The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Oct. 23, 2012
Filed:
Aug. 24, 2010
Patrick J. Malloy, Washington, DC (US);
Dana Znamova, Rockville, MD (US);
Alain J. Cohen, Washington, DC (US);
Antoine Dunn, Silver Spring, MD (US);
John W. Strohm, Rockville, MD (US);
Abbas Haider Ali, Rockville, MD (US);
Russell Mark Elsner, Bethesda, MD (US);
Patrick J. Malloy, Washington, DC (US);
Dana Znamova, Rockville, MD (US);
Alain J. Cohen, Washington, DC (US);
Antoine Dunn, Silver Spring, MD (US);
John W. Strohm, Rockville, MD (US);
Abbas Haider Ali, Rockville, MD (US);
Russell Mark Elsner, Bethesda, MD (US);
OPNET Technologies, Inc., Bethesda, MD (US);
Abstract
Data representing application deployment attributes, network topology, and network performance attributes based on a reduced set of element attributes is utilized to simulate application deployment. The data may be received from a user directly, a program that models a network topology or application behavior, and a wizard that implies the data based on an interview process. The simulation may be based on application deployment attributes including application traffic pattern, application message sizes, network topology, and network performance attributes. The element attributes may be determined from a lookup table of element operating characteristics that may contain element maximum and minimum boundary operating values utilized to interpolate other operating conditions. Application response time may be derived using an iterative analysis based on multiple instances of one or more applications wherein a predetermined number of iterations is used or until a substantially steady state of network performance is achieved.