Trigger based recording of flows with play back

ABSTRACT

The various embodiments provide selective real-time monitoring of one or more flows of packets over a network, real-time buffering of packets for the one or more monitored flows, real-time recording of packets for one or more monitored flows and its corresponding buffered packets based on initiation of at least one trigger, and real-time analysis of the one or more recorded flows of packets regarding at least the occurrence of the at least one trigger. One or more flows of packets may be selected for monitoring by an administrator or an automated process based on different factors. In at least one of the various embodiments, the one or more monitored flows of packets are tagged and threaded so that they are separately accessible in a ring buffer.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of U.S. patent application Ser. No.13/831,908 filed on Mar. 15, 2013, entitled “TRIGGER BASED RECORDING OFFLOWS WITH PLAY BACK,” the benefit of the earlier filing date of whichis hereby claimed under 35 U.S.C. §120 and 37 C.F.R. §1.78, and which isfurther incorporated by reference in its entirety.

FIELD OF THE INVENTION

The present invention is generally directed to monitoring flows ofpackets over a network, and more particularly, it is directed torecording one or more flows if a trigger occurs.

BACKGROUND OF THE INVENTION

On most computer networks, bits of data arranged in bytes are packagedinto collections of bytes called packets. These packets are generallycommunicated between computing devices over networks in a wired and/orwireless manner. A suite of communication protocols is typicallyemployed to communicate between at least two endpoints over one or morenetworks. The protocols are typically layered on top of one another toform a protocol stack. One model for a network communication protocolstack is the Open Systems Interconnection (OSI) model, which definesseven layers of different protocols that cooperatively enablecommunication over a network. The OSI model layers are arranged in thefollowing order: Physical (1), Data Link (2), Network (3), Transport(4), Session (5), Presentation (6), and Application (7).

Another model for a network communication protocol stack is the InternetProtocol (IP) model, which is also known as the Transport CommunicationProtocol/Internet Protocol (TCP/IP) model. The TCP/IP model is similarto the OSI model except that it defines four layers instead of seven.The TCP/IP model's four layers for network communication protocol arearranged in the following order: Link (1), Internet (2), Transport (3),and Application (4). To reduce the number of layers from four to seven,the TCP/IP model collapses the OSI model's Application, Presentation,and Session layers into its Application layer. Also, the OSI's Physicallayer is either assumed or is collapsed into the TCP/IP model's Linklayer. Although some communication protocols may be listed at differentnumbered or named layers of the TCP/IP model versus the OSI model, bothof these models describe stacks that include basically the sameprotocols. For example, the TCP protocol is listed on the fourth layerof the OSI model and on the third layer of the TCP/IP model.Additionally, the HTTP protocol is listed on the seventh layer of theOSI model and on the fourth layer of the TCP/IP model.

To assess and troubleshoot communicated packets and protocols over anetwork, different types of network monitors can be employed. One typeof network monitor, a “packet sniffer” may be employed to generallymonitor and record packets of data as they are communicated over anetwork. Some packet sniffers can display data included in each packetand provide statistics regarding a monitored stream of packets. Also,some types of network monitors are referred to as “protocol analyzers”in part because they can provide additional analysis of monitored andrecorded packets regarding a type of network, communication protocol, orapplication.

Generally, packet sniffers and protocol analyzers passively monitornetwork traffic without participating in the communication protocols. Insome instances, they receive a copy of each packet on a particularnetwork segment or VLAN from one or more members of the network segment.In other instances, they may receive these packet copies through a portmirror on a managed Ethernet switch, e.g., a Switched Port Analyzer(SPAN) port, or a Roving Analysis Port (RAP). Port mirroring enablesanalysis and debugging of network communications. Port mirroring can beperformed for inbound or outbound traffic (or both) on single ormultiple interfaces. In still other instances packet copies may beprovided to the network monitors from a specialized network tap.

In some instances, a network monitor may operate as a proxy that isactively arranged between two endpoints, such as a client device and aserver device. A network monitor proxy intercepts each packet sent byeach endpoint and retransmits or forwards each intercepted packet to theother endpoint. Since network monitor proxies actively monitor networkpackets, they often enable a variety of additional services such ascaching, content filtering, and access control.

However, the sheer volume of packets that are regularly communicatedover networks in even a short period of time has made it relativelydifficult and/or inefficient for network monitors in real time to recordand store all monitored packets in a readily accessible format that isboth useful for analysis and helpful for troubleshooting a particularissue or event.

Additionally, one challenge with continuous packet recording is thathard disks are relatively slow compared to network speeds. Other memorymedia like Dynamic Access Random Memory devices (DRAMs) are fast and cankeep up with network speeds, but their storage size is relativelylimited (or cost prohibitive), which is why a DRAM buffer canhistorically only go back in time for a limited amount. Also, even aRedundant Array of Independent Disks (RAIDs) with substantially greatercapacity have trouble keeping up with network speeds.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the present innovationsare described with reference to the following drawings. In the drawings,like reference numerals refer to like parts throughout the variousfigures unless otherwise specified.

For a better understanding of the present invention, reference will bemade to the following Detailed Description, which is to be read inassociation with the accompanying drawings, wherein:

FIG. 1 illustrates a system environment in which various embodiments maybe implemented;

FIG. 2A shows a schematic drawing of a rack of blade servers;

FIG. 2B illustrates a schematic embodiment of a blade server that may beincluded in a rack of blade servers such as that shown in FIG. 2A;

FIG. 3 shows a schematic embodiment of a client device;

FIG. 4 illustrates a schematic embodiment of a network device;

FIG. 5 shows a portion of a logical architecture for an NMD to passivelymonitor communication over at least one network;

FIG. 6 illustrates a flowchart for an exemplary process for real-timetrigger based recording of flows;

FIG. 7 shows a flowchart for an exemplary process for real-timebuffering monitored flows;

FIG. 8 illustrates a flowchart for an exemplary process for real-timeanalysis of recorded flows with retrieval; and

FIG. 9 shows an exemplary embodiment of a TCP packet header inaccordance with at least one of the various embodiments.

DETAILED DESCRIPTION OF THE VARIOUS EMBODIMENTS

Various embodiments now will be described more fully hereinafter withreference to the accompanying drawings, which form a part hereof, andwhich show, by way of illustration, specific exemplary embodiments bywhich the invention may be practiced. The embodiments may, however, beembodied in many different forms and should not be construed as limitedto the embodiments set forth herein; rather, these embodiments areprovided so that this disclosure will be thorough and complete, and willfully convey the scope of the embodiments to those skilled in the art.Among other things, the various embodiments may be methods, systems,media or devices. Accordingly, the various embodiments may take the formof an entirely hardware embodiment, an entirely software embodiment oran embodiment combining software and hardware aspects. The followingdetailed description is, therefore, not to be taken in a limiting sense.

Throughout the specification and claims, the following terms take themeanings explicitly associated herein, unless the context clearlydictates otherwise. The phrase “in one embodiment” as used herein doesnot necessarily refer to the same embodiment, though it may.Furthermore, the phrase “in another embodiment” as used herein does notnecessarily refer to a different embodiment, although it may. Thus, asdescribed below, various embodiments may be readily combined, withoutdeparting from the scope or spirit of the invention.

In addition, as used herein, the term “or” is an inclusive “or”operator, and is equivalent to the term “and/or,” unless the contextclearly dictates otherwise. The term “based on” is not exclusive andallows for being based on additional factors not described, unless thecontext clearly dictates otherwise. In addition, throughout thespecification, the meaning of “a,” “an,” and “the” include pluralreferences. The meaning of “in” includes “in” and “on.”

For example embodiments, the following terms are also used hereinaccording to the corresponding meaning, unless the context clearlydictates otherwise.

As used herein, the term “session” refers to a semi-permanentinteractive packet interchange between two or more communicatingendpoints, such as network devices. A session is set up or establishedat a certain point in time, and torn down at a later point in time. Anestablished communication session may involve more than one message ineach direction. A session may have stateful communication where at leastone of the communicating network devices saves information about thesession history to be able to communicate. A session may also providestateless communication, where the communication consists of independentrequests with responses between the endpoints. An established session isthe basic requirement to perform a connection oriented communication. Asession also is the basic step to transmit in connectionlesscommunication modes.

As used herein, the term “connection” refers to a communication sessionwith a semi-permanent connection for interactive packet interchangebetween two or more communicating endpoints, such as network devices.The connection is established before any useful data is transferred, andwhere a stream of data is delivered in the same order as it was sent.The alternative to connection-oriented transmission is connectionlesscommunication. For example, the datagram mode of communication used bythe Internet Protocol (IP) and the Universal Datagram Protocol (UDP) maydeliver packets out of order, since different packets may be routedindependently and could be delivered over different paths.

