$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Correlating input and output requests between client and server components in a multi-tier application 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/00
  • G06F-015/173
  • G06F-017/30
  • H04L-029/08
  • H04L-029/06
출원번호 US-0365484 (2012-02-03)
등록번호 US-9549030 (2017-01-17)
발명자 / 주소
  • Malloy, Patrick
  • Crosby, Peter Anthony
  • Meagher, Robert
출원인 / 주소
  • RIVERBED TECHNOLOGY, INC.
대리인 / 주소
    Park, Vaughan, Fleming & Dowler LLP
인용정보 피인용 횟수 : 1  인용 특허 : 46

초록

The present invention relates to correlating requests between a client and a server to a particular transaction. In one embodiment, transactions in a system of clients and servers are monitored and traced. From this information, a context comprising sets or groupings of transaction call sequences ar

대표청구항

1. A method of marking a transaction at a first node for correlation with a related transaction at a second node, said method comprising: determining when a socket connection is opened by the first node for a communication destined to the second node;assigning a connection ID to the socket connectio

이 특허에 인용된 특허 (46)

  1. Barsness,Eric Lawrence; Santosuosso,John Matthew, Apparatus and method for monitoring usage of components in a database index.
  2. Block,Timothy Roy; Cernohous,Bob Richard; Simonson,Steven John; Unterholzner,John Christian, Apparatus and method for processing sequenced records across multiple network connections.
  3. Cobb, Jeffrey R.; Thio, Ling; Zuzga, Brian, Automatic correlation of service level agreement and operating level agreement.
  4. Berger Toby ; Chiu Yi-Jen ; Kawahara Mikio,JPX, Byte-based prefix encoding.
  5. Bittinger Reed Richard ; Fraenkel Michael Levi ; Housel ; III Barron Cornelius ; Lindquist David Bruce, Client/server communication system.
  6. Mukerji, Arindum; Rothstein, Jesse Abraham, Coalescing acknowledgement responses to improve network communications.
  7. Luke Charles A. (Saratoga CA), Converting trace data from processors executing in parallel into graphical form.
  8. Sorenson Ellen L., Database backup and recovery using separate history files for database backup and audit backup.
  9. Saunders, Roger Clive; Goulet, Michael; Singh, Vashistha, Instrumenting an application with flexible tracers to provide correlation data and metrics.
  10. Turek John J. E. ; Vetter Brian Jay, Internet quality-of-service method and system.
  11. Zelig, David; Bruckman, Leon; Solomon, Ronen; Oster, Zeev; Rozenberg, David; Khill, Uzi, MAC address learning in a distributed bridge.
  12. Arcese, Mauro; Perrone, Antonio; Piccinini, Sandro; Sidoti, Stefano, Measuring transaction performance across application asynchronous flows.
  13. Dixon, Scot; Huband, Simon Teverey; McKenna, Luke Rowan, Message queue transaction tracking using application activity trace data.
  14. Dixon, Scot; Huband, Simon Teverey; McKenna, Luke Rowan, Message queue transaction tracking using application activity trace data.
  15. Benson, Donald Edward; Gallagher, Edward Joseph; Ho, Mang-Rong; Richardson, Dwayne Lorenzo, Method and apparatus for entity removal from a content management solution implementing time-based flagging for certainty in a relational database environment.
  16. Chagoly, Bryan Christopher; Emuchay, Nduwuisi, Method and apparatus for exposing monitoring violations to the monitored application.
  17. Brentano, James; Pieber, Toby; Martinelli, Paul; Thompson, Brad; Northing, Richard, Method and system for managing digital goods.
  18. Carusi, Francesco; Sciacca, Vincenzo, Method and system for monitoring performance of distributed applications.
  19. Carusi,Francesco; Sciacca,Vincenzo, Method and system for monitoring performance of distributed applications.
  20. Barnett, Paul T.; Braddock, Daniel M.; Clarke, Allan Drew; DuPré´, David Leigh; Gimarc, Richard; Lehr, Theodore F.; Palmer, Annette; Ramachandran, Rajinikala; Reynolds, James; Spellmann, Amy Carolyn; West, Carolyn; Wise, Timothy E.; Zauli, Tom; Zink, Kenneth, Method of semi-automatic data collection, data analysis, and model generation for the performance analysis of enterprise applications.
  21. Barnett,Paul T.; Braddock,Daniel M.; Clarke,Allan Drew; DuPr챕쨈,David Leigh; Gimarc,Richard; Lehr,Theodore F.; Palmer,Annette; Ramachandran,Rajinikala; Renyolds,James; Spellman,Amy Carolyn; West,Carolyn; Wise,Timothy E.; Zauli,Tom; Zink,Kenneth, Method of semi-automatic data collection, data analysis, and model generation for the performance analysis of enterprise applications.
  22. Gale, Martin J; Smart, Robert; Stanford-Clark, Andy J, Method, apparatus and computer program product for managing persistence in a messaging network.
  23. Longshaw, Tom Benjamin, Method, system, and database archive for enhancing database archiving.
  24. David, Ram Adva Fish; Kenchammana-Hosekote, Dilip Raghu; Adams, Alistair Edwin, Methods and systems for associating location information with a wireless local area network.
  25. Bröker, Norbert, Methods and systems for providing guided navigation.
  26. Russell, Travis E.; Marsico, Peter J., Methods, systems, and computer program products for providing media content delivery audit and verification services.
  27. Mani, Ramesh; Zuzga, Brian; Thio, Ling, Monitoring related content requests.
  28. Barsness, Eric Lawrence; Santosuosso, John Matthew, Monitoring usage of components in a database index.
  29. Ben-Yehuda, Shmuel; Breitgand, David; Factor, Michael E.; Kolodner, Elliot K.; Pelleg, Dan, Platform-level indicators of application performance.
  30. Block, Timothy Roy; Cernohous, Bob Richard; Simonson, Steven John; Unterholzner, John Christian, Processing sequenced records across multiple network connections.
  31. Miller Daniel L. ; Haney Scott J. ; Ouellette Christopher J., Product-independent performance monitoring tool kit.
  32. Chung, Ho Ming; Ip, Wing Kei, Real time data exchange system.
  33. Madrid Louise M. ; Meier Richard A. ; Putzolu Franco ; Sharma Sunil ; O'Shea Thomas J. ; Troisi James H. ; Zeller Hansjorg ; Gilbert Gary M. ; Maier Donald S. ; Davis Elizabeth G. ; Celis Pedro, Relational database system and method with high availability compliation of SQL programs.
  34. Davis, Jeffrey Anderson, Secure systems, software, and methods for verifying user-agent string by interrogation.
  35. Harada, Lilian; Yugami, Nobuhiro; Kobayashi, Kenichi; Otsuka, Hiroshi; Yokoyama, Ken; Take, Riichiro; Kubota, Kazumi; Hotta, Yuuji; Akaboshi, Naoki, System analysis program, system analysis method, and system analysis apparatus.
  36. Harada, Lilian; Yugami, Nobuhiro; Kobayashi, Kenichi; Otsuka, Hiroshi; Yokoyama, Ken; Take, Riichiro; Kubota, Kazumi; Hotta, Yuuji; Akaboshi, Naoki, System analysis program, system analysis method, and system analysis apparatus.
  37. Harada, Lilian; Yugami, Nobuhiro; Kobayashi, Kenichi; Otsuka, Hiroshi; Yokoyama, Ken; Take, Riichiro; Kubota, Kazumi; Hotta, Yuuji; Akaboshi, Naoki, System analysis program, system analysis method, and system analysis apparatus.
  38. Brentano, James; Pieper, Tobid; Habets, Ariane, System and method for bulk transfer of digital goods.
  39. Johns, William M.; Lindau, Brian G., System and method for continuous monitoring and measurement of performance of computers on network.
  40. Friedrich Richard J. ; Rolia Jerome,CAX, System and method for continuously measuring quality of service in a federated application environment.
  41. Pierce Edward Brockman ; Lisan Lin, System and method for correlating transaction messages in a communications network.
  42. Chang, Joon; Shi, Amy Yi-mei, System and method for ghost offset utilization in sequential byte stream semantics.
  43. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  44. Hood, Gavan W., Time stamp methods for unified plant model.
  45. Patterson, Bret, Using MD4 checksum as primary keys to link transactions across machines.
  46. Patterson,Bret, Using MD4 checksum as primary keys to link transactions across machines.

이 특허를 인용한 특허 (1)

  1. Dixon, Scot W.; Larcombe, Steven; Weatherill, Mark N., High performance topology resolution for non-instrumented nodes.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로