Methods for analyzing and load balancing based on server health and devices thereof

Information

  • Patent Grant
  • 10505818
  • Patent Number
    10,505,818
  • Date Filed
    Wednesday, May 4, 2016
    8 years ago
  • Date Issued
    Tuesday, December 10, 2019
    4 years ago
Abstract
A method, non-transitory computer readable medium, and health analysis apparatus that monitors network traffic exchanged with a plurality of server devices in a server pool to obtain signal data regarding a plurality of signals associated with the network traffic. A determination is made when there is a sever health anomaly for one or more of the server devices based on an application of a server health prediction model to the signal data. The server health prediction model includes a plurality of predictive health targets each based at least in part on historical signal data for one or more of the signals and having an associated threshold value. A mitigation action is initiated when the determining indicates there is a sever health anomaly for one or more of the server devices.
Description
FIELD

This technology generally relates to computer networks and, more particular, to methods and devices for analyzing server health.


BACKGROUND

Server health is often analyzed based on thresholds established by network administrators corresponding to latency observed in network traffic. For example, network traffic exchanged between server devices and traffic management computing devices that are disposed between client devices and these server devices in a network. However, latency is not a robust or effective metric with respect to server health.


In particular, current methods for analyzing server health based on latency do not facilitate effective load balancing decisions or early recognition of impending server saturation or other server health problems. Additionally, the thresholds used by current server health analysis methods are static and may not accurately identify server health problems, particularly over an extended period of time.


SUMMARY

A method for analyzing server health includes monitoring, by a health analysis apparatus, network traffic exchanged with a plurality of server devices in a server pool to obtain signal data regarding a plurality of signals associated with the network traffic. A determination is made, by the health analysis apparatus, when there is a sever health anomaly for one or more of the server devices based on an application of a server health prediction model to the signal data. The server health prediction model includes a plurality of predictive health targets each based at least in part on historical signal data for one or more of the signals and having an associated threshold value. A mitigation action is initiated, by the health analysis apparatus, when the determining indicates there is a sever health anomaly for one or more of the server devices.


A health analysis apparatus includes memory comprising programmed instructions stored in the memory and one or more processors configured to be capable of executing the programmed instructions stored in the memory to monitor network traffic exchanged with a plurality of server devices in a server pool to obtain signal data regarding a plurality of signals associated with the network traffic. A determination is made when there is a sever health anomaly for one or more of the server devices based on an application of a server health prediction model to the signal data. The server health prediction model includes a plurality of predictive health targets each based at least in part on historical signal data for one or more of the signals and having an associated threshold value. A mitigation action is initiated when the determining indicates there is a sever health anomaly for one or more of the server devices.


A non-transitory computer readable medium having stored thereon instructions for analyzing server health traffic includes executable code which when executed by one or more processors, causes the one or more processors to perform steps including monitoring network traffic exchanged with a plurality of server devices in a server pool to obtain signal data regarding a plurality of signals associated with the network traffic. A determination is made when there is a sever health anomaly for one or more of the server devices based on an application of a server health prediction model to the signal data. The server health prediction model includes a plurality of predictive health targets each based at least in part on historical signal data for one or more of the signals and having an associated threshold value. A mitigation action is initiated when the determining indicates there is a sever health anomaly for one or more of the server devices.


This technology has a number of associated advantages including providing methods, non-transitory computer readable media, and health analysis apparatuses that more effectively analyze server health. This technology facilitates monitoring of server health based on observed network traffic signal data and the application of dynamically generated models to the signal data. The models generated by this technology consider historical server health anomalies and associated signal data and are more effective to predict future server health anomalies. Additionally, this technology advantageously leverages a more effective server health analysis to make load balancing decisions, thereby improving resource utilization, round trip times to client devices, and the associated end user experience.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of a network environment with an exemplary health analysis apparatus with a traffic management computing device and an analytic server computing device;



FIG. 2 is a block diagram of the exemplary traffic management computing device shown in FIG. 1;



FIG. 3 is a block diagram of the exemplary analytic server computing device shown in FIG. 2;



FIG. 4 is a flowchart of an exemplary method for analyzing server health; and



FIG. 5 is an exemplary connection lifetime timing diagram.





DETAILED DESCRIPTION

Referring to FIG. 1, a system diagram of an exemplary network environment 10 including an exemplary health analysis apparatus 12 with a traffic management computing device 14 and an analytic server computing device 16 is illustrated. In this example, the traffic management computing device 14 is coupled to client devices 18(1)-18(n) through communication network(s) 20, server devices 22(1)-22(m) through a local area network (LAN) 24, and the analytic server computing device 16 through a direct connection, although the traffic management computing device 12, client devices 18(1)-18(n), server devices 22(1)-22(m), and analytic server computing device 16 may be coupled together via other topologies. The network environment 10 may also include other network devices, such as one or more routers and/or switches, for example, which are well known in the art and thus will not be described herein. This technology provides a number of advantages including methods, non-transitory computer readable media, and health analysis apparatuses that facilitate more effective dynamic health monitoring of server devices and load balancing of network traffic to the server devices.


Referring to FIGS. 1-2, the traffic management computing device 14 may perform any number of functions in addition to analyzing server health including detecting and sending signal data to the analytic server computing device 16, and accelerating and optimizing network traffic communicated between the server devices 22(1)-22(m) and client devices 18(1)-18(n) in order to improve the user experience. The traffic management computing device 14 can also perform other functions on the network traffic, such as load balancing the network traffic to the server devices 22(1)-22(m) and/or implementing firewalls or other security measures on behalf of web applications executing on the server devices, for example. The traffic management computing device 14 includes processor(s) 26, a memory 28, and a communication interface 30, which are coupled together by a bus 32 or other communication link, although the traffic management computing device 14 may include other types and numbers of elements in other configurations.


The processor(s) 26 of the traffic management computing device 14 may execute programmed instructions for any number of the functions identified above and/or described herein for dynamic health monitoring of server devices 22(1)-22(m) and load balancing network traffic among the server devices 22(1)-22(m) and, optionally, managing network traffic and/or optimizing service of content requests, for example. The processor(s) 26 of the traffic management computing device 14 may include one or more central processing units and/or general purpose processors with one or more processing cores, for example, although other types of processor(s) can also be used.


The memory 28 of the traffic management computing device 14 stores these programmed instructions for one or more aspects of the present technology as described and illustrated herein, although some or all of the programmed instructions could be stored and executed elsewhere. A variety of different types of memory storage devices, such as random access memory (RAM), read only memory (ROM), flash, hard disk drives, solid state drives, or other computer readable medium which is read from and written to by a magnetic, optical, or other reading and writing system that is coupled to the processor(s) 26, can be used for the memory 28.


Accordingly, the memory 28 of the traffic management computing device 14 can store one or more applications that can include computer executable instructions that, when executed by the traffic management computing device 14, cause the traffic management computing device 14 to perform actions, such as to transmit, receive, or otherwise process messages, for example, and to perform other actions described and illustrated below with reference to FIGS. 4-5. The application(s) can be implemented as modules or components of other applications. Further, the application(s) can be implemented as operating system extensions, module, plugins, or the like.


Even further, the application(s) may be operative in a cloud-based computing environment. The application(s) can be executed within or as virtual machine(s) or virtual server(s) that may be managed in a cloud-based computing environment. Also, the application(s), and even the traffic management computing device 14 itself, may be located in virtual server(s) running in a cloud-based computing environment rather than being tied to one or more specific physical network computing devices. Also, the application(s) may be running in one or more virtual machines (VMs) executing on the traffic management computing device 14. Additionally, in one or more embodiments of this technology, virtual machine(s) running on the traffic management computing device 14 may be managed or supervised by a hypervisor.


In this particular example, the memory 28 further includes a load balancing module 34 that includes a load balancing policy 36 and a server health observer module 38. The load balancing module 34 is configured to implement the load balancing policy 36 to distribute network traffic among the server devices 22(1)-22(m) based on a server health score for each of the server devices 22(1)-22(m), as described and illustrated in more detail later. The server health observer module 38 is configured to monitor server-side signals to obtain data and apply models in order to determine the health of the server devices 22(1)-22(m) or whether one or more of the server devices 22(1)-22(m) is experiencing an anomaly representative of a health issue, also as described and illustrated in more detail later.


The communication interface 30 of the traffic management computing device 14 operatively couples and communicates between the traffic management computing device 14, client devices 18(1)-18(n), server devices 22(1)-22(m), and analytic server computing device 16, which are all coupled together by the LAN 24, communication network(s) 20 and direct connection(s), although other types and numbers of communication networks or systems with other types and numbers of connections and configurations to other devices and elements. By way of example only, the LAN and communication network(s) 20 can use TCP/IP over Ethernet and industry-standard protocols, including NFS, CIFS, SOAP, XML, LDAP, and SNMP, although other types and numbers of communication networks, can be used.


Referring to FIGS. 1-3, the analytic server computing device 16 is configured to process signal data received from the traffic management computing device 14 and generate server health models that facilitate subsequent network traffic analysis by the traffic management computing device 14. While the analytic server computing device 16 is illustrated in this particular example as a separate device that allows significant processing related to model generation and machine learning to be performed separate from the traffic management computing device 14, in other examples, the functionality provided by the analytic server computing device 16 can be performed by analytic modules included in the memory 28 of the traffic management computing device 14, and other configurations can also be used.


In yet other examples, the analytic server computing device 16 can be located in a local network or outside of a local network and accessible via a cloud architecture, for example. In this particular example, the analytic server computing device 16 includes processor(s) 40, a memory 42, and a communication interface 44, which are coupled together by a bus 46 or other communication link, although the analytic server computing device 16 may include other types and numbers of elements in other configurations.


The processor(s) 40 of the analytic server computing device 16 may execute programmed instructions for any number of the functions identified above and/or described herein for generating server health models that facilitate the identification of anomalous network traffic by the traffic management computing device 14. The processor(s) 40 of the analytic server computing device 16 may include one or more central processing units and/or general purpose processors with one or more processing cores, for example.


The memory 42 of the analytic server computing device 16 stores these programmed instructions for one or more aspects of the present technology as described and illustrated herein, although some or all of the programmed instructions could be stored and executed elsewhere. A variety of different types of memory storage devices, such as random access memory (RAM), read only memory (ROM), flash memory, hard disk drives, solid state drives, or other computer readable medium which is read from and written to by a magnetic, optical, or other reading and writing system that is coupled to the processor(s) 40, can be used for the memory 42.


Accordingly, the memory 42 of the analytic server computing device 16 can store one or more applications that can include computer executable instructions that, when executed by the analytic server computing device 16, cause the analytic server computing device 16 to perform actions, such as to transmit, receive, or otherwise process messages, for example, and to perform other actions described and illustrated below with reference to FIGS. 4-5. The application(s) can be implemented as modules or components of other applications. Further, the application(s) can be implemented as operating system extensions, module, plugins, or the like.


Even further, the application(s) may be operative in a cloud-based computing environment. The application(s) can be executed within or as virtual machine(s) or virtual server(s) that may be managed in a cloud-based computing environment. Also, the application(s), and even the analytic server computing device 20 itself, may be located in virtual server(s) running in a cloud-based computing environment rather than being tied to one or more specific physical network computing devices. Also, the application(s) may be running in one or more virtual machines (VMs) executing on the analytic server computing device 16. Additionally, in one or more embodiments of this technology, virtual machine(s) running on the analytic server computing device 16 may be managed or supervised by a hypervisor.


In this particular example, the memory 42 of the analytic server computing device 16 further includes a model builder module 48. The model builder module 48 in this example is configured to dynamically generate models that can be applied by the traffic management computing device 14 to identify anomalous network traffic impacting the health of one or more of the server devices 22(1)-22(m), although the model builder module 48 can be configured to execute other types and/or numbers of other health monitoring functions and/or other operations. The models can include thresholds for any number of signals and an estimated number of pending requests that, when one or more are exceeded, indicate that an anomaly exists, as described and illustrated in more detail later.


The communication interface 44 of the analytic server computing device 16 operatively couples and communicates with the traffic management computing device 14, which is coupled to the analytic server computing devices by a direct connection or LAN (not shown), although other types and numbers of communication networks or systems with other types and numbers of connections and configurations to other devices and elements can also be used.


Each of the server devices 22(1)-22(m) in this example includes one or more processors, a memory, and a communication interface, which are coupled together by a bus or other communication link, although other numbers and types of network devices could be used. The server devices 22(1)-22(m) in this example process requests received from the client devices 18(1)-18(n) via the communication network(s) 20 according to the HTTP-based application RFC protocol, for example. Various applications may be operating on the server devices 22(1)-22(m) and transmitting data (e.g., files or Web pages) to the client devices 18(1)-18(n) via the traffic management computing device 14 in response to requests from the client devices 18(1)-18(n). The server devices 22(1)-22(m) may be hardware or software or may represent a system with multiple servers in a pool, which may include internal or external networks.


Although the server devices 22(1)-22(m) are illustrated as single devices, one or more actions of each of the server devices 22(1)-22(m) may be distributed across one or more distinct network computing devices that together comprise one or more of the server devices 22(1)-22(m). Moreover, the server devices 22(1)-22(m) are not limited to a particular configuration. Thus, the server devices 22(1)-22(m) may contain a plurality of network computing devices that operate using a master/slave approach, whereby one of the network computing devices of the server devices 22(1)-22(m) operate to manage and/or otherwise coordinate operations of the other network computing devices. The server devices 22(1)-22(m) may operate as a plurality of network computing devices within a cluster architecture, a peer-to peer architecture, virtual machines, or within a cloud architecture, for example.


Thus, the technology disclosed herein is not to be construed as being limited to a single environment and other configurations and architectures are also envisaged. For example, one or more of the server devices 22(1)-22(m) can operate within the traffic management computing devices 14 itself, rather than as a stand-alone server device. In this example, the one or more of the server devices 22(1)-22(m) operate within the memory 28 of the traffic management computing devices 14.


The client devices 18(1)-18(n) in this example include any type of computing device that can generate, receive, and process network traffic, such as mobile computing devices, desktop computing devices, laptop computing devices, tablet computing devices, virtual machines (including cloud-based computers), or the like. Each of the client devices 18(1)-18(n) in this example includes a processor, a memory, and a communication interface, which are coupled together by a bus or other communication link, although other numbers and types of network devices could be used.


The client devices 18(1)-18(n) may run interface applications, such as standard web browsers or standalone client applications, that may provide an interface to make requests for, and receive content stored on, one or more of the server devices 22(1)-22(m) via the communication network(s) 20. The client devices 18(1)-18(n) may further include a display device, such as a display screen or touchscreen, and/or an input device, such as a keyboard for example.


Although the exemplary network environment with the traffic management computing device 14, client devices 18(1)-18(n), server devices 22(1)-22(m), analytic server computing device 16, LAN 24, and communication network(s) 20 are described and illustrated herein, other types and numbers of systems, devices, components, and elements in other topologies can be used. It is to be understood that the systems of the examples described herein are for exemplary purposes, as many variations of the specific hardware and software used to implement the examples are possible, as will be appreciated by those skilled in the relevant art(s).


One or more of the components depicted in the network environment 10, such as the traffic management computing device 14, client devices 18(1)-18(n), server devices 22(1)-22(m), or analytic server computing device 16, for example, may be configured to operate as virtual instances on the same physical machine. In other words, one or more of the traffic management computing device 14, client devices 18(1)-18(n), server devices 22(1)-22(m), or analytic server computing device 16 may operate on the same physical device rather than as separate devices communicating through communication network(s). Additionally, there may be more or fewer traffic management computing device, client devices, server devices, or analytic server computing devices than illustrated in FIG. 1.


In addition, two or more computing systems or devices can be substituted for any one of the systems or devices in any example. Accordingly, principles and advantages of distributed processing, such as redundancy and replication also can be implemented, as desired, to increase the robustness and performance of the devices and systems of the examples. The examples may also be implemented on computer system(s) that extend across any suitable network using any suitable interface mechanisms and traffic technologies, including by way of example only teletraffic in any suitable form (e.g., voice and modem), wireless traffic media, wireless traffic networks, cellular traffic networks, G3 traffic networks, Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, and combinations thereof.


The examples may also be embodied as non-transitory computer readable media having instructions stored thereon for one or more aspects of the present technology as described and illustrated by way of the examples herein, as described herein, which when executed by a processor, cause the processor to carry out the steps necessary to implement the methods of the examples, as described and illustrated herein.


Exemplary methods for analyzing server health will now be described with reference to FIGS. 1-5. Referring more specifically to FIG. 3, a method for monitoring the health of the server devices 22(1)-22(m) is illustrated. In step 400 in this example, the health analysis apparatus 12 monitors network traffic exchanged with the server devices 22(1)-22(m) to obtain raw health signal data.


Optionally, the traffic management computing device 14 of the health analysis apparatus 12 can obtain the signal data periodically (e.g., every second) over a specified period of time, and can combine the signal data into a snapshot, which is sent to the model builder module 48 of the analytic server computing device 14. The signal data can include transactions per second, requests per second, request jitter, response jitter, drops per second, pending transactions per second, concurrent connections per second, bytes in per second, bytes out per second, upload time, download time, idle time, inter-packet time, mean and/or median latency over a specified time period, server errors per second, or redirected requests per second, for example, although other signals can also be used.


Referring more specifically to FIG. 5, an exemplary connection lifetime timing diagram is illustrated. In this example, a request is received by the traffic management computing device 14 followed by an upload time. Subsequent to the upload, the connection experiences a latency associated with one of the server devices 22(1)-22(m) to which the request is directed. In response to the request, the one of the server devices 22(1)-22(m) provides requested data during a download time. Subsequent to the download time, the traffic management computing device 14 is idle during an idle time before and after a subsequent request is received. In this example, one or more of the upload time, server latency, download time, inter-packet time, or idle time can be recorded as part of the signal data.


Referring back to FIG. 4, in step 402, the health analysis apparatus 12 determines whether there is a predicted anomaly in the network traffic monitored in step 400. In order to determine whether there is a predicted anomaly, the traffic management computing device 12 can apply a server health prediction model received from the model builder module 48 of the analytic server computing device 16 to the signal data obtained for each of the server devices 22(1)-22(m) in step 400. The server health prediction model can be dynamically modified and can result from a machine learning process applied to historical predicted and actual anomalies and associated historical signal data.


In this particular example, the server health prediction model can include a plurality of predictive health targets, such as expressions or values that have a benign range and for which associated boundaries or thresholds have been determined over time based on server health feedback. The predictive health targets can be saturation expressions, pending transaction (or pending request) expressions, and/or ratios that have components corresponding to the signals for which signal data is obtained in step 400 (e.g., pending transactions to concurrent connections or request jitter for the traffic management computing device 14 to request jitter for one or more of the server devices 22(1)-22(m)), although other types of expressions can also be used for the predictive health targets. Additionally, the predictive health targets can include expected latency, expected drops per second, expected server errors per second, or redirected requests per second, for example, and values for other signals can also be used for the predictive health targets.


The predictive health targets are generated using both current value(s) of the predictive health target component(s) in the signal data (e.g., current number of pending requests) and also historical signal data for the component(s) in the predictive health targets that is obtained in one or more other time windows. Accordingly, in this example, predictive health target and signal data values during time interval of W seconds (in which there are W values for every predictive health target and every signal data value (assuming signal data is collected every second)) and predictive health target values and signal data values during the following W seconds (i.e., in time t+w) are used in one or more machine learning algorithms to build the server health prediction model(s) that include the predictive health targets analyzed in step 402.


Accordingly, the health analysis apparatus 12 can predict a server health anomaly in step 402 when a specified number or one or more specified ones of the threshold values for one or more of the predictive health targets in the server health prediction model have been exceeded, for example. In other examples, other methods of determining whether there is a predicted server health anomaly using the signal data and predictive health targets also can be used. If the health analysis apparatus 12 determines there is a server health anomaly, then the Yes branch is taken to step 404.


In step 404, the health analysis apparatus 12 initiates a mitigation action. The mitigation action can include blocking network traffic having certain characteristics, intentionally dropping packets from certain of the client devices 18(1)-18(n), presenting certain client devices with challenges before proceeding to accept network traffic in order to confirm whether the client devices 18(1)-18(n) are malicious bots, redirecting network traffic to one or more relatively healthy of the server devices 22(1)-22(m), or any other type of mitigation action intended to defend the one or more of the server devices. Accordingly, the mitigation action can be initiated by the traffic management computing device 14, for example. Subsequent to initiating the mitigation action, or if the health analysis apparatus 12 determines in step 402 that there is not a predicted anomaly in the network traffic and the No branch is taken, then the health analysis apparatus 12 proceeds to step 406.


