This disclosure relates generally to computer networks, and more specifically, to mitigating control plane disruptions within computer networks.
A computer network is a collection of interconnected computing devices that can exchange data and share resources. In a packet-based network, such as the Internet, the computing devices communicate data by dividing the data into small blocks called packets, which are individually routed across the network from a source device to a destination device. The destination device extracts the data from the packets and assembles the data into its original form. Dividing the data into packets enables the source device to resend only those individual packets that may be lost during transmission.
Certain devices, referred to as routers, maintain routing information that describes available routes through the network. Each route defines a path between two locations on the network. In order to maintain an accurate representation of a network, each router typically executes one or more routing protocols in a “control plane” of the device. In general, the “control plane” of a router refers to dedicated hardware or other resources that provide the intelligence to communicate with other peer routers to learn the topology of a network including available routes through the network. By execution of the routing protocols, the control planes of routers maintain control-plane communication sessions through which the protocols exchange routing information that reflects the current topology of the network.
Based on the topology, the control plane of a router makes path selection and programs or otherwise configures a “data plane” or “forwarding plane” of the router, which refers to the dedicated hardware or other resources that is responsible for processing the packets traversing the network. Upon receiving an incoming packet, for example, the forwarding plane of the router examines information within the packet and forwards the packet in accordance with forwarding information installed within the forwarding plane by the control plane of the router.
In general, techniques are described for providing an indication of an impending control plane disruption using an enhanced forwarding plane liveliness detection protocol. For example, techniques are described in which a protocol used for monitoring operational status of a forwarding plane of a router or other network device is enhanced to carry additional information that provides an indicator of an impending disruption in the control plane of the network device.
In one example, liveliness detection messages sent by a router in accordance with the forwarding plane liveliness detection protocol may provide an indication that the forwarding plane of a router is operation and able to forward packets. The liveliness detection messages may be enhanced to include additional information to provide an indication of impending disruption in the control plane of the network device. In some cases, the liveliness detection messages may be sent with periodically by the forwarding plane detection protocol with short periodicity (e.g., on the order of a few tens of milliseconds). In other examples, the liveliness detection messages may be sent on demand by the forwarding plane, i.e., when needed or in response to an event or received communication. In either case, by leveraging liveliness detection messages between forwarding planes, peer routers or other devices, such as network controllers, may thus be quickly informed of an impending loss of operation of the control plane of the router. In response, peer routers may adjust their own control plane operation so as to prevent various control plane protocols triggering traffic re-route or other recovery processes upon detecting unreachability of the router. That is, the peer router may suppress, at least temporarily a control-plane recovery or re-convergence process that would otherwise be triggered upon loss of control-plane communication with the router. In some examples, the additional information embedded within the messages of the forwarding plane liveliness detection protocol may further include an optional field specifying an expected duration for the impending control plane disruption. Moreover, in some examples, a subsequent forwarding plane message may be used to affirmatively indicate an end to the control plane disruption period.
Although described herein with reference to the liveliness detection protocols, the techniques may be applied with other protocols (e.g., layer two or layer three protocols) that execute in the forwarding plane or are otherwise delegated to the forwarding plane and that utilize period/on-demand messages with peer devices to indicate forwarding plane connectivity. Examples of such protocols include Address Resolution Protocol (ARP), the Neighbor Discover (ND) Protocol.
In one example, a method comprises executing, within a control plane of a network device, one or more routing protocols to exchange network topology information with one or more other network devices and to program a packet forwarding component of the network device to forward packets in accordance with the network topology information. The method further comprises detecting, with the packet forwarding component, an impending disruption to operation of the control plane of the network device and constructing, with the packet forwarding component, a liveliness detection message in accordance with a forwarding-plane liveliness detection protocol. The message comprises an indication of the impending disruption to operation of the control plane. The method includes outputting, by the packet forwarding component, the liveliness detection message to a peer network device in accordance with the forwarding plane liveliness detection protocol.
In another example, a network device comprises a routing component having a hardware-based processor to execute one or more control plane protocols and exchange network topology information with a peer network device. The network device further comprises a packet forwarding component of the network device programmed by the routing component to forward packets in accordance with the network topology information. The packet forwarding component exchanges liveliness detection messages with packet forwarding components of the peer network device in accordance with a forwarding-plane liveliness detection protocol. Responsive to an impending disruption to operation of the routing component of the network device, the packet forwarding component constructs one of the liveliness detection messages to include an indication of the impending disruption to operation of the routing component and outputs the liveliness detection message to the peer network device in accordance with the forwarding plane liveliness detection protocol.
In another example, a network device comprises a routing component having a hardware-based processor that provides a control plane for execution of one or more protocols. A packet forwarding component of the network device is programmed by the routing component to forward packets in accordance with the network topology information. The packet forwarding component executes a forwarding-plane liveliness detection protocol to receive liveliness detection messages from a peer network device, a first one of the messages comprising an indication of an impending disruption to operation of the routing component. The routing component, in response to receipt of the first one of the liveliness detection message by the packet forwarding component, suppresses a recovery action otherwise triggered by a loss of communication with a control plane of the peer network device.
The details of one or more examples are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of this disclosure will be apparent from the description and drawings, and from the claims.
Additionally, customer networks 16 include respective customer edge routers 17A and 17B (“CE routers 17”). As shown, each of CE routers 17 is linked to a respective edge router of routers 12. Edge routers 12C and 12F communicate with CE routers 17 to provide customer networks 16 with access to service provider network 19. As shown, each of customer networks 16 may be a network for a site of an enterprise. Each of customer networks 16 may include one or more computing devices (not shown), such as personal computers, laptop computers, handheld computers, workstations, servers, switches, printers, or other devices. Service provider network 19 may be coupled to one or more networks administered by other service providers, and may thus form part of a large-scale public network infrastructure, e.g., the Internet. Consequently, customer networks 16 may be viewed as edge networks of the Internet.
The service provider may provide computing devices within customer networks 16 with access to the Internet via service provider network 19, which allows computing devices within one of customer networks 16 to communicate with computing devices within the Internet or the other one of customer networks 16.
Routers 12 execute control-plane routing protocols to maintain accurate representation of the topology of service provider network 19. For example, routing components within routers 12 maintain peering sessions with each other and exchange routing information for routes or links within service provider network 19 in accordance with one or more routing protocols. In the example of
In addition to routing protocols, the control planes of routers 12 typically execute a variety of other so called “control plane” protocols, such as the Address Resolution Protocol (ARP), the Neighbor Discover (ND) Protocol, various Operations, Administration, and Maintenance (OAM) protocols and the like.
In the example of
In association with the control plane communication sessions for conveying network topology information, routers 12 and controller 35 may periodically send status inquiries (e.g., send “periodic packets” or “periodic data”) to one another in order to provide and continue to prove/verify the control plane communication between the peer routers. That is, by sending periodic packets and detecting receipt of similar periodic packets, routers 12 and controller 35 detect any failures in control plane communications between the peer routers, either as a result of failure of an internal routing component or a given control-plane protocol of one or more of routers 12. In this example of
Each router typically maintains a relatively long timeout value in association with the monitoring of control plane connectivity, such as three to twenty seconds or more as examples. Upon detecting loss of control plane communication, the detecting router 12 may elect to update one or more internal representations of the topology of service provider network 19, and outputs session messages to the other routers 12 to inform the other routers 12 of the topology changes. For example, upon detecting loss of control plane communication with router 12B by way of periodic packets 20, router 12A may elect to update its routing information so as to direct packets destined for customer network 16B to router 12E, thereby routing around router 12B.
In some cases, router 12B may support various features such as “non-stop forwarding” and “graceful restart.” For example, packet forwarding components (e.g., hardware-based packet forwarding engines) of router 12B may support “non-stop forwarding” and, therefore, is capable of continuing to forward packets even though the control plane of router 12B may no longer be operational. This allows the packet forwarding components of router 12B to forward packets in accordance with its last know state as to the topology of service provider network 12. As such, even though the control plane of router 12B may be out of communication, the forwarding plane of router 12B continues operation in uninterrupted fashion. Moreover, the control plane of router 12B may support “graceful restart,” which refers to the capability of preserving the forwarding information while restarting a routing communication session, e.g., a BGP session, in the control plane. In other words, even though router 12B may have lost control plane communication via session 20, router 12B may be able to continue to forward packets and may, upon restoring control plane functionality, may be able to restart certain control plane routing protocols without substantially disrupting routing services. As such, by way of periodic packets 20, router 12A may detect loss of control plane communication with router 12B but typically only after a significant period of time (e.g., after reaching a threshold timeout value of 3-20 seconds or more). In response, router 12A may direct traffic around 12B or may elect to defer redirection when router 12B supports features such as non-stop forwarding and graceful restart; however, in either case the forwarding plane of router 12B may have been utilizing state forwarding information for some time prior to detection of the loss of control plane communication between the routers.
In addition to utilizing protocols and corresponding periodic packets for monitoring an ability to communicate directly between control plane components, routers 12 may separately execute data plane protocols to monitor operation of the underlying packet forwarding components (also referred to as packet forwarding engines or a “forwarding plane”) to confirm that the forwarding components of the routers are currently able to forward packets. In the example of
When a forwarding plane message 22 associated with a forwarding plane liveliness detection protocol is not received in the allotted time frame, a packet forwarding component of the router expecting receipt of the periodic packet determines that a network event has occurred causing the forwarding plane of the peer router to be unable to process packets. In such case, the router may elect to immediately reroute traffic around the peer router since the peer router is no longer forwarding packets. For example, router 12A may, upon detecting failure lack of responsiveness from the forwarding plane of router 12B via liveliness detection messages 22, immediately reroute traffic around router 12B since the forwarding plane of router 12B appears to no longer be forwarding packets. One exemplary forwarding plane liveliness detection protocol is the bidirectional forwarding detection (BFD) protocol. The BFD protocol provides a very short interval of time between which the forwarding plane of routers 12 must transmit periodic messages, and thus may facilitate a fast detection of failures by packet forwarding engines for any of routers 12 that are in active BFD sessions. Further details of the BFD protocol may be found in the proposed standard for BFD, by D. Katz and D. Ward (Juniper Networks, June 2010, ISSN: 2070-1721), the entire content of which is incorporated herein by reference.
In general, techniques are described for preemptively providing an indication of an impending control plane disruption using forwarding plane liveliness detection protocols. For example, techniques are described in which a data plane protocol used for monitoring operational status of a forwarding plane of a router or other network device is enhanced to carry additional information that provides an indicator of an impending disruption in the control plane of the network device. With respect to the example of
In this way, peer router 12A or other devices, such as network controller 35, may thus be quickly informed of an impending loss of communication with the control plane of router 12B. As a result, peer router 12A may adjust its own control plane operation so as to prevent various control plane protocols from triggering traffic re-route or other recovery processes upon detecting unreachability of the control plane of router 12B. Further, the additional information embedded within liveliness detection messages 22 by the forwarding plane liveliness detection protocol of router 12B may include an optional field indicating an expected duration for the impending control plane disruption. In some examples, a subsequent packet 22 may be output by router 12B to affirmatively indicate an end to the control plane disruption period.
Leveraging a forwarding path liveliness detection protocol to convey in internal state of communications between the forwarding plane (e.g., a packet forwarding component) and a control plane (e.g., a routing component) of a router may provide certain advantages. For example, by providing such an indication, peer routers may, in response to liveliness detection messages 22 conveying an indication of an impending loss of control plane functionality and upon detecting an actual loss of communication with the control plane of the peer network device via periodic packets 20, suppresses reroute of one or more packet flows around peer router 12B. As another example, in response to receiving an indication of an impending loss of control plane functionality, peer network router 12A may suppress a recovery process of one or more control plane protocols upon detecting loss of communication with the control plane of the peer network device. For example, router 12A may execute ARP, OAM, ND or other control plane protocols, and router 12A may configure any of the protocols to at least temporary suspend triggering a recovery process in response to loss of control plane communication with router 12B.
Although described herein with reference to the BFD protocol as an example, the techniques may be applied with other protocols (e.g., layer two or layer three protocols) that execute in the forwarding plane or are otherwise delegated to the forwarding plane and that utilize period messages to indicate forwarding plane connectivity. Other example forwarding plane liveliness detection protocols that may be used could, for example, be OAM (Operations, Administration and Management) protocols that may be used to verify forwarding plane connectivity. Moreover, the techniques may be applied to instances where routers 12 employ the BFD protocol, for example, in conjunction with other control plane protocols, such as routing protocols like BGP, OSPF or IS-IS. In situations where multiple protocols are sharing one or more common BFD sessions, peer routers, and protocols executed by those protocols, can respond differently to an indication of an impending disruption to all or portions of the control plane. Furthermore, in the event no existing BDF sessions between certain pairs of routers 12, BFD sessions may be established between the routers using topology information learned by other protocols executing in the control plane, such as IGP, BGP or EGP routing protocols. Once established, the BFD sessions may execute in forwarding components of the routers to exchange enhanced periodic messages as described herein.
In one example, routers 12 negotiate timeout values during an initial discover process. For example, upon initial discovery using ND or an Interior Gateway Protocol (IGP), routers 12A and 12B exchange time duration values, such as maximum suppression durations, for one or more types of potential control plane disruptions. For each potential control plane disruptions, routers 12A and 12B may agree upon or otherwise be pre-configured with timeout value. Moreover, such timeouts may be specified with respect to the entire control plane or individual control plane protocols. For example, routers 12A and 12B may negotiate indicators (codes) for indicating an impending disruption of specific control plane features as well as respective durations for suppressing any recovery or re-convergence process by the control plane protocol. One example of such negotiated indicators and time duration values is as follow:
In this way, peer routers may selectively suppress keep-alive requirements for specific control plane components. For example, in the event router 12B issues a packet 22 having an indication of an impending disruption to the ARP protocol in the control plane (indicator code 4), router 12A may reconfigure the ARP protocol in its control plane to suppress triggering a recovery process in the event the ARP protocol loses communication with the ARP protocol on router 12B. Moreover, other control plane components of router 12A remain unaffected. As a result, a routing protocol executing in the control plane of router 12A may still trigger a reroute of traffic in the event communication is lost with a routing protocol executing on router 12B.
In this example, router 30 includes a control unit 31 that comprises a routing engine 32 that provide control plane functionality and a packet forwarding engine 34 that provides forwarding plane functionality. In addition, router 30 includes a set of interface cards (IFCs) 50A-50N (collectively, “IFCs 50”) for communicating packets via inbound links 52A-52N (collectively, “inbound links 52”) and outbound links 54A-54N (collectively, “outbound links 54”).
Routing engine 32 primarily provides an operating environment for execution of control plane protocols, such as those included in protocols 40. For example, one or more routing protocols (“RP”) 47 maintains routing information 36 to reflect the current topology of a network and other network entities to which it is connected. In particular, RP 47 may communicate with protocols executing in the control plane of other routers to exchange topology information or others state information for a computer network and, based on the exchanged communication, update routing information 36 to accurately reflect the topology of the network and other entities. Example routing protocols include Multi-Protocol Border Gateway Protocol (mpBGP), the Intermediate System to Intermediate System (ISIS) routing protocol, the Open Shortest Path First (OSPF) routing protocol and the like.
As shown in
Internal communication link 33 provides bi-directional communication between forwarding engine 34 and routing engine 32. For example, inbound control-plane communications conveying topology information from other peer routers are received on interface cards 50 and forwarded to the routing engine via internal communication link 33. In response, routing engine 32 processes the control plane packets to update routing information 36, generates forwarding information in the control plane and, by way of the internal communication link 33, programs the forwarding engine 34 with forwarding information 38 that associates network destinations with specific next hops and corresponding interface ports of IFCs 50 in accordance with routing information 36. Routing engine 32 may generate forwarding information 38 in the form of a radix tree having leaf nodes that represent destinations within the network. In this way, internal communication link 33 allows routing engine 32 of the control plane to update forwarding information 38 within the forwarding plane in response to control-plane messages received from peer routers, thereby preventing the forwarding information from becoming stale.
Based on forwarding information 38, forwarding engine 34 forwards packets received from inbound links 52A-52N to outbound links 54A-54N that correspond to next hops associated with destinations of the packets. U.S. Pat. No. 7,184,437 provides details on an exemplary embodiment of a router that utilizes a radix tree for route resolution, the contents of which is incorporated herein by reference in its entirety.
In one example, forwarding engine 34 is a rich and dynamic shared forwarding plane, optionally distributed over a multi-chassis router. Moreover, forwarding plane 34 may be provided by dedicated forwarding integrated circuits normally associated with high-end routing components of a network router. Further details of one example embodiment of router 30 can be found in U.S. Provisional Patent Application 61/054,692, filed May 20, 2008, entitled “STREAMLINED PACKET FORWARDING USING DYNAMIC FILTERS FOR ROUTING AND SECURITY IN A SHARED FORWARDING PLANE,” which is incorporated herein by reference.
As shown in
Moreover, as shown in
In general, BFD module 39 implements BFD protocol-based functionalities, such as transmitting and monitoring for periodic BFD packets in the data-plane, thereby conserving resources that would otherwise be expended by routing engine 32. In case of a detected connectivity failure, BFD module 39 may be configured to output a failure notification, or other similar indication. In some examples, forwarding engine 34 responds to the failure notification by triggering pre-programmed actions, such as rerouting traffic or initiating one or more timers. In other example, BFD module 39 outputs the failure indication to BFD module 39′ or another component of routing engine 32. In response to receiving the failure notification from BFD module 39 of forwarding engine 34, BFD module 39′ or another component of routing engine 32 causes RP 47 to update the network topology currently stored to routing information 36, to reflect the failed link(s) represented by the BFD failure.
In accordance with the techniques described herein, BFD module 39 has been enhanced to generate outbound BFD packets so as to include additional information that provides an indication an impending disruption of operation of the control plane (e.g., routing engine 32) of router 32. For example, as a forwarding-plane liveliness detection protocol, outbound packets generated by BFD module 39 may provide other routers an indication that the forwarding plane of router 32 is operational and able to forward packets
In one example, BFD module 39 constructs the BFD packets to embed additional information based on a status signal 51 received from a component of routing engine 32 via internal communication interface 53. For example, a component of routing engine 32 may output a command informing forwarding engine 34 of an impending loss of internal communication, such as a planned or recently initiated software upgrade to routing engine 32. In any of these cases, BFD module 39 constructs and outputs BFD packets to include additional information that, although forwarding engine 34 may be able to continue to forward packets in accordance with forwarding information 38, operation of routing engine 32 may subsequently become disrupted.
The architecture of router 30 illustrated in
In this example, routing engine 60 includes high-level, control plane software processes 62. In this example, software processes include command-line interface daemon 64 (“CLI 64”), routing protocol daemon 66 (“RPD 66”), and Simple Network Management Protocol daemon 68 (“SNMP 68”). In this respect, routing engine 60 may provide routing plane, service plane, and management plane functionality for the router. Various instances of routing engine 60 may include additional software processes 62 not shown in
RPD 66 interacts with kernel 72 (e.g., by way of API calls) to update routing information base (RIB) 74 based on routing protocol messages received by router 30. RPD 66 may, for example, execute various routing protocols, such as LDP and RSVP to establish LSPs within a network. RIB 74 may include information defining a topology of a network, including one or more routing tables and/or link-state databases. Kernel 43 executes on routing engine microprocessor 78 and may comprise, for example, a UNIX operating system derivative such as Linux or Berkeley Software Distribution (BSD). Kernel 72 processes kernel calls from RPD 66 and generates forwarding information in the form of FIBs 76 based on the network topology represented in RIB 74, i.e., performs route resolution. Typically, RPD 66 generates FIB 76 in the form of radix or other lookup tree to map packet information (e.g., header information having destination information and/or a label stack) to next hops and ultimately to interface ports of interface cards associated with respective PFEs 82. Routing engine microprocessor 78 of kernel 72 then communicates with communication interface 105 of PFE 82A by way of communication interface 101 and internal communication link 103. Routing engine microprocessor 78 may program PFEs 82 and install copies of the FIBs as software FIB 86. Microprocessor 78 may comprise one or more general- or special-purpose processors such as a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), or any other equivalent logic device. Accordingly, the terms “processor” or “controller,” as used herein, may refer to any one or more of the foregoing structures or any other structure operable to perform techniques described herein.
In this example, ASICs 90 are microcode-controlled chipsets programmably configured by a forwarding engine microprocessor 84 executing on each of PFEs 82A-82N (e.g., PFE 82A). Specifically, one or more of ASICs 90 is controllable by microcode 92 programmed by forwarding engine microprocessor 84. The forwarding engine microprocessor 84 programs a hardware FIB 96 into internal memory of ASIC 90 within the data plane 88 based on software FIB 86. When forwarding packets, control logic 94 traverses HW FIB 96 and, upon reaching a FIB entry for the packet (e.g., a leaf node), microcode-implemented control logic 94 automatically selects a forwarding next hop and processes the packets in accordance with the operations defined within the next hop. Additionally, microcode 92 includes BFD module 98, which implements various functionalities in accordance the BFD protocol. As examples, BFD module 98 outputs enhanced BFD packets to embed status information as to communications between PFE 82A and routing engine 60.
Command line interface daemon 64 (“CLI 64”) provides an interface by which an administrator or other management entity may modify the configuration of router 30 using text-based commands. Simple Network Management Protocol daemon 68 (“SNMP 68”) comprises an SNMP agent that receives SNMP commands from a management entity to set and retrieve configuration and management information for router 30. Using CLI 64, SNMP 68, and BFD 70, management entities may enable/disable and configure services, install routes, enable/disable and configure rate limiters, and configure interfaces, for example. RPD 66, CLI 64, SNMP 68, and BFD module 70 configure router 30 to implement configured services, add/modify/delete routes, and otherwise modify packet forwarding paths by installing forwarding structures to PFEs 82.
In accordance with the techniques described herein, forwarding engine microprocessor 84 implements BFD control 80. BFD control 80, in turn, implements one or more of the techniques described herein. More specifically, microcode-implemented BFD module 98 is configured by BFD control 80, responsive to signal 107, to generate outbound BFD packets to include an indication of an impending control plane disruption using forwarding plane liveliness detection protocols routing engine 60. Moreover, BFD module 98 may, when processing inbound BFD packets, extract information as to an impending control plane disruption of routing components of peer routers and provide such information to BFD control 80 for relaying to other control plane of routing engine 60. For example, upon detecting via an inbound BFD packet that a forwarding component of a peer router remains operational but has been informed of or otherwise detected an upcoming disruption to its control plane, any of control logic 94 of forwarding ASICs 90, forwarding engine microprocessor 84, and/or components of routing engine 60 may alter operation. For example, RPD 66 may, upon subsequently detecting loss of communication with the control plane of the peer router, suppress reroute of traffic around the router, at least until expiration of one or more timers. As other examples, other protocols 62 may suppress or otherwise delay triggering a recovery process.
In the example shown in
Detection timer multiplier field 140E specifies a value that when multiplied by the value specified within desired minimum transfer interval 140I provides the detection time for the router transmitting BFD control message 138 in “asynchronous mode.” Length field 140F specifies the length of BFD control message 138 in bytes. My discriminator field 140G specifies a unique, nonzero discriminator value generated by the router transmitting BFD control message 138. My discriminator field 140G may be used to demultiplex multiple BFD sessions between the same set of receiving and transmitting routers. Your discriminator field 140H specifies the discriminator received from the corresponding router of the particular BFD session. Your discriminator field 140H may specify a zero value, if the discriminator of received from the corresponding router is unknown by the transmitting router.
Desired minimum transfer interval field 140I specifies the minimum interval, in microseconds, that the local system would like to use when transmitting BFD control message 138 and subsequent BFD control messages. Required minimum receive interval field 140J specifies the minimum interval, in microseconds, between received BFD control messages that the router transmitting BFD control message 138 is capable of supporting. If the transmitting router sets required minimum receive interval field 140J to zero, the transmitting router does not want the remote or receiving router to send any periodic BFD control messages. Required minimum echo receive interval field 140K specifies the minimum interval, in microseconds, between received BFD echo messages that the transmitting router is capable of supporting. Specifying a zero to this field indicates that the transmitting router does not support the receipt of BFD echo packets.
A router, such as any of the routers of
In the above example, an additional code word ‘9’ has been defined for diagnostic field 140B to indicate an impending disruption in the control plane.
As another example, BFD message 139 may include an additional type-length-value (TLV) field so as to include the additional information. Moreover, BFD message 139 may further include an optional field indicating an expected duration of the impending event. For further information concerning the BFD protocol generally, BFD control message, and BFD control message fields, see the Internet Draft published by the Network Working Group of the Internet Engineering Task Force (IETF), titled “Bidirectional Forwarding Detection,” written by D. Katz and D. Ward, and dated March, 2007, the entire contents of which are hereby incorporated by reference as if fully set forth herein.
In operation, control plane components of the routers receive control plane routing protocol messages from other routers and, in response, update topology information and perform route selection (202, 212).
