WO2005125100A1 - System and method for connection performance analysis - Google Patents

System and method for connection performance analysis Download PDF

Info

Publication number
WO2005125100A1
WO2005125100A1 PCT/IB2005/001715 IB2005001715W WO2005125100A1 WO 2005125100 A1 WO2005125100 A1 WO 2005125100A1 IB 2005001715 W IB2005001715 W IB 2005001715W WO 2005125100 A1 WO2005125100 A1 WO 2005125100A1
Authority
WO
WIPO (PCT)
Prior art keywords
test
traffic
connection
service
frame
Prior art date
Application number
PCT/IB2005/001715
Other languages
French (fr)
Inventor
John Kevin Weeks
Ross Alexander Jamieson
Vikas Trehan
Wayne Robert Sankey
Doug Blettner
Michael J. Mezeul
Original Assignee
Adva Ag Optical Networking
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Adva Ag Optical Networking filed Critical Adva Ag Optical Networking
Priority to CA002570176A priority Critical patent/CA2570176A1/en
Priority to DE602005003226T priority patent/DE602005003226T2/en
Priority to EP05750305A priority patent/EP1757017B1/en
Publication of WO2005125100A1 publication Critical patent/WO2005125100A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5077Network service management, e.g. ensuring proper service fulfilment according to agreements wherein the managed service relates to simple transport services, i.e. providing only network infrastructure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5625Operations, administration and maintenance [OAM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • H04L43/55Testing of service level quality, e.g. simulating service usage

