The present invention is directed to systems and methods for implementing improved network architectures, and more specifically to systems and methods for routing internet protocol (IP) packets using modified frame relay protocols.
2. Description of the Related Arts
Recently, the popularity of large “meshed” networks has been increasing. However, large-scale highly-meshed networks can be difficult to implement, maintain, and manage using conventional network technologies.
An example of a conventional mesh configuration is shown in
At the UNI 920, the frame is checked for validity to determine if there is a predefined PVC associated with the DLCI 912. If so, the frame 914 is then forwarded on that PVC through the network along the same path and in the same order as other frames with that DLCI, as depicted in FIG. 2. The layer 2 frame information remains as the packet traverses the frame relay network whether this network is actually implemented as a frame relay network or other network such as an ATM network. The frame is carried to its destination without any further routing decisions being made in the network. The FCS is checked at the egress UNI, and if the frame is not corrupted, it is then output to the UNI associated with the end user.
As is well known in the art,
In conventional frame relay, a layer 2 Q.922 frame carries the layer 3 customer data packet across the network in a permanent virtual circuit (PVC) which is identified by a data link connection identifier (DLCI). Thus, the DLCIs are used by the customer as addresses that select the proper PVC to carry the data to the desired destination. The customer data packet is carried across the network transparently and its contents is never examined by the network.
The conventional meshed frame relay network discussed above has a number of limitations. For example, every time a new end user location is added to the meshed network, a new connection is required to be added to every other end user location. Consequently, all of the routing tables must be updated at every end user location. Thus, a “ripple” effect propagates across the entire network whenever there is a change in the network topology. For large networks with thousands of end user locations, this ripple effect creates a large burden on both the network provider to supply enough permanent virtual circuits (PVCs) and on the network customers in updating all of their routing tables. Further, most routers are limited to peeling with a maximum of 10 other routers which makes this network topology difficult to implement. As networks grow in size, the number of PVCs customers need to manage and map to DLCIs increases. Further complicating the problem is a trend toward increasing “meshedness” of networks, meaning more sites are directly connected to each other. The result is a growth in the number and mesh of PVCs in networks that does not scale well with current network technologies.
A possible solution for handling large meshed networks is to use a virtual private network (VPN) which interconnects end user locations using encrypted traffic sent via “tunneling” over the internet. However, VPNs are not widely supported by internet service providers (ISPs), have erratic information rates, and present a number of security concerns.
Another possible solution is the use of frame relay based switched virtual circuits (SVCs). While PVCs (discussed above) are usually defined on a subscription basis and are analogous to leased lines, SVCs are temporary, defined on an as-needed basis, and are analogous to telephone calls. However, SVCs require continuous communications between all routers in the system to coordinate the SVCs. Further, because the tables mapping IP addresses to SVC addresses are typically manually maintained, SVCs are often impractical for large highly-meshed networks. Security is a major concern for SVC networks where tables are mismanaged or the network is spoofed. Further, frame SVCs are difficult to interwork with asynchronous transfer mode (ATM) SVCs.
None of the above solutions adequately address the growing demand for large mesh networks. Accordingly, there is a need for network architectures which enable implementation of large mesh networks having security, low maintenance costs, efficient operations, and scalability.
Aspects of the present invention solve one or more of the above-stated problems and/or provide improved systems and methods for implementing a network architecture.
A new type of data transport service takes advantage of the existing base of frame relay customer premises equipment (CPE) and customers while offering a new mechanism for providing extensible service features to those customers. In the new service, data link connection identifiers (DLCIs) may be used by the CPE to select among service types, feature sets, and closed user groups (CUGs). The DLCI is used in the layer 2 frame that conveys the user data to the network. The layer 3 user data packet is extracted from the layer 2 frame and the layer 3 address information for the (routable) protocol is used to route the user data packet over a high-performance packet switched network, according to the service class/feature set selected by the DLCI. At the destination, the layer 3 data packet is again enclosed in a layer 2 frame with a DLCI that indicates to which service group it belongs. The frame is then forwarded to the CPE. Use of this technique will allow the existing frame relay CPE to support, over the same physical interface, conventional frame relay service with a range of DLCIs that are linked to logical paths such as permanent virtual circuit (PVCs), as well as a range of DLCIs that are linked to service and/or feature sets. This will allow a robust method for extension of new services to the frame relay installed base, with minimal impact to existing customer equipment.
In some aspects of the invention, frame relay DLCIs are used for selecting among various “service categories.” This differs significantly from conventional frame relay, which uses DLCIs only to select PVCs and/or switched virtual circuits (SVCs). Service categories may include, but are not limited to, communication via the public internet, communication via a local intranet, communication within a closed user group (CUG), communication with an extranet (e.g., a network of trusted suppliers or corporate trading partners), live audio/video transmission, multicasting, telephony over internet protocol (IP), or any combination thereof. Thus, the concept of a frame relay PVC is significantly expanded by aspects of the present invention. For example, the location of an intended network endpoint recipient is not necessarily determined by a DLCI at a sending network endpoint. The DLCI may represent a service category with the intended recipient indicated by an IP address within the frame relay packet. This results in a significant benefit to network customers because, unlike that of conventional frame relay, customers no longer need to update their local DLCI tables each time a network customer with whom they wish to communicate is added or removed from the network. Thus, the customer's burden of network administration is substantially reduced.
In sub-aspects of the invention, some DLCIs may be used to select among service categories (“service category DLCIs”) while in the same network other DLCIs may be used to select conventional PVCs and/or SVCs (“conventional DLCIs”). In other words, conventional frame relay may be mixed with aspects of the present invention within the same network, allowing aspects of the present invention to be incrementally implemented in existing conventional frame relay networks.
In further aspects of the invention, addressing contained in multiple layers (e.g., as defined by the Open System Interconnection model) are compared with each other in a network to determine routing errors. If the addressing in the layers are consistent with each other, then the associated data is routed without interruption. On the other hand, if the addressing in the layers is inconsistent with each other, the associated data may be specially handled. For example, the data may be discarded, sent to a predetermined address, and/or returned to the sender. This address comparison may be applied to the sending address and/or the destination address. An advantage of this multiple layer address comparison is that network security is increased. For instance, problems such as “spoofing,” which is the practice of purposely providing an incorrect sending internet protocol (IP) address, are better controlled by such a method.
In still further aspects of the invention, routing look-up tables within the network are separated such that, for example, each customer, closed user group (CUG), extranet, and/or intranet may have its own private partition and/or separate table. This can provide greater network speed because a router need not scan the entire available address space for all network customers at once. Furthermore, data security is improved because the risk of sending data to a wrong recipient is reduced.
In yet further aspects of the invention, layer 3 and/or layer 4 IP address information is utilized to route the fast packets through the network.
In even further aspects of the invention, new network traffic management techniques and measurements are defined. For example, in some traffic-management aspects of the invention, committed delivery rates (CDRs) may be assigned to one or more UNIs. A CDR is the average minimum data rate that is guaranteed to be delivered to a given UNI when sufficient traffic is being sent to the UNI. In further traffic-management aspects of the invention, a destination rate share (DRS) is assigned to one or more UNIs. The DRS may be used to determine the share of traffic that a given UNI may send through the network. If several UNIs are simultaneously offering to send traffic to the same destination UNI, then each sending UNI's share of the network may be determined by its own DRS and the DRSs of the other sending UNIs.
These and other features of the invention will be apparent upon consideration of the following detailed description of preferred embodiments. Although the invention has been defined using the appended claims, these claims are exemplary in that the invention is intended to include the elements and steps described herein in any combination or subcombination. Accordingly, there are any number of alternative combinations for defining the invention, which incorporate one or more elements from the specification, including the description, claims, and drawings, in various combinations or subcombinations. It will be apparent to those skilled in network theory and design, in light of the present specification that alternate combinations of aspects of the invention, either alone or in combination with one or more elements or steps defined herein, may be utilized as modifications or alterations of the invention or as part of the invention. It is intended that the written description of the invention contained herein covers all such modifications and alterations.
The foregoing summary of the invention, as well as the following detailed description of preferred embodiments, is better understood when read in conjunction with the accompanying drawings. For the purpose of illustration, embodiments showing one or more aspects of the invention are shown in the drawings. These exemplary embodiments, however, are not intended to limit the invention solely thereto.
Exemplary embodiments of the present invention allow the large installed base of frame relay customer premises equipment (CPE) to be maintained by using the same interface in a different way to deliver new sets of services and features to the customer. For example, the data link connection identifier (DLCI) known from the frame relay protocol may be used to select among several virtual private networks with differing address spaces, feature sets, and/or conventional permanent virtual circuits (PVCs).
Referring to
The network architecture of the WAN 1 allows the number of IP switches to increase as customers are transitioned to the new service. For example, as shown in
In some embodiments, the WAN 1 may include a combination of conventional network switches and/or routers 501 in addition to IP switches 502. On the other hand, every switch in the SPN 500 may be an IP switch 502. Alternatively, the WAN 1 may contain only a single IP switch 502. The IP switches 502 may be variously configured to include a suitable multi-layer routing switch such as a Tag Switch from Cisco. Multi layer routing switches may also be utilized from vendors such as Ipsilon, Toshiba, IBM, and/or Telecom. IP switches are currently being developed to replace endpoint routers so that customer premise equipment (e.g., Ethernet local area network (LAN) equipment) can connect directly to an asynchronous transfer mode (ATM) network. Aspects of the present invention propose using IP switches in a different manner to maintain the huge installed base of customer premise equipment while avoiding the limitations of previous systems. Accordingly, the IP switches in accordance with embodiments of the invention are disposed within the SPN 500 and modified to provide suitable routing and interface functions.
In some embodiments of the invention, an IP switch 502 acts as a multi-layer switch. For example, an IP switch 502 may receive ATM cells, switching some or all of the ATM cells based upon the content of IP packets encapsulated within the ATM cells. Thus, IP addressing may be used by an IP switch 502 to determine an ATM virtual path for sending ATM cells to a destination UNI 402. In further embodiments of the invention, higher layer addressing (e.g., transmission control program (TCP) logical ports at layer 4) may also be used by an IP switch 502 as a basis for switching ATM cells to provide a path through the SPN 500. In still further embodiments of the invention, an IP switch 502 uses IP addresses and/or TCP logical ports to make quality of service (QOS) decisions.
In further embodiments of the invention, an endpoint router 919 may encapsulate one or more IP packets in frame relay frame 914. In this event, the frame relay frames may be transmitted between an endpoint router 919 and a corresponding UNI 402 and/or IP switch 502. The endpoint router 919 encapsulates IP packets 950 with frame relay frames 914. Further, the endpoint router 919 may set the DLCI of each frame relay frame 914 according to a particular service category (if a service category DLCI is used) that the user has selected. For example, the various service categories may include the public internet, communication via a local intranet, communication within a closed user group (CUG), communication with an extranet (e.g., a network of trusted suppliers or corporate trading partners), live audio/video transmission, multicasting, telephony over internet protocol (IP), or any combination thereof. Thus, the concept of a frame relay PVC is significantly expanded by aspects of the present invention. For example, the location of an intended network endpoint recipient is not necessarily determined by a DLCI at the endpoint routers 919.
In further embodiments of the invention, a UNI 402 may receive frame relay frames 914 from an endpoint router 919 and divides and encapsulates frame relay frames into, for example, smaller fixed-length ATM cells. The UNI 402 may further translates the frame relay DLCI into an ATM address (e.g., a virtual path identifier/virtual channel identifier (VPI/VCI)). There are various methods which may be used to translate DLCIs to VPI/VCIs. For example, the Network Interworking Standard as defined in Implementation Agreement #5 of the Frame Relay Forum, and/or the Service Interworking Standard as defined in Implementation Agreement #8 of the Frame Relay Forum may be utilized. An ATM address associated with a service category DLCIs defines an ATM virtual path via network routers to an IP switch 502. Thus, ATM data associated with a service category DLCI is ultimately sent to an IP switch 502. However, ATM data associated with a conventional DLCI may or may not be sent to an IP switch 502 and may be routed through the network without passing through an IP switch 502. Thus, both translated IP data and conventional PVC data may be present in the SPN 500 and/or WAN 1.
In further embodiments of the invention, a UNI 402 and/or a network router 501 may send data to a predetermined IP switch 502. In even further embodiments of the invention, a UNI 402 and/or a network router 501 selects which IP switch 502 to send data to based upon an algorithm (e.g., based on network traffic flows, the relative distance/location of an IP switch 502, the type of data being sent, and/or the service category selected). In still further embodiments of the invention, a UNI 402, network router 501, and/or IP switch 502 may send the same data to more than one UNI 402, network router 501, and/or IP switch 502, depending upon, for example, a service category or categories.
In further embodiments of the invention, a UNI 402, an IP switch 502, and/or a network router 501 compares an ATM VPI/VCI 303-305 address with an IP address for the same data. If the two addresses are inconsistent, then the ATM cell may be discarded, sent to a pre-determined address, and/or returned to the sending location. In even further embodiments of the invention, layers above the layer 3 IP layer may be used for address and/or service class generation/discrimination. For example layer 4 of the ISO addressing scheme and/or other application level data may be utilized to determine particular service classes.
Referring specifically to
At the UNI A 402, the switching based on the DLCI takes place. The packet may be routed to IP switch 502 in the center of the SPN 500. The first packet has its layer 2 frame stripped off as it is forwarded to VPN A. Within VPN A, the layer 3 address is now used to make routing decisions that send the packet to its destination UNI. Thus, no PVC need be established ahead of time for that path, and conventional routing methods and protocols can be used, as well as newer “short-cut” routing techniques. This permits VPN A to provide a high “mesh” of connectivity between sites without requiring the customer to configure and maintain the “mesh” as a large number of PVCs. The packet forwarded to VPN B is treated similarly except that VPN B is implemented with a lower service class (e.g. higher delay). Finally, the packet forwarded to PVC D has its layer 2 frame intact and passes through the network as a conventional frame relay frame. This allows customers to maintain their current connectivity of PVCs for their high utilization traffic paths, but still have a high mesh of connectivity through various VPNs.
Thus, in various aspects of the invention, the WAN 1 and/or SPN 500 may be any suitable fast packet network receiving frame relay data packets having user data in a user data field. The WAN 1 and/or SPN 500 then switches packets using one or more IP switches 502 responsive to the user data. The user data may be used to discriminate between a plurality of different service categories based on the user data. Routing over the WAN 1 and/or SPN 500 may be responsive to at least one of the different service categories including discriminating based on multicast data. Additionally, the WAN may generate a fast packet address field responsive to the IP packet data and route the IP packet through the fast packet network responsive to the fast packet address field. Further, layer 4 information may be utilized to determine the quality of service. The quality of service may include, for example, one or more of the following: an information rate, priority information, delay, loss, availability, etc. Security features may be implemented in the IP switch such that routing tables for each of the users are separated based on one or more service categories and/or users. In this manner the system is made more secure. Still further, the system may receive a plurality of frame relay packets over a permanent virtual circuit (PVC) at a first node in an asynchronous transfer mode (ATM) network, generate an ATM address based on a data field other than a data link connection identifier (DLCI) within the frame relay packets, and then route the packets through the ATM network based on the ATM address. The routing of packets may be responsive to one of a plurality of service categories. The system may provide separate routing tables within an ATM switch for each of a plurality of different service categories. The different service categories may be determined using internet protocol (IP) data within a data field of a packet passed by the ATM switch. In a fast packet network, a fast packet switch may compare an address of a fast packet with a layer 3 internet protocol (IP) address contained within the fast packet and determining whether the fast packet address is consistent with the layer 3 IP address. Further, for security, hardware circuits and/or software may be provided for examination of a sending address or a destination address. Further, packets may be discarded responsive to an inconsistency being detected. The WAN 1 may include customer premises equipment (CPE) and an asynchronous transfer mode (ATM) switch coupled to and receiving from the CPE frame relay data packets, and including address translation circuitry for translating data link connection identifiers from the frame relay data packets into ATM addresses representing a plurality of virtual private networks based on a predetermined service category associated with a particular DLCI; or the WAN 1 may include customer premises equipment (CPE) and a fast packet switch coupled to the CPE via one or more permanent virtual circuits and receiving frame relay data packets, the fast packet switch including address translation circuitry for translating user data within the frame relay data packets into fast packet addresses.
In embodiments of the present invention, data security is enhanced in that data may be easily and accurately checked for inconsistencies at the destination. This is because these embodiments operate using both layer 2 and layer 3 addressing information. As an illustration, assume that a frame relay frame having a DLCI indicating VPN 1 (e.g., the corporate intranet) arrives in a network switch/router with an IP address of a particular corporate accounting system. However, since the VPN processor has available to it the DLCI of the packet (and thus information about the source of the packet), the VPN processor may cross-check the DLCI with the source IP address in the packet to see if the source IP address is in the range known from the originating site. Thus, the problem associated with the spoofing of IP source addresses may be significantly reduced.
In still further embodiments of the invention, a UNI 402, an IP switch 502, and/or a network router 501 has separate and/or partitioned routing look-up tables. Routing tables may be separated based upon service category, customer or user, and/or UNI 402. Thus, in some embodiments, within a VPN, a customer or user may have an individual routing table containing the customer's IP network address information. In some embodiments, since the DLCI identifies the source of a frame, the DLCI may be used as an index by an IP switch, network router, and/or UNI for determining which routing table to use. This allows customers to have their routing table size and speed governed by their individual address space, thus speeding the routing process considerably. The use of separate routing tables also provides an added measure of security, as packets cannot be mis-routed due to errors or updates in routing information related to other customers.
In some embodiments, a router has multiple data space images paired with a single instruction space image of the routing software. Thus, for example, as packets arrive from Customer A, the routing software uses the data image for a routing table associated with Customer A to make a routing decision. In further embodiments, a single software image is used, but additional indices corresponding to customers are added to the routing tables. In still further embodiments, instruction execution and data handling are processed separately. This may be accomplished by the use of separate processors, one for instruction execution and one for data handling.
As the service grows, the functionality for making the VPN routing decisions may be migrated closer to the customer and may eventually be present in every switching node, as shown in FIG. 13. This can reduce the backhaul previously needed to get to the router/switch processing nodes and allow for optimal routing using all the nodes in the WAN 1 and/or SPN 500. In the exemplary embodiment of
In some embodiments, an ATM core network may be used for data transport, and frame relay interfaces may be used to interface with the customer. An exemplary embodiment using an ATM core network is shown in FIG. 14. In this embodiment, switch 2003 and router 2004 are connected to Customer Site A via switch 2000 and a frame relay/ATM conversion unit 2001. Switch 2019 and router 2018 are connected to Customer Site B via switch 2005 and frame relay/ATM conversion unit 2006. Switch 2012 and router 2010 are connected to Customer Site C via switch 2015 and frame relay/ATM conversion unit 2014. Switch 2013 and router 2011 are connected to Customer Site D via switch 2016 and frame relay/ATM conversion unit 2017 Assuming that Customer Site A is sending frames 2020 destined for Customer Site B, incoming layer 2 frames may be encapsulated for transport into ATM cells at switch 2000 according to, for example, the Network Interworking Standard. Such encapsulation may, for example, occur in conversion unit 2001, external to ATM switch 2000. ATM cells 2002 may be sent down an ATM PVC designated for VPN #1 processing. ATM cells 2002 may then be forwarded to switch 2003 and router/switch 2004 (which may be attached to switch 2003), where the ATM cells may be reassembled to obtain the layer 3 packet information for routing within VPN #1. Once the address information has been extracted from the layer 3 packet, the packet may be segmented again into ATM cells 2009 that can be transferred through the network. After being sent through router/switch 2018, 2019, ATM cells 2008 may be converted from cells to frames at the external conversion unit 2006 and switch 2005. Customer Site B would then receive frame relay frames 2021. Thus, an extra segmentation and reassembly (SAR) cycle may be required when using an ATM backbone with a core of router/switches. However, if the VPN processing is pushed outward to edge switches, the extra SAR cycle may be eliminated. The extra SAR cycle may be eliminated because conversion from frame relay frames to ATM cells may take place in the same unit where VPN routing decisions are made.
Traffic management may be variously configured in the WAN 1 and/or the SPN 500. For example, from a customer's viewpoint, the WAN 1 and/or SPN 500 may ensure certain traffic rates for the customer.
In a network, data traffic may be sent from multiple sources to a single destination (multi-point to point). A “source” is defined as the user transmitting side of, for example, a UNI (i.e., the customer side of a UNL, which may be external to a WAN and/or to a VPN), a switch, an IP switch, and/or a router at or near the edge of a network. A “destination” is defined as the user receiving side of, for example, a UNI (i.e., the network side of a UNI), a switch, an IP switch, and/or router at or near the edge of a network. Traffic that is offered for transmission by a source to the WAN 1 and/or SPN 500 is defined as the “offered traffic.” Further, a “VPN source” and a “VPN destination” are a source and destination, respectively, which belong to a given VPN. A given UNI, if simultaneously sending and receiving, may simultaneously be a source and a destination. Furthermore, a given source may offer data traffic to multiple destinations, and a given destination may receive traffic from multiple sources.
In some embodiments of the invention, a committed delivery rate (CDR) may be assigned to each destination. The CDR is defined as the average number of bits per second that the WAN 1 and/or SPN 500 is committed to deliver to a given destination, wherein the average may be calculated over a fixed or variable time window. Although the word “average” will be used throughout, any other similar algorithm may be used, such as the mean, the sum, or any other useful measurement and/or statistical calculation. If the average rate of aggregate offered traffic (i.e. the total offered traffic) from one or more sources to a given destination is greater than or equal to a given destination's assigned CDR, then the WAN 1 and/or SPN 500 may guarantee to deliver traffic addressed to the destination at an average rate equal to or greater than the CDR. If the average rate of aggregate offered traffic is less than the CDR, then the WAN 1 and/or SPN 500 may deliver the offered traffic to the destination at the aggregate offered traffic rate (100% of the offered traffic). To clarify, let the number of active sources sending traffic to a particular destination be N. As will be described in more detail below, a source may be considered “active” during a given time window if the source offers at least a threshold amount of traffic to the WAN 1 and/or SPN 500 within the given time window. Let Si be the average offered traffic rate, or “offering rate,” from each source i toward a single given destination, wherein i=[1, . . . , N]. Further, let R be the total rate at which the WAN 1 and/or SPN 500 actually delivers traffic to the destination. Then, the WAN 1 and/or SPN 500 will provide that:
If the aggregate offered traffic rate ΣSi does not exceed the CDR, then 100% of the offered traffic from each source i may be delivered through the WAN 1 and/or SPN 500 to the destination. However, when the aggregate offered traffic rate ΣSi exceeds the CDR, the WAN 1 and/or SPN 500 may have the discretion to throttle back or reduce the delivery rate of offered traffic from some or all of the active sources. Delivery may be reduced by an amount such that the total rate of traffic delivery R to a destination is at least equal to the destination's assigned CDR. In the situation where R is reduced by the network, it may be desirable to enforce “fairness” for each source. In other words, it may be desirable to ensure that no single source may be allowed to be greedy by obtaining a disproportionate amount of network bandwidth at the expense of other sources.
To provide for fair access to the WAN 1 and/or SPN 500, in some embodiments each source is assigned at least one destination rate share (DRS). A DRS is a rate, measured in data units per unit of time (e.g., bits per second). A separate DRS and/or set of DRSs may be assigned to each source and/or group of sources. Further, the DRS or DRSs for a given source may depend upon the destination or set of destinations that the source may send traffic to. In other words, each source i may be assigned at least one DRSi corresponding to the DRS assigned between a source i and a given destination (or set of destinations). Thus, in some embodiments, the DRS may be different for a given source depending upon which destination it is sending traffic to. In further embodiments, the DRS for a given source may be constant, independent of the destination.
When a source i offers traffic at an average rate Si exceeding the CDR of a particular destination, fairness may be achieved by ensuring that each source is allowed to transmit at least its fair share of the CDR. A source's “fair share” of the destination's CDR is defined as the source's DRS divided by the aggregate DRS of active sources transmitting to a given destination. Thus, each active source's fair share, ri, of the CDR may be defined as the following:
The actual network transmission rate, Ti, that the WAN 1 and/or SPN 500 chooses as conforming traffic guaranteed to be delivered from each source to a given destination may satisfy the following:
Thus, in these embodiments the WAN 1 and/or SPN 500 may enforce fairness by reducing one or more sources' actual network transmission rate Ti at most from Si to ri, ensuring that each source obtains its fair share of the CDR. In some embodiments, to achieve a rate of at least CDR, the WAN 1 and/or SPN 500 may at its discretion transmit traffic from a given active source or sources at a rate greater than ri. In fact, the WAN 1 and/or SPN 500 may at its discretion transmit data from a source i at any rate between and including the fair share rate ri and the full offered rate Si.
If Si is greater than Ti, a source may be considered by the WAN 1 and/or SPN 500 to be a “non-conforming source.” Conformance of a source may be calculated using a standard leaky bucket algorithm with variable drain rate. Thus, the conforming “depth” of a “bucket” would be DRSi*W. In other words, the maximum number of bits that will be sent to the network within a given time window of length W is equal to DRSi*W. During a given time window of length W, the “drain rate” of the “bucket” is equal to Ti which is calculated during previous time windows. Thus, data packets inserted “above” the conforming bucket depth may be labeled as “non-conforming.” In other words, for a given time window, data packets in excess of the total DRSi*W number of bits may be labeled as non-conforming data packets. In such a situation, some or all of the source data packets equal to the difference between Si and Ti may be labeled as non-conforming data packets, and some or all of the non-conforming data packets may be dropped.
This does not mean that data cannot be of a bursty or rate-variant nature. Although exemplary embodiments have been described as operating using average rates, real-time rates may vary within any given time window of length W. Thus, a certain amount of burstiness of data is allowable. This maximum burst size is the maximum number of bits that the WAN 1 and/or SPN 500 guarantees to transfer during a time window W.
In further embodiments of the invention, the WAN 1 and/or SPN 500 may provide forward congestion notification to a destination. For example, the WAN 1 and/or SPN 500 may provide a layer 2 binary indication that the CDR is being exceeded by using the frame relay forward explicit congestion notification (FECN) bit and/or a layer 3 message that indicates a non-conforming source and optionally contains rate information for that source (e.g. the actual transmitted rate Ti and/or the excess rate Si−Ti). Furthermore, in some embodiments, multiple non-conforming sources might be listed, even within a single message. In these forward congestion notification embodiments, conformance may be measured at the network side of a destination. In some embodiments, a forward congestion notification may be provided to a given destination when the offering rate Si of an active source offering to send traffic to the destination exceeds the actual network transmission rate Ti for the source.
Non-conforming packets that cannot be transmitted on the egress port of a source may be dropped with or without any indication to the source or destination. To measure conformance of a source, the amount of excess bandwidth available to the sources for transmission to the destination should be determined. To calculate the excess bandwidth, let Wj be the jth time window. The excess bandwidth above the fair share bandwidth may be computed as
wherein M is defined as the number of possible sources from which a destination may receive traffic, and wherein B is defined as a predetermined reference rate. The introduction of reference rate B effectively reserves network bandwidth for an inactive source, thus ensuring that a previously inactive source that becomes active can send at least some traffic through the network during time period Wj. Specifically, the WAN 1 and/or SPN 500 may ensure that each source's Ti is guaranteed to be at least a minimum reference rate B. In this situation, a source is considered active during Wj if more than B*Wj units of data (e.g., bits) are received during Wj. It is desirable to define B to be relatively small as compared with Si so as to retain as much excess bandwidth as possible, yet still large enough to ensure network availability to a non-active source (non-sending source with respect to a given destination) that may later become active with respect to a given destination. In some embodiments, B may be a predetermined rate. In further embodiments, B may vary with time, with the number of inactive sources, with the number of active sources, and/or with the total number of sources. In still further embodiments, B for a source may depend upon a priority classification assigned to the source. In still further embodiments, when a previously inactive source becomes active, the priority assigned to the source may depend upon the content of the data (e.g., data payload, DLCI, and/or address) offered to be sent. Thus, B may not be the same for each source.
Once the excess bandwidth is determined, the maximum conforming actual network transmission rates, Ti, may be calculated. To accomplish this, Ti for each source may first be set by default to min(ri,Si). Then the excess bandwidth, E, may be distributed among some or all of the sources that are actively transmitting to the given destination, thus adjusting or raising Ti for these sources. In some embodiments, the excess bandwidth may be uniformly distributed among some or all of the active sources. In further embodiments, the excess bandwidth may be distributed among these sources according to source priority, data priority, and/or DLCL.
In further embodiments, the WAN 1 and/or SPN 500 may provide backward congestion notification to a non-conforming source. Such notification may be in the form of a layer 2 and/or a layer 3 message indicating a destination(s) for which the non-conforming source is exceeding Ti and/or rate information for the non-conforming source (e.g. the actual transmitted rate Ti and/or the excess rate Si−Ti). However, a layer 2 notification by itself may not be preferable, since a source receiving only a layer 2 notification may not be able to distinguish between destinations to which the source is conforming and those for which it is not conforming. In some embodiments, a backward congestion notification may be provided to a given active source when the offering rate Si of the source exceeds the actual network transmission rate Ti for the source. In further embodiments, a user at a non-conforming source may be notified of congestion information, the assigned CDR, DRSi, ri, and/or Ti. In still further embodiments, it may be up to a user to decide how to act upon a congestion notification. In even further embodiments, a source may reduce its offering rate Si in response to receiving a backward congestion notification.
In these backward congestion notification embodiments, conformance may be implemented at the network side of the source UNI. In such embodiments, feedback concerning the destination delivery rate may be required from the destination. The feedback may also contain information regarding the rate share of the active sources at the destination and/or the CDR divided by the aggregate rate.
While exemplary systems and methods embodying the present invention are shown by way of example, it will be understood, of course, that the invention is not limited to these embodiments. Modifications may be made by those skilled in the art, particularly in light of the foregoing teachings. For example, each of the elements of the aforementioned embodiments may be utilized alone or in combination with elements of the other embodiments. Additionally, although a meshed network is shown in the examples, the inventions defined by the appended claims is not necessarily so limited. Further, the IP switch may convert from any higher level IP like protocol to any fast-packet like protocol and is not necessarily limited to the ATM/IP example provided above. Furthermore, examples of steps that may be performed in the implementation of various aspects of the invention are described in conjunction with the example of a physical embodiment as illustrated in FIG. 5. However, steps in implementing the method of the invention are not limited thereto. Additionally, although the examples have been derived using the IP protocol for layer three, it will be apparent to those skilled in the art that any version of IP or IPX could be used as the layer three routeable protocol. Furthermore, it will be understood that while some examples of implementations are discussed above regarding IP and ATM protocols, the invention is not intended to be limited solely thereto, and other protocols that are compatible with aspects of the invention may be used as well.
The present application is a continuation of application Ser. No. 08/988,424, filed Dec. 10, 1997, which claims priority from provisional application Ser. No. 60/051,564 entitled “FRAME RELAY SWITCHED DATA SERVICE” filed on Jul. 3, 1997, herein incorporated by reference, and is related by subject matter to concurrently filed U.S. patent application Ser. No. 08/988,159, entitled “FRAME RELAY SWITCHED DATA SERVICE” by the same inventors.
Number | Name | Date | Kind |
---|---|---|---|
4018993 | Edström | Apr 1977 | A |
4135156 | Sanders, Jr. et al. | Jan 1979 | A |
4181886 | Cooperman | Jan 1980 | A |
4285064 | Hodge | Aug 1981 | A |
4301533 | Acampora et al. | Nov 1981 | A |
4307461 | Brickman et al. | Dec 1981 | A |
4319353 | Alvarez, III et al. | Mar 1982 | A |
4320504 | Alvarez, III et al. | Mar 1982 | A |
4328543 | Brickman et al. | May 1982 | A |
4330857 | Alvarez, III et al. | May 1982 | A |
4332026 | Alvarez, III et al. | May 1982 | A |
4346470 | Alvarez, III et al. | Aug 1982 | A |
4377793 | Horna | Mar 1983 | A |
4381562 | Acampora | Apr 1983 | A |
4468727 | Carrison et al. | Aug 1984 | A |
4485478 | Takada | Nov 1984 | A |
4507781 | Alvarez, III et al. | Mar 1985 | A |
4516156 | Fabris et al. | May 1985 | A |
4521879 | Gueldenpfennig et al. | Jun 1985 | A |
4536874 | Stoffel et al. | Aug 1985 | A |
4587651 | Nelson et al. | May 1986 | A |
4597077 | Nelson et al. | Jun 1986 | A |
4599647 | George et al. | Jul 1986 | A |
4642806 | Hewitt et al. | Feb 1987 | A |
4644534 | Sperlich | Feb 1987 | A |
4665516 | Middleton et al. | May 1987 | A |
4672602 | Hargrave et al. | Jun 1987 | A |
4679191 | Nelson et al. | Jul 1987 | A |
4686698 | Tompkins et al. | Aug 1987 | A |
4701907 | Collins | Oct 1987 | A |
4703479 | Ikeda | Oct 1987 | A |
4706080 | Sincoskie | Nov 1987 | A |
4706081 | Hart et al. | Nov 1987 | A |
4710917 | Tompkins et al. | Dec 1987 | A |
4713806 | Oberlander et al. | Dec 1987 | A |
4720850 | Oberlander et al. | Jan 1988 | A |
4720873 | Goodman et al. | Jan 1988 | A |
4730305 | Acampora et al. | Mar 1988 | A |
4739510 | Jeffers et al. | Apr 1988 | A |
4751732 | Kamitake | Jun 1988 | A |
4769833 | Farleigh et al. | Sep 1988 | A |
4775974 | Kobayashi | Oct 1988 | A |
4777657 | Gillaspie | Oct 1988 | A |
4792948 | Hangen et al. | Dec 1988 | A |
4797589 | Collins | Jan 1989 | A |
4797878 | Armstrong | Jan 1989 | A |
4811338 | Haruyama et al. | Mar 1989 | A |
4813039 | Yoshihiro | Mar 1989 | A |
4847829 | Tompkins et al. | Jul 1989 | A |
4847892 | Shelley | Jul 1989 | A |
4858225 | deSantis | Aug 1989 | A |
4868811 | Suzuki | Sep 1989 | A |
4876737 | Woodworth et al. | Oct 1989 | A |
4879711 | Rosen | Nov 1989 | A |
4888769 | Deal | Dec 1989 | A |
4890280 | Hirata | Dec 1989 | A |
4894822 | Buhrke et al. | Jan 1990 | A |
4916691 | Goodman | Apr 1990 | A |
4933936 | Rasmussen et al. | Jun 1990 | A |
4937825 | Ballard et al. | Jun 1990 | A |
RE33426 | Sugimoto et al. | Nov 1990 | E |
4970721 | Aczel et al. | Nov 1990 | A |
4993015 | Fite, Jr. | Feb 1991 | A |
4999829 | Fite, Jr. et al. | Mar 1991 | A |
5014267 | Tompkins et al. | May 1991 | A |
5016243 | Fite, Jr. | May 1991 | A |
5018133 | Tsukakoshi et al. | May 1991 | A |
5019910 | Filmer | May 1991 | A |
5023869 | Grover et al. | Jun 1991 | A |
5023873 | Stevenson et al. | Jun 1991 | A |
5027400 | Baji et al. | Jun 1991 | A |
5029163 | Chao et al. | Jul 1991 | A |
5058138 | Figura et al. | Oct 1991 | A |
5065397 | Shiobara | Nov 1991 | A |
5079764 | Orita et al. | Jan 1992 | A |
5081621 | Sugimoto | Jan 1992 | A |
5086426 | Tsukakoshi et al. | Feb 1992 | A |
5090011 | Fukuta et al. | Feb 1992 | A |
5095480 | Fenner | Mar 1992 | A |
5101267 | Morales-Garza | Mar 1992 | A |
5115433 | Baran et al. | May 1992 | A |
5121396 | Irvin et al. | Jun 1992 | A |
5130978 | Mobasser | Jul 1992 | A |
5153876 | Sin | Oct 1992 | A |
5177604 | Martinez | Jan 1993 | A |
5184347 | Farwell et al. | Feb 1993 | A |
5191582 | Upp | Mar 1993 | A |
5195090 | Bolliger et al. | Mar 1993 | A |
5195091 | Farwell et al. | Mar 1993 | A |
5208811 | Kashio et al. | May 1993 | A |
5223923 | Morales-Garza | Jun 1993 | A |
5224099 | Corbalis et al. | Jun 1993 | A |
5229990 | Teraslinna | Jul 1993 | A |
5229994 | Balzano et al. | Jul 1993 | A |
5237564 | Lespagnol et al. | Aug 1993 | A |
5239545 | Buchholz | Aug 1993 | A |
5251207 | Abensour et al. | Oct 1993 | A |
5260936 | Bardet et al. | Nov 1993 | A |
5274643 | Fisk | Dec 1993 | A |
5276907 | Meidan | Jan 1994 | A |
5278892 | Bolliger et al. | Jan 1994 | A |
5280481 | Chang et al. | Jan 1994 | A |
5287535 | Sakagawa et al. | Feb 1994 | A |
5291479 | Vaziri et al. | Mar 1994 | A |
5291492 | Andrews et al. | Mar 1994 | A |
5295133 | Jurkevich | Mar 1994 | A |
5295137 | Jurkevich | Mar 1994 | A |
5301273 | Konishi | Apr 1994 | A |
5303042 | Lewis et al. | Apr 1994 | A |
5303237 | Bergman et al. | Apr 1994 | A |
5305308 | English et al. | Apr 1994 | A |
5307348 | Buchholz et al. | Apr 1994 | A |
5309440 | Nakamura et al. | May 1994 | A |
5313454 | Bustini et al. | May 1994 | A |
5313457 | Hostetter et al. | May 1994 | A |
5315591 | Brent et al. | May 1994 | A |
5319705 | Halter et al. | Jun 1994 | A |
5319707 | Wasilewski et al. | Jun 1994 | A |
5325421 | Hou et al. | Jun 1994 | A |
5327421 | Hiller et al. | Jul 1994 | A |
5331631 | Teraslinna | Jul 1994 | A |
5335276 | Thompson et al. | Aug 1994 | A |
5337044 | Folger et al. | Aug 1994 | A |
5343465 | Khalil | Aug 1994 | A |
5345445 | Hiller et al. | Sep 1994 | A |
5345446 | Hiller et al. | Sep 1994 | A |
5351146 | Chan et al. | Sep 1994 | A |
5355362 | Gorshe et al. | Oct 1994 | A |
5361259 | Hunt et al. | Nov 1994 | A |
5363369 | Hemmady et al. | Nov 1994 | A |
5365265 | Shibata et al. | Nov 1994 | A |
5365524 | Hiller et al. | Nov 1994 | A |
5373550 | Campbell et al. | Dec 1994 | A |
5381408 | Brent et al. | Jan 1995 | A |
5387941 | Montgomery et al. | Feb 1995 | A |
5390169 | Bernstein | Feb 1995 | A |
5390175 | Hiller et al. | Feb 1995 | A |
5392277 | Bernstein | Feb 1995 | A |
5392402 | Robrock, II | Feb 1995 | A |
5394561 | Freeburg | Feb 1995 | A |
5400329 | Tokura et al. | Mar 1995 | A |
5400401 | Wasilewski et al. | Mar 1995 | A |
5402418 | Shibata et al. | Mar 1995 | A |
5402478 | Hluchyj et al. | Mar 1995 | A |
5404505 | Levinson | Apr 1995 | A |
5408237 | Patterson et al. | Apr 1995 | A |
5408464 | Jurkevich | Apr 1995 | A |
5412647 | Giroux et al. | May 1995 | A |
5412660 | Chen et al. | May 1995 | A |
5416770 | Stoner et al. | May 1995 | A |
5420857 | Jurkevich | May 1995 | A |
5420866 | Wasilewski | May 1995 | A |
5422882 | Hiller et al. | Jun 1995 | A |
5423002 | Hart | Jun 1995 | A |
5425029 | Hluchyj et al. | Jun 1995 | A |
5426635 | Mitra et al. | Jun 1995 | A |
5426636 | Hiller et al. | Jun 1995 | A |
5426640 | Hluchyj et al. | Jun 1995 | A |
5426773 | Chabanet et al. | Jun 1995 | A |
5428607 | Hiller et al. | Jun 1995 | A |
5428608 | Freeman et al. | Jun 1995 | A |
5428616 | Field et al. | Jun 1995 | A |
5428629 | Gutman et al. | Jun 1995 | A |
5434850 | Fielding et al. | Jul 1995 | A |
5434856 | Huang | Jul 1995 | A |
5436891 | Grossman et al. | Jul 1995 | A |
5438565 | Hemmady et al. | Aug 1995 | A |
5446726 | Rostoker et al. | Aug 1995 | A |
5446730 | Lee et al. | Aug 1995 | A |
5448564 | Thor | Sep 1995 | A |
5450394 | Gruber et al. | Sep 1995 | A |
5450395 | Hostetter et al. | Sep 1995 | A |
5452293 | Wilkinson et al. | Sep 1995 | A |
5457808 | Osawa et al. | Oct 1995 | A |
5457811 | Lemson | Oct 1995 | A |
5463620 | Sriram | Oct 1995 | A |
5463777 | Bialkowski et al. | Oct 1995 | A |
5469468 | Schilling | Nov 1995 | A |
5469495 | Beveridge | Nov 1995 | A |
5471473 | Tejima | Nov 1995 | A |
5473612 | Dehner, Jr. et al. | Dec 1995 | A |
5481561 | Fang | Jan 1996 | A |
5481609 | Cohen et al. | Jan 1996 | A |
5490252 | Macera et al. | Feb 1996 | A |
5491695 | Meagher et al. | Feb 1996 | A |
5495607 | Pisello et al. | Feb 1996 | A |
5497375 | Hluchyj et al. | Mar 1996 | A |
5506904 | Sheldrick et al. | Apr 1996 | A |
5517502 | Bestler et al. | May 1996 | A |
5519699 | Ohsawa | May 1996 | A |
5526404 | Wiedeman et al. | Jun 1996 | A |
5526489 | Nilakantan et al. | Jun 1996 | A |
5539884 | Robrock, II | Jul 1996 | A |
5565910 | Rowse et al. | Oct 1996 | A |
5566173 | Steinbrecher | Oct 1996 | A |
5579370 | Fukushima et al. | Nov 1996 | A |
5587743 | Montgomery et al. | Dec 1996 | A |
5590133 | Billstrom et al. | Dec 1996 | A |
5594782 | Zicker et al. | Jan 1997 | A |
5628011 | Ahamed et al. | May 1997 | A |
5689553 | Ahuja et al. | Nov 1997 | A |
5727065 | Dillon | Mar 1998 | A |
5743530 | Sklad et al. | Apr 1998 | A |
5754530 | Awdeh et al. | May 1998 | A |
5796727 | Harrison et al. | Aug 1998 | A |
5796944 | Hill et al. | Aug 1998 | A |
5805599 | Mishra et al. | Sep 1998 | A |
5812545 | Liebowitz et al. | Sep 1998 | A |
5852721 | Dillon et al. | Dec 1998 | A |
5909443 | Fichou et al. | Jun 1999 | A |
5914956 | Williams | Jun 1999 | A |
5991268 | Awdeh et al. | Nov 1999 | A |
5995511 | Zhou et al. | Nov 1999 | A |
6023453 | Ruutu et al. | Feb 2000 | A |
Number | Date | Country |
---|---|---|
2202542 | Oct 1997 | CA |
0 324 363 | Jul 1989 | EP |
0 535 890 | Apr 1993 | EP |
0719012 | Jun 1996 | EP |
0800294 | Oct 1997 | EP |
WO 9619060 | Jun 1996 | WO |
Number | Date | Country | |
---|---|---|---|
60051564 | Jul 1997 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 08988424 | Dec 1990 | US |
Child | 09654616 | US |