Link speed downshifting for error determination and performance enhancements

ABSTRACT

Various embodiments for regulating link speed for performance enhancement and port diagnosis are provided. In response to identifying an amount of errors in a communications link above a predetermined threshold, an applicable transmission speed is selectively reduced. The selective reduction occurs upon one of a temporary, permanent, and user-defined basis, and the selective reduction is performed using one of a manual setting adjustment and speed negotiation logic applied to the communications link. If errors identified at the reduced transmission speed are found to decrease, a communications port incorporating the communications link is flagged as potentially dirty, and if the errors identified at the reduced transmission speed are found to remain constant, the communications port is flagged as potentially bad.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates in general computing systems, and moreparticularly to, various embodiments for performance enhancement anderror diagnosis in data networks.

2. Description of the Related Art

Today with modern technology, large volumes of data are storable on diskand flash drives; these drives can exist as a solo entity, or as part ofa broader make up within a larger storage environment. As the sheervolume of data in today's information-based society continues toincrease, so too does the demands placed on legacy infrastructures suchas Fibre Channel and Gigabit Ethernet cabling and other datacommunications mechanisms.

SUMMARY OF THE INVENTION

High speed optical-fibre cabling, such as Fibre Channel, Fibre Channelover Ethernet, Infiniband, SCSI, iSCSI, Ethernet, and Gigabit Ethernetcabling, has always recommended special handling and cleaning proceduresbut in the past, such cabling was often robust enough to withstandhigher levels or dirt, dust particles and mistreatment. The same relaxedpolicies that existed in many client and development/test labs acrossthe industry for years are starting to cause larger scale problems athigher fibre channel speeds. As networking speeds increase, thetolerance for dust, cable bends, kinks and other optical variants ismuch smaller. Currently one of the top causes of intermittent linkissues is cabling and Small Form-Factor Pluggables (SFPs), often relatedto improper maintenance, cleaning or cabling knots.

A wide variety of resources collectively advise customers to take moreproactive measures and increase cleaning schedules at higher speeds, butthere is nothing currently to help diagnose these problems and handlethem in a live customer environment scale. Current technologies includespecialized tools to be placed on one link at a time to physicallyinspect optics for dust particles and other variants, particularly atthe exposed ends of the optical-fibre cables. Higher link speeds aremore and more sensitive to optical signal strength degradation.Consequently there is a continuing and increasing need for advanceddetection and handling capabilities built into data transfer products tohelp alleviate the related stress and errors seen in complex customerenvironments.

Accordingly and in view of the foregoing, to address the challengespreviously described, various embodiments for regulating link speed forperformance enhancement and port diagnosis are provided. In one suchembodiment, by way of example only, a method for regulating link speedfor performance enhancement and port diagnosis are provided. In responseto identifying an amount of errors in a communications link above apredetermined threshold, an applicable transmission speed is selectivelyreduced. The selective reduction occurs upon one of a temporary,permanent, and user-defined basis, and the selective reduction isperformed using one of a manual setting adjustment and speed negotiationlogic applied to the communications link. If errors identified at thereduced transmission speed are found to decrease, a communications portincorporating the communications link is flagged as potentially dirty,and if the errors identified at the reduced transmission speed are foundto remain constant, the communications port is flagged as potentiallybad.

Other system and computer program product embodiments are provided andsupply related advantages.

BRIEF DESCRIPTION OF THE DRAWINGS

In order that the advantages of the invention will be readilyunderstood, a more particular description of the invention brieflydescribed above will be rendered by reference to specific embodimentsthat are illustrated in the appended drawings. Understanding that thesedrawings depict only typical embodiments of the invention and are nottherefore to be considered to be limiting of its scope, the inventionwill be described and explained with additional specificity and detailthrough the use of the accompanying drawings, in which:

FIG. 1 is an exemplary block diagram showing a hardware structure forperforming link speed regulation functionality, in which aspects of thepresent invention may be realized;

FIG. 2 is a flow chart diagram illustrating an exemplary method for linkspeed regulation, again in which aspects of the present invention may berealized;

FIG. 3A is an additional flow chart diagram illustrating an additionalexemplary method for effecting link speed regulation, again in whichaspects of the present invention may be implemented; and

FIG. 3B is an additional flow chart diagram illustrating a continuationof the exemplary method for effecting link speed regulation first shownin FIG. 3A previously, here again in which aspects of the presentinvention may be implemented.

DETAILED DESCRIPTION OF THE DRAWINGS

As previously mentioned, such communications mechanisms as optical-fibrechannel cabling have always recommended special handling and cleaningprocedures. However, in the past, these communications mechanisms wereoften robust enough to withstand higher levels or dirt, dust particlesand mistreatment. The same relaxed policies that existed in many clientand development/test labs across the industry for years are starting tocause larger scale problems at higher fibre channel and especiallyGigabit Ethernet speeds, for example. As networking speeds increase, thetolerance for dust, cable bends, kinks and other optical variants ismuch smaller. Currently one of the top causes of intermittent linkissues is cabling and Small Form-Factor Pluggables (SFPs), often relatedto improper maintenance, cleaning, or cabling knots.

A wide variety of resources collectively advise customers to take moreproactive measures and increase cleaning schedules at higher speeds, butthere is nothing currently to help diagnose these problems and handlethem in a live customer environment scale. Current technologies includespecialized tools to be placed on one link at a time to physicallyinspect optics for dust particles and other variants. Higher link speedsare more and more sensitive to optical signal strength degradation.Consequently there is a continuing and increasing need for advanceddetection and handling capabilities built into data transfer products tohelp alleviate the related stress and errors seen in complex customerenvironments.

Accordingly and in view of the foregoing, to address the challengespreviously described, various embodiments for regulating link speed forperformance enhancement and port diagnosis are provided. In one suchembodiment, by way of example only, a method for regulating link speedfor performance enhancement and port diagnosis are provided. In responseto identifying an amount of errors in a communications link above apredetermined threshold, selectively an applicable transmission speed isselectively reduced. The selective reduction occurs upon one of atemporary, permanent, and user-defined basis, and the selectivereduction is performed using one of a manual setting adjustment andspeed negotiation logic applied to the communications link. If errorsidentified at the reduced transmission speed are found to decrease, acommunications port incorporating the communications link is flagged aspotentially dirty, and if the errors identified at the reducedtransmission speed are found to remain constant, the communications portis flagged as potentially bad.

Turning now to FIG. 1, exemplary architecture 10 of a computing systemenvironment is depicted. Architecture 10 may, in one embodiment, beimplemented at least as part of a system for effecting mechanisms of thepresent invention. The computer system 10 includes central processingunit (CPU) 12, which is connected to communication port 18 and memorydevice 16. The communication port 18 is in communication with acommunication network 20. The communication network 20 and storagenetwork may be configured to be in communication with server (hosts) 22and 24 and storage systems, which may include storage devices 14. Thestorage systems may include hard disk drive (HDD) devices, solid-statedevices (SSD), optical disk drives, flash storage, etc., which may beconfigured in a redundant array of independent disks (RAID). Thecommunication port 18, communication network 20, and other componentsnot pictured for the sake of brevity but known to the skilled artisanmay include such hardware components as Fibre Channel, Fibre Channelover Ethernet, Infiniband, SCSI, iSCSI, Ethernet, and/or GigabitEthernet cabling, corresponding Fibre Channel, Fibre Channel overEthernet, Infiniband, SCSI, iSCSI, Ethernet, and/or Gigabit Ethernetports, Host-Bus Adapters (HBAs), Converged Network Adapters (CNAs),network switches and switching components, and similar communicationsmechanisms known to one of ordinary skill in the art. Various aspects ofthe illustrated embodiments may be realized using one or more of thesecomponents as will be further described.

