US9270687B2 - System and method for providing sensor overlay networks - Google Patents
System and method for providing sensor overlay networks Download PDFInfo
- Publication number
- US9270687B2 US9270687B2 US12/624,494 US62449409A US9270687B2 US 9270687 B2 US9270687 B2 US 9270687B2 US 62449409 A US62449409 A US 62449409A US 9270687 B2 US9270687 B2 US 9270687B2
- Authority
- US
- United States
- Prior art keywords
- network
- traffic
- sensor
- module
- data request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000004044 response Effects 0.000 claims abstract description 7
- 238000005259 measurement Methods 0.000 claims description 41
- 230000006870 function Effects 0.000 claims description 10
- 238000000926 separation method Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 13
- 238000013500 data storage Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000013024 troubleshooting Methods 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 4
- 239000000835 fiber Substances 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 235000008694 Humulus lupulus Nutrition 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000005641 tunneling Effects 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/34—Signalling channels for network management communication
- H04L41/344—Out-of-band transfers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
Definitions
- Communications services such as Internet, telephone, and television services, are becoming increasingly popular among consumers, businesses, and other subscribers.
- Networks form the basis for such communications services.
- Some networks provide instrumentation of the network to customers. This gives customers the ability to troubleshoot network-related problems but poses a great security risk since customers are able to locate and identify network components.
- these networks generally do not have a way to deal with high traffic volume from user-generated packets or signals without new equipment or aggressive filtering techniques.
- Other networks seek to provide protection against hackers and other security offenses by hiding network topology from customers. However, these networks lack the ability to allow customer troubleshooting.
- FIG. 1 depicts a block diagram of a system architecture for providing a sensor overlay network, according to an exemplary embodiment.
- FIGS. 2A-2B depict schematic diagrams of a sensor plane architecture, according to an exemplary embodiment.
- FIG. 3 depicts an illustrative flowchart of a method for providing a sensor overlay network, according to an exemplary embodiment.
- FIG. 4 depicts an illustrative flowchart of a method for providing a sensor overlay network, according to another exemplary embodiment.
- Exemplary embodiments may provide a system and method for providing a sensor overlay network. That is, exemplary embodiments may, among other things, manage and optimize user-generated packet traffic and troubleshooting by comprehensively and effectively providing a sensor overlay network.
- Networks form the basis for communications services, such as Internet, telephone, and television services.
- “Open” networks may allow a user or customer to view instrumentation of the network.
- user-generated packets for troubleshooting may be received by all devices in the network, each of which may reply to these user-generated packets. This allows customers the ability to troubleshoot network-related problems or determine whether enough local system resources are available.
- openness may pose a great security risk since customers are able to locate and identify each and every network component.
- an open network provides a user-friendly network model
- security and efficient traffic controls may be lacking.
- end-users or customers who measure network performance using these instrumented packets may have a relatively skewed view or perception of network performance due to variance in measurement traffic of an open network.
- “Closed” networks may provide greater protection from user-generated, infrastructure-target packets by hiding topology from end-users or customers.
- a closed network may create what appears to be a “black box” to end-users and customers. These black boxes may still allow a customer to interface with the network (e.g., the network components may still respond to user-generated packets), but nothing inside the network may be visible to the customer. It should be appreciated that allowing any access may nevertheless still publicly expose systems and components of a network.
- FIG. 1 depicts a block diagram of a system architecture for providing a sensor overlay network 100 , according to an exemplary embodiment.
- the system 100 may include a first network 102 .
- the first network 102 may be a local network, a service provider network, or other network.
- the first network 102 may be communicatively coupled to a second network 104 .
- the second network 102 may be an off-net network or other similar network.
- the first network 102 may include network elements 106 a , 106 b , 106 c , and 106 d , which may be communicatively coupled with one another.
- Network elements 106 a , 106 b , 106 c , and 106 d may also be communicatively coupled to other components, such as network element 106 e (e.g., in the second network 104 ) or end-user or customer-side network element 110 .
- network elements 106 a , 106 b , 106 c , and 106 d may each be communicatively coupled to network boxes 108 a , 108 b , 108 c , and 108 d , respectively.
- These network boxes 108 a , 108 b , 108 c , and 108 d may be used to form a sensor overlay network.
- Traceroutes 112 a , 112 b , and 112 c may be used to provide measurement traffic from the end-user or customer-side network element 110 to a network component residing at the network or other location.
- Other devices or network components e.g., intermediary network components
- Network 102 or network 104 may be a wireless network, a wired network, or any combination of wireless network and wired network.
- network 102 or network 104 may include one or more of a fiber optics network, a passive optical network, a cable network, an Internet network, a satellite network (e.g., operating in Band C, Band Ku or Band Ka), a wireless LAN, a Global System for Mobile Communication (“GSM”), a Personal Communication Service (“PCS”), a Personal Area Network (“PAN”), D-AMPS, Wi-Fi, Fixed Wireless Data, IEEE 802.11a, 802.11b, 802.15.1, 802.11n and 802.11g or any other wired or wireless network for transmitting or receiving a data signal.
- GSM Global System for Mobile Communication
- PCS Personal Communication Service
- PAN Personal Area Network
- D-AMPS D-AMPS
- Wi-Fi Fixed Wireless Data
- IEEE 802.11a, 802.11b, 802.15.1, 802.11n and 802.11g or any other wired
- network 102 or network 104 may include, without limitation, telephone line, fiber optics, IEEE Ethernet 802.3, a wide area network (“WAN”), a local area network (“LAN”), or a global network such as the Internet.
- network 102 or network 104 may support, an Internet network, a wireless communication network, a cellular network, or the like, or any combination thereof.
- Network 102 or network 104 may further include one, or any number of the exemplary types of networks mentioned above operating as a stand-alone network or in cooperation with each other.
- Network 102 or network 104 may utilize one or more protocols of one or more network elements to which it is communicatively coupled.
- Network 102 or network 104 may translate to or from other protocols to one or more protocols of network devices.
- network 102 or network 104 is depicted as one network, it should be appreciated that according to one or more embodiments, network 102 or network 104 may comprise a plurality of interconnected networks, such as, for example, service provider network, the Internets, a broadcasting networks, cable television networks, corporate networks, or home networks.
- Network elements 106 a , 106 b , 106 c , 106 d , and 106 e may transmit and receive data to and from network 102 or network 104 representing broadcast content, user request content, mobile communications data, or other data.
- the data may be transmitted and received utilizing a standard telecommunications protocol or a standard networking protocol.
- SIP Session Initiation Protocol
- the data may be transmitted or received utilizing other Voice Over IP (“VOIP”) or messaging protocols.
- SIP Session Initiation Protocol
- VOIP Voice Over IP
- data may also be transmitted or received using Wireless Application Protocol (“WAP”), Multimedia Messaging Service (“MMS”), Enhanced Messaging Service (“EMS”), Short Message Service (“SMS”), Global System for Mobile Communications (“GSM”) based systems, Code Division Multiple Access (“CDMA”) based systems, Transmission Control Protocol/Internet (“TCP/IP”) Protocols, or other protocols and systems suitable for transmitting and receiving data.
- WAP Wireless Application Protocol
- MMS Multimedia Messaging Service
- EMS Enhanced Messaging Service
- SMS Short Message Service
- GSM Global System for Mobile Communications
- CDMA Code Division Multiple Access
- TCP/IP Transmission Control Protocol/Internet Protocols
- Data may be transmitted and received wirelessly or may utilize cabled network or telecom connections such as an Ethernet RJ45/Category 5 Ethernet connection, a fiber connection, a traditional phone wireline connection, a cable connection or other wired network connection.
- Network 102 network 104 may use standard wireless protocols including IEEE 802.11a, 802.11b and 802.11g.
- Network 102 network 104
- network elements 106 a , 106 b , 106 c , 106 d , and 106 e may be provider-owned routers used to forward customer data. These routers may run various routing protocols between them to communicate reachability information.
- An intermediary device may include a repeater, microwave antenna, amplifier, cellular tower, or another network access device capable of providing connectivity between to different network mediums. These intermediary devices may be capable of sending or receiving signals via a mobile network, a paging network, a cellular network, a satellite network or a radio network. These network elements may provide connectivity to one or more wired networks and may be capable of receiving signals on one medium such as a wired network and transmitting the received signals on a second medium, such as a wireless network.
- Network boxes 108 a , 108 b , 108 c , and 108 d may include dedicated machinery (e.g., sensor CPUs) for providing an sensor overlay network at network 102 .
- network boxes 108 a , 108 b , 108 c , and 108 d may be out-of-band sensor CPUs and may be communicatively coupled to network elements 106 a , 106 b , 106 c , and 106 d , as depicted in FIG. 1 .
- Network boxes 108 a , 108 b , 108 c , and 108 d may be dedicated to respond to user-generated measurement traffic.
- These boxes may be separate hardware that collocated and connected to the network routers or these boxes may be integrated into the hardware of the network routers in such a way that the measurement traffic does not impede or is impacted by other control plane traffic or customer data traffic.
- the sensor CPUs may therefore provide a more accurate view of the network.
- the network boxes 108 a , 108 b , 108 c , and 108 d may emulate network elements and respond to queries from end-user or customer-side network element 110 .
- Network boxes 108 a , 108 b , 108 c , and 108 d may use a variety of overlay mechanisms. These may include, but not limited to, Generic Routing Encapsulation (“GRE”) tunnels, Internet Protocol Security (“IPSec”) tunnels, Internet Protocol to Internet Protocol (“IP-IP”) tunneling, Reservation Protocol or Resource Reservation Protocol (“RSVP”) or Label Distribution Protocol (“LDP”) signaled Multiprotocol Label Switching (“MPLS”) Label Switch Paths (“LSPs”).
- GRE Generic Routing Encapsulation
- IPSec Internet Protocol Security
- IP-IP Internet Protocol to Internet Protocol
- RSVP Reservation Protocol or Resource Reservation Protocol
- LDP Label Distribution Protocol
- MPLS Multiprotocol Label Switching
- Network elements 106 a , 106 b , 106 c , 106 d , and 106 e and network boxes 108 a , 108 b , 108 c , and 108 d may be one or more servers (or server-like devices), such as a Session Initiation Protocol (“SIP”) server.
- Network elements 106 a , 106 b , 106 c , 106 d , and 106 e and network boxes 108 a , 108 b , 108 c , and 108 d may include one or more processors (not shown) for transmitting, receiving, processing, or storing data.
- network elements 106 a , 106 b , 106 c , 106 d , and 106 e may be servers providing network service and network boxes 108 a , 108 b , 108 c , and 108 d may emulate their respective network elements to provide a sensor overlay network.
- network elements 106 a , 106 b , 106 c , 106 d , and 106 e and network boxes 108 a , 108 b , 108 c , and 108 d may be servers that provide network connection, such as the Internet, public broadcast data, a cable television network, or another media.
- each of the components of system 100 may include one or more processors for recording, transmitting, receiving, or storing data. Although each of the components of system 100 are depicted as individual elements, it should be appreciated that the components of system 100 may be combined into fewer or greater numbers of devices and may be connected to additional devices not depicted in FIG. 1 .
- network boxes 108 a , 108 b , 108 c , and 108 d may be integrated within network elements 106 a , 106 b , 106 c , and 106 d .
- each of the components of system 100 may be local, remote, or a combination thereof to one another.
- Data storage may also be provided to each of the components of system 100 .
- Data storage may be network accessible storage and may be local, remote, or a combination thereof to the components of system 100 .
- Data storage may utilize a redundant array of inexpensive disks (“RAID”), tape, disk, a storage area network (“SAN”), an internet small computer systems interface (“iSCSI”) SAN, a Fibre Channel SAN, a common Internet File System (“CIFS”), network attached storage (“NAS”), a network file system (“NFS”), or other computer accessible storage.
- RAID redundant array of inexpensive disks
- SAN storage area network
- iSCSI internet small computer systems interface
- CIFS Internet File System
- NAS network attached storage
- NFS network file system
- data storage may be a database, such as an Oracle database, a Microsoft SQL Server database, a DB2 database, a MySQL database, a Sybase database, an object oriented database, a hierarchical database, or other database.
- Data storage 108 may utilize flat file structures for storage of data. It should also be appreciated that network-based or GPS-based timing (e.g., Network Time Protocol (“NTP”)) between the measurement boxes for synchronization may be provided as well. Other various embodiments may also be realized.
- NTP Network Time Protocol
- the end-user or customer-side network element 110 may be another network, a residential gateway, such as a router, an optical network terminal, or a piece of Customer Premises Equipment (“CPE”) providing access to one or more other equipment.
- a residential gateway such as a router, an optical network terminal, or a piece of Customer Premises Equipment (“CPE”) providing access to one or more other equipment.
- CPE Customer Premises Equipment
- the end-user or customer-side network element 110 element 110 may be another network that provides connectivity to a service provider at network 102 or network 104 .
- the end-user or customer-side network element 110 may be, or may be communicatively coupled to, a desktop computer, a laptop computer, a server, a server-like device, a mobile communications device, a wireline phone, a cellular phone, a mobile phone, a satellite phone, a personal digital assistant (“PDA”), a computer, a handheld MP3 player, a handheld multimedia device, a personal media player, a gaming device, or other devices capable of communicating with network 102 or network 104 (e.g., CPE, television, radio, phone, or appliance).
- the end-user or customer-side network element 110 may include wired or wireless connectivity.
- User-generated, infrastructure-targeted packets may originate from the end-user or customer-side network element 110 . For example, basic performance measurements may rely on Internet Control Message Protocol (“ICMP”) ping, ICMP traceroute, User Datagram Protocol (“UDP”) traceroute, or other protocol.
- ICMP Internet Control Message Protocol
- UDP User Datagram Protocol
- System 100 may be used for communications between two or more components of the system 100 .
- System 100 may also be used for transmitting or receiving data associated with a variety of content, such multimedia content.
- the various components of system 100 as shown in FIG. 1 may be further duplicated, combined, or integrated to support various applications and platforms. Additional elements may also be implemented in the systems described above to support various applications.
- an end-user or customer-side network element 110 may rely one or more traceroutes to identify or determine measurement traffic at a network element.
- a customer traceroute 112 a from the end-user or customer network element 110 may seek to identify measurement traffic network element 106 c and a customer traceroute 112 b from the end-user or customer network element 110 may seek to identify measurement traffic network element 106 a .
- traceroute 112 a may be shunted to network box 108 c and traceroute 112 b may be shunted to network box 108 a .
- Unbeknownst to the end-user or customer-side network element 110 these network boxes may respond on behalf of their respective network elements.
- Traceroute 112 c may provide traffic to network element 106 e of the second network 104 .
- an out-of-band sensor network may be provided at network 102 .
- This overlay may be separate from any other overlay networks that may exist in a providers domain, e.g., network 104 .
- a sensor overlay network may therefore provide an excellent solution where the network remains closed and protected while allowing the end-users to ascertain useful performance and connectivity information about the network. In fact, the information provided may be more accurate when compared to the open network because of the dedicated sensors and the separation of the traffic.
- Further refinements may be available in that the hardware of the network boxes 108 a , 108 b , 108 c , and 108 d (e.g., sensor CPUs) may be customized and optimized to respond to various sensor traffic.
- the network elements 106 a , 106 b , 106 c , and 106 d be configured in a way that they may not be required to respond to sensor traffic.
- the out-of-band sensor network or sensor overlay network dedicated paths for user-generated sensor packets may be provided to mitigate issues associated with hidden network topology. Furthermore, the sensor network may experience higher infrastructure security since network instrumentation or internal network elements may be walled off from customer reachability. Furthermore, with the exception of traffic that is required for routing, other traffic destined to network elements 106 a , 106 b , 106 c , and 106 d may be shunted to the sensor overlay network at the first network 102 .
- network boxes 108 a , 108 b , 108 c , and 108 d also removes attack vectors and allows the overlay sensor network to provide a more accurate monitoring of the network itself.
- network boxes 108 a , 108 b , 108 c , and 108 d may be leveraged as a platform to source diagnostic traffic from without jeopardizing health or security of the network. End-user greater visibility and more targeted information for troubleshooting may be provided as a result. Increased visibility may also increase customer comfort with network performance and reduce expensive customer service calls and other disadvantages.
