This invention relates to the multiplexing of multiple sources in a multiplexer. Especially, the invention relates to multiplexing in an ATM multiplexer. The invention also relates to a situation where the sources have different bit rates and/or different packet sizes (or batch sizes).
The ATM system offers functions for different applications. The system can be divided into layers (compare to the OSI layer model). Above the ATM layer, which handles, for example, the multiplexing and demultiplexing functions, is the ATM adaptation layer (AAL) that handles convergence, segmentation, and reassembly matters. It can be said that the AAL provides for the mapping of higher-layer protocol data units (PDUs) into the payload fields of ATM cells and the reassembly of these PDUs. Several AAL protocols exist that support different applications. One of these protocols is AAL 2.
AAL 2 is especially designed for bandwidth efficient transmission, for low-rate, short length packets in delay sensitive applications. For example, compressed voice as generated in mobile networks is such an application.
It is difficult, in certain implementation, to achieve good performance for a system. If requirements for a system are low-delay connections when there are few incoming links in asynchrony, but still connection establishment rates are high, it is difficult to find a peak allocation in a way that the ATM link performance is efficient. Either the performance tends to be low in these kinds of implementations, or the algorithms are too slow for real-time fast calculation. The goal of the invention is to solve the problem of the above-mentioned implementations. This is achieved in a way described in the claims.
Since packet size (or more generally batch size) may be different (due to different bit rates or different inter-packet time periods) in incoming links of the multiplexer, a special arrangement must be used for calculating an efficient peak capacity value that guarantees good performance for an outgoing link. The idea of the invention uses a method with two phases. The first phase precalculates the capacity of the outgoing link with different numbers of incoming links having equal packet size, and forms a table from the results of the precalculation. In the second phase, the peak capacity needed for the outgoing link is calculated.
The second phase cuts a piece from each packet of the incoming links with a fixed maximum piece size, then repeats this action for the remaining part of the packets from the different incoming links until the remaining part of the longest packet size is left. In this way, several sets of virtual packets are formed, each set containing virtual packets with equal length, and forming a virtual packet stream. A peak capacity value is calculated for each set (virtual stream). The values are calculated, one for each set by using the table formed in the first phase. The peak capacity value of each set is then scaled so that it reflects the fixed maximum piece size of that set. After this, the scaled peak values of the sets are added together for getting the peak capacity value for the outgoing link.
In the preferred embodiment of the invention, the number of the incoming links is relatively low. One preferred realization of the outgoing link is an ATM link.
In the following the invention is described in more detail by means of
In this example the first phase of the invention is based on a well-known N*D/D/1 model that calculates overflow probability. However any other suitable model could be used. In N*D/D/1,
A well-known formula of the overflow probability can be written
The formula (1) can be used for calculating the peak capacity value of an ATM link. In that case, the relation between the packet loss and the overflow probability is needed. Let's assume that the loss probability is equal to the overflow probability. However, this is not the only choice for the relation, but the validity of the choice depends on the case. The packet loss probability describes the allowable number of lost packets in relation to the number of packets sent during a certain time period.
The symbol δ represents an allowable time for the delay of a packet. The maximum delay can be τ. D is 4 since it is possible to serve 4 incoming packets in the time τ. Let's take a new parameter into use, namely an allowable relative delay d that is d=δ/τ. Now, it is possible to substitute the allowable queue size, x=D*d, in the formula (1). D can be solved from the formula (1) in desired values of the loss probability (QDN(x)) and N. d depends on the structure of a system in the above-mentioned way. By solving D with several N values, it is possible to form a table, as shown in
In the the second phase of the invention the peak capacity value for an ATM link is calculated in a way that the performance of the link is good, i.e. there is no useless extra capacity in the link.
In
Let's look at an example of two incoming link types. Both of the links are carrying speech data and: both of the links have the same frequency, τ=20 ms, for incoming packets, but different packet sizes, K1=10 bytes and K2=20 bytes (See
According to the invention two virtual streams (sets) are formed: S1 and S2. Stream S1 consists of 25+25=50 packets of 10 bytes. Correspondingly, Stream S2 consists of 25 packets of 10 bytes. The N*D/D/1 model can be used for achieving the capacity values for both the streams, and the total capacity requirement is achieved by adding the results. Since τ=20 ms for the incoming packets and the packet sizes are 10 and 20 bytes, rates of 4 kbit/s and 8 kbit/s are applied for the incoming link types. The desired loss probability is 1E-5 with an allowable delay 5 ms. Table 1 shows what is the required capacity when the N*D/D/1 model is used in a trivial way and when the capacity is achieved according to the invention. Link utilization describes how efficiently the outgoing link works.
As can be noticed, the required capacity is smaller using the method according to the invention. The outgoing link, which is going to be established, is also used more efficiently. Furthermore, it is worth noticing that the results depend strongly on the requirements used, such as the loss probability and the allowable delay.
Although, the method according to the invention is described only in the few above-mentioned examples, it is obvious that the invention can be realized in many ways, such as different variations of dividing incoming packets, in the scope of the inventive idea.
Number | Date | Country | Kind |
---|---|---|---|
20002646 | Dec 2000 | FI | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/FI01/01026 | 11/26/2001 | WO | 00 | 11/21/2003 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO02/45459 | 6/6/2002 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5289462 | Ahmadi et al. | Feb 1994 | A |
5504773 | Padovani et al. | Apr 1996 | A |
6307838 | Haas | Oct 2001 | B1 |
6894991 | Ayyagari et al. | May 2005 | B2 |
7095744 | Iny | Aug 2006 | B2 |
7187654 | Beshai et al. | Mar 2007 | B1 |
20020191540 | Fujii et al. | Dec 2002 | A1 |
Number | Date | Country |
---|---|---|
0 961 444 | Dec 1999 | EP |
WO 9808357 | Feb 1998 | WO |
WO 9945739 | Sep 1999 | WO |
Number | Date | Country | |
---|---|---|---|
20040066804 A1 | Apr 2004 | US |