David B. Hamilton - Milpitas CA, US Marcus Thordal - Los Gatos CA, US Prakash Kaligotla - Milpitas CA, US Hui-Lin Li - Sunnyvale CA, US
Assignee:
Brocade Communications Systems, Inc. - San Jose CA
International Classification:
H04L 9/00
US Classification:
713150
Abstract:
A management station which manages the encryption devices in a SAN to set up encrypted LUNs. In setting up the encryption, the source and target ports are identified, along with the target LUN. LUN serial numbers used to identify unique LUNs. As paths to a given LUN are defined, the management station compares the path to existing paths and provides an indication if there is a mismatch in the encryption policies or keys being applied to the LUN over the various paths. This allows the administrator to readily identify when there is a problem with the paths to an encrypted LUN and then take steps to cure the problem. By determining the paths and then comparing them, the management station greatly simplifies setting up multipath I/O to an encrypted LUN or access by multiple hosts to an encrypted LUN.
Application Performance Management Integration With Network Assurance
- San Jose CA, US David John Zacks - Vancouver, CA Mark Montanez - Gilroy CA, US Prakash Kaligotla - San Jose CA, US
International Classification:
H04L 12/26 H04L 12/24
Abstract:
Systems, methods, and computer-readable for determining performance metrics of a network include obtaining, from a network assurance system, one or more network performance metrics, the network performance metrics corresponding to execution of one or more applications in a network domain. An Application Performance Management (APM) system provides one or more applications performance metrics, the applications performance metrics corresponding to execution of the one or more applications in an applications domain. The one or more network performance metrics are integrated with the one or more applications performance metrics to determine integrated performance metrics for the one or more applications across the network domain and the applications domain.
Deep Network Path Analysis For Identifying Network Segments Affecting Application Performance
- San Jose CA, US Ajay Chandel - Fremont CA, US Prakash Kaligotla - San Jose CA, US
International Classification:
H04L 12/24 H04L 12/803 H04L 12/801 H04L 12/26
Abstract:
In one embodiment, a network analysis process initiates network path analysis for a transaction application operating over a logical transaction path having a first segment from a first set of transaction servers to a load balancer and a second segment then to a second set of transaction servers. The network path analysis, when for the second segment, comprises: selecting a receiving transaction server of the second set of transaction servers; identifying a TCP session associated with the transaction application already in progress to the receiving transaction server; initiating a TCP traceroute using ACK packets, whose signature matches the in-progress TCP session, from the receiving transaction server to the load balancer; and determining, in reverse, a network path of layer-3 segments and associated network metrics between the receiving transaction server and the load balancer. Specific layer-3 segments of the network path causing performance degradation of the transaction application are then identifiable.
- San Jose CA, US Ajay Chandel - Fremont CA, US Nikhar Rakesh Saxena - Dublin CA, US Naveen Kondapalli - San Ramon CA, US Prakash Kaligotla - San Jose CA, US
International Classification:
H04L 12/24 H04L 29/06
Abstract:
According to one or more embodiments of the disclosure, techniques herein provide for auto discovery of network proxies. In particular, in one embodiment, a controller in a computer network receives, from both source devices and destination devices, corresponding Transmission Control Protocol/Internet Protocol (TCP/IP) information and associated transaction identifiers (IDs) for packets sent by the source devices and for packets received at the destination devices. The controller may then correlate particular source TCP/IP information to particular destination TCP/IP information based on associated transaction IDs being the same, and can compare the correlated source TCP/IP information and destination TCP/IP information in order to determine whether a proxy device exists (e.g., and which particular type of proxy device exists) between the source device and the destination device.
- San Jose CA, US Ajay Chandel - Fremont CA, US Prakash Kaligotla - San Jose CA, US Naveen Kondapalli - San Ramon CA, US
International Classification:
G06F 11/07
Abstract:
In one embodiment, techniques herein monitor activity of one or more applications in a computer network, and identify individual business transactions occurring within the one or more applications. Additionally, network traffic metrics within the computer network may be determined, and particular network traffic metrics can be correlated to each of the individual business transactions. By developing a baseline of network traffic metrics based on network traffic metrics of one or more individual business transactions, a trigger may be detected to perform root cause analysis on the activity of the one or more applications. As such, the techniques herein may initiate, in response to the trigger, root cause analysis on the activity of the one or more applications, where the root cause analysis leverages the correlation of anomalous network traffic metrics to particular business transactions.
Correlating Performance Outliers And Network Performance Impacting Event Metric
- San Francisco CA, US Nikhar Rakesh Saxena - Dublin CA, US Prakash Kaligotla - San Jose CA, US
Assignee:
AppDynamics, LLC - San Francisco CA
International Classification:
H04L 12/26 H04L 12/24 G06N 99/00
Abstract:
In one aspect, a system for correlating application performance data with network performance data is disclosed. The system includes: a processor; a memory; and one or more modules stored in the memory and executable by a processor to perform operations. The operations include: receive data associated with monitored environment performing a distributed business transaction; identify business transaction performance outliers and network performance impacting events from the received data; generate a single network performance impacting event metric by categorizing the network performance events; provide a user interface for displaying an interactive report of the received data including the identified business transaction performance outliers and the generated single network performance impacting event metric; and display, through the user interface, correlation of the identified business transaction performance outliers and the generated single network performance impacting event metric using a common time scale.
Distributed Business Transaction Path Network Metrics
- San Francisco CA, US Ajay Chandel - Fremont CA, US Prakash Kaligotla - San Francisco CA, US Naveen Kondapalli - San Ramon CA, US
International Classification:
H04L 12/26 H04L 12/24 H04L 29/08
Abstract:
In one aspect, the performance of a network within the context of an application using that network is determined for a distributed business transaction. Network data is collected and correlated with a business transaction along with an application that uses the network and implements the distributed business transaction. The collected network data is culled, and the remaining data is rolled up into one or more metrics. The metrics, selected network data, and other data are reported in the context of the distributed business transaction. In this manner, specific network performance and architecture data associated with the distributed business transaction is reported along with application context information.
Network Aware Distributed Business Transaction Anomaly Detection
- San Francisco CA, US Ajay Chandel - Fremont CA, US Prakash Kaligotla - San Francisco CA, US Naveen Kondapalli - San Ramon CA, US
Assignee:
AppDynamics, Inc. - San Francisco CA
International Classification:
H04L 12/26
Abstract:
A system monitors applications and network flows used during the business transaction to determine distributed business transaction anomalies caused at least in part by network performance issues. A network flow associated with a business transaction is monitored by a network agent. The network agent may capture packets, analyze the packets and other network data to determine one or more baselines, and dynamically compare subsequent network flow performance to those baselines to determine an anomaly. When an anomaly in a network flow is detected, this information may be provided to a user along with other data regarding a business transaction that is utilizing the network flow. Concurrently with the network agent monitoring, application agents may monitor one or more applications performing the business transaction. The present system reports performance data for a business transaction in terms of application performance and network performance, all in the context of a distributed business transaction.
Appdynamics
Director, Software Engineering
Brocade Mar 2011 - Feb 2015
Senior Manager- Software Engineering
Brocade Sep 2007 - Mar 2011
Senior Staff Software Engineer
Mcdata Corporation Apr 2005 - Sep 2007
Software Engineer
Oracle 2000 - 2005
Project Lead and Applications Engineer
Education:
Cleveland State University 1999 - 2000
Masters, Computer Science
Birla Institute of Technology and Science, Pilani 1994 - 1998
Masters, Electronics
Skills:
Cloud Computing Software Development Java Agile Methodologies Ethernet Storage Virtualization Snmp San Clearcase Tcp/Ip Integration Storage Area Networks Databases Sdlc Distributed Systems Testing Test Automation Program Management Network Management Applications Sdn Openstack Openflow Splunk