Push pull data collection

ABSTRACT

A monitoring device responds to status data pushed from a network device, and also manages a link with another network device, the link allowing the monitoring device to pull status data from the second network device. The monitoring device receives packets including status, the data indicating activity for one or more clock ticks. The monitoring device can compute statistical measures, rather than the network device. The monitoring device maintains the status data in a buffer. The monitoring device lags actual activity, but has is more likely to capture delayed packets. The network device sends packets as wrappers, each wrapper indicating sets of status information. When the information in a wrapper crosses a clock tick boundary, the monitoring device allocates reported activity among clock ticks, assuming that activity follows a uniform distribution.

RELATED DOCUMENTS

The specification, filed on Jun. 9, 2017, is a continuation and does notcontain “new matter.”

This Application relates to devices, methods, and techniques, such asdescribed in the following documents, and documents quoted therein orrelated thereto:

-   -   U.S. application Ser. No. 12/180,437; filed Jul. 25, 2008; in        the name of inventors Derek SANDERS, Rangaswamy JAGANNATHAN,        Rosanna LEE, Kishor KAKATKAR, and Xiaohong PAN; titled “Symptom        Detection Using Behavior Probability Density, Network Monitoring        of Multiple Observation Values Types, and Network Monitoring        Using Orthogonal Profiling Dimensions”;    -   U.S. application Ser. No. 12/791,704; filed Jun. 1, 2010; in the        name of inventors Kishor KAKATKAR, Roy NAKASHIMA, Rosanna LEE,        Jing LIU, Derek SANDERS, Rangaswamy JAGANNATHAN, and David        MESSINA; titled “Recording, Replay, and Sharing of Live Network        Monitoring Views”;    -   U.S. Provisional Application Ser. No. 62/041,130; filed Aug. 24,        2014; in the name of inventors Rosanna LEE, Rangaswamy        JAGANNATHAN, and Jing LIU; titled “Push Pull Data Collection”;    -   U.S. application Ser. No. 14/834,367; filed Aug. 24, 2015; in        the name of inventors Rosanna LEE, Rangaswamy JAGANNATHAN, and        Derek SANDERS; titled “Push Pull Data Collection”;    -   U.S. Provisional Application Ser. No. 62/041,141; filed Aug. 24,        2014; in the name of inventors Rosanna LEE, Rangaswamy        JAGANNATHAN, and Jing LIU; titled “Cross-silo Time Stitching”;    -   U.S. application Ser. No. 14/834,371; filed Aug. 24, 2015; in        the name of inventors Rosanna LEE, Rangaswamy JAGANNATHAN, and        Derek SANDERS; titled “Cross-silo Time Stitching”.    -   U.S. Provisional Application Ser. No. 62/041,140; filed Aug. 24,        2014; in the name of inventors Jing LIU, Rangaswamy JAGANNATHAN,        and Rosanna LEE; titled “Enhanced flow processing”;    -   U.S. application Ser. No. 14/834,424; filed Aug. 24, 2015; in        the name of inventors Rosanna LEE, Rangaswamy JAGANNATHAN, and        Derek SANDERS; titled “Enhanced flow processing”;    -   U.S. Provisional Application Ser. No. 62/041,143; filed Aug. 24,        2014; in the name of inventors Derek SANDERS, Rangaswamy        JAGANNATHAN, and Rosanna LEE; titled “Self-learning and        best-practices profiling and alerting with relative and absolute        capacity”;    -   U.S. Provisional Application Ser. No. 62/041,135; filed Aug. 24,        2014; in the name of inventors Rosanna LEE, Derek SANDERS,        Rangaswamy JAGANNATHAN, and Jing LIU; titled “Storm detection,        analysis, and remediation”;    -   A Technical Appendix having 1 page, titled “Xangati solution        architecture extensible across cloud applications and cloud        stacks,” a copy of which is enclosed herewith, and incorporated        by reference as if fully set forth herein.

Each and every one of these documents, as well as all documents citedtherein, is hereby incorporated by reference as if fully recited herein.

This Application claims priority of each and every one of thesedocuments, as well as to all documents incorporated therein, to thefullest extent possible.

BACKGROUND Field of the Disclosure

This Application can relate to push pull data collection, and othermatters. For example, this Application can include information relatingto push pull data collection in a distributed network monitoringenvironment.

Other and further possibilities are described herein.

Related Art

One problem that has arisen, particularly in the field of networkmonitoring, is that some network devices will provide status data ontheir own initiative (or for an extended period of time, after havingbeen asked to do so), such as routers in a distributed networkmonitoring environment. For example, at least some routers in adistributed network monitoring environment will, upon request, providestatus data periodically, such as each second, to the requesting device.For example, that status data can take the form of message packetsindicating the amount of network traffic they have transferred from oneendpoint to another in a selected time frame. In contrast, other networkdevices will generally only provide status data when explicitlyrequested to do so, such as in the form of a message packet requestingthat status data. For example, at least some commercially availablevirtual machines (VM's) will provide status data only when requested,and will only provide that status data in the form of a message packeteither (1) providing raw data, such as a count of access requests todata storage made by that virtual machine, or (2) providing a summary ofinformation, such as an average of the number of access requests to datastorage, but for a relatively longer time than routers or other networkdevices might provide.

This can present multiple problems for monitoring devices in thedistributed network monitoring environment.

-   -   First, when a monitoring device receives information indicating        status data for different amounts of time for distinct network        devices, the monitoring device might have difficulty        reconciling, within the meaning of the distributed network        monitoring environment, the status data provided by a first        device with status data provided by a second device.    -   Second, when a monitoring device receives information indicating        differing types of status data for distinct network devices,        that monitoring device might have to determine for itself        meaningful and reconcilable status data, within the meaning of        the distributed network monitoring environment, from the status        data provided by the first device (in a first format) and the        status data provided provided by a second device (in a second        format).    -   Third, when a monitoring device requests status data from a        particular network device, either the monitoring device or the        particular network device, or both, might be unable to handle        the request within a sufficiently short time duration that the        status data can still be included with other status data in a        meaningful network monitoring report, within the meaning of the        distributed network monitoring environment.    -   Fourth, when a monitoring device requests status data from a        particular network device, either the monitoring device or the        particular network device, or both, might be unable to handle        their other tasks within a relatively reasonable time duration,        with the effect that the request for status data to the        particular network device, or the response from the particular        network device, might degrade the ability of that network device        within the distributed network monitoring environment.

One possibility is sometimes referred to as “virtual infrastructureoperations management.” The possibility can provide that virtualmachines implemented at the network device are each outfitted with theirown local monitoring elements. Those local monitoring elements might bedisposed to measure resource utilization metrics, to report (postmortem, that is, after the fact) any errors discovered about performanceof the network device or its virtual machines, or to perform capacitymanagement. While this possibility might have the capability ofperforming these functions at the network device, with the effect thatthe monitoring device is not burdened with those functions, thepossibility can be subject to several drawbacks.

-   -   One drawback is that the local monitoring elements cannot        conveniently or easily be disposed to obtain information from        more than one “silo,” that is, information with respect to a        function performed by the network device. Thus, the push data        and the pull data cannot conveniently or easily be coordinated        to provide a unitary in-order time record. Moreover, status data        in differing formats or embodying differing concepts would have        to be collated by each individual network device's local        monitoring elements, with the strong probability that        differences or errors would creep into the implementation of        those local monitoring elements.    -   Another drawback is that the network device's local monitoring        element cannot conveniently or easily be disposed to be        coordinated with status data with respect to any other network        device. For example, a virtual machine operating on a server        might be able to provide status data its own operation, but it        would not be able to coordinate its own status data with another        network device, such as a data storage element. Moreover, a        local monitoring element for a virtual machine operating on a        server would not be able to conveniently or easily manipulate        status data in another format, such as status data from another        network device.

Another possibility might be to install a reporting element, such as asoftware program including instructions capable of being interpreted bythe network device, or another computing device accessible to thenetwork device, to collect status data and send that information to oneor more monitoring devices, in a manner convenient to those monitoringdevices. While this possibility might have the capability ofameliorating difficulties the monitoring devices might have inprocessing status data they receive from network devices, thepossibility can be subject to several drawbacks.

-   -   One drawback is that the reporting element might be incompatible        with some other element of the network device, whether hardware,        software, or otherwise. For example, if the reporting element        relies on a particular aspect of the network device's operating        system, or of a guest operating system in a virtual machine in        the network device, there is always a chance that any upgrades        or other changes in one or more of those operating systems will        cause the reporting element to perform improperly, or vice        versa.

Another drawback is that, for these and other reasons, historically,operators of network devices have been substantially hostile to suchreporting elements.

Some Drawbacks of the Known Art

Each of these issues, either alone or in combination with others, atsome times, or in some conditions, can difficulty in aspects ofeffective and efficient collation of status data from more than onenetwork device, more than one type of network device, or more than oneformat or type of status data, or otherwise, particularly in adistributed network monitoring environment.

BRIEF SUMMARY

A system includes apparatus, such as a network monitoring device,capable of responding to status data pushed from a network device, andof maintaining that status data in an accessible database.

In one embodiment (in a push circumstance for status data), the networkmonitoring device receives message packets from a network device thatcan include status data information, such as (in the case of networktraffic status data) a number of message packets and a number of octetsprocessed by the network device in a recent time duration (sometimesreferred to herein as a “clock tick”). For example, the network devicecan send message packets each second, which each include status datainformation for the previous clock tick. In such cases, the networkdevice can send each message packet as a wrapper, the wrapper includingsets of status data information, each set of status data informationbeing associated with an earlier clock tick. As network traffic issometimes delayed, it is not necessarily so that the status data messagepackets arrive in order. Accordingly, the network monitoring devicemaintains a buffer of one to two minutes (that is, 60-120 seconds or,equivalently, 60-120 clock ticks). The inventors have found that with abuffer of one minute, approximately 95% of all status data messagepackets are retrieved by the network monitoring device before the bufferis recycled, and with a buffer of two minutes, approximately 99% of allstatus data message packets are retrieved by the network monitoringdevice before the buffer is recycled. An even larger buffer would belikely to maintain an even greater probability that status data messagepackets would arrive before the buffer had to be recycled. Whether thisis worth it is up to the operator of the network monitoring device andits users.

In one embodiment, the network monitoring device assigns each wrapper ina status data message packet a beginning and ending time stamp, with theeffect that the network monitoring device can determine a time durationof the period for which the network device is reporting (usually exactlyone clock tick, but it is possible to be more or less); and whether thestatus data message packet is appropriately associated with the mostrecent clock tick, or whether the status data message packet was delayedin transit, and belongs to an earlier clock tick. In either case, thesystem assigns the status data in the message packet to the proper clocktick, maintains that information in the buffer, and when the buffer isrecycled to that point, emits one or more messages to users to presentlive (or recordable) status data thereto.

In one embodiment, the network monitoring device assumes that actualstatus data indicates activity that was processed by the network devicein a substantially uniform distribution. For example, if the status datamessage packet indicates that the network device processed 600 items inthe past 10 clock ticks, the network monitoring device assumes, unlesstold otherwise, that there were 60 data items for each such clock tick.If a status data message packet crosses a clock tick boundary, thenetwork monitoring device can divide the message packet into more thanone such message packet, assigning data items to each portion of theoriginal message packet in response to where it crossed the clock tickboundary. This is described in other and further detail herein.

In different circumstances (that is, in a pull circumstance for statusdata), the network monitoring device can obtain status data messagepackets from a network device by communicating with the network devicein a similar manner as a client-server relationship. In such cases, thenetwork monitoring device would be similar to the client, thus makingrequests for status data from the network device, and the network devicewould be similar to the server, making responses including that statusdata information. However, in many cases, such as with vmWare devices,the network device is unwilling to provide status data message packetsas often as each clock tick, so the network device accumulates statusdata for longer, such as about 20 seconds for data storage accessinformation maintained by virtual machines. Even this value can vary, asresource usage at the virtual machine can cause the virtual machine toprovide status data message packet less frequently or with less statusdata, such as possibly as little as only five seconds for data storageaccess information.

Possibly, the network device can provide a set of average usage valuesfor the reported time duration as the status data (sometimes referred toherein as “cooked” status data), or can provide a set of register valuesat the start and end of the reported time duration as the status data(sometimes referred to herein as “raw” status data). In the latter suchcase, the network monitoring device determines the format of the statusdata information in the message packet, computes the cooked status dataon behalf of the network device, and maintains the cooked status data inthe buffer at the appropriate one or more clock ticks. Similar to theprocess described above, the network monitoring device allocates thestatus data, from the network device, among the clock ticks, assumingthat activity follows a substantially uniform distribution.

Moreover, the network monitoring device manages its communication withthe network device, so as to manage how much status data it canretrieve, how much load it is placing on its “server,” the networkdevice, and how much load it is placing on itself. When the networkmonitoring device places excess load on the network device, the latterhas the possibility of throttling back the amount of status data itprovides, or the number of message packet it provides, or the fidelityof the status data to actual measurements, or even whether it is willingto communicate with the network monitoring device at all.

Other and further details are included herein.

This Application

After reading this application, those skilled in the art would recognizethat techniques shown in this application are applicable to more thanjust the specific embodiments shown herein. For example, theapplicability of the techniques shown herein can broadly encompass awide variety of network monitoring techniques. These can include “push”techniques, in which the network device pushes the status data out tothe network monitoring device, “pull” techniques, in which the networkmonitoring device explicitly requests status data information from thenetwork device, “polling” techniques, in which the network monitoringdevice looks to each network device in a round-robin or similar fashionto determine if any status data information is available, “sharedmemory” techniques, in which the network monitoring device and thenetwork device can each include one or more portions of memory in whichstatus data information can be maintained, and otherwise.

Moreover, after reading this application, those skilled in the art wouldrecognize that techniques shown in this application are applicable, orcan be made applicable with relatively small effort that does notinclude undue experiment or further invention, to circumstances in whichthe status data information is fuzzy, probabilistic, unclear, unknown,or otherwise. For example, while this Application is primarily directedto status data information that can be explicitly stated and maintainedin non-volatile (or volatile) storage, or in memory or mass storage, inthe context of the invention, there is no particular requirement for anysuch limitation. In such cases, the status data can include informationthat is only meaningful when examined over a period of time, or whencombined with other information, or when interpreted by a user—or byanother computing device, a machine learning system, an ArtificialIntelligence system, one or more human beings (possibly with expertknowledge).

Moreover, after reading this application, those skilled in the art wouldrecognize that techniques shown in this application are applicable, orcan be made applicable with relatively small effort that does notinclude undue experiment or further invention, to circumstances in whichthe status data information is maintained in a data structure other thana buffer, such as when the status data information is maintained due tocircumstances other than network delay. For example, the status data canbe maintained in a data structure that includes one or more hashingtechniques, one or more hierarchical techniques (such as a treestructure, directed graph, or lattice), one or more holographictechniques (such as a content-addressable memory, a Kohonen network, abiochemical computing device, or otherwise), or some other technique.

Moreover, after reading this application, those skilled in the art wouldrecognize that techniques shown in this application are applicable, tomany other circumstances not explicitly described, such as status datathat is distinguished by its application to activity with respect tolocation in an area or region (such as a particular set of networkdevices or endpoints in one or more selected places), or in anotherstate-space (such as a particular set of network devices or endpointsusing one or more virtual machines, virtual machine applications, realor virtual machine communication ports, or otherwise).

Possible Applicability

After reading this Application, those skilled in the art would recognizethat techniques shown herein are applicable to more than just thespecific embodiments shown herein, are within the scope and spirit ofthe invention, and would not require undue experiment or furtherinvention.

Some particular implementations could include one or more of thefollowing:

-   -   Use of push pull data collection in other types of network        environments

Other and further techniques, also shown or suggested by thisApplication, are also applicable to more than just the specificembodiments described herein.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a conceptual drawing of a system, and method of making thesame.

FIG. 2 shows a conceptual drawing of a status data buffer.

FIG. 3 shows a conceptual drawing of a method of operation.

DETAILED DESCRIPTION OF AN EMBODIMENT Terminology

Generality of the Description

Ideas and technologies shown or suggested by this Application should bethought of in their most general form, including without limitation,considering one or more of the following:

-   -   The phrases and terms “Application,” “this Application,” “this        Disclosure,” and variants thereof, generally refer to this        Specification, Drawings, Figures, and Claims, all other parts of        this Application, and all facts known in the art at the time of        filing, and all facts that can be rationally concluded        therefrom.    -   When an apparatus element or a method step is said to “include”        or “perform,” and variants thereof, or otherwise be restricted        in some way, this Application should be read that the subpart of        the apparatus element, or the sub-step of the method, and the        restriction mentioned, is only optional, not required. After        reading this Application, those skilled in the art would        recognize that those apparatus elements or method steps need not        necessarily include or perform those particular subparts or        sub-steps. In the context of the invention, no such particular        subparts or sub-steps are particularly required. In an        alternative embodiment, apparatus elements or method steps        without those sub-parts or sub-steps would be workable, are        within the scope and spirit of the invention, and would not        require undue experiment or further invention.    -   The phrases and terms “in one example,” “in one embodiment,” “in        one implementation,” “in one scenario,” “in possible examples,”        “in possible embodiments,” “in possible implementations,” “in        possible scenario,” and variants thereof, generally refer that a        particular characteristic, feature, or structure, described        herein is included in at least one embodiment of the invention.        Multiple uses of this phrase do not necessarily all refer to the        same embodiment. Rather, the specific particular characteristic,        feature, or structure, described herein might be combined in any        suitable manner into one or more distinct possible embodiments.    -   The phrases and terms “perform,” and variants thereof, generally        refer (in the context of a program of instructions) any one or        more means by which those instructions are executed or        interpreted, or a device (such as a computing device) otherwise        conducts the process indicated by that program of instructions.        A program of instructions can be detected or interpreted at one        location, and executed or its process conducted at another        location. A program of instructions can be performed by a        portion of a device, rather than the entire device, or by one or        more devices, or by one or more portions of devices (the same        device or different devices). A program of instructions can be        per-formed by an emulated device, such as a virtual machine,        “sandbox” environment, or otherwise. A program of instructions        can be performed in part, halted or paused or stopped,        transferred to another device, in whole or in part, and possibly        continued.    -   The phrases and terms “relatively,” and variants thereof,        generally refer any relationship in which a comparison is        possible, including without limitation “relatively less,”        “relatively more,” and otherwise. In the context of the        invention, where a measure or value is indicated to have a        relationship “relatively,” that relationship need not be        precise, need not be well-defined, and need not be by comparison        with any particular or specific other measure or value. For one        example, whenever a measure or value is “relatively increased”        or “relatively more,” that comparison need not be with respect        to any known measure or value, but might be with respect to a        measure or value held by that measurement or value at another        place or time, or with respect to a measure or value commonly        used in the art.    -   The phrases and terms “substantially,” and variants thereof,        generally refer any circumstance in which a determination,        measure, value, or otherwise; is equal, equivalent, nearly        equal, nearly equivalent, or approximately; what the measure or        value is recited to be. For example, the phrases and terms        “substantially all,” and variants thereof, generally refer any        circumstance in which all, except possibly a relatively minor        amount or number, have the stated property. For example, the        phrases and terms “substantially none,” and variants thereof,        generally refer any circumstance in which none, except possibly        a relatively minor amount or number, have the stated property.        For example, the phrases and terms “substantial effect,” and        variants thereof, generally refer any circumstance in which an        effect might be detected or determined.    -   The phrases and terms “techniques,” and variants thereof,        generally refer any material suitable for description, including        without limitation all such material within the scope of        patentable subject matter. Whenever a method step is described,        those skilled in the art would know, without further invention        or undue experiment, that this application thereby also        describes (1) at least a first product, such as one maintaining        instructions that are interpretable by a computing device, where        those instructions direct one or more devices to perform that        method step; and (2) at least a second product, such as one        capable of performing that method step.

After reading this application, those skilled in the art would realizethat the invention is not in any way limited to the specifics of anyparticular example. Many other variations are possible that remainwithin the content, scope and spirit of the invention, and thesevariations would be clear to those skilled in the art, without furtherinvention or undue experiment.

Specific Phrases and Terms

One or more of the following phrases and terms can be used in thisApplication. Where clear from the context, they can have the meaningsdescribed herein. After reading this Application, those skilled in theart would recognize that these phrases and terms can have other, broaderand further, meanings as well or instead.

Ideas and technologies shown or suggested by, or specific to, thisApplication should be thought of in their most general form, includingwithout limitation, considering one or more of the following:

-   -   The terms and phrases “collate,” and variants thereof, generally        indicate that the status data information can be collected in an        arrangement, order, structure, or otherwise, not equal to the        way it was collected. For example, status data information can        be considered to be collated when it arrives out of time order        at the network monitoring device from the network device, due to        network delay or some other characteristic of the communication        between the network monitoring device and the network device.        Alternatively, status data can be considered to be collated when        it arrives in a first format and is converted to a second format        by one or more computing devices.    -   The terms and phrases “data storage,” and variants thereof,        generally indicate one or more real or virtual devices that are        capable of maintaining data or information for later access,        either by the same device that stored the data or information,        or by another device.    -   The terms and phrases “monitoring device,” “network monitoring,”        and variants thereof, generally indicate one or more real or        virtual devices that can perform the functions of monitoring        network devices, or their activity, such as by determining or        gleaning status data information, collating that status data        information, and processing that collated status data        information.    -   The terms and phrases “network device,” and variants thereof,        generally indicate any device including computational capacity,        such as a real or virtual processing substrate, a real or        virtual data storage element, a real or virtual network        communication element, a real or virtual memory, or otherwise.    -   The terms and phrases “local monitoring element,” “reporting        element,” and variants thereof, generally indicate any portion        of one or more network devices, or some combination or        conjunction thereof, that can include the capability of        generating a report of status data information. For example, a        network device that can include a virtual machine, when the        virtual machine can provide status data information to the        network monitoring device, can include a reporting element.    -   The terms and phrases “status data,” and variants thereof,        generally indicate any information indicating activity or        capability of a network device, such as processing capacity,        memory capacity, storage capacity, network activity, or        otherwise. Status data is not generally limited to capacity, and        can include expandability, latency, reliability, size, or any        other feature useful in the field of computing that can include        computing devices.    -   The terms and phrases “silo,” and variants thereof, generally        indicate any division of status data information into categories        of activity, capability, capacity, or otherwise. For example,        network bandwidth and processing power can be in distinct silos        of status data information, as can the difference between either        of those measures and any measure from the group: memory, data        storage, application servers, virtual machine capacity, or        otherwise.

Any terms appearing in the figures but not explicitly described in thisApplication should be apparent to those skilled in the art.

