CA2050436A1 - Method of controlling date transmission in atm network with cell loss priority level - Google Patents

Method of controlling date transmission in atm network with cell loss priority level

Info

Publication number
CA2050436A1
CA2050436A1 CA002050436A CA2050436A CA2050436A1 CA 2050436 A1 CA2050436 A1 CA 2050436A1 CA 002050436 A CA002050436 A CA 002050436A CA 2050436 A CA2050436 A CA 2050436A CA 2050436 A1 CA2050436 A1 CA 2050436A1
Authority
CA
Canada
Prior art keywords
cells
loss
cell
intolerable
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002050436A
Other languages
French (fr)
Inventor
Yasuhiro Katsube
Hiroshi Esaki
Toshikazu Kodama
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2050436A1 publication Critical patent/CA2050436A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L12/5602Bandwidth control in ATM Networks, e.g. leaky bucket
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5629Admission control
    • H04L2012/5631Resource management and allocation
    • H04L2012/5636Monitoring or policing, e.g. compliance with allocated rate, corrective actions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5638Services, e.g. multimedia, GOS, QOS
    • H04L2012/5646Cell characteristics, e.g. loss, delay, jitter, sequence integrity
    • H04L2012/5647Cell loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5638Services, e.g. multimedia, GOS, QOS
    • H04L2012/5646Cell characteristics, e.g. loss, delay, jitter, sequence integrity
    • H04L2012/5651Priority, marking, classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5638Services, e.g. multimedia, GOS, QOS
    • H04L2012/5646Cell characteristics, e.g. loss, delay, jitter, sequence integrity
    • H04L2012/5652Cell construction, e.g. including header, packetisation, depacketisation, assembly, reassembly

Abstract

ABSTRACT OF THE DISCLOSURE

A method of controlling data transmission in the ATM
network which establishes simple modes of a network control for a case in which a plurality of cell loss priority levels are involved within the cells of a single virtual channel. The method includes the steps of declaring the traffic characteristics for either the loss intolerable cells only, or the loss intolerable cells and the loss tolerable cells separately, and carrying out at the network a connection admission control by estimating a cell loss rate on a basis of the declared traffic characteristics, such that the cell loss rate for either the loss intolerable cells only, or the loss intolerable cells and the loss tolerable cells separately in the multiplexed virtual channels is secured by the network on a basis of the estimated cell loss rate.

Description

METHOD OF CONTROLLING DATA TRANSMISSION
IN ATM NETWORK WITH CELL LOSS PRIORITY LEVEL

BACKGROUND OF THE INVENTION

Field o~ the Invention The present invention relates to a method of controlling cell loss rates ~or data transmission in ATM
(asynchronous transfer mode) network.

Description of the Background Art In the ATM network, the information generated at each terminal is transmitted in units of fixed length packets called cells. In transmitting the cells, the request connections fro~ the terminals are admitted to the n~twork by such a number that an arithmetic sum of the maximum cell transmission speeds of the terminals can be greater than the bandwidth of the physical transmission lines, by taking the statistical multiplexing effect into account. Thus, the arithmetic sum of the cell transmission speeds of the terminals exceeds the bandwidth of the physical transmission lines at some probability, and therefore there is a possibility for the cells transmitted from the terminals to be discarded at some probability. Namely, in the ATM network, up to a certain level of overloading of the cells can be handled without dlscarding any cell at all ; by utllizing the bu~fering function of the network, but when the cells to be transmitted exceeds the buf~er capacity, the buffer overflow occurs and some cells are discarded.
Now, in the ATM network, the management of he bandwidth for transmitting the cells is carried out by taking the statistical multiplexing effect into account.
Namely, when each terminal makes a connection set up request to the network, the terminal also makes a request for a quality of service concerning the cell loss rate at least, and the network ln response carries out the so called connection admission control in which the admission or re~ection of the requested connection set up is determined according to a ~udgement as to whether it is possible to satisfy the requested quality of service by admitting this connection set up. In order to carry out this connection admission control accurately, it is necessary to make an estimation for the cell loss rate as accurately as possible for the sake of achieving more efficient network per~ormance, and to be an over-estimation for the sake of securing the safety in the network operation. In other words, in the ATM network, the communication resource (bandwidth) is shared by a plurality of virtual channels by allowing the cell loss up to a certain cell loss ra*e, in order to improve the efficiency of the network performance.
Moreover, ln the ATM network, it is possible for the network to distinguish those cells for which the cell loss is not tolerable at all and those cells for which the cell loss up to a certain level of the cell loss rate ls tolerable, by specifying an explicit indication of the priority level regarding the cell loss in the CLP (cell loss priority) field provided in the ATM header of the cell to be transmitted from the terminal to the network. In this case, when the need for discard~ng some cells arises because of congestion, the network starts discarding the cells with the lower priority level flrst. Thus, in this case, two types of cells with two di~ferent cell loss priority levels are mixed within a single virtual channel, and the network needs to carry out the cell loss priority control for these two types of cells, along with the usual connection admission control for securing the qualitY Of service.

~5~36 However, a method of quality of service control regarding the cell loss for a case in which a plurality of priority levels are involved within a single virtual channel has not been established yet.
Moreover, in the ATM network, the following two conditions must be satisfied in a case of using the CLP
field in the ATM header.
(1) The quality of service regardin~ the cell loss for each virtual channel requested by the termlnal must be secured.
(2) In a case of discardin~ cells, the network must secure that it starts discarding the cells with the lower priority level ~loss tolerable cells) first, be*ore discarding any cell with the higher priority level (loss intolerable cell).
The conditlon (2) is required obviously because otherwise the priority level specified in each cell loses any signi~icance at all.
As for the condition (1), when two types of loss tolerable cells and loss intolerable cells are present among the cells of a single vlrtual channel and these two types of cells are controlled according to the condition (Z), it is inevitable that the actual cell loss rate for the loss tolerable cells and the actual cell loss rate ~or the loss intolerable cells turn out to be different even within a single virtual channel. Thus, it ls necessary to establish exactly what should be secured by the network and what should be requested by the terminal as the quality of service concerning the cell loss for each virtual channel, and to de~ise an algorithm ~or the connectlon admission control capable of securing the quality of SerYiCe regarding the cell loss.
On the other hand, it ls also necessary for the network to monitor whether the traf~ic charac~eristics declared by each terminal at a time of the connection set S~L3fi up request is faith~ully maintained or not, and to regulate the cell ~low in a case there is a violation. This operatlon of the network is called a usage parameter control. Here, it is necessarY to establish how this usage parameter control should be carried out with respect to the two types o~ the cells with two di~erent cell loss priority levels.
Furthermore, when the a plurality of cell groups ~virtual channels) containing the loss tolerable cells and loss intolerable cells at different ratio share the same communication resource, the network does not recogni~e the individual virtual channel, so that in discarding the cells, all the loss tolerable cells are discarded uni~ormly, regardless of ~hich virtual channel they belong to. As a consequence, the virtual channels containing more loss tolerable cells may end up losing more cells, such that the total cell loss rate becomes much larger for these virtual channels than for the other virtual channels. In other words, in such a case, it is impossible to secure the total cell loss rate for each virtual channel.

