`
`www.archive.org
`
`415.561.6767
`
`415.840-0391 e-fax
`
`
`
`Internet Archive
`
`300 Funston Avenue
`
`
`
`
`
`AFFIDAVIT OF CHRISTOPHER BUTLER
`
`
`
`
`
`1. I am the Office Manager at the Internet Archive, located in San Francisco,
`California. I make this declaration of my own personal knowledge.
`
`2. The Internet Archive is a website that provides access to a digital library of Internet
`sites and other cultural artifacts in digital form. Like a paper library, we provide free
`access to researchers, historians, scholars, and the general public. The Internet
`Archive has partnered with and receives support from various institutions, including
`the Library of Congress.
`
`3. The Internet Archive has created a service known as the Wayback Machine. The
`Wayback Machine makes it possible to browse more than 450 billion pages stored
`in the Internet Archive's web archive. Visitors to the Wayback Machine can search
`archives by URL (i.e., a website address). If archived records for a URL are
`available, the visitor will be presented with a display of available dates. The visitor
`may select one of those dates, and begin browsing an archived version of the Web.
`Links on archived files in the Wayback Machine point to other archived files
`(whether HTML pages or other file types), if any are found for the URL indicated
`by a given link. For instance, the Wayback Machine is designed such that when a
`visitor clicks on a hyperlink on an archived page that points to another URL, the
`visitor will be served the archived file found for the hyperlink’s URL with the
`closest available date to the initial file containing the hyperlink.
`
`4. The archived data made viewable and browseable by the Wayback Machine is
`obtained by use of web archiving software that automatically stores copies of files
`available via the Internet, each file preserved as it existed at a particular point in
`time.
`
`5. The Internet Archive assigns a URL on its site to the archived files in the format
`http://web.archive.org/web/[Year in yyyy][Month in mm][Day in dd][Time code in
`hh:mm:ss]/[Archived URL] aka an “extended URL”. Thus, the extended URL
`http://web.archive.org/web/19970126045828/http://www.archive.org/ would be the
`URL for the record of the Internet Archive home page HTML file
`(http://www.archive.org/) archived on January 26, 1997 at 4:58 a.m. and 28 seconds
`(1997/01/26 at 04:58:28). A web browser may be set such that a printout from it
`will display the URL of a web page in the printout’s footer. The date indicated by
`an extended URL applies to a preserved instance of a file for a given URL, but not
`necessarily to any other files linked therein. Thus, in the case of a page constituted
`by a primary HTML file and other separate files (e.g., files with images, audio,
`multimedia, design elements, or other embedded content) linked within that primary
`HTML file, the primary HTML file and the other files will each have their own
`respective extended URLs and may not have been archived on the same dates.
`
`6. Attached hereto as Exhibit A are true and accurate copies of browser printouts of
`the Internet Archive's records of the archived files for the URLs and the dates
`
`
`
`
`
`
`
`
`San Francisco, CA 94118
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`specified in the footer of the printout or an attached coversheet (in the case of
`records for which a browser does not provide a ready option to print a URL in the
`footer, e.g., in the case of a PDF file).
`
`7. I declare under penalty of perjury that the foregoing is true and correct.
`
`
`
`
`DATE:______________
`
`
`
`
`
`
` _________________________
` Christopher Butler
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`01/24/2022
`
`
`
`
`
`
`Exhibit A
`Exhibit A
`
`
`
`https://web.archive.org/web/20030317051910/http:/packeteer.com/PDF_files/4steps.pdf
`
`
`
`Technical Product Overview
`
`
`
`
`
`Four Steps to Application Performance
`Across the Network
`
` With Packeteer’s PacketShaper®
`
`
`
`September 2002
`
`
`
`Packeteer, Inc.
`Cupertino, CA 95014
`408.873.4400
`info@packeteer.com
`www.packeteer.com
`
`
`
`
`
`
`
`Company and product names are trademarks or registered trademarks of their respective companies. Copyright 2002 Packeteer,
`Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, transmitted, or
`translated into another language without the express written consent of Packeteer, Inc.
