Document revision date: 30 March 2001 | |
Previous | Contents | Index |
The transport (TR) header is used to pass SCS datagrams and sequenced messages between cluster nodes. The important fields for network troubleshooting are the TR datagram flags, message acknowledgment, and sequence numbers. Note that because the CC and TR headers occupy the same space, a TR/CC flag identifies the type of message being transmitted over the channel.
Figure F-10 shows the portions of the TR header that are needed for network troubleshooting, and Table F-11 describes these fields.
Figure F-10 TR Header
Note: The TR header shown in Figure F-10 is used when both nodes are running Version 1.4 or later of the NISCA protocol. If one or both nodes are running Version 1.3 or an earlier version of the protocol, then both nodes will use the message acknowledgment and sequence number fields in place of the extended message acknowledgment and extended sequence number fields, respectively.
Field | Description |
---|---|
Datagram flags (bits <7:0>) | Provide additional information about the transport datagram. |
Message acknowledgment | An increasing value that specifies the last sequenced message segment received by the local node. All messages prior to this value are also acknowledged. This field is used when one or both nodes are running Version 1.3 or earlier of the NISCA protocol. |
Extended message acknowledgment | An increasing value that specifies the last sequenced message segment received by the local node. All messages prior to this value are also acknowledged. This field is used when both nodes are running Version 1.4 or later of the NISCA protocol. |
Sequence number | An increasing value that specifies the order of datagram transmission from the local node. This number is used to provide guaranteed delivery of this sequenced message segment to the remote node. This field is used when one or both nodes are running Version 1.3 or earlier of the NISCA protocol. |
Extended sequence number | An increasing value that specifies the order of datagram transmission from the local node. This number is used to provide guaranteed delivery of this sequenced message segment to the remote node. This field is used when both nodes are running Version 1.4 or later of the NISCA protocol. |
Some failures, such as packet loss resulting from congestion, intermittent network interruptions of less than 20 seconds, problems with backup bridges, and intermittent performance problems, can be difficult to diagnose. Intermittent failures may require the use of a LAN analysis tool to isolate and troubleshoot the NISCA protocol levels described in Section F.1.
As you evaluate the various network analysis tools currently available,
you should look for certain capabilities when comparing LAN analyzers.
The following sections describe the required capabilities.
F.8.1 Single or Multiple LAN Segments
Whether you need to troubleshoot problems on a single LAN segment or on multiple LAN segments, a LAN analyzer should help you isolate specific patterns of data. Choose a LAN analyzer that can isolate data matching unique patterns that you define. You should be able to define data patterns located in the data regions following the LAN header (described in Section F.7.2). In order to troubleshoot the NISCA protocol properly, a LAN analyzer should be able to match multiple data patterns simultaneously.
To troubleshoot single or multiple LAN segments, you must minimally define and isolate transmitted and retransmitted data in the TR header (see Section F.7.7). Additionally, for effective network troubleshooting across multiple LAN segments, a LAN analysis tool should include the following functions:
The purpose of distributed enable and distributed combination trigger
functions is to capture packets as they travel across multiple LAN
segments. The implementation of these functions discussed in the
following sections use multicast messages to reach all LAN segments of
the extended LAN in the system configuration. By providing the ability
to synchronize several LAN analyzers at different locations across
multiple LAN segments, the distributed enable and combination trigger
functions allow you to troubleshoot LAN configurations that span
multiple sites over several miles.
F.8.2 Multiple LAN Segments
To troubleshoot multiple LAN segments, LAN analyzers must be able to capture the multicast packets and dynamically enable the trigger function of the LAN analyzer, as follows:
Step | Action |
---|---|
1 | Start capturing the data according to the rules specific to your LAN analyzer. Compaq recommends that only one LAN analyzer transmit a distributed enable multicast packet on the LAN. The packet must be transmitted according to the media access-control rules. |
2 | Wait for the distributed enable multicast packet. When the packet is received, enable the distributed combination trigger function. Prior to receiving the distributed enable packet, all LAN analyzers must be able to ignore the trigger condition. This feature is required in order to set up multiple LAN analyzers capable of capturing the same event. Note that the LAN analyzer transmitting the distributed enable should not wait to receive it. |
3 |
Wait for an explicit (user-defined) trigger event or a distributed
trigger packet. When the LAN analyzer receives either of these
triggers, the LAN analyzer should stop the data capture.
Prior to receiving either trigger, the LAN analyzer should continue to capture the requested data. This feature is required in order to allow multiple LAN analyzers to capture the same event. |
4 | Once triggered, the LAN analyzer completes the distributed trigger function to stop the other LAN analyzers from capturing data related to the event that has already occurred. |
The HP 4972A LAN Protocol Analyzer, available from the Hewlett-Packard Company, is one example of a network failure analysis tool that provides the required functions described in this section.
Reference: Section F.10 provides examples that use
the HP 4972A LAN Protocol Analyzer.
F.9 Data Isolation Techniques
The following sections describe the types of data you should isolate
when you use a LAN analysis tool to capture OpenVMS Cluster data
between nodes and LAN adapters.
F.9.1 All OpenVMS Cluster Traffic
To isolate all OpenVMS Cluster traffic on a specific LAN segment, capture all the packets whose LAN header contains the protocol type 60--07.
Reference: See also Section F.7.2 for a description of
the LAN headers.
F.9.2 Specific OpenVMS Cluster Traffic
To isolate OpenVMS Cluster traffic for a specific cluster on a specific LAN segment, capture packets in which:
Reference: See Sections F.7.2 and
F.7.5 for descriptions of the LAN and DX headers.
F.9.3 Virtual Circuit (Node-to-Node) Traffic
To isolate virtual circuit traffic between a specific pair of nodes, capture packets in which the LAN header contains:
You can further isolate virtual circuit traffic between a specific pair of nodes to a specific LAN segment by capturing the following additional information from the DX header:
Reference: See Sections F.7.2 and
F.7.5 for LAN and DX header information.
F.9.4 Channel (LAN Adapter--to--LAN Adapter) Traffic
To isolate channel information, capture all packet information on every channel between LAN adapters. The DX header contains information useful for diagnosing heavy communication traffic between a pair of LAN adapters. Capture packets in which the LAN header contains:
Because nodes can use multiple LAN adapters, specifying the source and destination LAN addresses may not capture all of the traffic for the node. Therefore, you must specify a channel as the source LAN address and the destination LAN address in order to isolate traffic on a specific channel.
Reference: See Section F.7.2 for information about the
LAN header.
F.9.5 Channel Control Traffic
To isolate channel control traffic, capture packets in which:
Reference: See Sections F.7.2 and
F.7.6 for a description of the LAN and CC headers.
F.9.6 Transport Data
To isolate transport data, capture packets in which:
Reference: See Sections F.7.2 and
F.7.7 for a description of the LAN and TR headers.
F.10 Setting Up an HP 4972A LAN Protocol Analyzer
The HP 4972A LAN Protocol Analyzer, available from the Hewlett-Packard Company, is highlighted here because it meets all of the requirements listed in Section F.8. However, the HP 4972A LAN Protocol Analyzer is merely representative of the type of product useful for LAN network troubleshooting.
Note: Use of this particular product as an example here should not be construed as a specific purchase requirement or endorsement.
This section provides some examples of how to set up the HP 4972A LAN
Protocol Analyzer to troubleshoot the local area OpenVMS Cluster system
protocol for channel formation and retransmission problems.
F.10.1 Analyzing Channel Formation Problems
If you have a LAN protocol analyzer, you can set up filters to capture data related to the channel control header (described in Section F.7.6).
You can trigger the LAN analyzer by using the following datagram fields:
Then look for the HELLO, CCSTART, VERF, and VACK datagrams in the captured data. The CCSTART, VERF, VACK, and SOLICIT_SRV datagrams should have the AUTHORIZE bit (bit <4>) set in the CC flags byte. Additionally, these messages should contain the scrambled cluster password (nonzero authorization field). You can find the scrambled cluster password and the cluster group number in the first four longwords of SYS$SYSTEM:CLUSTER_AUTHORIZE.DAT file.
Reference: See Sections F.9.3 through
F.9.5 for additional data isolation techniques.
F.10.2 Analyzing Retransmission Problems
Using a LAN analyzer, you can trace datagrams as they travel across an OpenVMS Cluster system, as described in Table F-12.
Step | Action | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 |
Trigger the analyzer using the following datagram fields:
|
||||||||||||
2 | Use the distributed enable function to allow the same event to be captured by several LAN analyzers at different locations. The LAN analyzers should start the data capture, wait for the distributed enable message, and then wait for the explicit trigger event or the distributed trigger message. Once triggered, the analyzer should complete the distributed trigger function to stop the other LAN analyzers capturing data. | ||||||||||||
3 |
Once all the data is captured, locate the sequence number (for nodes
running the NISCA protocol Version 1.3 or earlier) or the extended
sequence number (for nodes running the NISCA protocol Version 1.4 or
later) for the datagram being retransmitted (the datagram with the
REXMT flag set). Then, search through the previously captured data for
another datagram between the same two nodes (not necessarily the same
LAN adapters) with the following characteristics:
|
||||||||||||
4 |
The following techniques provide a way of searching for the problem's
origin.
|
Reference: See Appendix G for more information
about congestion control and PEDRIVER message retransmission.
F.11 Filters
Use the values shown in Table F-13 to set up a filter, named LAVc_TR_ReXMT, for all of the LAN retransmissions for a specific cluster. Fill in the value for the local area OpenVMS Cluster group code (nn--nn) to isolate a specific OpenVMS Cluster on the LAN.
Byte Number | Field | Value |
---|---|---|
1 | DESTINATION | xx--xx--xx--xx--xx--xx |
7 | SOURCE | xx--xx--xx--xx--xx--xx |
13 | TYPE | 60--07 |
23 | LAVC_GROUP_CODE | nn--nn |
31 | TR FLAGS | 0x1xxxxx 2 |
33 | ACKING MESSAGE | xx--xx |
35 | SENDING MESSAGE | xx--xx |
Use the values shown in Table F-14 to filter all of the LAN packets for a specific cluster. Fill in the value for OpenVMS Cluster group code (nn--nn) to isolate a specific OpenVMS Cluster on the LAN. The filter is named LAVc_all.
Byte Number | Field | Value |
---|---|---|
1 | DESTINATION | xx--xx--xx--xx--xx--xx |
7 | SOURCE | xx--xx--xx--xx--xx--xx |
13 | TYPE | 60--07 |
23 | LAVC_GROUP_CODE | nn--nn |
33 | ACKING MESSAGE | xx--xx |
35 | SENDING MESSAGE | xx--xx |
Previous | Next | Contents | Index |
privacy and legal statement | ||
4477PRO_033.HTML |