Abstract:
Method and apparatus for evaluating the quality of a packet-switched voice connection. The apparatus includes measurement circuitry coupled to receive a voice signal. The measurement circuitry measures rate of packet loss and at least one other objective characteristic of the voice signal. The rate of packet loss and the at least one other objective characteristic are related to a plurality of quality characteristics affecting the quality of the voice signal as perceived by users, such that measurements of the rate of packet loss and the at least one other objective characteristic can be translated into subjective quantifications of each of the quality characteristics. A database stores an effects matrix. The effects matrix provides quality information for voice signals that include different combinations of subjective quantifications for each quality characteristic. Software operating on the apparatus utilizes measurements of the rate of packet loss and the at least one other objective characteristic and the effects matrix to generate quality information for the voice signal.
Abstract:
Systems, methods, and computer-readable media for identifying bogon addresses. A system can obtain an indication of address spaces in a network. The indication can be based on route advertisements transmitted by routers associated with the network. The system can receive a report generated by a capturing agent deployed on a host. The report can identify a flow captured by the capturing agent at the host. The system can identify a network address associated with the flow and, based on the indication of address spaces, the system can determine whether the network address is within the address spaces in the network. When the network address is not within the address spaces in the network, the system can determine that the network address is a bogon address. When the network address is within the address spaces in the network, the system can determine that the network address is not a bogon address.
Abstract:
A computer implemented method includes encoding a packet in a source endpoint of a multi-path communication network, the packet having a hash seed for use by routers to route the packet through the multi-path communication network to a destination endpoint. Network performance is tracked for the packet at the source endpoint. The hash seed is modified as a function of the network performance. The packet is re-sent such that the modified hash seed is used to route the packet to the destination endpoint.
Abstract:
A method includes obtaining Wi-Fi channel state information (CSI) parameters measured at an anchor and a target device from Wi-Fi frames transmitted between the anchor and the target device, the CSI parameters comprising, for each of the anchor and the target device, frame transmission and reception times, a carrier phase of the CSI, a crystal offset factor, and a packet detection time error. The method also includes determining a round trip time (RTT) estimate or a relative change in the RTT estimate as a function of the CSI parameters. The method further includes estimating a range between the anchor and the target device as a function of the RTT estimate, or estimating a change in the range between the anchor and the target device as a function of the relative change in the RTT estimate.
Abstract:
An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
Abstract:
Provided are a screen casting data transmission method and apparatus, an electronic device and a storage medium. The screen casting data transmission method includes: receiving feedback information which is sent by a target data reception terminal according to received screen casting data, and determining a data round-trip time of the screen casting data according to information content of a preset data transmission field in transmission control protocol (TCP) header information in the feedback information; estimating a network bandwidth according to a value change of the data round-trip time, and determining an adjustment strategy for a screen casting data encoding parameter based on a network bandwidth estimation result and a current data sending bandwidth; and adjusting the screen casting data encoding parameter, encoding to-be-sent screen casting data according to the adjusted encoding parameter, and performing transmission.
Abstract:
Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.
Abstract:
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.
Abstract:
An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an attack. The pattern can be associated with various components of a network and can describe expected behavior of these various components. A system performing this method can then choose a nodes or nodes to generate traffic according to the pattern and send an instruction accordingly. After this synthetic traffic is generated, the system can compare the behavior of the components with the expected behavior. An alert can then be created to notify an administrator or otherwise remedy any problems.
Abstract:
This disclosure describes techniques for providing information associated with an inter-cluster segment. For instance, system(s) may determine dependencies for first services associated with a first cluster and second dependencies for second services associated with a second cluster. The system(s) may then determine information for interconnections between the first cluster and the second cluster. The information may include at least dependencies for third services included in the inter-cluster segment and/or performance information for the third services. The system(s) may then generate a user interface that includes the first dependencies for the first services, the second dependencies for the second services, and the information for the inter-cluster segment. This way, a user is able to use the user interface to identify both problems occurring within the clusters and/or problems that are caused by the third services in the inter-cluster segment.