EP1221214A1 - Ablaufsteurung mit umlaufend hierarchischen prioritäten - Google Patents
Ablaufsteurung mit umlaufend hierarchischen prioritätenInfo
- Publication number
- EP1221214A1 EP1221214A1 EP00965409A EP00965409A EP1221214A1 EP 1221214 A1 EP1221214 A1 EP 1221214A1 EP 00965409 A EP00965409 A EP 00965409A EP 00965409 A EP00965409 A EP 00965409A EP 1221214 A1 EP1221214 A1 EP 1221214A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- class
- flow
- queue
- bandwidth
- flows
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2441—Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/20—Traffic policing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/215—Flow control; Congestion control using token-bucket
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/31—Flow control; Congestion control by tagging of packets, e.g. using discard eligibility [DE] bits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/52—Queue scheduling by attributing bandwidth to queues
- H04L47/525—Queue scheduling by attributing bandwidth to queues by redistribution of residual bandwidth
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/52—Queue scheduling by attributing bandwidth to queues
- H04L47/527—Quantum based scheduling, e.g. credit or deficit based scheduling or token bank
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/62—Queue scheduling characterised by scheduling criteria
- H04L47/621—Individual queue per connection or flow, e.g. per VC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/62—Queue scheduling characterised by scheduling criteria
- H04L47/6215—Individual queue per QOS, rate or priority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/62—Queue scheduling characterised by scheduling criteria
- H04L47/622—Queue service order
- H04L47/6225—Fixed service order, e.g. Round Robin
Definitions
- This invention relates generally to computer networks and more particularly to scheduling data traffic onto a data transmission link.
- link-sharing One requirement for link-sharing is to share bandwidth on a link between multiple organizations, where each organization wants to receive a guaranteed share of the link bandwidth during congestion, but where bandwidth that is not being used by one organization should be available to other organizations sharing the link. Examples range from the multiple agencies that share the Trans -Atlantic FAT pipe and each pay a fixed share of the costs to individuals who share a single ISDN line.
- Another example of link-sharing is the shared bandwidth on a link between different protocol families (e.g. IP and SNA) , where controlled link-sharing is desired because the different protocol families have different responses to congestion.
- a third example of link-sharing is to share bandwidth on a link between different traffic types, such as telnet, ftp, or real-time audio and video.
- the control of network resources involves local decisions on usage as well as considerations of per-connection end-to-end requirements.
- One function of link-sharing mechanisms is to enable gateways to control the distribution of bandwidth on local links in response to purely local needs .
- Link- sharing services and realtime services involve simultaneous sets of constraints to be satisfied at the gateway.
- Current scheduling methods support differentiated Quality of Service (QOS) using variations on prioritized Class Based Queuing (CBQ) or a Weighted Fair Queuing (WFQ) approach.
- QOS Quality of Service
- CBQ prioritized Class Based Queuing
- WFQ Weighted Fair Queuing
- Overbooking of flows means that flows with reserved minimum bandwidth requirements are admitted even though there is insufficient capacity to provide that bandwidth when all flows are simultaneously active.
- the CBQ algorithm depends on a fixed set of flows that are always considered active, rather than an environment of rapidly changing active flows.
- the CBQ algorithm uses a slow-acting average rate per flow to classify it as overlimit.
- the CBQ algorithm is relatively slow acting, because it relies on a calculated average rate of a class to determine whether the class is above or below a traffic limit.
- each class can be limited to its assigned average bandwidth, but there are no protections to the instantaneous loss of bandwidth to underlimit classes. This is because the CBQ algorithm as described relies on the relatively slow- changing average rate to determine whether a class is overlimit or not .
- Single-level WFQ methods suffer from the problem of overbooking, because an overbooked set of flows can obtain an arbitrarily large fraction of bandwidth. Each flow consumes its fair share even if there are too many of them.
- the overbooking problem is alleviated, with the concept of a hierarchy of WFQ schedulers.
- the WFQ algorithms assume that each flow obeys its traffic specification, and the algorithm described makes no provision for individual flows that are over the traffic specification limit. There is no concept in the hierarchical WFQ method for a flow in one class to share the bandwidth with a best effort class . If one flow of a higher level is overlimit, it must content itself with the bandwidth allocated to its class, and cannot compete with other best- effort flows in the default class.
- overbooked flows will continue to use their weight's worth of bandwidth, and indeed with sufficient overbooking can consume arbitrarily large fractions of the bandwidth.
- the WFQ algorithm makes no provision for a class of flows to be limited to a percentage of bandwidth, and for that bandwidth to be enforced even in the presence of overbooking. Overbooking is an important economic requirement for commercial bandwidth providers .
- the WFQ algorithm while providing better worst case delays than a Deficit Round Robin (DRR) algorithm, also has several computational complexities. The chief problems are a divide operation to calculate the finish time of a packet, and the complexity in maintaining an ordered queue based on finish time. These complexities are generally considered to be on the order of O(log N) for N possible flows.
- the problems of scheduling packets to a data transmission link are solved by the present invention of hierarchical prioritized round robin scheduling.
- the present invention is a method for scheduling packets on a transmission interface that provides for assigned bandwidth to different classes of traffic, where each class consists of a number of flows. It provides for efficient and fair handling of overbooked flows, i.e. where the admitted flows have a sum of traffic rates that exceed the assigned capacity for the flows' classes.
- the present invention includes an enhancement to the Deficit Round Robin (DRR) algorithm to provide for prioritized forwarding of packets with the concept of a priority for each class, while maintaining the DRR mechanisms for limiting each class 1 bandwidth to an assigned fraction of capacity.
- DRR Deficit Round Robin
- a key aspect of the invention is the identification of one class as the default class, where flows that exceed their class's traffic rate may still forward packets in the default class's assigned bandwidth.
- HPRR the former example's bursting guaranteed class flow will get its 10% guaranteed fraction plus 1/2 of the best effort bandwidth (25%), for a total of 35% of bandwidth.
- the HPRR method efficiently and easily allocates default or best effort bandwidth to any differentiated class flows that are over their traffic specification limit.
- the HPRR method uses immediately accurate token bucket rate classifiers to mark each individual packet as conforming or not conforming to a traffic specification for the flow.
- the key to this invention is that flows are considered to be part of two different classes: the flow's assigned class and the default, or best effort class.
- the HPRR method allows a packet from a flow to be forwarded in one of two ways, either as part of its class's allocated bandwidth or as part of the best effort bandwidth.
- the HPRR method does not attempt to mark classes as overlimit or not, nor to determine whether or not overlimit classes are permitted to block or forward their packets. There is no need to process any algorithm that examines the over or under-limit status of all peer classes. Instead, by always providing two paths for a flow to send its packets, a flow is always given its fair share of two different classes: its primary or configured class and the best effort class.
- the HPRR method is a simple and effective algorithm for handling overbooked classes.
- An overbooked class will have each of its flows compete for the inadequate bandwidth allocated to the class, but because each flow can use the best effort bandwidth it also gets a fair share of that bandwidth to allow the classes bandwidth guarantees to be when other classes are inactive.
- the HPRR method determines on a packet-by-packet basis whether the packet itself conforms to a traffic rate token bucket. Held packets that are not conforming to the flow' s Traffic Spec token bucket are ineligible for forwarding via the flow's class bandwidth, but are still eligible for forwarding via the default class bandwidth.
- the HPRR method by using novel prioritized DRR method, avoids the divide operations and O(log N) maintenance of an ordered queue, at the admitted cost of higher worst-case delay bounds. Definitions:
- General scheduler schedules packets from leaf classes without regard to link-sharing guidelines
- Link-sharing scheduler schedules packets from some leaf classes that have been exceeding the link-sharing allocations in times of congestion.
- Regulated class if packets from that class are being scheduled by the link-sharing scheduler at the gateway.
- Unregulated class if traffic from that class is being scheduled by the general scheduler.
- Overlimit, underlimit, at-limit A class is called overlimit if it has recently used more than its allocated link- sharing bandwidth. (in bytes/sec, as averaged over a specified time interval) ,- underlimit if it has used less than a specified fraction of its link- sharing bandwidth, and at-limit otherwise.
- Figure 1 is a part-schematic flow diagram of hierarchical prioritized round robin (HPRR) scheduling according to principles of the invention
- Figure 2 is a block diagram of data structures used by the HPRR method and system of Figure 1;
- Figure 3 is a block diagram of an example state of the data structures of Figure 2;
- Figures 4 and 5 are flow charts of the operation of the process of receiving a new packet according to the system and method of Figure 1 ,-
- Figures 6, 7, 8, 9 and 10 are flow charts of the scheduling of packets to be transmitted according to the system and method of Figure 1.
- Figure 1 is a part-schematic flow diagram of a hierarchical prioritized round robin scheduling method according to principles of the invention.
- the present invention discloses a method and apparatus for scheduling the transmission of packets onto a data transmission link. Packets intended to be transmitted on a transmission link are given to a scheduler, which enqueues the packets and reorders the packets if necessary to meet pre-determined criteria.
- the scheduling method and apparatus involves a combination of per-flow queuing with a prioritized service that limits both the maximum burst at each priority level as well as the bandwidth fraction on a per- priority level basis.
- the present invention combines key aspects of both Weighted Fair Queuing (WFQ) and Class Based Queuing (CBQ) packet scheduling methods.
- WFQ Weighted Fair Queuing
- CBQ Class Based Queuing
- an improved Deficit Round Robin service method is included in the present scheduling method and apparatus .
- the improved Deficit Round Robin service method avoids the complexity of prioritized enqueuing and the divide operations of WFQ finish time calculation. Referring now to Figure 1, the scheduler of the present invention processes packets in a number of stages within the scheduler.
- Packets are first classified into flows.
- IP Internet Protocol
- the flow classification is advantageously a function of the packet's source and destination IP addresses, the IP protocol type, and the User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) port number in the packet.
- UDP User Datagram Protocol
- TCP Transmission Control Protocol
- packets are first enqueued on a per-flow queue.
- Each flow advantageously has a maximum number of buffers that may be queued on it.
- packets for IP telephony i.e. encapsulated voice
- all other packets are classified as flow number 4 (the default flow class) .
- Each flow is considered to be a member of a single service class, which describes a set of data forwarding services provided to flows.
- Packets then must pass a Maximum Rate token bucket limiter, which limits the forwarding rate on a per-flow basis. Once packets have passed their Maximum Rate limiter, they are eligible for forwarding in either of two classes : the flow' s configured class or the default class.
- the Traffic Rate is the maximum rate at which flow's source agrees to inject traffic into the network.
- the service contract between the network and the traffic source is such that only packets transmitted at less than the traffic rate will receive differentiated service by the network.
- CIR Committed Information rate
- the Traffic Rate corresponds to the CIR rate. It is desirable for the network to accept packets at a faster then Traffic rate, but to forward them on only a best effort basis.
- packets arriving faster than the Traffic Rate are being prohibited from being forwarded as part of the bandwidth allocated to their service class, and may be forwarded only as part of the bandwidth allocated to the default class. 4.
- a class may be instantaneously overbooked, which means that the admission control algorithm permitted flows with traffic rates to be admitted that exceeded the configured capacity of the transmission channel allocated to the class. In this condition, the scheduler permits flows to forward packets using the default class bandwidth in addition to their class's bandwidth.
- Packets passing the Traffic Rate Limiter are scheduled onto a per-class queue which holds the packets for all flows in the same class . Packets are physically enqueued only on a per-flow queue.
- the per-class queues of Figure 1 are virtual queues used for describing the operation of the method of the present invention. Also, all packets which conform to a flow's Maximum Rate token bucket limiter are eligible for forwarding from both the class's bandwidth and the default class bandwidth.
- the actual per-flow queues conceptually feed a per-class queue for the flows' assigned service classes.
- the manner in which packets from flows in the same class are forwarded to the per-class queue is independent of the present invention, but is preferably a type of fair queuing algorithm, such as Deficit Round Robin scheduling.
- Each flow is configured with a maximum rate limiter in the scheduler, so that it will not forward a packet if doing so would exceed the maximum rate configured for the flow. Buffer management is performed on a per-flow basis, not a per-class basis.
