CN105306265A - Data packet tracing method for simulation verification of switch system - Google Patents
Data packet tracing method for simulation verification of switch system Download PDFInfo
- Publication number
- CN105306265A CN105306265A CN201510656606.5A CN201510656606A CN105306265A CN 105306265 A CN105306265 A CN 105306265A CN 201510656606 A CN201510656606 A CN 201510656606A CN 105306265 A CN105306265 A CN 105306265A
- Authority
- CN
- China
- Prior art keywords
- packet
- data packet
- key message
- cell
- switch system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a data packet tracing method for simulation verification of a switch system. The data packet tracing method comprises the following steps: a first step: identifying key information of a data packet; a second step: adding the key information of the data packet in an excitation generator (generator) during simulation; a third step: collecting, refreshing and outputting the key information of the data packet to a text at a key node; and a fourth step: using a command of the data packet tracing method to seek out the data packet or path information of corresponding cells according to a certain key information combination. According to the data packet tracing method disclosed by the invention, the key information of the data packet is identified, and the data packet is searched by the key information, so that the track of the data packet is open-and-shut, no level by level search is necessary, and the manpower cost of a positioning problem is saved by a one-key operation, so that the positioning efficiency of data packet loss or error and other problems is improved.
Description
Technical field
The present invention relates to network communication technology field, be specifically related to a kind of packet method for tracing for switch system simulating, verifying.
Background technology
Along with the development of the communications industry, the development of switch is advanced by leaps and bounds, and various consensus standard and exchange scheme become increasingly complex, and switch system is more and more huger, and the emulation testing of switch system also becomes day by day complicated.
Along with the difficulty of switch system emulation testing increases, its method of testing also gets more and more.As Chinese invention patent CN103440195A discloses a kind of exchanger chip verification method and device of logic-based chip, describe a kind of method of simulating, verifying exchanger chip, make configuration use-case simpler.As Chinese invention patent CN104253723A discloses a kind of method and device of the switch validation test based on software-hardware synergism realization, describe a kind of method software merit rating and High-Speed Hardware characteristic combined.As Chinese invention patent CN104065536A discloses a kind of Ethernet switch FPGA verification method based on UVM verification method, describe a kind of introducing UVM methodology, for the verification platform of certain class particular switch system.Research and the invention of the emulation verification method of switch like this are more and more.But these methods are all absorbed in the methodology of checking and the structure of verification platform, to the positioning means not research emulating the problem detected.
In the switch system simulating, verifying become increasingly complex, the location of the problem of data-bag lost or mistake will become increasingly complex.Section can be there is and be cell, also have the series of complex such as multicast, broadcast situation in packet in switch system, it selects the path that forwards we neither specify or be easy to calculate, the trace looking for packet also becomes difficulty, generally mostly be and find from downstream toward upstream one-level one-level, efficiency is very low, and the human cost that locator data packet loss or wrong this kind of problem expend is huge.In order to address this problem, research is needed how to improve the method for the location efficiency of data-bag lost or wrong this kind of problem.
Summary of the invention
Technical problem to be solved by this invention solves when data-bag lost or wrong this kind of problem occur, and improves the problem of packet tracking and location efficiency.
In order to solve the problems of the technologies described above, the technical solution adopted in the present invention is to provide a kind of packet method for tracing for switch system simulating, verifying, comprises the following steps:
The first step: the identification completing packet key message, generally comprises: stream ID (stream_id), identifies this packet and belong to which bar data flow; Scene ID (scenario_id), identifies the sequence number of this packet in corresponding data stream; Packet ID (data_id), the sequence number of the packet that actuation generator produces, the overall situation is unique; Copy ID (copy_id), for multicast and broadcasting scenario, can there is situation about copying in packet, and this ID identifies the sequence number of copy.If based on cell process, a bag may be multiple cell by section, need to increase section ID (fragment_id), and identifying this cell is which of corresponding data bag is cut into slices.
Second step: when emulating, adds the key message of packet in actuation generator (generator).
3rd step: at the key message of key node collection, refreshing and output packet to text.
4th step: use order of the present invention to combine according to certain key message, searches out path (module of the cell process) information of packet or corresponding each cell.
In the above-mentioned methods, need the identifier adding packet voluntarily, according to the key message of debug function switch print data bag, use order provided by the invention to find the path of packet (one or more cell may be cut in switch system).
In the above-mentioned methods, if circuit-level code, then identifier is carried at filling (padding) part; If transaction-level code, then construct a key message structure, carry relevant information.
In the above-mentioned methods, described identifier requires relatively independent, does not affect the function of tested design (DUT).
The present invention by identification data packet key message and according to order key message is searched for, make the whereabouts of packet very clear, do not need one-level one level search, and operating in a key reduces the human cost of orientation problem, the location efficiency of data-bag lost and this kind of problem of mistake can be improved, and have the following advantages:
(1) from huge data, the routing information of the packet known required for finding, reduces positioning problems scope;
(2) according to command set, intuitively show paths information result, removes the cumbersome process of one-level one level search packet information from;
(3) above-mentioned key message, can contain each scene of current communication switchboard application, different information combination can tackle the location requirement of different scene.
(4) key message can be filled as a part for packet, or transmits with packet as extra data structure, even if the verification platform completed, also can revise seldom part and use this invention, not affect original function.
Accompanying drawing explanation
Fig. 1 dark parts is a kind of position related in verification platform and DUT for the packet method for tracing of switch system simulating, verifying provided by the invention;
Fig. 2 is the method flow diagram of a kind of packet method for tracing for switch system simulating, verifying provided by the invention.
Embodiment
Below in conjunction with specification drawings and specific embodiments, the present invention is described in detail.
Embodiments provide a kind of packet method for tracing for switch system simulating, verifying, as shown in Figure 1 and Figure 2, said method comprising the steps of:
The first step: the identification completing packet key message.
Packet key message generally comprises:
Stream ID (stream_id), identifies this packet and belongs to which bar data flow;
Scene ID (scenario_id), identifies the sequence number of this packet in corresponding data stream;
Packet ID (data_id), the sequence number of the packet that actuation generator produces, the overall situation is unique;
Copy ID (copy_id), for multicast and broadcasting scenario, can there is situation about copying in packet, and this ID identifies the sequence number of copy.
If based on cell process, a bag may be multiple cell by section, need to increase section ID (fragment_id), and identifying this cell is which of corresponding data bag is cut into slices.
Second step: when emulating, adds the key message of packet, as 101 in Fig. 1 in actuation generator (generator).
3rd step: at the key message of key node collection, refreshing and output packet to text, as 102 in Fig. 1.
4th step: according to the combination of certain key message, searches out path (module of the cell process) information of packet ID or corresponding each cell from text.
As shown in Figure 2, the concrete steps of second step are described as follows:
Step 201: the key message adding packet in actuation generator: stream_id, scenario_id and data_id, in emulation platform, correspondence position is the generator in Fig. 1;
Step 202: the line in the middle of each adjacent modules of DUT inserts key message and gathers refresh module, in emulation platform, correspondence position is the key message collection refresh module in Fig. 1 in DUT;
Step 203: judge whether DUT has cell slicing treatment, if had, enter step 204, otherwise directly enter step 205;
Step 204: gather in refresh module exporting with DUT cell slicing treatment module the key message be connected, extract the sequence number of cell in corresponding data bag, refresh the fragment_id of corresponding cell key message, all the other key messages are constant, then enter step 205;
Step 205: judge whether DUT has multicast or broadcast process, if had, enters step 206, otherwise directly enters step 207;
Step 206: gather in refresh module exporting with DUT multicast or broadcast process module the key message be connected, add up the fanout of this packet, refresh copy_id successively, all the other key messages are constant, then enter step 207;
Step 207: if debug function is enable, then enter step 208, otherwise process ends;
Step 208: print the key message in each key message collection refresh module, then enter step 209,
Step 209: use find_p_c or find_module_p_c order, obtain Debugging message and the path of expected data bag or cell, result puts into text-independent, can intuitively read, last process ends.
It should be noted that, in use process of the present invention, need the value of adding key message voluntarily.
In the present invention, search command adopts bashshell to write, and performs, also can use shell and perl under unix, or other scripts realize, and implementing procedure is the same, also can run under windows and Linux system, such as:
Find_p_c: extract related data packets or cell information from log information, performs ./find_p_c and can point out this order using method, as follows:
commandofmcpkt:./find_p_cstidxxscidxxdidxxcidxx
commandofucpkt:./find_p_cstidxxscidxxdidxx
commandofmcdatacell:./find_p_cstidxxscidxxdidxxcidxx
commandofucdatacell:./find_p_cstidxxscidxxdidxx
commandofsomecell:./find_p_cstidxxscidxxdidxxcidxxfidxx
youcouldchoosepartoftheparameters
Command format is one of above-mentioned, and ./find_p_c adds each combination parameter, and stid is stream_id, scid be scenario_id, did be data_id, cid be copy_id, fid is fragment_id.
Find_module_p_c: extract the associated packet based on module or cell information from log information, performs ./find_module_p_c and can point out this order using method, as follows:
commandofmcpkt:./find_p_cmodule_nameinstidxxstidxxscidxxdidxxcidxx
commandofucpkt:./find_p_cmodule_nameinstidxxstidxxscidxxdidxx
commandofmcdatacell:./find_p_cmodule_nameinstidxxstidxxscidxxdidxxcidxx
commandofucdatacell:./find_p_cmodule_nameinstidxxstidxxscidxxdidxx
commandofsomecell:./find_p_cmodule_nameinstidxxstidxxscidxxdidxxcidxxfidxx
youcouldchoosepartoftheparameters
Command format is one of above-mentioned, and ./find_module_p_c adds each combination parameter, and module_name is the module name wishing to check, instid is the sequence number of this module exampleization, and all the other parameter declarations are consistent with find_p_c order.
The present invention is not limited to above-mentioned preferred forms, and anyone should learn the structural change made under enlightenment of the present invention, and every have identical or close technical scheme with the present invention, all falls within protection scope of the present invention.
Claims (4)
1., for a packet method for tracing for switch system simulating, verifying, it is characterized in that, comprise the following steps:
The first step: the identification completing packet key message, generally comprises: stream ID (stream_id), identifies this packet and belong to which bar data flow; Scene ID (scenario_id), identifies the sequence number of this packet in corresponding data stream; Packet ID (data_id), the sequence number of the packet that actuation generator produces, the overall situation is unique; Copy ID (copy_id), for multicast and broadcasting scenario, can there is situation about copying in packet, and this ID identifies the sequence number of copy; If based on cell process, a bag may be multiple cell by section, need to increase section ID (fragment_id), and identifying this cell is which of corresponding data bag is cut into slices;
Second step: when emulating, adds the key message of packet in actuation generator (generator);
3rd step: at the key message of key node collection, refreshing and output packet to text;
4th step: use order of the present invention to combine according to certain key message, searches out path (module of the cell process) information of packet or corresponding each cell.
2. the method for claim 1, it is characterized in that, need the identifier adding packet voluntarily, according to the key message of debug function switch print data bag, use order provided by the invention to find the path of packet (one or more cell may be cut in switch system).
3. the method for claim 1, is characterized in that, if circuit-level code, then identifier is carried at filling (padding) part; If transaction-level code, then construct a key message structure, carry relevant information.
4. the method as described in claim 1-3, is characterized in that, described identifier requires relatively independent, does not affect the function of tested design (DUT).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510656606.5A CN105306265B (en) | 2015-10-12 | 2015-10-12 | A kind of data packet method for tracing for switch system simulating, verifying |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510656606.5A CN105306265B (en) | 2015-10-12 | 2015-10-12 | A kind of data packet method for tracing for switch system simulating, verifying |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105306265A true CN105306265A (en) | 2016-02-03 |
CN105306265B CN105306265B (en) | 2019-01-04 |
Family
ID=55203049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510656606.5A Active CN105306265B (en) | 2015-10-12 | 2015-10-12 | A kind of data packet method for tracing for switch system simulating, verifying |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105306265B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108183840A (en) * | 2017-12-28 | 2018-06-19 | 天津芯海创科技有限公司 | Verification method, device and the realization device of switch performance |
