Scheduling system for transmission of cells to ATM virtual circuits and DSL ports

Information

  • Patent Grant
  • 7471688
  • Patent Number
    7,471,688
  • Date Filed
    Tuesday, June 18, 2002
    22 years ago
  • Date Issued
    Tuesday, December 30, 2008
    15 years ago
Abstract
A system and method for controlling transmission of cells is described. The cells are associated with virtual circuits that either require shaping according to constant bit rate (CBR) or real-time variable bit rate (rt-VBR), or no shaping with transmit selection based on priority (for services other than CBR and rt-VBR). The system transmits the shaped and unshaped traffic using one or more circular control structures. The control structures have time slots at the granularity of the maximum system transmit rate.
Description
BACKGROUND

The invention relates generally to networking, and more particularly to cell-based transmission scheduling for virtual circuits.


In complex networks, cells are transmitted to physical channels (or “ports”) over a virtual circuit according to traffic parameters of the virtual circuit. One example of such traffic parameters are those specified in the “The ATM Forum Technical Committee Traffic Management Specification Version 4.1”, The ATM Forum, March 1999. An ATM virtual circuit connection may characterize its traffic by using source traffic descriptions, which attempt to capture the cell inter-arrival pattern for resource allocation. Once such traffic descriptor is Peak Cell Rate (PCR), which represents the minimum spacing between cells, and therefore the peak emission rate of the source. The PCR is expressed in cell/seconds.


ATM supports a quality of service required by an application through the selection of an appropriate service category. The services offer different QoS commitments in terms of delay and loss tolerance. The services differ in how the network allocates bandwidth and applies different traffic management functions. The service categories include constant bit rate (CBR), variable bit rate (VBR) and unspecified bit rate (UBR). For CBR and VBR, bandwidth is allocated for the duration of the connection. In contrast, UBR services target for use bandwidth that becomes dynamically available as connections go idle.


The CBR service provides a connection with dedicated bandwidth providing extremely low probability of cell loss, as well as low and predictable delay. The inter-arrival time between two cells is constant and can be characterized as a minimum cell inter-arrival, which corresponds to a known PCR.


The VBR service category is mainly intended for more efficient support of applications that have known or predictable bursty traffic characteristics. The VBR traffic can be characterized by a sustained cell rate (SCR) as well as a PCR. The SCR is measured over a defined period and represents the average transmission rate. The VBR service can be further divided into two subcategories based on delay requirements, the real-time VBR (rt-VBR) and non-real-time VBR (nrt-VBR). The rt-VBR has strict end-to-end delay requirements, whereas the nrt-VBR does not guarantee any delay bounds.


A UBR virtual circuit can have a priority determined by the weight associated with such VC on a given port.


Ports can be characterized in terms of the maximum rates at which they are capable of transmitting.





DESCRIPTION OF DRAWINGS


FIG. 1 is block diagram of a network environment that includes a Digital Subscriber Loop Access Multiplexer (DSLAM).



FIG. 2 is a block diagram of DSLAM, including a Segmentation and Re-assembly device (“SAR”).



FIG. 3 is a block diagram illustrating one embodiment of the DSLAM based on a network processor architecture.



FIG. 4 is a detailed block diagram of the SAR device (of FIG. 2).



FIG. 5 is a depiction of the field format of an entry in a circular buffer that maintains schedules for shaped traffic (“shaped wheel”).



FIG. 6 is a flow diagram of a receive process used by SAR device.



FIG. 7 is a flow diagram of a scheduler process used by the SAR device.



FIGS. 8A and 8B are flow diagrams of schedule determination processes for shaped traffic and unshaped traffic, respectively.



FIG. 9 is a depiction of exemplary circular buffers (or “wheels”) for shaped and unshaped traffic.



FIG. 10 is a depiction of an exemplary port table.



FIG. 11 is a flow diagram of a traffic shaping process used by the SAR device.



FIG. 12 is an exemplary multi-threaded microengine embodiment of the SAR traffic scheduler and shaping functions.



FIG. 13 is a depiction of the multi-threaded microengine embodiment of the receive, scheduler and traffic shaping functions in which the shaped and unshaped wheels each are partitioned into four separate wheels.



FIG. 14 is a detailed block diagram of an alternative embodiment of the SAR device (of FIG. 2).



FIG. 15 is a depiction of the field format of an entry in a circular buffer that maintains schedules for shaped and unshaped traffic in the SAR device of FIG. 14.



FIG. 16 is a flow diagram of a scheduler process used by the SAR device of FIG. 14.



FIGS. 17A and 17B are flow diagrams of schedule determination processes for shaped and unshaped traffic, respectively, performed by the scheduler of FIG. 16.



FIG. 18 is a flow diagram of a traffic shaping process used by the SAR device of FIG. 14.





DETAILED DESCRIPTION


FIG. 1 shows a DSL network environment 10 that includes a DSL aggregation device 12, shown as a Digital Subscriber Loop Access Multiplexer (DSLAM), which concentrates connections 14a, 14b, . . . , 14k, from DSL access points 16a, 16b, . . . , 16k, for access to a service network such as the public Internet (or a corporate Intranet) 18. The DSL network environment 10 may be viewed in two parts: a customer or service user environment 20 and a service provider environment 22. In the customer environment 20, the DSL access points 16 typically correspond to Customer Premises Equipment (CPE). The CPE can take a variety of different forms, e.g., a DSL modem used by a home consumer, or a Small Office/Home Office (SOHO) router, and so forth. The connections 14 between the CPE 16 and the DSLAM 12 are usually ATM connections. The DSLAM 12 can be deployed in the service provider environment 22, as shown.


The DSLAM 12 can be characterized as having a CPE side with first port interfaces 24 for handling ATM cell-based traffic associated with corresponding DSL links or connections 14, and one or more second port interfaces 26, which are coupled to a router (or ATM switch) 28 via a WAN uplink connection 30. The router/switch 28 connects to a service network, such as the Internet 18, as indicated earlier, or some other type of service network, for example, an ATM network 32. Thus, for upstream traffic, many DSL ports on the CPE side may be aggregated at the DSLAM 12 and, on the service provider side, connected to the service network router with a single physical port interface.


For each port, there may be many virtual connections. The virtual connections represent “state full” communication setups, such as an ATM virtual circuit or Internet TCP connection. At each end of the network virtual connection is an application that can send and receive messages. The messages are carried across the network as packets or frames, which are further subdivided into 48 byte ATM cells. The interface into and out of the DSLAM 12 is either cell-based (48 byte ATM cells) or packet (or segment) -based (64 byte packet or greater sized segments based on the MTU on port interfaces 26). In the embodiment shown, the first port interfaces 24 are cell-based and the second port interfaces 26 handle frames (or packets). Each virtual connection has a quality of service or rate specification. In the described embodiment, the types of rates include constant bit rate (CBR), real-time and non-real-time variable bit rate (rt-VBR and nrt-VBR, respectively) and unspecified bit rate (UBR). A priority may be associated with a VC that contracts with the UBR service.


Referring to FIG. 2, a depiction of the DSLAM 12 for handling traffic from the service network 18 (or 32) to one of the CPEs 16 (that is, traffic flowing in the downstream direction) is shown. The DSLAM 12 therefore includes at least one of the second port interfaces 26, shown as an ingress medium interface, and at least one of the first port interfaces 24, shown as an egress medium interface. The interface 26 receives the downstream traffic from a service network, such as network 18, and provides that packet-based traffic to a Segmentation and Reassembly unit (SAR) 34. The SAR 24 segments packets into ATM cells, which are transmitted to a CPE over a medium via the egress medium interface 24. The SAR 34 also performs traffic scheduling and shaping, as will be described. The DSLAM 12 could further include logic to perform optional pre-SAR processing (e.g., packet formatting, aggregation of and interface to different media interfaces 26) and post-SAR processing (e.g., interface and MUX to different media interfaces 24). The logic could be implemented in software or hardware, e.g., in Field Programmable Gate Arrays (FPGAs) 36, 38, as shown. Thus, the logic 36 and 38 removes from the SAR 34 any complexity related to specific media interfaces and connects to the SAR 34 with a single bus that is compatible with the SAR architecture. The bus communication between the SAR and external processing logic 36, 38 is therefore purely concerned with satisfying the particular handshaking signals required by that bus.


The SAR 34 may be implemented with a commercially available network processor, for example, the Intel® IXP™ 1200 network processor. In such an embodiment, as shown in FIG. 3, the SAR 34 may be coupled to each FPGA via the Interface Exchange (IX) Bus. In this or other network processor architecture implementations, the bus could be some other bus suitable for connecting the SAR 34 to a medium interface or optional processing logic. Specifically, FIG. 3 illustrates the SAR 34, along with the DSLAM unit's pre-SAR cell-based processing FPGA 38 and a plurality of ingress medium interfaces 26. The interfaces 26 can be implemented to handle different types of connectivity and medium access protocols.


