The present application generally relates to network diagnostics. In particular, the present application relates to systems and methods for alerting administrators of upcoming or possible network outages in a specific location.
In various computing environments, network connectivity may be necessary to provide basic functionalities. At times, networks may experience issues which may lead to network outages or degraded user experiences.
In various computing environment deployments, an enterprise may include various data centers and branch offices. Each branch office may include one or more networks in which endpoints connect. At times, issues may arise related to the network(s) in the branch offices that may lead to outages or degraded user experiences. According to the systems and methods described herein, a server may collect, ingest, or otherwise receive metrics from endpoints associated with the enterprise, and proactively warn administrator devices regarding degradation of networks in any branch offices, to eliminate or avoid potential network outages. The server may receive metrics from a workspace application executing on the endpoints. The workspace application may facilitate connection with various resources at the endpoints. For example, the workspace application may provide a user with access to remotely-hosted resources (such as applications, programs, data, etc.), local resources, and the like. As such, the workspace application may be uniquely suitable for providing metrics relating to network performance at the endpoint upon with the workspace application is executing. The metrics may include, for instance, network speed (i.e., download speed), bandwidth information, and internet service provider (ISP) information, among other metrics. The systems and methods described herein may correlate the metrics with potential outages and/or degradations in network performance to generate alerts before such issues occur.
According to the systems and methods described herein, the server may compute a network performance score, measure, or other value based on the metrics received from the endpoints. The network performance value may be or include a daily or weekly average of the metrics (or a value computed based on the metrics). The server may compare the network performance value to a threshold. The threshold may be, for example, a threshold percentage drop in performance from a historical or past average. The systems and methods described herein may automatically generate an alert or notification for a computing device associated with administrator, indicating a potential network outage or degradation in performance.
According to the systems and methods described herein, the server may leverage workspace applications, which may be ubiquitous in various enterprises and at branch locations, for providing metrics relating to network performance of network(s) at the branch locations. The metrics may be received at various intervals throughout the day, which may provide granularity in the metrics. By providing more granularity in the metrics, the systems and methods described herein may detect degradation in network performance in near real-time and correspondingly generating alerts relating to the network performance. Various other advantages of the present solution are described in greater detail below.
In one aspect, this disclosure is directed to a method. The method includes receiving, by one or more servers from a plurality of workspace applications of a plurality of endpoints across a plurality of different locations of an enterprise, metrics for usage of one or more networks for each workspace application. The method includes determining, by the one or more servers according to the metrics for each workspace application, a network download speed for each location of the plurality of different locations. The method includes generating, by the one or more servers, an alert to be provided to a device of a user associated with a first location of the plurality of different locations responsive to the network download speed for a network of the one or more networks falling below a threshold.
In some embodiments, the workspace applications execute on endpoints to provide a user of the endpoint access to a plurality of local or remote resources. In some embodiments, the metrics include an average network download speed for a current time interval, and the threshold includes a percentage drop of the average network download speed for the current time interval from an average network download speed for a previous time interval. In some embodiments, the metrics include network download speed and at least one of a network name, an address, a network interface type, or an internet service provider for the respective networks. In some embodiments, the method further includes computing, by the one or more servers, a performance score based on the metrics including the network download speed, wherein the alert is generated responsive to the performance score falling below the threshold. In some embodiments, the network interface type includes at least one of an Ethernet network interface, a Wi-Fi network interface, a token-ring network interface, a fiber distributed data interface (FDDI) network interface, a point-to-point (PPP) network interface, a loopback network interface, or a serial line internet protocol (SLIP) network interface.
In some embodiments, the alert indicates at least one of an existing network interruption or a potential network interruption. In some embodiments, at least some of the metrics are received from a plurality of probe services executing at the respective network locations. In some embodiments, at least some of the plurality of networks including the network are located at a common geographic location, and the alert indicates that the first network located at the common geographic location is experiencing an degradation in network connectivity. In some embodiments, the method further includes causing, by the one or more servers, an endpoint connected to the network to render a notification indicating a degradation in network connectivity.
In another aspect, this disclosure is directed to a system. The system includes one or more processors configured to receive, from a plurality of workspace applications of a plurality of endpoints across a plurality of different locations of an enterprise, metrics for usage of one or more networks for each workspace application. The one or more processors are further configured to determine, according to the metrics for each workspace application, a network download speed for each location of the plurality of different locations. The one or more processors are further configured to generate an alert to be provided to a device of a user associated with a first location of the plurality of different locations responsive to the network download speed for a network of the one or more networks falling below a threshold.
In some embodiments, the workspace applications execute on endpoints to provide a user of the endpoint access to a plurality of local or remote resources. In some embodiments, the metrics include an average network download speed for a current time interval, and the threshold includes a percentage drop of the average network download speed for the current time interval from an average network download speed for a previous time interval. In some embodiments, the metrics include network download speed and at least one of a network name, an address, a network interface type, or an internet service provider for the respective networks. In some embodiments, the one or more processors are further configured to compute a performance score based on the metrics including the network download speed, wherein the alert is generated responsive to the performance score falling below the threshold.
In some embodiments, the network interface type includes at least one of an Ethernet network interface, a Wi-Fi network interface, a token-ring network interface, a fiber distributed data interface (FDDI) network interface, a point-to-point (PPP) network interface, a loopback network interface, or a serial line internet protocol (SLIP) network interface. In some embodiments, the alert indicates at least one of an existing network interruption or a potential network interruption. In some embodiments, at least some of the metrics are received from a plurality of probe services executing at the respective network locations. In some embodiments, at least some of the plurality of networks including the network are located at a common geographic location, and the alert indicates that the first network located at the common geographic location is experiencing an degradation in network connectivity.
