Patents by Inventor Dan Pei
Dan Pei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10075356Abstract: Example methods disclosed herein to prioritize anomalies in a communication network include classifying respective nodes in the communication network as normal, abnormal or indeterminate based on measurements received for the nodes. Disclosed example methods also include selecting a subset of the nodes classified as abnormal to be root cause abnormal nodes representing sources of the anomalies in the communication network, respective ones of the root cause abnormal nodes being abnormal nodes identified in the communication network and determined to have respective sets of direct descendent nodes having majorities of nodes classified as abnormal or indeterminate. Disclosed example methods further include combining respective anomaly sizes and anomaly scopes determined for the respective ones of root cause abnormal nodes based on the measurements to determine respective rankings for the root cause abnormal nodes, and outputting the respective rankings to prioritize the set of root cause abnormal nodes.Type: GrantFiled: January 29, 2016Date of Patent: September 11, 2018Assignee: AT&T Intellectual Property I, L.P.Inventors: Dan Pei, Ashley Flavel, Zihui Ge, Alexandre Gerber, Hiren Shah, He Yan
-
Publication number: 20160149783Abstract: Example methods disclosed herein to prioritize anomalies in a communication network include classifying respective nodes in the communication network as normal, abnormal or indeterminate based on measurements received for the nodes. Disclosed example methods also include selecting a subset of the nodes classified as abnormal to be root cause abnormal nodes representing sources of the anomalies in the communication network, respective ones of the root cause abnormal nodes being abnormal nodes identified in the communication network and determined to have respective sets of direct descendent nodes having majorities of nodes classified as abnormal or indeterminate. Disclosed example methods further include combining respective anomaly sizes and anomaly scopes determined for the respective ones of root cause abnormal nodes based on the measurements to determine respective rankings for the root cause abnormal nodes, and outputting the respective rankings to prioritize the set of root cause abnormal nodes.Type: ApplicationFiled: January 29, 2016Publication date: May 26, 2016Inventors: Dan Pei, Ashley Flavel, Zihui Ge, Alexandre Gerber, Hiren Shah, He Yan
-
Patent number: 9338177Abstract: A method of placing prefix hijacking detection modules in a communications network includes selecting a set of candidate locations. For each candidate location, a detection coverage ratio with respect to a target Autonomous System is calculated. Based on the relative size of the coverage ratios, proposed locations for the prefix hijacking detection modules are determined.Type: GrantFiled: May 14, 2013Date of Patent: May 10, 2016Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Lusheng Ji, Dan Pei, Tongquing Qiu, Jia Wang
-
Patent number: 9264331Abstract: Example methods disclosed herein to localize anomalies in a communication network include identifying a first set of abnormal nodes in the communication network, and including respective ones of the first set of abnormal nodes having a number of normal direct descendent nodes that is less than a combined number of abnormal direct descendent nodes and indeterminate direct descendent nodes in a set of candidate nodes. Such disclosed example methods also include iteratively selecting ones of the set of candidate nodes to include in a set of root cause abnormal nodes representing sources of the anomalies in the communication network. In such disclosed example methods, the ones of the set of candidate nodes are selected based on sizes of respective subsets of the abnormal nodes from the first set of abnormal nodes covered by the candidate nodes.Type: GrantFiled: December 5, 2014Date of Patent: February 16, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Dan Pei, Ashley Flavel, Zihui Ge, Alexandre Gerber, Hiren Shah, He Yan
-
Publication number: 20150085675Abstract: Example methods disclosed herein to localize anomalies in a communication network include identifying a first set of abnormal nodes in the communication network, and including respective ones of the first set of abnormal nodes having a number of normal direct descendent nodes that is less than a combined number of abnormal direct descendent nodes and indeterminate direct descendent nodes in a set of candidate nodes. Such disclosed example methods also include iteratively selecting ones of the set of candidate nodes to include in a set of root cause abnormal nodes representing sources of the anomalies in the communication network. In such disclosed example methods, the ones of the set of candidate nodes are selected based on sizes of respective subsets of the abnormal nodes from the first set of abnormal nodes covered by the candidate nodes.Type: ApplicationFiled: December 5, 2014Publication date: March 26, 2015Inventors: Dan Pei, Ashley Flavel, Zihui Ge, Alexandre Gerber, Hiren Shah, He Yan
-
Patent number: 8984116Abstract: A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.Type: GrantFiled: April 23, 2013Date of Patent: March 17, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Zihui Ge, Ashley Flavel, Alexandre Gerber, Dan Pei, Hiren Shah, He Yan, Jennifer Yates
-
Patent number: 8955117Abstract: Method, system and computer-readable device to locate a prefix hijacker of a destination prefix within a one-hop neighborhood. The method includes generating one-hop neighborhoods from autonomous system-level paths associated with a plurality of monitors to a destination prefix. The method also includes determining a suspect set of autonomous system identifiers resulting from a union of the one-hop neighborhoods. The method further includes calculating a count and a distance associated with each autonomous system identifier in the suspect set of autonomous system identifiers. The count represents how often an autonomous system identifier appears in the one-hop neighborhoods. The distance represents a total number of autonomous system identifiers from the autonomous system identifier to autonomous system identifiers associated with the plurality of monitors.Type: GrantFiled: November 15, 2012Date of Patent: February 10, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Dan Pei, Jia Wang, Tongqing Qiu
-
Patent number: 8934352Abstract: Methods, apparatus and articles of manufacture for hierarchical anomaly localization and prioritization are disclosed. An example method disclosed herein comprises obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate, and determining a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node.Type: GrantFiled: August 30, 2011Date of Patent: January 13, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Dan Pei, Ashley Flavel, Zihui Ge, Alexandre Gerber, Hiren Shah, He Yan
-
Patent number: 8769662Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS.Type: GrantFiled: October 22, 2012Date of Patent: July 1, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Dan Pei, Jia Wang
-
Patent number: 8761029Abstract: Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.Type: GrantFiled: March 6, 2013Date of Patent: June 24, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Zihui Ge, Dan Pei, Jennifer Yates, He Yan
-
Patent number: 8671197Abstract: A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.Type: GrantFiled: October 12, 2012Date of Patent: March 11, 2014Assignee: AT&T Intellectual Property II, L.P.Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman
-
Publication number: 20130282896Abstract: A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.Type: ApplicationFiled: April 23, 2013Publication date: October 24, 2013Inventors: Zihui Ge, Ashley Flavel, Alexandre Gerber, Dan Pei, Hiren Shah, He Yan, Jennifer Yates
-
Publication number: 20130254887Abstract: A method of placing prefix hijacking detection modules in a communications network includes selecting a set of candidate locations. For each candidate location, a detection coverage ratio with respect to a target Autonomous System is calculated. Based on the relative size of the coverage ratios, proposed locations for the prefix hijacking detection modules are determined.Type: ApplicationFiled: May 14, 2013Publication date: September 26, 2013Applicant: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Dan Pei, Tongquing Qiu, Jia Wang
-
Patent number: 8521904Abstract: Certain exemplary embodiments can provide a method, which can comprise, based upon a quantified completeness of a determined topology of an interconnected set of Autonomous Systems of the Internet, at a user interface of an information device, automatically rendering a determined identity of a customer to which telecommunications products will be offered.Type: GrantFiled: December 16, 2008Date of Patent: August 27, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Dan Pei, Lixia Zhang, Ricardo Oliveira, Walter Willinger, Beichuan Zhang
-
Patent number: 8452871Abstract: A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.Type: GrantFiled: August 27, 2011Date of Patent: May 28, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Zihui Ge, Ashley Flavel, Alexandre Gerber, Dan Pei, Hiren Shah, He Yan, Jennifer Yates
-
Patent number: 8443076Abstract: A method of placing prefix hijacking detection modules in a communications network includes selecting a set of candidate locations. For each candidate location, a detection coverage ratio with respect to a target Autonomous System is calculated. Based on the relative size of the coverage ratios, proposed locations for the prefix hijacking detection modules are determined.Type: GrantFiled: December 17, 2009Date of Patent: May 14, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Dan Pei, Tonqing Qiu, Jia Wang
-
Patent number: 8411577Abstract: Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.Type: GrantFiled: March 19, 2010Date of Patent: April 2, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Zihui Ge, Dan Pei, Jennifer Yates, He Yan
-
Publication number: 20130051248Abstract: Methods, apparatus and articles of manufacture for hierarchical anomaly localization and prioritization are disclosed. An example method disclosed herein comprises obtaining reported status for a plurality of nodes of a hierarchical topology, the reported status for a particular node being at least one of normal, abnormal or indeterminate, and determining a subset of root cause abnormal nodes, a root cause abnormal node included in the subset of root cause abnormal nodes having a total number of abnormal direct descendent nodes and indeterminate direct descendent nodes that is greater than a number of normal direct descendent nodes of the root cause abnormal node.Type: ApplicationFiled: August 30, 2011Publication date: February 28, 2013Inventors: Dan Pei, Ashley Flavel, Zihui Ge, Alexandre Gerber, Hiren Shah, He Yan
-
Publication number: 20130054783Abstract: A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm.Type: ApplicationFiled: August 27, 2011Publication date: February 28, 2013Inventors: Zihui Ge, Ashley Flavel, Alexandre Gerber, Dan Pei, Hiren Shah, He Yan, Jennifer Yates
-
Publication number: 20130042009Abstract: A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.Type: ApplicationFiled: October 12, 2012Publication date: February 14, 2013Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Alexandre Gerber, Oliver Spatscheck, Dan Pei, Mohammad Taghi Hajiaghayi, Jeffrey Erman