Connection oriented communication may be a packet-mode virtual circuitconnection. For example, a transport layer virtual circuit protocol suchas the TCP protocol can deliver packets of data in order although thelower layer switching is connectionless. A connection-oriented transportlayer protocol such as TCP can also provide connection-orientedcommunications over connectionless communication. For example, if TCP isbased on a connectionless network layer protocol (such as IP), thisTCP/IP protocol can then achieve in order delivery of a byte stream ofdata, by means of segment sequence numbering on the sender side, packetbuffering and data packet reordering on the receiver side.Alternatively, the virtual circuit connection may be established in adatalink layer or network layer switching mode, where all data packetsbelonging to the same traffic stream are delivered over the same path,and traffic flows are identified by some connection identifier ratherthan by complete routing information, which enables fast hardware basedswitching.

As used herein, the terms “session flow” and “flow” refer to one packetor a stream of packets that are communicated in a session that isestablished between at least two endpoints, such as two network devices.In at least one of the various embodiments, flows may be useful if oneor more of the endpoints of a session may be behind a network trafficmanagement device, such as a firewall, switch, router, load balancer, orthe like. In at least one of the various embodiments, such flows may beused to ensure that the packets sent between the endpoints of a flow maybe routed appropriately.

Typically, establishing a TCP based connection between endpoints beginswith a handshake and creates a single bi-directional flow between twoendpoints, e.g., one direction of the flow going from endpoint A toendpoint B, the other direction of the flow going from endpoint B toendpoint A, where endpoint A and endpoint B are IP-Port source anddestinations. In at least one of the various embodiments, a tuple may beemployed to identify a flow. In some embodiments, a tuple may includeattributes, such as VLAN, IP protocol, or the like. Also, otherprotocols may establish a separate flow for control information thatenables management of at least one or more flows between two or moreendpoints.

As used herein, the terms “network monitor”, “network monitor device”,or “NMD” refer to an application (software, hardware, or somecombination) that is arranged to monitor and record flows of packets ina session that are communicated between at least two endpoints over atleast one network. The NMD can provide information for assessingdifferent aspects of these monitored flows. In at least one embodiment,the NMD passively monitors network packet traffic without participatingin the communication protocols. This monitoring is performed for avariety of reasons, including troubleshooting and proactive remediation,end-user experience monitoring, SLA monitoring, capacity planning,application lifecycle management, infrastructure change management,infrastructure optimization, business intelligence, security, andregulatory compliance. The NMD can receive network communication formonitoring through a variety of means including network taps, wirelessreceivers, port mirrors or directed tunnels from network switches,servers including the endpoints themselves, or other infrastructuredevices. In at least some of the various embodiments, the NMD mayreceive a copy of each packet on a particular network segment or virtuallocal area network (VLAN). Also, for at least some of the variousembodiments, they may receive these packet copies through a port mirroron a managed Ethernet switch, e.g., a Switched Port Analyzer (SPAN)port, or a Roving Analysis Port (RAP). Port mirroring enables analysisand debugging of network communications. Port mirroring can be performedfor inbound or outbound traffic (or both) on single or multipleinterfaces.

The NMD may track network connections from end points such as a clientand/or a server. The NMD may also extract information from the packetsincluding protocol information at various layers of the communicationprotocol stack. The NMD may reassemble or reconstruct the stream of dataexchanged between the endpoints. The NMD may perform decryption of thepayload at various layers of the protocol stack. The NMD may passivelymonitor the network traffic or it may participate in the protocols as aproxy. The NMD may attempt to classify the network traffic according tocommunication protocols that are used. The NMD may categorize thetraffic where categories might include file transfers, streaming audio,streaming video, database access, interactive, gaming, and the like. TheNMD may attempt to determine whether the traffic corresponds to knowncommunications protocols, such as HTTP, FTP, SMTP, RTP, TDS, TCP, IP,and the like.

As used herein, the terms “layer” and “model layer” refer to a layer ofone or more communication protocols in a stack of communication protocollayers that are defined by a model, such as the OSI model and the TCP/IP(IP) model. The OSI model defines seven layers and the TCP/IP modeldefines four layers of communication protocols.

For example, at the OSI model's lowest or first layer (Physical),streams of electrical/light/radio impulses (bits) are communicatedbetween computing devices over some type of media, such as cables,network interface cards, radio wave transmitters, and the like. At thenext or second layer (Data Link), bits are encoded into packets andpackets are also decoded into bits. The Data Link layer also has twosub-layers, the Media Access Control (MAC) sub-layer and the LogicalLink Control (LLC) sub-layer. The MAC sub-layer controls how a computingdevice gains access to the data and permission to transmit it. The LLCsub-layer controls frame synchronization, flow control and errorchecking. At the third layer (Network), logical paths are created, knownas virtual circuits, to communicate data from node to node. Routing,forwarding, addressing, internetworking, error handling, congestioncontrol, and packet sequencing are functions of the Network layer. Atthe fourth layer (Transport), transparent transfer of data between endcomputing devices, or hosts, is provided. The Transport layer isresponsible for end to end recovery and flow control to ensure completedata transfer over the network.

At the fifth layer (Session) of the OSI model, connections betweenapplications are established, managed, and terminated. The Session layersets up, coordinates, and terminates conversations, exchanges, anddialogues between applications at each end of a connection. At the sixthlayer (Presentation), independence from differences in datarepresentation, e.g., encryption, is provided by translating fromapplication to network format and vice versa. Generally, thePresentation layer transforms data into the form that the protocols atthe Application layer (7) can accept. For example, the Presentationlayer generally handles the formatting and encrypting/decrypting of datathat is communicated across a network.

At the top or seventh layer (Application) of the OSI model, applicationand end user processes are supported. For example, communicationpartners may be identified, quality of service can be identified, userauthentication and privacy may be considered, and constraints on datasyntax can be identified. Generally, the Application layer providesservices for file transfer, messaging, and displaying data. Protocols atthe Application layer include FTP, HTTP, and Telnet.

To reduce the number of layers from seven to four, the TCP/IP modelcollapses the OSI model's Application, Presentation, and Session layersinto its Application layer. Also, the OSI's Physical layer is eitherassumed or may be collapsed into the TCP/IP model's Link layer. Althoughsome communication protocols may be listed at different numbered ornamed layers of the TCP/IP model versus the OSI model, both of thesemodels describe stacks that include basically the same protocols.

The following briefly describes the various embodiments to provide abasic understanding of some aspects of the invention. This briefdescription is not intended as an extensive overview. It is not intendedto identify key or critical elements, or to delineate or otherwisenarrow the scope. Its purpose is merely to present some concepts in asimplified form as a prelude to the more detailed description that ispresented later.

Briefly stated, the various embodiments are directed towards selectivelymonitoring in real time one or more flows of packets over a network,real-time buffering of packets for the one or more monitored flows,real-time recording of packets for one or more monitored flows and itscorresponding buffered packets based on at least one trigger, real-timeanalysis of the one or more recorded flows of packets based at least oninitiation of the at least one trigger, and subsequent retrieval of theone or more recorded flows of packets.

In at least one of the various embodiments, one or more flows of packetsover the network may be selected for real-time monitoring by anadministrator of the network or an automated process based on differentfactors. For example, flows may be selected for monitoring thatcorrespond to an application, node, network device, or the like, that iscommunicating over the network. Further, related flows may be identifiedand selected for monitoring, e.g., one or more flows that correspond toa selected application, node, network device, or the like. In at leastone of the various embodiments, the one or more monitored flows ofpackets are tagged and threaded for buffering so that they areseparately accessible in a buffer, such as a ring buffer. Also, thebuffered flows are accessible in real time for analysis.

In at least some of the various embodiments, the buffer includes atleast a high-speed read/write memory media, such as DRAM, Static RandomAccess Memory (SRAM), or the like. By buffering the individual monitoredflows (subset of all of the monitored traffic) in a high speed memorymedia, the buffer can more readily keep up with the network flows. Also,by analyzing the monitored flows in real-time, and upon the satisfactionof recording criteria, the process can head backwards into a ring buffercomposed of high speed memory media to retrieve and record/storereceived packets for subsequent real time analysis. In at least one ofthe various embodiments, if at least one monitored flow dominates acapacity of the buffer over other monitored flows, the buffering of thedominant monitored flow may be throttled back, e.g., restricting anumber of packets that may be buffered per second to the buffer for thedominant monitored flow. Moreover, in at least one of the variousembodiments, a new buffer may be instantiated to separately buffer amonitored flow that dominates a capacity of a buffer over othermonitored flows. Additionally, in at least one of the variousembodiments, if the capacity of a buffer is exceeded by the buffering ofthe one or more flows, the overflow may be stored in a separatedatastore and/or the capacity of the buffer may be increased.Additionally, since not all of the flows on the network are necessarilyselected for monitoring, the capacity of the buffer may be optimized forbuffering the selected flows.