`
`
`
`
`P/N 1600.B
`
`
`
`Table of Contents
`
`Four Steps to Application Performance ..........................................................................3
`
`What Is PacketShaper? .................................................................................................3
`
`Ease of Deployment and Use........................................................................................4
`
`A Four-Step Snapshot...................................................................................................4
`
`Step One: Classifying Network Traffic............................................................................5
`
`Applications and Protocols — Automatically ..............................................................5
`
`Classification, a Step Above.........................................................................................6
`
`Common Classification Approaches ............................................................................8
`
`Step Two: Analyzing Traffic.............................................................................................9
`
`Utilization Analysis ......................................................................................................9
`
`Performance Analysis.................................................................................................14
`
`Raw Metrics................................................................................................................18
`
`Step Three: Controlling Traffic......................................................................................19
`
`Partitioning Bandwidth ...............................................................................................19
`
`Per-Session Rate Policies ...........................................................................................21
`
`Other Policies..............................................................................................................22
`
`Rate-Control Features.................................................................................................22
`
`Universal Translator ...................................................................................................24
`
`Detecting and Avoiding Attacks.................................................................................24
`
`Step Four: Generating Reports ......................................................................................24
`
`Following a Typical Investigation...................................................................................26
`
`Deployment — When and Where...................................................................................27
`
`Most Appropriate Situations.......................................................................................27
`
`Choosing a Deployment Strategy ...............................................................................28
`
`Feature Sets .........................................................................................................28
`
`Locations .............................................................................................................28
`
`Topology Pictures................................................................................................29
`
`Story of a Deployment Progression.....................................................................30
`
`Questions to Ponder ............................................................................................30
`
`For More Information .....................................................................................................30
`
`
`
`
`
`Packeteer, Inc.
`
`2
`
`
`
`
`
`Four Steps to Application Performance
`
`Sluggish mission-critical applications are bad for business. Unfortunately,
`non-critical or less urgent applications tend to dominate when applications
`battle for bandwidth on congested WAN access links. Large email
`attachments or high-capacity file transfers consume more than their share
`of bandwidth, while Oracle, SAP, Citrix, and other critical applications
`struggle. Do any of these problems sound familiar to you?
`(cid:120)(cid:3) A user downloads a large file and SAP performance lags.
`(cid:120)(cid:3) An employee synchronizes his laptop with the message server and clogs the branch office’s
`WAN link for 15 minutes.
`(cid:120)(cid:3) Music enthusiasts’ MP3 downloads cause more urgent, interactive applications to struggle.
`(cid:120)(cid:3)
`
`Intranet applications served from a central site offer employees easy access but poor
`performance.
`(cid:120)(cid:3) Repeated bandwidth upgrades fail to address performance problems but do increase costs
`substantially.
`
`Today’s enterprises require performance, predictability, and consistency from their networks and
`the applications that traverse them. And that’s precisely what PacketShaper® from Packeteer
`delivers.
`
`This paper describes a process to avoid problems like those described in the examples above and
`serves as a technical product overview for the PacketShaper product line. The paper is intended
`for system and network administrators in organizations that manage their own applications and
`network performance.
`
`What Is PacketShaper?
`
`In enterprise networks that are overwhelmed by increasing amounts of traffic, unmanaged
`congestion at WAN-access links and Internet links undermines application performance,
`resulting in impaired employee and company productivity. Network managers spend increasing
`portions of the budget on bandwidth upgrades in attempts to solve the performance problems,
`only to find that the problems persist.
`
`PacketShaper is the bandwidth-management solution that brings predictable, efficient
`performance to applications running over enterprise wide-area networks (WANs) and the
`Internet. It balances traffic’s demands, giving each type of traffic the bandwidth it needs to
`perform. PacketShaper protects critical traffic, paces bandwidth-greedy traffic, and prevents any
`single type of traffic from monopolizing resources. It provisions bandwidth to applications,
`sessions, branch offices, and/or users.
`
`PacketShaper’s four-step approach safeguards application performance and maximizes return on
`network capacity. It provides insight into and control over network usage. PacketShaper
`discovers and classifies applications, analyzes their performance, enforces policy-based
`bandwidth allocation, and generates reports on the results. With PacketShaper, you can control
`application performance to suit business priorities, make efficient use of a limited-capacity link,
`increase throughput, and protect critical applications.
`
`
`
`Packeteer, Inc.
`
`3
`
`
`
`
`
`Ease of Deployment and Use
`
`PacketShaper sits behind WAN-link routers and/or Internet-link routers at main sites and at
`branch offices. PacketShaper must be positioned so that it sees all traffic you intend it to manage.
`You can choose to deploy PacketShaper comprehensively throughout many or all offices, or you
`can start more slowly and follow a phased deployment strategy by starting with a main site first.
`Benefits vary with topology and deployment strategy. PacketShaper is available in a variety of
`models based on capacity and features. For more detail, see Deployment — When and Where
`later in this paper.
`
`PacketShaper installation is easy and consists of plugging in two cables and entering address and
`access information on a web-based setup page. PacketShaper integrates cleanly with existing
`network infrastructure, imposing no changes on router configuration, topologies, desktops, or
`servers. It also integrates smoothly with central, third-party management platforms and reporting
`tools such as HP OpenView®, HP Policy Xpert™, Micromuse NETCOOL™, InfoVista™,
`Microsoft Excel®, and others. In addition, Packeteer’s PolicyCenter™ provides the convenience
`of centralized management in large deployments, and Packeteer’s ReportCenter provides full-
`featured reports
`analyzing utilization and
`performance for
`multiple locations.
`
`A web-based user
`interface offers access to
`PacketShaper from any
`desktop with a web
`browser. A command-
`line interface offers fast,
`detailed control from a
`Telnet session. You
`choose the level of
`security required to
`examine and alter
`PacketShaper’s
`configuration and
`measurement data.
`
`A Four-Step Snapshot
`
`Each step in PacketShaper’s four-step bandwidth-management strategy is an integral part of
`managing application performance. The steps are introduced below and explained in more detail
`in the remainder of the paper.
`
`One: Classify Network Traffic
`
`It’s hard to protect an application if you can’t differentiate it from other types of
`traffic. PacketShaper detects and identifies thousands of types of traffic. You can
`isolate traffic associated with applications, protocols, subnets, web pages, users, and
`more.
`
`
`
`Packeteer, Inc.
`
`4
`
`
`
`
`
`Two: Analyze Behavior
`
`How is limited bandwidth consumed? Why do critical applications move so slowly?
`PacketShaper provides detailed analysis of network and application behavior. It
`tracks traffic levels, detects network trends, measures response time, and calculates
`network efficiency.
`
`Three: Control Performance
`
`Managing application performance is a matter of precisely allocating bandwidth
`according to business requirements and the needs of the applications themselves.
`PacketShaper enables the control of all types of traffic: steady rates for voice or
`video streams; immediate passage for small, delay-sensitive traffic such as Telnet;
`and a balance of consistent access and a bandwidth limit for applications such as
`Microsoft Exchange that are both bandwidth-hungry and critically important.
`
`Four: Report Results
`
`Comprehensive reports, graphs, and tables provide easy insight into historical
`performance, load, efficiency, and application-based service-level compliance.
`If performance is not suitable, control policies can be modified to bring
`response times within range and keep new traffic and applications from
`unintended impact. Reports offer proof that applications continue to perform as
`desired, even during network growth.
`
`
`Step One: Classifying Network Traffic
`
`Identifying and categorizing the types of network traffic that compete for limited bandwidth is
`the first step toward solving performance problems. Packeteer calls this process classification.
`Rich traffic classification is crucial — bandwidth controls are useful only if you can apply them
`to the precise traffic you have in mind. In addition, administrators are usually surprised to see the
`diversity of their network applications.
`
`You can classify traffic by application, protocol, port number, URL or
`wildcard, host name, LDAP host lists, Diffserv setting, MPLS labels, IP
`precedence bits, IP or MAC address, subnet, travel direction
`(inbound/outbound), source, destination, host speed range, Mime type, web
`browser, Oracle database, Citrix published application, Citrix ICA priority
`tagging, VLAN varieties, and more. PacketShaper builds a hierarchical
`traffic-classification tree, inserting an entry for every distinct traffic type it
`observes. Each traffic category is called a traffic class.
`
`While most products can differentiate traffic based on layers two through four of the standard
`OSI networking model, PacketShaper classifies traffic based on layers two through seven, telling
`you precisely which applications are in use.
`
`Applications and Protocols — Automatically
`Packeteer continually adds to the list of protocols and applications PacketShaper classifies
`automatically. A recent list includes the following services:
`
`
`
`Packeteer, Inc.
`
`5
`
`
`
`
`
`Client/Server
`CORBA
`CVS
`Folding@Home
`FIX (Finance)
`Java Rmt Mthd
`MATIP (Airline)
`MeetingMaker
`NetIQ AppMngr
`OpenConnect JCP
`SunRPC (dyn
`port)
`
`Content
`Delivery
`Backweb
`Chaincast
`EntryPoint
`Kontiki
`Marimba
`PointCast
`
`ERP
`Baan
`JavaClient
`JD Edwards
`Oracle (7,8,9i)
`SAP
`
`Internet
`ActiveX
`FTP, Passive FTP
`Gopher
`IP, IPIP, UDP, TCP
`IPv6
`IRC
`Mime type
`NNTP
`SSHTCP
`SSL
`TFTP
`UUCP
`URL
`Web browser
`
`Database
`FileMaker Pro
`MS SQL
`Oracle 7/8i
`Progress
`
`Directory
`Services
`CRS
`DHCP
`DNS
`DPA
`Finger
`Ident
`Kerberos
`LDAP
`RADIUS
`TACACS
`WINS
`whois
`
`E-mail,
`Collaboration
`Biff
`cc:MAIL
`IMAP
`LotusNotes MSSQ
`Microsoft DCOM
` (MS Exchange)
`Novell
` GroupWise
`POP3
`SMTP
`
`File Server
`AFS
`CVSup
`Lockd
`Microsoft-ds
`NetBIOS-IP
`NFS
`Novell
` NetWare5
`
`Games
`Asheron’s Call
`Battle.net
`Diablo II
`Doom
`EverQuest
`Kali
`Half-Life
`LucasArts (Jedi*)
`MSN Zone
`Mythic
`Quake I, II, & III
`SonyOnline
`Tribes I,II
`Unreal
`Warcraft III
`Yahoo! Games
`
`Host Access
`ATSTCP
`Attachmate
` SHARESUDP
`Persoft Persona
`SMTBF
`TN3270
`TN5250
`
`Legacy LAN
`and Non-IP
`AFP
`AppleTalk
`DECnet
`IPX
`FNA
`LAT
`NetBEUI
`MOP-DL/RC
`PPPoE
`SNA
`
`
`Thin Client or
`Server Based
`Citrix
` Published Apps
` and VideoFrame
`RDP/Terminal
` Server
`
`Voice over IP
`Clarent
`CUSeeMe
`Dialpad
`H.323
`I-Phone
`MCK Commun.
`Micom VIP
`Net2Phone
`RTP
`RTCP
`T.120
`VDOPhone
`
`
`
`Messaging
`AOL Instant Msging
`ICQ Chat
`MSN Messenger
`Yahoo! Messenger
`Internet Relay Chat
`
`Misc
`CiscoCTI
`Date-Time
`DICOM
`HL7
`NewsStand
`Time Server
`WebShots
`
`MultiMedia
`Multi-cast
` NetShow
`NetMeeting
`QuickTime
`RTP
`Real Audio
`Streamworks
`RTSP
`MPEG
`ST2
`SHOUTcast
`WebEx
`WindowsMedia
`
`
`Music P2P
`Aimster
`AudioGalaxy
`Blubster
`DirectConnect
`eDonkey
`FileRogue
`Gnutella
`Groove
`Hotline
`iMesh
`KaZaA
`Napster
`Scour
`Tripnosis
`
`Network
`Management
`Cisco Discovery
`ICMP by
` packet type
`Microsoft SMS
`NTP
`RSVP
`SNMP
`SYSLOG
`
`LPR
`IPP
`TN5250p
`TN3287
`
`Routing
`AURP
`BGP
`CBT
`DRP
`EGP
`EIGRP
`IGMP
`IGP
`MPLS (+tag, +app)
`OSPF
`PIM
`RARP
`RIP
`Spanning Tree
`VLAN (802.1p/q)
`
`Security
`Protocol
`DLS
`DPA
`GRE
`IPSEC
`ISAKMP/IKE
` key exchange
`L2TP
`PPTP
`SOCKS Proxy
`
`Session
`REXEC
`rlogin
`rsh
`Telnet
`Timbuktu
`VNC
`Xwindows
`
`New applications come along at quite a pace these days. Packeteer makes new application
`classification features available to customers between software releases with an easy plug-in
`feature. When the next obtrusive or critical application comes along, a small download enables
`your PacketShaper to automatically detect it.
`
`Classification, a Step Above
`
`The number of applications is growing, and many of them are extremely bandwidth intensive.
`Limited bandwidth and shrinking or flat-line budgets are placing a further strain on networks.
`The growing complexities associated with network traffic make sophisticated classification
`techniques a necessity. Simple IP-address or static-port schemes fall short. PacketShaper detects
`dynamic port assignments, tracks transactions with migrating port assignments, differentiates
`among different applications using the same port, and uses layer-seven indicators to identify
`applications.
`
`Web Classification
`
`Sometimes it seems that two-thirds of network traffic is web traffic — from web browsing to
`web-based clients for mission-critical applications to XML-based e-commerce. But not all web
`
`
`
`Packeteer, Inc.
`
`6
`
`
`
`
`
`traffic requires or deserves the same treatment. Web traffic can vary in urgency, sensitivity to
`latency, and performance requirements. PacketShaper can differentiate between different types
`of web traffic so that you can manage each with an appropriate strategy.
`
`For example, PacketShaper can use travel direction, server location, and/or URLs to distinguish
`employee browsing from your own (potentially profitable) customers’ shopping. It can separate
`critical HTTP XML from recreational HTTP MPEGs, preventing someone’s enthusiasm for
`Madonna or Metallica from interfering with e-business. Some very thin web-based clients, such
`as Oracle’s WebForms™ and web-based S390/AS400 host access, can look like normal HTTP
`traffic, but PacketShaper can classify them separately.
`
`Citrix and Oracle Classification
`
`PacketShaper can automatically isolate each published application running within a Citrix
`environment. For example, it can distinguish Microsoft Word from PeopleSoft, and it can
`distinguish interactive PeopleSoft traffic from its print traffic.
`
`PacketShaper differentiates many types of Oracle traffic, allowing you to tailor your analysis or
`management strategies. For example, PacketShaper can separate Oracle traffic accessing the
`“sales” database from Oracle traffic accessing the “accounting” database. PacketShaper
`identifies Oracle8i/9i and netv2 protocols using a multi-threaded server as well as the older
`Oracle 7 (or before) and netv1 protocols using a dedicated server.
`
`Intricate Port Classification
`
`When multiple applications use the
`same port, it is usually difficult to
`apply different management or
`analysis strategies because they
`appear as one application. Not so for
`PacketShaper. For example,
`PacketShaper can distinguish
`TN3270 and TN5250 sessions from
`other Telnet sessions even though
`all use well-known port 23.
`
`In addition, an application that hops
`from port to port can be a challenge
`to identify, because it looks like
`different applications. But, as
`before, not so for PacketShaper. For
`example, AOL instant messaging
`and passive FTP both hop ports
`frequently, but PacketShaper tracks
`them both throughout their journeys.
`
`File-Sharing Protocols
`
`Although specific peer-to-peer applications come and go with political and legal battles, there are
`now whole genres of peer-to-peer applications that facilitate file sharing. These favorites of
`music lovers have taken a heavy toll on network performance. Schools, businesses, and other
`
`
`
`Packeteer, Inc.
`
`7
`
`
`
`
`
`organizations have no desire to issue oppressive and controversial mandates regarding
`unsanctioned use of the network. However, they do want to maintain control over their networks
`and uphold acceptable performance for mission-critical applications.
`
`PacketShaper automatically identifies a large number of these file-sharing applications, enabling
`you to control their behavior (with control features, coming later). These include Aimster,
`AudioGalaxy, Blubster, DirectConnect, eDonkey, Gnutella (BearShare, Furi, Gnotella,
`Gnucleus, Gnut, Gnewtellium, Hagelslag, LimeWire, Mactella, Newtella, Phex, ToadNode),
`Groove, Hotline, Imesh, KaZaA, Napster (amster, BeNapster, BitchX, TekNap, crapster, gnap,
`gnapster, gnome-napster, hackster, iNapster, jnap, Knapster, Lopster, MacStar, MyNapster, nap,
`NapAmp, TkNap, Riscster, Shuban, snap, webnap, XmNap, AudioGnome, Rapigator, potlight,
`StaticNap, Swaptor, WinMX, macster, Rapster, PMNapster QNX, phaster), Scour, Tripnosis,
`and, believe it or not, even more of these popular vehicles.
