Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020142180 - PACKET LOSS ISOLATION TEST

Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

[ EN ]

CLAIMS

We claim as our invention:

1. A method for isolating packet loss on a hierarchical packet network, the method comprising:

connecting a first Network Element (NE) to a second NE via a varying path traversing multiple network segments;

discovering, with the first NE, a set of segment-demarcation expect-to-echo nodes along the varying path;

ascertaining, with the first NE, a request-to-echo configuration for each node in the set;

emitting a sample size of requests-to-echo in a respective request-to-echo

configuration for each node in the set at a sample rate;

receiving results of the sample size of requests-to-echo to generate a packet-loss sample; and

calculating a rate-of-loss for the packet-loss sample.

2. The method of claim 1, further comprising accumulating multiple packet-loss samples over a reporting interval; and calculating an accumulated rate-of-loss for the reporting interval with the multiple packet-loss samples.

3. The method of claim 2, wherein the emitting emits packets marked with different Class of Service (CoS)-categorizers per packet-loss sample in a round-robin fashion for the reporting interval.

4. The method of claim 2, wherein the emitting comprises emitting from multiple locations, and the method further comprises gathering the packet-loss samples from the multiple locations; and correlating the gathered multiple packet-loss samples to a geospatial map or one of the segments along the network path.

5. The method of claim 1, wherein the discovering comprises identifying a traceroute protocol for each node of the set.

6. The method of claim 5, wherein a traceroute configuration for each node comprises an ICMP port 7 echo request-to-echo, a TCP port 7 echo request-to-echo, a UDP port 7 echo request-to-echo, a UDP port 1967 request-to-echo, or a combination thereof.

7. The method of claim 1, wherein the set comprises a Modem Ping-point (MPP), an Ingress Ping-point (IPP), an Egress Ping-Point (EPP) or a combination thereof.

8. The method of claim 1, wherein the first NE comprises a split-tunnel connection along the network path, and the discovering discovers different segment-demarcation nodes along the split-tunnel connection.

9. The method of claim 8, further comprising discerning an onset of excessive rate of packet-loss by comparing the rate-of-loss with an onset threshold; comparing the results along the split-tunnel connection; and deducing an at-fault segment based on the comparison.

10. The method of claim 1, wherein the request-to-echo configuration comprises a TTL-time-exceeded traceroute request-to-echo, a fragmentation-reassembly-time-exceeded traceroute request-to-echo, a DF-MTU-destinati on-unreachable traceroute request-to-echo, a UDP packet destined for port 123 with a Time to Live (TTL) set to decrement to zero at a respective node, a TCP packet for a port other than 80 with a TTL set to decrement to zero at the respective node, an ICMP port 7 echo request-to-echo, a TCP port 7 echo request-to-echo, a UDP port 7 echo request-to-echo, a UDP port 1967 request-to-echo, a configured protocol and port, or a combination thereof.

11. The method of claim 1, wherein the request-to-echo configuration comprises multiple request-to-echo configurations, and

the ascertaining comprises sending, in parallel, a request-to-echo in each of the

multiple request-to-echo configurations.

12. The method of claim 1, wherein the receiving comprises tabulating packet responses and packet losses.

13. The method of claim 1, wherein the calculating calculates a length-of-burst-loss for the packet-loss sample.

14. The method of claim 1, further comprising deducing an at-fault segment by comparing the rate-of-loss with an onset threshold for the results.

15. The method of claim 1, further discerning an abatement of already-onset excessive rate of packet-loss is by comparing the rate-of-loss with an abatement threshold, or an end of a reporting interval.

16. The method of claim 1 further comprising observing a misbehavior of packet traffic, with a third NE different from the first NE and the second NE; and

triggering a periodic performance of the emitting.

17. The method of claim 1, wherein the hierarchical packet network comprises a single-CoS layer-3 network, a single-CoS WAN network, a CoS-categorized layer-3 network, a CoS-categorized WAN network, a CoS-categorized Layer-2 container network, or a combination thereof.

18. The method of claim 1, further comprising determining the sample size and the sample rate based on a bandwidth subscription of the first NE.

19. An underlay monitor to isolate packet loss on a hierarchical packet network, the underlay monitor comprising:

a first Network Element (NE) connected to a second NE via a varying path traversing multiple network segments;

a discoverer to discover, with the first NE, a set of segment-demarcation expect-to- echo nodes along the varying path, and to ascertain, with the first NE, a request-to-echo configuration for each node in the set;

an emitter to emit a sample size of requests-to-echo in a respective request-to-echo configuration for each node in the set at a sample rate;

a receiver to receive results of the sample size of requests-to-echo to generate a

packet-loss sample; and

a calculator to calculate a rate-of-loss for the packet-loss sample.

20. The underlay monitor of claim 19, wherein the discoverer identifies a traceroute protocol for each node of the set.