WO2004053693A2 - Resource-aware management of request traffic based on a management policy - Google Patents
Resource-aware management of request traffic based on a management policy Download PDFInfo
- Publication number
- WO2004053693A2 WO2004053693A2 PCT/GB2003/004920 GB0304920W WO2004053693A2 WO 2004053693 A2 WO2004053693 A2 WO 2004053693A2 GB 0304920 W GB0304920 W GB 0304920W WO 2004053693 A2 WO2004053693 A2 WO 2004053693A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- corrective action
- management policy
- approaching
- overload condition
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/149—Network analysis or design for prediction of maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5019—Ensuring fulfilment of SLA
- H04L41/5025—Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/0816—Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Definitions
- the present invention provides resource-aware management of request traffic based on a management policy. Specifically, the present invention provides management of request traffic based on the performance of system resources in response to the request traffic.
- a need for a resource-aware management of request traffic based on a management policy there exists a need for a resource-aware management of request traffic based on a management policy. Specifically, a need exists for a system that manages request traffic based on specific resources that are approaching overload conditions. A further need exists for a performance of system resources to be monitored in response to request traffic, and based on a management policy, corrective actions to be taken when a system resource is approaching overload conditions. An additional need exists for the management policy to be changed based on a performance history of implemented corrective actions.
- the present invention provides resource- ware management of request traffic based on a management policy.
- a management policy Specifically, under the present invention, the performance of a set (i.e., one or more) of system resources is monitored in response to request traffic.
- a corrective action is identified from the management policy and then implemented.
- the corrective action is typically identified based on the system resource that is approaching overload so that an appropriate and effective corrective action will be implemented.
- the management policy can be changed under the present invention to account for performance histories of the corrective actions. This allows ineffective corrective actions to be discarded and new corrective actions to be implemented.
- a resource-aware system for managing request traffic based on a management policy.
- the system comprises: (1) an analyzer system for monitoring a performance of a set of system resources in response to the request traffic, and for determining when at least one of the set of system resources is approaching an overload condition based on the management policy; and (2) a planning system for identifying a corrective action to avoid the overload condition, wherein the corrective action is identified based on the at least one system resource that is approaching the overload condition and the management policy.
- a resource-aware method for managing request traffic based on a management policy comprises: (1) receiving the request traffic; (2) monitoring a performance of a set of system resources in response to the request traffic; (3) determining when at least one of the set of system resources is approaching an overload condition based on the management policy; and (4) identifying a corrective action to avoid the overload condition based on the at least one system resource that is approaching the overload condition and the management policy.
- a program product stored on a recordable medium for managing request traffic based on a management policy When executed, the program product comprises: (1) program code for monitoring performance of a set of system resources in response to incoming request traffic, and for determining when at least one of the set of system resources is approaching an overload condition based on the management policy; and (2) program code for identifying and implementing a corrective action to avoid the overload condition, wherein the corrective action is identified based on the at least one system resource that is approaching the overload condition and the management policy.
- the present invention provides a resource-aware system, method and program product for managing request traffic based on a management policy.
- Fig. 1 depicts a resource-aware system for managing request traffic based on a management policy according to the present invention
- FIG. 2 depicts more detailed diagram of the system of Fig. 1;
- FIG. 3 depicts a method flow diagram according to the present invention. Detailed Description of the Invention
- the present invention provides a resource-aware system, method and program product for managing request traffic based on a management policy.
- a performance of a set (i.e., one or more) of system resources is monitored in response to request traffic.
- a corrective action is identified from the management policy and then implemented.
- the corrective action is typically identified based on the system resource that is approaching overload so that an appropriate and effective corrective action will be implemented.
- the management policy can be changed under the present invention to account for performance histories of the corrective actions. This allows ineffective corrective actions to be discarded and new corrective actions to be implemented.
- enterprise system 10 generally includes entry point node 12 and system resources 14.
- Enterprise system 10 is intended to represent any type of computer infrastructure that can process requests from clients 16.
- enterprise system 10 could be the internal computing infrastructure use by a retail company.
- clients 16 are intended to represent any system capable of generating and transmitting requests to enterprise system 10.
- clients 16 could be web users attempting to order goods from the retail company.
- clients 16 could be employees of the retail company attempting to perform work-related tasks.
- Entry point node 12 is intended to represent any node that receives and routes incoming request traffic 18 among system resources 14.
- entry point node 12 could be a load balancer, a request router, etc.