The operations as described below may be executed on storage device(s)14, located in system 10 or elsewhere and may have multiple memorydevices 16 working independently and/or in conjunction with other CPUdevices 12. Memory device 16 may include such memory as electricallyerasable programmable read only memory (EEPROM) or a host of relateddevices. Memory device 16 and storage devices 14 are connected to CPU 12via a signal-bearing medium. In addition, CPU 12 is connected throughcommunication port 18 to a communication network 20, having an attachedplurality of additional computer host systems 22 and 24. In addition,memory device 16 and the CPU 12 may be embedded and included in eachcomponent of the computing system 10. Each storage system may alsoinclude separate and/or distinct memory devices 16 and CPU 12 that workin conjunction or as a separate memory device 16 and/or CPU 12.

In light of the observation that in general, the higher thecommunications link speeds, the higher the sensitivity to signaldegradation, the mechanisms of the illustrated embodiments introduce aproactive self-diagnostic link process and link integrity copingmethodology as will be further described. At a high level and in oneembodiment, this methodology may be described as the following. If theapplicable link speed is, for example, 8 Gb (Gigabits/second) or higher(e.g., 10 Gb, 16 Gb, 32 Gb, 40 Gb, etc. etc.), and the associatedcommunications link is found to experience intermittent errors, thefollowing steps may be performed.

First, again in an exemplary embodiment, the rate of errors is loggedfor a period of time (e.g., x minutes) at the current link speed.Second, the speed layer is reduced one degree (e.g., one layer) (n−1),and the applicable rate is again monitored for another period of time(e.g., another x minutes). Third, if the rate of failure was reduced atthe lower speed (factoring in Input/Output Operations Per Second(IOPS)), then log the occurrence of the reduced failure at the lowerspeed.

Fourth, return to the original speed and monitor, and if the errorsagain return, flag the applicable communications port as a potential“dirty link.” If errors are found to continue at the same magnitude atthe n−1 layer speed, flag the applicable communications port aspotentially “bad.”

Those links that are identified as failing and/or dirty may, as one ofordinary skill in the art, be repaired, cleaned, and maintained as thecase may be. In repairing a failed communication link, such tasks may beinvolved as (1) replacing the SFPs because the optical interfaces couldalso be scratched or dirty, (2) replacing the cable between the SFPs, or(3) both.

The ability for data center administrators to diagnose which componentsare failing and which are dirty represents a significant advancement,and would also help to streamline the maintenance process. Further, ahistory table of components that were flagged as dirty and/or bad may,in one embodiment, be maintained, and if the same components continuallymanifested themselves on the list, flags could be set and administratorsnotified so the components could be removed from the environment. Thislist could also be used to help determine cleaning schedules and otherrelated activities.

Additional logic could be added such that is a failure occurs off-hours(or policy based logic) that if n−1 speed was more stable the port couldcontinue to operate at that speed until a maintenance window can occuror the system administrator is able to replace the component.

An additional aspect of the illustrated embodiments may be seen byvested security or lab owners seeking to understand the types of errorsand themes that are occurring to try and identify intentional oraccidental insider threats to the overall network environment. Forexample, when a certain threshold of “dirty ports” per month is met, orsome percentage of event types occur over a defined period of time, analert could be sent to an administrator, security officer, or anotherperson of authority so that the administrator, security officer, orother person of authority is aware of the problems and can changepolicies or procedures accordingly to help protect the environment fromthese errors in the future. For example, perhaps an employee isn'tperiodically cleaning critical components or perhaps the errors spikeafter a recent cleaning due to improper cleaning procedures, or perhapsa disgruntled employee is bending cables. The potential causes forerrors is essentially infinite; however by adding the identificationcapabilities of the mechanisms of the illustrated embodiments, handlingand notification capabilities can help to improve the environment goingforward.

For example, in a related embodiment, environmental sensors may beimplemented in similar fashion to the error counters previouslydescribed, such that when the environmental sensors are at or below acertain “contamination” tolerance of the recommended handling/cleaningprocedures and/or requirements, and a vested parties policies thresholdhas been exceeded, that an early warning alert may be triggered toindicate potentially covert or malicious activity against the systemsinfrastructure. In other words, this embodiment may help to identifyactivity patterns that are not expected/found under normal and propermaintenance and environmental conditions.

Turning now to FIG. 2, a flow chart diagram of exemplary functionalityfor implementing link regulation according to various aspects of thepresent invention is shown by method 200. Method 200 begins (step 202)by selectively reducing (i.e. reduction of speed from its current speed“n” to the next lower speed “n−1”) of an applicable transmission speedin response to an identification of an amount of errors in acommunications link above a predetermined threshold (step 204). Theselective reduction occurs on a temporary, permanent, or user-definedbasis (step 206). The selective reduction is performed using a manualsetting adjustment and/or speed negotiation logic applied to thecommunications link (step 208). If errors at the reduced transmissionspeed are found, the communications port is flagged as potentially dirty(step 210), and if errors at the reduced transmission speed are found toremain approximately constant, the communications port is flagged aspotentially bad (step 212). The method 200 then ends (step 214).

Turning now to FIG. 3A, a flow chart illustration of an exemplary methodfor effecting link regulation in accordance with various aspects of theillustrated embodiments, is depicted as method 300. Method 300 begins(step 302) with the detection of errors on a given communication portthat are logged into error counters (step 304) by use of a monitoringprocess. During the course of the monitoring activity, specifiedcounters are observed at an applicable link speed “n,” such as ErrorCorrection Code (ECC) errors, Cyclic Redundancy Check (CRC) errors,Frame Check Sequence (FCS) errors, bad header errors, and the like, butnot including buffer-related drops (step 306). Here again, a variety oferrors may be detected, including the environmentally related errorsdiscoverable by environmental sensors previously described.

Moving to step 308, if a given counter goes over the specified thresholdin the specified time, the method 300 moves to step 310; otherwise themethod 300 returns to step 306 to continue the monitoring andobservation practices.

If, as previously stated, the specified threshold is exceeded (again,step 308), the applicable port number is logged, for example in a table,including the rate of errors per time threshold and IOPs identifiedpreviously (step 310). As a following step (step 312), a NetworkOnline/Offline Sequence (NOS) is sent to initiate a link bounceoperation and renegotiate speeds over the communication link (step 312).

During the speed negotiation process in step 312, the mechanisms of theillustrated embodiments may advertise the applicable new top speed as“n−1” (i.e., the communication link speed has been reduced to a new,generally lower speed) (step 314). The communication of this new topspeed to network components informs the components and allows thecomponents to adjust data processing and transfer activities in view ofthe new top speed.

As a next step (step 316), the link comes up at the new applicable n−1speed. The login completes, and I/O then resumes. The monitoring processpreviously described then observes specified port counters during thespecified time threshold (step 318). Errors per IOPs are then calculatedfor this specified time threshold, and logged (here again, for exampleto the table previously mentioned) (step 320).

As an optional step in the illustrated exemplary method 300, the steps304-320 indicated may be rerun, or a subset of these steps 304-320 maybe rerun to ensure that the results obtained are repeatable (step 322).

Turning now to FIG. 3B, exemplary method 300 continues from FIG. 3Ashown previously. In decision step 324, the method queries whether thecalculated error rate/ratio at the n−1 speed improved by a programmablethreshold (e.g., “x”). If the error rate is observed to remain constant(i.e., not improved) at the n−1 speed, the network component orcomponents in question using the link may be suspect. Accordingly, theapplicable component is marked/flagged as a potential “bad link” (step330).

Returning to step 324, if the error rate is observed to improve (i.e.reduce) at the n−1 speed, then the network component or components inquestion using the link may alternatively be suspected to be “dirty,”rather than “bad,” and the component is marked/flagged as a potentiallydirty link (step 326).

Continuing from step 326, if the component or components were marked asa “dirty link” and a run at n−1 speed for stability policy is set in thenetwork, the applicable speed is renegotiated back to n−1 as in step 312previously, and the system continues to run at the n−1 speed untilapplicable maintenance or further checks are undertaken byadministrators, etc. (step 328).

Continuing to step 332, if an alert vested parties policy is set, theapplicable log(s) is checked to determine if the alert threshold pergiven policy has been surpassed. If so, the vested part(ies) are alertedvia any means available (e.g., email, text, tweet) (step 334). Themethod 300 then ends (step 336).

While the mechanisms of the illustrated embodiments have been said toselectively reduce the applicable transmission speed as a consequence oferror identification, these mechanisms may also be tailored, in afurther embodiment, such that the applicable transmission speed, uponthe determination of one or more predetermined criterion, is selectivelyreduced a greater amount (i.e., to a n−2 rather than n−1 speed). Forexample, identified errors may be of a large enough magnitude that agreater speed reduction may be warranted. One of ordinary skill in theart will appreciate that the reduction in applicable link speed may varysignificantly depending on a particular situation. In addition, themanner in which the changes in link speed are implemented may alsosignificantly vary.

It should be noted that while the mechanisms of the illustratedembodiments have applicability in the high-speed cabling scenariosdescribed above, these mechanisms also may be applied to other legacycommunications links/cabling, such as copper cabling. One of ordinaryskill in the art will appreciate that the mechanisms may be tailored tosuit a wide variety of implementations across a broad swath ofcommunications technologies and protocols.

The present invention may be a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The invention claimed is:
 1. A method for regulating link speed forperformance enhancement and port diagnosis by a processor device,comprising: in response to identifying an amount of errors in acommunications link above a predetermined threshold, selectivelyreducing (n−1) an applicable transmission speed, wherein: the selectivereduction occurs upon one of a temporary, permanent, and user-definedbasis, and the selective reduction is performed using one of a manualsetting adjustment and speed negotiation logic applied to thecommunications link; and if errors identified at the reducedtransmission speed are found to decrease, flagging a communications portincorporating the communications link as potentially dirty, and if theerrors identified at the reduced transmission speed are found to remainconstant, flagging the communications port as potentially bad.
 2. Themethod of claim 1, wherein selective reducing the applicabletransmission speed further includes, upon a determination of at leastone criterion, forgoing the reduction of the applicable link speed ton−1 and instead implementing a further, n−2, transmission speedreduction.
 3. The method of claim 1, wherein selectively reducing theapplicable transmission speed further includes sending a NetworkOnline/Offline Sequence (NOS) to initiate a link bounce and re-negotiatethe transmission speed over the communications link.
 4. The method ofclaim 1, wherein selectively reducing the applicable transmission speedfurther includes advertising a top speed as the reduced, n−1 speed. 5.The method of claim 1, further including performing at least one of:logging errors in the communications link in at least one error counter,returning the applicable transmission speed to a prior (n) state,identifying errors above the predetermined threshold, selectivelyreducing the applicable transmission speed, and flagging thecommunications port as one of potentially dirty and potentially bad. 6.The method of claim 1, wherein if the communications port is flagged aspotentially dirty, continuing to operate at the reduced, n−1 speed untila maintenance operation is performed on at least one of thecommunications link and the communications port.
 7. The method of claim1, further including alerting a vested party per an alert vested partiespolicy.
 8. The method of claim 7, wherein: identifying the amount oferrors includes identifying an environmental error in which at least oneenvironmental sensor is found at or below a contamination tolerance of arecommended handling procedure; and if a threshold for the alert vestedparties policy is exceeded, an alert is provided to an administrator toindicate malicious activity against infrastructure incorporating thecommunications link.
 9. A system for regulating link speed forperformance enhancement and port diagnosis, comprising: a communicationslink; a communications port connected to the communications link; and aprocessor device in operable control over the communications port andcommunications link, wherein the processor device, in response toidentifying an amount of errors in the communications link above apredetermined threshold, selectively reduces (n−1) an applicabletransmission speed, wherein: the selective reduction occurs upon one ofa temporary, permanent, and user-defined basis, and the selectivereduction is performed using one of a manual setting adjustment andspeed negotiation logic applied to the communications link; and iferrors identified at the reduced transmission speed are found todecrease, flags the communications port as potentially dirty, and if theerrors identified at the reduced transmission speed are found to remainconstant, flags the communications port as potentially bad.
 10. Thesystem of claim 9, wherein the processor device, pursuant to selectivereducing the applicable transmission speed, upon a determination of atleast one criterion, forgoes the reduction of the applicable link speedto n−1 and instead implements a further, n−2, transmission speedreduction.
 11. The system of claim 9, wherein the processor device,pursuant to selectively reducing the applicable transmission speed,sends a Network Online/Offline Sequence (NOS) to initiate a link bounceand re-negotiate the transmission speed over the communications link.12. The system of claim 9, wherein the processor device selectivelyreduces the applicable transmission speed further includes advertising atop speed as the reduced, n−1 speed.
 13. The system of claim 9, whereinthe processor device performs at least one of: logging errors in thecommunications link in at least one error counter, returning theapplicable transmission speed to a prior (n) state, identifying errorsabove the predetermined threshold, selectively reducing the applicabletransmission speed, and flagging the communications port as one ofpotentially dirty and potentially bad.
 14. The system of claim 9,wherein if the communications port is flagged as potentially dirty, theprocessor device continues to operate at the reduced, n−1 speed until amaintenance operation is performed on at least one of the communicationslink and the communications port.
 15. The system of claim 9, wherein theprocessor device alerts a vested party per an alert vested partiespolicy.
 16. The system of claim 15, further including at least oneenvironmental sensor associated with the communication link, andwherein: identifying the amount of errors includes identifying anenvironmental error in which the at least one environmental sensor isfound at or below a contamination tolerance of a recommended handlingprocedure; and if a threshold for the alert vested parties policy isexceeded, an alert is provided to an administrator to indicate maliciousactivity against infrastructure incorporating the communications link.17. A computer program product for regulating link speed for performanceenhancement and port diagnosis by a processor device, the computerprogram product comprising a non-transitory computer-readable storagemedium having computer-readable program code portions stored therein,the computer-readable program code portions comprising: a firstexecutable portion that, in response to identifying an amount of errorsin a communications link above a predetermined threshold, selectivelyreduces (n−1) an applicable transmission speed, wherein: the selectivereduction occurs upon one of a temporary, permanent, and user-definedbasis, and the selective reduction is performed using one of a manualsetting adjustment and speed negotiation logic applied to thecommunications link; and a second executable portion that, if errorsidentified at the reduced transmission speed are found to decrease,flags a communications port incorporating the communications link aspotentially dirty, and if the errors identified at the reducedtransmission speed are found to remain constant, flags thecommunications port as potentially bad.
 18. The computer program productof claim 17, further including a third executable portion that, pursuantto selectively reducing the applicable transmission speed, upon adetermination of at least one criterion, forgoes the reduction of theapplicable link speed to n−1 and instead implements a further, n−2,transmission speed reduction.
 19. The computer program product of claim17, further including a fourth executable portion that, pursuant toselectively reducing the applicable transmission speed, sends a NetworkOnline/Offline Sequence (NOS) to initiate a link bounce and re-negotiatethe transmission speed over the communications link.
 20. The computerprogram product of claim 17, further including a fourth executableportion that, pursuant to reducing the applicable transmission speed,advertises a top speed as the reduced, n−1 speed.
 21. The computerprogram product of claim 17, further including a fourth executableportion that performs at least one of: logging errors in thecommunications link in at least one error counter, returning theapplicable transmission speed to a prior (n) state, identifying errorsabove the predetermined threshold, selectively reducing the applicabletransmission speed, and flagging the communications port as one ofpotentially dirty and potentially bad.
 22. The computer program productof claim 17, further including a fourth executable portion that, if thecommunications port is flagged as potentially dirty, continues tooperate at the reduced, n−1 speed until a maintenance operation isperformed on at least one of the communications link and thecommunications port.
 23. The computer program product of claim 17,further including a fourth executable portion that alerts a vested partyper an alert vested parties policy.
 24. The computer program product ofclaim 17, further including a fifth executable portion that: pursuant toidentifying the amount of errors, identifies an environmental error inwhich at least one environmental sensor is found at or below acontamination tolerance of a recommended handling procedure; and if athreshold for the alert vested parties policy is exceeded, provides analert to an administrator to indicate malicious activity againstinfrastructure incorporating the communications link.