`
`Multiple Locations
`
`When customers choose main-site deployment, the ability to distinguish traffic from each branch
`office becomes crucial. PacketShaper can classify traffic according to subnet, IP address, address
`ranges, and host lists, which can all work to discern different offices’ traffic. Even better,
`PacketShaper can then automatically discover all applications used by any location. It keeps
`them separate from those discovered at other locations, allowing different management strategies
`for the same application at different offices.
`
`Classification in Heterogeneous Networks
`
`PacketShaper can also identify and track hosts by their DNS name, even if DHCP (Dynamic
`Host Configuration Protocol) changes the host’s IP address frequently. You can use LDAP
`(Lightweight Directory Access Protocol) host lists to isolate any traffic associated with any host
`in the list.
`
`PacketShaper fits well within VLAN environments, both ISL and 802.1p/q VLANS, as it
`classifies and perpetuates traffic division based on virtual LAN. PacketShaper can classify (and
`mark, but that comes later) traffic based on IP COS/TOS bits, Diffserv settings, and MPLS
`labels, allowing traffic types to have uniform end-to-end treatment by multi-vendor devices in
`heterogeneous WANs.
`
`Common Classification Approaches
`
`Most customers organize and classify traffic based on one of two systems:
`(cid:120)(cid:3) Application-based hierarchy
`Distinguish traffic based on application (such as SAP) or application-related criteria (such as
`URL or particular database) and build a traffic tree of application-based classes.
`(cid:120)(cid:3) Location-based hierarchy
`Separate traffic according to location or user group, based on subnets, host lists, or IP
`addresses. Then, optionally, expand each location to include its applications.
`
`
`
`
`
`Packeteer, Inc.
`
`8
`
`
`
`
`
`Application-based traffic tree
`
`Location-based traffic trees
`
`
`
`Step Two: Analyzing Traffic
`
`While discovery reveals what is on the network, analysis shows how it behaves,
`helping to form strategies for performance management, server balancing,
`topology planning, and capacity planning. Several types of analysis are
`summarized in the next sections.
`
`Utilization Analysis
`
`Utilization analysis determines how bandwidth is used and answers questions such as:
`(cid:120)(cid:3) How is link capacity divided?
`(cid:120)(cid:3) Which traffic, which hosts, and which web destinations are the most popular?
`(cid:120)(cid:3) What is DICOM (medical images) traffic’s current bandwidth rate? Its peak last month?
`(cid:120)(cid:3) How much of Oracle throughput is wasted on retransmissions?
`(cid:120)(cid:3) What portion of my link services non-critical traffic? Unsanctioned traffic?
`(cid:120)(cid:3) How much bandwidth did one branch office use compared to another?
`
`
`
`Packeteer, Inc.
`
`9
`
`
`
`
`
`PacketShaper tracks average and peak traffic levels, identifies top users and applications,
`evaluates network efficiency, and more. PacketShaper gives you an automatic breakdown of
`usage statistics for each traffic class and, if you want it, even for each user.
`
`Several graphs and analysis techniques are described below. For a more comprehensive list of
`PacketShaper graphs, consult PacketGuide’s Reference section and look for Graphs. For a more
`comprehensive description of analysis techniques, consult PacketGuide’s Solution section and
`look for Analysis. (PacketGuide is available at support.packeteer.com/documentation.)
`
`Monitoring Table
`
`PacketShaper keeps several groups of usage statistics. The simplest group is a collection of peak
`and current rates for every class in your traffic tree and provides a handy glimpse into traffic
`behavior for all classes on one convenient screen.
`
`The Tops
`
`
`
`PacketShaper offers a variety of mechanisms to track top consumers of bandwidth. There are
`lists, tables, pie charts, line graphs, and bar charts. You can evaluate the top applications, users,
`locations, web sites, and other possibilities.
`
`A pie chart gives an intuitive picture of your traffic classes that generate the most network
`traffic.
`
`
`
`Packeteer, Inc.
`
`10
`
`
`
`
`
`A Top Ten list ranks the top traffic classes with the percentage of bandwidth consumed for each.
`
`
`
`PacketShaper’s Top Talkers/Top Listeners feature lets you delve into a traffic class to explore its
`heaviest contributors. Top Talkers displays the top 10 generators of a class’ traffic, and Top
`Listeners displays the top 10 recipients of a class’ traffic. For example, if Top Talkers is turned
`on for HTTP traffic, you’ll find out which web pages are the most popular. And if Top Listeners
`is turned on for RealAudio, you’ll find out who’s using the network to listen to music.
`
`
`
`Packeteer, Inc.
`
`11
`
`
`
`
`
`Another PacketShaper feature, called host accounting, tracks historical usage levels for each IP
`address and offers statistics summed for each user, host list, or subnet. If you import this data
`into a tool such as MS Excel, you can sort the results, yielding top users, or even a fully ranked
`list of users from top to bottom. Using these features, you could, for example, retrieve usage
`figures for each department in a company — this much by Marketing, that much by Accounting,
`and so on.
`
`Utilization over Time
`
`Customers frequently have an artificial sense of security if they examine graphs of average
`network usage over sizeable chunks of time. When PacketShaper adds peak usage and more
`frequent intervals, graphs can highlight a hidden contention problem. An average-rate line might
`mislead someone into thinking that usage never approaches link capacity. A peak-rate line can
`tell the real story — frequent spikes that use the entire link. Alternatively, it can tell you the
`opposite – that your organization uses less bandwidth than you’re paying for.
`
`
`
`Packeteer, Inc.
`
`12
`
`
`
`
`
`Diagnostic Aids
`
`Some of PacketShaper graphs aid the diagnostic process. Among them:
`
`TCP Health gives you a comprehensive picture of TCP connections for a link, partition, or traffic
`class. It compares the number of TCP connections that were started, aborted, and ignored or
`refused by the server.
`
`The Network Efficiency graph was designed to expose the hidden cost of retransmissions. The
`graph shows the percentage of bandwidth wasted by retransmissions. Other technologies might
`give a count of retransmitted packets, but PacketShaper knows the packets’ sizes, a requirement
`for calculating bandwidth percentages. You can track the current retransmission rate or explore
`its history. You can focus on the traffic that is of interest: your link as a whole, an application, a
`protocol, a branch office, a user, a server, or a web destination. For example, you might note that
`although your network efficiency is 95 percent for your network as a whole, it plunges to 55
`percent for your company’s web page.
`
`
`
`Packeteer, Inc.
`
`13
`
`
`
`
`
`The Connection Retransmissions graph can help focus your investigation into retransmissions,
`comparing the retransmitted and tossed rates.
`
`Performance Analysis
`
`PacketShaper’s response-time management facility (RTM) provides performance statistics,
`threshold monitoring, high-level problem indicators, and performance graphs. It quantifies what
`has traditionally been subjective, anecdotal information. Response-time measurement has many
`advantages. Response times allow you to recognize performance problems before they impact
`business. Concrete figures enable performance comparisons to assess the results of configuration
`changes. With a mechanism to compare actual and promised performance, service-level
`agreements (SLAs) become meaningful.
`
`RTM offers the following features:
`(cid:120)(cid:3) Tracks delay statistics for flexible, user-defined traffic categories. For example, you can
`measure response times for applications such as Oracle, applications running over Citrix
`MetaFrame, individual hosts, subnets, and the web pages of your choice.
`
`
`
`Packeteer, Inc.
`
`14
`
`
`
`
`
`(cid:120)(cid:3) Breaks each response-time measurement into network delay (time spent in transit) and server
`delay (time the server used to process the request).
`
`(cid:120)(cid:3)
`
`Identifies the users and servers with the slowest performance, called Worst Clients and Worst
`Servers.
`(cid:120)(cid:3) Allows users to set acceptability standards and track whether performance adheres to the
`standards. You can set the speed that divides good response from bad (900 ms, for example).
`And you can set the percentage of transactions that should be within your performance goal
`(such as 95 percent).
`(cid:120)(cid:3) Offers current and historical performance data in intuitive tables and graphs, in a MIB
`(management information base), or as raw data. SNMP management tools, such as HP
`OpenView, and third-party reporting tools, such as InfoVista, integrate smoothly.
`
`PacketShaper’s position in the corporate network — monitoring and controlling all the traffic
`that passes — gives it a unique opportunity to provide accurate response-time measurements at a
`very low cost. Because it already classifies every packet, PacketShap