Patents by Inventor Mark Libby
Mark Libby has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11956131Abstract: Described are examples for providing end-to-end intent definition of network functions for network slice management. Intents are defined for each level of network constituent including slices, slice subnets, and management functions. A system of intent based network slice management includes a network slice management function (NSMF) configured to receive a service profile from a communication service management function (CSMF) and derive an intent for each desired network slice subnet for a network slice subnet management function (NSSMF). The NSSMF is configured to derive requirements for a plurality of network functions (NFs) and provide an intent defining the requirements of a respective NF to a network function management function (NFMF). The NFMF is configured to receive the intent for the respective NF via an intent-based interface for management of NFs and derive a network resource model (NRM) for the respective NF based on the intent.Type: GrantFiled: May 10, 2022Date of Patent: April 9, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ronald Mark Parker, Michael Anthony Brown, Bahareh Sadeghi, Mark Gordon Libby
-
Patent number: 11930358Abstract: A method of data communication includes receiving, by a first wireless access gateway (WAG), at least a first data packet corresponding to a first data flow transmitted from user equipment (UE) and receiving, by a second WAG, at least a second data packet transmitted from the UE. In response to receiving the second data packet, the second WAG determines an identity of the first WAG, and in response to determining the identity of the first WAG, the method includes establishing a tunnel connection between the first WAG and the second WAG. After establishing the tunnel connection, the method includes receiving by the second WAG at least a third data packet corresponding to the first data flow transmitted from the UE, and the second WAG transmits to the first WAG, via the tunnel connection, the third data packet.Type: GrantFiled: November 3, 2020Date of Patent: March 12, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Mark Libby, Deepak Garg, Girish Nair, Narsi Veldanda
-
Patent number: 11930390Abstract: Described are examples for providing intent based network slice management using a management data analytics function (MDAF) to predict deficiencies. A network management system receives an intent for a network slice constituent. The network management system configures computing resources for the network slice constituent to satisfy the intent based on expected performance of the computing resources. The network management system receives feedback with respect to actual performance of the network slice constituent. The network management system determines, based on analysis of the feedback by a management data analytics function (MDAF), a predicted deficiency of the network slice constituent not being able to satisfy the intent. The network management system modifies the configuration of the computing resources based on the feedback and the predicted deficiency to satisfy the intent.Type: GrantFiled: May 10, 2022Date of Patent: March 12, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ronald Mark Parker, Michael Anthony Brown, Bahareh Sadeghi, Mark Gordon Libby
-
Patent number: 11880419Abstract: A network function is implemented using cloud native architecture. The network function utilizes one or more loosely coupled and independently deployable microservice instances to perform services. To retain state between independent transactions, a microservice instance takes a soft lock on state data in an external database. The soft lock makes the state data unavailable except to the microservice instance. After the microservice instance completes the transaction, the microservice instance clears the lock so that the state data is available for use by other microservices.Type: GrantFiled: October 9, 2020Date of Patent: January 23, 2024Assignee: Microsoft Tech nology Licensing, LLCInventors: Mark Libby, Ronald M. Parker, Haibo Qian
-
Publication number: 20230050017Abstract: Techniques for distributed charging in digital telecommunications networks are disclosed. In one particular embodiment, the techniques may be realized as a method that includes provisioning a data path that carries a plurality of network flows, receiving a shared usage quota associated with the plurality of network flows, and allocating the shared usage quota among the plurality of network flows. For each network flow among the plurality of network flows, the method includes providing the data path with data indicative of an amount of the shared usage quota allocated to the network flow, configuring the data path to collect metering data associated with the network flow, and configuring the data path to enforce the shared usage quota based on the metering data associated with the network flow and the amount of the shared usage quota allocated to the network flow.Type: ApplicationFiled: October 24, 2022Publication date: February 16, 2023Inventors: Mark LIBBY, Anupama RAGHAVAN, Krishna GUNDAMARAJU, Girish NAIR
-
Patent number: 11483685Abstract: Techniques for distributed charging in digital telecommunications networks are disclosed. In one particular embodiment, the techniques may be realized as a method that includes provisioning a data path that carries a plurality of network flows, receiving a shared usage quota associated with the plurality of network flows, and allocating the shared usage quota among the plurality of network flows. For each network flow among the plurality of network flows, the method includes providing the data path with data indicative of an amount of the shared usage quota allocated to the network flow, configuring the data path to collect metering data associated with the network flow, and configuring the data path to enforce the shared usage quota based on the metering data associated with the network flow and the amount of the shared usage quota allocated to the network flow.Type: GrantFiled: May 1, 2020Date of Patent: October 25, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Mark Libby, Anupama Raghavan, Krishna Gundamaraju, Girish Nair
-
Patent number: 11032378Abstract: Embodiments disclosed herein relate to systems and methods for separately managing control and data plan contexts for a secure connection during a standby node switchover scenario. Primary and standby nodes for a secure connection can both maintain a data plane context for a secure connection such as IPSec. In the event that the primary node becomes inactive, the standby node can immediately begin processing data plane traffic using the data plane context for the secure connection maintained at the standby node. Control plane information necessary for programming and activating a control plane context can be stored until needed. During a switchover, the standby node can retrieve the control plane information and activate the control plane context after it has begun processing the data plane traffic.Type: GrantFiled: May 31, 2018Date of Patent: June 8, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Akash Baid, Vinay M. Cherian, Mark Libby, Nan Luo
-
Publication number: 20210109978Abstract: A network function is implemented using cloud native architecture. The network function utilizes one or more loosely coupled and independently deployable microservice instances to perform services. To retain state between independent transactions, a microservice instance takes a soft lock on state data in an external database. The soft lock makes the state data unavailable except to the microservice instance. After the microservice instance completes the transaction, the microservice instance clears the lock so that the state data is available for use by other microservices.Type: ApplicationFiled: October 9, 2020Publication date: April 15, 2021Inventors: Mark LIBBY, Ronald M. PARKER, Haibo QIAN
-
Publication number: 20210051476Abstract: A method of data communication includes receiving, by a first wireless access gateway (WAG), at least a first data packet corresponding to a first data flow transmitted from user equipment (UE) and receiving, by a second WAG, at least a second data packet transmitted from the UE. In response to receiving the second data packet, the second WAG determines an identity of the first WAG, and in response to determining the identity of the first WAG, the method includes establishing a tunnel connection between the first WAG and the second WAG. After establishing the tunnel connection, the method includes receiving by the second WAG at least a third data packet corresponding to the first data flow transmitted from the UE, and the second WAG transmits to the first WAG, via the tunnel connection, the third data packet.Type: ApplicationFiled: November 3, 2020Publication date: February 18, 2021Inventors: Mark LIBBY, Deepak GARG, Girish NAIR, Narsi VELDANDA
-
Publication number: 20200351626Abstract: Techniques for distributed charging in digital telecommunications networks are disclosed. In one particular embodiment, the techniques may be realized as a method that includes provisioning a data path that carries a plurality of network flows, receiving a shared usage quota associated with the plurality of network flows, and allocating the shared usage quota among the plurality of network flows. For each network flow among the plurality of network flows, the method includes providing the data path with data indicative of an amount of the shared usage quota allocated to the network flow, configuring the data path to collect metering data associated with the network flow, and configuring the data path to enforce the shared usage quota based on the metering data associated with the network flow and the amount of the shared usage quota allocated to the network flow.Type: ApplicationFiled: May 1, 2020Publication date: November 5, 2020Inventors: Mark LIBBY, Anupama RAGHAVAN, Krishna GUNDAMARAJU, Girish NAIR
-
Publication number: 20180352036Abstract: Embodiments disclosed herein relate to systems and methods for separately managing control and data plan contexts for a secure connection during a standby node switchover scenario. Primary and standby nodes for a secure connection can both maintain a data plane context for a secure connection such as IPSec. In the event that the primary node becomes inactive, the standby node can immediately begin processing data plane traffic using the data plane context for the secure connection maintained at the standby node. Control plane information necessary for programming and activating a control plane context can be stored until needed. During a switchover, the standby node can retrieve the control plane information and activate the control plane context after it has begun processing the data plane traffic.Type: ApplicationFiled: May 31, 2018Publication date: December 6, 2018Inventors: Akash BAID, Vinay M. CHERIAN, Mark LIBBY, Nan LUO
-
Patent number: 10129769Abstract: Systems and methods for adaptively adjusting a transaction rate at a mobile network node. A first mobile network client node receives configuration parameters including an initial transaction rate, a step up rate, a step down rate, a minimum rate, a maximum rate, an evaluation time period, a step up response time threshold, a step down response time threshold, a step up threshold percentage of responses, and a step down threshold percentage of responses. Responses associated with communications with the server node are received during a first time period associated with the evaluation time period. A percentage of the received responses being less than the step up response time threshold and a percentage of the received responses being greater than the step down response time threshold are determined. An initial transaction rate is increased by the step up rate or decreased by the step down rate based on the determined percentages.Type: GrantFiled: December 23, 2016Date of Patent: November 13, 2018Assignee: AFFIRMED NETWORKS, INC.Inventors: James L. Logan, Mark Libby, Narsi Veldanda, Rajesh Palakkal, Siddharth Bhojnagarwala
-