SUMMARY OF THE INVENTION

It is therefore an obJect o~ the present invention to provide a method of controlling data transmission in the ATM network which establishes simple modes of a network control for a case in which a plurality of cell loss prior~ty levels are involved within $he cells of a single virtual channel.
According to one aspect of the present invention there is provided a method of controlling data transmission in an ATM network, in which data are transmitted in un~ts of cells, a group o~ cells are transmitted ~rom a terminal to the network by setting up a virtual channel, and a ~5~36 plurality of virtual channels are multiplexed at the network, comprising the steps o~: providing a cell loss priority field in each cell to be transmitted with a cell loss priority level at a terminal; declaring from the terminal to the network a traffic characteristic for loss ~ intolerable cells with a higher cell loss priority level in each virtual channel to be set up at a t~me of a connection set up request; and carrying out at the network a connection admission control by estimating a cell loss rate ~or the loss intolerable cells on a basis of the traffic characteristic declared at the declaring step, such that only the cell loss rate ~or the loss intolerable cells in the multiplexed virtual channels is secured by the network on a basis of the estlmated cell loss rate for the loss intolerable cells.
According to another aspect of the present invention there is provided a method of controlling data transmission in an ATM network, in which data are transmitted in units o~ cells, a group o~ cells are transmitted from a terminal 20 -to the network by setting up a virtual channel, and a plurality o~ virtual channels are multiplexed at the network, comprising the steps of: providing a cell loss priority field in each cell to be transmltted with a cell loss priority level at a terminal; declaring from the terminal to the network traffic characteristics for loss intolerable cells with a higher cell loss priority level and loss tolerable cells with a lower cell loss priority level in each virtual channel to be set up at a time of a connection set up request; and carrying out at the network a connection admission control by estimating cell loss rates for the loss intolerable cells and the loss tolerable cells separately on a basis of the declared traffic characteristlcs, such that the cell loss rates ~or the loss intolerable cells and the loss tolerable cells in the multiplexed virtual channels are secured separately by the ~5al~36 network on a basis o~ the est1mated cell loss rates for the loss intolerable cells and the loss tolerable cells.
According to another aspect o~ the present lnvention there is provided a method of controlling data transmission ln an ATM network, in which data are transmitted in units of c811s, a group of cells are transmitted from a terminal to the network by setting up 8 Yirtual channel, and a plurality o~ virtual channels are multiplexed at the network, comprising the steps of: providing a cell loss priority ~ield in each cell to be transmitted with a cell loss priority level at a termlnal; declaring from the terminal to the network a ratio of numbers o~ 105s intolerable cells with a hi~her cell loss prior~ty level and loss tolerable cells with a lower cell loss priority level in each virtual channel to be set up at a time of a connection set up request; classlfying at the network the virtual channels into a plurality of virtual channel classes according to the ratio declared at the declaring step; dividing at the network a communication resource into a plurality of sub-resources in correspondence with the plurality of the virtual channel classes; and carrying out at the network a connection admission control for each of the virtual channel classes classified at the classi~ying step separately.
Other ~eatures and advantages of the present invention will become apparent from the ~ollowing description taken in con~unction with the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Fig. 1 is ~ diagram of an ATM cell format used by the method of controlling data transmission in an ATM network according to the present invention.
Fig. 2 is a diagram of a typical loading state for a ~g~504L36 transmisslon path arising in the method of controlling data transmission in an ATM ne~work according to the present invention.
Fig. 3 is a diagram o~ one type of a queueing buf~er control used in the method of controlling data transmission in an ATM network according to the present invention.
Fig. 4 is a diagram of another type of a queueing bu~fer control used ~n the method of controlling data transmission in an ATM network according to the present invention.
Fig. 5 is a diagram of a typical loading state ~or a transmission path arising in one partlcular embodiment of the method o~ controlling data transmission in an ATM
network according to the present invention.
Fig. 6 is a flow chart for a connection admission control in the embodiment related to Fig. 5.
. Fig. 7 is a diagram of a typical loading state for a transmission path arising in another particular embodiment o~ the method o~ controlling data transmis~ion in an ATM
network according to the present invention.
Fig. 8 is a flow chart for a connection admission control in the embodiment related to Fig. 7.
Fig. 9 is a schematic dlagram o~ a con~iguration of an ATM exchange ln an ATM network.
Fig. 10 is a schematic diagram of an exemplary con~iguration of an ATM network.
Figs. ll(A) and ll(B) are flow charts ~or two embodiments of a method of monitoring declaration violation in one type of the method o~ controlling data transmission in an ATM network according to the present invention.
Flgs. 12(A), 12(B), and 12(C) are ~low charts ~or three embodiments o~ a method of monitoring declaration violation in another type of the method of controlllng data transmission in an ATM network according to the present invention.

Fig. 13 is a ~low ~hart for one embodiment of a method for controlling data transmission in an ATM network according to the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

First, the cell loss priority in the ATM ne$work will be described in general.
In the ATM network, each ATM cell at a user network lnterface has a format shown in Fi~. 1, which includes 5 bytes of a header field ,and 48 bytes o~ an informa*ion field.
In this ATM cell o~ Fig. 1, GFC field is a region for a flow control, VPI field is a region for a virtual path identi~ication, VCI field is a region for a virtual channel identi~icat~on, PT ~ield is a region ~or a payload type used in distinguishing user data and network data in the data section, HEC ~ield is a region for a header error control, Res field is a reserved region, and CLP field is a region for indicating a cell loss priority.
In transmitting such an ATM cell ~rom the terminal, the cell loss priorities can be specif1ed explicitly by manipulating a bit o~ the CLP field in each cell. Namely, the bit value o~ the CLP field is set ~o 1 ~or the loss tolerable cell whlch has a lower cell loss priority level, and O for the loss intolerable cell which has a higher cell loss priority level.
Now, in the ATM network, a loading state ~a state of cell arrival) ~or a multiplexed transmission path changes in time as shown in Fig. 2, which shows a typical example.
As shown in Fig. 2, usually a plurallty of virtual channels are multiplexed in the transmission path, while the generation of the cells for each virtual channel fluctuate in time in general7 so that the state of cell ~1~5~43~j arrival in the transmission path in which the virtual channels are multiple~ed is also changing in tlme.
Moreover, when the cells of each virtual channel transmitted ~rom each terminal include the loss intolerable cells (CLP = 0) and the loss tolerable cells (CLP = 1), the multiplexed cells of a plurallty o~ virtual channels arriving at the transmission path can also be classified into the cells with CLP = 0 and the cells with CLP = 1, as shown in Fig. 2.
In Fig. 2, shaded regions El and E2 are those at which a number o~ cells arriving at the transmission path per unit time e~ceeded the capacity of the multiple~ed transmisslon path. The cells o-E these regions E~ and E2 are either stored by a queueing buffer at a node until the capacity becomes available again or discarded as a result of a bu~er overflow.
This queueing bu~fer is to be controlled such that, in a case of discarding cells, the cells with the lower priority level (loss tolerable cells) are discarded ~irst, be~ore discarding any cell with the higher priority level (loss intolerable cell).
For example, as shown in Fig. 3, in a case o~ the buffer overflow, the CLP ~ields of ~he cells stored ln the queueing buf~er are checked to pick out the loss tolerable cells to be discarded ~irst. This manner of controlling the queueing bu~er is called a pushout scheme.
Alternatively, as shown in Fig. 4, a threshold smaller than the full buffer capacity is se$ up in the queueing buf~er, such that when a number of cells stored in the queueing buffer exceeds this threshold, any newly arriving loss tolerable cell is discarded without being admitted into the queueing buffer, while a newly arriving loss intolerable cell is admitted into the queueing buf~er up to the full buffer capacity. This manner of controlling the queueing buffer ls called a threshold scheme.

20S(~436 By controlling the queuelng buf~er as shown in Fig. 3 or Fig. 4, the cell loss rate ~or the loss lntolerable cells can be made lower than that for the loss tolerable cells.

