WO1998026612A2 - Dynamic control processes and systems for asynchronous transfer mode networks - Google Patents

Dynamic control processes and systems for asynchronous transfer mode networks Download PDF

Info

Publication number
WO1998026612A2
WO1998026612A2 PCT/US1997/022776 US9722776W WO9826612A2 WO 1998026612 A2 WO1998026612 A2 WO 1998026612A2 US 9722776 W US9722776 W US 9722776W WO 9826612 A2 WO9826612 A2 WO 9826612A2
Authority
WO
WIPO (PCT)
Prior art keywords
virtual
transfer mode
control module
network
asynchronous transfer
Prior art date
Application number
PCT/US1997/022776
Other languages
French (fr)
Other versions
WO1998026612A3 (en
WO1998026612A9 (en
Inventor
Gregory Graham
Patrick S. Ma
Original Assignee
Northern Telecom Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northern Telecom Limited filed Critical Northern Telecom Limited
Priority to AU56003/98A priority Critical patent/AU5600398A/en
Publication of WO1998026612A2 publication Critical patent/WO1998026612A2/en
Publication of WO1998026612A3 publication Critical patent/WO1998026612A3/en
Publication of WO1998026612A9 publication Critical patent/WO1998026612A9/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L12/5602Bandwidth control in ATM Networks, e.g. leaky bucket
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/04Selecting arrangements for multiplex systems for time-division multiplexing
    • H04Q11/0428Integrated services digital network, i.e. systems for transmission of different types of digitised signals, e.g. speech, data, telecentral, television signals
    • H04Q11/0478Provisions for broadband connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5619Network Node Interface, e.g. tandem connections, transit switching
    • H04L2012/5621Virtual private network [VPN]; Private-network - network-interface (P-NNI)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5629Admission control
    • H04L2012/5631Resource management and allocation
    • H04L2012/5632Bandwidth allocation

Definitions

  • the present invention generally relates to the field of telecommunications equipment and processes and, more specifically, to the field of Asynchronous Transfer Mode (“ATM”) network management and control equipment and processes.
  • ATM Asynchronous Transfer Mode
  • TDM Time Division Multiplex
  • ATM Asynchronous Transfer Mode
  • TDM uses time slots to divide the bandwidth into fixed size channels
  • ATM uses 53 byte cells to divide the bandwidth into virtual channels.
  • Each cell includes a header that identifies a virtual path and virtual channel to which the cell belongs.
  • Cells can be allocated to a virtual channel in response to the needs of the users sending information over the virtual channel and the limits of the transmission facilities, physical interfaces, and switches that carry the virtual channel.
  • Virtual paths are used to group certain virtual channels together to aid in the management and routing of the virtual channels.
  • virtual path connections must be made through each switch that the virtual path traverses, connects, or through which the virtual path connection extends.
  • virtual channel connections must be constructed through each switch that the virtual channel traverses, connects, or through which the virtual channel extends.
  • Virtual channel connections can be made through provisioning by the operator, which is called a Permanent Virtual Connection ("PVC").
  • PVC Permanent Virtual Connection
  • virtual channel connections can be made through the use of signaling messages to request a connection, which is called a Switched Virtual Connection (“SVC").
  • a request for either a virtual path connection or a virtual channel connection, whether it is a PVC or SVC typically includes the quality of service and traffic parameters that characterize the connection.
  • the parameter corresponding to the quality of service indicates whether the requestor of the connection requires any guarantees from the network to transport data over the connection at a certain rate, which is described by the traffic parameter corresponding to the traffic
  • Parameters corresponding to traffic include features, such as peak cell rate, average cell rate, and cell delay variation. Parameters corresponding to traffic generally describe the network bandwidth that will be taken up by the connection.
  • CAC Connection Admission Control
  • a virtual channel connection When a virtual channel connection is requested, it must be placed in a virtual path, so that the CAC software can determine if there is enough bandwidth remaining in the virtual path to support the new virtual channel connection. Since virtual channel connections can only be made over existing virtual paths, virtual paths provide a way to control the maximum bandwidth taken up by virtual channels in the network and, as a result, are helpful in managing the bandwidth in an ATM network. However, because virtual paths are manually provisioned in a switch, the management capabilities that they provide are inflexible and static.
  • private communications networks can span a vast geographic area. In practice, it is cost prohibitive for private networks to install its own transmission facilities between different sites. Instead, private networks often lease dedicated transmission lines from a public carrier (e.g., AT&T or MCI). As a general rule, these leased lines are "nailed up" and are designed to provide full transmission capacity 24 hours a day regardless of its actual utilization. A large mesh of leased lines is typically required to provide connections between every site of a network. Furthermore, each private network will require its own mesh of leased lines. Private networks using leased lines are very expensive, because of the inefficient use of resources. Public carriers have attempted to solve this problem by allowing multiple clients to utilize the carrier's facilities and through software control have them appear as individual dedicated leased lines.
  • a public carrier e.g., AT&T or MCI
  • VPN Virtual Private Network
  • Preferred embodiments pertain to an apparatus and related methods and systems that generally manage networks and individually and collectively manage ATM switches. Note that preferred methods are preferably performed by the preferred apparatus and systems and are discussed in reference to the preferred apparatus and systems.
  • Preferred embodiments of the network are generally comprised of at least one virtual private network, which is provided by a service provider.
  • the virtual private network is comprised of a plurality of ATM switches that are interconnected with one another via one or more physical interfaces (e.g., fiber optic, twisted pair, coax, and wireless) to form the backbone of a network, which can span over a large geographical area.
  • Clients using the virtual path network generally have a local private network of one type or another, such as a local private data network and or a local private voice network.
  • a client's local private network(s) is(are) interconnected to a carrier's network backbone via a common communication infrastructure provided by the service provider. If so, a client's local private network shares transmission facilities with other networks.
  • Virtual connections e.g., virtual paths, virtual channels, groupings of virtual paths, and any combination thereof
  • Preferred embodiments bundle virtual channel(s) into a virtual path and virtual paths into grouping(s) of virtual paths.
  • Preferred embodiments have a system-wide, centralized control module to manage these virtual paths and/or virtual channels.
  • the control module is in direct communication with at least one ATM switch in the ATM network and in indirect communication with most, if not all, of the other ATM switches in the ATM network.
  • the control module controls the provisioning of each ATM switch in the ATM network, which, among other things, enables the centralized control module to set up and dvnamicallv change virtual paths and virtual channels as well as groups of virtual paths in an ATM network on an ongoing, continuous, real-time basis.
  • the control module specifically has the ability to dynamically control the assigned parameters (e.g., bandwidth) of virtual paths, virtual channels, and groupings of virtual paths. Specifically, regarding the operation of the control module, the control module considers one or more factors to determine whether the virtual connection through the network can be made.
  • control module determines on an ongoing basis whether the network is in an overload condition. The control module also checks the overload condition and determines whether the virtual connection can be set up for the network.
  • the reference to a client agreement concerning the client's use of the network defines acceptable parameter and quality of service requests for the virtual connection that are available to the client.
  • Preferred embodiments of the control module generally perform the following procedure: (i) checks with the agreement to determine whether the parameter requirements of the virtual connections are compliant with the agreement, (ii) checks with the agreement governing quality of service requests to determine whether the quality of service requirements of the virtual connections are compliant with the agreement, and (iii) determines whether the virtual connection has any available capacity. If the network is not in an overload condition and the control module does not otherwise allow(or object to) the creation of the virtual connection, the control module may allow the virtual connection to be set up in unspecified capacity of the network.
  • Preferred embodiments provide a number of advantages. Preferred embodiments manage an ATM switch dynamically and continuously, which allows for greater use of the available capacity of networks and, particularly, transmission facilities within a network. Preferred embodiments enable telecommunications companies that operate various types of networks for a multitude of clients to "lease" unspecified capacity on virtual paths in a virtual path group having certain features or parameters to other customers on an ATM backbone network, on an 'as needed' basis. Some of this capacity may, in fact, be owned by another party or already be leased to another party, but is not being used at the specific time that another party requests permission to use the capacity. Preferred embodiments thereby provide a technique of "throttling" the physical interfaces needed to shape the bandwidth consumed by the overall ATM networks. The importance of this capability should not be underestimated, as it effectively allows carriers to "over book” physical interfaces and transmission facilities (e.g., ATM links, ATM switches, and ATM networks) to ensure existing capacity will be used to the fullest extent possible.
  • physical interfaces and transmission facilities e.g
  • FIGURE 1 A is a diagram showing a preferred embodiment 180 of a virtual private network 170 having centralized control module 160 comprised of call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager module 150, ATM Edge Switch 130G, ATM Edge Switch 130H, ATM Edge Switch 1301, ATM Edge Switch 130J, and ATM Switch 130K;
  • FIGURE I B is a diagram showing a preferred embodiment 100 having ATM Network 120 connected directly and/or indirectly to multiple customer networks 1 10A, 1 10B, 1 10C, and 1 1 OK via physical interfaces 133, wherein ATM Network 120 is comprised of ATM Edge Switches 130A, 130B, 130C, . . . . and 130F interconnected with one another via physical interfaces 131 , at least one of which, ATM Edge Switch 130A, is connected to centralized control module 160 with bandwidth control module 1 50, centralized call admission control usage monitor module 145, and call control module 140 via one physical interface 133;
  • FIGURE 2 is a diagram showing the detailed view of the interrelationship of call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager module 150 of centralized control module 160 and ATM Switch 130K;
  • FIGURE 3 is an enlarged view of ATM Switch 300 having physical interface 302 extending from ATM Switch 300, physical interfaces 310 and 312 transferring voice information and data information, respectively, for Client A, physical interfaces 314 and 316 transferring voice information and data information, respectively, for Client B, which corresponds to ATM Switch 130K (in FIGURE 2), ATM Edge Switches 130G, 130H, 1301, and 130J (in FIGURE 1A), and ATM Switches 130A, 130B, 130C, . . .
  • FIGURES 4A, 4B, 4C, and 4D are diagrams that illustrate the relationship between the reserved and available bandwidth for specific ATM physical interfaces 141A, 141 B, 141 C, and 141 D (in FIGURE 1 A) in which virtual paths are grouped or pooled together for Clients A and B by a number of factors, such as Quality of Service (“QOS”) and bandwidth;
  • QOS Quality of Service
  • FIGURES 5A, 5B, 5C, and 5D are diagrams that show a switch level view of specific ATM physical interfaces 141A, 14 IB, 141C, and 141D (in FIGURE 1A) in which virtual paths are grouped or pooled together for Clients A and B by a number of factors, such as quality of service and bandwidth;
  • FIGURE 6 is a diagram showing a more generalized view of the use of virtual path groups in an ATM physical interface for Clients A and B with varying traffic types by preferred embodiments;
  • FIGURES 7A and 7B are drawings that highlight the organization and relationship between virtual paths 702 and virtual channels 703 that are managed and controlled by bandwidth manager module 150 of centralized control module 160 (in FIGURE 1A);
  • FIGURE 8 is a flow diagram for the procedure implemented by centralized call admission control/usage monitor module 145 in FIGURES 1A, IB, and 2;
  • FIGURES 9A and 9B are flow diagrams for subprocedures implemented by centralized call admission control/usage monitor module 145 in FIGURES 1A, IB, and 2, which are referenced in FIGURE 8, that monitor the availability of unspecified virtual paths and check the utilization level of each virtual path group to determine whether an overload condition exists;
  • FIGURE 10 is a flow diagram for the procedure implemented by bandwidth manager module 150 in FIGURES 1A, IB, and 2.
  • FIGURE 1A shows a preferred embodiment 180.
  • Virtual private network 170 is comprised of centralized control module 160 and ATM Edge Switches 130G, 130H,
  • ATM Switch 130K forms the backbone of virtual private network 170, whereas ATM Edge Switches 130G, 130H, 1301, and 130J have the additional interfaces needed to interact with various Clients A and B in order to concentrate these numerous small physical interfaces 142A, 142B, 142C, . . . , and 142F from clients into larger physical interfaces 14IA, 14 IB, 141C, and 141D.
  • Centralized control module 160 manages calls for virtual private network 170 and is generally comprised of call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager module 150.
  • call control module 140 handles the majority, if not all, of the call requests for virtual private network 170.
  • Centralized call admission control/usage monitor module 145 determines whether or not to allow a specific 'call' to access to virtual private network 170.
  • Bandwidth manager module 150 controls the size of all virtual paths in virtual private network 170 in response to and in conjunction with call control module 140 and centralized call admission control/usage monitor module 145.
  • Note call control module 140, centralized call admission control/usage monitor module 145 , and bandwidth manager module 150 preferably all run on a single computing platform (e.g., a computer), but, alternatively, may be configured to run on more than one separate computer platform at multiple locations.
  • a virtual private network may stretch a ⁇ oss large geographic distances.
  • ATM Edge Switches 130H and 130G may reside in Richardson, Texas, whereas ATM Edge Switches 1301 and 130 J may reside in Raleigh, North Carolina. And, ATM Switch 130K may reside somewhere else, such as in Knoxville, Tennessee.
  • Centralized control module 160 may be positioned in one or more places as well. For the purposes of illustration, all of the transmission facilities or physical interfaces shown in the figures are presumed to be OC- 3 interfaces, but other physical interfaces can be used.
  • FIGURE IB is a diagram showing an overview of a preferred embodiment 100 of an ATM network 120 verses a single virtual private network 170.
  • Multiple virtual private networks such as virtual private network 170 in FIGURE 1A, are preferably installed on an ATM network, such as ATM Network 120 in FIGURE IB.
  • ATM Network 120 has multiple customer networks 1 10A, HOB, HOC, . . . , and 1 10K electrically or optically coupled directly and or indirectly to ATM Network 120 via physical interfaces 133.
  • Customer networks 1 10A, 1 10B, 1 IOC, . . . , and 1 lOK may correspond to data networks and/or voice networks, both of which may be selectively grouped together to provide a virtual path network for one or more clients, such as for Clients A and B in FIGURES 1A and IB.
  • ATM Network 120 in preferred embodiments is comprised of a plurality of ATM Switches, such as ATM Edge Switches 130A, 130B, 130C, . . . , and 130F, all of which are interconnected with one another via physical interface or transmission facilities 131 to form ATM Network 120.
  • ATM Switches 130A, 130B, 130C, . . . , and 130F all of which are interconnected with one another via physical interface or transmission facilities 131 to form ATM Network 120.
  • at least one ATM switch such as ATM Edge Switch 130A
  • centralized control module 160 which has submodules therein to manage various parameters used to define virtual paths and/or virtual channels, such as bandwidth and the number of calls.
  • centralized control module 1 60 in FIGURE I B is comprised of call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager 150.
  • Centralized control module 160 utilizes control features typically provided in ATM Edge Switches 130A, 130B, 130C and 130F to control each individual ATM Edge Switch 130A, 130B, 130C, . . . . and 130F. In so doing, centralized control module 160 controls the creation and nature of virtual paths and virtual channels extending throughout the overall ATM Network 120 (in FIGURE IB).
  • FIGURE 2 shows the interrelationship between call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager module 150 of centralized control module 160 and between bandwidth manager module 150 and ATM Switch 130K
  • Call control module 140 implements an overall, network- wide call admission strategy, which determines whether to admit or reject a request to allow a virtual connection to be setup.
  • call control module 140 handles specific client requests for a call requiring access to virtual private network 170 (in FIGURE 1A).
  • centralized call admission control/usage monitor module 145 handles a request for permission to access virtual private network 170 (in FIGURE 1A) that was received by call control module 140.
  • Centralized call admission control/usage monitor module 145 determines what virtual paths and virtual channels are needed and, ultimately, will be connected, depending upon any number of factors, such as virtual path network customer service contract agreement, traffic type, quality of service expectations, and existing or expected traffic load and utilization.
  • centralized call admission control/monitor module 145 instructs bandwidth manager module 150 to dynamically adjust the size of each virtual path, virtual channel, and virtual path group with instructions to and from the CAC at specific ATM switches.
  • ATM Switch 130K (and any other ATM switch in the ATM network) adjusts, alters, creates, or destroys the actual size of the virtual path, as instructed by the bandwidth manager module 150, so that, if possible, the call requested by a client to call control module 140 can be made.
  • the CAC at each ATM switch checks every connection created or changed, no matter how or when it is created.
  • centralized call admission control/monitor module 145 balances the needs of some clients against the needs of other hardwares using the virtual path network who may have contracted for varying amounts of capadties in real time. For instance, preferred embodiments of centralized control module 160 consider parameters set in service contract agreements with the clients for the allocation of an available bandwidth for virtual paths and virtual channels. Additional allocations can be negotiated by clients using virtual path resizing to add additional capadty needed to address requirements exceeding the levels spedfied by the service contract. Centralized call admission control/usage monitor module 145 takes the appropriate actions to guarantee the levd of service as spedfied in the contract agreements.
  • preferred embodiments grant priority to connection requests which are compliant to the service contract agreements concerning virtual path networks.
  • a client using a virtual private network exceeds its service agreement, as mentioned above, it can "borrow" additional bandwidth from the provider of the virtual private network as long as the provider is not in an "overload” condition.
  • the borrowed bandwidth requests are tagged and returned to the client using (or wanting to use) the virtual private network with a spedal "over-reserved" condition.
  • bandwidth that is reserved with an "over-reserved” condition is generally not guaranteed and calls using this bandwidth are subjected to call loss in an overload condition. Connections with the "over-reserved" connections are set up in the virtual path with the unspecified quality of service.
  • clients using the virtual private networks are responsible for accepting or rejecting calls when the virtual path network is in the overload condition.
  • Clients of the virtual private network are also responsible for prioritizing their own calls. For example, in an overload condition, one client may dedde to drop calls using a first-in-first-out basis, while another client may dedde to drop a data application call to accommodate a voice call. Since this connection may be setup and torn down on demand, necessary computation processing is kept to a minimum.
  • FIGURES 9A and 8B illustrate the subprocedures implemented by centralized call admission control/usage monitor module 145 in FIGURES 1A, IB, and 2 and referenced in the flow diagram shown in FIGURE 8.
  • FIGURE 9A and 9B monitor the traffic load of clients of virtual path networks and dynamically adjust the bandwidth allocation for each client of the virtual path network.
  • these background processes detect overload conditions and take necessary aaions to address and relieve an overload condition. Flags or indicators of an overload condition are set when the actual utilization exceeds the utilization threshold, which craftsmen spedfy by provisioning.
  • the background processes report service contract violations in the form of an alarm.
  • these background processes negotiate with the termination side to add a block of additional bandwidth when a maximum utilization threshold is exceeded in order to antidpate periods of over utilization and accommodate the extra bandwidth demand.
  • these background processes release a block of "borrowed" bandwidth when the load falls below the minimum utilization threshold.
  • Preferred background processes are generally divided into two subfunctions.
  • one function monitors the client traffic load on the virtual private network and adjusts the bandwidth allocation for each virtual private group.
  • another function monitors the client traffic load on a virtual private network and adjusts the bandwidth allocation for each of virtual paths in the virtual path group.
  • centralized control module 160 spedfically directlv and indirectly controls the operation of ATM Switch 130K in FIGURE 2 (and other ATM Switches not shown in FIGURE 2, such as ATM Edge Switches 130G, 130H, 130H, and 130J in FIGURE 1A and ATM Switches 130A, 130B, 130C, . . . and 130F in FIGURE I B).
  • This capability is, perhaps, most useful in managing the bandwidth assigned to a spcdfic virtual path and a virtual path group.
  • Centralized control module 160 enables preferred embodiments to dynamically adjust the bandwidth of a virtual path and/or a virtual path grouping to respond to varying requests of clients, which ensures that ATM physical interfaces are used to their fullest capadty.
  • Centralized control module 1 60 allows a carrier to dynamically respond to changing needs of numerous clients (e.g., Clients A and B) that share the backbone network. In short, if a specific client is not using all of the capadty which the client has a reservation o ⁇ a right to use (according to the contract), this unused capadty is made available to other clients.
  • This function in centralized control module 160 is generally performed by bandwidth control module 150.
  • Bandwidth control module 150 uses management interfaces found in ATM Switches 130A, 130B, 130C, . . . , and 130F, namely the management interface of each ATM switch that provisions the virtual paths and channds for each ATM switch, to control the size of the virtual path or paths within overall ATM Network 120.
  • ATM Edge Switch 300 which corresponds to ATM Edge Switches 130G, 130H, 1301, and 130J shown in FIGURE 1A
  • ATM Edge Switches 130A, 130B, 130C, . . . , and 130F in FIGURE 1 B enables preferred embodiments to consolidate multiple traffic types (e.g., voice and data) with varying quality of service expectations into a single ATM interface or a network.
  • Traffic types e.g., voice and data
  • Client A uses physical interface 310 for various traffic and physical interface for data traffic 372
  • Client B uses physical interface 314 for various traffic and physical interface 316 for data traffic, all of which are consolidated on ATM interface 302 by ATM edge switch 700.
  • centralized control module 160 The operation of centralized control module 160 is, perhaps, best understood in relation to an example.
  • the first step performed by centralized call admission control/usage monitor module 145 of centralized control module 160 is to check the service contract agreement for each client for which the call was initiated to determine whether or not to accept the call, what quality of service to provide, what to charge the client, and for directions as to how to make the connections.
  • FIGURE 1A and define physical interface 141A as "Interface 1 ,” physical interface 141 B as “Interface 2,” physical interface 141C as “Interface 3,” and physical interface 141 D as “Interface 4.”
  • the service contract agreement between the carrier managing the virtual private network 170 (in FIGURE 1A) and/or network 120 (in FIGURE IB) and Client A guarantees 93 MB sec at Interface 1 and 62 Mb/sec at Interface 2.
  • Client A desires connection (s) having a maximum total bandwidth of 155 Mb/second total and Client B desires connection(s) also having a maximum total bandwidth of 155 Mb/second total.
  • one breakup for Clients A and B provided by centralized control module 160 for Interfaces 1 , 2, 3, and 4 is shown in TABLE 1 : CLIENT A
  • Initial allocation: Quality of Service 1 : 20%(of 62Mb) 18.6Mb
  • FIGURES 4A, 4B, 4C, and 4D are diagrams illustrating the relationship between the reserved and available bandwidth for spedfic ATM physical interfaces 141A, 14 IB, 141C, and 14 ID (in FIGURE 1A) for the above example.
  • the relative size of each endosed drde or oval reflects the size (e.g., in terms of bandwidth) of the actual virtual path and/or virtual path group.
  • the actual size of the virtual path adjusts (or is adjusted by centralized control module 160) dynamically based upon the utilization levd of that virtual path, as indicated by the bidirectional arrows crossing the borders of regions corresponding to virtual paths and virtual channels.
  • each virtual group of virtual paths is dependent upon the terms and conditions within the service contract agreement between a host and the carrier.
  • the sizes of the virtual path groupings are adjusted by centralized control module 160 based upon the utilization levels. As shown in FIGURE 8 and explained in the corresponding text, if the size needed by some client increases beyond a certain contractually defined point, the calls from the client admitted will be tagged as using 'over- reserved' capacity within the spedfic physical interface and will use the unspecified quality of service as defined by the ATM forum.
  • region 401 corresponds to the virtual path group for Client A in the above example, which represents 93 Mb
  • region 402 corresponds to the virtual path group for Client B in the above example, which represents 93 Mb.
  • virtual paths 403 and 404 have been created, one for each quality of service promised Client A in virtual path group
  • virtual paths 405 and 406 have been created, one for each quality of service promised for Client B in virtual path group
  • the total bandwidth capadty for virtual group 401 and virtual group 402 equals 155 Mb, which is the total fixed capadty of Interface 1. There is not any unassigned bandwidth capadty that is available for reservation.
  • the region 408 corresponds to the virtual path group for Client A in the above example, which represents 62 Mb.
  • virtual path 407 has been created for the spedfic quality of service for Client A in virtual path group 408. Additional bandwidth capadty (or area) within Interface 2 is available for reservation. Similarly, additional bandwidth capadty within virtual path group 408 is unspedfied.
  • region 409 corresponds to the virtual path group for Client B in the above example, which represents 93 Mb.
  • virtual path 410 has been created for the spedfic quality of service for Client B in virtual path group 409. Additional bandwidth capadty (or area) within Interface 3 is available for reservation. Similarly, additional bandwidth capadty within virtual path group 409 is unspecified.
  • FIGURE 4D no virtual path groups and/or virtual paths for any client have been assigned to Interface 4, so the entire bandwidth capadty, 155 Mb, of Interface 4 is available for reservations.
  • FIGURES 5A, 5B, 5C, and 5D are diagrams showing a switch level view of separate ATM physical interfaces (physical interfaces 141 A, 14 IB, 141C, and 14 ID correspond to FIGURE 1 A), for Clients A and B.
  • the quality of service has been defined when applicable.
  • the Quality of Service 1 has been generally defined as Constant Bit Rate (“CBR") traffic
  • Quality of Service 2 has been generally defined as Variable Bit Rate (“VBR”) traffic.
  • CBR Constant Bit Rate
  • VBR Variable Bit Rate
  • alternate assignments for other quality of service types can be made. Referring to FIGURE 6, for ATM Interface 600 between ATM Switches A and B (not shown), for each virtual path group, a unique virtual path will be provisioned for each spedfic traffic type as indicated by its quality of service requirements.
  • One additional virtual path will be provisioned for "unspedfied" quality of service, which will be used by the virtual path network service provider to offer an "unguaranteed” service or a "best-effort” service.
  • Client A requires or contracts for a certain amount of capadty for CBR traffic (for voice and video), VBR traffic (for packetized audio and video), Connection-Oriented traffic (for frame-Rday), and/or
  • Connectionless traffic (for IP traffic)
  • Client A will be assigned a virtual path group 601 having virtual paths 403 for CBR traffic, virtual path 604 for VBR, virtual path 605 for Connection-Oriented traffic, and virtual path 606 for Connectionless traffic.
  • Client B if Client B requires or contracts for a certain amount of capadty for CBR and VBR traffic, but not any virtual paths for any other forms of traffic (e.g., connection-oriented traffic and connectionless traffic), Client B will be assigned virtual path group 602 having virtual paths for CBR traffic and virtual path 608 for VBR traffic.
  • the bandwidth requirements are calculated differentiates for each quality of service.
  • Virtual path 609 is not a member of any virtual path group and is unspedfied and otherwise available to be used on an 'as-needed' case by either Client A, Client B, or another client.
  • Preferred embodiments take advantage of the fact that each allocation to each client has varying amounts of unspedfied quality of service capadty and that, while Interface 1 appears to be completely booked, Interfaces 2 and 3 have varying amounts of bandwidth that is available to be reserved by Clients A and/or B and/or any other client and Interface 4 appears to be completely clear of any reservations. Thus, bandwidth reserved is not necessary equal to bandwidth utilized.
  • Centralized control module 160 simultaneously balances the use of the under utilized bandwidth and the obligations to the service contract agreements and prevents overload conditions to use each ATM Switch and the overall ATM network to the utmost.
  • bandwidth reserved is equal to bandwidth utilized, which means large portions of physical interfaces are not used on an ongoing basis and there is no way to actively and systematically utilize such unused capacity.
  • virtual path 702 may be comprised of at least one virtual channel 403, which reside inside virtual path 702. Note, however, a virtual path is not required to hold any virtual channels, but every virtual channd must be in a virtual path.
  • transmission fadlities 700 may contain additional virtual paths, other than virtual path 702 and these additional virtual paths would rest inside transmission fadlity 700, like virtual path 702. As shown in
  • FIGURE 7A virtual channels 703 consume all of the available bandwidth of virtual path 702. As a result, any attempt to create an additional virtual channd 703 in virtual path 702 will be denied by the CAC of the ATM switch.
  • bandwidth manager module 150 effectivdy increased or otherwise adjusted the size of virtual path 702 to provide extra capadty 704, so that additional virtual channels 703 can be created to accommodate varying demands of clients on an ATM Network, such as ATM network 120 in FIGURE 1 B.
  • Bandwidth manager module 150 dynamically manages bandwidths utilized by virtual paths in reaction or antidpation to traffic volume levels. For instance, as shown in TABLE 3, data traffic, such as e-mail and file transfers, and voice traffic, such as telephone conversations, typically vary throughout a day, but data traffic, unlike voice traffic, can be put off until the evening hours. Thus, bandwidth manager module 150 changes the virtual path sizes of virtual paths and virtual path groups according to time of day. TIME VOICE BANDWIDTH DATA BANDWIDTH
  • FIGURE 10 is a flow diagram for the procedure implemented by bandwidth manager module 150 in FIGURES 1A, IB, and 2. Spedfically, as discussed above, virtual paths are set up for each customer to provide desired connectivity to the spedfic customer sites and desired bandwidth for each traffic type according to the current time of day. Next, dther customers or bandwidth manager module 150 create and destroy corresponding virtual channd(s) within the virtual path(s) as needed. Each virtual channel that is created must be in one of the existing virtual paths, which have been set up for that spedfic customer. When a virtual channel is created, the CAC of each switch in the ATM network through which the virtual channd extends determines whether or not the virtual channel will fit in the specified (or corresponding) virtual path.
  • Bandwidth manager module 150 then checks the customer contract and current time of day to determine whether it is permissible (the correct time) to make needed bandwidth changes.
  • bandwidth manager module 150 creates and destroys virtual channels as needed to make space for the requested virtual channel.
  • bandwidth manager module 150 calculates the sum of the bandwidth for all virtual channels on each virtual path to determine whether the total virtual channel bandwidth is larger than the new virtual path bandwidth spedfied by the customer contract for the current time of day period.
  • bandwidth manager module 150 uses the ATM switch management interface to ddete virtual channels until the sum of the virtual channel bandwidth is bdow the new virtual path bandwidth and, then, the virtual paths are resized, such that preferred embodiments use the ATM management interface to change the size of each virtual path so that it conforms to the customer contract value for the current time of day.
  • physical interfaces may be based on or utilize conductive wiring, such as twisted pair, fiber optic, coax, wireless transmission fadlities and/or any combination thereof.
  • conductive wiring such as twisted pair, fiber optic, coax, wireless transmission fadlities and/or any combination thereof.
  • other switches can be used as well, so long as the ATM switches are compatible with UNI 3.0 or greater and provide a management interface that allows the creation, deletion, and resizing of virtual path connections.
  • Northern Telecom's Concorde"", Vector"", and Passport tm switches generally satisfy these requirements and are preferred for that reason, but other switches may also satisfy these requirements and may be used.
  • Control module 160 can use alternate procedures to control the operation of the ATM switches and the sizing and creation of virtual paths and channels, in addition to or in lieu of the preferred procedures shown in FIGURES 8, 9A, and 9B.
  • the procedures that are implemented by centralized control module 160, call control module 140, centralized call admission control/usage module 145, and bandwidth manager module 150 in preferred embodiments use software on a computer equipped platform that directs each individual ATM switch in an ATM network.

Abstract

A system comprises a system control module (160) and a plurality of interconnected asynchronous transfer mode switches (130G-130K), the interconnected asynchronous transfer mode switches (130G-130K) are interconnected with one another via at least one physical interface (141) to form a network (170). The network (170) is used to transfer various types of information. Each asynchronous transfer mode switch (130) has a connection admission control module (140) to determine whether a virtual connection, such a virtual path, virtual channel, or grouping of virtual paths, can be connected through that particular asynchronous transfer mode switch (130). The virtual connection is formed from one asynchronous transfer mode switch to at least one other asynchronous transfer mode switch via a link of at least one physical interface (141). The system control module (160) connects to at least one asynchronous transfer mode switch and determines whether the virtual connection can be created in the network (170). A process of monitoring a utilization level of a grouping of a virtual path on a physical interface comprises checking the utilization level of the virtual path, updating an amount of available bandwidth for the virtual path, and comparing the amount of available bandwidth with a maximum threshold for the available bandwidth and setting an overload condition if the amount exceeds the maximum threshold and clearing the overload condition if the amount is below the maximum threshold. Service contracts governing a client's use of the network and ability to set up a virtual connection are also checked in certain circumstances.

Description

DYNAMIC CONTROL PROCESSES AND SYSTEMS FOR ASYNCHRONOUS TRANSFER MODE NETWORKS
FIELD OF INVENTION The present invention generally relates to the field of telecommunications equipment and processes and, more specifically, to the field of Asynchronous Transfer Mode ("ATM") network management and control equipment and processes.
BACKGROUND
Modern telecommunications systems and networks are generally built around digital networks that were originally designed for transmitting telephone conversations. These systems and networks typically use digital techniques to multiplex many communication channels designed to carry voice transmissions onto individual transmission facilities (e.g., copper wire, coaxial cable, and optical fiber). One such digital technique, Time Division Multiplex ("TDM"), divides the data transmission bandwidth of the transmission facility into equal sized time slots, which have the exact size needed to carry a telephone voice conversation. TDM generally served its purpose when the network was primarily used for standard, telephony voice transmission, but todav telecommunications networks are being used to transmit computer data, video information, and voice information from cellular and traditional telephones alike. Each of these applications have varying data transmission bandwidth requirements that differ from each other and from requirements associated with traditional telephony. As a result, traditional digital techniques, such as TDM, have encountered a number of problems in recent years.
Asynchronous Transfer Mode ("ATM") techniques have provided a new way of dividing the bandwidth of the transmission facilities, physical interfaces, and switches of a network. Where TDM uses time slots to divide the bandwidth into fixed size channels, ATM uses 53 byte cells to divide the bandwidth into virtual channels. Each cell includes a header that identifies a virtual path and virtual channel to which the cell belongs. Cells can be allocated to a virtual channel in response to the needs of the users sending information over the virtual channel and the limits of the transmission facilities, physical interfaces, and switches that carry the virtual channel. Virtual paths are used to group certain virtual channels together to aid in the management and routing of the virtual channels.
To create a virtual path through an ATM network, virtual path connections must be made through each switch that the virtual path traverses, connects, or through which the virtual path connection extends. Similarly, to create a virtual channel through an ATM network, virtual channel connections must be constructed through each switch that the virtual channel traverses, connects, or through which the virtual channel extends. Virtual channel connections can be made through provisioning by the operator, which is called a Permanent Virtual Connection ("PVC"). Alternatively, virtual channel connections can be made through the use of signaling messages to request a connection, which is called a Switched Virtual Connection ("SVC"). A request for either a virtual path connection or a virtual channel connection, whether it is a PVC or SVC, typically includes the quality of service and traffic parameters that characterize the connection. The parameter corresponding to the quality of service indicates whether the requestor of the connection requires any guarantees from the network to transport data over the connection at a certain rate, which is described by the traffic parameter corresponding to the traffic Parameters corresponding to traffic include features, such as peak cell rate, average cell rate, and cell delay variation. Parameters corresponding to traffic generally describe the network bandwidth that will be taken up by the connection. When a request is made to set up a virtual channel connection through an ATM switch, software found in the ATM switch determines if the ATM switch and physical interfaces through which the connection is to be made can support the requested bandwidth, which is generally called Connection Admission Control ("CAC"). When a virtual channel connection is requested, it must be placed in a virtual path, so that the CAC software can determine if there is enough bandwidth remaining in the virtual path to support the new virtual channel connection. Since virtual channel connections can only be made over existing virtual paths, virtual paths provide a way to control the maximum bandwidth taken up by virtual channels in the network and, as a result, are helpful in managing the bandwidth in an ATM network. However, because virtual paths are manually provisioned in a switch, the management capabilities that they provide are inflexible and static.
In addition, large private communications networks can span a vast geographic area. In practice, it is cost prohibitive for private networks to install its own transmission facilities between different sites. Instead, private networks often lease dedicated transmission lines from a public carrier (e.g., AT&T or MCI). As a general rule, these leased lines are "nailed up" and are designed to provide full transmission capacity 24 hours a day regardless of its actual utilization. A large mesh of leased lines is typically required to provide connections between every site of a network. Furthermore, each private network will require its own mesh of leased lines. Private networks using leased lines are very expensive, because of the inefficient use of resources. Public carriers have attempted to solve this problem by allowing multiple clients to utilize the carrier's facilities and through software control have them appear as individual dedicated leased lines. This software controlled utilization then forms what has been called a Virtual Private Network ("VPN"). In order for a VPN network to function, it must effectively divide the bandwidth between different customers. Unfortunately, however, existing systems do not adequately address the concern of whether each client consumes an appropriate, necessary portion of the shared resources. There does not presently exist anv way to dynamically manage stored resources on a continuous, ongoing, real-time basis.
Existing designs and procedures have other problems as well.
SUMMARY
Preferred embodiments pertain to an apparatus and related methods and systems that generally manage networks and individually and collectively manage ATM switches. Note that preferred methods are preferably performed by the preferred apparatus and systems and are discussed in reference to the preferred apparatus and systems. Preferred embodiments of the network are generally comprised of at least one virtual private network, which is provided by a service provider. The virtual private network is comprised of a plurality of ATM switches that are interconnected with one another via one or more physical interfaces (e.g., fiber optic, twisted pair, coax, and wireless) to form the backbone of a network, which can span over a large geographical area. Clients using the virtual path network generally have a local private network of one type or another, such as a local private data network and or a local private voice network. Sometimes, a client's local private network(s) is(are) interconnected to a carrier's network backbone via a common communication infrastructure provided by the service provider. If so, a client's local private network shares transmission facilities with other networks. Virtual connections (e.g., virtual paths, virtual channels, groupings of virtual paths, and any combination thereof) extend from one ATM switch to another ATM switch through the network and are used to transfer various types of information across the network Preferred embodiments bundle virtual channel(s) into a virtual path and virtual paths into grouping(s) of virtual paths. Preferred embodiments have a system-wide, centralized control module to manage these virtual paths and/or virtual channels. The control module is in direct communication with at least one ATM switch in the ATM network and in indirect communication with most, if not all, of the other ATM switches in the ATM network. The control module controls the provisioning of each ATM switch in the ATM network, which, among other things, enables the centralized control module to set up and dvnamicallv change virtual paths and virtual channels as well as groups of virtual paths in an ATM network on an ongoing, continuous, real-time basis. The control module specifically has the ability to dynamically control the assigned parameters (e.g., bandwidth) of virtual paths, virtual channels, and groupings of virtual paths. Specifically, regarding the operation of the control module, the control module considers one or more factors to determine whether the virtual connection through the network can be made. These factors include, but are not limited to, terms and conditions of a network contract agreement covering the virtual connection, type of information that the virtual connection will transfer (e.g., constant bit rate information, voice information, video information, variable bit rate information, data information, connection-oriented information, frame-relay information, and connectionless information), the quality of service expected of the virtual connection, existing traffic load of the network, and the utilization of the network. In particular, regarding the utilization level, the control module determines on an ongoing basis whether the network is in an overload condition. The control module also checks the overload condition and determines whether the virtual connection can be set up for the network. Similarly, the reference to a client agreement concerning the client's use of the network defines acceptable parameter and quality of service requests for the virtual connection that are available to the client. Preferred embodiments of the control module generally perform the following procedure: (i) checks with the agreement to determine whether the parameter requirements of the virtual connections are compliant with the agreement, (ii) checks with the agreement governing quality of service requests to determine whether the quality of service requirements of the virtual connections are compliant with the agreement, and (iii) determines whether the virtual connection has any available capacity. If the network is not in an overload condition and the control module does not otherwise allow(or object to) the creation of the virtual connection, the control module may allow the virtual connection to be set up in unspecified capacity of the network.
Preferred embodiments provide a number of advantages. Preferred embodiments manage an ATM switch dynamically and continuously, which allows for greater use of the available capacity of networks and, particularly, transmission facilities within a network. Preferred embodiments enable telecommunications companies that operate various types of networks for a multitude of clients to "lease" unspecified capacity on virtual paths in a virtual path group having certain features or parameters to other customers on an ATM backbone network, on an 'as needed' basis. Some of this capacity may, in fact, be owned by another party or already be leased to another party, but is not being used at the specific time that another party requests permission to use the capacity. Preferred embodiments thereby provide a technique of "throttling" the physical interfaces needed to shape the bandwidth consumed by the overall ATM networks. The importance of this capability should not be underestimated, as it effectively allows carriers to "over book" physical interfaces and transmission facilities (e.g., ATM links, ATM switches, and ATM networks) to ensure existing capacity will be used to the fullest extent possible.
Other advantages of the invention and/or inventions described herein will be explained in greater detail below.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings are incorporated into and form a part of the specification to illustrate several examples of the present inventions. These drawings together with the description serve to explain the principles of the inventions. The drawings are only for the purpose of illustrating preferred and alternative examples of how the inventions can be made and used and are not to be construed as limiting the inventions to only the illustrated and described examples. Further features and advantages will become apparent from the following and more particular description of the various embodiments of the invention, as illustrated in the accompanying drawings, wherein:
FIGURE 1 A is a diagram showing a preferred embodiment 180 of a virtual private network 170 having centralized control module 160 comprised of call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager module 150, ATM Edge Switch 130G, ATM Edge Switch 130H, ATM Edge Switch 1301, ATM Edge Switch 130J, and ATM Switch 130K;
FIGURE I B is a diagram showing a preferred embodiment 100 having ATM Network 120 connected directly and/or indirectly to multiple customer networks 1 10A, 1 10B, 1 10C, and 1 1 OK via physical interfaces 133, wherein ATM Network 120 is comprised of ATM Edge Switches 130A, 130B, 130C, . . . . and 130F interconnected with one another via physical interfaces 131 , at least one of which, ATM Edge Switch 130A, is connected to centralized control module 160 with bandwidth control module 1 50, centralized call admission control usage monitor module 145, and call control module 140 via one physical interface 133;
FIGURE 2 is a diagram showing the detailed view of the interrelationship of call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager module 150 of centralized control module 160 and ATM Switch 130K; FIGURE 3 is an enlarged view of ATM Switch 300 having physical interface 302 extending from ATM Switch 300, physical interfaces 310 and 312 transferring voice information and data information, respectively, for Client A, physical interfaces 314 and 316 transferring voice information and data information, respectively, for Client B, which corresponds to ATM Switch 130K (in FIGURE 2), ATM Edge Switches 130G, 130H, 1301, and 130J (in FIGURE 1A), and ATM Switches 130A, 130B, 130C, . . .
, and 130F (in FIGURE I B);
FIGURES 4A, 4B, 4C, and 4D are diagrams that illustrate the relationship between the reserved and available bandwidth for specific ATM physical interfaces 141A, 141 B, 141 C, and 141 D (in FIGURE 1 A) in which virtual paths are grouped or pooled together for Clients A and B by a number of factors, such as Quality of Service ("QOS") and bandwidth;
FIGURES 5A, 5B, 5C, and 5D are diagrams that show a switch level view of specific ATM physical interfaces 141A, 14 IB, 141C, and 141D (in FIGURE 1A) in which virtual paths are grouped or pooled together for Clients A and B by a number of factors, such as quality of service and bandwidth; FIGURE 6 is a diagram showing a more generalized view of the use of virtual path groups in an ATM physical interface for Clients A and B with varying traffic types by preferred embodiments;
FIGURES 7A and 7B are drawings that highlight the organization and relationship between virtual paths 702 and virtual channels 703 that are managed and controlled by bandwidth manager module 150 of centralized control module 160 (in FIGURE 1A);
FIGURE 8 is a flow diagram for the procedure implemented by centralized call admission control/usage monitor module 145 in FIGURES 1A, IB, and 2; FIGURES 9A and 9B are flow diagrams for subprocedures implemented by centralized call admission control/usage monitor module 145 in FIGURES 1A, IB, and 2, which are referenced in FIGURE 8, that monitor the availability of unspecified virtual paths and check the utilization level of each virtual path group to determine whether an overload condition exists; and FIGURE 10 is a flow diagram for the procedure implemented by bandwidth manager module 150 in FIGURES 1A, IB, and 2.
DETAILED DESCRIPTION
The present inventions will be described by referring to apparatus and methods showing various examples of how the inventions can be made and used. When possible, like reference characters are used throughout the several views of the drawing to indicate like or corresponding parts.
FIGURE 1A shows a preferred embodiment 180. Virtual private network 170 is comprised of centralized control module 160 and ATM Edge Switches 130G, 130H,
1301, and 1 0J and ATM Switch 130K ATM Switch 130K forms the backbone of virtual private network 170, whereas ATM Edge Switches 130G, 130H, 1301, and 130J have the additional interfaces needed to interact with various Clients A and B in order to concentrate these numerous small physical interfaces 142A, 142B, 142C, . . . , and 142F from clients into larger physical interfaces 14IA, 14 IB, 141C, and 141D. Centralized control module 160 manages calls for virtual private network 170 and is generally comprised of call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager module 150.
In general, call control module 140 handles the majority, if not all, of the call requests for virtual private network 170. Centralized call admission control/usage monitor module 145 determines whether or not to allow a specific 'call' to access to virtual private network 170. Bandwidth manager module 150 controls the size of all virtual paths in virtual private network 170 in response to and in conjunction with call control module 140 and centralized call admission control/usage monitor module 145. Note call control module 140, centralized call admission control/usage monitor module 145 , and bandwidth manager module 150 preferably all run on a single computing platform (e.g., a computer), but, alternatively, may be configured to run on more than one separate computer platform at multiple locations. Also, note that a virtual private network may stretch aσoss large geographic distances. For instance, ATM Edge Switches 130H and 130G may reside in Richardson, Texas, whereas ATM Edge Switches 1301 and 130 J may reside in Raleigh, North Carolina. And, ATM Switch 130K may reside somewhere else, such as in Knoxville, Tennessee. Centralized control module 160 may be positioned in one or more places as well. For the purposes of illustration, all of the transmission facilities or physical interfaces shown in the figures are presumed to be OC- 3 interfaces, but other physical interfaces can be used.
FIGURE IB is a diagram showing an overview of a preferred embodiment 100 of an ATM network 120 verses a single virtual private network 170. Multiple virtual private networks, such as virtual private network 170 in FIGURE 1A, are preferably installed on an ATM network, such as ATM Network 120 in FIGURE IB. ATM Network 120 has multiple customer networks 1 10A, HOB, HOC, . . . , and 1 10K electrically or optically coupled directly and or indirectly to ATM Network 120 via physical interfaces 133. Customer networks 1 10A, 1 10B, 1 IOC, . . . , and 1 lOK may correspond to data networks and/or voice networks, both of which may be selectively grouped together to provide a virtual path network for one or more clients, such as for Clients A and B in FIGURES 1A and IB.
ATM Network 120 in preferred embodiments is comprised of a plurality of ATM Switches, such as ATM Edge Switches 130A, 130B, 130C, . . . , and 130F, all of which are interconnected with one another via physical interface or transmission facilities 131 to form ATM Network 120. As with the single virtual private network 170 in FIGURE 1A, at least one ATM switch, such as ATM Edge Switch 130A, is connected to centralized control module 160, which has submodules therein to manage various parameters used to define virtual paths and/or virtual channels, such as bandwidth and the number of calls. As explained above in reference to FIGURE 1A, centralized control module 1 60 in FIGURE I B is comprised of call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager 150. Centralized control module 160 utilizes control features typically provided in ATM Edge Switches 130A, 130B, 130C and 130F to control each individual ATM Edge Switch 130A, 130B, 130C, . . . . and 130F. In so doing, centralized control module 160 controls the creation and nature of virtual paths and virtual channels extending throughout the overall ATM Network 120 (in FIGURE IB).
FIGURE 2 shows the interrelationship between call control module 140, centralized call admission control/usage monitor module 145, and bandwidth manager module 150 of centralized control module 160 and between bandwidth manager module 150 and ATM Switch 130K These interrelationships enable preferred embodiments to use an efficient control scheme to effectively manage and accommodate different traffic service requirements of a virtual path network. Call control module 140 implements an overall, network- wide call admission strategy, which determines whether to admit or reject a request to allow a virtual connection to be setup. Using the procedure and apparatus discussed in co-assigned, the pending patent application, entitled "Enhanced Services for ATM Switching Using External Control," which was filed herewith and incorporated by reference above, call control module 140 handles specific client requests for a call requiring access to virtual private network 170 (in FIGURE 1A). Using a procedure to implement a call admission strategy procedure, which is outlined in the flow chart shown in FIGURE 8, centralized call admission control/usage monitor module 145 handles a request for permission to access virtual private network 170 (in FIGURE 1A) that was received by call control module 140. Centralized call admission control/usage monitor module 145 determines what virtual paths and virtual channels are needed and, ultimately, will be connected, depending upon any number of factors, such as virtual path network customer service contract agreement, traffic type, quality of service expectations, and existing or expected traffic load and utilization. Moreover, if necessary, depending upon the current load conditions, centralized call admission control/monitor module 145 instructs bandwidth manager module 150 to dynamically adjust the size of each virtual path, virtual channel, and virtual path group with instructions to and from the CAC at specific ATM switches. ATM Switch 130K (and any other ATM switch in the ATM network) adjusts, alters, creates, or destroys the actual size of the virtual path, as instructed by the bandwidth manager module 150, so that, if possible, the call requested by a client to call control module 140 can be made. The CAC at each ATM switch checks every connection created or changed, no matter how or when it is created. In using the call admission process outlined in FIGURE 8, centralized call admission control/monitor module 145 balances the needs of some clients against the needs of other dients using the virtual path network who may have contracted for varying amounts of capadties in real time. For instance, preferred embodiments of centralized control module 160 consider parameters set in service contract agreements with the clients for the allocation of an available bandwidth for virtual paths and virtual channels. Additional allocations can be negotiated by clients using virtual path resizing to add additional capadty needed to address requirements exceeding the levels spedfied by the service contract. Centralized call admission control/usage monitor module 145 takes the appropriate actions to guarantee the levd of service as spedfied in the contract agreements. Consequently, preferred embodiments grant priority to connection requests which are compliant to the service contract agreements concerning virtual path networks. In addition, when a client using a virtual private network exceeds its service agreement, as mentioned above, it can "borrow" additional bandwidth from the provider of the virtual private network as long as the provider is not in an "overload" condition. The borrowed bandwidth requests are tagged and returned to the client using (or wanting to use) the virtual private network with a spedal "over-reserved" condition. Furthermore, bandwidth that is reserved with an "over-reserved" condition is generally not guaranteed and calls using this bandwidth are subjected to call loss in an overload condition. Connections with the "over-reserved" connections are set up in the virtual path with the unspecified quality of service. Finally, clients using the virtual private networks are responsible for accepting or rejecting calls when the virtual path network is in the overload condition. Clients of the virtual private network are also responsible for prioritizing their own calls. For example, in an overload condition, one client may dedde to drop calls using a first-in-first-out basis, while another client may dedde to drop a data application call to accommodate a voice call. Since this connection may be setup and torn down on demand, necessary computation processing is kept to a minimum.
FIGURES 9A and 8B illustrate the subprocedures implemented by centralized call admission control/usage monitor module 145 in FIGURES 1A, IB, and 2 and referenced in the flow diagram shown in FIGURE 8. The ongoing background processes shown in
FIGURE 9A and 9B monitor the traffic load of clients of virtual path networks and dynamically adjust the bandwidth allocation for each client of the virtual path network. Spedfically, these background processes detect overload conditions and take necessary aaions to address and relieve an overload condition. Flags or indicators of an overload condition are set when the actual utilization exceeds the utilization threshold, which craftsmen spedfy by provisioning. In addition, the background processes report service contract violations in the form of an alarm. Similarly, these background processes negotiate with the termination side to add a block of additional bandwidth when a maximum utilization threshold is exceeded in order to antidpate periods of over utilization and accommodate the extra bandwidth demand. Finally, these background processes release a block of "borrowed" bandwidth when the load falls below the minimum utilization threshold. Preferred background processes are generally divided into two subfunctions. In particular, as shown in FIGURE 9A, one function monitors the dient traffic load on the virtual private network and adjusts the bandwidth allocation for each virtual private group. Likewise, as shown in FIGURE 9B, another function monitors the client traffic load on a virtual private network and adjusts the bandwidth allocation for each of virtual paths in the virtual path group.
As a result of the above operation, centralized control module 160 spedfically directlv and indirectly controls the operation of ATM Switch 130K in FIGURE 2 (and other ATM Switches not shown in FIGURE 2, such as ATM Edge Switches 130G, 130H, 130H, and 130J in FIGURE 1A and ATM Switches 130A, 130B, 130C, . . . and 130F in FIGURE I B). This capability is, perhaps, most useful in managing the bandwidth assigned to a spcdfic virtual path and a virtual path group. Centralized control module 160 enables preferred embodiments to dynamically adjust the bandwidth of a virtual path and/or a virtual path grouping to respond to varying requests of clients, which ensures that ATM physical interfaces are used to their fullest capadty.
Centralized control module 1 60 allows a carrier to dynamically respond to changing needs of numerous dients (e.g., Clients A and B) that share the backbone network. In short, if a specific client is not using all of the capadty which the client has a reservation oκ a right to use (according to the contract), this unused capadty is made available to other clients. This function in centralized control module 160 is generally performed by bandwidth control module 150. Bandwidth control module 150 uses management interfaces found in ATM Switches 130A, 130B, 130C, . . . , and 130F, namely the management interface of each ATM switch that provisions the virtual paths and channds for each ATM switch, to control the size of the virtual path or paths within overall ATM Network 120.
As shown in FIGURE 3, the use of ATM switches, such as ATM Edge Switch 300, which corresponds to ATM Edge Switches 130G, 130H, 1301, and 130J shown in FIGURE 1A, and ATM Edge Switches 130A, 130B, 130C, . . . , and 130F in FIGURE 1 B, enables preferred embodiments to consolidate multiple traffic types (e.g., voice and data) with varying quality of service expectations into a single ATM interface or a network. Spedfically, note Client A uses physical interface 310 for various traffic and physical interface for data traffic 372, whereas Client B uses physical interface 314 for various traffic and physical interface 316 for data traffic, all of which are consolidated on ATM interface 302 by ATM edge switch 700. The operation of centralized control module 160 is, perhaps, best understood in relation to an example. The first step performed by centralized call admission control/usage monitor module 145 of centralized control module 160 is to check the service contract agreement for each client for which the call was initiated to determine whether or not to accept the call, what quality of service to provide, what to charge the client, and for directions as to how to make the connections. In the following example, please refer to FIGURE 1A and define physical interface 141A as "Interface 1 ," physical interface 141 B as "Interface 2," physical interface 141C as "Interface 3," and physical interface 141 D as "Interface 4." Furthermore, suppose that the service contract agreement between the carrier managing the virtual private network 170 (in FIGURE 1A) and/or network 120 (in FIGURE IB) and Client A guarantees 93 MB sec at Interface 1 and 62 Mb/sec at Interface 2. a situation in which Client A desires connection (s) having a maximum total bandwidth of 155 Mb/second total and Client B desires connection(s) also having a maximum total bandwidth of 155 Mb/second total. While other breakups may be possible, one breakup for Clients A and B provided by centralized control module 160 for Interfaces 1 , 2, 3, and 4 is shown in TABLE 1 : CLIENT A
BREAKUP BY INTERFACE
Interface 1 : 60% total bandwidth = 93 Mb Initial allocation:
Quality of Service 1 : 20%(of 93Mb) = 18.6Mb Quality of Service 2: 50%(of 93Mb)=46.4Mb
Unspeάfied Quality of Service: 30%(of 93Mb)=27.9Mb Interface 2: 40% total bandwidth (155 Mb) = 62 Mb Initial Allocation
Quality of Service 1 : 20%(of 62Mb) = 18.6Mb Unspedfied Quality of Service: 80%(of 62Mb) = 49.6Mb CLIENT B BREAKUP BY INTERFACE
Interface 1 : 40% total bandwidth (155 Mb) = 62 Mb Initial allocation: Quality of Service 1 : 20%(of 62Mb) = 18.6Mb
Quality of Service 2: 50%(of 62Mb) =46.4Mb
Unspedfied Quality of Service: 30%(of 62Mb) = 18.6Mb Interface 3: 60% total bandwidth ( 155 Mb) = 93 Mb Initial Allocation Quality of Service 1 : 20%(of 93Mb)= 18.6Mb
Unspedfied Quality of Service: 80%(of 93Mb) = 74.4Mb
TABLE 1 : Breakup for Clients A and B for Interfaces 1 , 2, 3 and 4
The assignments of Clients A and B for Interfaces 1, 2, 3, and 4 are shown for this example in the following TABLE 2.
INTERFACE 1
Client A: 93 Mb Assigned
18.6 Mb for Quality Of Service 1 46.5 Mb for Quality Of Service 2 27.9 Mb Unspedfied Client B: 62 Mb Assigned
12.4 Mb for Quality Of Service 1 31 Mb for Quality Of Service 2 18.6 Mb Unspedfied
INTERFACE 2
Client A: 62 Mb Assigned
18.6 Mb for Quality Of Service 1 49.6 Mb Unspedfied
Available Bandwidth for Reservation: 93 Mb
INTERFACE 3
Client B: 93 Mb Assigned
18.6 Mb for Quality Of Service 1 74.4 Mb Unspedfied
Available Bandwidth for Reservation: 62 Mb
INTERFACE 4
Available Bandwidth for Reservation: 155 Mb
TABLE 2: Assignments for Clients A and B for Interfaces 1 , 2, 3 and 4 FIGURES 4A, 4B, 4C, and 4D are diagrams illustrating the relationship between the reserved and available bandwidth for spedfic ATM physical interfaces 141A, 14 IB, 141C, and 14 ID (in FIGURE 1A) for the above example. The relative size of each endosed drde or oval reflects the size (e.g., in terms of bandwidth) of the actual virtual path and/or virtual path group. As a general rule, the actual size of the virtual path adjusts (or is adjusted by centralized control module 160) dynamically based upon the utilization levd of that virtual path, as indicated by the bidirectional arrows crossing the borders of regions corresponding to virtual paths and virtual channels. The size of each virtual group of virtual paths is dependent upon the terms and conditions within the service contract agreement between a dient and the carrier. Once again, the sizes of the virtual path groupings are adjusted by centralized control module 160 based upon the utilization levels. As shown in FIGURE 8 and explained in the corresponding text, if the size needed by some client increases beyond a certain contractually defined point, the calls from the client admitted will be tagged as using 'over- reserved' capacity within the spedfic physical interface and will use the unspecified quality of service as defined by the ATM forum.
Spedfically, referring to FIGURE 4A, in Interface 1 , region 401 corresponds to the virtual path group for Client A in the above example, which represents 93 Mb, whereas region 402 corresponds to the virtual path group for Client B in the above example, which represents 93 Mb. Also, note within virtual path group 401, virtual paths 403 and 404 have been created, one for each quality of service promised Client A in virtual path group
401. Similarly, within virtual path group 402 for Client B, virtual paths 405 and 406 have been created, one for each quality of service promised for Client B in virtual path group
402. Additional or leftover capadty (or area) within virtual path group 401 and virtual path group 402 is unspecified. The total bandwidth capadty for virtual group 401 and virtual group 402 equals 155 Mb, which is the total fixed capadty of Interface 1. There is not any unassigned bandwidth capadty that is available for reservation.
Referring to FIGURE 4B, in Interface 2, the region 408 corresponds to the virtual path group for Client A in the above example, which represents 62 Mb. Within virtual path group 408 for Client A, virtual path 407 has been created for the spedfic quality of service for Client A in virtual path group 408. Additional bandwidth capadty (or area) within Interface 2 is available for reservation. Similarly, additional bandwidth capadty within virtual path group 408 is unspedfied.
Referring to FIGURE 4C, in Interface 3, region 409 corresponds to the virtual path group for Client B in the above example, which represents 93 Mb. Within virtual path group 409 for Client B, virtual path 410 has been created for the spedfic quality of service for Client B in virtual path group 409. Additional bandwidth capadty (or area) within Interface 3 is available for reservation. Similarly, additional bandwidth capadty within virtual path group 409 is unspecified. Referring to FIGURE 4D, no virtual path groups and/or virtual paths for any client have been assigned to Interface 4, so the entire bandwidth capadty, 155 Mb, of Interface 4 is available for reservations.
FIGURES 5A, 5B, 5C, and 5D are diagrams showing a switch level view of separate ATM physical interfaces (physical interfaces 141 A, 14 IB, 141C, and 14 ID correspond to FIGURE 1 A), for Clients A and B. Note that the quality of service has been defined when applicable. For instance, the Quality of Service 1 has been generally defined as Constant Bit Rate ("CBR") traffic and Quality of Service 2 has been generally defined as Variable Bit Rate ("VBR") traffic. Note, as shown in FIGURE 6, alternate assignments for other quality of service types can be made. Referring to FIGURE 6, for ATM Interface 600 between ATM Switches A and B (not shown), for each virtual path group, a unique virtual path will be provisioned for each spedfic traffic type as indicated by its quality of service requirements. One additional virtual path will be provisioned for "unspedfied" quality of service, which will be used by the virtual path network service provider to offer an "unguaranteed" service or a "best-effort" service. In particular, if Client A requires or contracts for a certain amount of capadty for CBR traffic (for voice and video), VBR traffic (for packetized audio and video), Connection-Oriented traffic (for frame-Rday), and/or
Connectionless traffic (for IP traffic), Client A will be assigned a virtual path group 601 having virtual paths 403 for CBR traffic, virtual path 604 for VBR, virtual path 605 for Connection-Oriented traffic, and virtual path 606 for Connectionless traffic. Similarly, if Client B requires or contracts for a certain amount of capadty for CBR and VBR traffic, but not any virtual paths for any other forms of traffic (e.g., connection-oriented traffic and connectionless traffic), Client B will be assigned virtual path group 602 having virtual paths for CBR traffic and virtual path 608 for VBR traffic. As a general rule, the bandwidth requirements are calculated differentiates for each quality of service. Virtual path 609 is not a member of any virtual path group and is unspedfied and otherwise available to be used on an 'as-needed' case by either Client A, Client B, or another client.
Preferred embodiments take advantage of the fact that each allocation to each client has varying amounts of unspedfied quality of service capadty and that, while Interface 1 appears to be completely booked, Interfaces 2 and 3 have varying amounts of bandwidth that is available to be reserved by Clients A and/or B and/or any other client and Interface 4 appears to be completely clear of any reservations. Thus, bandwidth reserved is not necessary equal to bandwidth utilized. Centralized control module 160 simultaneously balances the use of the under utilized bandwidth and the obligations to the service contract agreements and prevents overload conditions to use each ATM Switch and the overall ATM network to the utmost. By comparison, traditional time multiplexed systems dedicate transmission and switching resources when a call "reserves" bandwidth during call setups, which ties up the capacity for the call duration, even if all of the capadty is not needed. Thus, as far as its call admission control system is concerned, bandwidth reserved is equal to bandwidth utilized, which means large portions of physical interfaces are not used on an ongoing basis and there is no way to actively and systematically utilize such unused capacity. Referring to FIGURE 7A, the bandwidth capadty of a transmission fadlity 700
(e.g., SONET OC-3 fiber optic fadlity, which has a bandwidth capadty of 155 Megabits per second (Mb/s)), virtual path 702, and virtual channds 703 arc conceptually represented by "pipes" of various sizes that are nested inside of each other, wherdn the diameter of each pipe represents the bandwidth of transmission fadlity 700, virtual path 702, and virtual channels 703. Virtual path 702 may be comprised of at least one virtual channel 403, which reside inside virtual path 702. Note, however, a virtual path is not required to hold any virtual channels, but every virtual channd must be in a virtual path. Of course, although not shown in FIGURE 7A (see FIGURE 6), transmission fadlities 700 may contain additional virtual paths, other than virtual path 702 and these additional virtual paths would rest inside transmission fadlity 700, like virtual path 702. As shown in
FIGURE 7A, virtual channels 703 consume all of the available bandwidth of virtual path 702. As a result, any attempt to create an additional virtual channd 703 in virtual path 702 will be denied by the CAC of the ATM switch. As shown in FIGURE 4B, preferred embodiments of bandwidth manager module 150 effectivdy increased or otherwise adjusted the size of virtual path 702 to provide extra capadty 704, so that additional virtual channels 703 can be created to accommodate varying demands of clients on an ATM Network, such as ATM network 120 in FIGURE 1 B.
Bandwidth manager module 150 dynamically manages bandwidths utilized by virtual paths in reaction or antidpation to traffic volume levels. For instance, as shown in TABLE 3, data traffic, such as e-mail and file transfers, and voice traffic, such as telephone conversations, typically vary throughout a day, but data traffic, unlike voice traffic, can be put off until the evening hours. Thus, bandwidth manager module 150 changes the virtual path sizes of virtual paths and virtual path groups according to time of day. TIME VOICE BANDWIDTH DATA BANDWIDTH
6 a.m.-6 p.m. 60% 40% 6 p.m.-6 a.m. 15% 85%
TABLE 3: Bandwidth Management Example Schedule
FIGURE 10 is a flow diagram for the procedure implemented by bandwidth manager module 150 in FIGURES 1A, IB, and 2. Spedfically, as discussed above, virtual paths are set up for each customer to provide desired connectivity to the spedfic customer sites and desired bandwidth for each traffic type according to the current time of day. Next, dther customers or bandwidth manager module 150 create and destroy corresponding virtual channd(s) within the virtual path(s) as needed. Each virtual channel that is created must be in one of the existing virtual paths, which have been set up for that spedfic customer. When a virtual channel is created, the CAC of each switch in the ATM network through which the virtual channd extends determines whether or not the virtual channel will fit in the specified (or corresponding) virtual path. Bandwidth manager module 150 then checks the customer contract and current time of day to determine whether it is permissible (the correct time) to make needed bandwidth changes. Remember, as a general rule, different bandwidths are assigned to handle different types of transmissions (e.g., data or voice) on spedfic virtual channels, depending upon the time of day. If it is not permissible to make the needed bandwidth changes, then bandwidth manager module 150 creates and destroys virtual channels as needed to make space for the requested virtual channel. Alternatively, if it is permissible to make the needed bandwidth changes, bandwidth manager module 150 calculates the sum of the bandwidth for all virtual channels on each virtual path to determine whether the total virtual channel bandwidth is larger than the new virtual path bandwidth spedfied by the customer contract for the current time of day period. If the requested (or needed) virtual channels do, indeed, fit inside the virtual path, then virtual paths are resized. If the requested (or needed) virtual channds do not fit, bandwidth manager module 150 uses the ATM switch management interface to ddete virtual channels until the sum of the virtual channel bandwidth is bdow the new virtual path bandwidth and, then, the virtual paths are resized, such that preferred embodiments use the ATM management interface to change the size of each virtual path so that it conforms to the customer contract value for the current time of day.
FURTHER MODIFICATIONS AND VARIATIONS
Although the invention has been described with reference to a spedfic embodiment, this description is not meant to be construed in a limiting sense. The example embodiments shown and described above are only intended as an example. Various modifications of the disclosed embodiment as well as alternate embodiments of the invention will become apparent to persons skilled in the art upon reference to the description of the invention. For instance, while a spedfic physical interface was described above, other physical interfaces can be used as well, such as Tl , T3, 25 Mb ATM, OC-3, OC-.12, OC-48, OC-192, and 100Mb TAXI. Note the ATM Forum, an industry consortium, have approved several of these physical interfaces and may approve other such interfaces in the future that could likely be used in preferred embodiments. In addition, physical interfaces may be based on or utilize conductive wiring, such as twisted pair, fiber optic, coax, wireless transmission fadlities and/or any combination thereof. Similarly, in addition to ATM switches, other switches can be used as well, so long as the ATM switches are compatible with UNI 3.0 or greater and provide a management interface that allows the creation, deletion, and resizing of virtual path connections. Northern Telecom's Concorde"", Vector"", and Passporttm switches generally satisfy these requirements and are preferred for that reason, but other switches may also satisfy these requirements and may be used. Also, please note that while the above discussion generally described dectrical connections as "connections," or bdng directly and/or indirectly "connected," it should be noted that these connections may also be coupled dectrically, optically, or dectromagnetically (e.g., radio signals and wireless transmissions). Control module 160 can use alternate procedures to control the operation of the ATM switches and the sizing and creation of virtual paths and channels, in addition to or in lieu of the preferred procedures shown in FIGURES 8, 9A, and 9B. In addition, note that the procedures that are implemented by centralized control module 160, call control module 140, centralized call admission control/usage module 145, and bandwidth manager module 150 in preferred embodiments use software on a computer equipped platform that directs each individual ATM switch in an ATM network. While prewired control systems could be designed and built implementing the following control mechanism and may be used, software control mechanisms are preferred, because software control mechanisms are substantially more flexible and enable the carrier operating ATM network to easily update and refine procedures used to control ATM switches. Software control mechanisms can also be easily updated to handle varying types of ATM switches, when such ATM switches are modified and/or updated. Thus, even though numerous characteristics and advantages of the present inventions have been set forth in the foregoing description, together with details of the structure and function of the inventions, the disdosure is illustrative only, and changes may be made in the detail, espedally in matters of shape, size and arrangement of the parts within the prindples of the inventions to the full extent indicated by the broad general meaning of the terms used in the attached daims. Accordingly, it should be understood that the modifications and variations suggested above and bdow are not intended to be exhaustive. These examples help show the scope of the inventive concepts, which are covered in the appended daims. The appended daims are intended to cover these modifications and alternate embodiments.
In short, the description and drawings of the spedfic examples above are not intended to point out what an infringement of this patent would be, but are to provide at least one explanation of how to make and use the inventions contained herdn. The limits of the inventions and the bounds of the patent protection are measured by and defined in the following daims.

Claims

CLAIMSWhat is claimed:
1. A system, comprising:
(a) a plurality of interconnected asynchronous transfer mode switches that are interconnected with one another via at least one physical interface to form a network, said network used to transfer various types of information, each asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches having a connection admission control module to determine whether a virtual connection can be connected through that particular asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches, said virtual connection connecting one asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches to at least one other asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches via a link of said at least one physical interface; and (b) a system control module connected to at least one asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches, said system control module determines whether said virtual connection can be created in said network.
2. The system of Claim 1 , further wherein said system control module considers at least one factor to determine whether said virtual connection through said network can be made, said at least one factor is sdected from a group consisting of terms and conditions of a network contract agreement covering said virtual connection, type of information that said virtual connection will transfer, quality of service expected of said virtual connection, existing traffic load of said network, and utilization of said network.
3. The system of Claim 1 , wherein said system control module on an on-going basis determines whether said network is in an overload condition and said system control module also checks said overload condition and deterrnines whether said virtual connection can be set up for said network.
4. The system of Claim 3, wherein said virtual connection is requested by a client, said client signed an agreement concerning said client's use of said network, said agreement defining certain conditions concerning parameter expectations and quality of service expectations, and wherein said virtual connection has corresponding parameter requirements and quality of service requirements, said system control module checks said agreement to ensure that said corresponding parameter requirements and quality of service requirements of said virtual connection are compliant with said parameter expectations and said quality of service expectations of said agreement.
5. The system of Claim 3, wherein said virtual connection is requested by a client, said client signed an agreement concerning said client's use of said network, said agreement defining parameter requests for said virtual connection that are available to said client, and wherein said virtual connection has corresponding parameter requirements and quality of service requirements, and said system control module performs step (i) checks with said agreement to determine whether said parameter requirements of said virtual connections are compliant with said agreement, step (ii) checks with said agreement governing quality of service requests to determine whether said quality of service requirements of said virtual connections are compliant with said agreement, and step (iii) determines whether said virtual connection has any available capadty.
6. The system of Claim 5, wherein said system control module performs said step (i) before said step (ii) and before said step (iii).
7. The system of Claim 6, wherein said system control module performs step (ii) before said step (iii).
8. The system of Claim 3, wherein, if said system is not in an overload condition and said system control module does not otherwise allow said virtual connection to be created, said system control module allows said virtual connection to be set up in unspedfied capacity of said network.
9. The system of Claim 8, wherein said virtual connection has a bandwidth and, if said system is not in an overload condition, said system control module further adds a bandwidth amount corresponding to said bandwidth of said virtual connection to a running sum of used bandwidth capadty.
10. The system of Claim 1 , wherein said physical interface is sdected from a group consisting of fiber optic, twisted pair, coax, and wireless.
1 1. The system of Claim 1 , wherein said various types of information indudes information selected from a group consisting of constant bit rate information, voice information, video information, variable bit rate information, data information, connection- oriented information, frame-relay information, and connectionless information.
12. The system of Claim 1 , wherein said virtual connection is selected from a group consisting of virtual paths and virtual channels and any combination of virtual paths and virtual channels.
13. The system of Claim 3, wherdn said network has a utilization level and further wherein said system control module periodically and continuously checks said utilization level of said network.
14. The system of Claim 3, wherein said virtual connection is comprised of at least one virtual path group and each virtual path group of said at least one virtual path group is comprised of at least one virtual path and further wherein each virtual path group has a first utilization level and each virtual path has a second utilization level and said system control module checks said second utilization level of each virtual path in one virtual path group and then said first utilization level of said virtual path group to establish said overload condition.
15. A system of monitoring use of a network, said network used to transfer information from a first location to a second location, comprising:
(a) a plurality of interconnected asynchronous transfer mode switches that are interconnected with one another via at least one physical interface to form said network and a virtual path group connecting one asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches to at least one other asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches via a first physical interface of said at least one physical interface, said virtual path group comprised of at least one virtual path, each virtual path is comprised of at least one virtual channel; and
(b) a system control module connected to at least one asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches, said system control module determines whether said virtual path group can be created in said network, said system control module determines whether said at least one virtual channel of each said virtual path can be created in said network.
16. The system of Claim 15 , wherein a client is allowed to use said network under certain drcumstances, and further wherein said system control module compares a request from said client to use said virtual grouping with a contract with said client having terms and conditions governing said certain drcumstances to determine whether said request of said client is complaint with said terms and conditions found in said contract.
17. The system of Claim 16, wherein if said request of said client is not compliant with said terms and conditions of said contract, said system control module determines whether said network is presently overloaded or not, and, if said network is not presently overloaded, said network utilizes unspedfied virtual channels in said virtual path group to satisfy said request of said client.
18. The system of Claim 16, wherein said terms and conditions define quality of service expectations and certain parameter restrictions.
19. The system of Claim 18, further wherein if said system control module determines that said request from said client is not compliant with said quality of service expectations or said certain parameter restrictions, said system control module determines whether said network is presently overloaded, and, if said network is not presently overloaded, said network utilizes unspecified capadty in any one of said at least one virtual path groups to satisfy said request of said dient.
20. The system of Claim 15, wherein said network has a utilization levd and further wherein said system control module periodically and continuously checks said utilization level to determine whether said network is overloaded, whether said virtual path group can be created, and whether said at least one virtual channel of said virtual path can be created.
21. The system of Claim 15, wherein each virtual path group has a first utilization level and each virtual path has a second utilization level and said system control module checks said second utilization level of each virtual path in one virtual path group and then said first utilization level of said virtual path group to determine whether said at least one virtual channel of said virtual path can be created.
22. The system of Claim 15, wherein system control module considers at least one factor to determine whether said virtual path grouping or said virtual channel can be formed, said at least one factor is selected from a group consisting of terms and conditions of a network contract agreement covering a client's unspedfied capadty, type of information transferred, quality of service expectations, existing traffic load of said network and utilization of said network.
23. The system of Claim 1 , further wherein each asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches has a connection admission control module to determine whether said virtual connection can be connected to that particular asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches and said system control module communicates with each connection admission control module of each asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches that will be connected to another asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches by said virtual connection through said network in determining whether said virtual connection can be created in said network.
24. The system of Claim 15, further wherein each asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches has a connection admission control module to determine whether said virtual channel of each virtual path can be connected to that particular asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches and wherein said system control module communicates with each connection admission control module of each asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches that will be connected to another asynchronous transfer mode switch of said plurality of interconnected asynchronous transfer mode switches by said virtual path group through said network to determine whether said virtual path group can be created and whether said at least one virtual channd of each virtual path can be created in said network.
25. A process of monitoring a utilization level of a grouping of virtual paths on a physical interface, comprising:
(a) checking said utilization level of said grouping of said virtual paths; (b) updating an amount of available bandwidth for said grouping of said virtual paths; and (c) comparing said amount of available bandwidth with a maximum threshold for said available bandwidth and setting an overload condition if said amount exceeds said maximum threshold and clearing said overload condition if said amount is bdow said maximum threshold.
5 26. The process of monitoring a utilization levd of a grouping of virtual paths of
Claim 25 , further comprising:
(d) comparing said amount to a minimum threshold condition and releasing a block of borrowed bandwidth to said physical interface if said amount is below said minimum threshold condition. 0
27. The process of monitoring a utilization level of a grouping of virtual paths of
Claim 25, further comprising:
(d) requesting a block of additional bandwidth from said physical interface if said amount exceeds said maximum threshold; and
(e) updating total bandwidth allocation and available bandwidth if additional 5 bandwidth from said physical interface is available.
28. The process of monitoring a utilization level of a grouping of virtual paths of Claim 25, further comprising:
(d) requesting a block of additional bandwidth from said physical interface if said amount exceeds said maximum threshold; and o (e) searching for violations of terms and conditions of client contracts and taking measures to enforce client contracts if additional bandwidth from said physical interface is not available.
29. A process of monitoring a utilization level of a grouping of a virtual path on a physical interface, comprising: 5 (a) checking said utilization level of said virtual path;
(b) updating an amount of available bandwidth for said virtual path; and (c) comparing said amount of available bandwidth with a maximum threshold for said available bandwidth and setting an overload condition if said amount exceeds said maximum threshold and dearing said overload condition if said amount is bdow said maximum threshold.
5 30. The process of monitoring a utilization levd of a virtual path on a physical interface of Claim 29, further comprising:
(d) comparing said amount to a minimum threshold condition and releasing a block of borrowed bandwidth to said physical interface if said amount is below said minimum threshold condition.
31. The process of monitoring a utilization level of a virtual path of Claim 29, further comprising:
(d) requesting a block of additional bandwidth from said physical interface if said amount exceeds said maximum threshold; and
(e) updating total bandwidth allocation and available bandwidth if additional 5 bandwidth from said physical interface is available.
32. The process of monitoring a utilization level of a virtual path of Claim 29, further comprising:
(d) requesting a block of additional bandwidth from said physical interface if said.amount exceeds said maximum threshold; and o (e) searching for violations of terms and conditions of client contracts and taking measures to enforce client contracts if additional bandwidth from said physical interface is not available.
33. A process of monitoring a utilization levd of a virtual connection on a physical interface, said virtual connection on said physical interface comprising a plurality of 5 groupings of virtual paths in which each grouping of virtual paths comprising a plurality of virtual path, each grouping of virtual paths having a grouping utilization level and each virtual path having a path utilization levd, comprising:
(a) monitoring said path utilization levd of each virtual path in one grouping of virtual paths of said plurality of virtual paths to generate a path usage amount; (b) combining said path usage amounts of each virtual path of said one grouping of virtual paths to monitor said grouping utilization labd of said one grouping of virtual paths.
34. The process of monitoring a utilization level of a virtual connection on a physical interface of Claim 33, further comprising: (c) repeating steps (a) and (b) for each grouping of virtual paths in said plurality of grouping of virtual paths.
35. The process of monitoring a utilization level of a virtual connection on a physical interface of Claim 33, wherein steps (a) and (b) are performed at periodic intervals.
36. The process of monitoring a utilization level of a virtual connection on a physical interface of Claim 33, wherein step (a) further comprises:
(a 1 ) checking said grouping utilization level of said one grouping of said virtual paths;
(a2) updating an amount of available bandwidth for said one grouping of said virtual paths; and (a3) comparing said amount of available bandwidth with a maximum threshold for said available bandwidth and setting an overload condition if said amount exceeds said maximum threshold and clearing said overload condition if said amount is below said maximum threshold.
37. The process of monitoring a utilization level of a virtual connection on a physical interface of Claim 36, wherein step (a) further comprises: (a4) comparing said amount to a minimum threshold condition and releasing a block of borrowed bandwidth to said physical interface if said amount is bdow said minimum threshold condition.
38. The process of monitoring a utilization levd of a virtual connection on a 5 physical interface of Claim 36, wherdn step (a) further comprises:
(a4) requesting a block of additional bandwidth from said physical interface if said amount exceeds said maximum threshold; and
(a5) updating total bandwidth allocation and available bandwidth if additional bandwidth from said physical interface is available.
39. The process of monitoring a utilization level of a virtual connection on a physical interface of Claim 33, wherein step (a) further comprises:
(d) requesting a block of additional bandwidth from said physical interface if said amount exceeds said maximum threshold; and
(e) searching for violations of terms and conditions of client contracts and 5 taking measures to enforce dient contracts if additional bandwidth from said physical interface is not available.
40. The process of monitoring a utilization level of a virtual connection on a physical interface of Claim 33, wherein step (b) further comprises: (bl ) checking said utilization levd of said virtual path; o (b2) updating an amount of available bandwidth for said virtual path; and
(b3) comparing said amount of available bandwidth with a maximum threshold for said available bandwidth and setting an overload condition if said amount exceeds said maximum threshold and dearing said overload condition if said amount is below said maximum threshold. 5 41. The process of monitoring a utilization levd of a virtual connection on a physical interface of Claim 40, further comprising: (b4) comparing said amount to a niinimum threshold condition and releasing a block of borrowed bandwidth to said physical interface if said amount is bdow said minimum threshold condition.
42. The process of monitoring a utilization level of a virtual connection on a physical interface of Claim 40, further comprising:
(b4) requesting a block of additional bandwidth from said physical interface if said amount exceeds said maximum threshold; and
(b5) updating total bandwidth allocation and available bandwidth if additional bandwidth from said physical interface is available.
43. The process of monitoring a utilization levd of a virtual connection on a physical interface of Claim 40, further comprising:
(b6) requesting a block of additional bandwidth from said physical interface if said amount exceeds said maximum threshold; and
(b7) searching for violations of terms and conditions of client contracts and talcing measures to enforce client contracts if additional bandwidth from said physical interface is not available.
44. A system, comprising:
(a) a first asynchronous transfer mode switch;
(b) a second asynchronous transfer mode switch that is interconnected with said first asynchronous transfer mode switch via a physical interface, said first asynchronous transfer mode switch transfer various types of information to said second asynchronous transfer mode switch via said a virtual connection on said physical interface; and
(c) a system control module in communication with said first asynchronous transfer mode switch, said system control module in communication with said second asynchronous transfer mode switch via said first asynchronous transfer mode switch and said physical interface, said system control module dynamically determines whether said virtual connection can be created.
45. The system of Claim 44, wherein said first asynchronous transfer mode switch has a first connection admission control module therein to determine whether said virtual connection can be connected through said first asynchronous transfer mode switch and said second asynchronous transfer mode switch has a second connection admission control module therein to determine whether said virtual connection can be connected through said second asynchronous transfer mode switch.
46. The system of Claim 44, wherein said virtual connection is requested to occur at a spedfic time of day and is adapted to transfer a specific type of information and system control module considers said spedfic time of day and said spedfic type of information to determine whether to create said virtual connection.
47. The system of Claim 44, wherein said system control module considers at least one factor to determine whether to make said virtual connection, said at least one factor is selected from a group consisting of terms and conditions of a network contract agreement covering said virtual connection, type of information that said virtual connection will transfer, quality of service expected of said virtual connection, existing traffic load of said network, utilization of said network, and date and time of day that said virtual connection will exist.
48. The system of Claim 44, wherein said system control module on an on-going basis determines whether said physical link is in an overload condition and said system control module also checks said overload condition and determines whether said virtual connection can be set up for said network.
49. The system of Claim 44, wherein said physical interface is selected from a group consisting of fiber optic, twisted pair, coax, and wireless.
50. The system of Claim 44, wherein said various types of information indudes information selected from a group consisting of constant bit rate information, voice information, video information, variable bit rate information, data information, connection- oriented information, frame-relay information, and connectionless information.
51. The system of Claim 44, wherdn said virtual connection is sdected from a group consisting of virtual paths, virtual channels, groupings of virtual paths, and any combination of virtual paths and virtual channels.
52, The system of Claim 16, wherein said physical interface has a corresponding utilization level and further wherein said system control module periodically and continuously checks said utilization level to determine whether said virtual connection should be created.
53. The system of Claim 16, wherein said virtual connection is comprised of at least one virtual path group and each virtual path group of said at least one virtual path group is comprised of at least one virtual path and further wherdn each virtual path group has a first utilization level and each virtual path has a second utilization level and said system control module checks said second utilization level of each virtual path in one virtual path group and then said first utilization level of said virtual path group.
PCT/US1997/022776 1996-12-13 1997-12-12 Dynamic control processes and systems for asynchronous transfer mode networks WO1998026612A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU56003/98A AU5600398A (en) 1996-12-13 1997-12-12 Dynamic control processes and systems for asynchronous transfer mode networks

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/764,959 1996-12-13
US08/764,959 US5953338A (en) 1996-12-13 1996-12-13 Dynamic control processes and systems for asynchronous transfer mode networks

Publications (3)

Publication Number Publication Date
WO1998026612A2 true WO1998026612A2 (en) 1998-06-18
WO1998026612A3 WO1998026612A3 (en) 1998-10-01
WO1998026612A9 WO1998026612A9 (en) 1998-11-19

Family

ID=25072275

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/022776 WO1998026612A2 (en) 1996-12-13 1997-12-12 Dynamic control processes and systems for asynchronous transfer mode networks

Country Status (3)

Country Link
US (1) US5953338A (en)
AU (1) AU5600398A (en)
WO (1) WO1998026612A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000033606A1 (en) * 1998-12-01 2000-06-08 Nortel Networks Limited An adaptive connection admission control scheme for packet networks
WO2005067203A1 (en) 2003-12-30 2005-07-21 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic
US8631151B2 (en) 2006-05-18 2014-01-14 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic

Families Citing this family (208)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6314103B1 (en) 1994-05-05 2001-11-06 Sprint Communications Company, L.P. System and method for allocating bandwidth for a call
DE69533831T2 (en) 1994-05-05 2005-04-21 Sprint Communications Co METHOD, SYSTEM AND TRANSMISSION CONTROL DEVICE
US6430195B1 (en) 1994-05-05 2002-08-06 Sprint Communications Company L.P. Broadband telecommunications system interface
GB9603582D0 (en) 1996-02-20 1996-04-17 Hewlett Packard Co Method of accessing service resource items that are for use in a telecommunications system
US6154445A (en) 1996-04-18 2000-11-28 Bell Atlantic Network Services, Inc. Telephony communication via varied redundant networks
US6069890A (en) 1996-06-26 2000-05-30 Bell Atlantic Network Services, Inc. Internet telephone service
JP3672683B2 (en) * 1996-10-28 2005-07-20 富士通株式会社 Traffic control method, network system, and frame relay switch
US6078582A (en) * 1996-12-18 2000-06-20 Bell Atlantic Network Services, Inc. Internet long distance telephone service
IT1289816B1 (en) * 1996-12-30 1998-10-16 Sip INTERFACE DEVICE FOR ATM TYPE NETWORKS
US5978379A (en) 1997-01-23 1999-11-02 Gadzoox Networks, Inc. Fiber channel learning bridge, learning half bridge, and protocol
US6137869A (en) 1997-09-16 2000-10-24 Bell Atlantic Network Services, Inc. Network session management
US6574216B1 (en) 1997-03-11 2003-06-03 Verizon Services Corp. Packet data network voice call quality monitoring
US6125123A (en) * 1997-03-14 2000-09-26 Fujitsu Limited Signaling method, switching system, storage medium and network
JPH10262050A (en) * 1997-03-17 1998-09-29 Fujitsu Ltd Atm exchange and atm communication system
US6292479B1 (en) 1997-03-19 2001-09-18 Bell Atlantic Network Services, Inc. Transport of caller identification information through diverse communication networks
US6870827B1 (en) 1997-03-19 2005-03-22 Verizon Services Corp. Voice call alternative routing through PSTN and internet networks
GB2324223A (en) * 1997-04-11 1998-10-14 Northern Telecom Ltd Network management
US6704327B1 (en) 1997-05-09 2004-03-09 Sprint Communications Company, L.P. System and method for connecting a call
JP3441044B2 (en) * 1997-05-30 2003-08-25 富士通株式会社 Persistent virtual connection reservation control device and readable storage medium for causing a computer to perform a persistent virtual connection reservation control function
GB9718269D0 (en) * 1997-08-28 1997-11-05 British Telecomm Connection admission control for connection orientated networks
US6912222B1 (en) 1997-09-03 2005-06-28 Internap Network Services Corporation Private network access point router for interconnecting among internet route providers
US6163542A (en) * 1997-09-05 2000-12-19 Carr; David Walter Virtual path shaping
DE19740106A1 (en) * 1997-09-12 1999-03-18 Alsthom Cge Alcatel Method for establishing logical connections in a synchronous digital communication network, network element and management system
US6081517A (en) * 1997-09-22 2000-06-27 Integrated Telecom Express, Inc. Digital subscriber loop access circuit for digital switch and packet network interconnections
CA2242219A1 (en) * 1997-10-03 1999-04-03 Newbridge Networks Corporation Classes of service in an mpoa network
US6614765B1 (en) * 1997-10-07 2003-09-02 At&T Corp. Methods and systems for dynamically managing the routing of information over an integrated global communication network
US6118788A (en) * 1997-10-15 2000-09-12 International Business Machines Corporation Balanced media access methods for wireless networks
JPH11136238A (en) * 1997-10-28 1999-05-21 Fujitsu Ltd System for controlling signal frequency band in packet network
US6169740B1 (en) * 1997-10-30 2001-01-02 Nortel Networks Limited Method of and apparatus for virtual link management
GB2331659A (en) * 1997-11-21 1999-05-26 Ericsson Telefon Ab L M Resource reservation
JP3881102B2 (en) * 1997-12-26 2007-02-14 富士通株式会社 Conversion circuit in mixed network
CA2226063C (en) * 1997-12-31 2003-10-07 Northern Telecom Limited A method of provisioning nodes within a communications network
JPH11225147A (en) * 1998-02-05 1999-08-17 Fujitsu Ltd Communication method in central supervisory system
US6922409B1 (en) * 1998-02-20 2005-07-26 Sprint Communications Company L.P. System and method for allocating bandwidth for a call
US7079534B1 (en) 1998-02-20 2006-07-18 Sprint Communications Company L.P. System and method for allocating bandwidth for a call
US6574222B1 (en) * 1998-02-20 2003-06-03 Sprint Communications Company, L.P. System and method for allocating bandwidth for a call
US6314110B1 (en) * 1998-03-06 2001-11-06 Cisco Technology, Inc. Method and apparatus for distributed bandwidth allocation for a bi-directional ring media with spatial and local reuse
US6735176B1 (en) * 1998-03-26 2004-05-11 Nortel Networks Limited Dynamic bandwidth management and rerouting
US6781996B1 (en) * 1998-04-16 2004-08-24 Samsung Electronics Co., Ltd. System and method in an ATM switch for dynamically routing data cells using quality of service data
US6331986B1 (en) * 1998-04-24 2001-12-18 Lucent Technologies Inc. Method for resource allocation and routing in multi-service virtual private networks
JP3233208B2 (en) * 1998-04-30 2001-11-26 日本電気株式会社 Layer 3 flow switching method
US6137801A (en) * 1998-05-05 2000-10-24 Excel Switching Corporation Telecommunication switching system administrative and management tools
FI105970B (en) * 1998-06-05 2000-10-31 Nokia Networks Oy Procedures and systems for road selection
US6446122B1 (en) * 1998-06-24 2002-09-03 Cisco Technology, Inc. Method and apparatus for communicating quality of service information among computer communication devices
US6745243B2 (en) * 1998-06-30 2004-06-01 Nortel Networks Limited Method and apparatus for network caching and load balancing
JP3634635B2 (en) * 1998-07-31 2005-03-30 富士通株式会社 Cell switching device for controlling fixed rate connections
US6356546B1 (en) * 1998-08-11 2002-03-12 Nortel Networks Limited Universal transfer method and network with distributed switch
US6912232B1 (en) * 1998-10-19 2005-06-28 At&T Corp. Virtual private network
EP1127435A1 (en) * 1998-10-27 2001-08-29 Fujitsu Network Communications, Inc. Frame based quality of service
US7430171B2 (en) 1998-11-19 2008-09-30 Broadcom Corporation Fibre channel arbitrated loop bufferless switch circuitry to increase bandwidth without significant increase in cost
US6563793B1 (en) 1998-11-25 2003-05-13 Enron Warpspeed Services, Inc. Method and apparatus for providing guaranteed quality/class of service within and across networks using existing reservation protocols and frame formats
DE19855194C2 (en) * 1998-11-30 2001-06-13 Siemens Ag Method and communication system for the transmission of data of a combination of several services via shared physical channels
US6724765B1 (en) 1998-12-22 2004-04-20 Sprint Communications Company, L.P. Telecommunication call processing and connection system architecture
US6888833B1 (en) 1998-12-22 2005-05-03 Sprint Communications Company L.P. System and method for processing call signaling
US6785282B1 (en) 1998-12-22 2004-08-31 Sprint Communications Company L.P. System and method for connecting a call with a gateway system
US6982950B1 (en) 1998-12-22 2006-01-03 Sprint Communications Company L.P. System and method for connecting a call in a tandem architecture
US6728272B1 (en) 1998-12-30 2004-04-27 At&T Corp. Method and apparatus for transporting private line traffic over an ATM network
US6963916B1 (en) * 1998-12-31 2005-11-08 Qwest Communications International Inc. Network management system and graphical user interface
US6903755B1 (en) 1998-12-31 2005-06-07 John T. Pugaczewski Network management system and graphical user interface
US6631134B1 (en) * 1999-01-15 2003-10-07 Cisco Technology, Inc. Method for allocating bandwidth in an optical network
US6532229B1 (en) * 1999-01-15 2003-03-11 Brian Weatherred Johnson Low cost link aggregation method and system
US6535504B1 (en) * 1999-01-15 2003-03-18 Brian Weatherred Johnson Link aggregation path selection method
US6856627B2 (en) * 1999-01-15 2005-02-15 Cisco Technology, Inc. Method for routing information over a network
US7046631B1 (en) * 1999-01-22 2006-05-16 Alcatel Canada Inc. Method and apparatus for provisioning traffic dedicated cores in a connection oriented network
US6789118B1 (en) 1999-02-23 2004-09-07 Alcatel Multi-service network switch with policy based routing
US6980515B1 (en) 1999-02-23 2005-12-27 Alcatel Multi-service network switch with quality of access
US6674756B1 (en) * 1999-02-23 2004-01-06 Alcatel Multi-service network switch with multiple virtual routers
US7095759B1 (en) * 1999-03-19 2006-08-22 At Comm Corporation Combined telephone PBX and computer data router with pooled resources
US6724722B1 (en) * 1999-03-19 2004-04-20 Lucent Technologies Inc. Managing congestion and potential traffic growth in an information network
US6771648B1 (en) * 1999-03-31 2004-08-03 Marconi Communications, Inc. Method and apparatus for a dynamic call admission control algorithm
US6577653B1 (en) * 1999-04-28 2003-06-10 3Com Corporation Apparatus for and method of establishing a route utilizing multiple parallel segments in an asynchronous transfer mode network
US6356544B1 (en) * 1999-05-03 2002-03-12 Fujitsu Network Communications, Inc. SONET add/drop multiplexer with packet over SONET capability
US7103068B1 (en) 1999-05-04 2006-09-05 Sprint Communication Company L.P. System and method for configuring bandwidth transmission rates for call connections
US6430619B1 (en) 1999-05-06 2002-08-06 Cisco Technology, Inc. Virtual private data network session count limitation
US6529955B1 (en) 1999-05-06 2003-03-04 Cisco Technology, Inc. Proxy session count limitation
US6895088B1 (en) 1999-05-21 2005-05-17 Sprint Communications Company L.P. System and method for controlling a call processing system
US6721323B1 (en) * 1999-06-14 2004-04-13 Tellab Operations, Inc. Distributed virtual path
DE19927544A1 (en) * 1999-06-16 2000-12-21 Bosch Gmbh Robert Process for controlling the data flow from terminals in centrally controlled communication systems
US6539017B1 (en) * 1999-06-28 2003-03-25 Cisco Technology, Inc. Method and apparatus for arranging and adjusting a bundle in an ATM network
US7136387B2 (en) * 1999-08-09 2006-11-14 Mci, Llc Method of and system for providing quality of service in IP telephony
US6675225B1 (en) * 1999-08-26 2004-01-06 International Business Machines Corporation Method and system for algorithm-based address-evading network snoop avoider
US7072964B1 (en) * 1999-08-31 2006-07-04 Science Applications International Corporation System and method for interconnecting multiple virtual private networks
FI19991967A (en) * 1999-09-16 2001-03-16 Nokia Networks Oy Network elements and data transfer systems
US6791941B1 (en) * 1999-09-28 2004-09-14 Lucent Technologies Inc. Learning-based admission control adjustment in data networks
US6697369B1 (en) * 1999-09-28 2004-02-24 Lucent Technologies Inc Admission control adjustment in data networks using maximum cell count
US6665272B1 (en) * 1999-09-30 2003-12-16 Qualcomm Incorporated System and method for persistence-vector-based modification of usage rates
US7330815B1 (en) * 1999-10-04 2008-02-12 Globalenglish Corporation Method and system for network-based speech recognition
US7106756B1 (en) * 1999-10-12 2006-09-12 Mci, Inc. Customer resources policy control for IP traffic delivery
US6735193B1 (en) * 1999-10-28 2004-05-11 Avaya Technology Corp. Method and apparatus for suppression of packets during silence periods in a packet telephony system
US7369536B2 (en) * 1999-11-02 2008-05-06 Verizon Business Global Llc Method for providing IP telephony with QoS using end-to-end RSVP signaling
US6970930B1 (en) * 1999-11-05 2005-11-29 Mci, Inc. Method and system of providing differentiated services
US6816497B1 (en) 1999-11-05 2004-11-09 Sprint Communications Company, L.P. System and method for processing a call
US6954739B1 (en) * 1999-11-16 2005-10-11 Lucent Technologies Inc. Measurement-based management method for packet communication networks
JP3614059B2 (en) * 1999-11-30 2005-01-26 日本電気株式会社 Communication connection merging method and node using the same
US6388991B1 (en) 1999-12-23 2002-05-14 West Communications International Inc. Method and system for interfacing between circuit network switches and ATM edge switches
US7990882B1 (en) * 1999-12-30 2011-08-02 Avaya Inc. Adaptively maintaining quality of service (QoS) in distributed PBX networks
EP1447998A1 (en) * 1999-12-30 2004-08-18 Nortel Networks Limited Adaptively maintaining quality of service (Qos) in distributed PBX networks
US6665273B1 (en) * 2000-01-11 2003-12-16 Cisco Technology, Inc. Dynamically adjusting multiprotocol label switching (MPLS) traffic engineering tunnel bandwidth
JP3508669B2 (en) * 2000-01-18 2004-03-22 日本電気株式会社 ATM connection bandwidth control method
US6785377B1 (en) 2000-01-19 2004-08-31 Sprint Communications Company L.P. Data calls using both constant bit rate and variable bit rate connections
EP1119216A1 (en) * 2000-01-21 2001-07-25 Siemens Aktiengesellschaft Method and divice for access control in a communications network
JP2001292148A (en) * 2000-02-01 2001-10-19 Hitachi Ltd Atm communications equipment and its band control method
US7260635B2 (en) * 2000-03-21 2007-08-21 Centrisoft Corporation Software, systems and methods for managing a distributed network
US6671724B1 (en) * 2000-03-21 2003-12-30 Centrisoft Corporation Software, systems and methods for managing a distributed network
DE60102367T2 (en) * 2000-04-13 2005-02-17 Operax Ab NETWORK OPTIMIZATION METHOD
JP3855595B2 (en) * 2000-04-25 2006-12-13 株式会社日立製作所 COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMMUNICATION DEVICE
EP1277304B1 (en) * 2000-04-28 2009-07-01 Broadcom Corporation High-speed serial data transceiver systems and related methods
US6810008B2 (en) 2000-05-05 2004-10-26 Park Technologies, Llc Immediate rerouting in data networks
JP4034497B2 (en) * 2000-05-08 2008-01-16 富士通株式会社 Network system
US6920107B1 (en) 2000-05-24 2005-07-19 Lucent Technologies Inc. Method and apparatus for congestion control for packet-based networks using pipeline reconfiguration
US6980517B1 (en) * 2000-05-24 2005-12-27 Lucent Technologies Inc. Method and apparatus for congestion control for packet-based networks using call gapping and rerouting in the peripheral domain
US8396052B1 (en) * 2000-07-20 2013-03-12 Alcatel Lucent Apparatus and method for synchronous and asynchronous switching of internet protocol traffic
US7788354B2 (en) * 2000-07-28 2010-08-31 Siddhartha Nag End-to-end service quality in a voice over Internet Protocol (VoIP) Network
US7088720B1 (en) * 2000-08-07 2006-08-08 Sbc Technology Resources, Inc. Multiservice use of network connection capability under user-to-network interface signaling
US7307993B2 (en) * 2000-08-08 2007-12-11 At&T Labs, Inc. Controller based call control for ATM SVC signaling
US6948000B2 (en) * 2000-09-22 2005-09-20 Narad Networks, Inc. System and method for mapping end user identifiers to access device identifiers
US7072360B2 (en) * 2000-09-22 2006-07-04 Narad Networks, Inc. Network architecture for intelligent network elements
US20020105965A1 (en) * 2000-09-22 2002-08-08 Narad Networks, Inc. Broadband system having routing identification based switching
US20020075805A1 (en) * 2000-09-22 2002-06-20 Narad Networks, Inc. Broadband system with QOS based packet handling
US20020075875A1 (en) * 2000-09-22 2002-06-20 Narad Networks, Inc. Broadband system with transmission scheduling and flow control
US7139247B2 (en) * 2000-09-22 2006-11-21 Narad Networks, Inc. Broadband system with topology discovery
US7146630B2 (en) * 2000-09-22 2006-12-05 Narad Networks, Inc. Broadband system with intelligent network devices
US20020097674A1 (en) * 2000-09-22 2002-07-25 Narad Networks, Inc. System and method for call admission control
US7027394B2 (en) * 2000-09-22 2006-04-11 Narad Networks, Inc. Broadband system with traffic policing and transmission scheduling
US20020118688A1 (en) * 2000-10-25 2002-08-29 Ravi Jagannathan Generation of fast busy signals in data networks
US6795445B1 (en) * 2000-10-27 2004-09-21 Nortel Networks Limited Hierarchical bandwidth management in multiservice networks
US7154851B1 (en) 2000-12-05 2006-12-26 Nortel Networks Limited Application-aware resource reservation in multiservice networks
JP3779543B2 (en) * 2000-12-20 2006-05-31 株式会社日立コミュニケーションテクノロジー Path size control method and operation system in transmission apparatus
JP4141106B2 (en) * 2001-02-06 2008-08-27 富士通株式会社 Bandwidth control device
DE60214829T2 (en) * 2001-03-09 2007-04-26 Gen-Probe Inc., San Diego PUNCHABLE CLOSURE
US7796608B2 (en) 2001-03-20 2010-09-14 Verizon Business Global Llc Edge-based per-flow QoS admission control in a data network
US7069337B2 (en) * 2001-03-20 2006-06-27 Mci, Inc. Policy-based synchronization of per-class resources between routers in a data network
US7209439B2 (en) * 2001-03-20 2007-04-24 Mci, Llc Pool-based resource management in a data network
US7457239B2 (en) * 2001-03-22 2008-11-25 Hitachi, Ltd. Method and apparatus for providing a quality of service path through networks
JP2002290433A (en) * 2001-03-27 2002-10-04 Fujitsu Ltd Data repeater system provided with band control function, and band management device
US20020141420A1 (en) * 2001-03-30 2002-10-03 Sugiarto Basuki Afandi Throttling control system and method
US20020159468A1 (en) * 2001-04-27 2002-10-31 Foster Michael S. Method and system for administrative ports in a routing device
US6956866B1 (en) * 2001-05-23 2005-10-18 Cisco Technology, Inc. Method and apparatus for collecting statistics from elements at multiple collection rates
US7961616B2 (en) 2001-06-07 2011-06-14 Qualcomm Incorporated Method and apparatus for congestion control in a wireless communication system
JP4176011B2 (en) * 2001-07-10 2008-11-05 シャープ株式会社 AV data transmitter, AV data receiver, AV data display / playback device
US7136386B2 (en) * 2001-07-19 2006-11-14 Sbc Technology Resources, Inc. Virtual private network over asynchronous transfer mode
US7187678B2 (en) 2001-08-13 2007-03-06 At&T Labs, Inc. Authentication for use of high speed network resources
US7177971B2 (en) * 2001-08-24 2007-02-13 Intel Corporation General input/output architecture, protocol and related methods to provide isochronous channels
US6691192B2 (en) 2001-08-24 2004-02-10 Intel Corporation Enhanced general input/output architecture and related methods for establishing virtual channels therein
AU2002326752A1 (en) * 2001-08-24 2003-03-10 Intel Corporation (A Delaware Corporation) (A Delawware Corporation) A general input/output architecture protocol and related methods to manage data integrity
US9836424B2 (en) 2001-08-24 2017-12-05 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
FI20011949A0 (en) * 2001-10-05 2001-10-05 Stonesoft Corp Managing a Virtual Private Network
WO2003036889A1 (en) 2001-10-25 2003-05-01 Worldcom, Inc. Communication session quality indicator
EP1383353B1 (en) * 2002-07-05 2005-04-13 Alcatel Resource admission control in an access network
US8060643B2 (en) * 2002-08-30 2011-11-15 Hewlett-Packard Development Company, L.P. Method and apparatus for dynamically managing bandwidth for clients in a storage area network
US7277392B2 (en) * 2002-10-01 2007-10-02 Motorola, Inc. Method and apparatus for managing the usage of data link resources
US8045539B2 (en) * 2002-10-25 2011-10-25 Alcatel Lucent Virtual group connection scheme for ATM architecture in an access node
US7283532B2 (en) * 2002-10-25 2007-10-16 Alcatel Lucent Hierarchical scheduler architecture for use with an access node
US7336662B2 (en) * 2002-10-25 2008-02-26 Alcatel Lucent System and method for implementing GFR service in an access node's ATM switch fabric
US7236495B2 (en) * 2002-10-25 2007-06-26 Alcatel Lucent Calendar heap system and method for efficient sorting
US7280542B2 (en) * 2002-10-25 2007-10-09 Alcatel Lucent Multicasting system and method for use in an access node's ATM switch fabric
US7701953B2 (en) * 2002-11-04 2010-04-20 At&T Intellectual Property I, L.P. Client server SVC-based DSL service
US7602788B2 (en) 2002-11-04 2009-10-13 At&T Intellectual Property I, L.P. Peer to peer SVC-based DSL service
US7599287B2 (en) * 2002-11-15 2009-10-06 Cisco Technology, Inc. Tokens in token buckets maintained among primary and secondary storages
US7304942B1 (en) 2002-11-15 2007-12-04 Cisco Technology, Inc. Methods and apparatus for maintaining statistic counters and updating a secondary counter storage via a queue for reducing or eliminating overflow of the counters
EP1584164A2 (en) * 2002-12-31 2005-10-12 Conexant, Inc. System and method for providing quality of service in asynchronous transfer mode cell transmission
US7382785B2 (en) * 2003-02-21 2008-06-03 At&T Knowledge Ventures, L.P. Extended virtual user-to-network interface with ATM network
US6947409B2 (en) * 2003-03-17 2005-09-20 Sony Corporation Bandwidth management of virtual networks on a shared network
US7797439B2 (en) * 2003-06-23 2010-09-14 Hewlett-Packard Development Company, L.P. Cost-aware admission control for streaming media server
US7443857B1 (en) * 2003-07-09 2008-10-28 Cisco Technology Inc. Connection routing based on link utilization
US20050058130A1 (en) * 2003-08-04 2005-03-17 Christ Chris B. Method and apparatus for assigning data traffic classes to virtual channels in communications networks
US8098669B2 (en) * 2003-08-04 2012-01-17 Intel Corporation Method and apparatus for signaling virtual channel support in communication networks
FI20031401A0 (en) * 2003-09-29 2003-09-29 Nokia Corp Dynamic SVC connections for AAL2 traffic transfer
US20050071494A1 (en) * 2003-09-30 2005-03-31 Rundquist William A. Method and apparatus for providing fixed bandwidth communications over a local area network
DE10350353A1 (en) * 2003-10-29 2005-06-02 Siemens Ag Method for effort limitation in the transmission of unidirectional information streams
US20050102420A1 (en) * 2003-11-11 2005-05-12 Tamas Major Link layer based network sharing
DE10357522A1 (en) * 2003-12-08 2005-07-07 Marconi Communications Gmbh Data transmission method and network
ATE461577T1 (en) * 2003-12-12 2010-04-15 Alcatel Lucent METHOD FOR AUTOCONFIGURATION OF A CPE IN A DSL NETWORK
JP2005190057A (en) * 2003-12-25 2005-07-14 Hitachi Ltd Disk array device and remote copy control method for disk array device
US7343451B2 (en) * 2003-12-25 2008-03-11 Hitachi, Ltd. Disk array device and remote copying control method for disk array device
US7539176B1 (en) 2004-04-02 2009-05-26 Cisco Technology Inc. System and method for providing link, node and PG policy based routing in PNNI based ATM networks
US7609626B2 (en) * 2004-04-16 2009-10-27 Alcatel-Lucent Usa Inc. Nodes for managing congestion and traffic flow by considering the minimization of link utilization values
US7197048B1 (en) * 2004-06-23 2007-03-27 At&T Corp Virtual private network
US7391721B1 (en) 2004-07-08 2008-06-24 Cisco Technology, Inc. Maintaining counters and updating a secondary counter storage
GR1005055B (en) * 2004-08-27 2005-12-06 Atmel Corporation Method and system for aquality of service mechanism for a wireless network
US20060045051A1 (en) * 2004-08-30 2006-03-02 Andreas Floros Method and system for a quality of service mechanism for a wireless network
US7573879B2 (en) 2004-09-03 2009-08-11 Intel Corporation Method and apparatus for generating a header in a communication network
US7703124B2 (en) * 2005-03-31 2010-04-20 Hewlett-Packard Development Company, L.P. System and method for implementing a private virtual backbone on a common network infrastructure
KR100705582B1 (en) * 2005-09-07 2007-04-09 삼성전자주식회사 apparatus and method of service providing in multitude network system
US8184643B2 (en) * 2005-09-14 2012-05-22 Ciena Corporation Device, system, and method for transporting data using combined broadband and legacy network infrastructures
US8018845B2 (en) * 2006-01-25 2011-09-13 Cisco Technology, Inc Sampling rate-limited traffic
US20070204266A1 (en) 2006-02-28 2007-08-30 International Business Machines Corporation Systems and methods for dynamically managing virtual machines
US8300798B1 (en) 2006-04-03 2012-10-30 Wai Wu Intelligent communication routing system and method
US10419360B2 (en) * 2007-05-31 2019-09-17 International Business Machines Corporation Market-driven variable price offerings for bandwidth-sharing ad hoc networks
US8620784B2 (en) * 2007-05-31 2013-12-31 International Business Machines Corporation Formation and rearrangement of ad hoc networks
US8320414B2 (en) 2007-05-31 2012-11-27 International Business Machines Corporation Formation and rearrangement of lender devices that perform multiplexing functions
US7979311B2 (en) * 2007-05-31 2011-07-12 International Business Machines Corporation Payment transfer strategies for bandwidth sharing in ad hoc networks
US8520535B2 (en) 2007-05-31 2013-08-27 International Business Machines Corporation Optimization process and system for a heterogeneous ad hoc Network
US8040863B2 (en) 2007-05-31 2011-10-18 International Business Machines Corporation Demand pull and supply push communication methodologies
US8249984B2 (en) 2007-05-31 2012-08-21 International Business Machines Corporation System and method for fair-sharing in bandwidth sharing ad-hoc networks
US7944878B2 (en) * 2007-05-31 2011-05-17 International Business Machines Corporation Filtering in bandwidth sharing ad hoc networks
US10623998B2 (en) * 2007-05-31 2020-04-14 International Business Machines Corporation Price offerings for bandwidth-sharing ad hoc networks
US8959516B2 (en) 2007-07-30 2015-02-17 International Business Machines Corporation Methods and systems for coordinated financial transactions in distributed and parallel environments
US8559310B2 (en) * 2007-09-04 2013-10-15 Ca, Inc. System and method for bandwidth control
US8000240B2 (en) * 2008-07-07 2011-08-16 Verizon Patent And Licensing Inc. Method and system for providing auto-bandwidth adjustment
US8972352B1 (en) * 2008-12-31 2015-03-03 Emc Corporation Probe based backup
US8238538B2 (en) 2009-05-28 2012-08-07 Comcast Cable Communications, Llc Stateful home phone service
US9055003B2 (en) * 2011-03-03 2015-06-09 International Business Machines Corporation Regulating network bandwidth in a virtualized environment
US8694995B2 (en) 2011-12-14 2014-04-08 International Business Machines Corporation Application initiated negotiations for resources meeting a performance parameter in a virtualized computing environment
US8863141B2 (en) 2011-12-14 2014-10-14 International Business Machines Corporation Estimating migration costs for migrating logical partitions within a virtualized computing environment based on a migration cost history
EP2838231B1 (en) * 2013-05-15 2017-02-01 NTT DoCoMo, Inc. Network system and access controller and method for operating the network system
US10263807B2 (en) * 2016-12-19 2019-04-16 Ciena Corporation Hierarchical statistics acceleration
US10779017B2 (en) * 2018-12-10 2020-09-15 Warner Bros. Entertainment Inc. Method and system for reducing drop-outs during video stream playback

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5282207A (en) * 1991-03-28 1994-01-25 Sprint International Communications Corp. Frame compression in integrated services networks
US5521971A (en) * 1994-04-13 1996-05-28 British Telecommuncations, Plc Communication network control method
US5557611A (en) * 1994-07-26 1996-09-17 Cselt - Centro Studi E Laboratori Telecomunicazioni S.P.A. ATM cross-connect node utilizing two passes through the connection network with shaping between passes for optimal resource allocation in a bursty environment
US5696764A (en) * 1993-07-21 1997-12-09 Fujitsu Limited ATM exchange for monitoring congestion and allocating and transmitting bandwidth-guaranteed and non-bandwidth-guaranteed connection calls

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3241716B2 (en) * 1990-08-31 2001-12-25 株式会社東芝 ATM exchange method
JP3278865B2 (en) * 1991-06-28 2002-04-30 日本電気株式会社 Traffic control method
WO1994023517A1 (en) * 1993-03-26 1994-10-13 Curtin University Of Technology Method and apparatus for managing the statistical multiplexing of data in digital communication networks
KR100293920B1 (en) * 1993-06-12 2001-09-17 윤종용 Apparatus and method for controlling traffic of atm user network interface
GB9401092D0 (en) * 1994-01-21 1994-03-16 Newbridge Networks Corp A network management system
US5633868A (en) * 1994-10-17 1997-05-27 Lucent Technologies Inc. Virtual circuit management in cellular telecommunications
US5623492A (en) * 1995-03-24 1997-04-22 U S West Technologies, Inc. Methods and systems for managing bandwidth resources in a fast packet switching network
US5734656A (en) * 1995-07-12 1998-03-31 Bay Networks, Inc. Method and apparatus for dynamically allocating bandwidth on a TDM bus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5282207A (en) * 1991-03-28 1994-01-25 Sprint International Communications Corp. Frame compression in integrated services networks
US5696764A (en) * 1993-07-21 1997-12-09 Fujitsu Limited ATM exchange for monitoring congestion and allocating and transmitting bandwidth-guaranteed and non-bandwidth-guaranteed connection calls
US5521971A (en) * 1994-04-13 1996-05-28 British Telecommuncations, Plc Communication network control method
US5557611A (en) * 1994-07-26 1996-09-17 Cselt - Centro Studi E Laboratori Telecomunicazioni S.P.A. ATM cross-connect node utilizing two passes through the connection network with shaping between passes for optimal resource allocation in a bursty environment

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000033606A1 (en) * 1998-12-01 2000-06-08 Nortel Networks Limited An adaptive connection admission control scheme for packet networks
US6490249B1 (en) 1998-12-01 2002-12-03 Nortel Networks Limited Adaptive connection admission control scheme for packet networks
WO2005067203A1 (en) 2003-12-30 2005-07-21 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic
EP1700420A1 (en) * 2003-12-30 2006-09-13 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic
EP1700420A4 (en) * 2003-12-30 2009-02-18 Intel Corp Techniques for guaranteeing bandwidth with aggregate traffic
EP2341673A3 (en) * 2003-12-30 2011-10-05 Intel Corporation (INTEL) Techniques for guaranteeing bandwith with aggregate traffic
EP2533479A3 (en) * 2003-12-30 2012-12-26 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic
US9264311B2 (en) 2003-12-30 2016-02-16 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic
US10038599B2 (en) 2003-12-30 2018-07-31 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic
US10721131B2 (en) 2003-12-30 2020-07-21 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic
US8631151B2 (en) 2006-05-18 2014-01-14 Intel Corporation Techniques for guaranteeing bandwidth with aggregate traffic

Also Published As

Publication number Publication date
AU5600398A (en) 1998-07-03
US5953338A (en) 1999-09-14
WO1998026612A3 (en) 1998-10-01

Similar Documents

Publication Publication Date Title
US5953338A (en) Dynamic control processes and systems for asynchronous transfer mode networks
US6097722A (en) Bandwidth management processes and systems for asynchronous transfer mode networks using variable virtual paths
WO1998026612A9 (en) Dynamic control processes and systems for asynchronous transfer mode networks
WO1998029984A9 (en) Bandwidth management system using variable virtual paths
EP0765554B1 (en) A method and device for partitioning physical network resources
US6069894A (en) Enhancement of network operation and performance
US5432785A (en) Broadband private virtual network service and system
US7209443B2 (en) Bandwidth updating method and bandwidth updating apparatus
US6400687B1 (en) ATM network management
Murphy et al. Distributed pricing for embedded ATM networks
US5432783A (en) System and method for providing egress policing for broadband virtual private networks
AU715715B2 (en) SDH multiplexer with aim facilities
CA2213423C (en) Method for shared memory management in network nodes
US6865179B1 (en) Apparatus and method for synchronous and asynchronous transfer mode switching of ATM traffic
US6307866B1 (en) Broadband telecommunications system
GB2310971A (en) SDH multiplexer
EP1145588B1 (en) Mechanism and method for dynamically allocating atm connections between exchanges
Johnson ATM performance management
Deng Flexible access control in broadband communication networks
Valadas Dimensioning and Resource Management of ATM Networks
Arvidsson On Dynamic Capacity Management in Voice/Frame Relaying Networks
Arvidsson Strategies for Dynamic Network Management
GB2321569A (en) Bandwidth allocation in a broadband telecommunications system
AU2357999A (en) A connection control method for a communications network

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SZ UG ZW AT BE CH DE DK ES FI FR GB GR IE IT LU MC

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
COP Corrected version of pamphlet

Free format text: PAGES 1-27, DESCRIPTION, REPLACED BY NEW PAGES 1-23; PAGES 28-40, CLAIMS, REPLACED BY NEW PAGES 24-35; PAGES 1/13-13/13, DRAWINGS, REPLACED BY NEW PAGES 1/13-13/13; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase