With increased uses for network communication, the importance of maintaining quality network performance continues to increase. New methods and apparatus have been developed to assist network performance, but it can be a challenge to tell whether a particular network has the most recent network performance upgrades.
A method and apparatus to determine whether a network is quality of service enabled is disclosed. The method may send a variety of test packets through a network and depending on how the network handles the packets, a determination may be made whether the network does not support packets with quality of service identification, tolerates packets with quality of service identification or supports packets with quality of service identification.
Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the description is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
It should also be understood that, unless a term is expressly defined in this patent using the sentence “As used herein, the term ‘______’ is hereby defined to mean . . . ” or a similar sentence, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a single meaning, that is done for sake of clarity only so as to not confuse the reader, and it is not intended that such claim term by limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word “means” and a function without the recital of any structure, it is not intended that the scope of any claim element be interpreted based on the application of 35 U.S.C. § 112, sixth paragraph.
The steps of the claimed method and apparatus are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the methods or apparatus of the claims include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The steps of the claimed method and apparatus may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The methods and apparatus may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
With reference to
Computer 110 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 110. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
The system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. A basic input/output system 133 (BIOS), containing the basic routines that help to transfer information between elements within computer 110, such as during start-up, is typically stored in ROM 131. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 120. By way of example, and not limitation,
The computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
The computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180. The remote computer 180 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110, although only a memory storage device 181 has been illustrated in
When used in a LAN networking environment, the computer 110 is connected to the LAN 171 through a network interface or adapter 170. When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173, such as the Internet. The modem 172, which may be internal or external, may be connected to the system bus 121 via the user input interface 160, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 110, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
At block 200, on a Sink side, when receiving traffic from an unknown source, the method may store the Internet Protocal (“IP”) address and source port of the source. At block 205, the method may create a user datagram protocal (“UDP”) socket. At block 210, the method may connect this socket to the source IP address and source port received. At block 215, the method may send noise to the source using this socket a variety of ways. One way may include sending n large packets back to back where n is greater than or equal to 1 (block 220), repeating the send (block 225) and validating the order of packets received from each source (block 230). The noise from the sink may be re-sent periodically (such as every 10 ms) until the source disconnects or up to an expiring time limit (such as 200 ms). The noise may help create congestion on the network so that the low and high priority packets may be held briefly in the same network device where, if the network device is QoS enabled, the higher priority packet may be queued earlier than the low priority packet, even if the low priority packet was received earlier. For example, given a capacity of 100 Mbps, a layer-3 1500 bytes packet plus 802.11 header of 34 bytes will hold the fabric for a minimum of (1500+34)•8/(100•1024•1024)=117 microseconds. This means both packets (the high and the low priority packets) must be received within this time period for them to be queued and inverted. Note that sending a minimal packet of 46 bytes+18 bytes of 802.3 header requires at most (46+18)•8/(100•1024•1024)=4.8 microseconds. If two packets of minimal size and different priorities can be sent back to back such that the overall host overhead is less than ˜100 microseconds, then sometimes the two packet trains will collide and inversion may be observed.
Referring again to
At block 245, test probes may be sent to the sink by sending a large high priority probe packet with an oversized flag using the first socket. A probe packet may include an oversized field which when selected may indicate that the packet is oversized such as of the size of 1504 bytes, a train size field that may indicate the number of packets that are part of this train and a sequence number that may have a unique identifier of the packet that increases sequentially. The packets sent may be assigned sequence numbers. In addition, all the packets may be sent as close to one another as possible.
At block 250, the method may wait for notification that the large high priority packet has entered the network. This may be to ensure that the messages actually leave the sending computer and that any packet re-queuing occurs on equipment on the network and not inside the sending computer. At block 255, y best-effort priority large probe packets may be sent using the second socket where y is greater than 1. At block 260, one or more best-effort priority small probe packets may be sent using the second socket. At block 265, the method may wait for notification that all these sends have entered the network. At block 270, a small high priority probe packet may be sent on the first socket. At block 275, the method may wait for notification that the send of the small high priority packet has entered the network.
At block 280, the packets sent and received may be reviewed and if no large packet was received after a plurality of sends, the method may determine that the network fabric does not support QoS. The relevant IEEE specification states that the maximum payload transmission unit (“MTU”) for Ethernet frames is 1500 bytes of payload. However, through 802.1p tags, it is possible to insert a 4 byte tag in the frame header. This tag contains the priority value of the data frame. To simple intermediate network devices, the data frame may appear to break the 1500 byte restriction. Devices that may be unaware of 802.1p tags may discard such overly large packets. For example, if the system is not QoS enabled, the probe packet which may be 1504 bytes, may be too large for the non-QoS enabled equipment and may be dropped and may never arrive. From this, the method may determine that the network is non-QoS enabled.
At block 285, the packets sent and received may be reviewed and if all packets were received in the order sent, determining that the path tolerates QoS enabled traffic. Unlike the results of block 280, all the packets having been received implies that the network equipment did not discard the packets which indicates that the path tolerates QoS enabled traffic. However, the higher priority packets may not have arrived prior to the lower priority packets, meaning that the method cannot determine whether there was sufficient traffic on the network to allow the higher priority packet to catch and be re-queued ahead of a lower priority packet. However, all the packets did arrive, even the large packets (greater than 1500 bytes, for example), meaning the network may be QoS tolerant, but the method cannot absolutely say that the network is QoS enabled.
At block 290, the packets sent and received may be reviewed and if all the sent packets were received and a later sent higher priority packet was received prior to a lower priority earlier sent packet, determining that QoS is supported. At some point on the network, a higher priority packet was re-queued ahead of a lower priority packet, from which the method determines that the network is QoS enabled.
Although the forgoing text sets forth a detailed description of numerous different embodiments, it should be understood that the scope of the patent is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possible embodiment because describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
Thus, many modifications and variations may be made in the techniques and structures described and illustrated herein without departing from the spirit and scope of the present claims. Accordingly, it should be understood that the methods and apparatus described herein are illustrative only and are not limiting upon the scope of the claims.
Number | Name | Date | Kind |
---|---|---|---|
4769811 | Eckberg, Jr. et al. | Sep 1988 | A |
5991302 | Berl et al. | Nov 1999 | A |
6760309 | Rochberger et al. | Jul 2004 | B1 |
6781971 | Davis et al. | Aug 2004 | B1 |
6798743 | Ma et al. | Sep 2004 | B1 |
6850490 | Woo et al. | Feb 2005 | B1 |
6954435 | Billhartz et al. | Oct 2005 | B2 |
7079508 | Ayyagari et al. | Jul 2006 | B2 |
20030093563 | Young et al. | May 2003 | A1 |
20030189935 | Warden et al. | Oct 2003 | A1 |
20030204616 | Billhartz et al. | Oct 2003 | A1 |
20040151114 | Ruutu | Aug 2004 | A1 |
20040260750 | Ruutu et al. | Dec 2004 | A1 |
Number | Date | Country |
---|---|---|
1 130 855 | May 2001 | EP |
WO-2004100464 | Nov 2004 | WO |
Number | Date | Country | |
---|---|---|---|
20060227713 A1 | Oct 2006 | US |