{"id":169706,"date":"2007-01-06T11:11:47","date_gmt":"2007-01-06T11:11:47","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/project\/nethealth\/"},"modified":"2017-06-01T13:39:19","modified_gmt":"2017-06-01T20:39:19","slug":"nethealth","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/nethealth\/","title":{"rendered":"NetHealth"},"content":{"rendered":"<h2>Overview<\/h2>\n<p>Networks are being deployed extensively in large corporations, small offices, and homes. However, a significant number of &#8220;pain points&#8221; remain for end-users and network administrators. To resolve complaints quickly and efficiently, network administrators need tools that can assist them in detecting, isolating, diagnosing, and correcting faults. Furthermore, such tools should also detect network security breaches, possibly caused by innocent employees. <i>The NetHealth project<\/i> is about detecting, inferring, diagnosing, and recovering from user perceived performance problems in enterprise networks.<\/p>\n<p>Existing products do a reasonable job of presenting statistical data from the network. However, they do not do a comprehensive job of gathering and analyzing the data to establish the root cause of the problem. Furthermore, on the wireless side, most products gather data from the Access Points (APs) only and neglect the client-side view of the network. Some products that monitor the network from the client&#8217;s perspective require hardware sensors, which can be expensive to deploy and maintain. Also, current solutions do not provide any support for disconnected clients even though these are the ones that need the most help. On the wired side, a number of researchers have come up with solutions for diagnosing problems over WANs; however, most of those approaches are not integrated to perform end-to-end inference and diagnostics.<\/p>\n<p>Under the NetHealth umbrella, we are building algorithms and tools that<\/p>\n<ul>\n<li>allow generalist operators to diagnose end-to-end performance as &#8220;seen&#8221; by users<\/li>\n<li>produce near real-time and historical-analysis reports of end-to-end performance problems with networked services and components<\/li>\n<li>prioritize and raise alerts based on impact analysis on users from performance glitches\/problems<\/li>\n<li>automatically resolve the problem or offer meaningful resolution strategies<\/li>\n<li>provide detailed analysis of wireless failures for mobile devices<\/li>\n<li>provide snapshots of the &#8220;health&#8221; of network elements and services<\/li>\n<li>compliment existing detailed networked diagnosis technologies<\/li>\n<\/ul>\n<p>In contrast to traditional network-based and bolt-on approaches, NetHealth leverages clients and servers. NetHealth agents on the end systems are positioned to harvest available application data, and infer application-level dependencies, rather than reverse this information out from the network or from summarized logs and alerts from computing and network elements, and associated management systems. As a result, the NetHealth approach is well-suited for effective problem location and resolution, and for bringing together the intelligence needed to support meaningful resilience and self-healing, self-* capabilities.<\/p>\n\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-2\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-2\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-1\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tSub-Projects\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-1\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-2\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Sherlock\u00a0&#8211; Enterprise network management via analysis of network dependencies<\/li>\n<li>Orion &#8211; Dependency extraction in enterprise networks<\/li>\n<li>DAIR <strong>&#8211;<\/strong> Enterprise wireless LAN management via Dense Array of Inexpensive Radios<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?displaylang=en&FamilyID=ff76c25d-363c-46e4-8ce3-e7bd0cfe71c4\" target=\"_new\">ELDA (SureMail)<\/a> &#8211;\u00a0Notification system when email losses are detected<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/netprofiler-profiling-wide-area-networks-using-peer-cooperation\/\" target=\"_new\">NetProfiler<\/a> &#8211; Cooperative Network Monitoring & Diagnosis<\/li>\n<\/ul>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-4\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-4\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-3\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tBrainstorming Events\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-3\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-4\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p>All talks, videos and presentation decks are available on event&#8217;s web site.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/event\/self-managing-networks-summit-2005\">Self Managing Networks Summit 2005<\/a> &#8212; A 2-day mindswap event between researchers from industry, academia, and government to discuss Self-aware networking. June 1-2, 2005<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/event\/edgenet-2006\/\">EdgeNet 2006: Life at the Edge: Research and Practice in Corporate\/Campus Networks<\/a>\u00a0&#8212; This summit brought together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. June 1-2, 2006<\/li>\n<\/ul>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-6\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-6\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-5\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPress\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-5\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-6\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ul>\n<li>Larry Greenemeier, InformationWeek, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.informationweek.com\/news\/\/showArticle.jhtml?articleID=196600677\">Inside Microsoft&#8217;s Labs<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, December 04 , 2006<\/li>\n<li>Gary Anthes, Computerworld, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&articleId=111503&pageNumber=1\">The Future of E-mail<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, June 12, 2006<\/li>\n<li>Gary Anthes, Computerworld, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&articleId=111442\">Projects in the Microsoft Research labs<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, June 5, 2006<\/li>\n<li>Joris Evers, The Industry Standard, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.thestandard.com\/internetnews\/001044.php\">Microsoft Researchers target worms<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, March 4, 2005<\/li>\n<\/ul>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t\n","protected":false},"excerpt":{"rendered":"<p>Overview Networks are being deployed extensively in large corporations, small offices, and homes. However, a significant number of &#8220;pain points&#8221; remain for end-users and network administrators. To resolve complaints quickly and efficiently, network administrators need tools that can assist them in detecting, isolating, diagnosing, and correcting faults. Furthermore, such tools should also detect network security [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13552,13547],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-169706","msr-project","type-msr-project","status-publish","hentry","msr-research-area-hardware-devices","msr-research-area-systems-and-networking","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"2007-01-06","related-publications":[153963,160076,160074,160072,160070,158156,158155,154819,154015,154009,146425,153958,153783,153778,153300,153299,153067,152962,152734,152715],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","value":"bahl","display_name":"Victor Bahl","author_link":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bahl\/\" aria-label=\"Visit the profile page for Victor Bahl\">Victor Bahl<\/a>","is_active":false,"user_id":31167,"last_first":"Bahl, Victor","people_section":0,"alias":"bahl"},{"type":"user_nicename","value":"dmaltz","display_name":"Dave Maltz","author_link":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/dmaltz\/\" aria-label=\"Visit the profile page for Dave Maltz\">Dave Maltz<\/a>","is_active":false,"user_id":31648,"last_first":"Maltz, Dave","people_section":0,"alias":"dmaltz"},{"type":"user_nicename","value":"ranveer","display_name":"Ranveer Chandra","author_link":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ranveer\/\" aria-label=\"Visit the profile page for Ranveer Chandra\">Ranveer Chandra<\/a>","is_active":false,"user_id":33344,"last_first":"Chandra, Ranveer","people_section":0,"alias":"ranveer"}],"msr_research_lab":[199565],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/169706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/169706\/revisions"}],"predecessor-version":[{"id":388136,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/169706\/revisions\/388136"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=169706"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=169706"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=169706"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=169706"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=169706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}