Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
TRANSPARENT MESSAGE MODIFICATION FOR DIAGNOSTICS OR TESTING
Document Type and Number:
WIPO Patent Application WO/2014/137866
Kind Code:
A1
Abstract:
The modification of a network message so that a supplemental action is performed in transit at a designated intermediary node. The modification is performed in a manner that is transparent to the source computing entity that caused the network message to be generated. Upon acquiring the network message, a message modification component modifies the network message so that the network message is routed through an intermediary node, and further so that the intermediary node performs supplemental action(s). For instance, the modification might cause routing components to route the network message to the intermediary node, and the modification might also include instructions that the intermediary node interprets as being an instruction to perform the supplemental action.

Inventors:
CHEN HONGWEI (US)
LU PEI (US)
Application Number:
PCT/US2014/019798
Publication Date:
September 12, 2014
Filing Date:
March 03, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
MICROSOFT CORP (US)
International Classes:
H04L12/26; H04L29/06
Foreign References:
EP1401147A12004-03-24
US20050091024A12005-04-28
Other References:
None
Attorney, Agent or Firm:
NYDEGGER, Rick D. (Microsoft CorporationLCA - International Patents, Redmond Washington, US)
Download PDF:
Claims:
CLAIMS

1. A method for a message modification component facilitating supplemental action being taken on a network message in a manner that is transparent to a source computing entity that caused the network message to be generated, the method comprising: an act of the message modification component acquiring a network message from a source that includes a source computing entity, wherein the network message is transparent to a source computing entity that caused the network message to be generated; and

an act of the message modification component modifying the network message so that the network message is routed through an intermediary node, and such that the intermediary node performs a supplemental action on the network message that is beyond what a routing node would have performed on the network message without the modification.

2. The method in accordance with Claim 1, wherein the message modification component comprises a firewall component.

3. The method in accordance with Claim 1, wherein the network message is an Internet Protocol packet.

4. The method in accordance with Claim 3, wherein the act of modifying the message comprises an act of inserting an IP options portion of an IP header.

5. The method in accordance with Claim 1, wherein the supplemental action comprises a diagnostics action that cause the intermediary node to using the network message to at least facilitate diagnostics of the source computing entity.

6. The method in accordance with Claim 1, wherein the supplemental action comprises a testing action that causes the intermediary node to at least facilitate testing of the source computing entity.

7. The method in accordance with Claim 6, wherein the testing action comprises an act of dropping the network message, delaying the network message, or returning an error message to the source.

8. The method in accordance with Claim 1 , wherein the network message is at least part of a request in a request/reply message sequence.

9. The method in accordance with Claim 1 , wherein the network message is at least part of a reply in a request/reply message sequence.

10. A computer program product comprising one or more computer-readable storage media having thereon computer-executable instructions that are structured such that, when executed by one or more processors of an intermediary computing system, cause the intermediary computing system to perform a method of intermediating a network message received from a source and targeted for a destination, the method comprising:

an act of receiving a network message in transit from a source to a target, the network message including an instruction to route the network message through the intermediary computing system, and also an instruction for the intermediary computing system to perform a supplemental action;

in response to the instruction for the intermediary computing system to perform the supplemental action, and act of performing the supplemental action; and

an act of modifying the network message to remove the instruction to perform the supplemental action on the network message, and to remove the instruction to route the network message through the intermediary computing system.

Description:
TRANSPARENT MESSAGE MODIFICATION FOR DIAGNOSTICS OR

TESTING

BACKGROUND

[0001] Many software applications rely on cooperative interaction with other computing systems over a network. The Internet Protocol (IP) is a protocol that provides for a mechanism to address different nodes in a network, and also provides a mechanism to fragment larger messages into smaller pieces that can be handled by the various intermediating networks between two communicating network nodes. Network messages that conform to an Internet Protocol are often referred to as "IP packets", which are processed using logic at the IP layer in the protocol stack.

[0002] As an IP packet is in transit from the source application to the target application, the IP packet will often transit through various routers, each having their own routing logic at the IP layer in the protocol stack, that allows the router to make decisions about how to best route the IP packet to the intended destination.

[0003] The IP protocol also provides for a portion of the packet header to include a selection of a larger number of optional processing to apply to the IP packet. One of these options is a source route option, which allows the source to specify part or all of the route to take.

SUMMARY

[0004] In accordance with at least one embodiment described herein, the modification of a network message so that a supplemental action is performed in transit at a designated intermediary node is described. The modification is performed in a manner that is transparent to the source computing entity (such as an application, process, port, address) that caused the network message to be generated. For instance, although the source computing entity issued the instruction that caused the network message to be generated further down the network stack, the source computing entity does not have a view on that lower portion of the stack.

[0005] Upon acquiring the network message, a message modification component modifies the network message so that the network message is routed through an intermediary node, and further so that the intermediary node performs a supplemental action. For instance, the modification might cause routing components to route the network message to the intermediary node, and the modification might also include instructions that the intermediary node interprets as being an instruction to perform the supplemental action. Examples of supplemental action including actions that at least facilitate diagnostics of the source computing entity. Further examples include testing actions such as dropping or delaying the network message, or returning an error message related to the network message.

[0006] The intermediary node may thus respond to the network message by performing the supplemental action. Furthermore, the intermediary node may modify the network message so as to return the network message to its unmodified state prior to routing the network message further along towards the target. Thus, from the viewpoint of the source computing entity and the target computing system, the fact that there was ever an instruction to perform the supplemental action is abstracted from view.

[0007] This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.

BRIEF DESCRIPTION OF THE DRAWINGS

[0008] In order to describe the manner in which the above-recited and other advantages and features can be obtained, a more particular description of various embodiments will be rendered by reference to the appended drawings. Understanding that these drawings depict only sample embodiments and are not therefore to be considered to be limiting of the scope of the invention, the embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:

[0009] Figure 1 abstractly illustrates a computing system in which some embodiments described herein may be employed;

[0010] Figure 2 illustrates a network environment that includes a source computing system includes a source computing entity that causes a network message to be generated for communication to a target computing system;

[0011] Figure 3 illustrates a flowchart of a method for a message modification component facilitating supplemental action being taken on a network message in a manner that is transparent to a source computing entity that caused the network message to be generated;

[0012] Figure 4 illustrates a flowchart of a method for an intermediary node intermediating a network message received from a source to a target; and

[0013] Figure 5 illustrates a more specific embodiment in which the principles described with respect to Figures 2 through 4 are applied in both the request path and the reply path. DETAILED DESCRIPTION

[0014] In accordance with embodiments described herein, the modification of a network message is described. The modification causes the network message to be routed to an intermediary node, and is interpreted by the intermediary node as an instruction to perform a supplemental action. The modification is performed in a manner that is transparent to the source computing entity that caused the network message to be generated. Some introductory discussion of a computing system will be described with respect to Figure 1. Then, the principles of the message modification will be described with respect to Figures 2 through 5.

[0015] Computing systems are now increasingly taking a wide variety of forms. Computing systems may, for example, be handheld devices, appliances, laptop computers, desktop computers, mainframes, distributed computing systems, or even devices that have not conventionally been considered a computing system. In this description and in the claims, the term "computing system" is defined broadly as including any device or system (or combination thereof) that includes at least one physical and tangible processor, and a physical and tangible memory capable of having thereon computer-executable instructions that may be executed by the processor. The memory may take any form and may depend on the nature and form of the computing system. A computing system may be distributed over a network environment and may include multiple constituent computing systems.

[0016] As illustrated in Figure 1 , in its most basic configuration, a computing system 100 includes at least one processing unit 102 and computer-readable media 104. The computer- readable media 104 may conceptually be thought of as including physical system memory, which may be volatile, non- volatile, or some combination of the two. The computer- readable media 104 also conceptually includes non- volatile mass storage. If the computing system is distributed, the processing, memory and/or storage capability may be distributed as well.

[0017] As used herein, the term "executable module" or "executable component" can refer to software objects, routings, or methods that may be executed on the computing system. The different components, modules, engines, and services described herein may be implemented as objects or processes that execute on the computing system (e.g., as separate threads). Such executable modules may be managed code in the case of being executed in a managed environment in which type safety is enforced, and in which processes are allocated their own distinct memory objects. Such executable modules may also be unmanaged code in the case of executable modules being authored in native code such as C or C++. [0018] In the description that follows, embodiments are described with reference to acts that are performed by one or more computing systems. If such acts are implemented in software, one or more processors of the associated computing system that performs the act direct the operation of the computing system in response to having executed computer- executable instructions. For example, such computer-executable instructions may be embodied on one or more computer-readable media that form a computer program product. An example of such an operation involves the manipulation of data. The computer- executable instructions (and the manipulated data) may be stored in the memory 104 of the computing system 100. Computing system 100 may also contain communication channels 108 that allow the computing system 100 to communicate with other processors over, for example, network 110.

[0019] Embodiments described herein may comprise or utilize a special purpose or general-purpose computer including computer hardware, such as, for example, one or more processors and system memory, as discussed in greater detail below. Embodiments described herein also include physical and other computer-readable media for carrying or storing computer-executable instructions and/or data structures. Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer system. Computer-readable media that store computer-executable instructions are physical storage media. Computer-readable media that carry computer- executable instructions are transmission media. Thus, by way of example, and not limitation, embodiments of the invention can comprise at least two distinctly different kinds of computer-readable media: computer storage media and transmission media.

[0020] Computer storage media includes RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other tangible storage medium which can be used to store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.

[0021] A "network" is defined as one or more data links that enable the transport of electronic data between computer systems and/or modules and/or other electronic devices. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer, the computer properly views the connection as a transmission medium. Transmissions media can include a network and/or data links which can be used to carry desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer. Combinations of the above should also be included within the scope of computer-readable media.

[0022] Further, upon reaching various computer system components, program code means in the form of computer-executable instructions or data structures can be transferred automatically from transmission media to computer storage media (or vice versa). For example, computer-executable instructions or data structures received over a network or data link can be buffered in RAM within a network interface controller (e.g., a "NIC"), and then eventually transferred to computer system RAM and/or to less volatile computer storage media at a computer system. Thus, it should be understood that computer storage media can be included in computer system components that also (or even primarily) utilize transmission media.

[0023] Computer-executable instructions comprise, for example, instructions and data which, when executed at a processor, cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, or even source code. Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the described features or acts described above. Rather, the described features and acts are disclosed as example forms of implementing the claims.

[0024] Those skilled in the art will appreciate that the invention may be practiced in network computing environments with many types of computer system configurations, including, personal computers, desktop computers, laptop computers, message processors, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, pagers, routers, switches, and the like. The invention may also be practiced in distributed system environments where local and remote computer systems, which are linked (either by hardwired data links, wireless data links, or by a combination of hardwired and wireless data links) through a network, both perform tasks. In a distributed system environment, program modules may be located in both local and remote memory storage devices.

[0025] Figure 2 illustrates a network environment 200 that includes a source computing system 201 that includes a source computing entity 211 that causes a network message 220 to be generated for communication to a target computing system 202. In a manner that is transparent to the source computing entity 201, the network message 220 is modified 220' so as to be routed through an intermediary node 203. The source computing system 201, the target computing system 202 and the intermediary node 203 each represent examples of a computing system that is described above with respect to Figure 1. Methods described as being performed by these computing systems may be performed by, for example, one or more processors (such as processor(s) 102) of the computing system (e.g., computing system 100) executing computer-executable instructions that are embodied on a computing- readable media (such as a computing-readable storage media) that may form part or all of a computing program product.

[0026] The source computing entity 211 causes the network message 220 to be generated by, for example, issuing a request 221 that is interpretable by components 212 to cause such components 212 to generate the network message 220. As an example, the source computing entity 211 might be an application, a process, a port, an address, or any other computing entity.

[0027] Although the source computing entity 211 causes the network message 220 to be generated via request 221, the actual generation of the network message 220 is performed by logic that is abstracted away from the view of the source computing entity 211. Such abstraction is symbolized by the dashed line 215. While the network message may be any kind of network message, in one embodiment, the network message 220 is an Internet Protocol (IP) packet.

[0028] The network message 220 is provided to a message modification component 213 as represented by arrow 222. The message modification component 213 performs modifications to the network message 220. For instance, the modifications that are to be performed may be a function of the identity of the source computing entity 211. For instance, the message modification component 213 may have a register entry in which there are one or more modifications associated with the source computing entity 211.

[0029] Figure 3 illustrates a flowchart of a method 300 for a modification component facilitating supplemental action being taken on a network message in a manner that is transparent to a source computing entity that caused the network message to be generated. The method 300 is initiated upon acquiring a network message that was caused to be generated by a source computing entity (initiating event 301). As the method 300 may be performed by the message modification component 213 of Figure 2, the method 300 of Figure 3 will now be described with frequent reference to Figure 2. [0030] The message modification component detects that the network message was caused to be generated by a particular computing identity (act 302), and then identifies one or more supplemental actions that are to be performed on network messages coming from that particular computing entity (act 303). The message modification component may be, for example, a firewall that has access to network messages, and is capable of modifying the network messages in a manner that is transparent to the source computing entity.

[0031] The message modification component then modifies the network message (act 304) so that the network message is routed through an intermediary node, and such that the intermediary node performs a supplemental action on the network message. For instance, the message modification component might modify the network message to include an instruction to route the network message via the intermediary node (act 311). For instance, in Figure 2, the modified message 220' includes instruction 231 that cause the network message 220' to be routed to the intermediary node 203 as represented by the arrow 223. The message modification component may also modify the message to include an instruction that is interpretable by the intermediary node as an instruction for the intermediary node to perform the supplemental action (act 312). This instruction is represented in Figure 2, by the instruction 232 being added to the network message 220 to form the modified message 220'.

[0032] If the message modification component 213 were a firewall component, the firewall may perform other firewall functions on the modified network message 220' prior to dispatching the modified network message to the intermediary node (act 305). For instance, referring to Figure 2, the message modification component 213 uses dispatching component 214 to dispatch the network message to the intermediary node 203.

[0033] The supplemental action to be performed by the intermediary is beyond what a routing node would have performed in response to receiving the network message 220 in unmodified form without the instruction to perform the supplemental action. Several examples of such supplemental actions will now be described along with a description of how an IP packet could be modified so as to include an instruction to route via the intermediary node (instruction 231) and an instruction to perform the supplemental action (instruction 232). In each example, the modification of the IP packet might occur by adding an IP options portion of the header portion. In accordance with the IP protocol, this would also include modifying the length field of the IP header portion to account for the additional header length caused by the insertion of the IP options portion. [0034] In one embodiment, the supplemental action might be a diagnostics action that causes the intermediary node to use the network message to at least facilitate diagnostics of the source application. For instance, the intermediary node might gather statistics regarding the network message, and perhaps also inspect content of the network message. The thereby gathered information (perhaps in combination with other information gathered from other network messages from the source computing entity) might be used to ascertain performance of the source computing entity, or otherwise diagnose a current or emerging problem within the source computing entity. The intermediary node 203 may itself perform this diagnostics, or the intermediary node 203 might report the gathered information to another computing system for performing diagnostics based on the information gathered at the intermediary node 203.

[0035] The instruction to route through the intermediary node and to perform the diagnostics action might be performed by specifying the loose source route option in an IP option field added to the IP packet. For instance, the first octet of the options field would include the following: a "1" in the first bit (i.e., the copy bit) indicating that the option is to apply to all related packets corresponding to a single message; followed by the class bits (2 bits) being a 0, and then followed by the 5 value bits specifying a 3, which identifies the loose source route option. Following this first octet would be a length octet specifying a length of the IP option fields consistent with the IP protocol, a pointer octet specifying a pointer which initially points to the following set of 4 octets which would specify the IP address of the intermediary node. Additional data could be added, which could be interpreted by the intermediary node as an instruction to perform the diagnostic action.

[0036] The supplemental action might also be to perform a testing action that causes the intermediary node to at least facilitate testing of the source computing entity 211. For instance, suppose that the source computing entity 211 were actually a system under test, and that the target computing system 220 was an external dependency that the source computing entity 211 is anticipated to rely upon after the source computing entity 211 is actually deployed. The testing action might allow for actually real world scenarios to be encountered to determine how the source computing entity 211 responds to such real world scenarios. For instance, the testing action might include dropping the network message, delaying the network message, or returning an error message, which would be an Internet Control Message Protocol (ICMP) in the case of the network message being an IP packet. Such would simulate actual possible conditions that might be encountered by the source computing entity 211. [0037] In the case of an IP packet, this might again be performed by adding an IP options portion to the header of the IP packet. The first octet includes a first bit that specifies a "1" for the copy bit, meaning that the IP options portion is included in all packets that are fragments of the same message. The next two bits represents the class, and could be a previously unused class (such as 3), which is reserved for future use in the original IP protocol. The intermediary node could be programmed to recognize a class of 3 to mean that a testing action of some type is to be performed. For instance, the final five bits of the first octet in the IP options portion might specify a value corresponding to a particular testing action to be performed. For instance, a 1 might be for a delay to be added into the message delivery. A 2 in these 5 bits might specify that an error message is to be returned. A 3 in these 5 bits might specify that the IP packet is to be dropped.

[0038] Following a particular schema, the exact structure of which is not important to the broader principles described herein, supplemental data regarding the selected testing action may also be provided. For instance, in the case of a delay action, the amount of latency might be specified or might be derived from transmission speed. In the case of an error message being returned, a type of error message may be specified. Furthermore, the schema of the remainder of the IP options could be structured to allow for additional testing actions to be specified. For instance, the IP packet could be both delayed a certain amount, and an error message is returned. The schema might also allow for more complex testing workflows such as conditionally performing a testing action.

[0039] Returning to Figure 2, once the intermediary node 203 receives the modified network message 220', the intermediary node 203 takes action by performing the supplemental action(s) to thereby facilitate diagnostics and/or testing of the source computing entity 210 in an actual environment in which there is an external dependency in the form of target computing system 220. Figure 4 illustrates a flowchart of a method 400 for an intermediary node (such as intermediary node 203) intermediating a network message received from a source (such as source 201) to a target (such as target 202).

[0040] The method 400 is initiated upon receiving the modified network message in transit from a source to a target (initiating act 401). For instance, in Figure 2, the intermediary node 202 receives the modified network message 220 ' that includes the routing instruction 231 as well as the supplemental action instruction 232. In response to the supplemental action instruction 232, the intermediary code 202 performs the instructed supplemental action (act 402), such as the described diagnostic action and/or the described testing action. [0041] In addition, the intermediary node 202 modifies the network message to remove the instruction to perform the supplemental action on the network message (act 403), and removes the instruction to route the network message through the intermediary computing system (act 404). For instance, the intermediary node 203 might return the network message to its original form 220 as it existed prior to being modified to include the instructions 231 and 232. For instance in the case of the IP packet, the IP options portion may be removed, with the length field of the IP header portion being reverted to its original value, reflecting the absence of the IP options portion. The network message 220 is then dispatched to the target computing system 202 (act 405) as represented by the arrow 224 in Figure 2. Thus, the network message 220 dispatched by the intermediary node 203 may appear identical to the network message 220 as generated by the components 212. Thus, neither the source computing entity 211 nor the target computing system 202 can be aware that the network message was routed through the intermediary node 203, or that the supplemental action(s) were taken.

[0042] Note that the principles described herein can be applied when in a request/response paradigm. For instance, in Figure 2, the source computing system 201 might transmit a request to the target computing system 202, in which case, the network message is a request or a fragment thereof. Thus, the network message 220 could be at least part of a request in a request/reply message sequence. However, the same principles can apply to the reverse path as well. In that case, the network message 220 would be at least part of a reply in a request/reply message sequence.

[0043] Figure 5 illustrates a more specific embodiment in which the principles described with respect to Figures 2 through 4 are applied in both the request path and the reply path. In the request direction, the system under test 501 (or the system to which diagnostics is being applied) represents an example of the source computing system 201 of Figure 2, and the external dependency computing system 502 represents an example of the target computing system 202 of Figure 2. In this request direction, the firewall 511 represented an example of the message modification component 213 of Figure 2. Furthermore, request 521 and modified request 521 ' represent examples of the message 220 and the modified message 220' of Figure 2. The intermediary node 503 represents an example of the intermediary node 203 of Figure 2.

[0044] In the response direction, the external dependency computing system 502 represents an example of the source computing system 201 of Figure 2, and the system under test 501 (or the system to which diagnostics is being applied) represents an example of the target computing system 202 of Figure 2. In this response direction, the firewall 512 represented an example of the message modification component 213 of Figure 2. Furthermore, reply 522 and modified reply 522' represent examples of the message 220 and the modified message 220' of Figure 2. The intermediary node 504 represents an example of the intermediary node 203 of Figure 2.

[0045] Accordingly, the principles described herein provide for a mechanism to transparently perform supplemental actions on a network message without the source computing entity that caused the network message or the target computing system being aware that the supplemental action was performed. Such can be especially useful in a diagnostics environment after the source computing entity has been deployed, or in a testing environment in which the source computing entity is under development and has an external dependency.

[0046] The principles described herein may be deployed in a cloud computing environment. For instance, referring to Figure 2, each of the source computing system 201 and the target computing system 202 may itself be a cloud computing environment, or perhaps the entire environment 200 might be a cloud computing environment.

[0047] In this description and the following claims, "cloud computing" is defined as a model for enabling on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services). The definition of "cloud computing" is not limited to any of the other numerous advantages that can be obtained from such a model when properly deployed.

[0048] For instance, cloud computing is currently employed in the marketplace so as to offer ubiquitous and convenient on-demand access to the shared pool of configurable computing resources. Furthermore, the shared pool of configurable computing resources can be rapidly provisioned via virtualization and released with low management effort or service provider interaction, and then scaled accordingly.

[0049] A cloud computing model can be composed of various characteristics such as on- demand self-service, broad network access, resource pooling, rapid elasticity, measured service, and so forth. A cloud computing model may also come in the form of various service models such as, for example, Software as a Service ("SaaS"), Platform as a Service ("PaaS"), and Infrastructure as a Service ("IaaS"). The cloud computing model may also be deployed using different deployment models such as private cloud, community cloud, public cloud, hybrid cloud, and so forth. In this description and in the claims, a "cloud computing environment" is an environment in which cloud computing is employed. [0050] The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.