Definitions

  • a final step in establishing a circuit often includes a testing process to verify the service integrity and performance characteristics of the circuit. In-service testing may also be performed to ensure that a previously established circuit is operating as desired. Such testing generally requires a service provider to connect external test equipment to both ends of the circuit to verify the circuit's service integrity and performance characteristics. The purpose of the test equipment is to verify that all intermediate switching points in the network are properly configured and that the circuit operates as specified under various traffic conditions and loads. This is a time-consuming and labor and resource-intensive task. Some systems use a centralized test head included in a network management node (i.e., within the network connecting the two ends of the circuit).
  • Such a centralized test head may, for example, send frames to each end of the circuit separately for testing purposes.
  • the end-to-end connection between the two ends is not tested because the frames are originated and terminated on the centralized test head and only pass through one segment of the connection at a time. Accordingly, if one end of the circuit fails the testing, it may be because of problems in the test head itself or problems between the test head and the endpoint being tested. Therefore, current centralized test heads do not provide satisfactory remote testing capabilities. ' Accordingly, an improved system and method for performing connection performance analysis in a network environment are desired.
  • Fig. 1 illustrates a conventional system using two test sets for verifying a service connection.
  • Fig. 2 illustrates the system of Fig. 1 utilizing one embodiment of embedded connection performance analysis functionality for end-to-end verification of the service connection.
  • Fig. 3 is a flow chart of one embodiment of a method for performing the connection performance analysis within the system of Fig. 2.
  • Fig. 4 illustrates a conventional system using three test sets for verifying point-to-multipoint service connections.
  • Fig. 5 illustrates the system of Fig. 4 utilizing one embodiment of embedded connection performance analysis functionality for end-to-end verification of one or more of the service connections.
  • Fig. 1 illustrates a conventional system using two test sets for verifying a service connection.
  • Fig. 2 illustrates the system of Fig. 1 utilizing one embodiment of embedded connection performance analysis functionality for end-to-end verification of the service connection.
  • Fig. 3 is a flow chart of one embodiment of a method for performing the connection performance analysis within the system of Fig. 2.
  • FIG. 6 is a block diagram of one embodiment of a service demarcation point having connection performance analyzer capabilities.
  • Fig. 7 is a block diagram illustrating one embodiment of the connection performance analyzer of the service demarcation point of Fig. 6 as a functional block in a service card.
  • Fig. 8 is a block diagram illustrating the flow of test traffic through a connection established between two of the service cards of Fig. 7.
  • Fig. 9a is a flow chart of one embodiment of a method for verifying the connection of Fig. 8 from the perspective of the service card that originates the test traffic.
  • Fig. 9b is a flow chart of one embodiment of a method for verifying the connection of Fig. 8 from the perspective of the service card that is at the opposite end of the connection from the originating service card of Fig.
  • Fig. 10 is a block diagram illustrating the flow of test traffic in a point-to-multipoint environment with the service cards of Fig. 7.
  • Fig. 11 is a block diagram illustrating one embodiment of functional components within a connection performance analyzer in a service demarcation point.
  • Fig. 12 is a block diagram of a test traffic injector that may be used in the connection performance analyzer of Fig. 11.
  • Fig. 13 is a block diagram of a test traffic monitor that may be used in the connection performance analyzer of Fig. 11.
  • the present disclosure relates generally to communication services and, more specifically, to a system and metliod for connection verification and perfonnance analysis. It is understood, however, that the following disclosure provides many different embodiments or examples. Specific examples of components and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting. In addition, the present disclosure may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed. The following description uses an Ethernet environment as an example environment and therefore uses Ethernet terminology (e.g., frames).
  • Ethernet terminology e.g., frames
  • the methods and systems disclosed herein may be used in other environments, such as those utilizing Multiprotocol Label Switching (MPLS), Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and other technologies based on a protocol data unit (PDU) model.
  • MPLS Multiprotocol Label Switching
  • IP Internet Protocol
  • ATM Asynchronous Transfer Mode
  • frame is used extensively herein for purposes of example, it is understood that other PDUs (e.g., MPLS/IP packets) may be substituted for the term "frame” and alterations made to the Ethernet specific exemplary methods and systems for purposes of compatibility with the particular PDU model.
  • encapsulation e.g., IP/AAL5/ATM
  • an exemplary environment 100 includes a network (e.g., a Metro Ethernet Network (MEN)) 102, two service demarcation points UNI A and UNI B (contained within the provider equipment 104 and 106, respectively) and customer equipment 108, 110 coupled to the provider equipment 104 and 106, respectively, via local area networks (LANs) 112, 114.
  • the MEN 102 is a service provider network that provides Ethernet frame transport services between customer Ethernet ports.
  • Each of the UNIs A and B is a standard Ethernet interface that is the point of demarcation between the customer equipment 108, 110 and the MEN 102.
  • a connection (e.g., an Ethernet Virtual Connection (EVC)) 116 couples the provider equipment 104 and 106 (and their corresponding UNIs A and B) via the MEN 102.
  • the EVC of the present example is defined by the Metro Ethernet Forum (MEF) as an association of two or more UNIs.
  • An EVC connects two or more subscriber sites 118 and 120 and enables the transfer of Ethernet service frames between them, and prevents data transfer between subscriber sites that are not part of the same EVC.
  • each subscriber site 118 and 120 includes provider equipment and customer equipment coupled by a LAN.
  • service demarcation point and "UNI” may be used interchangeably in certain examples, and it is understood that a UNI is contained in provider equipment that is positioned in the network as a service demarcation point. It is also understood that the UNI may represent other service demarcation points, such as a network-to-network interface (NNI).
  • NNI network-to-network interface
  • test equipment 122 and 124 The purpose of the test equipment 122 and 124 is to verify that all intermediate switching points in the MEN 102 are properly configured and that the EVC 116 operates properly under various traffic conditions and loads. This is a time-consuming and labor and resource-intensive task.
  • the MEN operator when creating an Ethernet point-to-point service connection (e.g., the EVC 116), the MEN operator first identifies which physical ports on the provider equipment 104 and 106 are to participate in the EVC 116 between UNIs A and B. The operator then configures the provider equipment 104 and 106 (e.g., on both ends) and all intermediate equipment in the MEN 102 to establish the EVC 116 using the assigned ports.
  • the identification and configuration may be accomplished from a central network management node 126 (e.g., a terminal) by a single operator. If the network operator is to offer a guaranteed level of service to an end subscriber (e.g., a user of the customer equipment 108 or 110), the operator should verify that the EVC configuration is correct across the network between the two sites 118 and 120. To accomplish this, the network operator should verify the service connection and its performance parameters from end-to-end before declaring the EVC "fit for use.” The verification entails the deployment of one or more network technicians 128 and/or 130 to the customer sites 118 and 120 with the Ethernet test equipment 122 and 124.
  • a central network management node 126 e.g., a terminal
  • the technicians 128 and 130 connect the test equipment 122 and 124 to the assigned physical ports on both ends of the EVC 116 and proceed to verify the performance and integrity of the EVC under various operating conditions. After the network technicians and operator are satisfied that the connection is functioning properly, the EVC and its associated service is turned over to the subscriber.
  • a connection performance analyzer (CPA) (not shown) positioned within the provider equipment 104 and 106.
  • each CPA may be implemented as part of a service demarcation point (e.g., as a service card within the provider equipment).
  • the CPAs enable end-to-end (UNI-to-UNI) testing of the EVC 116 without the need for the testing equipment and technicians described with respect to Fig. 1. It is understood that the implementation of a CPA within a service card is for purposes of convenience only, and that the CPA may be implemented in any portion of the provider equipment.
  • the CPA functionality may be used to execute a custom or predefined series of tests, such as those detailed in RFC 2544 (entitled "Benclimarking Methodology for Network Interconnect Devices") from any UNI point in a network that has the CPA functionality. Furthermore, the testing may be controlled remotely from the network management node 126.
  • the management node may use management tunnels (that use VLAN tags, MAC addresses, etc.) and TL1 commands such as OPR-LPBK- E100: ⁇ tid>: ⁇ aid>: ⁇ ctag>; RLS-LPBK-E100: ⁇ tid>: ⁇ aid>: ⁇ ctag>; and TEST-E100: ⁇ tid>: ⁇ aid>: ⁇ ctag>:.
  • management tunnels that use VLAN tags, MAC addresses, etc.
  • TL1 commands such as OPR-LPBK- E100: ⁇ tid>: ⁇ aid>: ⁇ ctag>; RLS-LPBK-E100: ⁇ tid>: ⁇ aid>: ⁇ ctag>; and TEST-E100: ⁇ tid>: ⁇ aid>: ⁇ ctag>:.
  • a method 300 illustrates one embodiment of a process that may be used to test the EVC 116 of Fig. 2.
  • the UNI B is the originating UNI and the UNI A is the destination UNI.
  • the originating UNI B injects test traffic into the EVC 116.
  • UNI A loops the test traffic back to the UNI B.
  • the UNI B monitors the EVC's traffic to identify the test traffic, which may then be analyzed. It is understood that the various steps may occur simultaneously, with test traffic being injected, looped back, and monitored in an ongoing process.
  • the duration of such a test may be defined as desired (e.g., number of frames generated, defined time period, manual start/stop, or until certain test values are received).
  • the system 100 of Fig. 1 is illustrated with an additional site 400 coupled in a point to multi-point relationship with the sites 118 and 120.
  • service verification can be performed at both ends of the EVC without disrupting existing traffic.
  • service verification becomes more complicated when deploying point to multi-point EVCs. It is understood that this problem can also be extrapolated to a multi-point to multi-point case (not shown).
  • the UNI of site 400 is acting as an aggregation point for EVCs from multiple other UNIs (e.g., the UNIs A and B from sites 118 and 120, respectively).
  • Traffic from UNI A and UNI-B is aggregated at UNI C (provider equipment 404) and presented to the customer equipment 402 over a single Ethernet.
  • UNI C provider equipment 404
  • An example of this application is the case of an Internet Service Provider (ISP), where the subscriber at UNI C is an ISP that is collecting traffic from multiple customers (UNIs A and B).
  • ISP Internet Service Provider
  • the single Ethernet port at UNI-C has multiple EVCs 116 and 406 terminated on it.
  • Each individual EVC to UNIs A and B is established in the same manner as the point-to-point EVC described earlier with respect to Fig 1.
  • the difficulty lies in testing each individual EVC 116 and 406 without disrupting traffic on the other EVCs already established on the multipoint UNI C, as disrupting traffic on UNI C whenever a new EVC is established to a new remote site is undesirable.
  • the system of Fig. 4 is illustrated with the addition of a CPA (not shown) positioned within the provider equipment 104, 106, and 404.
  • the CPAs enable the EVCs 116 and 406 to be tested without the need for testing equipment and technicians at each UNI.
  • the testing may be controlled remotely from the network management node 126.
  • each CPA e.g., an Etherjack® Connection Performance Analyzer (ECPA) available from Covaro Networks, Inc. of Richardson, Texas
  • ECPA Etherjack® Connection Performance Analyzer
  • each CPA may provide a subset of Ethernet test equipment functions embedded directly into the service demarcation point so that each individual Ethernet port can act as its own "test equipment.” This allows the CPA to minimize or eliminate the need for external test equipment and may also allow EVC integrity and perfonnance characterization to be performed by a single operator from a single (remote) management console.
  • Such remote management may be accomplished by providing a management feature that allows for remote control from a network management terminal anywhere in the network.
  • the CPA may also provide a means to add and test new EVCs without disrupting existing services on a multi-service UNI, including service verification for new point-to-point EVCs on a multipoint Ethernet port without disrupting other "live" connections on the same port. Accordingly, the CPA allows a network operator to significantly reduce the operational expense (and time) of deploying Ethernet services.
  • the CPA may also provide a port loopback on each Ethernet port that loops egress traffic back to the ingress path to enable end-to-end traffic testing.
  • the CPA's functionality may be implemented by a combination of hardware and software components. For example, a hardware component may be used to insert Ethernet test frames into an EVC connection and to extract the Ethernet test frames received from the EVC connection.
  • FIG. 6 a block diagram illustrates one embodiment of CPA components implemented within the data path of a service demarcation point 600.
  • the service demarcation point 600 includes a media access control (MAC) block 602, an ingress frame processing block 604, a network transport block 606, and an egress frame processing block 608.
  • MAC media access control
  • the CPA functionality includes a test traffic injector 610 (e.g., a frame injector in the present Ethernet example) positioned in tire ingress traffic data-path on the service card 600 and a traffic monitor 612 (e.g., a frame monitor in the present Ethernet example) positioned in the egress traffic data-path.
  • a test traffic injector 610 e.g., a frame injector in the present Ethernet example
  • a traffic monitor 612 e.g., a frame monitor in the present Ethernet example
  • the frame injector 610 allows traffic from the MAC block 602 to pass througli to tire ingress frame processing block 604.
  • the frame monitor 612 in normal operation, passes frames transparently in the egress direction from the egress frame processing block 608 to the MAC block 602.
  • the frame injector 610 injects test traffic into the ingress or egress traffic flow (i.e., into the network or towards the subscriber).
  • This test traffic emulates the flow of traffic from a UNI and allows various characteristics of the traffic to be simulated to ensure that the EVC connection performs correctly all the way through the network.
  • the frame monitor 612 when enabled, sniffs the egress traffic path for EVC test frames and traps them. The frame monitor 612 may then perform various performance calculations on the received traffic to generate performance results (e.g., received traffic rate, transmission delay, jitter, frame sequence reception, total number of received frames, and verification of 802. lp priority bits).
  • the frame injector 610 and frame monitor 612 may also implement a flow loopback path 614 that allows egress test traffic frames trapped in the frame monitor 612 to be "looped" back to the frame injector 610 for transmission back into the network.
  • This flow loopback enables a single EVC test traffic flow to be looped back without affecting the egress flow of normal EVC traffic. This capability may be used, for example, in multi-service port testing.
  • Fig. 7 is a block diagram illustrating a more detailed embodiment of the service demarcation point of Fig. 6 with the CPA functionality implemented within a service card inserted into provider equipment.
  • the frame injector 610 is capable of sourcing three independent traffic flows (although it is understood that implementations sourcing more or fewer traffic flows may be provided), each with a different set of characteristics. Thus, it is possible to test EVC performance for multiple classes of traffic (for instance, with different priority levels) to ensure that different traffic classes receive the correct treatment.
  • the frame monitor 612 is capable of monitoring and analyzing three independent data flows in the present example. For example, there may be high priority, low latency traffic on the first flow, high priority, latency tolerant traffic on the second flow, and low priority, best effort traffic on the third flow.
  • the three monitors observe each flow individually and then traffic flow characteristics of all three flows can be verified through the same service to ensure that high priority traffic does not interfere with low priority traffic.
  • Multiple instances of frame injector and frame monitor components may exist to handle the various flows, as will be described later in greater detail.
  • the frame injector 610 is a hardware block that provides numerous parameters that may be configured by control software that executes on a separate processor module located in the same chassis. The frame injector 610 allows the control software to create each independent Ethernet traffic flow througli the specification of one or more fields of an Ethernet frame.
  • Exemplary fields include: • Frame Control Header: a hardware label or header that is used internally by the service module to identify test frames; • MAC source and destination addresses; • Stacked VLAN header (optional); • VLAN header (optional); • Ethernet frame Length/Type fields: allow the software to specify the overall size of the frame to be generated; • IP frame header (optional); o IPv4 (20 bytes) o IPv6 (40 bytes) o Enables software to specify an entire IP packet header to enable the setting to TOS/DSCP bits, IP addresses, etc., to allow testing of layer 3 devices in the network connection; and • Payload pattern: allows software to specify either a fixed pattern to fill out the remaining payload in the Ethernet frame or the insertion of a pseudo-random pattern.
  • the frame injector 610 may also automatically calculate and insert the following fields into each test frame prior to transmission: • Sequence Number: an incrementing number to verify frame ordering on receive. • Timestamp: an internally generated time stamp indicating the number of clock cycles that have passed since the start of the test. This is used by the frame monitor 612 to calculate delay and latency parameters. • Signature: an internally generated field used to confirm that the frame is a CPA test frame.
  • Each traffic flow may also have a designated rate parameter that specifies the average bits per second transmission rate for the flow.
  • a scheduling mechanism such as a weighted round-robin scheduling mechanism, may be used to ensure that each flow receives the appropriate bandwidth when multiple flows are enabled. In the case of a single flow, weighted round-robin scheduling may be bypassed.
  • upstream traffic e.g., traffic directed from the MAC block 602 to the ingress frame processing block 604
  • matching the traffic being injected by the frame injector 610 may be identified and blocked. This prevents the upstream traffic from interfering with the injected test traffic stream.
  • the function of the frame monitor 612 is to monitor and terminate test frames received from the network. During normal operation, when monitoring is inactive, all frames pass transparently through the frame monitor 612 unchanged. As described previously, in the present example, the frame monitor 612, like the frame injector 610, supports up to three simultaneous, independent monitoring sessions to monitor up to three EVC traffic flows. Performance parameters may be calculated for each flow independently. Traffic passing through the frame monitor 612 may be discarded if it matches certain criteria. When monitoring is enabled, all non-test frames (normal EVC traffic) continue to pass through the frame monitor 612 unchanged. All test frames, however, are trapped by the frame monitor 612 and are either terminated or looped back to the frame injector 610.
  • the frame monitor 612 may determine various characteristics of some or all test frames, including CRC integrity, sequence ordering, delay and latency, delay distribution (minimum and maximum latency), and throughput (e.g., bits per second). Minimum and maximum latency values may be determined by the frame monitor 612. This supports the calculation of jitter performance on frame transmission.
  • the frame monitor 612 and frame injector 610 swap Source and Destination MAC addresses to ensure that the received test frame, when injected back into the network, can traverse any Ethernet switches in the network and successfully navigate back to the frame injector 610 that originally sourced the test frame.
  • IP address swapping/processing may be required when operating in flow loopback mode to ensure that loopback test frames can successfully navigate any routers or layer 3 switches that may be present in the EVC.
  • a configuration of a typical point-to-point EVC service verification test is illustrated using the service card 700 of Fig. 7 (positioned within a UNI B) and an additional service card 800 (positioned within a UNI A) that is similar or identical to the service card 700.
  • the service card 800 includes a MAC block 802, an ingress frame processing block 804, a network transport block 806, an egress frame processing block 808, a test traffic injector 810, and a traffic monitor 812.
  • the test traffic (which follows the path indicated by line 814) is injected by the frame injector 610 of the service card 700.
  • Port loopback 816 (or flow loopback in some embodiments) may be utilized on the remote UNI B to return all traffic (including the test traffic) to the service card 700, and the frame monitor 612 of lie service card 700 monitors the incoming traffic to detect the test traffic.
  • Figs. 9a and 9b One embodiment of this process is illustrated in greater detail in Figs. 9a and 9b.
  • Figs. 9a a method 900 executed by the originating UNI B of Fig. 8
  • 9b a method 914 executed by the remote or destination UNI A
  • step 902 attributes are defined for the test traffic (e.g., for each PDU (frame in the present example)) and the frames are generated in step 904.
  • Traffic to be injected into the flow e.g., test traffic or normal traffic
  • step 910 the CPA monitors incoming traffic for test traffic and analyzes the traffic for desired characteristics in step 912.
  • the CPA monitors the incoming traffic for test traffic in step 916 and loops the test traffic back to tlie originating CPA in step 918.
  • a test being conducted on a multipoint UNI is illustrated with the service cards 700 (UNI B) and 800 (UNI A).
  • the EVC 1002 is between the UNIs A and B
  • the EVC 1004 is between the UNI A and another UNI (not shown)
  • the EVC 1006 (between the UNIs A and B) is for the test traffic that is injected into the network by the frame injector 610 of the service card 700.
  • flow loopback 1008 is used to loopback only the test traffic EVC 1006, while other EVC flows 1002 and 1004 continue unimpeded through the multipoint UNI A port.
  • the frame monitor 612 of the service card 700 monitors the incoming traffic on the UNI B to detect the test traffic.
  • a block diagram 1100 illustrates the interaction between various frame injector and frame monitor functions in one embodiment of a CPA.
  • the frame injector and frame monitor functions are positioned between a MAC block 1102 and a network transport block 1104.
  • the M AC block 1102 provides standard Ethernet Media Access Controller functionality, providing Ethernet MAC functions (e.g., per the IEEE-802.3 standard).
  • the network transport block 1104 performs normal frame processing to control transmission to, and reception from, the network.
  • the remaining functional blocks of the diagram 1100 include an egress select block 1106, a test inject block 1108, an ingress select block 1110, a test monitor block 1112, a monitor select block 1114, and two traffic control blocks 1116a and 1116b.
  • the egress select block 1106 selects the traffic frames that are transmitted to the subscriber, either test frames from the test inject block 1108 or normal frames from the network.
  • the test inject block 1108 generates the test frames and is illustrated in greater detail in Fig. 12.
  • the ingress select block 1110 selects traffic frames that are transmitted to the network, either test frames from the test inject block 1108, normal frames from the subscriber, or test frames that are being looped back into the network.
  • the test monitor block 1112 monitors test frames from the ingress or egress direction and performs analysis on the test traffic. This block is illustrated in greater detail in Fig. 13.
  • the monitor select block 1114 is programmed to select test frames from either the ingress or egress traffic path and forward test frames to the test monitor block 1112.
  • the two traffic control blocks 1116a and 1116b function as ON/OFF valves to allow frames to flow through or to terminate frames without sending them on. These blocks 1116a and 1116b may differentiate between normal traffic frames and test frames and may be configured to act independently with respect to each type of traffic. This enables test frames to be terminated, for example, while normal traffic frames are allowed to pass through. Fields such as the VLAN ID and/or signature fields may be used to differentiate between test frames and normal traffic frames.
  • a VLAN loopback channel 1118 provides a means for looping test frames received from the network back into the network. Loopback test frames may be identified by means of their VLAN value(s), signatures, and/or other identifiers. This function allows certain test frames to be looped back to a source point without disrupting any other live traffic flows on the same physical port.
  • a functional block diagram illustrates one embodiment of the test inject block 1108 of Fig. 11. As previously described, the test inject block 1108 of the present example can generate up to three independent flows. Accordingly, there are three instances of the components illustrated in the diagram, with the exception of the blocks drawn with dashed lines, which are common control blocks across all three instances. For purposes of clarity, only the connections for one instance of the components are illustrated.
  • the components that may have multiple instances include a MAC header (HDR) 1200, an IP HDR 1202, a payload pattern generator 1204, a timestamp generator 1206, a sequence generator 1208, a signature generator 1210, a frame generator 1212, a frame count 1214, and a byte count 1216.
  • Components having only a single instance in the present example include a bandwidth controller 1218, a frame insertion manager 1220, a clock 1222, and a hardware flow control 1224.
  • the MAC HDR 1200 is programmable by software and contains the values for Ethernet MAC frame header fields, such as MAC Destination Address, Source Address, VLAN header, and Type/Length fields. These values are used when the test frame is created.
  • the IP HDR 1202 is programmable by software and contains values for fields in the IP packet header. This allows TOS DSCP bits to be specified in the IP packet header to simulate IP headers that would be received from subscribers.
  • the payload pattern generator 1204 is responsible for generating data for the payload of the IP packet and MAC frame. In the present example, there are three software programmable data types: (1) a random pattern generated by this function, (2) a software specified pattern of limited length, which is duplicated and repeated by the payload pattern generator 1204 to fill the remaining payload, and (3) a complete payload content specification (that may be manually defined).
  • the timestamp generator 1206 is configured to place an internal timestamp in a portion of the payload each time a test frame is generated.
  • the location of the timestamp may be proprietary.
  • the timestamp is used by a Frame monitor function (e.g., the test monitor 1112 of Fig. 11) to determine latency and jitter associated with transmission of the test frame.
  • the sequence generator 1208 provides a unique, incrementing sequence number for each test frame generated for each flow. The sequence number is used by the frame monitor to look for proper packet ordering on receipt. The sequence generator 1208 maintains the sequence numbering for this test flow.
  • the signature generator 1210 generates a signature used to verify that tlie associated frame is a test frame.
  • the signature generator 1210 may generate the signature in many different ways, including the use of a checksum, CRC, or a multi-input signature register (MISR).
  • MISR multi-input signature register
  • the frame generator 1212 creates a test frame using data input from the various component contributors (1200-1210). It calculates the frame check sequence (FCS) value for the entire packet frame and transmits the frame when signaled to do so by the frame insertion manager 1220.
  • the frame count 1214 maintains a count of the number of test frames that have been transmitted since the test was initiated by software. The value of the frame count is available to software at any point in time.
  • the frame count 1214 may cooperate with the bandwidth controller 1218 to generate a finite number of test frames. Once this (optional) limit is reached, the bandwidth controller 1218 will not request that any further frames be generated until the test is reset by software. This allows a finite number of test frames to be sent.
  • the byte count 1216 keeps track of the number of bytes sent for the current test duration.
  • the bandwidth controller 1218 controls the bandwidth for each test flow.
  • the bandwidth or rate of frame generation for a test flow is specified via software. This block uses the software specifications and clock ticks received from the hardware clock 1222 to determine how often to schedule and generate a test frame. Because each individual test flow can have its own rate of generation, the bandwidth controller coordinates between the three possible flows to ensure that each flow receives its proper bandwidth allocation.
  • the frame insertion manager 1220 is triggered by the bandwidth controller 1218 once the bandwidth controller has determined it is time to generate a frame for a flow.
  • the frame insertion manager 1220 coordinates frame insertion using the internal hardware flow control 1224 to schedule the test frame transmission when an opportunity arises.
  • the clock 1222 represents the hardware clock ticks that are used to schedule the operation of the frame injector and to derive timestamps. It is understood that other scheduling methods may be used, including controlled methods.
  • the hardware flow control 1224 coordinates with the transport modules in the system to request a frame inject timeslice. When granted a transmit token, the hardware flow control 1224 notifies the frame insertion manager 1220 to trigger the transmission of the test frame.
  • a functional block diagram illustrates one embodiment of the test monitor block 1112 of Fig. 11. As previously described, the test monitor block 1112 of the present example can monitor up to three independent flows, and there are three instances of the test monitor.
  • the test monitor block 1112 includes a frame screener 1300, a frame capture function 1302, a frame analyzer 1304, a signature analyzer 1306, a sequence analyzer 1308, a latency calculator 1310, a frame count 1312, and abyte count 1314.
  • the frame screener 1300 calculates and verifies the FCS for the frame and screens all received frames with a valid FCS to identify test frames in the traffic flow. Test frames are identified using criteria programmed by software.
  • This block also generates a control signal that determines whether the test frame is terminated or whether the test frame is allowed to continue downstream. This control signal may be used by one or both of the traffic control blocks 1116a and 1116b of Fig. 11 to terminate or pass the test frame.
  • the frame capture function 1302 captures and buffers one or more received test frames when a test is initiated. Software can then read the contents of this buffer to examine a frame's contents.
  • the frame analyzer 1304 uses information programmed by software to locate fields in the test frame that contain test specific data, such as the signature, originating timestamp, and sequence numbers. The signature, sequence, and timestamp numbers are passed to tlie signature analyzer 1306, sequence analyzer 1308, and latency calculator 1310.
  • the signature analyzer 1306 utilizes the signature embedded in the test frame to determine whether the frame is a test frame.
  • the sequence analyzer 1308 utilizes the sequence numbers embedded in the test traffic frames to look for missing and out-of-sequence frames.
  • the sequence analyzer 1308 maintains a count of missing frames that is reported (e.g., to a user) when the test is completed.
  • the sequence analyzer also scans for mis- ordered frames and reports the number of out-of-sequence occurrences in tlie test results.
  • the latency calculator 1310 utilizes the timestamp information in the test frame to calculate the round-trip delay from when the frame was sent by the frame insertion manager 1220 (Fig. 12) to the time it was received back in the test monitor 1112.
  • the latency calculator 1310 examines each received test frame during the testing period to calculate its latency and maintains three heuristics for the test iteration: (a) the minimum latency of all frames; (b) tlie maximum latency of all frames; and (c) the average latency observed over all frames.
  • the latency calculator 1310 (and the timestamp generator 1206 of Fig. 12) use a clocking mechanism that provides latency measurements accurate to within a desired amount of time.
  • the counter may be a per-clock-tick counter running at frequencies on the order of 10 to 100 MHz to provide accuracy on the order of 10 to 100 ns, or .01 to 0.1 microseconds.
  • the frame count 1312 maintains a count of the test frames that have been received since the test was initiated.
  • Tlie byte count 1314 maintains a count of the number of test frame bytes that have been received since the test was initiated.
  • a management layer (located outside of UNI A and B, in one of the UNIs, or as a distributed platform) may be used to communicate with and control the injector and monitor.
  • the preceding examples are generally directed to testing whether a new connection is ready for use (e.g., meets predefined performance criteria), it is understood that the CPA functionally described herein may also be applied to in-service testing. For example, if a service provider desires to determine tlie performance characteristics of a previously established connection, the CPA functionality may be used.
  • Flow-based loopback may be used to identify and test a particular EVC flow for in-service testing purposes. Accordingly, the present application should not be limited to any particular testing scenario, but may be applied to a connection at various points in the connection's existence. While the invention has been particularly shown and described with reference to the preferred embodiment tliereof, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention. Therefore, the claims should be interpreted in a broad manner, consistent with the present invention.

