Patent application number | Description | Published |
20090161673 | Method and System For Computing Multicast Traffic Matrices - A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records. | 06-25-2009 |
20090185486 | Method for controlling traffic balance between peering networks - A method that measures ratio, relative to a peering network, of traffic burden of incoming traffic to traffic burden of outgoing traffic, where traffic burden takes into account traffic volume and distance that the traffic traverses through the network. A determination is made from this ratio as to whether an imbalance exists with the peering network. With the assistance of a simulation of changes in routing policy and their effects, an existing or impending imbalance is remedied by changing the routing policy relative to particular customers, for example from a “hot potato” routing policy to a “best exit” routing policy. | 07-23-2009 |
20090198569 | METHOD AND APPARATUS FOR PRESENTING ADVERTISEMENTS - A system that incorporates teachings of the present disclosure may include, for example, a controller to determine a behavioral profile of an end user from packet traffic generated by activities of the end user, and share the behavioral profile with a network element for distributing targeted advertisements to the end user according to the behavioral profile. Additional embodiments are disclosed. | 08-06-2009 |
20090254638 | Topology Aware Content Delivery Network - A method of assigning a server to a client system includes determining an ingress point of the client system and identifying possible egress points for the client system. The method further includes selecting the server from a plurality of servers to reduce network cost and delivery time. | 10-08-2009 |
20090296714 | SCALABLE MULTIPROTOCOL LABEL SWITCHING BASED VIRTUAL PRIVATE NETWORKS AND METHODS TO IMPLEMENT THE SAME - Example scalable multi-protocol label switching (MPLS) based virtual private networks (VPNs) and methods to implement the same are disclosed. A disclosed example spoke provider edge (PE) router for an MPLS-based VPN includes a truncated virtual routing and forwarding (VRF) table containing a first value referencing a hub PE router and a second value referencing a first customer edge (CE) router coupled to the VPN via the PE router, and a forwarding module to forward a packet received from the first CE router to the hub PE router when the packet contains an address referencing a second CE router coupled to the VPN via a second spoke PE router. | 12-03-2009 |
20090316590 | Sampling and Analyzing Packets in a Network - The preferred embodiments of the present invention can include sampling packets transmitted over a network based on the content of the packets. If a packet is sampled, the sampling unit can add one or more fields to the sampled packet that can include a field for a number of bytes contained in the packet, a packet count, a flow count, a sampling type, and the like. The sampled packets can be analyzed to discern desired information from the packets. The additional fields that are added to the sampled packets can be used during the analysis. | 12-24-2009 |
20100034084 | Reliability as an Interdomain Service - A system and techniques are disclosed that increase the redundancy (i.e., physical diversity and bandwidth) available to an IP network, thereby increasing the failure processing capability of IP networks. The techniques include pooling the resources of multiple networks together for mutual backup purposes to improve network reliability and employing methods to efficiently utilize both the intradomain and the interdomain redundancies provided by networks at low cost. | 02-11-2010 |
20100061370 | Systems and Methods for Optimized Route Caching - A method for optimized route caching includes comparing a destination address of a network packet to a first set of prefixes in a routing cache, and comparing the destination address to a second set of prefixes in a full routing table when a longest matching prefix for the destination address is not found in the routing cache. The method further includes copying the longest matching prefix and a set of sub-prefixes of the longest matching prefix from the full routing table to the routing cache, and forwarding the network packet. | 03-11-2010 |
20100115604 | METHODS AND APPARATUS TO DYNAMICALLY CONTROL ACCESS FROM VIRTUAL PRIVATE NETWORKS TO NETWORK-BASED SHARED RESOURCES - Methods and apparatus to dynamically control access from VPNs to shared resources are disclosed. A disclosed example route reflector comprises a memory to implement a database, a user interface module to receive a request to permit access for a VPN to a shared resource, a BGP engine to process BGP advertisements, a network interface to receive a first BGP advertisement from a PE router associated with the VPN that includes a first RT associated with the VPN, and a shared resource access controller to update the database based on the request, to query the database to determine whether the VPN has access to the shared resource in response to the first BGP advertisement, and to direct the BGP engine to form a second BGP advertisement based on the first BGP advertisement that includes a second RT associated with the shared resource when the VPN has access to the shared resource. | 05-06-2010 |
20100121945 | Hybrid Unicast/Anycast Content Distribution Network System - A method includes receiving a request for an edge cache address, and comparing a requester address to an anycast group. The method can further include providing an anycast edge cache address when the requestor address is in the anycast group. Alternatively, the method can further include determining an optimal cache server, and providing a unicast address of the optimal cache server when the requester address is not in the anycast group. | 05-13-2010 |
20100125643 | Interdomain Network Aware Peer-to-Peer Protocol - A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client. | 05-20-2010 |
20100138543 | Real-time content detection in ISP transmissions - A method and system for detecting the transmission of preidentified content, such as copyrighted material, over an Internet Service Provider (ISP) network. A set of rules is provided to identify one or more traffic flow profiles of data streams transmitting preidentified content. Preferably the rules are adaptively created through analysis of actual ISP data in conjunction with data suggesting an initial set of profile characteristics. The rules are applied to data streams being transmitted in the ISP network, so that data streams fitting one or more of the profiles are identified. A database contains, e.g., as digital signatures or fingerprints, one or more items of content whose transmission is sought to be detected. Data streams identified as matching a profile are analyzed to determine if their content matches an item of content in the database, and if so, an action is taken which may include interrupting the transmission, suspending an ISP account, or reporting the transmission. An ISP with a system performing this method may offer services to content providers, and a plurality of ISPs may jointly use a single database of preidentified content to be compared to each ISP's identified data streams. | 06-03-2010 |
20100138555 | System and Method to Guide Active Participation in Peer-to-Peer Systems with Passive Monitoring Environment - A method includes identifying shared content by inspecting a peer-to-peer traffic flow and identifying source peers providing the shared content, and requesting the shared content from the source peers. The method further includes receiving requests for the shared content from requesting peers, identifying requesting peers based on the requests for the shared content, and providing the shared content to a local subset of the requesting peers. | 06-03-2010 |
20100146100 | Flexible Application Classification - A system includes an information storage module and an inspection module. The information storage module is configured to store a plurality of tags. Each tag is associated with a known set of traffic types of a plurality of known sets of traffic types. The inspection module is configured to compare a traffic flow to a set of traffic types to determine a matching set of traffic types, request a tag from the information storage module, and mark the traffic flow with the tag. The tag corresponds to the matching set of traffic types. | 06-10-2010 |
20100150005 | SYSTEM AND METHOD FOR DETERMINATION OF ROUTING INFORMATION IN A NETWORK - A system and method to use network flow records to generate information about changes in network routing and to understand the impact of these changes on network traffic. The inferences made can be determinative, if sufficient information is available. If sufficient information is not available to make determinative inferences, inferences may be made that narrow the range of possible changes that may have occurred to network traffic and the underlying network. | 06-17-2010 |
20100157809 | SYSTEM AND METHOD FOR SPATIALLY CONSISTENT SAMPLING OF FLOW RECORDS AT CONSTRAINED, CONTENT-DEPENDENT RATES - Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a desired quantity of flow record to sample, receiving a plurality of network flow record each summarizing a network flow of packets, calculating a hash for each flow record of based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, generating a priority from the calculated hash for each respective flow record, and sampling exactly the desired quantity of flow records, selecting flow records having a highest priority first. In one aspect, the method further partitions the plurality of flow records into groups based on flow origin and destination, generates an individual priority for each partitioned group, and separately samples exactly the desired quantity of flow records from each partitioned group, selecting flows having a highest individual priority first. | 06-24-2010 |
20100159931 | System and Method for Inferring Wireless Trajectories in a Cellular Telephone Network - A device includes a processor configured to determine a number of users in each of a plurality of wireless telephone cells of a trajectory in a wireless telephone network. The processor is also configured to determine handoff data between each adjacent pair of the wireless telephone cells, and to determine a first number of users traveling along the trajectory in the wireless telephone network while on a telephone call. The processor also calculates a total number of users associated with the trajectory in the wireless telephone network based on the handoff data between each adjacent pair of the wireless telephone cells, and based on the first number of users traveling along the trajectory while on the telephone call. | 06-24-2010 |
20100161535 | METHOD AND APPARATUS FOR INFERRING THE PRESENCE OF STATIC INTERNET PROTOCOL ADDRESS ALLOCATIONS - A method and apparatus for inferring if an IP address allocation in a remote network is static or dynamic are disclosed. For example, the method contacts at least one remote peer to peer endpoint using a peer to peer application to obtain an IP address of the at least one remote peer to peer endpoint. The method then analyzes characteristics of the at least one remote peer to peer endpoint over a predefined period of time to infer whether the presence of static IP address allocation exists for the at least one remote peer to peer endpoint. | 06-24-2010 |
20100161791 | SYSTEM AND METHOD FOR SAMPLING NETWORK TRAFFIC - Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a plurality of flow records, calculating a hash for each flow record based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, and sampling flow records having a quasi-random number below a probability P. Invariant parts of flow records include destination IP address, source IP address, TCP/UDP port numbers, TCP flags, and network protocol. A plurality of routers can uniformly calculate hashes for flow records. Each router in a plurality of routers can generate a same quasi-random number for each respective flow record and uses different values for probability P. The probability P can depend on a flow size. The method can divide the quasi-random number by a maximum possible hash value. | 06-24-2010 |
20100262683 | Network Aware Forward Caching - An Internet service provider includes a cache server and a network aware server. The network aware server is operable to determine an optimization between a cost of retrieving content from a network and a cost of caching content from the network at the first cache server and then send a content identifier to the cache server. The cache server is operable to receive the content identifier, and determine the source of a content item. If the source is the same as the content identifier, then the cache server caches the content item. | 10-14-2010 |
20100296430 | Method and System for Computing Multicast Traffic Matrices - A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records. | 11-25-2010 |
20110013525 | Indirect measurement methodology to infer routing changes using statistics of flow arrival processes - Statistical methods are used to observe packet flow arrival processes and to infer routing changes from those observations. Packet flow arrivals are monitored using NetFlow or another packet flow monitoring arrangement. Packet flow arrivals are quantified by counting arrivals per unit time, or by measuring an inter-arrival time between flows. When a change in packet flow arrivals is determined to be statistically significant, a change in network routing protocol is reported. | 01-20-2011 |
20110069634 | METHODS AND APPARATUS TO IMPLEMENT SCALABLE ROUTING IN NETWORK COMMUNICATION SYSTEMS - Methods and apparatus to implement scalable routing in network communication systems are disclosed. A disclosed example method involves selecting a plurality of virtual private networks in a communication network and selecting a candidate hub router from a plurality of routers in the communication network. The example method also involves determining a plurality of least memory utilization costs associated with assigning different quantities of spoke routers to the candidate hub router. Each of the least memory utilization costs and corresponding quantity of spoke routers is associated with a corresponding one of the plurality of virtual private networks. For each of the least memory utilization costs, a bandwidth usage of a corresponding one of the quantities of spoke routers is identified. The candidate hub router is selected to operate as a hub router for one of the quantities of spoke routers associated with a corresponding one of the bandwidth usages that does not exceed a bandwidth capacity of the candidate hub router. | 03-24-2011 |
20110072127 | Network Aware Application Management - A method of managing a network application includes identifying a network path for the network application, obtaining network performance measurements along the network path, obtaining application performance information for the network application, and extracting infrastructure specific information for the infrastructure supporting the network application. The method further includes correlating the application performance information, network performance measurements, and the infrastructure specific information to identify a performance issue affecting the network application, and modifying the application behavior, the network behavior, or any combination thereof in response to the performance issue. | 03-24-2011 |
20110085630 | TCP FLOW CLOCK EXTRACTION - A packet trace is received. The packet trace is transformed into a sequence of pulse signals in a temporal domain. The sequence of pulse signals in the temporal domain is transformed into a sequence of pulse signals in a frequency domain. Peaks are detected within relevant frequency bands in the sequence of pulse signals in the frequency domain. A fundamental frequency is identified within the peaks. The fundamental frequency, which represents the TCP flow clock, is returned. | 04-14-2011 |
20110096662 | Inferring TCP Initial Congestion Window - A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size a size of the ICW as a product of the order number and the maximum segment size is returned. | 04-28-2011 |
20110103256 | Detecting Irregular Retransmissions - A packet trace is received. Transmitted bytes and retransmitted bytes are identified in the packet trace. Upon identifying the transmitted bytes and the retransmitted bytes in the packet trace, one or more time-rate pairs are determined from the packet trace. The time-rate pairs are plotted on a rate tracking graph. | 05-05-2011 |
20110142053 | METHODS AND APPARATUS TO COMMUNICATIVELY COUPLE VIRTUAL PRIVATE NETWORKS TO VIRTUAL MACHINES WITHIN DISTRIBUTIVE COMPUTING NETWORKS - Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks are disclosed. A disclosed example method includes receiving a request to provision a virtual machine from a virtual private network, determining a host for the virtual machine within a distributive computing network, creating the virtual machine within the host, communicatively coupling the virtual machine to a virtual local area network switch within the distributive computing network, configuring a portion of a router to be communicatively coupled to the virtual machine via the virtual local area network switch by specifying an address space within the router associated with at least one of the virtual machine or the virtual private network communicatively coupled to the router, and communicatively coupling the portion of the router to the virtual private network. | 06-16-2011 |
20110145211 | Network Based Audience Measurement - Methods, systems, and computer-readable media for providing network-based audience measurement are provided. Data packets are intercepted between a client computer and a content server. Unique subscribers and content names are identified based on the data packets. One or more audience measurement metrics are computed based on the unique subscribers and the content names. | 06-16-2011 |
20110161313 | METHOD AND APPARATUS FOR AUTOMATED END TO END CONTENT TRACKING IN PEER TO PEER ENVIRONMENTS - A method, computer readable medium and system for automatically tracking content in a peer-to-peer environment are disclosed. For example, the method monitors a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer environment, adds one or more content titles of the plurality of content titles that are downloaded above a predetermined threshold to a list, downloads each one of the one or more content titles in the list via the peer-to-peer environment and verifies that each one of the one or more content titles that are downloaded matches at least one content title in the list. | 06-30-2011 |
20120057571 | METHOD AND APPARATUS FOR NORMALIZING CELLULAR COMMUNICATIONS NETWORK DATA - A method, computer readable medium and apparatus for normalizing cellular communications network data are disclosed. For example, the method collects a data packet from the cellular communications network, modifies a time stamp of the data packet in accordance with a promotion delay time from the time stamp of the data packet to create a normalized data packet and processes the normalized data packet to optimize state machine configurations. | 03-08-2012 |
20120058773 | METHOD AND APPARATUS FOR PERFORMING A DEMOTION IN A CELLULAR COMMUNICATIONS NETWORK - A method, computer readable medium and apparatus for performing a demotion in a cellular communications network are disclosed. For example, the method receives a packet indicating that a batching transfer is completed, determines if a background packet was received after receiving the packet indicating that the batching transfer is completed and demotes a state of a state machine implemented by a radio network controller to a lower state if the background packet was not received. | 03-08-2012 |
20120060221 | Prioritizing Malicious Website Detection - A computer implemented method includes identifying a universal resource locator and characterizing a traffic pattern associated with the universal resource locator. The traffic pattern can include referrer information, referring information, advertising network relationship information, and any combination thereof. The method can further include classifying the universal resource locator into a risk category based on the traffic pattern. | 03-08-2012 |
20120096140 | Network Aware Forward Caching - A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item. | 04-19-2012 |
20120120812 | METHOD AND APPARATUS FOR INFERRING STATE TRANSITIONS IN A WIRELESS COMMUNICATIONS NETWORK - A method, a computer readable medium and an apparatus for inferring state transitions in a wireless communications network are disclosed. In one embodiment, the method infers a state promotion procedure. In another embodiment, the method infers a state demotion procedure. | 05-17-2012 |
20120122405 | METHOD AND APPARATUS FOR PROVIDING A DYNAMIC INACTIVITY TIMER IN A WIRELESS COMMUNICATIONS NETWORK - A method, a computer readable medium and an apparatus for providing a dynamic inactivity timer are disclosed. For example, the method monitors a timer for a time threshold associated with a burst of a plurality of bursts of packets, and determines if the timer for the time threshold associated with the burst has expired. The method predicts an inter-burst time for the burst, if the timer for the time threshold associated with the burst has expired and sets the dynamic inactivity timer in accordance with the inter-burst time for the burst. | 05-17-2012 |
20120131664 | METHOD AND APPARATUS FOR CONTENT AWARE OPTIMIZED TUNNELING IN A MOBILITY ENVIRONMENT - A method, computer readable medium and apparatus for performing content aware optimized tunneling in a communication network are disclosed. For example, the method authenticates a user endpoint device, establishes a tunnel to the user endpoint device if the user endpoint device is authenticated, analyzes content of a data packet transmitted through the tunnel to determine if the tunnel should be re-directed, and re-directs the tunnel to a gateway general packet radio services support node light based upon the content of the data packet. | 05-24-2012 |
20120147758 | SYSTEM FOR ESTIMATING DOWNLOAD SPEED FROM PASSIVE MEASUREMENTS - A system for passive estimation of throughput in an electronic network is disclosed. The system may include an plurality of mobile devices configured to operate in the network and may further include an electronic data processor. The processor may be configured to access flow records for data flows associated with the mobile devices during a predetermined time interval. Additionally, the processor may be configured to annotate the flow records with an application field and a content provider field. The processor may also be configured to determine a flow type of each data flow based on the application field and the content provider field of the flow records. Furthermore, the processor may be configured to generate a throughput index that only includes non-rate-limited flow types. Moreover, the processor may be configured to estimate maximum throughput for each data flow having non-rate-limited flow types in the throughput index. | 06-14-2012 |
20120151041 | INTELLIGENT MOBILITY APPLICATION PROFILING TOOL - Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user. | 06-14-2012 |
20120155255 | METHOD AND APPARATUS FOR MANAGING A DEGREE OF PARALLELISM OF STREAMS - A method, computer readable medium and apparatus for managing a degree of parallelism of streams are disclosed. For example, the method analyzes wireless traffic to determine a profile of the wireless traffic, determines an amount of available processing resources, and manages the degree of parallelism of streams based on the profile and the amount of available processing resources in a probe server. | 06-21-2012 |
20120155293 | METHOD AND APPARATUS FOR PROVIDING A TWO-LAYER ARCHITECTURE FOR PROCESSING WIRELESS TRAFFIC - A method and system for processing wireless traffic of a wireless network, e.g., a cellular network are disclosed. For example, the method obtains wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds comprising a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers by a plurality of aggregator servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers, and outputs a correlated result from the correlating. | 06-21-2012 |
20120155319 | METHOD AND APPARATUS FOR CHARACTERIZING INFRASTRUCTURE OF A CELLULAR NETWORK - A method and apparatus for characterizing an infrastructure of a wireless network are disclosed. For example, the method obtains a first data set from a server log, and obtains a second data set from a plurality of wireless endpoint device. The method characterizes a parameter of the infrastructure of the wireless network using the first data set and the second data set and optimizes a network resource of the wireless network based on the parameter. | 06-21-2012 |
20120155379 | METHOD AND APPARATUS FOR APPLYING UNIFORM HASHING TO WIRELESS TRAFFIC - A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server. | 06-21-2012 |
20120157088 | METHOD AND APPARATUS FOR CORRELATING END TO END MEASUREMENTS THROUGH CONTROL PLANE MONITORING OF WIRELESS TRAFFIC - A method, computer readable medium and apparatus for correlating measures of wireless traffic are disclosed. For example, the method obtains the wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds, wherein the plurality of feeds comprises a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers by a plurality of aggregator servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers to provide a correlated control plane and a correlated data plane, and extracts at least partial path information of a flow from the correlated control plane. The method then correlates performance information from the correlated data plane for the flow. | 06-21-2012 |
20120159109 | METHOD AND APPARATUS FOR IMPROVING NON-UNIFORM MEMORY ACCESS - A method, computer readable medium and apparatus for improving non-uniform memory access are disclosed. For example, the method divides a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform. The method sets a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory, and defines a plurality of processor sets. The method binds one of the plurality of groups to one of the plurality of processor sets, and run the one group of stream processing jobs on the one processor set. | 06-21-2012 |
20120246308 | Interdomain Network Aware Peer-to-Peer Protocol - A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client. | 09-27-2012 |
20120275344 | METHODS AND APPARATUS TO IMPLEMENT SCALABLE ROUTING IN NETWORK COMMUNICATION SYSTEMS - An example method involves for a first virtual private network (VPN) installed on a candidate hub router, selecting a first spoke-to-hub assignment solution having a first least memory utilization cost to assign the candidate hub router a quantity of first virtual private edge (VPE) routers serving the first VPN; for a second VPN installed on the candidate hub router, selecting a second spoke-to-hub assignment solution having a second least memory utilization cost to assign the candidate hub router a quantity of second VPE routers serving the second VPN; determining third least memory utilization costs to assign the candidate hub router to a quantity of the first VPE routers, and fourth least memory utilization costs to assign the candidate hub router to a quantity of the second VPE routers; and selecting the first or second spoke-to-hub assignment solution for the candidate hub router based on the least memory utilization costs. | 11-01-2012 |
20120307678 | Inferring TCP Initial Congestion Window - A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size, a size of the ICW as a product of the order number and the maximum segment size is returned. | 12-06-2012 |
20120324041 | BUNDLING DATA TRANSFERS AND EMPLOYING TAIL OPTIMIZATION PROTOCOL TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION - Techniques for increasing power and resource efficiency of a mobile device are presented herein. In the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device. | 12-20-2012 |
20130007255 | Methods, Devices, and Computer Program Products for Providing a Computing Application Rating - A rating is provided for a computing application. Traffic data, power data, and/or network signaling load data is collected for a computing application and compared with other similar data. A rating for the computing application is provided based on the comparison. | 01-03-2013 |
20130035082 | CONTROLLING TRAFFIC TRANSMISSIONS TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION - Techniques for using controlling traffic transmissions to manage radio resource utilization are presented herein. When content is being streamed to user equipment (UE) and is at least initially intended to be streamed in real time at a constant bitrate, a communication management component can determine whether the content being transmitted to the UE can be delayed, instead of being transmitted in real time. In response to determining that the content can be delayed, the communication management component can facilitate buffering data and periodically streaming the data to the UE in data bursts to reduce use of UE power and radio resources. When transmitting a visual image to a UE, the communication management component can adjust resolution of a visual image to correspond to screen dimensions of the UE based on information indicating screen dimensions of the UE that can be received from the UE. | 02-07-2013 |
20130042009 | Network Aware Forward Caching - A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item. | 02-14-2013 |
20130051248 | HIERARCHICAL ANOMALY LOCALIZATION AND PRIORITIZATION - Methods, apparatus and articles of manufacture for hierarchical anomaly localization and prioritization are disclosed. An example method disclosed herein comprises obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate, and determining a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node. | 02-28-2013 |
20130054783 | PASSIVE AND COMPREHENSIVE HIERARCHICAL ANOMALY DETECTION SYSTEM AND METHOD - A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm. | 02-28-2013 |
20130132608 | System And Method For Determination Of Routing Information In A Network - A system and method to use network flow records to generate information about changes in network routing and to understand the impact of these changes on network traffic. The inferences made can be determinative, if sufficient information is available. If sufficient information is not available to make determinative inferences, inferences may be made that narrow the range of possible changes that may have occurred to network traffic and the underlying network. | 05-23-2013 |
20130159503 | METHOD AND APPARATUS FOR DETECTING TETHERING IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature. | 06-20-2013 |
20130215738 | Reliability as an Interdomain Service - A system and techniques are disclosed that increase the redundancy (i.e., physical diversity and bandwidth) available to an IP network, thereby increasing the failure processing capability of IP networks. The techniques include pooling the resources of multiple networks together for mutual backup purposes to improve network reliability and employing methods to efficiently utilize both the intradomain and the interdomain redundancies provided by networks at low cost. | 08-22-2013 |
20130262429 | METHOD AND APPARATUS FOR AUTOMATED END TO END CONTENT TRACKING IN PEER TO PEER ENVIRONMENTS - A method, computer readable medium and system for automatically tracking content in a peer-to-peer environment are disclosed. For example, the method monitors a number of times each content title of a plurality of content titles are downloaded in the peer-to-peer environment, adds one or more content titles of the plurality of content titles that are downloaded above a predetermined threshold to a list, downloads each one of the one or more content titles in the list via the peer-to-peer environment and verifies that each one of the one or more content titles that are downloaded matches at least one content title in the list. | 10-03-2013 |
20130266023 | Method and System for Computing Multicast Traffic Matrices - A system and method for receiving, from one or more ingress routers, a first set of records including data corresponding to network traffic, receiving, from one or more egress routers, a second set of records including data corresponding to network traffic and creating a multicast traffic matrix using at least a portion of the data included in the first and second sets of records. | 10-10-2013 |
20130272159 | System for Estimating Download Speed From Passive Measurements - A system for passive estimation of throughput in an electronic network is disclosed. The system may include an plurality of mobile devices configured to operate in the network and may further include an electronic data processor. The processor may be configured to access flow records for data flows associated with the mobile devices during a predetermined time interval. Additionally, the processor may be configured to annotate the flow records with an application field and a content provider field. The processor may also be configured to determine a flow type of each data flow based on the application field and the content provider field of the flow records. Furthermore, the processor may be configured to generate a throughput index that only includes non-rate-limited flow types. Moreover, the processor may be configured to estimate maximum throughput for each data flow having non-rate-limited flow types in the throughput index. | 10-17-2013 |
20130282896 | Passive And Comprehensive Hierarchical Anomaly Detection System And Method - A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm. | 10-24-2013 |
20130298240 | Prioritizing Malicious Website Detection - A computer implemented method includes identifying a universal resource locator and characterizing a traffic pattern associated with the universal resource locator. The traffic pattern can include referrer information, referring information, advertising network relationship information, and any combination thereof. The method can further include classifying the universal resource locator into a risk category based on the traffic pattern. | 11-07-2013 |
20130298241 | Network Based Audience Measurement - Methods, systems, and computer-readable media for providing network-based audience measurement are provided. Data packets are intercepted between a client computer and a content server. Unique subscribers and content names are identified based on the data packets. One or more audience measurement metrics are computed based on the unique subscribers and the content names. | 11-07-2013 |
20130304914 | Topology Aware Content Delivery Network - A method of assigning a server to a client system includes determining an ingress point of the client system and identifying possible egress points for the client system. The method further includes selecting the server from a plurality of servers to reduce network cost and delivery time. | 11-14-2013 |
20130315088 | INTELLIGENT MOBILITY APPLICATION PROFILING TOOL - Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user. | 11-28-2013 |
20140059208 | Methods, Systems, and Products for Monitoring Domain Name Servers - Methods, systems, and products infer performance of a domain name system. Queries to, and responses from, the domain name system are logged and categorized. Each category is associated with a different performance issue related to the domain name system. The number of entries in each category may be used to infer the performance of the domain name system | 02-27-2014 |
20140164140 | METHOD AND APPARATUS FOR PRESENTING ADVERTISEMENTS - A system that incorporates teachings of the present disclosure may include, for example, a controller to determine a behavioral profile of an end user from packet traffic generated by activities of the end user, and share the behavioral profile with a network element for distributing targeted advertisements to the end user according to the behavioral profile. Additional embodiments are disclosed. | 06-12-2014 |
20140204789 | METHOD AND APPARATUS FOR MANAGING A DEGREE OF PARALLELISM OF STREAMS - A method, computer readable medium and apparatus for managing a degree of parallelism of streams are disclosed. For example, the method analyzes wireless traffic to determine a profile of the wireless traffic, determines an amount of available processing resources, and manages the degree of parallelism of streams based on the profile and the amount of available processing resources in a probe server. | 07-24-2014 |
20140206344 | METHOD AND APPARATUS FOR CORRELATING END TO END MEASUREMENTS THROUGH CONTROL PLANE MONITORING OF WIRELESS TRAFFIC - A method, computer readable medium and apparatus for correlating measures of wireless traffic are disclosed. For example, the method obtains the wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds, wherein the plurality of feeds comprises a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers to provide a correlated control plane and a correlated data plane, and extracts at least partial path information of a flow from the correlated control plane. The method then correlates performance information from the correlated data plane for the flow. | 07-24-2014 |
20140258518 | METHOD AND APPARATUS FOR APPLYING UNIFORM HASHING TO WIRELESS TRAFFIC - A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server. | 09-11-2014 |
20140269430 | METHOD AND APPARATUS FOR DETECTING TETHERING IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature. | 09-18-2014 |
20150085675 | HIERARCHICAL ANOMALY LOCALIZATION AND PRIORITIZATION - Example methods disclosed herein to localize anomalies in a communication network include identifying a first set of abnormal nodes in the communication network, and including respective ones of the first set of abnormal nodes having a number of normal direct descendent nodes that is less than a combined number of abnormal direct descendent nodes and indeterminate direct descendent nodes in a set of candidate nodes. Such disclosed example methods also include iteratively selecting ones of the set of candidate nodes to include in a set of root cause abnormal nodes representing sources of the anomalies in the communication network. In such disclosed example methods, the ones of the set of candidate nodes are selected based on sizes of respective subsets of the abnormal nodes from the first set of abnormal nodes covered by the candidate nodes. | 03-26-2015 |