Abstract:
In one embodiment, techniques are shown and described relating to traffic-based inference of influence domains in a network by using learning machines. In particular, in one embodiment, a management device computes a time-based traffic matrix indicating traffic between pairs of transmitter and receiver nodes in a computer network, and also determines a time-based quality parameter for a particular node in the computer network. By correlating the time-based traffic matrix and time-based quality parameter for the particular node, the device may then determine an influence of particular traffic of the traffic matrix on the particular node.
Abstract:
In one embodiment, a state tracking engine (STE) defines one or more classes of elements that can be tracked in a network. A set of elements to track is determined from the one or more classes, and the set of elements is tracked in the network. Access to the tracked set of elements then provided via one or more corresponding application programming interfaces (APIs). In another embodiment, a metric computation engine (MCE) defines one or more network metrics to be tracked in the network. One or more tracked elements are received from the STE. The one or more network metrics are tracked in the network based on the received one or more tracked elements. Access to the tracked network metrics is then provided via one or more corresponding APIs.
Abstract:
In one embodiment, nodes are polled in a network for Quality of Service (QoS) measurements, and a QoS anomaly that affects a plurality of potentially faulty nodes is detected based on the QoS measurements. A path, which traverses the plurality of potentially faulty nodes, is then computed from a first endpoint to a second endpoint. Also, a median node that is located at a point along the path between the first endpoint and the second endpoint is computed. Time-stamped packets are received from the median node, and the first endpoint and the second endpoint of the path are updated based on the received time-stamped packets, such that an amount of potentially faulty nodes is reduced. Then, the faulty node is identified from a reduced amount of potentially faulty nodes.
Abstract:
Described herein are devices, systems, methods, and processes for managing roaming actions in a wireless network. The embodiments utilize a machine learning model to generate roaming recommendations based on a plurality of roaming-related metrics. The metrics include data about the current network conditions, the station's previous roaming experiences, and the capabilities of potential roaming target candidates. The roaming recommendations can be provided to a station by an access point (AP). The station can then attempt to perform a roaming action based on the recommendations. After the attempt, the station transmits a roaming feedback to the AP, which includes data about the success or failure of the roaming action and any additional relevant data. In case the station rejects the roaming recommendations, the station may also provide a feedback indicating the rejection. The feedback is utilized to update the machine learning model, thereby improving the accuracy of future roaming recommendations.
Abstract:
The technology provides for providing an interactive user interface to explore a complete network, see relationships with various aspects of the network, and drill down to details in an instinctive manner. In some embodiments, network component data is received that identifies metrics associated with network components. A graphical user interface made up of representations of network components of a network is presented, where the network components are selectable. Relevant network components are displayed at varying network scales by receiving an input selecting a first representation of a first network component at a first network level. Based on a network component relationship between the first representation of the first network component and a second relationship of a second network component, second network component data is received that identifies one or more metrics associated with the second network component. The second network component is at a second network level. The one or more metrics associated with the second network component are presented within a context of the second network level.
Abstract:
In one embodiment, a device in a network receives anomaly data regarding an anomaly detected by a machine learning-based anomaly detection mechanism of a first node in the network. The device matches the anomaly data to threat intelligence feed data from one or more threat intelligence services. The device determines whether to provide threat intelligence feedback to the first node based on the matched threat intelligence feed data and one or more policy rules. The device provides threat intelligence feedback to the first node regarding the matched threat intelligence feed data, in response to determining that the device should provide threat intelligence feedback to the first node.
Abstract:
In one embodiment, a device in a network performs anomaly detection functions using a machine learning-based anomaly detector to detect anomalous traffic in the network. The device identifies an ability of one or more nodes in the network to perform at least one of the anomaly detection functions. The device selects a particular one of the anomaly detection functions to offload to a particular one of the nodes, based on the ability of the particular node to perform the particular anomaly detection function. The device instructs the particular node to perform the selected anomaly detection function.
Abstract:
In one embodiment, a primary networking device in a branch network receives a notification of an anomaly detected by a secondary networking device in the branch network. The primary networking device is located at an edge of the network. The primary networking device aggregates the anomaly detected by the secondary networking device and a second anomaly detected in the network into an aggregated anomaly. The primary networking device associates the aggregated anomaly with a location of the secondary networking device in the branch network. The primary networking device reports the aggregated anomaly and the associated location of the secondary networking device to a supervisory device.
Abstract:
In one embodiment, a device in a network receives data indicative of traffic characteristics of traffic associated with a particular application. The device identifies one or more paths in the network via which the traffic associated with the particular application was sent, based on the traffic characteristics. The device determines a probing schedule based on the traffic characteristics. The probing schedule simulates the traffic associated with the particular application. The device sends probes along the one or more identified paths according to the determined probing schedule.
Abstract:
In one embodiment, a predictive model is constructed by mapping multiple network characteristics to multiple network performance metrics. Then, a network performance metric pertaining to a node in a network is predicted based on the constructed predictive model and one or more network characteristics relevant to the node. Also, a local parameter of the node is optimized based on the predicted network performance metric.