Enterprise network analyzer host controller/zone controller interface system and method
First Claim
Patent Images
1. A method for analyzing a network utilizing a host controller, comprising:
- (a) accumulating network traffic information;
(b) tracking a predetermined interval setting;
(c) polling for the receipt of a demand over a network; and
(d) in response to the demand or the cessation of the predetermined interval setting, transmitting the network traffic information to a zone controller;
wherein enterprise latency mapping is performed, where at least one zone controller chooses a port number associated with an application and pushes a configuration request to a plurality of the host controllers in an associated zone, and the host controllers push the configuration requests to a plurality of agents so that the agents begin to monitor a port associated with the port number, such that monitor data is sent from the agents to the host controllers and buffered, whereafter the host controllers update the at least one zone controller with consolidated monitor data, where differences in delay times are calculated to construct a picture of latency throughout an enterprise;
wherein a man of a network is generated based on the network traffic information;
wherein intrusion detection services are provided based on the network traffic information.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided for analyzing a network utilizing a host controller/zone controller interface. Initially, network traffic information is collected utilizing a host controller. Then, a predetermined interval setting is tracked, and the system polls for the receipt of a demand over the network. In response to the demand or the cessation of the predetermined interval setting, the network traffic information is transmitted to a zone controller over the network.
76 Citations
28 Claims
-
1. A method for analyzing a network utilizing a host controller, comprising:
-
(a) accumulating network traffic information;
(b) tracking a predetermined interval setting;
(c) polling for the receipt of a demand over a network; and
(d) in response to the demand or the cessation of the predetermined interval setting, transmitting the network traffic information to a zone controller;
wherein enterprise latency mapping is performed, where at least one zone controller chooses a port number associated with an application and pushes a configuration request to a plurality of the host controllers in an associated zone, and the host controllers push the configuration requests to a plurality of agents so that the agents begin to monitor a port associated with the port number, such that monitor data is sent from the agents to the host controllers and buffered, whereafter the host controllers update the at least one zone controller with consolidated monitor data, where differences in delay times are calculated to construct a picture of latency throughout an enterprise;
wherein a man of a network is generated based on the network traffic information;
wherein intrusion detection services are provided based on the network traffic information. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for analyzing a network utilizing a host controller, comprising:
-
(a) computer code for accumulating network traffic information;
(b) computer code for tracking a predetermined interval setting;
(c) computer code for polling for the receipt of a demand over a network; and
(d) computer code for transmitting the network traffic information to a zone controller, in response to the demand or the cessation of the predetermined interval setting;
wherein enterprise latency mapping is performed, where at least one zone controller chooses a port number associated with an application and pushes a configuration request to a plurality of the host controllers in an associated zone, and the host controllers push the configuration requests to a plurality of agents so that the agents begin to monitor a port associated with the port number, such that monitor data is sent from the agents to the host controllers and buffered, whereafter the host controllers update the at least one zone controller with consolidated monitor data, where differences in delay times are calculated to construct a picture of latency throughout an enterprise;
wherein a map of a network is generated based on the network traffic information;
wherein intrusion detection services are provided based on the network traffic information. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system for analyzing a network utilizing a host controller, comprising:
-
(a) logic for accumulating network traffic information;
(b) logic for tracking a predetermined interval setting;
(c) logic for polling for the receipt of a demand over a network; and
(d) logic for transmitting the network traffic information to a zone controller, in response to the demand or the cessation of the predetermined interval setting;
wherein enterprise latency mapping is performed, where at least one zone controller chooses a port number associated with an application and pushes a configuration request to a plurality of the host controllers in an associated zone, and the host controllers push the configuration requests to a plurality of agents so that the agents begin to monitor a port associated with the port number, such that monitor data is sent from the agents to the host controllers and buffered, whereafter the host controllers update the at least one zone controller with consolidated monitor data, where differences in delay times are calculated to construct a picture of latency throughout an enterprise;
wherein a map of a network is generated based on the network traffic information;
wherein intrusion detection services are provided based on the network traffic information. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for analyzing a network utilizing a host controller, comprising:
-
(a) accumulating network traffic information;
(b) transmitting the network traffic information to a zone controller;
(c) generating a map of the network based on the network traffic information; and
(d) transmitting the map to the zone controller;
wherein enterprise latency mapping is performed, where at least one zone controller chooses a port number associated with an application and pushes a configuration request to a plurality of the host controllers in an associated zone, and the host controllers push the configuration requests to a plurality of agents so that the agents begin to monitor a port associated with the port number, such that monitor data is sent from the agents to the host controllers and buffered, whereafter the host controllers update the at least one zone controller with consolidated monitor data, where differences in delay times are calculated to construct a picture of latency throughout an enterprise;
wherein intrusion detection services are provided based on the network traffic information.
-
-
20. A method for analyzing a network utilizing a host controller, comprising:
-
(a) receiving an interval setting from a zone controller;
(b) accumulating network traffic information from a plurality of agents distributed over a network based on the zone controller;
(c) tracking a predetermined interval setting;
(d) polling for the receipt of a demand over the network;
(e) in response to the demand or the cessation of the predetermined interval setting, transmitting the network traffic information to the zone controller;
(f) generating a map of the network based on the network traffic information;
(g) transmitting the map to the zone controller; and
(h) synchronizing a clock between the host controller and the zone controller;
wherein enterprise latency mapping is performed, where at least one zone controller chooses a port number associated with an application and pushes a configuration request to a plurality of the host controllers in an associated zone, and the host controllers push the configuration requests to the agents so that the agents begin to monitor a port associated with the port number, such that monitor data is sent from the agents to the host controllers and buffered, whereafter the host controllers update the at least one zone controller with consolidated monitor data, where differences in delay times are calculated to construct a picture of latency throughout an enterprise;
wherein intrusion detection services are provided based on the network traffic information.
-
-
21. A method for analyzing a network, comprising:
-
accumulating network traffic information from at least one computer utilizing an information collector;
transmitting the network traffic information to an information collector manager; and
generating a map of the network based on the network traffic information;
wherein enterprise latency mapping is performed, where at least one zone controller chooses a port number associated with an application and pushes a configuration request to a plurality of the information collector managers in an associated zone, and the information collector managers push the configuration requests to a plurality of the information collectors so that the information collectors begin to monitor a port associated with the port number, such that monitor data is sent from the information collectors to the information collector managers and buffered, whereafter the information collector managers update the at least one zone controller with consolidated monitor data, where differences in delay times are calculated to construct a picture of latency throughout an enterprise;
wherein intrusion detection services are provided based on the network traffic information. - View Dependent Claims (22, 23, 24)
-
-
25. A computer program product for analyzing a network, comprising:
-
computer code for accumulating network traffic information from at least one source utilizing an information collector;
computer code for transmitting the network traffic information to an information collector manager; and
computer code for generating a map of the network based on the network traffic information;
wherein enterprise latency mapping is performed, where at least one zone controller chooses a port number associated with an application and pushes a configuration request to a plurality of the information collector managers in an associated zone, and the information collector managers push the configuration requests to a plurality of the information collectors so that the information collectors begin to monitor a port associated with the port number, such that monitor data is sent from the information collectors to the information collector managers and buffered, whereafter the information collector managers update the at least one zone controller with consolidated monitor data, where differences in delay times are calculated to construct a picture of latency throughout an enterprise;
wherein intrusion detection services are provided based on the network traffic information. - View Dependent Claims (26, 27, 28)
-
Specification