-
公开(公告)号:US20170300368A1
公开(公告)日:2017-10-19
申请号:US15444893
申请日:2017-02-28
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Ishai Menache , F. Bruce Shepherd , Joseph (Seffi) Naor
CPC classification number: G06F9/5088 , G06F9/4856 , Y02D10/32
Abstract: There is provided a method and system for process migration in a data center network. The method includes selecting processes to be migrated from a number of overloaded servers within a data center network based on an overload status of each overloaded server. Additionally, the method includes selecting, for each selected process, one of a number of underloaded servers to which to migrate the selected process based on an underload status of each underloaded server, and based on a parameter of a network component by which the selected process is to be migrated. The method also includes migrating each selected process to the selected underloaded server such that a migration finishes within a specified budget.
-
22.
公开(公告)号:US20170104640A1
公开(公告)日:2017-04-13
申请号:US15387316
申请日:2016-12-21
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain
IPC: H04L12/24
CPC classification number: H04L41/5022 , H04L29/06 , H04L41/0622 , H04L41/064 , H04L41/0663 , H04L41/0668 , H04L41/0672 , H04L41/0686 , H04L41/069 , H04L41/0826 , H04L41/0893 , H04L41/145 , H04L41/22 , H04L41/5012 , H04L41/5016 , H04L41/5019 , H04L41/5074 , H04L43/08 , H04L67/322 , H04L67/327
Abstract: The described implementations relate to processing of electronic data. One implementation is manifest as one or more computer-readable storage devices comprising instructions which, when executed by one or more processing devices, cause the one or more processing devices to perform acts. The acts can include determining service levels provided by multiple network configurations, determining costs associated with the multiple network configurations, and evaluating the multiple network configurations based on both the costs and the service levels. The multiple network configurations can include redundantly-deployed devices. Furthermore, some implementations may determine cost/service level metrics that can be used to compare devices based on expected costs to provide a particular service level.
-
公开(公告)号:US20160344595A1
公开(公告)日:2016-11-24
申请号:US15228327
申请日:2016-08-04
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Ishai Menache
IPC: H04L12/24 , H04L12/927 , H04L29/08
CPC classification number: H04L41/5025 , G06F9/5072 , G06F2209/508 , H04L47/803 , H04L67/1008
Abstract: A system for managing allocation of resources based on service level agreements between application owners and cloud operators. Under some service level agreements, the cloud operator may have responsibility for managing allocation of resources to the software application and may manage the allocation such that the software application executes within an agreed performance level. Operating a cloud computing platform according to such a service level agreement may alleviate for the application owners the complexities of managing allocation of resources and may provide greater flexibility to cloud operators in managing their cloud computing platforms.
Abstract translation: 基于应用程序所有者和云运营商之间的服务级别协议来管理资源分配的系统。 根据某些服务水平协议,云运营商可能有责任管理对软件应用程序的资源分配,并且可以管理分配,使得软件应用程序在商定的性能水平下执行。 根据这样的服务级别协议来操作云计算平台可能会减轻应用程序所有者管理资源分配的复杂性,并可能为云运营商管理云计算平台提供更大的灵活性。
-
公开(公告)号:US20160306689A1
公开(公告)日:2016-10-20
申请号:US14690361
申请日:2015-04-17
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain
CPC classification number: G06F11/079 , G06F11/0742 , G06F11/0751
Abstract: A nexus of a software failure can be determined. A feature module can determine execution features based at least in part on particular execution-related data. An analysis module can determine particular nexus data based at least in part upon a stored computational model and the determined execution features. In some examples, a communications module receives the particular execution-related data and transmits the determined particular nexus data via the communications interface. In some examples, a modeling module determines the computational model based at least in part on training data including execution features of a plurality of execution-related data records and respective nexus data values. Some examples include executing a program module, transmitting execution-related data of the program module, receiving a nexus data value, and executing the program module again if the nexus is a condition external to the program module.
Abstract translation: 可以确定软件故障的联系。 特征模块可以至少部分地基于特定执行相关数据来确定执行特征。 分析模块可以至少部分地基于存储的计算模型和所确定的执行特征来确定特定的连接数据。 在一些示例中,通信模块接收特定执行相关数据并且经由通信接口发送所确定的特定连接数据。 在一些示例中,建模模块至少部分地基于包括多个执行相关数据记录的执行特征和相应联结数据值的训练数据来确定计算模型。 一些示例包括执行程序模块,发送程序模块的执行相关数据,接收连接数据值,以及如果连接是程序模块外部的条件,则再次执行程序模块。
-
公开(公告)号:US20220107858A1
公开(公告)日:2022-04-07
申请号:US17060835
申请日:2020-10-01
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Phuong Ngoc Viet Pham , Shane Hu
Abstract: Methods, systems, apparatuses, and computer-readable storage mediums are described for detecting a common root cause for a multi-resource outage in a computing environment. For example, incident reports associated with multiple resources and that are generated by a plurality of monitors are featurized and provided to a classification model. The classification model detects whether a multi-resource outage exists based on the featurized incident reports and identifies a subset of the incident reports upon which the detection is based. Upon detecting a multi-resource outage, an analysis is performed to determine a potential common root cause of the multi-resource outage.
-
公开(公告)号:US11212195B1
公开(公告)日:2021-12-28
申请号:US17019187
申请日:2020-09-11
Applicant: Microsoft Technology Licensing, LLC
Inventor: Gal Tamir , Rachel Lemberg , Zakie Mashiah , Shane Hu , Tamar Agmon , Navendu Jain
Abstract: Operational metrics of a distributed collection of servers in a cloud environment are analyzed by a service to intelligently machine learn which operational metric is highly correlated to incidents or failures in the cloud environment. To do so, metric values of the operational metrics are analyzed over time by the service to check whether the operation metrics exceed a particular metric threshold. If so, the service also checks whether such spikes in the operation metric above the metric thresholds occurred during known cloud incidents. Statistics are calculated reflecting the number of times the operational metrics spiked during times of cloud incidents and spiked during times without cloud incidents. Correlation scores based on these statistics are calculated and used to select the correlated operational metrics that are most correlated to cloud failures.
-
公开(公告)号:US11196613B2
公开(公告)日:2021-12-07
申请号:US16567931
申请日:2019-09-11
Applicant: Microsoft Technology Licensing, LLC
Inventor: Sai Sankalp Arrabolu , Alia Maisel Buckner , Thomas William Potthast, III , Russell Joseph Trupiano , Anastasiia Pronska , Roman Batoukov , John Anthony Morman , Keiji Kanazawa , Navendu Jain , Irina Frumkin
Abstract: Examples described herein generally relate to identifying a set of service events corresponding to an incident report, querying a multiple-layer relational graph to determine one or more other service events related to the set of service events, detecting a pattern in the set of service events and a subset of the one or more other service events, and indicating, via a user interface and based on the incident report, the subset of the one or more other service events as related to the incident report.
-
公开(公告)号:US10608992B2
公开(公告)日:2020-03-31
申请号:US15054671
申请日:2016-02-26
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Ang Chen
Abstract: Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to the hosts. The local packet trends are combined to identify network-wide packet trends. The network-wide packet trends are used to detect anomalies or attacks, which in turn informs mitigation actions. The local inspection may be performed by reconfigurable/reprogrammable “smart” network interfaces (NICs) at each of the hosts. Local inspection involves identifying potentially suspect packet features based on statistical prevalence of recurring commonalities among the packets; pre-defined threat patterns are not required. For network-wide coherence, each host/NIC uses the same packet-identifying and occurrence-measuring algorithms. An overlay or control server collects and combines the local occurrence-measures to derive the network-wide occurrence-measures. The network-wide occurrences can be used to automatically detect and mitigate completely new types of attack packets.
-
公开(公告)号:US10509687B2
公开(公告)日:2019-12-17
申请号:US15444893
申请日:2017-02-28
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Ishai Menache , F. Bruce Shepherd , Joseph (Seffi) Naor
Abstract: There is provided a method and system for process migration in a data center network. The method includes selecting processes to be migrated from a number of overloaded servers within a data center network based on an overload status of each overloaded server. Additionally, the method includes selecting, for each selected process, one of a number of underloaded servers to which to migrate the selected process based on an underload status of each underloaded server, and based on a parameter of a network component by which the selected process is to be migrated. The method also includes migrating each selected process to the selected underloaded server such that a migration finishes within a specified budget.
-
公开(公告)号:US10432722B2
公开(公告)日:2019-10-01
申请号:US15148923
申请日:2016-05-06
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Luhui Hu
Abstract: A performance-based storage service level agreement (SLA) can be established that specifies one or more storage performance parameters. A storage allocation process can include receiving a request for a storage SLA that specifies one or more storage performance parameters, determining, for a virtual machine (VM) and based at least in part on the one or more storage performance parameters in the storage SLA: (i) a storage location among a set of candidate storage locations, and (ii) an amount of storage to allocate. The amount of storage can then be allocated at the storage location for the VM to use in making storage requests. Runtime enforcement of the storage SLA can utilize a scheduling mechanism that buffers individual storage requests into different queues that are used for meeting one or more storage performance requirements specified in storage SLA.
-
-
-
-
-
-
-
-
-