System for monitoring and managing datacenters

N Yadav, AR Singh, S Gandham, EC Scheib… - US Patent …, 2018 - Google Patents
An example method includes detecting, using sensors, packets throughout a datacenter.
The sensors can then send packet logs to various collectors which can then identify and …

MDL-based clustering for application dependency mapping

EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine an optimum number of clusters for the network using the minimum description …

Augmenting flow data for improved network monitoring and management

A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as
attributes from a source host and/or destination host of a flow, a process initiating the flow …

Cluster discovery via multi-domain fusion for application dependency mapping

A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine whether certain nodes form a cluster of a tier of an application. The network can …

Method and apparatus for adjusting audio for a user environment

P Kahn, A Kinsolving - US Patent 8,285,344, 2012 - Google Patents
US8285344B2 - Method and apparatus for adjusting audio for a user environment - Google
Patents US8285344B2 - Method and apparatus for adjusting audio for a user environment …

Techniques for determining network anomalies in data center networks

A Kulshreshtha, N Yadav, HT Vu, MS Watts… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A monitoring device/module monitors a plurality of nodes in a data center
network, and determines one or more latency distributions of response times for messages …

Optimizations for application dependency mapping

A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping can be automated in a network. The network can capture
traffic data for flows passing through the network using a sensor network that provides …

Systems and methods for wireless vulnerability analysis

A Sinha, NJ Darrow - US Patent 7,577,424, 2009 - Google Patents
Security vulnerability assessment for wireless networks is provided. Systems and methods
for security vulnerability assessment simulate an attack upon the wireless network, capture …

Personal wireless monitoring agent

SE Hrastar, S Viswanathan - US Patent 8,196,199, 2012 - Google Patents
US8196199B2 - Personal wireless monitoring agent - Google Patents US8196199B2 -
Personal wireless monitoring agent - Google Patents Personal wireless monitoring agent …

Determining a reputation of a network entity

N Yadav, SHN Rao, A Kulshreshtha, O Madani… - US Patent …, 2019 - Google Patents
An example method can include monitoring a network to identify flows between nodes in the
network. Once flows have been identified, the flows can be tagged and labelled according to …