- system resources 14 generally include a network 12, one or more servers 26 and one or more storage units 28. It should be understood, however, that such system resources are shown for illustrative purposes only and that the teachings of the present invention could be implemented with any type and/or quantity of system resources.
- management system 30 Shown loaded on entry point node 12 is management system 30.
- management system includes analyzer system 32, planning system 34 that includes corrective action system 36 and learning system 38, and storage system 40.
- Storage system 40 could be local (as shown) or remote and provides storage for information under the present invention.
- information could include, among other things, a management policy, a record of requests received, performance history of corrective actions, etc.
- the management policy sets forth an overload threshold for each of the system resources 14. That is, the management policy will identify the point at which a system resource will be overloaded and possibly fail. The management policy will also identify a corresponding corrective action to be taken to avoid the overload condition.
- requests 20 and 22 could be for any purpose.
- requests 20 and 22 could be to access or perform some task over network 24, to access one or more servers 26, to access information in one or more storage units 28, etc.
- the management policy will specify precisely how performance of a system resource should be monitored and measured. For example, network 24 performance could be monitored based on how many active connections exist.
- analyzer system 32 will continuously monitor the number of active network connections, and compare that number to an overload threshold (e.g., 1000 active connections) for network 24 as set forth in the management policy. If the number of connections is approaching an overload threshold as indicated in the policy, analyzer system 32 will communicate that information to planning system 34.
- the management policy could include a set of threshold rules such as "when the number of connections to network 24 is equal to 1000 out of 1100 possible connections, inform planning system 34 to avoid overload.”
- Analyzer system 32 can also check storage system 40 to see what actions were previously taken to address the overload condition and whether they were successful. As will be further described below, a performance history of the corrective actions can be recorded so that ineffective corrective actions can be discarded.
- analyzer system 32 could communicate this information to planning system 34.
- a similar approach can be used to monitor servers 26 and storage units 28. With respect to servers 26, performance could be monitored based on, for example, a number of tasks a server is currently being requested to perform. With respect to storage units 28, performance could be monitored based on, for example, a quantity of information retrieval requests a storage unit 28 is processing at any one time. If a particular system resource is approaching its overload threshold, corrective action system 36 will receive the information transmitted from analyzer system 32 and reference the management policy to identify and implement the most appropriate corrective action. Unlike previous systems, the corrective action is resource-based in that the requests that are causing the specific overload condition will be targeted.
- the present invention can allow innocuous traffic to continue, thereby helping system performance without worsening system "pressure.”
- the first type is to change a queue priority of requests 18 based on the type of request and what system resource is approaching the overload condition.
- requests 20 are the type that primarily "task" network 24 and servers 26.
- requests 20 will be given a lower queue priority so that fewer requests for network 24 connections are received and network 24 will not approach or exceed its overload threshold.
- Changing the queue priority of requests 20 may or may not lead to an increased priority of requests 22. If the altering of queue priority fails to remedy the overload condition, corrective action system 36 can take the more drastic action of discarding or excluding the requests causing the problems.
- a third type of corrective action could be implemented based on the consumption of resources per request type, as monitored by analyzer system 32. For example, assume that each request 20 requires server 26 to perform an average of two tasks and a maximum of four. Further assume that each request 22 requires that server 26 perform an average of ten requests and a maximum of fifty. In this example, if server 26 is determined to be approaching an overload condition, corrective action system 36 could receive the consumption information from analyzer system 32 and "intelligently" decide to limit requests 22, but not requests 20. The "intelligence" for such a limitation could be provided as one or more rules in the management policy.
- the management policy could optionally set forth a bottom threshold for returning to "normal" status. For example, if the overload threshold for network 24 is 1000 connections, the management policy could also state that once the number of connections falls below 800, corrective action system 36 will cease implementing the corrective actions (until the overload threshold of 1000 connections is approached again) . As indicated above, analyzer system 32 is continuously monitoring the performances of system resources 14. Any relevant information will be communicated to planning system 34 and used by corrective action system 36. Thus, if the queue priority of requests 20 was made lower to avoid crossing the overload threshold of network 24, the queue priority could be returned to normal when the number of network connections returns to "normal" levels (e.g., falls below the bottom threshold) .
- Learning system 38 of planning system 34 can dynamically change/amend the management policy based on the performance histories of the corrective actions. For example, if the queue priority of requests 20 are made lower in an attempt to avoid overloading of network 24, learning system 38 can change the management policy based on whether the lowering of the queue priority actually helped avoid overloading. To this extent, learning system 38 could use continuous monitoring information received from analyzer system 32. If it appears that the implemented corrective action is not helping to avoid overload conditions, learning system 38 will make a record of such in storage system 40 and change the management policy to reflect the failure. Changing of the management policy could be done in any manner. Examples include inserting a specific rule such as "do not adjust queue policy of requests 20 when attempting to avoiding overloading of network 24," or a broader change such as entirely eliminating queue priority changes as a corrective action.
- entry point node 12 generally includes central processing unit (CPU) 50, memory 52, bus 54, input/output (I/O) interfaces 56 and external devices/resources 58.
- CPU 50 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server.
- Memory 52 may comprise any known type of data storage and/or transmission media, including magnetic media, optical media, random access memory (RAM) , read-only memory (ROM), a data cache, a data object, etc.
- memory 52 may reside at a single physical location, comprising one or more types of data storage, or be distributed across a plurality of physical systems in various forms.
- I/O interfaces 56 may comprise any system for exchanging information to/from an external source.
- External devices/resources 58 may comprise any known type of external device, including speakers, a CRT, LED screen, hand-held device, keyboard, mouse, voice recognition system, speech output system, printer, monitor, facsimile, pager, etc.
- Bus 54 provides a communication link between each of the components in entry point node 12 and likewise may comprise any known type of transmission link, including electrical, optical, wireless, etc.
- additional components such as cache memory, communication systems, system software, etc., may be incorporated into entry point node 12.
- entry point node 12 could include storage system 40 which can be local (as shown) or remote.
- storage system 40 may include one or more storage devices, such as a magnetic disk drive or an optical disk drive.
- storage system 40 includes data distributed across, for example, a local area network (LAN) , wide area network (WAN) or a storage area network (SAN) (not shown) .
- LAN local area network
- WAN wide area network
- SAN storage area network
- storage system 40 may also be configured in such a way that one of ordinary skill in the art may interpret it to include one or more storage devices .
- communication between clients 16 and entry point node 12 can occur via a direct hardwired connection (e.g. , serial port) , or via an addressable connection in a client-server (or server-server) environment (as shown) which may utilize any combination of wireline and/or wireless transmission methods.
- the server and client may be connected via the Internet, a wide area network (WAN) , a local area network (LAN) , a virtual private network (VPN) or other private network.
- the server and client may utilize conventional network connectivity, such as Token Ring, Ethernet, WiFi or other conventional communications standards.
- connectivity could be provided by conventional TCP/IP sockets-based protocol.
- management system 30 includes analyzer system 32 and planning system 34, which itself includes corrective action system 36 and learning system 38. As indicated above, analyzer system 32 will continuously monitor the performances of system resources 14. Based on the management policy, analyzer system 32 will determine when a particular system resource (e.g., network, server 26, or storage unit 28) is approaching an overload condition. If an overload condition is being approached (as dictated by thresholds or rules in the management policy) , analyzer system 32 will reference storage system 40 to determine what corrective actions were previously performed, and whether they were successful. Analyzer system 32 will then communicate this information to planning system 34.
- a particular system resource e.g., network, server 26, or storage unit 28
- corrective action system 36 Upon receipt, corrective action system 36 will identify and implement appropriate corrective actions based on what system resource 14 is approaching an overload condition, and the management policy. Specifically, the management policy contains additional rules that dictate what corrective actions should be implemented to remedy specific overload conditions. Thus, for example, if network 24 is approaching an overload condition, the management policy could dictate that the queue priority of requests 20 should be lowered. As indicated above, if changing the queue priority does not work, other corrective actions such as excluding requests 20 all together could be implemented. Still yet, corrective action could be implemented based of the consumption of resources per request type. This is so that, for example, if requests 20 and requests 22 are both received by server 26, corrective action system 36 could limit either requests 20 or requests 22 based on which type consumes the most resources .
- corrective action system 36 could cease implementing the corrective action if the performance of the overloaded system resource (i.e., as continuously monitored by analyzer system 32) returns to a "normal" level.
- learning system 38 will dynamically change the management policy to reflect the performance history thereof . This allows ineffective corrective actions to be removed from the management policy to prevent making futile efforts in the future, and increase the efficiency of the system accordingly.
- a flow diagram of method 100 according to the present invention is shown.
- Request traffic is received in step 102.
- step 104 the performance of a set of system resources is monitored in response to the request traffic. Based on the management policy, it is determined when at least one of the system resources is approaching an overload condition in step 106. Then, a corrective action to avoid the overload condition is identified and implemented in step 108. As indicated above, the corrective action is identified based on the particular system resource that is approaching overload condition, and the management policy.
- the present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computer/server system(s) - or other apparatus adapted for carrying out the methods described herein - is suited.
- a typical combination of hardware and software could be a general purpose computer system with a computer program that, when loaded and executed, controls entry point node 12 such that it carries out the respective methods described herein.
- a specific use computer containing specialized hardware for carrying out one or more of the functional tasks of the invention, could be utilized.
- the present invention can also be embedded in a computer program product, which comprises all the respective features enabling the implementation of the methods described herein, and which - when loaded in a computer system - is able to carry out these methods.
- Computer program, software program, program, or software in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.
- learning system 38 has been shown as part of planning system 34, it could actually be implemented as a separate system.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2004558197A JP4452185B2 (ja) | 2002-12-10 | 2003-11-13 | 管理ポリシーに基づいた要求トラフィックのリソース認識管理 |
| AU2003286240A AU2003286240A1 (en) | 2002-12-10 | 2003-11-13 | Resource-aware management of request traffic based on a management policy |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/315,339 US7986625B2 (en) | 2002-12-10 | 2002-12-10 | Resource-aware system, method and program product for managing request traffic based on a management policy |
| US10/315,339 | 2002-12-10 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2004053693A2 true WO2004053693A2 (en) | 2004-06-24 |
| WO2004053693A3 WO2004053693A3 (en) | 2004-09-16 |
Family
ID=32468670
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/GB2003/004920 Ceased WO2004053693A2 (en) | 2002-12-10 | 2003-11-13 | Resource-aware management of request traffic based on a management policy |
Country Status (5)
| Country | Link |
|---|---|
| US (3) | US7986625B2 (https=) |
| JP (1) | JP4452185B2 (https=) |
| CN (1) | CN100478891C (https=) |
| AU (1) | AU2003286240A1 (https=) |
| WO (1) | WO2004053693A2 (https=) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100444676C (zh) * | 2005-06-03 | 2008-12-17 | 中兴通讯股份有限公司 | 系统资源的监视任务的管理方法 |
Families Citing this family (51)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8392586B2 (en) * | 2001-05-15 | 2013-03-05 | Hewlett-Packard Development Company, L.P. | Method and apparatus to manage transactions at a network storage device |
| US7986625B2 (en) * | 2002-12-10 | 2011-07-26 | International Business Machines Corporation | Resource-aware system, method and program product for managing request traffic based on a management policy |
| US7216169B2 (en) * | 2003-07-01 | 2007-05-08 | Microsoft Corporation | Method and system for administering personal computer health by registering multiple service providers and enforcing mutual exclusion rules |
| US7783740B2 (en) * | 2003-09-25 | 2010-08-24 | Rockwell Automation Technologies, Inc. | Embedded network traffic analyzer |
| KR100544900B1 (ko) * | 2003-10-09 | 2006-01-24 | 한국전자통신연구원 | 네트워크 교정 보안 방법 |
| US7409447B1 (en) | 2003-11-20 | 2008-08-05 | Juniper Networks, Inc. | Policy analyzer |
| US7734561B2 (en) * | 2003-12-15 | 2010-06-08 | International Business Machines Corporation | System and method for providing autonomic management of a networked system using an action-centric approach |
| US8046763B1 (en) * | 2004-02-20 | 2011-10-25 | Oracle America, Inc. | Regulation of resource requests to control rate of resource consumption |
| US7624396B1 (en) * | 2004-02-26 | 2009-11-24 | Sun Microsystems, Inc. | Retrieving events from a queue |
| US7822837B1 (en) * | 2004-12-30 | 2010-10-26 | Packeteer, Inc. | Adaptive correlation of service level agreement and network application performance |
| US7453817B1 (en) * | 2005-02-01 | 2008-11-18 | Sprint Communications Company L.P. | Central traffic correlation system |
| US8078740B2 (en) | 2005-06-03 | 2011-12-13 | Microsoft Corporation | Running internet applications with low rights |
| US8245270B2 (en) * | 2005-09-01 | 2012-08-14 | Microsoft Corporation | Resource based dynamic security authorization |
| US8676974B2 (en) * | 2005-09-29 | 2014-03-18 | International Business Machines Corporation | Quality of service (QoS) based planning in web services aggregation |
| US8892737B2 (en) * | 2006-03-06 | 2014-11-18 | Vmware, Inc. | Network sniffer for performing service level management |
| US10225788B2 (en) | 2006-05-25 | 2019-03-05 | Truconnect Technologies, Llc | Method and system for selecting a wireless network for offloading |
| US9148843B2 (en) * | 2006-05-25 | 2015-09-29 | Wefi Inc. | Method and system for selecting a wireless network for offloading |
| US8185737B2 (en) | 2006-06-23 | 2012-05-22 | Microsoft Corporation | Communication across domains |
| US20080138063A1 (en) * | 2006-12-11 | 2008-06-12 | Youichi Akasaka | System and Method for Protecting an Optical Network |
| US8243597B2 (en) * | 2007-03-01 | 2012-08-14 | International Business Machines Corporation | Application layer synchronous traffic shaping |
| US9274847B2 (en) * | 2007-05-04 | 2016-03-01 | Microsoft Technology Licensing, Llc | Resource management platform |
| US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
| US9306812B2 (en) * | 2007-07-05 | 2016-04-05 | Rpx Clearinghouse Llc | System and method for providing network application performance management in a network |
| JP4834622B2 (ja) * | 2007-07-23 | 2011-12-14 | 株式会社日立製作所 | ビジネスプロセス運用管理システム、方法、プロセス運用管理装置およびそのプログラム |
| US9049123B2 (en) * | 2008-01-08 | 2015-06-02 | International Business Machines Corporation | Determining policy follow-up action based on user-specified codes |
| US20090238077A1 (en) * | 2008-03-19 | 2009-09-24 | Paritosh Bajpay | Method and apparatus for providing automated processing of a virtual connection alarm |
| JP5035469B2 (ja) * | 2009-03-31 | 2012-09-26 | 富士通株式会社 | データ転送回路及びデータ転送方法 |
| US20110196957A1 (en) * | 2010-02-05 | 2011-08-11 | International Business Machines Corporation | Real-Time Policy Visualization by Configuration Item to Demonstrate Real-Time and Historical Interaction of Policies |
| US8417817B1 (en) * | 2010-09-15 | 2013-04-09 | Google Inc. | Preventing server overload |
| US8549579B2 (en) * | 2011-07-06 | 2013-10-01 | International Business Machines Corporation | Dynamic data-protection policies within a request-reply message queuing environment |
| US8909696B1 (en) * | 2011-11-02 | 2014-12-09 | Google Inc. | Redundant data requests with redundant response cancellation |
| US20140207671A1 (en) | 2012-08-08 | 2014-07-24 | Yedream Tps Co., Ltd. | Customer relationship management using mobile device and method therefor |
| KR101395327B1 (ko) * | 2012-08-08 | 2014-05-16 | 에스케이텔레콤 주식회사 | 적응적 비실시간 트래픽 제어 방법과 그를 위한 단말기 |
| KR101973505B1 (ko) * | 2012-08-28 | 2019-04-29 | 에스케이텔레콤 주식회사 | 적응적 비실시간 트래픽 과금 방법과 그를 위한 정책 제공 장치, 단말기 |
| KR101970617B1 (ko) * | 2012-08-28 | 2019-08-13 | 에스케이 텔레콤주식회사 | 과금 식별 정보를 이용한 트래픽 과금 방법과 그를 위한 단말기, 컨텐츠 제공 장치 및 과금 처리 장치 |
| JP6024296B2 (ja) * | 2012-08-30 | 2016-11-16 | 富士通株式会社 | 情報処理装置、コピー制御プログラム、およびコピー制御方法 |
| KR101691213B1 (ko) * | 2012-09-19 | 2016-12-30 | 에스케이 텔레콤주식회사 | 임계값을 이용한 트래픽 제어 방법과 그를 위한 단말기 |
| KR101691214B1 (ko) * | 2012-09-21 | 2016-12-30 | 에스케이 텔레콤주식회사 | 이동성을 이용한 트래픽 제어 방법과 그를 위한 단말기 |
| KR102054755B1 (ko) * | 2013-01-08 | 2020-01-22 | 에스케이 텔레콤주식회사 | 적응적 비실시간 트래픽 제어방법과 이를 위한 단말기 및 장치 |
| US9444889B1 (en) | 2013-02-08 | 2016-09-13 | Quantcast Corporation | Managing distributed system performance using accelerated data retrieval operations |
| US9686121B2 (en) * | 2013-09-23 | 2017-06-20 | Amazon Technologies, Inc. | Client-premise resource control via provider-defined interfaces |
| US9647904B2 (en) * | 2013-11-25 | 2017-05-09 | Amazon Technologies, Inc. | Customer-directed networking limits in distributed systems |
| US9367384B2 (en) | 2014-06-12 | 2016-06-14 | International Business Machines Corporation | Admission control based on the end-to-end availability |
| US9264320B1 (en) * | 2014-06-17 | 2016-02-16 | Ca, Inc. | Efficient network monitoring |
| US10484257B1 (en) | 2015-07-15 | 2019-11-19 | Amazon Technologies, Inc. | Network event automatic remediation service |
| US9733834B1 (en) * | 2016-01-28 | 2017-08-15 | Weka.IO Ltd. | Congestion mitigation in a distributed storage system |
| CN107861420A (zh) * | 2017-11-01 | 2018-03-30 | 张玉岩 | 一种土地资源信息一体化管理系统 |
| US20210318926A1 (en) * | 2018-11-07 | 2021-10-14 | Hewlett-Packard Development Company, L.P. | Identifying corrective actions based on telemetry data |
| US11099891B2 (en) | 2019-04-22 | 2021-08-24 | International Business Machines Corporation | Scheduling requests based on resource information |
| US11973842B2 (en) * | 2022-02-11 | 2024-04-30 | International Business Machines Corporation | Service status prediction based transaction failure avoidance |
| TWI869770B (zh) * | 2023-02-08 | 2025-01-11 | 臺灣中小企業銀行股份有限公司 | 於發送效能過低時調整通知訊息發送順序之裝置及方法 |
Family Cites Families (48)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5008882A (en) * | 1987-08-17 | 1991-04-16 | California Institute Of Technology | Method and apparatus for eliminating unsuccessful tries in a search tree |
| JP2515823B2 (ja) | 1987-10-12 | 1996-07-10 | 積水化学工業株式会社 | 管内ライニング後の枝管開口位置の削孔方法及び削孔装置 |
| CA1318409C (en) | 1988-10-27 | 1993-05-25 | Dennis L. Debruler | Multiprocessor load sharing arrangement |
| US5031089A (en) | 1988-12-30 | 1991-07-09 | United States Of America As Represented By The Administrator, National Aeronautics And Space Administration | Dynamic resource allocation scheme for distributed heterogeneous computer systems |
| US5265257A (en) * | 1990-06-22 | 1993-11-23 | Digital Equipment Corporation | Fast arbiter having easy scaling for large numbers of requesters, large numbers of resource types with multiple instances of each type, and selectable queuing disciplines |
| JPH05216842A (ja) | 1992-02-05 | 1993-08-27 | Mitsubishi Electric Corp | 資源管理装置 |
| US5426736A (en) | 1993-05-26 | 1995-06-20 | Digital Equipment Corporation | Method and apparatus for processing input/output commands in a storage system having a command queue |
| US5440741A (en) * | 1993-09-20 | 1995-08-08 | Motorola, Inc. | Software overload control method |
| JP2774238B2 (ja) | 1993-11-30 | 1998-07-09 | 日本電信電話株式会社 | コンピュータシステムの負荷均衡化方式 |
| US5446874A (en) | 1993-12-23 | 1995-08-29 | International Business Machines Corp. | Automated benchmarking with self customization |
| US5974457A (en) | 1993-12-23 | 1999-10-26 | International Business Machines Corporation | Intelligent realtime monitoring of data traffic |
| US5936939A (en) | 1995-05-22 | 1999-08-10 | Fore Systems, Inc. | Digital network including early packet discard mechanism with adjustable threshold |
| US5878224A (en) * | 1996-05-24 | 1999-03-02 | Bell Communications Research, Inc. | System for preventing server overload by adaptively modifying gap interval that is used by source to limit number of transactions transmitted by source to server |
| US5938749A (en) | 1996-06-03 | 1999-08-17 | Whittaker Communications Inc. | Queue measurement apparatus and methodology |
| US6141323A (en) | 1996-06-03 | 2000-10-31 | Whittaker Corporation | Closed loop congestion control using a queue measurement system |
| US6961341B1 (en) * | 1996-07-02 | 2005-11-01 | Microsoft Corporation | Adaptive bandwidth throttling for network services |
| JP3779039B2 (ja) | 1996-07-30 | 2006-05-24 | 日本電信電話株式会社 | コンピュータシステムの負荷均衡化方法及び装置 |
| KR100216368B1 (ko) | 1997-06-11 | 1999-08-16 | 윤종용 | Atm 스위치에서 셀 손실율 개선을 위한 역방향압력 신호를 이용한 입력 버퍼 제어기 장치 및 논리버퍼 크기 결정알고리즘 |