After reading this application, those skilled in the art would realizethat the invention is not in any way limited to the specifics of anyparticular example. Many other variations are possible that remainwithin the content, scope and spirit of the invention, and thesevariations would be clear to those skilled in the art, without undueexperiment or further invention.

FIG. 1

FIG. 1 shows a conceptual drawing of a system, and method of making thesame.

In possible implementations, a system 100 can include elements describedherein, other elements shown in the figure, and possibly other elements.Not all elements are required. Elements should be considered optional,unless otherwise specified or unless clearly obvious for operation ofthe system. Elements may also be embodied in one or more devices, notnecessarily in only a single device.

FIG. 1, Element Identifiers

System elements and sub-elements are sometimes described herein withrespect to the following reference numbers and/or names:

-   100—System-   110—Communication network-   111—Network devices-   112—Network monitoring devices-   113—Message packet-   120—Computing devices-   121—Port(s)-   122—Virtual machine-   123—Hypervisor-   124—Host operating system-   125—Guest operating system-   126—Application servers-   127—Virtual desktop-   128—User(s)-   129—Virtual desktop implementation-   130—Database-   131—Virtual data stores

FIG. 1, Configuration of Elements

A system 100 includes elements described herein, other elements shown inthe figure, and possibly other elements. Not all elements are required.Elements should be considered optional, unless otherwise specified orunless clearly obvious for operation of the system.

Communication Network

The system 100 can include a communication network 110, suitablydisposed to interact with other elements described herein. In general,when elements described herein communicate, they do so using thecommunication network 110. The communication network 110 can include oneor more network devices 111, such as network routers, and can bedisposed as a TCP/IP network, an IEEE 802.11 wireless communicationnetwork 110, an Ethernet or other local communication network 110, asubdivision of the Internet, or otherwise. The communication network 110can also include one or more network monitoring devices 112, coupled tothe communication network 110, and capable of reviewing message packets113 that are transmitted on the communication network 110, withoutinterfering with transmission or reception of those message packet 113.

Computing Device

The system 100 (in particular, the network devices 111) can include oneor more computing devices 120, such as computing servers, quantumcomputers, or other types of computing devices. Each particularcomputing device 120 of the one or more computing devices 120 caninclude one or more ports 121 coupling the particular computing device120 to the communication network 110, with the effect that theparticular computing device 120 can exchange message packets 113 withother devices coupled to the communication network 110.

Virtual Machine

Each particular computing device 120 can also include one or morevirtual machines 122, each virtual machine 122 being capable of beingcontrolled by a hypervisor 123 that is executed by the particularcomputing device 120. Each virtual machine 122 can include a hostoperating system 124 (controlled by the hypervisor 123) and one or moreguest operating systems 125 (each controlled by a host operating system124). Each virtual machine 122 can also include one or more applicationservers 126 (controlled by the guest operating system 125), each capableof receiving messages from a client device (a particular network device111, as otherwise and further described herein) and capable ofresponding to those messages.

Virtual Desktop

Each virtual machine 122 can execute an application server 126 thatpresents a virtual desktop 127 to one or more users 128. In such cases,the virtual desktop 127 can include one or more output elements (such asa display screen and/or a speaker), and be responsive to one or moreinput devices (such as a keyboard and/or a pointing device), eachshowing one or more application programs executing in a windowingsystem, with the effect that a particular user 128 can interact with thevirtual desktop 127, using the communication network 110, as if theparticular user 128 were physically present at the virtual machine 122and, by implication, at the particular computing device 120 on whichthat virtual machine 122 is executed.

Virtual Desktop Implementation

In one embodiment, one or more of those virtual desktops 127 caninclude, or be coupled to, a virtual desktop implementation 129. Thevirtual desktop implementation 129 can include a software programexecuted by the virtual machine 122, capable of exchanging messagepackets 113 with the user 128, in which the message packets 113 can besubstantially compressed and can include substantial error correctingcoding. This can have the effect that communication between the virtualdesktop 127 and the user 128 can be sufficiently smooth as if thevirtual desktop 127 and the user 128 were physically local, and thattheir exchange of messages using the communication network 110 weresubstantially invisible to the user 128.

Database

In one embodiment, the system 100 can include a database 130, or otherdata maintenance or data storage element, capable of maintaining statusdata information communicated, using the message packets 113, betweenthe one or more network devices 111 and the one or more networkmonitoring devices 112. The database 130 can be disposed substantiallylocally, such as substantially directly coupled to the communicationnetwork 110, or can be disposed substantially remotely, such assubstantially indirectly coupled to other elements that are eventuallycoupled to the communication network 110. The database 130 can includeone or more real or virtual data stores 131, such as disk drives, flashdrives, or other storage techniques.

Network Monitoring

In one embodiment, the system 100 can include one or more networkmonitoring devices 112, as described herein. The network monitoringdevices 112 can be disposed to exchange message packets 113 with the oneor more network devices 111, the one or more computing devices 120, theone or more virtual machines 122, the one or more virtual desktopimplementations 129, the one or more databases 130, and any otherelements coupled to the system 100. For example, the one or more networkmonitoring devices 112 can exchange message packets 113 with the one ormore network devices 111, with the effect that the network monitoringdevices 112 can receive status data information with respect to anyinteraction in the system 100. This can include interactions between anypair of devices (whether same or different) described herein.

Alternative Embodiments

After reading this Application, those having ordinary skill in the artwill recognize that the particular elements described herein, theirparticular cooperation and organization, and their particular use asdescribed herein, can be substantially altered while remaining withinthe scope and spirit of the invention, and that such alterations wouldwork without undue experiment or further invention.

FIG. 2

FIG. 2 shows a conceptual drawing of a status data buffer.

In possible implementations, a system 100 can include elements describedherein, other elements shown in the figure, and possibly other elements.Not all elements are required. Elements should be considered optional,unless otherwise specified or unless clearly obvious for operation ofthe system. Elements may also be embodied in one or more devices, notnecessarily in only a single device.

FIG. 2, Element Identifiers

System elements and sub-elements are sometimes described herein withrespect to the following reference numbers and/or names:

-   201—Status data buffer-   202—Clock tick(s)

FIG. 2, Configuration of Elements

The system 100 can include a status data buffer 201, disposed tomaintain a selected number of clock ticks 202 of status datainformation. For example, the buffer 201 can be one or two minutes oftime, while each clock tick 202 is assigned one second of time. Thiswould mean that the buffer is 60-120 clock ticks 202 in width, and hasroom for inserting status data information (or pointers thereto), uponreceipt. If status data information is received but is out of date (thatis, for a buffer 201 that is one minute wide, the status datainformation is more than one minute late, the late information isdiscarded.

When status data information is received, whether by means of a pushsequence (in which one or more network devices 111 send the status datainformation without having been requested), or a pull sequence (in whichone or more network devices 111 are specifically requested by thenetwork monitoring device 112 to provide status data information), thenetwork monitoring device 112 determines a start and end time for thestatus data information, parcels out the status data information intomultiple clock ticks 202 if necessary, and maintains the status datainformation at the appropriate clock ticks 202.

In one embodiment, the network monitoring device 112 can maintain thestatus data information in a database 130, whether a relatively localdatabase 130 such as one coupled substantially directly to thecommunication network 110, or a relatively remote database 130 such asone coupled only substantially indirectly (that is, by means of otherdevices) to the communication network 110.

FIG. 3

FIG. 3 shows a conceptual drawing of a method of operation.

A method 300 includes flow points and method steps as described herein,other elements shown in the figure, and possibly other elements. Not allelements are required. Elements should be considered optional, unlessotherwise specified or unless clearly obvious for operation of thesystem.

These flow points and method steps are, by the nature of the writtenword, described in one particular order. This description does not limitthe method to this particular order. The flow points and method stepsmight be performed in a different order, or concurrently, or partiallyconcurrently, or otherwise in a parallel, pipelined, quasi-parallel, orother manner. They might be performed in part, paused, and returned tofor completion. They might be performed as co-routines or otherwise. Inthe context of the invention, there is no particular reason for any suchlimitation.

One or more portions of the method 300 are sometimes described as beingperformed by particular elements of the system 100 described withrespect to FIG. 1, or sometimes by “the method” itself. When a flowpoint or method step is described as being performed by “the method,” itcan be performed by one or more of those elements, by one or moreportions of those elements, by an element not described with respect tothe figure, by a combination or conjunction thereof, or otherwise.

In possible implementations, a method 200 includes flow points andmethod steps as described herein, other elements shown in the figure,and possibly other elements. Not all flow points or method steps arerequired. Flow points or method steps should be considered optional,unless otherwise specified or unless clearly obvious for operation ofthe system.

The system 100, or portions of the system 100, can or be used whileperforming the method 200, or portions of the method 200. Wheredescribed herein that a flow point is reached, or a step is performed,by the method 200, it should be understood from the context, or from thefigure, which portions (or all of them) of the system 100, reaches theflow point or takes the actions to perform the step.

Although the nature of text necessitates that the flow points and stepsare shown in a particular order, in the context of the invention, thereis no reason for any such limitation. The flow point may be reached, andthe steps may be performed, in a different order, or may be performed byco-routines or recursive functions, or may be performed in a parallel orpipelined manner, or otherwise.

FIG. 3, Flow Points and Method Steps

General Process Overview

A general process can include steps such as the following:

In one embodiment, the network monitoring device 112 maintains a buffer201, including at least one spot for each clock tick 202 at which statusdata information can be maintained. In one embodiment, the buffer 201can be maintained at a relatively local database 130, as describedherein; however, the buffer 201 may alternatively be maintained at arelatively remote database 130, such as one that is accessible using thecommunication network 110.

The network devices 111 send push status data information, in messagepackets 113, to the network monitoring device 112. The networkmonitoring device 112 receives the message packets 113, parses them todetermine the status data information, and determines their appropriateclock ticks 202, at which they should be placed in the buffer 201. Thenetwork monitoring device 112 places the status data information in thebuffer 201.

The push status data information can include any information relating toexchanges between network devices 111, including status data informationwith respect to network traffic (such as with respect to communicationbetween network devices 111 using the communication network 110),computing devices 120, virtual machines 122, virtual desktopimplementations 129, databases 130, and any other elements coupled tothe system 100.

In one embodiment, the network monitoring device 112 can maintain statusdata information with respect to any pair of objects (such as withrespect to communication between a selected computing device 120 and aselected data store 131), and/or with respect to any type of interaction(such as with respect to whether the selected computing device 120 andthe selected data store 131 are exchanging relatively short messagepackets 113 or relatively long message packets 113), and/or combinationsor conjunctions thereof. For example, the network monitoring device 112can maintain status data information with respect to whether aparticular user 128 is using the HTTP protocol (port 8080 on a computingdevice 120, or on a virtual machine 122, or detected by a virtualdesktop implementation 129, or otherwise).

In one embodiment, the network monitoring device 112 can manage itscommunication with network devices 111 that do not choose to push statusdata information to it. For example, one or more virtual machines 122might choose to report status data information only if requested. Insuch cases, the network monitoring device 112 determines how much loadwill be needed by itself, and by the network device 111, just for makingrequests for status data information; determines how much load will beneeded, depending on how frequently it asks for status data information,and for how much status data information; and determines if the networkdevice 111 will provide too little fidelity if it requests more statusdata information than the network device 111 is comfortable withproviding.

In one embodiment, the network monitoring device 112 sends requests to,and receives responses from, network devices 111, with the effect thatit receives status data information from those network devices 111. Thenetwork monitoring device 112 determines the format in which it receivesthe status data information, converts that status data information (ifnecessary) into a common format with all other network devices 111,determines start and end clock ticks 202 for the status datainformation, parcels out the status data information (if appropriate)among clock ticks 202, and maintains the status data information in thebuffer 201.

Beginning of Method

A flow point 200A indicates that the method 200 is ready to start.

At this flow point, the method 300 can initialize variables andreset/set state, as appropriate.

The method 300 proceeds with both flow points 320A and 340A. In oneembodiment, this can be conducted in parallel, and the method 300 canperform the steps following those flow points in parallel, concurrently,or in any other reasonably convenient order, as determined by thenetwork monitoring device 112.

“Push” Status Data Information

A flow point 320A indicates that the method 300 is ready to receive“push” status data message packets 113, which can include status datainformation with respect to network traffic, computing devices (hostsfor virtual machines 122), virtual machines 122, real and virtual datastores. At this flow point, the method 300 can initialize variables forreceiving “push” status data message packets 113, as appropriate.

At a step 331, the network devices 111 determine push status datainformation to be sent to the network monitoring device 112. In oneembodiment, the push status data information can relate to anyinteraction between elements in the system 100, including all networkdevices 111, computing devices 120, virtual machines 122, virtualdesktop implementations 129, databases 130, and any other elementscoupled to the system 100.

At a step 332, the network monitoring device 112 receives the statusdata information in one or more message packets 113, parses the statusdata information, determines a start and end time for the status datainformation, and determines at which clock ticks 202 the status datainformation should be maintained. The network monitoring device 112maintains the status data information in the buffer 201.

At a step 333, the network monitoring device 112 determines if thestatus data information should be parceled out to more than one suchclock tick 202. For example, one or more network devices 111 mightprovide more than one second of status data information. If so, thenetwork monitoring device 112 parcels out the amount of status datainformation, assuming that activity has been performed in asubstantially uniform distribution. In one example, if the one or moremessage packets 113 indicate that there have been 500 data storerequests in 10 seconds, the network monitoring device 112 assumes thateach one second had 50 such data store requests. In another example, ifone or more message packets 113 indicate that there have been 50 virtualapplication operations between 2.00 and 3.25 seconds into the one-minutebuffer 201 (thus, a total of 1.25 seconds), the network monitoringdevice 112 assumes that 40 of those operations occurred between 2.00 and3.00 seconds, and maintains them at the clock tick 202 for 2.00 seconds,and that 10 of those operations occurred between 3.00 and 3.25 seconds,and maintains them at the clock tick 202 for 3.00 seconds. If any ofthese operations could involve partitioning the message packets 113, thenetwork monitoring device 112 duplicates the message packets 113, andadjusts their values to indicate the computed measures for each separatemessage packet 113.

At a step 334, the network monitoring device 112 advances its clock tick202 (clearing the status data for that clock tick 202 so that new statusdata can be maintained at that clock tick 202 for the next minute), andpresents the measures for each value (that is, for all network devices111 and for all combinations thereof) to an operator, who might also bea user 128. For status data information that is accurate to each clocktick 202, the network monitoring device 112 presents the value for thatclock tick 202. For status data information that is only accurate to alarger measure (such as some virtual machines 122 that sometimes onlyprovide status data information accurate to 20 seconds, the networkmonitoring device 112 reports the same measure for all 20 of thoseseconds, until a new measure is available.

A flow point 320B indicates that the method 300 is ready to continue toreceive “push” status data message packets 113. The method 300 returnsto the earlier flow point 310A.

“Pull” Status Data Information

A flow point 340A indicates that the method 300 is ready to receive“pull” status data message packets 113, which can include status datainformation with respect to network traffic, computing devices (hostsfor virtual machines 122), virtual machines 122, real and virtual datastores, as described above with respect to “push” status data messagepackets 113. At this flow point, the method 300 can initialize variablesfor receiving “push” status data message packets 113, as appropriate.

At a step 351, the network monitoring device 112 determines a measure ofhow many requests, and how much information, it should request from thenetwork device 111. For example, if the network device 111 is a verybusy virtual machine 122, the network monitoring device 112 coulddetermine that it should not make too many requests, that they shouldnot request too much status data information, and/or some combination orconjunction thereof. In one embodiment, the network monitoring device112 re-determines the results of this step periodically (or otherwisewith some selected frequency), so as to manage its connection with thenetwork device 111.

At a step 352, the network monitoring device 112 sends requests to, andreceives responses from, network devices 111, with the effect that itreceives status data information from those network devices 111.

At a step 353, the network monitoring device 112 determines the formatin which it receives the status data information, converts that statusdata information (if necessary) into a common format with all othernetwork devices 111, determines start and end clock ticks 202 for thestatus data information, parcels out the status data information (ifappropriate) among clock ticks 202, and maintains the status datainformation in the buffer 201, similar to as described above withrespect to the pull status data information circumstance.

A flow point 340B indicates that the method 300 is ready to continue toreceive “push” status data message packets 113. The method 300 returnsto the earlier flow point 310A.

Method Completed

A flow point 200B indicates that the method 200 has been completed.

In possible implementations, the user 101 could repeat the method 200 tomove to another location, or to move between a sitting and standingposition, or between other positions. For example, the user 101 couldmove from the target user chair 103 back to the source user chair 102.

When the user 101 desires to repeat the method 200, the method 200proceeds with the flow point 200A.

Alternative Embodiments

While this application is primarily described with respect to push pulldata collection, after reading this Application, those of ordinary skillin the art will recognize that there is no particular requirement forany such limitation. For example, techniques described herein can alsobe applied to other circumstances in which it is desired to retrievedynamic data and collate that dynamic data (possibly received out oforder) into a unified sequence, which is in an specified order. Forexample, the techniques described and suggested herein (includingmachines, methods, articles of manufacture, and compositions of matter)can be applied to any time-sensitive system, including sensors,robotics, machine learning, dynamic compression and expansion of datastreams, or otherwise.

