摘要:
A method of generating an annotated network topology of a network is described. The method includes; deriving a network topology by performing a route tracing utility between each pair of endpoints to determine the route taken by packets; initially annotating each network path with an initial value; determining the available bandwidth of a path connecting a pair of endpoints by performing Transfer Control Protocol (TCP) flows between the pair of endpoints; identifying a bottleneck link in the network path, and annotating all edges to generate an annotated network topology wherein available bandwidth annotation of links inside the network is determined using end-to-end network measurements.
摘要:
A system and method for scalable status change detection in a network of nodes includes embedding node coordinate positions into a virtual map environment. A cluster of nodes are represented with a representative node to form a hierarchy of nodes and clusters where changes in a status of the representative node imply a status change in the nodes of the cluster. By selectively monitoring the representative nodes for the changes in status, the representative nodes create a capability for scalable monitoring of the network.
摘要:
A system and method for scalable status change detection in a network of nodes includes embedding node coordinate positions into a virtual map environment. A cluster of nodes are represented with a representative node to form a hierarchy of nodes and clusters where changes in a status of the representative node imply a status change in the nodes of the cluster. By selectively monitoring the representative nodes for the changes in status, the representative nodes create a capability for scalable monitoring of the network.
摘要:
Managing application performance on a network. A network graph is generated from a set of application endpoints on the network. The network graph is annotated by associating one or more of the application endpoints with at least one of a corresponding latency annotation or a corresponding available bandwidth annotation. An end to end plan is formulated from the annotated network graph, wherein the plan maps one or more application requirements onto the plurality of paths in accordance with one or more end to end control adjustments including at least one of a server selection adjustment, an internet service provider (ISP) selector, or an overlay routing adjustment.
摘要:
A method and system for obtaining and storing accurate skills data relative to human resource objects of an enterprise. Relevant data is extracted from runtime processes that monitor the activities of the human resource objects and a metric value indicative of a skill level attained for each of a list of skills is calculated for each human resource object.
摘要:
A method and system for obtaining and storing accurate skills data relative to human resource objects of an enterprise. Relevant data is extracted from runtime processes that monitor the activities of the human resource objects and a metric value indicative of a skill level attained for each of a list of skills is calculated for each human resource object.
摘要:
A method is provided. The method includes the steps of: generating a model of an information technology process, wherein the process comprises a plurality of process steps and wherein the model identifies resources associated with the process; identifying dependencies on the resources for at least one process step or the plurality of process steps; perturbing the model; assessing an impact of the perturbation on the model; and reducing the impact of the perturbation on the model by utilizing at least one remedial action.
摘要:
Systems and methods are disclosed for differentiated handling of VoIP call control messages according to their importance and functionality, thus providing to VoIP infrastructures a level of robust call control similar to that in PSTN networks. SIP messages are classified by their type or content, and resources of a VoIP call control server are allocated to the SIP messages according to a policy. The scheme also provides overload protection and prioritized handling of certain kinds of requests in VoIP call control servers.
摘要:
A method is provided. The method includes the steps of: generating a model of an information technology process, wherein the process comprises a plurality of process steps and wherein the model identifies resources associated with the process; identifying dependencies on the resources for at least one process step of the plurality of process steps; perturbing the model; assessing an impact of the perturbation on the model; and reducing the impact of the perturbation on the model by utilizing at least one remedial action.
摘要:
A method and system for generating a graph-based model of an IT system that experiences certain undesirable events. The graphical representation of the IT system and its events is used to resolve other undesirable events occurring on the same system or a similar system and is also used to manage changes within the IT system.