The present invention relates to data transmission networks wherein it is necessary to perform the analysis of the network between a first data processing device such as a host and a second data processing device, such as a server, and relates in particular to a path analysis tool and method in a data transmission network including several Internet autonomous systems.
Today, there is a need for the users and service providers in the Internet network to understand the behavior of the network which may be slow and congested and wherein the server access for processing a user request takes much time because the server is heavily loaded.
It is hard to diagnose a server problem remotely, but some basic tools can help to check out the network. The two standard functions used most often to debug networks are called Ping and Traceroute. Both tools originated under UNIX (trademark of Unix System Laboratories), but have spawned programs such as DOS and Windows (trademark of Microsoft corporation) that behave similarly (namely Ping and Tracert, which are available using the DOS command shell).
The ping function is based upon a special Internet Protocol (IP) packet called the Internet Control Message Protocol (ICMP) echo request packet used to send network information between two hosts. When the destination host receives the original echo request packet, it answers with an echo reply message placing the original echo request packet into the data field of the echo reply message. Ping is a useful tool to test the network connectivity and to measure whether the data packets are getting from a source host to a destination host and to give details about the path. Furthermore, ping enables measuring how long a data packet takes to get from one host to another host. The Traceroute function is a more sophisticated tool defining the router path a data packet is taking. In fact, Traceroute is a particularity of the ICMP Messages. One of these messages is returned to the source host when the Time To Live (TTL) field, which is decremented by one each time the message goes through a router, reaches zero. This means that the destination host is unreachable and, in such a case, it is necessary for the source host to process a reverse Domain Name Service (DNS) request. As the ping function, the Traceroute function provides a hop by hop response time, allowing determination of a bottleneck point in the network between two hops.
A type of bottleneck may be due to the packet Maximum Transmission Unit (MTU) which limits the length of a datagram that may be put in one physical frame. IP requires that each link has an MTU of at least 68 bytes. If any network provides a lower value than this, fragmentation and re-assembly must be implemented in the network interface layer in a way that is transparent to IP. IP implementations are not required to handle unfragmented datagrams larger than 576 bytes, but most implementations will handle larger values, typically slightly more than 8192 bytes or higher and rarely less than 1500. New technologies with tunnelling add overhead to incoming packets and therefore the packet size is bigger than the expected. This leads to MTU problems that need to be identified. These problems may impact not only latency but also packet delivery.
Some other Internet tools are very useful to troubleshoot a network problem. They include the Whois function, which can determine which company (or legal entity) is responsible for an IP address and can then group several IP addresses in one Autonomous System (AS) group. They include also the DNS function which allows making the link between the IP address and the hostname. The DNS as well as the Whois are able to determine who is the person responsible for an IP address.
But, at this time, none of the existing tools that include the above functions groups them in an efficient way to enable troubleshooting the problems raised in the data path through a network.
Accordingly, the main object of the invention is to build a tool and achieve a method using information requesting procedures such as ping or Traceroute for analyzing a network behavior between a source data processing device, such a host, and a destination data processing device, such a server.
The invention relates therefore to a method for performing the analysis of the characteristics of a data path from a first data processing device to a second data processing device through a network comprising at least an autonomous system, the method consisting in defining in a scenario file the scenario to be used, such a scenario including the actions to be used, building a parameter file defining the parameters to be used in the actions, running at least one analysis module based upon the actions of the scenario file and the parameters of the parameter file, the analysis module calling at least a predefined information requesting procedure, and storing in at least an output file the data resulting from the running of the analysis modules.
According to another aspect, the invention relates to a path analysis tool for performing the analysis of a data path from a first data processing device to a second data processing device through a network comprising at least one autonomous system, the path analysis tool comprising a scenario file including a scenario defining the actions to be performed, a parameter file defining the parameters to be used in the actions, at least one analysis program module for performing the actions and using the parameters, the analysis program module calling at least one predefined information requesting procedure, and at least an output file for storing the data resulting from the running of the analysis modules.