Similar Elements or Steps

Individual elements or method steps of the described embodiments couldbe replaced with substitutes that perform similar functions in othercontexts.

Elements of the system are described herein with respect to one or morepossible embodiments, and are not intended to be limiting in any way. Inthe context of the invention, there is the particular requirement forany such limitations as described with respect to any elements of thesystem. For one example, individual elements of the describedapparatuses could be replaced with substitutes that perform similarfunctions. Moreover, as described herein, many individual elements ofthe described apparatuses are optional, and are not required foroperation.

Moreover, although control elements of the one or more describedapparatuses are described herein as being executed as if on a singlecomputing device, in the context of the invention, there is noparticular requirement for any such limitation. For one example, thecontrol elements of the one or more described apparatuses can includemore than one computing device (or more than one specialized computingdevice), not necessarily all similar, on which the element's functionsare performed.

For one example, while some embodiments are generally described hereinwith respect to specific steps to be performed by generalized computingdevices, in the context of the invention, there is no particularrequirement for any such limitation. In such cases, subject matterembodying the invention can include special-purpose devices; and caninclude special-purpose hardware devices having the elements describedherein, and having the effect of performing the steps described herein;and combinations and/or conjunctions thereof. Embodiments of theinvention are not necessarily limited to computing de-vices, but canalso include any form of device or method that can improve techniquesfor improving the effect of the machine operations described herein.

In one particular implementation, instructions capable of beinginterpreted for control of devices can be provided as a computer programproduct, such as instructions that are maintained on a computer-readablestorage medium or a non-transitory machine-readable medium. Thenon-transitory medium can include a magnetic, optical or magneto-opticalstorage medium; a flash storage medium; and/or otherwise.

Specification not Limiting

After reading this Application, those skilled in the art would recognizethat the invention is not limited to only the specifically describedembodiments, that many variations are within the scope and spirit of theinvention, and would be workable without undue experiment or furtherinvention.

Claims Included in Specification

The Claims in this Application are hereby included by reference in thetext of the Specification.

The invention claimed is:
 1. Apparatus including a network monitoringdevice coupleable to a communication network, said communication networkcoupleable to at least one first type of device sending network data ontheir own behest, and at least one second type of device sending networkstatus data upon the request of said network monitoring device; saidnetwork monitoring device including a buffer of network status data,said buffer being equally divided into a selected number of entriesbeing assigned a selected clock tick offset from a selected marker; eachentry in said buffer including status data received by said networkmonitoring device, the status data being inserted out of order by saidnetwork monitoring device with respect to a time when it was generatedby the network at a discernable past time; when said network monitoringdevice maintains said status data from said network in said buffer, at alocation where it was inserted out of order associated with saiddiscernable past time; and when said discernable past time exceeds aselected threshold, said network monitoring device reduces an effect ofsaid status data from a selected discernable past time associated withsaid selected threshold.
 2. Apparatus including a network monitoringdevice, the network monitoring device responsive to first network statusdata from one or more devices coupled to a network; wherein the networkmonitoring device includes a database responsive to the first networkstatus data and having a defined time order of database entries, thedatabase disposed to enter the first network status data into thedatabase entries out of order from when it was received, in response towhen the first network status data was generated by those one or moredevices; wherein when the network monitoring device receives secondnetwork status data for a time duration associated with multipledatabase entries, the network monitoring device divides network statusdata items, determined from the second network status data, among thoseidentifiable multiple database entries.
 3. Apparatus as in claim 2,wherein when the database includes first or second network status dataolder than a selected time, the database entries including data olderthan a selected time are reduced in effect.
 4. Apparatus as in claim 2,wherein when the database includes first or second network status dataolder than a selected time, the database entries including data olderthan a selected time are discarded.
 5. Apparatus as in claim 2, whereinthe one or more devices coupled to the network provide the networkstatus data in one or more message packets, in response to which thenetwork monitoring device is disposed to determine one or more networkstatus data items each including status data having multiple bits ofdata.
 6. Apparatus as in claim 2, wherein when the network monitoringdevice divides the second network status data among multiple databaseentries, the second network status data items are spread among thosemultiple database entries in a substantially uniform distribution. 7.Apparatus as in claim 2, wherein when the second network status datacrosses a database entry boundary, the network monitoring device dividesthe network status data into a first and a second portion, assigning thefirst portion to a first database entry and the second portion to asecond database entry.
 8. A method of operating a network monitoringdevice, the method including steps of coupling the network monitoringdevice to one or more devices coupled to a network; receiving networkstatus data from the network, one or more network status data itemsbeing determinable from the network status data; entering the networkstatus data items in a database, the database including one or moredatabase entries having a defined time order, each database entryrepresenting a known time duration relative to a current time; whenentering the network status data items in the database, entering thenetwork status data into the database entries out of order from when itwas received, in response to when the first network status data wasgenerated by those one or more devices.
 9. A method as in claim 8,including steps of managing requests for network status data in responseto one or more of: a selected amount of network status data to receive,a selected amount of load on a device coupled to the network, a selectedamount of load on the network monitoring device.
 10. A method as inclaim 9, including steps of upon receiving second network status datafor a time duration associated with a plurality of identifiable databaseentries, dividing those second network status data items, in response tothe network status data, among those database entries.
 11. A method asin claim 9, wherein dividing the second network status data amongmultiple database entries includes steps of spreading second networkstatus data items among those multiple database entries in asubstantially uniform distribution.
 12. A method as in claim 9, whereinreceiving the network status data includes steps of computing individualnetwork status data items in response to network status datarepresentative of a first and a second register value associated with areported time duration.
 13. A method as in claim 12, wherein receivingthe network status data occurs in one or more message packets, fromwhich the network monitoring device can determine the one or morenetwork status data items.