Abstract:
An apparatus stores, in association with each of one or more services to be provided, a communication monitoring rule under which communication performed for providing the each of the one or more services is to be monitored. The apparatus communicates with another apparatus that is operable to run a virtual machine and run a virtual router relaying communication performed by the virtual machine. When a service to be provided by the virtual machine is selected from among the one or more services, the apparatus controls the virtual router to monitor communication performed by the virtual machine according to the communication monitoring rule associated with the selected service, by sending the communication monitoring rule to the virtual router.
Abstract:
A communication system including: a first device that includes first and second units and a first encapsulation unit encapsulating data; a second device that includes a third unit communicating data with the second unit, a fourth unit, and a second encapsulation unit encapsulating data; a third device that includes a fifth unit communicating data with the first or third unit, a sixth unit, and a third encapsulation unit encapsulating data; and a fourth device that includes a seventh unit communicating data with the first or third unit, an eighth unit communicating data with the fifth unit, and a fourth encapsulation unit encapsulating data; wherein at least two of the first to fourth devices include control units that control the units that the at least two of the first to fourth devices have, so as not to transfer received data to other devices.
Abstract:
Transfer destination of a packet originating from a virtual machine is controlled so as to allow a capture device arranged in a communication network to capture a packet that is transferred using a communication tunnel. A first server acquires a first packet originating from a source virtual machine being operated by the first server, encapsulates the first packet by adding source and destination addresses. The first server further adds a transfer-destination address to the encapsulated first packet to generate a second packet when the first packet is determined to be a target packet to be captured by the capture device. Then, the first server transmits the second packet including the transfer-destination address to the second server using the communication tunnel while the second packet including the first packet is transferred to the transfer-destination address.
Abstract:
From an observed packet, the hop number, which is the number of nodes that the packet has passed through, and a bottleneck bandwidth, which is a bottleneck for transmitting the packet, are determined so as to detect loss failures. Thereby, the subnet that transmitted the observed packet is located as a node in a topology tree on the basis of the determined hop count and bottleneck bandwidth. When a loss failure, by which the packet is lost, is detected, subnets that are inappropriately arranged are extracted from the arrangement in the topology tree of the loss-failure-detected subnet, and the arrangement of the extracted subnets is modified in order to resolve the inappropriateness.