Publication number: 20180102056Abstract: A device, system, and method manages regional diversions. The method perform at a diversion server includes determining whether a diversion is to be used for an aircraft based on a primary expected operating capability of a primary airport that is a destination for the aircraft in transit. The method includes, when a diversion is to be used, selecting a secondary airport to which the aircraft is to be diverted, the secondary airport being selected based on a secondary expected operating capability. The method includes scheduling the diversion for the aircraft to the secondary airport.Type: ApplicationFiled: October 12, 2017Publication date: April 12, 2018Inventors: William Leber, Robert Junge, Mark Libby, Ron Dunsky
-
Publication number: 20180096612Abstract: A method performed by an optimization server for receiving an identification identifying an aircraft, identifying a gate assigned to the aircraft upon landing at a destination including the gate, determining whether a gate conflict is expected for the aircraft to use the gate, when there is a gate conflict, determining a resolution for the gate conflict based on actual departure demand information of the gate and providing a notification corresponding to the resolution.Type: ApplicationFiled: October 5, 2017Publication date: April 5, 2018Inventors: Noel Alphonso, Leo Prusak, Howard King, Mark Libby
-
Publication number: 20170195898Abstract: Systems and methods for adaptively adjusting a transaction rate at a mobile network node. A first mobile network client node receives configuration parameters including an initial transaction rate, a step up rate, a step down rate, a minimum rate, a maximum rate, an evaluation time period, a step up response time threshold, a step down response time threshold, a step up threshold percentage of responses, and a step down threshold percentage of responses. Responses associated with communications with the server node are received during a first time period associated with the evaluation time period. A percentage of the received responses being less than the step up response time threshold and a percentage of the received responses being greater than the step down response time threshold are determined. An initial transaction rate is increased by the step up rate or decreased by the step down rate based on the determined percentages.Type: ApplicationFiled: December 23, 2016Publication date: July 6, 2017Inventors: James L. LOGAN, Mark LIBBY, Narsi VELDANDA, Rajesh PALAKKAL, Siddharth BHOJNAGARWALA
-
Publication number: 20170195288Abstract: A method of data communication includes receiving, by a first wireless access gateway (WAG), at least a first data packet corresponding to a first data flow transmitted from user equipment (UE) and receiving, by a second WAG, at least a second data packet transmitted from the UE. In response to receiving the second data packet, the second WAG determines an identity of the first WAG, and in response to determining the identity of the first WAG, the method includes establishing a tunnel connection between the first WAG and the second WAG. After establishing the tunnel connection, the method includes receiving by the second WAG at least a third data packet corresponding to the first data flow transmitted from the UE, and the second WAG transmits to the first WAG, via the tunnel connection, the third data packet.Type: ApplicationFiled: December 22, 2016Publication date: July 6, 2017Inventors: Mark LIBBY, Deepak GARG, Girish NAIR, Narsi VELDANDA
-
Patent number: 8295278Abstract: The present invention provides systems and methods which create an infrastructure/transport Pseudowire (PW) a priori between two Provider Edge (PE) devices. Accordingly, other PWs can be mapped to this transport PW. In an exemplary application, the transport PW (which is a MS-PW by itself) can start and end between two Switching Provider Edge (S-PE) devices and span across multiple S-PEs in between. In another exemplary application, the transport PW terminates between two Terminating Provider Edge (T-PE) devices spanning across all S-PEs in between. In a further exemplary application, the transport PW can start at a S-PE or T-PE and terminate at a T-PE or S-PE, respectively. The placement of the endpoints of the transport PW (on two PEs) determines the number of intervening S-PEs that benefit from this application.Type: GrantFiled: December 18, 2007Date of Patent: October 23, 2012Assignee: Ciena CorporationInventors: Himanshu Shah, Mark Libby, David Parks
-
Publication number: 20090154453Abstract: The present invention provides systems and methods which create an infrastructure/transport Pseudowire (PW) a priori between two Provider Edge (PE) devices. Accordingly, other PWs can be mapped to this transport PW. In an exemplary application, the transport PW (which is a MS-PW by itself) can start and end between two Switching Provider Edge (S-PE) devices and span across multiple S-PEs in between. In another exemplary application, the transport PW terminates between two Terminating Provider Edge (T-PE) devices spanning across all S-PEs in between. In a further exemplary application, the transport PW can start at a S-PE or T-PE and terminate at a T-PE or S-PE, respectively. The placement of the endpoints of the transport PW (on two PEs) determines the number of intervening S-PEs that benefit from this application.Type: ApplicationFiled: December 18, 2007Publication date: June 18, 2009Inventors: Himanshu Shah, Mark Libby, David Parks
-
Publication number: 20070206562Abstract: The present invention provides methods and systems for the management of sequence-sensitive, connection-oriented traffic on a multi-link aggregated port. The methods include: at a first end of a multi-link aggregated port, selectively enabling a first constituent link of a plurality of constituent links to transmit data traffic in a first direction via a transmit state block associated with the first constituent link; and, at the first end of the multi-link aggregated port, selectively enabling the plurality of constituent links to receive data traffic from a second direction via a plurality of receive state blocks associated with the plurality of constituent links.Type: ApplicationFiled: March 2, 2006Publication date: September 6, 2007Inventors: Mark Libby, Ronald Parker, Fouad Hallal