Claims
- 1. A method for system for identifying network traffic flows in order to provide end-to-end quality of service measurements in a distributed network environment, the method comprising:
receiving a first observed data packet and applying a first timestamp thereto; identifying an invariant portion of the first observed data packet; applying a hash function to the invariant portion of the first observed data packet to produce a first hash key; comparing the first hash key to a second hash key produced by applying the hash function to another observed data packet; and if the first hash key matches the second hash key, comparing the first timestamp of the first observed data packet with a second time stamp of the second observed data packet in order to calculate network latency.
- 2. The method of claim 1, wherein the hash function is a cyclic redundancy check mechanism.
- 3. The method of claim 1, further including classifying the first observed data packet as belonging to a first traffic flow, wherein the other data packet also is classified as belonging to the first data traffic flow.
- 4. The method of claim 1, further including determining if the first observed data packet is a final data packet in a traffic flow or conversation.
- 5. The method of claim 1, further including receiving additional attributes associated with the first observed data packet.
- 6. The method of claim 5, further including comparing the additional attributes of the first observed data packet to additional attributes associated with the other data packet.
- 7. A method for system for identifying network traffic flows in order to provide end-to-end quality of service measurements in a distributed network environment, the method comprising:
applying a hash function to a first invariant combination of a first conversation instance to produce a first hash key; recording one or more additional attributes associated with the first invariant of the first conversation instance; associating the first hash key with the timestamps of selected data packets of the first conversation instance and the one or more additional attributes; comparing the first hash key to a second hash key produced by applying the hash function to a second invariant combination from a second conversation instance; if the first hash key matches the second hash key, comparing the one or more additional attributes of the first conversation instance with one more corresponding attributes associated with the second conversation instance; and if the one or more additional attributes match the one more corresponding attributes, comparing the timestamps associated with the first hash key to corresponding timestamps associated with the second hash key in order to calculate network latencies.
- 8. The method of claim 7, wherein the hash function is a cyclic redundancy check mechanism.
- 9. The method of claim 7, wherein the additional attributes include at least one of the number of bytes of data in the conversation instance and number of packets in the conversation instance.
- 10. The method of claim 7, wherein the first conversation instance and the second conversation instance are received at two distinct network monitoring devices.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims benefit of co-pending U.S. Provisional Application No. 60/369,101, filed Mar. 29, 2002, which is entirely incorporated herein by reference. In addition, this application is related to the following co-pending, commonly assigned U.S. applications, each of which is entirely incorporated herein by reference: “Systems and Methods for End-to-End Quality of Service Measurements In A Distributed Network Environment” filed Mar. 31, 2003, and accorded Publication No. ______; and “Forward Looking Infrastructure Re-Provisioning” filed Mar. 31, 2003, and accorded Publication No.______.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60369101 |
Mar 2002 |
US |