Patents by Inventor Nikolaj Bjorner
Nikolaj Bjorner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240015094Abstract: A system manages network traffic in a distributed system comprising a plurality of network devices. The network devices are divided into a plurality of network slices, each of the network slices including a subset of the network devices such that there is no overlap of network devices between the network slices. Individual network slices are associated with individual slice controllers, and an individual slice controller is configured to manage network routing of an individual network slice. Each of the individual slice controllers route the network traffic within each respective individual network slice. The network traffic is independently routed based on expected network conditions for each respective individual network slice, and data defining routing decisions is contained within each network slice to limit fault effects between the network slices.Type: ApplicationFiled: September 26, 2023Publication date: January 11, 2024Inventors: Umesh KRISHNASWAMY, Rachee SINGH, Nikolaj BJORNER, Himanshu RAJ
-
Patent number: 11811646Abstract: A system manages network traffic in a distributed system comprising a plurality of network devices. The network devices are divided into a plurality of network slices, each of the network slices including a subset of the network devices such that there is no overlap of network devices between the network slices. Individual network slices are associated with individual slice controllers, and an individual slice controller is configured to manage network routing of an individual network slice. Each of the individual slice controllers route the network traffic within each respective individual network slice. The network traffic is independently routed based on expected network conditions for each respective individual network slice, and data defining routing decisions is contained within each network slice to limit fault effects between the network slices.Type: GrantFiled: May 28, 2022Date of Patent: November 7, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Umesh Krishnaswamy, Rachee Singh, Nikolaj Bjorner, Himanshu Raj
-
Publication number: 20230300053Abstract: A network verification system uses general-purpose programming language to create network verification tests. A test orchestrator builds a model of the network only using data from the network verification test. An optimization testing manager creates symbolic packets for verification tests using assertions based on a packet library embedded into the testing manager and the general-purpose programming language.Type: ApplicationFiled: April 30, 2021Publication date: September 21, 2023Inventors: Ryan Andrew BECKETT, Karthick JAYARAMAN, Neha Milind RAJE, Jitendra PADHYE, Christopher Scott JOHNSTON, Steven Jeffrey BENALOH, Nikolaj BJORNER, Andrey Aleksandrovic RYBALCHENKO, Nuno CERQUEIRA AFONSO, Nuno CLAUDINO PEREIRA LOPES, Sharad AGARWAL, Hang Kwong LEE, Aniruddha PARKHI, Maik RIECHERT
-
Publication number: 20230275828Abstract: A system manages network traffic in a distributed system comprising a plurality of network devices. The network devices are divided into a plurality of network slices, each of the network slices including a subset of the network devices such that there is no overlap of network devices between the network slices. Individual network slices are associated with individual slice controllers, and an individual slice controller is configured to manage network routing of an individual network slice. Each of the individual slice controllers route the network traffic within each respective individual network slice. The network traffic is independently routed based on expected network conditions for each respective individual network slice, and data defining routing decisions is contained within each network slice to limit fault effects between the network slices.Type: ApplicationFiled: May 28, 2022Publication date: August 31, 2023Inventors: Umesh KRISHNASWAMY, Rachee SINGH, Nikolaj BJORNER, Himanshu RAJ
-
Patent number: 11121934Abstract: A network verification system uses general-purpose programming language to create network verification tests. A test orchestrator builds a model of the network only using data from the network verification test. An optimization testing manager creates symbolic packets for verification tests using assertions based on a packet library embedded into the testing manager and the general-purpose programming language.Type: GrantFiled: December 8, 2020Date of Patent: September 14, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Ryan Andrew Beckett, Karthick Jayaraman, Neha Milind Raje, Jitendra Padhye, Christopher Scott Johnston, Steven Jeffrey Benaloh, Nikolaj Bjorner, Andrey Aleksandrovic Rybalchenko, Nuno Cerqueira Afonso, Nuno Claudino Pereira Lopes, Sharad Agarwal, Hang Kwong Lee, Aniruddha Parkhi, Maik Riechert
-
Patent number: 10411967Abstract: The present technology is generally directed to updating a cloud network. This technology may include generating a set is inequalities based network topology information, shared risk link group information, demand information, and traffic solver parameters. The set of inequalities may also be based upon a model of traffic routing that is based on selection of routes based on dynamic and global traffic engineering. A capacity plan may also be generated based on the set of inequalities and at least one objective. The capacity plan may include a target capacity for each link of the plurality of links in the network.Type: GrantFiled: October 13, 2016Date of Patent: September 10, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Umesh Krishnaswamy, Nikolaj Bjorner, Muntazir Mehdi
-
Publication number: 20180109424Abstract: The present technology is generally directed to updating a cloud network. This technology may include generating a set is inequalities based network topology information, shared risk link group information, demand information, and traffic solver parameters. The set of inequalities may also be based upon a model of traffic routing that is based on selection of routes based on dynamic and global traffic engineering. A capacity plan may also be generated based on the set of inequalities and at least one objective. The capacity plan may include a target capacity for each link of the plurality of links in the network.Type: ApplicationFiled: October 13, 2016Publication date: April 19, 2018Inventors: Umesh Krishnaswamy, Nikolaj Bjorner, Muntazir Mehdi
-
Patent number: 9424157Abstract: A computer management system may track services on multiple computers executing the same workload. Various performance counters may be retrieved from the computers and analyzed to identify those with low deviations and low mean deviations. Statistical tests may then be used to compare the values of a particular computer to the deviation of the group of computers to identify outliers, which may indicate degraded performance and imminent failure of the computer. The management system may analyze any collectable performance related parameter to identify outlying systems.Type: GrantFiled: March 11, 2014Date of Patent: August 23, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Nikolaj Bjorner, Assaf Schuster, Moshe Gabel, Ran Gilad-Bachrach
-
Publication number: 20140195860Abstract: A computer management system may track services on multiple computers executing the same workload. Various performance counters may be retrieved from the computers and analyzed to identify those with low deviations and low mean deviations. Statistical tests may then be used to compare the values of a particular computer to the deviation of the group of computers to identify outliers, which may indicate degraded performance and imminent failure of the computer. The management system may analyze any collectable performance related parameter to identify outlying systems.Type: ApplicationFiled: March 11, 2014Publication date: July 10, 2014Applicant: Microsoft CorporationInventors: Nikolaj Bjorner, Assaf Schuster, Moshe Gabel, Ran Gilad-Bachrach
-
Patent number: 8677191Abstract: A computer management system may track services on multiple computers executing the same workload. Various performance counters may be retrieved from the computers and analyzed to identify those with low deviations and low mean deviations. Statistical tests may then be used to compare the values of a particular computer to the deviation of the group of computers to identify outliers, which may indicate degraded performance and imminent failure of the computer. The management system may analyze any collectable performance related parameter to identify outlying systems.Type: GrantFiled: December 13, 2010Date of Patent: March 18, 2014Assignee: Microsoft CorporationInventors: Nikolaj Bjorner, Assaf Schuster, Moshe Gabel, Ran Gilad-Bachrach
-
Publication number: 20120151276Abstract: A computer management system may track services on multiple computers executing the same workload. Various performance counters may be retrieved from the computers and analyzed to identify those with low deviations and low mean deviations. Statistical tests may then be used to compare the values of a particular computer to the deviation of the group of computers to identify outliers, which may indicate degraded performance and imminent failure of the computer. The management system may analyze any collectable performance related parameter to identify outlying systems.Type: ApplicationFiled: December 13, 2010Publication date: June 14, 2012Applicant: MICROSOFT CORPORATIONInventors: Nikolaj BJORNER, Assaf Schuster, Moshe Gabel, Ran Gilad-Bachrach
-
Patent number: 8140459Abstract: Relevancy propagation for efficient theory combination is described. In one implementation, an efficient SMT solver dynamically applies relevancy propagation to limit propagation of unnecessary constraints in a DPLL-based solver. This provides a drastic increase in speed and performance over conventional DPLL-based solvers. The relevancy propagation is guided by relevancy rules, which in one implementation emulate Tableau rules for limiting constraint propagation, while maintaining the performance of efficient DPLL-based solvers. An exemplary solver propagates truth assignments to constraints of a formula, and tracks which truth assignments are relevant for determining satisfiability of the formula. The solver propagates truth assignments that were marked relevant to a theory solver, while avoiding propagation of irrelevant truth assignments.Type: GrantFiled: February 21, 2008Date of Patent: March 20, 2012Assignee: Microsoft CorporationInventors: Nikolaj Bjorner, Leonardo Mendonca de Moura
-
Publication number: 20070220328Abstract: Aspects of the subject matter described herein relate to shutdown recovery for resource replication systems. In aspects, a mechanism is described in which a machine having replicated data thereon can recover from a dirty shutdown. First, the machine determines whether a dirty shutdown has occurred. If so, the machine automatically performs shutdown recovery by causing resource metadata stored by the machine to be consistent with resource data stored by the machine. This may involve fixing the resource metadata for updates to the resource data that were not flushed to disk or may involve deleting the resource metadata and restoring it from another machine replicating the data.Type: ApplicationFiled: February 28, 2006Publication date: September 20, 2007Applicant: Microsoft CorporationInventors: Huisheng Liu, Guhan Suriyanarayanan, Nikolaj Bjorner, Dan Teodosiu
-
Publication number: 20070220067Abstract: Aspects of the subject matter described herein relate to replicating initial content in resource replication systems. In aspects, each member participating in a replica group obtains a content set state from a directory service. The content set state indicates whether the member is allowed to synchronize resources with another member participating in the replica group. If the member is designated as a primary member, the member may replicate out resources to its downstream partners. If a member is not designated as a primary member, the member may not replicate out resources to its downstream partners until it has successfully synchronized resources with an upstream partner. Fence values may be set which control which resources win (and are replicated out) during synchronization.Type: ApplicationFiled: February 28, 2006Publication date: September 20, 2007Applicant: Microsoft CorporationInventors: Guhan Suriyanarayanan, Huisheng Liu, Shobana Balakrishnan, Nikolaj Bjorner
-
Publication number: 20070185932Abstract: Various embodiments introduce the notion of a replication entity which implements a highly scalable file replication system. In one embodiment, the replication entity resides in the form of a scalable replication service. In at least some embodiments, the replication service provides a “drive in the sky” facility that can be used by individuals, such as subscribers, to synchronize their individual machines, such that their files are automatically replicated to a safe and always-on location. Alternatively or additionally, individuals such as subscribers can also access their files via a web-based interface when they are away from their machines.Type: ApplicationFiled: February 1, 2006Publication date: August 9, 2007Applicant: Microsoft CorporationInventors: Dan Teodosiu, David Steere, Muthukaruppan Annamalai, Nikolaj Bjorner, Michael Bohlander, Huisheng Liu, Patrick Bozeman
-
Publication number: 20070168516Abstract: Aspects of the subject matter described herein relate to resource replication systems. In aspects, a mechanism is described that detects when local resources are stale. Local resources may be stale when the time between a last successful synchronization activity and a current time exceeds a staleness value. If the local resources are determined to be stale, the local member may refrain from certain synchronization activities until the local member is allowed to resume these certain synchronization activities. If the local resources are not stale, additional synchronization activities including synchronizing resources between the member and an upstream or downstream partner may be performed.Type: ApplicationFiled: February 28, 2006Publication date: July 19, 2007Applicant: Microsoft CorporationInventors: Huisheng Liu, Guhan Suriyanarayanan, Nikolaj Bjorner
-
Publication number: 20070112887Abstract: Aspects of the subject matter described herein relate to resource replication systems. In aspects, a mechanism is described that maintains replicated resources on a slave member that participates in a replica group. The slave member detects that a local resource has been updated locally. If the resource was created locally in the update, the slave member deletes the local resource. Otherwise, the slave member determines an upstream partner from which to install a replacement resource and then installs the replacement resource. In aspects, this behavior undoes local updates to local resources that occur on the slave member.Type: ApplicationFiled: February 28, 2006Publication date: May 17, 2007Applicant: Microsoft CorporationInventors: Huisheng Liu, Nikolaj Bjorner, Guhan Suriyanarayanan
-
Publication number: 20070026373Abstract: Aspects of the subject matter described herein relate to replicating resources across machines participating in a replica set. In aspects, a downstream machine requests that an upstream machine notify the downstream machine when updates to resources of the replica set occur. When such updates occur, the upstream machine notifies the downstream machine. In response thereto, the downstream machine requests resource meta-data and may include a limit as to how much resource meta-data may be sent. The upstream machine responds with the requested resource meta-data. Thereafter, the downstream machine determines which data associated with the updated resources to request and requests such data.Type: ApplicationFiled: November 2, 2005Publication date: February 1, 2007Applicant: Microsoft CorporationInventors: Guhan Suriyanarayanan, Nikolaj Bjorner, Rafik Robeal, Shi Cong, Joseph Porkka, Christophe Robert, Dan Teodosiu, David Golds, Huisheng Liu, Shobana Balakrishnan
-
Publication number: 20070016621Abstract: A computing device has a file stored on a storage volume by a file system and accessed through such file system. The file is defined to include data and metadata relating to the data, and at least a portion of the data of the file is removed from the file and stored at an alternate location such that the data does not occupy substantially any space on the volume and the file is in a reduced, ghosted form. The ghosted file is reconstituted for use by retrieving the data from the alternate location and associating such retrieved data with such ghosted file to form the reconstituted file.Type: ApplicationFiled: July 14, 2005Publication date: January 18, 2007Applicant: Microsoft CorporationInventors: Sarosh Havewala, Guhan Suriyanarayanan, Christophe Robert, Shobana Balakrishnan, Dan Teodosiu, Nikolaj Bjorner
-
Publication number: 20060184652Abstract: Remote differential compression is integrated within applications. Objects are updated between two or more computing devices using remote differential compression (RDC) techniques such that required data transfers are minimized. An algorithm provides enhanced efficiencies for allowing the receiver to locate a set of objects that are similar to the object that needs to be transferred from the sender. Once this set of similar objects has been found, the receiver may reuse any chunks from these objects during the RDC algorithm.Type: ApplicationFiled: February 16, 2005Publication date: August 17, 2006Applicant: Microsoft CorporationInventors: Dan Teodosiu, Jay Paulus, Joseph Porkka, Nikolaj Bjorner, Robert Post, William Scheidel, Richard Chinn