The above and other objects, features and advantages of the invention will be better understood by reading the following more particular description of the invention in conjunction with the accompanying drawings wherein:
Several standard protocols and associated servers may be used to build the path analysis tool, including a Whois server 13 and a DNS server 14 which are attached to AS115. A certificate Authority CA 18 attached to AS216 may also be used to get characteristics of the data processing devices. CA allows providing trusted information inasmuch as this information is signed by organizations or companies. Note that DNS servers are less secure as they may be spoofed and do not contain all necessary information.
A case not covered by the current existing network analysis tools is illustrated in
Another case illustrated in
The path analysis tool according to the invention is illustrated in
Several types of analysis may be performed. The scenario file identifies which modules will be used within the analysis blocks. The scenario file may use one or several analysis blocks, each defining an analysis procedure. The currently defined analysis blocks include a zone analysis block 45, a Delay Analysis block 46, a Jitter Analysis block 47, a Throughput analysis block 48 and a MTU analysis block 49. Additional blocks may be added without major changes on the system which is modular. For example, a security analysis block may be added. This added block may use existing functions such as Certificate recovery form CA 54 or add new functions such as Authentication to a server. The proposed embodiment only addresses the performance test but the structure is open to any networking test.
An analysis block may contain several modules. For example, the zone analysis block includes a SortZone module used to group devices belonging to the same network or autonomous system. Another module is the Time To Live (TTL) calculator. This module uses the TTL field of the IP packet which is set to a relatively high number. As the packet goes through the network, the TTL field gets decreased by one by each router. When the TTL drops to 0, the packet is discarded by the router. Thus, the TTL can be used to determine approximately how many router hops the packet has gone through.
Another module is the Get module that is a cross analysis module that provides analysis with external data such as output files. This module is not shown as a block in the drawing but just with an arrow coming from database 44 to the analysis blocks. Similarly, the Put module allows storing information in a file like the output file or an intermediate file. Another common module is the timeout module which prevents a test from staying on hold.
External functions can be called by an analysis block. These functions are related to existing networking protocols and the call to a function results in packet generation on the network interface. A function which is often used is the ping function 50. Ping is a function that provides round-trip latency measurement of the sent packet and which depends mainly on the packet size and the class of service of the packet.
When pinging to a destination device, the function sends one ICMP echo request packet every second, for example, to the IP address of the device. When the ping program gets back an echo reply from the remote device, it prints out the response, giving several interesting pieces of information. The first one is the IP address of where it comes from (normally, the address of the destination device). The second one is the sequence number which indicates which ping packet got a reply (a skipped sequence number indicates a dropped packet). The third one is the Time To Live (TTL) field as mentioned above, and the fourth one is the time (in milliseconds) it took to get a reply. The ping parameters, such as packet parameters including packet length TOS (Type Of Service field included in the IP header) and the byte value which gives the Class of Service to use, are defined in the scenario file.
Another function often used is the Traceroute function 51 (Tracert) providing the identification of the IP address of nodes (devices) in the path up to the destination device. Several packets with different TTL values from 1 to N (N is the number of routers between the source and the destination devices) are successively sent to each router between the source and the destination devices. When the reply IP address is the same as the destination device address, this means that the destination device has been reached. Note that the IP address of the destination device can be determined by processing a single Domain Name Service (DNS) request to find the IP address from a hostname value.
Other functions illustrated in
Finally, the results of each analysis are used to create or to modify at least an output file 55 that is defined in scenario file 42. The details of such an output file are given hereafter.
The following grammar in XML language of the scenario file explains the structure of each field and each internal command. Note that XML is not mandatory, but the use of structured files for input and output files simplifies and improves the tool, making it easy to interface with other softwares.
Thus, the following example is a zone analysis for a device followed by a delay analysis based on a defined sequence of pings for all nodes in the path to the destination device which is a web server.
In the above example, the analysis is made thanks to the traceroute and Whois functions and the SortZone module as a first step and then ping as the second step when the scenario is involved. But a more complex mechanism may be added if necessary, such as the advanced Traceroute module.
Two output files for writing test results are created in this example: a Whois file which will contain the details for each node for which the Whois actions have been performed and a SortZone file which will contain the results of the aggregation by the provider.