Now, the method o~ controlling data transmission in such an ATM network incorporating the cell loss priority according to the present invention will be described in detail.
First, accordlng to the present invention, the cell loss priority control is carrled out for the entire multlplexed cells of a plurality of virtual channels allocated to a single bandwidth as a whole, without recognizing individual virtual channel separately, in order to avoid introducing an excessive complexity into the control algorithm.
Thus, according to the present invention, the network secures the quality o~ service which can be satisfied ~or each virtual channel separately without recognizing each virtual channel separately.
As a cholce o~ such an quality of service to be secured by the network, the ~ollowing two cases can be considered.
(I3 A case of secur~ng only the cell loss rate for the loss intolerable cells.
~ II) A case of securing the cell loss rate for the loss tolerable cells and the cell loss rate for the loss intolerable cells separately.
The embodiments based on each o~ these cases will now be described in detail.

First, an embodiment based on a case (I) of securing only the cell loss rate ~or the loss intolerable cells will be described.
In this case, a loading state (a state of cell 2~S~.3~j, arrival) for the multiplexed transmission path changes in time as shown in Fig. 5, which shows a typical example.
At a time of connection set up request, each terminal declares to the network the traffic characteristics (and a level of the cell loss rate) ~or only the loss intolerable cells (CLP = 0) among the cells belonging to the virtual channel to be set up, while not declaring anything for the loss tolerable cells (CLP = 1). Therefore, the network can comprehend and manage the trafflc for only the loss intolerable cells and does not concern at all about the loss tolerable cells, either for each virtual channel separately or ~or the multiplexed virtual channels as a whole.
When the network carries out the priority control such as that the threshold scheme shown in Fig. 4, it is possible for the network to carry out the connection set up control which can safeiy secure the cell loss rate for the loss intolerable cells under the assumptlon that only the cell intolerable cells can use the buf~er area behind the threshold, wlthout concerning the existence of any loss tolerable cell at all.
Consequently, only those data which are hopefully transmitted but not critically important should be transmitted as the loss tolerable cells from each terminal in this case.
For example, when the data to be transmitted are the image data encoded hierarchically into upper bits and lower bits, the upper bits which are critically important should be transmitted as the loss intolerable cells, whereas the lower bits which have less influence on the visual appearance of the image should be transmitted as the loss tolerable cells.
More specifically, as a choice for the traffic characteristics for the loss intolerable cells to be declared by each terrninal, there are several candidates ~S!~3 Ei including a peak rate such as a minimum cell arrival interval, and an average rate such as a maximum number of arriving cells within a given period of time.
A connection admission control at each ATM exchange node in this case can be carried out according to a ~low chart of Fig. 6, as -follows.
Namely, at each ATM exchange node, an information concerning currently transmitting virtual channels and the traffic ch~racteristics of the loss intolerable cells belonging to these currently transmittlng vlrtual channels are stored in a ~form of a transmitting VC table 100 for all the communication resources managed.
Then, at the step 101, the connection admission control is initiated by receiving a VC set up request message containing the traffic characteristics for the loss intolerable cells belonging to the virtual channel to be set up as a declaration parameter.
Next, at theistep 102, the admission or re~ection of the VC set up request is determined by ~udging whether the prescrlbed cell loss rate can be satis~ied for the loss intolerable cells of the currently transmitting virtual channels and the virtual channel to be set up in a case of admitting the set up o~ the virtual channel to be set up requested by the ~C set up request, by using the transmitting VC table 100 and the declared in~ormation on the traffic characteristic for the loss intolerable cells belonglng to the virtual channel to be set up.
Here, this determination of the admission or reJection can be carried out by either one o-f the following two methods.
(1) Each time the VC set up request is generated, the estimated cell loss rate ~or the loss intolerable cells of the currently transmitting virtual channels and the virtual channel to be set up are estimated according to the traffic characteristics of the currently transmitting vlrtual S04~E;

channels and the virtual channel to be set up, and then the estimated cell loss rate so obtained is compared with th~
prescribed cell loss rate for the loss intolerable cells 110 .
(2) An upper limlt for a number of virtual channels that can be transmitted simultaneously while satisfying the prescribed cell loss rate is determined ln advance by carrying out an approximation calculation, simulation, or experlment, and *his upper limit is stored in a ~orm o~ a connection possible VC table. Then, when the VC set up request is generated, the admission or re~ection is determined by comparing the number of virtual channels in the connection possible VC table and the transmitting VC
table.
When the requested set up of the virtual channel is admitted at the step 102, the transmitting VC table is - updated at the step 103, and the connection processing for the set up of the virtual channel ls carried out at the step 104.
- Next, an embodiment based on a case (II) o~ securing the cell loss rate for the loss tolerable cells and the cell loss rate for the loss intolerable cells separately will be described.
In this case, a loading state (a state of cell arrival] for the multiplexed transmission path changes in time as shown in Fig. 7 which shows a typical example.
At a time of connectlon set up request, each terminal declares to the network the traffic characteristics (and a level of the cell loss rate) for the loss intolerable cells (CLP = 0) belonging to the virtual channel to be set up, as well as the traffic characteristics (and a level of the cell loss rate) for the loss tolerable cells (CLP = 1) belonging to the virtual channel to be set up. Therefore, the network can comprehend and manage the traffic for both ~0~;~4~3~

the 105s intolerable cells and the loss tolerable cells, separately.
The network carries out the priority control at the queueing buffer such as that shown in Fig. 3 or Fig. 4, while carrying out the connection admission control which : can estimate and secure the cell loss rate for both the loss intolerable cells and the cell tolerable cells separately.
Thls case (II) is capable of providing the most detalled securing of the quallty of service by the network, although the amount of information required ~or the control becomes larger.
More specifically, as a choice for the traffic characteristic for the loss intolerable cells and the loss tolerable cells to be declared by each terminal, there are several candidates including a peak rate such as a min1mum cell arrival lnterval, and an average rate such as a maximum number of arriving cells within a given period of time.
A connection admisslon control at each ATM exchange node in this case can be carried out according to a flow chart of Fig. 10, as follows.
Namely, at each ATM exchange node, an informatlon concerning currently transmitting virtual channels and the traffic characteristics o~ both the loss intolerable cells and the loss tolerable cells belonging to these currently transmitting ~irtual channels are stored separately in a form of a transmitting VC table 200 ~or all the communication resource managed.
Then, at the step 201, the connection admission control ~ 5 initiated by receiving a VC set up request message containing the traffic characteristics for both the loss intolerable cells and the loss tolerable cells belonglng to ~he virtual channel to be set up separatelY as declaration parameters.

2Cl1~04~6 Next, at the step ~02, the ~dmiss~on or re~ection of the VC set up request is determined by Judging whether the ~rescribed cell loss rate can be satis~ied ~or both the loss lntolerable cells and the loss tolerable cells of the currently transmittlng virtual channels and the virtual - channel to be set up in a case of admitting the set up of the virtual channel to be set up requested by the VC set up request, by using the transmitting ~C table 100 and the declared in~ormation on the traf~ic characteristics for both the loss intolerable cells and loss tolerable cells belonging to the virtual channel to be set up.
Here, this determination of the admission or rejection can be carried out by either one of the following two methods.
~1) Each time the VC set up request is generated, the estimated cell loss rates for both the loss intolerable cells and the loss tolerable cells of the currently transmitting virtual channels and the virtual channel to be set up are estimated separately according to the traf~ic characteristics of the currently transmitting virtual channels and the.virtual channel to be set up, and then the estimated cell loss rates so obtained are compared with the prescribed cell loss rates for the loss intolerable cells and for the loss tolerable cells 210 separately.
(2) Upper limits for a number of virtual channels that can be transmitted simultaneously while satisfying the prescribed cell loss rates for the loss intolerable cells and for the loss tolerable cells are determined separately in advance by carrying out an approximation calculation, simulation, or experiment, and these upper limits are stored in a ~orm o~ a connection possible VC table. Then, when the VC set up request is generated, the admission or re~ection ls determined by comparing the number of virtual channels ln *he connection possible VC table and the transmitting VC table.