In at least one of the various embodiments, any amount of differenttriggers/filters may be arranged either singly, or in combination, toinitiate the real-time recording of a corresponding monitored flow andoptionally any related monitored flows too. The real-time recording ofthe monitored flow includes those packets in the buffer that correspondto the monitored flow prior to the initiation of the trigger and any newpackets that are subsequently received. A trigger is not limited to anyparticular type or combination with other triggers.

In at least one of the various embodiments, analysis of a recorded flowmay be based on playing back at least a portion of the recording, whichmay be arranged based on one or more selected values, including, but notlimited to a time, byte pattern, offset, sequence number, checksum,pointer, destination port, source port, payload, or the like.

In at least one embodiment, the play-back actions may be associated witha dashboard that may be arranged to operate automatically and/ormanually. Further, a display may be provided for displaying informationregarding one or more packets and/or information regarding the recordedflow, play back of the recorded flow, and/or other monitored flows. Inat least one embodiment, real-time analysis may be performed on therecorded flow and/or the play back of the recorded flow, which mayinclude statistics, reports, or the like. In at least one embodiment,the analysis may be provided to a separate application for subsequentprocessing.

Illustrative Operating Environment

FIG. 1 shows components of an environment in which various embodimentsmay be practiced. Not all of the components may be required to practicethe various embodiments, and variations in the arrangement and type ofthe components may be made without departing from the spirit or scope ofthe various embodiments.

In at least one embodiment, cloud network 102 enables one or morenetwork services for a user based on the operation of correspondingarrangements 104 and 106 of virtually any type of networked computingdevice. As shown, the networked computing devices may include networkdevices 112 and 114, enclosure of blade servers 110, enclosure of servercomputers 116, super computer network device 118, and the like. Althoughnot shown, one or more mobile devices may be included in cloud network102 in one or more arrangements to provide one or more network servicesto a user. Also, these arrangements of networked computing devices mayor may not be mutually exclusive of each other.

In at least one of the various embodiments, network devices 112 and 114may include module, processes, components, services, or the like, andwhich are operative to perform as a Network Monitor Device (NMD). TheseNMDs are arranged to monitor and record flows of packets in a sessionthat are communicated between at least two endpoints over at least onenetwork. These NMDs can provide information for assessing differentaspects of these monitored flows. In at least one embodiment, the NMDspassively monitor network packet traffic without participating in thecommunication protocols. Both network devices 112 and 114 are arrangedto operate as NMDs that may perform actions as further described inconjunction with at least the figures beginning at FIG. 6.

Also, in at least one of the various embodiments, enclosure of bladeservers 110, enclosure of enclosure of server computers 116, supercomputer network device 118 may include network devices that perform theactions of NMDs. In at least one embodiment, at least one blade serveror at least one server computer may be arranged to also operate as anNMD.

Additionally, the user may employ a plurality of virtually any type ofwired or wireless networked computing devices to communicate with cloudnetwork 102 and access at least one of the network services enabled byone or more of arrangements 104 and 106. These networked computingdevices may include tablet client device 122, handheld client device124, wearable client device 126, desktop client device 120, and thelike. Although not shown, in various embodiments, the user may alsoemploy notebook computers, desktop computers, microprocessor-based orprogrammable consumer electronics, network appliances, mobiletelephones, smart telephones, pagers, radio frequency (RF) devices,infrared (IR) devices, Personal Digital Assistants (PDAs), televisions,integrated devices combining at least one of the preceding devices, andthe like.

One embodiment of a client device is described in more detail below inconjunction with FIG. 3. Generally, client devices may include virtuallyany substantially portable networked computing device capable ofcommunicating over a wired, wireless, or some combination of wired andwireless network.

In various embodiments, network 102 may employ virtually any form ofcommunication technology and topology. For example, network 102 caninclude local area networks Personal Area Networks (PANs), (LANs),Campus Area Networks (CANs), Metropolitan Area Networks (MANs) Wide AreaNetworks (WANs), direct communication connections, and the like, or anycombination thereof. On an interconnected set of LANs, including thosebased on differing architectures and protocols, a router acts as a linkbetween LANs, enabling messages to be sent from one to another. Inaddition, communication links within networks may include virtually anytype of link, e.g., twisted wire pair lines, optical fibers, open airlasers or coaxial cable, plain old telephone service (POTS), waveguides, acoustic, full or fractional dedicated digital communicationlines including T1, T2, T3, and T4, and/or other carrier and other wiredmedia and wireless media. These carrier mechanisms may includeE-carriers, Integrated Services Digital Networks (ISDNs), universalserial bus (USB) ports, Firewire ports, Thunderbolt ports, DigitalSubscriber Lines (DSLs), wireless links including satellite links, orother communications links known to those skilled in the art. Moreover,these communication links may further employ any of a variety of digitalsignaling technologies, including without limit, for example, DS-0,DS-1, DS-2, DS-3, DS-4, OC-3, OC-12, OC-48, or the like. Furthermore,remotely located computing devices could be remotely connected tonetworks via a modem and a temporary communication link. In essence,network 102 may include virtually any communication technology by whichinformation may travel between computing devices. Additionally, in thevarious embodiments, the communicated information may include virtuallyany kind of information including, but not limited to processor-readableinstructions, data structures, program modules, applications, raw data,control data, archived data, video data, voice data, image data, textdata, and the like.

Network 102 may be partially or entirely embodied by one or morewireless networks. A wireless network may include any of a variety ofwireless sub-networks that may further overlay stand-alone ad-hocnetworks, and the like. Such sub-networks may include mesh networks,Wireless LAN (WLAN) networks, Wireless Router (WR) mesh, cellularnetworks, pico networks, PANs, Open Air Laser networks, Microwavenetworks, and the like. Network 102 may further include an autonomoussystem of intermediate network devices such as terminals, gateways,routers, switches, firewalls, load balancers, and the like, which arecoupled to wired and/or wireless communication links. These autonomousdevices may be operable to move freely and randomly and organizethemselves arbitrarily, such that the topology of network 102 may changerapidly.

Network 102 may further employ a plurality of wired and wireless accesstechnologies, e.g., 2nd (2G), 3rd (3G), 4th (4G), 5^(th) (5G), and6^(th) (6G) generation wireless access technologies, and the like, formobile devices. These wired and wireless access technologies may alsoinclude Global System for Mobile communication (GSM), General PacketRadio Services (GPRS), Enhanced Data GSM Environment (EDGE), CodeDivision Multiple Access (CDMA), Wideband Code Division Multiple Access(WCDMA), Long Term Evolution Advanced (LTE), Universal MobileTelecommunications System (UMTS), Orthogonal frequency-divisionmultiplexing (OFDM), Wideband Code Division Multiple Access (W-CDMA),Code Division Multiple Access 2000 (CDMA2000), Evolution-Data Optimized(EV-DO), High-Speed Downlink Packet Access (HSDPA), IEEE 802.16Worldwide Interoperability for Microwave Access (WiMax), ultra wide band(UWB), user datagram protocol (UDP), transmission controlprotocol/Internet protocol (TCP/IP), any portion of the Open SystemsInterconnection (OSI) model protocols, Short Message Service (SMS),Multimedia Messaging Service (MMS), Web Access Protocol (WAP), SessionInitiation Protocol/Real-time Transport Protocol (SIP/RTP), or any of avariety of other wireless or wired communication protocols. In onenon-limiting example, network 102 may enable a mobile device towirelessly access a network service through a combination of severalradio network access technologies such as GSM, EDGE, HSDPA, LTE and thelike.

Enclosure of Blade Servers

FIG. 2A shows one embodiment of an enclosure of blade servers 200, whichare also illustrated in FIG. 1. Enclosure of blade servers 200 mayinclude many more or fewer components than those shown in FIG. 2A.However, the components shown are sufficient to disclose an illustrativeembodiment. Generally, a blade server is a stripped down servercomputing device with a modular design optimized to minimize the use ofphysical space and energy. A blade enclosure can include several bladeservers and provide each with power, cooling, network interfaces,input/output interfaces, and resource management. Although not shown, anenclosure of server computers typically includes several computers thatmay have at least one network connection and a power cord connection.Each server computer often includes redundant components for power andinterfaces.

