Unlock instant, AI-driven research and patent intelligence for your innovation.

System and methods for network reachability detection

An autonomous system and boundary technology, applied in the direction of transmission system, digital transmission system, data exchange network, etc., can solve problems such as lack of

Inactive Publication Date: 2014-09-24
CISCO TECH INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This routing capability is usually not available in traditional IP traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and methods for network reachability detection
  • System and methods for network reachability detection
  • System and methods for network reachability detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Pinging remote nodes on routes or paths across autonomous systems using LSP routing encounters the problem that the identity of the ping originator may not be recognized outside the source AS. Due to the difficulty of propagating addresses within an AS outside the local AS, the traditional ping command does not extend outside the AS. Traditional MPLS ASBRs and other LSRs incorporate this ping message using a time-to-live (TTL) attribute, usually as part of the MPLS header. Each ASBR sets the TTL to 1 or introduces a route warning label, indicating that the ping message is intercepted before leaving the originating AS. Setting the TTL to 1 ensures that the packet is not propagated outside the source AS. So, there is no way to perform traditional ping commands outside of ASBR. Therefore, since traditional ASBRs using LSP routing cannot provide return path routing information for ping commands issued to remote ASs, VPN subnets (i.e., CE or PE routers), or other destinati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In an autonomous system (AS) that is familiar with LSPs, such as an MPLS VPN environment, a method used by ASBRs to identify the originating node or router that maintains the originating node and subsequent ASs on the path to the pinged node. The ID of the successor node of . The identification of the transmission node is stored in the stack or other objects related to the ping request (ping), so that the stored identification is used by the ping node as a set of return path routing information. Subsequent ASBRs along the path to the destination store their identities sequentially on the stack. Upon reaching the target (ping) node, the target node sends an acknowledgment or ping response using the identity of the first node in the stack.

Description

Background technique [0001] Virtual Private Networks (VPN) are becoming an increasingly popular mechanism for interconnecting multiple remote sites of a public entity, such as a company, university, government agency, or other enterprise. VPNs allow remote sites to interconnect as if they were co-located by providing messaging, security, and node addressing. This kind of VPN interconnects multiple subnets or local area networks (Local Area Networks, LAN) of enterprises, such as companies, universities or distributors. The subnets are connected to each other via private or public access networks such as the Internet, intranet, VPN, etc. [0002] This subnetwork interconnection is often referred to as the core network, which includes service providers with high-speed backbone routers and backbones. Each subnet and core network has access points called edge routers through which traffic flows in and out of the network. The core network has ingress points controlled by nodes kn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04L45/50
CPCH04L45/36H04L12/2697H04L45/04H04L45/50H04L43/50H04L69/16
Inventor 托马斯·D·纳德奥阿扎·穆罕默德·萨亚德迈克尔·T·派库彻詹姆斯·N·古伊查德让-菲利普·瓦瑟尔乔治·L·斯旺洛
Owner CISCO TECH INC