Aug 2013 to 2000 Software EngineerCisco Systems, Inc New York, NY Jun 2012 to Aug 2012 Summer InternMicrosoft Corporation
Jun 2010 to Aug 2010 Summer Intern
Education:
New York University New York, NY 2011 to 2013 Master of Science in Computer ScienceShanghai Jiao Tong University 2007 to 2011 Bachelor in Electrical and Computer Engineering
Suzanne C. Aldous - Gillette NJ, US John Ziqi Jiang - Hillsborough NJ, US Jinqi Lu - Somerville NJ, US Liang Ma - Hillsborough NJ, US Lan Mu - Bedminster NJ, US Harry Randall Munson - Annandale NJ, US Jeffrey Stephen Sabol - Bridgewater NJ, US Sukanthini Thurairatnam - Bedminster NJ, US Christopher Loren Vandeusen - East Windsor NJ, US
- Armonk NY, US Liang Ma - White Plains NY, US Erich M. Nahum - New York NY, US Mudhakar Srivatsa - White Plains NY, US
International Classification:
H04L 12/24 H04L 12/26 G06F 9/00 H04L 29/08
Abstract:
A computer-implemented method, computer program product, and computer processing system are provided for client-side monitoring in a cloud provider environment including a network having a plurality of nodes. The method includes estimating a logical topology of the network by clustering source-destination node pairs while excluding intermediate nodes from among the plurality of nodes based on end-to-end performance measurements between various ones of the plurality of nodes forming the source-destination node pairs. The method also includes at least one of scheduling and customizing a workload within the network, and executing the workload within the network, based on the estimated logical topology.
- Armonk NY, US Ting He - Piermont NY, US Liang Ma - White Plains NY, US
International Classification:
H04L 12/24 H04L 29/08 H04L 12/26
Abstract:
Monitoring a network is provided. A set of predicted network topology snapshot graphs of nodes in the network are generated based on a set of network topology prediction models for the network. A subset of the nodes is selected as monitors in the set of predicted network topology snapshot graphs of the network so that each link in a set of selected network links is identifiable using end-to-end measurements between the monitors. Network states of interest are determined in the set of selected network links within a selected time window based on the end-to-end measurements between the monitors.
- Armonk NY, US Liang Ma - YORKTOWN NY, US Erich M. Nahum - New York NY, US Mudhakar Srivatsa - White Plains NY, US
International Classification:
H04L 12/24 H04L 29/08 H04L 12/26
Abstract:
A method is provided for client-side monitoring in a cloud provider environment including a network having a plurality of nodes. The method includes estimating a logical topology of the network by clustering source-destination node pairs from among the plurality of nodes based on end-to-end performance measurements between various ones of the plurality of nodes. The method further includes estimating a performance state of the network for a client application based on end-to-end performance measurements. The method also includes at least one of scheduling and customizing a workload within the network based on the estimated logical topology and the estimated performance state of the network.
Bounded-Budget Monitor Deployment In Monitoring Networks Via End-To-End Probes
- Armonk NY, US Ting He - Piermont NY, US Liang Ma - Armonk NY, US Bonnie K. Ray - Nyack NY, US
International Classification:
H04L 12/24
Abstract:
The present disclosure relates generally to mechanisms for bounded-budget monitor deployment in monitoring networks via end-to-end probes. In various embodiments, methodologies may be provided that automatically perform bounded-budget monitor deployment in monitoring networks via end-to-end probes.
Bounded-Budget Monitor Deployment In Monitoring Networks Via End-To-End Probes
- Armonk NY, US Ting He - Piermont NY, US Liang Ma - Armonk NY, US Bonnie K. Ray - Nyack NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 12/26 H04L 12/24
US Classification:
370250
Abstract:
The present disclosure relates generally to mechanisms for bounded-budget monitor deployment in monitoring networks via end-to-end probes. In various embodiments, methodologies may be provided that automatically perform bounded-budget monitor deployment in monitoring networks via end-to-end probes.