- Each flow also has a Traffic Rate Limiter that prevents it rom forwarding packets that exceed the flow's Traffic Rate onto its service class queue.
- Each flow must be configured with a Traffic Rate Limiter to which it must conform in order to receive the bandwidth assigned to its flow class.
- a flow is permitted to send data faster than the traffic rate, but it is kept back on the per- flow queue and may be forwarded only as part of the bandwidth allocated to the default class.
- the scheduler forwards packets from the flow queues to a virtual queue for the service class of the flow.
- This is a virtual queue because it is not necessary to implement a physical queue (e.g. a linked list) for the per-class queue. Instead, the scheduler needs only to keep a pointer to the top flow queue on the per-class list.
- the top packet or packets from the virtual priority queue are dequeued, they are removed from the (actual) flow queue, and the next top of the class queue is determined by scanning the active flow queues in that class. It is desirable that the scheduler not forward packets in any single queue out of order.
- Each service class is assigned a scheduling priority.
- the per- class queues are serviced in priority order, subject to bandwidth limits.
- the Deficit Round Robin (DRR) algorithm may be used to schedule packets from each class.
- the present invention includes an enhancement to the DRR algorithm in order to implement prioritized scheduling.
- the highest priority class queue is serviced until its quantum runs out, at which time the next higher priority class is scanned.
- a new DRR round is started.
- a class's quantum for its priority DRR algorithm is calculated by the scheduler based on a Maximum Assigned Bandwidth (MAB) configured for the class.
- the MAB is conveniently expressed in units of integer percentage points in the range of 1 to 100 although some other measure may be used within the scope of the present invention.
- the MABs assigned to a class determine its quantum for DRR purposes, so that the ratio of quanta for each class equal the ratio of MABs for each class.
- One algorithm for computing the quantum from a MAB is described here.
- the class with the highest MAB is given the maximum quantum which is the maximum packet size permitted in the system. For the IP routing protocol, a reasonable maximum is a figure of 1600 bytes, which exceeds the IP Maximum Transmission Unit (MTU) for Ethernet Local Area Networks (LANs) .
- MTU IP Maximum Transmission Unit
- Other classes are assigned a quantum based on the ratio of their MAB to the highest MAB. For example, suppose the highest MAB is 50%, and it is assigned a class quantum of 1600. A class with an MAB of 10%, receives a quantum of 10/50*1600, or 320 bytes. Using this quantum assignment algorithm, the dynamic range of reserved rates must be limited to 1500 to 1. Ideally, the dynamic range should be limited to about 100 to 1, in order to limit the number of rounds required to accumulate a 1600
- An important concept for the scheduler of the present invention is that all nonzero priority flows are scanned twice: once by their priority queue scheduler, and once by the Best Effort (BE) priority level 0 DRR scheduler.
- the purpose of this is to grant bandwidth to prioritized flows even for the best effort bandwidth. For example , consider 5 prioritized flows with the 10 kbps traffic rates and 1 best effort flow sharing a 500 kbps channel. The prioritized flows reserve only 50 kbps of the 500 kbps available, but they need some mechanism for sharing the 450 kbps left for the best effort. Scanning the flows twice as described above achieves this purpose.
- a flow' s actual bandwidth received during an epoch of continuously backlogged flows is the sum of two rates: 1. The flow's advertised Traffic Rate, which is transmitted at the flow's class's priority level; and 2. the flow's share of the remaining best effort capacity.
- the service share of any given flow is not its quantum divided by the sum of all assigned flow's quanta, but its quantum divided by the sum of the active flows' quanta.
- the term allocated refers to a flow that is assigned to a channel when spectrum management assigns a modem to a particular RF channel. The flow is considered active only when it has packets enqueued on its per-flow queue (i.e. it is backlogged) or it has a packet actually being transmitted. For example, suppose here are 100 flows at the best effort or priority 0 level assigned to a channel. Each is given a flow quantum of 1500 bytes. Over a given congested period (i.e.
- the operation of the present invention scheduler in the event of overbooking is important. Overbooking occurs when the traffic rate of flows admitted to a transmission link exceeds the assigned capacity of the link assigned to the flows' class. Each class is separately scheduled, and no class is permitted to exceed its average rate (as determined by the quantum assignments when DRR is used at the per-class scheduling level) .
- the per-class scheduling step could also use WFQ, in which case each class is also blocked from using more than its assigned share of bandwidth.
- the modified Deficit Round Robin method of the present invention provides prioritized forwarding.
- the prioritized DRR method is advantageously used as the last per-class scheduling stage of the scheduler of the present invention.
- Prior art DRR depends on the concept of a quantum assigned for each scheduled class, and visits each class in a round robin manner.
- each class is assigned a priority.
- the prioritized DRR method of the present invention visits each class in order of priority, with no order specified for classes at the same priority. The highest priority class is serviced until it either forwards all packets on its per-class queue or it exhausts its deficit count. At that point, the next highest priority class is serviced.
- a new DRR round is started, i.e. all backlogged classes are given a new quantum.
- the ratio of the quantum assignments determines the long-term ratio of transmission link bandwidth assigned to the class.
- flows are admitted to a transmission channel based on a configured level of overbooking.
- One approach is to configure the assumed percent active flows in a service class. For example, if only 10% of the flows were expected to be simultaneously active, the Configured Active Percent (CAP) configuration for this case would be 10%.
- CAP Configured Active Percent
- Each flow would have an identified Traffic Specification which gives a traffic rate and traffic burst parameters for a traffic rate token bucket . Packets from the flow are determined to be either conformant or non-conformant to the traffic specification.
- Each class would have a minimum reserved bandwidth associated with it . This is analogous to the committed information rate of frame relay networks of the minimum cell rate for ATM networks. The minimum reserved rate is used as the Traffic Specification for the Traffic Rate token bucket of the method of the present invention.
- the overbooking admission control method is to admit flows such that the CAP percentage times the sum of the admitted flows' reserved rates is less than the MAB percentage allocated for the class on the channel. For example, if the CAP is set to 10%, a class is configured with an MAB of 50% of a 1 Mbps channel, and the class has a reserved traffic rate of 100 Kbps, then the number of the admitted flow is:
- the scheduling method of the present invention divides the configured capacity for the class evenly among all of the overbooked admitted flows so that each will receive less than its "committed" rate of bandwidth, and also such that no other class is affected. All flows are allowed to use the best effort bandwidth, however, if other best effort flows are inactive, it is still possible that the flows will receive their committed bandwidth. Still, it is advantageous to report the number of packets that arrived into the system to find an overbooked situation for their class, i.e. when more than the CAP configured active percent of flows were simultaneously backlogged. This gives guidance on how to set the CAP parameter, and can be used as the basis of a service level agreement .
- the major QOS service schemes can be implemented using the present invention.
- a guaranteed service can be provided with a class that has the highest priority with a nonzero traffic bucket and zero overbooking (i.e. a CAP of 100% simultaneously active). This combination can guarantee minimum delays and maximum bandwidths .
- a committed information rate CIR service class can be implemented with a nonzero traffic rate, a priority less than the guaranteed class, and with permitted overbooking. By permitting overbooking, the bursty traffic of typical data communications can receive a statistically guaranteed service while maintaining a high link utilization.
- the default service class should have an unlimited traffic rate bucket, unlimited overbooking, and a priority lower than the Prioritized Best Effort class above.
- a bulk or low priority service class would have an unlimited traffic rate and unlimited overbooking, and would have a priority level lower than the default class.
- FIG. 2 shows key data structures used in the described embodiment of the present invention.
- the FLOW structure 100 contains all information associated with a single flow of packets.
- Each flow contains a queue structure named PacketQ which contains pointers to the beginning and end of a queue of packets to be transmitted.
- the QITEM structure 110 allows structures which contain it to be linked in a doubly-linked list.
- the QUEUE structure 120 contains pointers to the head and tail QITEM ⁇ of a given list, along with the count of items in that list.
- a SLICONF structure 130 contains parameters that are considered to be configured for the operation of a particular Service Class SCLASS 140 when it operates on a particular Interface Intf 150. It contains a parameter overbook, for instance, that indicates what multiple of actual bandwidth may be overbooked by admitted flows to the interface with reserved rates in excess of capacity.
- the DRRITEM structures 160 contains the parameters needed to schedule a flow (or service class) using the Deficit Round Robin (DRR) algorithm.
- the DRR algorithm operates by initially assigning each item a fixed quantum. Flows are allocated bandwidth according to the relative ratio of their quantum assignments. The quantum assignments are fixed for each flow, and determined at the time the flow is created.
- a quantum for a flow is stored in the U32 quantum field 162 of the DRRITEM.
- a flow is allowed to transmit a quantity of bytes stored in the deficit count of its DRRITEM.
- all DRRITEMS in that queue increment their deficit count by the amount in their quantum.
- its deficit value is compared against the number of bytes to be sent by the next packet for that flow. if there is an insufficient count of bytes in the deficit count, the flow is moved to the end of its DRR queue to await the next DRR round at which time its deficit will be incremented.
- the DRR algorithm offers bandwidth fairly to all flows within a DRR queue, based on the ratio of their quantum assignments. It is much fairer than the usual first come, first served (FCFS) service of a single transmit queue, because flows with fewer and smaller packets are not forced to wait behind the packets of flows with many and larger packets.
- FCFS first served
- a Service Level Interface (SLI) structure 170 controls the scheduling and contains statistics of the operation of a single Service Class (SCLASS) operating on a single Interface (Intf) .
- the scheduling method of this invention calls for logically offering fractions of bandwidth of an interface to each SLI according to a configured weight for the SLI. Within that allocated bandwidth, the embodiment offers equal-weighted fractions to all active flows within the same Service Class.
- the SLIs are considered to be ordered in terms of the priority field of the Service Class (SCLASS 140) .
- the p_classes field of the INTF structure 150 heads a linked list of SLI structures 170, and are linked through the QITEM structure 110 named priority that is in the SLI.
- the present invention uses three separate DRR queues :
- Flow structures 100 contain a DRRITEM 160 called pq which links all of the flows belonging to the same service class (and hence at the same priority level) .
- the head and tail of this queue is the QUEUE structure 120 named flowlist within the SLI structure 170.
- Flow Best Effort DRR Queue Flow structures 100 contain a DRRITEM 160 called bq which links all of the active flows on an interface.
- An Interface structure Intf 150 contains a QUEUE structure 120 that provides the head and tail of this linked list of flows .
- Class DRR Queue Service Level Interface (SLI) structures 170 that are active on an interface are considered to be part of a DRR queue of the SLIs themselves.
- the DRRITEM 160 for this Class level of scheduling is stored in the cq object of an SLI 170.
- the TOKBKT structure 180 describes both the traffic rate token bucket used to determine when flows are permitted to use their service classes bandwidth, as well as the maximum rate token bucket used to hold flow packets on their flow queue when they arrive faster than the flows maximum permitted forwarding rate.
- Figure 3 shows an example state of the structures of Figure 2. Only relevant fields of the structures are shown.
- a single Intf structure contains the QUEUE structure that heads a linked list of SLIs in decreasing priority order.
- Flow 1 220 is one of two active flows in the gold SCLASS. Like all active flows, it has a QUEUE structure named PacketQ 222 that heads a linked list of packets 224, 226 to send on the flow.
- the scheduling method of this invention always sends packets from the same flow in order.
- Flow 1 is shown to have packets on its PacketQ, but in the example all active flows are considered to have such packets.
- the PacketQ and packets are not shown in the other flows for brevity.
- Flow 1 220 is considered to be on two DRR queues.
- the Flow Priority Queue is headed by the QUEUE structure named FlowList within the SLI 230 for the gold class on this interface.
- the DRRITEM named pq within Flow 1 contains a link to the other FLOW on the SLIs FlowList, Flow 2 235.
- Flow 1 is also considered to be on the Best Effort DRR Queue, which is headed by the QUEUE structure named beq within the Intf interface structure 240. All of the flows on the Best Effort DRR Queue are linked via the DRRITEM named "bq" within the Flow structure. Notice that all Flows of Figure 3 (220, 235, 245, 250) are on the linked list headed by Intf.beq (240) and linked via their bq DRRITEM structures .
- Flow 2 235 is another flow within the gold service class that is active along with Flow 1.