In addition, the packet forwarding components of the routers establish a communication session in accordance with the forwarding-plane liveliness detection protocol, such as BFD (204, 214). The forwarding plane liveliness detection protocol may, for example, comprise a bidirectional forwarding detection (BFD) protocol. At this time, the two packet forwarding components of the routers begin exchanging liveliness detection messages that, when received by the other router, provide an indication that the packet forwarding engines are operational and able to forward packets.
In the example of
In the event the packet forwarding component determines that loss of control plane operation is impending (YES OF 209), the packet forwarding component includes within the liveliness detection message an indicator of such impending disruption (210). If no fault condition is detected, the packet forwarding engine does not include the indicator within the liveliness detection message.
After construction, the packet forwarding component of the sending router outputs the liveliness detection message to a peer network device in accordance with the forwarding plane liveliness detection protocol (211). The packet forwarding component of the sending router repeats this transmission at a high rate, such as every 1-10 ms to provide an indication of the operational status of the forwarding plane of the sending router.
Receipt of the liveliness detection message by the packet forwarding component of the receiving router confirms to the receiving router that the packet forwarding component of the sending router is currently able to forward packets (216). In addition, the packet forwarding component of the receiving router further processes the received liveliness detection message to detect whether the packet forwarding component of the packet forwarding engine has determined that the control plane of the sending router has been marked for impending operational disruption (217).
If no impending loss of control plane functionality has been indicated in the inbound liveliness detection message, the receiving router continues to forward traffic according to normal operation (218).
However, if the liveliness detection message indicates an impending loss of control plane operation for the sending router, the receiving router may reconfigure its control place and/or forwarding plane to at least temporarily suppress certain actions, such as rerouting of packet flows or control-plane recovery processes in the event control-plane communications are subsequently lost with the sending router (220).
The techniques described in this disclosure may be implemented, at least in part, in hardware, software, firmware or any combination thereof. For example, various aspects of the described techniques may be implemented within one or more processors, including one or more microprocessors, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), or any other equivalent integrated or discrete logic circuitry, as well as any combinations of such components. The term “processor” or “processing circuitry” may generally refer to any of the foregoing logic circuitry, alone or in combination with other logic circuitry, or any other equivalent circuitry. A control unit comprising hardware may also perform one or more of the techniques of this disclosure.
Such hardware, software, and firmware may be implemented within the same device or within separate devices to support the various operations and functions described in this disclosure. In addition, any of the described units, modules or components may be implemented together or separately as discrete but interoperable logic devices. Depiction of different features as modules or units is intended to highlight different functional aspects and does not necessarily imply that such modules or units must be realized by separate hardware or software components. Rather, functionality associated with one or more modules or units may be performed by separate hardware or software components, or integrated within common or separate hardware or software components.
The techniques described in this disclosure may also be embodied or encoded in a computer-readable medium, such as a non-transitory computer-readable storage medium, containing instructions. Instructions embedded or encoded in a computer-readable medium may cause a programmable processor, or other processor, to perform the method, e.g., when the instructions are executed. Computer readable storage media, which is tangible and non-transitory, may include random access memory (RAM), read only memory (ROM), programmable read only memory (PROM), erasable programmable read only memory (EPROM), electronically erasable programmable read only memory (EEPROM), flash memory, a hard disk, a CD-ROM, a floppy disk, a cassette, magnetic media, optical media, or other computer-readable storage media. It should be understood that the term “computer-readable storage media” refers to physical storage media, and not signals, carrier waves, or other transient media.
Various examples have been described. These and other examples are within the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
5253248 | Dravida et al. | Oct 1993 | A |
5613136 | Casavant et al. | Mar 1997 | A |
5721855 | Hinton et al. | Feb 1998 | A |
5826081 | Zolnowsky | Oct 1998 | A |
5848128 | Frey | Dec 1998 | A |
5933601 | Fanshier et al. | Aug 1999 | A |
6052720 | Traversat et al. | Apr 2000 | A |
6101500 | Lau | Aug 2000 | A |
6148337 | Estberg et al. | Nov 2000 | A |
6163544 | Andersson et al. | Dec 2000 | A |
6173411 | Hirst et al. | Jan 2001 | B1 |
6212559 | Bixler et al. | Apr 2001 | B1 |
6223260 | Gujral et al. | Apr 2001 | B1 |
6255943 | Lewis et al. | Jul 2001 | B1 |
6263346 | Rodriquez | Jul 2001 | B1 |
6272537 | Kekic et al. | Aug 2001 | B1 |
6304546 | Natarajan et al. | Oct 2001 | B1 |
6310890 | Choi | Oct 2001 | B1 |
6374329 | McKinney et al. | Apr 2002 | B1 |
6389464 | Krishnamurthy et al. | May 2002 | B1 |
6393481 | Deo et al. | May 2002 | B1 |
6405289 | Arimilli et al. | Jun 2002 | B1 |
6453430 | Singh et al. | Sep 2002 | B1 |
6466973 | Jaffe | Oct 2002 | B2 |
6477566 | Davis et al. | Nov 2002 | B1 |
6477572 | Elderton et al. | Nov 2002 | B1 |
6480955 | DeKoning et al. | Nov 2002 | B1 |
6502131 | Vaid et al. | Dec 2002 | B1 |
6507869 | Franke et al. | Jan 2003 | B1 |
6510164 | Ramaswamy et al. | Jan 2003 | B1 |
6516345 | Kracht | Feb 2003 | B1 |
6529941 | Haley et al. | Mar 2003 | B2 |
6542934 | Bader et al. | Apr 2003 | B1 |
6563800 | Salo et al. | May 2003 | B1 |
6584499 | Jantz et al. | Jun 2003 | B1 |
6618360 | Scoville et al. | Sep 2003 | B1 |
6636242 | Bowman-Amuah | Oct 2003 | B2 |
6662221 | Gonda et al. | Dec 2003 | B1 |
6681232 | Sistanizadeh et al. | Jan 2004 | B1 |
6684343 | Bouchier et al. | Jan 2004 | B1 |
6725317 | Bouchier et al. | Apr 2004 | B1 |
6738908 | Bonn et al. | May 2004 | B1 |
6751188 | Medved et al. | Jun 2004 | B1 |
6757897 | Shi et al. | Jun 2004 | B1 |
6804816 | Liu et al. | Oct 2004 | B1 |
6816897 | McGuire | Nov 2004 | B2 |
6816905 | Sheets et al. | Nov 2004 | B1 |
6850253 | Bazerman et al. | Feb 2005 | B1 |
6910148 | Ho et al. | Jun 2005 | B1 |
6922685 | Greene et al. | Jul 2005 | B2 |
6934745 | Krautkremer | Aug 2005 | B2 |
6952728 | Alles et al. | Oct 2005 | B1 |
6982953 | Swales | Jan 2006 | B1 |
6983317 | Bishop et al. | Jan 2006 | B1 |
6990517 | Bevan et al. | Jan 2006 | B1 |
7024450 | Deo et al. | Apr 2006 | B1 |
7055063 | Leymann et al. | May 2006 | B2 |
7069344 | Carolan et al. | Jun 2006 | B2 |
7082463 | Bradley et al. | Jul 2006 | B1 |
7082464 | Hasan et al. | Jul 2006 | B2 |
7085277 | Proulx et al. | Aug 2006 | B1 |
7085827 | Ishizaki et al. | Aug 2006 | B2 |
7093280 | Ke et al. | Aug 2006 | B2 |
7099912 | Ishizaki et al. | Aug 2006 | B2 |
7103647 | Aziz | Sep 2006 | B2 |
7120693 | Chang et al. | Oct 2006 | B2 |
7124289 | Suorsa | Oct 2006 | B1 |
7130304 | Aggarwal | Oct 2006 | B1 |
7131123 | Suorsa et al. | Oct 2006 | B2 |
7139263 | Miller et al. | Nov 2006 | B2 |
7151775 | Renwick et al. | Dec 2006 | B1 |
7152109 | Suorsa et al. | Dec 2006 | B2 |
7161946 | Jha | Jan 2007 | B1 |
7184437 | Cole et al. | Feb 2007 | B1 |
7200662 | Hasan et al. | Apr 2007 | B2 |
7206836 | Dinker et al. | Apr 2007 | B2 |
7219030 | Ohtani | May 2007 | B2 |
7236453 | Visser et al. | Jun 2007 | B2 |
7305492 | Bryers et al. | Dec 2007 | B2 |
7310314 | Katz et al. | Dec 2007 | B1 |
7310666 | Benfield et al. | Dec 2007 | B2 |
7313611 | Jacobs et al. | Dec 2007 | B1 |
7336615 | Pan | Feb 2008 | B1 |
7359377 | Kompella et al. | Apr 2008 | B1 |
7362700 | Frick et al. | Apr 2008 | B2 |
7363353 | Ganesan et al. | Apr 2008 | B2 |
7379987 | Ishizaki et al. | May 2008 | B2 |
7391719 | Ellis et al. | Jun 2008 | B2 |
7406030 | Rijsman | Jul 2008 | B1 |
7406035 | Harvey et al. | Jul 2008 | B2 |
7433320 | Previdi et al. | Oct 2008 | B2 |
7447167 | Nadeau et al. | Nov 2008 | B2 |
7463591 | Kompella | Dec 2008 | B1 |
7471638 | Torrey et al. | Dec 2008 | B2 |
7487232 | Matthews et al. | Feb 2009 | B1 |
7499395 | Rahman | Mar 2009 | B2 |
7506194 | Appanna et al. | Mar 2009 | B2 |
7508772 | Ward et al. | Mar 2009 | B1 |
7522599 | Aggarwal et al. | Apr 2009 | B1 |
7523185 | Ng et al. | Apr 2009 | B1 |
7539769 | McGuire | May 2009 | B2 |
7561527 | Katz et al. | Jul 2009 | B1 |
7606898 | Hunt et al. | Oct 2009 | B1 |
7609637 | Doshi et al. | Oct 2009 | B2 |
7639624 | McGee et al. | Dec 2009 | B2 |
7720047 | Katz et al. | May 2010 | B1 |
7720061 | Krishnaswamy et al. | May 2010 | B1 |
7724677 | Iwami | May 2010 | B2 |
7738367 | Aggarwal et al. | Jun 2010 | B1 |
7760652 | Tsillas | Jul 2010 | B2 |
7764599 | Doi | Jul 2010 | B2 |
7765306 | Filsfils et al. | Jul 2010 | B2 |
7765328 | Bryers et al. | Jul 2010 | B2 |
7813267 | Tsai | Oct 2010 | B2 |
7852778 | Kompella | Dec 2010 | B1 |
7860981 | Vinokour et al. | Dec 2010 | B1 |
7911938 | Florit | Mar 2011 | B2 |
7940646 | Aggarwal et al. | May 2011 | B1 |
7957330 | Bahadur et al. | Jun 2011 | B1 |
7990888 | Nadeau et al. | Aug 2011 | B2 |
8019835 | Suorsa et al. | Sep 2011 | B2 |
8077726 | Kumar et al. | Dec 2011 | B1 |
8254271 | Nadeau et al. | Aug 2012 | B1 |
8266264 | Hasan et al. | Sep 2012 | B2 |
8339959 | Moisand et al. | Dec 2012 | B1 |
8370528 | Bryers et al. | Feb 2013 | B2 |
8488444 | Filsfils et al. | Jul 2013 | B2 |
8503293 | Raszuk | Aug 2013 | B2 |
8543718 | Rahman | Sep 2013 | B2 |
8693398 | Chaganti et al. | Apr 2014 | B1 |
8797886 | Kompella | Aug 2014 | B1 |
8902780 | Hegde et al. | Dec 2014 | B1 |