- FIG. 2A depicts schematic diagram of a sensor plane architecture 200 A, according to an exemplary embodiment.
- the sensor plane architecture 200 may be included in network boxes 108 a , 108 b , 108 c , and 108 d for providing a sensor overlay network.
- the sensor plane architecture 200 may be included in network elements 106 a , 106 b , 106 c , and 106 d without separate network boxes 108 a , 108 b , 108 c , and 108 d.
- the sensor plane architecture 200 may include a forwarding plane 202 that forwards data 212 a (e.g., an ICMP request) to the control plane 204 .
- data 212 a e.g., an ICMP request
- routing protocols may typically be communicated between the control plane of one network element to another.
- the control plane 204 may be shielded from such activity when a sensor plane 206 is provided.
- the data 212 a is forwarded to the sensor plane 206 instead of the control plane 204 .
- the sensor plane 206 may emulate the control plane 204 and respond with response data 212 b (e.g., an ICMP reply) via the forwarding plane 202 .
- the sensor plane 206 may obtain routing/forwarding information from the control plane 204 and recreate a representative network based on routing protocol information.
- a network emulation layer may build a virtual topology that mimics the actual network.
- the network emulation layer of each of the network elements 106 a , 106 b , 106 c , and 106 d or network boxes 108 a , 108 b , 108 c , and 108 d may be connected with a tunnel overlay that is transparent to the sensor plane 206 and the network emulation layer.
- the overlay tunnels may be constructed to appear as physical circuits to the sensor plane.
- Various filtering may allow the sensor plane 206 to shunt traffic from the control plane 204 .
- separate and distinct instances of the control plane 204 may be created so that the sensor plane 206 may function within the routing platform identically or similarly as the control plane 204 would function.
- This additional level of separation may enable end-users to exchange routing protocol information with this sensor plane CPU further reducing attacks on the routing infrastructure.
- Use of a sensor layer network may also mitigate control plane attacks, including well-crafted packet attacks, since the control plane 204 may be completely isolated to external routing communications.
- a higher level of security to segments of end-users or communities of interest by separating them across sets of sensor plane CPUs may also be provided. For example, a small number of highly critical customers may share a sensor plane CPU while a majority of less critical customers and peers may be aggregated on other sensor CPUs. Such security segmentation may further reduce routing attacks between communities of interest or segments of customers (e.g., from the majority of customers or peers to those few highly critical customers).
- FIG. 2B depicts schematic diagram of a sensor plane architecture 200 B, according to another exemplary embodiment.
- the sensor plane architecture 200 B may be similar to the sensor plane architecture 200 A of FIG. 2A .
- the sensor plane architecture 200 B may include a forwarding plane 202 , a control plane 204 , and a sensor plane 206 .
- routing traffic 216 a and 216 b may traverse the forwarding plane 202 to or from the control plane 204 and sensor traffic 212 a and 212 b may traverse the forwarding plane 202 to or from the sensor plane 206 .
- decision engines 242 , 244 , and 246 may be provided in the forwarding plane 202 , the control plane 204 , or the sensor plane 206 , respectively. These decision engines 242 , 244 , and 246 may determine how to handle various types of traffic at each of the forwarding plane 202 , the control plane 204 , or the sensor plane 206 .
- the forwarding plane decision engine 242 may determine whether or not traffic is transiting traffic 214 , routing traffic 216 a and 216 b , or sensor traffic 212 a and 212 b . In the case of transiting traffic 214 , the forwarding plane decision engine 242 may keep the traffic on the forwarding plane 202 and traverses the device 200 B.
- the forwarding plane decision engine 242 may deliver the traffic to or from the control plane. In the case of sensor traffic 212 a and 212 b , the forwarding plane decision engine 242 may deliver the traffic to or from the sensor plane 206 . It should be appreciated that the forwarding plane decision engine 242 may perform other various functions optionally filter, rate limit, log, syslog, or forward to the control plane any or all sensor traffic 212 a and 212 b that meets one or more profiles, such as a five-tuple criteria. Although described with reference to the forwarding plane decision engine 242 , it should be appreciated that the above features and functions may be implemented in one or more additional decision engines as well (e.g., decision engines 244 and 246 ).
