USRE50298E1 - Exporting real time network traffic latency and buffer occupancy - Google Patents
Exporting real time network traffic latency and buffer occupancy Download PDFInfo
- Publication number
- USRE50298E1 USRE50298E1 US17/329,520 US202117329520A USRE50298E US RE50298 E1 USRE50298 E1 US RE50298E1 US 202117329520 A US202117329520 A US 202117329520A US RE50298 E USRE50298 E US RE50298E
- Authority
- US
- United States
- Prior art keywords
- packet
- analytics
- buffer
- network device
- packets
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
- H04L43/0882—Utilisation of link capacity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/30—Flow control; Congestion control in combination with information about buffer occupancy at either end or at transit nodes
Definitions
- the present disclosure relates generally to analysis of occupancy of a buffer in a network device.
- data is transmitted from a source to a destination in the form of packets that generally pass through one or more network devices (e.g., switches, routers, firewalls, etc.).
- network devices e.g., switches, routers, firewalls, etc.
- certain errors may arise that result in, for example, redundant data being added to the original data, dropped packets, etc.
- Massively Scalable Data Center and Cloud Computing systems are putting more traffic load on network equipment such that over-provisioned networks are no longer possible. Monitoring of a buffer in a network device is useful to gain knowledge for network administration, analysis, and performance.
- FIG. 1 is a diagram illustrating a network device configured to generate buffer analytics packets based on occupancy of a buffer in the network device.
- FIG. 2 is a block diagram illustrating one example implementation of the buffer analytics logic.
- FIG. 3 is a diagram that generally illustrates a format of a buffer analytics packet.
- FIG. 4 is a flow chart depicting operations in a network device to generate and output buffer analytics packets.
- FIG. 5 is a flow chart depicting operations in a device that receives and retrieves information from the buffer analytics packets.
- FIG. 6 is a diagram illustrating an example of playback of buffer occupancy from buffer analytics packets.
- Packets are received at a network device.
- Information is captured describing occupancy of the buffer caused by packet flow through the buffer in the network device.
- Analytics packets are generated containing the information. The analytics packets from the network device for retrieval of the information contained therein for analysis, replay of buffer occupancy, etc.
- FIG. 1 a diagram is shown of a network environment 5 in which a network device 10 is provided that is configured to generate buffer analytics packets based on occupancy of a buffer the network device 10 .
- the network device 10 comprises a plurality of ports 12 ( 1 )- 12 (N), any of which can serve as an ingress port or egress port at any time.
- the network device includes a buffer 14 , buffer analytics logic 16 , a central processing unit (CPU) 18 and memory 19 . It should be understood that there are other components of the network device 10 , such as a switch fabric or application specific integrated circuit (ASIC), and the buffer 14 may reside the switch fabric.
- There are typically numerous buffers in the network device 10 but for simplicity only one is shown in FIG. 1 .
- the buffer analytics logic 14 may be implemented in hardware by digital logic gates (and embedded in the switch fabric) or by software stored in memory 19 and executed by CPU 18 .
- Packets 20 arrive at the network device 10 via any of the ports 12 ( 1 )- 12 (N).
- FIG. 1 shows an example where packets are arriving at ports 12 ( 1 ), 12 ( 2 ) and 12 ( 3 ).
- the network device 10 is coupled to a network 40 , e.g., a local area network or wide area network (the Internet), via ports 12 ( 5 )- 12 (N) to ultimately communicate with any one or more of the network devices 50 ( 1 )- 50 (M).
- a network 40 e.g., a local area network or wide area network (the Internet)
- the buffer analytics logic 16 captures information describing occupancy of the buffer 14 caused by packet flow through the buffer in the network device 10 , and generates buffer analytics packets 30 containing the information.
- buffer analytics packets 30 there are two types of buffer analytics packets: enqueue buffer analytics packets and dequeue buffer analytics packets.
- the buffer analytics packets 30 are then output from the network device 10 at a programmable time schedule (or based of packet size) in any one of several ways to allow for replay of the occupancy of the buffer.
- the network device 10 may insert into buffer analytics packets 30 an address for a destination of the buffer analytics packet, e.g., address for any device connected to the network 40 , such as collector device 60 having a CPU 62 and memory 64 .
- the network device 10 sends the analytics packet 30 via network 40 to the destination collector device 60 , which may be at any location, local or remote from network device 10 .
- the network device 10 may output the analytics packet 30 to a dedicated port, e.g., port 12 ( 4 ) of the network device 10 to which a collector device 70 is connected.
- the dedicated analytics port 12 ( 4 ) can participate in port channel or fixed port distribution to expand bandwidth to a single or multiple monitor ports.
- the collector device 70 since it is connected directly to port 12 ( 4 ), is usually local to the network device 10 .
- the collector device 70 includes a CPU 72 and memory 74 .
- the analytics packets 30 may be output to the onboard CPU 18 and memory 19 in the network device 10 , such that CPU 18 and memory 19 also serve as a collector device.
- the CPUs 18 , 62 and 72 may replay and analyze the occupancy of the buffer 14 based on software instructions stored in its associated memory 19 , 64 and 74 , respectively.
- the analytics packets are stored in the memory 19 , 64 and 74 for the associated CPU 18 , 62 and 72 , respectively.
- the network device 10 can be any network device now known or hereinafter developed, including a switch, router, gateway, a software stack on a host device, virtual network interface cards (VNICs) virtual switches, physical network interface cards (including those that support virtualization).
- VNICs virtual network interface cards
- Memory 19 , 64 and 74 may comprise read only memory (ROM), random access memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices.
- the memory 19 , 64 and 74 may comprise one or more tangible (non-transitory) computer readable storage media (e.g., a memory device) encoded with software comprising computer executable instructions and when the software is executed (by the associated CPU) it is operable to perform the operations described herein.
- FIG. 2 shows that the buffer analytics logic 16 comprises an enqueue analytics packet generator 80 and a dequeue analytics packet generator 82 .
- the buffer analytics logic 16 comprises an enqueue analytics packet generator 80 and a dequeue analytics packet generator 82 .
- the admission control block 84 and departure control block 86 are commonly found in a network device and are hardware (or software) blocks used to make processing decisions, such as a drop, scheduling, rate limiting, policing, shaping, etc.
- the enqueue analytics packet generator 80 is configured to generate an analytics packet, called an enqueue buffer analytics packet shown at reference numeral 32 , that describes/summarizes a packet being enqueued into buffer 14 .
- the dequeue analytics packet generator 82 is configured to generate an analytics packet, called a dequeue buffer analytics packet shown at reference numeral 34 , that describes/summarizes a packet being dequeued from buffer 14 .
- the packet assembler 88 assembles a packet 20 ready out from the buffer 14 for output from the network device.
- the enqueue analytics packet generator 80 captures, for a packet enqueued to buffer 14 , information describing one or more of identification of ingress port of arrival of the packet at the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, Layer 4 source address and destination address, class of service, and timestamp of arrival at the ingress port.
- the dequeue analytics packet generator 82 captures, for a packet dequeued from the buffer 14 , information describing one or more of identification of egress port for departure of the packet from the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, and timestamp of departure from the egress port.
- the multiplexer 90 selectively outputs, at any given time, either a packet 20 , an enqueue buffer analytics packet 32 or a dequeue buffer analytics packet 34 . Priority is given to output of a packet 20 in order to maintain proper flow of network traffic through the network device 10 .
- Trigger for output of an analytics packet may be based on time (according to a schedule) or size of a packet enqueued to the buffer or dequeued from the buffer.
- Replay of buffer occupancy has several categories, namely the buffer enqueue, buffer dequeue, buffer enqueue drop, and buffer dequeue drop, each having properties to facilitate buffer visibility.
- the buffer enqueue is defined as any packet that is admitted to the buffer, while buffer dequeue is defined as any packet that is removed from the buffer.
- Buffer enqueue drop is defined as any packet that is not admitted to the buffer, while buffer dequeue drop is defined as any packet that is admitted to the buffer, but that will be dropped. Recording each of these categories would require enormous bandwidth if a complete packet is captured. However, the entire packet is not necessary for analysis and a replay of the buffer may use specific pieces of information that is of interest to network administrators and application developers.
- a networking device is configured to filter packets in a network buffer and to generate a “record” for selected packets.
- Each captured record corresponds to a single buffered packet and is, in essence, a truncation of the packet.
- the record includes only certain desired information about the packet (i.e. selected information desired by a network administrator).
- Examples of record fields can include, but are not limited to: (1) Ethernet packet header information such as media access control (MAC) destination address/source address (DA/SA), Internet Protocol (IP) DA/SA, class of service (CoS), or type of service (TOS); (2) a timestamp of the packet arrival and/or departure to/from the buffer to create replay; (3) a timestamp based on a local or global clock derived from protocols such as Precision Time Protocol (PTP) or Network Time Protocol (NTP); (4) buffer occupancy characteristics such as overall, priority, unicast or multicast queue length; (5) packet properties such as drop, port mirrored, load balanced, bridged or routed, and packet length; or (6) packet error properties such as Cyclic Redundancy Check (CRC), Runt, Giant, and Jabber.
- MAC media access control
- DA/SA Internet Protocol
- IP Internet Protocol
- CoS class of service
- TOS type of service
- PTP Precision Time Protocol
- buffer occupancy characteristics such as overall, priority, unicast or multicast queue
- FIG. 3 shows an example format of an enqueue buffer analytics packet 32 or dequeue buffer analytics packet 34 .
- an enqueue buffer analytics packet 32 summarizes a packet that is being enqueued to a buffer
- a dequeue buffer analytics packet 34 summarizes a packet that is being dequeued from the buffer.
- an enqueue buffer analytics packet 32 and a dequeue buffer analytics packet 34 includes an Ethernet Header field 100 , a Common Header field 110 , one or more Records fields 120 ( 1 )- 120 (N) and a cyclic redundancy check (CRC) field 130 .
- the Ethernet header field 110 is field that is used to encapsulate the destination address of the analytics packet, e.g., to direct the analytics packet to a destination, i.e., a local or remote collector device (as indicated in FIG. 1 ), including to the CPU of the network device itself.
- the Ethernet header field 110 includes information, such as media access control (MAC) destination address/source address (DA/SA), optional IEEE 802.1q virtual local area network (VLAN) routing information, an optional Internet Protocol (IP) header including an IP SA and IP DA.
- MAC media access control
- DA/SA destination address/source address
- VLAN virtual local area network
- IP Internet Protocol
- the Ethernet header field 110 contains information used to route the buffer analytics packet to its desired destination.
- the common header field 110 contains information captured from the header of a packet that has been enqueued to or dequeued (as the case may be) from the buffer.
- the common header field summarizes the header of a packet that is enqueued to and dequeued from the buffer in the network device.
- the common header field includes information for a common header version (to allow for backward/future compatibility), timescale information representing the timescale of the enqueued or dequeued packet, a timestamp of the packet arrival and/or departure to/from the buffer to allow for replay, a record number to allow a collector to determine how many, if any records, have been lost in between the current analytics packet and the last received analytics packet, and one or more user defined fields such as class of service, type of service, etc.
- the record field 120 contains data for an enqueued or dequeued packet that a user configures the buffer analytics logic to capture. Examples of data that may be include in a record field includes:
- MAC SA/DA L2 Header Fields
- compressed versions i.e. last 24 bits
- IP SA/DA L3 Header
- compressed versions i.e. last 16 bits
- priority and protocol type i.e. last 16 bits
- User defined fields including one or more of:
- the record field 120 for an analytics packet contains information about an enqueued packet or dequeued packet to describe buffer occupancy characteristics such as overall buffer occupancy, buffer occupancy based on packet priority, unicast queue length, multicast queue length; packet properties such as drop, port mirrored, load balanced, bridged or routed, and packet length; and packet error properties such as Cyclic Redundancy Check (CRC), and various error protocols such as Runt, Giant, and Jabber.
- buffer occupancy characteristics such as overall buffer occupancy, buffer occupancy based on packet priority, unicast queue length, multicast queue length
- packet properties such as drop, port mirrored, load balanced, bridged or routed, and packet length
- packet error properties such as Cyclic Redundancy Check (CRC), and various error protocols such as Runt, Giant, and Jabber.
- information is included in the record field describing one or more of identification of ingress port of arrival of the packet at the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, Layer 4 source address and destination address, class of service, and timestamp of arrival at the ingress port.
- information is included in the record field describing one or more of identification of egress port for departure of the packet from the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, and timestamp of departure from the egress port.
- Other examples of data captured into user defined fields include an indication of a packet being rate limited, shaped, policed as well as any programmable bytes of the packet including payload.
- the size of the analytics packet may be the Maximum Transmit Unit (MTU), a switch specific analytics MTU, determined using a time-based method (e.g., analytics packet generated and transmitted at predetermined times), determined based on a selected number of packets, or by other techniques.
- MTU Maximum Transmit Unit
- time-based method e.g., analytics packet generated and transmitted at predetermined times
- FIG. 4 provides a flow chart that depicts the high level operations performed in a network device in generating and outputting analytics packets.
- a network device receives a packet.
- the network device captures information describing occupancy of a buffer caused by packet flow through the buffer in the network device.
- an analytics packet is generated for each packet that is enqueued to and/or dequeued from the buffer.
- a destination address is inserted into the analytics packet.
- the network device processes the packet in the normal course, and outputs an analytics packet to its destination (local or remote network destination) or to a local CPU of the network device.
- the capturing, generating, and outputting operations are triggered to be performed based on at least one of time and size of enqueued packet or dequeued packet.
- FIG. 5 illustrates a high level flow chart depicting the operations performed at a destination of the analytics packets.
- a collector device receives the analytics packets over time.
- the collector device parses the analytics packets to retrieve information in the individual records as well as the common header, and uses this information to replay buffer occupancy, perform traffic latency and perform other analysis.
- FIG. 6 shows an example of how a replay of buffer occupancy, subject to certain filtering criteria, may be made.
- a “*” represents data that has been stored into buffer and lack of “*” represents absence or removal of data from the buffer.
- a replay of the buffer may be achieved using specific pieces of information that are of interest to network administrators and application developers. Recording each of these categories would require enormous bandwidth if a complete enqueued or dequeued packet is captured.
- presented herein are techniques that enable a time-based complete replay of the buffer occupancy with resolution determined by a sampling period. These techniques provide visibility of traffic flows received by network devices. The information provided can be used by network administrators to gain insight into their specific network traffic, such as per-packet latency, buffer occupancy, and possible congestion sources. This information can lead to better allocation and provisioning of network resources, reduced congestion, and higher overall throughput. By parsing and aggregating relevant characteristics from each packet according to the techniques presented herein, bandwidth requirements associated with network monitoring are greatly reduced. As such, these techniques assist in reducing the amount of data exported for analysis.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Cardiology (AREA)
- General Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Techniques are presented herein to facilitate the monitoring of occupancy of a buffer in a network device. Packets are received at a network device. Information is captured describing occupancy of the buffer caused by packet flow through the buffer in the network device. Analytics packets are generated containing the information. The analytics packets from the network device for retrieval of the information contained therein for analysis, replay of buffer occupancy, etc.
Description
This application is a continuation of U.S. application Ser. No. 14/707,139, filed May 8, 2015, which in turn is turn is a continuation of U.S. application Ser. No. 13/708,265, filed Dec. 7, 2012, now U.S. Pat. No. 9,077,619, which in turn claims priority to U.S. Provisional Application No. 61/702,320, filed Sep. 18, 2012, entitled “Exporting Real Time Network Traffic Latency and Buffer Occupancy.” The entirety of these applications is incorporated herein by reference. This is an application for reissue of U.S. Pat. No. 9,641,407, and is a divisional of U.S. application Ser. No. 16/400,122, filed May 1, 2019, which is also an application for reissue of U.S. Pat. No. 9,641,407, which is a continuation of U.S. application Ser. No. 14/707,139, filed May 8, 2015, now U.S. Pat. No. 9,509,622, which is a continuation of U.S. application Ser. No. 13/708,265, filed Dec. 7, 2012, now U.S. Pat. No. 9,077,619, which claims the benefit of U.S. Provisional Application No. 61/702,320, filed Sep. 18, 2012.
The present disclosure relates generally to analysis of occupancy of a buffer in a network device.
In a computer network, data is transmitted from a source to a destination in the form of packets that generally pass through one or more network devices (e.g., switches, routers, firewalls, etc.). During the transmission, certain errors may arise that result in, for example, redundant data being added to the original data, dropped packets, etc. Massively Scalable Data Center and Cloud Computing systems are putting more traffic load on network equipment such that over-provisioned networks are no longer possible. Monitoring of a buffer in a network device is useful to gain knowledge for network administration, analysis, and performance.
Techniques are presented herein to facilitate the monitoring of occupancy of a buffer in a network device. Packets are received at a network device. Information is captured describing occupancy of the buffer caused by packet flow through the buffer in the network device. Analytics packets are generated containing the information. The analytics packets from the network device for retrieval of the information contained therein for analysis, replay of buffer occupancy, etc.
Complete network visibility into buffer occupancy and the ability to replay occupancy via export and post processing is important since network disruptions (e.g., microbursts) can occur at any time. Furthermore, the ability to replay buffer occupancy allows for effective diagnosis of network issues to provide corrective actions. Existing solutions such as port mirroring (i.e., Switched Port Analyzer (SPAN)) do not provide visibility of buffer occupancy. As such, presented herein are techniques for monitoring and replaying buffer occupancy.
