摘要:
Node merging methods and apparatus are disclosed for generating simplified representations of network topology. A first topology representative of a given network is determined, and at least one pair of nodes of the first topology is merged into a single node based on measures associated with respective edges connecting the nodes of the node pair to at least one neighbor node common to that pair. The merging step is repeated for one or more additional pairs of nodes to produce a reduced network topology meeting one or more desired criteria, and a visualization or other representation of the reduced network topology is generated.
摘要:
Techniques for determining a problem location or otherwise characterizing a network comprising a plurality of processing elements, including at least one processing element associated with performance of a packet encapsulation operation of an encapsulation protocol. The packet encapsulation operation is performed on a test packet to generate an encapsulated packet, the test packet having a time to live (TTL) value and an identifier. In conjunction with performance of the packet encapsulation operation, the TTL value and the identifier of the test packet are copied to a header of the encapsulated packet. The encapsulated packet is transmitted, and a determination is made as to whether a reply packet has been received responsive to transmission of the encapsulated packet. The reply packet, if any, is processed to obtain information utilizable in determining the problem location or otherwise characterizing the network. By way of example, these operations may be repeated, for subsequent test packets with increasing TTL values, until an amount of router hop information sufficient to determine the problem location is obtained.
摘要:
Route asymmetry is detected in a network by running a route tracing program to trace routes between a first element of the network and a second element of the network. The route tracing program need be run at only a single network element, such as the first network element. Forward and reverse routes between the first and second network elements are identified as asymmetric if performance data from the route tracing program indicates a significant deviation from an expected monotonic characteristic as a function of time-to-live values of respective packets transmitted by the route tracing program.
摘要:
Route asymmetry is detected in a network by running a route tracing program to trace routes between a first element of the network and a second element of the network. The route tracing program need be run at only a single network element, such as the first network element. Forward and reverse routes between the first and second network elements are identified as asymmetric if performance data from the route tracing program indicates a significant deviation from an expected monotonic characteristic as a function of time-to-live values of respective packets transmitted by the route tracing program.
摘要:
Node merging methods and apparatus are disclosed for generating simplified representations of network topology. A first topology representative of a given network is determined, and at least one pair of nodes of the first topology is merged into a single node based on measures associated with respective edges connecting the nodes of the node pair to at least one neighbor node common to that pair. The merging step is repeated for one or more additional pairs of nodes to produce a reduced network topology meeting one or more desired criteria, and a visualization or other representation of the reduced network topology is generated.
摘要:
Performance problems or other conditions are analyzed in a system comprising a plurality of endpoint devices and an associated centralized or distributed controller. End-to-end measurements are obtained for respective paths through the network, for example, using communications between the endpoint devices. For a given end-to-end measurement obtained for a particular one of the paths, a value of a performance indicator for the path is determined and the performance indicator value is assigned to each of a plurality of links of the path. The determining and assigning operations are repeated for additional ones of the end-to-end measurements, the links are grouped into one or more exculpation or inculpation sets based on how many times a particular performance indicator value has been assigned to each of the links, and the one or more sets are utilized to determine, for example, the location of a performance problem in the network.
摘要:
A distributed monitoring system comprises a plurality of agents configured for communication with at least one central server. A given one of the agents obtains measurement data, and applies a statistical test to the measurement data. Based on a result of the statistical test, the given agent determines whether or not an update needs to be sent by the agent to the central server. The agent sends the update to the central server if the determination indicates that the update should be sent.
摘要:
A system visualizes and generates reports from stored data, concerning various measured parameters related to a network carrying call traffic. The network is displayed in an easily recognized arrangement, with various parameters being indicated by different shapes and colors for each device on the network. The parameters are changed to indicate the status of the network at different times. More detailed information about a parameter, a device or a path between devices may be obtained simply using a mouse or keystrokes. A variety of different types of detailed displays allows the operator to troubleshoot problems in the network.
摘要:
A network condition capture and reproduction technique captures measurement data characterizing network conditions at a given time between first and second endpoint devices of a network, and utilizes the captured measurement data in a network impairment device to reproduce the network conditions at a later time and possibly in a different place.
摘要:
A method of internet protocol (IP) address de-aliasing that involves obtaining IP addresses from devices in a network, pinging pairs of the IP addresses by sending packets to pairs of the IP addresses, obtaining ping response orders for the packets, and determining whether the pairs of IP addresses are aliases of the same network device based on the obtained ping response orders.