Patents by Inventor Paramvir Bahl

Paramvir Bahl has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230016213
    Abstract: The present application relates to communications between a partner network and a wide area network (WAN). The partner network and WAN may exchange representations of the respective networks including a delay profile for the partner network. The WAN receives a network delay profile for multiple virtual network entities within the partner network. The multiple virtual network entities include at least a plurality of peering locations with the WAN. The WAN determines a path from the partner network through the WAN via a selected peering location of the plurality of peering locations with the WAN to a destination based on at least the network delay profile. The WAN deploys a policy for an agent within the partner network. The policy identifies traffic for the destination to route through the WAN via the selected peering location. The WAN routes traffic from the selected peering location to the destination along the path.
    Type: Application
    Filed: July 15, 2021
    Publication date: January 19, 2023
    Inventors: Paramvir Bahl, Ryan Andrew Beckett, Abhishek Udupa, Sharad Agarwal, Rachee Singh
  • Publication number: 20230018685
    Abstract: The present application relates to communications between a partner network and a wide area network (WAN) via the Internet. Although Internet service providers may act as autonomous systems, the WAN may control routing from the partner network by advertising unicast border gateway protocol (BGP) address prefixes for a plurality of front-end devices in the WAN. An agent in the partner network measures a plurality of paths to a service within the WAN. Each of the plurality of paths is associated with one of the plurality of front-end devices and a respective unicast BGP address prefix. The WAN selects a path within the WAN for the service. The WAN exports a routing rule to the agent. The agent forwards data packets for the service to the respective BGP address prefix via the Internet. The WAN receives data packets for the service of the partner network at the selected device.
    Type: Application
    Filed: July 15, 2021
    Publication date: January 19, 2023
    Inventors: Sharad AGARWAL, Ryan Andrew BECKETT, Abhishek UDUPA, Rachee SINGH, Paramvir BAHL
  • Publication number: 20230013211
    Abstract: The present application relates to communications between a partner network and a wide area network (WAN) via the Internet. The WAN advertises unicast border gateway protocol (BGP) address prefixes for a plurality of front-end devices in the WAN. An agent in the partner network measures a plurality of paths to a service within the WAN. Each of the plurality of paths is associated with one of the plurality of front-end devices and a respective unicast BGP address prefix. The agent provides measurements of the plurality of paths to the WAN. The WAN selects a path within the WAN for the service. The agent receives a routing rule specifying a unicast address prefix for a selected device of the plurality of front-end devices of the WAN. The agent forwards data packets for the service to the respective border gateway protocol address prefix of the selected device via the Internet.
    Type: Application
    Filed: July 15, 2021
    Publication date: January 19, 2023
    Inventors: Sharad Agarwal, Ryan Andrew Beckett, Abhishek Udupa, Rachee Singh, Paramvir Bahl
  • Publication number: 20230007077
    Abstract: Described are examples for deploying workloads in a cloud-computing environment. In an aspect, based on a desired number of workloads of a process to be executed in a cloud-computing environment and based on one or more failure probabilities, an actual number of workloads of the process to execute in the cloud-computing environment to provide a level of service can be determined and deployed. In another aspect, a standby workload can be executed as a second instance of the process without at least a portion of the separate configuration used by the multiple workloads, and based on detecting termination of one of multiple workloads, the standby workload can be configured to execute based on the separate configuration of the separate instance of the process corresponding to the one of the multiple workloads.
    Type: Application
    Filed: September 8, 2022
    Publication date: January 5, 2023
    Inventors: Sanjeev MEHROTRA, Paramvir BAHL, Anuj KALIA
  • Publication number: 20220414264
    Abstract: Systems and methods are provided for performing privacy transformation of data to protect privacy in data analytics under the multi-access edge computing environment. In particular, a policy receiver in an edge server receives privacy instructions. Inference determiner in the edge server in a data analytics pipeline receives data from an IoT device and evaluates the data to recognize data associated with personally identifiable information. Privacy data transformer transforms the received data with inference for protecting data privacy by preventing exposure of private information from the edge server. In particular, the privacy data transformer dynamically selects a technique among techniques for removing information that is subject to privacy protection and transforms the received data using the technique.
    Type: Application
    Filed: June 28, 2021
    Publication date: December 29, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ganesh ANANTHANARAYANAN, Landon Prentice COX, Paramvir BAHL
  • Publication number: 20220417102
    Abstract: Described are examples for providing a system for managing configuration and policies for a virtualized wide area network (vWAN) support on a wide area network (WAN). The vWAN includes a plurality of virtual network entities associated with geographic locations including the physical computing resources of the WAN and virtual connections between the virtual network entities. The system includes a network safety component for managing configurations and policies of the vWAN on the WAN. The network safety component receives a change to a policy or configuration of the vWAN from an operator of a network connected to the vWAN. The network safety component evaluates a set of safety rules for the operator based on the change and a network state of a physical WAN underlying the vWAN. The network safety component generates an error message in response to at least one of the set of safety rules failing the evaluation.
    Type: Application
    Filed: June 25, 2021
    Publication date: December 29, 2022
    Inventors: Ryan Andrew BECKETT, Sharad AGARWAL, Paramvir BAHL, Rachee SINGH, Abhishek UDUPA
  • Publication number: 20220417948
    Abstract: Aspects include a machine learning based resource block scheduler configured to meet service level requirements of applications. Aspects include receiving a plurality of scheduling requests each associated with a respective application of a plurality of applications on a plurality of wireless devices, identifying a plurality of current channel state information each associated with one of the plurality of wireless devices, and identifying a plurality of different types of service level requirements each associated with one of the plurality of applications.
    Type: Application
    Filed: June 23, 2021
    Publication date: December 29, 2022
    Inventors: Arjun Varman Balasingam, Paramvir Bahl, Manikanta Kotaru
  • Publication number: 20220414534
    Abstract: Systems and methods are provided for continuous learning of models across hierarchies under a multi-access edge computing. In particular, an on-premises edge server, using a model, generates inference data associated with captured stream data. A data drift determiner determines a data drift in the inference data by comparing the data against reference data generated using a golden model. The data drift indicates a loss of accuracy in the inference data. A gateway model maintains one or more models in a model cache for update the model. The gateway model instructs the one or more servers to train the new model. The gateway model transmits the trained model to update the model in the on-premises edge server. Training the new model includes determining an on-premises edge server with computing resources available to train the new model while generating other inference data for incoming stream data in the data analytic pipeline.
    Type: Application
    Filed: June 29, 2021
    Publication date: December 29, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ganesh ANANTHANARAYANAN, Yuanchao SHU, Paramvir BAHL, Tsuwang HSIEH
  • Publication number: 20220417103
    Abstract: Described are examples for providing management of a virtual wide area network (vWAN) based on operator policies. A network orchestrator presents, to a network operator, a representation of the vWAN including virtual network entities associated with respective geographic locations and virtual connections between the virtual network entities. The network orchestrator receives a policy for the virtual wide area network from the network operator via the representation, the policy to be implemented at one or more of the virtual connections. The network orchestrator translates the policy for the virtual wide area network into a configuration of an underlying wide area network (WAN). The underlying WAN a plurality of geographically distributed physical computing resources in geographic regions corresponding to the virtual network entities and connections there between.
    Type: Application
    Filed: June 25, 2021
    Publication date: December 29, 2022
    Inventors: Ryan Andrew BECKETT, Sharad AGARWAL, Paramvir BAHL, Rachee SINGH, Abhishek UDUPA
  • Patent number: 11540298
    Abstract: In a 5G network, a slice controller operating in a radio access network (RAN) is arranged to make predictions of channel state information (CSI) for user equipment (UE) on the network using a predictive propagation model. The slice controller uses the predicted CSI to schedule subcarriers and time slots associated with physical radio resources for data transmission on slices of the 5G network between a 5G radio unit (RU) and the UE to maximize network throughput on a slice for the radio spectrum that is utilized for a given time period. In view of the CSI predictions, the slice controller controls operations of the MAC (Medium Access Control) layer functions based on PHY (physical) layer radio resource subsets to schedule the subcarrier and time slots for data transmissions on a slice over the 5G air interface from RU to UE.