~2~5~3$

When the requested set up of the virtual channel is admitted at the step 202, the transmitting VC table is updated at the step 203, and the connection processlng ~or the set up of the virtual channel is carried out at the step 204.

Now, it is also necessary ~or the network to monitor whether the tra~ic characteristics declared by each terminal at a tlme o~ the connection set up request is faithfully maintained or not, and to regulate the c~ low in a case there is a violation. Such a usage parameter control in a case lnvolving two types of the cells ~ith two di~ferent cell loss priority levels described above will now be described ln detail.
First o~ all, an ATM network has a configuration schematically shown in Fig. 9, where the ATM exchange includes a plu,rality of subscriber line interfaces 13a to 13n which are connected to a plurality of æubscriber transmlssion lines lla to lln, a plurality of transit l~ne ~nterfaces 17a to 17n which are connected to a plurality of transit transmission lines l9a to 19n, and an ATM switch 15 which transmits cells by hardware. In such a con~lguration, a subscrib~r line inter~ace is included only in the subscriber ATM exchange and not in the transit ATM
exchange.
In this ATM network, the above mentioned usage parameter control function is provided in ~he subscriber line interfaces 13a to 13n, which monitors a number of cells in each virtual channel transmitted ~rom the subscriber transmission lines lla to lln.
Here, as a choice for a type of cells to be monitored by this usage parameter control functlon, the following two cases can be considered.
(i) A case of monltoring only the loss intolerable cellæ.

~)5~4:~

(ii) A case of monitoring the loss tolerable cells and the loss lntolerable cells separately.
The embodiments based on each of these cases will now be described in detail.

First, an embodiment based on a case ~i) o~ monitoring only the loss intolerable cells will be described.
In this case, at a time of connection set up request, each terminal declares to the network the tra~fic characteristics (and a level of the cell loss rate~ for only the loss intolerable cells (CLP = 0) among the cells belonging to the virtual channal to be set up, while not declaring anything for the loss tolerable cells (CLP = 1).
Then, while carrying out the connection admission control which secure the cell loss rate only for the loss intolerable cells, the network also monitors whether the traffic characteristic for the loss intolerable cells for each virtual channel declared by each terminal at a time of the connection set up request is faithfully maintained or not.
When a terminal transmitting the cells by violating the declaration is detected, it must be regulated by the usage parameter control in order to prevent an adverse effect due to thls violation on the loss intolerable cells of the other virtual channels which are not violating the declarations.
Such a usa~e parameter control can be realized by the followlng three methods.
A first method is to simply discard all the violation cells which are transmitted by violating the declaration.
This method is quite simple and therefore practical, but it requires a very accurate algorithm for ~udglng which cells are the violation cells. This is because it is qulte undesirable for the network to irretrievably discard the cells which the terminal belleves to have transmitted ln , , ~

)43~i accordance wikh the declaration, without any notice.
A second method is to a*tach a violation tag indicating the violation cell to a field other than CLP, VPI, VCI, and HEC in the ATM cell header section, such as the PT field or the Res field for example, of each violation cell.
For example, this method operates in an exemplary configuration of the ATM network shown in Fig. 10 in which the data are to be transmitted ~rom one subscr~ber terminal 20 to another subscriber terminal 30 through a subscriber transmission line 21A, an ATM exchange 25A, a transit transmission line 29A, an ATM exchange 25B, a transit transmission line 29B, an ATM exchange 25C9 and a subscriber transmission line 21B. The monitorlng of the loss intolerable cells in each virtual channel transmitted ls carried out by a subscriber line interface of the ATM
exchange 25A.
i Here, at the subscriber line interface, the violation tags are attached to the PT fields or the Res fields ln the ATM cell header sections of those loss intolerable cells which are ~udged to be the violation cells, and then transmitted to the ATM switch of the ATM exchange 25A.
Then, in a case a need for discarding of the cells arises at any one of the ATM e~changes 25A, 25B, and 25C, the network starts discarding the loss tolerable cells and the loss in~olerable cells with the violation tags first, be~ore discar~ing any non-violation loss intolerable cell, so as to prevent the unfair deterioration of the cell loss rate for the loss intolerable cells without the violation tags. Here, the loss tolerable cells and the violation cells may be treated equally, or may be given the different priority levels.
The usage parameter control algorithm ~or monitoring only the loss intolerable cells in this case is roughly shown in Fig. ll~A~. Namely, when the cell is received at .~50~3~;

the step 300, a usage parameter control unit in the subscriber line interface checks the CLP values o~ the received cell and whether the received cell has CLP = 0 or not is determined at the step 301. I~ no, the cell is the loss tolerable cell which is unconditionallY transmitted, whereas otherwise next at the step 302, whether the cell is transmitted by violating the declaration or not is determined. I~ no, the cell is the non-violation loss intolerable cell which can be transmitted as it is, whereas otherwise next at the step 303, the cell is transmitted with the violation tag attached.
A third method is to change the bit value o~ the CLP
field in the ATM cell header section of each violation cell ~rom 0 indicating the loss intolerable status to 1 indicating the loss tolerable status.
In this method, similarly to the second method described above, at the subscriber line interface o~ the ATM exchange 25A carrying out the monitoring function, the bit values o~ the CLP fields in the ATM cell header sections of those loss intolerable cells which are ~udged to be the violation cells are changed from 0 to 1, and then transmitted to the ATM switch of the ATM exchange 25A.
Then, in a case a need for discarding of the cells arises at any one o~ the ATM exchanges 25A, 25B, and 25C, the network starts discarding the cells with CLP = 1 first, be~ore discarding any cell with CLP = 0, so as to prevent the unfair deterioration o-E the cell loss rate for the non-violatlon loss intolerable cells.
The usage parameter control algorithm for monitoring only the loss lntolerable cells ln this case is roughly shown in Fig. ll(B). Namely, when the cell is received at the step 400, a usage parameter control unit in the subscriber line interface checks the CLP values of the received cell and whether the received cell has CLP = 0 or not is determined at the step 401. I~ no, the cell is the ~2~i04~

loss tolerable cell which is unconditlonally transmitted, whereas otherwise next at the step 402, whether the cell is transmitted by violating the declaration or not is determined. If no, the cell is the non-violation loss intolerable cell which can be transmitted as it is, whereas otherwise next at the step 403, the cell is transmitted with the CLP changed from 0 to 1.

Next, an embodiment based on a case (ii) of monitoring the loss intolerable cells and the loss tolerable cells separately will be described.
In this case, at a time of connection set up request, each terminal declares to the network the traffic characteristics for the loss intolerable cells (CLP = 0) among the cells belonging to the virtual channel to be set up, as well as the traffic characteristic for the loss tolërable cells (CLP = 1) among the cells belonging to the virtual channel to be set up. Then, while carrying out the connection admission control which secure the cell loss rates for the loss intolerable cells and the loss tolerable cells separately, the network also monitors whether the traffic characteristics ~or the loss intolerable cells and the loss tolerable cells for each virtual channel declared by each terminal at a time of the connection set up request are faithfully maintained or not.
When a terminal transmitting the cells by violating the declaration is detected, it must be regulated by the usa~e parameter control in order to prevent an adverse e~fect due to this violation on the cells of the other virtual channels which are not violating the declarations.
Such a usage parameter control can be realized by the following four methods.
A first method is to simply discard all the violation cells which are transmitte~ by violating the declaration, regardless of whether the cell is the loss intolerable cell .~50436 or the loss tolerable cell. This method is quite simple and there~ore practical, but it requires a very accurate algorithm for Judging which cells are the Ylolation cells.
Thls is because it is quite undesirable for the network to irretrievably discard the cells which the terminal believes to have transmitted in accordance with the declaration, without any notice.
A second method is to discard the violation cells which are the loss tolerable cells ~CLP = 1), and to change the bit value o~ the CLP field in the ATM cell header section of each violation cell which is a loss intolerable cell (CLP = O) from O indicating the loss intolerable status to 1 indicating the loss tolerable status.
In this method, at the subscriber line interface of the ATM exchange 25A carrying out the monitoring function, the bit values o~ the CLP fields in the ATM cell header sections o~ those loss intolerable cells which are judged to be the vio~ation are changed from O to 1, and then transmitted to the ATM switch of the ATM exchange 25A.
Then, in a case a need for discarding o~ the cells arises at any one of the ATM exchanges 25A, 25B, and 25C, the network starts discarding the cells with CLP = 1 -first, be~ore discarding any cell with CLP = O. Here, i~ the violation cells are the loss intolerable cells (CLP = O), the number o~ the loss tolerable cells (CLP = 1) will be increased from that declared after the CLP o-E the violation loss intolerable cells are changed, so that there is a possibillty that the actually realized cell loss rate ~or the loss tolerable ~ells is greater than that suppossd to be secured by the network. However, the cells to be discarded ln this ease will be predominantly the cells with CLP = 1, so that the un~air deterioration o~ the cell loss rate ~or the non-violation loss lntolerable cells can be prevented.
The usage parameter control algorithm ~or monitorlng 50d~36 the loss intolerable cells and the loss tolerable cells separately ln thls case is roughly shown in Fig. 12(A).
Namely, when the cell is received at the step 500, a usage parameter control unit in the subscriber line lnterface checks the CLP values of the received cell and whether the - recei~ed cell has CLP = O or not is determined at the step 501. If yes, next at the step 50Z, whether the cell is transmitted by violating the declaration or not is determined. If no, the cell is transmitted, whereas otherwise next at the ~tep 503, the cell is transmitted with the CLP changed ~rom O to 1. On the other hand, if the cell has CLP = 1 at the step 501, next at the step 504, whether the cell is transmitted by violating the declaratlon or not 1s determined. If no, the cell ls transmitted, whereas otherwise next at the step 505, the cell is discarded.
A third method is to discard the violation cells which are the loss tolerable cells (CLP = 1), and to attach a violation tag indicating the violation cell to a field other than CLP, VPI, VCI, and HEC in the ATM cell header section, such as the PT field or the Res ~ield for example, of each violation cell which is a loss intolerable cell (CLP = O). Thus, in this method, three types of cells including the cells with CLP = 1, the cells with CLP = O
and the violation tags, and the cells with CLP = O without the vlolation tag exist in the network.
In this method, at a subscriber line inter~ace carrying out the monitoring ~unction, the violation tags are attached to the PT fields or the Res fields in the ATM
cell header sections of those loss intolerable cells which are ~udged to be the violation cells, and then transmitted to the ATM switch of the ATM e~change 25A.
Then, in a case a need for discarding o-f the cells arises at any one of the ATM exchanges 25A, ~5B, and 25C, the network starts discarding the cells with CLP = O and ~5~36 the vlolation tags first, and then thP cells with CLP = 1 (loss tolerable cells) next, before discarding any cell with CLP-= O without the violation tag, so as to prevent the unfair deterioration of the cell loss rates for the non-violation loss intolerable cells and the non-violation - loss tolerable cells separately.
The usage parameter control algorithm ~or monitorlng the loss intolerable cells and the loss tolerable cells separately in this case is roughly shown in Fig. 12~B).
Namely, when the cell is received at the step 600, a usage parameter control unit ln the subscriber line lnterface checks the CLP values of the received cell and whether the received cell has CLP = O or not is determined at the step 601. If yes, next at the step 602, whether the cell is transmitted by violating the declaration or not is determined. I-~ no, the cell is transmitted, whereas otherwise next at the step 603, the cell is transmitted with the vlolation tag attached. On the other hand, if the cell has CLP = 1 at the step 601, next at the step 604, whether the cell is transmitted by ~iolating the declaration or not is determined. If no, the cell is transmitted, whereas otherwise next at the step 605, the cell is discarded.
A ~ourth method is to attach a violation tag indicating the ~iolation cell to a ~ield other than CLP, YPI, VCI, and HEC in the ATM cell header section, such as the PT field or the Res ~ield for example, of each violation cell, regardless o~ whether ~he cell is a loss intoIerable cell (CLP = O) or a loss tolerable cell (CLP =
1). Thus, in thls method, four types o~ cells including the cells with CLP = 1 and the violation tags, the cells with CLP = 1 without the violation tag, the cells wlth CLP = O
and the violation tagQ, and the cells with CLP = O without the violation tag exist in the network.
In this method, at a subscriber llne inter~ace ~S~43~

carrying out the monitoring ~unctlon~ the violation tags are attached to the PT ~ields or the Res fields in the ATM
cell header sections of those cells which are ~udged to be the violation cells, and then transmitted to the ATM switch of the ATM exchange 25A.
Then, in a case a need ~or discarding of the cells arises at any one of the ATM exchanges 25A, 25B, and 25C, the network starts discarding the cells in an order of the cells with CLP = 1 and the violation tags first, the cells with CLP = O and the violation tags next, the cells with CLP = 1 without the violation tag next, and the cells with CLP = O ~ithout *he violation tag last, so as to prevent the unfair deterioration of the cell loss rates o~ the non-violation loss intolerable cells and the non-violation loss tolerable cells separately.
The usage parameter control algorithm for monitoring the loss intolerable cells and the loss tolerable cells separately ln this case is roughlY shown in Fig. 12(C~.
Namely, when the cell ls received at the step 700, a usage parameter control unit in the subscriber line interface checks the CLP values o~ the received cell and whether the received cell has CLP = O or not is determined at the step 701. If yes, next at the step 702, whether the cell is transmitted by violating the declaration or not is determined. I~ no, the cell is transmitted, whereas otherwise next at the step 703, the cell is transmitted with the violation tag attached. On the other hand, if the cell has CLP = 1 at the step 701, next at the step 704, whether the cell is transmitted by violating the declaration or not is determined. I~ no, the cell is transmitted, whereas otherwise next at the step 705, the cell is transmitted with the violation tag attached.

Referring now to Fig. 13, another embodiment o~ the method of controlling data transmission in such an ATM

~0~;0ai36 network lncorporating the cell loss priorlty according to the present invention will be descrlbed in detail.
In this ambodiment, at a time of connection set up request, each terminal declares to the network a ratio of numbers 01 the loss intolerable cells and the loss - tolerable cells in each virtual channel to be set up, along with the other parameters to be declared.
Then, the network carries out the connection admission control according to a class o~ the declared ratio of numbers of the loss intolerable cells and the loss tolerable cells. Namely, the network divide the available communication resource into a plurality of mutually exclusive sub-resources ln correspondence with a plurality of classes 01 the declared ratio, and carries out the connection admission control with respect to each o~ these sub-resources separately.
Hereafter, the description of-this embodiment will be given for an exemplary case o~ a connection admiæsion control for a certain class of cells, with the bandwidth as the communication resource.
Now, the ratio of numbers o~ the loss intolerable cells and the loss tolerable cells is denoted by r 5 o s a S
r < b 5 1), i.e., r = (number 0`1 loss intolerable cells)/(number of loss intolerable cells I number of loss tolerable cells), where a and b are predetermined numbers and it ls assumed that the cells for which r is between a and b are to be admitted.
The connection admission control in this case will be carried out according to the llow chart shown ~n Fig~ 13, as follows.
First, at the step S1, the connection set up request is made from the termlnal, and then in response, the connection is classified according to the declared ra~io at the step S3. Next, at the step S5, the requested cell loss rate can be satisfied by the bandwidth allocated to the ~C~5~ 3~;

class of the connection determined at the step S3 even when *he requested connection set up is admitted is ~udged. When it is Judged to be possible to satisfy, the requested connection set up is admitted at the step S7, whereas when it is ~udged to be impossible to satisfy, the requested connection set up is re~ected at the step S9.
Now, in th1s embodiment, at a time of connection set up request, each terminal is also supposed to request to the network a level of cell loss rate for the entire cells including the loss intolerable cells (CLP = 0) and the loss tolerable cells (CLP = 1) belonging to the virtual channel of the class to be set up. Here, there is a possibility for the loss intolerable cells to be discarded, but such a possibility is much smaller compared with the cell loss rate for the loss tolerable cells, so that it sufflces to consider only the cell loss rate for the loss tolerable cells in discussing the cell loss rate for the entire cells. Hereinbeiow, the cell loss rate for the loss tolerable cells in the multiplexed virtual channels is denoted by CLR1, while the cell loss rate for the loss intolerable cells in the multiplexed virtual channels is denoted by CLR0.
First, the cell loss rate for the entire cells including the loss intolerable cells (CLP = 0) and the loss tolerable cells (CLP = 1) belonging to the virtual channel of the class to be set up can be secured as follows.
In a case all the virtual channels of the class request the same cell loss rate~ the connection admission control is carried out as follows. Here, lt is assumed that the cell loss rate for the cells of each cell loss priority class can be estimated from the traffic characteristics for the cells of each cell loss priority class.
When the cell loss rate for the entire cells requested by the virtual channels of the class is CLR(REQ), the connection admlssion control is carried out such that the Z~S~ 3~.
~ollowing equa*ion ~1) can be satis*ied.

CLR(REQ) > CLR1 x (1-a) (1) The worst posslble cell loss rate for each virtual channel can be estimated as CLR1 x (1-a), so that the requested cell loss rate CLR(REQ) can be secured ~or all the virtual channels by carrylng out the connection admission control according to the above equation (1).
It is to be noted that many modi~ications and variations of the above embodiments may be made without departing from the novel and advantageous features of the present invention. Accordingly, all such modi~ications and variations are intended to be included within the scope of the appended claims.

~5

Claims (11)

1. A method of controlling data transmission in an ATM
network, in which data are transmitted in units of cells, a group of cells are transmitted from a terminal to the network by setting up a virtual channel, and a plurality of virtual channels are multiplexed at the network, comprising the steps of:
providing a cell loss priority field in each cell to be transmitted with a cell loss priority level at a terminal;
declaring from the terminal to the network a traffic characteristic for loss intolerable cells with a higher cell loss priority level in each virtual channel to be set up at a time of a connection set up request; and carrying out at the network a connection admission control by estimating a cell loss rate for the loss intolerable cells on a basis of the traffic characteristic declared at the declaring step, such that only the cell loss rate for the loss intolerable cells in the multiplexed virtual channels is secured by the network on a basis of the estimated cell loss rate for the loss intolerable cells.
2. The method of claim 1, further comprising the step of monitoring a traffic of the loss intolerable cells in each virtual channel in order to detect violation loss intolerable cells which are the loss intolerable cells transmitted in excess of the traffic characteristic declared at the declaring step.
3. The method of claim 2, further comprising the step of discarding the violation loss intolerable cells detected at the monitoring step.
4. The method of claim 2, further comprising the steps of:
attaching a violation tag to a cell header section of each of the violation loss intolerable cells detected at the monitoring step.
5. The method of claim 2, further comprising the steps of:
changing the cell loss priority level in a cell loss priority field of each of the violation loss intolerable cells detected at the monitoring step from a higher level to a lower level.
6. A method of controlling data transmission in an ATM
network, in which data are transmitted in units of cells, a group of cells are transmitted from a terminal to the network by setting up a virtual channel, and a plurality of virtual channels are multiplexed at the network, comprising the steps of:
providing a cell loss priority field in each cell to be transmitted with a cell loss priority level at a terminal;
declaring from the terminal to the network traffic characteristics for loss intolerable cells with a higher cell loss priority level and loss tolerable cells with a lower cell loss priority level in each virtual channel to be set up at a time of a connection set up request; and carrying out at the network a connection admission control by estimating cell loss rates for the loss intolerable cells and the loss tolerable cells separately on a basis of the declared traffic characteristics, such that the cell loss rates for the loss intolerable cells and the loss tolerable cells in the multiplexed virtual channels are secured separately by the network on a basis of the estimated cell loss rates for the loss intolerable cells and the loss tolerable cells.
7. The method of claim 6, further comprising the step of monitoring a traffic of the loss intolerable cells and the loss tolerable cells in each virtual channel separately in order to detect violation cells which are the cells transmitted in excess o* the traffic characteristic declared at the declaring step.
8. The method of claim 7, further comprising the steps of:
changing the cell loss priority level of each of the violation cells which are the loss intolerable cells detected at the monitoring step from a higher level to a lower level; and discarding the violation cells which are the loss tolerable cells detected at the monitoring step.
9. The method of claim 7, further comprising the steps of:
attaching a violation tag to a cell header section of each of the violation cells which are the loss intolerable cells detected at the monitoring step; and discarding the violation cells which are the loss tolerable cells detected at the monitoring step.
10. The method of claim 7, further comprising the steps of:
attaching a violation tag to a cell header section of each of all the violation cells detected at the monitoring step including the violation cells which are the loss intolerable cells and the violation cells which are the loss tolerable cells.
11. A method of controlling data transmission in an ATM

network, in which data are transmitted in units of cells, a group of cells are transmitted from a terminal to the network by setting up a virtual channel, and a plurality of virtual channels are multiplexed at the network, comprising the steps of:
providing a cell loss priority field in each cell to be transmitted with a cell loss priority level at a terminal;
declaring from the terminal to the network a ratio of numbers of loss intolerable cells with a higher cell loss priority level and loss tolerable cells with a lower cell loss priority level in each virtual channel to be set up at a time of a connection set up request;
classifying at the network the virtual channels into a plurality of virtual channel classes according to the ratio declared at the declaring step;
dividing at the network a communication resource into a plurality of sub-resources in correspondence with the plurality of the virtual channel classes; and carrying out at the network a connection admission control for each of the virtual channel classes classified at the classifying step separately.
CA002050436A 1990-08-31 1991-08-30 Method of controlling date transmission in atm network with cell loss priority level Abandoned CA2050436A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP23154990A JP3241716B2 (en) 1990-08-31 1990-08-31 ATM exchange method
JP2-231549 1990-08-31