8948001 | Guichard | Feb 2015 | B2 |
8953460 | Addepalli | Feb 2015 | B1 |
9258234 | Addepalli et al. | Feb 2016 | B1 |
9407526 | Addepalli et al. | Aug 2016 | B1 |
9455894 | Neelam | Sep 2016 | B1 |
20010042190 | Tremblay et al. | Nov 2001 | A1 |
20020007443 | Gharachorloo et al. | Jan 2002 | A1 |
20020032725 | Araujo et al. | Mar 2002 | A1 |
20020038339 | Xu | Mar 2002 | A1 |
20020093954 | Weil et al. | Jul 2002 | A1 |
20020105972 | Richter et al. | Aug 2002 | A1 |
20020120488 | Bril et al. | Aug 2002 | A1 |
20020141343 | Bays | Oct 2002 | A1 |
20020158900 | Hsieh et al. | Oct 2002 | A1 |
20020165727 | Greene et al. | Nov 2002 | A1 |
20020169975 | Good | Nov 2002 | A1 |
20020191014 | Hsieh et al. | Dec 2002 | A1 |
20020194497 | McGuire | Dec 2002 | A1 |
20020194584 | Suorsa et al. | Dec 2002 | A1 |
20030005090 | Sullivan et al. | Jan 2003 | A1 |
20030009552 | Benfield et al. | Jan 2003 | A1 |
20030055933 | Ishizaki et al. | Mar 2003 | A1 |
20030097428 | Afkhami et al. | May 2003 | A1 |
20030112749 | Hassink et al. | Jun 2003 | A1 |
20030123457 | Koppol | Jul 2003 | A1 |
20030149746 | Baldwin et al. | Aug 2003 | A1 |
20040024869 | Davies | Feb 2004 | A1 |
20040116070 | Fishman et al. | Jun 2004 | A1 |
20050013310 | Banker et al. | Jan 2005 | A1 |
20050021713 | Dugan et al. | Jan 2005 | A1 |
20050063458 | Miyake et al. | Mar 2005 | A1 |
20050083936 | Ma | Apr 2005 | A1 |
20050175017 | Christensen et al. | Aug 2005 | A1 |
20050195741 | Doshi et al. | Sep 2005 | A1 |
20050259571 | Battou | Nov 2005 | A1 |
20050259634 | Ross | Nov 2005 | A1 |
20050281192 | Nadeau et al. | Dec 2005 | A1 |
20060018266 | Seo | Jan 2006 | A1 |
20060095538 | Rehman et al. | May 2006 | A1 |
20060133300 | Lee et al. | Jun 2006 | A1 |
20060233107 | Croak et al. | Oct 2006 | A1 |
20060239201 | Metzger et al. | Oct 2006 | A1 |
20060262772 | Guichard et al. | Nov 2006 | A1 |
20060285500 | Booth et al. | Dec 2006 | A1 |
20070014231 | Sivakumar et al. | Jan 2007 | A1 |
20070021132 | Jin et al. | Jan 2007 | A1 |
20070041554 | Newman et al. | Feb 2007 | A1 |
20070061103 | Patzschke et al. | Mar 2007 | A1 |
20070147281 | Dale et al. | Jun 2007 | A1 |
20070165515 | Vasseur | Jul 2007 | A1 |
20070180104 | Filsfils et al. | Aug 2007 | A1 |
20070180105 | Filsfils et al. | Aug 2007 | A1 |
20070207591 | Rahman et al. | Sep 2007 | A1 |
20070220252 | Sinko | Sep 2007 | A1 |
20070263836 | Huang | Nov 2007 | A1 |
20070280102 | Vasseur et al. | Dec 2007 | A1 |
20080004782 | Kobayashi et al. | Jan 2008 | A1 |
20080034120 | Oyadomari et al. | Feb 2008 | A1 |
20080049622 | Previdi et al. | Feb 2008 | A1 |
20080074997 | Bryant et al. | Mar 2008 | A1 |
20080163291 | Fishman et al. | Jul 2008 | A1 |
20080225731 | Mori et al. | Sep 2008 | A1 |
20080247324 | Nadeau et al. | Oct 2008 | A1 |
20080253295 | Yumoto et al. | Oct 2008 | A1 |
20090016213 | Lichtwald | Jan 2009 | A1 |
20090019141 | Bush et al. | Jan 2009 | A1 |
20090046579 | Lu et al. | Feb 2009 | A1 |
20090046723 | Rahman et al. | Feb 2009 | A1 |
20090201799 | Lundstrom et al. | Aug 2009 | A1 |
20090225650 | Vasseur | Sep 2009 | A1 |
20090232029 | Abu-Hamdeh et al. | Sep 2009 | A1 |
20090279440 | Wong et al. | Nov 2009 | A1 |
20100299319 | Parson et al. | Nov 2010 | A1 |
20110019550 | Bryers et al. | Jan 2011 | A1 |
20110063973 | VenkataRaman et al. | Mar 2011 | A1 |
20110170408 | Furbeck et al. | Jul 2011 | A1 |
20130028099 | Birajdar et al. | Jan 2013 | A1 |
20130185767 | Tirupachur Comerica et al. | Jul 2013 | A1 |
20140149819 | Lu | May 2014 | A1 |
Number | Date | Country |
---|---|---|
1367750 | Dec 2003 | EP |
1861963 | Dec 2007 | EP |
1864449 | Dec 2007 | EP |
1891526 | Feb 2008 | EP |
2006104604 | Oct 2006 | WO |
Entry |
---|
“ActiveXperts Ping backgrounds (PING is part of the ActiveSocket Toolkit),” ActiveSocket Network Communication Toolkit 2.4, Activexperts, www.activexperts.com/activesocket/toolkits/ping.html, last printed Nov. 10, 2005, 3 pp. |
“Configure an Unnumbered Interface,” www.juniper.net/techpubs/software/junos/junos56/index.html, last printed Nov. 7, 2005, 1 p. |
“Configure the loopback Interface,” www.juniper.net/techpubs/soft- ware/junos/junos56/index.html, Last printed Nov. 7, 2005, 2 pp. |
“ICMP (Internet Control Message Protocol),” Data Network Resource, www.rhyshaden.com/icmp.html, last printed Nov. 10, 2005, 4 pp. |
“RFC 2151—(rfc2151)—A primer on Internet and TCP/IP Tools and Utilities,” www.rfcsearch.org/rfcview/RFC/2151.html, last printed Nov. 9, 2005, 3 pp. |
“Traceroute,” Webopedia, www.webopedia.com/TERM/t/traceroute.heml, Aug. 26, 2004, 1 p. |
“Using the IP unnumbered configuration FAQ,” APNIC, www.apnic.net/info/faq/ip—unnumb.html, Jul. 1, 2005, 2 pp. |
Aggarwal et al., “Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs),” Internet Engineering Task Force (IETF), RFC 5884, Cisco Systems, Inc., Jun. 2010, 12 pp. |
Aggarwal, “OAM Mechanisms in MPLS Layer 2 Transport Networks,” IEEE Communications Magazine, Oct. 2004, pp. 124-130. |
Atlas, “ICMP Extensions for Unnumbered Interfaces,” draft-atlas-icmp-unnumbered -00, Dec. 9, 2005, 8 pp. |
Atlas, ICMP Extensions for Unnumbered Interfaces, draft-atlas-icmp-unnumbered-01, Feb. 2006 8 pp. |
Berkowitz, “Router Renumbering Guide,” Network Working Group, RFC 2072, Jan. 1997, 41 pp. |
