Predicting and mitigating memory leakage in a computer system

    公开(公告)号:US11874731B2

    公开(公告)日:2024-01-16

    申请号:US17513663

    申请日:2021-10-28

    Abstract: The system determines a first and a second snapshot of memory usage by processes in a computing system based on a predetermined time interval, wherein a respective snapshot indicates, for a respective process, memory usage corresponding to memory types including private memory and shared memory. The system computes, for processes common to the first and the second snapshots, a likelihood of memory leak for a process and memory type based on: an increase in an amount of heap memory and private memory; an increase in an amount of shared memory; and an increase in a total amount of private and shared memory. The system compares the computed likelihood for the process with a predetermined threshold. Responsive to determining that the computed likelihood for the process exceeds the predetermined threshold, the system performs a corrective action to address memory leak associated with the process.

    Detecting spikes in memory usage in a computer system

    公开(公告)号:US11768747B2

    公开(公告)日:2023-09-26

    申请号:US17517494

    申请日:2021-11-02

    CPC classification number: G06F11/3037 G06F11/327 G06F11/3433

    Abstract: The system determines data which indicate memory usage by a process and information related to a number of instances of the process. The system determines for the process: a first average amount of memory; a first standard deviation; a first value indicating a difference between a current amount of memory used by the process and the first average amount; a second average number of process instances; a second standard deviation; and a second value indicating a difference between a current number of process instances and the second average number. The system performs a corrective action to address a memory spike associated with the process responsive to comparing at least one of: the current amount of memory used by the process with a watermark; the first value with the first standard deviation scaled; the current number of instances with a watermark; and the second value with the second standard deviation scaled.

    PREDICTING AND MITIGATING MEMORY LEAKAGE IN A COMPUTER SYSTEM

    公开(公告)号:US20230134485A1

    公开(公告)日:2023-05-04

    申请号:US17513663

    申请日:2021-10-28

    Abstract: The system determines a first and a second snapshot of memory usage by processes in a computing system based on a predetermined time interval, wherein a respective snapshot indicates, for a respective process, memory usage corresponding to memory types including private memory and shared memory. The system computes, for processes common to the first and the second snapshots, a likelihood of memory leak for a process and memory type based on: an increase in an amount of heap memory and private memory; an increase in an amount of shared memory; and an increase in a total amount of private and shared memory. The system compares the computed likelihood for the process with a predetermined threshold. Responsive to determining that the computed likelihood for the process exceeds the predetermined threshold, the system performs a corrective action to address memory leak associated with the process.

    IDENTIFYING SOURCE OF LAYER-2 LOOP IN RING NETWORK

    公开(公告)号:US20240146574A1

    公开(公告)日:2024-05-02

    申请号:US17974359

    申请日:2022-10-26

    CPC classification number: H04L12/423 H04L12/4641 H04L43/106

    Abstract: A system for identifying the source of a loop in a ring network is provided. During operation, the system receives a first message, which indicates the presence of a looped packet, from a network device of the ring network. The system receives a second message from a respective network device with an uplink to an external network. The second message can include traffic information associated with the uplink. Upon determining based on the first message that a local link intended to be disabled is active, the system determines that a loop is present in the ring network. Upon determining that a plurality of uplinks are active based on the second message, the system determines that a loop is present in the uplinks. If a loop is not present in the ring network or in the uplinks, the system determines that a loop is present in the external network.

    SYSTEM AND METHOD FOR MONITORING INGRESS/EGRESS PACKETS AT A NETWORK DEVICE

    公开(公告)号:US20220006712A1

    公开(公告)日:2022-01-06

    申请号:US16918870

    申请日:2020-07-01

    Abstract: One embodiment can provide a method and system for monitoring network traffic. During operation, the system may receive a request to monitor packets ingressing or egressing a device. The request can indicate a set of parameters for monitoring the packets. In response to receiving the request, the system may configure a network switch coupled to the device to replicate the packets ingressing or egressing the device. The system can then encapsulate the replicated packets, based on the set of parameters, with a destination address associated with the request, thereby allowing the packets to be analyzed remotely.

    METHOD TO STABILIZE A RING DURING LINK FLAPPING

    公开(公告)号:US20240348492A1

    公开(公告)日:2024-10-17

    申请号:US18133320

    申请日:2023-04-11

    CPC classification number: H04L41/0654 H04L12/4654 H04L43/0811

    Abstract: A system monitors metrics relating to link flapping associated with a physical link in a ring network. Network management traffic is transported via a first VLAN and customer data traffic is transported via a second VLAN. The system maintains a signal fail state for the ring network based on the monitored metrics. If a first condition associated with the first VLAN is detected, the system disallows customer data traffic on the second VLAN. If a second condition associated with the monitored metrics is detected, the system disallows network management traffic on the first VLAN and disallows customer data traffic on the second VLAN, resulting in the signal fail state. If the second condition is no longer met, the system allows network management traffic on the first VLAN. If the first condition is no longer met, the system allows customer data traffic on the second VLAN, resulting in the idle state.

    System and method for monitoring ingress/egress packets at a network device

    公开(公告)号:US11252064B2

    公开(公告)日:2022-02-15

    申请号:US16918870

    申请日:2020-07-01

    Abstract: One embodiment can provide a method and system for monitoring network traffic. During operation, the system may receive a request to monitor packets ingressing or egressing a device. The request can indicate a set of parameters for monitoring the packets. In response to receiving the request, the system may configure a network switch coupled to the device to replicate the packets ingressing or egressing the device. The system can then encapsulate the replicated packets, based on the set of parameters, with a destination address associated with the request, thereby allowing the packets to be analyzed remotely.

    DETECTING SPIKES IN MEMORY USAGE IN A COMPUTER SYSTEM

    公开(公告)号:US20230133975A1

    公开(公告)日:2023-05-04

    申请号:US17517494

    申请日:2021-11-02

    Abstract: The system determines data which indicate memory usage by a process and information related to a number of instances of the process. The system determines for the process: a first average amount of memory; a first standard deviation; a first value indicating a difference between a current amount of memory used by the process and the first average amount; a second average number of process instances; a second standard deviation; and a second value indicating a difference between a current number of process instances and the second average number. The system performs a corrective action to address a memory spike associated with the process responsive to comparing at least one of: the current amount of memory used by the process with a watermark; the first value with the first standard deviation scaled; the current number of instances with a watermark; and the second value with the second standard deviation scaled.

Patent Agency Ranking