摘要:
An apparatus for and a method of dynamically prioritizing packets over a packet based network. Packets are dynamically prioritized on the basis of their ‘time to live’ in the network as they travel from one network entity to another. Packets are assigned a priority in accordance with how ‘old’ or ‘young’ they are. Packets with a relatively long time left to live are assigned lower priority then those with relatively little time left to live. A time to live (TTL) field is added to the packet as it travels from one network entity to another. The contents of the time to live (TTL) field represents how ‘young’ or ‘old’ the packet is and conveys the time left before the packet is no longer of any use. Each network entity that receives the packet with a TTL field, subtracts from it the time the packet spends passing through that entity. The field decreases as it hops from network entity to entity until it reaches its destination or is discarded.
摘要:
An apparatus for and a method of establishing a connection between a source and destination node using multiple parallel paths. To establish a connection, bandwidth capacity on one or more parallel paths are aggregated and combined to form a route having a bandwidth larger than any single path. A technique similar to inverse multiplexing is used at the source end to split the cell stream into multiple parallel paths. At the destination end, the parallel multiple cell streams are inverse demultiplexed and the multiple cell streams combined into a single cell stream. The parallel routes are established by building parallel VCCs for the same call via the network. The ATM signaling process at the source and destination nodes is modified to accommodate multiple VCCs. In addition, the hardware at each source and destination node is configured to perform the inverse and inverse demultiplexing. Further, the control software at the source and destination nodes is modified to implement the call handling required of such a multiple VCC call, including setup, tear down, error handling, etc.
摘要:
A system comprising a single sender SMS for forwarding multicast traffic is collocated in the same device as the LEC thus creating an optimal distribution path for multicast traffic. This reduces the latency of transmission of multicast traffic from sender to receivers by eliminating the need to transmit cells from the LEC to the SMS via the network and reassemble cells into frames and segment frames into cells. The SMS functions as a private SMS for exclusive use by the LEC alone. The SMS of the present invention enables a LEC to distribute multicast traffic in a very efficient manner. The LEC communicates with the SMS directly via the operating system internal messaging subsystem or equivalent. The multicast traffic is sent on a P2M connection from the sending LEC via the SMS to all the receiving LECs interested in listening to a given MMAC. In a first embodiment, the LEC internally has knowledge of the existence of the private SMS and is inhibited from issuing a LE_ARP_REQ to find the SMS. The LES is prevented from assigning an LEC to that SMS. In a second embodiment, address and LEC information is predefined for the SMS and propagated to all the SMSs. The LES is directed to permit only a single LEC to be assigned to a SMS preventing the LES from assigning a LEC other than the registered LEC to that SMS.
摘要:
A method of calculating a complex node representation for logical nodes in a hierarchical peer group in a PNNI based ATM network. The summary information for default spokes, exceptions and bypasses is determined in a way that closely represents the underlying metrics associated with the peer group. A list of all border nodes in the peer group is generated and maintained and a matrix of tables is generated, one table for each metric per each class of service. The table is populated by the best value associated with the corresponding metric for a particular pair of border nodes within a particular class of service. Once the table is populated, each element is placed in a group or bin. The bins are generated by dividing the full range of the metric into a plurality of smaller subgroups or bins. The bin having a count greater than a threshold count is selected and 80% of the worst value for that group is used as the default spoke. If no bin exists having at least a threshold count, the number of bins is reduced by one and a new set of subranges is calculated. The elements of the table are placed in the newly divided bins and a scan is performed once again.
摘要:
A method of path restoration in an ATM network which attempts to minimize the loss of cells in the event a node or a link fails. The method is suitable for failures in point to point Switched Virtual Circuits (SVCs) in ATM networks and makes use of the bi-directional properties of point to point SVC calls. The method permits the construction of an ATM network which includes call path redundancy whereby if a node or link fails, another path meeting the requirements of the call (if one exists) will be used on an automatic basis. The alternative or redundant path is placed into service in such a way that the flow of data is substantially constant. The switching of the path occurs with almost no data loss and without the overhead time associated with Q.SAAL based detection and signaling.
摘要:
A method of performing source routing when a node is in the overload state. A node in the overload state cannot perform routing functions in response to a SETUP message for destinations other than its directly connected neighbors. Instead, the node forwards the SETUP request to one of its directly connected neighbors. The neighboring node chosen must be able to support the overload routing feature, the link between the two nodes must be in the FULL state and the node chosen must not itself be in the overload state. The neighboring node chosen to calculate the source route receives a ROUTE REQUEST message encapsulating the information received from the source user. The neighboring node chosen then calculates the source route as if it was the node connected to the source user, i.e., the node in the overload state. The route, once calculated, is sent to the requesting node in the overload state.
摘要:
A method for performing topology database synchronization between two nodes wherein one of the nodes is in an overload state. The node in the overload state looks for a neighboring node directly connected to it that is not in the overload state. After such a node is found, the link to the neighboring node is intentionally dropped and subsequently re-established. This causes the neighboring node to transfer its entire knowledge of the network to the node in the overload state. The node in the overload state than functions to forward the topology database information to its other neighboring node. In this fashion, the portions of the network one either side of the link learn about the other side notwithstanding the fact that one of the nodes is in an overload state. Once the database synchronization process is complete, calls can then be initiated from either side of the network to the other side.
摘要:
Two solutions are provided for optimizing the algorithm used by the local node in calculating the route to a destination node. A first method optimizes the route calculation by associating a port/link information with the PTSEs received by the node. The association is made using the first PTSE to arrive from an originating node. The routing algorithm is then steered to begin routing to a destination using the associated port/link. A second method optimizes the route calculation by utilizing a special PTSE termed a ROUTE.sub.-- PTSE into which is placed the route the PTSE takes upon being flooded from the creating node to the local node. When routing, the local node traverses the DTL already existing in the ROUTE.sub.-- PTSE received from a particular originating node that is the current destination node.