Abstract

A system and method for connection performance analysis are provided. In one example, the method is for performing an end-to-end analysis of a connection coupling two service demarcation points in a network, where each of the service demarcation points includes a test traffic injector and a test traffic monitor. The example method includes injecting test traffic into the connection using the test traffic injector of one of the service demarcation points. A loopback of the test traffic received by the other service demarcation point via the connection is performed to return the traffic to the originating service demarcation point. The traffic received by the originating service demarcation point via the connection is monitored to identify the looped back test traffic.

Description

SYSTEM AND METHOD FOR CONNECTION PERFORMANCE ANALYSIS
BACKGROUND In a communications network, a final step in establishing a circuit (e.g., a virtual circuit such as an Ethernet Virtual Circuit) often includes a testing process to verify the service integrity and performance characteristics of the circuit. In-service testing may also be performed to ensure that a previously established circuit is operating as desired. Such testing generally requires a service provider to connect external test equipment to both ends of the circuit to verify the circuit's service integrity and performance characteristics. The purpose of the test equipment is to verify that all intermediate switching points in the network are properly configured and that the circuit operates as specified under various traffic conditions and loads. This is a time-consuming and labor and resource-intensive task. Some systems use a centralized test head included in a network management node (i.e., within the network connecting the two ends of the circuit). Such a centralized test head may, for example, send frames to each end of the circuit separately for testing purposes. However, the end-to-end connection between the two ends is not tested because the frames are originated and terminated on the centralized test head and only pass through one segment of the connection at a time. Accordingly, if one end of the circuit fails the testing, it may be because of problems in the test head itself or problems between the test head and the endpoint being tested. Therefore, current centralized test heads do not provide satisfactory remote testing capabilities.' Accordingly, an improved system and method for performing connection performance analysis in a network environment are desired.
BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 illustrates a conventional system using two test sets for verifying a service connection. Fig. 2 illustrates the system of Fig. 1 utilizing one embodiment of embedded connection performance analysis functionality for end-to-end verification of the service connection. Fig. 3 is a flow chart of one embodiment of a method for performing the connection performance analysis within the system of Fig. 2. Fig. 4 illustrates a conventional system using three test sets for verifying point-to-multipoint service connections. Fig. 5 illustrates the system of Fig. 4 utilizing one embodiment of embedded connection performance analysis functionality for end-to-end verification of one or more of the service connections. Fig. 6 is a block diagram of one embodiment of a service demarcation point having connection performance analyzer capabilities. Fig. 7 is a block diagram illustrating one embodiment of the connection performance analyzer of the service demarcation point of Fig. 6 as a functional block in a service card. Fig. 8 is a block diagram illustrating the flow of test traffic through a connection established between two of the service cards of Fig. 7. Fig. 9a is a flow chart of one embodiment of a method for verifying the connection of Fig. 8 from the perspective of the service card that originates the test traffic. Fig. 9b is a flow chart of one embodiment of a method for verifying the connection of Fig. 8 from the perspective of the service card that is at the opposite end of the connection from the originating service card of Fig. 9a. Fig. 10 is a block diagram illustrating the flow of test traffic in a point-to-multipoint environment with the service cards of Fig. 7. Fig. 11 is a block diagram illustrating one embodiment of functional components within a connection performance analyzer in a service demarcation point. Fig. 12 is a block diagram of a test traffic injector that may be used in the connection performance analyzer of Fig. 11. Fig. 13 is a block diagram of a test traffic monitor that may be used in the connection performance analyzer of Fig. 11.
WRITTEN DESCRIPTION The present disclosure relates generally to communication services and, more specifically, to a system and metliod for connection verification and perfonnance analysis. It is understood, however, that the following disclosure provides many different embodiments or examples. Specific examples of components and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting. In addition, the present disclosure may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed. The following description uses an Ethernet environment as an example environment and therefore uses Ethernet terminology (e.g., frames). However, it is understood that the methods and systems disclosed herein may be used in other environments, such as those utilizing Multiprotocol Label Switching (MPLS), Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and other technologies based on a protocol data unit (PDU) model. Accordingly, although the term "frame" is used extensively herein for purposes of example, it is understood that other PDUs (e.g., MPLS/IP packets) may be substituted for the term "frame" and alterations made to the Ethernet specific exemplary methods and systems for purposes of compatibility with the particular PDU model. In addition, it is understood that encapsulation (e.g., IP/AAL5/ATM) may be used with the methods and systems discussed herein. Referring to Fig. 1, an exemplary environment 100 includes a network (e.g., a Metro Ethernet Network (MEN)) 102, two service demarcation points UNI A and UNI B (contained within the provider equipment 104 and 106, respectively) and customer equipment 108, 110 coupled to the provider equipment 104 and 106, respectively, via local area networks (LANs) 112, 114. The MEN 102 is a service provider network that provides Ethernet frame transport services between customer Ethernet ports. Each of the UNIs A and B is a standard Ethernet interface that is the point of demarcation between the customer equipment 108, 110 and the MEN 102. A connection (e.g., an Ethernet Virtual Connection (EVC)) 116 couples the provider equipment 104 and 106 (and their corresponding UNIs A and B) via the MEN 102. The EVC of the present example is defined by the Metro Ethernet Forum (MEF) as an association of two or more UNIs. An EVC connects two or more subscriber sites 118 and 120 and enables the transfer of Ethernet service frames between them, and prevents data transfer between subscriber sites that are not part of the same EVC. In the present example, each subscriber site 118 and 120 includes provider equipment and customer equipment coupled by a LAN. For purposes of convenience, the terms "service demarcation point" and "UNI" may be used interchangeably in certain examples, and it is understood that a UNI is contained in provider equipment that is positioned in the network as a service demarcation point. It is also understood that the UNI may represent other service demarcation points, such as a network-to-network interface (NNI). When establishing an EVC from UNI A to UNI B across the MEN 102, it is often necessary for the MEN provider (not shown) to connect external test equipment 122 and 124 to each end of the circuit to verify the circuit's service integrity and performance characteristics. The purpose of the test equipment 122 and 124 is to verify that all intermediate switching points in the MEN 102 are properly configured and that the EVC 116 operates properly under various traffic conditions and loads. This is a time-consuming and labor and resource-intensive task. Generally, when creating an Ethernet point-to-point service connection (e.g., the EVC 116), the MEN operator first identifies which physical ports on the provider equipment 104 and 106 are to participate in the EVC 116 between UNIs A and B. The operator then configures the provider equipment 104 and 106 (e.g., on both ends) and all intermediate equipment in the MEN 102 to establish the EVC 116 using the assigned ports. In some systems, the identification and configuration may be accomplished from a central network management node 126 (e.g., a terminal) by a single operator. If the network operator is to offer a guaranteed level of service to an end subscriber (e.g., a user of the customer equipment 108 or 110), the operator should verify that the EVC configuration is correct across the network between the two sites 118 and 120. To accomplish this, the network operator should verify the service connection and its performance parameters from end-to-end before declaring the EVC "fit for use." The verification entails the deployment of one or more network technicians 128 and/or 130 to the customer sites 118 and 120 with the Ethernet test equipment 122 and 124. The technicians 128 and 130 connect the test equipment 122 and 124 to the assigned physical ports on both ends of the EVC 116 and proceed to verify the performance and integrity of the EVC under various operating conditions. After the network technicians and operator are satisfied that the connection is functioning properly, the EVC and its associated service is turned over to the subscriber. Referring to Fig. 2, in one embodiment, the system of Fig. 1 is illustrated with the addition of functionality provided by a connection performance analyzer (CPA) (not shown) positioned within the provider equipment 104 and 106. As will be described later in greater detail, each CPA may be implemented as part of a service demarcation point (e.g., as a service card within the provider equipment). The CPAs enable end-to-end (UNI-to-UNI) testing of the EVC 116 without the need for the testing equipment and technicians described with respect to Fig. 1. It is understood that the implementation of a CPA within a service card is for purposes of convenience only, and that the CPA may be implemented in any portion of the provider equipment. The CPA functionality may be used to execute a custom or predefined series of tests, such as those detailed in RFC 2544 (entitled "Benclimarking Methodology for Network Interconnect Devices") from any UNI point in a network that has the CPA functionality. Furthermore, the testing may be controlled remotely from the network management node 126. For example, the management node may use management tunnels (that use VLAN tags, MAC addresses, etc.) and TL1 commands such as OPR-LPBK- E100:<tid>:<aid>:<ctag>; RLS-LPBK-E100:<tid>:<aid>:<ctag>; and TEST-E100:<tid>:<aid>:<ctag>:. One example of a system and method for providing such management capabilities is described in U.S. Patent Application Serial No. 10/369,411, filed on February 18, 2003, and entitled "Single-Ended Ethernet Management System and Method," which is incorporated herein by reference in its entirety. With additional reference to Fig. 3, a method 300 illustrates one embodiment of a process that may be used to test the EVC 116 of Fig. 2. For purposes of example, the UNI B is the originating UNI and the UNI A is the destination UNI. In step 302, the originating UNI B injects test traffic into the EVC 116. In step 304, UNI A loops the test traffic back to the UNI B. In step 306, the UNI B monitors the EVC's traffic to identify the test traffic, which may then be analyzed. It is understood that the various steps may occur simultaneously, with test traffic being injected, looped back, and monitored in an ongoing process. The duration of such a test may be defined as desired (e.g., number of frames generated, defined time period, manual start/stop, or until certain test values are received). Referring to Fig. 4, the system 100 of Fig. 1 is illustrated with an additional site 400 coupled in a point to multi-point relationship with the sites 118 and 120. In simple point-to-point EVC topologies (such as that of Fig. 1), service verification can be performed at both ends of the EVC without disrupting existing traffic. However, service verification becomes more complicated when deploying point to multi-point EVCs. It is understood that this problem can also be extrapolated to a multi-point to multi-point case (not shown). In the present example, the UNI of site 400 is acting as an aggregation point for EVCs from multiple other UNIs (e.g., the UNIs A and B from sites 118 and 120, respectively). Traffic from UNI A and UNI-B is aggregated at UNI C (provider equipment 404) and presented to the customer equipment 402 over a single Ethernet. An example of this application is the case of an Internet Service Provider (ISP), where the subscriber at UNI C is an ISP that is collecting traffic from multiple customers (UNIs A and B). In this scenario, the single Ethernet port at UNI-C has multiple EVCs 116 and 406 terminated on it. Each individual EVC to UNIs A and B is established in the same manner as the point-to-point EVC described earlier with respect to Fig 1. However, the difficulty lies in testing each individual EVC 116 and 406 without disrupting traffic on the other EVCs already established on the multipoint UNI C, as disrupting traffic on UNI C whenever a new EVC is established to a new remote site is undesirable. Referring to Fig. 5, in another embodiment, the system of Fig. 4 is illustrated with the addition of a CPA (not shown) positioned within the provider equipment 104, 106, and 404. The CPAs enable the EVCs 116 and 406 to be tested without the need for testing equipment and technicians at each UNI. In some embodiments, the testing may be controlled remotely from the network management node 126. In the embodiments illustrated in Figs. 2 and 5, each CPA (e.g., an Etherjack® Connection Performance Analyzer (ECPA) available from Covaro Networks, Inc. of Richardson, Texas) may provide a subset of Ethernet test equipment functions embedded directly into the service demarcation point so that each individual Ethernet port can act as its own "test equipment." This allows the CPA to minimize or eliminate the need for external test equipment and may also allow EVC integrity and perfonnance characterization to be performed by a single operator from a single (remote) management console. Such remote management may be accomplished by providing a management feature that allows for remote control from a network management terminal anywhere in the network. The CPA may also provide a means to add and test new EVCs without disrupting existing services on a multi-service UNI, including service verification for new point-to-point EVCs on a multipoint Ethernet port without disrupting other "live" connections on the same port. Accordingly, the CPA allows a network operator to significantly reduce the operational expense (and time) of deploying Ethernet services. The CPA may also provide a port loopback on each Ethernet port that loops egress traffic back to the ingress path to enable end-to-end traffic testing. As is described below, the CPA's functionality may be implemented by a combination of hardware and software components. For example, a hardware component may be used to insert Ethernet test frames into an EVC connection and to extract the Ethernet test frames received from the EVC connection. However, it is understood that various combinations of hardware and software may be used, and that functionality is attributed to hardware or software in the present embodiment for purposes of example only. The software and/or hardware may implemented in different ways, such as in a service card that is placed into provider equipment. Referring to Fig. 6, a block diagram illustrates one embodiment of CPA components implemented within the data path of a service demarcation point 600. The service demarcation point 600 includes a media access control (MAC) block 602, an ingress frame processing block 604, a network transport block 606, and an egress frame processing block 608. The CPA functionality includes a test traffic injector 610 (e.g., a frame injector in the present Ethernet example) positioned in tire ingress traffic data-path on the service card 600 and a traffic monitor 612 (e.g., a frame monitor in the present Ethernet example) positioned in the egress traffic data-path. By injecting test traffic into an EVC connection, looping the test traffic at the far end of the EVC connection, and monitoring the "echoed" traffic, the CPA is able to verify network connectivity along with various performance parameters. It is understood that the frame injector 610 and frame monitor 612 are configured for Ethernet in the present example, but may be readily adapted to MPLS, IP, and other PDU- based technologies. Under normal circumstances, the frame injector 610 allows traffic from the MAC block 602 to pass througli to tire ingress frame processing block 604. Similarly, the frame monitor 612, in normal operation, passes frames transparently in the egress direction from the egress frame processing block 608 to the MAC block 602.
[0010] When placed in test mode, the frame injector 610 injects test traffic into the ingress or egress traffic flow (i.e., into the network or towards the subscriber). This test traffic emulates the flow of traffic from a UNI and allows various characteristics of the traffic to be simulated to ensure that the EVC connection performs correctly all the way through the network. The frame monitor 612, when enabled, sniffs the egress traffic path for EVC test frames and traps them. The frame monitor 612 may then perform various performance calculations on the received traffic to generate performance results (e.g., received traffic rate, transmission delay, jitter, frame sequence reception, total number of received frames, and verification of 802. lp priority bits). The frame injector 610 and frame monitor 612 may also implement a flow loopback path 614 that allows egress test traffic frames trapped in the frame monitor 612 to be "looped" back to the frame injector 610 for transmission back into the network. This flow loopback enables a single EVC test traffic flow to be looped back without affecting the egress flow of normal EVC traffic. This capability may be used, for example, in multi-service port testing. Fig. 7 is a block diagram illustrating a more detailed embodiment of the service demarcation point of Fig. 6 with the CPA functionality implemented within a service card inserted into provider equipment. Although not necessary, implementing the CPA in a service card may aid in testing the provider equipment in which the service card is installed, as well as maximizing the amount of connection being tested. In the present example, the frame injector 610 is capable of sourcing three independent traffic flows (although it is understood that implementations sourcing more or fewer traffic flows may be provided), each with a different set of characteristics. Thus, it is possible to test EVC performance for multiple classes of traffic (for instance, with different priority levels) to ensure that different traffic classes receive the correct treatment. Similarly, the frame monitor 612 is capable of monitoring and analyzing three independent data flows in the present example. For example, there may be high priority, low latency traffic on the first flow, high priority, latency tolerant traffic on the second flow, and low priority, best effort traffic on the third flow. The three monitors observe each flow individually and then traffic flow characteristics of all three flows can be verified through the same service to ensure that high priority traffic does not interfere with low priority traffic. Multiple instances of frame injector and frame monitor components may exist to handle the various flows, as will be described later in greater detail. The frame injector 610 is a hardware block that provides numerous parameters that may be configured by control software that executes on a separate processor module located in the same chassis. The frame injector 610 allows the control software to create each independent Ethernet traffic flow througli the specification of one or more fields of an Ethernet frame. Exemplary fields include: • Frame Control Header: a hardware label or header that is used internally by the service module to identify test frames; • MAC source and destination addresses; • Stacked VLAN header (optional); • VLAN header (optional); • Ethernet frame Length/Type fields: allow the software to specify the overall size of the frame to be generated; • IP frame header (optional); o IPv4 (20 bytes) o IPv6 (40 bytes) o Enables software to specify an entire IP packet header to enable the setting to TOS/DSCP bits, IP addresses, etc., to allow testing of layer 3 devices in the network connection; and • Payload pattern: allows software to specify either a fixed pattern to fill out the remaining payload in the Ethernet frame or the insertion of a pseudo-random pattern. It is understood that the above fields are for purposes of example only, and that the illustrated fields and the designation of certain fields as optional may vary based on the specific implementation (e.g., a particular Ethernet implementation or the use of IP packets, pseudowire headers, or MPLS tags in other technologies, as well as the use of varying levels of encapsulation). The frame injector 610 may also automatically calculate and insert the following fields into each test frame prior to transmission: • Sequence Number: an incrementing number to verify frame ordering on receive. • Timestamp: an internally generated time stamp indicating the number of clock cycles that have passed since the start of the test. This is used by the frame monitor 612 to calculate delay and latency parameters. • Signature: an internally generated field used to confirm that the frame is a CPA test frame. In the present example, these three fields are inserted into the test frame's payload. Each traffic flow may also have a designated rate parameter that specifies the average bits per second transmission rate for the flow. A scheduling mechanism, such as a weighted round-robin scheduling mechanism, may be used to ensure that each flow receives the appropriate bandwidth when multiple flows are enabled. In the case of a single flow, weighted round-robin scheduling may be bypassed. In some embodiments, upstream traffic (e.g., traffic directed from the MAC block 602 to the ingress frame processing block 604) matching the traffic being injected by the frame injector 610 may be identified and blocked. This prevents the upstream traffic from interfering with the injected test traffic stream. The function of the frame monitor 612 is to monitor and terminate test frames received from the network. During normal operation, when monitoring is inactive, all frames pass transparently through the frame monitor 612 unchanged. As described previously, in the present example, the frame monitor 612, like the frame injector 610, supports up to three simultaneous, independent monitoring sessions to monitor up to three EVC traffic flows. Performance parameters may be calculated for each flow independently. Traffic passing through the frame monitor 612 may be discarded if it matches certain criteria. When monitoring is enabled, all non-test frames (normal EVC traffic) continue to pass through the frame monitor 612 unchanged. All test frames, however, are trapped by the frame monitor 612 and are either terminated or looped back to the frame injector 610. The frame monitor 612 may determine various characteristics of some or all test frames, including CRC integrity, sequence ordering, delay and latency, delay distribution (minimum and maximum latency), and throughput (e.g., bits per second). Minimum and maximum latency values may be determined by the frame monitor 612. This supports the calculation of jitter performance on frame transmission. When operating in flow loopback mode, the frame monitor 612 and frame injector 610 swap Source and Destination MAC addresses to ensure that the received test frame, when injected back into the network, can traverse any Ethernet switches in the network and successfully navigate back to the frame injector 610 that originally sourced the test frame. In addition, IP address swapping/processing may be required when operating in flow loopback mode to ensure that loopback test frames can successfully navigate any routers or layer 3 switches that may be present in the EVC. Referring to Fig. 8, a configuration of a typical point-to-point EVC service verification test is illustrated using the service card 700 of Fig. 7 (positioned within a UNI B) and an additional service card 800 (positioned within a UNI A) that is similar or identical to the service card 700. The service card 800 includes a MAC block 802, an ingress frame processing block 804, a network transport block 806, an egress frame processing block 808, a test traffic injector 810, and a traffic monitor 812. In the point-to-point EVC shown, the test traffic (which follows the path indicated by line 814) is injected by the frame injector 610 of the service card 700. Port loopback 816 (or flow loopback in some embodiments) may be utilized on the remote UNI B to return all traffic (including the test traffic) to the service card 700, and the frame monitor 612 of lie service card 700 monitors the incoming traffic to detect the test traffic. One embodiment of this process is illustrated in greater detail in Figs. 9a and 9b. With additional reference to Figs. 9a (a method 900 executed by the originating UNI B of Fig. 8) and 9b (a method 914 executed by the remote or destination UNI A), one embodiment of an end-to-end testing process is illustrated. In step 902, attributes are defined for the test traffic (e.g., for each PDU (frame in the present example)) and the frames are generated in step 904. Traffic to be injected into the flow (e.g., test traffic or normal traffic) is selected, as will be described later in greater detail, in step 906 and injected into the flow in step 908. In step 910, the CPA monitors incoming traffic for test traffic and analyzes the traffic for desired characteristics in step 912. On the opposite end of the connection, the CPA monitors the incoming traffic for test traffic in step 916 and loops the test traffic back to tlie originating CPA in step 918. Referring to Fig. 10, a test being conducted on a multipoint UNI is illustrated with the service cards 700 (UNI B) and 800 (UNI A). Three separate EVCs 1002, 1004, and 1006 are illustrated. The EVC 1002 is between the UNIs A and B, the EVC 1004 is between the UNI A and another UNI (not shown), and the EVC 1006 (between the UNIs A and B) is for the test traffic that is injected into the network by the frame injector 610 of the service card 700. In the present example, flow loopback 1008 is used to loopback only the test traffic EVC 1006, while other EVC flows 1002 and 1004 continue unimpeded through the multipoint UNI A port. The frame monitor 612 of the service card 700 monitors the incoming traffic on the UNI B to detect the test traffic. It is also possible for EVC flows (such as the EVC flow 1002) to continue through UNI B without being affected by the EVC test flow 1006. Referring to Fig. 11, a block diagram 1100 illustrates the interaction between various frame injector and frame monitor functions in one embodiment of a CPA. The frame injector and frame monitor functions are positioned between a MAC block 1102 and a network transport block 1104. The M AC block 1102 provides standard Ethernet Media Access Controller functionality, providing Ethernet MAC functions (e.g., per the IEEE-802.3 standard). The network transport block 1104 performs normal frame processing to control transmission to, and reception from, the network. The remaining functional blocks of the diagram 1100 include an egress select block 1106, a test inject block 1108, an ingress select block 1110, a test monitor block 1112, a monitor select block 1114, and two traffic control blocks 1116a and 1116b. The egress select block 1106 selects the traffic frames that are transmitted to the subscriber, either test frames from the test inject block 1108 or normal frames from the network. The test inject block 1108 generates the test frames and is illustrated in greater detail in Fig. 12. The ingress select block 1110 selects traffic frames that are transmitted to the network, either test frames from the test inject block 1108, normal frames from the subscriber, or test frames that are being looped back into the network. The test monitor block 1112 monitors test frames from the ingress or egress direction and performs analysis on the test traffic. This block is illustrated in greater detail in Fig. 13. The monitor select block 1114 is programmed to select test frames from either the ingress or egress traffic path and forward test frames to the test monitor block 1112. The two traffic control blocks 1116a and 1116b function as ON/OFF valves to allow frames to flow through or to terminate frames without sending them on. These blocks 1116a and 1116b may differentiate between normal traffic frames and test frames and may be configured to act independently with respect to each type of traffic. This enables test frames to be terminated, for example, while normal traffic frames are allowed to pass through. Fields such as the VLAN ID and/or signature fields may be used to differentiate between test frames and normal traffic frames. A VLAN loopback channel 1118 provides a means for looping test frames received from the network back into the network. Loopback test frames may be identified by means of their VLAN value(s), signatures, and/or other identifiers. This function allows certain test frames to be looped back to a source point without disrupting any other live traffic flows on the same physical port. With additional reference to Fig. 12, a functional block diagram illustrates one embodiment of the test inject block 1108 of Fig. 11. As previously described, the test inject block 1108 of the present example can generate up to three independent flows. Accordingly, there are three instances of the components illustrated in the diagram, with the exception of the blocks drawn with dashed lines, which are common control blocks across all three instances. For purposes of clarity, only the connections for one instance of the components are illustrated. The components that may have multiple instances include a MAC header (HDR) 1200, an IP HDR 1202, a payload pattern generator 1204, a timestamp generator 1206, a sequence generator 1208, a signature generator 1210, a frame generator 1212, a frame count 1214, and a byte count 1216. Components having only a single instance in the present example include a bandwidth controller 1218, a frame insertion manager 1220, a clock 1222, and a hardware flow control 1224. The MAC HDR 1200 is programmable by software and contains the values for Ethernet MAC frame header fields, such as MAC Destination Address, Source Address, VLAN header, and Type/Length fields. These values are used when the test frame is created. The IP HDR 1202 is programmable by software and contains values for fields in the IP packet header. This allows TOS DSCP bits to be specified in the IP packet header to simulate IP headers that would be received from subscribers. The payload pattern generator 1204 is responsible for generating data for the payload of the IP packet and MAC frame. In the present example, there are three software programmable data types: (1) a random pattern generated by this function, (2) a software specified pattern of limited length, which is duplicated and repeated by the payload pattern generator 1204 to fill the remaining payload, and (3) a complete payload content specification (that may be manually defined). The timestamp generator 1206 is configured to place an internal timestamp in a portion of the payload each time a test frame is generated. The location of the timestamp may be proprietary. The timestamp is used by a Frame monitor function (e.g., the test monitor 1112 of Fig. 11) to determine latency and jitter associated with transmission of the test frame. The sequence generator 1208 provides a unique, incrementing sequence number for each test frame generated for each flow. The sequence number is used by the frame monitor to look for proper packet ordering on receipt. The sequence generator 1208 maintains the sequence numbering for this test flow. The signature generator 1210 generates a signature used to verify that tlie associated frame is a test frame. The signature generator 1210 may generate the signature in many different ways, including the use of a checksum, CRC, or a multi-input signature register (MISR). The frame generator 1212 creates a test frame using data input from the various component contributors (1200-1210). It calculates the frame check sequence (FCS) value for the entire packet frame and transmits the frame when signaled to do so by the frame insertion manager 1220. The frame count 1214 maintains a count of the number of test frames that have been transmitted since the test was initiated by software. The value of the frame count is available to software at any point in time. The frame count 1214 may cooperate with the bandwidth controller 1218 to generate a finite number of test frames. Once this (optional) limit is reached, the bandwidth controller 1218 will not request that any further frames be generated until the test is reset by software. This allows a finite number of test frames to be sent. The byte count 1216 keeps track of the number of bytes sent for the current test duration. The bandwidth controller 1218 controls the bandwidth for each test flow. The bandwidth or rate of frame generation for a test flow is specified via software. This block uses the software specifications and clock ticks received from the hardware clock 1222 to determine how often to schedule and generate a test frame. Because each individual test flow can have its own rate of generation, the bandwidth controller coordinates between the three possible flows to ensure that each flow receives its proper bandwidth allocation. The frame insertion manager 1220 is triggered by the bandwidth controller 1218 once the bandwidth controller has determined it is time to generate a frame for a flow. The frame insertion manager 1220 coordinates frame insertion using the internal hardware flow control 1224 to schedule the test frame transmission when an opportunity arises. The clock 1222 represents the hardware clock ticks that are used to schedule the operation of the frame injector and to derive timestamps. It is understood that other scheduling methods may be used, including controlled methods. The hardware flow control 1224 coordinates with the transport modules in the system to request a frame inject timeslice. When granted a transmit token, the hardware flow control 1224 notifies the frame insertion manager 1220 to trigger the transmission of the test frame. With additional reference to Fig. 13, a functional block diagram illustrates one embodiment of the test monitor block 1112 of Fig. 11. As previously described, the test monitor block 1112 of the present example can monitor up to three independent flows, and there are three instances of the test monitor. The test monitor block 1112 includes a frame screener 1300, a frame capture function 1302, a frame analyzer 1304, a signature analyzer 1306, a sequence analyzer 1308, a latency calculator 1310, a frame count 1312, and abyte count 1314. The frame screener 1300 calculates and verifies the FCS for the frame and screens all received frames with a valid FCS to identify test frames in the traffic flow. Test frames are identified using criteria programmed by software. This block also generates a control signal that determines whether the test frame is terminated or whether the test frame is allowed to continue downstream. This control signal may be used by one or both of the traffic control blocks 1116a and 1116b of Fig. 11 to terminate or pass the test frame. The frame capture function 1302 captures and buffers one or more received test frames when a test is initiated. Software can then read the contents of this buffer to examine a frame's contents. The frame analyzer 1304 uses information programmed by software to locate fields in the test frame that contain test specific data, such as the signature, originating timestamp, and sequence numbers. The signature, sequence, and timestamp numbers are passed to tlie signature analyzer 1306, sequence analyzer 1308, and latency calculator 1310. The signature analyzer 1306 utilizes the signature embedded in the test frame to determine whether the frame is a test frame. The sequence analyzer 1308 utilizes the sequence numbers embedded in the test traffic frames to look for missing and out-of-sequence frames. The sequence analyzer 1308 maintains a count of missing frames that is reported (e.g., to a user) when the test is completed. The sequence analyzer also scans for mis- ordered frames and reports the number of out-of-sequence occurrences in tlie test results. The latency calculator 1310 utilizes the timestamp information in the test frame to calculate the round-trip delay from when the frame was sent by the frame insertion manager 1220 (Fig. 12) to the time it was received back in the test monitor 1112. The latency calculator 1310 examines each received test frame during the testing period to calculate its latency and maintains three heuristics for the test iteration: (a) the minimum latency of all frames; (b) tlie maximum latency of all frames; and (c) the average latency observed over all frames. The latency calculator 1310 (and the timestamp generator 1206 of Fig. 12) use a clocking mechanism that provides latency measurements accurate to within a desired amount of time. For example, the counter may be a per-clock-tick counter running at frequencies on the order of 10 to 100 MHz to provide accuracy on the order of 10 to 100 ns, or .01 to 0.1 microseconds. The frame count 1312 maintains a count of the test frames that have been received since the test was initiated. Tlie byte count 1314 maintains a count of the number of test frame bytes that have been received since the test was initiated. Although the PDU injector and monitor are described as being in a single service demarcation point, it is understood that a service demarcation point may contain only a monitor or an injector. For example, UNI A of Fig. 1 may contain only an injector and UNI B may contain only a monitor. In this uni-directional, end-to-end scenario, the injector of UNI A would inject test traffic into the EVC 116 as described previously, and the monitor of UNI B would monitor the test traffic. A management layer (located outside of UNI A and B, in one of the UNIs, or as a distributed platform) may be used to communicate with and control the injector and monitor. Although the preceding examples are generally directed to testing whether a new connection is ready for use (e.g., meets predefined performance criteria), it is understood that the CPA functionally described herein may also be applied to in-service testing. For example, if a service provider desires to determine tlie performance characteristics of a previously established connection, the CPA functionality may be used.
Flow-based loopback may be used to identify and test a particular EVC flow for in-service testing purposes. Accordingly, the present application should not be limited to any particular testing scenario, but may be applied to a connection at various points in the connection's existence. While the invention has been particularly shown and described with reference to the preferred embodiment tliereof, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention. Therefore, the claims should be interpreted in a broad manner, consistent with the present invention.

Claims

WHAT IS CLAIMED IS:
1. A method for performing an end-to-end analysis of a connection coupling first and second service demarcation points in a network, wherein each of the first and second service demarcation points includes a test traffic injector and a test traffic monitor, the method comprising: injecting test fraffic into the connection using the test traffic injector of the first service demarcation point; performing a loopback of the test traffic received by the second service demarcation point via the connection, wherein tlie loopback is performed by the second service demarcation point and returns tlie fraffic to the first service demarcation point; and monitoring traffic received by the first service demarcation point via the connection to identify the looped back test fraffic, wherein the monitoring is performed using the test traffic monitor of the first service demarcation point.
2. The metliod of claim 1 further comprising assigning at least one attribute to each data unit in the test fraffic.
3. The method of claim 1 further comprising analyzing the identified looped back test traffic to determine at least one performance characteristic.
4. Tlie metliod of claim 1 further comprising performing a loopback of all traffic received by the second service demarcation point via the connection.
5. The method of claim 4 wherein the loopback of all traffic occurs on a per port basis.
6. The method of claim 1 further comprising filtering the test traffic received by the second service demarcation point via the connection, wherein tlie filtering identifies tlie test fraffic to be looped back.
7. The method of claim 6 wherein the loopback of the test fraffic occurs on a per flow basis and prevents traffic associated with the connection from interfering with other traffic passing through the second service demarcation point.
8. A connection performance analyzer configured for implementation in a service demarcation point of a network, the connection performance analyzer comprising: a first test traffic injector for injecting test fraffic into a connection terminating on the service demarcation point; a first test traffic monitor for identifying test traffic received from the connection; and a first loopback path for looping test traffic originating at a second test fraffic injector at the opposite end of the connection back to a second test traffic monitor at the opposite end of the connection.
9. The connection performance analyzer of claim 8 further comprising a second loopback path, wherein the first loopback path is configured to loop all fraffic back to tlie second test monitor and the second loopback path is configured to loop
10. A system for analyzing a virtual connection coupling first and second service demarcation points in a network, the system comprising: a first service demarcation point having a first test fraffic injector for injecting test traffic into the virtual connection, a first test fraffic monitor for monitoring test fraffic received from the virtual connection, and a first loopback path for returning test traffic injected into the virtual connection by a second service demarcation point; the second service demarcation point having a second test traffic injector for injecting test fraffic into the virtual connection, a second test traffic monitor for monitoring test traffic received from tlie virtual connection, and a second loopback path for returning test fraffic injected into the virtual connection by the first service demarcation point; and a network management node configured to communicate with Hie first and second service demarcation points to control an end-to-end test of the virtual connection.
PCT/IB2005/001715 2004-06-18 2005-06-18 System and method for connection performance analysis WO2005125100A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CA002570176A CA2570176A1 (en) 2004-06-18 2005-06-18 System and method for connection performance analysis
DE602005003226T DE602005003226T2 (en) 2004-06-18 2005-06-18 SYSTEM AND METHOD FOR ANALYZING CONNECTION PERFORMANCE
EP05750305A EP1757017B1 (en) 2004-06-18 2005-06-18 System and method for connection performance analysis

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US58087104P 2004-06-18 2004-06-18
US60/580,871 2004-06-18

Publications (1)

Publication Number Publication Date
WO2005125100A1 true WO2005125100A1 (en) 2005-12-29

Family

ID=34993310

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/001715 WO2005125100A1 (en) 2004-06-18 2005-06-18 System and method for connection performance analysis

Country Status (7)

Country Link
US (1) US20050281392A1 (en)
EP (1) EP1757017B1 (en)
CN (1) CN100518084C (en)
AT (1) ATE377882T1 (en)
CA (1) CA2570176A1 (en)
DE (1) DE602005003226T2 (en)
WO (1) WO2005125100A1 (en)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7408883B2 (en) * 2004-09-01 2008-08-05 Nettest, Inc. Apparatus and method for performing a loopback test in a communication system
US7433319B2 (en) * 2004-10-27 2008-10-07 At&T Intellectual Property I, L.P. System and method for collecting and presenting service level agreement metrics in a switched metro ethernet network
US20070115833A1 (en) * 2005-11-21 2007-05-24 Gerald Pepper Varying the position of test information in data units
WO2008040021A1 (en) * 2006-09-28 2008-04-03 Qualcomm Incorporated Methods and apparatus for determining quality of service in a communication system
US9191226B2 (en) * 2006-09-28 2015-11-17 Qualcomm Incorporated Methods and apparatus for determining communication link quality
KR100842256B1 (en) * 2006-10-19 2008-06-30 한국전자통신연구원 Methods and system for checking connectivity of physical layer Lable Swtiched Path in GMPLS based network
US7869376B2 (en) * 2006-11-10 2011-01-11 World Wide Packets, Inc. Communicating an operational state of a transport service
US20090010265A1 (en) * 2007-07-05 2009-01-08 Cisco Technology, Inc. Flexible mapping of virtual local area networks to Ethernet virtual circuits
JP2009033644A (en) * 2007-07-30 2009-02-12 Nec Electronics Corp Packet communication apparatus and communication line quality analyzing method
WO2009034450A2 (en) * 2007-09-13 2009-03-19 Accedian Networks Inc. System for testing ethernet paths and links without impacting non-test traffic
US8315179B2 (en) * 2008-02-19 2012-11-20 Centurylink Intellectual Property Llc System and method for authorizing threshold testing within a network
US8427970B2 (en) * 2008-11-14 2013-04-23 Laris Benkis Apparatus and method for determining a service interruption time measurement
US20100128770A1 (en) * 2008-11-21 2010-05-27 Adrian Stanciu Measuring Delay in a Network Segment and/or through a Network Communications Device
US20100142377A1 (en) * 2008-12-10 2010-06-10 Razvan Caciula SIP Information Extraction
US7990873B2 (en) * 2009-05-19 2011-08-02 Fujitsu Limited Traffic shaping via internal loopback
CN101997763B (en) * 2009-08-21 2014-04-09 中兴通讯股份有限公司 Service data transmission method and device
US8705395B2 (en) * 2010-06-15 2014-04-22 Jds Uniphase Corporation Method for time aware inline remote mirroring
US8571032B2 (en) 2010-11-17 2013-10-29 Ixia Testing packet fragmentation
US8730826B2 (en) 2010-11-17 2014-05-20 Ixia Testing fragment reassembly
US8929835B2 (en) * 2011-04-04 2015-01-06 Broadcom Corporation Non-intrusive and operational communication system monitoring and diagnostics
US9787607B2 (en) * 2011-04-04 2017-10-10 Infinera Corporation End-to-end provisioning of Ethernet Virtual Circuits
US20140254394A1 (en) * 2013-03-08 2014-09-11 Calix, Inc. Network activation testing
US9515908B2 (en) * 2013-07-09 2016-12-06 Calix, Inc. Network latency testing
US20150261635A1 (en) * 2014-03-13 2015-09-17 Calix, Inc. Network activation testing
US10298481B1 (en) * 2014-04-29 2019-05-21 Marvell Israel (M.I.S.L) Ltd. Method and apparatus for testing VLAN
US10116493B2 (en) 2014-11-21 2018-10-30 Cisco Technology, Inc. Recovering from virtual port channel peer failure
US10313222B2 (en) * 2015-07-13 2019-06-04 International Business Machines Corporation Diagnosis of a network adapter during network operation
US10333828B2 (en) 2016-05-31 2019-06-25 Cisco Technology, Inc. Bidirectional multicasting over virtual port channel
US11509501B2 (en) * 2016-07-20 2022-11-22 Cisco Technology, Inc. Automatic port verification and policy application for rogue devices
US10193750B2 (en) 2016-09-07 2019-01-29 Cisco Technology, Inc. Managing virtual port channel switch peers from software-defined network controller
US11323353B1 (en) * 2016-12-30 2022-05-03 Wells Fargo Bank, N.A. Assessing system effectiveness
US10547509B2 (en) 2017-06-19 2020-01-28 Cisco Technology, Inc. Validation of a virtual port channel (VPC) endpoint in the network fabric
US11108675B2 (en) 2018-10-31 2021-08-31 Keysight Technologies, Inc. Methods, systems, and computer readable media for testing effects of simulated frame preemption and deterministic fragmentation of preemptable frames in a frame-preemption-capable network
JP2023530118A (en) * 2020-06-16 2023-07-13 テレフオンアクチーボラゲット エルエム エリクソン(パブル) Techniques for reporting network traffic activity

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0777401A1 (en) * 1995-11-29 1997-06-04 AT&T Corp. Method for controlling a loopback test between ATM points
US5793976A (en) * 1996-04-01 1998-08-11 Gte Laboratories Incorporated Method and apparatus for performance monitoring in electronic communications networks

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5825849A (en) * 1995-08-31 1998-10-20 Lucent Technologies, Inc. Loop-back test system using a suppressed ringing connection
US6154448A (en) * 1997-06-20 2000-11-28 Telefonaktiebolaget Lm Ericsson (Publ) Next hop loopback
EP1367750A1 (en) * 2002-05-30 2003-12-03 Agilent Technologies, Inc. - a Delaware corporation - Testing network communications
GB2400770B (en) * 2003-04-17 2006-03-22 Agilent Technologies Inc Testing network communications
US7564798B2 (en) * 2003-08-27 2009-07-21 Finisar Corporation Methods and devices for testing and monitoring high speed communication networks
US7821929B2 (en) * 2004-04-05 2010-10-26 Verizon Business Global Llc System and method for controlling communication flow rates
US7710888B2 (en) * 2004-04-05 2010-05-04 Verizon Business Global Llc Apparatus and method for testing and fault isolation in a communication network
US8488476B2 (en) * 2004-04-05 2013-07-16 Verizon Business Global Llc Providing applets to remote devices in a communications network
US7515542B2 (en) * 2005-07-12 2009-04-07 Cisco Technology, Inc. Broadband access note with a virtual maintenance end point

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0777401A1 (en) * 1995-11-29 1997-06-04 AT&T Corp. Method for controlling a loopback test between ATM points
US5793976A (en) * 1996-04-01 1998-08-11 Gte Laboratories Incorporated Method and apparatus for performance monitoring in electronic communications networks

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MATHIS M: "Windowed ping: an IP layer performance diagnostic", COMPUTER NETWORKS AND ISDN SYSTEMS, NORTH HOLLAND PUBLISHING. AMSTERDAM, NL, vol. 27, no. 3, December 1994 (1994-12-01), pages 449 - 459, XP004037978, ISSN: 0169-7552 *
SANGHI D ET AL: "Experimental assessment of end-to-end behavior on Internet", NETWORKING : FOUNDATION FOR THE FUTURE. SAN FRANCISCO, MAR. 28 - APR. 1, 1993, PROCEEDINGS OF THE ANNUAL JOINT CONFERENCE OF THE COMPUTER AND COMMUNICATIONS SOCIETIES (INFOCOM), LOS ALAMITOS, IEEE COMP. SOC. PRESS, US, vol. VOL. 2 CONF. 12, 28 March 1993 (1993-03-28), pages 867 - 874, XP010032228, ISBN: 0-8186-3580-0 *

Also Published As

Publication number Publication date
DE602005003226T2 (en) 2008-03-06
DE602005003226D1 (en) 2007-12-20
US20050281392A1 (en) 2005-12-22
CN101002426A (en) 2007-07-18
CN100518084C (en) 2009-07-22
ATE377882T1 (en) 2007-11-15
CA2570176A1 (en) 2005-12-29
EP1757017A1 (en) 2007-02-28
EP1757017B1 (en) 2007-11-07

Similar Documents

Publication Publication Date Title
EP1757017B1 (en) System and method for connection performance analysis
EP1734690B1 (en) Performance monitoring of frame transmission in a data network utilising OAM protocols
US6269330B1 (en) Fault location and performance testing of communication networks
CN100382517C (en) Network QoS test method and system
US20100008248A1 (en) Network tester for real-time measuring of tcp throughput
US20090161569A1 (en) System and method for facilitating carrier ethernet performance and quality measurements
Goga et al. Speed measurements of residential internet access
EP1847069A1 (en) Method and apparatus for evaluation of service quality of a real time application operating over a packet-based network
US20030163772A1 (en) System of testing the upstream cable modem channel
US20090034596A1 (en) Ethernet Traffic Emulation Using Ramped Traffic Generation Techniques
US7274663B2 (en) System and method for testing differentiated services in a value add network service
WO2006105707A1 (en) A network performance testing method and the system, the device thereof
US11121938B2 (en) Performance measurement in a packet-switched communication network
Ðerić et al. Towards Understanding the Performance of Traffic Policing in Programmable Hardware Switches
WO2012103761A1 (en) Method for detecting quality of multicast service and terminal
Bisson et al. Switched Ethernet testing for avionics applications
Cisco Isolating Problems
Cisco Isolating Problems
Cisco Isolating Problems
Cisco Isolating Problems
Al-Shaer et al. SMRM: SNMP-based multicast reachability monitoring
Cheng et al. Java-based tools for accurate bandwidth measurement of digital subscriber line networks
US20180004624A1 (en) Debugging failure of a service validation test
Calarco et al. An open modular router with QoS capabilities
Collange et al. Correlation of packet losses with some traffic characteristics

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2570176

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWE Wipo information: entry into national phase

Ref document number: 2005750305

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 200580025732.5

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2005750305

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 2005750305

Country of ref document: EP