Network analysis omniscent loop state machine

Embodiments of the invention provide a method for analyzing a data trace representative of an FC network. The method includes determining a topology of the network, filtering the data trace for open commands that are not perceived by at least one analyzer positioned in communication with the network...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Klotz, Steve, Mann, Jason David, McDaniel, Timothy Lane
Format: Patent
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Klotz, Steve
Mann, Jason David
McDaniel, Timothy Lane
description Embodiments of the invention provide a method for analyzing a data trace representative of an FC network. The method includes determining a topology of the network, filtering the data trace for open commands that are not perceived by at least one analyzer positioned in communication with the network and eliminating devices associated with these open commands not received by an analyzer from further analysis, filtering the data trace for failed open commands and eliminating devices associated with the failed open commands from further analysis, and filtering the trace data for frames to destinations that are not received by the analyzer and eliminating devices associated with these frame from further analysis. The method further includes filtering frames transmitted when a loop is in closed state and eliminating devices associated with transmitting frames when a loop is closed from further analysis, and conducting error analysis of the network topology not eliminated by a filtering step.
format Patent
fullrecord <record><control><sourceid>uspatents_EFH</sourceid><recordid>TN_cdi_uspatents_grants_07343524</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>07343524</sourcerecordid><originalsourceid>FETCH-uspatents_grants_073435243</originalsourceid><addsrcrecordid>eNrjZND1Sy0pzy_KVkjMS8ypLM4sVsjPzcssTk7NK1HIyc8vUCguSSxJVchNTM7IzEvlYWBNS8wpTuWF0twMCm6uIc4euqXFBUBleSXF8elFiSDKwNzYxNjUyMSYCCUAyk0raA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network analysis omniscent loop state machine</title><source>USPTO Issued Patents</source><creator>Klotz, Steve ; Mann, Jason David ; McDaniel, Timothy Lane</creator><creatorcontrib>Klotz, Steve ; Mann, Jason David ; McDaniel, Timothy Lane ; Finisar Corporation</creatorcontrib><description>Embodiments of the invention provide a method for analyzing a data trace representative of an FC network. The method includes determining a topology of the network, filtering the data trace for open commands that are not perceived by at least one analyzer positioned in communication with the network and eliminating devices associated with these open commands not received by an analyzer from further analysis, filtering the data trace for failed open commands and eliminating devices associated with the failed open commands from further analysis, and filtering the trace data for frames to destinations that are not received by the analyzer and eliminating devices associated with these frame from further analysis. The method further includes filtering frames transmitted when a loop is in closed state and eliminating devices associated with transmitting frames when a loop is closed from further analysis, and conducting error analysis of the network topology not eliminated by a filtering step.</description><language>eng</language><creationdate>2008</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7343524$$EPDF$$P50$$Guspatents$$Hfree_for_read</linktopdf><link.rule.ids>230,308,780,802,885,64039</link.rule.ids><linktorsrc>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7343524$$EView_record_in_USPTO$$FView_record_in_$$GUSPTO$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Klotz, Steve</creatorcontrib><creatorcontrib>Mann, Jason David</creatorcontrib><creatorcontrib>McDaniel, Timothy Lane</creatorcontrib><creatorcontrib>Finisar Corporation</creatorcontrib><title>Network analysis omniscent loop state machine</title><description>Embodiments of the invention provide a method for analyzing a data trace representative of an FC network. The method includes determining a topology of the network, filtering the data trace for open commands that are not perceived by at least one analyzer positioned in communication with the network and eliminating devices associated with these open commands not received by an analyzer from further analysis, filtering the data trace for failed open commands and eliminating devices associated with the failed open commands from further analysis, and filtering the trace data for frames to destinations that are not received by the analyzer and eliminating devices associated with these frame from further analysis. The method further includes filtering frames transmitted when a loop is in closed state and eliminating devices associated with transmitting frames when a loop is closed from further analysis, and conducting error analysis of the network topology not eliminated by a filtering step.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2008</creationdate><recordtype>patent</recordtype><sourceid>EFH</sourceid><recordid>eNrjZND1Sy0pzy_KVkjMS8ypLM4sVsjPzcssTk7NK1HIyc8vUCguSSxJVchNTM7IzEvlYWBNS8wpTuWF0twMCm6uIc4euqXFBUBleSXF8elFiSDKwNzYxNjUyMSYCCUAyk0raA</recordid><startdate>20080311</startdate><enddate>20080311</enddate><creator>Klotz, Steve</creator><creator>Mann, Jason David</creator><creator>McDaniel, Timothy Lane</creator><scope>EFH</scope></search><sort><creationdate>20080311</creationdate><title>Network analysis omniscent loop state machine</title><author>Klotz, Steve ; Mann, Jason David ; McDaniel, Timothy Lane</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-uspatents_grants_073435243</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2008</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Klotz, Steve</creatorcontrib><creatorcontrib>Mann, Jason David</creatorcontrib><creatorcontrib>McDaniel, Timothy Lane</creatorcontrib><creatorcontrib>Finisar Corporation</creatorcontrib><collection>USPTO Issued Patents</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Klotz, Steve</au><au>Mann, Jason David</au><au>McDaniel, Timothy Lane</au><aucorp>Finisar Corporation</aucorp><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network analysis omniscent loop state machine</title><date>2008-03-11</date><risdate>2008</risdate><abstract>Embodiments of the invention provide a method for analyzing a data trace representative of an FC network. The method includes determining a topology of the network, filtering the data trace for open commands that are not perceived by at least one analyzer positioned in communication with the network and eliminating devices associated with these open commands not received by an analyzer from further analysis, filtering the data trace for failed open commands and eliminating devices associated with the failed open commands from further analysis, and filtering the trace data for frames to destinations that are not received by the analyzer and eliminating devices associated with these frame from further analysis. The method further includes filtering frames transmitted when a loop is in closed state and eliminating devices associated with transmitting frames when a loop is closed from further analysis, and conducting error analysis of the network topology not eliminated by a filtering step.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_uspatents_grants_07343524
source USPTO Issued Patents
title Network analysis omniscent loop state machine
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T01%3A59%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-uspatents_EFH&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Klotz,%20Steve&rft.aucorp=Finisar%20Corporation&rft.date=2008-03-11&rft_id=info:doi/&rft_dat=%3Cuspatents_EFH%3E07343524%3C/uspatents_EFH%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true