The other input file, that is the parameter file, provides flexibility in providing easy access to the parameters and sequencing of functions to the user. Predefined parameter files can be used or modified for specific needs. This file defines which kinds of packets are to be sent, which size each packet will be and which timing will be used. Thus, the ping command may be used in burst mode, and a module is then used to define the parameters to apply to the ping function. Burst is a module that may be invoked in delay analysis, in jitter analysis or in throughput analysis.
The characteristics of a burst in the ping function defined in the following grammar includes the space between bursts called “period” and the space between pings in a burst called “burst space”.
The following parameter file shows an example of several bursts being configured with different timings and different packet sizes.
The output file contains the results of the analysis which are structured in a predefined manner in order to be easily presented to the user thanks to a web browser. An output file grammar is defined for each kind of test. Thus, the following grammar is given for delay measurement structured by zones.
For each test, detailed results can be stored or only aggregated results or both. So, each action corresponding to a call of an external function or an internal function from a module of an analysis block may be defined as a function having outputs. Output information of each action as standard results or advanced computation can have several attribute fields as defined in the output grammar.
As an example, the following output file example shows a first action Traceroute providing just a list of IP addresses corresponding to the nodes in the path. Then, the Whois action provides the network to which each IP address or host name belongs. A third action, SortZone, defines which are the first and last nodes in the path in the corresponding networks, including the number of hops on each network. A last action is the ping action (in burst mode) providing statistics by zone.
Now, examples of the analysis procedures shown in
Referring to
The delay analysis then continues at step 94 where all network or sub-network boundary nodes are pinged with parameters defined by the parameter file used. The reception of ping packets provides information that can be used to calculate requested information on delay at step 96 which is then stored in an output file at step 99.
The main difference for the main link delay calculation is that a ping or sequence of pings is sent to all nodes in the path at step 95 and then the delay measurement is done at step 97 by delta round-trip calculation between two consecutive nodes. The classification of nodes may also be provided at this stage depending on the request defined in the scenario file. The last step 99, as for the other analysis, is to store the results in an output file.
Referring to
With a server, the same sequence of pings can be sent at step 103; but as the server is proprietary, other protocols than ICMP can be used, for example, the test can be performed with TCP or UDP over IP. The server will intercept these packets and will rebuild a similar sequence using the same parameter file. Either the scenario is predefined or the station starting the test sends its scenario to the server prior to the test. So, the server sends the same sequence back to the station which will be received at step 104. The method steps in the server are not shown as they are similar to the ones in the station. The server can do the test in parallel on its side. The station then requests the results of the first sequence to the server and gets associated results at step 105. The results will provide the jitter for the path from the station to the server while the received sequence provides the jitter for the path from the server to the station after calculation at step 106. The last step 100 is to store both one-way results into an output file (shown in
Referring to
If no answer is received to the ping, a timeout at step 113 branches to step 115 where the MTU is reduced to a value defined in the parameter file. The method can be either a dichotomist test or a decrease of the MTU value corresponding to a decrease of the ping packet length. Then, step 115 loops back to step 113 and waits for an answer.
If bottleneck identification is done at step 116, which can be the case for any MTU not being the max MTU or for a MTU under a defined value, a ping is sent to each node in the path with a value just above the MTU found at step 117. The first node not answering (or the last answering from the source) identifies the bottleneck node at step 118. The information is stored in an output file and will help to improve the network behavior by further investigation.
Referring to
The throughput analysis is more efficient if it starts with packets from the maximum size so the MTU calculation will help to define this value which can be an input for this analysis.
In that case, the max frame size is set to this MTU value at step 121 and then a sequence of packets (ping generally) defined in the parameter file are sent to the destination at step 122. If only large packets are sent, this provides the maximum throughput but does not give all network characteristics so that the preferred test is to continue after the first sequence of packets to send smaller packets in decreasing the size. This is an option in the scenario file. In that case, the first access to step 123 will see that the low limit of packet size is not reached and then, at step 124, the packet size is decreased before resending a full test sequence. When the low limit is reached, step 123 jumps to step 125 where the results are stored in an output file.
While this invention has been described in a preferred embodiment, other embodiments and variations can be effected by a person of ordinary skill in the art without departing from the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
0216752 | Dec 2002 | FR | national |