摘要:
A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.
摘要:
A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.
摘要:
Methods, apparatus and articles of manufacture for hierarchical anomaly localization and prioritization are disclosed. An example method disclosed herein comprises obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate, and determining a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node.
摘要:
Methods, apparatus and articles of manufacture for hierarchical anomaly localization and prioritization are disclosed. An example method disclosed herein comprises obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate, and determining a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node.
摘要:
A method of implementing a cloud computing network includes defining, for a cloud computing network including tangible network storage elements and tangible network computing elements, a library of network connectivity building blocks for designing a virtual private cloud computing network within the cloud computing network. Each building block has user-definable attributes and each building block is translatable into a set of network element configuration statements that instantiate an action particular to the building block. Usage rules specifying how the building blocks can be used are defined for the cloud computing network. Dynamically-selected building blocks from the library are accepted and assembled into a configuration template. The configuration template is validated against the usage rules. The virtual private cloud computing network is implemented in accordance with the validated configuration template.
摘要:
A computer-readable storage medium includes operational instructions, that when executed by a processor, cause the processor to receive network configuration data representing a network having a plurality of routers and to identify at least one of the plurality of routers as having a predicted oscillatory behavior based at least partially on the network configuration data.
摘要:
Methods and apparatus to analyze autonomous system (AS) peering policies are disclosed. A disclosed example method comprises obtaining routing information from two or more border routers of a first AS, wherein the routing information identifies two or more routes to a prefix associated with a second AS, and wherein the second AS is a peer of the first AS, identifying one of the two or more routes as an inferior route advertised by the second AS based on the routing information, and determining whether a routing impact is present within the first AS due to the advertised inferior route.
摘要:
An authoritative domain name system server includes a memory configured to store a set of instructions, and a processor configured to execute the set of instructions. The processor obtains a first Internet Protocol address of a client system associated with a request for a domain name, and assigns a location of the authoritative domain name system server as an ingress region. The processor assigns the egress override as an egress region when the first Internet Protocol address matches the prefix of the egress override, otherwise obtains an egress table, determines a longest prefix match of the first Internet Protocol address, obtains a distance matrix for distances from the ingress location to a plurality of egress regions, and selects the egress region based on the distance matrix and the longest prefix match in the egress table. The processor selects a content node based on the one egress region, and assigns a second Internet Protocol address for the content node to a local domain name system server associated with the client system.
摘要:
An authoritative domain name system server includes a memory configured to store a set of instructions, and a processor configured to execute the set of instructions. The processor obtains a first Internet Protocol address of a client system associated with a request for a domain name, and assigns a location of the authoritative domain name system server as an ingress region. The processor assigns the egress override as an egress region when the first Internet Protocol address matches the prefix of the egress override, otherwise obtains an egress table, determines a longest prefix match of the first Internet Protocol address, obtains a distance matrix for distances from the ingress location to a plurality of egress regions, and selects the egress region based on the distance matrix and the longest prefix match in the egress table. The processor selects a content node based on the one egress region, and assigns a second Internet Protocol address for the content node to a local domain name system server associated with the client system.
摘要:
Methods and apparatus to analyze autonomous system (AS) peering policies are disclosed. A disclosed example method comprises obtaining routing information from two or more border routers of a first AS, wherein the routing information identifies two or more routes to a prefix associated with a second AS, and wherein the second AS is a peer of the first AS, identifying one of the two or more routes as an inferior route advertised by the second AS based on the routing information, and determining whether a routing impact is present within the first AS due to the advertised inferior route.