SYSTEM AND METHOD FOR ANALYZING AND TESTING PACKET FLOWS TO LOCALIZE PROBLEMS
First Claim
1. A method of managing a packet network, the method comprising a data processor executing computer instructions stored on a non-transitory computer-readable storage medium to perform the steps of:
- (a) analyzing packet flows for bitstreams associated with a network node in order to compute a measure of protection that a queue of the network node gives to a high-priority one of the bitstreams relative to a low-priority one of the bitstreams;
(b) using the measure of protection to determine whether the network node is a source of a protection error with respect to priority markings for packets flowing through the network node; and
(c) generating an alarm upon determining in step (b) that the network node is the source of the protection error with respect to the priority markings for the packets flowing though the network node.
23 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are systems, methods, and computer-readable storage media for analyzing packet flows and generating an alarm and for active testing of a network to localize problems. The system analyzes packet flows for bitstreams associated with a network node in order to compute a measure of protection that a queue of the network node gives to a high-priority one of the bitstreams relative to a low-priority one of the bitstreams, and uses the measure of protection to determine whether the network node is a source of a protection error with respect to priority markings for packets flowing through the network node, and generates an alarm upon determining that the network node is a source of a protection error with respect to the priority markings for the packets flowing through the network node.
-
Citations
20 Claims
-
1. A method of managing a packet network, the method comprising a data processor executing computer instructions stored on a non-transitory computer-readable storage medium to perform the steps of:
-
(a) analyzing packet flows for bitstreams associated with a network node in order to compute a measure of protection that a queue of the network node gives to a high-priority one of the bitstreams relative to a low-priority one of the bitstreams; (b) using the measure of protection to determine whether the network node is a source of a protection error with respect to priority markings for packets flowing through the network node; and (c) generating an alarm upon determining in step (b) that the network node is the source of the protection error with respect to the priority markings for the packets flowing though the network node. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for managing a packet network, the system comprising:
-
a data processor; and a non-transitory computer-readable storage medium storing computer instructions that, when executed by the data processor, perform the steps of; (a) analyzing packet flows for bitstreams associated with a network node in order to compute a measure of protection that a queue of the network node gives to a high-priority one of the bitstreams relative to a low-priority one of the bitstreams; (b) using the measure of protection to determine whether the network node is a source of a protection error with respect to priority markings for packets flowing through the network node; and (c) generating an alarm upon determining in step (b) that the network node is the source of the protection error with respect to the priority markings for the packets flowing though the network node. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing computer instructions that, when executed by a data processor, perform management of a packet network by the steps of:
-
(a) analyzing packet flows for bitstreams associated with a network node in order to compute a measure of protection that a queue of the network node gives to a high-priority one of the bitstreams relative to a low-priority one of the bitstreams; (b) using the measure of protection to determine whether the network node is a source of a protection error with respect to priority markings for packets flowing through the network node; and (c) generating an alarm upon determining in step (b) that the network node is the source of the protection error with respect to the priority markings for the packets flowing though the network node. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification