CN115361329A - Method for monitoring network topology change and triggering alarm based on TTL - Google Patents

Method for monitoring network topology change and triggering alarm based on TTL Download PDF

Info

Publication number
CN115361329A
CN115361329A CN202210717407.0A CN202210717407A CN115361329A CN 115361329 A CN115361329 A CN 115361329A CN 202210717407 A CN202210717407 A CN 202210717407A CN 115361329 A CN115361329 A CN 115361329A
Authority
CN
China
Prior art keywords
ttl
node
alarm
node routing
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210717407.0A
Other languages
Chinese (zh)
Other versions
CN115361329B (en
Inventor
姜作毅
林达顺
谢光玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tianwei Communication Technology Co ltd
Original Assignee
Beijing Tianwei Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tianwei Communication Technology Co ltd filed Critical Beijing Tianwei Communication Technology Co ltd
Priority to CN202210717407.0A priority Critical patent/CN115361329B/en
Publication of CN115361329A publication Critical patent/CN115361329A/en
Application granted granted Critical
Publication of CN115361329B publication Critical patent/CN115361329B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/123Evaluation of link metrics

Abstract

The application relates to a method for monitoring network topology change and triggering alarm based on TTL, which sets a node routing link based on an Underlay network topology structure; monitoring the TTL value of the node routing link in real time, and judging whether the TTL value exceeds a preset TTL threshold value or not; and calculating the change nodes in the topological structure of the Underlay network in a fixed point mode according to the judgment result. Through TTL detection on a plurality of end-to-end node routing links, real-time monitoring is carried out on the change of TTL values through an alarm engine, and once the change occurs, an alarm is given immediately and a point which is possible to generate topology change is calculated. When the Underalay of the SD-WAN changes, the network optimization can be found as early as possible and carried out in a targeted manner by detecting and triggering the alarm through the multi-angle TTL.

Description

Method for monitoring network topology change and triggering alarm based on TTL
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for monitoring a network topology change and triggering an alarm based on TTL, and a TTL monitoring system.
Background
In the SD-WAN network, because many underwlay nodes are based on the Internet available everywhere, the change of the network topology will inevitably cause the influence of the quality of the underwlay network, and further influence various performance indexes of the Overlay.
Since the Internet is not controlled by anyone, the current mainstream processing method is to detect the quality of the Overlay network manually, detect the topology of the Underlay network manually after the quality of the Overlay network is found to be degraded, and deal with the situation.
In view of the above manual detection, it is necessary to passively wait for Overlay network quality degradation and then manually troubleshoot the complicated Underlay network. And not to say, inefficient, more likely, hands-free.
Therefore, a means for automatically discovering the underwlay topology change based on the method for monitoring the network topology change and triggering the alarm by TTL is needed, so that when the underwlay of SD-WAN changes, the network can be discovered as early as possible and network optimization can be carried out in a targeted manner through multi-angle detection and alarm triggering.
Disclosure of Invention
In order to solve the above problems, the present application provides a method, an apparatus, and a system for monitoring network topology changes and triggering alarms based on TTL, so that TTL detection is performed on a plurality of end-to-end node routing links, a change in TTL values is monitored in real time by an alarm engine, and once the change occurs, an alarm is immediately given and a point where topology change may occur is calculated. When the Underlay of the SD-WAN changes, the network optimization is discovered as soon as possible and performed in a targeted manner by detecting and triggering the alarm through the multi-angle TTL.
On one hand, the application provides a method for monitoring network topology change and triggering alarm based on TTL, which comprises the following steps:
s100, setting a node routing link based on an Underlay network topology structure;
s200, monitoring the TTL value of the node routing link in real time, and judging whether the TTL value exceeds a preset TTL threshold value or not;
s300, calculating the change nodes in the Underlay network topology structure in a fixed point mode according to the judgment result.
As an optional implementation of the present application, optionally, in step S100, the setting a node routing link based on an underwlay network topology includes:
s101, presetting a link setting rule;
s102, selecting a plurality of nodes meeting the link setting rule in the Underalay network topological structure according to the link setting rule;
s103, setting a plurality of end-to-end node routing links based on the selected nodes.
As an optional implementation of the present application, optionally, in step S100, the setting a node routing link based on an underwlay network topology further includes:
s110, acquiring the node routing link, and calculating and obtaining the number of nodes in the node routing link;
s120, configuring a plurality of TTL thresholds corresponding to the number of the nodes according to the number of the nodes and a preset configuration rule;
s130, configuring the TTL threshold value on each node in the node routing link according to the configuration rule.
As an optional implementation of the present application, optionally, in S200, monitoring the TTL value of the node routing link in real time, and determining whether the TTL value exceeds a preset TTL threshold value, includes:
s201, configuring an alarm system and setting the sampling frequency of the alarm system;
s202, configuring alarm strategies with different sensitivities, and configuring the alarm strategies in the alarm system;
s203, carrying out real-time TTL monitoring on the node routing link through the alarm system, and obtaining the routing TTL value of the node routing link.
As an optional implementation of the present application, optionally, in step S200, monitoring a TTL value of the node routing link in real time, and determining whether the TTL value exceeds a preset TTL threshold, further including:
s210, performing real-time TTL monitoring on the node routing links through the alarm system, and acquiring a TTL value of each node routing link;
s220, comparing the TTL value of the node routing link with the TTL threshold value of the node routing link, and judging whether the TTL value of the node routing link exceeds the TTL threshold value;
and S230, if the TTL value of the node routing link exceeds the TTL threshold value of the node routing link, judging that the topological structure of the Underalay network where the node routing link is located changes, and sending an alarm through the alarm system.
As an optional implementation of this application, optionally, in step S300, the fixed-point calculating a change node in the underrlay network topology according to the determination result includes:
s301, acquiring the node routing link which gives out the alarm;
s302, performing real-time TTL monitoring on each node in the node routing link through the alarm system to obtain a TTL value of each node;
s303, comparing the TTL value of each node with the TTL threshold value configured for each node, calculating and judging whether the TTL value of each node exceeds the TTL threshold value: if the TTL value of one node exceeds the corresponding TTL threshold value, the topological structure of the Underalay network where the node is located is judged to be changed, the node is marked, and an alarm is sent out through the alarm system.
In a second aspect of the present application, a device for implementing the method for monitoring a network topology change and triggering an alarm based on TTL is provided, where the method includes:
the link setting module is used for setting a node routing link based on the Underlay network topology structure;
the TTL value judging module is used for monitoring the TTL value of the node routing link in real time and judging whether the TTL value exceeds a preset TTL threshold value or not;
and the fixed point calculation module is used for calculating the change nodes in the Underlay network topology structure in a fixed point mode according to the judgment result.
As an optional implementation of the present application, optionally, the TTL value determining module includes:
the system comprises a configuration module, a data processing module and a data processing module, wherein the configuration module is used for configuring an alarm system and setting the sampling frequency of the alarm system; configuring alarm strategies with different sensitivities and configuring the alarm strategies in the alarm system;
the warning module is used for carrying out real-time TTL monitoring on the node routing link through the warning system and obtaining a routing TTL value of the node routing link; carrying out real-time TTL monitoring on the node routing links, and acquiring a TTL value of each node routing link;
a judging module, configured to compare the TTL value of the node routing link with a TTL threshold of the node routing link, and judge whether the TTL value of the node routing link exceeds the TTL threshold; and if the TTL value of the node routing link exceeds the TTL threshold value of the node routing link, judging that the topological structure of the Underlay network where the node routing link is located is changed, and sending an alarm through the alarm system.
As an optional implementation of this application, optionally, the fixed point calculating module includes:
an obtaining module, configured to obtain the node routing link that sends an alarm;
the computing module is used for carrying out real-time TTL monitoring on each node in the node routing link through the alarm system and acquiring a TTL value of each node;
the fixed point alarm module is used for comparing the TTL value of each node with the TTL threshold value configured for each node, calculating and judging whether the TTL value of each node exceeds the TTL threshold value: if the TTL value of one node exceeds the corresponding TTL threshold value, the topological structure of the Underalay network where the node is located is judged to be changed, the node is marked, and an alarm is sent out through the alarm system.
In one aspect, a TTL monitoring system is provided, which includes:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to execute the executable instructions to implement the TTL-based method for monitoring a network topology change and triggering an alarm.
The invention has the technical effects that:
the method comprises the steps that node routing links are set based on an Underlay network topology structure; monitoring the TTL value of the node routing link in real time, and judging whether the TTL value exceeds a preset TTL threshold value or not; and calculating the change nodes in the topological structure of the Underlay network in a fixed point mode according to the judgment result. Through TTL detection on a plurality of end-to-end node routing links, real-time monitoring is carried out on the change of TTL values through an alarm engine, and once the change occurs, an alarm is given immediately and a point which is possible to have topology change is calculated. When the Underalay of the SD-WAN changes, the network optimization can be found as early as possible and carried out in a targeted manner by detecting and triggering the alarm through the multi-angle TTL.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features, and aspects of the disclosure and, together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a schematic diagram illustrating an implementation flow of a method for implementing node display and control based on IRC protocol control symbols according to the present invention;
FIG. 2 is a diagram illustrating a data format structure of an open message according to the present invention;
FIG. 3 is a diagram illustrating a data format structure of a close message according to the present invention;
fig. 4 is a schematic diagram illustrating the format structure of the arrangement structure of the data packet header according to the present invention.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
Example 1
In the SD-WAN, the TTL index is a field used for describing the network hop count, and can also indirectly describe the partial topology condition of the network between end to end. In short, if the TTL changes, the network topology must change, the TTL does not change, and the network topology does not necessarily change.
In addition, the change described by TTL is only end-to-end "one-dimensional" network, and if it is necessary to detect network change more comprehensively and sensitively, it is necessary to perform TTL detection on multiple end-to-end links at the same time.
In this embodiment, the monitoring of the network quality of the network node and the node routing link is realized by performing TTL value monitoring and threshold value judgment on different node routing links in the Underlay topology of the SD-WAN. The change of the TTL value is monitored in real time through an alarm engine, once the change occurs, the alarm is immediately given and a point which is possible to have a topological change is calculated, and when the Underalay of the SD-WAN changes, the alarm is triggered through the detection of the multi-angle TTL so as to discover as early as possible and carry out network optimization in a targeted manner.
The TTL value, which is used as the only index to be monitored, is pushed to a general alarm system, and alarm strategies with different sensitivities are customized to realize the triggering of alarms. In this embodiment, the alarm policies with different sensitivities configured in the alarm system may be set according to the topology network configured by the user. When monitoring and judging TTL values of a node routing link and a node, different calculation methods and different sensitivity alarm policies may be set, which does not limit the design rules of the calculation methods and the alarm policies.
As shown in fig. 1, in one aspect, the present application provides a method for monitoring a network topology change and triggering an alarm based on TTL, which includes the following steps:
s100, setting a node routing link based on an Underlay network topology structure;
s200, monitoring the TTL value of the node routing link in real time, and judging whether the TTL value exceeds a preset TTL threshold value or not;
s300, calculating the change nodes in the Underlay network topology structure in a fixed point mode according to the judgment result.
First, several node routing links need to be set up in the underwlay topology of the SD-WAN. Specifically, as an optional implementation of the present application, optionally, in step S100, the setting a node routing link based on an underwlay network topology includes:
s101, presetting a link setting rule;
s102, selecting a plurality of nodes meeting the link setting rule in the Underalay network topological structure according to the link setting rule;
s103, setting a plurality of end-to-end node routing links based on the selected nodes.
In a topology structure, a user needs to identify a node/link that needs network optimization monitoring, and design a link setting rule, so that a routing line of different nodes, that is, a node routing link, is set through the link setting rule.
As shown in fig. 2, in the Underlay topology of an SD-WAN, 9 nodes are included, wherein, node 1, node 2 and node 3, and the routing links to node 9 are respectively:
the route from the node 1 to the node 9 is 1-4-6-9;
the route from the node 2 to the node 9 is 2-4-7-9;
the route from node 3 to node 9 is 3-5-8-9.
The topology has 3 links, namely 3 node routing links.
Secondly, setting an alarm, namely a preset TTL threshold value, for TTL values of all routing nodes on the node of each node routing link, and once the alarm system monitors the node routing link and even one node in the node routing link and finds that the node routing link reaches a trigger condition, then: and once the TTL is changed, an alarm is given immediately. In this embodiment, the accuracy of TTL sampling is in the order of seconds.
Once the TTL value changes, the nodes with changed TTL values can be obtained through fixed-point calculation, fixed-point investigation, automatic calculation and alarm are carried out, and the network optimization strategy efficiency of the Underalay topology structure of the SD-WAN is greatly improved.
In the embodiment, TTL detection is performed on a plurality of end-to-end node routing links, change of TTL values is monitored in real time through an alarm engine, and once the change occurs, an alarm is immediately given and a point where topology change is likely to occur is calculated.
Therefore, the changed nodes of the topological structure of the Underlay of the SD-WAN can be found, and when the Underlay of the SD-WAN changes, the changed nodes can be found as early as possible and network optimization can be performed in a targeted manner by detecting and triggering the alarm through the multi-angle TTL.
As shown in fig. 3, when the topology changes as shown in fig. 2, node a is added between node 6 and node 9. At this time, the routing from node 1 to node 9 is changed from 1-4-6-9 to 1-4-6-A-9 by Underlay change, the TTL value is less than 1, and the condition of triggering alarm is achieved.
Meanwhile, the TTLs of the nodes 2 and 3 are not changed, so that the route change can be judged to generate a path of 1-9, and meanwhile, similar TTL changes are found on the node 4 and the node 6, and finally, the problem is quickly locked in a link of 6-9.
Similarly, if a new node B is located between nodes 6, 7, 8 and 9, as shown in fig. 4, all nodes find that their TTL to node 9 is less than 1 for the same reason, so the location of the new node can be quickly determined and an alarm triggered.
And monitoring the change of the TTL value in real time through an alarm engine, immediately alarming once the change occurs, and calculating a point which is possibly subjected to topology change. When the Underlay of the SD-WAN changes, the network optimization is discovered as soon as possible and performed in a targeted manner by detecting and triggering the alarm through the multi-angle TTL.
Based on the above implementation, the present embodiment will further detail each specific step.
In this embodiment, TTL values of each node routing link may be monitored and calculated, and whether the TTL value of a certain node routing link exceeds a set threshold is determined; and monitoring and calculating the TTL value of the node in each node routing link, and judging whether the TTL value of a certain node in the node routing link with the alarm exceeds a set threshold value, so as to carry out fixed-point monitoring and capture the changed node. Therefore, for the node routing link and the node, alarm strategies with different sensitivities can be configured in the alarm system, and the monitored object is calculated and judged through the correspondingly configured alarm strategies, so that the setting is carried out by the user.
As an optional implementation of this application, optionally, in step S100, the setting a node routing link based on the Underlay network topology further includes:
s110, acquiring the node routing link, and calculating and obtaining the number of nodes in the node routing link;
s120, configuring a plurality of TTL thresholds corresponding to the number of the nodes according to the number of the nodes and a preset configuration rule;
s130, configuring the TTL threshold value on each node in the node routing link according to the configuration rule.
Here, for the nodes in each node routing link, the TTL threshold is configured according to the number of included nodes, so that each node can perform TTL threshold configuration according to the configuration rule. Therefore, when monitoring is facilitated, the alarm system compares and judges the TTL values of all the nodes. The TTL threshold configuration mode set by the configuration rule can be set according to the function of the alarm system.
As an optional implementation of the present application, optionally, in S200, monitoring the TTL value of the node routing link in real time, and determining whether the TTL value exceeds a preset TTL threshold value, includes:
s201, configuring an alarm system and setting the sampling frequency of the alarm system;
s202, configuring alarm strategies with different sensitivities, and configuring the alarm strategies in the alarm system;
s203, carrying out real-time TTL monitoring on the node routing link through the alarm system, and obtaining the routing TTL value of the node routing link.
In this embodiment, data is collected as second as possible by detecting TTL of a plurality of end-to-end links, and the sampling frequency is set by the system. The system type of the alarm system can be a system customized or developed by a user.
Alarm strategies with different sensitivities configured by the alarm system need to be switched according to the monitored object, so that TTL values under different alarm strategies can be conveniently monitored and judged. After the alarm strategy configuration is finished, the alarm system can perform real-time TTL monitoring on a plurality of node routing links which need network quality monitoring and are arranged in an Underalay topological structure of the SD-WAN, and the routing TTL values of the node routing links are obtained.
As an optional implementation of the present application, optionally, in step S200, monitoring, in real time, a TTL value of the node routing link, and determining whether the TTL value exceeds a preset TTL threshold, further including:
s210, performing real-time TTL monitoring on the node routing links through the alarm system, and acquiring a TTL value of each node routing link;
s220, comparing the TTL value of the node routing link with the TTL threshold value of the node routing link, and judging whether the TTL value of the node routing link exceeds the TTL threshold value;
and S230, if the TTL value of the node routing link exceeds the TTL threshold value of the node routing link, judging that the topological structure of the Underlay network where the node routing link is located is changed, and sending an alarm through the alarm system.
The monitoring object is the node routing link, the TTL value of each node routing link is obtained and calculated, whether the calculated TTL value of the node routing link exceeds the TTL threshold value specified by a strategy or not is judged, if yes, the network quality of the node routing link is judged to be changed, namely, if the TTL value of a certain node routing link exceeds the TTL threshold value, if so, the node routing link has node changes, and if the nodes are increased, an alarm is sent out through the alarm system. And can be marked at the same time.
The TTL values of the node routing links are obtained and calculated, for example, the TTL values are obtained by calculating the mean value of TTL values of all nodes in each node routing link, which is not limited in this location, and the user may select the calculation method.
If the alarm system finds that TTL values of some node routing links change, fixed point calculation is further carried out at the moment, and the alarm system monitors the node routing links sending alarms.
As an optional implementation of this application, optionally, in step S300, the fixed-point calculating a change node in the underrlay network topology according to the determination result includes:
s301, acquiring the node routing link sending the alarm;
s302, performing real-time TTL monitoring on each node in the node routing link through the alarm system to obtain a TTL value of each node;
s303, comparing the TTL value of each node with a TTL threshold value configured for each node, calculating and judging whether the TTL value of each node exceeds the TTL threshold value: if the TTL value of one of the nodes exceeds the corresponding TTL threshold value, the topological structure of the Underlay network where the node is located is judged to be changed, the node is marked, and an alarm is sent out through the alarm system.
The principle of the method for monitoring the TTL value of each node and determining whether the TTL value of each node exceeds the TTL threshold value corresponding to each node according to the TTL threshold value configured for each node is the same as the method for determining the node routing link, which is only different from the TTL threshold value in the policy calculation, and is not repeated herein.
As shown in fig. 4, when all nodes find that their TTL to node 9 is less than 1, the location of the newly added node can be quickly ascertained and an alarm triggered. Therefore, the change of the TTL value is monitored in real time through the alarm engine, and the alarm is immediately given once the change occurs and the point where the topology change is possible is calculated.
In this embodiment, when TTL is detected, the quality (delay, packet loss rate) of the network may also be detected, which helps to improve the network quality detection efficiency.
It should be noted that although the node routing links are designed according to several nodes as described above by way of example, those skilled in the art will appreciate that the present disclosure should not be limited thereto. In fact, the user can set the monitoring range completely according to the number of nodes of the topology result, and the like, as long as the technical function of the present application can be realized according to the above technical method.
Example 2
Based on the implementation principle of embodiment 1, in the second aspect of the present application, a device for implementing the method for monitoring a network topology change and triggering an alarm based on TTL is provided, including:
the link setting module is used for setting a node routing link based on the Underlay network topology structure;
a TTL value judging module for monitoring the TTL value of the node routing link in real time and judging whether the TTL value exceeds a preset TTL threshold value;
and the fixed point calculation module is used for calculating the change nodes in the Underlay network topology structure in a fixed point mode according to the judgment result.
As an optional implementation of this application, optionally, the TTL value determining module includes:
the system comprises a configuration module, a data processing module and a data processing module, wherein the configuration module is used for configuring an alarm system and setting the sampling frequency of the alarm system; configuring alarm strategies with different sensitivities and configuring the alarm strategies in the alarm system;
the warning module is used for carrying out real-time TTL monitoring on the node routing link through the warning system and obtaining a routing TTL value of the node routing link; performing real-time TTL monitoring on the plurality of node routing links, and acquiring a TTL value of each node routing link;
a judging module, configured to compare the TTL value of the node routing link with a TTL threshold of the node routing link, and judge whether the TTL value of the node routing link exceeds the TTL threshold; and if the TTL value of the node routing link exceeds the TTL threshold value of the node routing link, judging that the topological structure of the Underlay network where the node routing link is located changes, and sending an alarm through the alarm system.
As an optional implementation of this application, optionally, the fixed point calculating module includes:
the acquisition module is used for acquiring the node routing link which sends out the alarm;
the computing module is used for carrying out real-time TTL monitoring on each node in the node routing link through the alarm system and acquiring a TTL value of each node;
the fixed point warning module is used for comparing the TTL value of each node with the TTL threshold value configured for each node, calculating and judging whether the TTL value of each node exceeds the TTL threshold value: if the TTL value of one of the nodes exceeds the corresponding TTL threshold value, the topological structure of the Underlay network where the node is located is judged to be changed, the node is marked, and an alarm is sent out through the alarm system.
The functions of the modules and the interaction logic between the modules are described in embodiment 1, and are not described herein again. The connection mode between the modules may be wired or wireless, and is not limited herein.
It should be apparent to those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by hardware related to instructions of a computer program, and the program may be stored in a computer readable storage medium, and when executed, may include the processes of the embodiments of the control methods as described above. The modules or steps of the present invention described above can be implemented by a general purpose computing device, they can be centralized in a single computing device or distributed over a network of multiple computing devices, and they can alternatively be implemented by program code executable by a computing device, so that they can be stored in a storage device and executed by a computing device, or they can be separately fabricated into various integrated circuit modules, or multiple modules or steps in them can be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by hardware related to instructions of a computer program, and the program may be stored in a computer readable storage medium, and when executed, may include the processes of the embodiments of the control methods as described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
Example 3
Furthermore, in an aspect of the present application, a TTL monitoring system is provided, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method for monitoring network topology change and triggering alarm based on TTL according to embodiment 1 when the executable instructions are executed.
The TTL monitoring system of the disclosed embodiments includes a processor and a memory for storing processor-executable instructions. When the processor is configured to execute the executable instructions, any one of the above methods for monitoring a network topology change and triggering an alarm based on TTL is implemented, and a method for displaying and controlling a node is implemented based on an IRC protocol control symbol.
Here, it should be noted that the number of processors may be one or more. Meanwhile, the TTL monitoring system according to the embodiments of the present disclosure may further include an input device and an output device. The processor, the memory, the input device, and the output device may be connected through a bus, or may be connected through another manner, which is not specifically limited herein.
The memory, which is a computer-readable storage medium for a method of monitoring network topology changes and triggering alarms based on TTL, may be used to store software programs, computer-executable programs, and various modules, such as: the method for monitoring the network topology change and triggering the alarm based on TTL in the embodiment of the disclosure realizes the program or module corresponding to the method for displaying and controlling the node based on the IRC protocol control symbol. The processor executes various functional applications and data processing of the TTL monitoring system by running software programs or modules stored in the memory.
The input device may be used to receive an input number or signal. Wherein the signal may be a key signal generated in connection with user settings and function control of the device/terminal/server. The output means may comprise a display device such as a display screen.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

1. A method for monitoring network topology change and triggering alarm based on TTL is characterized by comprising the following steps:
s100, setting a node routing link based on an Underlay network topology structure;
s200, monitoring the TTL value of the node routing link in real time, and judging whether the TTL value exceeds a preset TTL threshold value or not;
s300, calculating the change nodes in the Underlay network topology structure in a fixed point manner according to the judgment result.
2. The method for monitoring network topology change and triggering alarm based on TTL of claim 1, wherein in step S100, the setting node routing links based on an underwlay network topology structure includes:
s101, presetting a link setting rule;
s102, selecting a plurality of nodes meeting the link setting rule in the Underalay network topological structure according to the link setting rule;
s103, setting a plurality of end-to-end node routing links based on the selected nodes.
3. The TTL-based method for monitoring network topology change and triggering alarm according to claim 2, wherein in step S100, the node routing links are set based on an underwlay network topology, further comprising:
s110, acquiring the node routing link, and calculating and obtaining the number of nodes in the node routing link;
s120, configuring a plurality of TTL thresholds corresponding to the number of the nodes according to the number of the nodes and a preset configuration rule;
s130, configuring the TTL threshold value on each node in the node routing link according to the configuration rule.
4. The TTL-based network topology change monitoring and alarm triggering method of claim 1, wherein the monitoring the TTL values of the node routing links in real time and determining whether the TTL values exceed a preset TTL threshold at S200 comprises:
s201, configuring an alarm system and setting the sampling frequency of the alarm system;
s202, configuring alarm strategies with different sensitivities, and configuring the alarm strategies in the alarm system;
s203, carrying out real-time TTL monitoring on the node routing link through the alarm system, and obtaining the routing TTL value of the node routing link.
5. The TTL-based network topology change monitoring and alarm triggering method of claim 4, wherein in step S200, the TTL value of the node routing link is monitored in real time, and it is determined whether the TTL value exceeds a preset TTL threshold, further comprising:
s210, performing real-time TTL monitoring on a plurality of node routing links through the alarm system, and acquiring a TTL value of each node routing link;
s220, comparing the TTL value of the node routing link with the TTL threshold value of the node routing link, and judging whether the TTL value of the node routing link exceeds the TTL threshold value;
and S230, if the TTL value of the node routing link exceeds the TTL threshold value of the node routing link, judging that the topological structure of the Underalay network where the node routing link is located changes, and sending an alarm through the alarm system.
6. The TTL-based method for monitoring network topology change and triggering alarm according to claim 5, wherein in step S300, the fixed-point calculation of the changed node in the underrlay network topology according to the determination result includes:
s301, acquiring the node routing link sending the alarm;
s302, performing real-time TTL monitoring on each node in the node routing link through the alarm system to obtain a TTL value of each node;
s303, comparing the TTL value of each node with a TTL threshold value configured for each node, calculating and judging whether the TTL value of each node exceeds the TTL threshold value: if the TTL value of one of the nodes exceeds the corresponding TTL threshold value, the topological structure of the Underlay network where the node is located is judged to be changed, the node is marked, and an alarm is sent out through the alarm system.
7. An apparatus for implementing the TTL-based method for monitoring network topology changes and triggering alarms as recited in any one of claims 1-6, wherein the apparatus comprises:
the link setting module is used for setting a node routing link based on an Underalay network topological structure;
a TTL value judging module for monitoring the TTL value of the node routing link in real time and judging whether the TTL value exceeds a preset TTL threshold value;
and the fixed point calculation module is used for calculating the change nodes in the Underalay network topology structure in a fixed point manner according to the judgment result.
8. The apparatus of claim 7, wherein the TTL value determining module comprises:
the system comprises a configuration module, a data processing module and a data processing module, wherein the configuration module is used for configuring an alarm system and setting the sampling frequency of the alarm system; configuring alarm strategies with different sensitivities and configuring the alarm strategies in the alarm system;
the warning module is used for carrying out real-time TTL monitoring on the node routing link through the warning system and obtaining a routing TTL value of the node routing link; carrying out real-time TTL monitoring on the node routing links, and acquiring a TTL value of each node routing link;
a judging module, configured to compare the TTL value of the node routing link with a TTL threshold of the node routing link, and judge whether the TTL value of the node routing link exceeds the TTL threshold; and if the TTL value of the node routing link exceeds the TTL threshold value of the node routing link, judging that the topological structure of the Underlay network where the node routing link is located is changed, and sending an alarm through the alarm system.
9. The apparatus of claim 8, wherein the fixed point computation module comprises:
the acquisition module is used for acquiring the node routing link which sends out the alarm;
the computing module is used for carrying out real-time TTL monitoring on each node in the node routing link through the alarm system and acquiring a TTL value of each node;
the fixed point alarm module is used for comparing the TTL value of each node with the TTL threshold value configured for each node, calculating and judging whether the TTL value of each node exceeds the TTL threshold value: if the TTL value of one node exceeds the corresponding TTL threshold value, the topological structure of the Underalay network where the node is located is judged to be changed, the node is marked, and an alarm is sent out through the alarm system.
10. A TTL monitoring system, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to execute the executable instructions to implement the method for monitoring network topology change and triggering alarm based on TTL according to any claim 1 to 6.
CN202210717407.0A 2022-06-23 2022-06-23 Method for monitoring network topology change and triggering alarm based on TTL Active CN115361329B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210717407.0A CN115361329B (en) 2022-06-23 2022-06-23 Method for monitoring network topology change and triggering alarm based on TTL

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210717407.0A CN115361329B (en) 2022-06-23 2022-06-23 Method for monitoring network topology change and triggering alarm based on TTL

Publications (2)

Publication Number Publication Date
CN115361329A true CN115361329A (en) 2022-11-18
CN115361329B CN115361329B (en) 2023-08-08

Family

ID=84029963

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210717407.0A Active CN115361329B (en) 2022-06-23 2022-06-23 Method for monitoring network topology change and triggering alarm based on TTL

Country Status (1)

Country Link
CN (1) CN115361329B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040213274A1 (en) * 2000-03-03 2004-10-28 Fan Jason C. Routing switch detecting change in session identifier before reconfiguring routing table
WO2011091977A1 (en) * 2010-01-26 2011-08-04 Astrium Sas Service admisson path control (sapc)
CN104767688A (en) * 2015-04-15 2015-07-08 杭州华三通信技术有限公司 General time-to-live safety mechanism inspection method and device
CN105141434A (en) * 2014-05-26 2015-12-09 华为技术有限公司 Fault detection method and device of service chain
CN106470083A (en) * 2015-08-19 2017-03-01 中国移动通信集团公司 A kind of synchronizing network detection method and device
CN107171883A (en) * 2016-03-08 2017-09-15 华为技术有限公司 Detect method, device and the equipment of forward table
CN110392408A (en) * 2019-07-04 2019-10-29 东南大学 Time-varying network topology control method and system based on node role and Parameter adjustable
US20220070085A1 (en) * 2020-08-31 2022-03-03 Ciena Corporation Hop Limit/TTL propagation mode aware relayed MPLS/SRv6 traceroute

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040213274A1 (en) * 2000-03-03 2004-10-28 Fan Jason C. Routing switch detecting change in session identifier before reconfiguring routing table
WO2011091977A1 (en) * 2010-01-26 2011-08-04 Astrium Sas Service admisson path control (sapc)
CN105141434A (en) * 2014-05-26 2015-12-09 华为技术有限公司 Fault detection method and device of service chain
CN104767688A (en) * 2015-04-15 2015-07-08 杭州华三通信技术有限公司 General time-to-live safety mechanism inspection method and device
CN106470083A (en) * 2015-08-19 2017-03-01 中国移动通信集团公司 A kind of synchronizing network detection method and device
CN107171883A (en) * 2016-03-08 2017-09-15 华为技术有限公司 Detect method, device and the equipment of forward table
CN110392408A (en) * 2019-07-04 2019-10-29 东南大学 Time-varying network topology control method and system based on node role and Parameter adjustable
US20220070085A1 (en) * 2020-08-31 2022-03-03 Ciena Corporation Hop Limit/TTL propagation mode aware relayed MPLS/SRv6 traceroute

Also Published As

Publication number Publication date
CN115361329B (en) 2023-08-08

Similar Documents

Publication Publication Date Title
CN109495322B (en) Network fault positioning method, related equipment and computer storage medium
EP2408154B1 (en) Optimal route selection apparatus, optimal route selection method, and program
US20190327130A1 (en) Methods, control node, network element and system for handling network events in a telecomunications network
CN108833271B (en) Power grid wide area control service communication path selection method and server
US20170207993A1 (en) Bidirectional constrained path search
EP3474493A1 (en) Network performance measurement method and detection device
CN113489711A (en) DDoS attack detection method, system, electronic device and storage medium
CN115038088A (en) Intelligent network security detection early warning system and method
CN112437037A (en) Sketch-based DDoS flooding attack detection method and device
CN114051001A (en) Flow data processing method and device, storage medium and electronic equipment
CN112702221B (en) BGP abnormal route monitoring method and device
CN110995606B (en) Congestion analysis method and device
CN115361329A (en) Method for monitoring network topology change and triggering alarm based on TTL
CN112532467B (en) Method, device and system for realizing fault detection
CN109361658B (en) Industrial control industry-based abnormal flow information storage method and device and electronic equipment
CN108512698B (en) Network disaster tolerance method and device and electronic equipment
CN108141406B (en) Method, device and equipment for processing service fault
KR20080040257A (en) Method and apparatus for early detecting unknown worm and virus in network level
CN111200520A (en) Network monitoring method, server and computer readable storage medium
JP7468658B2 (en) SECURITY SETTING SUPPORT DEVICE, SECURITY SETTING SUPPORT METHOD, AND PROGRAM
CN117176839B (en) Remote measurement message transmission method, device, communication equipment and storage medium
CN110932878A (en) Management method, equipment and system of distributed network
CN112825504B (en) Data monitoring method, device, equipment and storage medium
CN117938714A (en) Network link fault detection method, device, equipment and readable storage medium
KR102371060B1 (en) Design of network topology discovery system based on traffic in-out count analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100083 room B1001, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing

Applicant after: China Broadband Communications Co.,Ltd.

Address before: 100083 room B1001, building 8, yard 1, Zhongguancun East Road, Haidian District, Beijing

Applicant before: Beijing Tianwei Communication Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant