Discovering configured tunnels between nodes on a path in a data communications network
First Claim
Patent Images
1. An apparatus, comprising:
- one or more processors;
first logic encoded in one or more tangible media for execution and when executed operable for discovering, without prior knowledge of an existence of tunnels in a data communications network and without prior knowledge of a topology of the data communications network, whether for a pair of nodes in the data communication network one or more configured tunnels have been already established, and remotely accessing each node in a plurality of nodes in the data communications network;
second logic which when executed is operable to identify, for every accessed node of the plurality of nodes, whether a tunnel is configured on the accessed node; and
third logic which when executed is operable, when the identified tunnel is configured on the accessed node, to determine whether the identified tunnel is a load balancing tunnel, and in response to determining that the identified tunnel is not a load balancing tunnel, determining whether the identified tunnel is a backup-path-fast-reroute tunnel, and whether the identified tunnel has a fault.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method are described for discovering a configured tunnel between nodes on a path in a data communications network. In an embodiment, an apparatus is arranged to remotely access at least one node on the path, identify whether a tunnel is configured on the access node and, if so, identify whether the identified tunnel has a fault.
88 Citations
21 Claims
-
1. An apparatus, comprising:
-
one or more processors; first logic encoded in one or more tangible media for execution and when executed operable for discovering, without prior knowledge of an existence of tunnels in a data communications network and without prior knowledge of a topology of the data communications network, whether for a pair of nodes in the data communication network one or more configured tunnels have been already established, and remotely accessing each node in a plurality of nodes in the data communications network; second logic which when executed is operable to identify, for every accessed node of the plurality of nodes, whether a tunnel is configured on the accessed node; and third logic which when executed is operable, when the identified tunnel is configured on the accessed node, to determine whether the identified tunnel is a load balancing tunnel, and in response to determining that the identified tunnel is not a load balancing tunnel, determining whether the identified tunnel is a backup-path-fast-reroute tunnel, and whether the identified tunnel has a fault. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method of discovering a configured tunnel between nodes on a path in a data communications network, the method comprising:
-
discovering, without prior knowledge of an existence of tunnels in a data communications network and without prior knowledge of a topology of the data communications network, whether for a pair of nodes in the data communication network one or more configured tunnels have been already established, and remotely accessing each node in a plurality of nodes in the data communications network; identifying, for every accessed node of the plurality of nodes, whether a tunnel is configured on the accessed node; and determining whether the identified tunnel is a load balancing tunnel, and in response to determining that the identified tunnel is not a load balancing tunnel, determining whether the identified tunnel is a backup-path-fast-reroute tunnel, and whether the identified tunnel has a fault; wherein the method is performed by one or more computing devices. - View Dependent Claims (11, 12, 13)
-
-
14. A data processing apparatus configured for discovering a configured tunnel between nodes on a path in a data communications network, and comprising:
-
one or more processors; means for discovering, without prior knowledge of an existence of tunnels in a data communications network and without prior knowledge of a topology of the data communications network, whether for a pair of nodes in the data communication network one or more configured tunnels have been already established, and remotely accessing each node in a plurality of nodes in the data communications network; means for identifying for every accessed node of the plurality of nodes, whether a tunnel is configured on the accessed node; and means for determining whether the identified tunnel is a load balancing tunnel, and in response to determining that the identified tunnel is not a load balancing tunnel, determining whether the identified tunnel is a backup-path-fast-reroute tunnel, and whether the identified tunnel has a fault when the identified tunnel is configured on the accessed node. - View Dependent Claims (15, 16, 17)
-
-
18. A non-transitory computer readable volatile or non-volatile storage medium storing one or more sequences of instructions for discovering a configured tunnel between nodes on a path in a data communications network and which instructions, when executed by one or more processors, cause the more or more processors to perform:
-
discovering, without prior knowledge of an existence of tunnels in a data communications network and without prior knowledge of a topology of the data communications network, whether for a pair of nodes in the data communication network one or more configured tunnels have been already established, and remotely accessing each node in a plurality of nodes in the data communications network; identifying, for every accessed node of the plurality of nodes, whether a tunnel is configured on the accessed node; and determining whether the identified tunnel has been already configured as a load balancing tunnel, and in response to determining that the identified tunnel is not a load balancing tunnel, determining whether the identified tunnel is a backup-path-fast-reroute tunnel, and whether the identified tunnel has a fault. - View Dependent Claims (19, 20, 21)
-
Specification