Multiplex communications – Data flow congestion prevention or control – Control of data admission to the network
Reexamination Certificate
2007-06-26
2007-06-26
Pham, Chi (Department: 2616)
Multiplex communications
Data flow congestion prevention or control
Control of data admission to the network
C370S235100, C370S412000, C709S223000
Reexamination Certificate
active
10421953
ABSTRACT:
A method for monitoring traffic in a packet switched network. The packet switched network includes connections grouped in a single group; token buffers for respectively corresponding to the connections, and storing tokens generated at a predetermined token generation rate by the corresponding connection; a shared token pool for being shared among the connections, and storing the generated tokens therein when each token buffer of each connection is over a predetermined maximum size; and counters for respectively corresponding to the connections, and counting tokens stored in the shared token pool by a corresponding connection. The method for monitoring traffic in the packet switched network includes the steps of: a) providing data buffers for respectively corresponding to the connections and storing a packet of a contract-following connection in case of a temporary deficiency of a network resource; b) if a token buffer of a corresponding connection is over a predetermined maximum size and the shared token pool is over its own predetermined maximum size, storing tokens generated during a token generation time in the shared token pool, and controlling a count value of a corresponding counter; c) checking the count value of the corresponding counter, and selectively controlling a permitted buffer size of a data buffer of a corresponding connection upon receiving the checking result of the count value of the corresponding counter; and d) checking a token buffer of a corresponding connection and a shared token pool if a packet reaches the corresponding connection or is present in a data buffer of the corresponding connection, and selectively storing a received packet in a corresponding data buffer according to a count value of a corresponding counter if there is no token in the token buffer of the corresponding connection and the shared token pool.
REFERENCES:
patent: 5533020 (1996-07-01), Byrn et al.
patent: 5596576 (1997-01-01), Milito
patent: 5835711 (1998-11-01), Chang et al.
patent: 6347077 (2002-02-01), Ginzboorg
patent: 6349088 (2002-02-01), Ginzboorg et al.
patent: 6388992 (2002-05-01), Aubert et al.
patent: 6801500 (2004-10-01), Chandran
Rexford et al., A scalable architecture for fair leaky-bucket shaping, INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings IEEE vol. 3, Apr. 7-11, 1997, pp. 1054-1062.
Wong et al., TBLB algorithm for servicing real-time multimedia traffic streams, Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on vol. 1, Jul. 30-Aug. 2, 2000, pp. 557-560.
An article by J. Sairmesh and N. Shroff entitled “Limitations and Pitfalls of Leaky Bucket” and “A Study with Video Traffic” in Proceedings of IEEE ICCCN'94, Sep. 1994, pp. 93-98.
“The Token-Bank Leaky Bucket Mechanism for Group Connections in ATM Networks” by Sheng-Lin Wu and Wen-Shyen E. Chen, Sep. 1996, pp. 226-233.
“Effectiveness of the ‘Leaky Bucket’ Policing Mechanism in ATM Networks,”IEEE Journal on Selected Areas in Communications, vol. 9, No. 3, by M. Butto, E. Cavallero, and A. Tonietti on Apr. 1991, pp. 335-342.
“ATM User-Network Interface Specification-Version 3.1” by George Dobrowski on Sep. 1994.
Annex A “Guidelines for Use of ATM Address Formats”.
Annex B “Compatibility Checking”.
Annex C “B-LLI Negotiation”.
Annex D “Transit Network Selection”.
Annex E “Cause Definitions”.
Annex F “ATM Adaption Layer Parameters Negotiation”.
Appendix A “Quality of Service Guidelines”.
Appendix B “Conformance Examples in a Traffic Contract”.
Appendix C “Point-Multipoint Signalling Procedures Using Seperate State Machines(Information)”.
Appendix D “Examples Signalling Codings”.
Appendix E “Differences with ITU-T draft Recommendation Q.2931”.
Appendix F “Guidlines on the use of Bearer Class, Traffic Parameters and QoS”.
Appendix G “OAM Cell Error Detection Code Field”.
Appendix H “Glossary”.
Choe Byung-Gu
Kang Byung-Chang
Lee Jae-Hwoon
Park Eun-Young
Bushnell , Esq. Robert E.
Pham Chi
Phan Tri H.
LandOfFree
Method for monitoring traffic in packet switched network does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for monitoring traffic in packet switched network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for monitoring traffic in packet switched network will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3874566