-
公开(公告)号:US10931534B2
公开(公告)日:2021-02-23
申请号:US15800055
申请日:2017-10-31
Applicant: Cisco Technology, Inc.
Inventor: Harish Nataraj , Ajay Chandel , Nikhar Rakesh Saxena , Naveen Kondapalli , Prakash Kaligotla
Abstract: According to one or more embodiments of the disclosure, techniques herein provide for auto discovery of network proxies. In particular, in one embodiment, a controller in a computer network receives, from both source devices and destination devices, corresponding Transmission Control Protocol/Internet Protocol (TCP/IP) information and associated transaction identifiers (IDs) for packets sent by the source devices and for packets received at the destination devices. The controller may then correlate particular source TCP/IP information to particular destination TCP/IP information based on associated transaction IDs being the same, and can compare the correlated source TCP/IP information and destination TCP/IP information in order to determine whether a proxy device exists (e.g., and which particular type of proxy device exists) between the source device and the destination device.
-
公开(公告)号:US20210184937A1
公开(公告)日:2021-06-17
申请号:US17176328
申请日:2021-02-16
Applicant: Cisco Technology, Inc.
Inventor: Harish Nataraj , Ajay Chandel , Nikhar Rakesh Saxena , Naveen Kondapalli , Prakash Kaligotla
Abstract: According to one or more embodiments of the disclosure, techniques herein provide for auto discovery of network proxies. In particular, in one embodiment, a controller in a computer network receives, from both source devices and destination devices, corresponding Transmission Control Protocol/Internet Protocol (TCP/IP) information and associated transaction identifiers (IDs) for packets sent by the source devices and for packets received at the destination devices. The controller may then correlate particular source TCP/IP information to particular destination TCP/IP information based on associated transaction IDs being the same, and can compare the correlated source TCP/IP information and destination TCP/IP information in order to determine whether a proxy device exists (e.g., and which particular type of proxy device exists) between the source device and the destination device.
-
公开(公告)号:US10659338B1
公开(公告)日:2020-05-19
申请号:US15800061
申请日:2017-10-31
Applicant: Cisco Technology, Inc.
Inventor: Harish Nataraj , Ajay Chandel , Naveen Kondapalli , Prakash Kaligotla
IPC: H04L12/26 , H04L12/733
Abstract: In one embodiment, an agent process produces synthetic packet traffic and iteratively performs a sub-process that determines isolated network segments of the communication channel between intermediate nodes and computes a set of network metrics for the isolated network segments based at least in part on incrementing TTL expiry error data points. The sub-process also encapsulates, for inclusion within the next packet to be sent, a list of intermediate node IDs along the communication channel up to a latest received node ID and computed sets of network metrics for respective network segments. The agent process may then generate, upon termination of the sub-process, a report, the report including the list of intermediate node IDs along the communication channel up to a latest received node ID and computed sets of network metrics for respective network segments.
-
公开(公告)号:US10462031B1
公开(公告)日:2019-10-29
申请号:US15800039
申请日:2017-10-31
Applicant: Cisco Technology, Inc.
Inventor: Harish Nataraj , Ajay Chandel , Naveen Kondapalli , Prakash Kaligotla
IPC: H04L12/26
Abstract: In one embodiment, a network agent, associated with an operating system of a computing device, tracks socket connection calls made by a plurality of cotenant processes on the computing device that share a common network transport between the computing device and a remote computing device. The network agent may then extract a process identification (ID) for the socket connection calls, the process ID identifying which particular cotenant process of the plurality of cotenant processes is making each particular socket connection call. While monitoring network metrics of network traffic flows over socket connections between the computing device and the remote computing device, the network agent may attribute given network metrics from particular socket connections to a corresponding cotenant process based on the correlated process ID for the socket connection. As such, the network agent may then report the network metrics as attributed to the corresponding cotenant processes.
-
公开(公告)号:US11522765B2
公开(公告)日:2022-12-06
申请号:US17176328
申请日:2021-02-16
Applicant: Cisco Technology, Inc.
Inventor: Harish Nataraj , Ajay Chandel , Nikhar Rakesh Saxena , Naveen Kondapalli , Prakash Kaligotla
IPC: H04L41/12 , H04L69/22 , H04L43/026 , H04L69/16 , H04L43/028 , H04L67/56 , H04L61/2514
Abstract: According to one or more embodiments of the disclosure, techniques herein provide for auto discovery of network proxies. In particular, in one embodiment, a controller in a computer network receives, from both source devices and destination devices, corresponding Transmission Control Protocol/Internet Protocol (TCP/IP) information and associated transaction identifiers (IDs) for packets sent by the source devices and for packets received at the destination devices. The controller may then correlate particular source TCP/IP information to particular destination TCP/IP information based on associated transaction IDs being the same, and can compare the correlated source TCP/IP information and destination TCP/IP information in order to determine whether a proxy device exists (e.g., and which particular type of proxy device exists) between the source device and the destination device.
-
公开(公告)号:US20190034254A1
公开(公告)日:2019-01-31
申请号:US15665299
申请日:2017-07-31
Applicant: Cisco Technology, Inc.
Inventor: Harish Nataraj , Ajay Chandel , Prakash Kaligotla , Naveen Kondapalli
IPC: G06F11/07
Abstract: In one embodiment, techniques herein monitor activity of one or more applications in a computer network, and identify individual business transactions occurring within the one or more applications. Additionally, network traffic metrics within the computer network may be determined, and particular network traffic metrics can be correlated to each of the individual business transactions. By developing a baseline of network traffic metrics based on network traffic metrics of one or more individual business transactions, a trigger may be detected to perform root cause analysis on the activity of the one or more applications. As such, the techniques herein may initiate, in response to the trigger, root cause analysis on the activity of the one or more applications, where the root cause analysis leverages the correlation of anomalous network traffic metrics to particular business transactions.
-
公开(公告)号:US20190132207A1
公开(公告)日:2019-05-02
申请号:US15800055
申请日:2017-10-31
Applicant: Cisco Technology, Inc.
Inventor: Harish Nataraj , Ajay Chandel , Nikhar Rakesh Saxena , Naveen Kondapalli , Prakash Kaligotla
Abstract: According to one or more embodiments of the disclosure, techniques herein provide for auto discovery of network proxies. In particular, in one embodiment, a controller in a computer network receives, from both source devices and destination devices, corresponding Transmission Control Protocol/Internet Protocol (TCP/IP) information and associated transaction identifiers (IDs) for packets sent by the source devices and for packets received at the destination devices. The controller may then correlate particular source TCP/IP information to particular destination TCP/IP information based on associated transaction IDs being the same, and can compare the correlated source TCP/IP information and destination TCP/IP information in order to determine whether a proxy device exists (e.g., and which particular type of proxy device exists) between the source device and the destination device.
-
-
-
-
-
-