H04L43/045

System and method of comparing time periods before and after a network temporal event

The present technology pertains to a system, method, and non-transitory computer-readable medium for evaluating the impact of network changes. The technology can detect a temporal event, wherein the temporal event is associated with a change in a network configuration, implementation, or utilization. The technology defines, based on a nature of the temporal event, a first period prior to the temporal event or a second period posterior to the temporal event. The technology compares network data collected in the first period and network data collected in the second period.

System and method of comparing time periods before and after a network temporal event

The present technology pertains to a system, method, and non-transitory computer-readable medium for evaluating the impact of network changes. The technology can detect a temporal event, wherein the temporal event is associated with a change in a network configuration, implementation, or utilization. The technology defines, based on a nature of the temporal event, a first period prior to the temporal event or a second period posterior to the temporal event. The technology compares network data collected in the first period and network data collected in the second period.

Method, apparatus, and system for time synchronization based on in-band telemetry
11558267 · 2023-01-17 · ·

A method, an apparatus, and a system for time synchronization based on in-band telemetry are disclosed. The method includes: acquiring an estimated value of delay in a first transmission direction and an estimated value of delay in a second transmission direction; wherein the estimated value of delay in the first transmission direction is determined according to multiple delay samples in the first transmission direction, and the estimated value of delay in the second transmission direction is determined according to multiple delay samples in the second transmission direction, the first transmission direction is a direction from a second device to a first device, and the second transmission direction is vice versa; and determining a time system error of the first device relative to the second device according to the estimated value of delay in the first transmission direction and the estimated value of delay in the second transmission direction.

Method, apparatus, and system for time synchronization based on in-band telemetry
11558267 · 2023-01-17 · ·

A method, an apparatus, and a system for time synchronization based on in-band telemetry are disclosed. The method includes: acquiring an estimated value of delay in a first transmission direction and an estimated value of delay in a second transmission direction; wherein the estimated value of delay in the first transmission direction is determined according to multiple delay samples in the first transmission direction, and the estimated value of delay in the second transmission direction is determined according to multiple delay samples in the second transmission direction, the first transmission direction is a direction from a second device to a first device, and the second transmission direction is vice versa; and determining a time system error of the first device relative to the second device according to the estimated value of delay in the first transmission direction and the estimated value of delay in the second transmission direction.

MEASURING PERFORMANCE OF VIRTUAL DESKTOP EVENT REDIRECTION

The disclosure provides an approach for measuring performance between a virtualized desktop infrastructure (VDI) client running on a client device and a remote computing device. Embodiments include generating, by a performance client on the client device, an event and storing a time associated with generating the event. Embodiments include transmitting, by the VDI client to the remote computing device, a message based on the OS event. Embodiments include determining, by a performance agent on the remote computing device, a time associated with receiving the message at the remote computing device and causing an indication of the time to be displayed in a virtual desktop screen. Embodiments include extracting, by the performance client, from the virtual desktop screen, the time, and determining a performance metric based on the extracted time and the time associated with receiving the message at the remote computing device.

Spam detection
11575633 · 2023-02-07 · ·

A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.

Identifying an ingress router of a flow in inter-AS VPN option-C networks with visibility in one AS
11575596 · 2023-02-07 · ·

Systems and methods include detecting whether a monitored network has a unique configuration; responsive to the unique configuration, determining an ingress point for flow samples; and utilizing the determined ingress point for the flow samples to generate a traffic report for the monitored network. The unique configuration is an inter-Autonomous System (AS) option-C Virtual Private Network (VPN) network where control and data planes are asymmetric. The approach provides traffic projection based on the flow samples with the asymmetric flows.

Identifying an ingress router of a flow in inter-AS VPN option-C networks with visibility in one AS
11575596 · 2023-02-07 · ·

Systems and methods include detecting whether a monitored network has a unique configuration; responsive to the unique configuration, determining an ingress point for flow samples; and utilizing the determined ingress point for the flow samples to generate a traffic report for the monitored network. The unique configuration is an inter-Autonomous System (AS) option-C Virtual Private Network (VPN) network where control and data planes are asymmetric. The approach provides traffic projection based on the flow samples with the asymmetric flows.

System for automated cross-network monitoring of computing hardware and software resources

A system is provided for automated cross-network monitoring of computing hardware and software status. In particular, the system may track the status of various computing resources using process automation-based operations to simulate calls made by users to the various resources that the users are authorized to access. Based on said operations, the system may assess whether the authorized pathways to the resources and/or their respective components are properly functioning by capturing information regarding the resource, its associated components, and the current status of the resource. The results of these operations may be aggregated to provide an overview of which resources and/or systems are functioning and which are not. In this way, the system may provide a detailed view of the statuses of the individual resources and components within an entity's complex computing network.

System for automated cross-network monitoring of computing hardware and software resources

A system is provided for automated cross-network monitoring of computing hardware and software status. In particular, the system may track the status of various computing resources using process automation-based operations to simulate calls made by users to the various resources that the users are authorized to access. Based on said operations, the system may assess whether the authorized pathways to the resources and/or their respective components are properly functioning by capturing information regarding the resource, its associated components, and the current status of the resource. The results of these operations may be aggregated to provide an overview of which resources and/or systems are functioning and which are not. In this way, the system may provide a detailed view of the statuses of the individual resources and components within an entity's complex computing network.