DETECTING WIRED CLIENT STUCK
    42.
    发明公开

    公开(公告)号:US20240223434A1

    公开(公告)日:2024-07-04

    申请号:US18148232

    申请日:2022-12-29

    CPC classification number: H04L41/0604 H04L41/142 H04L41/16

    Abstract: Techniques are described for detecting that a client device physically connected to a network device is “stuck,” that is, the client device is not sending or receiving network packets with the network device. A network management system (NMS) receives current network statistics of ports of network devices with respect to client devices physically connected to the ports. The NMS identifies a candidate client device connected to a particular port of a particular network device for which the current network statistics indicate an issue. The NMS detects anomalous behavior of the candidate client device based on one or more features of the current network statistics, historical baseline statistics associated with the candidate client device, and peer statistics associated with one or more peer client devices of a same device type as the candidate client device. The NMS outputs a notification of the anomalous behavior.

    THIRD-PARTY SERVICE AND APPLICATION DATA FOR QUALITY OF SERVICE

    公开(公告)号:US20240220389A1

    公开(公告)日:2024-07-04

    申请号:US18148938

    申请日:2022-12-30

    CPC classification number: G06F11/3466 G06F9/54 G06F11/079 H04L67/53

    Abstract: Techniques are disclosed for a network management system (NMS) that performs quality of service (QOS) monitoring and troubleshooting of user experience issues occurring outside of a network managed by the NMS using data obtained from third-party sources. For example, an NMS obtains third-party data of a third-party application server or third-party service provider server from a third-party monitoring vendor. The NMS identifies a user experience issue indicated by the third-party data and stitches the third-party data to network data received from network devices. The NMS determines a root cause or a remedial action of the user experience issue based at least on the network data received from the one or more network devices. The NMS generates a notification for presentation to an administrator device which identifies the root cause or the remedial action of the user experience issue.

    Automatically troubleshooting and remediating network issues via connected neighbors

    公开(公告)号:US12003363B2

    公开(公告)日:2024-06-04

    申请号:US17653608

    申请日:2022-03-04

    CPC classification number: H04L41/0627 H04L41/0631 H04L41/0654 H04L41/12

    Abstract: An example system includes network devices at a site; and a network management system (NMS) that is configured to: identify a first network device of the plurality of network devices with which a network connection has been lost; identify, based on a network topology graph generated from the network data, one or more neighbor network devices of the plurality of network devices that are connected to the first network device; perform root cause analysis of the lost connection with the first network device based on the network data to identify a root cause of the lost connection; and send, to a neighbor network device selected from the one or more neighbor network devices and based on the identified root cause, instructions for the first network device to perform an action to remediate the lost connection, wherein the neighbor network device communicates the instructions to the first network device.

    ADAPTABLE SOFTWARE DEFINED WIDE AREA NETWORK APPLICATION-SPECIFIC PROBING

    公开(公告)号:US20240073117A1

    公开(公告)日:2024-02-29

    申请号:US18501190

    申请日:2023-11-03

    CPC classification number: H04L43/12 H04L43/026 H04L43/028

    Abstract: Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.

    Detecting VLAN misconfiguration
    47.
    发明授权

    公开(公告)号:US11902051B2

    公开(公告)日:2024-02-13

    申请号:US17808226

    申请日:2022-06-22

    Inventor: Jisheng Wang

    CPC classification number: H04L12/4641 G06N20/00 H04L12/4633 H04L49/354

    Abstract: Disclosed are methods for detecting misconfigured VLANs. In some embodiments, traffic on a VLAN across multiple access points is categorized. Traffic on the VLAN at a single access point is then also categorized. The categorization of the VLAN traffic at the single access point can be in response to, for example, communication errors or other conditions. The two categorizations are then compared to determine if the VLAN traffic at the AP is consistent with the VLAN traffic across a network (e.g., an enterprise network). If the VLAN traffic at the AP is generally consistent with that across the network, this may indicate that a downstream network component, such as a switch or router, is misconfigured. Thus, some embodiments programmatically reconfigure the downstream component to forward traffic for the VLAN.

    LOG ANALYSIS IN VECTOR SPACE
    48.
    发明公开

    公开(公告)号:US20240012707A1

    公开(公告)日:2024-01-11

    申请号:US18472806

    申请日:2023-09-22

    CPC classification number: H04L41/0654 H04L41/0604 H04L41/16

    Abstract: The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file. In some example embodiments, messages from the system log file are used as input to generate vectors within a vector space. Portions of the log messages may generate vectors that cluster into a region in the vector space. The region of vector space is associated with one or more remedial actions. The disclosed embodiments are configured, in some example embodiments, to perform the one or more remedial actions when activity in the log file maps to the region of vector space associated with the one or more remedial actions. In some example embodiments, a remedial action can include submitting a problem report to a problem tracking database.

    NETWORK MANAGEMENT ACTIONS BASED ON ACCESS POINT CLASSIFICATION

    公开(公告)号:US20230396485A1

    公开(公告)日:2023-12-07

    申请号:US18453872

    申请日:2023-08-22

    CPC classification number: H04L41/0631 H04W88/08

    Abstract: An example system includes access point (AP) devices configured to provide a wireless network at a site; and a network management system that stores network data received from the AP devices, the network data collected by the AP devices or client devices associated with the wireless network, and one or more processors configured to: receive a time series of SLE metrics based on the network data, determine, based on the time series, whether a network event has occurred, in response to a determination that a network event has occurred, determine a root cause for the network event, and in response to a determination that the root cause of the network event is associated with an AP device, determine a classification of the AP device, and determine a network management action for the AP device based on the network event and the classification of the AP device.

    DETECTING NETWORK EVENTS HAVING ADVERSE USER IMPACT

    公开(公告)号:US20230308374A1

    公开(公告)日:2023-09-28

    申请号:US17812676

    申请日:2022-07-14

    CPC classification number: H04L43/0876 H04L41/0631 H04L45/48 H04L43/062

    Abstract: A method includes receiving, by a network management system, network data from a plurality of network devices configured to provide a network at a site; receiving, by the processing circuitry, user impact data from a plurality of client devices that access the network at the site; determining, based on the network data, a pattern of one or more network events occurring over time; correlating in time the pattern of the one or more network events to an adverse user impact event indicated by the user impact data received from the plurality of client devices; and determining, in response to the correlating, an instance of overwhelming network traffic having an adverse user impact. In some examples, the network data includes network traffic impact data, such as a number of packets dropped at a switch port due to congestion.

Patent Agency Ranking