1. Technical Field of the Invention
The present invention generally relates to Ethernet networks. More particularly, and not by way of any limitation, the present invention is directed to system and method for diagnosing misconfigurations in such networks.
2. Description of Related Art
In any network, various network parameters will have to be configured in order to provide efficient and optimal network operation. This is also true with respect to Ethernet networks; however, the situation with respect to Ethernet networks is somewhat more unique. In particular, although Ethernet supports plug-and-play operation, some level of configuration must be performed to achieve efficient levels of performance, especially in carrier grade Ethernet networks. This situation is not dissimilar from those to which operators are accustomed in other networks currently employed, except that Ethernet brings with it an entirely new philosophy of operation, as well as an entirely new set of parameters that need to be configured and with which operators might not be well-acquainted. This translates to a higher likelihood that Ethernet network parameters will be either wrongly configured or misconfigured.
Currently, when an Ethernet network is improperly configured, it can be difficult to detect and correct the misconfiguration before it negatively impacts the network. Specifically, those misconfigurations that result in sub-optimal network operation, as opposed to a catastrophic outcome, are particularly difficult to detect. Catastrophic outcome is typically due to link or fabric failure and is detected and corrected by Operation, Administration and Maintenance (“OAM”) mechanisms. As used herein, sub-optimal operation encompasses both situations in which a network is functioning in a sub-optimal manner and situations in which a network is currently functioning in an optimal manner, but in which there is potential for problems upon reconfiguration or topology change (due to the addition/removal of elements/links) in the future.
As previously noted, a misconfiguration will typically be detected only after it has caused potentially serious network problems, at which point, an attempt will be made to correct the misconfiguration. Thus, diagnosis and correction of misconfigurations are reactive, rather than proactive; as a result, they can result in substantial expense to the network operator.
One embodiment is a method of diagnosing misconfigurations in a network. The method comprises querying a network element for a current value of at least one parameter; determining an optimal value of the at least one parameter; comparing the current value of the at least one parameter with the optimal value of the at least one parameter; and providing a notification if a discrepancy exists between the optimal value of the at least one parameter and the current value of the at least one parameter.
Another embodiment is a system for diagnosing misconfigurations in a network. The system comprises means for querying a network element for a current value of at least one parameter; means for determining an optimal value of the at least one parameter; means for comparing the current value of the at least one parameter with the optimal value of the at least one parameter; and means for providing a notification if a discrepancy exists between the optimal value of the at least one parameter and the current value of the at least one parameter.
Yet another embodiment is a system for diagnosing misconfigurations in a network. The system comprises a network element query module for querying a network element for a current value of at least one parameter; a topology analysis module for analyzing a topology of the network to determine an optimal value of the at least one parameter; and a comparison module for comparing the current value of the at least one parameter with the optimal value of the at least one parameter and for providing a notification if a discrepancy exists between the optimal value of the at least one parameter and the current value of the at least one parameter.
A more complete understanding of the present invention may be had by reference to the following Detailed Description when taken in conjunction with the accompanying drawings wherein:
Embodiments of the invention will now be described with reference to various examples of how the invention can best be made and used. Like reference numerals are used throughout the description and several views of the drawings to indicate like or corresponding parts, wherein the various elements are not necessarily drawn to scale.
A network management system (“NMS”) 110 is connected to a management port of each of the bridges B0-B3 via links 112(0)-112(3) for monitoring the status of the bridges. It will be recognized that no network traffic is transmitted via the links 112(0)-112(3). The network 100 illustrated in
A Topology Analysis Module (“TAM”) 206 comprises logic for, given a network topology, computing optimal values for the parameters that will optimize the operation of that network. These optimal parameter values are also stored in the database 204. The TAM logic is executed off-line. Given a set of network topologies that is derived through the NMS, various algorithms will be invoked to calculate the various parameters. A Comparison Module 208 periodically compares the current parameter values with the optimal values for those parameters to determine whether the values match; i.e., whether the operation of the network is optimized for the current topology. If not, the Comparison Module 208 initiates issuance of a non-binding notification or alarm to the network operator that a misconfiguration has been detected. Suggestions for corrective measures may also be issued with this notification/alarm.
It will be recognized that the NDM can be as encompassing as the number of parameters that are subject to analysis can be. A non-exhaustive list of such parameters, along with an explanation of each such parameter, is provided in detail below. It should be recognized that there are other parameters that may also be monitored and that not all of these parameters must be monitored in order to practice the embodiments described herein.
Additionally, again with regard to the assignment of VLAN identifiers, it should be noted that “double encapsulated VLAN hopping attacks” take advantage of the way the hardware on some switches operates. In particular, some switches perform only one level of IEEE Std. 802.1Q de-capsulation, which can be exploited by an attacker to illegally change VLAN assignments. The best remedy is to make sure that the native VLAN on “trunk ports” is different than the native VLAN on “user ports”.
It is believed that the operation and construction of the present invention will be apparent from the Detailed Description set forth above. While the exemplary embodiments of the invention shown and described have been characterized as being preferred, it should be readily understood that various changes and modifications could be made therein without departing from the scope of the present invention as set forth in the following claims.