Patent classifications
H04L43/12
METHODS AND APPARATUS TO IMPLEMENT A VIRTUAL PRIVATE NETWORK WITH PROBE FOR NETWORK CONNECTIVITY
Methods, apparatus, systems and articles of manufacture to implement a virtual private network with probe for network connectivity are disclosed. An example non-transitory computer readable storage medium is disclosed comprising instructions which, when executed, cause a machine to at least, in response to a first instruction from an operating system to establish a network tunnel, transmit a probe request to a server; and in response to not receiving, from the server, a probe response to the probe request, report that the network tunnel has been established to prevent the operating system from transmitting subsequent instructions to establish the network connection until a response to a probe request is received.
METHODS AND APPARATUS TO IMPLEMENT A VIRTUAL PRIVATE NETWORK WITH PROBE FOR NETWORK CONNECTIVITY
Methods, apparatus, systems and articles of manufacture to implement a virtual private network with probe for network connectivity are disclosed. An example non-transitory computer readable storage medium is disclosed comprising instructions which, when executed, cause a machine to at least, in response to a first instruction from an operating system to establish a network tunnel, transmit a probe request to a server; and in response to not receiving, from the server, a probe response to the probe request, report that the network tunnel has been established to prevent the operating system from transmitting subsequent instructions to establish the network connection until a response to a probe request is received.
Network Traffic Identification Device
A network traffic device comprising: at least one network device adapted to receive network data packets; wherein said at least one network device filters network data packets to locate at least one identifying packet, and samples said network data packets to select at least one sample packet. The at least one network device may transfer said at least one identifying packet and said at least one sample packet to an analyser. A predetermined sample rate may determine the number of sample packets selected by said at least one network device.
INTUITIVE GRAPHICAL NETWORK MAPPING BASED ON COLLECTIVE INTELLIGENCE
In one embodiment, a method comprises: obtaining, by a process, path trace data collected by a plurality of performance monitoring agents across a computer network; obtaining, by the process, one or more catalogs having application-based correlation information for the path trace data; generating, by the process, network mapping directed graphs by correlating the path trace data using the one or more catalogs, the network mapping directed graphs logically comprising nodes categorized at a plurality of levels of aggregation and edges connecting the nodes; associating, by the process, test-based performance data with the edges of the network mapping directed graphs; and providing, by the process, at least one Sankey diagram based on the network mapping directed graphs and test-based performance data associated with their edges for selectable display by a user interface.
Traffic detection method, apparatus, and system
A traffic detection method, apparatus, and system are provided. A first network device obtains a packet, where the packet is any packet of the traffic. The first network device adds a detection flag and detection indication information to the packet to update the packet, where the detection flag is used to indicate a position of the detection indication information, where the detection indication information includes a first flag, and the first flag is used to indicate whether the traffic is to-be-detected traffic. The first network device sends an updated packet to a second network device. According to this method, traffic performance is detected, and flexibility and extensiveness of traffic performance detection are improved.
Traffic detection method, apparatus, and system
A traffic detection method, apparatus, and system are provided. A first network device obtains a packet, where the packet is any packet of the traffic. The first network device adds a detection flag and detection indication information to the packet to update the packet, where the detection flag is used to indicate a position of the detection indication information, where the detection indication information includes a first flag, and the first flag is used to indicate whether the traffic is to-be-detected traffic. The first network device sends an updated packet to a second network device. According to this method, traffic performance is detected, and flexibility and extensiveness of traffic performance detection are improved.
Monitoring enterprise networks with endpoint agents
Techniques for monitoring enterprise networks with endpoint agents are disclosed. In some embodiments, a system, process, and/or computer program product for monitoring enterprise networks with endpoint agents includes deploying a plurality of endpoint agents to a plurality of endpoint devices; collecting test results from each of the plurality of endpoint agents, wherein the test results are based on tests executed on each of the plurality of endpoint devices for monitoring network activity; and generating a graphical visualization of an application delivery state for one or more application delivery layers based on the test results, generating an alert based on the test results, or generating a report based on the test results.
Monitoring enterprise networks with endpoint agents
Techniques for monitoring enterprise networks with endpoint agents are disclosed. In some embodiments, a system, process, and/or computer program product for monitoring enterprise networks with endpoint agents includes deploying a plurality of endpoint agents to a plurality of endpoint devices; collecting test results from each of the plurality of endpoint agents, wherein the test results are based on tests executed on each of the plurality of endpoint devices for monitoring network activity; and generating a graphical visualization of an application delivery state for one or more application delivery layers based on the test results, generating an alert based on the test results, or generating a report based on the test results.
Secure radio frequency-based imaging
According to an example aspect of the present invention, there is provided a method comprising, transmitting by a wireless device, during a first phase, a first probe signal associated with a user and receiving a reflected version of the first probe signal, transmitting by the wireless device, during the first phase, the reflected version of the first probe signal to a ground truth classifier, transmitting by the wireless device, during a second phase, a second probe signal associated with the user and receiving a reflected version of the second probe signal and transmitting by the wireless device, during the second phase, the reflected version of the second probe signal to a trusted apparatus.
Secure radio frequency-based imaging
According to an example aspect of the present invention, there is provided a method comprising, transmitting by a wireless device, during a first phase, a first probe signal associated with a user and receiving a reflected version of the first probe signal, transmitting by the wireless device, during the first phase, the reflected version of the first probe signal to a ground truth classifier, transmitting by the wireless device, during a second phase, a second probe signal associated with the user and receiving a reflected version of the second probe signal and transmitting by the wireless device, during the second phase, the reflected version of the second probe signal to a trusted apparatus.