- the control plane 204 may acquire information from itself and the other network components to form a Routing Information Base (“RIB”) 224 a that may has path information.
- the control plane 204 may optionally synchronize the RIB 224 a with the sensor plane 206 to form a RIB copy 224 b , for example, thus enabling the sensor plane 206 to simulate forwarding and routing behavior of the control plane 204 . Accordingly, any atomic update to the RIB 224 a may result in synchronization with the RIB copy 224 b.
- the control plane 204 may also use the RIB 224 a to select Forwarding Information Base (“FIB”) 222 a on the control plane 204 .
- the FIB 222 a may be pushed 232 (or otherwise transmitted) to other instances of the forwarding plane 202 . This may create a local FIB 222 b , 222 c . . . 222 n , as necessary, for each instantiation of the forwarding plane 202 .
- One or more connections 252 may exist between the forwarding plane 202 and control plane 204 . These one or more connections 252 may facilitate communications for routing traffic 216 a and 216 b , FIB push 232 , or other related feature or functionality.
- One or more connections 254 may exist between the forwarding plane 202 and the sensor plane 206 to facilitate communications of sensor traffic 212 a and 212 b .
- One or more connections 256 may exist between the control plane 204 and the sensor plane 206 to facilitate communications for RIB synchronization 234 .
- Other various embodiments may also be provided to facilitate communications, synchronization, or other related features or functionalities.
- the sensor plane architecture 200 A of FIG. 2A and the sensor plane architecture 200 B of FIG. 2B may be implemented in a variety of ways.
- the architectures 200 A and 200 B may be implemented as a hardware component (e.g., as a module) within a network element or network box.
- the architecture 200 may be implemented in computer executable software.
- module functionality of the architectures 200 A and 200 B may be located on a single device or distributed across a plurality of devices including one or more centralized servers and one or more pieces of customer premises equipment or end user devices.
- embodiments are primarily directed to user-generated packets, other data may also be handled by the components of system 100 . While depicted as various servers, components, elements, or devices, it should be appreciated that embodiments may be constructed in software or hardware, as a separate or stand-alone device, or as part of an integrated transmission or switching device.
- system support and updating the various components of the system 100 may be easily achieved.
- a system administrator may have access to one or more of the components of the system, network, components, elements, or device.
- the one or more servers, components, elements, or devices of the system may not be limited to physical components. These components may be software-based, virtual, etc.
- the various servers, components, elements, or devices may be customized to perform one or more additional features and functionalities. Such features and functionalities may be provided via deployment, transmitting or installing software or hardware.
- FIG. 3 depicts an illustrative flowchart of a method for providing a sensor overlay network, according to an exemplary embodiment.
- the exemplary method 300 is provided by way of example, as there are a variety of ways to carry out methods disclosed herein.
- the method 300 shown in FIG. 3 may be executed or otherwise performed by one or a combination of various systems.
- the method 300 is described below as carried out by at least system 100 in FIG. 1 and architectures 200 A- 200 B in FIG. 2A-2B , by way of example, and various elements of systems 100 and 200 A- 200 B are referenced in explaining the exemplary method of FIG. 3 .
- Each block shown in FIG. 3 represents one or more processes, methods, or subroutines carried in the exemplary method 300 .
- a computer readable medium comprising code to perform the acts of the method 300 may also be provided. Referring to FIG. 3 , the exemplary method 300 may begin at block 310 .
- the control module 204 of FIG. 2A may be provided and configured to receive and respond to data requests.
- the data request may be a request for basic performance measurements.
- the data request may be at least one of an Internet Control Message Protocol (“ICMP”) message and User Datagram Protocol (“UDP”) message.
- ICMP Internet Control Message Protocol
- UDP User Datagram Protocol
- the forwarding module 202 of FIG. 2A may be provided and configured to receive a data request from at least one network element and forward a response to the data request to the at least one network element.
- the data request may be directed to a control module for handling.
- the network element may be a provider-side network element or a customer-side network element.
- the network element may be a router, a customer premises equipment (CPE), a server, a gateway, a network terminal, a computer processor, or a network.
- CPE customer premises equipment
- the sensor module 206 of FIG. 2A may be provided and communicatively coupled to the forwarding module and control module.
- the sensor module 206 may be configured to emulate the control module 204 by receiving and responding to the data request from the forwarding module and handle data received from the forwarding module.
- the sensor module 206 may be implemented within a dedicated sensor CPU. It should be appreciated that the dedicated sensor CPU may be separate and distinct from the control plane CPU or may be integrated with the control plane CPU.
- the sensor module may create an out-of-band sensor layer, forming a sensor overlay network, shielding the control plane from identification.
- the sensor module may include at least one customizable filter configured to filter data away from the control module. It should be appreciated that the customizable filter may be physical or virtual and may determine how data is handled, processed, and directed. In some embodiments, the customizable filter may filter ICMP messages from the control plane to the sensor plane. In this example, all other traffic may be forwarded to the control plane. In other embodiments, the customizable filter may filter all traffic and redirect it to the sensor plane to process
- FIG. 4 an illustrative flowchart of a method for providing a sensor overlay network, according to another exemplary embodiment.
- the exemplary method 400 is provided by way of example, as there are a variety of ways to carry out methods disclosed herein.
- the method 400 shown in FIG. 4 may be executed or otherwise performed by one or a combination of various systems.
- the method 400 is described below as carried out by at least system 100 in FIG. 1 and architectures 200 A- 200 B in FIGS. 2A-2B , by way of example, and various elements of systems 100 and 200 A- 200 B are referenced in explaining the exemplary method of FIG. 4 .
- Each block shown in FIG. 4 represents one or more processes, methods, or subroutines carried in the exemplary method 400 .
- a computer readable medium comprising code to perform the acts of the method 400 may also be provided. Referring to FIG. 4 , the exemplary method 400 may begin at block 410 .
- the control module 204 of FIG. 2B may organize information from itself and generate a Routing Information Base (“RIB”) 224 a .
- the RIB 224 a may comprise path information.
- the control module 204 may optionally synchronize the RIB 224 a with the sensor module 206 to form a RIB copy 224 b , for example, thus enabling the sensor module 206 to simulate forwarding and routing behavior of the control module 204 . Accordingly, any atomic update to the RIB 224 a may result in synchronization with the RIB copy 224 b.
- the control module 204 may use the RIB 224 a to select a Forwarding Information Base (“FIB”) 222 a on the control module 204 .
- FIB Forwarding Information Base
- the FIB 222 a may be pushed 232 (or otherwise transmitted) to other instances of the forwarding module 202 . This may create a local FIB 222 b , 222 c . . . 222 n , as necessary, for each instantiation of the forwarding module 202 .
- embodiments may provide a system and method for providing a sensor overlay network. It should be appreciated that although embodiments are described primarily with basic measurement data and communications between various network components, the systems and methods discussed above are provided as merely exemplary and may have other various applications and implementations.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/624,494 US9270687B2 (en) | 2009-11-24 | 2009-11-24 | System and method for providing sensor overlay networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/624,494 US9270687B2 (en) | 2009-11-24 | 2009-11-24 | System and method for providing sensor overlay networks |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110125873A1 US20110125873A1 (en) | 2011-05-26 |
US9270687B2 true US9270687B2 (en) | 2016-02-23 |
Family
ID=44062905
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/624,494 Expired - Fee Related US9270687B2 (en) | 2009-11-24 | 2009-11-24 | System and method for providing sensor overlay networks |
Country Status (1)
Country | Link |
---|---|
US (1) | US9270687B2 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8626827B1 (en) * | 2011-03-25 | 2014-01-07 | Amazon Technologies, Inc. | Programmatically simulating system conditions |
US9118732B2 (en) * | 2011-05-05 | 2015-08-25 | At&T Intellectual Property I, L.P. | Control plane for sensor communication |
US20140088873A1 (en) * | 2012-09-21 | 2014-03-27 | Lantronix, Inc. | Networked Sensor Devices And Systems |
WO2017102088A1 (en) * | 2015-12-17 | 2017-06-22 | Praesideo B.V. | Method and system for a distributed early attack warning platform (deawp) |
US10416918B2 (en) | 2016-06-28 | 2019-09-17 | Vmware, Inc. | Service state management in a decentralized control plane of a computing system |
CN108241648A (en) * | 2016-12-23 | 2018-07-03 | 中兴通讯股份有限公司 | A kind of data processing method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020059425A1 (en) * | 2000-06-22 | 2002-05-16 | Microsoft Corporation | Distributed computing services platform |
US20030172145A1 (en) * | 2002-03-11 | 2003-09-11 | Nguyen John V. | System and method for designing, developing and implementing internet service provider architectures |
US20040028003A1 (en) * | 2002-04-22 | 2004-02-12 | Diener Neil R. | System and method for management of a shared frequency band |
US20090323537A1 (en) * | 2008-06-30 | 2009-12-31 | Fujitsu Limited | Network failure detection system, method, and storage medium |
US7668941B1 (en) * | 2004-06-29 | 2010-02-23 | American Megatrends, Inc. | Systems and methods for implementing a TCP/IP stack and web interface within a management module |
-
2009
- 2009-11-24 US US12/624,494 patent/US9270687B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020059425A1 (en) * | 2000-06-22 | 2002-05-16 | Microsoft Corporation | Distributed computing services platform |
US20030172145A1 (en) * | 2002-03-11 | 2003-09-11 | Nguyen John V. | System and method for designing, developing and implementing internet service provider architectures |
US20040028003A1 (en) * | 2002-04-22 | 2004-02-12 | Diener Neil R. | System and method for management of a shared frequency band |
US7668941B1 (en) * | 2004-06-29 | 2010-02-23 | American Megatrends, Inc. | Systems and methods for implementing a TCP/IP stack and web interface within a management module |
US20090323537A1 (en) * | 2008-06-30 | 2009-12-31 | Fujitsu Limited | Network failure detection system, method, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
US20110125873A1 (en) | 2011-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11881964B2 (en) | System and method for a global virtual network | |
US10911472B2 (en) | Techniques for targeted botnet protection | |
CN114641968B (en) | Method and system for efficient network protection of mobile devices | |
Xu et al. | Finding service paths in a media service proxy network | |
US9270687B2 (en) | System and method for providing sensor overlay networks | |
US20220393943A1 (en) | Distributed Telemetry and Policy Gateway in the cloud for remote devices | |
US11483279B2 (en) | Domain name system as an authoritative source for multipath mobility policy | |
US20150112767A1 (en) | System and method for using network mobility events to build advertising demographics | |
US11563665B2 (en) | Detecting web probes versus regular traffic through a proxy including encrypted traffic | |
CN108809769B (en) | Method for detecting IPv6 liveness and electronic equipment | |
US11496579B2 (en) | Connection manager | |
US11582294B2 (en) | Highly scalable RESTful framework | |
EP3484101B1 (en) | Automatically determining over-the-top applications and services | |
US20160248652A1 (en) | System and method for classifying and managing applications over compressed or encrypted traffic | |
US8625529B2 (en) | System for and method of dynamic home agent allocation | |
Barbosa et al. | Simpleweb/university of twente traffic traces data repository | |
EP3041254A1 (en) | Method for providing information on network status from telecommunication networks | |
CN112995065B (en) | Internet flow control method and device and electronic equipment | |
Singh | Implementing Cisco Networking Solutions: Configure, implement, and manage complex network designs | |
US11849163B2 (en) | Redundant video stream generation | |
Dulaney | CompTIA Network+ N10-008 Exam Cram | |
Enghardt | Informed access network selection to improve application performance | |
Byers et al. | Report on the SIGCOMM 2011 Conference | |
Crawford | Creating a distributed network traffic analyser | |
Hoang-Van et al. | P2ptv traffic localization by deep packet inspection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VERIZON PATENT AND LICENSING, INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PACELLA, DANTE J.;SOLIS, NORMAN RICHARD;SCHILLER, HAROLD JASON;REEL/FRAME:023562/0031 Effective date: 20091119 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240223 |