As shown in the figure, enclosure 200 contains power supply 204, andinput/output interface 206, rack logic 208, several blade servers 210,212, 214, and 216, and backplane 202. Power supply 204 provides power toeach component and blade server within the enclosure. The input/outputinterface 206 provides internal and external communication forcomponents and blade servers within the enclosure. Backplane 208 canenable passive and active communication of power, logic, input signals,and output signals for each blade server.

Illustrative Blade Server

FIG. 2B illustrates an illustrative embodiment of blade server 250,which may include many more or fewer components than those shown. Asshown in FIG. 2A, a plurality of blade servers may be included in oneenclosure that shares resources provided by the enclosure to reducesize, power, and cost.

Blade server 250 includes processor 252 which communicates with memory256 via bus 254. Blade server 250 also includes input/output interface290, processor-readable stationary storage device 292, andprocessor-readable removable storage device 294. Input/output interface290 can enable blade server 250 to communicate with other blade servers,mobile devices, network devices, and the like. Interface 290 may providewireless and/or wired communication links for blade server.Processor-readable stationary storage device 292 may include one or moredevices such as an electromagnetic storage device (hard disk), solidstate hard disk (SSD), hybrid of both an SSD and a hard disk, and thelike. In some configurations, a blade server may include multiplestorage devices. Also, processor-readable removable storage device 294enables processor 252 to read non-transitory storage media for storingand accessing processor-readable instructions, modules, data structures,and other forms of data. The non-transitory storage media may includeFlash drives, tape media, floppy media, and the like.

Memory 256 may include Random Access Memory (RAM), Read-Only Memory(ROM), hybrid of RAM and ROM, and the like. As shown, memory 256includes operating system 258 and basic input/output system (BIOS) 260for enabling the operation of blade server 250. In various embodiments,a general-purpose operating system may be employed such as a version ofUNIX, LINUX™, a specialized server operating system such as Microsoft'sWindows Server™, or the like.

Memory 256 further includes one or more data storage 270, which can beutilized by blade server 250 to store, among other things, applications280 and/or other data. Data store 270 may include program code, data,algorithms, and the like, for use by processor 252 to execute andperform actions such as those described in conjunction with FIGS. 5-9.In one embodiment, at least some of datastore 270 might also be storedon another component of blade server 250, including, but not limited to,processor-readable removable storage device 294, processor-readablestationary storage device 292, or any other non-transitoryprocessor-readable storage device (not shown). Data storage 270 mayinclude, for example, Ring Buffer(s) 274, Triggers 276, or the like.Ring Buffer 274 is arranged to buffer in real time those packetsassociated with a monitored flow, as well as other supporting data.Likewise, Triggers 276 may contain real-time triggers and/or triggerpoint registrations, and other supporting data, arranged in lists,databases, configuration files, or the like. Initiation of Triggers 276enables packets buffered in real time by Ring Buffer 274 for aparticular monitored flow to be recorded for analysis, such as playback.

Applications 280 may include processor executable instructions which,when executed by blade server 250, transmit, receive, and/or otherwiseprocess messages, audio, video, and enable communication with othernetworked computing devices. Examples of application programs includedatabase servers, file servers, calendars, transcoders, and so forth.Applications 280 may include, for example, Network Monitor(s) 282,Reporting application 284, and Browser 286, which may be enabled toperform actions further described below starting with at least FIG. 6.

Human interface components (not pictured), may be remotely associatedwith blade server 250, which can enable remote input to and/or outputfrom blade server 250. For example, information to a display or from akeyboard can be routed through the input/output interface 290 toappropriate peripheral human interface components that are remotelylocated. Examples of peripheral human interface components include, butare not limited to, an audio interface, a display, keypad, pointingdevice, touch interface, and the like.

Furthermore, in at least one of the various embodiments, network monitorapplication 282, and reporting application 284 may be operative in acloud-based computing environment. In at least one of the variousembodiments, these applications, and others, may be executing withinvirtual machines and/or virtual servers that may be managed in acloud-based based computing environment. In at least one of the variousembodiments, in this context the applications may flow from one physicalblade server and/or network device within the cloud-based environment toanother depending on performance and scaling considerationsautomatically managed by the cloud computing environment. Likewise, inat least one of the various embodiments, virtual machines and/or virtualservers dedicated to running network monitor application 282 andreporting application 284 may be provisioned and de-commissionedautomatically.

Also, in at least one of the various embodiments, Ring buffer 274 andTriggers 276, or the like, may be located on virtual servers running ina cloud-based computing environment rather than being tied to one ormore specific physical blade servers.

Illustrative Client Device

FIG. 3 shows one embodiment of client device 300 that may include manymore or less components than those shown. Client device 300 mayrepresent, for example, at least one embodiment of client devices shownin FIG. 1.

Client device 300 may include processor 302 in communication with memory304 via bus 328. Client device 300 may also include power supply 330,network interface 332, audio interface 356, display 350, keypad 352,illuminator 354, video interface 342, input/output interface 338, hapticinterface 364, global positioning systems (GPS) receiver 358, open airgesture interface 360, temperature interface 362, camera(s) 340,projector 346, pointing device interface 366, processor-readablestationary storage device 334, and processor-readable removable storagedevice 336. Client device 300 may optionally communicate with a basestation (not shown), or directly with another computing device. And inone embodiment, although not shown, a gyroscope may be employed withinclient device 300 to measuring and/or maintaining an orientation ofclient device 300.

Power supply 330 may provide power to client device 300. A rechargeableor non-rechargeable battery may be used to provide power. The power mayalso be provided by an external power source, such as an AC adapter or apowered docking cradle that supplements and/or recharges the battery.

Network interface 332 includes circuitry for coupling client device 300to one or more networks, and is constructed for use with one or morecommunication protocols and technologies including, but not limited to,protocols and technologies that implement any portion of the OSI modelfor mobile communication (GSM), CDMA, time division multiple access(TDMA), UDP, TCP/IP, SMS, MMS, GPRS, WAP, UWB, WiMax, SIP/RTP, GPRS,EDGE, WCDMA, LTE, UMTS, OFDM, CDMA2000, EV-DO, HSDPA, or any of avariety of other wireless communication protocols. Network interface 332is sometimes known as a transceiver, transceiving device, or networkinterface card (NIC).

Audio interface 356 may be arranged to produce and receive audio signalssuch as the sound of a human voice. For example, audio interface 356 maybe coupled to a speaker and microphone (not shown) to enabletelecommunication with others and/or generate an audio acknowledgementfor some action. A microphone in audio interface 356 can also be usedfor input to or control of client device 300, e.g., using voicerecognition, detecting touch based on sound, and the like.

Display 350 may be a liquid crystal display (LCD), gas plasma,electronic ink, light emitting diode (LED), Organic LED (OLED) or anyother type of light reflective or light transmissive display that can beused with a computing device. Display 350 may also include a touchinterface 344 arranged to receive input from an object such as a stylusor a digit from a human hand, and may use resistive, capacitive, surfaceacoustic wave (SAW), infrared, radar, or other technologies to sensetouch and/or gestures.

Projector 346 may be a remote handheld projector or an integratedprojector that is capable of projecting an image on a remote wall or anyother reflective object such as a remote screen.

Video interface 342 may be arranged to capture video images, such as astill photo, a video segment, an infrared video, or the like. Forexample, video interface 342 may be coupled to a digital video camera, aweb-camera, or the like. Video interface 342 may comprise a lens, animage sensor, and other electronics. Image sensors may include acomplementary metal-oxide-semiconductor (CMOS) integrated circuit,charge-coupled device (CCD), or any other integrated circuit for sensinglight.

Keypad 352 may comprise any input device arranged to receive input froma user. For example, keypad 352 may include a push button numeric dial,or a keyboard. Keypad 352 may also include command buttons that areassociated with selecting and sending images.

Illuminator 354 may provide a status indication and/or provide light.Illuminator 354 may remain active for specific periods of time or inresponse to events. For example, when illuminator 354 is active, it maybacklight the buttons on keypad 352 and stay on while the client deviceis powered. Also, illuminator 354 may backlight these buttons in variouspatterns when particular actions are performed, such as dialing anotherclient device. Illuminator 354 may also cause light sources positionedwithin a transparent or translucent case of the client device toilluminate in response to actions.

Client device 300 may also comprise input/output interface 338 forcommunicating with external peripheral devices or other computingdevices such as other client devices and network devices. The peripheraldevices may include an audio headset, display screen glasses, remotespeaker system, remote speaker and microphone system, and the like.Input/output interface 338 can utilize one or more technologies, such asUniversal Serial Bus (USB), Infrared, WiFi, WiMax, Bluetooth™, and thelike.

Haptic interface 364 may be arranged to provide tactile feedback to auser of the client device. For example, the haptic interface 364 may beemployed to vibrate client device 300 in a particular way when anotheruser of a computing device is calling. Temperature interface 362 may beused to provide a temperature measurement input and/or a temperaturechanging output to a user of client device 300. Open air gestureinterface 360 may sense physical gestures of a user of client device300, for example, by using single or stereo video cameras, radar, agyroscopic sensor inside a device held or worn by the user, or the like.Camera 340 may be used to track physical eye movements of a user ofclient device 300.

GPS transceiver 358 can determine the physical coordinates of clientdevice 300 on the surface of the Earth, which typically outputs alocation as latitude and longitude values. GPS transceiver 358 can alsoemploy other geo-positioning mechanisms, including, but not limited to,triangulation, assisted GPS (AGPS), Enhanced Observed Time Difference(E-OTD), Cell Identifier (CI), Service Area Identifier (SAI), EnhancedTiming Advance (ETA), Base Station Subsystem (BSS), or the like, tofurther determine the physical location of client device 300 on thesurface of the Earth. It is understood that under different conditions,GPS transceiver 358 can determine a physical location for client device300. In at least one embodiment, however, client device 300 may, throughother components, provide other information that may be employed todetermine a physical location of the device, including for example, aMedia Access Control (MAC) address, IP address, and the like.

Human interface components can be peripheral devices that are physicallyseparate from client device 300, allowing for remote input and/or outputto client device 300. For example, information routed as described herethrough human interface components such as display 350 or keyboard 352can instead be routed through network interface 332 to appropriate humaninterface components located remotely. Examples of human interfaceperipheral components that may be remote include, but are not limitedto, audio devices, pointing devices, keypads, displays, cameras,projectors, and the like. These peripheral components may communicateover a Pico Network such as Bluetooth™, Zigbee™ and the like. Onenon-limiting example of a client device with such peripheral humaninterface components is a wearable computing device, which might includea remote pico projector along with one or more cameras that remotelycommunicate with a separately located client device to sense a user'sgestures toward portions of an image projected by the pico projectoronto a reflected surface such as a wall or the user's hand.

A client device may include a browser application that is configured toreceive and to send web pages, web-based messages, graphics, text,multimedia, and the like. The client device's browser application mayemploy virtually any programming language, including a wirelessapplication protocol messages (WAP), and the like. In at least oneembodiment, the browser application is enabled to employ Handheld DeviceMarkup Language (HDML), Wireless Markup Language (WML), WMLScript,JavaScript, Standard Generalized Markup Language (SGML), HyperTextMarkup Language (HTML), eXtensible Markup Language (XML), HTML5, and thelike.

Memory 304 may include RAM, ROM, and/or other types of memory. Memory304 illustrates an example of computer-readable storage media (devices)for storage of information such as computer-readable instructions, datastructures, program modules or other data. Memory 304 may store BIOS 308for controlling low-level operation of client device 300. The memory mayalso store operating system 306 for controlling the operation of clientdevice 300. It will be appreciated that this component may include ageneral-purpose operating system such as a version of UNIX, or LINUX™,or a specialized mobile computer communication operating system such asWindows Phone™, or the Symbian® operating system. The operating systemmay include, or interface with a Java virtual machine module thatenables control of hardware components and/or operating systemoperations via Java application programs.

Memory 304 may further include one or more data storage 310, which canbe utilized by client device 300 to store, among other things,applications 320 and/or other data. For example, data storage 310 mayalso be employed to store information that describes variouscapabilities of client device 300. The information may then be providedto another device based on any of a variety of events, including beingsent as part of a header during a communication, sent upon request, orthe like. Data storage 310 may also be employed to store socialnetworking information including address books, buddy lists, aliases,user profile information, or the like. Data storage 310 may furtherinclude program code, data, algorithms, and the like, for use by aprocessor, such as processor 302 to execute and perform actions. In oneembodiment, at least some of data storage 310 might also be stored onanother component of client device 300, including, but not limited to,non-transitory processor-readable removable storage device 336,processor-readable stationary storage device 334, or even external tothe client device.

Applications 320 may include computer executable instructions which,when executed by mobile device 300, transmit, receive, and/or otherwiseprocess instructions and data. Applications 320 may include, forexample, productivity application 322. In at least one of the variousembodiments, productivity application 322, messaging application 324,and browser application 326 may be used to communicate with bladeservers 110, server computers 116 and/or Supercomputer 118, and/or cloudcode device 112, including, but not limited to, queries, searches, APIcalls, content, data, messages, or the like.

Other examples of application programs include calendars, searchprograms, email client applications, IM applications, SMS applications,Voice Over Internet Protocol (VOIP) applications, contact managers, taskmanagers, transcoders, database programs, word processing programs,security applications, spreadsheet programs, games, search programs, andso forth.

Illustrative Network Device

FIG. 4 shows one embodiment of network device 400 that may be includedin a system implementing the invention. Network device 400 may includemany more or less components than those shown in FIG. 4. However, thecomponents shown are sufficient to disclose an illustrative embodimentfor practicing these innovations. Network device 400 may represent, forexample, one embodiment of at least one of network device 112, 114, or120 of FIG. 1.

As shown in the figure, network device 400 includes a processor 402 incommunication with a memory 404 via a bus 428. Network device 400 alsoincludes a power supply 430, network interface 432, audio interface 456,display 450, keyboard 452, input/output interface 438,processor-readable stationary storage device 434, and processor-readableremovable storage device 436. Power supply 430 provides power to networkdevice 400.

Network interface 432 includes circuitry for coupling network device 400to one or more networks, and is constructed for use with one or morecommunication protocols and technologies including, but not limited to,protocols and technologies that implement any portion of the OpenSystems Interconnection model (OSI model), global system for mobilecommunication (GSM), code division multiple access (CDMA), time divisionmultiple access (TDMA), user datagram protocol (UDP), transmissioncontrol protocol/Internet protocol (TCP/IP), Short Message Service(SMS), Multimedia Messaging Service (MMS), general packet radio service(GPRS), WAP, ultra wide band (UWB), IEEE 802.16 WorldwideInteroperability for Microwave Access (WiMax), Session InitiationProtocol/Real-time Transport Protocol (SIP/RTP), or any of a variety ofother wired and wireless communication protocols. Network interface 432is sometimes known as a transceiver, transceiving device, or networkinterface card (NIC). Network device 400 may optionally communicate witha base station (not shown), or directly with another computing device.

Audio interface 456 is arranged to produce and receive audio signalssuch as the sound of a human voice. For example, audio interface 456 maybe coupled to a speaker and microphone (not shown) to enabletelecommunication with others and/or generate an audio acknowledgementfor some action. A microphone in audio interface 456 can also be usedfor input to or control of network device 400, for example, using voicerecognition.

Display 450 may be a liquid crystal display (LCD), gas plasma,electronic ink, light emitting diode (LED), Organic LED (OLED) or anyother type of light reflective or light transmissive display that can beused with a computing device. Display 450 may be a handheld projector orpico projector capable of projecting an image on a wall or other object.

Network device 400 may also comprise input/output interface 438 forcommunicating with external devices not shown in FIG. 4. Input/outputinterface 438 can utilize one or more wired or wireless communicationtechnologies, such as USB™, Firewire™, WiFi, WiMax, Thunderbolt™,Infrared, Bluetooth™, Zigbee™, serial port, parallel port, and the like.

Human interface components can be physically separate from networkdevice 400, allowing for remote input and/or output to network device400. For example, information routed as described here through humaninterface components such as display 450 or keyboard 452 can instead berouted through the network interface 432 to appropriate human interfacecomponents located elsewhere on the network. Human interface componentsinclude any component that allows the computer to take input from, orsend output to, a human user of a computer. Accordingly, pointingdevices such as mice, styluses, track balls, or the like, maycommunicate through pointing device interface 458 to receive user input.

Memory 404 may include Random Access Memory (RAM), Read-Only Memory(ROM), and/or other types of memory. Memory 404 illustrates an exampleof computer-readable storage media (devices) for storage of informationsuch as computer-readable instructions, data structures, program modulesor other data. Memory 404 stores a basic input/output system (BIOS) 408for controlling low-level operation of network device 400. The memoryalso stores an operating system 406 for controlling the operation ofnetwork device 400. It will be appreciated that this component mayinclude a general-purpose operating system such as a version of UNIX, orLINUX™, or a specialized operating system such as MicrosoftCorporation's Windows® operating system, or the Apple Corporation's IOS®operating system. The operating system may include, or interface with aJava virtual machine module that enables control of hardware componentsand/or operating system operations via Java application programs.

Memory 404 may further include one or more data storage 410, which canbe utilized by network device 400 to store, among other things,applications 420 and/or other data. For example, data storage 410 mayalso be employed to store information that describes variouscapabilities of network device 400. The information may then be providedto another device based on any of a variety of events, including beingsent as part of a header during a communication, sent upon request, orthe like. Data storage 410 may also be employed to store socialnetworking information including address books, buddy lists, aliases,user profile information, or the like. Data storage 410 may furtherinclude program code, data, algorithms, and the like, for use by aprocessor, such as processor 402 to execute and perform actions such asthose action describe in conjunction with FIGS. 5-9. In one embodiment,at least some of data storage 410 might also be stored on anothercomponent of network device 400, including, but not limited to,non-transitory media inside processor-readable removable storage device436, processor-readable stationary storage device 434, or any othercomputer-readable storage device within network device 400, or evenexternal to network device 400. Data storage 410 may include, forexample, Ring Buffer(s) 412, and Trigger(s) 414.

Applications 420 may include computer executable instructions which,when executed by network device 400, transmit, receive, and/or otherwiseprocess messages (e.g., SMS, Multimedia Messaging Service (MMS), InstantMessage (IM), email, and/or other messages), audio, video, and enabletelecommunication with another user of another mobile device. Otherexamples of application programs include calendars, search programs,email client applications, IM applications, SMS applications, Voice OverInternet Protocol (VOIP) applications, contact managers, task managers,transcoders, database programs, word processing programs, securityapplications, spreadsheet programs, games, search programs, and soforth. Applications 420 may include Network Monitor application 422,Reporting application 424, and Browser application 426 which may beenabled to perform actions further described below starting with atleast FIG. 6. In at least one of the various embodiments, while they maybe illustrated here as separate applications, Network Monitorapplication 422 and/or Reporting application 424 may be implemented asmodules and/or components of the same application. Further, in at leastone of the various embodiments, Network Monitor application 422 and/orReporting application 424 may be implemented as operating systemextensions, modules, plugins, or the like.

Furthermore, in at least one of the various embodiments, Network Monitorapplication 422 and Reporting application 424 may be operative in acloud-based computing environment. In at least one of the variousembodiments, these applications, and others, that comprise the mobiledevelopment platform may be executing within virtual machines and/orvirtual servers that may be managed in a cloud-based based computingenvironment. In at least one of the various embodiments, in this contextthe applications may flow from one physical network device within thecloud-based environment to another depending on performance and scalingconsiderations automatically managed by the cloud computing environment.Likewise, in at least one of the various embodiments, virtual machinesand/or virtual servers dedicated to running Network Monitor application422 and/or Reporting application 424 may be provisioned andde-commissioned automatically.

Also, in at least one of the various embodiments, Ring Buffer(s) 412 andTrigger(s) 414, or the like, may located in virtual servers running in acloud-based computing environment rather than being tied to one or morespecific physical blade servers or server computer devices.

Illustrative Passive Arrangement of Network Monitor Device

FIG. 5 shows one embodiment of system 500 that includes a plurality ofnetwork devices on first network 502 and a plurality of network deviceson second network 504. Communication between the first network and thesecond network is managed by switch 506. Also, NMD 508 is arranged topassively monitor and record packets that are communicated in flowsbetween a network device on first network 502 and second network 504.For example, the communication of flows of packets between the Host Bnetwork device and the Host A network device are managed by switch 506and network device 508 is operative to passively monitor and recordthese flows.

NMD 508 can receive network communication for monitoring through avariety of means including network taps, wireless receivers, portmirrors or directed tunnels from network switches, servers including theendpoints themselves, or other infrastructure devices. In at least someof the various embodiments, the NMD may receive a copy of each packet ona particular network segment or virtual local area network (VLAN). Also,for at least some of the various embodiments, they may receive thesepacket copies through a port mirror on a managed Ethernet switch, e.g.,a Switched Port Analyzer (SPAN) port, or a Roving Analysis Port (RAP).The port mirroring enables real-time analysis and debugging of networkcommunications. Port mirroring can be performed in real time for inboundor outbound packet traffic (or both) on single or multiple interfaces.

Generalized Operation

FIG. 6 illustrates a flowchart for an exemplary process 600 forreal-time monitoring and analysis of selectively monitored flows, andtrigger-based recording of selectively monitored and buffered packetsthat enable back-in-time analysis and/or retrieval. Moving from thestart block, the process steps to block 602 and at least one trigger,such as a filter, is provided for selected flows of packets monitored inreal time.

In at least one of the various embodiments, any amount of differenttriggers/filters may be arranged either singly, or in combination, toinitiate real-time recording of a corresponding monitored flow andoptionally any related monitored flows. The real-time recording of themonitored flow includes the packets buffered prior to the initiation ofthe trigger that correspond to the monitored flow and any new packetsfor the monitored flow that are received after the trigger is initiated.A trigger is not limited to any particular type or combination withother triggers. Exemplary triggers may include, but is not limited to:(1) detecting threshold violations in one or more monitored flows ofpackets; (2) a byte pattern in a packet for a monitored flow; (3) aservice, such as email, that is disrupted; (4) detection of an attacksuch as denial of service; (5) a significant increase in the load on thenetwork; (6) overflowing a capacity of the buffer; and (7) initiation byan administrator of an NMD. Also, in at least one embodiment, theinitiation of a trigger my enable actions, e.g., the execution of abatch file or a program, the sending of a message or an alert, or thelike.

Triggers may also include triggers for transactions that occur at layer7 of the OSI model. These transaction-level triggers may be based on ananalysis of transaction-level attributes, such as, but not limited to,users, files, database tables, or the like. Exemplary transaction-leveltriggers may include, but are not limited to: 1) a specific useraccessing a specific resource; 2) a database query larger than athreshold; 3) a database query timing out or taking longer than athreshold time period; 4) a failed login attempt; 5) anapplication-level protocol error; 6) a packet with an HTTP 500 statuscode; or the like. In yet other embodiments, a trigger may affect otherrelated flows. In at least one such embodiment, a trigger of one flowmay act as the trigger of another flow, even though the other flow isnot directly associated with the original trigger.

At block 604, passive monitoring of selected flows in real time forsessions on a network is established. Also, in at least one of thevarious embodiments, one or more flows of packets over the network maybe selected for real-time monitoring by an administrator of the networkor an automated process based on different factors. For example, flowsmay be selected for real-time monitoring that correspond to anapplication, node, network device, or the like, that is communicatingover the network. Further, related flows may be identified and selectedfor real-time monitoring, e.g., one or more flows that also correspondto the same application, node, network device, or the like, as anotherflow that was previously selected for monitoring. Thus, a flow that isnot selected may not be monitored in real time.

At block 606, the one or more monitored flows of packets are buffered inreal time in a buffer e.g., a ring buffer. The buffered flows are taggedand threaded so that they are separately accessible from the buffer.Advancing to block 608, editing of one or more triggers and one or moreflows for real-time monitoring may be optionally performed. For example,one or more related flows may be newly discovered for currentlymonitored flows, an existing trigger may be modified, or a new triggermay be added.

Flowing to decision block 610, a determination is made as to whether atrigger is detected/initiated for one or more real-time monitored flows.If false, the process loops back to block 608 where substantially thesame process discussed above is performed. However, if the determinationat decision block 610 is true, the process moves to block 612 andpackets are recorded in real time for the one or more monitored flowsthat initiated the trigger. The real-time recording of the triggeredflow includes packets that are monitored after the initiation of thetrigger and those packets that were previously buffered for thatmonitored flow.

In some embodiments, packets for a plurality of flows may be monitoredand buffered (e.g., at block 606). A trigger may be detected for one ormore of the plurality of flows (e.g., at decision block 610). Thepreviously buffered packets associated with these one or more monitoredflows may be recorded back-in-time, which may be referred to flow-basedrecording with per-flow back-in-time capabilities. In some embodiments,each packet that was previously buffered that is associated with theflow that corresponds to the detected trigger may be recorded.

In at least one of the various embodiments, any amount of differenttriggers/filters may be arranged either singly, or in combination, toinitiate the real-time recording of a corresponding monitored flow andoptionally any related monitored flows too. A trigger is not limited toany particular type or combination with other triggers. Exemplarytriggers may include, but is not limited to: (1) detecting thresholdviolations in one or more monitored flows of packets; (2) a byte patternin a packet for a monitored flow; (3) a service, such as email, that isdisrupted; (4) detection of an attack such as denial of service; (5) asignificant increase in the load on the network; (6) overflowing acapacity of the buffer; and (7) initiation by an administrator of anNMD. Also, in at least one embodiment, the initiation of a trigger myenable the execution of a batch file or a program, the sending of amessage or an alert, or the like.

Triggers may also include triggers for transactions that occur at layer7 of the OSI model. These transaction-level triggers may be based on ananalysis of transaction-level attributes, such as, but not limited to,users, files, database tables, or the like. Exemplary transaction-leveltriggers may include, but are not limited to: 1) a specific useraccessing a specific resource; 2) a database query larger than athreshold; 3) a database query timing out or taking longer than athreshold time period; 4) a failed login attempt; 5) anapplication-level protocol error; 6) a packet with an HTTP 500 statuscode; or the like. In yet other embodiments, a trigger may affect otherrelated flows. In at least one such embodiment, a trigger of one flowmay act as the trigger of another flow, even though the other flow isnot directly associated with the original trigger.

At block 614, at least the recorded packets for the triggered flow areprocessed for analysis in real time. The real-time analysis may includeplay back of at least a portion of the triggered flow, as discussed inmore detail for FIG. 8.

Moving to decision block 616, a determination is made as to whether thereal-time monitoring of flows is ended. In some embodiments, thisdetermination may be based on a lack of data and/or packets beingtransmitted between the endpoints. In other embodiments, thisdetermination may be based on the session timing out. In yet otherembodiments, this determination may be based on a session terminationhandshake between the endpoints. If negative, the process loops back toblock 608 and performs substantially the same actions discussed above.However, if the determination at decision block 616 is affirmative, theprocess returns to performing other actions.

FIG. 7 shows a flowchart for exemplary process 700 for real-timebuffering of monitored flows of packets. Stepping from a start block toblock 702, the one or more real-time monitored flows are tagged andtheir corresponding packets are buffered in real time in a buffer. In atleast one of the various embodiments, a ring buffer is employed tobuffer and thread one or more monitored flows of packets. In yet atleast another of the various embodiments, a First In First Out buffermay be employed. In at least one of the various embodiments, a flowtable is employed to identify each monitored flow for each correspondingbuffered packet. Further, each entry corresponding to a buffered packetin the flow table may also include a direct or indirect reference to thepreceding buffered packet for that particular monitored flow.

At decision block 704, a determination is made as to whether a capacityof the buffer is exceeded by the real-time buffering of the one or moremonitored flows. If affirmative, the process moves to decision block 706where a determination is made as to whether the buffer's overflow shouldbe saved. If affirmative, the process advances to block 708 where thebuffer's overflow packets may be stored in a datastore, such as a diskstorage device, or the like, and/or the capacity of the buffer may beincreased to buffer more packets.

Next, the process advances to decision block 710. Also, if thedeterminations at either decision blocks 704 or 706 were negative, theprocess would have advanced directly to block 710 instead of asdescribed above. In any case, at decision block 710 a determination ismade as to whether at least one real-time monitored flow of packets isdominating the capacity of the buffer at the expense of buffering othermonitored packets. For example, a dominant monitored flow might providea thousand packets every second for buffering while other monitoredflows might average one packet every 10 seconds for buffering. In thiscase, the capacity of the buffer might be almost exclusively employed bythe dominant monitored flow.

If the determination at decision block 710 is false, the process returnsto block 702 and resumes performing substantially the same actionsdescribed above. However, if the determination at decision block 710 istrue, the process advances to decision block 712 where a determinationis made as to whether to throttle down the real-time buffering of thedominant monitored flow. If true, the process moves to block 714 wherethe buffering of the dominant monitored flow is modified. For example, asampling of the packets of the dominant monitored flow may be bufferedand the remaining packets may not be buffered. Next, the process returnsto block 702 and performs substantially the same actions describedabove.

Alternatively, if the determination at decision block 712 is negative,the process advances to decision block 716 where a determination is madeas to whether to provide a new buffer for real-time buffering for thedominant monitored flow. If negative, the process returns to block 702and performs substantially the same actions described above and thedominant monitored flow continues to dominate the capacity of thebuffer. However, if the determination at decision block 716 isaffirmative, the process moves to block 718 where a new buffer isinstantiated to separately buffer the dominant monitored flow. Next, theprocess returns to block 702 and resumes performing substantially thesame actions described above.

FIG. 8 illustrates a flowchart for exemplary process 800 that enablesanalysis of recorded of flows with play back. Moving from a start block,the process advances to decision block 802 where a determination is madeas to whether play back is selected for one or more monitored flows thatis being recorded in real time. If false, the process moves to decisionblock 810 where real-time analysis is performed for the one or morerecorded flows. However, if the determination at decision block 802 istrue, the process flows to block 804 where at least one value isselected for playing back at least a portion of one or more monitoredflows being recorded in real time. The one or more selected values mayinclude, but are not limited to a time, byte pattern, offset, sequencenumber, checksum, pointer, destination port, source port, payload, orthe like.

At block 806, the play back of at least one monitored flow that is beingrecorded in real time based at least in part on the selected value. Theone or more selected values enable fast and efficient analysis of arelatively large number of packets without having to examine everypacket of the recorded flow. In some of the various embodiments, one ormore recorded flows may be retrieved, rather than played back.

At decision block 808, another determination is made as to whether playback at least one monitored flow that is being recorded in real time. Ifaffirmative, the process returns to block 804 and substantially the sameactions are performed as described above. However, if the determinationat decision block 808 is negative, the process steps to block 810 andanalysis is performed for the one or more monitored flows that is beingrecorded in real time. In at least one of the various embodiments, theanalysis of the one or more monitored flows that is being recorded inreal time may be based on playing back at least a portion of therecording. In at least one of the various embodiments, the system couldbuffer the packets associated with a monitored flow while performingsome level of real-time analysis. In some embodiments, this real-timeanalysis may be for the purpose of triggering (e.g., determining if atrigger has occurred). If a trigger is detected, then the beginning ofthe flow (e.g., the buffered packets associated with the flow) can beplayed back for further and/or deeper analysis. In at least one ofvarious embodiments, a predetermined amount of a beginning of the flowmay be played back. In some other embodiments, the play back may beinternal to an analysis engine for the purpose of deeper analysis.

Also, in at least one of the various embodiments, the play back actionsmay be associated with a dashboard that may be arranged to operateautomatically and/or manually. Further, a display may be provided fordisplaying information in real time regarding one or more packets and/orinformation regarding the one or more monitored flows that is beingrecorded in real time, play back of the recorded flow(s), and othermonitored flows. In at least one of the various embodiments, analysismay be performed on the at least one monitored flow that is beingrecorded in real time, the play back of the recorded flow(s), and othermonitored flows, which may include statistics, reports, or the like. Inat least one of the various embodiments, the displayed informationand/or analysis may be displayed to an administrator and/or provided toa separate application for subsequent processing. Moving from block 810,the process returns to performing other actions.

FIG. 9 shows an exemplary embodiment of an Internet Protocol (IP) packet900 in accordance with at least one of the various embodiments. Asshown, packet 900 may contain a variety of information, including butnot limited to version, type of service, total length, identification,flags, fragment offset, time to live, protocol, header checksum, sourceIP address, destination IP address, Padding and data. In at least one ofthe various embodiments, other protocols or protocol layers (not shownin FIG. 9) may be employed to in identifying a packet as correspondingto a monitored flow. For example, the source port address anddestination address and sequence number and/or other L4 headerinformation may be employed in identifying a packet as corresponding toa monitored flow. However, there are many other aspects of a packeteither singly or in combination with these elements that may also beused to identify a packet and its corresponding monitored flow.

