Patent application number | Description | Published |
20080228459 | Method and Apparatus for Performing Capacity Planning and Resource Optimization in a Distributed System - Disclosed is a method and apparatus for performing capacity planning and resource optimization in a distributed system. In particular, the capacity needs of individual components (e.g., server, operating system, CPU, application software, memory, networking device, storage device, etc.) in a distributed system can be analyzed using relationships between measurements collected from the distributed system. These relationships, called invariants, do not change over time. From these measurements, a network of invariants are determined. The network of invariants characterize the relationships between the measurements. The capacity need of at least one component in the distributed system can be determined from the network of invariants. | 09-18-2008 |
20090112780 | DISCOVERING OPTIMAL SYSTEM CONFIGURATIONS USING DECENTRALIZED PROBABILITY BASED ACTIVE SAMPLING - A system and method for optimizing system performance includes applying sampling based optimization to identify optimal configurations of a computing system by selecting a number of configuration samples and evaluating system performance based on the samples. Based on feedback of evaluated samples, a location of an optimal configuration is inferred. Additional samples are generated towards the location of the inferred optimal configuration to further optimize a system configuration. | 04-30-2009 |
20090292954 | RANKING THE IMPORTANCE OF ALERTS FOR PROBLEM DETERMINATION IN LARGE SYSTEMS - A system and method for prioritizing alerts includes extracting invariants to determine a stable set of models for determining relationships among monitored system data. Equivalent thresholds for a plurality of rules are computed using an invariant network developed by extracting the invariants. For a given time window, a set of alerts are received from a system being monitored. A measurement value of the alerts is compared with a vector of equivalent thresholds, and the set of alerts is ranked. | 11-26-2009 |
20090310783 | Controlled Dissemination of Information in Mobile Networks - The present invention discloses systems and methods for controlled dissemination of information in mobile networks using encrypted broadcasts that are decrypted at the device. An encryption key is generated corresponding to a particular category or granularity of information. The information is encrypted before it is broadcast to the sector. A user within the sector sends a key request across the network, in response to which the encryption key is sent to the user. The user can decrypt the encrypted information received in the broadcast. Additionally, a credit-checking mechanism may be employed to ensure that the user has sufficient credit to purchase the key. In one embodiment, the information to be disseminated is divided into a plurality of categories, wherein each category corresponds to a granularity of information. The encryption key is one in a set of encryption keys, each of said set of encryption keys being assigned to a particular hierarchical level corresponding to a particular granularity of information. | 12-17-2009 |
20100058475 | FEEDBACK-GUIDED FUZZ TESTING FOR LEARNING INPUTS OF COMA - Embodiments of the present invention combine static analysis, source code instrumentation and feedback-guided fuzz testing to automatically detect resource exhaustion denial of service attacks in software and generate inputs of coma for vulnerable code segments. The static analysis of the code highlights portions that are potentially vulnerable, such as loops and recursions whose exit conditions are dependent on user input. The code segments are dynamically instrumented to provide a feedback value at the end of each execution. Evolutionary techniques are then employed to search among the possible inputs to find inputs that maximize the feedback score. | 03-04-2010 |
20100131440 | EXPERIENCE TRANSFER FOR THE CONFIGURATION TUNING OF LARGE SCALE COMPUTING SYSTEMS - A computer implemented method employing experience transfer to improve the efficiencies of an exemplary configuration tuning in computing systems. The method employs a Bayesian network guided tuning algorithm to discover the optimal configuration setting. After the tuning has been completed, a Bayesian network is obtained that records the parameter dependencies in the original system. Such parameter dependency knowledge has been successfully embedded to accelerate the configuration searches in other systems. Experimental results have demonstrated that with the help of transferred experiences we can achieve significant time savings for the configuration tuning task. | 05-27-2010 |
20100262858 | Invariants-Based Learning Method and System for Failure Diagnosis in Large Scale Computing Systems - A method system for diagnosing a detected failure in a computer system, compares a failure signature of the detected failure to an archived failure signature contained in a database to determine if the archived failure signature matches the failure signature of the detected failure. If the archived failure signature matches the failure signature of the detected failure, an archived solution is applied to the computer system that resolves the detected failure, the archived solution corresponding to a solution used to resolve a previously detected computer system failure corresponding to the archived failure signature in the database that matches the detected failure. | 10-14-2010 |
20110058499 | METHOD FOR INFERRING PHYSICAL NETWORK TOPOLOGY FROM END-TO-END MEASUREMENT - A method for inferring end-to-end network topology and to accurately determine a layer-3 routing tree between one sender and a set of receivers in the presence of anonymous routers in a network. | 03-10-2011 |
20110072130 | Extracting Overlay Invariants Network for Capacity Planning and Resource Optimization - A method and system determines capacity needs of components in a distributed computer system. In the method and system, a pair-wise invariant network is determined from collected flow intensity measurements. The network includes at least two separate and unconnected pair-wise invariant subnetworks, each of the subnetworks including two of the flow intensity measurements connected by a pairwise invariant, each of the pair-wise invariants characterizing a constant relationship between their two connected flow intensity measurements. At least one overlay invariant is determined from the pair-wise invariant network and from the collected flow intensity measurements using a minimal redundancy least regression process. The capacity needs of the components are determined using the pair-wise and overlay invariants. | 03-24-2011 |
20110172963 | Methods and Apparatus for Predicting the Performance of a Multi-Tier Computer Software System - A method and system for predicting the performance of a multi-tier computer software system operating on a distributed computer system, sends client requests to one or more tiers of software components of the multi-tier computer software system in a time selective manner; collects traffic traces among all the one or more tiers of the software components of the multi-tier computer software system; collects CPU time at the software components of the multi-tier computer software system; infers performance data of the multi-tier computer software system from the collected traffic traces; and determines disk input/output waiting time from the inferred performance data. | 07-14-2011 |
20110173327 | Virtualization and Consolidation Analysis Engine for Enterprise Data Centers - A method and apparatus for consolidating a plurality of applications into one or more servers. The method and apparatus organizes consolidation constraints representing preferences about placing applications into the one or more servers, and allocates the applications into the one or more servers in a manner that maximally satisfies the consolidation constraints. | 07-14-2011 |
20110173329 | Methods and Apparatus for Coordinated Energy Management in Virtualized Data Centers - A method and system for coordinating energy management in a virtualized data center including a plurality of physical servers and a plurality of virtual machines (VMs), includes analyzing status information about the virtualized data center; determining server utilization target settings for server consolidation from the analyzed status information; and executing the server consolidation according to the determined server utilization target settings. Server consolidation can be executed by determining an effective size of each of the VMs and placing the VMs on the servers in a selective manner using an independent workload VM placement process, a correlation-aware VM placement process, or a migration-cost and correlation-aware VM placement process. | 07-14-2011 |
20110276675 | METHODS AND SYSTEMS FOR MIGRATING NETWORKED SYSTEMS ACROSS ADMINISTRATIVE DOMAINS - Systems and methods for determining whether networked system migrations are successful are disclosed. In accordance with one method, a first set of properties of the networked system on a source platform in a first administrative domain is determined. Further, the method includes transferring the networked system to a destination platform in a second administrative domain. In addition, a second set of properties of the transferred system on the destination platform is determined, where the first and second sets of properties include functional properties and at least one of: performance properties, security properties or reliability properties. The method also includes outputting an indication that the transfer of the system to the destination platform is successful in response to determining that one or more of the properties of the second set are equivalent to corresponding properties of the first set. | 11-10-2011 |
20110276682 | System and Method for Determining Application Dependency Paths in a Data Center - A method and a system are disclosed for determining application dependency paths in a data center. The method and the system captures application traffic volume data on the servers with switches and monitoring agents; generates an application traffic matrix of all the components of the applications based on the application traffic volume data; estimates the number of the applications in the data center from the traffic matrix with a Rank Estimation via Singular Value Decomposition or Power Factorization Residue Errors process; and decomposes the traffic matrix into a first matrix and a second matrix with a non-negative matrix factorization process using the estimated number of applications. The first matrix represents a set of the components belonging to each of the applications and the second matrix represents the amount of traffic generated by each application over time. Any noise in the first and second matrices is removed with a concurrent volumes ratios based correlation process. | 11-10-2011 |
20110276684 | METHODS AND SYSTEMS FOR DISCOVERING CONFIGURATION DATA - Systems and methods for discovering configuration data are disclosed. In accordance with one method, network configuration tokens for a system are identified. Further, potential configuration files are obtained by identifying running processes in the system, restarting the processes and monitoring the restarted processes to discover files opened by the restarted processes. In addition, files that include the identified network configuration tokens are selected from the potential configuration files. Moreover, the method includes determining, by a hardware processor, that a given token from the identified tokens is a true token by replacing the given token with a test token in at least one of the selected files, restarting the identified processes that read the given token, and identifying a change in at least one of system call activity or network activity in the system. | 11-10-2011 |
20110320391 | Method and Apparatus for Predicting Application Performance Across Machines with Different Hardware Configurations - A method and system for predicting performance of an application on a machine of a predetermined hardware configuration simulates the performance of the application under a plurality of different simulated hardware configurations; builds a predictive model of the performance of the application based on the results of the simulations; obtains the performance of the application on a plurality of actual machines, each of the machines having a different hardware configuration; and Bayesian reinterprets the predictive model built from the results of the simulations using the performance of the application on the plurality of actual machines, to obtain a final predictive model of the performance of the application having an accuracy greater than the predictive model built from the results of the simulations. | 12-29-2011 |
20120099863 | HYBRID OPTICAL/ELECTRICAL SWITCHING SYSTEM FOR DATA CENTER NETWORKS - In one aspect, a system includes one or more electrical switches to transfer data in a data network; one or more optical switching groups coupled to each electrical switch, each switching group having one or more server racks, each server rack coupled to a top of rack (TOR) switch and an optical transceiver coupled to the TOR switch; and an optical switching unit (OSU) coupled to the one or more optical switching groups. | 04-26-2012 |
20120151490 | SYSTEM POSITIONING SERVICES IN DATA CENTERS - A system and method are disclosed for managing a data center in terms of power and performance. The system includes at least one system positioning application for managing power costs and performance costs at a data center. The at least one system positioning application may determine a status of a data center in terms of power costs and performance costs or generate configurations to automatically implement a desired target state at the data center. A system configuration compiler is configured to receive a request from the system positioning application associated with a data center management task, convert the request into a set of subtasks, and schedule execution of the subtasks to implement the data center management task. | 06-14-2012 |
20120185851 | CALCULATING VIRTUAL MACHINE RESOURCE UTILIZATION INFORMATION - A system and method are provided for estimating physical resource utilization information for virtual machines. The system includes a model which indicates how virtual resource activities are transformed into physical resource activities for each virtual machine running on a server. A run-time calibrator utilizes the model to estimate physical resource utiliation information for each individual virtual machine on the server. | 07-19-2012 |
20120191843 | SYSTEMS AND METHODS FOR APPLICATION DEPENDENCY DISCOVERY - Systems and methods for discovering a set of applications that run on a network are disclosed. In accordance with one method, aggregate traffic volumes are determined for pairs of nodes on the network over a plurality of time intervals. The method further includes building a traffic matrix denoting each of the pairs of nodes and denoting respective aggregate traffic volume histories of each of the pairs of nodes that are based on the determined traffic volumes. In addition, the traffic matrix is formulated as a combination of bases vectors that model the set of applications. The bases vectors are determined by applying a covariance matrix adaptation evolutionary strategy based on the traffic matrix. An indication of the set of applications based on the bases vectors is output. | 07-26-2012 |
20120265868 | System and Method for End- or Service-Node Placement Optimization - A method for producing a set of optimized node placement solutions for plural nodes of a computer network includes temporarily relocating movable ones of the nodes in the network; for each temporarily relocated movable node, determining a thermal energy of the network resulting from its temporary relocation in the network; for each temporarily relocated movable node, determining a potential energy reduction in the network resulting from its temporary relocation in the network; for each temporarily relocated movable node, determining whether to accept or reject its temporary relocation in the network; accepting the temporary relocation if an acceptance probability is greater than a randomly generated number, the acceptance probability being a function of the potential energy reduction in the network; and repeating the aforementioned steps to generate a set of optimized node placement solutions. | 10-18-2012 |
20130086272 | NETWORK-AWARE COORDINATION OF VIRTUAL MACHINE MIGRATIONS IN ENTERPRISE DATA CENTERS AND CLOUDS - Systems and methods are disclosed to schedule virtual machine (VM) migrations by analyzing VM migration behavior; building a simulation tool to predict time for multiple migrations under different links conditions and VM characteristics; determining a predetermined bandwidth sharing policy for each network link; applying a bin-packing technique to organize bandwidth resources from all network links, and allocating the links to different migration tasks. | 04-04-2013 |
20130176852 | Network Self-Protection - A device used in a network is disclosed. The device includes a network monitor to monitor a network state and to collect statistics for flows going through the network, a flow aggregation unit to aggregate flows into clusters and identify flows that can cause a network problem, and an adaptive control unit to adaptively regulate the identified flow according to network feedback. Other methods and systems also are disclosed. | 07-11-2013 |
20130185419 | OFSense: Light-Weight Networking Sensing With OpenFlow - A method for determining the state of an entire network, including state of applications and infrastructure includes receiving network control messages in an OpenFlow network, passing normal network control messages through OFSense, a control plane middleware, and constructing from the network control messages an application level connectivity graph to infer network delay between any two communicating server in the network and estimating an application response time of a given server in the network; and providing state of the network for enabling intelligent detection and diagnosis of infrastructure and application performance. | 07-18-2013 |
20130185438 | Policy-Aware Based Method for Deployment of Enterprise Virtual Tenant Networks - A method for policy-aware mapping of an enterprise virtual tenant network includes receiving inputs from a hosting network and tenants, translating resource demand and policies of the tenants into a network topology and bandwidth demand on each link in the network; pre-arranging a physical resource of a physical topology for clustering servers on the network to form an allocation unit before a VTN allocation; allocating resources of the hosting network to satisfy demand of the tenants in response to a VTN demand request; and conducting a policy aware VTN mapping for enumerating all feasibly resource mappings, bounded by a predetermined counter for outputting optimal mapping with policy-compliant routing paths in the hosting network. | 07-18-2013 |
20130191530 | FlowSense: Light-Weight Networking Sensing With OpenFlow - A method for determining the state of an entire network, including state of applications and infrastructure includes receiving network control messages in an OpenFlow network; passing normal network control messages through FlowSense, a control plane middleware, and constructing from the network control messages an application level connectivity graph to infer network delay between any two communicating server in the network and estimating an application response time of a given server in the network, the FlowSense including a network utilization procedure for computing the utilization of each link in the network derived from using captured messages triggered by switches when flow entries expire and providing state of the network for enabling intelligent detection and diagnosis of infrastructure and application performance. | 07-25-2013 |
20130219223 | Method for Metric Ranking in Invariant Networks of Distributed Systems - A method for metric ranking in invariant networks includes, given an invariant network and a set of broken invariants, two ranking processes are used to determine and rank the anomaly scores of each monitoring metrics in large-scale systems. Operators can follow the rank to investigate the root-cause in problem investigation. In a first ranking process, given a node/metric, the method determines multiple scores by integrating information from immediate neighbors to decide the anomaly score for metric ranking. In a second ranking process, given a node/metric, an iteration process is used to recursively integrate the information from immediate neighbors at each round to determine its anomaly score for metric ranking. | 08-22-2013 |
20130290936 | Method and System for Correlated Tracing with Automated Multi-Layer Function Instrumentation Localization - A system for automatically instrumenting and tracing an application program and related software components achieves a correlated tracing of the program execution. It includes tracing of endpoints that are the set of functions in the program execution path that the developers are interested. The tracing endpoints and related events become the total set of functions to be traced in the program (called instrument points). This invention automatically analyzes the program and generates such instrumentation points to enable correlated tracing. The generated set of instrumentation points addresses common questions that developers ask when they use monitoring tools. | 10-31-2013 |
20130318505 | Efficient Unified Tracing of Kernel and User Events with Multi-Mode Stacking - The invention efficiently provides user code information for kernel level tracing approaches. It applies an advanced variation of stack walking called multi-mode stack walking to the entire system level and generates the unified trace where the user code and kernel events are integrated. The invention uses runtime stack information and internal kernel data structures. Therefore, source code for user level code and libraries are not required for inspection. The invention introduces the mechanism to narrow down the monitoring focus to specific application software and improve monitoring performance. | 11-28-2013 |
20140047274 | Network Debugging - A debugging system used for a data center in a network is disclosed. The system includes a monitoring engine to monitor network traffic by collecting traffic information from a network controller, a modeling engine to model an application signature, an infrastructure signature, and a task signature using a monitored log, a debugging engine to detect a change in the application signature between a working status and a non-working status using a reference log and a problem log, and to validate the change using the task signature, and a providing unit to provide toubleshooting information, wherein an unknown change in the application signature is correlated to a known problem class by considering a dependency to a change in the infrastructure signature. Other methods and systems also are disclosed. | 02-13-2014 |
20140047279 | Fault Localization in Distributed Systems Using Invariant Relationships - A computer implemented method for temporal ranking in invariant networks includes considering an invariant network and a set of broken invariants in the invariant network, assuming, for each time point inside a window W, that each metric with broken invariants is affected by a fault at that time point, computing an expected pattern for each invariant of a metric with assumed fault, said pattern indicative of time points at which an invariant will be broken given that its associated metric was affected by a fault at time t, comparing the expected pattern with the pattern observed over the time window W; and determining a temporal score based on a match from the prior comparing | 02-13-2014 |
20140059690 | Method for Scalable Analysis of Android Applications for Security Vulnerability - A method for scalable analysis of Android applications for security includes applying Android application analytics to an Android application, which in turn includes applying an application taint tracking to the Android application and applying application repacking detection to the Android application, and determining security vulnerabilities in the Android application responsive to the analytics. | 02-27-2014 |
20140064066 | Data Processing - A method implemented in a network apparatus used in a network is disclosed. The method comprises collecting information about network topology from a network controller, collecting information about data movement, deciding routing in the network according to the information about network topology and the information about data movement, and providing information about the routing to the network controller, wherein the network controller enforces the routing in the network. Other methods, apparatuses, and systems also are disclosed. | 03-06-2014 |
20140068351 | Blackbox Memory Monitoring with a Calling Context Memory Map and Semantic Extraction - A computer implemented method provides efficient monitoring and analysis of a program's memory objects in the operation stage. The invention can visualize and analyze a monitored program's data status with improved semantic information without requiring source code at runtime. The invention can provide higher quality of system management, performance debugging, and root-cause error analysis of enterprise software in the production stage. | 03-06-2014 |
20140098678 | Network Management - A method implemented in a network apparatus used in a network is disclosed. The method includes sensing network topology and network utilization, receiving a request from an application, deciding path setup requirement using network state information obtained from the network topology and the network utilization, and translating the path setup requirement into a rule to be installed. Other methods, apparatuses, and systems also are disclosed. | 04-10-2014 |
20140108314 | INTEGRATED APPROACH TO MODEL TIME SERIES DYNAMICS IN COMPLEX PHYSICAL SYSTEMS - A system and method for analysis of complex systems which includes determining model parameters based on time series data, further including profiling a plurality of types of data properties to discover complex data properties and dependencies; classifying the data dependencies into predetermined categories for analysis; and generating a plurality of models based on the discovered properties and dependencies. The system and method may analyze, using a processor, the generated models based on a fitness score determined for each model to generate a status report for each model; integrate the status reports for each model to determine an anomaly score for the generated models; and generate an alarm when the anomaly score exceeds a predefined threshold. | 04-17-2014 |
20140108324 | DATA ANALYTIC ENGINE TOWARDS THE SELF-MANAGEMENT OF COMPLEX PHYSICAL SYSTEMS - Systems and method for modeling system dynamics, including extracting features representative of a temporal evolution of a dynamical system, further including deriving one or more vector trajectories by performing sliding window segmentation of one or more time series; applying a linear test to determine whether the one or more vector trajectories are linear or nonlinear; and performing linear or nonlinear subspace decomposition on the vector trajectory based on the linear test. The system and method may generate a system evolution model from the extracted features of the dynamical system and determine a fitness score of the system evolution model. | 04-17-2014 |
20140109112 | Method for Request Profiling in Service Systems with Kernel Events - A method for request profiling in service systems with kernel events includes collecting kernel events traces from a target system, the kernel event traces being obtainable from individual service machines by instrumenting core kernel functions, analyzing kernel event traces for constructing end-to-end request profiling traces consisting of kernel events belonging to service processes, and categorizing request traces responsive to the analyzing with the constructing including grouping requests based on marking kernel events used in the analyzing. | 04-17-2014 |
20140115403 | Method and System for Software System Performance Diagnosis with Kernel Event Feature Guidance - A method includes generating a normal trace in a training stage for the monitored software systems and a monitored trace in the deployment stage for anomaly detection, applying resource transfer functions to traces to convert them to resource features, and system call categorization to traces to convert them to program behavior features, performing anomaly detection in a global scope using the derived resource features and program behavior features, in case the system finds no anomaly, generating no anomaly report, in case the anomaly is found, including the result in an anomaly report; and performing conditional anomaly detection. | 04-24-2014 |
20140298300 | Guarding a Monitoring Scope and Interpreting Partial Control Flow Context - A computer implemented method for maintaining a program's calling context correct even when a monitoring of the program goes out of a scope of a program analysis by validating function call transitions and recovering partial paths before and after the violation of the program's control flow. The method includes detecting a violation of control flow invariants in the software system including validating a source and destination of a function call in the software system, interpreting a pre-violation partial path responsive to a failure of the validating, and interpreting a post violation path after a violation of program flow. | 10-02-2014 |
20140310561 | DYNAMIC FUNCTION-LEVEL HARDWARE PERFORMANCE PROFILING FOR APPLICATION PERFORMANCE ANALYSIS - The invention is directed to a computer implemented method and a system that implements an application performance profiler with hardware performance event information. The profiler provides dynamic tracing of application programs, and offers fine-grained hardware performance event profiling at function levels. To control the perturbation on target applications, the profiler also includes a control mechanism to constraint the function profiling overhead within a budget configured by users. | 10-16-2014 |
20150043382 | HYBRID NETWORK MANAGEMENT - Method and systems for controlling a hybrid network having software-defined network (SDN) switches and legacy switches include initializing a hybrid network topology by retrieving information on a physical and virtual infrastructure of the hybrid network; generating a path between two nodes on the hybrid network based on the physical and virtual infrastructure of the hybrid network; generating a virtual local area network by issuing remote procedure call instructions to legacy switches in accordance with a network configuration request; and generating an SDN network slice by issuing SDN commands to SDN switches in accordance with the network configuration request. | 02-12-2015 |
20150052243 | TRANSPARENT SOFTWARE-DEFINED NETWORK MANAGEMENT - Systems and methods for network management, including adaptively installing one or more monitoring rules in one or more network devices on a network using an intelligent network middleware, detecting application traffic on the network transparently using an application demand monitor, and predicting future network demands of the network by analyzing historical and current demands. The one or more monitoring rules are updated once counters are collected; and network paths are determined and optimized to meet network demands and maximize utilization and application performance with minimal congestion on the network. | 02-19-2015 |
20150071108 | PATENT LATENCY MONITORING IN SOFTWARE-DEFINED NETWORKS - In a software defined network having switches including first and last switches and intermediate switches, wherein a default routing path exists between the first and last switches, a system and method are provided for computing path latency. The method includes inserting a respective monitoring rule(s) in each switch, mandating for each switch, forwarding a received rule matching packet to a next switch, and further mandating for the first switch and the last switch, sending a PacketIn message to a controller. The method includes inserting, in each switch, a respective monitoring probe(s) matching the respective monitoring rule(s) in a same switch to initiate mandates specified by the respective monitoring rule(s) in the same switch responsive to an arrival of the packet thereat. The method includes time-stamping the PacketIn messages to generate PacketIn timestamps, aggregating the PacketIn timestamps, and estimating the path latency from an aggregation of PacketIn timestamps. | 03-12-2015 |