Multiplex communications – Data flow congestion prevention or control – Control of data admission to the network
Reexamination Certificate
1998-05-28
2003-04-01
Jung, Min (Department: 2731)
Multiplex communications
Data flow congestion prevention or control
Control of data admission to the network
C370S395700, C370S463000, C370S468000
Reexamination Certificate
active
06542463
ABSTRACT:
BACKGROUND OF THE INVENTION
In current communication networks designed according to the asynchronous transfer mode (ATM), in particular subscriber terminal networks and feeder networks (ACCESS networks, e.g. passive optical networks or fiber coax networks), the available network resources are partitioned to network terminal units connected to the communication network, or are partitioned to the communication terminal apparatuses connected to the network terminal units. The access of the network terminal units or communication terminal devices to the transmission medium used in common (e.g. light waveguides or radio channels) is controlled by an algorithm that is normally realized by hardware, given a high transmission speed and a plurality of connected communication terminal devices, the algorithm granting access authorization to a network terminal unit requesting communication network resources.
In already-installed subscriber terminal networks, for each network terminal unit a timer or counter is realized, for example in a network control unit connected with each network terminal unit, the timer being started in the context of connection setups introduced by the network terminal units. A timer runs out or the counter reaches a predetermined value, as soon as a new data packet is filled with useful data in a relevant network terminal unit and is intermediately stored for data transmission in a buffer memory likewise realized in the network terminal unit. The dimensioning of the counter or the time until the running out of a timer occurs dependent on the data transmission rates respectively reserved during the connection setups. A signaling signal that indicates the running out of a timer represents a request for a transmission authorization on the transmission medium used in common. The request is individual to the network terminal unit and is stored sequentially in a memory (e.g., a FIFO memory) that is realized in the network control unit and is used in common by all the network terminal units. The stored transmission authorizations are read out from this memory and are transmitted, as the actual transmission authorization, to the network terminal units or communication terminal apparatuses, which thus receive access to the transmission medium. Two timers can, for example, run out at the same time, i.e. two isochronous access authorizations would have to be stored and controlled. Since, however, two isochronous accesses are not possible, one of the two access authorizations is delayed until the current access is terminated. This delaying is designated “cell delay variation.” Given running out of several timers at the same time, the value of the cell delay variation is correspondingly increased.
In addition, it has already been proposed that the transmission authorizations requested by the network terminal units be acquired and stored directly by means of a central control unit, and that the requested transmission authorizations be uniformly distributed on the transmission medium used in common.
The methods described above for the assigning of transmission authorizations can be realized only for a limited number of network terminal units or communication terminal apparatuses. In addition, the delay times in which the network terminal units receive the access to the transmission medium comprise statistical fluctuations or a differing cell delay variation. The value of the cell delay variation depends on the data transmission rates of all connections set up, and becomes very large when the overall data transmission rate of the transmission medium used in common approximates the value 100%. The large delay times cause an overflow of buffer memories, and thus an extreme increase in the error rate in the data transmission, which results in a break off of set-up connections, In accordance with protocol.
SUMMARY OF THE INVENTION
It is an object of the invention to optimize the use of predetermined switching-oriented and transmission-oriented resources in a packet-oriented communication network.
According to the apparatus and method of the present invention, accesses of network terminal units to predetermined resources of a packet-oriented communication network are controlled. Annularly chained memories are allocated to the network terminal units, the chained memories being sampled cyclically and which represent predetermined partial communication network resources. In the context of connection setups introduced by the network terminal units. requested partial communication network resources are assigned to the network terminal units by entering access authorizations into the annularly chained memories. Given a sampling of an annularly chained memory, access is currently granted to the assigned partial communication network resources corresponding to the entered access authorization of the relevant network terminal unit.
An important aspect of the method of the invention for controlling accesses of network terminal units to predetermined resources of a packet-oriented communication network is in the allocation of annularly chained memories to the network terminal units, whereby the successive memories, which can be sampled cyclically, represent predetermined partial communication network resources. In the context of connection setups introduced by the network terminal units, requested partial communication network resources are allocated to the network terminal units by entering access authorizations into the annularly chained memories. When an annularly chained memory is sampled, access is currently granted to the allocated partial communication network resources, corresponding to the entered access authorization of the relevant network terminal unit.
The essential advantage of the method of the invention is that the predetermined resources of a packet-oriented communication network can be arbitrarily distributed to many network terminal units arranged therein, whereby the packet-oriented communication networks, e.g. packet networks such as ATM networks, however also comprise local packet-oriented communication networks (e.g., bus networks, ring networks or star networks). In addition, these predetermined resources (e.g., a transmission rate of 622 Mbit/s or 2.6 Gbit/s) can be assigned to a single network terminal unit as needed.
Advantageously, given a signaling from the network terminal units that modifies the scope of the requested partial communication network resources, or given a signaling from the packet-oriented communication network that indicates a modification of the availability of the predetermined resources, the allocation of the requested partial communication resources is carried out again. By means of this advantageous construction, current changes in the requested partial communication network resources are taken into account, so that the available predetermined resources of the packet-oriented communication network are distributed optimally to the network terminal units respectively currently containing or switching a connection.
According to a further advantageous construction, further annularly chained memories, constructed corresponding to the annularly chained memories, are allocated to the network terminal units, whereby the access authorizations are entered for the first time into the annularly chained memories or further annularly chained memories, and the controlling of accesses of network terminal units is currently controlled by these memories. Upon each change of access authorizations, all access authorizations are determined anew, and are entered into the memory not currently being used for controlling accesses. After this entering, after the current granting of an access these memories are used for controlling accesses. By means of this advantageous construction, an entering of access authorizations into the annularly chained memories is possible during running operation. Thus, during the sampling of the annularly chained memories a new allocation of access authorizations to the annularly chained memories (e.g., initiated by a connection setup of a
Jung Min
Morrison & Foerster / LLP
Siemens Aktiengesellschaft
LandOfFree
Method and arrangement for controlling accesses of network... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and arrangement for controlling accesses of network..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and arrangement for controlling accesses of network... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3070302