The present invention relates to a method of determining a configuration error in a network. More particularly this invention concerns a network that supplies information about its own configuration at its own network interface and sends this information to a neighboring network infrastructure device.
The transfer of information between infrastructure devices by means of discovery protocols is known in the prior art.
In the following, devices that are necessary for operating the network, for example, in the form of a (central) mediating unit, are designated as “devices,” “infrastructure devices” or “network infrastructure devices.” Examples of such devices are ethernet switches and routers.
Devices that are not necessary as active components for network operation, but rather use the network that has been made available for productive operation, are designated in the following as “clients.” Examples of clients might include notebook computers, personal computers or control units of machines with ethernet interfaces.
Many modern infrastructure devices support at least one form of a discovery protocol, such as the LLDP (Link Layer Discovery Protocol) standardized by the IEEE (Institute of Electrical and Electronics Engineers) or the proprietary CDP (Cisco Discovery Protocol), to send information about their own configurations to their own network interfaces.
The purpose of this information packet is to enable a device to notify directly connected neighboring devices of its own presence and in some cases to configure its own interfaces.
The configuration data, so-called information PDU's (Protocol Data Units), are sent more or less without connections, that is, each switch merely makes its own information available at its interfaces, regardless of whether or not a receiving device is connected.
If all the devices in a network infrastructure support a given discovery protocol, then every device sends its information to all interfaces, and receives and analyzes the information of its direct neighbor at the respective interface through which this neighbor is connected (see
Furthermore, every device removes the information PDU's received at its interfaces from the network in order to prevent their being passed on to other infrastructure devices, since it is only ever the direct neighbor of a device that should receive the respective PDU'S.
The data of the neighboring device, received via the information PDU'S, are usually stored on each individual device in a data structure, the so-called MIB (Management Information Base).
These MIB's can be accessed via a management interface, such as the SNMP (Simple Network Management Protocol), and the neighbor's updated information can be read out.
In addition to the information received from its neighbors, every device usually also stores the configuration of its own interfaces in the MIB. Depending on the configuration of the devices, there can be deviations as a result of different settings in the implemented configuration.
It is therefore an object of the present invention to provide an improved method of determining configuration errors in networks.
Another object is the provision of such an improved method by which the neighboring information available on network infrastructure devices via discovery protocols (such as LLDP) can be used to detect configuration errors between the local device and the remote device.
Thus according to the invention the information about the neighboring network infrastructure devices, made available by the storage unit of the first infrastructure device, is used to detect error configurations between the respective devices by means of comparison of the data deposited in the storage unit.
Error configurations are detected as follows:
The information about the neighboring devices and the local devices, made available by the storage unit (MIB), can be used to detect error configurations between the respective devices.
To do this, the information in the existing MIB pertaining to the interface in the queried device and the interface in the neighboring device is ascertained for every device detected via the discovery protocol.
Thereafter, the information is reciprocally analyzed, which results in one out of many possible constellations of the interface configuration.
This constellation is subsequently evaluated by an analysis logic. Depending on the existing configuration, the analysis finds error-free or faulty configurations between the two devices.
This information can now be released to the end user via an interface in order to inform the end user of the problem in the device configuration.
A concrete example would be two network switches that are connected with one another via a twisted pair copper cable. On the local device, that is the device on which the MIB is accessed for example via SNMP, the network interface, to which the neighboring device is connected, is automatically configured to 100 Mbit Full Duplex Automatic.
On the neighboring device, the network interface to which the local device is connected is configured to 100 Mbit Full Duplex Manual.
This constellation can possibly lead to operating problems. The analysis logic compares the information of the local interface and of the neighboring interface and discovers this configuration problem. Afterwards the problem is reported to the user in the administration surface of the switch.
Furthermore, it is also possible to use local error detection for global error detection. The error detection described thus far offers individually for each infrastructure device an error detection in the context of the respective local device.
Since this error detection can be carried out individually on each device, for every device local error detection data are available in the entirety of the infrastructure.
If these respective local data are made available to a higher level, for example to a software component for network management, then network-overlapping errors can be detected via the local data, for example VLAN's (Virtual Local Area Networks) configured wrongly via different switches in the context of the entire network.
The deployment of error detection is therefore not necessarily limited to a device-related context, for example the representation of an individual infrastructure device in the management interface, but rather can also occur within a higher management level such as a software component for network management.
The above and other objects, features, and advantages will become more readily apparent from the following description, reference being made to the accompanying drawing in which:
As seen in
This is done, for example, by the information existing in storage unit 11 being ascertained for the interface on the queried network infrastructure device 1 and for the interface on the neighboring network infrastructure device 2 or 3 or 4 via the discovery protocol, such as LLDP or a different one, and by the information then being analyzed reciprocally (to which end the respective network infrastructure device 1 has the necessary hardware and software), resulting in one out of many possible constellations of the interface configuration being found.
That means that the individual configurations of the network infrastructure devices 1 to 4 can be entered into a table and compared, resulting in an error-free state if the network infrastructure devices connected with one another via a data line 5 (for example 1 with 2 or 1 with 3 or 1 with 4 in the network infrastructure of
This overlapping error detection is shown in
This problem correction can be displayed then in the network management unit, so that the user can recognize that the error has been corrected. This positive feedback between error detection, display to the user, problem correction, report-back and display of the error correction is shown in
It is conceivable that error correction by a user, particularly a system administrator, following error detection can be carried out manually, or alternatively that error correction following error detection can occur automatically. Error correction by a user following error detection has the advantage that an intervention in the network infrastructure is done deliberately for the purpose of error correction, and the user also obtains knowledge of errors and their correction. The important thing is that the user is able to recognize whether the ascertained error is an actual error, and if so, by what means and method he wishes to correct it. If that is not desired, the error correction will occur automatically according to programmed processes, since this can be done faster in the case of standard errors, for example, and the user does not need to intervene. He or she can have the process displayed, however, so as to be simply notified about an error and its automatic correction.
Number | Date | Country | Kind |
---|---|---|---|
102007039484.7 | Aug 2007 | DE | national |