Referring now to FIG. 1 , a diagram is shown of a network environment 5 in which a network device 10 is provided that is configured to generate buffer analytics packets based on occupancy of a buffer the network device 10. The network device 10 comprises a plurality of ports 12(1)-12(N), any of which can serve as an ingress port or egress port at any time. The network device includes a buffer 14, buffer analytics logic 16, a central processing unit (CPU) 18 and memory 19. It should be understood that there are other components of the network device 10, such as a switch fabric or application specific integrated circuit (ASIC), and the buffer 14 may reside the switch fabric. There are typically numerous buffers in the network device 10, but for simplicity only one is shown in FIG. 1 . It should be understood that the techniques presented herein are useful for each of a plurality of buffers in a network device. The buffer analytics logic 14 may be implemented in hardware by digital logic gates (and embedded in the switch fabric) or by software stored in memory 19 and executed by CPU 18.
Generally, the buffer analytics logic 16 captures information describing occupancy of the buffer 14 caused by packet flow through the buffer in the network device 10, and generates buffer analytics packets 30 containing the information. As will become apparent from the description below in connection with FIG. 2 , there are two types of buffer analytics packets: enqueue buffer analytics packets and dequeue buffer analytics packets. The buffer analytics packets 30 are then output from the network device 10 at a programmable time schedule (or based of packet size) in any one of several ways to allow for replay of the occupancy of the buffer.
First, the network device 10 may insert into buffer analytics packets 30 an address for a destination of the buffer analytics packet, e.g., address for any device connected to the network 40, such as collector device 60 having a CPU 62 and memory 64. The network device 10 sends the analytics packet 30 via network 40 to the destination collector device 60, which may be at any location, local or remote from network device 10.
Second, the network device 10 may output the analytics packet 30 to a dedicated port, e.g., port 12(4) of the network device 10 to which a collector device 70 is connected. The dedicated analytics port 12(4) can participate in port channel or fixed port distribution to expand bandwidth to a single or multiple monitor ports. The collector device 70, since it is connected directly to port 12(4), is usually local to the network device 10. The collector device 70 includes a CPU 72 and memory 74.
Third, the analytics packets 30 may be output to the onboard CPU 18 and memory 19 in the network device 10, such that CPU 18 and memory 19 also serve as a collector device. In any of these scenarios, the CPUs 18, 62 and 72 may replay and analyze the occupancy of the buffer 14 based on software instructions stored in its associated memory 19, 64 and 74, respectively. Moreover, the analytics packets are stored in the memory 19, 64 and 74 for the associated CPU 18, 62 and 72, respectively.
The network device 10 can be any network device now known or hereinafter developed, including a switch, router, gateway, a software stack on a host device, virtual network interface cards (VNICs) virtual switches, physical network interface cards (including those that support virtualization).
Reference is now made to FIG. 2 for a more detailed description of the buffer analytics logic 16. FIG. 2 shows that the buffer analytics logic 16 comprises an enqueue analytics packet generator 80 and a dequeue analytics packet generator 82. In addition, there are an admission control block 84, a departure control block 86, a packet assembler 88 and a multiplexer 90. The admission control block 84 and departure control block 86 are commonly found in a network device and are hardware (or software) blocks used to make processing decisions, such as a drop, scheduling, rate limiting, policing, shaping, etc.
The enqueue analytics packet generator 80 is configured to generate an analytics packet, called an enqueue buffer analytics packet shown at reference numeral 32, that describes/summarizes a packet being enqueued into buffer 14. Similarly, the dequeue analytics packet generator 82 is configured to generate an analytics packet, called a dequeue buffer analytics packet shown at reference numeral 34, that describes/summarizes a packet being dequeued from buffer 14. The packet assembler 88 assembles a packet 20 ready out from the buffer 14 for output from the network device.
The enqueue analytics packet generator 80 captures, for a packet enqueued to buffer 14, information describing one or more of identification of ingress port of arrival of the packet at the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, Layer 4 source address and destination address, class of service, and timestamp of arrival at the ingress port. Similarly, the dequeue analytics packet generator 82 captures, for a packet dequeued from the buffer 14, information describing one or more of identification of egress port for departure of the packet from the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, and timestamp of departure from the egress port.
The enqueue buffer analytics packet 32 generated by the enqueue analytics packet generator 80, dequeue buffer analytics packet 34 generated by the dequeue analytics packet generator 82, and packet 20 output by the packet assembler 88, are all supplied to a corresponding input of the multiplexer 90. The multiplexer 90 selectively outputs, at any given time, either a packet 20, an enqueue buffer analytics packet 32 or a dequeue buffer analytics packet 34. Priority is given to output of a packet 20 in order to maintain proper flow of network traffic through the network device 10. Trigger for output of an analytics packet may be based on time (according to a schedule) or size of a packet enqueued to the buffer or dequeued from the buffer.
Replay of buffer occupancy has several categories, namely the buffer enqueue, buffer dequeue, buffer enqueue drop, and buffer dequeue drop, each having properties to facilitate buffer visibility. The buffer enqueue is defined as any packet that is admitted to the buffer, while buffer dequeue is defined as any packet that is removed from the buffer. Buffer enqueue drop is defined as any packet that is not admitted to the buffer, while buffer dequeue drop is defined as any packet that is admitted to the buffer, but that will be dropped. Recording each of these categories would require enormous bandwidth if a complete packet is captured. However, the entire packet is not necessary for analysis and a replay of the buffer may use specific pieces of information that is of interest to network administrators and application developers.
Therefore, in accordance with examples presented herein, a networking device is configured to filter packets in a network buffer and to generate a “record” for selected packets. Each captured record corresponds to a single buffered packet and is, in essence, a truncation of the packet. The record includes only certain desired information about the packet (i.e. selected information desired by a network administrator).
Examples of record fields can include, but are not limited to: (1) Ethernet packet header information such as media access control (MAC) destination address/source address (DA/SA), Internet Protocol (IP) DA/SA, class of service (CoS), or type of service (TOS); (2) a timestamp of the packet arrival and/or departure to/from the buffer to create replay; (3) a timestamp based on a local or global clock derived from protocols such as Precision Time Protocol (PTP) or Network Time Protocol (NTP); (4) buffer occupancy characteristics such as overall, priority, unicast or multicast queue length; (5) packet properties such as drop, port mirrored, load balanced, bridged or routed, and packet length; or (6) packet error properties such as Cyclic Redundancy Check (CRC), Runt, Giant, and Jabber.
Reference is now made to FIG. 3 . FIG. 3 shows an example format of an enqueue buffer analytics packet 32 or dequeue buffer analytics packet 34. As explained above, an enqueue buffer analytics packet 32 summarizes a packet that is being enqueued to a buffer and a dequeue buffer analytics packet 34 summarizes a packet that is being dequeued from the buffer. These analytics packets, when accumulated over time for packets that pass through the buffer, allow for playback of occupancy characteristics of the buffer and traffic flow of packets through the buffer. As shown in FIG. 3 , an enqueue buffer analytics packet 32 and a dequeue buffer analytics packet 34 includes an Ethernet Header field 100, a Common Header field 110, one or more Records fields 120(1)-120(N) and a cyclic redundancy check (CRC) field 130.
The Ethernet header field 110 is field that is used to encapsulate the destination address of the analytics packet, e.g., to direct the analytics packet to a destination, i.e., a local or remote collector device (as indicated in FIG. 1 ), including to the CPU of the network device itself. To this end, the Ethernet header field 110 includes information, such as media access control (MAC) destination address/source address (DA/SA), optional IEEE 802.1q virtual local area network (VLAN) routing information, an optional Internet Protocol (IP) header including an IP SA and IP DA. Again, the Ethernet header field 110 contains information used to route the buffer analytics packet to its desired destination.
The common header field 110 contains information captured from the header of a packet that has been enqueued to or dequeued (as the case may be) from the buffer. Thus, the common header field summarizes the header of a packet that is enqueued to and dequeued from the buffer in the network device. For example, the common header field includes information for a common header version (to allow for backward/future compatibility), timescale information representing the timescale of the enqueued or dequeued packet, a timestamp of the packet arrival and/or departure to/from the buffer to allow for replay, a record number to allow a collector to determine how many, if any records, have been lost in between the current analytics packet and the last received analytics packet, and one or more user defined fields such as class of service, type of service, etc.
The record field 120 contains data for an enqueued or dequeued packet that a user configures the buffer analytics logic to capture. Examples of data that may be include in a record field includes:
Format version to indicate a format version of the record field for backward/future compatibility.
L2 Header Fields (MAC SA/DA) or compressed versions (i.e. last 24 bits) and priority
L3 Header (IP SA/DA) or compressed versions (i.e. last 16 bits) and priority and protocol type
L4 Header (TCP/UDP SA/DA)
User defined fields, including one or more of:
-
- Input/output port
- Drop—an indication of whether the packet was dropped.
- Queue id—identifier of the queue (unicast or multicast) to which the packet is
- associated.
- Queue length—length of the queue to which the packet is associated.
- Packet length—overall length of size of the packet.
- Timestamp (absolute or relative to common header from protocols such as
- Precision Time Protocol (PTP) or Network Time Protocol (NTP))
- Programmable bytes—any user configurable one or more bytes of the payload of a packet
- Internally specific fields such as logical interface mapped from table with keys such as {ingress/egress port, vlan}
Last record—to indicate that this is last record field in the analytics packet.
