Riverbed Technology Patent Applications

NETWORK TOPOLOGY GENERATION USING TRACEROUTE DATA

Granted: August 14, 2014
Application Number: 20140229612
Embodiments provide systems, methods, and computer program products for inferring node and link information from traceroute data in order to generate topology information. A system receives traceroute data for a data packet that traverses a path from a source to a destination. The system infers port types for the addresses in the traceroute data and groups subsets of the addresses in the traceroute data into logical nodes based on neighbor relationships demonstrated in backward and…

INFERRING CONNECTIVITY AMONG NETWORK SEGMENTS IN THE ABSENCE OF CONFIGURATION INFORMATION

Granted: August 14, 2014
Application Number: 20140226528
The present system includes a system, method and device for inferring connectivity between unconnected network segments. In operation, unconnected network segments are identified. Configuration data related to the unconnected network segments may be examined to facilitate inferring configuration data for an external network connected between the unconnected network segments. The inferred configuration data may be rendered, such as exported or visualized. The inferred configuration data…

NETWORK MULTI-PATH DISCOVERY

Granted: July 31, 2014
Application Number: 20140211805
Potential paths between a source and destination of a network are identified based on trace-route information, then filtered to eliminate paths or links that are not supported by ancillary information associated with the network so as to identify feasible/actual paths between the source and destination. The ancillary information includes, for example, routing tables and ARP tables. If a feasible path cannot be identified based on the ancillary information, supplemental information…

STITCHING TOGETHER PARTIAL NETWORK TOPOLOGIES

Granted: July 17, 2014
Application Number: 20140201359
A method and system that takes advantage of processes that are efficient for determining the topology of small to medium size networks to determine individual network topologies for such networks, and then merges these individual topologies into a consolidated topology for the entire network. Each of the processes that determines the topology of the smaller networks provides the determined network topology, as well as a list of factors that may be relevant in the determination of how the…

CAPTURE, ANALYSIS, AND VISUALIZATION OF CONCURRENT SYSTEM AND NETWORK BEHAVIOR OF AN APPLICATION

Granted: June 19, 2014
Application Number: 20140172941
A first capture system that captures network communication events related to an application, and a second capture system that captures internal processing events related to the application. A visualization system analyzes the data captured by each of the capture systems, synchronizes and correlates the data, and presents an integrated display of these communication and processing events. In a preferred embodiment, the communicated messages include an identifier of the application, and…

COOPERATIVE PROXY AUTO-DISCOVERY AND CONNECTION INTERCEPTION

Granted: June 5, 2014
Application Number: 20140156836
In a network supporting transactions between clients and servers and proxies that are interposable in a network path, a pair of proxies can modify a packet stream such that packet data from client to server is transformed at a client-side proxy of the pair and untransformed at a server-side of the pair and packet data from server to client is transformed at the server-side proxy and untransformed at the client-side proxy. A discovering proxy transparently discovers its position in a…

DETECTING OUTLIERS IN NETWORK TRAFFIC TIME SERIES

Granted: June 5, 2014
Application Number: 20140153396
According to an aspect of the invention, a system and method is configured to detect time series outliers in network traffic.

Address Manipulation to Provide for the Use of Network Tools Even When Transaction Acceleration is in Use Over a Network

Granted: May 22, 2014
Application Number: 20140143306
In address-manipulation enabled transaction accelerators, the transaction accelerators include outer-connection addressing information in packets emitted over an inner connection between transaction accelerators and inner-connection addressing information is added in packets sent over the inner connection. The inner-connection addressing information can be carried in TCP option fields, directly in other fields, or indirectly through data structures maintained by the endpoints processing…

INSTRUMENTING COMPUTER PROGRAM CODE BY MERGING TEMPLATE AND TARGET CODE METHODS

Granted: May 15, 2014
Application Number: 20140137083
Embodiments provide systems, methods, and computer program products for instrumenting software application code. A target method and a template method may each be elevated to respective linked lists that maintain offsets in a relative relationship using pointers. The lists are merged and converted back to byte code as an instrumented method.

VIRTUALIZATION PLANNING SYSTEM

Granted: May 15, 2014
Application Number: 20140137117
An interactive virtualization management system provides an assessment of proposed or existing virtualization schemes. A Virtual Technology Overhead Profile (VTOP) is created for each of a variety of configurations of host computer systems and virtualization technologies by measuring the overhead experienced under a variety of conditions. The multi-variate overhead profile corresponding to each target configuration being evaluated is used by the virtualization management system to…

APPLICATION MONITORING OF RELATED ACTIVITIES ACROSS MULTIPLE THREADS

Granted: May 15, 2014
Application Number: 20140136691
Embodiments provide systems, methods, and computer program products for monitoring application performance in multithreaded environments. Monitoring data may be inserted into data structures that propagate and persist between threads involved in a processing event. Data related to specific methods executing on each thread may be output to a trace file. The trace file may be analyzed for application performance by associating the threads that contain the same tracking data from the…

TRAFFIC FLOW INFERENCE BASED ON LINK LOADS AND GRAVITY MEASURES

Granted: May 15, 2014
Application Number: 20140133349
Traffic flow between each pair of nodes in a network may be modeled based on loads measured at each link and based on gravity measures associated with each node. Gravity measures correspond to a relative likelihood of the node being a source or a sink of traffic. Gravity objectives are assigned to nodes to serve as an objective for a node's performance. These gravity objectives may be based on qualitative characteristics associated with each node. Because the assigned gravity objectives…

MEMORY UTILIZATION ANALYSIS

Granted: May 8, 2014
Application Number: 20140129793
The performance of a monitored system is profiled based on sampling a portion of its operations. In one embodiment, the monitored system allocates memory for objects created as instances of classes and automatically performs regular garbage collection to reclaim memory. A variety of sampling techniques are used to minimize the impact on the performance of the monitored system. Characteristic memory utilization patterns can then be estimated for classes based on the samples. The patterns…

WEB TRANSACTION ANALYSIS

Granted: May 1, 2014
Application Number: 20140122712
Individual network activities are correlated to interactions with a target web page to facilitate an analysis of the performance of the web page. This correlation is preferably performed using a combination of heuristics and rules developed to filter network activities into those activities that are likely to have been caused by the particular transaction, and those that are unlikely to be associated with that transaction. The activities that are identified as being associated with the…

MANAGING CAPTURED NETWORK TRAFFIC DATA

Granted: April 24, 2014
Application Number: 20140112154
A system and method for managing captured network traffic data is provided. The invention comprises a plurality of capture agents, each being configured to capture the network traffic associated with one or more applications. Each application is associated with one or more capture agents according to an application profile that is stored and maintained in a capture server. When analysis of an application's network traffic is required, the capture server contacts the corresponding capture…

SERIAL CLUSTERING

Granted: March 13, 2014
Application Number: 20140071824
Serial clustering uses two or more network devices connected in series via a local and/or wide-area network to provide additional capacity when network traffic exceeds the processing capabilities of a single network device. When a first network device reaches its capacity limit, any excess network traffic beyond that limit is passed through the first network device unchanged. A network device connected in series with the first network device intercepts and will process the excess network…

LINK INFERENCE IN LARGE NETWORKS

Granted: February 27, 2014
Application Number: 20140056180
A network is partitioned into a set of independent partitions, and the topology of each partition is determined, then merged to form a topology of the entire network. Preferably, the partitioning is hierarchical, wherein the network is partitioned to form individual VLAN partitions, and each of the VLAN partitions is further partitioned based on the nodes that are simply connected to each port of one or more selected root switches within the VLAN partition. Simple connections to each…

METHOD AND SYSTEM FOR MANAGING A DISTRIBUTED NETWORK OF NETWORK MONITORING DEVICES

Granted: February 6, 2014
Application Number: 20140036688
Network traffic information for nodes of a first logical hierarchy is stored at a monitoring device according to ranks of the nodes within the logical hierarchy as determined by each node's position therein and user preferences. At least some of the network traffic information stored at the network monitoring device may then be reported to another network monitoring device, where it can be aggregated with similar information from other network monitoring devices. Such reporting may occur…

USER-CONFIGURABLE NETWORK PERFORMANCE MONITORS

Granted: January 30, 2014
Application Number: 20140033054
A network analysis system provides for a user-definable display of information related to messages communicated on the network. The network analysis system includes one or more display formats that provide a display of message exchanges between nodes of a network, and a display augmenter that provides additional information on the display based on a user-defined visualization. The user defined visualization includes augmenting the display based on user-defined coloring characteristics…

RELIABILITY AND AVAILABILITY OF DISTRIBUTED SERVERS

Granted: January 16, 2014
Application Number: 20140019519
A system of network proxies distributes data to multiple servers. Each network proxy is associated with a server. A network proxy intercepts a client request for data. If the network proxy determines that the request can be served using a copy of data stored on the local server, rather than the data stored on a remote server, it diverts the request to the local server. If the network proxy determines that the request cannot be served using a data from the local server, the network proxy…