Patent classifications
H04L43/022
Monitoring network traffic to determine similar content
In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets. The method further includes, for each generated stream signature, attaching information to the stream signature. Such information may, for example, include time-stamp information for the stream signature, or an identification of the router. The method may further comprise storing the stream signatures corresponding to the data streams in a database. The stored stream signatures may be compared to determine matching stream signatures. Matching signatures may identify data streams that carry identical or similar content.
Monitoring network traffic to determine similar content
In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets. The method further includes, for each generated stream signature, attaching information to the stream signature. Such information may, for example, include time-stamp information for the stream signature, or an identification of the router. The method may further comprise storing the stream signatures corresponding to the data streams in a database. The stored stream signatures may be compared to determine matching stream signatures. Matching signatures may identify data streams that carry identical or similar content.
Reducing data storage and network traffic with data compression
A data collection device can determine that a connection is unavailable between the data collection device and a data processing platform. The data collection device can obtain, after the connection is unavailable, a plurality of readings. The data collection device can determine, based on determining that the connection is unavailable, to discard one or more readings from the plurality of readings to form a set of readings. The data collection device can store, based on determining that the connection is unavailable, the set of readings without storing the one or more readings. The data collection device can determine, after storing the set of readings, that the connection is available. The data collection device can transmit, based on determining that the connection is available, the set of readings to the data processing platform.
Network packet capture manager
The packet capture manager uses a multi-tiered storage for storing captured network traffic. Captured packets are stored on a primary storage with a time-to-live according to a retention policy. The packet capture manager receives instructions from one or more network monitoring devices identifying one or more captured packets as packets of interest. The packet capture manager flags the identified packets as packets of interest, moves the flagged packets to a secondary storage, and changes the TTL of the moved packets. A machine learning model analyzes historical data of the instructions received from the one or more network monitoring devices. The packet capture manager uses the machine learning model to identify packets of interest and move identified packets to the secondary storage without specific instructions from a network monitoring device.
Network packet capture manager
The packet capture manager uses a multi-tiered storage for storing captured network traffic. Captured packets are stored on a primary storage with a time-to-live according to a retention policy. The packet capture manager receives instructions from one or more network monitoring devices identifying one or more captured packets as packets of interest. The packet capture manager flags the identified packets as packets of interest, moves the flagged packets to a secondary storage, and changes the TTL of the moved packets. A machine learning model analyzes historical data of the instructions received from the one or more network monitoring devices. The packet capture manager uses the machine learning model to identify packets of interest and move identified packets to the secondary storage without specific instructions from a network monitoring device.
Method for testing a wireless link of a Wi-Fi node, and circuit performing the method
The method for monitoring a wireless link of a wireless node of a CPE device during operation of the CPE device, comprises the steps of taking samples of one or several of the following parameters in a defined time interval: Received Signal Strength (RSSI), modulation rate (Physical Layer Rate) and/or the number of spatial streams used for the wireless link, and calculating an average for that parameters by including a filtering of said parameters.
Network packet loss period expansion
Technologies are provided for analyzing packet loss in network packet streams using windowed loss durations. A computing device can be configured to detect a first loss period in a network packet stream and a second, subsequent loss period in the network packet stream. The computing device can determine a number of packets received in the stream between the two loss periods, and can compare this number of packets to a specified recovery window length. If the number of packets received between the two loss periods is less than the recovery window length, then the computing device can treat the two loss periods, and the packets received between the two loss periods, as a single period of packet loss. The packet loss period can be treated as a single loss event for the purposes of analyzing network packet stream quality of experience and/or tuning packet loss compensation mechanisms.
Network packet loss period expansion
Technologies are provided for analyzing packet loss in network packet streams using windowed loss durations. A computing device can be configured to detect a first loss period in a network packet stream and a second, subsequent loss period in the network packet stream. The computing device can determine a number of packets received in the stream between the two loss periods, and can compare this number of packets to a specified recovery window length. If the number of packets received between the two loss periods is less than the recovery window length, then the computing device can treat the two loss periods, and the packets received between the two loss periods, as a single period of packet loss. The packet loss period can be treated as a single loss event for the purposes of analyzing network packet stream quality of experience and/or tuning packet loss compensation mechanisms.
CROWD-SOURCED CLOUD COMPUTING RESOURCE VALIDATION
Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each IP address included in the received specification is determined. An agent is deployed that is operable to determine the value of each of a set of metrics in the environment of the host at which the agent is deployed. The agent determines the value of each metric of the set of metrics in the environment of the relevant host, and communicates the determined values to one or more computing devices that validate whether the resources characterized by the communicated values are sufficient to provide the performance characterized by the received specification and that each ISP router complies with a predetermined policy. For each computing resource provider validated and determined to comprise an ISP router compliant with policy, the specified computing resources are added to a pool of resources for cloud computing.
CROWD-SOURCED CLOUD COMPUTING RESOURCE VALIDATION
Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each IP address included in the received specification is determined. An agent is deployed that is operable to determine the value of each of a set of metrics in the environment of the host at which the agent is deployed. The agent determines the value of each metric of the set of metrics in the environment of the relevant host, and communicates the determined values to one or more computing devices that validate whether the resources characterized by the communicated values are sufficient to provide the performance characterized by the received specification and that each ISP router complies with a predetermined policy. For each computing resource provider validated and determined to comprise an ISP router compliant with policy, the specified computing resources are added to a pool of resources for cloud computing.