In step 406, the health analysis apparatus 12 generates a server health score for each of the server devices 22(1)-22(m) based on an application of the server health prediction model. The server health score corresponds with an estimated saturation level of each of the server devices 22(1)-22(m) and can be generated by the model builder module 48 of the analytic server computing device 16, for example. The server devices 22(1)-22(m) are considered saturated when additional requests or connections cannot be serviced. Accordingly the server health score represents an estimated saturation level or how close one of the server devices 22(1)-22(m) is to saturation.


In this particular example, the server health score can be generated based on the value of one or more of the expressions or values corresponding to one or more of the predictive health targets as compared to the threshold for the one or more expressions or values corresponding to the one or more of the predictive health targets, although server health scores can be generated based on other values and data. The predictive health target thresholds are optionally dynamic and determined over time based on historical values of the various signals when anomalies or health issues have occurred with each of the server devices 22(1)-22(m).


In step 408, the health analysis apparatus 12 updates the load balancing policy 36 based on the generated server health scores. Optionally, the load balancing module 34 of the traffic management computing device 14 can store one or more load balancing policies (e.g., load balancing policy 36) that can be applied to received network traffic in order to identify ones of the server devices 22(1)-22(m) to which the network traffic should be sent in order to provide a relatively balanced distribution of the network traffic across the server pool.


By using the server health scores as the load balancing criterion, ones of the server devices 22(1)-22(m) that are relatively healthy can process more of the network traffic received by the traffic management computing device 14, thereby resulting in more efficient responses to requests sent by the client devices 18(1)-18(n) and an associated improved user experience. Optionally, the server health scores can also be used to dynamically spawn an additional server device to join the pool and share the load of the server devices 22(1)-22(m) or to shift the load to a relatively healthy one or more other of the server devices 22(1)-22(m), for example.


Subsequent to updating the load balancing policy, the health analysis apparatus 12 proceeds back to step 400 and continues monitoring network traffic exchanged with the server devices 22(1)-22(m) to obtain signal data. In some examples, a plurality of iterations of steps 400-408 illustrated in FIG. 4 are performed by the health analysis apparatus 12, so that the predictive health targets of the server health prediction model become relatively reliable, prior to mitigation actions being taken in step 404 and/or the load balancing policy 36 being updated in step 408. During the iterative process, and based on the machine learning performed by the analytic server computing device 16, the predictive health targets of the server health prediction model can be validated and invalidated based on actual health target indicators representative of actual health issues or anomalies with one or more of the server devices 22(1)-22(m).


Accordingly, with this technology, server health issues can advantageously be identified and mitigated earlier and before service significantly deteriorates. Additionally, threshold values for various signals can be learned and dynamically changed over time based on historical signal data and anomalies to provide a relatively effective model for predicting future anomalies with respect to server health. Further, network traffic can be more effectively load balanced to servers in a server pool based on the health of the server.


Having thus described the basic concept of the disclosed technology, it will be rather apparent to those skilled in the art that the foregoing detailed disclosure is intended to be presented by way of example only, and is not limiting. Various alterations, improvements, and modifications will occur and are intended to those skilled in the art, though not expressly stated herein. These alterations, improvements, and modifications are intended to be suggested hereby, and are within the spirit and scope of the disclosed technology. Additionally, the recited order of processing elements or sequences, or the use of numbers, letters, or other designations therefore, is not intended to limit the claimed processes to any order except as may be specified in the claims. Accordingly, the disclosed technology is limited only by the following claims and equivalents thereto.

Claims
  • 1. A method for analyzing server health, comprising: monitoring network traffic exchanged with a plurality of servers to obtain signal data regarding a plurality of signals associated with the network traffic;applying a server health prediction model to the signal data to generate a server health score for each of the servers, the server health prediction model comprising a plurality of predictive health targets each based at least in part on historical signal data and having an associated threshold value, the historical signal data obtained based on an analysis of monitored network traffic exchanged between one or more of a plurality of clients and one or more of the servers; andupdating a stored load balancing policy based on the generated server health score for each of the servers to modify a distribution across the servers of network traffic received from the clients.
  • 2. The method of claim 1, wherein the server health score for each of the servers, which is generated based the application of the server health prediction model to the signal data obtained based on the monitoring of network traffic exchanged with the servers, comprises an estimated saturation level of each of the servers.
  • 3. The method of claim 1, further comprising: determining when there is a predicted server health anomaly based on the application of the server health prediction model to the signal data; andinitiating a mitigation action when the determination indicates that there is a predicted server health anomaly.
  • 4. The method of claim 1, wherein the signal data comprises one or more of transactions per second, requests per second, request jitter, response jitter, drops per second, pending transactions per second, bytes in per second, bytes out per second, upload time, download time, idle time, inter-packet time, or response codes.
  • 5. The method of claim 1, further comprising determining when a specified number or one or more specified ones of the threshold values has been exceeded.
  • 6. A non-transitory computer readable medium having stored thereon instructions for analyzing server health comprising executable code that, when executed by one or more processors, causes the processors to: monitor network traffic exchanged with a plurality of servers to obtain signal data regarding a plurality of signals associated with the network traffic;apply a server health prediction model to the signal data to generate a server health score for each of the servers, the server health prediction model comprising a plurality of predictive health targets each based at least in part on historical signal data and having an associated threshold value, the historical signal data obtained based on an analysis of monitored network traffic exchanged between one or more of a plurality of clients and one or more of the servers; andupdate a stored load balancing policy based on the generated server health score for each of the servers to modify a distribution across the servers of network traffic received from the clients.
  • 7. The non-transitory computer readable medium of claim 6, wherein the server health score for each of the servers, which is generated based the application of the server health prediction model to the signal data obtained based on the monitoring of network traffic exchanged with the servers, comprises an estimated saturation level of each of the servers.
  • 8. The non-transitory computer readable medium of claim 6, wherein the executable code, when executed by the processors, further causes the processors to: determine when there is a predicted server health anomaly based on the application of the server health prediction model to the signal data; andinitiate a mitigation action when the determination indicates that there is a predicted server health anomaly.
  • 9. The non-transitory computer readable medium of claim 6, wherein the signal data comprises one or more of transactions per second, requests per second, request jitter, response jitter, drops per second, pending transactions per second, bytes in per second, bytes out per second, upload time, download time, idle time, inter-packet time, or response codes.
  • 10. The non-transitory computer readable medium of claim 6, wherein the executable code, when executed by the processors, further causes the processors to determine when a specified number or one or more specified ones of the threshold values has been exceeded.
  • 11. A health analysis apparatus, comprising memory comprising programmed instructions stored thereon and one or more processors configured to be capable of executing the stored programmed instructions to: monitor network traffic exchanged with a plurality of servers to obtain signal data regarding a plurality of signals associated with the network traffic;apply a server health prediction model to the signal data to generate a server health score for each of the servers, the server health prediction model comprising a plurality of predictive health targets each based at least in part on historical signal data and having an associated threshold value, the historical signal data obtained based on an analysis of monitored network traffic exchanged between one or more of a plurality of clients and one or more of the servers; andupdate a stored load balancing policy based on the generated server health score for each of the servers to modify a distribution across the servers of network traffic received from the clients.
  • 12. The health analysis apparatus of claim 11, wherein the server health score for each of the servers, which is generated based the application of the server health prediction model to the signal data obtained based on the monitoring of network traffic exchanged with the servers, comprises an estimated saturation level of each of the servers.
  • 13. The health analysis apparatus of claim 11, wherein the processors are further configured to be capable of executing the stored programmed instructions to: determine when there is a predicted server health anomaly based on the application of the server health prediction model to the signal data; andinitiate a mitigation action when the determination indicates that there is a predicted server health anomaly.
  • 14. The health analysis apparatus of claim 11, wherein the signal data comprises one or more of transactions per second, requests per second, request jitter, response jitter, drops per second, pending transactions per second, bytes in per second, bytes out per second, upload time, download time, idle time, inter-packet time, or response codes.
  • 15. The health analysis apparatus of claim 11, wherein the processors are further configured to be capable of executing the stored programmed instructions to determine when a specified number or one or more specified ones of the threshold values has been exceeded.
  • 16. A network traffic management system, comprising one or more health analysis apparatuses, a plurality of client devices, and a plurality of server devices, the network traffic management system comprising memory comprising programmed instructions stored thereon and one or more processors configured to be capable of executing the stored programmed instructions to: monitor network traffic exchanged with the server devices to obtain signal data regarding a plurality of signals associated with the network traffic;apply a server health prediction model to the signal data to generate a server health score for each of the server devices, the server health prediction model comprising a plurality of predictive health targets each based at least in part on historical signal data and having an associated threshold value, the historical signal data obtained based on an analysis of monitored network traffic exchanged between one or more of the client devices and one or more of the server devices; andupdate a stored load balancing policy based on the generated server health score for each of the server devices to modify a distribution across the server devices of network traffic received from the client devices.
  • 17. The network traffic management system of claim 16, wherein the server health score for each of the server devices, which is generated based the application of the server health prediction model to the signal data obtained based on the monitoring of network traffic exchanged with the server devices, comprises an estimated saturation level of each of the server devices.
  • 18. The network traffic management system of claim 16, wherein the processors are further configured to be capable of executing the stored programmed instructions to: determine when there is a predicted server health anomaly based on the application of the server health prediction model to the signal data; andinitiate a mitigation action when the determination indicates that there is a predicted server health anomaly.
  • 19. The network traffic management system of claim 16, wherein the signal data comprises one or more of transactions per second, requests per second, request jitter, response jitter, drops per second, pending transactions per second, bytes in per second, bytes out per second, upload time, download time, idle time, inter-packet time, or response codes.
  • 20. The network traffic management system of claim 16, wherein the processors are further configured to be capable of executing the stored programmed instructions to determine when a specified number or one or more specified ones of the threshold values has been exceeded.
Parent Case Info

This application claims the benefit of U.S. Provisional Patent Application Ser. No. 62/156,973, filed on May 5, 2015, which is hereby incorporated by reference in its entirety.