Referring now to FIG. 4, the SAR 34 includes processes and control structures for a concurrent shaped and unshaped traffic scheduling system. It will be appreciated that the process and control structures illustrated in the figure are only those that pertain to processing of traffic flowing in the downstream direction, that is, from service network to service user. All of these processes and structures reside on, and the processes are executed by, a processor such as a network processor, as discussed above with reference to FIG. 3. The processes include a receive process 50, a scheduler process 52 and a shaper/transmit process 54. The control structures include receive control structures 56, shaper/transmit control structures 58 and a scheduler control structure 59. The receive control structures 56 include the following: a VC table 60 and VC packet queues 62. The VC table 60 stores information associated with different VCs, such as pre-built ATM header, traffic parameters and state information (queue depth, thresholds, etc.) associated with VC queue and port destination information. The lookup table 60 is indexed by values that correspond to VCI/VPI information or, alternatively, for a table of reduced size, indexed by values generated by hashing VPI/VCI information. The VC packet queues 62 store incoming packets by the VCs associated with the packets. Thus, the VC packet queues 62 are organized by an identifier (such as the VCI) by which the associated VC can be determined. The index is used to determine the appropriate VC (or flow) entry in the VC table 60 to be read and the specific queue in which the incoming packet is to be stored.


The port specific control structures 58 include ports tables 66, an array of UBR VCs 67, a “first chance” queue 68 and a Queue With Packet (QWP) vector 70. The scheduler control structures 59 include a scheduler message queue 72, as well as a shaped VC control structure 74 and an unshaped VC control structure 75. In the illustrated embodiment, the VC control structures 74 and 75 are implemented as calendarqueues, and are thus depicted conceptually and referred to hereinafter as “wheels”.


The scheduler message queue 72 stores schedule requests generated by the receive process 50 or shaper process 54, and is read by the scheduler process 52. The requests are cell transmission scheduling requests, which are VC-specific, and are therefore associated with one of the service types, that is, CBR, rt-VBR, nrt-VBR or UBR. The shaped VC wheel 74 and the unshaped VC wheel 75 hold current schedules. More specifically, the shaped VC wheel 74 is used to schedule CBR and rt-VBR VCs and, at times, nrt-VBR VCs (to meet SCR) as well, whereas the unshaped VC wheel 75 is used to schedule nrt-VBRVCs (with the aforementioned exception) and UBR VCs and, at times (e.g., to accommodate schedules to be added when a port goes from a flow-control asserted to de-asserted state), CBR and rt-VBR VCs as well, as will be explained in further detail later. The wheels 74, 75 are implemented as an array of time slots, the wheel 74 including slots 76 and the wheel 75 including slots 77, and the slots 76, 77 correspond to the maximum transmit rate of the network processor. Each slot represents a time slot in which an ATM cell can be transmitted.


The number of slots in the wheels is a function of aggregate port bandwidth. For example, for an aggregate bandwidth of 622 Mb/s, say, the smallest granularity of bandwidth that can be supported on any port is 9.6 Kb, which means that the wheels would be partitioned into 64 k locations or slots.


Cell transmit rate refers to the spacing between cell transmits to the network by the shaper/transmit process 54. The shaped wheel 74 is operated in absolute time. It steps every n cycles regardless of whether there are any cells to be transmitted. The timing of the unshaped wheel 76 is relative (with a current shaped wheel slot index), as will be described. It advances only when the shaped wheel has no cell to be transmitted in the current time slot.


A VC index associated with a virtual connection is stored in a particular one of the slots 76, 77, during scheduling. The VC may have a traffic parameter that requires it to be serviced at least at a predetermined rate. For example, a CBR VC must conform to a PCR specified for that VC. An rt-VBR must conform to PCR, SCR and Maximum Burst Size (MBS) parameters specified for that VC. Both CBR and rt-VBR will need to conform to the maximum cell transfer delay (maxCTD) as a measure of service quality. Cell Delay Variable Tolerance (CDVT) is used as a measure of time to compensate for jitter introduced due to the scheduling inefficiency.


The ports have data rates that can be measured and constrained. Like the PCR/SCR rate (bandwidth) associated with VCs, the rate of a port is converted from bits/sec to number of time slots determined by the port's inter-cell gap: more time slots yield a smaller rate. The conversion takes into account the network processors clock frequency and the clock cycle budget to process a single cell based on the aggregate bandwidth (sum of bandwidth of all ports).


One constraint consideration when configuring ports is the rates of VCs allocated to a port. Allocation is limited such that the sum of the minimum service rates for VC does not exceed the desired rate of the port. This ensures that all VCs on a given port can be serviced to their minimum rates.


The VC is scheduled into a wheel with sufficient spacing for transmission with sufficiency frequency to ensure that the transmission rate conforms to both the VC cell transmit rate and the port transmit rate.


The QWP vector 70 is a bit vector in which one bit position corresponds to the first chance queue 68 and 16 bit positions correspond to UBR VCs associated with a port. The array of UBR VCs 67 includes up to 16 entries, and each entry's priority is determined by the weight associated with it. Each array element is associated with a VC by a value indicating the VC index of that VC and contains the Weighted Round Robin (WRR) parameters.


If a bit position in the QWP vector has a value of one, either the first-chance queue or one of the 16 VCs has data awaiting transmission. When queuing packets in the VC queues associated with a VC that is either a UBR or a nrt-VBR VC that does not conform to SCR, the receive process 50 sets the corresponding bit in the QWP vector to one. When the transmit process 54 empties the VC queue queue (corresponding to the VBR-nrt or UBR), it sets the corresponding bit to zero.


The per-VC packet queues 62 include linked list queues, each associated with some VC. Given a VC index, the transmit process 54 can go to the associated per-VC packet queue 62 to get packet descriptor information and locate the corresponding packets. The transmit process 54 performs segmentation (that is, segments the packets into ATM cells) according to well-known SAR techniques.


As indicated earlier, the wheel slots represent processor time slots. Shaped wheel slots 76 reference VCs having “shaped” service rates CBR and rt-VBR, or sometimes SCR-conforming nrt-VBR. The allocation of the slots 76 to VCs provides a schedule for regular service to those VCs. Unshaped wheel slots 77 typically reference VCs having “unshaped” service rates nrt-VBR (PCR conforming) or UBR, but, as mentioned above, may also reference VCs having CBR and rt-VBR service rates.


The slots 76 of the shaped wheel 74 each reference VCs from two grades of service rates. FIG. 5 illustrates the format of the shaped wheel slot 76, which includes a must-send VC index field 78 corresponding to a first service rate (“must send” service rate) grade and a could-send VC index field 79 corresponding to a second service rate (“could send” service rate) grade. These fields 78, 79 reference virtual circuits characterized by the “must send” and “could send” grades of service rate, respectively. A “must-send” grade indicates VCs satisfying PCR for CBR VCs or SCR for VBR VCs. The “could-send” grade indicates VCs being opportunistic as in the case of rt-VBR VCs satisfying PCR, but of a lower priority than must-send.


In filling slots in the wheels, the scheduler 52 must ensure that the VC cell rate obeys the VC traffic parameters but does not exceed the physical port rate, as will be described later with reference to FIGS. 7 and 8A-8B.


Virtual circuits are selected for transmission from the unshaped wheel 76 when must-send and could-send virtual VCs in the shaped wheel, which have a higher priority, have not been scheduled. Thus, the unshaped wheel 75 provides rate control for VCs that are prioritized behind VCs referenced by must-send 78 and could-send fields 79 on the shaped wheel slots.


Returning to FIG. 4, the port tables 66 each contain information used by the scheduler 52 in determining schedules. Each port table 66 contains entries for a given port. Each schedule type (must-send, could-send, unshaped) has a separate field that indicates when a VC of that type was last scheduled on that port. This ensures that VCs associated with different schedule types can be scheduled in a way that does not allow a VC of an unshaped schedule type to be scheduled ahead of a VC of a shaped schedule.


The first chance queue 68 stores references to VCs, in FIFO order. First chance queue 68 is used for traffic to be transmitted to a VC at the first opportunity, as will be described.


The shaping/transmit process 54 is a process that manages the contention of multiple VCs, having various service rates, for transmission. The shaping/transmit process 54 iterates over the slots of the wheels to select VCs for transmission. In general, the shaping/transmit process 54 determines how time slots associated with the wheels 74, 75 will be used to transmit cells.


Further details of these control structures will be provided in the description of the operation of the SAR downstream processes 50, 52 and 54 to follow.


Incoming packets arrive and are stored in a receive buffer in main memory (not shown) pending transmission. Receive process 50 validate cells from the receive buffers and stages them by enqueuing the packets in the VC packet queues 62, pending transmission by the transmit process 54. The receive process 50 enqueues the packets based on the VC index of the VC with which each packet is associated. The transmit process 54 dequeues the packets from the VC packet queues 62, segments the packets into cells and transmits cells at specified cell rates appropriate to the VC and destination port, as will be explained. The VC index gives the position of the VC in VC table 60.


Referring to FIG. 6, the receive process 50 receives 80 a downstream packet from the network 18 (via one of the interfaces 24 and logic 36, as discussed earlier). The receive process 50 determines 81 if the packet is a control packet or a data packet. If the packet is a control packet, the receive process 50 checks 82 for a change in port flow control status. If no change is detected, the receive process 50 goes to sleep (at 83). If, at 81, the packet is determined to be a data packet, the receive process 50 performs a lookup 84 in the VC lookup table 60 for the received packet to associate that packet with a VC and uses the VC to locate a corresponding one of the packet queues. Information about the VC, e.g., TM4.1 traffic management, current packet being assembled, etc., is kept at the table 60, in a specific VC entry. Alternatively, packet data can be received for other network protocols, such as Ethernet/IP, Frame Relay, etc., and a lookup is performed on the header to obtain an index to the VC in VC table 60. Once the VC and a corresponding packet queue are identified, the receive process 50 determines 85 if a fullness threshold is exceeded for the VC packet queue. If so, the process 50 asserts 86 a flow control signal to the FPGA 36 to push the congestion towards the upstream edge of the DSLAM or move it outside the DSLAM. Otherwise, the process 50 enqueues 88 the packet in the VC packet queue. The process 50 determines 90 if the VC packet queue, prior to receiving the current packet, had been empty. If it is determined that the VC packet queue had been empty, or a change in the port flow control status is detected at 82, the receive process 50 sends 92 a schedule request message to the scheduler 52. If the VC packet queue had not been empty prior to the queuing of the current packet, then the process continues processing incoming packets at 80.


In the described embodiment, to send a message to the scheduler 52, the receive process 50 stores a schedule request in the message queue 72. This is done only when the VC packet queue transitions from an empty to non-empty state as a result of a new packet being stored in that VC packet queue, as discussed above. The scheduler 52 does not look for work in the VC packet queue. It waits to be told (via the enqueuing of a scheduler request) that there is work to do for a particular VC. This is a work conserving property of the scheduler 52. The message queue 72 is also used for any work-related messages by the shaper 54 for the scheduler 52.


In particular, when queuing packets for CBR or VBR or UBR, the receive process 50 sends a message to the message queue 72 to request either a shaped scheduling (CBR, rt-VBR) or unshaped scheduling (UBR, nrt-VBR) for transmission.


Referring to FIG. 7, the scheduler process 52 retrieves 100 from the message queue 72 a next scheduling request in the message queue 72. The scheduler process 52 determines 102 if the request is for a “shaped” VC, that is, for a VC having a traffic parameter that requires traffic shaping, such as CBR or rt-VBR (or even nrt-VBR, in order to meet an SCR contract). If so, the scheduler process 52 clears 104 the previous schedule if the message originated from the shaper 54. If the VC is shaped and the message is from the receive process, the scheduler process 52 reads 106 traffic parameters (from the VC table 60) and computes a schedule for a next cell on the VC in the shaped wheel. The scheduler 52 sets 108 the schedule in the shaped wheel. The scheduler 52 updates 109 the appropriate port table and VC table with the most recent scheduling information and returns to 100 to process the next received message.


If, at 102, the VC is determined to be an unshaped VC, and the scheduler 52 determines 110 that the first chance queue is not empty, the scheduler 52 de-queues 112 an entry from the first chance queue. If, at 110, the scheduler determines that the first chance queue is empty, the scheduler determines an unshaped VC to be processed based on a WRR weight 114. The first chance queue is checked on packet boundaries (as opposed to cell boundaries).


The simple case of the WRR is the round robin. If there are N connections, each separately queued, the RR mechanism in each cycle visits each of the queues and servers a cell if any is waiting. Thus, the RR mechanism shares the link bandwidth equally among all of the queues. Instead of an equal share, a weighted share per queue is also possible by assigning weights to each queue and giving slots proportional to the weight in each cycle.


Thus, when the scheduler 52 considers virtual circuits of an nrt-VBR or a UBR type, it uses the Queue With Packets bit vector 70 to check if the bit corresponding to the first-chance queue is set. If it is not set, the scheduler 52 uses the WRR algorithm to find the next UBR VC in the array of UBR VCs 67 that has data to transmit.


The scheduler determines 116 the schedule for the next cell on this VC in the unshaped wheel. The scheduler 52 sets 118 the schedule in the unshaped wheel by storing the VC index in the appropriate slot. The scheduler 52 updates 109 the appropriate port table and VC table with the most recent scheduling information and returns to 100 to process the next received message.


Referring to FIG. 8A, the shaped wheel schedule determination 106 is as follows. If, at 120, the VC is determined to be CBR, the scheduler process 52 computes 122 the earliest next time the cell can be sent by doing the following table lookups. It performs 124 a lookup of port information in the ports table 66 and uses that port information to determine the most recent time a cell (based on schedule type: must-send or could-send or unshaped) was scheduled for transmission on this port. It also performs a lookup 126 in the VC table 60 and uses that VC table lookup information to determine the last time a cell was last scheduled for transmission on this VC. The scheduler 52 inserts 128 the VC index (of the VC being scheduled) into the must-send side of a slot in the shaped wheel 74 that is as close as possible to that time. If, at 120, the scheduling request is determined to be non-CBR, the scheduler process 52 determines 129 if the VC is nrt-VBR. If the VC is determined not to be nrt-VBR (that is, it is rt-VBR), the scheduler process 52 determines 130 the earliest next transmit time (earliest slot time) by looking up 132 port information in ports table 66 to get the last time a cell was scheduled for transmission (based on schedule type:must-send or could-send or unshaped) on this port and by looking up 134 in the VC table 60 to get the last time a cell was scheduled for transmission on this VC, and finds 136 the latest time (using the traffic contract parameters) the next cell on this VC can be sent. The scheduler process 52 performs 138 a search of the shaped wheel 74 to find an open slot, starting with the earliest slot time. This may be accomplished by using hierarchical bit vectors of slots available information as a way of searching for an available slot to schedule. The scheduler process 52 determines 140 whether or not the slot found is near the latest time (that is, whether or not the slot conforms to SCR). If it is, the process 52 places 142 the VC index in the must-send field in that earliest open slot in the shaped wheel 74. If it is not, the process 52 places 144 the VC-index in the could-send field instead.


If, at 129, the VC is determined to be nrt-VBR, the scheduler process 52 performs 130, 136 and 138 (indicated collectively by reference numeral 145) as described above. The scheduler process 52 determines 146 if the slot found (at 145) is near the latest next cell transmit time (that is, if the slot conforms to SCR). If so, the scheduler process 52 places 147 the VC index in the must-send field in that earliest open slot of the shaped wheel 74. Otherwise, the scheduler process 52 handles the VC under unshaped traffic scheduling (discussed below with reference to FIG. 8B).


Referring to FIG. 8B, the schedule determination 116 is as follows. For a UBR scheduling request, an nrt-VBR scheduling request that could not be handled under shaped traffic scheduling or a first chance queue scheduling request, the scheduler process 52 determines 150 the earliest slot time this port could be transmitted to relative to the current time-slot being processed on the unshaped wheel 76 by performing 152 a lookup of port information in the ports table 66 to find the last time a cell was schedule for transmission (based on schedule type: must-send or could-send or unshaped) on this port, and adding 154 to that last time slot an offset corresponding to a minimum inter-cell gap (which is the minimum number of slot times between transmits to this port). It reads 155 the next time-slot a shaped VC (CBR or rt-VBR) is scheduled on the shaped wheel 74. If it determines 156 that the earliest slot time calculated above is in conflict with the next shaped VC slot, the scheduler process 52 determines 157 a slot corresponding to the next shaped VC time-slot plus the offset. The process 52 performs 158 a range search in the unshaped wheel 76 to find the earliest open slot after that time (that is, the shaped VC time-slot plus the offset), and enters 159 the VC index in that earliest open slot in the unshaped wheel 76. Otherwise, after 158, the process 52 enters 160 the VC index in the earliest time slot (the slot corresponding to the earliest cell transmit time).



FIG. 9 illustrates the timing relationship between the shaped wheel 74 and the unshaped wheel 75, and scheduling of the shaped wheel 74 for a simple example involving two CBR VCs. In the example, it is assumed that the maximum port transmit rate of a destination port “i” requires that one in every 256 slots be transmitted (or, in different terms, requires a minimum inter-cell spacing of 255 slots). A PCR of a first CBR VC (CBR1) to the destination port “i” requires that CBR1 transmits every 500 slots. The PCR of a second CBR VC (CBR2) requires that that VC transmits every 1000 slots. However, the scheduling of both of these shaped VCs must honor the port transmit rate. In the example, it is further assumed that a first CBR1 cell transmit is scheduled for slot 0 (indicated by reference numeral “161”) and a second one for slot 500 (indicated by reference number “162”) at time t0. Also assumed is that a first cell transmit on CBR2 is scheduled for slot 1000 (reference number “163”) at time t1. The spacing between the schedules for any of these cell transmits is greater than the minimum port inter-cell spacing (255 slots) and is therefore allowable. Now consider that a new cell is to be scheduled for CBR1 at time t2. That cell transmit cannot occupy slot 1001 because it would violate the required port rate inter-cell spacing. Thus, the earliest next slot that can be occupied by CB1 is slot 1256 (indicated by the reference number “164”).


During scheduling on the unshaped wheel 75, the scheduler determines a slot 165 pointed to by the current slot pointer or index (pointer 166) on the shaped wheel and adds to that slot number at least an offset based on the minimum inter-cell gap or spacing, which is 255 in the running example, or offset 167.



FIG. 10 illustrates an exemplary port table 66 for port “i” of the running example. As discussed earlier, the port table 66 includes entries 168 for each schedule type, entry 168a for the must-send schedule type, entry 168b for the could-send schedule type and entry 168c for the unshaped schedule type. Each entry includes a field 169a for indicating the last VC/cell transmission scheduled on the port and a second field 169b for indicating the port inter-cell gap. The scheduler 52 reads the entry of the appropriate schedule type for this VC to determine the last VC/cell transmission scheduled on this port and computes the next available slot based on the contents of the field 169a of that entry, the previous slot scheduled for this VC and the port inter-cell gap value. Because the port inter-cell gap value is the same for each of the entries, it could be stored in a single location. Storing it in each of the entries as illustrated, however, minimizes the number of reads performed by the scheduler 52. Thus, when looking to schedule CBR1 at t2, the scheduler 52 determines that, based solely on the PCR, the next slot should be 1000, that the last cell scheduled for this port was scheduled for slot 1000 and, given the inter-cell spacing required by the port transmit rate, the next earliest slot is slot 1256.


The shaping process 54 selects VCs for transmission. It iterates over slots in the wheels, examines wheel slots/entries, and determines how the slots will be used to transmit data.


Referring to FIG. 11, the shaper/transmit process 54 reads 170 the shaped wheel 74 for the next slot to be sent. The process 54 determines 172 if the next slot entry is empty. If the process 54 determines 172 that the slot entry is not empty, the process determines 178 if a VC index is present in the must-send field. If the process determines, at 178, that a VC index is present in the could-send field only, the process 54 issues 180 a transmit command. If, at 178, it is determined that a VC index is present in the must-send field and it is further determined, at 182, that no VC index is present in the could-send field, the process 54 issues a transmit command 180 to transmit the corresponding cell. If, however, at 182, the process 54 determines that a must-send and could-send VC index are both present in that slot, the process 54 sends a message to the scheduler 52 to re-schedule the could-send VC index. The process 54 then issues 180 a transmit command to transmit the corresponding cell associated with the must-send VC. The process 54 determines 186 if port flow control is asserted. If it is, the process 54 moves 187 the VC index to the first chance queue. After the process 54 has moved the VC index to the first chance queue, or if (at 186) port flow control is determined to be de-asserted, the process 54 sends 188 a message to the scheduler (via the message queue) to schedule a next cell on that port (whose flow-control was de-asserted). If a valid schedule (VC index) is present, the process 54 issues 194 that VC for transmit and proceeds to 188.


Thus, the unshaped wheel 75 advances only when it has a cell to transmit. The shaped wheel 74 advances in all cases (that is, whether or not it has a cell to transmit).


The shaper/transmit process 54 reconverts the scheduled slot time to an actual hardware cycle time so that the cell is transmitted as close to the desired time (traffic management contracted time) as possible.


As discussed earlier, the scheduling/shaping algorithms can be implemented in a multiprocessor, multi-threaded architecture such as the Intel® IXP™ 1200. In one such embodiment, for example, and as shown in FIG. 12, microengines (ME) 200a and 200b each perform TM4.1 functions. Each ME 200 supports four threads, which are used to execute two schedulers and two shaper-transmit functions. That is, ME 200a includes schedulers 202a and 202b, and ME 200b includes schedulers 202c and 202d. The ME 200a includes shaper-transmit functions 204a and 204b, and ME 200b includes shaper-transmit functions 206a and 206b.



FIG. 13 shows a third ME 200c dedicated to the downstream receive process 50 (2 threads) and the two ME's 200a, 200b for the downstream TM4.1 scheduling, shaping and transmit functions (4 threads each). Scheduler and shaper-transmit threads are paired, for example, and as shown, thread pairs 210a, 210b, 210c and 210d. Such pairs 210 operate on a distinct shaped and unshaped wheel. For example, pair 210a operates on shaped wheel 212a and unshaped wheel 214a, pair 210b operates on shaped wheel 212b and unshaped wheel 214b, and so forth. This partitioning of the workload removes the need for mutual exclusion that would have been necessary if all the threads dedicated to perform scheduling/shaping/transmitting were not bound to process a sub-set of all DSL ports in the system. In this scheme, the ports are uniquely mapped to one of the four wheels, which means that all shaped or unshaped VCs belonging to a given port are assigned to one of shaped wheels [00-11]/unshaped wheels [00-11]. In this embodiment, there are four message queues (represented by arrows 216a-216d). They are mapped on a one-to-one basis from the message-producing receive threads to the message-consuming scheduler threads.


As discussed above, the scheduling of the SAR 34 is performed on an as-needed basis. The must-send/could-send slot scheme allows a CBR VC to be scheduled after a VBR VC on the shaped wheel, with the CBR taking priority. It also minimizes additional reads should the VBR schedule be stored in a separate wheel. The first chance queue allows a displaced VBR scheduled VC to be sent at the earliest opportunity for a port. The scheduling of unshaped VCs in a relative time wheel eliminates searching for a port that has data, and assures the port rate is not exceeded by maintaining that back-to-back cells are separated by an inter-cell minimum gap.


In another embodiment, as will be described with reference to FIGS. 14 through 18, the SAR device could maintain, and, consequently, the scheduling and shaping mechanisms could be implemented to use, a single VC control structure to manage schedules for both shaped and unshaped traffic. Such a structure would therefore replace the two VC control structures, that is, the VC control structure 74 for shaped traffic and the VC control structure 75 for unshaped traffic, discussed so far.


Referring to FIG. 14, a SAR that supports a single wheel, indicated as SAR 34′, is shown. The SAR 34′, like the SAR 34 of FIG. 4 described earlier, includes processes and control structures for a concurrent shaped and unshaped traffic scheduling system. The processes include the receive process 50, a scheduler process 52′ and a shaper/transmit process 54′. The control structures include the receive control structures 56, the shaper/transmit control structures 58 and a scheduler control structure 59′.


The scheduler control structures 59′ include the scheduler message queue 72, as well as a VC control structure 220. In the illustrated embodiment, the VC control structure 220 is implemented as a calendar queue (“wheel”).


The VC wheel 220 hold current schedules. More specifically, the VC wheel 220 is used to schedule both shaped and unshaped traffic. The wheel 220 is implemented as an array of time slots, including slots 222, and the slots 222 correspond to the maximum transmit rate of the network processor. Each slot represents a time slot in which an ATM cell can be transmitted. The number of slots in the wheel is a function of aggregate port bandwidth. Cell transmit rate refers to the spacing between cell transmits to the network by the shaper/transmit process 54′. The wheel 220 is operated in absolute time. It steps every n cycles regardless of whether there are any cells to be transmitted.


A VC index associated with a virtual connection is stored in a particular one of the slots 222 during scheduling. The VC may have a traffic parameter that requires it to be serviced at least at a predetermined rate. For example, a CBR VC must conform to a PCR specified for that VC. An rt-VBR must conform to PCR, SCR and Maximum Burst Size (MBS) parameters specified for that VC. Both CBR and rt-VBR will need to conform to the maximum cell transfer delay (maxCTD) as a measure of service quality. Cell Delay Variable T (CDVT) is used as a measure of time to compensate for jitter introduced due to the scheduling inefficiency.


The VC is scheduled into the wheel 220 with sufficient spacing for transmission with sufficient frequency to ensure that the transmission rate conforms to both the VC cell transmit rate and the port transmit rate.


The slots 222 of the wheel 220 each reference VCs from two grades of service rates for shaped traffic, as well as unshaped VCs. FIG. 15 illustrates the format of the slot 222, which includes a must-send field 224 corresponding to a first service rate (“must send” service rate) grade and a could-send field 226 corresponding to a second service rate (“could send” service rate) grade. These fields are equivalent to 78, 79 in FIG. 5 that reference virtual circuits characterized by the “must send” and “could send” grades of service rate, respectively. A “must-send” grade indicates VCs satisfying PCR for CBR VCs or SCR for VBR VCs. The “could-send” grade indicates VCs being opportunistic as in the case of rt-VBR VCs satisfying PCR, but of a lower priority than must-send. A third field, unshaped (or “Best Effort”) field 228, is used to schedule the unshaped traffic. When the “Best Effort” field 228 and at least one of the other two fields 224, 226 store scheduling information, the scheduling information in the Best Effort field 228 results in a re-schedule message being sent by the shaper 54′ to the scheduler 52′, as will be described. Thus, virtual circuits are selected for transmission from the Best Effort field 228 when must-send and could-send virtual VCs, which have a higher priority, have not been scheduled in the same slot. Thus, the Best Effort field 228 provides rate control for VCs that are prioritized behind VCs referenced by must-send 224 and could-send fields 226 in a given slot.


In one implementation, the slot is organized as three longwords (32 bits). Two longwords are used to hold the contents of fields 224 and 226 respectively. The other longword is used to hold the Best Effort information of the Best Effort field 228. Each longword has the capability to store the port number associated with the scheduled VC in a port number information field 229. If more than one of the fields 224, 226, and 228 are populated in a given slot and the VC selected for transmission is determined to be flow controlled, the port numbers could enable the shaper process 54′ to determine in an efficient manner that another VC can be selected for transmission if the port numbers indicate that that VC and the originally selected VC are associated with different ports.


Returning to FIG. 14, the port tables 66 each contain information used by the scheduler 52′ in determining schedules. Each port table 66 contains entries for a given port. The port table 66 is the same as was described earlier with reference to FIGS. 4 and 10.


The shaping/transmit process 54′ is a process that manages the contention of multiple VCs, having various service rates, for transmission. The shaping/transmit process 54′ iterates over the slots of the wheel 220 to select VCs for transmission. In general, the shaping/transmit process 54′determines how time slots 222 and fields within the time slots 222 will be used to transmit cells.


Further details of the wheel 220 will be provided in the description of the operation of the SAR downstream processes 52′ and 54′ to follow.


Referring to FIG. 16, the scheduler process 52′ retrieves 100 from the message queue 72 a next scheduling request in the message queue 72. The scheduler process 52′ determines 102 if the request is for a “shaped” VC, that is, for a VC having a traffic parameter that requires traffic shaping, such as CBR or rt-VBR (or even nrt-VBR, in order to meet SCR contract). If so, the scheduler process 52′ clears 104 the previous schedule if the message originated from the shaper 54′. If the VC is shaped, the scheduler process 52′ reads 106′ traffic parameters (from the VC table 60) and computes a schedule for a next cell on the VC in the wheel 220. The scheduler 52′ sets 108′ the schedule in the wheel 220. The scheduler 52′ updates 109 the appropriate port table and VC table with the most recent scheduling information and returns to 100 to process the next received message.


If, at 102, the VC is determined to be an unshaped VC, and the scheduler 52′ determines 110 that the first chance queue is not empty, the scheduler 52′ de-queues 112 an entry from the first chance queue. If, at 110, the scheduler determines that the first chance queue is empty, the scheduler determines an unshaped VC to be processed based on a WRR weight 114. The first chance queue is checked on packet boundaries (as opposed to cell boundaries).


The scheduler determines 116′ the schedule for the next cell on this VC in the wheel 220. The scheduler 52′ sets 118′ the schedule in the wheel 220 by storing the VC index in the appropriate slot.


Referring to FIG. 17A, the shaped schedule determination 106′ is much the same as described earlier with respect to FIG. 8A. Because a single wheel is used, however, a “N” condition at decision 146 results in the VC index being placed in the unshaped field of the wheel 220 (block 230), instead of being handled under the unshaped scheduling of the separate unshaped wheel of the two wheel implementation (as illustrated in FIG. 8A).


Referring to FIG. 17B, the unshaped schedule determination 116′ is as follows. For a UBR scheduling request, an nrt-VBR scheduling request that could not be handled under shaped traffic scheduling or a first chance queue scheduling request, the scheduler process 52′ determines 150 the earliest slot time this port could be transmitted by performing 152 a lookup of port information in the ports table 66 to find the last time a cell was transmitted on this port, and adding 154 to that last time slot an offset corresponding to a minimum inter-cell gap (which is the minimum number of slot times between transmits to this port). The scheduler process 52′ determines 157 a slot corresponding to the next unshaped VC time-slot plus the offset. The process 52′ performs 158 a range search in the wheel 220 to find the earliest open slot after that time (that is, the unshaped VC time-slot plus the offset), and places 240 the VC index in the unshaped field of that earliest open slot in the wheel 220.


Referring to FIG. 18, the shaper/transmit process 54′ reads 270 the wheel 220 for the next slot 222 to be sent. The process 54′ determines 276 if a VC index is present in the must-send field. If, at 276, it is determined that a VC index is present in the must-send field and it is further determined, at 278, that no VC index is present in the could-send field, and, at 280, that no VC index is present in the Best Effort field, the process 54′ determines 282 if port flow control is asserted. If it is, the process 54′ moves 284 the VC index to the first chance queue. After the process 54′ has moved the VC index to the first chance queue, it goes to sleep 286 for the cell transmit time. If, at 282, it is determined that port flow control is not asserted, the process 54′ issues 287 a transmit command to transmit the corresponding cell and sends 288 a message to the scheduler 52′ to scheduler the next cell. After 287 or 288, the process 54′ returns to 270 to read the next wheel entry.


If, at 278 and 280, the process 54′ determines that either a could-send VC index or Best Effort VC index, or both, is present in that slot along with a must-send VC index, the process 54′ sends 290 a re-schedule message to the scheduler 52′ prior to determining if port control is asserted at 282. The re-schedule message informs the scheduler 52′ that the VC corresponding to the VC index in the Best Effort and/or could-send fields is to be re-scheduled.


If, at 276, the process 54′ determines that the must-send field is empty, the process 54′ determines 292 if a could-send VC index is present in the entry. If so, and the process 54′ further determines 294 that a Best Effort VC index is also present in the entry, the process 54′ sends 290 a reschedule message to the scheduler to re-schedule the Best Effort VC and proceeds to 282. Otherwise, if no Best Effort VC is scheduled in the entry, the process 54′ does not send a reschedule message but proceeds directly to 282. If, at 292, the process 54′ determines that no could-send VC index is present in the entry, the process 54′ still checks for a Best Effort VC index in the Best Effort field. If that field contains a VC index, the process 54′ proceeds to 282. If, at 296, it is determined that no Best Effort VC is present, the process 54′ proceeds to 286.


Returning to the multi-threaded processing architecture of FIGS. 12-13, it will be understood that a single wheel such as the wheel 220 described above could be used instead of the two wheel arrangement that is shown. Thus, each of the thread pairs 210 would operate on one wheel as opposed to two separate wheels for shaped and unshaped traffic.


Other embodiments are within the scope of the following claims.

Claims
  • 1. A method comprising: determining first transmit schedules for first cells, second transmit schedules for second cells, and third transmit schedules for third cells based on service rates and maximum port rates;storing the first transmit schedules and the second transmit schedules in a shaped data structure comprising slots, wherein the slots in the shaped data structure comprise a must send field for storing the first transmit schedules and a could send field storing the second transmit schedules;storing the third transmit schedules in an unshaped data structure; andselecting cells for transmission based on the first, second, and third transmit schedules so that the first transmit schedules for the first cells take priority over the second transmit schedules for the second cells and the third transmit schedules for the third cells and the second transmit schedules for the second cells take priority over the third transmit schedules for the third cells,wherein storing the first transmit schedules comprises determining if a service rate associated with a cell is constant bit rate (CBR),if the associated service rate is determined to be CBR, identifying from among the slots in the shaped data structure, an earliest open slot, and entering into the must send field of the earliest open slot a virtual circuit index for the virtual circuit associated with the cell,if the associated service rate is determined not to be CBR, determining if the service rate associated with the cell is real-time variable bit rate (rt-VBR),if the associated service rate is determined to be rt-VBR, determining if an earliest open time slot available for the rt-VBR cell in the shaped data structure is near in time to a latest cell transmit time,if the earliest open time slot available for the rt-VBR cell in the shaped data structure is determined not to be near in time to a latest cell transmit time, entering the virtual circuit index associated with the rt-VBR cell into the unshaped data structure, andif the earliest open time slot available for the rt-VBR cell in the shaped data structure is determined to be near in time to a latest cell transmit time, entering the virtual circuit index associated with the rt-VBR cell into a could-send field of a slot in the shaped data structure.
  • 2. The method of claim 1, further comprising: associating the first cells with shaped virtual circuits that use traffic shaping to ensure service rates; andassociating the second cells with unshaped virtual circuits that do not use traffic shaping to ensure service rates.
  • 3. The method of claim 2, further comprising: providing a shaped data structure for maintaining transmit the first transmit schedules for the first cells and the second transmit schedules for the second cells; andproviding an unshaped data structure for maintaining the third transmit schedules for the third cells.
  • 4. The method of claim 3, wherein: the shaped and unshaped data structures comprise time slots; andthe number of time slots is based on a maximum aggregate port bandwidth.
  • 5. The method of claim 3, further comprising advancing the second data structure only in response to transmission of a cell associated with the second data structure.
  • 6. The method of claim 2, wherein the third cells comprise cells for which unspecified bit rates (UBR) are specified.
  • 7. The method of claim 2, wherein the third cells comprise cells for which non-real-time virtual bit rates (nrt-VBR) are specified.
  • 8. The method of claim 2, further comprising: maintaining the first transmit schedules for the first cells, the second transmit schedule for the second cells, and the third transmit schedules for the third cells in at least one data structure that is partitioned into time slots.
  • 9. The method of claim 8, wherein each slot includes a plurality of fields, the plurality of fields including a must send field and a could send field for time slots associated with shaped virtual circuits, and a best effort field for time slots associated with unshaped virtual circuits.
  • 10. The method of claim 8, wherein, determining first transmit schedules comprises: for each first cell, selecting an earliest available one of the time slots associated with shaped virtual circuits based on an earliest next cell transmit time.
  • 11. The method of claim 8, further comprising: maintaining the third transmit schedules for the third cells in an array of entries each having an associated priority.
  • 12. The method of claim 11, wherein-selecting cells for transmission comprises: reading an entry from the array based on a Weighted Round Robin selection.
  • 13. The method of claim 8, wherein selecting comprises: reading a current slot in the data structure;if the current slot includes an entry, issuing a transmit command to transmit a cell corresponding to the entry.
  • 14. The method of claim 13, further comprising if port flow control is asserted for a port from which the cell corresponding to the entry is to be transmitted, moving the entry to the first chance queue.
  • 15. The method of claim 13, further comprising if port flow control is asserted for a port from which the cell corresponding to the entry is to be transmitted, determining if another one of the fields in the current slot stores an entry associated with a port that is different from the port for which port flow control is asserted, andissuing a command to transmit a cell corresponding to the entry in the other one of the fields.
  • 16. The method of claim 8, wherein determining transmit schedules comprises converting a bandwidth value expressed in bits per second to a time slot.
  • 17. The method of claim 8, wherein: the at least one data structure comprises multiple data structures, each mapping to a different port, andthe determining and the selecting are performed by multiple execution threads and each pair of threads performs the determining and the selecting for a different one of the data structures.
  • 18. The method of claim 1, wherein the first cells comprise cells for which a constant bit rate (CBR) of service is specified.
  • 19. The method of claim 9, wherein the second cells comprise cells for which a real-time variable bit rate (rt-VBR) of service is specified.
  • 20. The method of claim 1, wherein determining comprises: computing for each first cell an earliest next cell transmit time.
  • 21. The method of claim 1, wherein identifying the earliest open slot comprises searching a hierarchical arrangement of bit vectors used to convey slot information.
  • 22. The method of claim 1, further comprising: reading a current slot in the shaped data structure;if the current slot includes an entry in the must send field, issuing a transmit command to transmit a cell corresponding to the entry;if the current slot also includes a second entry in the could send field, moving the second entry to the first chance queue; andif the current slot in the shaped data structure is empty, issuing a transmit command to transmit a cell associated with an entry in a current slot of the unshaped data structure.
  • 23. The method of claim 22, further comprising if port flow control is asserted for the port from which the cell in the current slot of the unshaped data structure is to be transmitted, moving the entry from the current slot of the unshaped data structure to the first chance queue.
  • 24. The method of claim 22, wherein determining further comprises: determining if the first chance queue includes an entry;if the first chance queue is determined to include the entry, dequeueing the entry from the first chance queue and copying the entry to a slot in the unshaped control structure.
  • 25. The method of claim 24, wherein copying the entry to the slot in the unshaped control structure comprises identifying the slot in the unshaped control structure as the earliest cell transmit time slot that is not in conflict with a slot in the shaped control structure that includes an entry.
  • 26. The method of claim 25, wherein identifying the slot in the unshaped control structure further comprises: determining a last time when a cell was transmitted from a port associated with a virtual circuit for transmitting the cell; andadding to the last time an offset corresponding to a minimum inter-cell gap for the port.
  • 27. The method of claim 1, wherein determining transmit schedules comprises performing separate port bandwidth computations for each of the first transmit schedules, the second transmit schedules, and the third transmit schedules.
  • 28. A network data aggregation device having first ports for receiving packets from a service network and transmitting cells associated with the packets from second ports to a service user over a DSL link, comprising: a receiving device to generate requests to schedule the cells for transmission on virtual circuits from the second ports;scheduling data structures including a first data structure comprising a first collection of ordered scheduling slots that each specify a time when an associated cell is scheduled for transmission, wherein each scheduling slot in the first collection comprises a must send field and a could send field and cells associated with the must send field take priority over cells associated with the could send field, anda second data structure comprising a second collection of ordered scheduling slots that each specify a time when an associated cell is scheduled for transmission, wherein cells associated with scheduling slots in the first data structure take priority over cells associated with scheduling slots in the second data structure;a scheduler to process the requests, the scheduler determining, for each request, whether to schedule the cells for transmission on the first data structure or the second data structure and a schedule for transmission of the cells; anda traffic shaper to select a cell for transmission from the first data structure or the second scheduling data structure, wherein selecting the cell reading a current slot in the first data structure,if the current slot includes an entry, issuing a transmit command to transmit a cell corresponding to the entry; andif port flow control is asserted for a port from which the cell corresponding to the entry is to be transmitted, determining if another one of the fields in the current slot of the first data structure stores an entry associated with a port that is different from the port for which port flow control is asserted, and issuing a command to transmit a cell corresponding to the entry in the other one of the fields.
  • 29. The network data aggregation device of claim 28, wherein the second data structure advances only in response to transmission of a cell associated with the second data structure.
  • 30. A method comprising: determining first transmit schedules for first cells, second transmit schedules for second cells, and third transmit schedules for third cells based on service rates and maximum port rates;storing the first transmit schedules and the second transmit schedules in a shaped data structure comprising slots, wherein the slots in the shaped data structure comprise a must send field for storing the first transmit schedules and a could send field storing the second transmit schedules;storing the third transmit schedules in an unshaped data structure; andselecting cells for transmission based on the first, second, and third transmit schedules so that the first transmit schedules for the first cells take priority over the second transmit schedules for the second cells and the third transmit schedules for the third cells and the second transmit schedules for the second cells take priority over the third transmit schedules for the third cells,wherein storing the first transmit schedules comprises determining if a service rate associated with a cell is constant bit rate (CBR),if the associated service rate is determined to be CBR, identifying from among the slots in the shaped data structure, an earliest open slot, and entering into the must send field of the earliest open slot a virtual circuit index for the virtual circuit associated with the cell, wherein identifying the earliest open slot comprises searching a hierarchical arrangement of bit vectors used to convey slot information.
  • 31. A method comprising: determining first transmit schedules for first cells, second transmit schedules for second cells, and third transmit schedules for third cells based on service rates and maximum port rates;storing the first transmit schedules and the second transmit schedules in a shaped data structure comprising slots, wherein the slots in the shaped data structure comprise a must send field for storing the first transmit schedules and a could send field storing the second transmit schedules;storing the third transmit schedules in an unshaped data structure; andselecting cells for transmission based on the first, second, and third transmit schedules so that the first transmit schedules for the first cells take priority over the second transmit schedules for the second cells and the third transmit schedules for the third cells and the second transmit schedules for the second cells take priority over the third transmit schedules for the third cells,wherein selecting cells comprises reading a current slot in the shaped data structure,if the current slot includes an entry in the must send field, issuing a transmit command to transmit a cell corresponding to the entry,if the current slot also includes a second entry in the could send field, moving the second entry to the first chance queue, andif the current slot in the shaped data structure is empty, issuing a transmit command to transmit a cell associated with an entry in a current slot of the unshaped data structure; andwherein determining transmit schedules comprises determining if the first chance queue includes an entry, andif the first chance queue is determined to include the entry, dequeueing the entry from the first chance queue and copying the entry to a slot in the unshaped control structure.
  • 32. The method of claim 31, wherein copying the entry to the slot in the unshaped control structure comprises identifying the slot in the unshaped control structure as the earliest cell transmit time slot that is not in conflict with a slot in the shaped control structure that includes an entry.
  • 33. The method of claim 32, wherein identifying the slot in the unshaped control structure further comprises: determining a last time when a cell was transmitted from a port associated with a virtual circuit for transmitting the cell; andadding to the last time an offset corresponding to a minimum inter-cell gap for the port.
  • 34. The method of claim 31, further comprising: associating the first cells and the second cells with shaped virtual circuits that use traffic shaping to ensure service rates; andassociating the third cells with unshaped virtual circuits that do not use traffic shaping to ensure service rates.
  • 35. A method comprising: associating first cells with shaped virtual circuits that use traffic shaping to ensure service rates;associating second cells with unshaped virtual circuits that do not use traffic shaping to ensure service rates;determining first transmit schedules for the first cells, second transmit schedules for the second cells, and third transmit schedules for third cells based on service rates and maximum port rates;maintaining the first transmit schedules for the first cells, the second transmit schedule for the second cells, and the third transmit schedules for the third cells in at least one data structure that is partitioned into time slots; andselecting cells for transmission based on the first, second, and third transmit schedules so that the first transmit schedules for the first cells take priority over the second transmit schedules for the second cells and the third transmit schedules for the third cells and the second transmit schedules for the second cells take priority over the third transmit schedules for the third cells, wherein selecting comprises reading a current slot in the data structure,if the current slot includes an entry, issuing a transmit command to transmit a cell corresponding to the entry; andif port flow control is asserted for a port from which the cell corresponding to the entry is to be transmitted, determining if another one of the fields in the current slot stores an entry associated with a port that is different from the port for which port flow control is asserted, and issuing a command to transmit a cell corresponding to the entry in the other one of the fields.
US Referenced Citations (386)
Number Name Date Kind
3373408 Ling Mar 1968 A
3478322 Evans Nov 1969 A
3623001 Kleist et al. Nov 1971 A
3736566 Anderson et al. May 1973 A
3792441 Wymore et al. Feb 1974 A
3889243 Drimak Jun 1975 A
3940745 Sajeva Feb 1976 A
4016548 Law et al. Apr 1977 A
4032899 Jenny et al. Jun 1977 A
4075691 Davis et al. Feb 1978 A
4130890 Adam Dec 1978 A
4400770 Chan et al. Aug 1983 A
4514807 Nogi Apr 1985 A
4523272 Fukunaga et al. Jun 1985 A
4658351 Teng Apr 1987 A
4709347 Kirk Nov 1987 A
4745544 Renner et al. May 1988 A
4788640 Hansen Nov 1988 A
4831358 Ferrio et al. May 1989 A
4858108 Ogawa et al. Aug 1989 A
4866664 Burkhardt, Jr. et al. Sep 1989 A
4890218 Bram Dec 1989 A
4890222 Kirk Dec 1989 A
4991112 Callemyn Feb 1991 A
5115507 Callemyn May 1992 A
5140685 Sipple et al. Aug 1992 A
5142683 Burkhardt, Jr. et al. Aug 1992 A
5155831 Emma et al. Oct 1992 A
5155854 Flynn et al. Oct 1992 A
5168555 Byers et al. Dec 1992 A
5173897 Schrodi et al. Dec 1992 A
5251205 Callon et al. Oct 1993 A
5255239 Taborn et al. Oct 1993 A
5263169 Genusov et al. Nov 1993 A
5313454 Bustini et al. May 1994 A
5347648 Stamm et al. Sep 1994 A
5367678 Lee et al. Nov 1994 A
5379295 Yonehara Jan 1995 A
5379432 Orton et al. Jan 1995 A
5390329 Gaertner et al. Feb 1995 A
5392391 Caulk, Jr. et al. Feb 1995 A
5392411 Ozaki Feb 1995 A
5392412 McKenna Feb 1995 A
5404464 Bennett Apr 1995 A
5404469 Chung Apr 1995 A
5404482 Stamm et al. Apr 1995 A
5432918 Stamm Jul 1995 A
5448702 Garcia, Jr. et al. Sep 1995 A
5450351 Heddes Sep 1995 A
5452437 Richey et al. Sep 1995 A
5452452 Gaetner et al. Sep 1995 A
5459842 Begun et al. Oct 1995 A
5459843 Davis et al. Oct 1995 A
5463625 Yasrebi Oct 1995 A
5467452 Blum et al. Nov 1995 A
5475856 Kogge Dec 1995 A
5485455 Dobbins et al. Jan 1996 A
5515296 Agarwal May 1996 A
5517648 Bertone et al. May 1996 A
5539737 Lo et al. Jul 1996 A
5542070 LeBlanc et al. Jul 1996 A
5542088 Jennings, Jr. et al. Jul 1996 A
5544236 Andruska et al. Aug 1996 A
5550816 Hardwick et al. Aug 1996 A
5557766 Takiguchi et al. Sep 1996 A
5568476 Sherer et al. Oct 1996 A
5568617 Kametani Oct 1996 A
5574922 James Nov 1996 A
5581729 Nishtala et al. Dec 1996 A
5592622 Isfeld et al. Jan 1997 A
5613071 Rankin et al. Mar 1997 A
5613136 Casavant et al. Mar 1997 A
5617327 Duncan Apr 1997 A
5623489 Cotton et al. Apr 1997 A
5627829 Gleeson et al. May 1997 A
5630074 Beltran May 1997 A
5630130 Perotto et al. May 1997 A
5633865 Short May 1997 A
5644623 Gulledge Jul 1997 A
5649110 Ben-Nun et al. Jul 1997 A
5649157 Williams Jul 1997 A
5651002 Van Seters et al. Jul 1997 A
5659687 Kim et al. Aug 1997 A
5680641 Sidman Oct 1997 A
5689566 Nguyen Nov 1997 A
5692126 Templeton et al. Nov 1997 A
5699537 Sharangpani et al. Dec 1997 A
5701434 Nakagawa Dec 1997 A
5717898 Kagan et al. Feb 1998 A
5721870 Matsumoto Feb 1998 A
5724574 Stratigos et al. Mar 1998 A
5740402 Bratt et al. Apr 1998 A
5742587 Zornig et al. Apr 1998 A
5742782 Ito et al. Apr 1998 A
5742822 Motomura Apr 1998 A
5745913 Pattin et al. Apr 1998 A
5751987 Mahant-Shetti et al. May 1998 A
5754764 Davis et al. May 1998 A
5761507 Govett Jun 1998 A
5761522 Hisanaga et al. Jun 1998 A
5764915 Heimsoth et al. Jun 1998 A
5768528 Stumm Jun 1998 A
5781551 Born Jul 1998 A
5781774 Krick Jul 1998 A
5784649 Begur et al. Jul 1998 A
5784712 Byers et al. Jul 1998 A
5796413 Shipp et al. Aug 1998 A
5797043 Lewis et al. Aug 1998 A
5805816 Picazo, Jr. et al. Sep 1998 A
5809235 Sharma et al. Sep 1998 A
5809237 Watts et al. Sep 1998 A
5809530 Samra et al. Sep 1998 A
5812868 Moyer et al. Sep 1998 A
5828746 Ardon Oct 1998 A
5828863 Barrett et al. Oct 1998 A
5828881 Wang Oct 1998 A
5828901 O'Toole et al. Oct 1998 A
5832215 Kato et al. Nov 1998 A
5835755 Stellwagen, Jr. Nov 1998 A
5838988 Panwar et al. Nov 1998 A
5850399 Ganmukhi et al. Dec 1998 A
5850530 Chen et al. Dec 1998 A
5854922 Gravenstein et al. Dec 1998 A
5857188 Douglas Jan 1999 A
5860138 Engebretsen et al. Jan 1999 A
5860158 Pai et al. Jan 1999 A
5886992 Raatikainen et al. Mar 1999 A
5887134 Ebrahim Mar 1999 A
5890208 Kwon Mar 1999 A
5892979 Shiraki et al. Apr 1999 A
5898686 Virgile Apr 1999 A
5898701 Johnson Apr 1999 A
5905876 Pawlowski et al. May 1999 A
5905889 Wilhelm, Jr. May 1999 A
5909686 Muller et al. Jun 1999 A
5915123 Mirsky et al. Jun 1999 A
5918235 Kirshenbaum et al. Jun 1999 A
5933627 Parady et al. Aug 1999 A
5937187 Kosche et al. Aug 1999 A
5938736 Muller et al. Aug 1999 A
5940612 Brady et al. Aug 1999 A
5940866 Chisholm et al. Aug 1999 A
5946487 Dangelo Aug 1999 A
5948081 Foster Sep 1999 A
5953336 Moore et al. Sep 1999 A
5958031 Kim Sep 1999 A
5961628 Nguyen et al. Oct 1999 A
5968169 Pickett Oct 1999 A
5970013 Fischer et al. Oct 1999 A
5974518 Nogradi Oct 1999 A
5978838 Mohamed et al. Nov 1999 A
5983274 Hyder et al. Nov 1999 A
5995513 Harrand et al. Nov 1999 A
6012151 Mano Jan 2000 A
6014729 Lannan et al. Jan 2000 A
6023742 Ebeling et al. Feb 2000 A
6032190 Bremer et al. Feb 2000 A
6032218 Lewin et al. Feb 2000 A
6047002 Hartmann et al. Apr 2000 A
6049867 Eickemeyer et al. Apr 2000 A
6058168 Braband May 2000 A
6061710 Eickemeyer et al. May 2000 A
6067300 Baumert et al. May 2000 A
6067585 Hoang May 2000 A
6070231 Ottinger May 2000 A
6072781 Feeney et al. Jun 2000 A
6073215 Snyder Jun 2000 A
6079008 Clery, III Jun 2000 A
6085215 Ramakrishnan et al. Jul 2000 A
6085248 Sambamurthy et al. Jul 2000 A
6085294 Van Doren et al. Jul 2000 A
6092127 Tausheck Jul 2000 A
6092158 Harriman et al. Jul 2000 A
6104700 Haddock et al. Aug 2000 A
6111886 Stewart Aug 2000 A
6112016 MacWilliams et al. Aug 2000 A
6122251 Shinohara Sep 2000 A
6128669 Moriarty et al. Oct 2000 A
6134665 Klein et al. Oct 2000 A
6141677 Hanif et al. Oct 2000 A
6141689 Yasrebi Oct 2000 A
6141765 Sherman Oct 2000 A
6144669 Williams et al. Nov 2000 A
6145054 Mehrotra et al. Nov 2000 A
6157955 Narad et al. Dec 2000 A
6160562 Chin et al. Dec 2000 A
6170051 Dowling Jan 2001 B1
6175927 Cromer et al. Jan 2001 B1
6182177 Harriman Jan 2001 B1
6195676 Spix et al. Feb 2001 B1
6199133 Schnell Mar 2001 B1
6201807 Prasanna Mar 2001 B1
6212542 Kahle et al. Apr 2001 B1
6212544 Borkenhagen et al. Apr 2001 B1
6212604 Tremblay Apr 2001 B1
6212611 Nizar et al. Apr 2001 B1
6216220 Hwang Apr 2001 B1
6223207 Lucovsky et al. Apr 2001 B1
6223238 Meyer et al. Apr 2001 B1
6223243 Ueda et al. Apr 2001 B1
6223274 Catthoor et al. Apr 2001 B1
6223279 Nishimura et al. Apr 2001 B1
6247025 Bacon Jun 2001 B1
6256713 Audityan et al. Jul 2001 B1
6269391 Gillespie Jul 2001 B1
6272109 Pei et al. Aug 2001 B1
6272520 Sharangpani et al. Aug 2001 B1
6272616 Fernando et al. Aug 2001 B1
6275505 O'Loughlin et al. Aug 2001 B1
6279113 Vaidya Aug 2001 B1
6282169 Kiremidjian Aug 2001 B1
6286083 Chin et al. Sep 2001 B1
6289011 Seo et al. Sep 2001 B1
6295600 Parady Sep 2001 B1
6298370 Tang et al. Oct 2001 B1
6307789 Wolrich et al. Oct 2001 B1
6311261 Chamdani et al. Oct 2001 B1
6320861 Adam et al. Nov 2001 B1
6324624 Wolrich et al. Nov 2001 B1
6335932 Kadambi et al. Jan 2002 B2
6338078 Chang et al. Jan 2002 B1
6345334 Nakagawa et al. Feb 2002 B1
6347344 Baker et al. Feb 2002 B1
6349331 Andra et al. Feb 2002 B1
6356962 Kasper et al. Mar 2002 B1
6359911 Movshovich et al. Mar 2002 B1
6360262 Guenthner et al. Mar 2002 B1
6360277 Ruckley et al. Mar 2002 B1
6366998 Mohamed Apr 2002 B1
6373848 Allison et al. Apr 2002 B1
6377998 Noll et al. Apr 2002 B2
6389031 Chao et al. May 2002 B1
6389449 Nemirovsky et al. May 2002 B1
6393026 Irwin May 2002 B1
6393483 Latif et al. May 2002 B1
6404737 Novick et al. Jun 2002 B1
6415338 Habot Jul 2002 B1
6418488 Chilton et al. Jul 2002 B1
6424657 Voit et al. Jul 2002 B1
6424659 Viswanadham et al. Jul 2002 B2
6426940 Seo et al. Jul 2002 B1
6426943 Spinney et al. Jul 2002 B1
6427196 Adiletta et al. Jul 2002 B1
6430626 Witkowski et al. Aug 2002 B1
6434145 Opsasnick et al. Aug 2002 B1
6438132 Vincent et al. Aug 2002 B1
6438134 Chow et al. Aug 2002 B1
6448812 Bacigalupo Sep 2002 B1
6453404 Bereznyi et al. Sep 2002 B1
6457015 Eastham Sep 2002 B1
6463035 Moore Oct 2002 B1
6463072 Wolrich et al. Oct 2002 B1
6463480 Kikuchi et al. Oct 2002 B2
6463527 Vishkin Oct 2002 B1
6466898 Chan Oct 2002 B1
6477562 Nemirovsky et al. Nov 2002 B2
6484224 Robins et al. Nov 2002 B1
6501731 Chong et al. Dec 2002 B1
6507862 Joy et al. Jan 2003 B1
6522188 Poole Feb 2003 B1
6526451 Kasper Feb 2003 B2
6526452 Petersen et al. Feb 2003 B1
6529983 Marshall et al. Mar 2003 B1
6532509 Wolrich et al. Mar 2003 B1
6535878 Guedalia et al. Mar 2003 B1
6552826 Adler et al. Apr 2003 B2
6553406 Berger et al. Apr 2003 B1
6560667 Wolrich et al. May 2003 B1
6570850 Gutierrez et al. May 2003 B1
6577542 Wolrich et al. Jun 2003 B2
6584522 Wolrich et al. Jun 2003 B1
6587906 Wolrich et al. Jul 2003 B2
6604125 Belkin Aug 2003 B1
6606704 Adiletta et al. Aug 2003 B1
6625654 Wolrich et al. Sep 2003 B1
6628668 Hutzli et al. Sep 2003 B1
6629147 Grow Sep 2003 B1
6629236 Aipperspach et al. Sep 2003 B1
6631422 Althaus et al. Oct 2003 B1
6631430 Wolrich et al. Oct 2003 B1
6631462 Wolrich et al. Oct 2003 B1
6657963 Paquette et al. Dec 2003 B1
6658551 Berenbaum et al. Dec 2003 B1
6661774 Lauffenburger et al. Dec 2003 B1
6661794 Wolrich et al. Dec 2003 B1
6665699 Hunter et al. Dec 2003 B1
6665755 Modelski et al. Dec 2003 B2
6667920 Wolrich et al. Dec 2003 B2
6668317 Bernstein et al. Dec 2003 B1
6671827 Guilford et al. Dec 2003 B2
6675190 Schabernack et al. Jan 2004 B1
6675192 Emer et al. Jan 2004 B2
6678746 Russell et al. Jan 2004 B1
6680933 Cheesman et al. Jan 2004 B1
6681300 Wolrich et al. Jan 2004 B2
6684326 Cromer et al. Jan 2004 B1
6694380 Wolrich et al. Feb 2004 B1
6697379 Jacquet et al. Feb 2004 B1
6721325 Duckering et al. Apr 2004 B1
6724767 Chong et al. Apr 2004 B1
6728845 Adiletta Apr 2004 B2
6732187 Lougheed et al. May 2004 B1
6754211 Brown Jun 2004 B1
6754222 Joung et al. Jun 2004 B1
6768717 Reynolds et al. Jul 2004 B1
6775284 Calvignac et al. Aug 2004 B1
6792488 Wolrich et al. Sep 2004 B2
6798744 Loewen et al. Sep 2004 B1
6826615 Barrall et al. Nov 2004 B2
6834053 Stacey et al. Dec 2004 B1
6850521 Kadambi et al. Feb 2005 B1
6856622 Calamvokis et al. Feb 2005 B1
6873618 Weaver Mar 2005 B1
6876561 Wolrich et al. Apr 2005 B2
6895457 Wolrich et al. May 2005 B2
6925637 Thomas et al. Aug 2005 B2
6931641 Davis et al. Aug 2005 B1
6934780 Modelski et al. Aug 2005 B2
6934951 Wilkinson et al. Aug 2005 B2
6938147 Joy et al. Aug 2005 B1
6944850 Hooper et al. Sep 2005 B2
6947425 Hooper et al. Sep 2005 B1
6952824 Hooper et al. Oct 2005 B1
6959002 Wynne et al. Oct 2005 B2
6967963 Houh et al. Nov 2005 B1
6976095 Wolrich et al. Dec 2005 B1
6981077 Modelski et al. Dec 2005 B2
6983350 Adiletta et al. Jan 2006 B1
7006495 Hooper Feb 2006 B2
7065569 Teraslinna Jun 2006 B2
7069548 Kushlis Jun 2006 B2
7096277 Hooper Aug 2006 B2
7100102 Hooper et al. Aug 2006 B2
7111072 Matthews et al. Sep 2006 B1
7111296 Wolrich et al. Sep 2006 B2
7124196 Hooper Oct 2006 B2
7126952 Hooper et al. Oct 2006 B2
7149786 Bohringer et al. Dec 2006 B1
7181742 Hooper Feb 2007 B2
7191321 Bernstein et al. Mar 2007 B2
7206858 Hooper et al. Apr 2007 B2
7248584 Hooper Jul 2007 B2
7305500 Adiletta et al. Dec 2007 B2
7328289 Wolrich et al. Feb 2008 B2
7352769 Hooper et al. Apr 2008 B2
20010023487 Kawamoto Sep 2001 A1
20020027448 Bacigalupo Mar 2002 A1
20020041520 Wolrich et al. Apr 2002 A1
20020075878 Lee et al. Jun 2002 A1
20020118692 Oberman et al. Aug 2002 A1
20020150047 Knight et al. Oct 2002 A1
20020181194 Ho et al. Dec 2002 A1
20030043803 Hooper Mar 2003 A1
20030067934 Hooper et al. Apr 2003 A1
20030086434 Kloth May 2003 A1
20030105901 Wolrich et al. Jun 2003 A1
20030105917 Ostler et al. Jun 2003 A1
20030110166 Wolrich et al. Jun 2003 A1
20030115347 Wolrich et al. Jun 2003 A1
20030115426 Rosenbluth et al. Jun 2003 A1
20030131198 Wolrich et al. Jul 2003 A1
20030140196 Wolrich et al. Jul 2003 A1
20030145159 Adiletta et al. Jul 2003 A1
20030147409 Wolrich et al. Aug 2003 A1
20030161303 Mehrvar et al. Aug 2003 A1
20030161337 Weinman Aug 2003 A1
20030196012 Wolrich et al. Oct 2003 A1
20030210574 Wolrich et al. Nov 2003 A1
20040039895 Wolrich et al. Feb 2004 A1
20040052269 Hooper et al. Mar 2004 A1
20040054880 Bernstein et al. Mar 2004 A1
20040059828 Hooper et al. Mar 2004 A1
20040071152 Wolrich et al. Apr 2004 A1
20040073728 Wolrich et al. Apr 2004 A1
20040073778 Adiletta et al. Apr 2004 A1
20040085901 Hooper et al. May 2004 A1
20040098496 Wolrich et al. May 2004 A1
20040109369 Wolrich et al. Jun 2004 A1
20040148382 Narad et al. Jul 2004 A1
20040162933 Adletta et al. Aug 2004 A1
20040252686 Hooper et al. Dec 2004 A1
20050033884 Wolrich et al. Feb 2005 A1
20050149665 Wolrich et al. Jul 2005 A1
20060007871 Welin Jan 2006 A1
20060069882 Wheeler et al. Mar 2006 A1
20060156303 Hooper et al. Jul 2006 A1
Foreign Referenced Citations (25)
Number Date Country
0 379 709 Aug 1990 EP
0 464 715 Jan 1992 EP
0 663 678 Jan 1995 EP
0 745 933 Dec 1996 EP
0 773 648 May 1997 EP
0 809 180 Nov 1997 EP
0 959 602 Nov 1999 EP
59-111533 Jun 1984 JP
WO 9415287 Jul 1994 WO
WO 9738372 Oct 1997 WO
WO 9820647 May 1998 WO
WO 0038376 Jun 2000 WO
WO 0056024 Sep 2000 WO
WO 0116718 Mar 2001 WO
WO 0116769 Mar 2001 WO
WO 0116770 Mar 2001 WO
WO 0116782 Mar 2001 WO
WO 0117179 Mar 2001 WO
WO 0131856 May 2001 WO
WO 0148596 Jul 2001 WO
WO 0148606 Jul 2001 WO
WO 0148619 Jul 2001 WO
WO 0150247 Jul 2001 WO
WO 0150679 Jul 2001 WO
WO03030461 Apr 2003 WO
Related Publications (1)
Number Date Country
20030231635 A1 Dec 2003 US