In yet another aspect, this disclosure is directed to a non-transitory computer readable medium which stores instructions. The instructions, when executed by one or more processors, cause the one or more processors to receive, from a plurality of workspace applications of a plurality of endpoints across a plurality of different locations of an enterprise, metrics for usage of one or more networks for each workspace application. The instructions further cause the one or more processors to determine, according to the metrics for each workspace application, a network download speed for each location of the plurality of different locations. The instructions further cause the one or more processors to generate an alert to be provided to a device of a user associated with a first location of the plurality of different locations responsive to the network download speed for a network of the one or more networks falling below a threshold.
The foregoing and other objects, aspects, features, and advantages of the present solution will become more apparent and better understood by referring to the following description taken in conjunction with the accompanying drawings, in which:
The features and advantages of the present solution will become more apparent from the detailed description set forth below when taken in conjunction with the drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.
In various computing environment deployments, an enterprise may include various data centers and branch offices. Each branch office may include one or more networks in which endpoints connect. At times, issues may arise related to the network(s) in the branch offices that may lead to outages or degraded user experiences. According to the systems and methods described herein, a server may collect, ingest, or otherwise receive metrics from endpoints associated with the enterprise, and proactively warn administrator devices regarding degradation of networks in any branch offices, to eliminate or avoid potential network outages. The server may receive metrics from a workspace application executing on the endpoints. The workspace application may facilitate connection with various resources at the endpoints. For example, the workspace application may provide a user with access to remotely-hosted resources (such as applications, programs, data, etc.), local resources, and the like. As such, the workspace application may be uniquely suitable for providing metrics relating to network performance at the endpoint upon with the workspace application is executing. The metrics may include, for instance, network speed (i.e., download speed), bandwidth information, and internet service provider (ISP) information, among other metrics. The systems and methods described herein may correlate the metrics with potential outages and/or degradations in network performance to generate alerts before such issues occur.
According to the systems and methods described herein, the server may compute a network performance score, measure, or other value based on the metrics received from the endpoints. The network performance value may be or include a daily or weekly average of the metrics (or a value computed based on the metrics). The server may compare the network performance value to a threshold. The threshold may be, for example, a threshold percentage drop in performance from a historical or past average. The systems and methods described herein may automatically generate an alert or notification for a computing device associated with administrator, indicating a potential network outage or degradation in performance.
According to the systems and methods described herein, the server may leverage workspace applications, which may be ubiquitous in various enterprises and at branch locations, for providing metrics relating to network performance of network(s) at the branch locations. The metrics may be received at various intervals throughout the day, which may provide granularity in the metrics. By providing more granularity in the metrics, the systems and methods described herein may detect degradation in network performance in near real-time and correspondingly generating alerts relating to the network performance. Various other advantages of the present solution are described in greater detail below.
For purposes of reading the description of the various embodiments below, the following descriptions of the sections of the specification and their respective contents may be helpful:
Section A describes a computing environment which may be useful for practicing embodiments described herein;
Section B describes resource management services for managing and streamlining access by clients to resource feeds; and
Section C describes systems and methods for proactively alerting admins of upcoming or possible network outages in a specific location.
Prior to discussing the specifics of embodiments of the systems and methods of an appliance and/or client, it may be helpful to discuss the computing environments in which such embodiments may be deployed.
As shown in
Computer 100 as shown in
Communications interfaces 135 may include one or more interfaces to enable computer 100 to access a computer network such as a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or the Internet through a variety of wired and/or wireless or cellular connections.
In described embodiments, the computing device 100 may execute an application on behalf of a user of a client computing device. For example, the computing device 100 may execute a virtual machine, which provides an execution session within which applications execute on behalf of a user or a client computing device, such as a hosted desktop session. The computing device 100 may also execute a terminal services session to provide a hosted desktop environment. The computing device 100 may provide access to a computing environment including one or more of: one or more applications, one or more desktop applications, and one or more desktop sessions in which one or more applications may execute.
Referring to
In embodiments, the computing environment 160 may provide client 165 with one or more resources provided by a network environment. The computing environment 165 may include one or more clients 165a-165n, in communication with a cloud 175 over one or more networks 170. Clients 165 may include, e.g., thick clients, thin clients, and zero clients. The cloud 108 may include back end platforms, e.g., servers, storage, server farms or data centers. The clients 165 can be the same as or substantially similar to computer 100 of
The users or clients 165 can correspond to a single organization or multiple organizations. For example, the computing environment 160 can include a private cloud serving a single organization (e.g., enterprise cloud). The computing environment 160 can include a community cloud or public cloud serving multiple organizations. In embodiments, the computing environment 160 can include a hybrid cloud that is a combination of a public cloud and a private cloud. For example, the cloud 175 may be public, private, or hybrid. Public clouds 108 may include public servers that are maintained by third parties to the clients 165 or the owners of the clients 165. The servers may be located off-site in remote geographical locations as disclosed above or otherwise. Public clouds 175 may be connected to the servers over a public network 170. Private clouds 175 may include private servers that are physically maintained by clients 165 or owners of clients 165. Private clouds 175 may be connected to the servers over a private network 170. Hybrid clouds 175 may include both the private and public networks 170 and servers.
The cloud 175 may include back end platforms, e.g., servers, storage, server farms or data centers. For example, the cloud 175 can include or correspond to a server or system remote from one or more clients 165 to provide third party control over a pool of shared services and resources. The computing environment 160 can provide resource pooling to serve multiple users via clients 165 through a multi-tenant environment or multi-tenant model with different physical and virtual resources dynamically assigned and reassigned responsive to different demands within the respective environment. The multi-tenant environment can include a system or architecture that can provide a single instance of software, an application or a software application to serve multiple users. In embodiments, the computing environment 160 can provide on-demand self-service to unilaterally provision computing capabilities (e.g., server time, network storage) across a network for multiple clients 165. The computing environment 160 can provide an elasticity to dynamically scale out or scale in responsive to different demands from one or more clients 165. In some embodiments, the computing environment 160 can include or provide monitoring services to monitor, control and/or generate reports corresponding to the provided shared services and resources.
In some embodiments, the computing environment 160 can include and provide different types of cloud computing services. For example, the computing environment 160 can include Infrastructure as a service (IaaS). The computing environment 160 can include Platform as a service (PaaS). The computing environment 160 can include server-less computing. The computing environment 160 can include Software as a service (SaaS). For example, the cloud 175 may also include a cloud based delivery, e.g. Software as a Service (SaaS) 180, Platform as a Service (PaaS) 185, and Infrastructure as a Service (IaaS) 190. IaaS may refer to a user renting the use of infrastructure resources that are needed during a specified time period. IaaS providers may offer storage, networking, servers or virtualization resources from large pools, allowing the users to quickly scale up by accessing more resources as needed. Examples of IaaS include AMAZON WEB SERVICES provided by Amazon.com, Inc., of Seattle, Wash., RACKSPACE CLOUD provided by Rackspace US, Inc., of San Antonio, Tex., Google Compute Engine provided by Google Inc. of Mountain View, Calif., or RIGHTSCALE provided by RightScale, Inc., of Santa Barbara, Calif. PaaS providers may offer functionality provided by IaaS, including, e.g., storage, networking, servers or virtualization, as well as additional resources such as, e.g., the operating system, middleware, or runtime resources. Examples of PaaS include WINDOWS AZURE provided by Microsoft Corporation of Redmond, Wash., Google App Engine provided by Google Inc., and HEROKU provided by Heroku, Inc. of San Francisco, Calif. SaaS providers may offer the resources that PaaS provides, including storage, networking, servers, virtualization, operating system, middleware, or runtime resources. In some embodiments, SaaS providers may offer additional resources including, e.g., data and application resources. Examples of SaaS include GOOGLE APPS provided by Google Inc., SALESFORCE provided by Salesforce.com Inc. of San Francisco, Calif., or OFFICE 365 provided by Microsoft Corporation. Examples of SaaS may also include data storage providers, e.g. DROPBOX provided by Dropbox, Inc. of San Francisco, Calif., Microsoft SKYDRIVE provided by Microsoft Corporation, Google Drive provided by Google Inc., or Apple ICLOUD provided by Apple Inc. of Cupertino, Calif.
Clients 165 may access IaaS resources with one or more IaaS standards, including, e.g., Amazon Elastic Compute Cloud (EC2), Open Cloud Computing Interface (OCCI), Cloud Infrastructure Management Interface (CIMI), or OpenStack standards. Some IaaS standards may allow clients access to resources over HTTP, and may use Representational State Transfer (REST) protocol or Simple Object Access Protocol (SOAP). Clients 165 may access PaaS resources with different PaaS interfaces. Some PaaS interfaces use HTTP packages, standard Java APIs, JavaMail API, Java Data Objects (JDO), Java Persistence API (JPA), Python APIs, web integration APIs for different programming languages including, e.g., Rack for Ruby, WSGI for Python, or PSGI for Perl, or other APIs that may be built on REST, HTTP, XML, or other protocols. Clients 165 may access SaaS resources through the use of web-based user interfaces, provided by a web browser (e.g. GOOGLE CHROME, Microsoft INTERNET EXPLORER, or Mozilla Firefox provided by Mozilla Foundation of Mountain View, Calif.). Clients 165 may also access SaaS resources through smartphone or tablet applications, including, e.g., Salesforce Sales Cloud, or Google Drive app. Clients 165 may also access SaaS resources through the client operating system, including, e.g., Windows file system for DROPBOX.
In some embodiments, access to IaaS, PaaS, or SaaS resources may be authenticated. For example, a server or authentication server may authenticate a user via security certificates, HTTPS, or API keys. API keys may include various encryption standards such as, e.g., Advanced Encryption Standard (AES). Data resources may be sent over Transport Layer Security (TLS) or Secure Sockets Layer (SSL).
The client(s) 202 may be any type of computing devices capable of accessing the resource feed(s) 206 and/or the SaaS application(s) 210, and may, for example, include a variety of desktop or laptop computers, smartphones, tablets, etc. The resource feed(s) 206 may include any of numerous resource types and may be provided from any of numerous locations. In some embodiments, for example, the resource feed(s) 206 may include one or more systems or services for providing virtual applications and/or desktops to the client(s) 202, one or more file repositories and/or file sharing systems, one or more secure browser services, one or more access control services for the SaaS applications 210, one or more management services for local applications on the client(s) 202, one or more internet enabled devices or sensors, etc. Each of the resource management service(s) 202, the resource feed(s) 206, the gateway service(s) 208, the SaaS application(s) 210, and the identity provider 212 may be located within an on-premises data center of an organization for which the system 200 is deployed, within one or more cloud computing environments, or elsewhere.
For any of illustrated components (other than the client 165) that are not based within the cloud computing environment 214, cloud connectors (not shown in
As explained in more detail below, in some embodiments, the resource access application 224 and associated components may provide the user 226 with a personalized, all-in-one interface enabling instant and seamless access to all the user's SaaS and web applications, files, virtual Windows applications, virtual Linux applications, desktops, mobile applications, Citrix Virtual Apps and Desktops™, local applications, and other data.
When the resource access application 224 is launched or otherwise accessed by the user 226, the client interface service 216 may send a sign-on request to the identity service 218. In some embodiments, the identity provider 212 may be located on the premises of the organization for which the system 200 is deployed. The identity provider 212 may, for example, correspond to an on-premises Windows Active Directory. In such embodiments, the identity provider 212 may be connected to the cloud-based identity service 218 using a cloud connector (not shown in
In other embodiments (not illustrated in
For each configured resource feed, the resource feed service 220 may request an identity token from the single sign-on service 222. The resource feed service 220 may then pass the feed-specific identity tokens it receives to the points of authentication for the respective resource feeds 206. Each resource feed 206 may then respond with a list of resources configured for the respective identity. The resource feed service 220 may then aggregate all items from the different feeds and forward them to the client interface service 216, which may cause the resource access application 224 to present a list of available resources on a user interface of the client 165. The list of available resources may, for example, be presented on the user interface of the client 165 as a set of selectable icons or other elements corresponding to accessible resources. The resources so identified may, for example, include one or more virtual applications and/or desktops (e.g., Citrix Virtual Apps and Desktops™, VMware Horizon, Microsoft RDS, etc.), one or more file repositories and/or file sharing systems (e.g., Sharefile®, one or more secure browsers, one or more internet enabled devices or sensors, one or more local applications installed on the client 165, and/or one or more SaaS applications 210 to which the user 226 has subscribed. The lists of local applications and the SaaS applications 210 may, for example, be supplied by resource feeds 206 for respective services that manage which such applications are to be made available to the user 226 via the resource access application 224. Examples of SaaS applications 210 that may be managed and accessed as described herein include Microsoft Office 365 applications, SAP SaaS applications, Workday applications, etc.
For resources other than local applications and the SaaS application(s) 210, upon the user 226 selecting one of the listed available resources, the resource access application 224 may cause the client interface service 216 to forward a request for the specified resource to the resource feed service 220. In response to receiving such a request, the resource feed service 220 may request an identity token for the corresponding feed from the single sign-on service 222. The resource feed service 220 may then pass the identity token received from the single sign-on service 222 to the client interface service 216 where a launch ticket for the resource may be generated and sent to the resource access application 224. Upon receiving the launch ticket, the resource access application 224 may initiate a secure session to the gateway service 208 and present the launch ticket. When the gateway service 208 is presented with the launch ticket, it may initiate a secure session to the appropriate resource feed and present the identity token to that feed to seamlessly authenticate the user 226. Once the session initializes, the client 165 may proceed to access the selected resource.
When the user 226 selects a local application, the resource access application 224 may cause the selected local application to launch on the client 165. When the user 226 selects a SaaS application 210, the resource access application 224 may cause the client interface service 216 request a one-time uniform resource locator (URL) from the gateway service 208 as well a preferred browser for use in accessing the SaaS application 210. After the gateway service 208 returns the one-time URL and identifies the preferred browser, the client interface service 216 may pass that information along to the resource access application 224. The client 165 may then launch the identified browser and initiate a connection to the gateway service 208. The gateway service 208 may then request an assertion from the single sign-on service 222. Upon receiving the assertion, the gateway service 208 may cause the identified browser on the client 165 to be redirected to the logon page for identified SaaS application 210 and present the assertion. The SaaS may then contact the gateway service 208 to validate the assertion and authenticate the user 226. Once the user has been authenticated, communication may occur directly between the identified browser and the selected SaaS application 210, thus allowing the user 226 to use the client 165 to access the selected SaaS application 210.
In some embodiments, the preferred browser identified by the gateway service 208 may be a specialized browser embedded in the resource access application 224 (when the resource application is installed on the client 165) or provided by one of the resource feeds 206 (when the resource application 224 is located remotely), e.g., via a secure browser service. In such embodiments, the SaaS applications 210 may incorporate enhanced security policies to enforce one or more restrictions on the embedded browser. Examples of such policies include (1) requiring use of the specialized browser and disabling use of other local browsers, (2) restricting clipboard access, e.g., by disabling cut/copy/paste operations between the application and the clipboard, (3) restricting printing, e.g., by disabling the ability to print from within the browser, (3) restricting navigation, e.g., by disabling the next and/or back browser buttons, (4) restricting downloads, e.g., by disabling the ability to download from within the SaaS application, and (5) displaying watermarks, e.g., by overlaying a screen-based watermark showing the username and IP address associated with the client 165 such that the watermark will appear as displayed on the screen if the user tries to print or take a screenshot. Further, in some embodiments, when a user selects a hyperlink within a SaaS application, the specialized browser may send the URL for the link to an access control service (e.g., implemented as one of the resource feed(s) 206) for assessment of its security risk by a web filtering service. For approved URLs, the specialized browser may be permitted to access the link. For suspicious links, however, the web filtering service may have the client interface service 216 send the link to a secure browser service, which may start a new virtual browser session with the client 165, and thus allow the user to access the potentially harmful linked content in a safe environment.
In some embodiments, in addition to or in lieu of providing the user 226 with a list of resources that are available to be accessed individually, as described above, the user 226 may instead be permitted to choose to access a streamlined feed of event notifications and/or available actions that may be taken with respect to events that are automatically detected with respect to one or more of the resources. This streamlined resource activity feed, which may be customized for each user 226, may allow users to monitor important activity involving all of their resources—SaaS applications, web applications, Windows applications, Linux applications, desktops, file repositories and/or file sharing systems, and other data through a single interface, without needing to switch context from one resource to another. Further, event notifications in a resource activity feed may be accompanied by a discrete set of user-interface elements, e.g., “approve,” “deny,” and “see more detail” buttons, allowing a user to take one or more simple actions with respect to each event right within the user's feed. In some embodiments, such a streamlined, intelligent resource activity feed may be enabled by one or more micro-applications, or “microapps,” that can interface with underlying associated resources using APIs or the like. The responsive actions may be user-initiated activities that are taken within the microapps and that provide inputs to the underlying applications through the API or other interface. The actions a user performs within the microapp may, for example, be designed to address specific common problems and use cases quickly and easily, adding to increased user productivity (e.g., request personal time off, submit a help desk ticket, etc.). In some embodiments, notifications from such event-driven microapps may additionally or alternatively be pushed to clients 202 to notify a user 226 of something that requires the user's attention (e.g., approval of an expense report, new course available for registration, etc.).
In some embodiments, a microapp may be a single use case made available to users to streamline functionality from complex enterprise applications. Microapps may, for example, utilize APIs available within SaaS, web, or home-grown applications allowing users to see content without needing a full launch of the application or the need to switch context. Absent such microapps, users would need to launch an application, navigate to the action they need to perform, and then perform the action. Microapps may streamline routine tasks for frequently performed actions and provide users the ability to perform actions within the resource access application 224 without having to launch the native application. The system shown in
Referring to
In some embodiments, the microapp service 230 may be a single-tenant service responsible for creating the microapps. The microapp service 230 may send raw events, pulled from the systems of record 228, to the analytics service 238 for processing. The microapp service may, for example, periodically pull active data from the systems of record 228.
In some embodiments, the active data cache service 236 may be single-tenant and may store all configuration information and microapp data. It may, for example, utilize a per-tenant database encryption key and per-tenant database credentials.
In some embodiments, the credential wallet service 234 may store encrypted service credentials for the systems of record 228 and user OAuth2 tokens.
In some embodiments, the data integration provider service 232 may interact with the systems of record 228 to decrypt end-user credentials and write back actions to the systems of record 228 under the identity of the end-user. The write-back actions may, for example, utilize a user's actual account to ensure all actions performed are compliant with data policies of the application or other resource being interacted with.
In some embodiments, the analytics service 238 may process the raw events received from the microapps service 230 to create targeted scored notifications and send such notifications to the notification service 240.
Finally, in some embodiments, the notification service 240 may process any notifications it receives from the analytics service 238. In some implementations, the notification service 240 may store the notifications in a database to be later served in a notification feed. In other embodiments, the notification service 240 may additionally or alternatively send the notifications out immediately to the client 165 as a push notification to the user 226.
In some embodiments, a process for synchronizing with the systems of record 228 and generating notifications may operate as follows. The microapp service 230 may retrieve encrypted service account credentials for the systems of record 228 from the credential wallet service 234 and request a sync with the data integration provider service 232. The data integration provider service 232 may then decrypt the service account credentials and use those credentials to retrieve data from the systems of record 228. The data integration provider service 232 may then stream the retrieved data to the microapp service 230. The microapp service 230 may store the received systems of record data in the active data cache service 236 and also send raw events to the analytics service 238. The analytics service 238 may create targeted scored notifications and send such notifications to the notification service 240. The notification service 240 may store the notifications in a database to be later served in a notification feed and/or may send the notifications out immediately to the client 165 as a push notification to the user 226.
In some embodiments, a process for processing a user-initiated action via a microapp may operate as follows. The client 165 may receive data from the microapp service 230 (via the client interface service 216) to render information corresponding to the microapp. The microapp service 230 may receive data from the active data cache service 236 to support that rendering. The user 226 may invoke an action from the microapp, causing the resource access application 224 to send that action to the microapp service 230 (via the client interface service 216). The microapp service 230 may then retrieve from the credential wallet service 234 an encrypted Oauth2 token for the system of record for which the action is to be invoked, and may send the action to the data integration provider service 232 together with the encrypted Oath2 token. The data integration provider service 232 may then decrypt the Oath2 token and write the action to the appropriate system of record under the identity of the user 226. The data integration provider service 232 may then read back changed data from the written-to system of record and send that changed data to the microapp service 230. The microapp service 232 may then update the active data cache service 236 with the updated data and cause a message to be sent to the resource access application 224 (via the client interface service 216) notifying the user 226 that the action was successfully completed.
In some embodiments, in addition to or in lieu of the functionality described above, the resource management services 202 may provide users the ability to search for relevant information across all files and applications. A simple keyword search may, for example, be used to find application resources, SaaS applications, desktops, files, etc. This functionality may enhance user productivity and efficiency as application and data sprawl is prevalent across all organizations.
In other embodiments, in addition to or in lieu of the functionality described above, the resource management services 202 may enable virtual assistance functionality that allows users to remain productive and take quick actions. Users may, for example, interact with the “Virtual Assistant” and ask questions such as “What is Bob Smith's phone number?” or “What absences are pending my approval?” The resource management services 202 may, for example, parse these requests and respond because they are integrated with multiple systems on the back-end. In some embodiments, users may be able to interact with the virtual assistance through either the resource access application 224 or directly from another resource, such as Microsoft Teams. This feature may allow employees to work efficiently, stay organized, and deliver only the specific information they are looking for.
Referring now to
Each of the above-mentioned elements or entities is implemented in hardware, or a combination of hardware and software, in one or more embodiments. Each component of the system 300 may be implemented using hardware or a combination of hardware or software detailed above in connection with Sections A and B. For instance, each of these elements or entities can include any application, program, library, script, task, service, process or any type and form of executable instructions executing on hardware of the system 300. For example, the server(s) 302 may include a manager service 312 including a metrics analyzer 314 and an alert generator 316. The manager service 312, metrics analyzer 314, and/or alert generator 316 may be or include any application, program, library, script, task, service, process or any type and form of executable instructions executing on hardware of the server(s) 302. The hardware may include circuitry, such as one or more processors in one or more embodiments.
As shown in
The system 300 is shown to include a computing device 310. The computing device 310 may be similar to one of the clients 165 described above with reference to
The system 300 is shown to include a plurality of endpoints 304. In some embodiments, the endpoints 304 may be clients 165 (similar to the clients 165 described above with reference to
The endpoints 304 are shown to execute a workspace application 306. The workspace application 306 may be or include a program, application, script, software, or other executable code configured to execute on the endpoints 304 to provide a user of the endpoint 304 access to various local or remote resources 318. The workspace application 306 may be the same as or similar to the resource access application 224 described above with reference to
The workspace applications 306 of the endpoints 304 may be configured to receive, collect, determine, or otherwise identify various metrics of the network to which the endpoint 304 is connected at the geographic location. In some embodiments, the workspace application 306 may include a script (i.e., a background script) executing on the endpoints 304 to identify metrics of the network. As such, the workspace applications 306 may be configured to identify metrics of the network without any interruption of services and/or resources provided via the workspace application 306 to the user. The workspace applications 306 may be configured to identify metrics of the network, endpoint, geographic location, etc. The metrics may include, for example, an average download speed, an average upload speed, a maximum download speed, a maximum upload speed, a network interface type, a network name, a session identifier, a speed unit, a device identifier, a launch source, an operating system, a timestamp, a timezone, and so forth. The workspace applications 306 may be configured to identify the metrics of the network, endpoint, geographic location, etc. at various intervals. For example, the workspace applications 306 may be configured to identify the metrics every minute, every five minutes, every ten minutes, every 15 minutes, every 30 minutes, every hour, every two hours, every four hours, every six hours, every 12 hours, daily, etc.
In some embodiments, the workspace applications 306 may be configured to generate a string, report, or other data packet including the metrics 308 for sending to the server 302. The workspace applications 306 may be configured to generate the data packet using the metrics identified by the workspace application 306. In some embodiments, the workspace applications 306 may generate the data packet to include the metrics 308 as a payload and a header which identifies the metrics included in the data packet. One example data packet is provided below:
In the example data packet provided above, the metrics may include data, analytics, and so forth relating to the network to which the endpoint 304 is connected (i.e., network name, network interface type, average upload and download speeds, maximum upload and download speeds, session identifier), data, analytics, and so forth related to the endpoint (i.e., computer manufacturer, computer name, hardware identifier, device identifier, etc.), and data related to the enterprise (i.e., a tenant identifier). As shown in
The system 300 is shown to include probe services 320. The probe services 320 may be or include any software, script, application, or executable code which is deployed for a network and configured to collect metrics relating to the network. The probe services 320 may be deployed at one or more of the geographic locations shown in
The system 300 is shown to include one or more servers 302. The server(s) 302 may be or include any device, component, computer, processor, or hardware deployed or otherwise implemented in a computing environment and configured to receive the metrics 308 from the workspace applications 308. In some embodiments, the server(s) 302 may be similar to the computers 100 and/or clients 165 described above with reference to
The server(s) 302 is shown to include a metrics analyzer 314. The metrics analyzer 314 may be any device, component, software, script, instructions, or other combination of hardware and/or software designed or implemented to parse, inspect, or otherwise analyze metrics 308 for the networks located at the various geographic locations. The metrics analyzer 314 may be configured to analyze the metrics 308 received from the workspace application(s) 306 and/or probe services 320 to identify potential network outages or degradations in network performance. As described in greater detail below, the metrics analyzer 314 may be configured to compare the metrics 308 (or one or more scores computed using the metrics 308) to a threshold. The metrics analyzer 314 may be configured to identify potential network outages or degradations in network performance based on the comparison.
The network analyzer 314 may be configured to receive or otherwise maintain location data relating to each of the geographic locations and/or networks of the geographic locations. For example, the network analyzer 314 may be configured to maintain location data relating to a network bandwidth for each of the networks, a location of each of the networks, internet service provider (ISP) details (i.e., ISP name, ISP identifier, etc.) for each of the networks, and user/endpoint details (usernames user identifiers of users which are authorized to access the network at a particular geographic location, device or endpoint identifiers of devices/endpoints 304 which are authorized to access the network at a particular geographic location, internet protocol (IP) address for the endpoints 304 authorized to access the network, etc.). In some embodiments, the network analyzer 314 may be configured to store the location data locally at the server(s) 302, such as in one or more data structures, databases, etc.
The network analyzer 314 may be configured to receive the metrics 308 from the workspace applications 306 and/or the probe services 320. In some embodiments, the network analyzer 314 may be configured to group each of the metrics 308 according to the corresponding network. The network analyzer 314 may be configured to parse the metrics 308 to identify a network name received in each of the metrics 308. The network analyzer 314 may be configured to group the metrics 308 using the network name (i.e., such that metrics 308 which are in a group have a shared or common network name).
The network analyzer 314 may be configured to determine an ISP for each of the networks based on IP addresses for the endpoints 304 obtained from the workspace applications 306. In some embodiments, the network analyzer 314 may be configured to access an IP-to-ISP application or resource which determines, detects, identifies, or otherwise derives ISP and/or location details from a public IP address. The network analyzer 314 may be configured to provide the IP address received from a workspace application 306 to the IP-to-ISP application or resource to determine the ISP and/or location of the endpoint 304.
Referring now to
Referring to
In some embodiments, the network analyzer 314 may be configured to compute the score based on a current (i.e., current average) network download speed in comparison to a daily average network download speed. For example, the network analyzer 314 may be configured to maintain or store (i.e., on the server 302 or in a different data structure) average metrics 308 for each of the networks of the system 300. The network analyzer 314 may be configured to compute the average metrics 308 on a rolling basis (i.e., each day, weekly, monthly, etc.). The network analyzer 314 may be configured to compare the current network download speed for a network (i.e., network download speed received in the metrics 308 from the workspace applications 306 of the network) to the daily average network download speed (i.e., stored or maintained by the network analyzer 314. In some embodiments, the network analyzer 314 may be configured to compute a performance score for the current network download speed. The network analyzer 314 may be configured to compute the performance score according to:
where Pvalue is the performance score, Ndaily(2) is the current average download speed (i.e., for the previous 15 minutes, for example) received in the metrics 308 from the workspace application 306 executing on the endpoints 304 communicably coupled to the network and Ndaily(1) is the daily average download speed maintained by the network analyzer 314. The network analyzer 314 may be configured to compare the performance score to a threshold. In some embodiments, the threshold may be a predetermined threshold (i.e., set by the administrator). The threshold may be a percentage drop in the performance score (i.e., 10%, 15%, 20%, 25%, etc.).
The manager service 312 is shown to include an alert generator 316. The alert generator 316 may be any device, component, software, script, instructions, or other combination of hardware and/or software designed or implemented to generate alerts for rendering at one or more devices. The alert generator 316 may be configured to generate the alert(s) based on the comparison of the performance score to the threshold. In some embodiments, the alert generator 316 may be configured to generate the alert(s) responsive to the performance score not satisfying the threshold. For example, the alert generator 316 may be configured to generate the alert(s) responsive to the performance score being less than 20% (or another threshold). The alert generator 316 may be configured to transmit, send, or otherwise provide the alert to a device to indicate the drop in the performance score (i.e., indicating a degradation in network performance or a possible network outage). In some embodiments, the alert generator 316 may be configured to generate the alert for a device associated with the network having a performance score which does not satisfy the threshold. In some embodiments, the alert generator 316 may be configured to generate the alert for a computing device 310 for an administrator of the network. The alert generator 316 may be configured to determine which computing device 310 is associated with (i.e., is used by an administrator which services) the network. In some embodiments, the alert generator 316 may be configured to store or otherwise maintain data (i.e., in a data structure at the server 302 or at another device) which links particular networks with corresponding computing devices 310. The alert generator 316 may be configured to identify the device 310 by performing a look-up function in the data structure using the network name or other identifier of the network. The alert generator 316 may be configured to identify the device 310 to which to transmit the alert.
The alert generator 316 may be configured to transmit, send, or otherwise provide the alert to the device 310. The alert may be or include a notification or prompt which indicates a degradation in network performance of the network. In some embodiments, the notification or prompt may indicate or otherwise identify a current or potential network outage. The alert generator 316 may be configured to provide the alert to the device 310 to prompt a user of the device 310 to service the network, switch the geographic location from a primary network or internet service provider to a secondary network or internet service provider, and so forth.
In some embodiments, the alert generator 316 may be configured to generate alerts or notifications for the endpoints 304 communicably coupled to the network having a degradation in network performance. For example, the alert generator 316 may be configured to access the data structure which stores data on IP addresses of endpoints 304 communicably coupled to a particular network or located at a corresponding location. The alert generator 316 may be configured to generate an alert for each of the endpoints 304 having in IP address which is stored in the data structure in association with the network experiencing the degradation in network performance. The alert may indicate a degradation in network performance, and prompt users of the endpoints 304 to switch to a different network, to use resources which consume less bandwidth or do not require internet connectivity, etc.
Referring now to
At step 502, a server receives metrics. In some embodiments, the server may receive metrics from a plurality of workspace applications of a plurality of endpoints across a plurality of different locations of an enterprise. The metrics may be for usage of one or more networks for each workspace application. In some embodiments, the server may receive the metrics at various intervals. For example, the server may receive the metrics every five minutes, every ten minutes, every 15 minutes, every 30 minutes, every hour, etc. The server may receive the metrics responsive to the workspace applications generating a data packet or string which includes the metrics. In some embodiments, the server may receive metrics from the workspace applications and from probe services. The probe services may execute at the network locations and automatically generate, identify, determine, or otherwise acquire metrics relating to the network. The probe services may be dedicated services executing at the network locations and acquiring/sending metrics to the server.
The endpoints may be located across various geographic locations and communicably coupled to various networks at a respective geographic location. For example, a geographic location (such as a building, an office space, etc.) may include various endpoints. The geographic location may also include one or more networks which are used by the endpoints located at the geographic location. In some instances, a geographic location may include a plurality of networks (i.e., a primary and fallback network, for instance). Each endpoint may be communicably coupled to a respective network at a respective geographic location. Additionally, each endpoint may execute (or may be configured to execute) a workspace application. The workspace application may be software or a software suite, an application, etc. which executes on an endpoint to provide a user of the endpoint access to a plurality of local or remote resources. Each endpoint may execute a workspace application to provide a user of the endpoint access to the resources. The workspace applications may execute responsive to a user launching the workspace application, responsive to a user requesting access to a resource via the workspace application, etc. The workspace application may gather, acquire, compile, or otherwise receive metrics relating to the network responsive to executing on the endpoint. The workspace application may receive metrics relating to the network to which the endpoint is communicably coupled.
In some embodiments, the metrics may include, for example, a network download speed. The network download speed may be or include an average network download speed (i.e., as measured by a workspace application over a time duration). The network download speed may be a maximum download speed. In some embodiments, the metrics may also include an upload speed, a latency, a packet loss, or other metrics which are indicative of a strength of a network connection. In some embodiments, the metrics may include network download speed and network name, an address, network interface type and/or an internet service provider. Such embodiments may provide information on analytics for a network as well as identifying information for the network. The network interface type may include at least one of an Ethernet network interface, a Wi-Fi network interface, a token-ring network interface, a fiber distributed data interface (FDDI) network interface, a point-to-point (PPP) network interface, a loopback network interface, or a serial line internet protocol (SLIP) network interface.
At step 504, the server computes a score based on the metrics. In some embodiments, the server may compute a score based on a determined network download speed. For instance, the server may determine a network download speed for each location of the plurality of different locations according to the metrics for each workspace application. In some embodiments, the server may determine the network download speed for each location by computing an average of the network download speed received in metrics for each location. For example, the server may receive metrics from a plurality of endpoints for a common geographic location and network. The server may identify a network download speed in the metrics from each of the plurality of endpoints. The server may compute an average of the identified network download speed from the metrics.
In some embodiments, the server may compute a performance score based on the metrics including the network download speed. For example, the server may compute a performance score based on the network download speed and a previous network download speed. The server may compute the performance score based on a comparison of the network download speed for a current time interval (i.e., using the metrics received at step 502) to a network download speed for a previous time interval (i.e., using a value stored by the server in memory, in a data structure, or other database in association with a network identifier).
At step 506, the server determines whether the score satisfies a threshold. In some embodiments, the server may compare the score (i.e., the network download speed or a value computed, derived, or otherwise determined based on the network download speed) to a threshold. The threshold may be or include a percentage drop from a previous network download speed. For example, the threshold may be a 20% drop in average network download speed for a current time interval from a previous time interval. If the score satisfies the threshold (i.e., the current average network download speed is within 20% of the previous average network download speed or greater), the method may proceed to step 508. On the other hand, if the score does not satisfy the threshold (i.e., the current average network download speed has dropped by 20% or more from a previous average network download speed), the method may proceed to step 510.
Where the score satisfies the threshold, at step 508, the server may do nothing. For example, where the score satisfies the threshold, the server may remain idle, not take any actions, not take any alerts, etc. In some embodiments, where the score satisfies the threshold, the server may maintain a state of the network (i.e., to indicate that there is no degradation in network performance). In some embodiments, the server may remain idle until receiving metrics at a subsequent iteration (i.e., at the next interval in which the workspace applications on the endpoints send metrics to the server). For instance, the server may wait for a predetermined duration (i.e., a duration between the workspace applications sending metrics) and proceed back to step 502 following the predetermined duration.
Where the score does not satisfy the threshold, at step 510, the server may generate an alert. In some embodiments, the server may generate an alert to be provided to a device of a user associated with a first location of the plurality of different locations. The server may generate the alert responsive to the network download speed for a network of the one or more networks falling below the threshold. The server may transmit, send, or otherwise provide the alert to the device for rendering at the device. In some embodiments, the device may be used by or correspond to an administrator for the enterprise. The administrator may service the network which is experiencing a degradation in network performance. The administrator may service multiple networks including the network. The alert may indicate at least one of an existing network interruption or a potential network interruption. The server may maintain a list or ledger of devices for administrators in association with corresponding networks. The server may identify the device to which to transmit the alert using a network identifier for the network, using a network name for the network, etc. The server may transmit, send, or otherwise provide the alert to the device identified in the list or ledger as being associated with the network experiencing the degradation in network performance.
In some embodiments, the server may cause an endpoint connected to the network to render a notification indicating a degradation in network connectivity. For example, the server may maintain or otherwise access a database or data structure including identifiers for devices/endpoints which are communicably coupled to each network (or located at each geographic location). The server may identify which endpoints are communicably coupled to the network by using the network name or network identifier to extract or otherwise identify endpoints which are communicably coupled to the network from the database or data structure. The server may transmit the notification to each of the identified endpoints. The notification may indicate the degradation in network connectivity. In some embodiments, the notification may include instructions to instruct a user of the endpoint to switch to a different network, to access local resources, to use resources which do not consume as much bandwidth or do not require internet connectivity, etc.
Various elements, which are described herein in the context of one or more embodiments, may be provided separately or in any suitable subcombination. For example, the processes described herein may be implemented in hardware, software, or a combination thereof. Further, the processes described herein are not limited to the specific embodiments described. For example, the processes described herein are not limited to the specific processing order described herein and, rather, process blocks may be re-ordered, combined, removed, or performed in parallel or in serial, as necessary, to achieve the results set forth herein.
It should be understood that the systems described above may provide multiple ones of any or each of those components and these components may be provided on either a standalone machine or, in some embodiments, on multiple machines in a distributed system. The systems and methods described above may be implemented as a method, apparatus or article of manufacture using programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof. In addition, the systems and methods described above may be provided as one or more computer-readable programs embodied on or in one or more articles of manufacture. The term “article of manufacture” as used herein is intended to encompass code or logic accessible from and embedded in one or more computer-readable devices, firmware, programmable logic, memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, SRAMs, etc.), hardware (e.g., integrated circuit chip, Field Programmable Gate Array (FPGA), Application Specific Integrated Circuit (ASIC), etc.), electronic devices, a computer readable non-volatile storage unit (e.g., CD-ROM, USB Flash memory, hard disk drive, etc.). The article of manufacture may be accessible from a file server providing access to the computer-readable programs via a network transmission line, wireless transmission media, signals propagating through space, radio waves, infrared signals, etc. The article of manufacture may be a flash memory card or a magnetic tape. The article of manufacture includes hardware logic as well as software or programmable code embedded in a computer readable medium that is executed by a processor. In general, the computer-readable programs may be implemented in any programming language, such as LISP, PERL, C, C++, C#, PROLOG, or in any byte code language such as JAVA. The software programs may be stored on or in one or more articles of manufacture as object code.
While various embodiments of the methods and systems have been described, these embodiments are illustrative and in no way limit the scope of the described methods or systems. Those having skill in the relevant art can effect changes to form and details of the described methods and systems without departing from the broadest scope of the described methods and systems. Thus, the scope of the methods and systems described herein should not be limited by any of the illustrative embodiments and should be defined in accordance with the accompanying claims and their equivalents.