- the term active when applied to a flow or an SLI means that it has a packet waiting to be transmitted.
- Flow 3 245 is a best effort flow. Although they are not shown, it includes a PacketQ with packets to send, and an sli pointer that points back to the SLI for the operation of the default service class (which is not shown) .
- Flow 3 does not use its pq DRRITEM; it is considered to be only on the Best Effort DRR queue, which uses the bq DRRITEM.
- Flow 4 250 is similar to Flow 3 245. It is a Best Effort flow that is scheduled bandwidth only under the default service class .
- Each flow has a pointer named S 255 that points to the Service Class (SCLASS) structure on which they are classified. All flows must be considered to be within one class . The default class contains flows that are not otherwise classified.
- SCLASS Service Class
- the flows that are considered to belong to the default service class 210 are not linked via their pq DRRITEM. Instead, when the default class SLI is offered bandwidth by the NextBurst procedure, the flows on it are obtained from the beq list off of the Intf structure 240, rather than the flowlist QUEUE the default class SLI 260.
- Figures 4 and 5 show the operation of a procedure to process the arrival of a new packet to the scheduling method of the present invention.
- the steps in Figure 4 are expressed in terms of statements in the C computer language using fields as described in Figure 2, however the invention is not limited to this computer language .
- Pkt is the packet to be sent which comprises a pointer and length of the packet .
- F is a pointer to the FLOW structure to which the packet has been classified.
- I is a pointer to the INTF structure on which the packet has been routed to be sent .
- the method checks if the number of enqueued packets on Flow F's Packet exceeds the maximum number of buffers permitted for Flow F's Service Class. If so, a statistic is incremented 310 and the packet is discarded step 315.
- step 320 the newly arrived packet is enqueued on Flow F's PacketQ Queue.
- the q_enq ( ) function of this method takes as its second argument a pointer to a QITEM.
- the Pkt structure is assumed to have as its first element a QITEM.
- step 325 the bActive boolean of Flow F is checked. If the flow is already marked as active, no further processing is required at packet arrival, and processing skips to step 380 (in Figure 5) . Otherwise, the flow needs to be made active and inserted into the data structures similar to Figure 3, step 330.
- step 335 the flow is checked to see if it belongs to the default Service Class. If not, the method proceeds to step 340, where flow is enqueued upon the flowlist QUEUE of its (non-default, prioritized) SLI.
- the QITEM within the pq DRRITEM of the flow is used to link the Flows of the same SLI together.
- the prioritized SLI is also marked active, step 345, and the count of active flows (the nflows field of the SLI structure 170) is incremented.
- the method checks if the newly activating flow initiates an overbooked condition of the service class.
- Each flow has associated with a normalized reserved rate (nrr) which is in terms of bits per second. This is the bandwidth reserved for the flow.
- nrr normalized reserved rate
- the method permits operators to configure and admit flows that are overbooked, i.e. the sum of the admitted flows reserved rates exceeds the capacity assigned for the service class.
- the capacity is assigned per service class on a percentage basis.
- the bits per second assigned for the service class is stored in the SLI's field normalized maximum assigned rate or nmar.
- the sum of the active flows' reserved rates is stored in the SLI's sumresv field, step 350.
- step 355 the SLI is marked as being in an overbooked state, step 360. Operation resumes with step 365.
- processing proceeds with step 365, at which point the flow is also enqueued on the best effort flow queue headed by Intf I's beq QUEUE structure.
- the QITEM within the bq DRRITEM of the flow is used to link the flows on the best effort flow list.
- the flow starts its place in the current DRR round with its deficit set equal to the flows assigned quantum.
- all flows in the bq (best effort queue) and the pq (priority queue) are considered to have the same quantum.
- a reasonable quantum would be 512 bytes.
- the quantum should be selected to be less than the maximum Ethernet packet size (1 500 bytes) , but not too much less, so that an excessive number of DRR rounds are not required in order to increment the deficit to the size of the packet.
- flow in prioritized SLIs are considered to be in two different DRR queues, their own classes prioritized queue (linked via pq) and the best effort DRR queue (linked via bq) .
- the deficit for both DR queues is initialized.
- the default SLI is marked as active because a flow has been added to the best effort flow list.
- the count of active flows on default SLI is incremented.
- the flow is checked if it is in an overbooked state.
- a flow is in the overbooked state when it becomes active and there are already other active flows in the flows service class whose reserved rates exceed the assigned capacity of the link for that service class.
- the method of this invention is unique in that it maintains such an overbooked state of flows and counts the arrivals of packets in an overbooked state.
- a packet that arrives to find that the service class is in an overbooked condition causes the count of "overbooked packet arrivals" to be incremented in step 390.
- Step 395 terminates the Packet Arrival processing.
- the flow to which the packet was classified is now inserted in the data structure exemplified in Figure 3.
- Figures 6, 7, 8, 9 and 10 show the scheduling method of the next burst of packets or bytes to be sent .
- the NextBurst operation is invoked when a data communication transmitter has completed sending one or more packets and is requesting the scheduler to select the next packet or group of packets.
- the algorithm is expressed such that the caller of NextBurst may specify a maximum number of bytes to be transmitted (maxBurst) or a maximum number of packets to be sent (maxPkts) .
- maxBurst maximum number of bytes to be transmitted
- maxPkts maximum number of packets to be sent
- the NextBurst routine has a number of local variables: active_classes is a count of the number of SLIs that are active. overlimit_classes is a count of the number of SLIs that are "overlimit”. An overlimit SLI is one in which all flows are "overlimit”. An overlimit flow is one which has exceeded its traffic token bucket .
- the traffic token bucket measures whether a flow has exceed its reserved minimum rate. nover is a count of the number of overlimit flows within a particular service class.
- bReturn is a control flag that becomes TRUE (i.e. set to 1) when the method determines that the NextBurst routine should return.
- P is a pointer to the current SLI structure which is offered bandwidth.
- F is a pointer to the current flow (within P) that is offered bandwidth.
- Pkt is a pointer to the current packet of F that is being examined.
- the method initializes the local variables and scans through all SLI's (via the p_classes QUEUE within the INTF) and sets the bOverlimit bit of the class to 0 (i.e. FALSE).
- Step 410 begins the next DRR round of the "priority DRR queue”. It sets the local SLI pointer P to the head of the INTF's p_classes queue. Note that the "q_head (QUEUE)" operation returns the pointer to the head of a queue, but does not remove it from the queue.
- step 440 if the last Class DRR round emptied all of the enqueued packets so that there is no longer any active classes, then NextBurst also returns in step 445. If there are still active classes, however, the new Class DRR round starts by transitioning back to step 410.
- step 415 if the current class DRR round is not over, processing continues with step 450.
- step 450 if the current SLI is not marked as active, that means it has no flows that are active, and can be skipped. In this case, the method goes to step 455 to get the next lower priority SLI on the interface's p_classes queue and then transitions back to step 415.
- step 450 the number of active_classes is incremented by one.
- the SLI is checked to see if it has exhausted its deficit in the current priority DRR round.
- the P- >bExhausted flag is used for this purpose. If so, this SLI cannot receive bandwidth in the current priority DRR round, and the next SLI must be checked in step 455.
- step 470 the bOverlimit flag of the current SLI is checked. This flag is set when all flows of the SLI are also overlimit. In this case, bandwidth is not offered to a priority SLI, and the next SLI must be checked via step 455.
- the method continues with steps 475, 480, and 485, where the local variable "FlowQP" is set depending on whether the current class is the "default" class or not. If the current CLI (P) is the default, then the relevant queue of flows to be offered bandwidth is the I->beq "best effort" queue of flows. If the current CLI (P) is a priority queue, then the only eligible flows are those linked form the CLI ' s flowList queue. FlowQP is set to point to the appropriate QUEUE structure.
- step 490 the number of overlimit flows in the current class (nover) is initialized to zero.
- Step 495 marks a common processing point to offer bandwidth to the "Next Flow” of the current service class.
- the off-sheet connector object "505" labeled "Next Flow” is referenced from Figure 6.
- the local pointer F is set to the head of the FlowQP queue (but the flow is not dequeued) .
- step 525 the method checks whether all of the flows in the current service class are overlimit. If so, the method transitions to step 530 where the class itself is marked as overlimit and the number of overlimit classes detected for this invocation of the NextBurst method transitions to step 455 to check the next service class .
- the method transitions from 525 to 535. This starts the "Next Packet" processing of the next packet on the current flow.
- the local pointer Pkt is set to the head of the current flow's packet queue (PacketQ), but the packet itself is not yet removed from the queue.
- step 545 the Pkt pointer is checked. If it is NULL, then all packets in the current flow have been sent, and the method transitions to step 585.
- Step 585 updates statistics and the data structures of Figure 2 for the case when a flow becomes inactive. The flow is removed from both the priority DRR queue (i.e. the SLI flowlist QUEUE) as well as the best effort DRR queue (from INTF's "beq” QUEUE). Step 585 also decrements a count of the sum of the reserved rates of all active flows in the class, the "P->sumresv" count.
- step 590 if P->sumresv drops below the "normalized maximum assigned rate" (P->nmar) , then the class is no longer considered to be in an Overbooked state.
- P->Overbooked flag is cleared in step 595 if this is the case. In either case after the check in step 590, the method continues with the next flow in the current SLI at step 495.
- step 545 if the current Pkt pointer is not null, the method transitions to step 550.
- the bReturn flag is checked in case it had been set by step 765, in which case the method returns in step 560. If the bReturn flag is not yet set, processing continues with step 555.
- Step 555 checks if sending the packet would cause the NextBurst routine to have exceeded the maximum number of bytes permitted in the NextBurst routine call.
- the current running total of bytes sent is kept in the "sent" local variable. In this case, NextBurst returns in step 560 without sending the current packet.
- step 565 the priority DRR queue "deficit" is checked. If the packet length exceeds the deficit count of the priority "class" DRR item (i.e. P->cq. deficit ) , then the current class has exhausted its allowed transmission in this priority DRR round. In this case, the service class is marked with bExhausted flag set to 1 (true) , and the method proceeds to check the next service class in step 455.
- step 575 the maximum rate token bucket for the flow is updated.
- the procedure to update a token bucket adds the appropriate number of tokens to the token bucket count based on the number of CPU processor ticks that have elapsed since its last update. Each "token" in a token bucket gives the right to transmit one byte.
- step 580 the method compares the packet length with the number of tokens in the just-updated max rate token bucket (F- >maxBkt) . If there are insufficient tokens, the method transitions to step 600. Here, the method increments a count of such "overMaximum” packet scheduling attempts and increments the number of "overlimit” flows in the current service class (the local variable "nover”). At step 605, the operation "MoveFlowToEnd ( ) " is invoked to move the overlimit flow to the end of its current Flow queue. The flow will not be permitted to send packets until a subsequent call to NextBurst at which time sufficient time may have elapsed to add more tokens to its max rate token bucket. The method transitions from 605 to handle the next flow in the current class at step 495.
- step 610 is a connector to the continuation of the NextBurst procedure in Figures 8 and 9.
- Step 620 is the continuation of the NextBurst procedure from Figure 7.
- Step 625 checks if the current class being offered bandwidth is the default class. If not, step 630 updates the reserved rate
- step 635 checks if the flow is currently "under” its reserved rate. If not, the method at step 640 marks the packet as over its traffic rate and moves the flow to the end of its priority DRR list in step 645, invoking the MoveFlowToEnd ( ) sub-method as described in steps 700- 720.
- the flow is not permitted to send traffic that exceeds its traffic rate token bucket in bandwidth that is offered to its prioritized service class. It may only send when bandwidth is offered to the default service class.
- step 650 transitions to step 495 to process the next flow in the current class.
- step 635 determines that the flow is not over its reserved traffic rate limit, then it transitions to step 655.
- This step checks if the current packet for the flow would exceed the deficit for the per-flow DRR round, i.e. F->pq.deficit . If so, the routine transitions to step 660 because the flow must wait until the next per-flow DRR round. In step 660, the flow's "pq" DRR item deficit is increased by the quantum.
- step 665 the MoveFlowToEnd sub-method is invoked to move the flow from the front to the rear of the current class's flowlist, and processing continues with the next flow at step 495.
- Step 675 compares the packet's length to the flow's deficit on the Best Effort DRR list (F->bq. deficit) . If the packet length is less than the flow's deficit, the method continues with step 725. If the next packet's length exceeds the Best Effort DRR deficit, however, the method continues with step 680. In step 680, the flow's Best Effort DRR deficit is increased by the flow's Best Effort DRR quantum (F->bq.quantum) .
- step 685 the flow is moved to the end of the class's flow list by invoking the MoveFlowToEnd method as described in steps 700-720.
- step 690 the method transitions in step 690 to return via the "Next Flow" label 505 to process the next flow in step 495.
- Step 700 is the start of the MoveFlowToEnd sub-method invoked by steps 605, 645, 665, and 685 above.
- the MoveFlowToEnd method is invoked for a particular DRR queue FlowPQ and for a particular Flow F.
- a flow may be a member of two different DRR queues, and as such has two different DRRITEMs (160) , F->pq and F- > bq.
- the MoveFlowToEnd method simply selects the proper DRRITEM to be modified.
- step 705 the DRR queue pointer FlowPQ is checked to see if it is the Best Effort queue. If so, the method transitions to step 715 where the Flow is first dequeued from the start of the best effort DRR queue (q_remove (FlowPQ, &P->bq) ) , and then re-enqueued to the tail of that DRR queue (q_enq (FlowPQ, &P->bq) ) .
- the MoveFlowtoEnd sub-method then terminates in step 720.
- Step 705 determines that the Priority DRR queue is being modified instead of the Best Effort DRR queue, then the method transitions to step 710 where the flow is first removed from the head of the priority DRR queue and then re- enqueued to the tail.
- step 655 or step 675 determines that the flow does have enough deficit in the current flow DRR round to send the current packet, then control transitions to step 725 (of Figure 9) .
- the packet is actually dequeued from the head of the Flows Packet queue in step 725.
- Step 730 invokes the operation "sendO" to actually send the packet onto the transmission link.
- the local variable "sent” accumulates the number of bytes sent via the "sendO" operation.
- Steps 735, 740, 745, and 750 update the appropriate flow DRR queue by decrementing the just-sent packet length from the "deficit" count of the appropriate DRRITEM.
- this is F- >bq (Step 740); for the non-default classes, this is F- > pq.
- step 755 a number of statistics are updated.
- the Flow's traffic rate and max rate token buckets have one token removed for each byte transmitted.
- a count of packets and bytes in a current statistics gathering interval are incremented, for both per-Flow and per-class statistics.
- Step 760 increments a count of packets sent in this invocation of NextBurst (sentPkts) . If it is lower than the maximum number of packets requested to be sent (the parameter maxPackets) , then processing resumes with the next packet in the current flow, which is indicated via the "NextPacket" connector to step 535. If the maxPackets count has been reached, a control flag "bReturn” is set TRUE, step 765. Operation of the method then returns to step 540 with consideration of the next packet. The "bReturn" flag set in step 765 is examined after the method appropriately updates the data structures of Figure 2 for the case when the just-sent packet was the last packet of an active service class. It is to be understood that the above-described embodiments are simply illustrative of the principles of the invention. Various and other modifications and changes may be made by those skilled in the art which will embody the principles of the invention and fall within the spirit and scope thereof .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15612399P | 1999-09-25 | 1999-09-25 | |
US156123P | 1999-09-25 | ||
PCT/US2000/026312 WO2001024428A1 (en) | 1999-09-25 | 2000-09-25 | Hierarchical prioritized round robin (hprr) scheduling |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1221214A1 true EP1221214A1 (de) | 2002-07-10 |
EP1221214A4 EP1221214A4 (de) | 2006-06-07 |
Family
ID=22558198
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP00965409A Withdrawn EP1221214A4 (de) | 1999-09-25 | 2000-09-25 | Ablaufsteurung mit umlaufend hierarchischen prioritäten |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1221214A4 (de) |
CN (1) | CN1376345A (de) |
AU (1) | AU7613200A (de) |
WO (1) | WO2001024428A1 (de) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2366119B (en) * | 2000-08-18 | 2004-04-21 | Motorola Inc | Access mechanism assignment |
GB2377117B (en) | 2001-06-27 | 2004-08-18 | Cambridge Broadband Ltd | Method and apparatus for providing communications bandwidth |
KR100431191B1 (ko) * | 2001-12-03 | 2004-05-12 | 주식회사 케이티 | 크레딧 기반 라운드 로빈을 이용한 패킷 스케쥴링장치 및방법 |
US7289525B2 (en) * | 2002-02-21 | 2007-10-30 | Intel Corporation | Inverse multiplexing of managed traffic flows over a multi-star network |
US20030179754A1 (en) * | 2002-03-20 | 2003-09-25 | Broadcom Corporation | Two stage egress scheduler for a network device |
US6925094B2 (en) | 2002-09-23 | 2005-08-02 | Symbol Technologies, Inc. | System and method for wireless network channel management |
FI112421B (fi) * | 2002-10-29 | 2003-11-28 | Tellabs Oy | Menetelmä ja laitteisto siirtoyhteyskapasiteetin vuorottamiseksi pakettikytkentäisten tietoliikennevoiden kesken |
US6888821B2 (en) * | 2003-02-10 | 2005-05-03 | Nokia Corporation | Dynamic media authorization in mobile networks |
US7697432B2 (en) | 2003-06-27 | 2010-04-13 | Broadcom Corporation | Equal and weighted cost multipath load balancing in a network device |
CN100395981C (zh) * | 2003-09-26 | 2008-06-18 | 华为技术有限公司 | 基于令牌桶算法的接入速率限制方法 |
CN100588174C (zh) | 2004-04-26 | 2010-02-03 | 意大利电信股份公司 | 在同一个网络上调度同步和异步分组的方法和系统 |
FI117685B (fi) | 2004-12-09 | 2007-01-15 | Tellabs Oy | Yhdistetty asiakasvuo- ja laatuluokkaperusteinen vuorotusmenetelmä ja -laitteisto siirtoyhteyskapasiteetin vuorottamiseksi pakettikytkentäisten tietoliikennevoiden kesken |
US7577096B2 (en) | 2005-02-18 | 2009-08-18 | Broadcom Corporation | Timestamp metering and rollover protection in a network device |
US8457131B2 (en) | 2005-02-18 | 2013-06-04 | Broadcom Corporation | Dynamic table sharing of memory space within a network device |
US8331380B2 (en) | 2005-02-18 | 2012-12-11 | Broadcom Corporation | Bookkeeping memory use in a search engine of a network device |
US7606231B2 (en) | 2005-02-18 | 2009-10-20 | Broadcom Corporation | Pipeline architecture for a network device |
US7529191B2 (en) | 2005-02-18 | 2009-05-05 | Broadcom Corporation | Programmable metering behavior based on table lookup |
US7564790B2 (en) * | 2005-02-28 | 2009-07-21 | Cisco Technology, Inc. | Method and system for shaping traffic in a parallel queuing hierarchy |
CN100550887C (zh) * | 2005-06-24 | 2009-10-14 | 上海华为技术有限公司 | 一种实现基带处理单元和射频处理单元间数据传输的方法 |
CA2750345C (en) | 2011-08-24 | 2013-06-18 | Guest Tek Interactive Entertainment Ltd. | Method of allocating bandwidth between zones according to user load and bandwidth management system thereof |
CN103139097B (zh) * | 2011-11-28 | 2016-01-27 | 华为技术服务有限公司 | Cpu过载控制方法、装置及系统 |
US9641424B1 (en) | 2014-10-10 | 2017-05-02 | Nomadix, Inc. | Shaping outgoing traffic of network packets in a network management system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0790726A2 (de) * | 1996-02-16 | 1997-08-20 | Lucent Technologies Inc. | Verfahren zur Aufteilung der Netzmittel mit virtueller Zuteilung |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5050161A (en) * | 1989-12-04 | 1991-09-17 | Bell Communications Research, Inc. | Congestion management based on multiple framing strategy |
CA2104753C (en) * | 1992-10-29 | 1999-02-16 | Kotikalapudi Sriram | Bandwidth allocation, transmission scheduling, and congestion avoidance in broadband atm networks |
WO1997004552A1 (en) * | 1995-07-19 | 1997-02-06 | Fujitsu Network Communications, Inc. | Point-to-multipoint transmission using subqueues |
-
2000
- 2000-09-25 EP EP00965409A patent/EP1221214A4/de not_active Withdrawn
- 2000-09-25 CN CN00813310A patent/CN1376345A/zh active Pending
- 2000-09-25 WO PCT/US2000/026312 patent/WO2001024428A1/en not_active Application Discontinuation
- 2000-09-25 AU AU76132/00A patent/AU7613200A/en not_active Abandoned
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0790726A2 (de) * | 1996-02-16 | 1997-08-20 | Lucent Technologies Inc. | Verfahren zur Aufteilung der Netzmittel mit virtueller Zuteilung |
Non-Patent Citations (3)
Title |
---|
MACGREGOR M H ET AL: "Deficits for bursty latency-critical flows: DRR++" NETWORKS, 2000. (ICON 2000). PROCEEDINGS. IEEE INTERNATIONAL CONFERENCE ON SEPTEMBER 5-8, 2000, PISCATAWAY, NJ, USA,IEEE, 5 September 2000 (2000-09-05), pages 287-293, XP010514114 ISBN: 0-7695-0777-8 * |
See also references of WO0124428A1 * |
SHREEDHAR M ET AL: "EFFICIENT FAIR QUEUING USING DEFICIT ROUND ROBIN" COMPUTER COMMUNICATION REVIEW, ACM, NEW YORK, NY, US, vol. 25, no. 4, 1 October 1995 (1995-10-01), pages 231-242, XP000541659 ISSN: 0146-4833 * |
Also Published As
Publication number | Publication date |
---|---|
CN1376345A (zh) | 2002-10-23 |
WO2001024428B1 (en) | 2001-05-17 |
EP1221214A4 (de) | 2006-06-07 |
AU7613200A (en) | 2001-04-30 |
WO2001024428A1 (en) | 2001-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7457313B2 (en) | Hierarchical prioritized round robin (HPRR) scheduling | |
Semeria | Supporting differentiated service classes: queue scheduling disciplines | |
EP1221214A1 (de) | Ablaufsteurung mit umlaufend hierarchischen prioritäten | |
US6859438B2 (en) | Policy based quality of service | |
US6104700A (en) | Policy based quality of service | |
US7142513B2 (en) | Method and multi-queue packet scheduling system for managing network packet traffic with minimum performance guarantees and maximum service rate control | |
US6377546B1 (en) | Rate guarantees through buffer management | |
US7382727B2 (en) | System and method for asymmetrical bandwidth management | |
US20040073694A1 (en) | Network resource allocation and monitoring system | |
US20020097733A1 (en) | Packet transmitting apparatus | |
Homg et al. | An adaptive approach to weighted fair queue with QoS enhanced on IP network | |
Mamais et al. | Efficient buffer management and scheduling in a combined IntServ and DiffServ architecture: a performance study | |
Zoriđ et al. | Fairness of scheduling algorithms for real-time traffic in DiffServ based networks | |
Francini et al. | A weighted fair queueing scheduler with decoupled bandwidth and delay guarantees for the support of voice traffic | |
EP2063580B1 (de) | Scheduler mit niedriger Komplexität mit Generalized Processor Sharing GPS-artiger Schedulerfunktion | |
Wang | USD: Scalable bandwidth allocation for the Internet | |
KR100475783B1 (ko) | 계층적 우선 순위화 라운드 로빈 스케쥴링 | |
Cisco | Policing and Shaping Overview | |
Cisco | Congestion Management Overview | |
Bodamer | A scheduling algorithm for relative delay differentiation | |
Chen et al. | Hierarchical scheduling for multiple classes of applications in connection-oriented integrated-service networks | |
Jain | A survey of scheduling methods | |
Hou et al. | Service disciplines for guaranteed performance service | |
Pletka et al. | A new buffer management scheme for IP differentiated services | |
Radivojević et al. | Quality of Service Implementation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20020425 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
RBV | Designated contracting states (corrected) |
Designated state(s): BE DE FR GB |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20060511 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20060811 |