Patents by Inventor Shuangtong Feng
Shuangtong Feng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9112765Abstract: A computer system that implements a quality of service policy. Information defining the quality of service policy is stored in a central location, such as a server within an enterprise. Policy management software on clients in the network download quality of service policy information from the central location to the clients. Within a client, a portion of the policy information is selected based on its applicability to a particular connection. The selected information is cached with an association to the connection so that, as datagrams are generated for transmission over the network, relevant policy information is quickly accessed for use in controlling transmission characteristics of datagrams sent using that connection. The policy information is applied on a datagram-by-datagram basis, allowing policy information to be selectively applied based on network type. Policy information may be selectively applied to those datagrams transmitted over a managed network.Type: GrantFiled: April 10, 2012Date of Patent: August 18, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Eric K. Han, Shuangtong Feng, Yinghua Yao
-
Publication number: 20120246270Abstract: A computer system that implements a quality of service policy. Information defining the quality of service policy is stored in a central location, such as a server within an enterprise. Policy management software on clients in the network download quality of service policy information from the central location to the clients. Within a client, a portion of the policy information is selected based on its applicability to a particular connection. The selected information is cached with an association to the connection so that, as datagrams are generated for transmission over the network, relevant policy information is quickly accessed for use in controlling transmission characteristics of datagrams sent using that connection. The policy information is applied on a datagram-by-datagram basis, allowing policy information to be selectively applied based on network type. Policy information may be selectively applied to those datagrams transmitted over a managed network.Type: ApplicationFiled: April 10, 2012Publication date: September 27, 2012Applicant: Microsoft CorporationInventors: Eric K. Han, Shuangtong Feng, Yinghua Yao
-
Patent number: 8170021Abstract: A computer system that implements a quality of service policy. Information defining the quality of service policy is stored in a central location, such as a server within an enterprise. Policy management software on clients in the network download quality of service policy information from the central location to the clients. Within a client, a portion of the policy information is selected based on its applicability to a particular connection. The selected information is cached with an association to the connection so that, as datagrams are generated for transmission over the network, relevant policy information is quickly accessed for use in controlling transmission characteristics of datagrams sent using that connection. The policy information is applied on a datagram-by-datagram basis, allowing policy information to be selectively applied based on network type. Policy information may be selectively applied to those datagrams transmitted over a managed network.Type: GrantFiled: January 6, 2006Date of Patent: May 1, 2012Assignee: Microsoft CorporationInventors: Eric K. Han, Shuangtong Feng, Yinghua Yao
-
Publication number: 20110191014Abstract: Maps of a particular location are often generated with an inset area map, rendered in an inset region of the location map, of the general area including the location at a lower zoom level than the location map. However, this presentation may be disadvantageous in some scenarios (e.g., the where a user is interested in examining the extended area around the location, the area between two locations, or the spatial layout of the locations.) Instead, a composite map may be generated comprising an area map at an area map zoom level, and an inset location map rendered in an inset region of the location map and illustrating a location at a higher zoom level than the area map zoom level. Such composite maps may also be requested programmatically of a map generating service, and may be provided in an automated manner for use in an application.Type: ApplicationFiled: February 4, 2010Publication date: August 4, 2011Applicant: Microsoft CorporationInventors: Shuangtong Feng, Chad Raynor, Andrew Paul McGovern, Michael John Narayan
-
Patent number: 7979549Abstract: A computer system that implements a quality of service policy. Information defining the quality of service policy is stored in a central location, such as a server within an enterprise. Policy management software on clients in the network download quality of service policy information from the central location to the clients. Within a client, a portion of the policy information is selected based on its applicability to a particular connection. The selected information is cached with an association to the connection so that, as datagrams are generated for transmission over the network, relevant policy information is quickly accessed for use in controlling transmission characteristics of datagrams sent using that connection. Additionally, time information may be associated with information in the cache as well as policy information available from the server. Whenever a datagram is to be transmitted over a connection associated with out-of-date policy information in the cache, the cache information is updated.Type: GrantFiled: November 30, 2005Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Dennis G. Frost, Eric K. Han, Khawar M. Zuberi, Shuangtong Feng
-
Patent number: 7904757Abstract: To trace an activity through multiple components or applications that may be involved in the performance of the activity, an activity identifier can be generated and utilized by the various components or applications. Each can generate its own activity identifier to minimize changes to existing interfaces. When logging of events has been activated, each application or component can provide, to an event store, an indication of the activity identifier it is using for a given activity. If a preceding or subsequent component utilizes a different activity identifier for aspects of the same activity, a link between the two activity identifiers can be communicated to the event store. Subsequently, examination of the event store can filter out irrelevant entries based on the activity identifiers. A graph linking the various related activity identifiers can be created and only those events associated with activity identifiers not in the graph can be filtered out.Type: GrantFiled: June 5, 2008Date of Patent: March 8, 2011Assignee: Microsoft CorporationInventors: Ari Pekka Niikkonen, Darene Brice Lewis, Anthony Goodrich Jones, Gueorgui Bonov Chkodrov, Tin Qian, Shuangtong Feng, Jwalin Buch
-
Patent number: 7761619Abstract: Disclosed are methods for handling RDMA connections carried over packet stream connections. In one aspect, I/O completion events are distributed among a number of processors in a multi-processor computing device, eliminating processing bottlenecks. For each processor that will accept I/O completion events, at least one completion queue is created. When an I/O completion event is received on one of the completion queues, the processor associated with that queue processes the event. In a second aspect, semantics of the interactions among a packet stream handler, an RDMA layer, and an RNIC are defined to control RDMA closures and thus to avoid implementation errors. In a third aspect, semantics are defined for transferring an existing packet stream connection into RDMA mode while avoiding possible race conditions. The resulting RNIC architecture is simpler than is traditional because the RNIC never needs to process both streaming messages and RDMA-mode traffic at the same time.Type: GrantFiled: May 13, 2005Date of Patent: July 20, 2010Assignee: Microsoft CorporationInventors: Shuangtong Feng, James T. Pinkerton
-
Publication number: 20090307533Abstract: To trace an activity through multiple components or applications that may be involved in the performance of the activity, an activity identifier can be generated and utilized by the various components or applications. Each can generate its own activity identifier to minimize changes to existing interfaces. When logging of events has been activated, each application or component can provide, to an event store, an indication of the activity identifier it is using for a given activity. If a preceding or subsequent component utilizes a different activity identifier for aspects of the same activity, a link between the two activity identifiers can be communicated to the event store. Subsequently, examination of the event store can filter out irrelevant entries based on the activity identifiers. A graph linking the various related activity identifiers can be created and only those events associated with activity identifiers not in the graph can be filtered out.Type: ApplicationFiled: June 5, 2008Publication date: December 10, 2009Applicant: Microsoft CorporationInventors: Ari Pekka Niikkonen, Darene Brice Lewis, Anthony Goodrich Jones, Gueorgui Bonov Chkodrov, Tin Qian, Shuangtong Feng, Jwalin Buch
-
Patent number: 7554976Abstract: Disclosed are methods for handling RDMA connections carried over packet stream connections. In one aspect, I/O completion events are distributed among a number of processors in a multi-processor computing device, eliminating processing bottlenecks. For each processor that will accept I/O completion events, at least one completion queue is created. When an I/O completion event is received on one of the completion queues, the processor associated with that queue processes the event. In a second aspect, semantics of the interactions among a packet stream handler, an RDMA layer, and an RNIC are defined to control RDMA closures and thus to avoid implementation errors. In a third aspect, semantics are defined for transferring an existing packet stream connection into RDMA mode while avoiding possible race conditions. The resulting RNIC architecture is simpler than is traditional because the RNIC never needs to process both streaming messages and RDMA-mode traffic at the same time.Type: GrantFiled: May 13, 2005Date of Patent: June 30, 2009Assignee: Microsoft CorporationInventors: Shuangtong Feng, James T. Pinkerton
-
Publication number: 20070160079Abstract: A computer system that implements a quality of service policy. Information defining the quality of service policy is stored in a central location, such as a server within an enterprise. Policy management software on clients in the network download quality of service policy information from the central location to the clients. Within a client, a portion of the policy information is selected based on its applicability to a particular connection. The selected information is cached with an association to the connection so that, as datagrams are generated for transmission over the network, relevant policy information is quickly accessed for use in controlling transmission characteristics of datagrams sent using that connection. The policy information is applied on a datagram-by-datagram basis, allowing policy information to be selectively applied based on network type. Policy information may be selectively applied to those datagrams transmitted over a managed network.Type: ApplicationFiled: January 6, 2006Publication date: July 12, 2007Applicant: Microsoft CorporationInventors: Eric Han, Shuangtong Feng, Yinghua Yao
-
Publication number: 20070124433Abstract: A computer system that implements a quality of service policy. Information defining the quality of service policy is stored in a central location, such as a server within an enterprise. Policy management software on clients in the network download quality of service policy information from the central location to the clients. Within a client, a portion of the policy information is selected based on its applicability to a particular connection. The selected information is cached with an association to the connection so that, as datagrams are generated for transmission over the network, relevant policy information is quickly accessed for use in controlling transmission characteristics of datagrams sent using that connection. Additionally, time information may be associated with information in the cache as well as policy information available from the server. Whenever a datagram is to be transmitted over a connection associated with out-of-date policy information in the cache, the cache information is updated.Type: ApplicationFiled: November 30, 2005Publication date: May 31, 2007Applicant: Microsoft CorporationInventors: Dennis Frost, Eric Han, Khawar Zuberi, Shuangtong Feng
-
Publication number: 20070124485Abstract: A computer system that implements a quality of service policy. Information defining the quality of service policy is stored in a central location, such as a server within an enterprise. Policy management software on clients in the network download quality of service policy information from the central location to the clients. Within a client, a portion of the policy information is selected based on its applicability to a particular connection. The selected information is cached with an association to the connection so that, as datagrams are generated for transmission over the network, relevant policy information is quickly accessed for use in controlling transmission characteristics of datagrams sent using that connection. Additionally, time information may be associated with information in the cache as well as policy information available from the server. Whenever a datagram is to be transmitted over a connection associated with out-of-date policy information in the cache, the cache information is updated.Type: ApplicationFiled: November 30, 2005Publication date: May 31, 2007Applicant: Microsoft CorporationInventors: Dennis Frost, Eric Han, Khawar Zuberi, Shuangtong Feng
-
Publication number: 20060259570Abstract: Disclosed are methods for handling RDMA connections carried over packet stream connections. In one aspect, I/O completion events are distributed among a number of processors in a multi-processor computing device, eliminating processing bottlenecks. For each processor that will accept I/O completion events, at least one completion queue is created. When an I/O completion event is received on one of the completion queues, the processor associated with that queue processes the event. In a second aspect, semantics of the interactions among a packet stream handler, an RDMA layer, and an RNIC are defined to control RDMA closures and thus to avoid implementation errors. In a third aspect, semantics are defined for transferring an existing packet stream connection into RDMA mode while avoiding possible race conditions. The resulting RNIC architecture is simpler than is traditional because the RNIC never needs to process both streaming messages and RDMA-mode traffic at the same time.Type: ApplicationFiled: May 13, 2005Publication date: November 16, 2006Applicant: Microsoft CorporationInventors: Shuangtong Feng, James Pinkerton
-
Publication number: 20060259661Abstract: Disclosed are methods for handling RDMA connections carried over packet stream connections. In one aspect, I/O completion events are distributed among a number of processors in a multi-processor computing device, eliminating processing bottlenecks. For each processor that will accept I/O completion events, at least one completion queue is created. When an I/O completion event is received on one of the completion queues, the processor associated with that queue processes the event. In a second aspect, semantics of the interactions among a packet stream handler, an RDMA layer, and an RNIC are defined to control RDMA closures and thus to avoid implementation errors. In a third aspect, semantics are defined for transferring an existing packet stream connection into RDMA mode while avoiding possible race conditions. The resulting RNIC architecture is simpler than is traditional because the RNIC never needs to process both streaming messages and RDMA-mode traffic at the same time.Type: ApplicationFiled: May 13, 2005Publication date: November 16, 2006Applicant: Microsoft CorporationInventors: Shuangtong Feng, James Pinkerton
-
Publication number: 20060256784Abstract: Disclosed are methods for handling RDMA connections carried over packet stream connections. In one aspect, I/O completion events are distributed among a number of processors in a multi-processor computing device, eliminating processing bottlenecks. For each processor that will accept I/O completion events, at least one completion queue is created. When an I/O completion event is received on one of the completion queues, the processor associated with that queue processes the event. In a second aspect, semantics of the interactions among a packet stream handler, an RDMA layer, and an RNIC are defined to control RDMA closures and thus to avoid implementation errors. In a third aspect, semantics are defined for transferring an existing packet stream connection into RDMA mode while avoiding possible race conditions. The resulting RNIC architecture is simpler than is traditional because the RNIC never needs to process both streaming messages and RDMA-mode traffic at the same time.Type: ApplicationFiled: May 13, 2005Publication date: November 16, 2006Applicant: Microsoft CorporationInventors: Shuangtong Feng, James Pinkerton