    Type: Grant
    Filed: May 21, 2021
    Date of Patent: December 27, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Manikanta Kotaru, Paramvir Bahl, Arjun Varman Balasingam
  • Publication number: 20220408377
    Abstract: A method for controlling transmission power from one or more radio units is provided including monitoring channel state feedback for a signal communicated between a first radio unit of the one or more radio units and a user device in a transmitted frequency range, wherein the channel state feedback is based at least in part on a metric of quality of the communicated radiofrequency signal, determining that the channel state feedback satisfies a channel state condition, wherein the channel state condition includes a metric to evaluate performance of the one or more radio units relative to the user device based at least on the metric of quality of the communicated signal, and transmitting an instruction to adjust a transmission power in the transmitted frequency range of at least one of the one or more radio units based at least on the satisfaction of the channel state condition.
    Type: Application
    Filed: June 17, 2021
    Publication date: December 22, 2022
    Inventors: Manikanta KOTARU, Paramvir BAHL
  • Publication number: 20220408262
    Abstract: Slice control elements in a 5G slicing framework are instantiated in trusted hardware to provide for sealed data transmission in a trusted slice. In addition to sealing the data plane in the trusted slice, the control plane for the slice may be secured by the instantiation into the trusted hardware of layer 2 (medium access control—MAC) scheduling functions for radio resources (e.g., subcarriers and time slots). Layer 1 (physical—PHY) may also be configured to further enhance security of the trusted slice by isolating its PHY layer from that of other trusted and non-trusted slices. Such isolation may be implemented, for example, by using dedicated PHY resources, or by limiting resource time sharing to provide temporal isolation.
    Type: Application
    Filed: June 22, 2021
    Publication date: December 22, 2022
    Inventors: Stefan SAROIU, Paramvir BAHL, Manikanta KOTARU
  • Publication number: 20220407890
    Abstract: Slices of a 5G network may be configured to implement a trust model by which network customers are provided with assurances that slice properties meet agreed-upon criteria specified by customer policy so that slices can be trusted. Illustrative slice properties may pertain to service types, geographic area of operations, and attributes associated with software, firmware, and hardware used in the infrastructure of nodes in a trusted slice. Particular values of the properties describe a slice configuration that may be measured, digested, and attested to the customer to provide assurances that the configuration conforms with the policy. The 5G slice trust model may be implemented as a two-way model in which a slice provider performs checks to verify slice properties while customers ensure that only authenticated and authorized user equipment (UE) will access a trusted slice.
    Type: Application
    Filed: June 22, 2021
    Publication date: December 22, 2022
    Inventors: Stefan SAROIU, Paramvir BAHL
  • Publication number: 20220400085
    Abstract: Computing resources are managed in a computing environment comprising a computing service provider and an edge computing network. The edge computing network comprises computing and storage devices configured to extend computing resources of the computing service provider to remote users of the computing service provider. The edge computing network collects capacity and usage data for computing and network resources at the edge computing network. The capacity and usage data is sent to the computing service provider. Based on the capacity and usage data, the computing service provider, using a cost function, determines a distribution of workloads pertaining to a processing pipeline that has been partitioned into the workloads. The workloads can be executed at the computing service provider or the edge computing network.
    Type: Application
    Filed: June 15, 2021
    Publication date: December 15, 2022
    Inventors: Ganesh ANANTHANARAYANAN, Yuanchao SHU, Paramvir BAHL
  • Publication number: 20220386171
    Abstract: Aspects of the present disclosure relate to allocating RAN resources among RAN slices using a machine learning model. In examples, the machine learning model may determine an optimal RAN resource configuration based on compute power needs. As a result, RAN resource allocation generation and compute power requirements may improve, even in instances with changing or unknown network conditions. In examples, a prediction engine may receive communication parameters and/or requirements associated with service-level agreements (SLAs) for applications executing at least partially at a device in communication with the RAN. The RAN may generate one or more RAN resource configuration for implementation among RAN slices. Upon a change in network conditions or SLA requirements, an optimal RAN configuration may be determined in terms of required compute power.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Manikanta KOTARU, Arjun Varman BALASINGAM, Paramvir BAHL
  • Publication number: 20220377612
    Abstract: Described are examples for receiving, from one or more second virtual radio access network (vRAN) workloads operating one or more second cells, an indication of a measurement of at least a first signal transmitted by a first vRAN workload operating a first cell, computing, based on measurements of at least the first signal as received from the one or more second vRAN workloads, a boundary of the first cell, and adjusting, based on the boundary of the first cell, a transmit parameter of the first vRAN workload for transmitting signals in the first cell.