Publications (1)

Publication Number Publication Date
CA2050436A1 true CA2050436A1 (en) 1992-03-01

Family

ID=16925237

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002050436A Abandoned CA2050436A1 (en) 1990-08-31 1991-08-30 Method of controlling date transmission in atm network with cell loss priority level

Country Status (5)

Country Link
US (1) US5267232A (en)
EP (1) EP0473188B1 (en)
JP (1) JP3241716B2 (en)
CA (1) CA2050436A1 (en)
DE (1) DE69114789T2 (en)

Families Citing this family (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3128654B2 (en) 1990-10-19 2001-01-29 富士通株式会社 Supervisory control method, supervisory control device and switching system
US5321692A (en) * 1991-04-09 1994-06-14 Siemens Aktiengesellschaft Method for checking the admissibility of setting up virtual connections
JPH0548638A (en) * 1991-08-15 1993-02-26 Fujitsu Ltd End to end congestion coping control processing system in atm network
US5850385A (en) * 1991-09-24 1998-12-15 Kabushiki Kaisha Toshiba Cell loss rate sensitive routing and call admission control method
JPH0614049A (en) * 1992-03-19 1994-01-21 Fujitsu Ltd Cell abort controller in atm and its method
SE515178C2 (en) * 1992-03-20 2001-06-25 Ericsson Telefon Ab L M Procedures and devices for prioritizing buffer management in packet networks
US5381404A (en) * 1992-07-14 1995-01-10 Mita Industrial Co., Ltd. Packet-switching communication network and method of design
JPH0646082A (en) * 1992-07-22 1994-02-18 Toshiba Corp Information transfer control system
DE4232652C2 (en) * 1992-09-29 1994-06-09 Siemens Ag Method for allocating switching resources in a communication system operating in asynchronous transfer mode
GB2272612B (en) * 1992-11-06 1996-05-01 Roke Manor Research Improvements in or relating to ATM signal processors
SE515274C2 (en) * 1992-11-09 2001-07-09 Ericsson Telefon Ab L M Package selector for telecommunication system
ES2068105B1 (en) * 1992-11-30 1995-11-01 Alcatel Standard Electrica METHOD AND DEVICE FOR DETECTION AND CORRECTION OF ERRORS IN ATM CELL HEADERS.
FI92361C (en) * 1992-12-14 1994-10-25 Nokia Telecommunications Oy Procedure for controlling overload situations in a frame switching network and a node for a frame switching network
US5359592A (en) * 1993-06-25 1994-10-25 Stratacom, Inc. Bandwidth and congestion control for queue channels in a cell switching communication controller
WO1995003657A1 (en) * 1993-07-21 1995-02-02 Fujitsu Limited Atm exchange
US5359593A (en) * 1993-08-26 1994-10-25 International Business Machines Corporation Dynamic bandwidth estimation and adaptation for packet communications networks
US5515377A (en) * 1993-09-02 1996-05-07 At&T Corp. Adaptive video encoder for two-layer encoding of video signals on ATM (asynchronous transfer mode) networks
JP2847612B2 (en) * 1993-09-08 1999-01-20 富士通株式会社 Cell assembly / separation equipment
JP3192039B2 (en) * 1993-09-13 2001-07-23 株式会社日立製作所 Traffic control method and network control system
JP3354689B2 (en) * 1994-02-28 2002-12-09 富士通株式会社 ATM exchange, exchange and switching path setting method thereof
US5487061A (en) * 1994-06-27 1996-01-23 Loral Fairchild Corporation System and method for providing multiple loss and service priorities
US5553061A (en) * 1994-06-27 1996-09-03 Loral Fairchild Corporation Packet processor having service priority and loss priority features
US5434848A (en) * 1994-07-28 1995-07-18 International Business Machines Corporation Traffic management in packet communications networks
JPH0897820A (en) * 1994-09-29 1996-04-12 Hitachi Ltd Upc circuit and performance monitoring cell processing circuit
FR2725573B1 (en) * 1994-10-11 1996-11-15 Thomson Csf METHOD AND DEVICE FOR CONTROLLING CONGESTION OF SPORADIC EXCHANGES OF DATA PACKETS IN A DIGITAL TRANSMISSION NETWORK
KR0133409B1 (en) * 1994-12-22 1998-04-27 Korea Electronics Telecomm Compensated upc/npc algorithm to generate qos in atm networks
US5677907A (en) * 1995-03-16 1997-10-14 Fujitsu Limited Method of calculating cell loss ratio and call accept controller using the same method
US5706279A (en) * 1995-03-24 1998-01-06 U S West Technologies, Inc. Methods and systems for managing packet flow into a fast packet switching network
US5623492A (en) * 1995-03-24 1997-04-22 U S West Technologies, Inc. Methods and systems for managing bandwidth resources in a fast packet switching network
NL9500585A (en) * 1995-03-27 1996-11-01 Nederland Ptt ATM policing body.
US5872918A (en) * 1995-07-14 1999-02-16 Telefonaktiebolaget Lm Erisson (Publ) System and method for optimal virtual path capacity dimensioning with broadband traffic
US5764740A (en) * 1995-07-14 1998-06-09 Telefonaktiebolaget Lm Ericsson System and method for optimal logical network capacity dimensioning with broadband traffic
AU6501496A (en) * 1995-07-19 1997-02-18 Ascom Nexion Inc. Point-to-multipoint transmission using subqueues
US5719864A (en) * 1995-08-11 1998-02-17 International Business Machines Corp. Logical channel resolution in asynchronous transmission mode communication systems
JPH11512583A (en) * 1995-09-14 1999-10-26 フジツウ ネットワーク コミュニケーションズ,インコーポレイテッド Transmitter-controlled flow control for buffer allocation in a wide area ATM network
JPH0993261A (en) * 1995-09-27 1997-04-04 Hitachi Ltd Atm exchange network and atm exchange
US5721833A (en) * 1995-12-29 1998-02-24 Gte Laboratories Incorporated Push-out of low priority signals from switch buffers
JP2000517488A (en) * 1996-01-16 2000-12-26 フジツウ ネットワーク コミュニケーションズ,インコーポレイテッド Reliable and flexible multicast mechanism for ATM networks
JP3622312B2 (en) * 1996-01-29 2005-02-23 株式会社日立製作所 Packet switch and cell transfer control method
JP3436845B2 (en) * 1996-06-18 2003-08-18 日本電信電話株式会社 Multi-class ATM call admission control method and apparatus
US5796723A (en) * 1996-06-28 1998-08-18 Mci Communications Corporation System and method for end-to-end threshold setting
US5787074A (en) * 1996-06-28 1998-07-28 Mci Communications Corporation System and method for monitoring point activation
US5768255A (en) * 1996-06-28 1998-06-16 Mci Communications Corporation System and method for monitoring point identification
US5886980A (en) * 1996-08-23 1999-03-23 Mitsubishi Electric Information Technology Center America, Inc. Bit stream based connection admission control system
US5748905A (en) * 1996-08-30 1998-05-05 Fujitsu Network Communications, Inc. Frame classification using classification keys
US5963542A (en) * 1996-09-03 1999-10-05 The United States Of America As Represented By The Secretary Of The Navy Asynchronous transfer mode cell loss estimator
US5862126A (en) * 1996-09-05 1999-01-19 Northern Telecom Limited Connection admission control for ATM networks
JPH10112717A (en) * 1996-10-04 1998-04-28 Fujitsu Ltd Cell flow rate control method in asynchronous transfer mode exchanger
JP3372797B2 (en) * 1996-12-06 2003-02-04 日本電気株式会社 Bandwidth reservation control method
JP2964968B2 (en) * 1996-12-06 1999-10-18 日本電気株式会社 Shaping processing apparatus and shaping processing method
US5953338A (en) * 1996-12-13 1999-09-14 Northern Telecom Limited Dynamic control processes and systems for asynchronous transfer mode networks
US6097722A (en) * 1996-12-13 2000-08-01 Nortel Networks Corporation Bandwidth management processes and systems for asynchronous transfer mode networks using variable virtual paths
JP2956639B2 (en) 1997-02-19 1999-10-04 日本電気株式会社 PVC switching system
JPH10294734A (en) * 1997-04-17 1998-11-04 Fujitsu Ltd Traffic controller in exchange and traffic control method
KR100231781B1 (en) 1997-04-18 1999-11-15 김영환 Connection admission control apparatus and method of different traffic of atm network
US6141322A (en) * 1997-05-09 2000-10-31 General Datacomm, Inc. Method and apparatus for precedence and preemption in ATM connection admission control
US6160818A (en) * 1997-07-17 2000-12-12 At &T Corp Traffic management in packet communication networks having service priorities and employing effective bandwidths
US5995487A (en) * 1997-08-06 1999-11-30 Northern Telecom Limited Method and apparatus for providing subscribers with unguaranteed bandwidth connections wherein subscribers are alerted by encoded messages or a warning tone
US6330226B1 (en) * 1998-01-27 2001-12-11 Nortel Networks Limited TCP admission control
US6222824B1 (en) * 1998-04-24 2001-04-24 International Business Machines Corporation Statistical call admission control
DE19854656A1 (en) * 1998-11-26 2000-06-08 Siemens Ag Method for coordinating packet loss priority information for overload control of a communication device which switches data packets
EP1142432A1 (en) * 1998-12-30 2001-10-10 Nokia Corporation Packet transmission method and apparatus
US6606301B1 (en) * 1999-03-01 2003-08-12 Sun Microsystems, Inc. Method and apparatus for early random discard of packets
CA2279652A1 (en) 1999-08-05 2001-02-05 Spacebridge Networks Corporation Method and apparatus for resource allocation in a cell/packet based network
US8161182B1 (en) 2000-01-26 2012-04-17 Cisco Technology, Inc. Managing network congestion using dynamically advertised congestion status
US6574195B2 (en) * 2000-04-19 2003-06-03 Caspian Networks, Inc. Micro-flow management
US7111163B1 (en) 2000-07-10 2006-09-19 Alterwan, Inc. Wide area network using internet with quality of service
US20030016625A1 (en) * 2001-07-23 2003-01-23 Anees Narsinh Preclassifying traffic during periods of oversubscription
US7599296B2 (en) * 2001-08-31 2009-10-06 Nec Corporation Method of transmitting data
US7570584B1 (en) 2002-03-29 2009-08-04 Cisco Technology, Inc. Network-wide congestion control of SPVC signaling messages
US7307949B1 (en) * 2002-11-19 2007-12-11 Juniper Networks, Inc. Hierarchical policers for enforcing differentiated traffic behavior
BR0318524A (en) * 2003-09-30 2006-09-12 Thomson Licensing quality of service control over a wireless LAN
US8547843B2 (en) 2006-01-20 2013-10-01 Saisei Networks Pte Ltd System, method, and computer program product for controlling output port utilization
US8300798B1 (en) 2006-04-03 2012-10-30 Wai Wu Intelligent communication routing system and method
US7697558B2 (en) * 2007-03-13 2010-04-13 Alcatel Lucent Emergency alert system enhancement using alert server and metro ATM network for DSL deployment
WO2013105991A2 (en) 2011-02-17 2013-07-18 Sable Networks, Inc. Methods and systems for detecting and mitigating a high-rate distributed denial of service (ddos) attack
EP2850793B1 (en) 2012-05-14 2016-09-21 Sable Networks, Inc System and method for ensuring subscriber fairness using outlier detection

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4484326A (en) * 1982-11-04 1984-11-20 At&T Bell Laboratories Packet load monitoring by trunk controllers
JP2865675B2 (en) * 1988-09-12 1999-03-08 株式会社日立製作所 Communication network control method
US5119367A (en) * 1988-10-28 1992-06-02 Oki Electric Industry Co., Ltd. Method and a node circuit for routing bursty data
JPH02220531A (en) * 1989-02-22 1990-09-03 Toshiba Corp Call connection control system and flow monitor system
JP2860661B2 (en) * 1989-03-14 1999-02-24 国際電信電話 株式会社 ATM switch
JP2964151B2 (en) * 1989-07-03 1999-10-18 富士通株式会社 Communication control method
FR2655223B1 (en) * 1989-11-27 1992-02-07 Cit Alcatel METHOD OF MANAGING FLOWS IN A BROADBAND BROADBAND DIGITAL TELECOMMUNICATION NETWORK, AND NETWORK FOR CARRYING OUT SAID METHOD.

Also Published As

Publication number Publication date
JP3241716B2 (en) 2001-12-25
US5267232A (en) 1993-11-30
EP0473188B1 (en) 1995-11-22
DE69114789T2 (en) 1996-05-09
DE69114789D1 (en) 1996-01-04
JPH04115643A (en) 1992-04-16
EP0473188A1 (en) 1992-03-04

Similar Documents

Publication Publication Date Title
CA2050436A1 (en) Method of controlling date transmission in atm network with cell loss priority level
US5546377A (en) Efficient distributed method for computing max-min fair rates of a limited resource in ATM networks
Saito Call admission control in an ATM network using upper bound of cell loss probability
US5754530A (en) Flow control of ABR traffic in ATM networks
US6021116A (en) Method and apparatus for controlling data transfer rate using virtual queues in asynchronous transfer mode networks
EP0719012B1 (en) Traffic management and congestion control for packet-based network
EP0647081B1 (en) Method and apparatus for controlling congestion in a communication network
CA2118471C (en) Upc-based traffic control framework for atm networks
US5905711A (en) Method and apparatus for controlling data transfer rates using marking threshold in asynchronous transfer mode networks
Chiussi et al. Dynamic max rate control algorithm for available bit rate service in ATM networks
US6587436B1 (en) Method and apparatus for allocation of available bandwidth
Sin et al. Adaptive proportional rate control for ABR service in ATM networks
US6865156B2 (en) Bandwidth control method, cell receiving apparatus, and traffic control system
US6542509B1 (en) Virtual path level fairness
US6859436B2 (en) Bandwidth control method, cell transmitting apparatus, and traffic control system
CA2205328C (en) Source traffic control method in atm network to prevent serious local congestion
Kawahara et al. Characteristics of ABR explicit rate control algorithms in WAN environments and an ABR control algorithm suitable for public networks
Ghani et al. Measurement‐based flow control for ABR services in ATM networks
KR100204052B1 (en) Congestion control method by detecting the queue length and traffic load in atm network
Vicari et al. Performance of the GFR-service with constant available bandwidth
KR100265070B1 (en) Cell rate and average cell rate control method in the monitoring information processing unit of asynchronous transmission mode that manages traffic in real time
Arulambalam Explicit congestion control algorithms for available bit rate services in asynchronous transfer mode networks
JP2831773B2 (en) Call connection control device in packet switching network
Liebeherr et al. A multi-level explicit rate control scheme for ABR traffic with heterogeneous service requirements
Kawahara et al. Characteristics of ABR explicit rate control algorithms in WAN environment

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued