Abstract:
Example methods disclosed herein to prioritize anomalies in a communication network include classifying respective nodes in the communication network as normal, abnormal or indeterminate based on measurements received for the nodes. Disclosed example methods also include selecting a subset of the nodes classified as abnormal to be root cause abnormal nodes representing sources of the anomalies in the communication network, respective ones of the root cause abnormal nodes being abnormal nodes identified in the communication network and determined to have respective sets of direct descendent nodes having majorities of nodes classified as abnormal or indeterminate. Disclosed example methods further include combining respective anomaly sizes and anomaly scopes determined for the respective ones of root cause abnormal nodes based on the measurements to determine respective rankings for the root cause abnormal nodes, and outputting the respective rankings to prioritize the set of root cause abnormal nodes.
Abstract:
A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.
Abstract:
A user is provided an interface for selecting network connectivity features for designing a virtual private cloud computing network. Each network connectivity feature has an attribute for connecting tangible storage elements and tangible computing elements in the virtual private cloud computing network. Each network connectivity feature is translatable into a network element configuration statement that instantiates an action particular to the network connectivity feature. Usage rules are defined specifying how the network connectivity features can be used. Selected network connectivity features are accepted from the user. The virtual private cloud computing network is configured in accordance with the selected network connectivity features using the tangible storage elements and tangible computing elements in the virtual private cloud computing network. The virtual private cloud computing network is implemented in accordance with the selected network connectivity features using the tangible storage elements and tangible computing elements in the virtual private cloud computing network.
Abstract:
Example methods disclosed herein to localize anomalies in a communication network include identifying a first set of abnormal nodes in the communication network, and including respective ones of the first set of abnormal nodes having a number of normal direct descendent nodes that is less than a combined number of abnormal direct descendent nodes and indeterminate direct descendent nodes in a set of candidate nodes. Such disclosed example methods also include iteratively selecting ones of the set of candidate nodes to include in a set of root cause abnormal nodes representing sources of the anomalies in the communication network. In such disclosed example methods, the ones of the set of candidate nodes are selected based on sizes of respective subsets of the abnormal nodes from the first set of abnormal nodes covered by the candidate nodes.
Abstract:
Example methods disclosed herein to localize anomalies in a communication network include identifying a first set of abnormal nodes in the communication network, and including respective ones of the first set of abnormal nodes having a number of normal direct descendent nodes that is less than a combined number of abnormal direct descendent nodes and indeterminate direct descendent nodes in a set of candidate nodes. Such disclosed example methods also include iteratively selecting ones of the set of candidate nodes to include in a set of root cause abnormal nodes representing sources of the anomalies in the communication network. In such disclosed example methods, the ones of the set of candidate nodes are selected based on sizes of respective subsets of the abnormal nodes from the first set of abnormal nodes covered by the candidate nodes.
Abstract:
Example methods disclosed herein to prioritize anomalies in a communication network include classifying respective nodes in the communication network as normal, abnormal or indeterminate based on measurements received for the nodes. Disclosed example methods also include selecting a subset of the nodes classified as abnormal to be root cause abnormal nodes representing sources of the anomalies in the communication network, respective ones of the root cause abnormal nodes being abnormal nodes identified in the communication network and determined to have respective sets of direct descendent nodes having majorities of nodes classified as abnormal or indeterminate. Disclosed example methods further include combining respective anomaly sizes and anomaly scopes determined for the respective ones of root cause abnormal nodes based on the measurements to determine respective rankings for the root cause abnormal nodes, and outputting the respective rankings to prioritize the set of root cause abnormal nodes.
Abstract:
A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.
Abstract:
A user is provided an interface for selecting network connectivity features for designing a virtual private cloud computing network. Each network connectivity feature has an attribute for connecting tangible storage elements and tangible computing elements in the virtual private cloud computing network. Each network connectivity feature is translatable into a network element configuration statement that instantiates an action particular to the network connectivity feature. Usage rules are defined specifying how the network connectivity features can be used. Selected network connectivity features are accepted from the user. The virtual private cloud computing network is configured in accordance with the selected network connectivity features using the tangible storage elements and tangible computing elements in the virtual private cloud computing network. The virtual private cloud computing network is implemented in accordance with the selected network connectivity features using the tangible storage elements and tangible computing elements in the virtual private cloud computing network.
Abstract:
A cloud computing network is implemented by defining a plurality of network connectivity features for designing a virtual private cloud computing network within the cloud computing network. Each network connectivity feature has user-definable attributes and each network connectivity feature is translatable into a set of network element configuration statements that instantiate an action particular to the network connectivity feature. Usage rules specifying how the features can be used are defined for the cloud computing network. Selected features from the plurality of network connectivity features are accepted and assembled into a template for configuring the virtual private cloud computing network. The template for configuring the virtual private cloud computing network is validated against the usage rules. The virtual private cloud computing network is implemented in accordance with the validated template for configuring the virtual private cloud computing network.