    Type: Application
    Filed: May 18, 2021
    Publication date: November 24, 2022
    Inventors: Bozidar RADUNOVIC, Sanjeev MEHROTRA, Yongguang ZHANG, Paramvir BAHL, Xenofon FOUKAS
  • Publication number: 20220377597
    Abstract: In a 5G network, a slice controller is arranged to dynamically configure a radio access network (RAN) by allocating physical radio resources into RAN slices by making predictions of channel state information (CSI) for user equipment (UE) executing applications that make connectivity requests for admission to particular identified slices. The slice controller grants or denies admission requests based on the predicted CSI to ensure that applicable service level agreement (SLA) guarantees are satisfied for traffic across all the RAN slices. Each time new admission requests are received from applications, the slice controller determines whether a suitable RAN configuration exists that will enable SLA guarantees for the slices to continue to be satisfied for the current traffic while also meeting the SLA guarantees applicable to the new admission request.
    Type: Application
    Filed: May 19, 2021
    Publication date: November 24, 2022
    Inventors: Manikanta KOTARU, Paramvir BAHL, Arjun Varman BALASINGAM
  • Publication number: 20220377751
    Abstract: In a 5G network, a slice controller operating in a radio access network (RAN) is arranged to make predictions of channel state information (CSI) for user equipment (UE) on the network using a predictive propagation model. The slice controller uses the predicted CSI to schedule subcarriers and time slots associated with physical radio resources for data transmission on slices of the 5G network between a 5G radio unit (RU) and the UE to maximize network throughput on a slice for the radio spectrum that is utilized for a given time period. In view of the CSI predictions, the slice controller controls operations of the MAC (Medium Access Control) layer functions based on PHY (physical) layer radio resource subsets to schedule the subcarrier and time slots for data transmissions on a slice over the 5G air interface from RU to UE.
    Type: Application
    Filed: May 21, 2021
    Publication date: November 24, 2022
    Inventors: Manikanta KOTARU, Paramvir BAHL, Arjun Varman BALASINGAM
  • Publication number: 20220377615
    Abstract: Described are examples for monitoring performance metrics of one or more workloads in a cloud-computing environment and reallocating compute resources based on the monitoring. Reallocating compute resources can include migrating workloads among nodes or other resources in the cloud-computing environment, reallocating hardware accelerator resources, adjusting transmit power for virtual radio access network (vRAN) workloads, and/or the like.
    Type: Application
    Filed: May 18, 2021
    Publication date: November 24, 2022
    Inventors: Bozidar RADUNOVIC, Sanjeev MEHROTRA, Yongguang ZHANG, Paramvir BAHL, Xenofon FOUKAS
  • Publication number: 20220374262
    Abstract: Systems and methods are provided for offloading a task from a central processor in a radio access network (RAN) server to one or more heterogeneous accelerators. For example, a task associated with one or more operational partitions (or a service application) associated with processing data traffic in the RAN is dynamically allocated for offloading from the central processor based on workload status information. One or more accelerators are dynamically allocated for executing the task, where the accelerators may be heterogeneous and may not comprise pre-programming for executing the task. The disclosed technology further enables generating specific application programs for execution on the respective heterogeneous accelerators based on a single set of program instructions.
    Type: Application
    Filed: May 18, 2021
    Publication date: November 24, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Paramvir BAHL, Daehyeok KIM, Anuj KALIA, Alastair WOLMAN