Patents by Inventor Stephen G. Low
Stephen G. Low has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10275274Abstract: According to an example, configurable workload optimization may include selecting a performance optimized application workload from available performance optimized application workloads. A predetermined combination of removable workload optimized modules may be selected to implement the selected performance optimized application workload. Different combinations of the removable workload optimized modules may be usable to implement different ones of the available performance optimized application workloads. The predetermined combination of the removable workload optimized modules may be managed to implement the selected performance optimized application workload. Data flows directed to the predetermined combination of the removable workload optimized modules may be received.Type: GrantFiled: June 29, 2016Date of Patent: April 30, 2019Assignee: Trend Micro IncorporatedInventors: Stephen G. Low, James Rolette, Edward A. Wartha, Matthew Laswell
-
Patent number: 10243988Abstract: According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from the received data flows based on an analysis of attributes of the received data flows. The selected data flows may be less than the received data flows. A number of IPS data plane modules of the server that are available for inspection of the selected data flows may be determined. The selected data flows may be distributed between the IPS data plane modules based on the determined number of the IPS data plane modules. The distributed data flows may be inspected using the IPS data plane modules to identify malicious and benign data flows, and to determine whether to drop the malicious data flows, direct the malicious data flows to a predetermined destination, or forward the benign data flows to the end node modules.Type: GrantFiled: October 13, 2016Date of Patent: March 26, 2019Assignee: Trend Micro IncorporatedInventors: Stephen G. Low, James Rolette, Matthew Laswell
-
Patent number: 9705756Abstract: Embodiments of the present disclosure may include methods, systems, and computer readable media with executable instructions. An example method for network virtualization can include providing, by a datacenter (100) having physical and/or virtual resources, a number of virtual tenant datacenters (tDatacenters), each tDatacenter being isolated from other tDatacenters. A tenant virtual local area network (T-VLAN) (226, 228, 682) is associated to each of the number of tDatacenters, and a value of an end-to-end invariant network virtual local area network (VLAN) identification (VID) label (T-VID) is associated to a particular T-VLAN (226, 228, 682). A network packet associated with the particular T-VLAN (226, 228, 682) is modified at an edge network boundary (561) to include the T-VID. The T-VID is configured to have more than 4096 possible values.Type: GrantFiled: June 2, 2011Date of Patent: July 11, 2017Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Stephen G. Low, Paul T. Congdon, Mark A. Pearson, Charles L. Hudson
-
Patent number: 9614777Abstract: One example provides a network device including a queue to receive frames from a source, a processor, and a memory communicatively coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to determine whether a flow control threshold of the queue has been exceeded, and in response to determining that the flow control threshold of the queue has been exceeded, generate a message to be sent to the source of the frame that exceeded the flow control threshold. The message includes a pause duration for which the source is to stop transmitting frames.Type: GrantFiled: August 21, 2012Date of Patent: April 4, 2017Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Paul Allen Bottorff, Charles L Hudson, Michael Schlansker, Stephen G Low
-
Publication number: 20170034207Abstract: According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from the received data flows based on an analysis of attributes of the received data flows. The selected data flows may be less than the received data flows. A number of IPS data plane modules of the server that are available for inspection of the selected data flows may be determined. The selected data flows may be distributed between the IPS data plane modules based on the determined number of the IPS data plane modules. The distributed data flows may be inspected using the IPS data plane modules to identify malicious and benign data flows, and to determine whether to drop the malicious data flows, direct the malicious data flows to a predetermined destination, or forward the benign data flows to the end node modules.Type: ApplicationFiled: October 13, 2016Publication date: February 2, 2017Applicant: Trend Micro IncorporatedInventors: Stephen G. LOW, James ROLETTE, Matthew LASWELL
-
Publication number: 20160306653Abstract: According to an example, configurable workload optimization may include selecting a performance optimized application workload from available performance optimized application workloads. A predetermined combination of removable workload optimized modules may be selected to implement the selected performance optimized application workload. Different combinations of the removable workload optimized modules may be usable to implement different ones of the available performance optimized application workloads. The predetermined combination of the removable workload optimized modules may be managed to implement the selected performance optimized application workload. Data flows directed to the predetermined combination of the removable workload optimized modules may be received.Type: ApplicationFiled: June 29, 2016Publication date: October 20, 2016Applicant: Trend Micro IncorporatedInventors: Stephen G. LOW, James ROLETTE, Edward A. WARTHA, Matthew LASWELL
-
Publication number: 20150236955Abstract: One example includes a network device. The network device includes a queue to receive frames from a source, a processor, and a memory coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to deposit tokens into a first token bucket at a first rate, determine whether a frame length of a frame received by the queue is less than the tokens in the first token bucket, remove tokens from the first token bucket in response to the frame length being less than the tokens in the first token bucket, and generate a congestion notification message in response to the frame length not being less than the tokens in the first token bucket. Each token represents a unit of bytes of a predetermined size.Type: ApplicationFiled: August 21, 2012Publication date: August 20, 2015Inventors: Paul Allen Bottorff, Mark Allen Gravel, Charles L. Hudson, Stephen G. Low, Frederick Grant Kuhns
-
Publication number: 20150229575Abstract: One example provides a network device including a queue to receive frames from a source, a processor, and a memory communicatively coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to determine whether a flow control threshold of the queue has been exceeded, and in response to determining that the flow control threshold of the queue has been exceeded, generate a message to be sent to the source of the frame that exceeded the flow control threshold. The message includes a pause duration for which the source is to stop transmitting frames.Type: ApplicationFiled: August 21, 2012Publication date: August 13, 2015Inventors: Paul Allen Bottorff, Charles L Hudson, Michael Schlansker, Stephen G Low
-
Publication number: 20150195209Abstract: One example provides a network device including a queue to receive in profile frames and out of profile frames, a processor, and a memory communicatively coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to determine whether a predetermined operating point of the queue has been exceeded, and in response to determining that the predetermined operating point of the queue has been exceeded, forward the in profile frames, sample the out of profile frames, and generate a congestion notification message for each sampled out of profile frame to be sent to a source of the out of profile frames to reduce the transmission rate of frames.Type: ApplicationFiled: August 21, 2012Publication date: July 9, 2015Inventors: Paul Allen Bottorff, Mark Allen Gravel, Charles L. Hudson, Stephen G. Low, Frederick Grant Kuhns
-
Patent number: 8948180Abstract: A system and method are provided to route packets in a data center network. Individual packets are encapsulated at an edge of the data center network, so that each encapsulated packet includes a set of header fields, such as a tenant identifier. For each encapsulated packet, a hash class is determined from the set of header fields. A routing virtual local area network (VLAN) is selected for the packet based on the tenant identifier and the hash class.Type: GrantFiled: October 18, 2012Date of Patent: February 3, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Michael Schlansker, Jean Tourrilhes, Jose Renato G. Santos, Stephen G. Low, Paul Allen Bottorff
-
Publication number: 20140112137Abstract: A system and method are provided to route packets in a data center network. Individual packets are encapsulated at an edge of the data center network, so that each encapsulated packet includes a set of header fields, such as a tenant identifier. For each encapsulated packet, a hash class is determined from the set of header fields. A routing virtual local area network (VLAN) is selected for the packet based on the tenant identifier and the hash class.Type: ApplicationFiled: October 18, 2012Publication date: April 24, 2014Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Michael Schlansker, Jean Tourrilhes, Jose Renato G. Santos, Stephen G. Low, Paul Allen Bottorff
-
Publication number: 20130346583Abstract: Embodiments of the present disclosure may include methods, systems, and computer readable media with executable instructions. An example method for network virtualization can include providing, by a datacenter (100) having physical and/or virtual resources, a number of virtual tenant datacenters (tDatacenters), each tDatacenter being isolated from other tDatacenters. A tenant virtual local area network (T-VLAN) (226, 228, 682) is associated to each of the number of tDatacenters, and a value of an end-to-end invariant network virtual local area network (VLAN) identification (VID) label (T-VID) is associated to a particular T-VLAN (226, 228, 682). A network packet associated with the particular T-VLAN (226, 228, 682) is modified at an edge network boundary (561) to include the T-VID. The T-VID is configured to have more than 4096 possible values.Type: ApplicationFiled: June 2, 2011Publication date: December 26, 2013Inventors: Stephen G. Low, Paul T. Congdon, Mark A. Pearson, Charles L. Hudson
-
