The present invention relates generally to a system for allowing devices connected to a network (e.g., an IP or Ethernet network) to collaborate with other such devices so as to transmit and receive data packets without impairment on the network
As is generally known, Ethernet and Internet Protocol (IP) are systems for transmitting packets between different points on a communications network. These switching systems are known as “contention-based” systems. That is, all transmitters contend for network resources. All transmitters may transmit simultaneously. If they do, then network resources may be oversubscribed. When this happens, data may be delayed or lost, resulting in network impairment.
As illustrated in
IP systems suffer from impairments such as packet loss and jitter. This happens because there is no control over how many such packets reach a router at any given instant. If two packets arrive at a router at the same time, destined for the same port, one will have to be delayed. Both cannot be transmitted simultaneously. One of the packets will be saved in the queue until the first packet is completely transmitted.
Various methods have been developed to overcome data loss on Ethernet and IP networks. The primary approach has been to use additional protocols to replace lost data. This is an after-the-fact solution. An example is the well-known Transmission Control Protocol (TCP). TCP is able to detect data loss and it causes retransmission of the data, until a perfect copy of the complete data file is delivered to the recipient device.
Many devices may be unable to use TCP or any retransmission method because it is far too slow. Real-time applications require delivery of data, accurately, the first time. For these applications to operate well, even the speed of light causes undesired delay. It is not feasible or desirable to add retransmission delay.
The problem is determining how to provide reliable, first-time delivery on a contention-based network. Various approaches have been tried. The most commonly proposed system relies on prioritization of data in the network. With this approach, data having real-time constraints is identified with priority coding so that it may be transmitted before other data.
Prioritization seems at first to be a good solution. However, on reflection it suffers from the same difficulty. Prioritization only provides a delivery advantage relative to the lower-priority data. It provides no advantage against the other priority data.
Analysis and testing shows that this approach can work in certain circumstances, but only when the amount of priority data is small. For simple applications like voice, the percentage of the total may need to be 8% or less. Other applications must occupy an even smaller percentage of total network resource. As shown in
Another approach is to multiplex the data. With this method the bursts of data associated with one flow of data are separated from the burst of another.
Multiplexing usually uses some type of time-domain system (known as Time Domain Multiplexing (TDM)) to separate flows. Flows may be separated in groups, so that one group does not contend with another group. This can be an improvement but still leaves the possibility of contention between groups. The only way to eliminate contention is to multiplex each flow individually. A central problem with multiplexing is that it eliminates a principal advantage of the network, namely that average bandwidth available to all is reduced. In other words, each potential transmitter on the network is guaranteed a slot of time on the network, even if that time is infrequently used. This leads to inefficient resource usage.
Asynchronous Transfer Mode (ATM) is another technology for multiplexing a data network, to reduce contention. ATM breaks all data flows into equal length data blocks. Further, ATM can limit the number of data blocks available to any flow or application. The result is a virtual TDM multiplex system.
Both TDM and ATM provide contention reduction, but at the cost of considerable added complexity, cost, components, and lost bandwidth performance. Other approaches rely on specialized hardware to schedule packet delivery, driving up hardware costs.
The invention overcomes many of the above-identified disadvantages by providing an empirically determined delivery schedule for packets that are to be delivered between two endpoints on the network. A transmitting node having the need to transmit packets according to a known data rate (e.g., to support a voice telephone call) transmits a series of test packets over the network to the intended recipient using different delivery times. The test packets are evaluated to determine which of the delivery times suffered the least latency and/or packet loss, and that delivery time is used to schedule the packets for the duration of the transmission. Other endpoints use a similar scheme, such that each endpoint is able to evaluate which delivery schedule is best suited for transmitting packets with the least likely packet loss and latency. Different priority levels are used to transmit the data; the test packets; and other data in the network. The system empirically determines a desirable time schedule for transmission of data packets between two endpoints on the network. The delivery scheme can be implemented without specialized hardware.
According to one variation of the invention, a priority scheme is used to assign priority levels to data packets in a network such that delivery of packets intended for real-time or near real-time delivery (e.g., phone calls, video frames, or TDM data packets converted into IP packets) are assigned the highest priority in the network. A second-highest priority level is assigned to data packets that are used for testing purposes (i.e. the so-called test packets). A third-highest priority level is assigned to remaining data packets in the system, such as TCP data used by web browsers.
Other priority levels above and below these three levels can be accommodated as well. For example, a priority level above the real-time level can be assigned for emergency purposes, or for network-level messages (e.g., messages that instruct routers or other devices to perform different functions).
Note that for two-way communication, two separate connections must be established:
one for node A transmitting to node B, and another connection for node B transmitting to node A. Although the inventive principles will be described with respect to a one-way transmission, it should be understood that the same steps would be repeated at the other endpoint where a two-way connection is desired.
In step 502, a delivery schedule is partitioned into time slots according to a scheme such as that illustrated in
In step 503, the required bandwidth between the two endpoints is determined. For example, for a single voice-over-IP connection, a bandwidth of 64 kilobits per second might be needed. Assuming a packet size of 80 bytes or 640 bits (ignoring packet overhead for the moment), this would mean that 100 packets per second must be transmitted, which works out to (on average) a packet every 10 milliseconds.
Returning to the example shown in
In step 504, a plurality of test packets are transmitted during different time slots at a rate needed to support the desired bandwidth. Each test packet is transmitted using a “discovery” level priority (see
In step 506, the sender evaluates the test packets to determine which time slot or slots are most favorable for carrying out the connection. For example, if it is determined that packets transmitted using time slot #1 suffered a lower average dropped packet rate than the other slots, that slot would be preferred. Similarly, the time slot that resulted in the lowest packet latency (round-trip from the sender) could be preferred over other time slots that had higher latencies. The theory is that packet switches that are beginning to be stressed would have queues that are beginning to fill up, causing increases in latency and dropped packets. Accordingly, according to the inventive principles other time slots could be used to avoid transmitting packets during periods that are likely to increase queue lengths in those switches. In one variation, the time slots can be “overstressed” to stretch the system a bit. For example, if only 80-byte packets are actually needed, 160-byte packets could be transmitted during the test phase to represent an overloaded condition. The overloaded condition might reveal bottlenecks where the normal 80-byte packets might not.
Rather than the recipient sending back time-stamped packets, the recipient could instead perform statistics on collected test packets and send back a report identifying the latencies and dropped packet rates associated with each time slot.
As explained above, packet header overhead has been ignored but would typically need to be included in the evaluation process (i.e., 80-byte packets would increase by the size of the packet header). Slot selection for the test packets could be determined randomly (i.e., a random selection of time slots could be selected for the test packets), or they could be determined based on previously used time slots. For example, if a transmitting node is already transmitting on time slot 3, it would know in advance that such a time slot might not be a desirable choice for a second connection. As another example, if the transmitting node is already transmitting on time slot 3, the test packets could be transmitted in a time slot that is furthest away from time slot 3, in order to spread out as much as possible the packet distribution.
In step 506, a connection is established between the two endpoints and packets are transmitted using the higher “realtime” priority level and using the slot or slots that were determined to be more favorable for transmission. Because the higher priority level is used, the connections are not affected by test packets transmitted across the network, which are at a lower priority level. In one variation, the IP precedence field in IP packet headers can be used to establish the different priority levels.
It should be appreciated that rather than transmitting test packets simultaneously during different time slots, a single slot can be tested, then another slot, and so on, until an appropriate slot is found for transmission. This would increase the time required to establish a connection. Also, as described above, for a two-way connection, both endpoints would carry out the steps to establish the connection.
It should also be understood that the phase of all frames may be independent from one another; they need only be derived from a common clock. Different endpoints need not have frames synchronized with each other. Other approaches can of course be used.
The invention will also work with “early discard” settings in router queues since the empirical method would detect that a discard condition is approaching.
In another variation, packet latencies and packet dropped rates can be monitored during a connection between endpoints and, based on detecting a downward trend in either parameter, additional test packets can be transmitted to find a better time slot in which to move the connection.
Packet switch 704, however, is heavily loaded. In that switch, the queue for priority level 1 traffic is fall, leading to dropped packets and latencies. Similarly, the test packets transmitted by endpoint 701 at priority level 2 cause that queue to overflow, causing dropped packets and longer latencies. However, the priority level 3 queue (existing realtime traffic) is not yet full, so those packets are transported through the network unaffected. In accordance with the invention, upon detecting that test packets sent during certain time slots are dropped and/or suffer from high latencies, endpoint 701 selects those time slots having either the lowest drop rate and/or the lowest latencies, and uses those time slots to schedule the packets (which are then transmitted using level 3 priority).
It is assumed that each endpoint in
While the invention has been described with respect to specific examples including presently preferred modes of carrying out the invention, those skilled in the art will appreciate that there are numerous variations and permutations of the above described systems and techniques that fall within the spirit and scope of the invention as set forth in the appended claims. Any of the method steps described herein can be implemented in computer software and stored on computer-readable medium for execution in a general-purpose or special-purpose computer, and such computer-readable media is included within the scope of the intended invention. Numbering associated with process steps in the claims is for convenience only and should not be read to imply any particular ordering or sequence.
Number | Name | Date | Kind |
---|---|---|---|
4745593 | Stewart | May 1988 | A |
4821259 | DeBruler et al. | Apr 1989 | A |
5271000 | Engbersen et al. | Dec 1993 | A |
5373504 | Tanaka et al. | Dec 1994 | A |
5408465 | Gusella et al. | Apr 1995 | A |
5432775 | Crayford | Jul 1995 | A |
5455865 | Perlman | Oct 1995 | A |
5477531 | McKee et al. | Dec 1995 | A |
5517620 | Hashimoto et al. | May 1996 | A |
5541921 | Swenson et al. | Jul 1996 | A |
5563875 | Hefel et al. | Oct 1996 | A |
5610903 | Crayford | Mar 1997 | A |
5734656 | Prince et al. | Mar 1998 | A |
5774668 | Choquier et al. | Jun 1998 | A |
5781534 | Perlman et al. | Jul 1998 | A |
5859835 | Varma et al. | Jan 1999 | A |
5859979 | Tung et al. | Jan 1999 | A |
5917822 | Lyles et al. | Jun 1999 | A |
5974056 | Wilson et al. | Oct 1999 | A |
6047054 | Bayless et al. | Apr 2000 | A |
6058117 | Ennamorato et al. | May 2000 | A |
6067572 | Jensen et al. | May 2000 | A |
6088361 | Hughes et al. | Jul 2000 | A |
6134589 | Hultgren | Oct 2000 | A |
6208666 | Lawrence et al. | Mar 2001 | B1 |
6240084 | Oran et al. | May 2001 | B1 |
6247061 | Douceur et al. | Jun 2001 | B1 |
6259695 | Ofek | Jul 2001 | B1 |
6272131 | Ofek | Aug 2001 | B1 |
6359885 | Kim et al. | Mar 2002 | B1 |
6360271 | Schuster et al. | Mar 2002 | B1 |
6373822 | Raj et al. | Apr 2002 | B1 |
6377579 | Ofek | Apr 2002 | B1 |
6385198 | Ofek et al. | May 2002 | B1 |
6426814 | Berger et al. | Jul 2002 | B1 |
6426944 | Moore | Jul 2002 | B1 |
6480506 | Gubbi | Nov 2002 | B1 |
6487593 | Banks | Nov 2002 | B2 |
6496477 | Perkins et al. | Dec 2002 | B1 |
6502135 | Munger et al. | Dec 2002 | B1 |
6529480 | Stewart et al. | Mar 2003 | B1 |
6556564 | Rogers | Apr 2003 | B2 |
6560222 | Pounds et al. | May 2003 | B1 |
6574193 | Kinrot | Jun 2003 | B1 |
6611519 | Howe | Aug 2003 | B1 |
6618360 | Scoville et al. | Sep 2003 | B1 |
6628629 | Jorgensen | Sep 2003 | B1 |
6633544 | Rexford et al. | Oct 2003 | B1 |
6711137 | Klassen et al. | Mar 2004 | B1 |
6731600 | Patel et al. | May 2004 | B1 |
6778536 | Ofek et al. | Aug 2004 | B1 |
6871078 | Nishioka et al. | Mar 2005 | B2 |
6885641 | Chan et al. | Apr 2005 | B1 |
6914900 | Komatsu et al. | Jul 2005 | B1 |
6999422 | Ishioka | Feb 2006 | B2 |
7080160 | Cognet et al. | Jul 2006 | B2 |
7116639 | Gail et al. | Oct 2006 | B1 |
7197010 | Berstein et al. | Mar 2007 | B1 |
7200158 | Gustin | Apr 2007 | B2 |
20010033565 | Rogers | Oct 2001 | A1 |
20010033649 | Rogers | Oct 2001 | A1 |
20020010792 | Border et al. | Jan 2002 | A1 |
20020031144 | Barton | Mar 2002 | A1 |
20020044557 | Isoyama | Apr 2002 | A1 |
20020054611 | Seta | May 2002 | A1 |
20020080719 | Parkvall et al. | Jun 2002 | A1 |
20020086641 | Howard | Jul 2002 | A1 |
20020110129 | Matsuoka et al. | Aug 2002 | A1 |
20020186660 | Bahadiroglu | Dec 2002 | A1 |
20020191592 | Rogers et al. | Dec 2002 | A1 |
20030012163 | Cafarelli et al. | Jan 2003 | A1 |
20030021287 | Lee et al. | Jan 2003 | A1 |
20030058880 | Sarkinen et al. | Mar 2003 | A1 |
20030067903 | Jorgensen | Apr 2003 | A1 |
20030107991 | Tezuka et al. | Jun 2003 | A1 |
20030117959 | Taranov | Jun 2003 | A1 |
20030188188 | Padmanabhan et al. | Oct 2003 | A1 |
20030219029 | Pickett | Nov 2003 | A1 |
20040008655 | Park et al. | Jan 2004 | A1 |
20040014491 | Weigand | Jan 2004 | A1 |
20040024550 | Doerken et al. | Feb 2004 | A1 |
20040160340 | Thomson et al. | Aug 2004 | A1 |
20040160916 | Vukovic et al. | Aug 2004 | A1 |
20040179530 | Verbesselt et al. | Sep 2004 | A1 |
20050058083 | Rogers | Mar 2005 | A1 |
20050086362 | Rogers | Apr 2005 | A1 |
20060168336 | Koyanagi et al. | Jul 2006 | A1 |
Number | Date | Country |
---|---|---|
0827307 | Mar 1998 | EP |
2004-056322 | Feb 2004 | JP |
WO 0028705 | May 2000 | WO |
WO 0028706 | May 2000 | WO |
WO 0147162 | Jun 2001 | WO |
WO 0150146 | Jul 2001 | WO |
WO 0159994 | Aug 2001 | WO |
WO 0160029 | Aug 2001 | WO |
WO 0241505 | May 2002 | WO |
WO 02100023 | Dec 2002 | WO |
WO 02100023 | Dec 2002 | WO |
WO 03084137 | Oct 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20050086362 A1 | Apr 2005 | US |