Estimating and managing network traffic
First Claim
Patent Images
1. A method for estimating network traffic comprising:
- receiving and analyzing connectivity information associated with a network to identify a set of parameters, wherein the connectivity information includes a plurality of samples of user activities stored by a node on the network and the set of parameters includes a distribution of network resources across network regions of the network;
generating a statistical model of the network using the set of parameters, the statistical model mathematically predicting connectivity between the network regions;
modifying at least one of the parameters within the set;
simulating the network using the modified set of parameters and the statistical model; and
presenting results of the simulation for use in managing the network.
1 Assignment
0 Petitions
Accused Products
Abstract
Network traffic may be estimated using samples of network activities to identify traffic parameters. A model of the network may be generated using the traffic parameters, and the model can be used to simulate the network using a modified set of parameters. Network traffic may be managed using the results of the simulation. Network traffic can also be managed by intercepting and modifying a control message on a peer-to-peer network.
-
Citations
48 Claims
-
1. A method for estimating network traffic comprising:
-
receiving and analyzing connectivity information associated with a network to identify a set of parameters, wherein the connectivity information includes a plurality of samples of user activities stored by a node on the network and the set of parameters includes a distribution of network resources across network regions of the network;
generating a statistical model of the network using the set of parameters, the statistical model mathematically predicting connectivity between the network regions;
modifying at least one of the parameters within the set;
simulating the network using the modified set of parameters and the statistical model; and
presenting results of the simulation for use in managing the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. Logic for estimating network traffic, the logic encoded in media and operable when executed to:
-
receive and analyze connectivity information associated with a network to identify a set of parameters, wherein the connectivity information includes a plurality of samples of user activities stored by a node on the network and the set of parameters includes a distribution of network resources across network regions of the network;
generate a statistical model of the network using the set of parameters, the statistical model mathematically predicting connectivity between the network regions;
modify at least one of the parameters within the set;
simulate the network using the modified set of parameters and the statistical model; and
present results of the simulation for use in managing the network. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for managing network traffic comprising:
-
analyzing peer-to-peer communications between peers on a peer-to-peer network;
identifying, based on the peer-to-peer communications, peer-to-peer information, the peer-to-peer information including network addresses of the peers, a distribution of peers within the peer-to-peer network, and a distribution of data files stored by the peers;
intercepting a control message sent from a first peer to a second peer; and
modifying the control message based on the peer-to-peer information. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. Logic for managing network traffic, the logic encoded in media and operable when executed to:
-
analyze peer-to-peer communications between peers on a peer-to-peer network;
identify, based on the peer-to-peer communications, peer-to-peer information, the peer-to-peer information including network addresses of the peers, a distribution of peers within the peer-to-peer network, and a distribution of data files stored by the peers;
intercept a control message sent from a first peer to a second peer; and
modify the control message based on the peer-to-peer information. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
Specification