Directory enabled policy management tool for intelligent traffic management
First Claim
Patent Images
1. A method for monitoring a flow of information coupled to a network of computers, the method comprising:
- providing a plurality of traffic classes;
associating at least one policy with each traffic class from the plurality of traffic classes;
receiving the flow of information via a communication link;
classifying the flow of information into a traffic class selected from the plurality of traffic classes, wherein the plurality of traffic classes include content of file types associated with data of the flow information, protocols or services used with the flow information, destination addresses associated with the flow information, source or origination addresses of the flow information, and a time that the flow information is received;
measuring traffic parameters for the flow of information and applying a time stamp to the measured parameters; and
applying a policy having predetermined parameter limitations which is associated with the traffic class to the flow information based on the measured traffic parameters and the time stamp to improve the quality of service for the flow of information.
17 Assignments
0 Petitions
Accused Products
Abstract
A method and system (100) for monitoring or profiling quality of service within one or more information sources in a network of computers. The method includes a step of providing a network of computers, each being coupled to each other to form a local area network. The network of computers has a firewall server (110) coupled to the network of computers and a distributed traffic management tool coupled to the firewall server. The method also includes implementing traffic monitoring or profiling of incoming and outgoing information from one of the information sources.
-
Citations
9 Claims
-
1. A method for monitoring a flow of information coupled to a network of computers, the method comprising:
-
providing a plurality of traffic classes;
associating at least one policy with each traffic class from the plurality of traffic classes;
receiving the flow of information via a communication link;
classifying the flow of information into a traffic class selected from the plurality of traffic classes, wherein the plurality of traffic classes include content of file types associated with data of the flow information, protocols or services used with the flow information, destination addresses associated with the flow information, source or origination addresses of the flow information, and a time that the flow information is received;
measuring traffic parameters for the flow of information and applying a time stamp to the measured parameters; and
applying a policy having predetermined parameter limitations which is associated with the traffic class to the flow information based on the measured traffic parameters and the time stamp to improve the quality of service for the flow of information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
determining the type of business associated with the traffic class;
determining priority of entities associated with the traffic class;
determining type of applications associated with the traffic class;
configuring a policy based on the type of business, the priority of entities, and the type of applications; and
associating the policy with the traffic class.
-
-
7. The method of claim 6 wherein:
-
determining a type of business comprises determining if the business involves an ISP; and
if the type of business involves an ISP, configuring the policy based on a business model configured by the ISP.
-
-
8. The method of claim 1 wherein applying the policy to the flow of information comprises;
-
determining bandwidth guarantees for the flow of information;
determining bandwidth limits for the flow of information;
determining bandwidth limiting priorities for the flow of information; and
determining admission control functions for the flow of information.
-
-
9. The method of claim 1 wherein applying the policy to the flow of information comprises:
-
validating the policy to be applied to the flow of information; and
applying the policy to the flow of information only if the policy is successfully validated.
-
Specification