What is claimed as new and desired to be protected by Letters Patent ofthe United States is:
 1. A method for improving the monitoring of flowsof packets over a network, wherein a network computer performs themethod by executing actions, comprising: selecting one or more of aplurality of flows for passive monitoring in real time over a network,wherein one or more other flows are related to the selected one or moreflows; providing one or more triggers that is initiated in real time byone or more conditions that are associated with the one or more selectedflows, wherein the one or more other flows are unassociated with the oneor more conditions; buffering in real time the one or more selectedflows in a buffer, wherein each selected flow is arranged as a thread inthe buffer; when one of the plurality of selected flows dominates acapacity of the buffer, executing one or more actions including:modifying the real-time buffering of the dominant selected flow toreduce an amount of corresponding packets buffered in the buffer; orinstantiating a new buffer to separately buffer in real time thedominant selected flow; and when the one or more conditions occurs andinitiates the one ormore triggers, recording in real time each packetfor the one or more selected flows that is associated with the one ormore conditions and each packet for the one or more other flows, whereineach buffered packet for the one or more selected flows is recorded inreal time along with the selected flow's packets and each packet for theone or more other flows that are received after the initiation of theone or more triggers.
 2. The method of claim 1, further comprising:selecting at least one value of the one or more recorded flows, whereinthe at least one selected value includes time, byte pattern, offset,sequence number, checksum, pointer, destination port, source port,destination address, source address or payload; and employing theselected value to play back or retrieve at least a portion of the one ormore recorded flows.
 3. The method of claim 1, further comprisingenabling in real time analysis and play back of the one or more recordedflows regarding the occurrence of the one or more conditions.
 4. Themethod of claim 1, further comprising providing a dashboard to controlthe playback and display of the one or more recorded flows.
 5. Themethod of claim 1, further comprising employing information from one ormore of a plurality of protocols and one or more of a plurality ofprotocol layers to identify each packet corresponding to the one or moreselected flows.
 6. The method of claim 1, wherein the one or moreconditions, further comprises information from one or more of aplurality of protocols and one or more of a plurality of protocollayers.
 7. A network computer for improving the monitoring of flows ofpackets over a network, comprising: a transceiver device for monitoringcommunication over the network; a memory device for storing at leastinstructions; and a processor device that is operative to executeinstructions that enable actions, including: selecting one or more of aplurality of flows for passive monitoring in real time over a network,wherein one or more other flows are related to the selected one or moreflows; providing one or more triggers that is initiated in real time byone or more conditions that are associated with the one or more selectedflows, wherein the one or more other flows are unassociated with the oneor more conditions; buffering in real time the one or more selectedflows in a buffer, wherein each selected flow is arranged as a thread inthe buffer; when one of the plurality of selected flows dominates acapacity of the buffer, further enabling one or more actions including:modifying the real-time buffering of the dominant selected flow toreduce an amount of corresponding packets buffered in the buffer; orinstantiating a new buffer to separately buffer in real time thedominant selected flow; and when the one or more conditions occurs andinitiates the one or more triggers, recording in real time each packetfor the one or more selected flows that is associated with the one ormore conditions and each packet for the one or more other flows, whereineach buffered packet for the one or more selected flows is recorded inreal time along with the selected flow's packets and each packet for theone or more other flows that are received after the initiation of theone or more triggers.
 8. The network computer of claim 7, furthercomprising: selecting at least one value of the one or more recordedflows, wherein the at least one selected value includes time, bytepattern, offset, sequence number, checksum, pointer, destination port,source port, destination address, source address or payload; andemploying the selected value to play back or retrieve at least a portionof the one or more recorded flows.
 9. The network computer of claim 7,further comprising enabling in real time analysis and play back of theone or more recorded flows regarding the occurrence of the one or moreconditions.
 10. The network computer of claim 7, further comprisingproviding a dashboard to control the playback and display of the one ormore recorded flows.
 11. The network computer of claim 7, furthercomprising employing information from one or more of a plurality ofprotocols and one or more of a plurality of protocol layers to identifyeach packet corresponding to the one or more selected flows.
 12. Thenetwork computer of claim 7, wherein the one or more conditions, furthercomprises information from one or more of a plurality of protocols andone or more of a plurality of protocol layers.
 13. A system forimproving the monitoring of flows of packets over a network, comprising:a first network computer that includes: a transceiver device formonitoring communication over the network; a memory device for storingat least instructions; and a processor device that is operative toexecute instructions that enable actions, comprising communicating oneor more flows of packets with at least a second network computer; and athird network computer that includes: a transceiver device formonitoring communication between the first network computer and thesecond network computer; a memory device for storing at leastinstructions; and a processor device that is operative to executeinstructions that enable actions, comprising: selecting one or more ofthe plurality of flows for passive monitoring in real time over anetwork, wherein one or more other flows are related to the selected oneor more flows; providing one or more triggers that is initiated in realtime by one or more conditions that are associated with the one or moreselected flows, wherein the one or more other flows are unassociatedwith the one or more conditions; buffering in real time the one or moreselected flows in a buffer, wherein each selected flow is arranged as athread in the buffer; and when one of the plurality of selected flowsdominates a capacity of the buffer, enabling one or more further actionsincluding: modifying the real-time buffering of the dominant selectedflow to reduce an amount of corresponding packets buffered in thebuffer; or instantiating a new buffer to separately buffer in real timethe dominant selected flow; when the one or more conditions occurs andinitiates the one or more triggers, recording in real time each packetfor the one or more selected flows that is associated with the one ormore conditions and each packet for the one or more other flows, whereineach buffered packet for the one or more selected flows is recorded inreal time along with the selected flow's packets and each packet for theone or more other flows that are received after the initiation of theone or more triggers.
 14. The system of claim 13, wherein the actions ofthe third network computer further comprise: selecting at least onevalue of the one or more recorded flows, wherein the at least oneselected value includes time, byte pattern, offset, sequence number,checksum, pointer, destination port, source port, destination address,source address or payload; and employing the selected value to play backor retrieve at least a portion of the one or more recorded flows. 15.The system of claim 13, wherein the actions of the third networkcomputer further comprise enabling in real time analysis and play backof the one or more recorded flows regarding the occurrence of the one ormore conditions.
 16. The system of claim 13, wherein the actions of thethird network computer further comprise providing a dashboard to controlthe playback and display of the one or more recorded flows.
 17. Thesystem of claim 13, wherein the actions of the third network computerfurther comprise employing information from one or more of a pluralityof protocols and one or more of a plurality of protocol layers toidentify each packet corresponding to the one or more selected flows.18. The system of claim 13, wherein the one or more conditions, furthercomprises information from one or more of a plurality of protocols andone or more of a plurality of protocol layers.
 19. A processor readablenon-transitive storage media that includes instructions for improvingthe monitoring of flows of packets over a network, wherein execution ofthe instructions by a network computer enables actions, comprising:selecting one or more of a plurality of flows for passive monitoring inreal time over a network, wherein one or more other flows are related tothe selected t one or more flows; providing one or more triggers that isinitiated in real time by one or more conditions that are associatedwith the one or more selected flows, wherein the one or more other flowsare unassociated with the one or more conditions; buffering in real timethe one or more selected flows in a buffer, wherein each selected flowis arranged as a thread in the buffer; when one of the plurality ofselected flows dominates a capacity of the buffer, enabling one or morefurther actions including: modifying the real-time buffering of thedominant selected flow to reduce an amount of corresponding packetsbuffered in the buffer; or instantiating a new buffer to separatelybuffer in real time the dominant selected flow; and when the one or moreconditions occurs and initiates the one or more triggers, recording inreal time each packet for the one or more selected flows that isassociated with the one or more conditions and each packet for the oneor more other flows, wherein each buffered packet for the one or moreselected flows is recorded in real time along with the selected flow'spackets and each packet for the one or more other flows that arereceived after the initiation of the one or more triggers.
 20. The mediaof claim 19, further comprising: selecting at least one value of the oneor more recorded flows, wherein the at least one selected value includestime, byte pattern, offset, sequence number, checksum, pointer,destination port, source port, destination address, source address orpayload; and employing the selected value to play back or retrieve atleast a portion of the one or more recorded flows.
 21. The media ofclaim 19, further comprising enabling in real time analysis and playback of the one or more recorded flows regarding the occurrence of theone or more conditions.
 22. The media of claim 19, further comprisingproviding a dashboard to control the playback and display of the one ormore recorded flows.
 23. The media of claim 19, further comprisingemploying information from one or more of a plurality of protocols andone or more of a plurality of protocol layers to identify each packetcorresponding to the one or more selected flows.
 24. The media of claim19, wherein the one or more conditions, further comprises informationfrom one or more of a plurality of protocols and one or more of aplurality of protocol layers.