摘要:
Systems, methods, and non-transitory computer-readable storage media for creating dynamic session maps. The method is discussed in terms of a system implementing the method. The system generates a dynamic session map token for a packet in a communication session, wherein the dynamic session map token instructs a node to send a copy of the packet to a specified destination. The dynamic session map token includes a unique dynamic session map identifier, a port number, and an IP address associated with the specified destination. Next, the system adds the dynamic session map token to the packet to yield a tracing packet. The dynamic session map token can be incorporated into the header portion of the packet, for example. Finally, the system transmits the tracing packet to the node. In one embodiment, the system also sends the copy of the packet to the specified destination.
摘要:
Systems, methods, and non-transitory computer-readable storage media for verifying service contracts by measuring rates of out-of-contract traffic. The method is discussed in terms of a system implementing the method. The system determines, based on packet markings, a number of network packets that are classified as out-of-contract by a network device, wherein the packet markings indicate a classification associated with respective network packets. The packet markings can be Differentiated Services Code Point markings Moreover, the classification associated with respective network packets can include a class of service and at least one of an in-contract status and an out-of-contract status. Next, the system measures network packets sent to the network device. Finally, the system determines how the network device is configured to classify incoming packets based on the number of network packets that are classified as out-of-contract by the network device and the network packets sent to the network device.
摘要:
A technique is disclosed that enables telecommunications endpoints to conveniently share the addressing information—that is, the Uniform Resource Identifiers (URI)—of documents that are available on the World Wide Web. In particular, a server is used to provide a bookmark service. The server acts as a repository of tag-URI pairs, in which each tag functions as a shorthand label for the corresponding URI. In the disclosed technique, a first user creates the tag for the intended URI by assigning a keyword to represent the URI as part of a bookmark tag-URI pair that the server stores. The created tag is presumably shorter than the URI that it represents, making the tag more convenient to use. A second user is then able to retrieve and use the URI by specifying the tag to the bookmark server. In essence, the technique of the illustrative embodiment enables the sharing of Web documents by sharing the bookmarks to those documents.
摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for implementing real-time transport control protocol to obtain an end-to-end encryption and security status of a communication session. The system collects real-time transport control protocol messages associated with a communication session, wherein the real-time transport control protocol messages are generated by devices in the communication session, and wherein the real-time transport control protocol messages include security information associated with the communication session. Then, based on the real-time transport control protocol messages, the system determines a security status associated with the communication session. The system can also generate an indication of the security status associated with the communication session. Further, the system can generate an indication of the security status of a communication session on a per participant basis.
摘要:
Disclosed herein are systems, methods, and computer-readable storage media for managing a packet network to deal with rogue applications that produce non-audio packets marked as audio packets. The system analyzes packet flow through the network to identify an unauthorized source of non-audio packets marked as audio packets, and upon identifying the unauthorized source, the system stops subsequent unauthorized transmission of non-audio packets marked as audio packets from the identified unauthorized source. For example, such an unauthorized source is identified by finding that an audio marked packet has a source address that is not found on a list of authorized sources, or by detecting atypical patterns of audio queue utilization, or by determining whether audio marked packets from a source exceed a threshold value related to transmission of audio marked packets.
摘要:
A packet analyzer(s) gets multiple packets, typically of a communication between communication devices. The multiple packets use the same protocol and contain one or more protocol headers with individual field(s) that contain data. The packets are organized into an array of packets. Each packet is a row in the array of packets. Each column in the array is comprised of the same field in each packet in the array of packets. The data in the fields in the column are then compressed into a compression packet.
摘要:
Performance problems or other conditions are analyzed in a system comprising a plurality of endpoint devices and an associated centralized or distributed controller. End-to-end measurements are obtained for respective paths through the network, for example, using communications between the endpoint devices. For a given end-to-end measurement obtained for a particular one of the paths, a value of a performance indicator for the path is determined and the performance indicator value is assigned to each of a plurality of links of the path. The determining and assigning operations are repeated for additional ones of the end-to-end measurements, the links are grouped into one or more exculpation or inculpation sets based on how many times a particular performance indicator value has been assigned to each of the links, and the one or more sets are utilized to determine, for example, the location of a performance problem in the network.
摘要:
A method is disclosed for adaptively and intelligently partitioning traffic among a plurality of communications channels, without injecting probe traffic into any of the channels. In accordance with the illustrative embodiment, a source node transmits traffic to a receiving node via K communications channels in accordance with partition coefficients α1, . . . , αK, and the source node receives information regarding the quality of service (QoS) provided by each of the communications channels. The source node adjusts the values of the partition coefficients α1, . . . , αK adaptively based on: the current channel QoS information, prior channel QoS information, the prior values of α1, . . . , αK, and a measure of channel independence for one or more pairs of communications channels.
摘要:
A technique for ensuring that a node that carries high-priority protocol data units and low-priority protocol data units is properly configured to accord the high-level protocol data units priority treatment is described. In accordance with the illustrative embodiment, two streams of protocol data units are transmitted through a node to be tested. One stream comprises high-priority protocol data units, and the second stream comprises low-priority protocol data units. The processing capabilities of the node are then burdened by increasing the frequency of protocol data units transmitted to it, so that the node is compelled to treat the two streams differently, if, in fact, it is properly configured to treat them differently. If the node treats the two streams differently and accords the high-priority stream higher priority, then the node is properly configured. Otherwise, the node is re-configured to accord the high-priority stream higher priority.
摘要:
Node merging methods and apparatus are disclosed for generating simplified representations of network topology. A first topology representative of a given network is determined, and at least one pair of nodes of the first topology is merged into a single node based on measures associated with respective edges connecting the nodes of the node pair to at least one neighbor node common to that pair. The merging step is repeated for one or more additional pairs of nodes to produce a reduced network topology meeting one or more desired criteria, and a visualization or other representation of the reduced network topology is generated.