Bonica et al., “Generic Tunnel Tracing Protocol (GTTP) Specification,” draft-bonica- tunproto-01.txt, IETF Standard-Working-Draft, Internet Engineering Task Force, Jul. 2001, 20 pp. |
Chen et al., “Dynamic Capability for BGP—4,” Network Working Group, Internet Draft, draft-ietf-idr-dynamic-cap-03.txt, Dec. 2002, 6 pp. |
Gorry Fairhurst, “Internet Control Message protocol,” Internet Control Protocol, (ICMP), www.erg.abdn.ac.uk/users/gorry/course/inet-pages/icmp.html, last printed Sep. 6, 2006, 3 pp. |
Hegde et al., Multipoint BFD for MPLS, Network Working Group, Internet-Draft, draft- chandra-hedge-mpoint-bfd-for-mpls-00.txt, Mar. 2012, 12 pp. |
Katz et al. “Bidirectional Forwarding Detection (BFD) for Multihop Paths” Internet Engineering Task Force (IETF), RFC 5883, Jun. 2010, 6 pgs. |
Katz et al., “Bidirectional Forwarding Detection,” draft-ietf-bfd-base-06.txt, Network Working Group, Internet Draft, Mar. 2007, 49 pp. |
Katz et al., “Bidirectional Forwarding Detection (BFD),” Internet Engineering Task Force (IETF), RFC 5880, Juniper Networks, Jun. 2010, 50 pp. |
Katz et al., “Generic Application of Bidirectional Forwarding Detection (BFD),” Internet Engineering Task Force (IETF), RFC 5882, Juniper Networks, Jun. 2010, 15 pp. |
Katz et al., “BFD for Multipoint Networks,” Network Working Group, Internet Draft, draft- ietf-bfd-multipoint-00.txt, Oct. 2011, 29 pp. |
Kolon, “BFD spots router forwarding failures,” Network World, www.networkworld.com/news/tech/2005/030705techupdate.html, Mar. 7, 2005, 3 pp. |
Kompella et al., “Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures,” Network Working Group, RFC 4379, Cisco Systems, Inc., Feb. 2006, 50 pp. |
Kompella et al., Signalling Unnumbered Links in Resource ReSerVation Protocol—Traffic Engineering (RSVP-TE), Network Working Group, RFC 3477, Jan. 2003, 8 pp. |
Mannie, “Generalized Multi-Protocol Label Switching Architecture,” Network Working Group, Internet draft, draft-ietf-ccamp-gmpls-architecture-07.txt, May 2003, 56 pp. |
Nadeau et al., “Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit Connectivity Verification (VCCV),” Internet Engineering Task Force (IETF), RFC 5885, Cisco Systems, Inc., Jun. 2010, 11 pp. |
Sangli et al., “Graceful Restart Mechanism for BGP,” Network Working Group, Internet Draft, draft-ietf-idr-restart-06.txt, http://toolsietf.ort/html/draft-ietf-idr-restart-06, Jan. 2003, 10 pp. |
Saxena et al., Detecting Data-Plane Failures in Point-to-Multipoint Mpls—Extensions to LSP Ping, Internet Engineering Task Force (IETF) RFC 6425, Nov. 2011, 28 pp. |
Sun Hai-feng, “Advanced TCP Port Scan and it's Response,” O.L. Automation 2005, vol. 24, No. 4, China Academic Electronic Publishing House, http://www.cnki.net, Apr. 24, 2005, 2 pp. (Abstract only). |
Vijay Mukhi et al., “Internet Control Message Protocol ICMP,” www.vijaymukhi.com/vmis/icmp, last printed Sep. 6, 2006, 5pp. |
Zvon, RFC 2072, [Router Renumbering Guide] —Router Identifiers, Chapter 8.3, Unnumbered Interfaces, www.zvon.org/tmRFC/RFC2072/output/chapter8.html , last printed on Nov. 7, 2005, 2 pp. |
Katz et al., “Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop),” Internet Engineering Task Force (IETF), RFC 5881, Juniper Networks, Jun. 2010, 7 pp. |
U.S. Appl. No. 61/054,692, filed May 20, 2008 entitled Streamlined Packet Forwarding Using Dynamic Filters for Routing and Security in a Shared Forwarding Plane. |
U.S. Appl. No. 13/730,737, filed Dec. 28, 2012 entitled Dynamically Adjusting Liveliness Detection Intervals for Periodic Network Communications. |
U.S. Appl. No. 13/731,993, filed Dec. 31, 2012 entitled Network Liveliness Detection Using Session-External Communications. |
U.S. Appl. No. 14/039,412, filed Sep. 27, 2013 entitled Selective Fast Re-Route Using Forwarding Plane Liveliness Detection Protocols. |
“DARPA Internet Program Protocol Specification,” Transmission Control Protocol, RFC 793, Sep. 1981, 90 pp. |
Boney, “Cisco IOS in a Nutshell,” 2nd Edition, published Aug. 2005, 16 pp. |
H3C S3610 & S5510 Series Ethernet Switches (Version: 20081229-C-1.01, Release 5303, 2006-2008, Command Manual- BFD-GR), 2008, 13 pp. |
Harmon “32-Bit Bus Master Ethernet Interface for the 68030 (Using the Macintosh SE/30),” Apr. 1993, 10 pp. |
U.S. Appl. No. 15/018,669, filed by Meher Aditya Kumar Addepalli et al, filed on Feb. 8, 2016. |
Muller, “Managing Service Level Agreements,” International Journal of Network Management, John Wiley & Sons, Ltd., May 1999, vol. 9, Issue 3, pp. 155-166. |
Nichols, et al., “Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers,” Network Working Group, RFC 2474, Dec. 1998, 20 pp. |
Papavassilion, “Network and service management for wide-area electronic commerce networks,” International Journal of Network Management, John Wiley & Sons, Ltd., Mar. 2001, vol. 11, Issue 2, pp. 75-90. |
Ramakrishnan, et al. “The Addition of Explicit Congestion Notification (ECN) to IP”, RFC 3168, Sep. 2001, 63 pp. |
Schmidt, “A Family of Design Patterns for Flexibly Configuring Network Services in Distributed Systems,” Proceedings of the Third International Conference on Configurable Distributed Systems, May 6-8, 1996, IEEE Press, pp. 124-135. |
Troutman, “DP83916EB-AT: High Performance AT Compatible Bus Master Ethernet Adapter Card,” Nov. 1992, 34 pp. |