CN109995557A (en) * | 2017-12-29 | 2019-07-09 | 中国移动通信集团陕西有限公司 | Communication method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142720A (en) * | 2011-04-29 | 2011-08-03 | 珠海市鸿瑞软件技术有限公司 | Network communication recorder and network communication record analysis system |
CN102981882A (en) * | 2011-09-05 | 2013-03-20 | 北京旋极信息技术股份有限公司 | Analytic method and analytic device |
CN103440195A (en) * | 2013-07-11 | 2013-12-11 | 盛科网络(苏州)有限公司 | Switch chip verification method and device based on logic chip |
CN104065536A (en) * | 2014-07-02 | 2014-09-24 | 浪潮集团有限公司 | Ethernet switch FPGA verification method based on UVM verification method |
CN104104561A (en) * | 2014-08-11 | 2014-10-15 | 武汉大学 | SDN (self-defending network) firewall state detecting method and system based on OpenFlow protocol |
CN104579788A (en) * | 2015-01-21 | 2015-04-29 | 上海交通大学 | Error positioning method for distributed dynamic routing network |
-
2015
- 2015-10-12 CN CN201510656606.5A patent/CN105306265B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142720A (en) * | 2011-04-29 | 2011-08-03 | 珠海市鸿瑞软件技术有限公司 | Network communication recorder and network communication record analysis system |
CN102981882A (en) * | 2011-09-05 | 2013-03-20 | 北京旋极信息技术股份有限公司 | Analytic method and analytic device |
CN103440195A (en) * | 2013-07-11 | 2013-12-11 | 盛科网络(苏州)有限公司 | Switch chip verification method and device based on logic chip |
CN104065536A (en) * | 2014-07-02 | 2014-09-24 | 浪潮集团有限公司 | Ethernet switch FPGA verification method based on UVM verification method |
CN104104561A (en) * | 2014-08-11 | 2014-10-15 | 武汉大学 | SDN (self-defending network) firewall state detecting method and system based on OpenFlow protocol |
CN104579788A (en) * | 2015-01-21 | 2015-04-29 | 上海交通大学 | Error positioning method for distributed dynamic routing network |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108183840A (en) * | 2017-12-28 | 2018-06-19 | 天津芯海创科技有限公司 | Verification method, device and the realization device of switch performance |
CN109995557A (en) * | 2017-12-29 | 2019-07-09 | 中国移动通信集团陕西有限公司 | Communication method and device |
CN109995557B (en) * | 2017-12-29 | 2022-05-13 | 中国移动通信集团陕西有限公司 | Communication method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105306265B (en) | 2019-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Skowyra et al. | Verifiably-safe software-defined networks for CPS | |
CN104253723B (en) | The method and device for the interchanger validation test realized based on software-hardware synergism | |
CN109379251A (en) | Protective relaying device process layer GOOSE and SV communicate automatic test approach and system | |
CN113572726B (en) | Multimode network control-data plane consistency verification method and device | |
Yao et al. | Formal modeling and systematic black-box testing of sdn data plane | |
CN105653935B (en) | Based on PPTL3Social networking system personal secrets run time verification method | |
US8681812B2 (en) | Method and device for analyzing transaction propagation in a multiprotocol network of a system on chip | |
CN110321285A (en) | Test case processing method and relevant device | |
CN105306265A (en) | Data packet tracing method for simulation verification of switch system | |
CN111200544B (en) | Network port flow testing method and device | |
CN103440363A (en) | Method for tracing source of abnormal signals in FPGA (Field Programmable Gate Array) post-placement and routing simulation | |
CN106130830A (en) | The method of testing of safety equipment stability and test device | |
Bošnački et al. | Model checking SDL with Spin | |
CN107294814A (en) | The method of testing and device of a kind of network-on-chip | |
CN103076557B (en) | Testing method of single event functional interruption of Spacewire circuit | |
CN111935767B (en) | Network simulation system | |
CN106027285A (en) | Complex system dynamic fault tress modeling method based on service path | |
CN102495778A (en) | System and method for testing single-packet regular matching logic | |
CN105513645A (en) | Failure detection method and failure detection apparatus for random access memory (RAM) | |
CN102843269B (en) | A kind of method and system for simulating microcode business processing flow | |
Zichao et al. | Ethernet topology discovery for virtual local area networks with incomplete information | |
CN107179993A (en) | Method for creating test sequence applied to train control system | |
CN107576926B (en) | A method of generating simulation ammeter returned data | |
Helmy et al. | Systematic testing of multicast routing protocols: Analysis of forward and backward search techniques | |
CN107066359B (en) | High-speed serial digital flight test interface simulation equipment and method for receiving high-speed serial digital flight test data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |