Techniques described herein provide for an end-to-end delay measurement between two network endpoints that leverages hardware timestamping close to the endpoints while offloading probe agents to external devices. Techniques described herein do not consume the network device control plane CPU cycles, avoid associated security risks resulting from control CPU cycle consumption, and give accurate measurement of the delay between endpoints. The techniques described herein help network administrators and network visibility tools to make more accurate network policy-based decisions.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.