-
公开(公告)号:US20230134981A1
公开(公告)日:2023-05-04
申请号:US17978081
申请日:2022-10-31
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Karthick JAYARAMAN , Ryan Andrew BECKETT , Nikolaj Skallerud BJORNER
IPC: H04L41/12 , H04L41/0893 , H04L41/0853
Abstract: Techniques of network configuration verification are disclosed herein. One example process includes, upon receiving a query to determine whether a packet from a first endpoint is reachable to a second endpoint in a virtual network, identifying a network path between the first endpoint to the second endpoint in a network graph. The network graph has nodes representing corresponding enforcement points of network policies in the virtual network and edges connecting pairs of the nodes. The example process can also include generating compound function representing conjoined individual constraints of the network policies at each of the nodes in the network graph along the identified network path, compiling the generated compound function into a Boolean formula, and solving the compiled Boolean formula to determine whether an assignment of values to packet fields of the packet exists such that all the conjoined individual constraints of the compound function can be satisfied.
-
公开(公告)号:US20230041081A1
公开(公告)日:2023-02-09
申请号:US17397560
申请日:2021-08-09
Applicant: Microsoft Technology Licensing, LLC
Inventor: Abhishek UDUPA , Sharad AGARWAL , Ryan Andrew BECKETT , Rachee SINGH , Paramvir BAHL
IPC: H04L12/713 , H04L12/26
Abstract: The present application relates to egressing traffic from a public cloud network. An egress traffic manager configures routing at hosts and edge routers within the public cloud network. The egress traffic manager determines, for an edge router, a plurality of current border gateway protocol (BGP) sessions with external networks. The egress traffic manager configures a virtual router hosted on the edge router to route a portion of egress traffic to a selected one of the external networks via one of the BGP sessions. A host is configured to route the portion of egress traffic within the public cloud network to the edge router. An edge router configured to route, by the virtual router, the portion of egress traffic from the edge router to the selected one of the external networks.
-
公开(公告)号:US20230039665A1
公开(公告)日:2023-02-09
申请号:US17397525
申请日:2021-08-09
Applicant: Microsoft Technology Licensing, LLC
Inventor: Abhishek UDUPA , Sharad AGARWAL , Ryan Andrew BECKETT , Rachee SINGH , Paramvir BAHL
IPC: H04L12/713 , H04L12/751 , H04L12/717 , H04L12/707
Abstract: The present application relates to traffic routing for overlay paths in a public cloud network. A path orchestrator receives a configuration of a set of overlay paths for a wide area network virtualization from a client, each overlay path including virtual routing nodes associated with respective geographic regions and at least one policy for a link between the virtual routing nodes. The path orchestrator is configured to instantiate a plurality of virtual routers on computing resources of the public cloud network located within the respective geographic regions based on the configuration, each virtual router configured to route traffic according to the policy for each link associated with the virtual routing node corresponding to the virtual router. The path orchestrator is configured to scale the plurality of virtual routers based on traffic for the client on the set of overlay paths.
-
公开(公告)号:US20250156288A1
公开(公告)日:2025-05-15
申请号:US18440713
申请日:2024-02-13
Applicant: Microsoft Technology Licensing, LLC
Inventor: Siva Kesava Reddy KAKARLA , Ryan Andrew BECKETT
IPC: G06F11/28
Abstract: The present disclosure relates to utilizing resources provided by large language models (LLMs) to generate models to be used in model-based testing of a variety of protocols. In particular, systems described herein utilize a vasty body of protocol knowledge defined in RFCs and standards, networking forums, blogs, and other online resources and documents to extract this knowledge in generating models that can be used for testing one or more components of a variety of protocols. The features and functionalities described herein provide a framework for utilizing LLMs to generate a protocol model while providing constraints for a harness (e.g., a symbolic harness) that will guide a symbolic execution engine in generating any number of protocol tests that may be used in determining whether a given application, hardware, and/or software implementation will perform as designed for a given protocol.
-
公开(公告)号:US20240080255A1
公开(公告)日:2024-03-07
申请号:US17929503
申请日:2022-09-02
Applicant: Microsoft Technology Licensing, LLC
Inventor: Behnaz ARZANI , Pooria NAMYAR , Ryan Andrew BECKETT , Srikanth KANDULA , Santiago Martin SEGARRA , Himanshu RAJ
IPC: H04L45/02
CPC classification number: H04L45/08
Abstract: A computing device is provided, including a processor that receives a network graph. The processor further receives a specification of a network traffic control heuristic for a network traffic routing problem over the network graph. The processor further constructs a gap maximization problem that has, as a maximization target, a difference between an exact solution to the network traffic routing problem and a heuristic solution generated using the network traffic control heuristic. The processor further generates a Lagrange multiplier formulation of the gap maximization problem. At a convex solver, the processor further computes an estimated maximum gap as an estimated solution to the Lagrange multiplier formulation of the gap maximization problem. The processor further performs a network traffic control action based at least in part on the estimated maximum gap.
-
公开(公告)号:US20230231806A1
公开(公告)日:2023-07-20
申请号:US18191573
申请日:2023-03-28
Applicant: Microsoft Technology Licensing, LLC
Inventor: Jitendra PADHYE , Karthick JAYARAMAN , Wei BAI , Rachee SINGH , Ryan Andrew BECKETT , Sarah Elisabeth MCCLURE , Neha Milind RAJE , Steven Jeffrey BENALOH , Christopher Scott JOHNSTON
IPC: H04L45/586 , H04L45/02 , H04L45/64
CPC classification number: H04L45/586 , H04L45/02 , H04L45/64
Abstract: Ghost routing is a network verification technique that uses a portion of a production network itself to verify the impact of potential network changes. Ghost routing logically partitions the production network into a main network and a ghost network. The main network handles live traffic while the ghost network handles traffic generated for diagnostic purposes. The ghost network may have a network topology identical to the production network and may use the same hardware and software as the production network. An operator may implement a network configuration change on the ghost network and then use verification tools to verify that the network configuration change on the ghost network does not result in bugs. Verifying on the ghost network may not affect the main network. If the network operator verifies the network configuration change on the ghost network, the network operator may implement the network configuration change on the main network.
-
公开(公告)号:US20220417103A1
公开(公告)日:2022-12-29
申请号:US17358737
申请日:2021-06-25
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ryan Andrew BECKETT , Sharad AGARWAL , Paramvir BAHL , Rachee SINGH , Abhishek UDUPA
Abstract: Described are examples for providing management of a virtual wide area network (vWAN) based on operator policies. A network orchestrator presents, to a network operator, a representation of the vWAN including virtual network entities associated with respective geographic locations and virtual connections between the virtual network entities. The network orchestrator receives a policy for the virtual wide area network from the network operator via the representation, the policy to be implemented at one or more of the virtual connections. The network orchestrator translates the policy for the virtual wide area network into a configuration of an underlying wide area network (WAN). The underlying WAN a plurality of geographically distributed physical computing resources in geographic regions corresponding to the virtual network entities and connections there between.
-
公开(公告)号:US20220124031A1
公开(公告)日:2022-04-21
申请号:US17072147
申请日:2020-10-16
Applicant: Microsoft Technology Licensing, LLC
Inventor: Jitendra PADHYE , Karthick JAYARAMAN , Wei BAI , Rachee SINGH , Ryan Andrew BECKETT , Sarah Elisabeth MCCLURE , Neha Milind RAJE , Steven Jeffrey BENALOH , Christopher Scott JOHNSTON
IPC: H04L12/713 , H04L12/751 , H04L12/715
Abstract: Ghost routing is a network verification technique that uses a portion of a production network itself to verify the impact of potential network changes. Ghost routing logically partitions the production network into a main network and a ghost network. The main network handles live traffic while the ghost network handles traffic generated for diagnostic purposes. The ghost network may have a network topology identical to the production network and may use the same hardware and software as the production network. An operator may implement a network configuration change on the ghost network and then use verification tools to verify that the network configuration change on the ghost network does not result in bugs. Verifying on the ghost network may not affect the main network. If the network operator verifies the network configuration change on the ghost network, the network operator may implement the network configuration change on the main network.
-
-
-
-
-
-
-