OPNET TECHNOLOGIES, INC. Patent applications |
Patent application number | Title | Published |
20130205009 | OVERHEAD MANAGEMENT FOR EVENT TRACING - The present invention relates to managing data generated by software transactions, such as event tracing software. In one embodiment, data generated by event tracing software is monitored. The throughput of the data generated may then be modulated based on various criteria, such as a target data rate. The throughput target may be specified on a per-system basis or individual basis. Based on the throughput, the level of detail recorded is modulated. Individual processes may determine a limit or quota depending on their contribution to the throughput. In one embodiment, the method calls for a trace are modified with different property specifications to meet a desired throughput of event tracing data. | 08-08-2013 |
20130188488 | USING ROUTING INFORMATION AND INTER-LAYER RELATIONSHIPS TO DETERMINE UTILIZATION IN A TRANSPORT NETWORK - Embodiments provide systems, methods, and computer program products for mapping higher-layer circuits, links, flows, and services to lower layer circuit and connection elements to determine utilization of the lower layer circuit elements based on the high-layer traffic. Higher layer configuration data and lower layer configuration data are imported to populate a model. An inter-layer relationship is either directly or indirectly mapped from the higher layers to the lower layer. Once the inter-layer relationship is established, the higher-layer circuits, links, flows, and services are inspected using the lower layer circuit and connection elements. Circuit and packet-based utilization is determined for the lower layer elements based on the higher-layer traffic flows. | 07-25-2013 |
20130159512 | METHODS AND SYSTEMS FOR EFFICIENT UPDATING OF TIME-ALIGNED GRAPHS IN A MONITORING SYSTEM - The present invention relates to displaying data in a time-aligned fashion. A dashboard may have a defined time window and a plurality of graphs for various types of monitoring data metrics. Updates to each of the graphs may occur at different intervals while the graphs stay aligned to the same time window. The updates may be asynchronously received and displayed in the dashboard in real-time or near real-time. The graphs are aligned to the same time window in a dashboard by adding a future time buffer. When the live data reaches the end of the time window, the future time buffer allows a brief overflow period for updates to be added to the graphs while keeping all the graphs on a common time axis. Once the current time reaches the end of the future time buffer, the dashboard is then shifted forward and a future time buffer is added. | 06-20-2013 |
20130158950 | APPLICATION PERFORMANCE ANALYSIS THAT IS ADAPTIVE TO BUSINESS ACTIVITY PATTERNS - The present invention relates to a system and method for assessing application performance. hi some embodiments, the analysis considers external factors, such as business hours, time zone, etc., to identify or recognize distinctive intervals of application performance. These distinctive intervals correspond to different periods of activity by an enterprise or business and may occur in a cyclical manner or other type of pattern. The distinctive intervals defined by external factors are employed in the analysis to improve aggregating of statistics, setting of thresholds for performance monitoring and alarms, correlating business and performance, and the modeling of application performance. The metrics measured can include, among other things, measures of CPU and memory utilization, disk transfer rates, network performance, queue depths and application module throughput. Key performance indicators, such as transaction rates and round-trip response times may also be monitored. | 06-20-2013 |
20130151697 | TRACKING OBJECTS WITHIN DYNAMIC ENVIRONMENTS - Embodiments provide systems, methods, and computer program products for tracking objects within a domain and their possible changes and genealogy over time. An object identifier and an interval identifier are associated with an object that enters the domain with an unknown set of attributes and genealogy. The object identifier is analyzed to determine whether it is a pre-existing object identifier. A comparison of the interval identifier is performed to determine whether the object is a copy of a prior object. The object identifier is replaced with a new object identifier and the interval identifier reset when the object is new or a copy. Based on the object identifier and the interval identifier, which represents the possibility of change during each interval, information about the tracked object may be derived and analyzed to enhance performance. | 06-13-2013 |
20130145015 | OVERHEAD MANAGEMENT FOR EVENT TRACING - The present invention relates to managing data generated by software transactions, such as event tracing software. In one embodiment, data generated by event tracing software is monitored. The throughput of the data generated may then be modulated based on various criteria, such as a target data rate. The throughput target may be specified on a per-system basis or individual basis. Based on the throughput, the level of detail recorded is modulated. Individual processes may determine a limit or quota depending on their contribution to the throughput. In one embodiment, the method calls for a trace are modified with different property specifications to meet a desired throughput of event tracing data. | 06-06-2013 |
20130124721 | Detected IP Link and Connectivity Inference - Embodiments provide systems, methods, and computer program products for inferring the switch port connectivity of discovered but. unmanaged devices in a network without direct access to the devices. Embodiments operate by generating a physical address-to-port map based on collected operational data and then pruning the generated map based on switch port connectivity information and/or inferred link connectivity information. The switch port connectivity of discovered unmanaged devices is then generated or updated based on the pruned map. The switch port connectivity information can be used by various other tools to enable diagramming, asset inventory, and network planning, design, and optimization workflows. | 05-16-2013 |
20130090987 | METHODS AND SYSTEM FOR WORKFLOW MANAGEMENT OF SALES OPPORTUNITIES - The embodiments relate to tracking some or all of the sales opportunities at a particular firm through an active business cycle. An active business cycle is representative of the progression of sales opportunities from beginning to end. Within an active business cycle, a sales opportunity may be categorized according to the stage through which the opportunity has progressed. Sales opportunities in the active business cycle are tracked and segmented according to their age, such as when they became active. The sales information may then be queried and graphically displayed with a representation of a plurality of opportunities according to their age. | 04-11-2013 |
20130090910 | APPLICATION LEVEL INTERFACE TO NETWORK ANALYSIS TOOLS - A user interface to a network simulator facilitates the use of application layer parameters and application layer logic. The user interface is configured to allow the user to define the input in a graphic form, or a text/programming form, or a combination of both. The user interface provides common graphic forms for both inputting the data to the simulator as well as for displaying the resultant data from the simulator. In response, the simulator and user interface may provide updated information to reflect the impact of changes made to application layer parameters and logic. | 04-11-2013 |
20130067076 | INCREMENTALLY IMPROVED AUTO-DISCOVERY OF NETWORK DEVICES - The embodiments improve the results of an auto-detection of network devices responsive to the causes of detection failures in preceding runs of the auto-detection process. The network may comprise various devices that are believed to be in the network. If a device that is believed to be in the network, but is undiscovered, the embodiments identify the device and information regarding the cause or causes of non-discovery. In response, the discovery parameters are modified, based on the causes associated with the undiscovered devices. The extent to which the discovery parameters are modified is based various criteria, such as the characterization of the network, or upon the detection of changes to the network. | 03-14-2013 |
20130046887 | NETWORK CAPACITY PLANNING FOR MULTIPLE INSTANCES OF AN APPLICATION - Data representing application deployment attributes, network topology, and network performance attributes based on a reduced set of element attributes is utilized to simulate application deployment. The data may be received from a user directly, a program that models a network topology or application behavior, and a wizard that implies the data based on an interview process. The simulation may be based on application deployment attributes including application traffic pattern, application message sizes, network topology, and network performance attributes. The element attributes may be determined from a lookup table of element operating characteristics that may contain element maximum and minimum boundary operating values utilized to interpolate other operating conditions. Application response time may be derived using an iterative analysis based on multiple instances of one or more applications wherein a predetermined number of iterations are used or until a substantially steady state of network performance is achieved. | 02-21-2013 |
20130042020 | Quick Network Path Discovery - Embodiments for quick network path discovery are provided. Embodiments may be used by a user (e.g., network administrator) in troubleshooting a performance/communication problem in the network. M an embodiment, path information, including Layer-3 and/or Layer-2 path information, can be requested between any pair of devices in the network and presented to the user. In an embodiment, path information is provided to the user in an iterative (or gradual) manner as soon as resolved. This allows the user quick access to path information, which both reduces troubleshooting time and enhances the user experience. In addition, in an embodiment, the path information may be provided without any live interaction with any device in the network. | 02-14-2013 |
20130036122 | ASSESSING APPLICATION PERFORMANCE WITH AN OPERATIONAL INDEX - The present invention relates to a system and method for assessing application performance and user satisfaction. In one embodiment, the system and method calculates an Operational Index (OPdex) representing user satisfaction with an application. The OPdex may be a number quantifying user satisfaction with an application, such as a web application, and system performance. The OPdex may be based on one or more measurable metrics having a range of values that may affect user satisfaction or performance of an application. The OPdex may comprise calculating the index based on a soft threshold, a hard threshold, and measurements indicating a perceived application response time. The OPdex calculation may also account for sensitivity of user satisfaction to response time. Based on the OPdex, the system and methods also provide information indicating the relationship among application response time thresholds set by the users, the user satisfaction level, and the mean response time. | 02-07-2013 |
20130007524 | MULTI-VARIATE NETWORK SURVIVABILITY ANALYSIS - Network survivability is quantified in such a way that failure cases can be compared and ranked against each other in terms of the severity of their impact on the various performance measures associated with the network. The degradation in network performance caused by each failure is quantified based on user-defined sets of thresholds of degradation severity for each performance measure. Each failure is simulated using a model of the network, and a degradation vector is determined for each simulated failure. A comparison function is defined to map the degradation vectors into an ordered set, and this ordered set is used to create an ordered list of network failures, in order of the network degradation caused by each failure. | 01-03-2013 |
20120324451 | VIRTUALIZATION PLANNING SYSTEM - The embodiments related to systems and methods for virtualization planning. A set of target machines may employ one or more virtualization technologies to divide resources of the given target computer system into multiple execution environments for virtual machines. Overhead profiles are determined based on a configuration of a given target computer system, the virtualization technology, and work performed by the virtual machines. The overhead consumed by the virtualization technologies is estimated for the proposed allocation of virtual machines. Performance of the proposed allocation of virtual machines is then modeled and various performance measures are provided. | 12-20-2012 |
20120316856 | METHODS AND SYSTEM FOR MODELING WIRELESS COMMUNICATIONS IN A NETWORK - The embodiments relate to modeling wireless communications in a network. In wireless communications, the nodes share one or more wireless communication channels. When a node has data to transmit, it must contend with the other nodes for access to the wireless communication channel. In the embodiments, the model is configured to simulate the throughput effects of contention including delays caused by retransmissions due to interference and collisions, listen-and-backoff, unavailability of time slots, etc. The occurrence of failed/dropped transmissions due to buffer overflows, excessive retransmission attempts, and unintended collisions are modeled as well. In addition, the embodiments may simulate the effect of mobility by the nodes and the effect of the location of the nodes relative to each other. | 12-13-2012 |
20120246307 | ANALYSIS OF ACTIVITY OF DEVICES IN A NETWORK THAT EMPLOY TRANSLATED NETWORK ADDRESSES - The embodiments provide for analyzing activity of devices in a network. Activity from a device may result from multiple devices translated to a common address, such as a public internet protocol (IP) address. In some embodiments, the activity from a network or device is analyzed to identify if multiple devices communicate via translated addresses from the common address. The devices may be identified based on various criteria, such as a unique identifier, protocol header information, or a media access control (or “MAC”) address. Other criteria may also be employed. Each device that is mapped to common address is then remapped so that each device has its own address. The activity data is then modified so that each device is correlated with its unique address. Alternatively, a new activity data file may be generated so that the activity of each device is indicated. | 09-27-2012 |
20120246287 | CORRELATING INPUT AND OUTPUT REQUESTS BETWEEN CLIENT AND SERVER COMPONENTS IN A MULTI-TIER APPLICATION - The present invention relates to correlating requests between a client and a server to a particular transaction. In one embodiment, transactions in a system of clients and servers are monitored and traced. From this information, a context comprising sets or groupings of transaction call sequences are determined. For example, a sequence of method calls on a client process is traced to a socket carrying data for transmission of a request message to a server. In response to this request message, the server then executes a set of method calls that can be correlated to the request message and the socket. This set of actions is considered part of a causally related grouping, and thus, associated together. In one embodiment, HTTP requests from a client may be comprise a unique custom header that is readily identified and traced. For other protocols, a client socket is associated with a corresponding server socket or to data received over a socket receive call. | 09-27-2012 |
20120201168 | SYSTEM AND METHOD FOR MODELING A SYSTEM THAT COMPRISES NETWORKS CONNECTED ACROSS A THIRD PARTY EXTERNAL NETWORK BASED ON INCOMPLETE CONFIGURATION DATA - The present system includes a system, method and device for inferring connectivity between network devices across a third party network. Configuration data related to the network devices is examined and configuration data about the network is inferred. The inferred configuration data may be related to a communication protocol, network bandwidth, and the like. A model representing the network is then created to indicate inferred interfaces and connections through the external network between network devices. The representation may be rendered in various forms, such as a display or data exported to another system. Various studies may also be performed using the model, such as traffic, routing, or planning studies. | 08-09-2012 |
20120182903 | INFERRING CONNECTIVITY IN THE PRESENCE OF CONFLICTING NETWORK DATA - The connectivity information provided by a variety of inference engines is integrated to provide a set of inferred links within a network. A consolidation is performed among inference engines that operate at a base level of connectivity detail to create a model of the network at this base level. The connectivity information provided by inference engines at each subsequent higher level of connectivity abstraction is then overlaid on the base level connectivity. By separately consolidating the connectivity information at each level of abstraction, the rules for dealing with conflicts can be simplified and/or better focused to resolve the conflict. By assuming that the more detailed lower level information is likely to be more accurate, rules can be developed to modify the connectivity models produced by the higher level techniques to conform to the lower level connectivity details while still maintaining the integrity of the higher level connectivity models. | 07-19-2012 |
20120179816 | MANAGING CAPTURED NETWORK TRAFFIC DATA - A system and method for managing captured network traffic data is provided. The invention comprises a plurality of capture agents, each being configured to capture the network traffic associated with one or more applications. Each application is associated with one or more capture agents according to an application profile that is stored and maintained in a capture server. When analysis of an application's network traffic is required, the capture server contacts the corresponding capture agents according to the application profile. The capture server then effects the identification and archiving of the network traffic that corresponds to a user-defined capture condition. A database at the capture server maintains a record that associates the corresponding network traffic with the user-defined capture condition such that the corresponding network traffic can later be retrieved and analyzed using an analysis engine. | 07-12-2012 |
20120163227 | SYSTEMS AND METHODS FOR INTELLIGENT PROBE TESTING - Systems and methods are disclosed for testing a processor having at least a first interface. In one embodiment, the method includes configuring, at the processor, a second interface, such that the configured second interface has one or more quality of service parameters representative of the first interface; sending one or more packets through the configured second interface, the one or more packets being representative of another packet received at the first interface; and determining, based on the one or more packets, one or more performance parameters corresponding to the first interface under test. | 06-28-2012 |
20120163197 | ROUTING VALIDATION - A simulator simulates routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables can represent steady-state routing tables that should be present in the routers of the actual network at steady state. By querying each router in the actual network for its routing table and comparing each routing table to the corresponding simulator-produced routing table, any differences from the steady state can be identified. | 06-28-2012 |