This application names the following inventors:
This application names the following assignee: Xangati, a business having an office in Cupertino, Calif.
This application claims priority from U.S. Provisional Application No. 61/182,242, filed May 29, 2009, entitled “Recording, Replay, and Sharing of Live Network Monitoring Views,” in the name of Kishor Kakatkar, Roy Nakashima, Rosanna K. Lee, Jing Liu, Derek A. Sanders, Rangaswamy Jagannathan, and David Messina.
This patent application is intended to be read with the following documents:
Each and every one of these documents including all drawings, figures, and subparts, is hereby incorporated by reference as if fully set forth herein. These documents are sometimes referred to herein, either as an entire set or a subset thereof, as the “Incorporated Disclosure” or “Incorporated Disclosures.”
Monitoring of network data tells network administrators how the network is operating, and whether there are network problems which should be addressed. Network problems should be identified almost immediately as they happen, so that network administrators can take appropriate action. For example, some network problems might indicate that the network has been infected with a virus, is under a denial-of-service attack, or is suffering from other (e.g., non-security-related) reasons, for example and without limitation, that a network communication link has failed or degraded, or that a network endpoint has failed or degraded. Known systems sometimes alert network administrators when a network problem is detected. For example and without limitation, a network administrators might be alerted using direct communication, such as by email or pager, by using network management systems, such as by using a network management system, e.g., a system log or a selected set of SNMP traps. While these known systems generally achieve the purpose of providing a rapid alert, the alerted network administrators then work with a network problem that has already occurred, rather than one which is occurring while the network administrators are able to watch it unfold.
A set of techniques provides methods by which live network monitoring views can be recorded, replayed and shared. A network monitoring system receives network monitoring data, in response to which a network monitoring view can be constructed. The network monitoring data is maintained in memory or mass storage, with the effect that one or more network monitoring views can later be constructed in response to user preferences, even if those users would not have known to select those particular preferences or construct those particular network monitoring views at the time.
The network monitoring views constructed in response to that network monitoring data can be presented to users in a simulation of the network problem, as if it were occurring at that time, with the effect that users can visualize and trouble-shoot operation of network problems even if those users were not present at the time those network problems occurred. This might be thought of as a recorded video stream, such as presentable on YouTube or a similar service, except that these views are far more versatile, in that they are dynamically adjustable (and in response to parameters which might not have been thought of at the time the video stream was recorded), and are presented as if they were occurring “live” for the user, e.g., a network administrator. Users can send particular network monitoring views to others, with both the effects that (1) the network monitoring view can be preserved as part of a trouble report, and (2) the persons receiving the network monitoring view can have useful insight into what problem the user has pointed to. After reading this application, those skilled in the art would appreciate that these effects would allow a network administrator to view (and repeatedly re-view) the network problem “as if” it were occurring in real time. For example and without limitation, these re-views “as if” they were occurring in real time would allow a network administrator to gain significant insight into whatever problem there might have been, by repeatedly examining the problem as it unfolds in “real time” and watching for particular types of features or symptoms, which might be associated with particular types of network problem.
The following definitions are generally applicable herein:
These definitions should be regarded as exemplary and not in any way limiting.
A system 100 includes elements as shown in the
The system 100 operates as described in the Incorporated Disclosure, which describes in further and other detail at least the operation of these elements. In particular, the Incorporated Disclosure describes in further and other detail multiple phases of operation of the system 100.
In particular, the Incorporated Disclosure describes in further and other detail, at least the following:
The UI engine 121 and the database engine 122 provide network personnel for live viewing and recording, and later playback and sharing, of information relating to the operation of the system 100. For example and without limitation, such information might include recordings of endpoints, applications, locations, and flow interfaces, as well as applicable pairs or triplets thereof. After reading this application, those skilled in the art will note that the information maintained by the database engine 122 is sufficient to replay, as if “live”, system problems as if they were occurring, and with the added feature of being able to review particular endpoints (and the like), and pairs and triplets thereof, during the replay of those system problems, even though network personnel might not have thought to include presentation of that information, or might not have had access to that information, at the time of the original system problem. Thus, the system 100 provides not just the ability to view and record system operation, but also provides the ability to enhance those recordings of system operation with then-current information that was not, in fact, then-available to network personnel.
A user interface 200 includes at least a network slider bar 210, which provides network personnel with the ability to pause, back up, replay, fast forward, and other functions, with respect to a network monitoring view, whether that network monitoring view is one relating to a current state of the system 100 or one relating to a past state of the system 100.
The user interface 200 also includes a set of (optionally multiple) views of information relating to the system 100. For example and without limitation, these views might include:
For a first example and without limitation, data for the entire network view might be generated by the monitoring engine 112, published using the virtual bus 120, and consumed directly by the UI engine 121.
For a second example and without limitation, data for the entire network view might be generated by the monitoring engine 112, published using the virtual bus 120, and recorded by the database engine 122 for later use.
For a third example and without limitation, data for the entire network view might be generated by the monitoring engine 112, published using the virtual bus 120, and consumed by the correlation engine 123, such as to determine correlations of interest to network administrators.
For a fourth example and without limitation, data for the entire network view might be generated by the monitoring engine 112, published using the virtual bus 120, and consumed by the notification engine 124, which might itself make use of the UI engine 121 to present notifications to network administrators or other personnel.
The user interface 200 also includes a set of (optionally multiple) views of information relating to portions of the system 100, not equal to the entire system 100. For example and without limitation, these views might include:
Further and other specific information that might be collected by the monitoring engine 112 is described in further and other detail in the Incorporated Disclosures, described below, and hereby incorporated by reference as if fully set forth herein.
Visual Trouble Tickets
As noted above, network monitoring views can be manipulated by network administrators (or other authorized personnel) using a network slider bar 210 (described above with respect to the
When a user (or administrator, or other authorized personnel), identifies a problem, it might be desirable for that user to report the problem using a “trouble ticket”, i.e., a report to network administrators of the existence of the problem, and some preferably detailed description of how the problem occurred and what the problem caused. In one embodiment, the user can send the associated network monitoring data, which thus identifies the problem using a “visual” trouble ticket. For example and without limitation, a “visual” trouble ticket might allow a recipient to re-view (possibly over and over) the problem as it occurred in “real time” (i.e., a simulation thereof), with the effect that users can visualize and trouble-shoot operation of the network “as if” the problem were unfolding before them in “real time”.
Sharing Recordings
Similarly to visual trouble tickets, a user might find it desirable for to share a network monitoring view of a past state of the system, with the effect that a recipient would be able to re-view (possibly over and over) the past state as it occurred in “real time” (i.e., a simulation thereof), with the effect that users can visualize and trouble-shoot operation of the network “as if” the problem were unfolding before them in “real time”.
For example and without limitation, a user or a recipient might have interest in one or more of, or some combination or conjunction of, the following:
a particular behavior of the network, which might or might not adequately adhere to a specification of the network approved by management;
a particular behavior of the network, which might or might not reflect the existence of a software anomaly or a software bug in network management;
a particular behavior of the network, which might be useful as evidence of behavior of the network during some past time epoch—for example and without limitation, the particular behavior of the network might be evidence of manipulation of the network by an unauthorized party;
a particular behavior of the network, which might be useful to identify a change in network behavior with addition (or deletion) of a selected feature or a selected software routine.
For example and without limitation, in each such case the user can send the associated network monitoring data, which thus identifies the problem in a way that might allow a recipient to replay the behavior of the network “as if” that behavior were occurring in “real time”.
Generality of Invention
This application should be read in the most general possible form. This includes, without limitation, the following:
The invention is not limited to the specifics of any particular embodiments and examples disclosed herein. Many other variations are possible which remain within the content, scope and spirit of the invention, and these variations would become clear to those skilled in the art after perusal of this application.
After reading this application, those skilled in the art would recognize that the scope and spirit of the invention includes other and further embodiments beyond the specifics of those disclosed herein, and that such other and further embodiments would not require new invention or undue experimentation.
Number | Name | Date | Kind |
---|---|---|---|
5128871 | Schmitz | Jul 1992 | A |
5233604 | Ahmadi et al. | Aug 1993 | A |
5271038 | Cai | Dec 1993 | A |
5430709 | Galloway | Jul 1995 | A |
5442750 | Harriman, Jr. et al. | Aug 1995 | A |
5684945 | Chen et al. | Nov 1997 | A |
5687168 | Iwata | Nov 1997 | A |
5779030 | Ikegami et al. | Jul 1998 | A |
5917870 | Wolf | Jun 1999 | A |
5958053 | Denker | Sep 1999 | A |
5970064 | Clark et al. | Oct 1999 | A |
5991881 | Conklin et al. | Nov 1999 | A |
6046979 | Bauman | Apr 2000 | A |
6076115 | Sambamurthy et al. | Jun 2000 | A |
6115745 | Berstis et al. | Sep 2000 | A |
6128296 | Daruwalla et al. | Oct 2000 | A |
6167025 | Hsing et al. | Dec 2000 | A |
6189035 | Lockhart et al. | Feb 2001 | B1 |
6202084 | Kumar et al. | Mar 2001 | B1 |
6314093 | Mann et al. | Nov 2001 | B1 |
6314464 | Murata et al. | Nov 2001 | B1 |
6347339 | Morris et al. | Feb 2002 | B1 |
6400681 | Bertin et al. | Jun 2002 | B1 |
6502135 | Minger et al. | Dec 2002 | B1 |
6529866 | Cope et al. | Mar 2003 | B1 |
6611525 | Natanson et al. | Aug 2003 | B1 |
6697802 | Ma | Feb 2004 | B2 |
6725377 | Kouznetsov | Apr 2004 | B1 |
6757742 | Viswanath | Jun 2004 | B1 |
6785237 | Sufleta | Aug 2004 | B1 |
6789190 | Cohen | Sep 2004 | B1 |
6807172 | Levenson et al. | Oct 2004 | B1 |
6816910 | Ricciulli | Nov 2004 | B1 |
6930978 | Sharp et al. | Dec 2005 | B2 |
6973040 | Ricciulli | Dec 2005 | B1 |
6990591 | Pearson | Jan 2006 | B1 |
7006443 | Storr | Feb 2006 | B2 |
7007301 | Crosbie et al. | Feb 2006 | B2 |
7013482 | Krumel | Mar 2006 | B1 |
7051369 | Baba | May 2006 | B1 |
7062782 | Stone et al. | Jun 2006 | B1 |
7076547 | Black | Jul 2006 | B1 |
7089428 | Farley et al. | Aug 2006 | B2 |
7260840 | Swander et al. | Aug 2007 | B2 |
7331060 | Ricciulli | Feb 2008 | B1 |
7376969 | Njemanze | May 2008 | B1 |
7386888 | Liang et al. | Jun 2008 | B2 |
7409714 | Gupta et al. | Aug 2008 | B2 |
7461403 | Libenzi et al. | Dec 2008 | B1 |
7506046 | Rhodes | Mar 2009 | B2 |
7594260 | Porras et al. | Sep 2009 | B2 |
7607170 | Chesla | Oct 2009 | B2 |
7620986 | Jagannathan et al. | Nov 2009 | B1 |
7702563 | Balson et al. | Apr 2010 | B2 |
7895320 | Oggerino et al. | Feb 2011 | B1 |
7941135 | Abusch-Magder | May 2011 | B2 |
7987228 | McKeown et al. | Jul 2011 | B2 |
8738761 | Raisoni | May 2014 | B2 |
9716638 | Sanders et al. | Jul 2017 | B1 |
9935858 | Sanders et al. | Apr 2018 | B1 |
10009237 | Sanders et al. | Jun 2018 | B1 |
20010049711 | Nishihara | Dec 2001 | A1 |
20010052087 | Garg et al. | Dec 2001 | A1 |
20020052967 | Goldhor et al. | May 2002 | A1 |
20020131413 | Tsao et al. | Sep 2002 | A1 |
20020152284 | Cambray | Oct 2002 | A1 |
20020164999 | Johnson | Nov 2002 | A1 |
20030202471 | Murooka et al. | Oct 2003 | A1 |
20030229485 | Nishikawa et al. | Dec 2003 | A1 |
20030229692 | Vo | Dec 2003 | A1 |
20040052209 | Ortiz | Mar 2004 | A1 |
20040054925 | Etheridge et al. | Mar 2004 | A1 |
20040064293 | Hamilton et al. | Apr 2004 | A1 |
20040111358 | Lange et al. | Jun 2004 | A1 |
20040117769 | Lauzon et al. | Jun 2004 | A1 |
20050099983 | Nakamura et al. | May 2005 | A1 |
20050171960 | Lomet | Aug 2005 | A1 |
20050190695 | Phaal et al. | Sep 2005 | A1 |
20050213504 | Enomoto et al. | Sep 2005 | A1 |
20050276230 | Akahane et al. | Dec 2005 | A1 |
20050278779 | Koppol et al. | Dec 2005 | A1 |
20060059282 | Chaudhary et al. | Mar 2006 | A1 |
20060077905 | Russell et al. | Apr 2006 | A1 |
20060077981 | Rogers | Apr 2006 | A1 |
20060109793 | Kim | May 2006 | A1 |
20060195896 | Fulp et al. | Aug 2006 | A1 |
20060272018 | Fouant et al. | Nov 2006 | A1 |
20070014248 | Fowlow | Jan 2007 | A1 |
20070019557 | Catter | Jan 2007 | A1 |
20070156919 | Potti et al. | Jul 2007 | A1 |
20070195787 | Alnuweiri et al. | Aug 2007 | A1 |
20070211645 | Tachibana et al. | Sep 2007 | A1 |
20070211697 | Noble | Sep 2007 | A1 |
20070237079 | Whitehead | Oct 2007 | A1 |
20070245015 | Raisoni | Oct 2007 | A1 |
20070245051 | Raisoni et al. | Oct 2007 | A1 |
20070248029 | Merkey et al. | Oct 2007 | A1 |
20070271374 | Shomura et al. | Nov 2007 | A1 |
20080046104 | Van Camp | Feb 2008 | A1 |
20080049628 | Bugenhagen | Feb 2008 | A1 |
20080049639 | Wiley et al. | Feb 2008 | A1 |
20080049748 | Bugenhagen et al. | Feb 2008 | A1 |
20080052387 | Heinz et al. | Feb 2008 | A1 |
20080219267 | Xia et al. | Sep 2008 | A1 |
20080225746 | Bedrosian | Sep 2008 | A1 |
20080291915 | Foschiano | Nov 2008 | A1 |
20090046664 | Aso | Feb 2009 | A1 |
20090182953 | Merkey et al. | Jul 2009 | A1 |
20100135180 | Morinaga et al. | Jun 2010 | A1 |
20100309812 | Galan Marquez et al. | Dec 2010 | A1 |
20110040706 | Sen et al. | Feb 2011 | A1 |
20110060831 | Ishii et al. | Mar 2011 | A1 |
20110250883 | Pyhtila et al. | Oct 2011 | A1 |
Entry |
---|
Deering et al. “RFC1883”, Internet Protocol Specification, Dec. 1995, pp. 1-27, ver. 6, <http://www.faqs.org/rfcs/frc1883.html>. |
Steinke “IP Addresses and Subnet Masks,” Network Magazine, Oct. 1995, pp. 1-3, Tables 1 and 3, <hppt://www.networkmagazine.com/shared/printableArticle.jhtml?articleID=17601068>. |
Number | Date | Country | |
---|---|---|---|
20210067426 A1 | Mar 2021 | US |
Number | Date | Country | |
---|---|---|---|
61182242 | May 2009 | US |