WO2002062013A2 - Methods and systems providing fair queuing and priority scheduling to enhance quality of service in a network - Google Patents

Methods and systems providing fair queuing and priority scheduling to enhance quality of service in a network Download PDF

Info

Publication number
WO2002062013A2
WO2002062013A2 PCT/US2002/003031 US0203031W WO02062013A2 WO 2002062013 A2 WO2002062013 A2 WO 2002062013A2 US 0203031 W US0203031 W US 0203031W WO 02062013 A2 WO02062013 A2 WO 02062013A2
Authority
WO
WIPO (PCT)
Prior art keywords
queue
data packets
data
deficit
critical
Prior art date
Application number
PCT/US2002/003031
Other languages
French (fr)
Other versions
WO2002062013A3 (en
Inventor
Manamohan D. Mysore
Florence C. I. Pagan
Joel E. Short
Vijay Krishna Bhagavath
Original Assignee
Nomadix, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nomadix, Inc. filed Critical Nomadix, Inc.
Priority to AU2002242067A priority Critical patent/AU2002242067A1/en
Publication of WO2002062013A2 publication Critical patent/WO2002062013A2/en
Publication of WO2002062013A3 publication Critical patent/WO2002062013A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/52Queue scheduling by attributing bandwidth to queues
    • H04L47/521Static queue service slot or fixed bandwidth allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/17Interaction among intermediate nodes, e.g. hop by hop
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2416Real-time traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2441Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/29Flow control; Congestion control using a combination of thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/52Queue scheduling by attributing bandwidth to queues
    • H04L47/525Queue scheduling by attributing bandwidth to queues by redistribution of residual bandwidth
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/56Queue scheduling implementing delay-aware scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/62Queue scheduling characterised by scheduling criteria
    • H04L47/6215Individual queue per QOS, rate or priority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/62Queue scheduling characterised by scheduling criteria
    • H04L47/625Queue scheduling characterised by scheduling criteria for service slots or service orders
    • H04L47/6265Queue scheduling characterised by scheduling criteria for service slots or service orders past bandwidth allocation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99934Query formulation, input preparation, or translation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99937Sorting

Definitions

  • the present invention relates to network communication, and more specifically, to apparatuses, methods and systems for enhancing quality of service in a network.
  • Guaranteed bandwidth fairness is typically provided using so called "Fair Queuing" algorithms. These algorithms guarantee that bandwidth of a certain link (or virtual link) is fairly apportioned among its various flows. Fair Queuing algorithms are incorporated into network systems using fair queuing (or bandwidth) schedulers. These schedulers seek to control congestion even in the presence of ill-behaved sources, so that a single source that sends packets to a gateway at a sufficiently high speed cannot capture an arbitrarily high portion of the bandwidth of the outgoing line.
  • latency-critical traffic flows such as Voice Over IP and Video
  • Prioritizing traffic flows so that latency-critical flows experience low latency is currently provided by priority (or latency) schedulers.
  • DRR Deficit Round Robin
  • FIG. 2 shows a DRR queue structure 200 implemented by the DRR algorithm.
  • the DRR queue structure 200 is located between an incoming link 210 and an outgoing link 220, and operates to buffer data packets.
  • Incoming packets from data sources received via the incoming link 210 are queued in the DRR queue structure 200 by an enqueue agent 230.
  • the enqueue agent 230 typically creates a queue for each source forwarding data packets over the incoming link.
  • queues are created and ordered sequentially based on the time data packets arrive at the queue structure 200.
  • a first data packet from a first source may be buffered into a first queue position in the queue structure 200, whereas a later received data packet from a separate source may be placed in a queue positioned lower in the queue structure 200.
  • a dequeue agent 240 removes the packets from the DRR queue structure 200 and transmits the packets over the outgoing link 220.
  • the implementations of the enqueue agent 220 and dequeue agent 240 constitute the DRR queuing algorithm. According to DRR queuing, the dequeue agent 240 intelligently dequeues the packets from the DRR queue structure 200 based on bandwidth apportioning specifications and places the packets on the outgoing link.
  • DRR queue structure 200 consists of an array of linked lists of packets, which ensures that each queue (for example, the nth queue) can be accessed quickly. Additionally, the head and tail pointers of the linked list are stored so as to enable sufficient enqueuing and dequeuing. According to one implementation of DRR, there is typically a deficit 250 data element and a quota 260 data element. According to the DRR algorithm, each data flow that is assured a share of bandwidth has a corresponding first in first out queue inside the DRR, and each queue within the DRR queue structure 200 has a deficit and quota associated therewith.
  • the quota 260 data element of a queue is the number of bytes of data the queue will send per cycle when viewed from a long-term average.
  • the deficit 250 refers the number of bytes of data that a queue can send in the current round.
  • the quotas of the various queues of the DRR are initially set so that the ratios of the quotas are in accordance with the intended apportioning of bandwidth among flows.
  • all quotas are equal and hence coalesced into a single data element termed Quantum.
  • Quantum One skilled in the art would appreciate that in the most general case, each queue would have its corresponding quota.
  • the enqueue agent 230 enqueues an arriving packet into the packet's appropriate queue.
  • the dequeue agent 240 then continuously steps through the queues in a round-robin fashion and sends as many packets from a queue as allowed by its deficit.
  • the deficit of a non-empty queue is increased by the quantum (and in the most general case, by its quota), as maintained in the quota element.
  • the quantum and in the most general case, by its quota
  • FIGs. 3a and 3b show a queue structure having four queues 310, labeled 1 through 4, where each queue has buffered a plurality of packets.
  • the fourth queue, labeled queue #4 has a greater queue number than queues one through three. For instance, in FIG.
  • the first queue (labeled queue #1) includes packets having 200, 750 and 20 data elements (e.g., each data element is a byte of data), while the second queue (labeled queue #2) includes packets of 500 and 500 data elements.
  • the packets are buffered in each respective queue sequentially, such that the packets arriving first enter the queue before packets arriving later in time. For instance, in the first queue of FIG. 3 a, the packet having 200 data elements is first in the queue because it arrived before those packets sized at 750 and 20 data elements. Similarly, the packet having 750 data elements is second in the queue because it arrived before the packet sized at 20 data elements.
  • DRR operates on a first in first out basis within each queue
  • the packet that enters the queue earliest in time is the first packet that will be dequeued and transmitted over an outgoing link.
  • a deficit counter 320 for maintaining the current deficit, as explained earlier.
  • non-empty queues have their deficit counters increased by the Quantum
  • empty queues have their deficit counters set to the Quantum.
  • DRR there is no notion of a per-queue quantum or quota, but rather a global quantum that applies to all queues.
  • a variant of DRR (which is usually termed weighted DRR) has queue-specific quotas.
  • the value of the deficit counter 320 establishes the number of units of data that will be dequeued from the corresponding queue by the dequeue agent during a current round of the deficit round robin process.
  • FIG. 3 a shows the state of the queue structure during an initial state of the DRR operation.
  • a round robin pointer (or dequeue agent) 340 initially points to the first queue within the queue structure.
  • the deficit counter 320 shows a value of 500 data elements in FIG. 3a because the quantum size 330 is added to the queue's current deficit maintained by the deficit counter 320, which is initially zero for each individual queue in the present illustration.
  • the deficit counter 320 can alternatively be initially set at any value for each queue.
  • the first packet of data buffered by the first queue is compared to the data element value maintained in the deficit counter 320 that corresponds to the first queue (500). Because the deficit counter 320 contains a data element value equal to or greater than the number of data elements in the packet (500>200), the packet is removed from the queue structure by the dequeue agent and transmitted over an outgoing link. The deficit counter is then reduced by the number of data elements within the transmitted packet.
  • the next packet in the first queue is then compared in the same manner as the first to the new value of the deficit counter, and this process is repeated until the deficit counter has insufficient deficit to transmit a packet.
  • the value of the deficit counter is reduced to 300 after the first packet is transmitted.
  • the DRR algorithm compares the new, reduced deficit counter 320 value to the size of the next packet, which has 750 data elements. Because the deficit counter 320 value is not greater than or equal to the size of the packet, the packet is not transmitted over the outgoing link, thereby preventing the source populating the first queue from utilizing a disproportionate share of the outgoing link bandwidth. However, as illustrated in FIG. 3b, the deficit counter 320 retains the unused allocation of data elements
  • the round robin pointer 340 moves to the second queue in the queue structure, and repeats the steps described above with respect to the first queue.
  • the DRR algorithm repeats the above steps by continuously stepping through the queues in a round-robin fashion, sending as many packets from each queue as allowed by its deficit and the quantum size. For instance, when the round robin pointer selects the first queue during the second round, the quantum size (500) will be added to the deficit (300), yielding a total of 800 data elements in the deficit counter 320. Therefore, the packet with 750 data elements and the packet with 20 data elements will both be dequeued and transmitted out an outgoing link, because 800>(750+20).
  • DRR in its most general form arranges each queue to have an associated bandwidth, quota and down counted deficit, where the deficit is the amount of data a queue can send in the current round.
  • the deficit keeps track of past unfairness and each queue's quota is added to its deficit at the beginning of each round.
  • the queues send packets on a round robin basis, and a packet is sent from the queue only when the queue has sufficient deficit. When a packet is sent from the queue its size is subtracted from the deficit. If a packet is unable to be sent due to insufficient deficit, the remaining deficit is added to the next round's deficit, thereby correcting unfairness in subsequent rounds.
  • DRR worst case cycle time in DRR is proportional to the sum of the queue bandwidth quotas divided by the bandwidth.
  • DRR is relatively efficient, simple, and is increasingly being accepted as a standard for fair queuing
  • DRR suffers from a number of problems that are undesirable for fair queuing of all types of traffic. For instance, DRR can cause packets to suffer high latency, causing DRR to be unsuitable for latency critical flows, such as Voice Over IP.
  • DRR also does not have mechanisms for handling multiple levels of latency critical flows. Additionally, DRR is a fair bandwidth scheduler, rather than a prioritized latency scheduler.
  • an Integrated Bandwidth Latency Scheduler apparatus, method and system (collectively referred to herein as IBLS) that combines Fair Queuing and Priority Schedulers in a single stage to provide bandwidth fairness guarantees as well as latency prioritization.
  • the IBLS accomplishes these goals by providing a scheduler and process that dequeues packets from multiple queues in an order based upon an algorithm of the TJBLS that arranges and dequeues those queues having the highest priority based on content therein.
  • the systems, methods and apparatuses of the present invention also utilize quotas and deficit counters, similar to the DRR process described above, to ensure that packets from each source receive their fair portion of the outgoing link bandwidth.
  • the enqueue agent utilized by the present invention classifies incoming packets based on the type of data included within the data packet, the source of the packet, the type of data flow, or another attribute of the packet, such as a header associated with the packet.
  • IBLS obviates the need for two stages of queuing to achieve both bandwidth and priority-based scheduling and thus reduces per-packet latency.
  • IBLS ensures that latency critical flows experience a lower latency than other flows. While doing so, IBLS makes sure that bandwidth fairness is not compromised. To achieve this, it ensures that both bandwidth scheduling and prioritized latency scheduling work in unison without causing correctness problems.
  • the bandwidth scheduler functionality within the IBLS decides how many packets are allowable from each queue in the current round, whereas the priority scheduler functionality makes sure that among these packets, those of higher latency criticality get sent earlier.
  • the IBLS of the present invention provides a significant amount of latency differentiation over conventional scheduling algorithms such as DRR.
  • IBLS reduces jitter of high priority flows under usual loads.
  • IBLS also provides better bandwidth fairness than DRR on a per cycle (i.e. round) basis.
  • the latency differentiation effect of IBLS diminishes in times of extreme congestion.
  • IBLS not only avoids queuing-theoretic flaws introduced by a two-stage design, but also reduces the latency experienced by a packet. Therefore, the IBLS approach is of great benefit in systems that need both bandwidth fairness and latency differentiation.
  • Also provided in the present invention is a weighted fair queuing algorithm providing express paths to latency critical components of aggregated flows while providing bandwidth guarantees to aggregated user flows. Therefore, although aggregated user flows may consist of traffic components of varying importance, the present invention makes it is possible to isolate and provide a lower latency to latency critical components of such aggregated user flows, while still ensuring that all aggregated flows still experience their overall share of fair bandwidth.
  • the latency critical components of aggregated flows can be separated and placed in a latency critical queue while the non-latency-critical components of aggregated flows use non-latency-critical queues corresponding to their respective user flows.
  • the dedicated queues and bandwidth borrowing features of the present invention apportion link bandwidth among users, ensure fair sharing of extra bandwidth among various users, and provide fast paths for latency critical application flows.
  • FIG. 1 shows a fair queuing scheduler combined in series with a priority scheduler, according to the prior art.
  • FIG. 2 shows a DRR queue structure according to the prior art.
  • FIG. 3 a shows an illustrative example of the operation of DRR, according to the prior art.
  • FIG. 3b shows an illustrative example of the operation of DRR, according to the prior art.
  • FIG. 4 shows a block diagram of an IBLS, according to one embodiment of the present invention.
  • FIG. 5 illustrates in block diagram form an enqueue process of the IBLS, according to one embodiment of the present invention.
  • FIG. 6 illustrates in block diagram form a dequeue process of the IBLS, according to one embodiment of the present invention.
  • FIG. 7 shows IBLS data structures, according to one aspect of the present invention.
  • FIG. 8 illustrates multiple queues having associated deficit arrays, and the AND product of an associated deficit bitmap and queue bitmap, according to one illustrative example of the present invention.
  • FIG. 9 shows TJBLS data structures, according to an alternative embodiment of the present invention.
  • FIG. 10 illustrates in block diagram form an enhanced DRR+ enqueue process, according to one aspect of the present invention.
  • FIG. 11 illustrates in block diagram form an enhanced DRR+ dequeue process, according to one aspect of the present invention.
  • FIG. 12 shows a two stage quality of service architecture implemented by the present invention.
  • FIG. 13 shows a block diagram of a queue structure illustrating bandwidth borrowing, according to one illustrative embodiment of the present invention.
  • the present invention may be embodied as a method, a data processing system, or a computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product on a computer- readable storage medium having computer-readable program code means embodied in the storage medium. Any suitable computer readable storage medium may be utilized including hard disks, CD-ROMs, optical storage devices, or magnetic storage devices.
  • These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
  • blocks of the block diagrams and flowchart illustrations support combinations of means for performing the specified functions, combinations of steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems which perform the specified functions or steps, or combinations of special purpose hardware and computer instructions.
  • IBLS Integrated Bandwidth Latency Scheduler
  • the IBLS 420 of the present invention combines a Fair Queuing Scheduler 400 with a Priority Scheduler 410 in a single stage to provide both bandwidth fairness guarantees and latency prioritization.
  • the present invention thus ensures that the latency experienced by packets, especially those of latency critical flows, is kept low, while maintaining bandwidth fairness among all packet flows. Further advantages of the present invention will be appreciated after the TJBLS of the present invention is disclosed in detail with reference to the figures.
  • the well-known Deficit Round Robin (DRR) bandwidth scheduler may be modified to incorporate prioritized latency support provided by the IBLS of the present invention.
  • the EBLS utilizes similar components as those described above with reference to DRR, including an enqueue agent, a queue structure having multiple queues therein, a dequeue agent, and deficit and quota registers.
  • the dequeue process of the TJBLS 420 determines the queue from which a packet (or a configurable number of bytes) will be transmitted immediately after the dequeue agent transmits the previous packet (or configurable number of bytes) over the outgoing link. Therefore, the IBLS algorithm of the present invention supports the notion of a round in which DRR- like bandwidth fairness is achieved, but in which reordering of packets is performed to cater to latency critical flows. To accomplish priority dequeuing, a dequeue agent of the IBLS quickly examines each queue that is ready to send data and ascertains the queue that has the highest priority.
  • one particular queue may contain Voice over IP (VoD?) data that the dequeue agent recognizes has higher priority than data in other queues. Regardless of each queue position, the dequeue agent will send the latency-critical data from its corresponding queue to the outgoing link.
  • VoIP Voice over IP
  • the present invention utilizes a method of reordering packets within a round such that higher priority queues get to forward their packets earlier than the lower priority ones. This embodiment and process will be explained in greater detail with respect to FIGs. 5, 6 and 7.
  • An enqueue process 500 according to one aspect of the IBLS of the present invention is depicted in the flowchart of FIG. 5.
  • the packet On receiving a packet transmitted from an incoming link, the packet is initially classified as a particular type so that the packet can be mapped to its corresponding queue by the enqueue agent and process (block 510).
  • This classification process is advantageous in this embodiment of TJBLS because increasing queue number (i.e., farther down in the queue structure) corresponds to decreasing latency priority.
  • increasing queue number i.e., farther down in the queue structure
  • decreasing latency priority i.e., farther down in the queue structure
  • the ordering of queues based on priority is done so as to enable quick ascertainment of the current highest priority queue. This is in direct contrast to DRR, where all queues have equal priority. For instance, referring again to the illustrative example shown in FIG.
  • DRR treats the first and third queues equally, whereas IBLS guarantees the first queue a higher latency priority than the third queue.
  • higher priority level translates to lower latency, in contrast to DRR, where all queues experience approximately the same latency.
  • the enqueue agent classifies incoming packets based on the type of data included within the data packet, the source of the packet, the type of data flow, or another attribute of the packet, such as a header associated with the packet.
  • the enqueue agent may classify data packets differently if the packets are VoIP, HTTP, FTP, Citrix (or any application service traffic), or other data types.
  • the TBLS can include a look-up table to ascertain the latency priority of particular types of data packets. For example, a VoIP packet may have an associated priority weight of 100, an HTTP packet a priority weight of 50, an FTP packet a priority weight of 10, and a Citrix data packet a priority weight of 75.
  • the enqueue agent upon receiving a VoTJ? packet the enqueue agent will identify and place the packet in first queue.
  • a Citrix data packet will similarly be recognized and placed in the second queue by the enqueue agent, even where the Citrix data packet is received before the VoIP packet.
  • the TBLS algorithm enables an administrator to easily configure or alter the priority weights associated with particular types of data.
  • the TJBLS algorithm allows an administrator to easily earmark particular flows, and assign those flows whatever priority the administrator so desires.
  • each queue or the entire queue structure may include a byte limit that should not be exceeded.
  • a byte limit exists for the entire queue structure, but it should be appreciated that the invention is not limited to this alone, and that it may also encompass per-queue byte limits. This feature is common in the enqueue processes of many common bandwidth schedulers including DRR. The enqueue process verifies that the queue structure byte limit is not exceeded by the addition of a packet to its corresponding queue (block 520).
  • a packet may be dropped from the queue structure.
  • the queues and queue structure discussed herein may be defined and stored within a database or memory. According to the process illustrated in FIG. 5, a packet may be dropped from the tail end of the queue having the highest ratio of length to its associated quota (block 530). However, it should be appreciated that alternative methods may be implemented to determine a packet to be dropped, such as dropping the current packet, or dropping from the head of the queue having the highest length to quota ratio.
  • the data structures of the queue structure are updated (block 540), as described below.
  • This step includes updating the data structures (such as the queue bitmap that is described below) based on which the dequeue process decides the next packet to send, and the data structures needed to decide which queue the enqueue process should drop a packet from in case the byte count of the queuing structure overshot the specified byte limit.
  • the dequeue process (block 550) is then initiated to transmit the packets from the queue structure over the outgoing link to their respective destinations.
  • the dequeue process 600 is illustrated in the flow chart of FIG. 6.
  • the dequeue process 600 sends a small portion of data (either a single packet or a certain number of bytes of data, which might include a multiple number of packets) from a queue and determines from which queue to transmit the next portion of data from.
  • the dequeue process enhances the conventional DRR dequeue process by reordering packets within a round (i.e., a cycle through each queue, although not necessarily in order, analogous to one pass in a round-robin approach) such that higher priority queues forward packets earlier than the lower priority queues.
  • the dequeue process is unlike the DRR dequeue process in that queues are selected based on their priority and readiness (i.e., a ready queue is a queue that has a data waiting to be transmitted and sufficient deficit to transmit at least the first packet) to transmit packets, like DRR, the IBLS algorithm maintains DRR-like deficits and quotas for each queue, where the deficit is the number of bytes a queue can send in the current round of the dequeue process, as will be described with reference to FIGs. 7 and 8.
  • the deficits and quotas, and arrays of deficits and quotas are contained within memory or one or more databases accessible by hardware and software components for executing the process described herein.
  • the dequeue agent and process begins the next round of dequeuing when each queue in the structure is either empty or does not have sufficient deficit to send packets. Where there is a queue with packets buffered therein, and the queue has sufficient deficit to transmit a packet (block 610), the oldest packet of the queue having the highest priority will be transmitted by the dequeue agent (block 620) and the deficit and data structures of the queue structure will be updated (block 630). The dequeue process then repeats the process, beginning the next step in a round by determining if there is a waiting queue with a non-zero deficit (block 610).
  • the dequeue process determines whether all queues within the queue structure are empty (block 650). If each queue is empty, the quotas are reset to each queues' deficit (block 640), and the dequeue process enters a sleep mode (block 680), wherein it waits for a packet to be buffered by the enqueue agent into a queue to restart the dequeue process (block 610). The copying of the quota to each queue's deficit value if all queues are empty 640 is done by means of a block copy for efficiency.
  • the data structures associated with one embodiment of the TBLS system are illustrated in the block diagram of FIG. 7.
  • the TBLS system includes a queue structure 700 located between an incoming link and an outgoing link. Incoming packets from data sources received via the incoming link are queued in the queue structure 700 by the enqueue agent and process 730 described above with respect to FIG. 5. Therefore, the queues are arranged in the queue structure such that queues are ordered on the basis of priority. According to this aspect of the invention, higher priority flows are assigned a lower queue number. However, the invention handles any other ordering scheme and hence is not limited by the ordering scheme described herein, as long as the ordering enables fast ascertainment of which is the ready queue with highest priority.
  • the IBLS implementation also includes a dequeue agent implementing the dequeue process 740 described above with respect to FIG. 6.
  • FIG. 7 also includes a quota array 720, which is an array indexed by queue number used to store predetermined bandwidth allocations, and a deficit array 710, which is a queue-number-indexed array of down-counted deficit amounts.
  • the quota array 720 can be the same for all queues, or can vary for each queue of the queue structure 700.
  • the deficit bitmap 750 is a bitmap that stores a 1 or 0 bit for each queue in the queue structure 700.
  • a bit corresponding to a queue is set to 1 if that queue has enough deficit to send its first packet; otherwise, the bit is set to 0.
  • the queue bitmap 760 is a similar bitmap in which a bit is set to 1 if the corresponding queue has a packet waiting in it, and a 0 if the corresponding queue does not have a packet waiting in it.
  • deficit bitmap and queue bitmap The purpose of the deficit bitmap and queue bitmap, and the operation of the dequeue process is best understood with reference to the illustrative example shown in FIG. 8. Illustrated in FIG. 8 are four bitmaps 800 arranged by the enqueue agent and process 730 in order of decreasing priority. Therefore, queue 1 has a priority greater than each of the other queues in the illustration, queue 2 has a priority greater than each of the other queues except for queue 1, and so forth. Also illustrated in the block diagram is the deficit array 810, deficit bitmap 850, queue bitmap 860, and a composite bitmap 870, which is the created by AND-ing the deficit bitmap 850 and queue bitmap 860.
  • the first queue includes two 60 byte packets and has a deficit of 500 (bytes)(this value is stored in the deficit array 810), the second bitmap includes one 60 byte packet and has a deficit of 5, the third queue includes one 60 byte packet and has a deficit of 100, and the fourth queue includes no packets and has a deficit of 60.
  • the deficit bitmap 850 a bit corresponding to a queue is set to 1 if that queue has enough deficit to send its first packet; otherwise, the bit is set to 0. Therefore, queues 1, 3 and 4 each include a deficit bitmap value of 1, as the deficit stored in the deficit array is sufficient to transmit the packets in the corresponding queues. However, because the deficit of queue 2 is less than the 60 byte packet size buffered in queue 2, the deficit bitmap includes a 0 bit for the second queue.
  • the queue bitmap 860 includes bits that are set to 1 if the corresponding queue has a packet waiting in it. Therefore, the first three queues include 1 bits, while the fourth queue includes a 0 bit, as the fourth queue does not include a packet waiting in it for transmission.
  • the composite bitmap 870 is created by bitwise- AND-ing the deficit bitmap 850 elements with the corresponding elements in the queue bitmap 860 for each queue. If there is a 1 bit set in the composite bitmap, the queue corresponding to that bit both has a packet waiting and sufficient deficit to send the packet (i.e., it is prepared or ready to send a packet). Thus, the use of the composite bitmap allows the IBLS algorithm of the present invention to quickly determine those queues that are prepared to send packets. If the resultant bitmap is zero, then there is no queue ready to transmit a packet. Thus, in the dequeue process illustrated in FIG. 6, the determination of whether there is a queue with a waiting packet (block 610) is equivalent to testing if the resultant bitmap is non-zero.
  • finding the highest bit position can be implemented efficiently by means of a single (or a few) table lookup(s).
  • the first and third queues are ready to transmit packets.
  • the dequeue process will attempt to transmit the packets within these queues prior to those having either insufficient deficit or no waiting packets. Because queue 1 has greater priority than queue 3, the dequeue process will begin by transmitting both 60 byte packets from the first queue, and reducing the deficit stored in the deficit array to 380 (see blocks 610, 620, 630).
  • the dequeue process will not transmit that packet, and will instead look for queues having a waiting packet and an adequate deficit. For instance, if the second packet in the first queue was 500 byte in size (rather than 60), the deficit would be insufficient to transmit the packet and the dequeue process would continue with the third queue. Continuing with the illustrative example of FIG. 8, after the two 60 byte packets are transmitted from the first queue, the dequeue process will transmit the packets from the third queue because the TBLS algorithm recognizes that the composite bitmap includes a 1 for the third queue.
  • the second queue is skipped, unlike that which would occur in DRR or in round-robin queuing algorithms.
  • the dequeue process will determine if all the queues are empty (see block 650). Because the fourth queue is empty and the second queue has a 60 byte packet (and a queue bitmap value of 1) the deficit of the first, third and fourth queues will be reset to the queue's quota (see block 660), and the deficit of queue 2 will be increased by its quota (see block 670). Thereafter the dequeue process repeats (see block 610).
  • IBLS unlike certain classical fair schedulers, uses a queue-wise allocation of quotas, which takes care of bandwidth apportioning on a per-round basis. It should also be noted that the present invention is unlike a strict round-robin scheduler (e.g., DRR); it can however be likened to a variant of DRR that uses queue-specific weighted-quotas. In IBLS, a new round begins when each queue is either empty or non-empty with insufficient deficit. Therefore, IBLS requires that the Fair Queuing Scheduler have a round or cycle in which bandwidth fairness is maintained.
  • DRR strict round-robin scheduler
  • the time complexity of the dequeue process is O(log n) (for n queues), which means that the time taken on a long term average by the dequeue process increases logarithmically as the number of queues is linearly increased.
  • the time complexity of the enqueue process is O(l), such that the process is independent of the number of queues.
  • each queue has a unique latency priority associated with it, or equivalently, there are as many priority levels as the number of flows/queues, and that queues are ordered on the basis of priority to enable bitmap-based implementation.
  • This implementation of TBLS enables table- lookup-based optimizations (e.g., finding the highest bit position in a bitmap is possible in just 2 table lookups for 16 queues), but requires that priorities be totally ordered such that equal priorities are not supported. Thus, two queues having equal priorities will not get the same latency preference, as one must precede the other.
  • these assumptions are convenient in certain circumstances, an alternative solution in which an arbitrary number of priorities (i.e., from 1 to n, the number of queues) and an arbitrary ordering of queues may be desirable.
  • the present invention provides an alternative solution that allows these capabilities.
  • FIG. 9 Another embodiment of the TBLS of the present invention is illustrated in the block diagram of FIG. 9.
  • the queues in the DRR queuing structure are mapped onto a number of active priority buckets 950.
  • Priority buckets consist of an array whose elements contain pointers to two linked lists of queue records. Each queue is mapped onto to an element of the array depending upon its priority. Henceforth, an element of the priority bucket array is referred to as a priority bucket. According to this embodiment, it is possible that multiple queues map onto the same priority bucket. Whenever a packet arrives, an enqueue process 930 first determines the queue to which the packet is destined and then determines the active priority bucket 950 the queue is associated with (or mapped to).
  • Each active priority bucket 950 contains two linked lists, the Active List 970 of queue records that represent the ready queues (i.e., have a packet that they can send immediately) that map to that active priority bucket 950, and the Inactive List 980 of queue records that have packets in them, but do not have enough deficit currently to send their first packet.
  • a bitmap (On bitmap) 960 is stored such that each priority bucket has a corresponding bit that is set to 1 if the corresponding Active List is not empty and is set to 0 otherwise.
  • the enqueue process 930 is implemented according to the flowchart shown in FIG. 10.
  • the enqueue processing in this embodiment is almost identical to that illustrated in FIG. 5 with the only difference being an additional set of operations (block 1050).
  • block 1050 When an incoming packet arrives, it is enqueued into the appropriate queue (block 1010), as discussed previously, and a check is made to see if the byte limit on the queue structure is exceeded (block 1020). If it is exceeded, packets are dropped suitably to reduce queue structure byte usage (block 1030).
  • the same update operations (block 1040) as described in the context of FIG. 5. (block 540) are then performed on the data structures.
  • the active and inactive lists specific to this embodiment are then updated (block 1050).
  • the queue i.e., the queue record
  • the Active List block 1066
  • the queue's priority bucket array element of the priority buckets
  • the bit corresponding to the cu ⁇ ent priority bucket is set in the On bitmap. If the deficit is not sufficient, the queue is inserted into the Inactive List (block 1068) co ⁇ esponding to the queue's priority bucket.
  • the dequeue process 940 shown in FIG. 11 is also similar to the one illustrated in FIG. 6, albeit more elaborate.
  • the dequeue process begins by determining if there is a packet to ready to be sent from the queuing structure (block 1110). This check is performed by checking if the On bitmap 960 is nonzero (i.e., has at least one bit set). If so, the priority bucket co ⁇ esponding to the highest bit position and thus of the highest priority is chosen and the first queue in its Active List is allowed to send a packet (or a configurable number of bytes)
  • block 1120 After sending a packet (or a certain number of bytes), if the deficit of the cu ⁇ ent queue is insufficient to send its next packet (which supposes that a next packet exists) (block 1130) the queue record is inserted (block 1150) into the co ⁇ esponding Inactive List 980 and removed from the Active List (block 1152). If however, the deficit is sufficient, a check is made to see if the queue is now empty (block 1145). If this occurs, the queue is removed from the co ⁇ esponding Active List 970, and is not inserted on the Inactive List since the queue is empty.
  • the priority bucket being serviced may have queues that cannot send packets because the deficit (which would have been increased at the end of the previous cycle) is still insufficient to send the packet waiting at the head of the queue.
  • the dequeue process can remove such queues from the active list and transfers them to the end of the inactive list. This method postpones the detailed updating of the active and inactive lists until the next cycle and instead performs a quick switch of the active and inactive queues. This method works well under conditions of congestion, where one can expect several queues to have outstanding packets.
  • the dequeue process can re-evaluate the place of each queue (in the active or inactive list) at the time it increases the deficit of each queue at the end of the cycle. This process would be beneficial in periods of low congestion.
  • the present invention is not restricted to a single method for starting a new cycle and thus the above methods represent only two possible embodiments for starting a new cycle.
  • an arbitrary number of priority levels may be used (from 1 to n). This ensures that all queues having the same priority experience the same average latency since all such queues are mapped onto the same priority bucket and on sending a packet (or configurable number of bytes) from a queue, it is reinserted at the end of the priority bucket's Active List.
  • This is an enhancement over the previous embodiment where the provision of equal priority queues was not possible.
  • this implementation is more complicated than the previous implementation, and may require a slightly higher run-time overhead to execute. The time complexity for the enqueue and dequeue processes are the same as in the first embodiment.
  • a Binary Heap (usually used to implement Priority Queue data structures) structure is incorporated to enable fast ascertainment of the highest priority queue that is cu ⁇ ently ready.
  • a binary heap allows efficient retrieval of the highest priority record in a given set of records.
  • the implementation complexities for insertion and deletion into a binary heap are both O(log n). This implementation involves the insertion of a queue record into the binary heap once it becomes ready and deletion from the binary heap once it becomes either empty or its deficit becomes insufficient.
  • the heap structure allows a flexible number of priority levels (1 to n) since it is impartial to two records of the same priority number.
  • TJBLS systems and methods guarantee fair bandwidth, allow bandwidth bursting without compromising fairness, and provide multiple latency priority levels. Furthermore, systems and methods of the present invention are amenable to light-weight implementation, allow for easy configuration of bandwidth and latency assignments, and are ideal where fine-grained control over per-flow latency is needed. Additionally, an IBLS according to the present invention provides better differentiation in latency and less jitter to higher priority flows in uncongested or near-congested network conditions.
  • the present invention provides another weighted fair queuing algorithm to provide express paths to latency critical components of user flows while providing overall bandwidth guarantees to user flows.
  • an administrator of a network may wish to restrict the bandwidth available to users according to their payment plan, but still ensure that certain traffic components, such as VoIP, of all users still experience low delay and jitter.
  • the following feature of this invention will prove useful and appropriate.
  • the latency sensitive traffic components of all user flows are channeled into one global latency critical queue while all other user traffic use their own separate non-latency critical queues. This is done in a manner which ensures that no bandwidth unfairness results by channeling the latency critical components of all user flows into a common latency critical queue.
  • an illustrative scenario may be considered where one desires that traffic originating from each user is limited to a certain fraction of the link bandwidth, and that the application components of the user's traffic are differentiated according to a predefined profile of bandwidths and priorities.
  • VoIP latency critical traffic component
  • this invention enunciates a two step solution as is illustrated in FIG. 12.
  • the second stage 1220 of the scheduler is an Enhanced DRR+ scheduler that is responsible for fairly apportioning bandwidth among users 1240a, 1240b, ...,1240n, while also ensuring low latency for the VoTP traffic components (although other latency sensitive traffic components could also be similarly scheduled).
  • the first stage 1210 of the scheduler consists of IBLSs that apportion user bandwidth to user applications.
  • the first stage queue has a queue per user application and FIG. 12 shows the VoEP queue 1250 co ⁇ esponding to User 1 1240a as being one among its application specific queues.
  • Both VoTP data and Non-VoIP data is transmitted to the second stage Enhanced DRR+ scheduler that puts the non-VoIP components of user traffic into respective user queues within the Stage II Scheduler 1220, and aggregates the VoTJP packets received from each of the Stage I Schedulers 1210, such that the Stage II Scheduler can separate the VoTP packets from other data, so as to ensure low pass-through latency to VoTP traffic. It should be noted that this special provision for VoIP components of user traffic does not affect overall bandwidth fairness to user flows.
  • FIG. 13 shows a block diagram of a queue structure illustrating bandwidth bo ⁇ owing, according to one illustrative embodiment of the present invention.
  • a latency critical VoIP packet 1300 belonging to aggregated flow 3 may need to be handled quickly.
  • it may be placed in the latency critical queue 8 1310 which is handled specially by the Stage II scheduler so as to provide it very low latency.
  • a corresponding deficit from the respective user queue in which non-VoIP packets from the same aggregated flow would be placed may be bo ⁇ owed to ensure overall bandwidth fairness.
  • the deficit in the respective user queue is insufficient, the aggregated flow is either misbehaving or has exhausted its deficit for the cu ⁇ ent round and will have to wait for its turn in the next round.
  • IBLS schedulers apportion user bandwidth appropriately among its application flows, ensures fair sharing of extra available bandwidth, and prioritizes application traffic based on latency.
  • the IBLS integrates a cycle-based fair bandwidth scheduler and a conventional priority scheduler into a single queuing stage in order to provide a combination of bandwidth fairness and multiple levels of latency criticality. This not only avoids the queuing-theoretic flaws introduced by a two-stage design but also reduces the latency experienced by a packet.

Abstract

Integrated Bandwidth Latency Scheduler apparatus, method and system (collectively, IBLS) combines Fair Queuing and Priority Schedulers in a single stage to provide bandwidth fairness guarantees as well as latency priritization. The IBLS includes a scheduler and process that dequeues packets from multiple queues in an order based upon an algorithm that arranges and dequeues those queues having the highest priority based on content therein. Quotas and deficit counters are used to ensure that packets from each source receive their fair portion of the outgoing link bandwidth. A weighted fair queuing algorithm provides express paths to latency critical components of user flows while providing overall bandwidth guarantees, and uses bandwidth borrowing from non-critical flows to ensure latency prioritization for high priority flows.

Description

METHODS AND SYSTEMS PROVIDING FAIR QUEUING AND PRIORITY SCHEDULING TO ENHANCE QUALITY OF SERVICE IN A
NETWORK
FIELD OF THE INVENTION The present invention relates to network communication, and more specifically, to apparatuses, methods and systems for enhancing quality of service in a network.
BACKGROUND OF THE INVENTION In the current state of the Internet, the issues of guaranteed bandwidth fairness and support for multiple levels of latency are becoming increasingly important. Guaranteed bandwidth fairness is typically provided using so called "Fair Queuing" algorithms. These algorithms guarantee that bandwidth of a certain link (or virtual link) is fairly apportioned among its various flows. Fair Queuing algorithms are incorporated into network systems using fair queuing (or bandwidth) schedulers. These schedulers seek to control congestion even in the presence of ill-behaved sources, so that a single source that sends packets to a gateway at a sufficiently high speed cannot capture an arbitrarily high portion of the bandwidth of the outgoing line. While providing bandwidth guarantees is important, it is also important that latency-critical traffic flows (such as Voice Over IP and Video) experience as low latency as possible. Prioritizing traffic flows so that latency-critical flows experience low latency is currently provided by priority (or latency) schedulers.
Conventional network solutions have attempted to resolve both fair queuing and priority scheduling, and, despite the inherent tension between the two concerns, have been somewhat successful in incorporating both features in network systems. For instance, according to one conventional solution shown in FIG. 1, conventional schedulers 120 have been created that cascade both fair queuing 100 and priority schedulers 110 in series to achieve fair queuing and low latency for latency-critical traffic. Fair queuing schedulers 100 have been proposed in which gateways maintain separate queues for packets received from each individual source. In many fair queuing schedulers, the queues are then serviced in a round- robin manner, which prevents a source from arbitrarily increasing its share of bandwidth or the delay of other sources. Therefore, when a source sends packets too quickly, it may effectively lengthen its own queue, thereby preventing antisocial behavior and limiting the negative impact on well-behaved sources. Other schedulers, some of which use a round-robin-based approach, have attempted to resolve problematic sources that send very long packets of data, which can get more bandwidth than other sources. However, these attempts suffer from some disadvantages, including that cascading the schedulers often results in erroneous queuing. Furthermore, arrangements such as those illustrated in FIG. 1 can require a substantial amount of packet processing.
One method for maintaining quality of service for networks, Deficit Round Robin (DRR), is a well-known fair queuing algorithm that is relatively efficient, simple, and is increasingly being accepted as a standard for fair queuing. DRR guarantees fair apportioning of bandwidth, provides close- to-perfect fairness in scheduling, and provides fast and lightweight enqueuing and dequeuing operations. DRR also provides 0(1) time complexity, which means that the algorithm's computation does not grow with input size (the number of queues). As a result, the processing time taken by the algorithm is independent of the number of queues. DRR is next explained in detail with reference to prior art FIGs. 2, 3A and 3B, although it should be appreciated that DRR is well known to those of skill in the art.
FIG. 2 shows a DRR queue structure 200 implemented by the DRR algorithm. The DRR queue structure 200 is located between an incoming link 210 and an outgoing link 220, and operates to buffer data packets. Incoming packets from data sources received via the incoming link 210 are queued in the DRR queue structure 200 by an enqueue agent 230. The enqueue agent 230 typically creates a queue for each source forwarding data packets over the incoming link. According to one embodiment of DRR, queues are created and ordered sequentially based on the time data packets arrive at the queue structure 200. Therefore, a first data packet from a first source may be buffered into a first queue position in the queue structure 200, whereas a later received data packet from a separate source may be placed in a queue positioned lower in the queue structure 200. After the packets are queued onto the DRR queue structure 200, a dequeue agent 240 removes the packets from the DRR queue structure 200 and transmits the packets over the outgoing link 220. The implementations of the enqueue agent 220 and dequeue agent 240 constitute the DRR queuing algorithm. According to DRR queuing, the dequeue agent 240 intelligently dequeues the packets from the DRR queue structure 200 based on bandwidth apportioning specifications and places the packets on the outgoing link. One implementation of the DRR queue structure 200 consists of an array of linked lists of packets, which ensures that each queue (for example, the nth queue) can be accessed quickly. Additionally, the head and tail pointers of the linked list are stored so as to enable sufficient enqueuing and dequeuing. According to one implementation of DRR, there is typically a deficit 250 data element and a quota 260 data element. According to the DRR algorithm, each data flow that is assured a share of bandwidth has a corresponding first in first out queue inside the DRR, and each queue within the DRR queue structure 200 has a deficit and quota associated therewith. The quota 260 data element of a queue is the number of bytes of data the queue will send per cycle when viewed from a long-term average. The deficit 250 refers the number of bytes of data that a queue can send in the current round. According to a general weighted variant of DRR, the quotas of the various queues of the DRR are initially set so that the ratios of the quotas are in accordance with the intended apportioning of bandwidth among flows. However, in the example presented in FIG. 3., all quotas are equal and hence coalesced into a single data element termed Quantum. One skilled in the art would appreciate that in the most general case, each queue would have its corresponding quota. In operation, the enqueue agent 230 enqueues an arriving packet into the packet's appropriate queue. The dequeue agent 240 then continuously steps through the queues in a round-robin fashion and sends as many packets from a queue as allowed by its deficit. At the end of each round, the deficit of a non-empty queue is increased by the quantum (and in the most general case, by its quota), as maintained in the quota element. Thus, if a packet cannot be sent for want of deficit, that remaining deficit is retained and increased by its quota in the next round. As a result, past unfairness due to packet boundaries is corrected in subsequent rounds. However, it should be appreciated that queues that are empty (i.e., have no packets located therein) at the end of the round do not retain and add their current deficit to that of the next round. The past deficit is then ignored since it was not being made use of and hence did not cause any unfairness. The operation of DRR is illustrated in FIGs. 3a and 3b, which show a queue structure having four queues 310, labeled 1 through 4, where each queue has buffered a plurality of packets. As referred to herein, the fourth queue, labeled queue #4, has a greater queue number than queues one through three. For instance, in FIG. 3a, the first queue (labeled queue #1) includes packets having 200, 750 and 20 data elements (e.g., each data element is a byte of data), while the second queue (labeled queue #2) includes packets of 500 and 500 data elements. The packets are buffered in each respective queue sequentially, such that the packets arriving first enter the queue before packets arriving later in time. For instance, in the first queue of FIG. 3 a, the packet having 200 data elements is first in the queue because it arrived before those packets sized at 750 and 20 data elements. Similarly, the packet having 750 data elements is second in the queue because it arrived before the packet sized at 20 data elements. Because DRR operates on a first in first out basis within each queue, the packet that enters the queue earliest in time is the first packet that will be dequeued and transmitted over an outgoing link. Also illustrated in FIGs. 3a and 3b is a deficit counter 320 for maintaining the current deficit, as explained earlier. At the beginning of each round, non-empty queues have their deficit counters increased by the Quantum, whereas empty queues have their deficit counters set to the Quantum. In this example of DRR there is no notion of a per-queue quantum or quota, but rather a global quantum that applies to all queues. However, a variant of DRR (which is usually termed weighted DRR) has queue-specific quotas. Referring again to FIG. 3 a, the value of the deficit counter 320 establishes the number of units of data that will be dequeued from the corresponding queue by the dequeue agent during a current round of the deficit round robin process.
FIG. 3 a shows the state of the queue structure during an initial state of the DRR operation. In this state, a round robin pointer (or dequeue agent) 340 initially points to the first queue within the queue structure. The deficit counter 320 shows a value of 500 data elements in FIG. 3a because the quantum size 330 is added to the queue's current deficit maintained by the deficit counter 320, which is initially zero for each individual queue in the present illustration. However, it will be appreciated by those of skill in the art that the deficit counter 320 can alternatively be initially set at any value for each queue. After the quantum size 330 (500) is added to the deficit counter 320, the first packet of data buffered by the first queue, sized at 200 data elements, is compared to the data element value maintained in the deficit counter 320 that corresponds to the first queue (500). Because the deficit counter 320 contains a data element value equal to or greater than the number of data elements in the packet (500>200), the packet is removed from the queue structure by the dequeue agent and transmitted over an outgoing link. The deficit counter is then reduced by the number of data elements within the transmitted packet. Because the transmission of the packet did not utilize the first queue's entire allotment of deficit (500-200 = 300), the next packet in the first queue is then compared in the same manner as the first to the new value of the deficit counter, and this process is repeated until the deficit counter has insufficient deficit to transmit a packet.
Continuing with the illustrative example shown in FIG. 3 a, the value of the deficit counter is reduced to 300 after the first packet is transmitted. Repeating the steps discussed above in processing the first packet, the DRR algorithm compares the new, reduced deficit counter 320 value to the size of the next packet, which has 750 data elements. Because the deficit counter 320 value is not greater than or equal to the size of the packet, the packet is not transmitted over the outgoing link, thereby preventing the source populating the first queue from utilizing a disproportionate share of the outgoing link bandwidth. However, as illustrated in FIG. 3b, the deficit counter 320 retains the unused allocation of data elements
(300), which remain in the deficit counter 320 for use by the first queue during the next transmission attempt. Thereafter, the round robin pointer 340 moves to the second queue in the queue structure, and repeats the steps described above with respect to the first queue. The DRR algorithm repeats the above steps by continuously stepping through the queues in a round-robin fashion, sending as many packets from each queue as allowed by its deficit and the quantum size. For instance, when the round robin pointer selects the first queue during the second round, the quantum size (500) will be added to the deficit (300), yielding a total of 800 data elements in the deficit counter 320. Therefore, the packet with 750 data elements and the packet with 20 data elements will both be dequeued and transmitted out an outgoing link, because 800>(750+20).
In sum, DRR in its most general form arranges each queue to have an associated bandwidth, quota and down counted deficit, where the deficit is the amount of data a queue can send in the current round. The deficit keeps track of past unfairness and each queue's quota is added to its deficit at the beginning of each round. The queues send packets on a round robin basis, and a packet is sent from the queue only when the queue has sufficient deficit. When a packet is sent from the queue its size is subtracted from the deficit. If a packet is unable to be sent due to insufficient deficit, the remaining deficit is added to the next round's deficit, thereby correcting unfairness in subsequent rounds. Finally, it should be appreciated that the worst case cycle time in DRR is proportional to the sum of the queue bandwidth quotas divided by the bandwidth. Although DRR is relatively efficient, simple, and is increasingly being accepted as a standard for fair queuing, DRR suffers from a number of problems that are undesirable for fair queuing of all types of traffic. For instance, DRR can cause packets to suffer high latency, causing DRR to be unsuitable for latency critical flows, such as Voice Over IP. DRR also does not have mechanisms for handling multiple levels of latency critical flows. Additionally, DRR is a fair bandwidth scheduler, rather than a prioritized latency scheduler.
Therefore, it will be appreciated that it would be advantageous to have a fair queuing and priority scheduling solution providing multiple levels of latency. It would also be advantageous to incorporate both fair queuing and priority scheduling, to work in unison and overcome latency-related problems associated with DRR. It would also be advantageous to implement both features to provide a fair bandwidth prioritized latency scheduler rather than merely a fair bandwidth scheduler, as is provided by DRR.
SUMMARY OF THE INVENTION
According to one embodiment of the present invention, there is provided an Integrated Bandwidth Latency Scheduler apparatus, method and system (collectively referred to herein as IBLS) that combines Fair Queuing and Priority Schedulers in a single stage to provide bandwidth fairness guarantees as well as latency prioritization. The IBLS accomplishes these goals by providing a scheduler and process that dequeues packets from multiple queues in an order based upon an algorithm of the TJBLS that arranges and dequeues those queues having the highest priority based on content therein. However, the systems, methods and apparatuses of the present invention also utilize quotas and deficit counters, similar to the DRR process described above, to ensure that packets from each source receive their fair portion of the outgoing link bandwidth. To determine which first in first out queue an incoming data packet is placed, the enqueue agent utilized by the present invention classifies incoming packets based on the type of data included within the data packet, the source of the packet, the type of data flow, or another attribute of the packet, such as a header associated with the packet.
IBLS obviates the need for two stages of queuing to achieve both bandwidth and priority-based scheduling and thus reduces per-packet latency. By means of a novel way of dequeuing packets, IBLS ensures that latency critical flows experience a lower latency than other flows. While doing so, IBLS makes sure that bandwidth fairness is not compromised. To achieve this, it ensures that both bandwidth scheduling and prioritized latency scheduling work in unison without causing correctness problems. The bandwidth scheduler functionality within the IBLS decides how many packets are allowable from each queue in the current round, whereas the priority scheduler functionality makes sure that among these packets, those of higher latency criticality get sent earlier. Furthermore, under typical loads, the IBLS of the present invention provides a significant amount of latency differentiation over conventional scheduling algorithms such as DRR. IBLS reduces jitter of high priority flows under usual loads. IBLS also provides better bandwidth fairness than DRR on a per cycle (i.e. round) basis. The latency differentiation effect of IBLS diminishes in times of extreme congestion. And IBLS not only avoids queuing-theoretic flaws introduced by a two-stage design, but also reduces the latency experienced by a packet. Therefore, the IBLS approach is of great benefit in systems that need both bandwidth fairness and latency differentiation.
Also provided in the present invention is a weighted fair queuing algorithm providing express paths to latency critical components of aggregated flows while providing bandwidth guarantees to aggregated user flows. Therefore, although aggregated user flows may consist of traffic components of varying importance, the present invention makes it is possible to isolate and provide a lower latency to latency critical components of such aggregated user flows, while still ensuring that all aggregated flows still experience their overall share of fair bandwidth. The latency critical components of aggregated flows can be separated and placed in a latency critical queue while the non-latency-critical components of aggregated flows use non-latency-critical queues corresponding to their respective user flows. The dedicated queues and bandwidth borrowing features of the present invention apportion link bandwidth among users, ensure fair sharing of extra bandwidth among various users, and provide fast paths for latency critical application flows.
BRIEF DESCRIPTION OF THE DRAWINGS Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
FIG. 1 shows a fair queuing scheduler combined in series with a priority scheduler, according to the prior art.
FIG. 2 shows a DRR queue structure according to the prior art. FIG. 3 a shows an illustrative example of the operation of DRR, according to the prior art.
FIG. 3b shows an illustrative example of the operation of DRR, according to the prior art.
FIG. 4 shows a block diagram of an IBLS, according to one embodiment of the present invention. FIG. 5 illustrates in block diagram form an enqueue process of the IBLS, according to one embodiment of the present invention.
FIG. 6 illustrates in block diagram form a dequeue process of the IBLS, according to one embodiment of the present invention.
FIG. 7 shows IBLS data structures, according to one aspect of the present invention.
FIG. 8 illustrates multiple queues having associated deficit arrays, and the AND product of an associated deficit bitmap and queue bitmap, according to one illustrative example of the present invention.
FIG. 9 shows TJBLS data structures, according to an alternative embodiment of the present invention.
FIG. 10 illustrates in block diagram form an enhanced DRR+ enqueue process, according to one aspect of the present invention.
FIG. 11 illustrates in block diagram form an enhanced DRR+ dequeue process, according to one aspect of the present invention. FIG. 12 shows a two stage quality of service architecture implemented by the present invention.
FIG. 13 shows a block diagram of a queue structure illustrating bandwidth borrowing, according to one illustrative embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.
As will be appreciated by one of ordinary skill in the art, the present invention may be embodied as a method, a data processing system, or a computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product on a computer- readable storage medium having computer-readable program code means embodied in the storage medium. Any suitable computer readable storage medium may be utilized including hard disks, CD-ROMs, optical storage devices, or magnetic storage devices.
The present invention is described below with reference to block diagrams and flowchart illustrations of methods, apparatus (i.e., systems) and computer program products according to an embodiment of the invention. It will be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the flowchart block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
Accordingly, blocks of the block diagrams and flowchart illustrations support combinations of means for performing the specified functions, combinations of steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems which perform the specified functions or steps, or combinations of special purpose hardware and computer instructions.
Integrated Bandwidth Latency Scheduler (IBLS)
As shown in the block diagram of FIG. 4, the IBLS 420 of the present invention combines a Fair Queuing Scheduler 400 with a Priority Scheduler 410 in a single stage to provide both bandwidth fairness guarantees and latency prioritization. The present invention thus ensures that the latency experienced by packets, especially those of latency critical flows, is kept low, while maintaining bandwidth fairness among all packet flows. Further advantages of the present invention will be appreciated after the TJBLS of the present invention is disclosed in detail with reference to the figures.
According to one embodiment of the invention, the well-known Deficit Round Robin (DRR) bandwidth scheduler, discussed above with reference to FIGs. 2, 3 a and 3b, may be modified to incorporate prioritized latency support provided by the IBLS of the present invention. In this embodiment the EBLS utilizes similar components as those described above with reference to DRR, including an enqueue agent, a queue structure having multiple queues therein, a dequeue agent, and deficit and quota registers. However, in contrast to the round-robin approach utilized by the DRR algorithm, the dequeue process of the TJBLS 420 determines the queue from which a packet (or a configurable number of bytes) will be transmitted immediately after the dequeue agent transmits the previous packet (or configurable number of bytes) over the outgoing link. Therefore, the IBLS algorithm of the present invention supports the notion of a round in which DRR- like bandwidth fairness is achieved, but in which reordering of packets is performed to cater to latency critical flows. To accomplish priority dequeuing, a dequeue agent of the IBLS quickly examines each queue that is ready to send data and ascertains the queue that has the highest priority. For instance, one particular queue may contain Voice over IP (VoD?) data that the dequeue agent recognizes has higher priority than data in other queues. Regardless of each queue position, the dequeue agent will send the latency-critical data from its corresponding queue to the outgoing link. Thus, the present invention utilizes a method of reordering packets within a round such that higher priority queues get to forward their packets earlier than the lower priority ones. This embodiment and process will be explained in greater detail with respect to FIGs. 5, 6 and 7. An enqueue process 500 according to one aspect of the IBLS of the present invention is depicted in the flowchart of FIG. 5. On receiving a packet transmitted from an incoming link, the packet is initially classified as a particular type so that the packet can be mapped to its corresponding queue by the enqueue agent and process (block 510). This classification process is advantageous in this embodiment of TJBLS because increasing queue number (i.e., farther down in the queue structure) corresponds to decreasing latency priority. As those of skill in the art will appreciate, the ordering of queues based on priority is done so as to enable quick ascertainment of the current highest priority queue. This is in direct contrast to DRR, where all queues have equal priority. For instance, referring again to the illustrative example shown in FIG. 3 a, DRR treats the first and third queues equally, whereas IBLS guarantees the first queue a higher latency priority than the third queue. Thus, according to the IBLS algorithm, higher priority level translates to lower latency, in contrast to DRR, where all queues experience approximately the same latency. To determine the destination queue in which a data packet having a corresponding queue should be placed into the queue structure, the enqueue agent classifies incoming packets based on the type of data included within the data packet, the source of the packet, the type of data flow, or another attribute of the packet, such as a header associated with the packet. For instance, the enqueue agent may classify data packets differently if the packets are VoIP, HTTP, FTP, Citrix (or any application service traffic), or other data types. To classify the packets based upon differing data types or other attributes, the TBLS can include a look-up table to ascertain the latency priority of particular types of data packets. For example, a VoIP packet may have an associated priority weight of 100, an HTTP packet a priority weight of 50, an FTP packet a priority weight of 10, and a Citrix data packet a priority weight of 75. In this example, upon receiving a VoTJ? packet the enqueue agent will identify and place the packet in first queue. A Citrix data packet will similarly be recognized and placed in the second queue by the enqueue agent, even where the Citrix data packet is received before the VoIP packet. Preferably, the TBLS algorithm enables an administrator to easily configure or alter the priority weights associated with particular types of data. Furthermore, it is preferable that the TJBLS algorithm allows an administrator to easily earmark particular flows, and assign those flows whatever priority the administrator so desires.
Referring now again to FIG. 5, after a packet and its associated queue are identified, the packet is enqueued (block 510). However, to prevent excess data being built up in one or more queues within the queue structure, each queue or the entire queue structure may include a byte limit that should not be exceeded. In this embodiment, a byte limit exists for the entire queue structure, but it should be appreciated that the invention is not limited to this alone, and that it may also encompass per-queue byte limits. This feature is common in the enqueue processes of many common bandwidth schedulers including DRR. The enqueue process verifies that the queue structure byte limit is not exceeded by the addition of a packet to its corresponding queue (block 520). Where the byte limit is exceeded, a packet may be dropped from the queue structure. As will be appreciated by those of skill in the art, the queues and queue structure discussed herein may be defined and stored within a database or memory. According to the process illustrated in FIG. 5, a packet may be dropped from the tail end of the queue having the highest ratio of length to its associated quota (block 530). However, it should be appreciated that alternative methods may be implemented to determine a packet to be dropped, such as dropping the current packet, or dropping from the head of the queue having the highest length to quota ratio. After the packet is enqueued, the data structures of the queue structure are updated (block 540), as described below. This step includes updating the data structures (such as the queue bitmap that is described below) based on which the dequeue process decides the next packet to send, and the data structures needed to decide which queue the enqueue process should drop a packet from in case the byte count of the queuing structure overshot the specified byte limit. The dequeue process (block 550) is then initiated to transmit the packets from the queue structure over the outgoing link to their respective destinations.
The dequeue process 600 according to one embodiment of the invention is illustrated in the flow chart of FIG. 6. At each step in the dequeue process, the dequeue process 600 sends a small portion of data (either a single packet or a certain number of bytes of data, which might include a multiple number of packets) from a queue and determines from which queue to transmit the next portion of data from. As explained briefly above, the dequeue process enhances the conventional DRR dequeue process by reordering packets within a round (i.e., a cycle through each queue, although not necessarily in order, analogous to one pass in a round-robin approach) such that higher priority queues forward packets earlier than the lower priority queues. Although the dequeue process is unlike the DRR dequeue process in that queues are selected based on their priority and readiness (i.e., a ready queue is a queue that has a data waiting to be transmitted and sufficient deficit to transmit at least the first packet) to transmit packets, like DRR, the IBLS algorithm maintains DRR-like deficits and quotas for each queue, where the deficit is the number of bytes a queue can send in the current round of the dequeue process, as will be described with reference to FIGs. 7 and 8. The deficits and quotas, and arrays of deficits and quotas, as discussed in detail below, are contained within memory or one or more databases accessible by hardware and software components for executing the process described herein. As is illustrated at block 610, although ready queues are serviced in order of priority, the dequeue agent and process begins the next round of dequeuing when each queue in the structure is either empty or does not have sufficient deficit to send packets. Where there is a queue with packets buffered therein, and the queue has sufficient deficit to transmit a packet (block 610), the oldest packet of the queue having the highest priority will be transmitted by the dequeue agent (block 620) and the deficit and data structures of the queue structure will be updated (block 630). The dequeue process then repeats the process, beginning the next step in a round by determining if there is a waiting queue with a non-zero deficit (block 610). On the other hand, where there is not a queue with sufficient deficit to transmit its next packet, the dequeue process determines whether all queues within the queue structure are empty (block 650). If each queue is empty, the quotas are reset to each queues' deficit (block 640), and the dequeue process enters a sleep mode (block 680), wherein it waits for a packet to be buffered by the enqueue agent into a queue to restart the dequeue process (block 610). The copying of the quota to each queue's deficit value if all queues are empty 640 is done by means of a block copy for efficiency. Where only some but not all of the queues are empty, the deficit of each empty queue is reset to the quota value (block 660), and for each non-empty queue, the quota is added to its existing deficit (block 670). Thereafter, the dequeue process repeats itself (block 610). It should further be noted that one of the aspects that differentiates the dequeue process of TJBLS from that of DRR, described above, is that parameters such as deficit and quota are updated at the end of the round, instead of at the beginning of each round. Those skilled in the art will realize that the description above could have many more optimizations, and many of the above steps could be made more efficient; but nevertheless, the main steps suggested by the above will need to be performed.
The data structures associated with one embodiment of the TBLS system are illustrated in the block diagram of FIG. 7. The TBLS system includes a queue structure 700 located between an incoming link and an outgoing link. Incoming packets from data sources received via the incoming link are queued in the queue structure 700 by the enqueue agent and process 730 described above with respect to FIG. 5. Therefore, the queues are arranged in the queue structure such that queues are ordered on the basis of priority. According to this aspect of the invention, higher priority flows are assigned a lower queue number. However, the invention handles any other ordering scheme and hence is not limited by the ordering scheme described herein, as long as the ordering enables fast ascertainment of which is the ready queue with highest priority. The IBLS implementation also includes a dequeue agent implementing the dequeue process 740 described above with respect to FIG. 6. FIG. 7 also includes a quota array 720, which is an array indexed by queue number used to store predetermined bandwidth allocations, and a deficit array 710, which is a queue-number-indexed array of down-counted deficit amounts. As in the DRR illustrative example discussed above, the quota array 720 can be the same for all queues, or can vary for each queue of the queue structure 700. Also included in the TBLS system of the present invention is the deficit bitmap 750, which is a bitmap that stores a 1 or 0 bit for each queue in the queue structure 700. A bit corresponding to a queue is set to 1 if that queue has enough deficit to send its first packet; otherwise, the bit is set to 0. The queue bitmap 760 is a similar bitmap in which a bit is set to 1 if the corresponding queue has a packet waiting in it, and a 0 if the corresponding queue does not have a packet waiting in it.
The purpose of the deficit bitmap and queue bitmap, and the operation of the dequeue process is best understood with reference to the illustrative example shown in FIG. 8. Illustrated in FIG. 8 are four bitmaps 800 arranged by the enqueue agent and process 730 in order of decreasing priority. Therefore, queue 1 has a priority greater than each of the other queues in the illustration, queue 2 has a priority greater than each of the other queues except for queue 1, and so forth. Also illustrated in the block diagram is the deficit array 810, deficit bitmap 850, queue bitmap 860, and a composite bitmap 870, which is the created by AND-ing the deficit bitmap 850 and queue bitmap 860. The first queue includes two 60 byte packets and has a deficit of 500 (bytes)(this value is stored in the deficit array 810), the second bitmap includes one 60 byte packet and has a deficit of 5, the third queue includes one 60 byte packet and has a deficit of 100, and the fourth queue includes no packets and has a deficit of 60.
As noted above, in the deficit bitmap 850 a bit corresponding to a queue is set to 1 if that queue has enough deficit to send its first packet; otherwise, the bit is set to 0. Therefore, queues 1, 3 and 4 each include a deficit bitmap value of 1, as the deficit stored in the deficit array is sufficient to transmit the packets in the corresponding queues. However, because the deficit of queue 2 is less than the 60 byte packet size buffered in queue 2, the deficit bitmap includes a 0 bit for the second queue. The queue bitmap 860 includes bits that are set to 1 if the corresponding queue has a packet waiting in it. Therefore, the first three queues include 1 bits, while the fourth queue includes a 0 bit, as the fourth queue does not include a packet waiting in it for transmission.
The composite bitmap 870 is created by bitwise- AND-ing the deficit bitmap 850 elements with the corresponding elements in the queue bitmap 860 for each queue. If there is a 1 bit set in the composite bitmap, the queue corresponding to that bit both has a packet waiting and sufficient deficit to send the packet (i.e., it is prepared or ready to send a packet). Thus, the use of the composite bitmap allows the IBLS algorithm of the present invention to quickly determine those queues that are prepared to send packets. If the resultant bitmap is zero, then there is no queue ready to transmit a packet. Thus, in the dequeue process illustrated in FIG. 6, the determination of whether there is a queue with a waiting packet (block 610) is equivalent to testing if the resultant bitmap is non-zero. Moreover, given a resultant bitmap, finding the highest bit position can be implemented efficiently by means of a single (or a few) table lookup(s). Continuing with the example illustrated in FIG. 8, according to the composite bitmap the first and third queues are ready to transmit packets. As a result, the dequeue process will attempt to transmit the packets within these queues prior to those having either insufficient deficit or no waiting packets. Because queue 1 has greater priority than queue 3, the dequeue process will begin by transmitting both 60 byte packets from the first queue, and reducing the deficit stored in the deficit array to 380 (see blocks 610, 620, 630). Note, however, that where the deficit is insufficient to complete the transmission of a packet in a queue the dequeue process will not transmit that packet, and will instead look for queues having a waiting packet and an adequate deficit. For instance, if the second packet in the first queue was 500 byte in size (rather than 60), the deficit would be insufficient to transmit the packet and the dequeue process would continue with the third queue. Continuing with the illustrative example of FIG. 8, after the two 60 byte packets are transmitted from the first queue, the dequeue process will transmit the packets from the third queue because the TBLS algorithm recognizes that the composite bitmap includes a 1 for the third queue. Thus, the second queue is skipped, unlike that which would occur in DRR or in round-robin queuing algorithms. After transmitting the 60 byte packet from the third queue, the dequeue process will determine if all the queues are empty (see block 650). Because the fourth queue is empty and the second queue has a 60 byte packet (and a queue bitmap value of 1) the deficit of the first, third and fourth queues will be reset to the queue's quota (see block 660), and the deficit of queue 2 will be increased by its quota (see block 670). Thereafter the dequeue process repeats (see block 610). It should be appreciated that IBLS, unlike certain classical fair schedulers, uses a queue-wise allocation of quotas, which takes care of bandwidth apportioning on a per-round basis. It should also be noted that the present invention is unlike a strict round-robin scheduler (e.g., DRR); it can however be likened to a variant of DRR that uses queue-specific weighted-quotas. In IBLS, a new round begins when each queue is either empty or non-empty with insufficient deficit. Therefore, IBLS requires that the Fair Queuing Scheduler have a round or cycle in which bandwidth fairness is maintained. It should also be noted that because IBLS does not adhere to a strict round-robin process, the time complexity of the dequeue process is O(log n) (for n queues), which means that the time taken on a long term average by the dequeue process increases logarithmically as the number of queues is linearly increased. However, the time complexity of the enqueue process is O(l), such that the process is independent of the number of queues. In sum, using the IBLS systems and methods of the present invention, the per-round properties of DRR are retained while inside the round, the order in which packets are sent depend upon the priorities of queues that have packets waiting in them. As a result, TBLS guarantees weighted apportioning of bandwidth, has the same bandwidth fairness properties as a weighted variant of DRR, and provides multiple priority levels based on response time.
It will be appreciated that the IBLS embodiment discussed above with respect to FIGs. 5-8 made the assumptions that each queue has a unique latency priority associated with it, or equivalently, there are as many priority levels as the number of flows/queues, and that queues are ordered on the basis of priority to enable bitmap-based implementation. This implementation of TBLS enables table- lookup-based optimizations (e.g., finding the highest bit position in a bitmap is possible in just 2 table lookups for 16 queues), but requires that priorities be totally ordered such that equal priorities are not supported. Thus, two queues having equal priorities will not get the same latency preference, as one must precede the other. Although these assumptions are convenient in certain circumstances, an alternative solution in which an arbitrary number of priorities (i.e., from 1 to n, the number of queues) and an arbitrary ordering of queues may be desirable. The present invention provides an alternative solution that allows these capabilities.
Another embodiment of the TBLS of the present invention is illustrated in the block diagram of FIG. 9. In this implementation, the queues in the DRR queuing structure are mapped onto a number of active priority buckets 950.
Priority buckets consist of an array whose elements contain pointers to two linked lists of queue records. Each queue is mapped onto to an element of the array depending upon its priority. Henceforth, an element of the priority bucket array is referred to as a priority bucket. According to this embodiment, it is possible that multiple queues map onto the same priority bucket. Whenever a packet arrives, an enqueue process 930 first determines the queue to which the packet is destined and then determines the active priority bucket 950 the queue is associated with (or mapped to). Each active priority bucket 950 contains two linked lists, the Active List 970 of queue records that represent the ready queues (i.e., have a packet that they can send immediately) that map to that active priority bucket 950, and the Inactive List 980 of queue records that have packets in them, but do not have enough deficit currently to send their first packet. Henceforth, we shall use the terms "insert the queue record into a List" and "insert the queue into the List" interchangeably. A bitmap (On bitmap) 960 is stored such that each priority bucket has a corresponding bit that is set to 1 if the corresponding Active List is not empty and is set to 0 otherwise. Thus, by checking if a certain bit is set, one can decide if the corresponding priority bucket has any ready queues that map onto it. This point enables an efficient table lookup based implementation to ascertain the priority bucket of highest priority that has ready queues in its Active List. More generally, if the On bitmap is non-zero, i.e., has at least one bit set, then it means that there is one priority bucket that has a ready queue. This property is made use of by the dequeue process 940.
The enqueue process 930 is implemented according to the flowchart shown in FIG. 10. The enqueue processing in this embodiment is almost identical to that illustrated in FIG. 5 with the only difference being an additional set of operations (block 1050). When an incoming packet arrives, it is enqueued into the appropriate queue (block 1010), as discussed previously, and a check is made to see if the byte limit on the queue structure is exceeded (block 1020). If it is exceeded, packets are dropped suitably to reduce queue structure byte usage (block 1030). The same update operations (block 1040) as described in the context of FIG. 5. (block 540) are then performed on the data structures. The active and inactive lists specific to this embodiment are then updated (block 1050). More specifically, if the incoming packet is the first packet (block 1062) entering an empty queue contained inside the queue structure, a check is made to see if the deficit pertaining to this queue is sufficient to send the packet (block 1064). If the deficit is sufficient to send the packet, the queue (i.e., the queue record) is then inserted into the Active List (block 1066) corresponding to the queue's priority bucket (array element of the priority buckets) and the bit corresponding to the cuπent priority bucket is set in the On bitmap. If the deficit is not sufficient, the queue is inserted into the Inactive List (block 1068) coπesponding to the queue's priority bucket. It should be appreciated, however, that the foregoing steps are performed only if the incoming packet is the first to enter an empty queue. The dequeue process 940 shown in FIG. 11 is also similar to the one illustrated in FIG. 6, albeit more elaborate. The dequeue process begins by determining if there is a packet to ready to be sent from the queuing structure (block 1110). This check is performed by checking if the On bitmap 960 is nonzero (i.e., has at least one bit set). If so, the priority bucket coπesponding to the highest bit position and thus of the highest priority is chosen and the first queue in its Active List is allowed to send a packet (or a configurable number of bytes)
(block 1120). After sending a packet (or a certain number of bytes), if the deficit of the cuπent queue is insufficient to send its next packet (which supposes that a next packet exists) (block 1130) the queue record is inserted (block 1150) into the coπesponding Inactive List 980 and removed from the Active List (block 1152). If however, the deficit is sufficient, a check is made to see if the queue is now empty (block 1145). If this occurs, the queue is removed from the coπesponding Active List 970, and is not inserted on the Inactive List since the queue is empty. However, if this check fails, the cuπent queue is reinserted at the end of the Active List (block 1154) so as to enable other ready queues to send their packets in succeeding rounds without incurring a high latency, thereby insuring that all queues having the same priority have the same latency over the long term. In either case, updates are performed (block 1156) on the data structures such as the On bitmap in order to maintain consistency. Returning to the check (block 1110) to see if there is a ready queue to send a packet from, if this check turns out to be false (i.e., no more ready queues are available), then a check is made to see if all queues are empty (block 1165). This is similar to the check made in (block 650) the process of FIG. 6. If this check is true, the quotas are block-copied onto the deficits for efficiency reasons (block 1155) (as in block 640) and the dequeue process 940 enters a sleep mode. If this check (block 1165) is false, steps are taken in a manner similar to those illustrated in FIG. 6 (see, e.g., blocks 660 and 670). The deficits of empty queues are reset to their respective quotas 1170, and those of non-empty queues are increased by their quotas (block 1180). In addition, the Active and Inactive Lists in the priority buckets are switched in their function (block 1190) since the Active List is empty. This means that the Active List of a priority bucket would now function as the Inactive List and vice versa. This switching is easily enabled by storing the Active List and Inactive List as pointers. One skilled in the art would also understand that such switching can be accomplished quickly and simultaneously in all priority buckets if these pointers are stored as elements of a two element aπay (indexed by two indices 0 and 1) and a global variable is maintained to indicate if the index of 1 (or 0) coπesponds to the Active List pointer or if it coπesponds to the Inactive List pointer. This process is repeated as long as there are non-empty queues.
It should be appreciated that when the next dequeue cycle starts, the priority bucket being serviced may have queues that cannot send packets because the deficit (which would have been increased at the end of the previous cycle) is still insufficient to send the packet waiting at the head of the queue. The dequeue process can remove such queues from the active list and transfers them to the end of the inactive list. This method postpones the detailed updating of the active and inactive lists until the next cycle and instead performs a quick switch of the active and inactive queues. This method works well under conditions of congestion, where one can expect several queues to have outstanding packets. In another embodiment, the dequeue process can re-evaluate the place of each queue (in the active or inactive list) at the time it increases the deficit of each queue at the end of the cycle. This process would be beneficial in periods of low congestion.
However, it should be appreciated that the present invention is not restricted to a single method for starting a new cycle and thus the above methods represent only two possible embodiments for starting a new cycle. According to this embodiment of the present invention, an arbitrary number of priority levels may be used (from 1 to n). This ensures that all queues having the same priority experience the same average latency since all such queues are mapped onto the same priority bucket and on sending a packet (or configurable number of bytes) from a queue, it is reinserted at the end of the priority bucket's Active List. This is an enhancement over the previous embodiment where the provision of equal priority queues was not possible. However, this implementation is more complicated than the previous implementation, and may require a slightly higher run-time overhead to execute. The time complexity for the enqueue and dequeue processes are the same as in the first embodiment.
In yet another embodiment of the invention, a Binary Heap (usually used to implement Priority Queue data structures) structure is incorporated to enable fast ascertainment of the highest priority queue that is cuπently ready. Those skilled in the art will be well aware that a binary heap allows efficient retrieval of the highest priority record in a given set of records. The implementation complexities for insertion and deletion into a binary heap are both O(log n). This implementation involves the insertion of a queue record into the binary heap once it becomes ready and deletion from the binary heap once it becomes either empty or its deficit becomes insufficient. The heap structure allows a flexible number of priority levels (1 to n) since it is impartial to two records of the same priority number. To enable low latency, it would be important to remove and reinsert a queue record into the binary heap once it has sent a packet (or a configurable number of bytes) so as to allow a queue of a priority equal to or greater than the current queue to get an opportunity to send its packet (or configurable number of bytes) without a large delay. This implementation would incur a greater run-time overhead than both the implementations discussed above. However, it uses a standard, well understood data structure to accomplish priority scheduling.
In summary, TJBLS systems and methods guarantee fair bandwidth, allow bandwidth bursting without compromising fairness, and provide multiple latency priority levels. Furthermore, systems and methods of the present invention are amenable to light-weight implementation, allow for easy configuration of bandwidth and latency assignments, and are ideal where fine-grained control over per-flow latency is needed. Additionally, an IBLS according to the present invention provides better differentiation in latency and less jitter to higher priority flows in uncongested or near-congested network conditions.
Enhanced DRR+: Bandwidth Borrowing In addition to the IBLS implementations described in detail above, the present invention provides another weighted fair queuing algorithm to provide express paths to latency critical components of user flows while providing overall bandwidth guarantees to user flows. As an illustrative example, an administrator of a network may wish to restrict the bandwidth available to users according to their payment plan, but still ensure that certain traffic components, such as VoIP, of all users still experience low delay and jitter. In such a scenario, the following feature of this invention will prove useful and appropriate. According to this feature of the present invention, the latency sensitive traffic components of all user flows are channeled into one global latency critical queue while all other user traffic use their own separate non-latency critical queues. This is done in a manner which ensures that no bandwidth unfairness results by channeling the latency critical components of all user flows into a common latency critical queue.
To fully describe the aforementioned feature, an illustrative scenario may be considered where one desires that traffic originating from each user is limited to a certain fraction of the link bandwidth, and that the application components of the user's traffic are differentiated according to a predefined profile of bandwidths and priorities. In addition, it may be required, under some circumstances, that a certain latency critical traffic component (VoIP, for instance) of all user flows experiences very low latency when compared with all other traffic types. To solve this problem, this invention enunciates a two step solution as is illustrated in FIG. 12. The second stage 1220 of the scheduler is an Enhanced DRR+ scheduler that is responsible for fairly apportioning bandwidth among users 1240a, 1240b, ...,1240n, while also ensuring low latency for the VoTP traffic components (although other latency sensitive traffic components could also be similarly scheduled). The first stage 1210 of the scheduler consists of IBLSs that apportion user bandwidth to user applications. The first stage queue has a queue per user application and FIG. 12 shows the VoEP queue 1250 coπesponding to User 1 1240a as being one among its application specific queues. Both VoTP data and Non-VoIP data is transmitted to the second stage Enhanced DRR+ scheduler that puts the non-VoIP components of user traffic into respective user queues within the Stage II Scheduler 1220, and aggregates the VoTJP packets received from each of the Stage I Schedulers 1210, such that the Stage II Scheduler can separate the VoTP packets from other data, so as to ensure low pass-through latency to VoTP traffic. It should be noted that this special provision for VoIP components of user traffic does not affect overall bandwidth fairness to user flows. This means that if the fairness criteria in the Stage II Scheduler 1220 is such that User 1 1240a is allowed to send twice as many data units in a round as User 2 1240b, then, the special scheduling of the VoTP components of either User 1 or User 2 will not affect this fairness specification. It merely makes sure that the VoTP components in the traffic generated by User 1 and User 2 experience very low latency. Although in the above discussion VoTP was used as an example of latency critical flow, it will be appreciated that this aspect of the present invention is not limited to VoTJP as the sole latency critical flow. According to one aspect of the invention, bandwidth boπowing may be used to provide especially low latency to flow components that are latency critical. FIG. 13 shows a block diagram of a queue structure illustrating bandwidth boπowing, according to one illustrative embodiment of the present invention. In FIG. 13, a latency critical VoIP packet 1300 belonging to aggregated flow 3 may need to be handled quickly. Hence, it may be placed in the latency critical queue 8 1310 which is handled specially by the Stage II scheduler so as to provide it very low latency. But while doing so, a corresponding deficit from the respective user queue in which non-VoIP packets from the same aggregated flow would be placed may be boπowed to ensure overall bandwidth fairness. Where the deficit in the respective user queue is insufficient, the aggregated flow is either misbehaving or has exhausted its deficit for the cuπent round and will have to wait for its turn in the next round. Thus, if the deficit is insufficient, it is fair to enqueue the latency critical packet not into the latency critical queue, but into the respective user queue that coπesponds to its aggregated flow without needing to boπow bandwidth. To avoid misordering of data, latency critical packets are channeled to the latency critical queue only if there are no other latency critical packets already existing in the respective user queue. As a consequence latency critical packets may sometimes pass through the respective user queue instead of the latency critical queue. Barring this case, latency critical flows would benefit from the latency critical cut-through path. This aforementioned aspect of the invention relies on the idea of boπowing bandwidth to ensure bandwidth fairness and uses a latency critical queue to channel latency critical traffic.
As discussed above, IBLS schedulers according to the present invention apportion user bandwidth appropriately among its application flows, ensures fair sharing of extra available bandwidth, and prioritizes application traffic based on latency. The IBLS integrates a cycle-based fair bandwidth scheduler and a conventional priority scheduler into a single queuing stage in order to provide a combination of bandwidth fairness and multiple levels of latency criticality. This not only avoids the queuing-theoretic flaws introduced by a two-stage design but also reduces the latency experienced by a packet. The dedicated queues and bandwidth boπowing features of the present invention discussed above, also apportion link bandwidth among users, ensure fair sharing of extra bandwidth among various users, and provide a fast path for latency critical application flows. Many modifications and other embodiments of the invention will come to mind to one skilled in the art to which this invention pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims

CLAIMS:
1. A method for limiting latency for latency-critical network traffic, comprising: receiving at a queue structure a plurality of data packets associated with at least one source, wherein said queue structure comprises a plurality of queues, and wherein each queue of said plurality of queues is ranked in said queue structure; identifying an attribute associated with one of said plurality of data packets; determining a queue of said plurality of queues to receive said one of said plurality of data packets, wherein said queue is identified based upon said attribute, and wherein said queue is ranked in said queue structure based at least in part upon said attribute; placing said one of said plurality of data packets into said queue; and dequeuing said one of said plurality of data packets from said queue structure based at least in part upon the rank of said queue in said queue structure.
2. The method of claim 1, further comprising the step of identifying one or more queues prepared to immediately transmit at least one data packet prior to dequeuing said one of said plurality of data packets.
3. The method of claim 2, wherein the step of dequeuing each data packet comprises dequeuing data packets from said one or more queues that are prepared to immediately transmit at least one data packet based at least in part upon the rank of said one or more queues in said queue structure.
4. The method of claim 1, further comprising the step of maintaining a deficit aπay, wherein the deficit aπay contains a respective deficit amount representing the quantity of data, within one or more data packets, that may be immediately dequeued from each queue within the queue structure.
5. The method of claim 4, further comprising the step of updating a deficit bitmap, wherein said deficit bitmap maintains a plurality of bits, wherein each bit represents whether the deficit amount exceeds the quantity of data within an initial data packet that may be immediately dequeued from a coπesponding queue within the queue structure.
6. The method of claim 1, further comprising the step of maintaining a quota aπay, wherein a respective quota amount of the quota aπay represents an additional quantity of data, within one or more data packets, that may be consecutively dequeued from a respective queue within the queue structure.
7. The method of claim 6, further comprising the step of maintaining a queue bitmap wherein said queue bitmap maintains a plurality of bits, wherein each bit represents whether a coπesponding queue within the queue structure has a packet of data.
8. The method of claim 1, wherein the identifying an attribute associated with one of said plurality of data packets comprises identifying the attribute within a header of said one of said plurality of data packets.
9. The method of claim 8, wherein identifying an attribute associated with one of said plurality of data packets comprises identifying, within the header, that said one of said plurality of data packets is a Voice Over Internet Protocol, Hyper Text Transfer Protocol, File Transfer Protocol, or Citrix data type.
10. The method of claim 1, further comprising the step of establishing a byte limit for each queue in said queue structure prior to the step of placing said one of said plurality of data packets into said queue.
11. The method of claim 10, wherein the step of placing said one of said plurality of data packets into said queue comprises the step of determining whether said one of plurality of data packets includes a number of bytes that exceeds the byte limit for said queue.
12. The method of claim 1, further comprising the step of maintaining a deficit for each queue, wherein said deficit represents the quantity of data, within one or more data packets, that may be immediately dequeued from each respective queue within the queue structure.
13. The method of claim 12, further comprising the step of maintaining a quota for each queue, wherein said quota represents an additional quantity of data, within one or more data packets, that may be consecutively dequeued from a respective queue within the queue structure.
14. The method of claim 13, wherein said step of dequeuing comprises dequeuing subsequent data packets from said queue structure based upon the rank of each other queue in said queue structure.
15. The method of claim 14, wherein the step of dequeuing further comprises updating the deficit of each empty queue to the quota.
16. The method of claim 14, wherein the step of dequeuing further comprises adding the quota to the deficit of each non-empty queue.
17. The method of claim 14, wherein dequeuing subsequent data packets from said queue structure based upon the rank of each other queue in said queue structure comprises repeatedly dequeuing subsequent data packets from said queue structure until said initial data packets in each respective queue are larger than the deficit for respective queues.
18. The method of claim 1, further comprising the step of identifying whether said attribute indicates whether said one of said plurality of data packets represents data that is latency critical or latency non-critical.
19. The method of claim 18, further comprising the steps of: establishing a latency critical second stage queue structure; and receiving at said latency critical second stage queue structure said one of said plurality of data packets where said attribute indicates that said one of said plurality of data packets represents data that is latency critical.
20. The method of claim 19, further comprising the steps of: establishing a latency non-critical second stage queue structure; and receiving at said latency non-critical second stage queue structure said one of said plurality of data packets where said attribute indicates that said one of said plurality of data packets represents data that is latency non-critical.
21. The method of claim 20, wherein said step of establishing a latency non-critical second stage queue structure comprises establishing a latency non- critical second stage queue structure comprising a plurality of latency non-critical queues.
22. The method of claim 21, further comprising the step of maintaining a non-critical queue structure deficit for each latency non-critical queue, wherein said deficit represents the quantity of data, within one or more data packets, that may be immediately dequeued from each respective queue within the non-critical second stage queue structure
23. The method of claim 22, further comprising the step of maintaining a critical queue structure quota for each latency critical queue within said critical queue structure quota, wherein said quota represents an additional quantity of data, within one or more data packets, that may be consecutively dequeued from a respective queue within the critical second stage queue structure.
24. The method of claim 23, further comprising the steps of boπowing at least a portion of said non-critical queue structure deficit and adding said portion to said critical queue structure quota.
25. The method of claim 20, wherein the step of receiving comprises receiving at said latency non-critical second stage queue structure said one of said plurality of data packets subsequent to said one of said plurality of data packets being dequeued from said queue structure.
26. The method of claim 1, further comprising the step of mapping each one of said plurality of queues within said queue structure to an associated element within an active priority bucket, wherein said associated element points to an active list or inactive list associated with said active priority bucket, wherein said active list identifies the queues prepared to immediately dequeue a data packet, and wherein said inactive list identifies the queues that contain data packets but are not prepared to immediately dequeue the data packets.
27. A computer program product for limiting latency for latency-critical network traffic, comprising: a computer readable storage medium having computer-readable program code means embodied in said medium, said computer-readable program code means comprising: computer readable program code means for receiving at a queue structure a plurality of data packets associated with at least one source, wherein said queue structure comprises a plurality of queues, and wherein each queue of said plurality of queues is ranked in said queue structure; computer readable program code means for identifying an attribute associated with one of said plurality of data packets; and computer readable program code means for determining a queue of said plurality of queues to receive said one of said plurality of data packets, wherein said queue is identified based upon said attribute, and wherein said queue is ranked in said queue structure based at least in part upon said attribute; computer readable program code means for placing said one of said plurality of data packets into said queue; and computer readable program code means for dequeuing said one of said plurality of data packets from said queue structure based at least in part upon the rank of said queue in said queue structure.
28. The computer program product of claim 27, further comprising computer readable program code means for identifying one or more queues prepared to immediately transmit at least one data packet prior to dequeuing said one of said plurality of data packets.
29. The computer program product of claim 28, wherein the computer readable program code means for dequeuing each data packet comprises computer readable program code means for dequeuing data packets from said one or more queues that are prepared to immediately transmit at least one data packet based at least in part upon the rank of said one or more queues in said queue structure.
30. The computer program product of claim 27, further comprising computer readable program code means for maintaining a deficit aπay, wherein the deficit aπay contains a respective deficit amount representing the quantity of data, within one or more data packets, that may be immediately dequeued from each queue within the queue structure.
31. The computer program product of claim 30, further comprising computer readable program code means for updating a deficit bitmap, wherein said deficit bitmap maintains a plurality of bits, wherein each bit represents whether the deficit amount exceeds the quantity of data within an initial data packet that may be immediately dequeued from a coπesponding queue within the queue structure.
32. The computer program product of claim 27, further comprising computer readable program code means for maintaining a quota aπay, wherein a respective quota amount of the quota aπay represents an additional quantity of data, within one or more data packets, that may be consecutively dequeued from a respective queue within the queue structure.
33. The computer program product of claim 32, further comprising computer readable program code means for maintaining a queue bitmap wherein said queue bitmap maintains a plurality of bits, wherein each bit represents whether a coπesponding queue within the queue structure has a packet of data.
34. The computer program product of claim 27, wherein the computer readable program code means for identifying an attribute associated with one of said plurality of data packets comprises computer readable program code means for identifying the attribute within a header of said one of said plurality of data packets.
35. The computer program product of claim 34, wherein the computer readable program code means for identifying an attribute associated with one of said plurality of data packets comprises computer readable program code means for identifying, within the header, that said one of said plurality of data packets is a Voice Over Internet Protocol, Hyper Text Transfer Protocol, File Transfer Protocol, or Citrix data type.
36. The computer program product of claim 27, wherein the computer readable program code means for identifying an attribute associated with one of said plurality of data packets comprises computer readable program code means for establishing a byte limit for each queue in said queue structure prior to the step of placing said one of said plurality of data packets into said queue.
37. The computer program product of claim 36, wherein the computer readable program code means for placing said one of said plurality of data packets into said queue comprises computer readable program code means for determining whether said one of plurality of data packets includes a number of bytes that exceeds the byte limit for said queue.
38. The computer program product of claim 27, further comprising computer readable program code means for maintaining a deficit for each queue, wherein said deficit represents the quantity of data, within one or more data packets, that may be immediately dequeued from each respective queue within the queue structure.
39. The computer program product of claim 38, further comprising computer readable program code means for maintaining a quota for each queue, wherein said quota represents an additional quantity of data, within one or more data packets, that may be consecutively dequeued from a respective queue within the queue structure.
40. The computer program product of claim 39, wherein said computer readable program code means for dequeuing comprises computer readable program code means for dequeuing subsequent data packets from said queue structure based upon the rank of each other queue in said queue structure.
41. The computer program product of claim 40, wherein said computer readable program code means for dequeuing further comprises computer readable program code means for updating the deficit of each empty queue to the quota.
42. The computer program product of claim 40, wherein said computer readable program code means for dequeuing further comprises computer readable program code means for adding the quota to the deficit of each non-empty queue.
43. The computer program product of claim 40, wherein said computer readable program code means for dequeuing subsequent data packets from said queue structure based upon the rank of each other queue in said queue structure comprises computer readable program code means for repeatedly dequeuing subsequent data packets from said queue structure until said initial data packets in each respective queue are larger than the deficit for respective queues.
44. The computer program product of claim 27, further comprising computer readable program code means for identifying whether said attribute indicates whether said one of said plurality of data packets represents data that is latency critical or latency non-critical.
45. The computer program product of claim 44, further comprising: computer readable program code means for establishing a latency critical second stage queue structure; and computer readable program code means for receiving at said latency critical second stage queue structure said one of said plurality of data packets where said attribute indicates that said one of said plurality of data packets represents data that is latency critical.
46. The computer program product of claim 45, further comprising: computer readable program code means for establishing a latency non- critical second stage queue structure; and computer readable program code means for receiving at said latency non- critical second stage queue structure said one of said plurality of data packets where said attribute indicates that said one of said plurality of data packets represents data that is latency non-critical.
47. The computer program product of claim 46, wherein said computer readable program code means for establishing a latency non-critical second stage queue structure comprises computer readable program code means for establishing a latency non-critical second stage queue structure comprising a plurality of latency non-critical queues.
48. The computer program product of claim 47, further comprising computer readable program code means for maintaining a non-critical queue structure deficit for each latency non-critical queue, wherein said deficit represents the quantity of data, within one or more data packets, that may be immediately dequeued from each respective queue within the non-critical second stage queue structure
49. The computer program product of claim 48, further comprising computer readable program code means for maintaining a critical queue structure quota for each latency critical queue within said critical queue structure quota, wherein said quota represents an additional quantity of data, within one or more data packets, that may be consecutively dequeued from a respective queue within the critical second stage queue structure.
50. The computer program product of claim 49, further comprising computer readable program code means for boπowing at least a portion of said non-critical queue structure deficit and adding said portion to said critical queue structure quota.
51. The computer program product of claim 46, wherein the computer readable program code means for receiving comprises computer readable program code means for receiving at said latency non-critical second stage queue structure said one of said plurality of data packets subsequent to said one of said plurality of data packets being dequeued from said queue structure.
52. The computer program product of claim 27, further comprising computer readable program code means for mapping each one of said plurality of queues within said queue structure to an associated element within an active priority bucket, wherein said associated element points to an active list or inactive list associated with said active priority bucket, wherein said active list identifies the queues prepared to immediately dequeue a data packet, and wherein said inactive list identifies the queues that contain data packets but are not prepared to immediately dequeue the data packets.
53. A system for limiting latency for latency-critical network traffic, comprising: a queue structure comprising a plurality of ranked queues, wherein said queue structure receives a plurality of data packets from a source; an enqueue agent, wherein said enqueue agent identifies an attribute associated with one of said plurality of data packets, and wherein said enqueue agent determines a queue of said plurality of queues to receive said one of said plurality of data packets, wherein said queue is identified based upon said attribute, and wherein said queue is ranked in said queue structure based at least in part upon said attribute; and a dequeue agent, wherein said dequeuing agent dequeues said one of said plurality of data packets from said queue structure based at least in part upon the rank of said queue in said queue structure.
54. The system of claim 53, wherein the dequeue agent is operable to dequeue data packets from said one or more queues that are prepared to immediately transmit at least one data packet based at least in part upon the rank of said one or more queues in said queue structure.
55. The system of claim 53, further comprising a deficit aπay, wherein the deficit array contains a respective deficit amount representing the quantity of data, within one or more data packets, that may be immediately dequeued from each queue within the queue structure.
56. The system of claim 55, further comprising a deficit bitmap, wherein said deficit bitmap is operable to maintain a plurality of bits, wherein each bit represents whether the deficit amount exceeds the quantity of data within an initial data packet that may be immediately dequeued from a coπesponding queue within the queue structure.
57. The system of claim 53, further comprising a quota array, wherein a respective quota amount of the quota aπay represents an additional quantity of data, within one or more data packets, that may be consecutively dequeued from a respective queue within the queue structure.
58. The system of claim 57, further comprising a queue bitmap wherein said queue bitmap is operable to maintain a plurality of bits, wherein each bit represents whether a coπesponding queue within the queue structure has a packet of data.
59. The system of claim 53, wherein said enqueue agent is operable to identify an attribute within a header of said one of said plurality of data packets.
60. The system of claim 59, wherein said attribute associated with one of said plurality of data packets comprises an attribute that identifies that said one of said plurality of data packets is a Voice Over Internet Protocol, Hyper Text Transfer Protocol, File Transfer Protocol, or Citrix data type.
61. The system of claim 60, further comprising a byte limit associated with each queue in said queue structure, and wherein said enqueue agent comprises an enqueue agent operable to determine whether said one of plurality of data packets includes a number of bytes that exceeds the byte limit for said queue.
62. The system of claim 53, further comprising a deficit for each queue, wherein said deficit represents the quantity of data, within one or more data packets, that may be immediately dequeued from each respective queue within the queue structure.
63. The system of claim 62, wherein each queue has an associated quota representing an additional quantity of data, within one or more data packets, that may be consecutively dequeued from a respective queue within the queue structure.
64. The system of claim 63, wherein said dequeue agent is operable to dequeue subsequent data packets from said queue structure based upon the rank of each other queue in said queue structure.
65. The system of claim 64, wherein dequeue agent is operable to update the deficit of each empty queue to the quota.
66. The system of claim 53, further comprising an active priority bucket, wherein said active priority bucket maps each one of said plurality of queues within said queue structure to an associated element within said active priority bucket, wherein said associated element points to an active list or inactive list associated with said active priority bucket, wherein said active list identifies the queues prepared to immediately dequeue a data packet, and wherein said inactive list identifies the queues that contain data packets but are not prepared to immediately dequeue the data packets.
PCT/US2002/003031 2001-01-30 2002-01-30 Methods and systems providing fair queuing and priority scheduling to enhance quality of service in a network WO2002062013A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002242067A AU2002242067A1 (en) 2001-01-30 2002-01-30 Methods and systems providing fair queuing and priority scheduling to enhance quality of service in a network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US26541501P 2001-01-30 2001-01-30
US60/265,415 2001-01-30

Publications (2)

Publication Number Publication Date
WO2002062013A2 true WO2002062013A2 (en) 2002-08-08
WO2002062013A3 WO2002062013A3 (en) 2003-11-06

Family

ID=23010354

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/003031 WO2002062013A2 (en) 2001-01-30 2002-01-30 Methods and systems providing fair queuing and priority scheduling to enhance quality of service in a network

Country Status (3)

Country Link
US (1) US6810426B2 (en)
AU (1) AU2002242067A1 (en)
WO (1) WO2002062013A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004032433A2 (en) 2002-10-02 2004-04-15 Marconi Intellectual Property (Ringfence) Inc. Frame relay frame shaping per dlci
FR2854296A1 (en) * 2003-04-24 2004-10-29 France Telecom Flow packet processing device for use in network link, has scheduling module to schedule packet in queue based on analyzing incoming bit rate of flow relative to fair bit rate and fair queuing with priority algorithm
WO2010043031A1 (en) * 2008-10-14 2010-04-22 Nortel Networks Limited Method and system for weighted fair queuing
EP2464058A1 (en) * 2009-08-07 2012-06-13 ZTE Corporation Queue scheduling method and apparatus
US10721176B2 (en) 2011-08-24 2020-07-21 Guest Tek Interactive Entertainment Ltd. Allocating bandwidth between bandwidth zones according to user load

Families Citing this family (148)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8266266B2 (en) 1998-12-08 2012-09-11 Nomadix, Inc. Systems and methods for providing dynamic network authorization, authentication and accounting
US8713641B1 (en) 1998-12-08 2014-04-29 Nomadix, Inc. Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device
US7194554B1 (en) 1998-12-08 2007-03-20 Nomadix, Inc. Systems and methods for providing dynamic network authorization authentication and accounting
US6738382B1 (en) 1999-02-24 2004-05-18 Stsn General Holdings, Inc. Methods and apparatus for providing high speed connectivity to a hotel environment
US7154858B1 (en) 1999-06-30 2006-12-26 Cisco Technology, Inc. System and method for measuring latency of a selected path of a computer network
EP1232610B1 (en) 1999-10-22 2009-01-07 Nomadix, Inc. Systems and methods for dynamic bandwidth management on a per subscriber basis in a communications network
US8190708B1 (en) 1999-10-22 2012-05-29 Nomadix, Inc. Gateway device having an XML interface and associated method
GB0008195D0 (en) * 2000-04-05 2000-05-24 Power X Limited Data switching arbitration arrangements
US7443873B1 (en) * 2001-08-21 2008-10-28 Juniper Networks, Inc. Virtual upstream channel provisioning and utilization in broadband communication systems
US7164686B2 (en) * 2001-10-16 2007-01-16 Institute For Information Industry Stepwise quality-of-service scheduling method in output-buffered switches for broadband networks
US7187684B2 (en) * 2001-11-01 2007-03-06 International Business Machines Corporation Weighted fair queue having extended effective range
US7280474B2 (en) * 2001-11-01 2007-10-09 International Business Machines Corporation Weighted fair queue having adjustable scaling factor
US7310345B2 (en) * 2001-11-01 2007-12-18 International Business Machines Corporation Empty indicators for weighted fair queues
US7103051B2 (en) * 2001-11-01 2006-09-05 International Business Machines Corporation QoS scheduler and method for implementing quality of service with aging time stamps
US7317683B2 (en) * 2001-11-01 2008-01-08 International Business Machines Corporation Weighted fair queue serving plural output ports
US7046676B2 (en) * 2001-11-01 2006-05-16 International Business Machines Corporation QoS scheduler and method for implementing quality of service with cached status array
US6981052B1 (en) * 2001-12-07 2005-12-27 Cisco Technology, Inc. Dynamic behavioral queue classification and weighting
US7107413B2 (en) * 2001-12-17 2006-09-12 Intel Corporation Write queue descriptor count instruction for high speed queuing
US7269179B2 (en) * 2001-12-18 2007-09-11 Intel Corporation Control mechanisms for enqueue and dequeue operations in a pipelined network processor
US7895239B2 (en) 2002-01-04 2011-02-22 Intel Corporation Queue arrays in network devices
US7181573B2 (en) * 2002-01-07 2007-02-20 Intel Corporation Queue array caching in network devices
US7420987B1 (en) 2002-01-17 2008-09-02 Juniper Networks, Inc. Arbiter for multiple mutually exclusive vectors
US7382793B1 (en) 2002-01-17 2008-06-03 Juniper Networks, Inc. Systems and methods for determining the bandwidth used by a queue
US7558197B1 (en) * 2002-01-17 2009-07-07 Juniper Networks, Inc. Dequeuing and congestion control systems and methods
US7684422B1 (en) * 2002-01-17 2010-03-23 Juniper Networks, Inc. Systems and methods for congestion control using random early drop at head of buffer
US7414985B1 (en) * 2002-02-01 2008-08-19 Ciena Corporation Link aggregation
US7149226B2 (en) * 2002-02-01 2006-12-12 Intel Corporation Processing data packets
US7319695B1 (en) * 2002-03-06 2008-01-15 Agere Systems Inc. Deficit-based striping algorithm
US7586909B1 (en) 2002-03-06 2009-09-08 Agere Systems Inc. Striping algorithm for switching fabric
US7257124B2 (en) * 2002-03-20 2007-08-14 International Business Machines Corporation Method and apparatus for improving the fairness of new attaches to a weighted fair queue in a quality of service (QoS) scheduler
US7680043B2 (en) 2002-03-20 2010-03-16 International Business Machines Corporation Network processor having fast flow queue disable process
US7523218B1 (en) * 2002-04-30 2009-04-21 University Of Florida Research Foundation, Inc. O(log n) dynamic router tables for prefixes and ranges
US7342936B2 (en) * 2002-06-17 2008-03-11 Integrated Device Technology, Inc. Method of performing deficit round-robin scheduling and structure for implementing same
US7272144B2 (en) * 2002-06-26 2007-09-18 Arris International, Inc. Method and apparatus for queuing data flows
AU2003279950A1 (en) 2002-10-10 2004-05-04 Rocksteady Networks, Inc. System and method for providing access control
WO2004036371A2 (en) 2002-10-16 2004-04-29 Rocksteady Networks, Inc. System and method for dynamic bandwidth provisioning
US7330477B2 (en) * 2002-12-24 2008-02-12 Sun Microsystems, Inc. Method and apparatus for starvation-free scheduling of communications
US7336665B1 (en) * 2003-02-12 2008-02-26 Cisco Technology, Inc. Polling scheme for controlling traffic through a networking system
US20040246956A1 (en) * 2003-06-06 2004-12-09 Meng David Qiang Parallel packet receiving, routing and forwarding
KR100542346B1 (en) * 2003-07-30 2006-01-11 삼성전자주식회사 method and apparatus for packet processing in WLAN access point
US7624438B2 (en) 2003-08-20 2009-11-24 Eric White System and method for providing a secure connection between networked computers
US7580355B2 (en) 2003-08-25 2009-08-25 Integrated Device Technology, Inc. Method of performing weighted round-robin queue scheduling using a dynamic link list and structure for implementing same
US9065741B1 (en) * 2003-09-25 2015-06-23 Cisco Technology, Inc. Methods and apparatuses for identifying and alleviating internal bottlenecks prior to processing packets in internal feature modules
US7590058B1 (en) 2003-12-09 2009-09-15 At&T Intellectual Property Ii, L.P. Method and apparatus for controlling the quality of service of voice and data services over variable bandwidth access networks
US7545745B1 (en) 2004-01-16 2009-06-09 At&T Intellectual Property Ii, L.P. Method and apparatus for controlling the quality of service of voice and data services over variable bandwidth access networks
US8543710B2 (en) 2004-03-10 2013-09-24 Rpx Corporation Method and system for controlling network access
US7610621B2 (en) 2004-03-10 2009-10-27 Eric White System and method for behavior-based firewall modeling
US7590728B2 (en) 2004-03-10 2009-09-15 Eric White System and method for detection of aberrant network behavior by clients of a network access gateway
US7665130B2 (en) 2004-03-10 2010-02-16 Eric White System and method for double-capture/double-redirect to a different location
US7626988B2 (en) * 2004-06-09 2009-12-01 Futurewei Technologies, Inc. Latency-based scheduling and dropping
US20050281277A1 (en) * 2004-06-22 2005-12-22 Killian Thomas J Establishing traffic priorities in a voice over IP network
AR043375A1 (en) * 2004-08-27 2005-07-27 Daniel Esteban Sarmiento APPARATUS AND METHOD FOR SIMULTANEOUS AND INTEGRATED COMMUNICATION OF VOICE AND DATA
FI118072B (en) 2004-09-24 2007-06-15 Tellabs Oy A method and apparatus for scheduling transmission link capacity between packet switched communication networks maintaining retention characteristics
FR2878106A1 (en) * 2004-11-15 2006-05-19 France Telecom METHOD AND DEVICE FOR ORDERING PACKETS FOR THEIR ROUTING IN A NETWORK WITH IMPLICIT DETERMINATION OF PACKETS TO BE PROCESSED IN PRIORITY
US7599381B2 (en) * 2004-12-23 2009-10-06 Cisco Technology, Inc. Scheduling eligible entries using an approximated finish delay identified for an entry based on an associated speed group
US7657883B2 (en) 2005-02-04 2010-02-02 Mips Technologies, Inc. Instruction dispatch scheduler employing round-robin apparatus supporting multiple thread priorities for use in multithreading microprocessor
US7664936B2 (en) * 2005-02-04 2010-02-16 Mips Technologies, Inc. Prioritizing thread selection partly based on stall likelihood providing status information of instruction operand register usage at pipeline stages
US7490230B2 (en) * 2005-02-04 2009-02-10 Mips Technologies, Inc. Fetch director employing barrel-incrementer-based round-robin apparatus for use in multithreading microprocessor
US7631130B2 (en) * 2005-02-04 2009-12-08 Mips Technologies, Inc Barrel-incrementer-based round-robin apparatus and instruction dispatch scheduler employing same for use in multithreading microprocessor
US7752627B2 (en) * 2005-02-04 2010-07-06 Mips Technologies, Inc. Leaky-bucket thread scheduler in a multithreading microprocessor
US7853777B2 (en) * 2005-02-04 2010-12-14 Mips Technologies, Inc. Instruction/skid buffers in a multithreading microprocessor that store dispatched instructions to avoid re-fetching flushed instructions
US7657891B2 (en) * 2005-02-04 2010-02-02 Mips Technologies, Inc. Multithreading microprocessor with optimized thread scheduler for increasing pipeline utilization efficiency
US7613904B2 (en) * 2005-02-04 2009-11-03 Mips Technologies, Inc. Interfacing external thread prioritizing policy enforcing logic with customer modifiable register to processor internal scheduler
US7506140B2 (en) 2005-02-04 2009-03-17 Mips Technologies, Inc. Return data selector employing barrel-incrementer-based round-robin apparatus
US7681014B2 (en) * 2005-02-04 2010-03-16 Mips Technologies, Inc. Multithreading instruction scheduler employing thread group priorities
TWI291622B (en) * 2005-08-11 2007-12-21 Ic Plus Corp Controller and method for per-flow rate
US8634422B2 (en) * 2005-08-17 2014-01-21 Qualcomm Incorporated Prioritization techniques for quality of service packet transmission over a network lacking quality of service support at the media access control layer
US20070070894A1 (en) * 2005-09-26 2007-03-29 Fan Wang Method to determine a scheduling priority value for a user data connection based on a quality of service requirement
US20070070895A1 (en) * 2005-09-26 2007-03-29 Paolo Narvaez Scaleable channel scheduler system and method
US8730982B2 (en) * 2005-11-10 2014-05-20 Broadcom Corporation Scheduling of data transmission with minimum and maximum shaping of flows in a network device
US20070116007A1 (en) * 2005-11-18 2007-05-24 Weimin Xiao Method and system for scheduling and resource allocation in a data communication network
DE602005021659D1 (en) 2005-11-30 2010-07-15 Alcatel Lucent Weighted and fair system for bandwidth allocation
US20070183320A1 (en) * 2006-02-08 2007-08-09 Chen Jian F Deficit fair priority queuing
US7809009B2 (en) * 2006-02-21 2010-10-05 Cisco Technology, Inc. Pipelined packet switching and queuing architecture
GB0606367D0 (en) * 2006-03-30 2006-05-10 Vodafone Plc Telecommunications networks
DE602006001512D1 (en) * 2006-04-20 2008-07-31 Alcatel Lucent Method and apparatus for efficient weighted and fair data monitoring
EP1885087A1 (en) * 2006-08-02 2008-02-06 ISS Manufacturing Limited Method, device and software for controlling the data traffic between a first computer network and a second computer network
US7990989B2 (en) 2006-09-16 2011-08-02 Mips Technologies, Inc. Transaction selector employing transaction queue group priorities in multi-port switch
US7760748B2 (en) * 2006-09-16 2010-07-20 Mips Technologies, Inc. Transaction selector employing barrel-incrementer-based round-robin apparatus supporting dynamic priorities in multi-port switch
US7961745B2 (en) 2006-09-16 2011-06-14 Mips Technologies, Inc. Bifurcated transaction selector supporting dynamic priorities in multi-port switch
US7773621B2 (en) 2006-09-16 2010-08-10 Mips Technologies, Inc. Transaction selector employing round-robin apparatus supporting dynamic priorities in multi-port switch
US8467401B1 (en) * 2006-10-04 2013-06-18 Altera Corporation Scheduling variable length packets
US8125967B1 (en) 2006-11-10 2012-02-28 Sprint Spectrum L.P. Prioritized EV-DO paging based on type of packet flow
US20080130675A1 (en) * 2006-12-01 2008-06-05 General Instrument Corporation Method and System for Data Traffic Integration Using Dynamic Data Packet Fragmentation
US8379518B2 (en) * 2007-01-23 2013-02-19 Agere Systems Llc Multi-stage scheduler with processor resource and bandwidth resource allocation
US7889743B2 (en) * 2007-04-19 2011-02-15 Lockheed Martin Corporation Information dissemination method and system having minimal network bandwidth utilization
US20090122707A1 (en) * 2007-11-13 2009-05-14 At&T Services, Inc. Multi-layer cascading network bandwidth control
US8134924B2 (en) * 2007-11-27 2012-03-13 Qualcomm Incorporated Methods and apparatus related to scheduling in a wireless communications system using shared air link resources for traffic
EP2257888A4 (en) * 2008-02-20 2013-04-10 Novatel Wireless Inc System and method for traffic prioritization
US9037657B2 (en) 2008-05-23 2015-05-19 The Trustees Of Columbia University In The City Of New York Systems and methods for peer-to-peer bandwidth allocation
US8213449B1 (en) 2008-08-29 2012-07-03 Sprint Spectrum L.P. Aging EV-DO pages in a queue based on latency-sensitivity
US7936754B2 (en) * 2008-12-12 2011-05-03 At&T Intellectual Property I, L.P. Methods and apparatus to dynamically store network routes for a communication network
US8676976B2 (en) * 2009-02-25 2014-03-18 International Business Machines Corporation Microprocessor with software control over allocation of shared resources among multiple virtual servers
US8194593B2 (en) * 2009-03-11 2012-06-05 Sony Corporation Quality of service architecture for home mesh network
US20100232400A1 (en) * 2009-03-11 2010-09-16 Sony Corporation Virtualizing single radio for multiple wireless interfaces in home mesh network
US8861445B2 (en) * 2009-03-11 2014-10-14 Sony Cororation Multi-channel single radio communication in home mesh network
US8761174B2 (en) * 2009-03-11 2014-06-24 Sony Corporation Quality of service traffic recognition and packet classification home mesh network
US8223786B2 (en) * 2009-03-11 2012-07-17 Sony Corporation Quality of service scheduling for home mesh network
US8780762B2 (en) * 2009-03-11 2014-07-15 Sony Corporation Node query in ad hoc home mesh network
US20100232309A1 (en) * 2009-03-13 2010-09-16 Qualcomm Incorporated Methods and systems for dynamic call blocking in wimax idle mode
US9496620B2 (en) 2013-02-04 2016-11-15 Ubiquiti Networks, Inc. Radio system for long-range high-speed wireless communication
US9634373B2 (en) 2009-06-04 2017-04-25 Ubiquiti Networks, Inc. Antenna isolation shrouds and reflectors
US8836601B2 (en) 2013-02-04 2014-09-16 Ubiquiti Networks, Inc. Dual receiver/transmitter radio devices with choke
US20110030037A1 (en) 2009-07-07 2011-02-03 Vadim Olshansky Zone migration in network access
US8335160B2 (en) * 2010-03-30 2012-12-18 Telefonaktiebolaget L M Ericsson (Publ) Flow sampling with top talkers
MY150188A (en) * 2010-12-30 2013-12-13 Mimos Bhd A system and a method for providing quality of service
ES2584077T3 (en) 2011-01-18 2016-09-23 Nomadix, Inc. Systems and methods for grouping bandwidth management in a network of communication systems
KR101893982B1 (en) * 2012-04-09 2018-10-05 삼성전자 주식회사 Distributed processing system, scheduler node and scheduling method of distributed processing system, and apparatus for generating program thereof
US20130283097A1 (en) * 2012-04-23 2013-10-24 Yahoo! Inc. Dynamic network task distribution
US8861538B2 (en) * 2012-09-06 2014-10-14 Unisys Corporation Throttling for fast data packet transfer operations
US9189281B2 (en) * 2012-10-18 2015-11-17 Oracle International Corporation Apparatus, system and method for providing fairness in task servicing
US20160218406A1 (en) 2013-02-04 2016-07-28 John R. Sanford Coaxial rf dual-polarized waveguide filter and method
US9543635B2 (en) 2013-02-04 2017-01-10 Ubiquiti Networks, Inc. Operation of radio devices for long-range high-speed wireless communication
US9397820B2 (en) 2013-02-04 2016-07-19 Ubiquiti Networks, Inc. Agile duplexing wireless radio devices
US8855730B2 (en) 2013-02-08 2014-10-07 Ubiquiti Networks, Inc. Transmission and reception of high-speed wireless communication using a stacked array antenna
US9542230B2 (en) * 2013-05-15 2017-01-10 Apple Inc. System and method for selective timer coalescing
US9904575B2 (en) * 2013-05-15 2018-02-27 Apple Inc. System and method for selective timer rate limiting
CN103559379A (en) * 2013-09-24 2014-02-05 许继集团有限公司 Data source validity judging method and double-data-source selecting method
ES2767051T3 (en) 2013-10-11 2020-06-16 Ubiquiti Inc Wireless Radio System Optimization Through Persistent Spectrum Analysis
US10375126B2 (en) 2013-11-22 2019-08-06 At&T Mobility Ii Llc Methods, devices and computer readable storage devices for intercepting VoIP traffic for analysis
US9742869B2 (en) * 2013-12-09 2017-08-22 Nvidia Corporation Approach to adaptive allocation of shared resources in computer systems
US10574474B2 (en) 2014-03-07 2020-02-25 Ubiquiti Inc. Integrated power receptacle wireless access point (AP) adapter devices
US20150256355A1 (en) 2014-03-07 2015-09-10 Robert J. Pera Wall-mounted interactive sensing and audio-visual node devices for networked living and work spaces
PL3114884T3 (en) 2014-03-07 2020-05-18 Ubiquiti Inc. Cloud device identification and authentication
US9912053B2 (en) 2014-03-17 2018-03-06 Ubiquiti Networks, Inc. Array antennas having a plurality of directional beams
EP3127187B1 (en) 2014-04-01 2020-11-11 Ubiquiti Inc. Antenna assembly
US10425536B2 (en) 2014-05-08 2019-09-24 Ubiquiti Networks, Inc. Phone systems and methods of communication
US9563366B2 (en) 2014-05-13 2017-02-07 International Business Machines Corporation Using queues corresponding to attribute values associated with units of work and sub-units of the unit of work to select the units of work and their sub-units to process
US9575800B2 (en) 2014-05-13 2017-02-21 International Business Machines Corporation Using queues corresponding to attribute values and priorities associated with units of work and sub-units of the unit of work to select the units of work and their sub-units to process
US9921879B2 (en) 2014-05-13 2018-03-20 International Business Machines Corporation Using queues corresponding to attribute values associated with units of work to select the units of work to process
KR101746191B1 (en) * 2014-06-27 2017-06-12 주식회사 케이티 Network apparatus and terminal for multi-path transmission, operating method of the same, and program of the same method
CN105993183B (en) 2014-06-30 2019-08-13 优倍快网络公司 Method and kit for for using functional diagram to assist in the configuration of radio net
CN106233797B (en) 2014-06-30 2019-12-13 优倍快网络公司 radio equipment alignment tool and method
ES2873999T3 (en) 2014-08-31 2021-11-04 Ubiquiti Inc Methods and devices for monitoring and improving the status of a wireless network
US10164332B2 (en) 2014-10-14 2018-12-25 Ubiquiti Networks, Inc. Multi-sector antennas
WO2016137938A1 (en) 2015-02-23 2016-09-01 Ubiquiti Networks, Inc. Radio apparatuses for long-range communication of radio-frequency information
US9958933B2 (en) 2015-06-04 2018-05-01 Apple Inc. Opportunistic waking of an application processor
WO2017044924A1 (en) 2015-09-11 2017-03-16 Ubiquiti Networks, Inc. Compact public address access point apparatuses
PL3353989T3 (en) 2015-09-25 2021-08-30 Ubiquiti Inc. Compact and integrated key controller apparatus for monitoring networks
CN107040294B (en) 2015-10-09 2020-10-16 优倍快公司 Synchronized multiradio antenna system and method
US10764027B2 (en) 2016-07-07 2020-09-01 Cisco Technology, Inc. Deterministic calibrated synchronized network interlink access
US10924641B2 (en) 2017-07-10 2021-02-16 Ubiquiti Inc. Wearable video camera medallion with circular display
CN111466108B (en) 2017-09-27 2022-12-06 优倍快公司 System for automatic secure remote access to a local network
WO2019139993A1 (en) 2018-01-09 2019-07-18 Ubiquiti Networks, Inc. Quick connecting twisted pair cables
US11016829B2 (en) * 2019-07-26 2021-05-25 Toshiba Memory Corporation Two-layered deterministic interprocess communication scheduler for input output determinism in solid state drives
JP2022547955A (en) 2019-09-13 2022-11-16 ユービキティ インコーポレイテッド Augmented reality for internet connection settings
US10841121B1 (en) 2019-09-30 2020-11-17 Hilton International Holding Llc Hospitality system and method of using the same
US11374872B1 (en) 2020-12-08 2022-06-28 Pensando Systems, Inc. Methods and systems for adaptive network quality of service for latency critical applications

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6058389A (en) * 1997-10-31 2000-05-02 Oracle Corporation Apparatus and method for message queuing in a database system
US6094663A (en) * 1998-03-31 2000-07-25 Apple Computer, Inc. Method and apparatus for implementing atomic queues
US6453356B1 (en) * 1998-04-15 2002-09-17 Adc Telecommunications, Inc. Data exchange system and method
US6724767B1 (en) * 1998-06-27 2004-04-20 Intel Corporation Two-dimensional queuing/de-queuing methods and systems for implementing the same
US6563793B1 (en) 1998-11-25 2003-05-13 Enron Warpspeed Services, Inc. Method and apparatus for providing guaranteed quality/class of service within and across networks using existing reservation protocols and frame formats
CA2255418C (en) 1998-12-07 2003-01-21 Pmc-Sierra Ltd. Ring interface and ring network bus flow control system
US6625121B1 (en) * 1999-04-28 2003-09-23 Cisco Technology, Inc. Dynamically delisting and relisting multicast destinations in a network switching node
US6405258B1 (en) * 1999-05-05 2002-06-11 Advanced Micro Devices Inc. Method and apparatus for controlling the flow of data frames through a network switch on a port-by-port basis
US6510531B1 (en) * 1999-09-23 2003-01-21 Lucent Technologies Inc. Methods and systems for testing parallel queues
GB2355374B (en) 1999-10-15 2001-10-31 3Com Corp Network device including selective discard of packets
DE60110760T2 (en) 2000-03-10 2006-02-02 Tellabs Operations, Inc., Lisle ELITE DISPOSAL CONTROL FOR NON-CONSISTENT FOLLOWING DATA
US6615215B1 (en) * 2000-03-17 2003-09-02 Commercequest Inc. Method for graduated load sensitive task dispatching in computing system
US6728792B2 (en) * 2001-01-04 2004-04-27 International Business Machines Corporation Priority queue with arbitrary queuing criteria

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BRADEN ET AL.: "RFC2309: Recommendations on queue management and congestion avoidance in the Internet" [Online] April 1998 (1998-04) , IETF , INET XP002210176 Retrieved from the Internet: <URL: http://www.faqs.org/rfcs/rfc2309.html> [retrieved on 2002-08-16] page 2, line 23 - line 30 page 3, line 25 - line 30 *
CISCO: "Interface queue management (white paper)" [Online] 3 August 1995 (1995-08-03) , CISCO , INET XP002210177 Retrieved from the Internet: <URL: http://www.cisco.com/warp/public/614/16.ht ml> [retrieved on 2002-08-16] page 6, line 4 - line 5 *
SHREEDHAR M ET AL: "EFFICIENT FAIR QUEUING USING DEFICIT ROUND ROBIN" PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMMUNITY NETWORKING, XX, XX, 1 August 1995 (1995-08-01), pages 231-242, XP000541659 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004032433A2 (en) 2002-10-02 2004-04-15 Marconi Intellectual Property (Ringfence) Inc. Frame relay frame shaping per dlci
WO2004032433A3 (en) * 2002-10-02 2004-11-11 Marconi Intellectual Pty Frame relay frame shaping per dlci
US7260063B2 (en) 2002-10-02 2007-08-21 Ericsson Ab Frame relay frame shaping per DLCI
FR2854296A1 (en) * 2003-04-24 2004-10-29 France Telecom Flow packet processing device for use in network link, has scheduling module to schedule packet in queue based on analyzing incoming bit rate of flow relative to fair bit rate and fair queuing with priority algorithm
EP1478140A1 (en) * 2003-04-24 2004-11-17 France Telecom Method and Apparatus for scheduling packets on a network link using priorities based on the incoming packet rates of the flow
US7646715B2 (en) 2003-04-24 2010-01-12 France Telecom Method and a device for implicit differentiation of quality of service in a network
US8711871B2 (en) 2008-10-14 2014-04-29 Rockstar Consortium US LLP Method and system for weighted fair queuing
US7995597B2 (en) 2008-10-14 2011-08-09 Nortel Networks Limited Method and system for weighted fair queuing
RU2495533C2 (en) * 2008-10-14 2013-10-10 РОКСТАР КОНСОРЦИУМ ЮЭс ЛП Method and system for scheduling data selection for transmission over data network
WO2010043031A1 (en) * 2008-10-14 2010-04-22 Nortel Networks Limited Method and system for weighted fair queuing
US9042224B2 (en) 2008-10-14 2015-05-26 Rpx Clearinghouse Llc Method and system for weighted fair queuing
EP2464058A1 (en) * 2009-08-07 2012-06-13 ZTE Corporation Queue scheduling method and apparatus
EP2464058A4 (en) * 2009-08-07 2013-01-23 Zte Corp Queue scheduling method and apparatus
US8588243B2 (en) 2009-08-07 2013-11-19 Zte Corporation Queue scheduling method and apparatus
US9288154B2 (en) 2009-08-07 2016-03-15 Zte Corporation Queue scheduling method and apparatus
US10721176B2 (en) 2011-08-24 2020-07-21 Guest Tek Interactive Entertainment Ltd. Allocating bandwidth between bandwidth zones according to user load

Also Published As

Publication number Publication date
US20020178282A1 (en) 2002-11-28
US6810426B2 (en) 2004-10-26
AU2002242067A1 (en) 2002-08-12
WO2002062013A3 (en) 2003-11-06

Similar Documents

Publication Publication Date Title
US6810426B2 (en) Methods and systems providing fair queuing and priority scheduling to enhance quality of service in a network
US7061865B2 (en) Data packet scheduler
CA2575869C (en) Hierarchal scheduler with multiple scheduling lanes
US20070070895A1 (en) Scaleable channel scheduler system and method
US7212535B2 (en) Scheduling items using mini-quantum values
US6795870B1 (en) Method and system for network processor scheduler
US20020122387A1 (en) Algorithm for time based queuing in network traffic engineering
US20030016686A1 (en) Traffic manager for network switch port
US20060291495A1 (en) Hardware self-sorting scheduling queue
JPH1084383A (en) Packet scheduling equipment and packet transfer method
US7580355B2 (en) Method of performing weighted round-robin queue scheduling using a dynamic link list and structure for implementing same
EP1654616A2 (en) Method and apparatus for bandwidth guarantee and overload protection in a network switch
JP4447521B2 (en) Packet scheduler and packet scheduling method
US7342936B2 (en) Method of performing deficit round-robin scheduling and structure for implementing same
EP1557976A1 (en) Method and apparatus for multicasting of cell or frame data
US6944171B2 (en) Scheduler method and device in a switch
Astuti Packet handling
US7599381B2 (en) Scheduling eligible entries using an approximated finish delay identified for an entry based on an associated speed group
JPH11298523A (en) Packet scheduling method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP