Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and methods for network reachability detection

An autonomous system and boundary technology, applied in the direction of transmission system, digital transmission system, data exchange network, etc., can solve problems such as lack of

Inactive Publication Date: 2008-02-13
CISCO TECH INC
View PDF1 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This routing capability is usually not available in traditional IP traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and methods for network reachability detection
  • System and methods for network reachability detection
  • System and methods for network reachability detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Pinging remote nodes on routes or paths across autonomous systems using LSP routing encounters the problem that the identity of the ping originator may not be recognized outside the source AS. Due to the difficulty of propagating addresses within an AS outside the local AS, the traditional ping command does not extend outside the AS. Traditional MPLS ASBRs and other LSRs incorporate this ping message using a time-to-live (TTL) attribute, usually as part of the MPLS header. Each ASBR sets the TTL to 1 or introduces a route warning label, indicating that the ping message is intercepted before leaving the originating AS. Setting the TTL to 1 ensures that the packet is not propagated outside the source AS. So, there is no way to perform traditional ping commands outside of ASBR. Therefore, since traditional ASBRs using LSP routing cannot provide return path routing information for ping commands issued to remote ASs, VPN subnets (i.e., CE or PE routers), or other destinati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A mechanism for ASBRs to identify the originating node, or router, in an LSP conversant autonomous system (AS), such as an MPLS VPN environment, maintains the identity of the originating node and successive nodes in subsequent autonomous systems along the path to the node to be pinged. The identity of the transporting nodes is stored in a stack or other object associated with the ping request (ping), such that the pinged node may employ the stored identity as a set of return path routing information. Successive ASBRs store their identity on the stack, in an ordered manner, along the path to the destination. Upon reaching the destination (ping) node, the destination node employs the identity of the first node on the stack to send the acknowledgment, or ping response. Each successive ASBR, therefore, pops (retrieves) the next node identity from the stack and redirects (sends) the ping response to the retrieved node.

Description

Background technique [0001] Virtual Private Networks (VPN) are becoming an increasingly popular mechanism for interconnecting multiple remote sites of a public entity, such as a company, university, government agency, or other enterprise. VPNs allow remote sites to interconnect as if they were co-located by providing messaging, security, and node addressing. This kind of VPN interconnects multiple subnets or local area networks (Local Area Networks, LAN) of enterprises, such as companies, universities or distributors. The subnets are connected to each other via private or public access networks such as the Internet, intranet, VPN, etc. [0002] This subnetwork interconnection is often referred to as the core network, which includes service providers with high-speed backbone routers and backbones. Each subnet and core network has access points called edge routers through which traffic flows in and out of the network. The core network has ingress points controlled by nodes kn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/28H04L45/50
CPCH04L45/36H04L12/2697H04L45/04H04L45/50H04L43/50H04L69/16
Inventor 托马斯·D·纳德奥穆罕默德·阿扎·萨亚德迈克尔·T·派库彻詹姆斯·N·古伊查德让-菲利普·瓦瑟尔
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products