Thus, to summarize, the record field 120 for an analytics packet contains information about an enqueued packet or dequeued packet to describe buffer occupancy characteristics such as overall buffer occupancy, buffer occupancy based on packet priority, unicast queue length, multicast queue length; packet properties such as drop, port mirrored, load balanced, bridged or routed, and packet length; and packet error properties such as Cyclic Redundancy Check (CRC), and various error protocols such as Runt, Giant, and Jabber. More specifically, for a packet enqueued to the buffer, information is included in the record field describing one or more of identification of ingress port of arrival of the packet at the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, Layer 4 source address and destination address, class of service, and timestamp of arrival at the ingress port. Similarly, for a packet dequeued from the buffer, information is included in the record field describing one or more of identification of egress port for departure of the packet from the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, and timestamp of departure from the egress port. Other examples of data captured into user defined fields include an indication of a packet being rate limited, shaped, policed as well as any programmable bytes of the packet including payload.
The size of the analytics packet (Ethernet header field, common header field and records) may be the Maximum Transmit Unit (MTU), a switch specific analytics MTU, determined using a time-based method (e.g., analytics packet generated and transmitted at predetermined times), determined based on a selected number of packets, or by other techniques.
Reference is now made to FIG. 4 . FIG. 4 provides a flow chart that depicts the high level operations performed in a network device in generating and outputting analytics packets. At 200, a network device receives a packet. At 210, the network device captures information describing occupancy of a buffer caused by packet flow through the buffer in the network device. At 220, an analytics packet is generated for each packet that is enqueued to and/or dequeued from the buffer. At 230, a destination address is inserted into the analytics packet. At 240, the network device processes the packet in the normal course, and outputs an analytics packet to its destination (local or remote network destination) or to a local CPU of the network device. The capturing, generating, and outputting operations are triggered to be performed based on at least one of time and size of enqueued packet or dequeued packet.
By generating and exporting analytics packets that summarize properties of packets enqueued to and dequeued from a buffer in a network device, a replay of the buffer may be achieved using specific pieces of information that are of interest to network administrators and application developers. Recording each of these categories would require enormous bandwidth if a complete enqueued or dequeued packet is captured.
In summary, presented herein are techniques that enable a time-based complete replay of the buffer occupancy with resolution determined by a sampling period. These techniques provide visibility of traffic flows received by network devices. The information provided can be used by network administrators to gain insight into their specific network traffic, such as per-packet latency, buffer occupancy, and possible congestion sources. This information can lead to better allocation and provisioning of network resources, reduced congestion, and higher overall throughput. By parsing and aggregating relevant characteristics from each packet according to the techniques presented herein, bandwidth requirements associated with network monitoring are greatly reduced. As such, these techniques assist in reducing the amount of data exported for analysis.
The above description is intended by way of example only.
Claims (43)
1. A method comprising:
at a collector device configured to be in communication with a network device operating in a network:
receiving analytics packets containing information describing occupancy of a buffer of the network device caused by packet flow through the buffer in the network device, each analytics packet including a record summarizing characteristics of a packet enqueued in the buffer or of a packet dequeued from the buffer; and
replaying the information pertaining to the occupancy of the buffer over time based on the analytics packets, by generating data for visually presenting to a user the information pertaining to the occupancy of the buffer over time.
2. The method of claim 1 , wherein replaying is based on one or more filtering criteria.
3. The method of claim 1 , wherein the information describes at least one of: identification of ingress port of arrival of a packet at the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, Layer 4 source address and destination address, class of service, or timestamp of arrival of a packet at the ingress port.
4. The method of claim 1 , wherein the information describes at least one of: identification of egress port for departure of a packet from the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, or timestamp of departure of a packet from the egress port.
5. The method of claim 1 , wherein the analytics packets include enqueue analytics packets and dequeue analytics packets, the enqueue analytics packets including information describing properties associated with a packet being enqueued to the buffer in the network device and the dequeue analytics packets including information describing properties associated with a packet being dequeued from the buffer in the network device.
6. The method of claim 1 , wherein the information describes buffer occupancy characteristics of the buffer including at least one of: overall buffer occupancy, buffer occupancy based on packet priority, unicast queue length or multicast queue length.
7. The method of claim 1 , wherein the information describes packet processing properties for packets processed by the network device including at least one of: drop, port mirrored, load balanced, bridged or routed, or packet length.
8. The method of claim 1 , wherein the information describes packet processing properties for packets corresponding to user defined parameters for one or more of: rate limited, shaped, policed or any programmable bytes of the packet including payload.
9. An apparatus comprising:
a memory;
a processor coupled to the memory and configured to be in communication with a network device operating in a network, and configured to:
receive analytics packets containing information describing occupancy of a buffer of the network device caused by packet flow through the buffer in the network device, each analytics packet including a record summarizing characteristics of a packet enqueued in the buffer or of a packet dequeued from the buffer; and
replay the information pertaining to the occupancy of the buffer over time based on the analytics packets, by generating data for visually presenting to a user the information pertaining to the occupancy of the buffer over time.
10. The apparatus of claim 9 , wherein the processor is configured to generate data to replay the information based on one or more filtering criteria.
11. The apparatus of claim 9 , wherein the information describes at least one of: identification of ingress port of arrival of a packet at the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, Layer 4 source address and destination address, class of service, or timestamp of arrival of a packet at the ingress port.
12. The apparatus of claim 9 , wherein the analytics packets include enqueue analytics packets and dequeue analytics packets, the enqueue analytics packets including information describing properties associated with a packet being enqueued to the buffer in the network device and the dequeue analytics packets including information describing properties associated with a packet being dequeued from the buffer in the network device.
13. The apparatus of claim 9 , wherein the information describes buffer occupancy characteristics of the buffer including at least one of: overall buffer occupancy, buffer occupancy based on packet priority, unicast queue length or multicast queue length.
14. The apparatus of claim 9 , wherein the information describes packet processing properties for packets processed by the network device including at least one of: drop, port mirrored, load balanced, bridged or routed, or packet length.
15. The apparatus of claim 9 , wherein the information describes packet processing properties for packets corresponding to user defined parameters for one or more of: rate limited, shaped, policed or any programmable bytes of the packet including payload.
16. A non-transitory computer readable tangible storage media encoded with instructions that, when executed by a processor of a collector device in communication with a network device operating in the network, cause the processor to:
receive analytics packets containing information describing occupancy of a buffer of the network device caused by packet flow through the buffer in the network device, each analytics packet including a record summarizing characteristics of a packet enqueued in the buffer or of a packet dequeued from the buffer; and
replay the information pertaining to the occupancy of the buffer over time based on the analytics packets, by generating data for visually presenting to a user the information pertaining to the occupancy of the buffer over time.
17. The non-transitory computer readable tangible storage media of claim 16 , further comprising instructions to generate data to replay the information based on one or more filtering criteria.
18. The non-transitory computer readable tangible storage media of claim 16 , wherein the information describes at least one of: identification of ingress port of arrival of a packet at the network device, Layer 2 source address and destination address, Layer 3 source address and destination address, Layer 4 source address and destination address, class of service, or timestamp of arrival of a packet at the ingress port.
19. The non-transitory computer readable tangible storage media of claim 16 , wherein the analytics packets include enqueue analytics packets and dequeue analytics packets, the enqueue analytics packets including information describing properties associated with a packet being enqueued to the buffer in the network device and the dequeue analytics packets including information describing properties associated with a packet being dequeued from the buffer in the network device.
20. The non-transitory computer readable tangible storage media of claim 16 , wherein the information describing buffer occupancy characteristics of the buffer including at least one of: overall buffer occupancy, buffer occupancy based on packet priority, unicast queue length or multicast queue length.
21. A method comprising:
receiving packets at a network device;
capturing information describing an occupancy of a buffer caused by packet flow through the buffer in the network device;
selecting one or more packets by applying a filter to the packets in the buffer to provide selected packets;
generating an analytics packet including packet characteristics of one or more of the selected packets that flowed through the buffer, wherein the packet characteristics include one or more of: an identification of ingress port of arrival of the packet at the network device, a Layer 2 address, a Layer 3 address, a Layer 4 address, a class of service, or a timestamp corresponding to a packet arrival time at the ingress port;
sending the analytics packet to a collector device for analysis of the analytics packet.
22. The method of claim 21 , further comprising:
receiving the analytics packet at the collector device; and
performing the analysis of the analytics packet at the collector device.
23. The method of claim 22 , wherein the receiving and the performing are performed by a CPU and a memory in the network device.
24. The method of claim 22 , wherein the receiving the analytics packet comprises receiving the analytics packet at the collector device that is connected to the network device via a network.
25. The method of claim 21 , wherein sending the analytics packet to the collector device includes sending the analytics packet from an egress port on the network device.
26. The method of claim 21 , wherein the sending the analytics packet comprises sending the analytics packet on a programmable time schedule.
27. A method comprising:
receiving packets at an ingress port on a network device;
placing the packets in a buffer prior to the packets being sent out an egress port of the network device;
selecting one or more packets by applying a filter to the packets in the buffer to provide selected packets;
generating analytics information describing an occupancy of the buffer, the analytics information including packet characteristics relating to one or more of the selected packets; and
sending the analytics information to a collector device for analysis.
28. The method of claim 27 , wherein the filter relates to the occupancy of the buffer.
29. The method of claim 27 , wherein the packet characteristics include one or more of: an identification of ingress port of arrival of a packet at the network device, a Layer 2 address, a Layer 3 address, a Layer 4 address, a class of service, or a timestamp corresponding to a packet arrival time at the ingress port.
30. The method of claim 27 , further comprising:
receiving the analytics information at the collector device; and
performing the analysis of the analytics information at the collector device.
31. The method of claim 30 , wherein the receiving and the performing are performed by a CPU and a memory in the network device.
32. The method of claim 30 , wherein the receiving the analytics information comprises receiving the analytics information at the collector device that is connected to the network device via a network.
33. The method of claim 27 , wherein sending the analytics information to the collector device includes generating an analytics packet and sending the analytics packet from an egress port on the network device.
34. The method of claim 27 , wherein the sending includes sending the analytics information on a programmable time schedule.
35. The method of claim 27 , wherein the analytics information includes queue length information.
36. The method of claim 27 , wherein the packet characteristics include an indication whether a packet was dropped due to the occupancy of the buffer.
37. A network device comprising:
a plurality of ingress ports and a plurality of egress ports;
a buffer to temporarily store one or more incoming packets received by the network device through one of the ingress ports; and
an analytics logic configured to select one or more packets by applying a filter to the packets in the buffer to provide one or more selected packets, generate analytics information describing an occupancy of the buffer, and send the analytics information to a collector device for analysis, wherein the analytics information includes packet characteristics relating to one or more of the selected packets.
38. The network device of claim 27 , wherein the analytics information includes queue length information.
39. The network device of claim 37 , wherein the packet characteristics include an indication whether a packet was dropped due to the occupancy of the buffer.
40. The network device of claim 37 , wherein the packet characteristics include one or more of: an identification of ingress port of arrival of a packet at the network device, a Layer 2 address, a Layer 3 address, a Layer 4 address, a class of service, or a timestamp corresponding to a packet arrival time at the ingress port.
41. The network device of claim 37 , wherein the collector device comprises a CPU and a memory in the network device.
42. The network device of claim 37 , wherein the collector device is connected to the network device via a network.
43. The network device of claim 37 , further comprising an analytics packet assembler configured to generate an analytics packet including the analytics information and send the analytics packet from one of the egress ports.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/329,520 USRE50298E1 (en) | 2012-09-18 | 2021-05-25 | Exporting real time network traffic latency and buffer occupancy |
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261702320P | 2012-09-18 | 2012-09-18 | |
| US13/708,265 US9077619B2 (en) | 2012-09-18 | 2012-12-07 | Exporting real time network traffic latency and buffer occupancy |
| US14/707,139 US9509622B2 (en) | 2012-09-18 | 2015-05-08 | Exporting real time network traffic latency and buffer occupancy |
| US15/285,603 US9641407B2 (en) | 2012-09-18 | 2016-10-05 | Exporting real time network traffic latency and buffer occupancy |
| US16/400,122 USRE48645E1 (en) | 2012-09-18 | 2019-05-01 | Exporting real time network traffic latency and buffer occupancy |
| US17/329,520 USRE50298E1 (en) | 2012-09-18 | 2021-05-25 | Exporting real time network traffic latency and buffer occupancy |
Related Parent Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/285,603 Reissue US9641407B2 (en) | 2012-09-18 | 2016-10-05 | Exporting real time network traffic latency and buffer occupancy |
| US16/400,122 Division USRE48645E1 (en) | 2012-09-18 | 2019-05-01 | Exporting real time network traffic latency and buffer occupancy |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| USRE50298E1 true USRE50298E1 (en) | 2025-02-11 |
Family
ID=50274367
Family Applications (5)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/708,265 Active 2033-03-13 US9077619B2 (en) | 2012-09-18 | 2012-12-07 | Exporting real time network traffic latency and buffer occupancy |
| US14/707,139 Active US9509622B2 (en) | 2012-09-18 | 2015-05-08 | Exporting real time network traffic latency and buffer occupancy |
| US15/285,603 Ceased US9641407B2 (en) | 2012-09-18 | 2016-10-05 | Exporting real time network traffic latency and buffer occupancy |
| US16/400,122 Active USRE48645E1 (en) | 2012-09-18 | 2019-05-01 | Exporting real time network traffic latency and buffer occupancy |
| US17/329,520 Active USRE50298E1 (en) | 2012-09-18 | 2021-05-25 | Exporting real time network traffic latency and buffer occupancy |
Family Applications Before (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/708,265 Active 2033-03-13 US9077619B2 (en) | 2012-09-18 | 2012-12-07 | Exporting real time network traffic latency and buffer occupancy |
| US14/707,139 Active US9509622B2 (en) | 2012-09-18 | 2015-05-08 | Exporting real time network traffic latency and buffer occupancy |
| US15/285,603 Ceased US9641407B2 (en) | 2012-09-18 | 2016-10-05 | Exporting real time network traffic latency and buffer occupancy |
| US16/400,122 Active USRE48645E1 (en) | 2012-09-18 | 2019-05-01 | Exporting real time network traffic latency and buffer occupancy |
Country Status (5)
| Country | Link |
|---|---|
| US (5) | US9077619B2 (en) |
| EP (1) | EP2898637B1 (en) |
| CN (1) | CN104641602B (en) |
| IN (1) | IN2015MN00444A (en) |
| WO (1) | WO2014046932A1 (en) |
Families Citing this family (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9077619B2 (en) | 2012-09-18 | 2015-07-07 | Cisco Technology, Inc. | Exporting real time network traffic latency and buffer occupancy |
| US10003530B2 (en) * | 2014-07-22 | 2018-06-19 | Futurewei Technologies, Inc. | Service chain header and metadata transport |
| JP6402576B2 (en) * | 2014-10-15 | 2018-10-10 | 富士通株式会社 | COMMUNICATION DEVICE, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, AND COMMUNICATION DEVICE CONTROL METHOD |
| JP2017027196A (en) * | 2015-07-17 | 2017-02-02 | 株式会社リコー | Communication device, power control method, and power control program |
| US9929928B1 (en) * | 2015-12-24 | 2018-03-27 | Microsemi Solutions (U.S.), Inc. | Packet transmitter and method for timestamping packets |
| US10015699B2 (en) * | 2016-03-28 | 2018-07-03 | Cisco Technology, Inc. | Methods and devices for policing traffic flows in a network |
| US10218625B2 (en) * | 2016-03-30 | 2019-02-26 | New York University | Methods and apparatus for alleviating congestion at a switch, such as a shallow buffered switch |
| CN109644124B (en) * | 2016-07-06 | 2021-12-07 | 瑞典爱立信有限公司 | Transmission and reception of time stamp information |
| US10764209B2 (en) | 2017-03-28 | 2020-09-01 | Mellanox Technologies Tlv Ltd. | Providing a snapshot of buffer content in a network element using egress mirroring |
| US10248357B2 (en) * | 2017-07-06 | 2019-04-02 | Seagate Technology Llc | Data storage system with hardware-based message routing |
| US10834006B2 (en) | 2019-01-24 | 2020-11-10 | Mellanox Technologies, Ltd. | Network traffic disruptions |
| US10999366B2 (en) * | 2019-03-10 | 2021-05-04 | Mellanox Technologies Tlv Ltd. | Mirroring dropped packets |
| US10798014B1 (en) * | 2019-04-05 | 2020-10-06 | Arista Networks, Inc. | Egress maximum transmission unit (MTU) enforcement |
| CN110365551B (en) * | 2019-07-04 | 2021-05-07 | 杭州吉讯汇通科技有限公司 | Network information acquisition method, device, equipment and medium |
| US12231401B2 (en) | 2022-04-06 | 2025-02-18 | Mellanox Technologies, Ltd | Efficient and flexible flow inspector |
| US12224950B2 (en) | 2022-11-02 | 2025-02-11 | Mellanox Technologies, Ltd | Efficient network device work queue |
Citations (70)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5546389A (en) * | 1993-07-13 | 1996-08-13 | Alcatel N.V. | Method of controlling access to a buffer and a device for temporary storage of data packets and an exchange with such a device |
| US6170022B1 (en) * | 1998-04-03 | 2001-01-02 | International Business Machines Corporation | Method and system for monitoring and controlling data flow in a network congestion state by changing each calculated pause time by a random amount |
| US6192406B1 (en) * | 1997-06-13 | 2001-02-20 | At&T Corp. | Startup management system and method for networks |
| US6246684B1 (en) | 1997-12-24 | 2001-06-12 | Nortel Networks Limited | Method and apparatus for re-ordering data packets in a network environment |
| US6333917B1 (en) * | 1998-08-19 | 2001-12-25 | Nortel Networks Limited | Method and apparatus for red (random early detection) and enhancements. |
| US20030007456A1 (en) * | 2001-06-25 | 2003-01-09 | Praveen Gupta | Triggered packet data rate change in a communication system |
| US20030081546A1 (en) * | 2001-10-26 | 2003-05-01 | Luminous Networks Inc. | Aggregate fair queuing technique in a communications system using a class based queuing architecture |
| US20030231596A1 (en) | 2001-12-14 | 2003-12-18 | Lg Electronics Inc. | Processing a duplicate data packet |
| US6690646B1 (en) | 1999-07-13 | 2004-02-10 | International Business Machines Corporation | Network capacity planning based on buffers occupancy monitoring |
| US20040128343A1 (en) * | 2001-06-19 | 2004-07-01 | Mayer Daniel J | Method and apparatus for distributing video programs using partial caching |
| US6788697B1 (en) * | 1999-12-06 | 2004-09-07 | Nortel Networks Limited | Buffer management scheme employing dynamic thresholds |
| US6853623B2 (en) | 1999-03-05 | 2005-02-08 | Cisco Technology, Inc. | Remote monitoring of switch network |
| US6892237B1 (en) | 2000-03-28 | 2005-05-10 | Cisco Technology, Inc. | Method and apparatus for high-speed parsing of network messages |
| US20050180250A1 (en) * | 2004-02-13 | 2005-08-18 | International Business Machines Corporation | Data packet buffering system with automatic threshold optimization |
| US20050182850A1 (en) | 2002-05-22 | 2005-08-18 | Michinari Kohno | Protocol information processing system and method information processing device and method recording medium and program |
| US20050240745A1 (en) | 2003-12-18 | 2005-10-27 | Sundar Iyer | High speed memory control and I/O processor system |
| US6990202B2 (en) | 2001-10-04 | 2006-01-24 | Hewlett-Packard Development Company, L.P. | Packetizing devices for secure scalable data streaming |
| US20060062209A1 (en) | 2004-09-20 | 2006-03-23 | Camiant, Inc. | Method for dynamic rate adaptation based on selective passive network monitoring |
| US7106731B1 (en) | 1997-12-31 | 2006-09-12 | Cisco Technology, Inc. | Router with class of service mapping |
| US20060253900A1 (en) | 2004-12-21 | 2006-11-09 | Qualcomm Incorporated | Client assisted firewall configuration |
| US20060268847A1 (en) | 2002-06-13 | 2006-11-30 | Nice Systems Ltd. | Voice over IP capturing |
| US20070201870A1 (en) * | 2006-02-24 | 2007-08-30 | Cohen Earl T | Buffering schemes for optical packet processing |
| US20080049787A1 (en) * | 2006-08-22 | 2008-02-28 | Mcnaughton James L | System and method for controlling network bandwidth with a connection admission control engine |
| WO2008097001A1 (en) | 2007-02-05 | 2008-08-14 | Samsung Electronics Co., Ltd. | Method and apparatus for transmitting/receiving variable-sized packet in a mobile communication system |
| US20080279207A1 (en) * | 2007-05-11 | 2008-11-13 | Verizon Services Organization Inc. | Method and apparatus for improving performance in a network using a virtual queue and a switched poisson process traffic model |
| US20080285463A1 (en) | 2007-05-14 | 2008-11-20 | Cisco Technology, Inc. | Tunneling reports for real-time internet protocol media streams |
| US7466703B1 (en) * | 1998-05-01 | 2008-12-16 | Alcatel-Lucent Usa Inc. | Scalable high speed router apparatus |
| US7474666B2 (en) | 2003-09-03 | 2009-01-06 | Cisco Technology, Inc. | Switch port analyzers |
| US20090034416A1 (en) | 2007-07-30 | 2009-02-05 | Canon Kabushiki Kaisha | Method for the transmission of data packets in a tunnel, corresponding computer program product, storage means and tunnel end-point |
| US20090041011A1 (en) | 2007-04-03 | 2009-02-12 | Scott Sheppard | Lawful Interception of Broadband Data Traffic |
| US20090171474A1 (en) | 2007-12-29 | 2009-07-02 | Amx, Llc | Method, computer-readable medium, and system for discovery and registration of controlled devices associated with self-describing modules |
| US20090252040A1 (en) * | 2008-03-28 | 2009-10-08 | Mustafa Kocaturk | Method and system for telecommunications using layer 3 packets obtained from a sequence of layer 2 radio link control layer data frames |
| US20100023635A1 (en) * | 2008-07-28 | 2010-01-28 | Francis Roger Labonte | Data streaming through time-varying transport media |
| US7656818B1 (en) | 2005-10-28 | 2010-02-02 | Cisco Technology, Inc. | Customizable network device management methods and systems |
| US20100054152A1 (en) | 2008-09-04 | 2010-03-04 | Cisco Technology, Inc. | ERSPAN dynamic session negotiation |
| US20100154033A1 (en) | 2008-12-16 | 2010-06-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and nodes for securing a communication network |
| US20100162399A1 (en) * | 2008-12-18 | 2010-06-24 | At&T Intellectual Property I, L.P. | Methods, apparatus, and computer program products that monitor and protect home and small office networks from botnet and malware activity |
| US7792130B2 (en) | 2007-08-12 | 2010-09-07 | Lg Electronics Inc. | Wireless device and method of transmitting uplink data and buffer status reports in a wireless communications system |
| US7830793B2 (en) | 2004-10-22 | 2010-11-09 | Cisco Technology, Inc. | Network device architecture for consolidating input/output and reducing latency |
| US20100287297A1 (en) | 2009-05-10 | 2010-11-11 | Yves Lefebvre | Informative data streaming server |
| US7899048B1 (en) | 2003-01-15 | 2011-03-01 | Cisco Technology, Inc. | Method and apparatus for remotely monitoring network traffic through a generic network |
| US7961621B2 (en) | 2005-10-11 | 2011-06-14 | Cisco Technology, Inc. | Methods and devices for backward congestion notification |
| US7969971B2 (en) | 2004-10-22 | 2011-06-28 | Cisco Technology, Inc. | Ethernet extension for the data center |
| GB2477640A (en) | 2010-02-03 | 2011-08-10 | Orbital Multi Media Holdings Corp | Controlling transmission rate dependent upon block ack/nak bitmask signals and receiver buffer fill levels |
| US8116307B1 (en) | 2004-09-23 | 2012-02-14 | Juniper Networks, Inc. | Packet structure for mirrored traffic flow |
| US20120093505A1 (en) | 2009-06-26 | 2012-04-19 | Tet Hin Yeap | Method and system for service-based regulation of traffic flow to customer premises devices |
| US20120120254A1 (en) * | 2009-08-31 | 2012-05-17 | Wai-Tian Tan | Reducing communication delay of video data |
| US8208389B2 (en) | 2006-07-20 | 2012-06-26 | Cisco Technology, Inc. | Methods and apparatus for improved determination of network metrics |
| US8238287B1 (en) * | 2004-10-06 | 2012-08-07 | Marvell International Ltd. | Method and apparatus for providing quality of service (QoS) in a wireless local area network |
| US20120215909A1 (en) | 2011-01-27 | 2012-08-23 | Verint Systems Ltd. | System and method for efficient classification and processing of network traffic |
| US8274905B2 (en) | 2006-08-22 | 2012-09-25 | Embarq Holdings Company, Llc | System and method for displaying a graph representative of network performance over a time period |
| US20120317276A1 (en) * | 2011-05-24 | 2012-12-13 | Muraliraja Muniraju | Systems and methods for analyzing network metrics |
| US20120330804A1 (en) * | 2006-08-22 | 2012-12-27 | Morrill Robert J | System and method for billing utilizing account status |
| US20120327779A1 (en) * | 2009-06-12 | 2012-12-27 | Cygnus Broadband, Inc. | Systems and methods for congestion detection for use in prioritizing and scheduling packets in a communication network |
| US20130007223A1 (en) * | 2006-06-09 | 2013-01-03 | Qualcomm Incorporated | Enhanced block-request streaming system for handling low-latency streaming |
| US20130067034A1 (en) * | 2011-03-08 | 2013-03-14 | Riverbed Technology, Inc. | Accessing Network Traffic Data at Multiple Time Scales and Levels of Detail |
| US20130155858A1 (en) | 2011-12-19 | 2013-06-20 | International Business Machines Corporation | Hierarchical occupancy-based congestion management |
| US20130188482A1 (en) * | 2012-01-19 | 2013-07-25 | Comcast Cable Communications, Llc | Adaptive buffer control |
| US20130194923A1 (en) | 2012-01-28 | 2013-08-01 | International Business Machines Corporation | Converged enhanced ethernet network |
| US8520522B1 (en) * | 2010-10-15 | 2013-08-27 | Juniper Networks, Inc. | Transmit-buffer management for priority-based flow control |
| US8601297B1 (en) * | 2010-06-18 | 2013-12-03 | Google Inc. | Systems and methods for energy proportional multiprocessor networks |
| US8605588B2 (en) | 2007-05-08 | 2013-12-10 | Cisco Technology, Inc. | Packet drop analysis for flows of data |
| US8640036B2 (en) | 2010-04-07 | 2014-01-28 | Cisco Techology, Inc. | Messaging and presence protocol as a configuration and management bus for embedded devices |
| US8681806B2 (en) | 2008-06-23 | 2014-03-25 | Koninklijke Philips N.V. | Method for communicating in a network and radio stations associated |
| US8767551B2 (en) | 2011-01-27 | 2014-07-01 | Verint Systems, Ltd. | System and method for flow table management |
| US8817615B2 (en) * | 2010-03-05 | 2014-08-26 | Nec Europe Ltd. | Method for operating a wireless network and a wireless network |
| US8964547B1 (en) * | 2004-06-08 | 2015-02-24 | Oracle America, Inc. | Credit announcement |
| US20150244637A1 (en) | 2012-09-18 | 2015-08-27 | Cisco Technology, Inc. | Exporting Real Time Network Traffic Latency and Buffer Occupancy |
| US9154452B2 (en) * | 2012-03-29 | 2015-10-06 | Alcatel Lucent | Methods and apparatuses for adapting buffer capacity at routers |
| US9917874B2 (en) * | 2009-09-22 | 2018-03-13 | Qualcomm Incorporated | Enhanced block-request streaming using block partitioning or request controls for improved client-side handling |
-
2012
- 2012-12-07 US US13/708,265 patent/US9077619B2/en active Active
-
2013
- 2013-09-11 WO PCT/US2013/059180 patent/WO2014046932A1/en active Application Filing
- 2013-09-11 CN CN201380048250.6A patent/CN104641602B/en not_active Expired - Fee Related
- 2013-09-11 EP EP13771660.1A patent/EP2898637B1/en active Active
- 2013-09-11 IN IN444MUN2015 patent/IN2015MN00444A/en unknown
-
2015
- 2015-05-08 US US14/707,139 patent/US9509622B2/en active Active
-
2016
- 2016-10-05 US US15/285,603 patent/US9641407B2/en not_active Ceased
-
2019
- 2019-05-01 US US16/400,122 patent/USRE48645E1/en active Active
-
2021
- 2021-05-25 US US17/329,520 patent/USRE50298E1/en active Active
Patent Citations (74)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5546389A (en) * | 1993-07-13 | 1996-08-13 | Alcatel N.V. | Method of controlling access to a buffer and a device for temporary storage of data packets and an exchange with such a device |
| US6192406B1 (en) * | 1997-06-13 | 2001-02-20 | At&T Corp. | Startup management system and method for networks |
| US6246684B1 (en) | 1997-12-24 | 2001-06-12 | Nortel Networks Limited | Method and apparatus for re-ordering data packets in a network environment |
| US7106731B1 (en) | 1997-12-31 | 2006-09-12 | Cisco Technology, Inc. | Router with class of service mapping |
| US6170022B1 (en) * | 1998-04-03 | 2001-01-02 | International Business Machines Corporation | Method and system for monitoring and controlling data flow in a network congestion state by changing each calculated pause time by a random amount |
| US7466703B1 (en) * | 1998-05-01 | 2008-12-16 | Alcatel-Lucent Usa Inc. | Scalable high speed router apparatus |
| US6333917B1 (en) * | 1998-08-19 | 2001-12-25 | Nortel Networks Limited | Method and apparatus for red (random early detection) and enhancements. |
| US6853623B2 (en) | 1999-03-05 | 2005-02-08 | Cisco Technology, Inc. | Remote monitoring of switch network |
| US6690646B1 (en) | 1999-07-13 | 2004-02-10 | International Business Machines Corporation | Network capacity planning based on buffers occupancy monitoring |
| US6788697B1 (en) * | 1999-12-06 | 2004-09-07 | Nortel Networks Limited | Buffer management scheme employing dynamic thresholds |
| US7395332B2 (en) | 2000-03-28 | 2008-07-01 | Cisco Technology, Inc. | Method and apparatus for high-speed parsing of network messages |
| US6892237B1 (en) | 2000-03-28 | 2005-05-10 | Cisco Technology, Inc. | Method and apparatus for high-speed parsing of network messages |
| US20040128343A1 (en) * | 2001-06-19 | 2004-07-01 | Mayer Daniel J | Method and apparatus for distributing video programs using partial caching |
| US20030007456A1 (en) * | 2001-06-25 | 2003-01-09 | Praveen Gupta | Triggered packet data rate change in a communication system |
| US6990202B2 (en) | 2001-10-04 | 2006-01-24 | Hewlett-Packard Development Company, L.P. | Packetizing devices for secure scalable data streaming |
| US20030081546A1 (en) * | 2001-10-26 | 2003-05-01 | Luminous Networks Inc. | Aggregate fair queuing technique in a communications system using a class based queuing architecture |
| US20030231596A1 (en) | 2001-12-14 | 2003-12-18 | Lg Electronics Inc. | Processing a duplicate data packet |
| US20050182850A1 (en) | 2002-05-22 | 2005-08-18 | Michinari Kohno | Protocol information processing system and method information processing device and method recording medium and program |
| US20060268847A1 (en) | 2002-06-13 | 2006-11-30 | Nice Systems Ltd. | Voice over IP capturing |
| US7899048B1 (en) | 2003-01-15 | 2011-03-01 | Cisco Technology, Inc. | Method and apparatus for remotely monitoring network traffic through a generic network |
| US8170025B2 (en) * | 2003-09-03 | 2012-05-01 | Cisco Technology, Inc. | Switch port analyzers |
| US7474666B2 (en) | 2003-09-03 | 2009-01-06 | Cisco Technology, Inc. | Switch port analyzers |
| US20050240745A1 (en) | 2003-12-18 | 2005-10-27 | Sundar Iyer | High speed memory control and I/O processor system |
| US20050180250A1 (en) * | 2004-02-13 | 2005-08-18 | International Business Machines Corporation | Data packet buffering system with automatic threshold optimization |
| US8964547B1 (en) * | 2004-06-08 | 2015-02-24 | Oracle America, Inc. | Credit announcement |
| US20060062209A1 (en) | 2004-09-20 | 2006-03-23 | Camiant, Inc. | Method for dynamic rate adaptation based on selective passive network monitoring |
| US8116307B1 (en) | 2004-09-23 | 2012-02-14 | Juniper Networks, Inc. | Packet structure for mirrored traffic flow |
| US8238287B1 (en) * | 2004-10-06 | 2012-08-07 | Marvell International Ltd. | Method and apparatus for providing quality of service (QoS) in a wireless local area network |
| US7830793B2 (en) | 2004-10-22 | 2010-11-09 | Cisco Technology, Inc. | Network device architecture for consolidating input/output and reducing latency |
| US7969971B2 (en) | 2004-10-22 | 2011-06-28 | Cisco Technology, Inc. | Ethernet extension for the data center |
| US20060253900A1 (en) | 2004-12-21 | 2006-11-09 | Qualcomm Incorporated | Client assisted firewall configuration |
| US7961621B2 (en) | 2005-10-11 | 2011-06-14 | Cisco Technology, Inc. | Methods and devices for backward congestion notification |
| US7656818B1 (en) | 2005-10-28 | 2010-02-02 | Cisco Technology, Inc. | Customizable network device management methods and systems |
| US20070201870A1 (en) * | 2006-02-24 | 2007-08-30 | Cohen Earl T | Buffering schemes for optical packet processing |
| US20130007223A1 (en) * | 2006-06-09 | 2013-01-03 | Qualcomm Incorporated | Enhanced block-request streaming system for handling low-latency streaming |
| US8208389B2 (en) | 2006-07-20 | 2012-06-26 | Cisco Technology, Inc. | Methods and apparatus for improved determination of network metrics |
| US20120330804A1 (en) * | 2006-08-22 | 2012-12-27 | Morrill Robert J | System and method for billing utilizing account status |
| US20080049787A1 (en) * | 2006-08-22 | 2008-02-28 | Mcnaughton James L | System and method for controlling network bandwidth with a connection admission control engine |
| US8274905B2 (en) | 2006-08-22 | 2012-09-25 | Embarq Holdings Company, Llc | System and method for displaying a graph representative of network performance over a time period |
| WO2008097001A1 (en) | 2007-02-05 | 2008-08-14 | Samsung Electronics Co., Ltd. | Method and apparatus for transmitting/receiving variable-sized packet in a mobile communication system |
| US20090100040A1 (en) | 2007-04-03 | 2009-04-16 | Scott Sheppard | Lawful interception of broadband data traffic |
| US20090041011A1 (en) | 2007-04-03 | 2009-02-12 | Scott Sheppard | Lawful Interception of Broadband Data Traffic |
| US8605588B2 (en) | 2007-05-08 | 2013-12-10 | Cisco Technology, Inc. | Packet drop analysis for flows of data |
| US20080279207A1 (en) * | 2007-05-11 | 2008-11-13 | Verizon Services Organization Inc. | Method and apparatus for improving performance in a network using a virtual queue and a switched poisson process traffic model |
| US20080285463A1 (en) | 2007-05-14 | 2008-11-20 | Cisco Technology, Inc. | Tunneling reports for real-time internet protocol media streams |
| US20090034416A1 (en) | 2007-07-30 | 2009-02-05 | Canon Kabushiki Kaisha | Method for the transmission of data packets in a tunnel, corresponding computer program product, storage means and tunnel end-point |
| US7792130B2 (en) | 2007-08-12 | 2010-09-07 | Lg Electronics Inc. | Wireless device and method of transmitting uplink data and buffer status reports in a wireless communications system |
| US20090171474A1 (en) | 2007-12-29 | 2009-07-02 | Amx, Llc | Method, computer-readable medium, and system for discovery and registration of controlled devices associated with self-describing modules |
| US20090252040A1 (en) * | 2008-03-28 | 2009-10-08 | Mustafa Kocaturk | Method and system for telecommunications using layer 3 packets obtained from a sequence of layer 2 radio link control layer data frames |
| US8681806B2 (en) | 2008-06-23 | 2014-03-25 | Koninklijke Philips N.V. | Method for communicating in a network and radio stations associated |
| US20100023635A1 (en) * | 2008-07-28 | 2010-01-28 | Francis Roger Labonte | Data streaming through time-varying transport media |
| US20100054152A1 (en) | 2008-09-04 | 2010-03-04 | Cisco Technology, Inc. | ERSPAN dynamic session negotiation |
| US20100154033A1 (en) | 2008-12-16 | 2010-06-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and nodes for securing a communication network |
| US20100162399A1 (en) * | 2008-12-18 | 2010-06-24 | At&T Intellectual Property I, L.P. | Methods, apparatus, and computer program products that monitor and protect home and small office networks from botnet and malware activity |
| US20100287297A1 (en) | 2009-05-10 | 2010-11-11 | Yves Lefebvre | Informative data streaming server |
| US20120327779A1 (en) * | 2009-06-12 | 2012-12-27 | Cygnus Broadband, Inc. | Systems and methods for congestion detection for use in prioritizing and scheduling packets in a communication network |
| US20120093505A1 (en) | 2009-06-26 | 2012-04-19 | Tet Hin Yeap | Method and system for service-based regulation of traffic flow to customer premises devices |
| US20120120254A1 (en) * | 2009-08-31 | 2012-05-17 | Wai-Tian Tan | Reducing communication delay of video data |
| US9917874B2 (en) * | 2009-09-22 | 2018-03-13 | Qualcomm Incorporated | Enhanced block-request streaming using block partitioning or request controls for improved client-side handling |
| US20130028088A1 (en) * | 2010-02-03 | 2013-01-31 | Do Manh H | Data flow control method and apparatus |
| GB2477640A (en) | 2010-02-03 | 2011-08-10 | Orbital Multi Media Holdings Corp | Controlling transmission rate dependent upon block ack/nak bitmask signals and receiver buffer fill levels |
| US8817615B2 (en) * | 2010-03-05 | 2014-08-26 | Nec Europe Ltd. | Method for operating a wireless network and a wireless network |
| US8640036B2 (en) | 2010-04-07 | 2014-01-28 | Cisco Techology, Inc. | Messaging and presence protocol as a configuration and management bus for embedded devices |
| US8601297B1 (en) * | 2010-06-18 | 2013-12-03 | Google Inc. | Systems and methods for energy proportional multiprocessor networks |
| US8520522B1 (en) * | 2010-10-15 | 2013-08-27 | Juniper Networks, Inc. | Transmit-buffer management for priority-based flow control |
| US8767551B2 (en) | 2011-01-27 | 2014-07-01 | Verint Systems, Ltd. | System and method for flow table management |
| US20120215909A1 (en) | 2011-01-27 | 2012-08-23 | Verint Systems Ltd. | System and method for efficient classification and processing of network traffic |
| US20130067034A1 (en) * | 2011-03-08 | 2013-03-14 | Riverbed Technology, Inc. | Accessing Network Traffic Data at Multiple Time Scales and Levels of Detail |
| US20120317276A1 (en) * | 2011-05-24 | 2012-12-13 | Muraliraja Muniraju | Systems and methods for analyzing network metrics |
| US20130155858A1 (en) | 2011-12-19 | 2013-06-20 | International Business Machines Corporation | Hierarchical occupancy-based congestion management |
| US20130188482A1 (en) * | 2012-01-19 | 2013-07-25 | Comcast Cable Communications, Llc | Adaptive buffer control |
| US20130194923A1 (en) | 2012-01-28 | 2013-08-01 | International Business Machines Corporation | Converged enhanced ethernet network |
| US9154452B2 (en) * | 2012-03-29 | 2015-10-06 | Alcatel Lucent | Methods and apparatuses for adapting buffer capacity at routers |
| US20150244637A1 (en) | 2012-09-18 | 2015-08-27 | Cisco Technology, Inc. | Exporting Real Time Network Traffic Latency and Buffer Occupancy |
Non-Patent Citations (9)
| Title |
|---|
| Arista Networks Inc., "LANZ—A New Dimension in Network Visibility", Latency Analyzer (LANZ) Technical Bulletin, Mar. 15, 2011, 5 pages. |
| Cisco Systems, Inc., "Cisco Nexus 3000 Series NX-OS Release Notes, Release 5.0(3)U2(1)," pp. 1-12, Aug. 31, 2011. |
| Donahue, Gary A., "Arista Warrior", Chapter 20, ISBN: 978-1-449-31453-8, O'Reilly Media Inc., Oct. 3, 2012, 15 pages. |
| English translation of First Office Action and Search Report in counterpart Chinese Application No. 201380048250.6, mailed Nov. 21, 2016, 10 pages. |
| English translation of Second Office Action in counterpart Chinese Application No. 201380048250.6, mailed May 2, 2017, 3 pages. |
| First Examination Report in counterpart Indian Application No. 444/MUMNP/2015, mailed May 24, 2019, 6 pages. |
| International Search Report and Written Opinion in counterpart International Application No. PCT/US2013/059180, mailed Nov. 28, 2013, 10 pages. |
| Office Action in counterpart Indian Application No. 201928047007, mailed Dec. 24, 2021, 6 pages. |
| Williams, Randy, Arista Networks Inc., "LANZ Streaming Client Configuration", Dec. 2, 2011, 2 pages. |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2898637B1 (en) | 2016-11-09 |
| US20140078915A1 (en) | 2014-03-20 |
| US20170026256A1 (en) | 2017-01-26 |
| CN104641602A (en) | 2015-05-20 |
| US9077619B2 (en) | 2015-07-07 |
| US9509622B2 (en) | 2016-11-29 |
| US9641407B2 (en) | 2017-05-02 |
| CN104641602B (en) | 2018-01-05 |
| USRE48645E1 (en) | 2021-07-13 |
| US20150244637A1 (en) | 2015-08-27 |
| WO2014046932A1 (en) | 2014-03-27 |
| EP2898637A1 (en) | 2015-07-29 |
| IN2015MN00444A (en) | 2015-09-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| USRE50298E1 (en) | Exporting real time network traffic latency and buffer occupancy | |
| US11249688B2 (en) | High-speed data packet capture and storage with playback capabilities | |
| US7787454B1 (en) | Creating and/or managing meta-data for data storage devices using a packet switch appliance | |
| US11943128B1 (en) | Path telemetry data collection | |
| US8000251B2 (en) | Instrumenting packet flows | |
| US8310942B2 (en) | Flow statistics aggregation | |
| US8229705B1 (en) | Performance monitoring in computer networks | |
| US11128740B2 (en) | High-speed data packet generator | |
| US9590910B1 (en) | Methods and apparatus for handling multicast packets in an audio video bridging (AVB) network | |
| US8520529B2 (en) | Reordering network traffic | |
| US10284460B1 (en) | Network packet tracing | |
| US10153962B2 (en) | Generating high-speed test traffic in a network switch | |
| US11606448B2 (en) | Efficient capture and streaming of data packets | |
| JP4823156B2 (en) | Remote traffic monitoring method | |
| CN113472697A (en) | Network information transmission system | |
| CN111049698A (en) | A method and device for collecting telemetry data | |
| US9094290B2 (en) | Measuring and displaying bandwidth contention | |
| CN116319468B (en) | Network telemetry method, device, switch, network, electronic equipment and medium | |
| CN109121017B (en) | Method and device for evaluating quality of video networking network | |
| Kernen et al. | Principles of Low-Latency Mediacentric Network Architectures |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EDSALL, THOMAS J.;YANG, YUE J.;HUANG, WEI-JEN;AND OTHERS;SIGNING DATES FROM 20121204 TO 20121207;REEL/FRAME:062960/0034 |