摘要:
A method for generating network traffic includes receiving packet header information and an optional packet payload. The received packet header information is arranged in accordance with a predetermined format. A packet of data including the packet payload and a packet header is formatted in accordance with the arranged header information. The predetermined format specifies a particular order in which packet headers are to be arranged.
摘要:
Systems and methods are provided for detecting malicious behavior in mobile ad-hoc wireless networks. The mobile ad-hoc network contains a plurality of actual nodes and a plurality of decoys that are derived from the actual nodes using duplicate instances of the operational software of the actual nodes in combination with a virtual interconnection topology created to make the decoys appear as actual nodes within the mobile ad-hoc network. The interconnection topology includes routing characteristics indicating that the most efficient path of communication to any given decoy is through at least one actual node in the network. The decoys are used to identify malicious behavior in the network and in particular to identify attempt to communicate directly with decoys in contradiction to the created interconnection topology. When the malicious behavior is associated with an identifiable node, corrective action is taken that includes quarantining that node from the other nodes in the network.
摘要:
Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported.
摘要:
In one embodiment, the invention is a method and apparatus for distributed policy evaluation. One embodiment of a method for evaluating a systems management policy, where the policy includes a condition and an action to be taken when the condition evaluates to TRUE, includes forwarding the policy, by a first autonomic manager, to at least a second autonomic manager and receiving at least partial evaluation results for the policy from at least the second autonomic manager.
摘要:
A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure.
摘要:
There are provided a hardware accelerator and method for providing hardware acceleration for an application server and/or a layer 7 switch. The hardware accelerator includes a content access memory (CAM) configured to accelerate string comparison operations in the application server and/or layer 7 switch. The string comparison operations involve strings having varying key string positions.
摘要:
Disclosed is a technique for performing configuration checking of a network. A network data store is scanned for at least one transaction. At least one event is generated for said transaction. At least one configuration policy is associated with said event. Said configuration policy is compared with configuration data associated with said event. It is determined whether said configuration policy has been violated based on the comparison. Also disclosed is a technique for performing proactive configuration checking of a network. A hypothetical network scenario is received. At least one transaction is generated based on the hypothetical network scenario. A network data store is populated with configuration data for said transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated. Moreover, disclosed is a technique for performing reactive configuration checking of a network. A request to perform configuration checking on an existing network configuration is received. A network data store is scanned for at least one transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated. Furthermore, disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user.
摘要:
A method for estimating a response time by combining metrics from networking and application layers. This is achieved by placing correlation tags in data collected at these layers so that the data can later be identified as corresponding to a single web page download or a web session. Once data corresponding to a single web page download or a web session is identified, a splicing algorithm calculates client perceived response time by using analytical models of response time.