US Referenced Citations (773)
Number Name Date Kind
3950735 Patel Apr 1976 A
4644532 George et al. Feb 1987 A
4897781 Chang et al. Jan 1990 A
4965772 Daniel et al. Oct 1990 A
5023826 Patel Jun 1991 A
5053953 Patel Oct 1991 A
5167024 Smith et al. Nov 1992 A
5282201 Frank et al. Jan 1994 A
5299312 Rocco, Jr. Mar 1994 A
5327529 Fults et al. Jul 1994 A
5367635 Bauer et al. Nov 1994 A
5371852 Attanasio et al. Dec 1994 A
5406502 Haramaty et al. Apr 1995 A
5475857 Dally Dec 1995 A
5517617 Sathaye et al. May 1996 A
5519694 Brewer et al. May 1996 A
5519778 Leighton et al. May 1996 A
5521591 Arora et al. May 1996 A
5528701 Aref Jun 1996 A
5550816 Hardwick et al. Aug 1996 A
5581764 Fitzgerald et al. Dec 1996 A
5596742 Agarwal et al. Jan 1997 A
5606665 Yang et al. Feb 1997 A
5611049 Pitts Mar 1997 A
5623490 Richter et al. Apr 1997 A
5663018 Cummings et al. Sep 1997 A
5752023 Choucri et al. May 1998 A
5761484 Agarwal et al. Jun 1998 A
5768423 Aref et al. Jun 1998 A
5774660 Brendel et al. Jun 1998 A
5790554 Pitcher et al. Aug 1998 A
5802052 Venkataraman Sep 1998 A
5812550 Sohn et al. Sep 1998 A
5825772 Dobbins et al. Oct 1998 A
5832283 Chou et al. Nov 1998 A
5875296 Shi et al. Feb 1999 A
5892914 Pitts Apr 1999 A
5892932 Kim Apr 1999 A
5919247 Van Hoff et al. Jul 1999 A
5936939 Des Jardins et al. Aug 1999 A
5941988 Bhagwat et al. Aug 1999 A
5946690 Pitts Aug 1999 A
5949885 Leighton Sep 1999 A
5951694 Choquier et al. Sep 1999 A
5959990 Frantz et al. Sep 1999 A
5974460 Maddalozzo, Jr. et al. Oct 1999 A
5983281 Ogle et al. Nov 1999 A
5988847 McLaughlin et al. Nov 1999 A
5991302 Beri et al. Nov 1999 A
5995491 Richter et al. Nov 1999 A
6006260 Barrick, Jr. Dec 1999 A
6006264 Colby et al. Dec 1999 A
6026452 Pitts Feb 2000 A
6026500 Topff et al. Feb 2000 A
6028857 Poor Feb 2000 A
6029175 Chow et al. Feb 2000 A
6041365 Kleinerman Mar 2000 A
6047356 Anderson et al. Apr 2000 A
6051169 Brown et al. Apr 2000 A
6067558 Wendt et al. May 2000 A
6078956 Bryant et al. Jun 2000 A
6085234 Pitts et al. Jul 2000 A
6092196 Reiche Jul 2000 A
6104706 Richter et al. Aug 2000 A
6108703 Leighton et al. Aug 2000 A
6111876 Frantz et al. Aug 2000 A
6128279 O'Neil et al. Oct 2000 A
6128657 Okanoya et al. Oct 2000 A
6154777 Ebrahim Nov 2000 A
6157950 Krishnan Dec 2000 A
6160874 Dickerman et al. Dec 2000 A
6170022 Linville et al. Jan 2001 B1
6178423 Douceur et al. Jan 2001 B1
6182139 Brendel Jan 2001 B1
6192051 Lipman et al. Feb 2001 B1
6233612 Fruchtman et al. May 2001 B1
6246684 Chapman et al. Jun 2001 B1
6253226 Chidambaran et al. Jun 2001 B1
6253230 Couland et al. Jun 2001 B1
6259405 Stewart et al. Jul 2001 B1
6260070 Shah Jul 2001 B1
6263368 Martin Jul 2001 B1
6279037 Tams Aug 2001 B1
6289012 Harrington et al. Sep 2001 B1
6292832 Shah et al. Sep 2001 B1
6298380 Coile et al. Oct 2001 B1
6304913 Rune Oct 2001 B1
6327622 Jindal et al. Dec 2001 B1
6330574 Murashita Dec 2001 B1
6338082 Schneider Jan 2002 B1
6343324 Hubis et al. Jan 2002 B1
6347339 Morris et al. Feb 2002 B1
6353848 Morris Mar 2002 B1
6360270 Cherkasova et al. Mar 2002 B1
6363056 Beigi et al. Mar 2002 B1
6370527 Singhal Apr 2002 B1
6374300 Masters Apr 2002 B2
6389462 Cohen et al. May 2002 B1
6393474 Eichert et al. May 2002 B1
6396833 Zhang et al. May 2002 B1
6430562 Kardos et al. Aug 2002 B1
6434081 Johnson et al. Aug 2002 B1
6446108 Rosenberg et al. Sep 2002 B1
6466580 Leung Oct 2002 B1
6469983 Narayana et al. Oct 2002 B2
6480476 Willars Nov 2002 B1
6484261 Wiegel Nov 2002 B1
6490624 Sampson et al. Dec 2002 B1
6505244 Natarajan et al. Jan 2003 B1
6510135 Almulhem et al. Jan 2003 B1
6510458 Berstis et al. Jan 2003 B1
6513061 Ebata et al. Jan 2003 B1
6514085 Slattery et al. Feb 2003 B2
6519643 Foulkes et al. Feb 2003 B1
6542936 Mayle et al. Apr 2003 B1
6560230 Li et al. May 2003 B1
6578069 Homann et al. Jun 2003 B1
6578076 Putzolu Jun 2003 B1
6601084 Bhaskaran et al. Jul 2003 B1
6615267 Whalen et al. Sep 2003 B1
6631422 Althaus et al. Oct 2003 B1
6636503 Shiran et al. Oct 2003 B1
6636894 Short et al. Oct 2003 B1
6650640 Muller et al. Nov 2003 B1
6650641 Albert et al. Nov 2003 B1
6654346 Mahalingaiah et al. Nov 2003 B1
6654701 Hatley Nov 2003 B2
6661802 Homberg et al. Dec 2003 B1
6683873 Kwok et al. Jan 2004 B1
6691165 Bruck et al. Feb 2004 B1
6694517 James et al. Feb 2004 B1
6701415 Hendren, III Mar 2004 B1
6708187 Shanumgam et al. Mar 2004 B1
6708220 Olin Mar 2004 B1
6718380 Mohaban et al. Apr 2004 B1
6728704 Mao et al. Apr 2004 B2
6738357 Richter et al. May 2004 B1
6738933 Fraenkel et al. May 2004 B2
6742045 Albert et al. May 2004 B1
6744776 Kalkunte et al. Jun 2004 B1
6751663 Farrell et al. Jun 2004 B1
6754215 Arikawa et al. Jun 2004 B1
6754228 Ludwig Jun 2004 B1
6754699 Swildens et al. Jun 2004 B2
6760337 Snyder, II et al. Jul 2004 B1
6760775 Anerousis et al. Jul 2004 B1
6772219 Shobatake Aug 2004 B1
6779039 Bommareddy et al. Aug 2004 B1
6781986 Sabaa et al. Aug 2004 B1
6795860 Shah Sep 2004 B1
6798777 Ferguson et al. Sep 2004 B1
6804542 Haartsen Oct 2004 B1
6816901 Sitaraman et al. Nov 2004 B1
6816977 Brakmo et al. Nov 2004 B2
6826698 Minkin et al. Nov 2004 B1
6829238 Tokuyo et al. Dec 2004 B2
6857009 Fereria Feb 2005 B1
6862282 Oden Mar 2005 B1
6865593 Reshef et al. Mar 2005 B1
6868082 Allen, Jr. et al. Mar 2005 B1
6868447 Slaughter et al. Mar 2005 B1
6871221 Styles Mar 2005 B1
6876629 Beshai et al. Apr 2005 B2
6876654 Hedge Apr 2005 B1
6880017 Marce et al. Apr 2005 B1
6883137 Girardot et al. Apr 2005 B1
6888836 Cherkasova May 2005 B1
6904040 Salapura et al. Jun 2005 B2
6914881 Mansfield et al. Jul 2005 B1
6928082 Liu et al. Aug 2005 B2
6928518 Talagala Aug 2005 B2
6947985 Hegli et al. Sep 2005 B2
6950434 Viswanath et al. Sep 2005 B1
6954780 Susai et al. Oct 2005 B2
6957272 Tallegas et al. Oct 2005 B2
6959394 Brickell et al. Oct 2005 B1
6970475 Fraser et al. Nov 2005 B1
6970924 Chu et al. Nov 2005 B1
6973490 Robertsono et al. Dec 2005 B1
6975592 Seddigh et al. Dec 2005 B1
6986040 Kramer et al. Jan 2006 B1
6987763 Rochberger et al. Jan 2006 B2
6990074 Wan et al. Jan 2006 B2
6990114 Erimli et al. Jan 2006 B1
7003564 Greuel et al. Feb 2006 B2
7006502 Lin Feb 2006 B2
7007092 Peiffer Feb 2006 B2
7020713 Shah et al. Mar 2006 B1
7023974 Brannam et al. Apr 2006 B1
7035212 Mittal et al. Apr 2006 B1
7039061 Connor et al. May 2006 B2
7058633 Gnagy et al. Jun 2006 B1
7065482 Shorey et al. Jun 2006 B2
7072800 Fernandez et al. Jul 2006 B1
7075924 Richter et al. Jul 2006 B2
7076689 Atkinson Jul 2006 B2
7080314 Garofalakis et al. Jul 2006 B1
7089491 Feinberg et al. Aug 2006 B2
7113993 Cappiello et al. Sep 2006 B1
7113996 Kronenberg Sep 2006 B2
7127625 Farkas et al. Oct 2006 B2
7133863 Teng et al. Nov 2006 B2
7133944 Song et al. Nov 2006 B2
7139792 Mishra et al. Nov 2006 B1
7155722 Hills Dec 2006 B1
7161904 Hussain et al. Jan 2007 B2
7185359 Schmidt et al. Feb 2007 B2
7191163 Herrera et al. Mar 2007 B2
7228359 Monteiro Jun 2007 B1
7228422 Morioka et al. Jun 2007 B2
7236491 Tsao et al. Jun 2007 B2
7240100 Wein et al. Jul 2007 B1
7257633 Masputra et al. Aug 2007 B2
7283470 Sindhu et al. Oct 2007 B1
7287082 O'Toole, Jr. Oct 2007 B1
7292541 Cs Nov 2007 B1
7295827 Liu et al. Nov 2007 B2
7296263 Jacob Nov 2007 B1
7308475 Pruitt et al. Dec 2007 B1
7308703 Wright et al. Dec 2007 B2
7308709 Brezak et al. Dec 2007 B1
7310339 Powers et al. Dec 2007 B1
7321926 Zhang et al. Jan 2008 B1
7324533 DeLiberato et al. Jan 2008 B1
7340571 Saze Mar 2008 B2
7343413 Gilde et al. Mar 2008 B2
7349391 Ben-Dor et al. Mar 2008 B2
7373438 DeBergalis et al. May 2008 B1
7398552 Pardee et al. Jul 2008 B2
7409440 Jacob Aug 2008 B1
7433962 Janssen et al. Oct 2008 B2
7454480 Labio et al. Nov 2008 B2
7454503 Childress Nov 2008 B2
7333999 Njemanze Dec 2008 B1
7490162 Masters Feb 2009 B1
7500243 Huetsch et al. Mar 2009 B2
7500269 Huotari et al. Mar 2009 B2
7505795 Lim et al. Mar 2009 B1
7516492 Nisbet et al. Apr 2009 B1
7522581 Acharya et al. Apr 2009 B2
7526541 Roese et al. Apr 2009 B2
7555608 Naik et al. Jun 2009 B2
7558197 Sindhu et al. Jul 2009 B1
7577723 Matsuda et al. Aug 2009 B2
7580356 Mishra Aug 2009 B1
7580971 Gollapudi et al. Aug 2009 B1
7624424 Morita et al. Nov 2009 B2
7640347 Sloat et al. Dec 2009 B1
7644137 Bozak et al. Jan 2010 B2
7647203 Herz Jan 2010 B1
7650331 Dean et al. Jan 2010 B1
7668166 Rekhter et al. Feb 2010 B1
7675868 Balonado Mar 2010 B2
7684423 Tripathi et al. Mar 2010 B2
7689710 Tang et al. Mar 2010 B2
7698458 Liu et al. Apr 2010 B1
7706261 Sun et al. Apr 2010 B2
7720954 Raja et al. May 2010 B2
7724657 Rao et al. May 2010 B2
7725093 Sengupta et al. May 2010 B2
7769860 Assadzadeh Aug 2010 B1
7778187 Chaturvedi et al. Aug 2010 B2
7801978 Susai et al. Sep 2010 B1
7808913 Ansari et al. Oct 2010 B2
7822839 Pruitt et al. Oct 2010 B1
7831662 Clark et al. Nov 2010 B2
7844839 Palmer et al. Nov 2010 B2
7861085 Case et al. Dec 2010 B1
7861102 Ranganathan Dec 2010 B1
7873060 Luo Jan 2011 B2
7876677 Cheshire Jan 2011 B2
7885398 Chandra Feb 2011 B2
7895653 Calo et al. Feb 2011 B2
7903554 Manur et al. Mar 2011 B1
7908245 Nakano et al. Mar 2011 B2
7908314 Yamaguchi et al. Mar 2011 B2
7925908 Kim Apr 2011 B2
7930365 Dixit et al. Apr 2011 B2
7933496 Livshits et al. Apr 2011 B2
7945908 Waldspurger et al. May 2011 B1
7958222 Pruitt et al. Jun 2011 B1
7984141 Gupta et al. Jul 2011 B2
7984500 Khanna et al. Jul 2011 B1
8024443 Jacob Sep 2011 B1
8037528 Williams et al. Oct 2011 B2
8064342 Badger Nov 2011 B2
8069225 McCanne et al. Nov 2011 B2
8103781 Wu et al. Jan 2012 B1
8130650 Allen, Jr. et al. Mar 2012 B2
8149819 Kobayashi et al. Apr 2012 B2
8155128 Balyan et al. Apr 2012 B2
8171124 Kondamuru May 2012 B2
8189567 Kavanagh et al. May 2012 B2
8190769 Shukla et al. May 2012 B1
8199757 Pani et al. Jun 2012 B2
8205246 Shatzkamer et al. Jun 2012 B2
8230055 Kondamuru et al. Jul 2012 B2
8239954 Wobber et al. Aug 2012 B2
8271620 Witchey Sep 2012 B2
8274895 Rahman et al. Sep 2012 B2
8321908 Gai et al. Nov 2012 B2
8351333 Rao et al. Jan 2013 B2
8380854 Szabo Feb 2013 B2
8396836 Ferguson et al. Mar 2013 B1
8417817 Jacobs Apr 2013 B1
8422365 Phillips et al. Apr 2013 B2
8447871 Szabo May 2013 B1
8447970 Klein et al. May 2013 B2
8452876 Williams et al. May 2013 B1
8463850 McCann Jun 2013 B1
8464265 Worley Jun 2013 B2
8468267 Yigang Jun 2013 B2
8484348 Subramanian et al. Jul 2013 B2
8359224 Henderson et al. Sep 2013 B2
8560693 Wang et al. Oct 2013 B1
8566474 Kanode et al. Oct 2013 B2
8578050 Craig et al. Nov 2013 B2
8601000 Stefani et al. Dec 2013 B1
8606921 Vasquez et al. Dec 2013 B2
8612612 Dukes et al. Dec 2013 B1
8615022 Harrison et al. Dec 2013 B2
8646067 Agarwal et al. Feb 2014 B2
8665868 Kay Mar 2014 B2
8701179 Penno et al. Apr 2014 B1
8725836 Lowery et al. May 2014 B2
8726338 Narayanaswamy et al. May 2014 B2
8737304 Karuturi et al. May 2014 B2
8778665 Glide et al. Jul 2014 B2
8804504 Chen Aug 2014 B1
8819109 Krishnamurthy et al. Aug 2014 B1
8819419 Carlson et al. Aug 2014 B2
8830874 Cho et al. Sep 2014 B2
8838817 Biswas Sep 2014 B1
8873753 Parker Oct 2014 B2
8875274 Montemurro et al. Oct 2014 B2
8879431 Ridel et al. Nov 2014 B2
8886981 Baumann et al. Nov 2014 B1
8908545 Chen et al. Dec 2014 B1
8959215 Koponen et al. Feb 2015 B2
9036529 Erickson et al. May 2015 B2
9037166 de Wit et al. May 2015 B2
9083760 Hughes et al. Jul 2015 B1
9114326 Arora et al. Aug 2015 B2
9143451 Amdahl et al. Sep 2015 B2
9244843 Michels et al. Jan 2016 B1
9497106 Khanal Nov 2016 B2
9505712 Leighton et al. Nov 2016 B2
9535775 Huang Jan 2017 B2
9709805 Shepard Jul 2017 B2
9745800 Madnick et al. Aug 2017 B2
9905829 Poor Feb 2018 B2
9906913 Colby et al. Feb 2018 B2
9910858 Leighton Mar 2018 B2
9939373 Sturm et al. Apr 2018 B2
9964967 Milsson et al. May 2018 B2
20010007560 Masuda et al. Jul 2001 A1
20010009554 Katseff et al. Jul 2001 A1
20010023442 Masters Sep 2001 A1
20020010757 Granik et al. Jan 2002 A1
20020010783 Primak et al. Jan 2002 A1
20020012352 Hansson et al. Jan 2002 A1
20020032777 Kawata et al. Mar 2002 A1
20020038360 Andrews et al. Mar 2002 A1
20020046291 O'Callaghan et al. Apr 2002 A1
20020049842 Huetsch et al. Apr 2002 A1
20020052928 Stern et al. May 2002 A1
20020059428 Susai et al. May 2002 A1
20020065848 Walker et al. May 2002 A1
20020072048 Slattery et al. Jun 2002 A1
20020083067 Tamayo et al. Jun 2002 A1
20020087571 Stapel et al. Jul 2002 A1
20020087744 Kitchin Jul 2002 A1
20020095498 Chanda et al. Jul 2002 A1
20020099829 Richards et al. Jul 2002 A1
20020099842 Jennings et al. Jul 2002 A1
20020103823 Jackson et al. Aug 2002 A1
20020112061 Shih et al. Aug 2002 A1
20020138615 Schmelling Sep 2002 A1
20020143819 Han et al. Oct 2002 A1
20020143852 Guo et al. Oct 2002 A1
20020161913 Gonzalez et al. Oct 2002 A1
20020162118 Levy et al. Oct 2002 A1
20020174216 Shorey et al. Nov 2002 A1
20020188753 Tang et al. Dec 2002 A1
20020194112 DePinto et al. Dec 2002 A1
20020194317 Kanada et al. Dec 2002 A1
20020194342 Lu et al. Dec 2002 A1
20020198956 Dunshea et al. Dec 2002 A1
20020198993 Cudd et al. Dec 2002 A1
20030005172 Chessell Jan 2003 A1
20030009528 Sharif et al. Jan 2003 A1
20030018450 Carley Jan 2003 A1
20030018585 Butler et al. Jan 2003 A1
20030018760 Putzolu et al. Jan 2003 A1
20030034905 Anton et al. Feb 2003 A1
20030037070 Marston Feb 2003 A1
20030046291 Fascenda Mar 2003 A1
20030051045 Connor Mar 2003 A1
20030055723 English Mar 2003 A1
20030065497 Rhoads Apr 2003 A1
20030065653 Overton et al. Apr 2003 A1
20030065762 Stolorz et al. Apr 2003 A1
20030065951 Igeta et al. Apr 2003 A1
20030069918 Lu et al. Apr 2003 A1
20030069974 Lu et al. Apr 2003 A1
20030070069 Belapurkar et al. Apr 2003 A1
20030074301 Solomon Apr 2003 A1
20030086415 Bernhard et al. May 2003 A1
20030105807 Thompson et al. Jun 2003 A1
20030105846 Zhao et al. Jun 2003 A1
20030105983 Brakmo et al. Jun 2003 A1
20030108000 Chaney et al. Jun 2003 A1
20030108002 Chaney et al. Jun 2003 A1
20030108052 Inoue et al. Jun 2003 A1
20030120948 Schmidt et al. Jun 2003 A1
20030128708 Inoue et al. Jul 2003 A1
20030130945 Force Jul 2003 A1
20030139934 Mandera Jul 2003 A1
20030145062 Sharma et al. Jul 2003 A1
20030145233 Poletto et al. Jul 2003 A1
20030156586 Lee et al. Aug 2003 A1
20030163576 Janssen et al. Aug 2003 A1
20030179755 Fraser Sep 2003 A1
20030189936 Terrell et al. Oct 2003 A1
20030191812 Agarwalla et al. Oct 2003 A1
20030195813 Pallister et al. Oct 2003 A1
20030195962 Kikuchi et al. Oct 2003 A1
20030208596 Carolan et al. Nov 2003 A1
20030212954 Patrudu Nov 2003 A1
20030220835 Barnes, Jr. Nov 2003 A1
20030225485 Fritz et al. Dec 2003 A1
20030229665 Ryman Dec 2003 A1
20030236995 Fretwell, Jr. Dec 2003 A1
20040003287 Zissimopoulos et al. Jan 2004 A1
20040006591 Matsui et al. Jan 2004 A1
20040015783 Lennon et al. Jan 2004 A1
20040017825 Stanwood et al. Jan 2004 A1
20040030627 Sedukhin Feb 2004 A1
20040030740 Stelting Feb 2004 A1
20040043758 Sorvari et al. Mar 2004 A1
20040059789 Shum Mar 2004 A1
20040064544 Barsness et al. Apr 2004 A1
20040064554 Kuno et al. Apr 2004 A1
20040072569 Omae et al. Apr 2004 A1
20040093361 Therrien et al. May 2004 A1
20040103283 Hornak May 2004 A1
20040111523 Hall et al. Jun 2004 A1
20040111621 Himberger et al. Jun 2004 A1
20040117493 Bazot et al. Jun 2004 A1
20040122926 Moore et al. Jun 2004 A1
20040123277 Schrader et al. Jun 2004 A1
20040133605 Chang et al. Jul 2004 A1
20040138858 Carley Jul 2004 A1
20040151186 Akama Aug 2004 A1
20040167967 Bastian et al. Aug 2004 A1
20040177165 Masputra et al. Sep 2004 A1
20040192312 Li et al. Sep 2004 A1
20040199762 Carlson et al. Oct 2004 A1
20040210663 Phillips et al. Oct 2004 A1
20040210898 Bergen et al. Oct 2004 A1
20040213156 Smallwood et al. Oct 2004 A1
20040215665 Edgar et al. Oct 2004 A1
20040236826 Harville et al. Nov 2004 A1
20040255000 Simionescu et al. Dec 2004 A1
20040264472 Oliver et al. Dec 2004 A1
20040264481 Darling et al. Dec 2004 A1
20040267920 Hydrie et al. Dec 2004 A1
20040267948 Oliver et al. Dec 2004 A1
20040268358 Darling et al. Dec 2004 A1
20050004887 Igakura et al. Jan 2005 A1
20050008017 Datta et al. Jan 2005 A1
20050021703 Cherry et al. Jan 2005 A1
20050021736 Carusi et al. Jan 2005 A1
20050027841 Rolfe Feb 2005 A1
20050027869 Johnson Feb 2005 A1
20050044158 Malik Feb 2005 A1
20050044213 Kobayashi et al. Feb 2005 A1
20050052440 Kim et al. Mar 2005 A1
20050055435 Gbadegesin et al. Mar 2005 A1
20050071283 Randle et al. Mar 2005 A1
20050071449 Alex et al. Mar 2005 A1
20050078604 Yim Apr 2005 A1
20050114508 DeStefano May 2005 A1
20050117589 Douady et al. Jun 2005 A1
20050122977 Lieberman Jun 2005 A1
20050132068 Rajamony Jun 2005 A1
20050138630 Reynolds Jun 2005 A1
20050154837 Keohane et al. Jul 2005 A1
20050165656 Frederick et al. Jul 2005 A1
20050174944 Legault et al. Aug 2005 A1
20050175013 Le Pennec et al. Aug 2005 A1
20050187866 Lee Aug 2005 A1
20050188220 Nilsson et al. Aug 2005 A1
20050198234 Leib et al. Sep 2005 A1
20050198310 Kim et al. Sep 2005 A1
20050213587 Cho et al. Sep 2005 A1
20050234928 Shkvarchuk et al. Oct 2005 A1
20050240664 Chen et al. Oct 2005 A1
20050256806 Tien et al. Nov 2005 A1
20050262238 Reeves et al. Nov 2005 A1
20050273456 Revanuru et al. Dec 2005 A1
20050288939 Peled et al. Dec 2005 A1
20060031374 Lu et al. Feb 2006 A1
20060031520 Bedekar et al. Feb 2006 A1
20060031778 Goodwin et al. Feb 2006 A1
20060036764 Yokota et al. Feb 2006 A1
20060045089 Bacher et al. Mar 2006 A1
20060045096 Farmer et al. Mar 2006 A1
20060047785 Wang et al. Mar 2006 A1
20060059267 Cugi et al. Mar 2006 A1
20060075093 Frattura Apr 2006 A1
20060077902 Kannan et al. Apr 2006 A1
20060077986 Rune Apr 2006 A1
20060083205 Buddhikot et al. Apr 2006 A1
20060089985 Poletto Apr 2006 A1
20060095573 Carle et al. May 2006 A1
20060100752 Kim et al. May 2006 A1
20060106802 Giblin et al. May 2006 A1
20060112176 Liu et al. May 2006 A1
20060112272 Morioka et al. May 2006 A1
20060112367 Harris May 2006 A1
20060123210 Pritchett et al. Jun 2006 A1
20060130133 Andreev et al. Jun 2006 A1
20060133374 Sekiguchi Jun 2006 A1
20060136584 Decker Jun 2006 A1
20060140193 Kakani et al. Jun 2006 A1
20060153201 Hepper et al. Jul 2006 A1
20060156416 Huotari et al. Jul 2006 A1
20060161577 Kulkrni et al. Jul 2006 A1
20060168070 Thompson et al. Jul 2006 A1
20060171365 Borella Aug 2006 A1
20060179153 Lee et al. Aug 2006 A1
20060182103 Martini et al. Aug 2006 A1
20060184647 Dixit et al. Aug 2006 A1
20060209669 Nishio Sep 2006 A1
20060209853 Hidaka et al. Sep 2006 A1
20060221077 Wright et al. Oct 2006 A1
20060229861 Tatsuoka et al. Oct 2006 A1
20060230148 Forecast et al. Oct 2006 A1
20060233106 Achlioptas et al. Oct 2006 A1
20060235998 Stechler et al. Oct 2006 A1
20060242300 Yumoto et al. Oct 2006 A1
20060259320 LaSalle et al. Nov 2006 A1
20060268692 Wright et al. Nov 2006 A1
20060268704 Ansari et al. Nov 2006 A1
20060270341 Kim et al. Nov 2006 A1
20060282442 Lennon et al. Dec 2006 A1
20060291483 Sela Dec 2006 A1
20070005807 Wong Jan 2007 A1
20070006293 Balakrishnan et al. Jan 2007 A1
20070016613 Foresti et al. Jan 2007 A1
20070016662 Desai et al. Jan 2007 A1
20070019636 Lau et al. Jan 2007 A1
20070019658 Park et al. Jan 2007 A1
20070038994 Davis et al. Feb 2007 A1
20070297410 Yoon et al. Feb 2007 A1
20070050843 Manville et al. Mar 2007 A1
20070058670 Konduru et al. Mar 2007 A1
20070064661 Sood et al. Mar 2007 A1
20070067771 Kulbak et al. Mar 2007 A1
20070083646 Miller et al. Apr 2007 A1
20070088822 Coile et al. Apr 2007 A1
20070106796 Kudo et al. May 2007 A1
20070107048 Halls et al. May 2007 A1
20070112775 Ackerman May 2007 A1
20070118879 Yeun May 2007 A1
20070124415 Lev-Ran et al. May 2007 A1
20070124502 Li May 2007 A1
20070130255 Wolovitz et al. Jun 2007 A1
20070130341 Ma Jun 2007 A1
20070147246 Hurley et al. Jun 2007 A1
20070162891 Burner et al. Jul 2007 A1
20070168320 Borthakur et al. Jul 2007 A1
20070168525 DeLeon et al. Jul 2007 A1
20070174491 Still et al. Jul 2007 A1
20070192543 Naik et al. Aug 2007 A1
20070208839 Voigt et al. Sep 2007 A1
20070220598 Salowey et al. Sep 2007 A1
20070233809 Brownell et al. Oct 2007 A1
20070233826 Tindal et al. Oct 2007 A1
20070250560 Wein et al. Oct 2007 A1
20070258451 Bouat Nov 2007 A1
20070297551 Choi Dec 2007 A1
20080004022 Johannesson et al. Jan 2008 A1
20080008202 Terrell et al. Jan 2008 A1
20080010372 Khendouri et al. Jan 2008 A1
20080022059 Zimmerer et al. Jan 2008 A1
20080025297 Kashyap Jan 2008 A1
20080031258 Acharya et al. Feb 2008 A1
20080034136 Ulenas Feb 2008 A1
20080072303 Syed Mar 2008 A1
20080120370 Chan et al. May 2008 A1
20080120592 Tanguay et al. May 2008 A1
20080133518 Kapoor et al. Jun 2008 A1
20080134311 Medvinsky et al. Jun 2008 A1
20080141048 Palmer Jun 2008 A1
20080141246 Kuck et al. Jun 2008 A1
20080148340 Powell et al. Jun 2008 A1
20080159145 Muthukrishnan et al. Jul 2008 A1
20080162690 Karagounis Jul 2008 A1
20080165801 Sheppard Jul 2008 A1
20080178278 Grinstein et al. Jul 2008 A1
20080201599 Ferraiolo et al. Aug 2008 A1
20080205613 Lopez Aug 2008 A1
20080208917 Smoot et al. Aug 2008 A1
20080222646 Sigal et al. Sep 2008 A1
20080225710 Raja et al. Sep 2008 A1
20080229415 Kapoor et al. Sep 2008 A1
20080239986 Xu et al. Oct 2008 A1
20080253395 Pandya Oct 2008 A1
20080256224 Kaji et al. Oct 2008 A1
20080263401 Stenzel Oct 2008 A1
20080270578 Zhang et al. Oct 2008 A1
20080279200 Shatzkamer et al. Nov 2008 A1
20080281908 McCanne et al. Nov 2008 A1
20080281944 Vorne et al. Nov 2008 A1
20080282354 Wobber et al. Nov 2008 A1
20080288621 Snell et al. Nov 2008 A1
20080288661 Galles Nov 2008 A1
20080301760 Lim Dec 2008 A1
20080316922 Riddle et al. Dec 2008 A1
20090028337 Balabine et al. Jan 2009 A1
20090049230 Pandya Feb 2009 A1
20090070617 Arimilli et al. Mar 2009 A1
20090077619 Boyce Mar 2009 A1
20090080440 Balyan et al. Mar 2009 A1
20090089487 Kwon et al. Apr 2009 A1
20090094311 Awadallah et al. Apr 2009 A1
20090094610 Sukirya Apr 2009 A1
20090097480 Curtis et al. Apr 2009 A1
20090106413 Salo et al. Apr 2009 A1
20090119504 van Os et al. May 2009 A1
20090125496 Wexler et al. May 2009 A1
20090125532 Wexler et al. May 2009 A1
20090125625 Shim et al. May 2009 A1
20090125955 DeLorme May 2009 A1
20090138314 Bruce May 2009 A1
20090138749 Moll et al. May 2009 A1
20090141891 Boyen et al. Jun 2009 A1
20090144421 Bunch Jun 2009 A1
20090161542 Ho Jun 2009 A1
20090187915 Chew et al. Jul 2009 A1
20090193513 Agarwal et al. Jul 2009 A1
20090196282 Fellman et al. Aug 2009 A1
20090217163 Jaroker Aug 2009 A1
20090217386 Schneider Aug 2009 A1
20090228956 He et al. Sep 2009 A1
20090241176 Beletski et al. Sep 2009 A1
20090265396 Ram et al. Oct 2009 A1
20090265467 Peles Oct 2009 A1
20090287935 Aull et al. Nov 2009 A1
20090289828 Hinchey Nov 2009 A1
20090292957 Bower et al. Nov 2009 A1
20090296624 Ryu et al. Dec 2009 A1
20090300161 Pruitt et al. Dec 2009 A1
20090300407 Kamath et al. Dec 2009 A1
20090313044 Hague et al. Dec 2009 A1
20090316708 Yahyaoui et al. Dec 2009 A1
20090319600 Sedan et al. Dec 2009 A1
20100011434 Kay Jan 2010 A1
20100017846 Huang et al. Jan 2010 A1
20100023582 Pedersen et al. Jan 2010 A1
20100042743 Jeon et al. Feb 2010 A1
20100061232 Zhou et al. Mar 2010 A1
20100064001 Daily Mar 2010 A1
20100070476 O'Keefe et al. Mar 2010 A1
20100071048 Novak et al. Mar 2010 A1
20100093318 Zhu et al. Apr 2010 A1
20100115236 Bataineh et al. May 2010 A1
20100131654 Malakapalli et al. May 2010 A1
20100138530 Brillhart Jun 2010 A1
20100146041 Gentry Jun 2010 A1
20100150154 Viger et al. Jun 2010 A1
20100154031 Montemurro et al. Jun 2010 A1
20100165877 Shukla et al. Jul 2010 A1
20100179984 Sebastian Jul 2010 A1
20100188976 Rahman et al. Jul 2010 A1
20100228814 McKenna et al. Sep 2010 A1
20100228819 Wei Sep 2010 A1
20100242092 Harris et al. Sep 2010 A1
20100250497 Redlich et al. Sep 2010 A1
20100251330 Kroeselberg et al. Sep 2010 A1
20100274772 Samuels Oct 2010 A1
20100279733 Karsten et al. Nov 2010 A1
20100299451 Yigang et al. Nov 2010 A1
20100306169 Pishevar et al. Dec 2010 A1
20100318329 Uraki Dec 2010 A1
20100322089 R Dec 2010 A1
20100322250 Shetty et al. Dec 2010 A1
20100325277 Muthiah et al. Dec 2010 A1
20110022812 van der Linden Jan 2011 A1
20110040889 Garrett et al. Feb 2011 A1
20110047620 Mahaffey et al. Feb 2011 A1
20110055386 Middleton Mar 2011 A1
20110055921 Narayanaswamy et al. Mar 2011 A1
20110066718 Susai et al. Mar 2011 A1
20110066736 Michell et al. Mar 2011 A1
20110072321 Dhuse Mar 2011 A1
20110075667 Li et al. Mar 2011 A1
20110078303 Li et al. Mar 2011 A1
20110098087 Tseng Apr 2011 A1
20110107077 Henderson et al. May 2011 A1
20110113095 Hatami-Hanza May 2011 A1
20110119374 Ruhl et al. May 2011 A1
20110154073 Wang Jun 2011 A1
20110154443 Thakur et al. Jun 2011 A1
20110173295 Bakke et al. Jul 2011 A1
20110184733 Yu et al. Jul 2011 A1
20110185082 Thompson Jul 2011 A1
20110188415 Graziano Aug 2011 A1
20110197059 Klein et al. Aug 2011 A1
20110202676 Craig et al. Aug 2011 A1
20110208875 Hasson Aug 2011 A1
20110213911 Eldus et al. Sep 2011 A1
20110246800 Accpadi et al. Oct 2011 A1
20110258137 Pasta Oct 2011 A1
20110264736 Zuckerberg et al. Oct 2011 A1
20110273984 Husu et al. Nov 2011 A1
20110282997 Prince et al. Nov 2011 A1
20110314178 Kanode et al. Dec 2011 A1
20110321122 Mwangi et al. Dec 2011 A1
20120030341 Jensen et al. Feb 2012 A1
20120039341 Latif et al. Feb 2012 A1
20120041965 Vasquez et al. Feb 2012 A1
20120063314 Pignataro et al. Mar 2012 A1
20120066489 Ozaki et al. Mar 2012 A1
20120072586 Kurahashi Mar 2012 A1
20120079055 Robinson Mar 2012 A1
20120101952 Raleigh et al. Apr 2012 A1
20120117028 Gold et al. May 2012 A1
20120150805 Pafumi et al. Jun 2012 A1
20120166430 Bakalov Jun 2012 A1
20120191847 Nas et al. Jul 2012 A1
20120195273 Iwamura et al. Aug 2012 A1
20120224531 Karuturi et al. Sep 2012 A1
20120254293 Winter et al. Oct 2012 A1
20120257506 Bazlamacci et al. Oct 2012 A1
20120258766 Cho et al. Oct 2012 A1
20120311153 Morgan Dec 2012 A1
20120313963 Chen-Quee Dec 2012 A1
20120317266 Abbott Dec 2012 A1
20130029726 Berionne et al. Jan 2013 A1
20130031060 Lowery et al. Jan 2013 A1
20130047027 Hatasaki Feb 2013 A1
20130058229 Casado et al. Mar 2013 A1
20130091002 Christie et al. Apr 2013 A1
20130182713 Giacomoni et al. Jul 2013 A1
20130189936 Terrell et al. Jul 2013 A1
20130205361 Narayanaswamy et al. Aug 2013 A1
20130238472 Fan et al. Sep 2013 A1
20130336122 Baruah et al. Dec 2013 A1
20130345896 David Dec 2013 A1
20130347125 Rezlan Dec 2013 A1
20140059678 Parker Feb 2014 A1
20140071895 Bane et al. Mar 2014 A1
20140095661 Knowles et al. Apr 2014 A1
20140099945 Singh et al. Apr 2014 A1
20140105069 Potnuru Apr 2014 A1
20140136676 Chow et al. May 2014 A1
20140019605 Boberg et al. Jun 2014 A1
20140162705 de Wit et al. Jun 2014 A1
20140171089 Janakiraman et al. Jun 2014 A1
20140173127 Samuels Jun 2014 A1
20140173612 Haydock Jun 2014 A1
20140187199 Yan et al. Jul 2014 A1
20140229595 Burke et al. Aug 2014 A1
20140269484 Dankberg et al. Sep 2014 A1
20140286316 Park et al. Sep 2014 A1
20140317404 Carlson et al. Oct 2014 A1
20140372581 McLeish et al. Dec 2014 A1
20150049763 Michels Feb 2015 A1
20150058595 Gura et al. Feb 2015 A1
20160261478 Navasivasakthivelsamy Sep 2016 A1
Foreign Referenced Citations (23)
Number Date Country
2080530 Apr 1994 CA
0605088 Jul 1994 EP
0744850 Nov 1996 EP
1081918 Mar 2001 EP
06205006 Jul 1994 JP
8021924 Mar 1996 JP
2000183935 Jun 2000 JP
2004110345 Apr 2004 JP
9114326 Sep 1991 WO
9505712 Feb 1995 WO
9905829 Feb 1997 WO
9709805 Mar 1997 WO
9745800 Dec 1997 WO
9906913 Feb 1999 WO
9910858 Mar 1999 WO
9939373 Aug 1999 WO
9964967 Dec 1999 WO
0004422 Jan 2000 WO
0004458 Jan 2000 WO
0058870 Oct 2000 WO
200239696 May 2002 WO
03039101 May 2003 WO
2006091040 Aug 2006 WO
Non-Patent Literature Citations (74)
Entry
F5 Networks, Inc., “BIG-IP® TMOS® : Concepts”, Manual, Nov. 11, 2014, pp. 1-148, Version 11.5.
F5 Networks, Inc., “F5 TMOS Operation Guide”, Manual, Mar. 5, 2015, pp. 1-297.
F5 Networks, Inc., “BIG-IP® Application Security Manager™: Implementations”, Manual, Jan. 31, 2014, pp. 1-396, Version 11.5.
F5 Networks, Inc., “BIG-IP® TMOS®: Implementations”, Manual, Jan. 31, 2014, pp. 1-274, Version 11.5.
F5 Networks, Inc., “BIG-IP® Analytics: Implementations”, Manual, Jan. 31, 2014, pp. 1-50, Version 11.5.
“A Process for Selective Routing of Servlet Content to Transcoding Modules,” Research Disclosure 422124, Jun. 1999, pp. 889-890, IBM Corporation.
“Market Research & Releases, CMPP PoC documentation”, last accessed Mar. 29, 2010 (http://mainsteet/sites/PD/Teams/ProdMgmt/MarketResearch/Universal).
“Market Research & Releases, Solstice Diameter Requirements”, last accessed Mar. 29, 2010 (http://mainstreet/sites/PD/Teams/ProdMgmt/MarketResearch/Universal).
“Respond to server depending on TCP::client_port”, DevCentral Forums iRules, pp. 1-6, last accessed Mar. 26, 2010 (http://devcentral.f5.com/Default/aspx?tabid=53&fommid=5&tpage=1&v).
“Servlet/Applet/HTML Authentication Process With Single Sign-On,” Research Disclosure 429128, Jan. 2000, pp. 163-164, IBM Corporation.
“Traffic Surges; Surge Queue; Netscaler Defense,” 2005, PowerPoint Presentation, slides 1-12, Citrix Systems, Inc.
“UDDI Overview”, Sep. 6, 2000 pp. 1-21, uddi.org (http://www.uddi.org/).
“UDDI Technical White Paper”, Sep. 6, 2000, pp. 1-12, uddi-org. (http://www.uddi.org/).
“UDDI Version 3.0.1”, UDDI Spec Technical Committee Specification, Oct. 14, 2003, pp. 1-383, uddi.org. (http://www.uddi.org/).
Baer, T., et al., “The elements of Web services” ADTmag.com, Dec. 1, 2002, pp. 1-6 (http://www.adtmag.com).
Blue Coat, “Technology Primer: CIFS Protocol Optimization,” Blue Coat Systems Inc., 2007, last accessed: Dec. 9, 2013, pp. 1-3, (http://www.bluecoat.com).
Chase J., et al., “Balance of Power: Energy Management for Server Clusters”, In Proceedings of the 8th Workshop on Hot Topics in Operating Systems, 2001, pp. 1-6.
Crescendo Networks, “Application Layer Processing (ALP)”, 2003-2009, pp. 168-186, Chapter 9, CN-5000E/5500E, Foxit Software Company.
Dean et al., “MapReduce: Simplified Data Processing on Large Clusters,” pp. 1-13 (2004).
Diameter MBLB Support Phase 2: Generic Message Based Loan Balancing (BMGLG), last accessed Mar. 29, 2010, pp. 1-10, (http://peterpan.f5net.com/twiki/bin/view/TMOS/TMOSDiameterMBLB).
F5 Networks Inc., “3-DNS® Reference Guide, version 4.5”, F5 Networks Inc., Sep. 2002, pp. 2-1-2-28, 3-1-3-12, 5-1-5-24, Seattle, Washington.
F5 Networks Inc., “BIG-IP® Reference Guide, version 4.5”, F5 Networks Inc., Sep. 2002, pp. 11-1-11-32, Seattle, Washington.
F5 Networks Inc., “Case Information Log for ‘Issues with BoNY upgrade to 4.3’”, as early as Feb. 2008.
F5 Networks Inc., “Configuration Guide for Local Traffic Management,” F5 Networks Inc., Jan. 2006, version 9.2.2, 406 pgs.
F5 Networks Inc., “Deploying the BIG-IP LTM for Diameter Traffic Management”, F5® Deployment Guide, Publication date Sep. 2010, version 1.2, pp. 1-19.
F5 Networks Inc., “F5 Diameter RM”, Powerpoint document, Jul. 16, 2009, pp. 1-7.
F5 Networks Inc., “F5 WANJet CIFS Acceleration”, White Paper, F5 Networks Inc., Mar. 2006, pp. 1-5, Seattle, Washington.
F5 Networks Inc., “Routing Global Internet Users to the Appropriate Data Center and Applications Using F5's 3-DNS Controller”, F5 Networks Inc., Aug. 2001, pp. 1-4, Seattle, Washington (http://www.f5.com/f5products/3dns/relatedMaterials/UsingF5.html).
F5 Networks Inc., “Using F5's-DNS Controller To Provide High Availability Between Two or More Data Centers”, F5 Networks Inc., Aug. 2001, pp. 1-4, Seattle, Washington, (http://www.f5.com/f5roducts/3dns/relatedMaterials/3DNSRouting.html).
F5 Networks, Inc., BIG-IP ASM 11.5.0, Release Notes, Apr. 12, 2016, Version 11.5.0.
F5 Networks, Inc., “BIG-IP Local Traffic Manager: Implementations”, Manual, pp. 1-270, Version 11.5.1 (Jul. 8, 2015).
F5 Networks, Inc., “BIG-IP TMOS: Implementations” Manual, Mar. 19, 2015, pp. 1-288, Version 11.5.1.
F5 Networks, Inc., “BIG-IP TMOS: IP Routing Administration”, Manual, Version 11.5.1, 60 pages (Sep. 10, 2015).
F5 Networks, Inc., “BIG-IP® Analytics: Implementations”, Manual, pp. 1-50, Version 11.5 (Aug. 25, 2015).
F5 Networks, Inc., “BIG-IP® Application Security Manager™: Implementations”, Manual, pp. 1-396, Version 11.5 (Jan. 27, 2014).
F5 Networks, Inc., “BIG-IP® TMOS®: Concepts”, Manual, pp. 1-148, Version 11.5 (May 1, 2014).
F5 Networks, Inc., “BIG-IP® TMOS®: Implementations”, Manual, pp. 1-274, Version 11.5 (Sep. 2, 2014).
F5 Networks, Inc., “BIP-IP Controller with Exclusive OneConnect Content Switching Feature Provides a Breakthrough System for Maximizing Server and Network Performance,” Press Release, May 8, 2001, 2 ages, Las Vegas, Nevada.
F5 Networks, Inc., “F5 TMOS Operations Guide”, Manual, 279 pages (Nov. 2015).
F5 Networks, Inc., “BIG-IP Local Traffic Manager & BIG-IP DNS Operations Guide,” 136 pages (Nov. 2015).
Fajardo V., “Open Diameter Software Architecture,” Jun. 25, 2004, pp. 1-6, Version 1.0.7.
Fielding et al., “Hypertext Transfer Protocol—HTTP/1.1,” Network Working Group, RFC: 2068, Jan. 1997, pp. 1-162.
Fielding et al., “Hypertext Transfer Protocol—HTTP/1.1,” Network Working Group, RFC: 2616, Jun. 1999, pp. 1-176.
Floyd et al., “Random Early Detection Gateways for Congestion Avoidance,” Aug. 1993, pp. 1-22, IEEE/ACM Transactions on Networking, California.
Gupta et al., “Algorithms for Packet Classification”, Computer Systems Laboratory, Stanford University, CA, Mar./Apr. 2001, pp. 1-29.
Heinz G., “Priorities in Stream Transmission Control Protocol (SCTP) Multistreaming”, Thesis submitted to the Faculty of the University of Delaware, Spring 2003, pp. 1-35.
Hochmuth, Phil, “F5, CacheFlow pump up content-delivery lines,” Network World Fusion, May 4, 2001, 1 page, Las Vegas, Nevada.
Ilvesjmaki M., “On the capabilities of application level traffic measurements to differentiate and classify internet traffic”, Presented in SPIE's International Symposium ITcom, Aug. 19-21, 2001, pp. 1-11, Denver, Colorado.
International Search Report and Opinion, PCT/US2012/022996, dated May 30, 2012.
International Search Report and Written Opinion, for International Patent Application No. PCT/US2011/058469, dated May 30, 2012.
International Search Report for International Patent Application No. PCT/US2013/026615 (dated Jul. 4, 2013).
Internet protocol, “Darpa Internet Program Protocol Specification” (RFC:791), Information Sciences Institute, University of Southern California, Sep. 1981, pp. 1-49.
Kawamoto D., “Amazon files for Web services patent”, CNET News.com, Jul. 28, 2005, pp. 1-2 (http://news.com).
LaMonica M., “Infravio spiffs up Web services registry idea”, CNET News.com, May 11, 2004, pp. 1-2 (http://www.news.com).
Macvittie, Lori, “Message-Based Load Balancing,” Technical Brief, Jan. 2010, pp. 1-9, F5 Networks, Inc.
Macvittie, Lori, “Message-Based Load Balancing: Using F5 solutions to address the challenges of scaling Diameter, Radius, and message-oriented protocols”, F5 Technical Brief, 2005, pp. 1-9, F5 Networks Inc., Seattle, Washington.
MapReduce Links, retrieved at http://www.dbms2.com/2008/08/25/mapreduce-links/ (Aug. 25, 2008).
Modiano E., “Scheduling Algorithms for Message Transmission over a Satellite Broadcast System,” MIT Lincoln Laboratory Advanced Network Group, Nov. 1997, pp. 1-7.
Nichols K., et al., “Definition of the Differentiated Services Field (DS Field) in the IPv4 and the IPv6 Headers”, (RFC:2474) Network Working Group, Dec. 1998 pp. 1-19 (http://www.ietf.org/rfc2474.txt).
Ott D., et al. “A Mechanism for TCP-Friendly Transport-level Protocol Coordination”, USENIX Annual Technical Conference, Jun. 10, 2002, University of North Carolina at Chapel Hill, pp. 1-12.
Padmanabhan V., et al., “Using Predictive Prefetching to Improve World Wide Web Latency”, SIGCOM, Jul. 1, 1996, pp. 1-15.
Rosen E., et al., “MPLS Label Stack Encoding”, (RFC:3032) Network Working Group, Jan. 2001, pp. 1-22 (http://www.ietf.org/rfc/rfc3032.txt).
Schilit B., “Bootstrapping Location-Enhanced Web Services”, University of Washington, Dec. 4, 2003 (http://www.cs.washington.edu/news/colloq.info.html).
Seeley R., “Can Infravio technology revive UDDI?”, ADTmag.com, Oct. 22, 2003 (http://www.adtmag.com).
Shohoud, Y., Building XML Web Services with VB .net and VB 6:, Addison Wesley, Sep. 2002, pp. 1-14.
Sleeper B., “The Evolution of UDDI”, UDDI.org White Paper, The Stencil Group, Inc., Jul. 19, 2002, pp. 1-15, San Francisco, California.
Sleeper, B., “Why UDDI Will Succeed, Quietly: Two Factors Push Web Services Forward”, The Stencil Group, Inc., Apr. 2001, pp. 1-7, San Francisco, California.
Sommers F., “Whats New in UDDI 3.0—Part 1”, Web Services Papers, Jan. 27, 2003, pp. 1-4 (http://www.webservices.org/index/php/article/articleprint/871/-1/24/).
Sommers F., “Whats New in UDDI 3.0—Part 2”, Web Services Papers, Mar. 2, 2003, pp. 1-8 (http://www.web.archive.org/web/20040320131006/).
Sommers F., “Whats New in UDDI 3.0—Part 3”, Web Services Papers, Sep. 2, 2003, pp. 1-4 (http://www.webservices.org/index.php/article/articleprint/894/-1/24/).
U.S. Appl. No. 13/771,538 to Michels et al., filed Feb. 20, 2013.
Wang, B., “Priority and realtime data transfer over the best-effort Internet”, Dissertation Abstract, ScholarWorks@UMASS, Sep. 2005, pp. I-xiv and pp. 1-9.
Wikipedia, “Diameter (protocol)”, pp. 1-11, last accessed Oct. 27, 2010 (http://en.wikipedia.og/wiki.Diameter_(protocol)).
Woo T.Y.C., “A Modular Approach to Packet Classification: Algorithms and Results”, Nineteenth Annual Conference of the IEEE Computer and Communications Societies 3(3): 1213-22, Mar. 26-30, 2000, abstract only (http://ieeexploe.ieee.og/xpl/freeabs_all.isp?arnumber-832499).
Provisional Applications (1)
Number Date Country
62156973 May 2015 US