Application identification and path selection at a wireless access point for local network traffic breakout

    公开(公告)号:US11606719B2

    公开(公告)日:2023-03-14

    申请号:US17031802

    申请日:2020-09-24

    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.

    Memory leak detection using real-time memory growth pattern analysis

    公开(公告)号:US11960382B2

    公开(公告)日:2024-04-16

    申请号:US18056834

    申请日:2022-11-18

    Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.

    MEMORY LEAK DETECTION USING REAL-TIME MEMORY GROWTH PATTERN ANALYSIS

    公开(公告)号:US20230086373A1

    公开(公告)日:2023-03-23

    申请号:US18056834

    申请日:2022-11-18

    Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.

    Application identification and path selection at a wireless access point for local network traffic breakout

    公开(公告)号:US11463914B2

    公开(公告)日:2022-10-04

    申请号:US17031802

    申请日:2020-09-24

    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.

    MEMORY LEAK DETECTION USING REAL-TIME MEMORY GROWTH PATTERN ANALYSIS

    公开(公告)号:US20210397536A1

    公开(公告)日:2021-12-23

    申请号:US17247903

    申请日:2020-12-29

    Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.

    APPLICATION IDENTIFICATION AND PATH SELECTION AT A WIRELESS ACCESS POINT FOR LOCAL NETWORK TRAFFIC BREAKOUT

    公开(公告)号:US20220400408A1

    公开(公告)日:2022-12-15

    申请号:US17821904

    申请日:2022-08-24

    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.

    Memory leak detection using real-time memory growth pattern analysis

    公开(公告)号:US11526426B2

    公开(公告)日:2022-12-13

    申请号:US17247903

    申请日:2020-12-29

    Abstract: The disclosure describes techniques that enable detection of memory leaks of software executing on devices within a computer network. An example network device includes memory and processing circuitry. The processing circuitry monitors a usage of the memory by a software component operating within the network device. The processing circuitry periodically determines a memory growth pattern score for the software component based on the usage of the memory. The processing circuitry also predicts whether the user-level process is experiencing a memory leak based on the memory growth pattern score. The processing circuitry applies confirmation criteria to current memory usage of the software component to confirm that the software component is experiencing the memory leak. When the software component is experiencing the memory leak, the processing circuitry generates an alert.

    APPLICATION IDENTIFICATION AND PATH SELECTION AT A WIRELESS ACCESS POINT FOR LOCAL NETWORK TRAFFIC BREAKOUT

    公开(公告)号:US20220095165A1

    公开(公告)日:2022-03-24

    申请号:US17031802

    申请日:2020-09-24

    Abstract: A wireless access point comprises a memory; and one or more processors operably coupled to the memory configured to: receive a first packet for an application; configure an initial packet flow for the application including a first forwarding action to send traffic for the application via a tunnel path; learn the application of the first packet; generate, based on a policy of the application, an entry in an application server address cache specifying an address of the application server and a second forwarding action to send traffic for the application via a local breakout path; receive a second packet for the application; and configure, in response to determining that a destination address of the second packet matches the entry in the application server address cache, a subsequent packet flow for the application including the second forwarding action to send traffic for the application via the local breakout path.

Patent Agency Ranking