Publication number: 20130107887Abstract: In a method for maintaining virtual network context across multiple infrastructures, a data packet having a virtual network identifier in a first routing infrastructure is accessed, wherein the virtual network identifier indicates a tenant network. The data packet is encapsulated for transport of the data packet through a second routing infrastructure. In addition, the virtual network identifier is inserted into the encapsulation of the data packet for routing of the data packet through the second routing infrastructure while maintaining virtual network context and identification between the first routing infrastructure and the second routing infrastructure, wherein the first routing infrastructure operates under a first virtual networking technology and the second routing infrastructure operates under a second virtual networking technology.Type: ApplicationFiled: October 26, 2011Publication date: May 2, 2013Inventors: Mark A. Pearson, Stephen G. Low
-
Patent number: 8391174Abstract: According to one example of the present invention, there is provided a method of routing data packets to a plurality of packet processors in a computer network. The method comprising obtaining workload data from the packet processors, determining a workload distribution across the packet processors, and updating a balancing table used by a switching element in the network based on the determined workload.Type: GrantFiled: July 13, 2010Date of Patent: March 5, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Michael Schlansker, Jean Tourrilhes, Dwight L. Barron, Stephen G. Low
-
Publication number: 20120014265Abstract: According to one example of the present invention, there is provided a method of routing data packets to a plurality of packet processors in a computer network. The method comprising obtaining workload data from the packet processors, determining a workload distribution across the packet processors, and updating a balancing table used by a switching element in the network based on the determined workload.Type: ApplicationFiled: July 13, 2010Publication date: January 19, 2012Inventors: Michael Schlansker, Jean Tourrilhes, Dwight L. Barron, Stephen G. Low
-
Patent number: 6545981Abstract: A system and method for facilitating both in-order and out-of-order packet reception in a SAN includes requestor and responder nodes, coupled by a plurality of paths, that maintain the good and bad status of each path and also maintain local copies of a message sequence number. If an error occurs for a transaction over a given path, the requestor informs the responder, over a good path, that the given path has failed and both nodes update their path status to indicate that the given path is bad. A barrier transaction is used by the requestor to determine whether the error is transient or permanent, and, if the error is transient, the requestor retries the transaction.Type: GrantFiled: December 30, 1998Date of Patent: April 8, 2003Assignee: Compaq Computer CorporationInventors: David J. Garcia, Richard O. Larson, Stephen G. Low, William J. Watson
-
Patent number: 6157967Abstract: A multiprocessor system includes a number of sub-processor systems, each substantially identically constructed, and each comprising a central processing unit (CPU), and at least one I/O device, interconnected by routing apparatus that also interconnects the sub-processor systems. A CPU of any one of the sub-processor systems may communicate, through the routing elements, with any I/O device of the system, or with any CPU of the system.Communications between I/O devices and CPUs is by packetized messages. Interrupts from I/O devices are communicated from the I/O devices to the CPUs (or from one CPU to another CPU) as message packets.CPUs and I/O devices may write to, or read from, memory of a CPU of the system. Memory protection is provided by an access validation method maintained by each CPU in which CPUs and/or I/O devices are provided with a validation to read/write memory of that CPU, without which memory access is denied.Type: GrantFiled: December 30, 1997Date of Patent: December 5, 2000Assignee: Tandem Computer IncorporatedInventors: Robert W. Horst, William Edward Baker, Linda Ellen Zalzala, William Patterson Bunton, Richard W. Cutts, Jr., David J. Garcia, John C. Krause, Stephen G. Low, David Paul Sonnier, William Joel Watson, Patracia L. Whiteside
-
Patent number: 5751932Abstract: A multiprocessor system includes a number of sub-processor systems, each substantially identically constructed, and each comprising a central processing unit (CPU), and at least one I/O device, interconnected by routing apparatus that also interconnects the sub-processor systems. A CPU of any one of the sub-processor systems may communicate, through the routing elements, with any I/O device of the system, or with any CPU of the system. The CPUs are structured to operate in one of two modes: a simplex mode in which the two CPUs operate independently of each other, and a duplex mode in which the CPUs operate in lock-step synchronism to execute each instruction of identical instruction streams at substantially the same time. Communications between I/O devices and CPUs is by packetized messages. Interrupts from I/O devices are communicated from the I/O devices to the CPUs (or from one CPU to another CPU) as message packets. CPUs and I/O devices may write to, or read from, memory of a CPU of the system.Type: GrantFiled: June 7, 1995Date of Patent: May 12, 1998Assignee: Tandem Computers IncorporatedInventors: Robert W. Horst, William Edward Baker, Randall G. Banton, John Michael Brown, William F. Bruckert, William Patterson Bunton, Gary F. Campbell, John Deane Coddington, Richard W. Cutts, Jr., Barry Lee Drexler, Harry Frank Elrod, Daniel L. Fowler, David J. Garcia, Paul N. Hintikka, Geoffrey I. Iswandhi, Douglas Eugene Jewett, Curtis Willard Jones, Jr., James Stevens Klecka, John C. Krause, Stephen G. Low, Susan Stone Meredith, Steven C. Meyers, David P. Sonnier, William Joel Watson, Patricia L. Whiteside, Frank A. Williams, Linda Ellen Zalzala