| US6230152B1 (en) | 1997-10-16 | 2001-05-08 | Lucent Technologies Inc | Fuzzy controller for loop management operating system |
| US5943232A (en) | 1997-10-29 | 1999-08-24 | Lucent Technologies Inc. | Autonomous overload control for distributed real time systems |
| US6237059B1 (en) | 1997-11-26 | 2001-05-22 | Compaq Computer Corporation | Method for estimating statistics of properties of memory system interactions among contexts in a computer system |
| US6442139B1 (en) | 1998-01-29 | 2002-08-27 | At&T | Adaptive rate control based on estimation of message queuing delay |
| US6097597A (en) | 1998-06-30 | 2000-08-01 | Mitsubishi Denki Kabushiki Kaisha | Thermo-siphon and manufacturing method of thermo-siphon and information processing apparatus |
| US6333917B1 (en) | 1998-08-19 | 2001-12-25 | Nortel Networks Limited | Method and apparatus for red (random early detection) and enhancements. |
| US6182136B1 (en) * | 1998-09-08 | 2001-01-30 | Hewlett-Packard Company | Automated service elements discovery using core service specific discovery templates |
| US6438652B1 (en) * | 1998-10-09 | 2002-08-20 | International Business Machines Corporation | Load balancing cooperating cache servers by shifting forwarded request |
| US6665701B1 (en) * | 1999-08-03 | 2003-12-16 | Worldcom, Inc. | Method and system for contention controlled data exchange in a distributed network-based resource allocation |
| US6671724B1 (en) * | 2000-03-21 | 2003-12-30 | Centrisoft Corporation | Software, systems and methods for managing a distributed network |
| US6985937B1 (en) * | 2000-05-11 | 2006-01-10 | Ensim Corporation | Dynamically modifying the resources of a virtual server |
| US6816907B1 (en) * | 2000-08-24 | 2004-11-09 | International Business Machines Corporation | System and method for providing differentiated services on the web |
| US7180857B2 (en) * | 2000-11-24 | 2007-02-20 | Matsushita Electric Industrial Co., Ltd | Apparatus and method for flow control |
| JP3934915B2 (ja) | 2000-11-24 | 2007-06-20 | 松下電器産業株式会社 | フロー制御装置及び方法 |
| US7003772B2 (en) | 2000-12-04 | 2006-02-21 | International Business Machines Corporation | Policy management for distributed computing and a method for aging statistics |
| US20020124085A1 (en) * | 2000-12-28 | 2002-09-05 | Fujitsu Limited | Method of simulating operation of logical unit, and computer-readable recording medium retaining program for simulating operation of logical unit |
| JP2002351852A (ja) | 2001-05-28 | 2002-12-06 | Mitsubishi Electric Corp | システム運用管理方式 |
| GB2372172B (en) * | 2001-05-31 | 2002-12-24 | Ericsson Telefon Ab L M | Congestion handling in a packet data network |
| US7774492B2 (en) * | 2001-07-26 | 2010-08-10 | Citrix Systems, Inc. | System, method and computer program product to maximize server throughput while avoiding server overload by controlling the rate of establishing server-side net work connections |
| US20030097443A1 (en) * | 2001-11-21 | 2003-05-22 | Richard Gillett | Systems and methods for delivering content over a network |
| DE60112817D1 (de) * | 2001-11-23 | 2005-09-22 | Nokia Corp | Verfahren und system zum behandeln von netzwerkstau |
| US6882850B2 (en) * | 2001-12-03 | 2005-04-19 | Sprint Spectrum L.P. | Method and system for zone-based capacity control |
| US7006439B2 (en) * | 2002-04-24 | 2006-02-28 | Freescale Semiconductor, Inc. | Method and apparatus for determining an upper data rate for a variable data rate signal |
| US8009607B2 (en) * | 2002-04-24 | 2011-08-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for uplink transmission timing in a mobile communications system |
| US6985439B2 (en) * | 2002-10-25 | 2006-01-10 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method for wireless network admission control based on quality of service |
| US7353538B2 (en) * | 2002-11-08 | 2008-04-01 | Federal Network Systems Llc | Server resource management, analysis, and intrusion negation |
| US7986625B2 (en) * | 2002-12-10 | 2011-07-26 | International Business Machines Corporation | Resource-aware system, method and program product for managing request traffic based on a management policy |
| US7243351B2 (en) * | 2002-12-17 | 2007-07-10 | International Business Machines Corporation | System and method for task scheduling based upon the classification value and probability |
| US7489928B2 (en) * | 2002-12-31 | 2009-02-10 | Smith Brian K | Adaptive RF link failure handler |
| US7602725B2 (en) * | 2003-07-11 | 2009-10-13 | Computer Associates Think, Inc. | System and method for aggregating real-time and historical data |
-
2002
- 2002-12-10 US US10/315,339 patent/US7986625B2/en not_active Expired - Fee Related
-
2003
- 2003-11-13 CN CNB2003801055181A patent/CN100478891C/zh not_active Expired - Lifetime
- 2003-11-13 AU AU2003286240A patent/AU2003286240A1/en not_active Abandoned
- 2003-11-13 JP JP2004558197A patent/JP4452185B2/ja not_active Expired - Fee Related
- 2003-11-13 WO PCT/GB2003/004920 patent/WO2004053693A2/en not_active Ceased
-
2011
- 2011-05-23 US US13/113,882 patent/US8873390B2/en not_active Expired - Fee Related
-
2014
- 2014-10-08 US US14/509,333 patent/US9755989B2/en not_active Expired - Fee Related
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100444676C (zh) * | 2005-06-03 | 2008-12-17 | 中兴通讯股份有限公司 | 系统资源的监视任务的管理方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1742261A (zh) | 2006-03-01 |
| AU2003286240A1 (en) | 2004-06-30 |
| CN100478891C (zh) | 2009-04-15 |
| US20040109410A1 (en) | 2004-06-10 |
| US20110225294A1 (en) | 2011-09-15 |
| WO2004053693A3 (en) | 2004-09-16 |
| US8873390B2 (en) | 2014-10-28 |
| US7986625B2 (en) | 2011-07-26 |
| JP4452185B2 (ja) | 2010-04-21 |
| US20150026350A1 (en) | 2015-01-22 |
| JP2006520937A (ja) | 2006-09-14 |
| US9755989B2 (en) | 2017-09-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7986625B2 (en) | Resource-aware system, method and program product for managing request traffic based on a management policy | |
| US20220353271A1 (en) | Dynamic user access control management | |
| US6832255B1 (en) | Access control method and apparatus | |
| US8832063B1 (en) | Dynamic request throttling | |
| US8958295B2 (en) | Adaptive edge-implemented traffic policy in a data processing network | |
| US7441046B2 (en) | System enabling server progressive workload reduction to support server maintenance | |
| US7290028B2 (en) | Methods, systems and computer program products for providing transactional quality of service | |
| US7174557B2 (en) | Method and apparatus for event distribution and event handling in an enterprise | |
| CN101297272B (zh) | 用于资源的虚拟化健康监控的方法和系统 | |
| US8429130B2 (en) | Optimized prefetching for wide area networks | |
| JP5173388B2 (ja) | 情報処理装置および情報処理方法 | |
| EP3128420A1 (en) | Service flow control method, controller and system in object-based storage system | |
| US8627327B2 (en) | Thread classification suspension | |
| GB2391419A (en) | Restricting the propagation of a virus within a network | |
| US20220329511A1 (en) | Systems and Methods for Restricting the Routing Scope of an Anycast Service | |
| US9563482B2 (en) | Method for imposing policy modification constraints | |
| US20030217134A1 (en) | Rule-based method and system for managing heterogenous computer clusters | |
| US20080313339A1 (en) | Connection management method, system, and program product | |
| AU2003293360A1 (en) | System and method for managing resource sharing between computer nodes of a network | |
| US7426551B1 (en) | System, method and computer program product for dynamic system adaptation using contracts | |
| JP2002091910A (ja) | ユーザの行動及び予測に基づいて要求を分類するWebサーバ要求分類システム | |
| US20060235957A1 (en) | Connection management method, system, and program product | |
| CN117608785A (zh) | 任务处理方法、装置、电子设备、介质和程序产品 | |
| US20250370817A1 (en) | Adaptive network resource allocation using application prioritization and deprioritization | |
| AU754580B2 (en) | Access control method and apparatus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2004558197 Country of ref document: JP Ref document number: 20038A55181 Country of ref document: CN |
|
| 122 | Ep: pct application non-entry in european phase |