TW319944B - - Google Patents

Download PDF

Info

Publication number
TW319944B
TW319944B TW85108506A TW85108506A TW319944B TW 319944 B TW319944 B TW 319944B TW 85108506 A TW85108506 A TW 85108506A TW 85108506 A TW85108506 A TW 85108506A TW 319944 B TW319944 B TW 319944B
Authority
TW
Taiwan
Prior art keywords
virtual
capacity
path
network
volume ratio
Prior art date
Application number
TW85108506A
Other languages
Chinese (zh)
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Application granted granted Critical
Publication of TW319944B publication Critical patent/TW319944B/zh

Links

Description

319944 A7 B7 五、發明説明(1 ) 根據35 11.5_(:.§119〇)&37(:.?.11_§1.78(&)(1)之優先 權 本非臨時專利申請案根據先前臨時美國專利申請案 60/001,169(内部編號27946-00094)"具有一般性訊息類型的 寬頻ATM網路之有效率路徑容量配置(dimensioning)方法” 而聲明優先權,該臨時美國專利申請案係於1995年7月1 4 日提出申請,申請人爲Wlodek Holender及Szabolcs Malomsoky,該申請案亦係讓渡給本發明之受讓人。 相關申請案之對照: 本非臨時美國專利申請案所包含之主題與下列申請案有 關:審查中之非臨時美國專利申請案08/514,480(内部編號 27946-00094 ) ”利用寬頻訊息流量配置最佳虛擬路徑容量之 系統及方法",該案係於1995年8月1 1日提出申請;以及非 臨時美國專利申請案08/5 13,723 (内部编號27946-00095 )"在 一虛擬路徑寬頻網路上執行適應性路徑選擇之系統及方法 ·’,該案係於提出1995年8月11曰提出申請。本申請案特此 引用這些非臨時美國專利中請案及其揭露事項以供參照。 發明背景 經濟部中央棣準局員工消費合作社印31 1.本發明之技術領域 本發明係有關一種有效率地配置一電訊網路的路徑容量 之系統及方法,尤係有關一種配置一有容量限制的實體網 路上所界定的各邏輯鏈路及虛擬網路路徑容量之技術。 2 _相關技術説明 利用被稱爲市内電信’局(l〇cal exchange )的交換設備 經濟部中央標準局員工消費合作社印裂 ^19944 A7 --~~—________B7__ 五、發明説明—(2 ) " '一'~一~- 以便利地將位於局部地理區域的電話器材或其他通訊裝置 ^互連接。而幹線電信局(trunk exchange)又連接各市内電 L局。位於相互分離的地理區域中並連接到不同市内電信 局的各電話/數據器材係經由鏈結到一電訊網路的—組複 雜的市内電信局及幹線電信局而相互通訊。—電訊網路因 而i含複數個互連-的網路成分,例如市内電信局、幹線電 信局、行動無線電信局、長途電信局、及上述成分的组合 在每一網路層級上,自一個諸如電信局等網路成分傳送 到另一個網路成分的訊息可以採取通過不同電信局的各種 路徑。 對一網路内各通訊設施執行有效率地網路訊息流量管理 時’必須在不擴大最後一個選擇的訊息傳送路徑上的擁擠 (congestion)程度下,使足夠數量的電路可用於處理每—目 的地之訊息流量要求。也要求所有最後一個選擇的路徑上 的網路擁擠程度儘量均勻,並要求在實際提供的各路徑内 之未使用容量降至最低,以便確保有效率地使用資源。此 外’經營網路的電話公司之預算有限,因而必須使每—網 路的現有資源發揮最大的效率。 以往在一通訊網路内的訊息流量管理包括以下列各程序 •疋期調查網路内的訊息流量模式;以及改變電路及路徑 之組態,以便增加訊息流量處理的效率。此外,在預期到 一特定位置或一特定區域有高呼叫密度時,或者預期到對 區域内的一些當地事件有高呼叫密度時,可將更多的路徑 及電路加入網路中。傳統的網路管理系統可改變網路内所 ---------- -5-_______ 本紙張认適用中國國家橾準(CNS )八4胁(2 i 〇 χ 297公釐) (請也閲讀背"之注意事項^填寫本頁) ,—裳. 、1Τ 31S944 A7 B7 五、發明説明(3 ) " ~~~" 選擇各路徑間訊息流量負載之相對分配,以便在不過度降 低服務品質(quality of service ;簡稱Q〇Sh々情形下,有效 率地儘量增加網路的使用。然而,傳統的訊息流量網路管 理系統及程序一般都不易爲了處理個別的訊息流量需求而 増加網路内的可用電路及路徑數,而是採取網路的重新配 置,其方式係在一声高的抽象層次上在網路内重新配置各 路徑及電路之容量,以便儘量提高該網路的整體效率。 除了使管理電訊系統内各實體網路資源的效率儘量提高 的固有需求之外,最近幾年中資訊及通訊技術的進步已產 生了新的商機’並對管理產生了新的挑戰。提供電訊服務 的供應商不斷碰到新的客户需求。經由電訊網路提供平常 的語音通訊已經不夠了。目前的用户希望不只是能傳送語 言信號,並且也能經由分封交換網路即時傳送數據、音訊 、視訊、及多媒體信號。由於非同步傳輸模式 (Asynchronous Transfer Mode ;簡稱 ATM)技術可提供寬頻 電訊設施的強化能力,所以ATM技術的重要性與日俱增。 經濟部中央梂準局貝工消费合作社印製 ATM技術的一項主要特徵在於其利用網路資源的彈性。 利用此種彈性的一種可能方式即是將實體網路資源完全或 部分地分割成若干在邏輯上界定之資源。例如,若將一實 體網路分割成複數個虚擬網路,則可大幅簡化該實體網路 的作業、维護、及管理。利用此程序,可將分析並解決一 整個實體網路上每一呼叫的訊息傳送路由問題之工作簡化 成每一虛擬網路上簡單許多的路由問題。就整體來看,每 一個各別的虛擬網路之複雜性小於整個實體網路,因而使 _____ _- 6 -_— 本紙涑尺度適用中國國家梯準(CNS ) Α4規格(210X297公釐) ' -- 319944 A7 B7 五、發明説明(4 經濟部中央標準局負工消费合作社印策 訊息傳送路由問題的解決方式較爲簡單。 由於專線網路内有不同的訊息類型、不同等級的服務、 或不斷又化的訊息流量需求存在,所以也需要對實體資源 的分劇。,務提供者並不爲每—客户應用提供獨立的實體 祠路而疋可建立若干虛擬網路,且這些虛擬網路是定義 在單一共用ATM實體基礎設施的上層。 在虛擬網路結構中此種新的组態彈性需要有效率的路徑 容量配置工具、方法、及演算法。因爲未來將提供的電訊 服務之本質是很難預測的,所以用來管理虛擬網路資源的 組態之任何路徑容量配置方法都必須能處理所有類型的寬 頻訊息。如果爲了適應所提供訊息流量模式之變化而必須 經常修改虛擬網路之组態,則網路重新配置路徑容量及组 fe控制系統之計算效率必須相當高。爲執行網路重新配置 路徑容量及重新設定網路组態而選擇的演算法應在遠短於 每一虛擬網路持續時間的時段中執行其計算。 許多現有的路徑容量配置技術並不符合路徑容量配置技 術可對一般性訊息流量分配建立模型之要求。大多數常用 的路徑容量配置方法無法處理一般性的訊息流量模型,這 是因爲這些方法由於採用歐蘭阻塞量測(Erlang blocking measure)所受到的限制。本發明之方法及系統則克服了這 些缺點。 發明概述 因此,本發明之一目的在於讓用户可利用一般性訊息流 量分配模型而配置一網路之路徑容量。本發明之另一目的 請 先、 閱 讀 背 面 意 事 項 本 頁 裝 訂 -7- 本紙浪尺度適用中國國家橾準(CNS ) A4g ( 210X297公釐) A7 B7 319944 五、發明説明 在於可利用最少的計算資源而執行路徑容量配置之計算。 本發明之再-目的在於實施―種計算複雜性較低並因而具 '有較快速度之路徑容量配置演算法。本發明之又-目的在 於可在儘量短的時段中執行重新配置路徑容量之計算。本 發明(又-目的在於提高虛擬網路的路徑容量配置及虛擬 .路徑配置程序之效率。 若有一包含複數個實體鏈路的實體網路,其中每一實體 鏈路具有-預先指定的傳輸容量,則本發明之系統及方法 示出種可支援-般性訊息流量模型之路徑容量配置技街 此種路咎谷量配置工作被視爲在各種實體鏈路上的負載 平衡問題。虛擬路徑配置問題的最佳解相當於在各種虛擬 路徑上對所分配容量之選擇,其中儘量在各種鏈路上使每 一虛擬路徑的阻塞均句。 在一種面向中,本發明包含—種有效率地配置一電訊網 路的路徑容量之方法,其中該電訊網路具有複數個實體趣 路,用以連接複數個電信局或節點。複數個實體鏈路係與 一個或多個虛擬路徑相關。每一虛擬路徑在該電訊網路的 對电仏局或節點之間提供一種可切換的個別連接。對每 一虛擬路徑都規定有所提供訊息流量,且對該電訊網路的 每一實體鏈路都設定一傳輸容量限制。在使用一平均訊息 量阻塞量測(entropy-blocking measure)的電訊網路上建立 所提供訊息流量與其他計算參數間之關係式模型,並依據 各種實體鏈路的傳輸容量限制,將容量分配給該等複數個 虛擬路徑’因而在一預先選擇的錯誤界限内,使各種虛擬 _______________- 8 - 本紙張尺度適用中國國家梯準(CNS ) A4規格(210X297公釐) 奢 裝 訂 經濟部中央揉準局負工消費合作社印製 3又99豸4 A7 ---------B7 五、發明説明i:6 ) 路徑上的阻塞機率儘量均句。 附圖簡述 若參照下文中較佳實施例之詳細說明,並配合各附圖, 應可對本發明的方法及系統有更完整的了解,這些附圖有 圖1是一例示電訊網路之方塊圖,在該電訊網路内可影響 到虛擬路徑之容量配置; 圖2是例示ATM單元封包(cell)構造之方塊圖; 圖3是一 ATM網路内若干互連虚擬路徑及虛擬頻道之方 塊圖; 圖4是一 ATM網路内各虚擬路徑及虛擬頻道交接及交換 之方塊圖; 圖5是CCITT B-ISDN參考模型之示意圖,圖中示出所支 援的各種服務等級及各標準層; 圖6示出一提供虚擬專線(virtuai leased line ;簡稱vll) 服務的例示A T Μ網路; 圖7不出一包含若干ATM交接設備之多層SDH傳輸網路 t 經濟部中央標準局貝工消費合作社印製 圖8示出各虛擬路徑與實體鏈路間之拓撲關係; 圖9是一用於配置一實體網路上所界定各虛擬路徑容量 的例示推下式演算法(push Down algorithm)各步驟之流程 圖; 圖1 0疋一與本發明有關的平均訊息量比率函數(Entropy Rate Function)之特性曲線圖; ____-9- 本紙诛尺度適用中國國家標準(CNS ) A4規格(210X297公着) 3'ίΗ44______五、發明説明ί: Α7 Β7 經濟部中央標準局貝工消费合作社印11 、圈11是與圖10所示平均訊息量比率函數有 之特性曲線圖; 圖1 2疋一使用與本發明有關的平均訊息量比率函數 擬路徑容量配置演算法各步驟之流程圖; 圖13疋-與本發明有關的適應性路徑容量配置演算法 連續步驟之流程圖; •圖14示出用於不同虛擬路徑之例示平均訊息量比率函數 t 圖15示出與本發明有關的適應性路徑容量配置演算法的 各計算步驟; 圖I 6示出一具有六個節點的例示實體網路; 圖1 7示出在圖丨6所示六個節點的網路上所界定十個虛擬 路徑之連接拓撲; 圖18不出一個三層抽象模型,用以顯示各實體路徑、虛 擬鏈路、與虛擬路徑間之拓撲關係; 圖1 9疋一將虛擬網路的配置路徑容量問題變換成一對等 的虛擬路徑容量配置之轉換程序流程圖; 圖2 0示出一具有六個鏈路且係置於圖1 6所示六個節點的 網路上之例示虛擬網路;以及 圖2 1示出置於圖1 6所示六個節點的實體網路上之五個不 同的子網路。 較佳實施例之詳細説明 在傳統網路内的擁擠控制 首先請參閲圖1’圖中示出一傳統公眾電訊網路之示意圖 關的移動參數 的虛 $· 閔 讀 背, 貪 裝 訂 -10- 本紙乐尺度適用中國國家標準(CNS ) A4Ai格(210X297公釐) 319944 A7 _________B7 五、發明説明(8 ) ,該公眾電訊網路包含複數個市内電信局(21_26),每一 市内電信局都有複數個與其相連接之本地用户,這些本地 用户係以電話器材(27)代表。其中兩個市内電信局(21)及 (24)代表具有與其相連接之遠端用户多工級(28)及(29)’ 該等遠端用户多工級又具有與其相連接之本地用户(27)。 圖1所示之網路又与含複數個幹線電信局(31至34),這些幹 線電信局主要係用來將各市内電信局互連,並提供該網路 各部分間之路徑。圖示之幹線電信局(3 1}係連接到一行動 電話交換局(35),該行動電話交換局(35)包含一對例示的 基地台(3 6)及(37),用以服務複數個行動無線電話用户 (3 8)。此外,亦可將諸如資料庫及智慧型網路等其他的電 訊服務連接到圖中所示的各電信局。在該網路中各電信局 (21-j5)之間示出複數個通訊路徑(3〇),每一通訊路徑可 包含複數個其中包括電纜、光纖鏈路、或無線電鏈路等通 訊電路,用以在該網路内的各電信局之間載送語音及(或) 數據通訊。 經濟部中央標準局®C工消費合作社印製 圖1所示之網路又包含一網路控制系統(40),係經由通 訊鏈路(41)(以虛線代表)將網路控制系統(4〇)連接到該網 路内的各電信局(2 1 - 3 5 ),以便將控制信號傳送到每一電 信局’並自每一電信局接收訊息數據。網路控制系統(4 〇) 發出命令,以便動態地在該網路的各訊息傳送路捏内重新 配置各通訊路徑,並控制該網路的各電信局之警示系統, 以便微調該網路内擁擠狀況之減輕情形。 A T Μ系統概念 ___-11 - 本紙張尺度通用中國國家標準(CNS ) Α4規格(210X297公釐) B7 五、發明説明(9广 ^ -- 在目前所實施的公眾電訊傳輸網路内正發生許多變化。 公眾電訊網路經營者的一個主要目標即是以單一類型的技 術在一共用的基礎設施内處理所有類型的電訊服務。一種 此類技術即是非同步傳輸模式(ATM)技術。 目前正爲了嘗試滿足這些需求而實施ATM,其方式爲產 生一運載電訊網路丨該電訊網路具有相當的"頻寬分割能力 ’’(bandwidth granularity”),可應付極高頻寬之連接。術語 頻寬分剖说力"即是網路的一種特性,其中_啤叫所需的 頻寬在整個呼叫持續時間中可自由變化。319944 A7 B7 V. Description of invention (1) Priority according to 35 11.5 _ (:. §119〇) & 37 (:.?. 11_§1.78 (&) (1) This non-provisional patent application is based on previous Provisional U.S. Patent Application 60 / 001,169 (Internal No. 27946-00094) " Effective Path Capacity Configuration Method for Broadband ATM Networks with Generic Message Types " The application was filed on July 14, 1995, and the applicants were Wlodek Holender and Szabolcs Malomsoky, and the application was also transferred to the assignee of the present invention. Comparison of related applications: This non-provisional US patent application contains The subject matter is related to the following application: Non-provisional U.S. Patent Application 08 / 514,480 (internal number 27946-00094) under review "System and method for configuring the optimal virtual path capacity using broadband message traffic", which was in 1995 The application was filed on August 1, 2011; and the non-provisional US patent application 08/5 13,723 (internal number 27946-00095) " System and method for performing adaptive path selection on a virtual path broadband network The case was filed on August 11, 1995. This application hereby cites these non-provisional U.S. patent applications and their disclosures for reference. BACKGROUND OF THE INVENTION Printed by the Employee Consumer Cooperative of the Central Department of Economics, Ministry of Economic Affairs 31 1. Technical Field of the Invention The present invention relates to a system and method for efficiently configuring the path capacity of a telecommunications network, and more particularly to configuring a logical link and a virtual network defined on a physical network with limited capacity The technology of the path capacity. 2 _Relevant technical description The use of the exchange equipment known as the municipal telecommunications bureau (l〇cal exchange) The Ministry of Economic Affairs Central Standards Bureau employee consumer cooperative printed ^ 19944 A7-~~ --________ B7__ V. Invention Explanation— (2) " '一' ~ 一 ~-to facilitate the interconnection of telephone equipment or other communication devices ^ located in a local geographic area. The trunk exchanges are connected to the municipal electricity L bureaus. Located in Each telephone / data equipment in geographically separated areas and connected to different municipal telecommunication bureaus is linked to a telecommunications network by a complex set of municipal telecommunication bureaus and The telecommunications bureaus communicate with each other. The telecommunications network therefore contains multiple interconnected network components, such as municipal telecommunication bureaus, trunk telecommunication bureaus, mobile wireless telecommunication bureaus, long-distance telecommunication bureaus, and combinations of these components in each At the network level, messages transmitted from one network component, such as a telecommunications office, to another network component can take various paths through different telecommunications offices. When performing efficient network message flow management on various communication facilities within a network, it is necessary to enable a sufficient number of circuits to handle each purpose without expanding the degree of congestion on the last selected message transmission path Local information flow requirements. It also requires that the network congestion on all the last selected paths be as uniform as possible, and that the unused capacity in each path actually provided is minimized to ensure efficient use of resources. In addition, the telephone company operating the network has a limited budget, so it must maximize the available resources of each network. In the past, the management of message flow in a communication network included the following procedures: • Investigate the message flow pattern in the network; and change the configuration of circuits and paths in order to increase the efficiency of message flow processing. In addition, when high call density is expected in a specific location or a specific area, or when high call density is expected for some local events in the area, more paths and circuits can be added to the network. The traditional network management system can change the internal location of the network ---------- -5 -_______ This paper is suitable for use by the Chinese National Standard (CNS) 84 (2 i 〇χ 297 mm) ( Please also read the notes on the back " fill in this page), —shang. 、 1Τ 31S944 A7 B7 V. Description of the invention (3) " ~~~ " Choose the relative distribution of the message traffic load between each path, so that In the case of not excessively reducing the quality of service (Q〇Sh々 for short), the use of the network is increased as efficiently as possible. However, traditional message flow network management systems and procedures are generally not easy to handle individual message flow requirements The number of available circuits and paths in the network is increased, but the network is reconfigured. The method is to reconfigure the capacity of each path and circuit in the network at a sound level of abstraction in order to maximize the network. In addition to the inherent need to maximize the efficiency of managing the physical network resources of telecommunications systems, the advancement of information and communication technologies in recent years has generated new business opportunities and new challenges for management. Providers of telecommunications services are constantly encountering new customer demands. Providing ordinary voice communications through telecommunications networks is no longer enough. Current users want to not only transmit language signals, but also transmit data in real time through the packet exchange network , Audio, video, and multimedia signals. Since Asynchronous Transfer Mode (ATM) technology can provide enhanced capabilities for broadband telecommunications facilities, the importance of ATM technology is increasing day by day. One of the main features of printed ATM technology is its flexibility in using network resources. One possible way to use this flexibility is to divide the physical network resources completely or partially into a number of logically defined resources. For example, if Splitting a physical network into multiple virtual networks greatly simplifies the operation, maintenance, and management of the physical network. With this procedure, it is possible to analyze and solve the message transmission of each call on an entire physical network The routing problem is simplified to a much simpler routing problem on each virtual network As a whole, the complexity of each individual virtual network is smaller than that of the entire physical network, so the _____ _- 6 -_— standard is applicable to China National Standards (CNS) Α4 specifications (210X297 mm ) '-319944 A7 B7 V. Description of the invention (4 The solution to the routing problem of message transmission by the Consumer Standardization Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs is relatively simple. Because there are different message types and different levels of service in the dedicated line network , Or constantly changing information flow requirements exist, so there is also a need to separate physical resources. The service provider does not provide an independent physical ancestral path for each client application and can establish several virtual networks, and these virtual The network is defined at the upper layer of a single shared ATM physical infrastructure. This new configuration flexibility in the virtual network structure requires efficient path capacity configuration tools, methods, and algorithms. Because the nature of telecommunications services to be provided in the future is difficult to predict, any path capacity allocation method used to manage the configuration of virtual network resources must be able to handle all types of broadband messages. If the configuration of the virtual network must be modified frequently in order to adapt to changes in the provided message flow patterns, the network reconfiguration path capacity and the computational efficiency of the fe-control system must be quite high. The algorithm selected to perform network reconfiguration path capacity and network configuration reconfiguration should perform its calculations in a period much shorter than the duration of each virtual network. Many existing path capacity allocation technologies do not meet the requirements of path capacity allocation technologies that can model general message traffic distribution. Most of the commonly used path capacity allocation methods cannot handle general message traffic models because of the limitations of these methods due to the use of Erlang blocking measures. The method and system of the present invention overcome these shortcomings. SUMMARY OF THE INVENTION Therefore, an object of the present invention is to allow users to configure the path capacity of a network using a general message flow distribution model. For another purpose of the present invention, please read the notes on the back of this page for binding -7- This paper wave scale is applicable to the Chinese National Standard (CNS) A4g (210X297mm) A7 B7 319944 5. The description of the invention lies in the use of the least computing resources The calculation of path capacity allocation is performed. A further object of the present invention is to implement a path capacity allocation algorithm with lower computational complexity and therefore faster speed. Another object of the present invention is that the calculation of the reconfiguration path capacity can be performed in the shortest possible time period. The present invention (again-aims to improve the efficiency of path capacity allocation and virtual path configuration procedures of a virtual network. If there is a physical network including a plurality of physical links, each physical link has a predetermined transmission capacity Then, the system and method of the present invention show a variety of path capacity allocation techniques that can support a general message traffic model. This kind of road allocation is considered as a problem of load balancing on various physical links. Virtual path allocation problem The best solution is equivalent to the selection of the allocated capacity on various virtual paths, where as much as possible to make the blocking of each virtual path on various links. In one aspect, the present invention includes-an efficient configuration of a telecommunications A method of path capacity of a network, wherein the telecommunications network has a plurality of physical interesting paths for connecting a plurality of telecommunications offices or nodes. The plurality of physical links are related to one or more virtual paths. Each virtual path is The telecommunications network provides a switchable individual connection between the offices or nodes of the telecommunications network. Provision is provided for each virtual path Information flow, and set a transmission capacity limit for each physical link of the telecommunications network. Establish the provided message flow and other calculation parameters on the telecommunications network using an entropy-blocking measure The relationship model, and according to the transmission capacity limits of various physical links, the capacity is allocated to the plurality of virtual paths'. Therefore, within a preselected error limit, the various virtual _______________- 8-This paper standard is applicable China National Standards (CNS) A4 specification (210X297 mm) Printed by the Central Business Bureau of the Ministry of Economics, the Ministry of Economic Affairs, the Consumer Cooperative, 3, 99, 4 A7 --------- B7 5. Description of the invention i: 6) The blocking probability on the path should be as uniform as possible. BRIEF DESCRIPTION OF THE DRAWINGS With reference to the detailed description of the preferred embodiments below and the accompanying drawings, it should be possible to have a more complete understanding of the method and system of the present invention. FIG. 1 is a block diagram illustrating a telecommunications network. The capacity allocation of virtual paths can be affected in the telecommunications network; FIG. 2 is a block diagram illustrating the structure of an ATM cell packet; FIG. 3 is a block diagram of several interconnected virtual paths and virtual channels in an ATM network; Figure 4 is a block diagram of the handover and exchange of virtual paths and virtual channels in an ATM network; Figure 5 is a schematic diagram of the CCITT B-ISDN reference model, showing the various service levels and standard layers supported; Figure 6 shows An example AT Μ network providing virtual leased line (virtual leased line; abbreviated as vll) service is shown; Figure 7 shows a multi-layer SDH transmission network containing several ATM handover devices t printed by the Beigong Consumer Cooperative, Central Bureau of Standards, Ministry of Economic Affairs 8 shows the topological relationship between each virtual path and the physical link; FIG. 9 is an exemplary push-down algorithm for configuring the capacity of each virtual path defined on a physical network Flow chart of steps; Fig. 10. Characteristic curve diagram of the Entropy Rate Function related to the present invention; ____- 9- This paper scale is applicable to the Chinese National Standard (CNS) A4 specification (210X297 published ) 3'ίΗ44 ______ V. Description of invention ί: Α7 Β7 The Ministry of Economic Affairs Central Standards Bureau Beigong Consumer Cooperatives printed 11, circle 11 is a characteristic curve with the average message volume ratio function shown in Figure 10; Figure 1 2 Flow chart of each step of the pseudo-path capacity allocation algorithm of the average message volume ratio function related to the present invention; FIG. 13-Flow chart of successive steps of the adaptive path capacity allocation algorithm related to the present invention; Exemplary average message volume ratio function t for different virtual paths. FIG. 15 shows the calculation steps of the adaptive path capacity allocation algorithm related to the present invention; FIG. 16 shows an example physical network with six nodes; 17 shows the connection topology of ten virtual paths defined on the six-node network shown in Figure 丨 6; Figure 18 does not show a three-layer abstract model to display each physical path, The topological relationship between the pseudo link and the virtual path; Figure 19: A flow chart of the conversion procedure to transform the virtual network configuration path capacity problem into an equal virtual path capacity configuration; Figure 20 shows a An example virtual network that is linked and placed on the six-node network shown in Figure 16; and Figure 21 shows five different subnets placed on the physical network of the six nodes shown in Figure 16 road. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Congestion Control in a Traditional Network First, please refer to FIG. 1 ', which shows a schematic diagram of a traditional public telecommunications network. The virtual parameters of mobile parameters are related to Min. -This paper music scale is applicable to the Chinese National Standard (CNS) A4Ai grid (210X297 mm) 319944 A7 _________B7 5. Description of invention (8), the public telecommunications network includes a plurality of municipal telecommunications bureaus (21_26), each municipal telecommunications The bureau has a number of local users connected to it, and these local users are represented by telephone equipment (27). Two of the municipal telecommunications bureaus (21) and (24) represent remote users with multiplexing levels (28) and (29) connected to them. These remote users with multiplexing levels also have local users connected to them (27). The network shown in Figure 1 is connected to multiple trunk telecommunications offices (31 to 34). These trunk telecommunications offices are mainly used to interconnect the municipal telecommunications offices and provide paths between various parts of the network. The illustrated trunk telecommunications office (3 1} is connected to a mobile telephone exchange (35). The mobile telephone exchange (35) includes a pair of illustrated base stations (36) and (37) to serve a plurality of Mobile radiotelephone users (38). In addition, other telecommunication services such as databases and smart networks can be connected to the telecom offices shown in the figure. In this network, the telecom offices (21- j5) shows a plurality of communication paths (30), each communication path may include a plurality of communication circuits including cables, optical fiber links, or radio links, etc., for each telecommunications office within the network Voice and / or data communication is carried between. Printed by the Central Bureau of Standards ®C Industrial and Consumer Cooperative of the Ministry of Economic Affairs. The network shown in Figure 1 includes a network control system (40), which is via a communication link (41) (Represented by a dotted line) Connect the network control system (4〇) to each telecommunication office (2 1-3 5) in the network to transmit control signals to and receive from each telecommunication office Message data. The network control system (4 〇) issues commands to dynamically access the network Reconfigure each communication path within each message transmission path and control the warning system of each telecommunication bureau on the network to fine-tune the reduction of congestion in the network. AT Μ System Concept ___- 11-This paper size is common China National Standard (CNS) Α4 specification (210X297 mm) B7 V. Invention description (9 Guang ^-Many changes are taking place in the currently implemented public telecommunications transmission network. A major goal of public telecommunications network operators That is, a single type of technology handles all types of telecommunications services in a common infrastructure. One such technology is asynchronous transmission mode (ATM) technology. ATM is currently being implemented in an attempt to meet these needs in a way that generates A carrier telecommunications network 丨 The telecommunications network has considerable “quot bandwidth bandwidth” (bandwidth granularity), which can cope with the connection of extremely high frequency bandwidth. The term bandwidth splitting power is a characteristic of the network , Where the bandwidth required for beer calls can be freely changed throughout the duration of the call.

在公眾電訊網路中使用A T Μ技術時,可提供下列能力: 相關服務的共用交換及傳輸、更大的頻寬分割能力、對可 變位元傳送速率服務之支援、以及對多媒體服務之支援。 因爲有這.些特性,所以國際電報及電話諮詢委員會 (International Telegraph and Telephone Consultative Committee ;簡稱CCITT)已選擇ATM作爲寬頻ISDN (Broadband ISDN ;簡稱B-ISDN)之核心技術。雖然ATM 經濟部中央標準局貝工消費合作社印製 尚有一些缺點,其中包括低速同步服務的傳輸延遲、增加 網路内的複雜性、以及須加入一些新的性能參數(例如單元 封包捨棄及擁擠),但CCITT仍然作出此選擇,而本發明將 處理這些缺點,將於下文中詳述之。 可利用近似同步數位階層(plesiochronous digital hierarchy ;簡稱pdh)、或同步數位階層(synchronous digital hierarchy ;簡稱SDH)、或以上兩者來實施一 ATM 網路。此外,在可應付因ATM與STM( synchronous _____-12- __—_ 本紙法尺度適用中國國家標準(CNS )八4規格(210XW7公釐〉 A7 五、發明説明(1〇 ) t侧fer mode 步傳輸模間之多重訊息互通而抱 閲 讀 背 釕·, 之 注 意 Ια 填 I 本衣 頁 限制、及因而產生的性能降低時,可將ATM用來作爲 路的訊息載送方式。 網 囷2所不(ATM單元封包結構是ATM技術的核心部分。 -atm單元封包具有53位元組的固定長度,這53個位元 組被分成5位元组的起始碼、及48位元組的資訊欄位(亦稱 爲載送資訊(payload)。ATM單元封包起始碼之結構爲— 數子攔位,其主要功能之—即是協助將ATM單元封包自起When using AT Μ technology in a public telecommunications network, it can provide the following capabilities: shared service related switching and transmission, greater bandwidth division capability, support for variable bit transmission rate services, and support for multimedia services . Because of these characteristics, the International Telegraph and Telephone Consultative Committee (CCITT) has selected ATM as the core technology of Broadband ISDN (Broadband ISDN; B-ISDN). Although the ATM Ministry of Economic Affairs Central Standards Bureau's Beigong Consumer Cooperative has some shortcomings, including low-speed synchronization service transmission delays, increased complexity in the network, and the need to add some new performance parameters (such as unit packet discard and congestion ), But CCITT still makes this choice, and the present invention will address these shortcomings, which will be described in detail below. An ATM network can be implemented using a plesiochronous digital hierarchy (pdh), or synchronous digital hierarchy (SDH), or both. In addition, the ATM and STM (synchronous _____- 12- __—_) can be dealt with in accordance with the Chinese National Standard (CNS) 84 specifications (210XW7mm) A7 5. Invention description (1〇) t-side fer mode step When multiple messages are communicated between the transmission modules, you should read the ruthenium. Note that Ια fills in this page, and the resulting performance is reduced, you can use ATM as a way to carry the message. Network 2 is not (ATM cell packet structure is the core part of ATM technology. -Atm cell packet has a fixed length of 53 bytes, these 53 bytes are divided into a 5-byte start code, and a 48-byte information column Bit (also called payload). The structure of the start code of the ATM unit packet is-a number of bits, its main function-that is to help the ATM unit packet from the beginning

源點經由一個或多個交換節點而繞送到目標點。每一 ATM 單元封包中所存放的資訊保持較小的數量,以便減少各交 換節點中内部緩衝器之容量,並限制這些緩衝器中之等候 订 延遲。A T Μ係在連接導向模式中運作。以模型化的觀點而 Τ,上述這種方式是相當重要的,因爲這種方式可使用現 有的電路父換數學模型而使分配最佳化,並控制網路資源 〇 經濟部中央標準局員工消費合作社印製 A Τ Μ單元封包起始碼的主要功能在識別虛擬連接。 A Τ Μ單元封包内的路由資訊係包含在下列兩個欄位中:一 個用來決定ATM單元封包屬於哪一個虛擬路徑之虛擬路 徑識別碼(virtual path identifier ;簡稱V PI )、及一個用來 決定該單元封包屬於虛擬路徑中的哪一個虛擬頻道之虛擬 頻道識別碼(virtual channel identifier ;簡稱 VCI)。 虚擬頻道是一種可動態分配的末端到末端連接。最佳的 傳輸鏈路每秒可傳送數百個百萬位元,然而虛擬頻道每秒 可能只填滿一條鏈路的數千位元。因此,可在單—的傳輸 -13 本紙乐尺度適用中國國家標準(CNS ) A4規格(210X29*7公釐) A7 319944 _____B7 五、發明説明(11 ) 鏈路上支援大量的同時虛擬頻道。 另一方面,虛擬路徑是一種在各端點間之半永久性連接 。每一虛擬路徑可傳輸大量同時連接的虛擬頻道。因爲係 以單一單元之方式共同處理並交換一大群的虛擬頻道,所 以一虛擬路徑的總處理需求小於一虛擬電路,因而每_( 虚擬)電路有較快的-處理,而能以高出許多的效率使用網路 資源。虚擬路徑的網路管理是較爲簡單且有效率的。 如圖2所示’在用户-網路介面(user_netw〇rk interface ; 簡稱U NI)上的A T Μ單元封包起始碼與網路-節點界面 (network-node interface ;簡稱ΝΝΙ)上的 ATM單元封包起 經濟部中央標準局貝工消費合作社印製 始碼略有不同。UNI包含用於一般性流程控制(general flow control ;簡稱G F C ),且係用來確保公平且有效率地 使用一終端機與該網路間之可用容量。一載送資訊類型指 不碼(payload type indicator ;簡稱PTI)欄位是用來指示— ATM單元封包是否包含用户資訊、或諸如爲維護目的之特 殊網路資訊。一單元封包捨棄優先順序(celn〇ss pd〇rity ; 簡稱C L P)欄位對—個兩階之優先順序編碼,且在因網路狀 況而必須捨棄單元封包時使用該CLP欄位。起始碼錯誤控 制(header error contr〇1 ;簡稱HEC)欄位内含的一核對和保 護該起始碼資訊。 使用ATM單元封包時,可容許資訊傳送速率隨著實際服 =的要求而調整。每單位時間的單元封包數可依據所需的 容量而増加到用來載送數據的實質媒體之傳輸位元速率之 上限。除了數據單元封包之外,還有用於發訊及維護之單 本'.氏張尺度適用中國國)八4驗(2似297公董)-- - 3^8944 A7 B7 五 、發明説明(12 經濟部中央揉準局員工消費合作社印製 =封包、及閒置單元封包。發訊單元封包係用在網路中的 取终用户之間,或用在網路中的各節點之間,此種單元封 I之功犯在於建互一服務(例如一連接)。維護單元封包提 供對ATM層之監督,而閒置單元封包係用來傳輸容量塡 到傳輸媒體的迷率。 、/ ' 請參閱圖3,圖中示出一 ATM鏈路内各虛擬頻道及虛擬 路^^的父換及父接之方塊圖。以一交換機設計者的觀點而 論,"VP交換"即是只使用識別碼搁位之上方部分(亦即較 短欄位(VPI)交換一ATM單元封包。相反地,在”vp/ vc交換,’中,則使用了整個識別碼欄位(VPI及VCI)。_ VP/VC路徑包含複數個互連的VP/VC長度。可在VP或 VC層級上執行交換及交接。虚擬路徑識別碼(vPI)及虛擬 頻道識別碼(VCI)在ATM電路内界定了一個兩層處理及路 由結構。以網路架構上的觀點而論,一虛擬路徑(V p )是— 组個別的連接,也是一 atm網路的路徑對照表中一種類型 的”高速公路"。網路管理的一項重要工作即是將正確數量 的傳輸容量分配给每一個此類高速公路(亦即一虛擬路徑) ’以便使網路的效能最佳化。此種最佳化的工作是頻寬管 理或虛擬路徑容量配置技術之目標,也是本發明將於下文 中詳述的一種面向之主題。 然後請參閲圖4,圖中示出虚擬路徑及虛擬頻道交接及 交換之觀念。虛擬路徑識別碼(V PI)及虛擬頻道識別碼 (VCI)値只對一特定鏈路有效。在每一交接/交換中,係 將新的V ΡI / V C I値措定給單元封包,而實體連接淳及 η 先:: 閑· 讀 背 面s.' 事 項 再 i 訂 -15 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) A7 ----:-----_B7 五、發明説明(13 ) VPI/VCI値I组合使ATM單元封包得以被識別。然後在 諸如表丨所示的轉換表之協助下執行—例示ATM單元封包 之路由,該表1如下所示: ---1 自何埠連接 VPI VCI ----^ 到何埠 VPI VCI A 1 ---—_ 丨·~ _ —:- —c 10 _ A 2 - D 6 B 5 3 —-- C 7 4 B 5 2 D 3 5 表1 一 ATM單凡封包是一 ATM傳輸系統内的基本多工單位 ,其中每一單元封包或資訊單元包含其本身的連接及路由 資訊。此種特性得以直接對各服務頻道施行多工化及解多 工,其中每一頻道可載送不同的位元傳送速率。利用虛擬 路徑識別碼(V PI)及虛擬頻道識別碼(v c丨)欄位内起始碼 中所含的資訊識別每一atm單元封包,並設定每一 atm 單元封包傳送的路徑。如上文所述,虛擬路徑(VP)是兩個 终端機(例如交換系統、區域網路(L A N)閘道器、或專用 網路閘道器)間之一組多工電路。一 vp提供了各虚擬路徑 終端間之直接邏輯鏈路,而以V PI値識別特定的虚擬路徑 〇 亦如上文所述,A T Μ技術内所用的虛擬路徑觀念可以單 元之方式處理多個虛擬頻道(VC)。可將具有諸如相同服務 ---------- ------ 16ji_________ 本紙張尺度適用中國國家標芈(CNS ) A#規格(2丨〇 χ邛7公釐) A7 B7 五、發明説明(14 口口 f (QoS)等共同特性的虛 + I擬頻道結合成能以一個單元方 式而傳輸、處理、及管理的嵌邮 A tm m , 的群體。此種彈性的結合簡化了 A T Μ系統的作業及維護。 虛擬路徑及虛擬頻道都能用爽 丨犯州术知供A Τ Μ網路内的半永久 路控。一作業支援系統設定交拄μ I 2 心X接叹備或沿著一路徑的各 夕工器,而建立及釋出路徑。發訊於一用户與網路之間, 或發訊於網路之内,即可用所建立的連接使各虛擬頻道用 於需要時的交換。 ATM技術的-項重要特性係有關其通訊協定架構,且該 通訊協定的建立是根據所謂的”核心及邊緣"的原理。在 ATM網路"邊緣"上的終端機中執行重新傳輸、流程控制、 及延遲均衡等與正在傳送的資訊類型有關的通訊協定功能 。此種万式保留了有效率且非特定服務的"核心,,網路,而 該網路只包含簡單的單元封包傳輸及交換功能。在此核心 的ATM節點内,並不對資訊欄位執行錯誤檢查,也沒有任 何流程控制。只是讀取單元封包的資訊,然後利用hec修 正可旎影響到位址的單元錯誤,然後朝向該單元封包的目 的地交換該單元封包。 經濟部中央樣準局貝工消费合作社印製 在網路的邊緣上使用A T M調整層(ATM adapUti〇n丨吖^ :簡稱A AL)來強化所提供的服務。如圖5所示,用於B _ IS D N服務的CCITT參考模型考慮到:A A L包含特定服務 的功能。如圖5所示,ATM標準中共有三層。第一層是界 定實體介面及訊框通訊協定的實體層。第二Atm層與所選 擇的實質媒體無關,並界定單元封包結構,且提供多工化 -17- 本紙乐尺度適用中國國家標準(CNS ) A4規格(210X297公釐) A7 B7 五、發明説明(;15 及解多工、以及VPI/VCI轉換,以便控制邏輯網路内各 單元封包的流程。第三層是A A L,A A L提供在服務與 AT Μ層間之重要調整,因而可容許非特定服務的atm傳 輸。AAL執行於使服務格式與ATM單元封包資訊欄位間 之對映。A A L所提供的例示功能包括可變長度封包的描述 、順序编號、時脈戸復、及效能監視。 在電訊網路中佈置atm 可在用户端使用atm技術,以便支援用户區域網路内部 及之間的高速數據通訊。此外,atm可用來作爲一用户端 網路内其中包括語音及影像通訊、數據傳輸、及多媒體應 用等所有服務共用的基礎設施資源。 將ATM節點加入公眾電訊網路後所產生的例示服務即是 提供虛擬專線(VLL)服務。VLL服務係基於虛擬路徑的觀 念’可按照用户的需求而直接調整線路容量,且容易改變 線路谷量’而無須修改界面結構。可經由用户-網路界面 (UNI)將大量的邏輯連接提供给用户。此外,亦可將隨著 用户需求而調整的服務品質提供給用户,以便配合用户的 需求。因此,可選擇多種服務等級、服務品質等級、及性 能參數。例如,語音服務需要較低的傳輸延遲,但可容忍 較高的位元錯誤;而另一方面,數據通訊更能容忍網路的 延遲’但對位元錯誤相當敏感。因此,服務提供者與用户 之間可以契約之方式同意一特定服務的服務品質水準,並 以人工或自動方式實施稽核以確保相符。 如圖6所示,圖中示出一 a T Μ網路内實施的例示虛擬頻 -18 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 請. 閲 讀 背 面*·, i 事 裝 訂 經濟部中央標準局員工消費合作.杜印製 S1S944 Μ Ι______ _ Β7 1 五、發明説明(16 ) 道型VLL服務。網路終端機(a-E)分別經由流程增強節點 (601 - 605 )而耦合到atm交接節點(611 - 614)。AT Μ網 路包含複數個A Τ Μ交接節點(611 - 614 ),這些交接節點可 在虛擬路徑及虛擬頻道層級上提供經過路徑設定。流程增 強節點(6〇 1 - 6〇5 )係位在a τ μ網路的邊緣,以便使網路不 會受到潛在性超載的影響。此種功能確保任何連接都不會 達反連接建立時所同意的條件。將服務增添到—個或多個 交接節點(611 - 6Μ ),即可實施額外的服務。在圖6所示的 網路内’係以终端機(c)與(D)間之波浪線(621)示出一例 不虛擬路徑。短劃線(63丨)示出終端機(A)與(B )間之第一 虛擬連接’而终端機(C)與(E)間之虛線(632)則示出第二 虛擬連接。 除了圖6所示之虛擬專線網路,只要將若干伺服器連接到 該網路内之各ATM節點,亦可根據需要而輕易加入諸如 SMDS/CBDS及訊框傳輸等其他的服務。在住宅區中, A Τ Μ技術亦可用來將諸如随選視訊(〇n_demand vide〇)等強 化的新型娱樂服務提供给最終用户。Α τ μ網路的彈性使其 可支援多種服務,例如長途敎育、家中蹲物、及電玩服務 經濟部中央標準局貝工消費合作社印製 等。 圖7示出一置於—SDH分層傳輸網路上的ατμ網路。這 二層包含用户端網路層(701 )、一夺地傳輸網路層(7〇2 ) 、一區域傳輸網路層(703)、及一國家傳輸網路層(7〇4)。 複數個ATM企業網路節點(川· 714)控制數據自各用户端 細機(715)及各LAN (716)流進複數個add_dr〇p多工器 1 ——_ I y - 本紙張尺度適用中國國家樣隼(CNS ) A^^~f210x29^羡〉 A7 B7 五、發明説明(17 (721)中的某些多工器,這些add_dr〇p多工器(721)服務本 地傳輸網路(705)内的各SDB互連節點(722)。各本地互連 節點(7 2 2 )又經由諸區域互連節點(7 3丨)而耦合到區域傳輸 網路中,而add-drop多工器(732)又將兩個區域互連節點 (731)耦合,在本地傳輸網路層(7〇2)内,包含各以心心叩 多工器(721}的一岑ATM近接節點(723 )及SDH環服務各 互連節點(722 ),且係在一全s T Μ - 1容量下(每秒丨55百萬 位π,也就是B-ISDN服務的標準近接速率)用於用户的近 接。. 利用遠端多工器及提供最終本地迴路連接的其他近接節 點’亦可在此環形網路上執行諸如一般舊型電話服務 (Plain Old Telephone Service ·’ 簡稱 Ρ 〇 T s )等現有訊息傳送 。各ATM近接節點(723 )被共用,以便自—個位置^用不 同的服務,且各ATM近接節點(723 )可包含使用不同νρ/ vc的語音及數據。在這些ΑΤΜ近接節點(723 )中,ατμ 訊息被集中’以便有效率地利用傳輸容量。 經濟部中央榇準局員工消費合作社印製 ATM近接節點的大小可根據所需的容量而變化,自—小 型多工器到-大型交接設備都可。在區域傳輸網料(703 ) 中,ATM交接設備(733 )係用來在各本地區域之間繞送訊 息。在國家傳輸網路層(7〇4)中,如囷7所示,ATM並不明 顯。在-ATM叠置網路中,如圖7所示,易於加入諸如訊 框傳輸及SMDS/CBDS等服務。若増添適當的軟體及硬體 ,則亦可將B-ISDN的功能加入各近接節點及區域節點。 亦如圖7所示,可實施諸如根據CCi_mn標準而運作 -20- 私紙張尺度適用中國國家標準(CNS ) A4%iS- ( 210^297¾ B7 五、發明説明(18 的一網路管理系統(750 ),以便將必要的網路管理功能提供 給該網路的SDH及ATM组成部分。 可根據Telefonaktiebolaget LM Ericsson(亦即本申請案之 丈讓人)提供的網路管理系統之電訊管理及作業支援 (telecommunication management and operation support ;簡 稱TMOS)系列’實施子系統(75〇)對atm網路的管理。此 種鋼路管理可包含根據本發明將於下文中詳述的揭露事項 而實施之路由演算法及擁擠控制等各種功能。 虛擬路徑容量配置: =置電訊網路各路徑容量的—種實用模型即是將配置路 徑容量問題視爲與-兩層結構相關之問㉟,此種兩層結構 包含:一具有不連續拓撲及指定鏈路容量之第一實體網路 層以及一具有若干虛擬路徑及其特定路由之第二虛擬路 栓層將訊息流量需求(traffic demand)提供給此模型中之 各虛擬路徑。在只處理網路容量配置的別乍中,事實上已 ::了繞經各虛擬路徑之順序了。每一虚擬路徑都經過許 〔實體繞路,但每—虛擬路徑係模擬只包含單—路徑之高 ' a路。每—虛擬路徑將有—個特性阻塞値d㈣ 經濟部中央標準局負工消費合作社印裝 varL及—個特性已分配容量値(al1。她d哪―) ,而此換型中之變數數目與虛擬路徑數目相同。 所Γ術語"所提供訊息流量偏t— 虛擬路徑上隨著時間而變的對傳輸容量之需求。 每二:d吾”訊息流量需求,,(’,trafflc demand,,)意指對 所提供訊息流量之時間平均値。當可以單-參數 A7 _______ B7_____ 五、發明説明(19 ) 的卜瓦松分配(Poissonian distribution)建立一 ATM網路上 訊息流量之特性時,可將此種訊息流量稱爲均勻單一等級 訊息流量(homogenous single-class traffic )。當所提供訊息 流量並不均勻時,則通常利用多等級的卜瓦松分配建立此 種訊息流量之模型。 亦可利用一常態分配(normal distribution)建立所提供訊 -- < 息流量之模型。可將此種訊息流量稱爲常態訊息流量 (normal traffic)。最後,亦可根據由量測而決定的實際訊 息流量執行網路各路徑容量之配置。 可將多個用户的傳輸需求合併成一個集體的訊息流。例 如’數個用户可同時將訊息自Dallas傳送到St〇ckh〇lm。此 時並不個別管理這些多個傳輸,而是更有效率地經由一寬 頻中繼線路將這些訊息合併,並當作一群體而傳輸。如上 文所述’ 一虛擬頻道是一可動態分配的末端到末端之連接 。一虛擬路徑則是一邏輯構造,可將多個虛擬頻道當作單 單元而一起處理及交換。此種統一的交換減少了整體的 處理需求,且亦加速了傳輸。因爲對虛擬路徑的管理比對 虛擬頻道或個別實體電路的管理更爲簡單且更有效率,所 以此種技術可大幅改善對網路資源的使用。 虛擬路徑容量配置模型 所考慮的基本模型是-種在一固定路由下運作的連接導 向網路。如果我們將實體網路定義成包含—组】個任意連接 <鏈路,則每一虛擬路徑(VP)或路徑r是—有序清單,該 有序清單之元素是_j的子集。可利用 呆J π用路由矩陣尤界定各 319944 Α7 Β7 五、發明説明(2〇 虛擬路徑與實體鏈路間之關係.,該路由矩陣的各元素爲··The source point is routed to the destination point via one or more switching nodes. The information stored in each ATM cell packet is kept to a small amount in order to reduce the capacity of internal buffers in each switching node and limit the waiting delay in these buffers. AT M is operated in connection-oriented mode. From a modeling point of view, the above method is very important, because this method can use the existing circuit parent to replace the mathematical model to optimize the allocation and control network resources. The Ministry of Economy Central Standards Bureau staff consumption The main function of the ATM unit packet printing start code printed by the cooperative is to identify the virtual connection. The routing information in the ATM unit packet is included in the following two fields: a virtual path identifier (V PI) used to determine which virtual path the ATM unit packet belongs to, and a A virtual channel identifier (virtual channel identifier; VCI for short) that determines which virtual channel in the virtual path the unit packet belongs to. A virtual channel is a dynamically assignable end-to-end connection. The best transmission link can transmit hundreds of millions of bits per second, however the virtual channel may only fill thousands of bits per second. Therefore, it can be transmitted in a single--13 format. The Chinese National Standard (CNS) A4 specification (210X29 * 7mm) is applicable. A7 319944 _____B7 5. Invention Description (11) A large number of simultaneous virtual channels are supported on the link. On the other hand, a virtual path is a semi-permanent connection between endpoints. Each virtual path can transmit a large number of simultaneously connected virtual channels. Because a large number of virtual channels are processed and exchanged together in a single unit, the total processing requirement of a virtual path is less than a virtual circuit, so each _ (virtual) circuit has faster processing, and can be much higher The efficiency of using network resources. Network management of virtual paths is relatively simple and efficient. As shown in Figure 2, the AT-M unit packet start code on the user-net interface (UNI) and the ATM unit on the network-node interface (NNI) The starting code printed by the Beigong Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs is slightly different. UNI includes general flow control (GFC), and is used to ensure fair and efficient use of the available capacity between a terminal and the network. A payload type indicator (PTI) field is used to indicate whether the ATM unit packet contains user information or special network information such as for maintenance purposes. A cell packet discarding priority (CLP) field is referred to as a two-level priority encoding, and this CLP field is used when the cell packet must be discarded due to network conditions. The start code error control (header error control; HEC for short) field contains a check and protection of the start code information. When using ATM unit package, the information transmission rate can be adjusted according to the actual service requirements. The number of unit packets per unit time can be increased to the upper limit of the transmission bit rate of the physical medium used to carry data according to the required capacity. In addition to the data unit package, there is a single book for sending and maintenance. The Zhang scale is suitable for China) 8 4 inspections (2 similar to 297 directors)--3 ^ 8944 A7 B7 5. Description of invention (12 Printed by the Employee Consumer Cooperative of the Central Ministry of Economic Affairs = packet, and idle unit packet. The sending unit packet is used between the end users in the network or between nodes in the network. The main crime of unit seal I is to establish a mutual service (such as a connection). The maintenance unit package provides supervision of the ATM layer, and the idle unit package is used to transfer the capacity to the transmission media. 3. The figure shows a block diagram of the parent exchange and the parent connection of each virtual channel and virtual channel in an ATM link. From the perspective of a switch designer, " VP exchange " is only using identification The upper part of the code shelf (that is, the shorter field (VPI) exchanges an ATM unit packet. Conversely, in "vp / vc exchange," the entire identification code field (VPI and VCI) is used._ VP / VC path contains multiple interconnected VP / VC lengths. Switching can be performed at the VP or VC level Handover. The virtual path identification code (vPI) and the virtual channel identification code (VCI) define a two-layer processing and routing structure within the ATM circuit. From a network architecture perspective, a virtual path (V p) is— The individual connection of the group is also a type of "highway" in the path comparison table of an atm network. An important task of network management is to allocate the correct amount of transmission capacity to each such highway (also That is, a virtual path) 'in order to optimize the performance of the network. This optimization is the goal of bandwidth management or virtual path capacity configuration technology, and is also a subject of the present invention that will be detailed in the following Then please refer to Figure 4, which shows the concept of virtual path and virtual channel handover and exchange. The virtual path identification code (V PI) and virtual channel identification code (VCI) value is only valid for a specific link. During the handover / exchange, the new V PI / VCI value is assigned to the unit package, and the physical connection is chun and η. First: Idle, read the back s. 'Matters, then I set -15. The paper size is applicable to Chinese national standards CNS) A4 specification (210X297 mm) A7 ----: -----_ B7 V. Description of the invention (13) The combination of VPI / VCI value I enables the identification of the ATM unit packet. Then, as shown in Table 丨Execute with the help of the conversion table—exemplify the routing of the ATM unit packet. The table 1 is as follows: --- 1 From where the port connects VPI VCI ---- ^ To where the port VPI VCI A 1 -----_ 丨 · ~ _ —:-—C 10 _ A 2-D 6 B 5 3 —- C 7 4 B 5 2 D 3 5 Table 1 An ATM simple packet is a basic multiplexing unit within an ATM transmission system A unit packet or information unit contains its own connection and routing information. This feature allows direct multiplexing and demultiplexing of each service channel, where each channel can carry a different bit rate. Use the information contained in the start code in the virtual path identification code (V PI) and virtual channel identification code (v c 丨) fields to identify each atm unit packet and set the transmission path of each atm unit packet. As mentioned above, a virtual path (VP) is a set of multiplexed circuits between two terminals (such as a switching system, LAN (LAN) gateway, or dedicated network gateway). A vp provides a direct logical link between the terminals of each virtual path, and the specific virtual path is identified by the V PI value. Also as mentioned above, the virtual path concept used in the AT M technology can handle multiple virtual channels in a unitary manner (VC). Can have the same service as ------------- 16ji_________ This paper standard is applicable to China National Standard (CNS) A # specifications (2 丨 〇xqiong 7mm) A7 B7 5. Description of the invention (Virtual + I pseudo-channels with common characteristics such as 14-port f (QoS) are combined into a group that can be transmitted, processed, and managed in a single unit by embedded mail A tm m,. This flexible combination simplifies The operation and maintenance of the AT Μ system. Both the virtual path and the virtual channel can be used for semi-permanent road control in the ATM network. One operation support system is set up. I 2 heart X connection or Create and release paths along various tools along a path. Sending messages between a user and the network, or sending messages within the network, you can use the established connection to make each virtual channel available for use The exchange of time. An important feature of ATM technology is related to its communication protocol architecture, and the establishment of the communication protocol is based on the so-called "core and edge" principle. Terminals on the ATM network " edge " Perform retransmission, flow control, and delay equalization in the The communication protocol function related to the type of information. This universal method retains an efficient and non-specific service "core", network, and the network contains only simple unit packet transmission and switching functions. At this core ATM node There is no error check on the information field and no flow control. Just read the information of the unit packet, then use hec to correct the unit error that can affect the address, and then exchange the unit packet towards the destination of the unit packet Printed on the edge of the network using the ATM adjustment layer (ATM adapUti〇n 丨 Acr ^: AAL for short) printed on the edge of the network by the Central Sample Bureau of the Ministry of Economic Affairs. The CCITT reference model for B_IS DN service considers: AAL contains the functions of specific services. As shown in Figure 5, there are three layers in the ATM standard. The first layer is the physical layer that defines the physical interface and the frame communication protocol. The second The Atm layer has nothing to do with the selected real media, and defines the unit packet structure, and provides multiplexing. 17- This paper music standard is applicable to the Chinese National Standard (CNS) A4 specification (210X297 Mm) A7 B7 5. Description of the invention (; 15 and demultiplexing, and VPI / VCI conversion to control the flow of each unit in the logical network. The third layer is AAL, AAL provides between the service and the AT Μ layer Important adjustments, which can allow atm transmission of non-specific services. AAL is implemented to map the service format to the packet information field of the ATM unit. Exemplary functions provided by AAL include variable-length packet description, sequence number, and time Pulse recovery, and performance monitoring. Deploying ATM in a telecommunications network can use ATM technology on the client side to support high-speed data communication within and between users' regional networks. In addition, atm can be used as an infrastructure resource shared by all services in a client network including voice and video communications, data transmission, and multimedia applications. The example service generated after adding ATM nodes to the public telecommunications network is to provide virtual private line (VLL) services. The VLL service system is based on the concept of virtual paths that can directly adjust the line capacity according to user needs, and it is easy to change the line valley volume without modifying the interface structure. A large number of logical connections can be provided to users via the user-network interface (UNI). In addition, the service quality adjusted according to the needs of users can also be provided to users in order to meet the needs of users. Therefore, a variety of service levels, service quality levels, and performance parameters can be selected. For example, voice services require lower transmission delays but can tolerate higher bit errors; on the other hand, data communications are more tolerant of network delays ’but are very sensitive to bit errors. Therefore, the service provider and the user can agree on the service quality level of a specific service in a contractual manner, and perform audits manually or automatically to ensure compliance. As shown in Figure 6, the figure shows an example virtual frequency implemented in a TM network -18 This paper standard is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) Please. Read the back *, i matter Binding cooperation of employees of the Central Standardization Bureau of the Ministry of Economic Affairs. Du Printed S1S944 Μ Ι ______ _ Β7 1 V. Description of invention (16) Road-type VLL service. The network terminals (a-E) are coupled to the ATM handover node (611-614) via the process enhancement nodes (601-605), respectively. The AT M network includes a plurality of A T M handover nodes (611-614). These handover nodes can provide path setting at the virtual path and virtual channel level. The process enhancement node (610-1 605) is located at the edge of a τ μ network, so that the network will not be affected by potential overload. This function ensures that any connection will not meet the conditions agreed upon when the anti-connection was established. Add services to one or more handover nodes (611-6M) to implement additional services. In the network shown in Fig. 6, an example of a non-virtual path is shown by a wavy line (621) between terminals (c) and (D). The dashed line (63 丨) shows the first virtual connection between the terminals (A) and (B) and the dashed line (632) between the terminals (C) and (E) shows the second virtual connection. In addition to the virtual private line network shown in Figure 6, as long as several servers are connected to each ATM node in the network, other services such as SMDS / CBDS and frame transmission can be easily added as needed. In residential areas, ATM technology can also be used to provide enhanced new entertainment services such as on-demand video (〇n_demand vide〇) to end users. The flexibility of the Α τ μ network allows it to support a variety of services, such as long-distance education, squatting at home, and video game services. Printed by the Beigong Consumer Cooperative of the Central Standards Bureau of the Ministry of Economy. Figure 7 shows an ατμ network placed on the SDH layered transmission network. These two layers include the client network layer (701), a terrestrial transmission network layer (702), a regional transmission network layer (703), and a national transmission network layer (704). A plurality of ATM enterprise network nodes (Chuan · 714) control data flows from each client's thin computer (715) and each LAN (716) into a plurality of add_dr〇p multiplexer 1 ——_ I y-This paper standard is applicable to China National Sample Falcon (CNS) A ^^ ~ f210x29 ^ En> A7 B7 5. Some multiplexers in the description (17 (721), these add_dr〇p multiplexers (721) serve the local transmission network (705 ) The SDB interconnection nodes (722) in the). Each local interconnection node (7 2 2) is coupled to the regional transmission network via the regional interconnection nodes (7 3 丨), and the add-drop multiplexer (732) Two regional interconnection nodes (731) are coupled, and within the local transmission network layer (702), there are one ATM ATM proximity node (723) and a multiplexer (721) with heart-to-heart multiplexers (721) and The SDH ring serves each interconnected node (722), and is used for user proximity at a full s T M-1 capacity (丨 55 million bits per second π, which is the standard proximity rate of B-ISDN services). . The use of remote multiplexers and other near-end nodes that provide the final local loop connection can also be performed on this ring network such as ordinary old telephone services (Plain Old Te Lephone Service · 'Abbreviation Ρ 〇T s) and other existing message transmission. Each ATM proximity node (723) is shared in order to use different services from one location, and each ATM proximity node (723) can include the use of different νρ / Voice and data of vc. In these ATM proximity nodes (723), ατμ messages are concentrated 'in order to efficiently use the transmission capacity. The size of the ATM proximity node printed by the Employee Consumer Cooperative of the Central Ministry of Economic Affairs of the Ministry of Economy can be based on The capacity varies, from-small multiplexer to-large handover equipment. In the regional transmission network material (703), ATM handover equipment (733) is used to send messages between local areas. Transmission in the country In the network layer (704), as shown in Figure 7, ATM is not obvious. In the -ATM stacked network, as shown in Figure 7, it is easy to add services such as frame transmission and SMDS / CBDS. With the addition of appropriate software and hardware, the B-ISDN function can also be added to the proximity nodes and regional nodes. As also shown in Figure 7, it can be implemented such as operating according to the CCi_mn standard -20- The private paper standard is applicable to China Standard (CNS) A4% iS -(210 ^ 297¾ B7 V. Description of invention (18 of a network management system (750), in order to provide the necessary network management functions to the SDH and ATM components of the network. According to Telefonaktiebolaget LM Ericsson (i.e. In this application, the telecommunications management and operation support (TMOS) series of network management systems provided by the application's implementation subsystem (75〇) manages the ATM network. Such steel road management may include various functions such as routing algorithms and congestion control implemented in accordance with the disclosure items detailed below. Virtual path capacity configuration: = A practical model that sets the capacity of each path in the telecommunications network is to consider the problem of configuring path capacity as a problem related to the two-layer structure. This two-layer structure includes: one with a discontinuous topology and The first physical network layer specifying the link capacity and a second virtual roadblock layer with several virtual paths and their specific routes provide traffic demand to each virtual path in this model. In Bezhazhong, which only deals with network capacity allocation, in fact, the order of bypassing each virtual path is already gone. Each virtual path passes through a number of physical detours, but the simulation of each virtual path contains only the height of a single path. Each virtual path will have a characteristic blocking value d) The varL printed by the Consumer Labor Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs and a characteristic allocated capacity value (al1. She d—), and the number of variables in this transformation is The number of virtual paths is the same. The term " provided message flow is biased t- the demand for transmission capacity on the virtual path that changes with time. Every two: "dwu" message traffic demand ,, (', trafflc demand ,,) means the time average value of the provided message traffic. When it can be single-parameter A7 _______ B7_____ V. Invention description (19) of Bwason When Poissonian distribution establishes the characteristics of message traffic on an ATM network, such message traffic can be called homogeneous single-class traffic. When the provided message traffic is not uniform, it is usually used Multi-level Poisson distribution establishes a model for this type of message flow. A normal distribution can also be used to model the information provided-< information flow. This type of message flow can be referred to as normal message flow ( normal traffic). Finally, the capacity of each path of the network can be configured according to the actual message traffic determined by the measurement. The transmission needs of multiple users can be combined into a collective message flow. For example, several users can be simultaneously Send messages from Dallas to Stokehlm. At this time, these multiple transmissions are not managed individually, but more efficiently via a broadband The line combines these messages and transmits them as a group. As mentioned above, a virtual channel is a dynamically assignable end-to-end connection. A virtual path is a logical structure that can treat multiple virtual channels as Process and exchange together as a single unit. This unified exchange reduces the overall processing requirements and also speeds up transmission. Because the management of virtual paths is simpler and more efficient than the management of virtual channels or individual physical circuits , So this technology can greatly improve the use of network resources. The basic model considered by the virtual path capacity allocation model is-a connection-oriented network that operates under a fixed route. If we define the physical network as including- Group] arbitrary connection < link, then each virtual path (VP) or path r is an ordered list, and the elements of the ordered list are a subset of _j. The routing matrix can be used to define it especially Each 319944 Α7 Β7 V. Description of the invention (2 Relationship between virtual path and physical link. The elements of the routing matrix are:

X 1 if 〇 otherwise (方程式1) 圖8示出各虛擬路徑與實體鐽路間之拓撲關係。在圖8 :虛擬路徑VPl包含實體鏈路匕及匕’而虛擬路徑Vp包X 1 if 〇 otherwise (Equation 1) FIG. 8 shows the topological relationship between each virtual path and the physical path. In FIG. 8: The virtual path VP1 includes physical links and the virtual path Vp packet

含實體鏈路PWith physical link P

及P ' =配給各VP的容量與各實.體鏈路.上所分配的對應容量間 之定量關係可以拖.陣形式表示如下;And P '= the quantitative relationship between the capacity allocated to each VP and the corresponding capacity allocated on each physical link can be dragged. The array form is expressed as follows;

Phys (方程式2) 其中A:是在上述方程式1中所界定類型的路由矩陣‘,是 虛擬路徑容量向韋,(:沖^是實體鏈路容量向量。 代表已分配給各種VP的容*之實體鏈路容量向量Cphys 不得超過任一實體鏈路上的可用實際容量。可利用下列簡 單限制關係式表示此種限制: 經濟部中央標準局員工消費合作社印製 phys c (方程式3 _) 此處的Cphys是一描述K個實·體鏈路的每一實體鏈路上之可用 實際容量。因爲方程式3是一向量不等式,所以重要的是 注意到兩個向量的各對應成分都必須滿足此不等式。舉圖 -23- 本紙浪尺度適用中國國家標準(CNS )厶4%格(210X 297公釐)Phys (Equation 2) where A: is the routing matrix of the type defined in Equation 1 above, is the virtual path capacity to Wei, (: Chong ^ is the physical link capacity vector. It represents the capacity that has been assigned to various VPs * The physical link capacity vector Cphys must not exceed the actual capacity available on any physical link. The following simple limit relationship can be used to express this limit: phys c (Equation 3 _) printed by the Employees Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs Cphys is a description of the actual capacity available on each physical link of K physical links. Because Equation 3 is a vector inequality, it is important to note that the corresponding components of the two vectors must satisfy this inequality. Figure-23- This paper wave scale is applicable to the Chinese National Standard (CNS) 4% grid (210X 297mm)

五 '發明説明(21 A7 B7 8所示之例子而言,路由矩陣尤爲 (方程式4) 量間之關係 此處各虛擬路徑容:量與分配给對應實體鏈路容 式爲方程式 各 10. 「 Ί c. 1 11 • C, +r c 1 2 0 1 2 VP .v phys (方程式5) 此處的 是虛擬'路徑容量向量, c. 且 C1 + c2 α phys 經濟部中央標準局負工消費合作社印製 各實體鍵路的被分配向量。, 到一特定路徑r的呼叫要求程序可以是我們已知假設佔用 为配的任何固疋程序’其前提爲該程序具有一可接受所有 呼叫並避免所有阻塞的無限,容量之資源。Xr表示此假設無 限容量資源之佔用水準,且通常在本門技術中被稱爲”所提 供説息流量"。 虛擬路桎容量配置問題在本發明的系統及方法中被界定 -24 本紙張尺度適用中國國家梯準(CNS ) A4規格(21 〇 X 297公釐) 312944 A7 ------_ 五、發明説明(22 ) 成具有兩個目標。第—,必須使分配給每一虛擬路徑的傳 輸ί量Ϊ佳化,因而儘量降低傳輸成本函數。第二,對於 每實體鍵路而言,分配给通過此鏈路的各種虛擬路徑之 奋^不得超過該實體鏈路的實體傳輸容量限制。 可用在範圍[0,cphys]中呈現任何實數値的連續函數作 爲可分配給各種虛擬路徑的實際容量之近似函數。因此, 因此資源最佳化工作並不需要離散式最佳化、及其伴隨的 複雜性。在本申請案所提出的配置路徑容量問題中,並未 考慮到不同的VP間之負載共用。我們假設對每一虛擬路徑 界疋所提供的訊息流量。此外,因爲網路具有固定的路由 ,所以對各虛擬路徑的選擇即固定了所提供訊息的路由。 "推下式”路徑容量配置技術 在本發明中將虛擬路徑容量配置工作視爲負載平衡問題 其中.負載疋適當選擇的阻塞量測値,且其中之最佳解 相當於所分配VP容量之選擇,其中係以儘量均勻之方式分 配每一虛擬路徑上的阻塞。使阻塞分配均勻的一種方式即 是量測每一虛擬路徑上阻塞値之分散性,然後儘量縮小此 經濟部中央標準局貝工消費合作社印製 種分散性。可利用諸如習知的模擬退火技術等任何最小化 演算法實施上述之方法。 —相關的方法爲:首先識別阻塞値最高的虛擬路徑,然 後自其他的VP重新分配容量,儘量減少該虛擬路徑的阻塞 ’直到該虛擬路徑不再是具有最大阻塞的VP爲止。此種構 心相S於取小値_最大値的最佳化問題,且可如下文所述以 分析之方式將其最佳化。 本紙張尺度適用中國國家縣(CNS ) A4^ ( 210X297公董) 31S944 A7 B7 五、發明説明(23 ) -- 如果我們將第i條虛擬路徑的阻塞表示爲B(vPi),則具 有最大阻塞的VP爲maxCBNPi).),此處是對所有的7;?取 最大値。在這组虛擬路徑上的阻塞量測最大値界定了vp配 置路徑容量問題的目標函數(亦稱爲成本函數)。因此,此 最佳化程序的目標在於拽出目標函數之最小値,該最小値 相當於: '*· . min max Ib (VP.))Five 'invention description (21 A7 B7 8 for example, the routing matrix is especially (Equation 4) The relationship between the volume here each virtual path capacity: the capacity and the capacity assigned to the corresponding physical link capacity are equations 10. "Ί c. 1 11 • C, + rc 1 2 0 1 2 VP .v phys (Equation 5) where is the virtual 'path capacity vector, c. And C1 + c2 α phys minus consumption of the Central Standards Bureau of the Ministry of Economic Affairs The cooperative prints the assigned vectors of each entity's key. The call request procedure to a specific path r can be any stubborn procedure that we know assumes that the occupancy is allocated. The premise is that the procedure has an acceptable all calls and avoids All blocked unlimited, capacity resources. Xr represents the assumption of the occupancy level of unlimited capacity resources, and is usually referred to as "provided information flow" in this technology. The problem of virtual road capacity configuration is in the system of the present invention. And the method is defined -24. This paper scale is applicable to China National Standards (CNS) A4 specifications (21 〇X 297 mm) 312944 A7 ------_ V. Invention description (22) has two goals. No.—must The amount of transmission allocated to each virtual path is optimized, so the transmission cost function is reduced as much as possible. Second, for each physical link, the efforts of the various virtual paths allocated through this link must not exceed the physical chain The physical transmission capacity limit of the path. It can be used in the range [0, cphys] as a continuous function of any real number value as an approximate function of the actual capacity that can be assigned to various virtual paths. Therefore, resource optimization does not require discrete Optimization and its accompanying complexity. In the configuration path capacity problem proposed in this application, load sharing among different VPs is not considered. We assume that the traffic provided by each virtual path boundary is In addition, because the network has a fixed route, the selection of each virtual path fixes the route of the provided message. &Quot; Push-down "path capacity configuration technology in the present invention regards the virtual path capacity configuration work as a load The balance problem includes the proper selection of the blocking measurement value of the load, and the best solution is equivalent to the selection of the allocated VP capacity, where Distribute the congestion on each virtual path as evenly as possible. One way to make the congestion distribution uniform is to measure the dispersion of the congestion value on each virtual path, and then try to minimize this printed by the Beigong Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs Seed decentralization. You can use any minimization algorithm such as the conventional simulated annealing technology to implement the above method. —The relevant method is: first identify the virtual path with the highest blocking value, and then reallocate capacity from other VPs. Reduce the congestion of the virtual path 'until the virtual path is no longer the VP with the largest congestion. This kind of constellation phase is used to optimize the problem of taking a small value_maximum value, and can be analyzed as described below Optimize it. This paper scale applies to China National Counties (CNS) A4 ^ (210X297 company director) 31S944 A7 B7 V. Description of the invention (23)-If we express the blocking of the i-th virtual path as B (vPi), it has the maximum blocking VP is maxCBNPi).), Here is for all 7 ;? Take the maximum value. The maximum value of the congestion measurement on this set of virtual paths defines the objective function (also called cost function) of the path configuration problem of vp configuration. Therefore, the goal of this optimization procedure is to extract the minimum value of the objective function, which is equivalent to: '* ·. Min max Ib (VP.))

1 (方程式Q 此處係對所有可行的组態而界定該最小値。 因爲此種技術涉及在所.考慮的所有VP中壓低最大阻塞値 ,所以利用此種技術以解決最佳化問題的演算.法被稱爲,,推 下式”演算法。此種演算法遵循下列事實:均勻的阻塞分配 相當於無限制條件的·νP配、置路徑容量問題之最佳解。因此 ,此最佳解是將各容量分配给每·二V-p,使在—錯誤界限内 每一 VP上的阻塞都相同。然而,此種最佳命並不必然可以 實現’因爲各種實體鍵路有容量限制。—實體鏈路的有限 容量必須由通過該實體鏈路的所有VP所共用。 經濟部中央樣準局員工消費合作社印製 圖9示出一配置在一實體網路上界定的各虛擬路徑容量 的推下式.演算法一例示實施例之各步驟。此配置路徑容量 程序開始於步驟(902),此時將界定各vP的連接拓撲。並 將各vp组合到一個vp路徑.容量配置组。然後在步驟(9〇3) 中按照各實體鏈路通過的順序聚集這些VP。然後在步祿 (904)中開始分配起始傳輸容量。在步驟(9〇5)中,選擇阻 尺度適用中國國ΰ"準"TcNS ) 規格(21^7^公釐) A7 B7 五、發明説明(24 塞減少的目標數字。爲τ π令 _ ,a , 馬了 5又疋—目標,我們必須首先選擇 —阻塞量測。在本發明的-較佳實施例中,係將-將於下 節中詳述的平均訊息量比率函數用來作爲阻塞量測。目標 値係用來設定路徑容量配置演算法之終止條件。 在步驟(9〇。6)中針對每—實體鏈路決定每一 VP上的阻塞 。如果通過單-實孽鏈路的各vp並未碰到相同水準的阻塞 ,則在步驟(907)中修改目前已分配給每一 vp的容量,以 便在-錯誤界限内均衡各vp<阻塞値。藉由分配尚未被分 配的實際容量,或將生產力較低的VP已經分配的容量重新 分配給較有生產力的VP,即可將容量增添到各VP。係在 不違反任一實錢路的容量限制下,執行此種容量重新調 整。 此程序得以在步驟(908)中識別一個或多個實體鏈路爲此 最佳化程序中之瓶頸。VP阻塞最高且無法以容量重新分配 降低阻塞的實體鏈路被稱爲關鍵鏈路(criticauink)。每一 關鍵鏈路決定通過該實體鏈路的各V P上可得到的最小阻塞 。推下式演算法在最佳化程序的每一階段中最主要的工作 即是識別某一组虛擬路徑的該组關鍵鏈路。 經濟部中央標準局員工消費合作社印裝 一旦在步驟(908)中識別了一關鍵鏈路,則可在通過此關 鍵链路的各虚擬路徑之問重新分配實際容量,其方式爲均 衡每一虛擬路徑之阻塞値。請注意,當發現一實體鏈路是 一關鍵鏈路時,事實上該實體鏈路並沒有尚未分配的容量 。因此,在本演算法到達此配置路徑容量程序的階段之後 ,可以只重新分配通過一關鍵鏈路的各V p間之容量。 -27- 各紙張尺度適用中國國家標準(CNS ) A4%# ( 210X:297公釐) A7 B7 五、發明説明(251 (Equation Q here defines the minimum value for all feasible configurations. Because this technique involves lowering the maximum blocking value in all VPs considered, this technique is used to solve the optimization problem. The method is called a "push-down" algorithm. This algorithm follows the fact that uniform blocking allocation is equivalent to the unrestricted optimal solution of the νP allocation and placement path capacity problem. Therefore, this optimal The solution is to allocate each capacity to every two Vp, so that the blocking on each VP within the -error limit is the same. However, this optimal life is not necessarily achievable because of the capacity limitations of various physical links.— The limited capacity of the physical link must be shared by all VPs that pass through the physical link. Printed by the Employee Consumer Cooperative of the Central Prototype Bureau of the Ministry of Economic Affairs. Figure 9 shows a virtual network configured on a physical network. An algorithm illustrates the steps of the embodiment. The path capacity configuration procedure starts at step (902), at which time the connection topology of each vP will be defined. Each vp is combined into a vp path. Capacity configuration group Then in step (9〇3), the VPs are aggregated according to the order in which each physical link passes. Then in step (904), the initial transmission capacity is allocated. In step (9〇5), the resistance scale is selected for China National ΰ " quasi " TcNS) specifications (21 ^ 7 ^ mm) A7 B7 V. Description of invention (the target number for the reduction of 24 plugs. For τ π 令 _, a, the horse is 5 and the target-we must first Choice-Congestion Measurement. In the preferred embodiment of the present invention, the average message volume ratio function detailed in the next section will be used as the congestion measurement. The target value is used to set the path capacity configuration calculation The termination condition of the method. In step (90.6), the blocking on each VP is determined for each physical link. If the vp passing through the single-sin link does not encounter the same level of blocking, then In step (907), modify the capacity currently allocated to each vp in order to balance the vp < blocking values within the -error limit. By allocating the actual capacity that has not been allocated, or the capacity already allocated by the VP with lower productivity Reallocate to more productive VPs Added to each VP. This type of capacity re-adjustment is performed without violating the capacity limit of any real money path. This procedure can identify one or more physical links in step (908) in this optimization procedure The bottleneck. The physical link that has the highest VP congestion and cannot be reallocated with capacity to reduce congestion is called a critical link. Each critical link determines the minimum congestion available on each VP that passes the physical link. The main work of the following algorithm in each stage of the optimization process is to identify the set of key links of a certain set of virtual paths. Once printed in step (908) by the Central Consumers Bureau of the Ministry of Economic Affairs, the employee consumer cooperative prints When a critical link is identified, the actual capacity can be reallocated among the virtual paths passing through the critical link by balancing the blocking value of each virtual path. Please note that when a physical link is found to be a critical link, in fact the physical link does not have unallocated capacity. Therefore, after the algorithm reaches the stage of this configuration path capacity program, it is possible to only reallocate the capacity between each V p through a critical link. -27- The Chinese national standard (CNS) A4% # (210X: 297mm) is applied to each paper size A7 B7 5. Description of invention (25

ίι, 閲* 讀 背 之 注 意 事 項 再,* 填 . !裝 1 I 然後在步驟(9〇9 )中,自仍然需要配置路徑容量的這组所 有的VP中去掉已分配容量的各VP。對應地在步驟(910)中 ’可用實體鍵路容量減少了在先前步驟中去掉的各VP之已 分配容量。 配置路技容量問題因而簡化成儘量減少渠於VP集合的最 高P且塞機率之最佳匕問題。因而可使用遞迴式重新進入演 算法來實施此程序。 現在使用先前步驟得到的阻塞値作爲其餘配置路徑容量 問題之起始値。在步驟(911)中遞迴地重複此最佳化程序, 直到分配完每一實體鏈路的所有容量爲止。概言之,此種 貪%型演算法開始時係對整組所有的V p配置其路徑容量, 1Τ 並在尚待配置路徑容量的虛擬路徑集合成爲零集合時,在 步驟(912)終止本演算法。 我們在此強調,於執行本文所詳述的這類路徑容量配置 演算法時,播須同樣遵循圖9所示之順序。依照實施細節 及收斂性考慮的不同,路徑容量配置演算法的某些步驟之 執行順序可以與圖9所示者不同。 經濟部t央揉準局員工消費合作社印製 在一特定VP集合中以分析方式識別關鍵鏈路的問題,已 也明是種困難的工作。目前並沒有已知的技術可利用所 提供訊息流量及實體鏈路之容量限制直接決定關鍵鏈路。 因此,推下式演算法採用一種反覆式方法來識別關鍵鏈路 。孩演算法開始時將—均勻的較大阻塞値指定給所有的 ,而設定所有VP的起始値。所選擇的起始阻塞値必須大到 各VC容量的起始分配値總和不會超過各實體鏈路的可用實ίι, READ * Read back attention items, and then fill in.! Install 1 I and then in step (9〇9), remove the VPs of the allocated capacity from the VPs of the group that still need to configure the path capacity. Correspondingly in step (910), the available physical link capacity reduces the allocated capacity of each VP removed in the previous step. The problem of configuring road technology capacity is thus reduced to the problem of minimizing the highest P and the probability of jamming in the VP set. Therefore, a recursive reentry algorithm can be used to implement this procedure. Now use the blocking value obtained in the previous step as the starting value for the remaining configuration path capacity problems. This optimization procedure is repeated recursively in step (911) until all the capacity of each physical link is allocated. In summary, this greedy-% algorithm starts by allocating its path capacity to all V p of the entire group. When the virtual path set that has yet to be configured with path capacity becomes a zero set, the process is terminated at step (912). Algorithm. We emphasize here that when implementing the path capacity allocation algorithm detailed in this article, the broadcast must also follow the sequence shown in Figure 9. Depending on implementation details and convergence considerations, the execution order of some steps of the path capacity allocation algorithm may be different from that shown in FIG. 9. Printed by the Employee Consumer Cooperative of the Ministry of Economic Affairs of the People's Republic of China to identify critical link problems in a specific VP set, it is also clearly a difficult task. At present, there is no known technology that can directly determine the critical link by using the provided message flow and the capacity limit of the physical link. Therefore, the push-down algorithm uses an iterative method to identify critical links. At the beginning of the algorithm, assign a uniform large blocking value to all, and set the starting value of all VPs. The selected initial blocking value must be so large that the sum of the initial allocation values of the capacity of each VC will not exceed the available real link of each physical link

31S944 A7 B7 五、發明説明_(26 ) 際容量。 對最佳化程序中剩下的這组所有的虛擬路徑緩慢且均勻 地降低阻塞程度,而在每—階段中將首先違反所通過實體 鏈路的實際容量限制之鏈路識別爲關鍵鏈路。 利用平均訊息量阻塞量測之路徑容量配置 在配置路徑容量,程的每一階段中用來識別關鍵鏈路的 上述程序之速度及效率有相當程度係取決於模型 中所使用 的阻塞量%。在傳統上’㈣阻塞量測(亦稱爲時間擁攝阻 塞么式)已被用來決定一網路中各容量的最佳配置。 使用平均訊息量比率函數作爲阻塞量測的本發明技術產 生優於使用歐蘭阻塞量測可得到的結果。使用平均訊息量 比率函數時’卩建互1壬—種訊息流量分配的才莫g,而且在 大多數的情形中,此種計算比依據他種阻塞量測的計算快 速許多。我們也發現:主要由於平均訊息量比率函數是一 凸形函數,因此可大幅改良對關鍵鏈路之反覆式搜尋。在 2明一採用平均訊息量比率函數的路徑容量配置演算法之 前,我們先説明平均訊息量比率函數之特性以幫助了解。 以平均訊息量比率函數作爲阻塞量測 經濟部中央標準局貝工消費合作社印製 如上文所述,阻塞量測的選擇是推下式演算法之關鍵。 將於下文中推導依據平均m比率函數的阻塞量測之一 般,表示式,然後將其應用於一例示情形中,其中係以單 -等級及多種等級的卜瓦松分配建立所提供訊息流量之模 型。 平均訊息量比率函數是本門技術中所習知者,已被用來 __ - 29 I紙張尺度適用t园國家標A4規格(210><297公幻 A7 B7 五、發明説明(27 建互實體鏈路層級上之擁擠模型,請參閲諸如J Y Hui所 著的”用於多層訊息傳送的呼叫許可及頻寬指定之擁擠量測 ’該文係刊登於 Internati〇nal..Journal of Digital & Analog31S944 A7 B7 Fifth, the description of the invention _ (26) international capacity. All the remaining virtual paths in the optimization process slowly and evenly reduce the degree of blocking, and in each phase, the link that first violates the actual capacity limit of the physical link passed is identified as a critical link. Path capacity configuration using average traffic volume congestion measurement In configuring path capacity, the speed and efficiency of the above procedure used to identify critical links at each stage of the process depends to a certain extent on the amount of congestion used in the model. Traditionally, ’㈣blocking measurement (also known as time congestion blocking) has been used to determine the optimal configuration of each capacity in a network. The technique of the present invention that uses the average message volume ratio function as the blocking measurement produces better results than can be obtained using the Oulan blocking measurement. When using the average message volume ratio function, it is only possible to assign a message flow to each other, and in most cases, this calculation is much faster than calculations based on other congestion measurements. We also found that: mainly because the average message volume ratio function is a convex function, it can greatly improve the iterative search for critical links. Before the Mingyi 2 path capacity allocation algorithm using the average message volume ratio function, we first describe the characteristics of the average message volume ratio function to help understand. Using the average message volume ratio function as the blocking measurement Printed by the Beigong Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs As mentioned above, the choice of blocking measurement is the key to the push-down algorithm. The general, expression of blocking measurement based on the average m ratio function will be derived below, and then applied to an example scenario in which single-level and multi-level Bwason distributions are used to establish the provided message flow model. The average message volume ratio function is known in this technology, and has been used to __-29 I paper scale is applicable to the national standard A4 specification (210 > < 297 public phantom A7 B7 V. Invention description (27 built For the congestion model at the inter-physical link level, please refer to the "Congestion Measurement for Call Permission and Bandwidth Designation for Multi-layer Message Transmission" by JY Hui, for example. This article is published in Internati〇nal..Journal of Digital & Analog

Cabled Systems”(1990),但該文中並未將平均訊息量比率 函數用在虚擬路徑層級或網路層級.中,作爲解決配置路徑 容量或計畫問題的阻塞量測。此外,平均訊息量比率函數 已被用來定義一實體鏈路,•有效容量"之觀念。但是請務必 /主意’採用本文所詳述的平均訊息量比率函數之路徑容量 配置技術並不限於遵循卜瓦松分配之所提供訊息流量,且 本發明.之系統及方法亦同樣適用於任何類型的所提供訊息 流量分配,包括利用量測而決定者。 可將飽和阻塞機率定義爲訊息流量需求超過傳輸容量的 一規定値之.機路。飽和機率亦稱爲"尾端機率.,,,.因爲該機 率意指所提供訊息流量分配尾端之機率群。將於下文中推 導此種尾端機率之習·知近似法,亦即—Chernoff界限。 假設X爲一任意分配的隨機變數,C爲一特定値。則對於 所有的正値.s而言,可證明下列的界限存在·: x>.C) = p(e E (e:;x) 經濟部中央標準局負工消費合作社印製 (方程式7) 此處P(X〉C)是随機變數X所取的値大於c之機率。 此界限之推導係基於馬可夫(Markov)不等式。術語 ln(E(esx))表示力矩產生函數之對數,亦稱爲cumulant函數 -30- 本紙張又度適用中國國家標準(CNS ) A4規格(2!0X297公釐) 五、發明説明(28 A7 B7 。對S其指數SC-" (s)之最大値,即具 Λ 侍到最緊的界限f亦 稱爲Chernoff界限)。在s = s *時,读钊山且 運到此最大値。此虛的 s*是方程式,(s)的唯一正數解。 此恩的 易於證明"’(s)隨著s的增加而增 g加因而保證其根的唯 一性。因爲〆’(s)2〇,所以"·()隨 、思考s的增加而增加。這 又是由於第二導數等於(移動後)分配之變異 之指數係以Ix(C)表.示’且被稱爲平均訊息量速率函數。 平均訊息量比率函數h_lant函數的凸共軛變換(― conjugate transform),且可以下式表示· -lnP(X>C) ^ SUsP[sC~lnE(esX))=I {C) (方程式8) 因爲 lnP(xsC) = 1ηΡ(_χ^),且 Inp(_x>_c)= lnp(e_sx^se)’所以可用下心等式推導此分配左尾端 之一類似公式: -lnP(^〇 ^S3P(-sC-ln'5(e-^)) = X-J~C)(方程式9) 經濟部中央標準局員工消費合作社印製 可利用參數S將平均訊息量*率函·數的右尾及左尾表示爲 (s) ) C( ~s) (方程式10) 因此’改變參數s(正負號時,可自平均訊息量比率函數之 右尾切換到左尾,反之亦然。 -31 - 本紙張尺度適用中國國家梂準(CNS )八4規格(210X297公董 B7 五、發明説明(29 均句卜瓦松分配訊息流量之平均訊息量比率函數 首先考慮在所提供訊息流量均勻時使用平均訊息量比率 函數來配置各虛擬路徑之容量。均勻卜瓦松分配訊息流量 之特徵在於:一頻寬需求參數卩(平均呼叫到達速率r、及 每一呼叫平均..持續時間h(亦稱爲平均佔線時間)。因此,訊 息流量需求P是平均呼叫到達速率及平均佔線時間之乘積 。亦即r * h。可以下列關係式描述均勻訊息流量之cumuiant 函數: (方程式11) P (s) = p(esp - 1) 因此,均勻訊息流量之已分配容量.c及平均訊息量比率函 數I可以下式表示·· C = U/(s)= ppe. (方程式12) 以及 J(C) =5*(C) -C-P(S*(C)). (方程式13) 經濟部中央標準局負工消費合作杜印策 亦g卩 工(C (s) > = sppe sp - p (e sp - 1) (方程式1 4 ) 若替代關係式(s - 1 n C - 1 η ( 0 p ))爲方程式丨2之解,則 亦可唯一地將方程式14所蛘述類型的均勻訊息流量之平均 ,-32 本紙張尺度適用中國國家標率(CMS ) A4規格(210X 297公釐) ^9944"Cabled Systems" (1990), but this article does not use the average message volume ratio function at the virtual path level or network level. It is used as a congestion measurement to solve the configuration path capacity or planning problems. In addition, the average message volume ratio The function has been used to define a physical link, the concept of "effective capacity". However, please be sure / idea that the path capacity configuration technique using the average message volume ratio function detailed in this article is not limited to follow the Bwason allocation The provided message flow, and the system and method of the present invention are also applicable to any type of provided message flow distribution, including the use of measurement to determine. The saturation blocking probability can be defined as a requirement that the message flow demand exceeds the transmission capacity The chance. The saturation probability is also known as " tail probability. &Quot; because the probability means the probability group at the tail end of the provided message traffic distribution. The practice of this tail probability will be derived below. Knowing the approximation method, that is-Chernoff limit. Suppose X is an randomly assigned random variable, C is a specific value. Then for all positive values. It is clear that the following limits exist: x> .C) = p (e E (e :; x) Printed by the Ministry of Economic Affairs Central Standards Bureau Negative Consumer Cooperative (Equation 7) where P (X> C) is a random variable The probability that the value taken by X is greater than c. The derivation of this limit is based on the Markov inequality. The term ln (E (esx)) means the logarithm of the torque generation function, also known as the cumulant function-30- This paper is also applicable China National Standard (CNS) A4 specification (2! 0X297mm) V. Description of invention (28 A7 B7. The maximum value of the index SC- " (s) for S, that is, with the tightest limit f (Called Chernoff limit). When s = s *, read Zhaoshan and transported to this maximum value. This imaginary s * is the equation, the only positive solution of (s). This grace is easy to prove " '(s) As s increases, increasing g increases and thus guarantees the uniqueness of its root. Because 〆 '(s) 2〇, so " · () increases with the increase of thinking s. This is because the second derivative is equal to ( (After moving) The index of the assigned variation is represented by Ix (C). It is called the average message volume rate function. The average message volume ratio function h_lant function is convex Conjugate transform (― conjugate transform), and can be expressed by the following formula -lnP (X> C) ^ SUsP [sC ~ lnE (esX)) = I {C) (Equation 8) Because lnP (xsC) = 1ηΡ (_χ ^ ), And Inp (_x > _c) = lnp (e_sx ^ se) ', so one can use the following equation to derive a similar formula for the left end of this distribution: -lnP (^ 〇 ^ S3P (-sC-ln'5 (e- ^)) = XJ ~ C) (Equation 9) Printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs can use the parameter S to express the average message volume * the right and left tails of the rate function and number as (s)) C (~ s) (Equation 10) Therefore, when changing the parameter s (sign), you can switch from the right tail to the left tail of the average message volume ratio function, and vice versa. -31-This paper scale is applicable to the Chinese National Standard (CNS) 84 specifications (210X297 by the director B7. V. Description of the invention (29 average sentence bwason distributed message flow average message volume ratio function first consider the uniformity of the provided message flow The average message volume ratio function is used to configure the capacity of each virtual path. The characteristic of uniform Poisson distribution of message traffic is: a bandwidth demand parameter (the average call arrival rate r, and the average per call .. duration h ( (Also known as average busy time). Therefore, the message traffic demand P is the product of the average call arrival rate and the average busy time. That is, r * h. The cumuiant function of uniform message traffic can be described by the following relationship: (Equation 11) P ( s) = p (esp-1) Therefore, the allocated capacity of the uniform message flow. c and the average message volume ratio function I can be expressed as follows: C = U / (s) = ppe. (Equation 12) and J ( C) = 5 * (C) -CP (S * (C)). (Equation 13) The Ministry of Economic Affairs, Central Bureau of Standards, negative labor consumption cooperation, Du Yinze, and g labor (C (s) > = sppe sp-p (e sp-1) (Equation 1 4) If the substitution relation (s-1 n C-1 (0 p)) is the solution to equation 丨 2, then it can also uniquely average the average message flow of the type described in equation 14, -32 This paper scale is applicable to China's national standard (CMS) A4 specification (210X 297 PCT) ^ 9944

、發明説明(30 訊息量比率函數表示爲、 Invention description (30 information volume ratio function is expressed as

如下式所示之已分配容量C l(c) = ~ (in c _ p、 - 1ηίρρ)) - ρ - 1 ·\ ΡΡ (方程式1 5 ) 圖10示出以單位頻宽需乾 訊息流量値之平均j p表不的若干不同所提供 H比率函數曲線。圖11示出移動參 與已刀配谷量c間關係之函數圖。 特:圖⑽U所示,平均訊息量比率函數具有三個顯著的 二:—,該函數是―凸函數,在分配之平均數上到達 即在〜時。第二,當增加。値到分配之平 :、:亦即當C=P),移動參數s由負値變成正値。如圖 11所不’當c<p時,移動參數5爲.負數;當時,5爲 正數卜第三,移動參數s是單調函數,且隨著分配給一虚 擬路徑的容量增加而增加。 因此’可將變換參數s视爲—機率分配之移動參數。當移 動參數取負値時,與移動參數爲零値時相比,機率分配被 移到左方。當移動參數取正値時^ .,則機率値移到右方。 經 中 梯 準 為 β 工 消 費 合 4 it 印 製 多等級卜瓦松分配訊息流量之丰均訊息量比率函數 可將訊息流量模型延伸到特徵爲多級卜瓦松分配之所 提供訊息流量,且將於下文中推導對應於此種所提供訊息 流量模型之平均訊息量比率函數、。 若用多等級分配的平均k息量量測來取代單—等級分配 的平均訊息量量測,則將產生‘法再以所分配容量C來明 ——:----33 - 本紙.張尺度適用中囷国家標準(CNS ) A4規格(2Ι0Χ^^^ A7 五 、發明説明(31 B7 :表示平均訊息量比率函舞的困難。冑了避免此一問題, 叙仝移動參數S來表7F平均訊息量比率函數,且亦利用該移參數S作爲-控制參數。只要增加此參數之絕對値,即可、〈改乂所分配的容f,因而可明確地遞增平均訊息量量 測値。。我們:以Xi表示等心之隨機訊息流量(此處i値爲 '界疋每I級的尖蜂頻寬需求P i ’平均呼叫到達速率 Γ i,及佔線時間h i,使 之期望値爲:The allocated capacity C l (c) = ~ (in c _ p,-1ηίρρ))-ρ-1 · ΡΡ (Equation 1 5) shown in the following formula The average jp represents a number of different H ratio function curves provided. Fig. 11 shows a function diagram of the relationship between the moving parameter and the amount c of the knife distribution valley. Special: As shown in Figure ⑽U, the average message volume ratio function has three significant two:-, the function is a convex function, which is reached when the average number of distributions is ~. Second, when increasing. Value to the level of distribution:,: That is, when C = P), the movement parameter s changes from negative value to positive value. As shown in Figure 11, when c < p, the movement parameter 5 is a negative number; at that time, 5 is a positive number. Third, the movement parameter s is a monotonic function, and increases as the capacity allocated to a virtual path increases. Therefore, the transformation parameter s can be regarded as a movement parameter of probability distribution. When the movement parameter takes a negative value, the probability distribution is shifted to the left compared to when the movement parameter is zero. When the movement parameter takes the positive value ^., The probability value moves to the right. The multi-level Bawasong distribution of information flow rate for the β-industrial consumption and 4 it is printed by Zhongti quasi. The ratio of abundance and average volume of information flow can extend the message flow model to the provided information flow characterized by multi-level Bwason distribution The average message volume ratio function corresponding to this provided message traffic model will be derived below. If the average k-volume measurement of multi-level distribution is used to replace the average-volume measurement of single-level distribution, the method will be generated and then specified by the allocated capacity C-:-33-this paper. The scale is applicable to the Chinese National Standard (CNS) A4 specification (2Ι0Χ ^^^ A7. V. Description of the invention (31 B7: the difficulty of expressing the average message volume ratio. To avoid this problem, describe the movement parameter S to table 7F The average message volume ratio function, and also uses the shift parameter S as a control parameter. As long as the absolute value of this parameter is increased, it can be changed to the assigned capacity f, so that the average message volume measurement value can be clearly increased. We: Let Xi denote the isocentric random message traffic (where i is the 'broadband bandwidth demand P i per class I' average call arrival rate Γ i, and the busy time hi, so that the expected value is :

P ,且隨機變數\累積値 (方程式1 6)P, and random variable \ cumulative value (Equation 16)

If (C) 多等級訊息流量^ 之平均訊息量比率函數h 是飽和機率負對數之估計値: (έIf (C) multi-level message flow ^ the average message volume ratio function h is the estimated negative logarithm of saturation probability

In > .(Ο (方程式1 7 ) 聞 讀 背if. 之 注In >. (Ο (Equation 1 7) Wen read back if.

填 訂 人 經濟部中央揉準局員工消費合作社印製 載送聚合多等 此處k是訊息流量等級數,C是分配給VP且 級訊息之容量。 下列關係式表示一適用於所有分配的平均訊息量比率函 數之一般特性: -34 本紙張尺度逋用中國國家標隼(CNS ) A4規格(2ΐ〇χ297公釐 A7 B7 · 五、發明説明(32 )Printed by the Ministry of Economic Affairs, Central Bureau of Standardization, Employee, Consumer Cooperative, Printed, Converged, etc. where k is the number of message flow levels, and C is the capacity of the message assigned to the VP. The following relationship expresses the general characteristics of the ratio function of the average message volume applicable to all distributions: -34 This paper scale adopts the Chinese National Standard Falcon (CNS) A4 specification (2 ΙΟχ297 mm A7 B7 )

I ΧΛ Ε t X.I ΧΛ Ε t X.

=J (方程式1 8 ) (方程式1 9) d 經濟部中央揉準局貝工消費合作社印製 .工佘' 我們同樣可證明出.在c上是凸的。 夕等級卜瓦松分配訊息流量的力矩產生函數之對數係以 下列關係式表示:. =έρ,(θ^-ΐ) 因爲該平均訊息量比率函數具有下列一般形式= J (Equation 1 8) (Equation 1 9) d Printed by the Beigong Consumer Cooperative of the Central Bureau of Economics of the Ministry of Economic Affairs. Gong She 'We can also prove that it is convex on c. The logarithm of the moment generating function of the evening-level Bwason ’s distribution of message flow is expressed by the following relationship: = = ρ, (θ ^ -1) because the average message volume ratio function has the following general form

Ix{C[s) ) = 5^P(sC- 所以可用移每參數s表示多等級訊息流量之平均訊息量比率 函數如下: I^x/C(s)),t{spiPie^ P;eSPj-l (方程式21) =可使所分配容量C與移動'參數S有如 下式所示之函數 -35-Ix {C [s)) = 5 ^ P (sC- So we can use shift per parameter s to express the average message volume ratio function of multi-level message traffic as follows: I ^ x / C (s)), t {spiPie ^ P; eSPj -l (Equation 21) = The allocated capacity C and the shifting parameter S can have a function as shown in the following formula -35-

本紙張尺度適用W國家標準(CNS ) A4^i^7i〇^29?S A7 B7 五、發明説明(33 (方裎式22) 若用多等級平均訊息量量測取代單一等級平均訊息量量 測,則可使問題在分析上更爲複雜,這是因爲無法料所This paper scale is applicable to the W national standard (CNS) A4 ^ i ^ 7i〇 ^ 29? S A7 B7 V. Description of the invention (33 (Square 22) If multi-level average message volume measurement is used instead of single-level average message volume Test, it can make the problem more complicated in analysis, because it is unpredictable

?配容量C明確表示.平均訊息量量測。此種複雜性是由於 無法自方程式2 2中去掉移動參數.s。 然而,因爲方程式21係以移動參數s表亲平均訊息量比 率函數,所以我們可以改绫5,而不改變c。因此,:用方 ^式2 2 ’即可在演算法的每一反覆步驟中計算容量値。請 注意,s之零値相當於平均,訊息量量測之零値。針對所有的 VP將s設定爲零,即可開始執行路徑容量配置演算法。 常態分配訊息流量之平均訊息量比率函數 經濟部中央標準局員工消費合作社印製 平均訊息量比率函數亦可.配合並非依據卜瓦松型所提供 訊息流量分配的其他訊息流量模型使用。下文中將説明兩 種重要的訊息流量模型。第一種訊息流量模型係基於所提 供訊息流量爲常態分配之平均訊息量比率函數。並將爲此 種訊息流量模型推導平均訊息量比率函數之對應公式。第 一種訊息泚章模型係基於利用實際量測訊息流量而推導出 之平均訊息量比率函數,而非基於對所提供訊息流量分配 的明確假設。 義 請參閲R.S. Ellis所著的,’平均訊息量、大型偏差、及統計 力學9 ( Springer-Verlag,1985 ),已可利用下列公式定 常態分配訊息流量之平均訊息量..比率函數·· 36- 本紙張尺度逋用中國國家標準(CNS ) A4^格(210X297公釐) 31S944 A7 B7 五、發明説明(34? Allocation capacity C clearly indicated. Average message volume measurement. This complexity is due to the inability to remove the movement parameter .s from equation 22. However, because Equation 21 is a function of the ratio of the average message volume of the cousin of the movement parameter s, we can change Aya5 without changing c. Therefore, using formula 2 2 ', the capacity value can be calculated in each iteration of the algorithm. Please note that the zero value of s is equivalent to the average, and the zero value of the measurement of the amount of information. By setting s to zero for all VPs, the path capacity allocation algorithm can be started. Average message volume ratio function for normal distribution of message flow Printed by the Staff Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economy The average message volume ratio function is also acceptable. It is used in conjunction with other message flow models that are not based on the message flow distribution provided by the Bwason model. Two important message traffic models will be described below. The first message flow model is based on the ratio of the average message volume to the normal distribution of the provided message flow. The corresponding formula of the average message volume ratio function will be derived for this message flow model. The first message model is based on the average message volume ratio function derived from the actual measurement of message flow, rather than based on explicit assumptions about the distribution of message flow provided. For the meaning, please refer to RS Ellis, "Average Message Volume, Large Deviation, and Statistical Mechanics 9 (Springer-Verlag, 1985). The average message volume of the normal distribution message flow can be determined using the following formula .. Ratio function 36- This paper uses Chinese National Standard (CNS) A4 ^ grid (210X297mm) 31S944 A7 B7 V. Description of invention (34

(方程式23) 此處m是常態分配N(…)之平均數,&變異數。此外 s(C) c (方程式24) 由上述兩關係式可得到#讀財^表㈣平均訊息量 比率函數之下列簡單公式·· JX(CU)) (方程式2 5 ) 經濟部中央標準局貝工消費合作社印製 因此,在g態分配訊息流量之情形中,可證明平均訊息令 比率函數是一種簡單(且凸的)二次方程式。 量測訊息流量之平均訊息量比率函數 因爲未來將在網路中提供的.各種服務必目前所能提供名 多出許多,所以未來的寬頻網珞極有可能在網路所提供的 訊息流量類型產生極大的變化。因此,基於以某—理想为 式代表訊息流量分配的所有模型可能都不再適用,這是区 爲此種方式原本即有無法彈性調整之特性。利用自訊息试 量量測而推導的平均訊息量.比率函數可解決此種困難的窗 息流量模型估計問題。 到現在爲止我們所討‘論的訊息流量模型都係界定在呼w -37- 本紙張尺度適用中國國家標準(CNS ) A4規格(21 OX 297公釐) _________B7 _ 五、發明説明(35 ) 層級時間標度上。相反地,訊息流量模型之統計數字係界 定在一標準atm單元封包之時間標度上。可將此種呼叫層 級時間標度視爲單元封包層級時間標度之一近似法。因而 可利用描述呼叫層級時間標度上固定頻寬需求的一個或多 個參數,而提取在一呼叫中隨機改變的訊息流量需求之特 性0 . 最近已有人建議可利用單元封包層級上的訊息流量量測 估計平均訊息量比率函數。請參閲諸如由N G Duffield等 人所著的,’ A T Μ訊息流之平均訊息量:一種估計服務品質 參數之工具"(Dublin Institute for Advanced Studies, 1994) o 訊息流量過載對平均訊息量比率函數之影響·· 如果每一實體鏈路上的平均提供訊息流量小於該鏈路上 對應的可用實際容量(亦即如果E(Xk) < 0二),則將平均 訊息量比率函數轉換爲阻塞量測可以正常運作。然而,在 某些實際的過載狀況中,可能達反此一條件。現在將考慮 下列基於均勻卜瓦松分配訊息流量及時間擁擠阻塞量測(亦 即歐蘭阻塞公式)之實例。 經濟部中央搮準局員工消費合作社印製 表2中列出三個所分配容量値、以及針對一固定阻塞值 0. 〇 3 sf算出來的對應訊息流量需求。請注意,在最後一種 情形中,縱使阻塞較小,但所提供之訊息流量大於所分配 之容量3 ____-38- 本纸張尺度適用中國國家標準(CNS )八4規^格(210X297公釐) 五、發明説明(36 A7 B7 所分配容量 所提供之平均訊息流量 15.45 10 109.29 100 699.00 700 此例顯示.在違反E(Xk) $ cphys之條件時,必須延伸」 均訊息量阻塞量測以涵蓋此過載狀況。在數學上,可易^ 完成此種延伸。如上文所述,平均訊息量比率函數是一^ E(Xk)有最小値之凸函數。平均訊息量比率函數之左端辰 域界定此過載區域(請參閲圖10&n)。在此區域中,平太 訊息量比率函數的增加相當於所分配容量的減少,也相^ t各控制參數係採取負値。若改變控制參數之正負號,貝 可易於延伸基於平均訊息量比率函數之推下式演算法,月 以涵蓋該過載區域。此種延伸只須對原始的路徑容量配逢 演算法作小幅度修改。 其餘的問題在本質上多屬觀念性,亦即如何解析此㈣ 伸。平均訊息量比率函數之左端區域相當於機率群左尾2 近似法: 經濟部中央揉準局貝工消費合作社印製(Equation 23) where m is the average number of normal distribution N (...), & the number of variations. In addition, s (C) c (Equation 24) The following simple formulas can be obtained from the above two relations. # 读 财 ^ 表 ㈣The average information volume ratio function of the following simple formula ·· JX (CU)) (Equation 2 5) Printed by industrial and consumer cooperatives. Therefore, in the case of g-state distribution of message flow, it can be proved that the average message makes the ratio function a simple (and convex) quadratic equation. The average message volume ratio function for measuring message traffic will be provided on the network in the future. Various services must be able to provide many more names at present, so it is very likely that the future broadband network will provide the type of message traffic on the network. Great changes. Therefore, all models based on a certain-ideal representation of message flow distribution may no longer be applicable. This is because this method is inherently unable to adjust elastically. The average message volume derived from the self-message test measurement. The ratio function can solve this difficult problem of window flow model estimation. The information flow model we have discussed so far has been defined in Hu w-37- This paper scale is applicable to the Chinese National Standard (CNS) A4 specification (21 OX 297 mm) _________B7 _ V. Invention description (35) Level Time scale. Conversely, the statistics of the message flow model are defined on the time scale of a standard atm unit packet. This call-level time scale can be regarded as an approximation of the unit packet-level time scale. Therefore, one or more parameters describing the fixed bandwidth requirement on the time scale of the call hierarchy can be used to extract the characteristics of the message traffic demand that changes randomly during a call. 0 Recently, it has been suggested that the message traffic at the unit packet level can be utilized The ratio function of measuring the estimated average message volume. See, for example, by NG Duffield et al., "Average Message Volume of AT M Message Flow: A Tool for Estimating Quality of Service Parameters" (Dublin Institute for Advanced Studies, 1994) o Ratio of Message Flow Overload to Average Message Volume The impact of the function · If the average provided message traffic on each physical link is less than the corresponding available actual capacity on the link (that is, if E (Xk) < 0 two), then the average message volume ratio function is converted to the blocking volume The test can work normally. However, in some actual overload conditions, this condition may be reversed. We will now consider the following example based on the uniform Poisson distribution message flow and time congestion congestion measurement (ie, the Oulan congestion formula). Printed by the Employee Consumer Cooperative of the Central Department of Economics of the Ministry of Economic Affairs. Table 2 lists the three allocated capacity values and the corresponding message flow requirements calculated for a fixed congestion value of 0.03 sf. Please note that in the last case, even though the blockage is small, but the flow of information provided is greater than the allocated capacity 3 ____- 38- This paper standard applies to the Chinese National Standard (CNS) 8.4 regulations ^ (210X297 mm ) 5. Description of the invention (the average message flow provided by the allocated capacity of 36 A7 B7 15.45 10 109.29 100 699.00 700 This example shows that when the condition of E (Xk) $ cphys is violated, the average message volume blocking measurement must be extended to This overload condition is covered. Mathematically, this extension can be easily completed. As mentioned above, the average message volume ratio function is a convex function with a minimum value of E (Xk). The left end of the average message volume ratio function Define this overload area (please refer to Figure 10 & n). In this area, the increase of the ratio function of the information volume of the Pacific is equivalent to the decrease of the allocated capacity. Also, each control parameter adopts a negative value. The sign of Becco is easy to extend the push-down algorithm based on the average message volume ratio function to cover the overload area. This extension only requires a small modification of the original path capacity matching algorithm The rest of the questions on the mostly conceptual in nature, that is, how to interpret this (iv) extend the left area ratio function of the average amount of information equivalent to the population of the left tail probability approximation 2: Central Bureau of Ministry of Economic Affairs rub quasi HIGHLAND consumer cooperatives printed

In P(X &lt; C) &gt; Ix(C(-s)) (方程式2 6 ) 且可將平均訊息量比率函數之左端 專广、τ 續視為利用所分配容 量C ι平均訊息量量測。 -39- 本紙張尺度家標準(CNS ^見格(21〇χ297公董 A7 318944 五、發明説明(37 ) ~〜·- 因爲在起始狀態中,已分配的資源超過實際資源的容量 ,亦及E(Xk)乏,所以必須減少資源的利用,因爲該 利用相當於平均訊息量比率函數之增加。 在過載區域中最佳化目標的解析可如下文所述。爲了改 進此區域中平均訊息量利用量測値分配的均H識別出 資源的最大耗用者(亦即具有最低平均訊息量之ν?),並減 少此極端代表VP之資源利用。最大耗用者資源利用的減少 相當於過載區域中平均訊息量比率函數之增加。因此/,此 種方式相當於最佳化問題的最大値最小値公式化。靖注意 ,現在係以起始落在過載區域的各數値開始,而施二限= 條件。 訂 我們此時可再度利用平均訊息量利用量測値的均勻分配 相當於對可使用的資源作最佳的利用(縱使該最佳利用是不 可行的)。在遵循與右端區域相同的理由下滿足限制條件, 使每一關键鏈路的平均訊息量利用量測値都能均勻。此外 ,於分配通過關鍵鏈路的所有vp之容量時,使這些 平均訊息量利用値相同。 — 經濟部中央標準局負工消費合作社印製 如上又所述,在平均訊息量曲線右端區域中最佳化的目 的在於使分配給具有最大的阻塞的V ρ (亦即具有最平均 訊息量阻塞量測値之VP)之容量增加。此種方式相當於二 佳化問題的最大値最小値公式化。請注意,只要在左端區 域先則表達取佳化目標中,以術語”阻塞,,取代術語&quot;利用 ,並以以術語”具有最大阻塞的νρ,,取代術語„資源的最 耗用者’’,即可將左端盧域的最佳化目標變換成右端區域的 -40- 本紙乐尺度適用中國國家揉準(CNS ) A4^^771〇x2^^ 經濟部中央揉準局身工消費合作社印製 、發明説明_(38 最佳化問題。 最# m比率1^數左端及右端區域的這兩種不同的 :目標表達將得到相同的最佳化程序。在兩種情形中 都而要增加平均訊息量比率函數。増加控制參數5之絕對 値’即可達到上述目標。 知如果負載並未超過可用資源,則 多動參數將爲正値,且可速績妈古八1 、 -.j運頌棱问分配給各虛擬路徑之容 ’直到分配完所有的可用實際資源爲止。另-方面,如 ΐ載超過了可用資源,則移動參數將爲負値。在此種情 形中,必須逐漸增加所分配之容量,直到這些容量到 際資源限制爲止。 貫 利用平均訊息量比率函數之VP路徑容量配置演算法 我們可利用上文中詳述的平均訊息量比率函數特性來有 效率地解決VP配置路徑容量問題。如上文所述,vp配置 路徑容量問題的目標是在有一所提供訊息流量分配下,將 將有限的實際網路資源分配給複數個預定的νρ。採用平均 訊息量比率函數的一 ν ρ路徑容量配置演算法實施例係示於 圖 12。 、 此程序係以一系列起始步驟(1202 - 12〇6)開始。在步驟 (1202 )中’將待配置路徑容量的所有vp集中在—ν ρ路徑 容量配置集合。在步驟(1203 )中规定網路中每—實體鏈路 之傳輸容量限制。在步驟(1204)中選擇性地規定平均訊息 量比率函數的一組上限ιΜ Αχ。 請注意,可視實施上的考慮而按照任何順序執行步躁 ( 1202 - 1204)。此外,只有在實際上可能有具有截去右尾 -41 - 本紙張尺度適用中國國家標準(CNS ) Α4^# ( 210 X 297公釐) 請 先 聞· 讀 背▽ 南*·' 項 I 再叫 填&lt; 裝 訂 ^19944 A7 ____________B7 五、發明説明(39 ) 的所提供訊息流量分配時(亦即只有在p(x&gt;c)對大於某一 有限値cMAXu値爲零時),才在步躁⑽4)中規幻鏡 。如果-所提供訊息流量分配具有_截去右尾,則該分配 在理論上可能爲時間標度。因而可利用描述呼叫層級時間 標度上固㈣寬需求的-個或多個參數,而提取在一呼叫 中隨機改變的訊息流量需求之特性。 在起始步驟⑴〇2-’12〇6)之後,本路徑容量配置技術執 行遞迴步驟(12〇7 _ 1215)。圖12所示之遞迴技術示出一個 兩層的遞迴,其中首先如步驟(12〇7 _ 121〇)所示,vp路徑 各量配置演算法重複地將容量分配給v p路徑容量配置集合 中之各VP,直到一個或多個實體鏈路到達完全(亦即1〇〇%) 利用爲止。 訂 已完全分配容量的實體鏈路被稱爲關鍵鏈路。因此,步 驟( 1207- 1210)的次一效應即是遞迴地識別各關鍵鏈路。雖 然在本反覆程序的每一階段中本關鍵鏈路識別程序都有可 能只識別一條實體鏈路爲關鍵鏈路,但是所實施的本演算 法亦同樣可在一特定時間中識別並處理一條以上的關鍵鏈 路。 經濟部中央標準局員工消費合作社印策 在本發明的一實施例中,利用依據所提供訊息流量模型 的平均訊息量比率函數之函數公式,在步驟(12〇7 )中將現 有的平均訊息量比率函數估計値遞增一固定量,即可執行 關鍵鏈路之識別。此類公式的例子如用於均勻卜瓦松分配 訊息流量的方程式1 5、用於多等級卜瓦松分配訊息流量的 方程式2 1、以及用於常態分配訊息流量之方程式2 3及2 5 ____ -42- 本紙張尺度適用中國國家標準(CNS〉 319944 A7 B7 五、發明説明(40 ) 。請注意,平均訊息量比率函數估計値之遞増量有時可沪 疋f値。如果路控容量配置演算法超過最佳値,且過度: 配谷量時,上述情形即有可能發生。 在步踩(12〇8)中針對路徑容量配置集合中的每—v 移動參數s値。請注意,對於對應的vp,移動參數値代表 圖10所π平均訊息量容量圖之斜率。在步驟(簡)中,利 用平均訊息量比率㈣之各遞增料料·给路徑容量 配置集合中各VP之遞增容量。可視實施上的考慮,而以不 同於圖12所π之順序執行步驟(12〇7 · 12〇9)。 、然後在步驟(12UD)中針對每一實體鍵路累積分配给各νρ 之容量,並在步驟(1211)中將所累積的容量與該實體鍵路 〈總容量比較。如果-鏈路尚未分配的實際容量小於一預 定界限,則決定此鏈路是一關键鏈路。 經濟部中央梯準局負工消費合作社印製 如果上述比較造成將一實體鏈路識別爲一關鍵鏈路,則 本计算程序進入步驟(1212)。如果並未發現任何實體鏈路 爲一關鍵鏈路,則重複執行步驟(12〇7 _ 121〇)或其等效步 骚,直到發現一關鍵鏈路爲止。在所提供訊息流量模型具 有一截去右尾的少見情形中,此反覆程序有時可能無法識 別任何更多的關鍵鏈路。在此種情形中,當平均訊息量比 率函數到達步驟(1204 )中所規定的最大値IΜ Α χ時,本計算 程序將自動終止。 在識別一關鍵鏈路之後,如步驟(1212 - 1213)所示,本 V Ρ路控容量配置演算法輸出計算結果,並重新將問題公式 化。每當在步驟(1211)中將一個或多個實體鏈路識別爲關 -43- Μ氏張尺度適用中國國家標準(CNS ) Α4規格(210Χ297公釐) S18944 五 、發明説明(41 A7 B7 ^ m 路徑容量配置演算法即進人步驟(1212) ^輸出,、詳細列出通過一關鍵鏈路的每一vp目前所分配 疋谷量。然後在步驟(1213)中自路#容量配置集合去掉通 县關鍵鏈路的各V P。如果並無任何V p仍待配置路徑容 量,則本路徑容量配置演算法终止於步驟(1216)。 經濟部中央標準局員工消費合作社印製 如果仍有一個或多個VP等待配置路徑容量,則在步驟 (1215)中重新界定該路徑容量配置集合,以便只包含此類 VP。因爲已自路徑容量配置集合中去掉通過關鍵鏈路的各 且因爲這些去掉的VP用掉部分的實體鏈路容量,所 以路彳二谷量配置工作簡化成對仍留在路徑容量配置集合的 各VP分配尚未分配的實體鏈路容量。在步驟(1215)中,將 各實體鏈路的可用谷量減掉分配給對應於上次在步骤(d 1) 中發現的各關鍵鏈路的已去掉”容量,即可完成上述目標 在本發明的一替代實施例中,凍結已自V p路徑容量配置 π Ο中去掉的各V P之平均訊息量比率函數値,亦可得到同 樣的效果。因爲分配給已去掉的V Ρ之容量係在步驟(1212 ) 中產生,所以可易於執行本計算。在步驟(1215)中重新將 此問題公式化之後,本演算法回到步驟(1207 ),且如上文 所述,係對仍留在路徑容量配置集合的所有ν ρ將平均訊息 量比率函數遞増一固定量。 採用適應性搜尋技術之VP路徑容量配置 現在將説明一種可將基本ν ρ路徑容量配置演算法的計算 效率提昇到採用平均訊息量比率函數作爲阻塞量測所能得 到的效率之上的方法。此種方法係基於平均訊息量比率函 -44- 本紙張尺度適用中國國家榡準(CNS ) ΑΊ規格(210Χ297公釐) A7 B7 五、發明説明(42 數的一般特性,且可適用於任何種類的訊息流量需求模型 ,其中包括基於實際訊息流量量測的模型。In P (X &lt; C) &gt; Ix (C (-s)) (Equation 2 6), and the left end of the average message volume ratio function can be regarded as wide, τ can be regarded as the utilization of the allocated capacity C ι average message volume Measurement. -39- This paper standard home standard (CNS ^ see grid (21〇 × 297 Gongdong A7 318944 V. Description of the invention (37)) ~~-Because in the initial state, the allocated resources exceed the actual resource capacity, also And E (Xk) is lacking, so it is necessary to reduce the utilization of resources, because the utilization is equivalent to the increase of the average message volume ratio function. The optimization target in the overload area can be analyzed as described below. In order to improve the average message in this area The utilization of the measured value of the allocated H identifies the largest consumer of the resource (that is, ν with the lowest average message volume), and reduces this extreme representative of the resource utilization of the VP. The reduction in the resource consumption of the largest consumer is equivalent to The increase of the ratio function of the average message volume in the overload area. Therefore, this method is equivalent to the formulation of the maximum value and the minimum value of the optimization problem. Note that now it starts with each number value that initially falls in the overload area. Second limit = condition. Ordering us to reuse the average message volume at this time. The even distribution of the measurement value is equivalent to the best use of the available resources (even if the best use is not feasible). Follow the same reason as the right end area to meet the restriction conditions, so that the average message utilization measurement value of each critical link can be even. In addition, when allocating the capacity of all vp passing through the critical link, make use of these average message volumes Values are the same. — Printed by the National Bureau of Standards of the Ministry of Economic Affairs, the Negative Work Consumer Cooperative. As mentioned above, the purpose of optimizing in the area at the right end of the average information volume curve is to make the V ρ assigned to the largest blockage The amount of information blocking measurement value (VP) is increased. This method is equivalent to formulating the maximum value and minimum value of the second optimization problem. Please note that as long as the expression in the left end area is first expressed in the optimization goal, the term "blocking," , Replace the term &quot; use, and replace the term "most resource consuming" with the term "νρ that has the most blockage", and the optimization goal of the left Lu domain can be transformed into the right end area -40- This paper music scale is applicable to the China National Standardization (CNS) A4 ^^ 771〇x2 ^^ Printed by the Ministry of Economic Affairs, Central Bureau of Standardization, Consumers and Workers Cooperatives, and description of invention_ (38 Optimization problem. 最 # The two ratios of the left and right regions of the m ratio 1 ^ number: the target expression will get the same optimization procedure. In both cases, the average message volume ratio function will be increased. Increase the absolute value of the control parameter 5 ' The above goal can be achieved. Knowing that if the load does not exceed the available resources, the hyperactive parameter will be positive, and can be quickly assigned to each of the virtual paths of the Maguba 1,-. End all available actual resources. On the other hand, if the load exceeds the available resources, the movement parameter will be negative. In this case, the allocated capacity must be gradually increased until these capacities reach the limit of the international resources. Through the VP path capacity allocation algorithm that utilizes the average message volume ratio function, we can use the characteristics of the average message volume ratio function detailed above to efficiently solve the VP configuration path capacity problem. As mentioned above, the goal of the vp configuration path capacity problem is to allocate limited actual network resources to a plurality of predetermined νρs under a given message traffic allocation. An example of a ν ρ path capacity allocation algorithm using the average message volume ratio function is shown in FIG. 12. , This program starts with a series of initial steps (1202-12〇6). In step (1202), all vp of the path capacity to be configured are concentrated in the -ν ρ path capacity configuration set. In step (1203), the transmission capacity limit of each physical link in the network is specified. In step (1204), a set of upper limit ι Αχ of the average message volume ratio function is selectively specified. Please note that step impatience (1202-1204) can be performed in any order depending on implementation considerations. In addition, only in reality may there be a truncated right tail -41-This paper scale is applicable to the Chinese National Standard (CNS) Α4 ^ # (210 X 297mm) Please read first · Read the back ▽ South * · 'Item I and then Call to fill &lt; binding ^ 19944 A7 ____________B7 5. The distribution of information flow provided by the invention description (39) (that is, only when p (x> c) is greater than a limited value cMAXu value is zero) Manic ⑽ 4) Chinese phantom mirror. If the provided message traffic distribution has a truncated right tail, the distribution may theoretically be a time scale. Therefore, one or more parameters that describe the fixed demand on the time scale of the call hierarchy can be used to extract the characteristics of the message traffic demand that changes randomly during a call. After the initial step ⑴〇2-'12〇6), this path capacity configuration technique performs a recursive step (12〇7-1215). The recursion technique shown in FIG. 12 shows a two-layer recursion, in which, first, as shown in step (12〇7_121〇), the vp path configuration algorithm repeatedly allocates capacity to the vp path capacity configuration set Each of the VPs until one or more physical links reach full (ie 100%) utilization. A physical link that has fully allocated capacity is called a critical link. Therefore, the secondary effect of step (1207-1210) is to recursively identify each key link. Although the critical link identification process may identify only one physical link as a critical link at each stage of the iterative process, the implemented algorithm can also identify and process more than one physical link at a specific time Critical link. In an embodiment of the present invention, the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs uses the function formula of the average message volume ratio function according to the provided message flow model to convert the existing average message volume in step (12〇7) The ratio function estimate value is incremented by a fixed amount to perform the identification of critical links. Examples of such formulas are Equation 15 for uniform Boisson distribution message flow, Equation 2 for multi-level Boisson distribution message flow, and Equations 2 3 and 2 5 for normal distribution message flow ____ -42- This paper scale is applicable to the Chinese National Standard (CNS> 319944 A7 B7 V. Description of the invention (40). Please note that the estimated value of the average message volume ratio function can sometimes be changed in value. If the road control capacity is configured The algorithm exceeds the optimal value and is excessive: When the amount of valley is allocated, the above situation may occur. In step (12〇8), the -v movement parameter s value in the set is configured for the path capacity. Please note that for Corresponding to vp, the moving parameter value represents the slope of the π average message volume graph shown in Figure 10. In step (simplified), each incremental material using the average message volume ratio (iv) is assigned to the incremental capacity of each VP in the path capacity configuration set Depending on implementation considerations, the steps (12〇7 · 12〇9) are executed in an order different from the π shown in Figure 12. Then, in step (12UD), the capacity allocated to each νρ is accumulated for each physical key , In step (1211), the accumulated capacity is compared with the physical link <total capacity. If the actual capacity of the link that has not been allocated is less than a predetermined limit, the link is determined to be a critical link. Central Ministry of Economic Affairs Printed by the Bureau of Consumer Labor Cooperatives If the above comparison results in the identification of a physical link as a critical link, the calculation procedure proceeds to step (1212). If no physical link is found to be a critical link, it is repeated Step (12〇7_121〇) or its equivalent steps until a critical link is found. In the rare case where the provided message traffic model has a truncated right tail, this iterative procedure may sometimes fail to identify any More critical links. In this case, when the average message volume ratio function reaches the maximum value I Μ Α χ specified in step (1204), this calculation procedure will automatically terminate. After identifying a critical link, As shown in steps (1212-1213), this V Ρ road control capacity configuration algorithm outputs the calculation results and re-formulates the problem. Whenever one or more entities are included in step (1211) Road identification is off-43-M's Zhang scale is applicable to China National Standard (CNS) Α4 specification (210Χ297 mm) S18944 V. Description of invention (41 A7 B7 ^ m Path capacity configuration algorithm is entered into the step (1212) ^ output ,, detailed listing the current allocation of each vp through a critical link. Then, in step (1213), remove all VPs from the critical link of Tongxian from the route #capacity configuration set. If there is no V p If path capacity is still to be configured, the path capacity allocation algorithm terminates at step (1216). Printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs. If there are still one or more VPs waiting to configure path capacity, then at step (1215) Redefine the set of path capacity configurations to include only such VPs. Because each of the critical links has been removed from the path capacity configuration set and because these removed VPs use a portion of the physical link capacity, the work of configuring the two-path valley volume is simplified into a pair of each remaining in the path capacity configuration set VP allocates the physical link capacity that has not been allocated. In step (1215), the available valley of each physical link is deducted and allocated to the removed capacity corresponding to each key link found in step (d 1) last time. In an alternative embodiment of the invention, freezing the average message volume ratio function value of each VP that has been removed from the V p path capacity configuration π Ο can also achieve the same effect. Because the capacity allocated to the removed V P is It is generated in step (1212), so it is easy to perform this calculation. After reformulating the problem in step (1215), the algorithm returns to step (1207), and as described above, the pair remains in the path capacity All ν ρ of the configuration set will increase the average message volume ratio function by a fixed amount. VP path capacity configuration using adaptive search technology will now show a way to increase the computational efficiency of the basic ν ρ path capacity configuration algorithm to use average messages The volume ratio function is used as a method above the efficiency that can be obtained by blocking measurement. This method is based on the average message volume ratio function -44- This paper scale is applicable to the Chinese National Standard (CNS ) ΑΊ specification (210Χ297 mm) A7 B7 V. Description of invention (42 general characteristics, and can be applied to any type of message flow demand model, including models based on actual message flow measurement.

利用一類似於Newton-Raphson技術的反覆式線性近似法 ,並利用平均訊息量速率函數的凸函數特性,即可大幅加 速基本V P路徑容量配置演算法的收斂速度》當一虛擬網路 的訊息流量需求擾動較小時,可進而利用一線性近似法改 良本適應性V P路徑容量配置演算法。 訂 虛擬網路有時可能受到擾動。可能因空間訊息流量模式 的改變、訊息流量分配的改變、或網路運作參數的小幅改 變,而引發這類擾動。例如,當首先在單一實體網路的頂 層界定多個虛擬網路,並隨即在不同的虛擬網路之間重新 分配小量的實際資源時,即有可能發生此類改變。 ”可移動邊界’’問題是網路配置路徑容量問題的一種特殊 情形,將於下文中詳述之。 經濟部中央標準局貝工消費合作杜印製 適應性V P路徑容量配置技術係建基於前文中配合附圖9 及12而詳述的vp路徑容量配置技術,且在配置路徑容量 的最後階段中提供了比習用技術更大的優點。爲了要了解 此種適應性技術的一些關鍵要素,我們假設係將基本演算 法用來得到一近似最佳狀態,在此種近似最佳狀態中分配 給各虛擬路徑的容量接近關鍵鏈路的實際容量上限。在此 種情形中’並不利用凸1 2所示的反覆式嘗試錯誤程序來找 出可兒全利用每一關鍵鏈路之狀態,且不必使通過該關鍵 鏈路的各VP之負載均等,而是利用下列一般性近似法即可 大幅加速基本路徑容量缸置演算法: -45 本紙涑尺度適用中國國家標準(CNS ) A4規格(210X 297公釐 siS944 at --- B7 五、發明説明(43Using an iterative linear approximation method similar to Newton-Raphson technology, and using the convex function characteristic of the average message volume rate function, the convergence speed of the basic VP path capacity allocation algorithm can be greatly accelerated "when the message traffic of a virtual network When the demand disturbance is small, a linear approximation method can be used to improve the adaptive VP path capacity allocation algorithm. Subscription Virtual network may be disturbed sometimes. Such disturbances may be caused by changes in spatial message traffic patterns, changes in message traffic distribution, or small changes in network operating parameters. For example, when multiple virtual networks are first defined on the top layer of a single physical network, and then a small amount of actual resources are redistributed among different virtual networks, such changes may occur. The "movable boundary" problem is a special case of the network configuration path capacity problem, which will be described in detail below. The Ministry of Economic Affairs Central Standards Bureau's Beigong Consumer Cooperation Du Printed Adaptive VP Path Capacity Configuration Technology is based on The vp path capacity configuration technology detailed in conjunction with FIGS. 9 and 12 provides greater advantages over conventional technologies in the final stage of configuring path capacity. In order to understand some of the key elements of this adaptive technology, we It is assumed that the basic algorithm is used to obtain an approximate optimal state. In this approximate optimal state, the capacity allocated to each virtual path is close to the upper limit of the actual capacity of the critical link. In this case, the convexity is not used. The repeated trial and error procedure shown in 2 to find out the status of each critical link can be fully utilized, and it is not necessary to equalize the load of each VP passing through the critical link, but the following general approximation method can be used to greatly Accelerated basic path capacity cylinder placement algorithm: -45 This paper size is applicable to China National Standard (CNS) A4 specification (210X 297mm siS944 at --- B7 V. Invention Ming (43

AI(C) = a CAI (C) = a C

SAC (方程式2 7) 此近似法係遵循下列易於推導的·平均訊息量比率函數一 性關係式: ’ .SAC (Equation 2 7) This approximation system follows the following easy-to-derivable, one-to-one relationship of the average message volume ratio function: ’.

dl(C) dC (方程式2 8 ) 然後我們必須計算在步驟t中對鏈路]4的平均訊息量比率函 數共用遞增量△:[〆’使關鍵鏈路k的未分配容量可以 被分配給通過該鏈路的所有VP -。我們以示分配给第 i個VP的遞增容量。因爲在每一反覆步驟{中八^ = △ Ik , = ί = ΔΙ/Σ — S 1 J -J \ Si),所以將遵循下式: ΔΤ AC, Σ s (方程式29) 經濟部中央樣準局員工消費合作社印製 方程式2 9计算得到的每一 △ i與對應△ s間之關係式如 下: MC(5))«AS —d-J(j(S)) =AS^L-^1£I=S 办一⑶ Λ …V(sl OS dC ds dsz s 因此,只要在微分式ϋ$.) = S中替代C=&quot; (S),並將ν( -46- 本紙伕尺度適用中國國家標準(CNS ) Α4規格(210 X 297公釐) A7 A7 則我們可得到△s 五、發明説明(44 =d2 μ (S) ^ ds2疋義爲移動後分配之變異數, 與△ I間之關係式如下: SV(S) (方程式30) 適應性V P路徑容量配置演算法 要平均訊息量比率函數的瞬時斜率s /不是零,即可使 用t万程式29估計更大數値的平均訊息量比率函數遞增量^ Ik。'爲平均訊息量比率函數在c上是凸的,且c隨著㈣ 増加而單調地増加,所以此種計算技術將低估。因此 ,如果重複執行此程序,則該程序將穩定地收斂。 採用平均訊息量比率函數作爲阻塞量測的另一 vp路徑容 量配置演算法實施例係示於圖13。與圖12所示基本VP路 4谷量配置次算法使用的嘗試錯誤技術不同,此種路徑容 量配置演算法使用一種有些像Newt〇n_Raphs〇n技術的適應 性搜尋技術。 ‘ 如同圖12所示的基本vp路徑容量配置演算法,圖13所 不的適應性VP路徑容量配置演算法亦以一系列起始步驟 (1302 _ 1304)開始。於步驟(13〇2)中,待配置路徑容量的 各vp被集中在_VP路徑容量配置集合。在步驟(13〇3)中 規定網路中每一實體鏈路之傳輸容量限制。如同囷1 2所示 的基本平均訊息量VP路徑容量配置演算法在步驟(12〇4)所 執行的’亦可選擇性地在此階段中規定平均訊息量比率函 _____-47- 本紙張尺度適用中國囷家梯準(CNS ) Α4規格(2丨0Χ297公釐) 請 对·· 閎 讀 背: 野·* 意 事 1^1 S 1 ▲ 頁 裝 訂 經濟部中央揉準局身工消资合作社印裝 η: 發明説明(a A7 B7 經濟部中央標準局員工消費合作社印製 數之上限ιΜΑχ。如上文所,口 去右尾的所提:有在實際上可能有具有截 敌件a心⑽量}料,才規定 請注意,可視實施上的考 (⑽)及⑴〇3)。如上文所;:而1倚順序執行起始步樣 mjL^r M乂,只有在所提供訊息流量分 配具有截去右尾的可能機牵眭 T 。4门廿 +時,才在步驟(12〇4)中規定 MAX 如同基本平均訊息量VP路庐六县*班 . 里V P路徨谷量配置演算法,此 起始程序非明示地包含:選 — 、 κ ^ &gt;τ 、 所如供之訊息流量模型; 推導平均訊息量比率函數I的對淹關技斗.、 双1的對應關係式、所分配容量 、及移動參數S。上述這些步驟並未示於圖13中。 其他的起始步驟包括:在步驟(⑽)中,選擇這组平均 訊息量㈣函數估計値的小而非零之起始値、&amp;所轉換參 數S(對應非零値。如上文所述,這些起始估計値相當於較 大的起始阻塞値。 _如同基本平均訊息量νρ路徑容量配置演算法,本路 徑容量配置演算法如步骤(13G5 _ 1311)所示反覆地分配容 量,直到一個或多個實體鏈路到達完全利用爲止。當在步 驟(1312)中決定一實體鏈路爲_關鍵鏈路時,如步驟(1313 • 1316)所示,自路徑容量配置集合中去掉通過該關鍵鏈路 的所有VP,並重新對配置路徑容量問題公式化。 圖1 3所7F適應性V P路徑容量配置演算法之關鍵鏈路識別 .¾序與圖1 2所不之基本演算法略有不同。利用先前所推導 的各關係式時,係在步骤( 1305)中針對每一實體鏈路 算各VP之容量分配%。在步驟(13〇6)中對每一實體鏈路 累積這些起始容量分配,而得到每一實體鏈路的。在步 閱· 讀 背· 面·,* 意 事 項 再 寫 頁 I 裝 訂 48- 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) A7 B7 五、發明説明(奶 驟(1。07)中’將此種總和與步_(i3G3)中規定 傳輸容量比較’以便決定每—實體鏈路的未分配容 如果起始分配使得一個或多個實體鏈路上有過載 如同基本模型要修改後續的計算步驟,以便利用基於負値 ,的移動參數s之公式。 、' 利用方程式29,並對通過每-實體鏈路k的所有vp叶算 動參數的總和,即可在.步驟()中針對該實體 -算β反覆程序的第t步驟之平均訊息量 値遞增量△ L t。嗜.、古咅· 干成聚信口 t k明注意,每一實體鏈路所計算出來的遞增 値可能會不同。在步驟(13。9)中比較各實體鏈路的平均訊 息量比率函數估計値遞增量,並選擇最低値 步驟⑽Μ利用下列更新方程式遞增現有的= 比率函數估計値It : .、 &quot; (方程式31) 請 閲* 讀 背', 面·.· 之 注dl (C) dC (Equation 2 8) Then we must calculate the average increment of the average message volume ratio function for the link] 4 in step t: [〆 'so that the unallocated capacity of the critical link k can be allocated to All VP-through this link. We show the incremental capacity allocated to the i-th VP. Because in each iteration step {中 八 ^ = △ Ik, = ί = ΔΙ / Σ — S 1 J -J \ Si), the following formula will be followed: ΔΤ AC, Σ s (Equation 29) Central Standards of the Ministry of Economic Affairs The relationship between each △ i and the corresponding △ s calculated by the bureau employee consumer cooperative printing equation 2 9 is as follows: MC (5)) «AS —dJ (j (S)) = AS ^ L- ^ 1 £ I = S do a ⑶ Λ… V (sl OS dC ds dsz s Therefore, as long as the differential formula ϋ $.) = S replaces C = &quot; (S), and applies ν (-46- this paper's scale to Chinese countries Standard (CNS) Α4 specification (210 X 297 mm) A7 A7, then we can get △ s 5. Invention description (44 = d2 μ (S) ^ ds2 is defined as the variation after distribution, and △ I The relationship is as follows: SV (S) (Equation 30) The adaptive VP path capacity allocation algorithm requires the instantaneous slope s of the average message volume ratio function to be non-zero, and you can use the t0000 program 29 to estimate the average message volume ratio for a larger number of values The function increments ^ Ik. 'Is the ratio of the average message volume. The function is convex on c, and c increases monotonously with the increase, so this calculation technique will be underestimated. Therefore, if you repeat the execution With this procedure, the procedure will converge steadily. Another example of a vp path capacity configuration algorithm that uses the average message volume ratio function as the congestion measurement is shown in Figure 13. The basic VP channel 4 valley configuration shown in Figure 12 The trial-and-error technique used in the sub-algorithm is different. This path capacity allocation algorithm uses an adaptive search technique somewhat similar to the Newton_Raphs technology. The basic vp path capacity allocation algorithm shown in Figure 12 is shown in Figure 13. The adaptive VP path capacity configuration algorithm also begins with a series of initial steps (1302 — 1304). In step (13〇2), each vp of the path capacity to be configured is concentrated in the _VP path capacity configuration set. In step (13〇3), the transmission capacity limit of each physical link in the network is specified. The basic average message volume VP path capacity configuration algorithm shown in FIG. 12 is executed in step (12〇4). You can also optionally specify the average message volume ratio letter at this stage _____- 47- This paper standard is applicable to China's National Standards (CNS) Α4 specifications (2 丨 0Χ297mm) Please read the back: Wild · * Things 1 ^ 1 S 1 ▲ page binding printed by the Ministry of Economic Affairs, Central Bureau of Accreditation, Workers and Consumers Cooperative η: description of invention (a A7 B7, the upper limit of the number of employees ’cooperatives printed by the Central Bureau of Standards, Ministry of Economy, ιΜΑχ. As mentioned above, oral The right end of the mention: there may actually be a heart ⑽ quantity that can intercept the enemy. It is only stipulated that please note that the visual test (⑽) and ⑴〇3). As mentioned above :: While the first step is executed sequentially by mjL ^ r MQ, only if the provided message flow distribution has a possible opportunity to truncate the right tail T. It is only 4 hours and 20+ hours that it is specified in step (12〇4) that MAX is the same as the basic average message volume. VP Road Lulu County * Class. The VP Road Valley Volume Configuration Algorithm in Li. This initial procedure includes: —, Κ ^ &gt; τ, the information flow model as supplied; the corresponding relational expression for deriving the average message volume ratio function I to the flood barrier, double 1, the allocated capacity, and the movement parameter S. These steps are not shown in Figure 13. Other initial steps include: In step (⑽), select the starting value of the set of average message volume (i) function estimation value is small and not zero, and the converted parameter S (corresponding to non-zero value. As mentioned above These initial estimated values are equivalent to larger initial blocking values. _ Like the basic average message volume νρ path capacity allocation algorithm, this path capacity allocation algorithm allocates capacity repeatedly as shown in steps (13G5 _ 1311) until One or more physical links reach full utilization. When it is determined in step (1312) that a physical link is a _critical link, as shown in step (1313 • 1316), remove the path from the path capacity configuration set. All VPs of critical links, and re-formulation of the configuration path capacity problem. Figure 13 Key link identification of 7F adaptive VP path capacity configuration algorithm. The sequence is slightly different from the basic algorithm shown in Figure 12 When using the relations derived previously, the capacity allocation% of each VP is calculated for each physical link in step (1305). In step (13〇6), these starting points are accumulated for each physical link Capacity allocation , And get each physical link. In the step reading · reading back · face ·, * write the page after the matters I binding 48- This paper size is applicable to China National Standard (CNS) A4 specifications (210X297 mm) A7 B7 five 3. Description of the invention (in milk step (1.07) 'compare this sum with the transmission capacity specified in step _ (i3G3)' in order to determine the unallocated capacity of each physical link. If the initial allocation makes one or more entities There is an overload on the link as in the basic model. The subsequent calculation steps need to be modified in order to use the formula for the movement parameter s based on the negative value. ′ Using equation 29, and calculating the dynamic parameters for all vp leaves passing through each physical link k The sum can be calculated in step () for the entity-calculate the average amount of incremental information in the t-th step of the iterative process △ L t. Addicted, ancient 咅 · dry Cheng Juxinkou tk clearly note that each The incremental value calculated by the physical link may be different. In step (13.9), the average message volume ratio function of each physical link is compared to estimate the incremental value, and the lowest value is selected. Step ⑽ Μ Use the following update equation to increase the existing value = Ratio letter Estimated Zhi It:.., &Quot; (Equation 31) * Please read the read back 'side of the note · ·

項 再/&gt;! 填 %破 本衣 I 訂 經濟部中央揉準局負工消費合作社印裝 自1 Ϊ : ^步驟(13 11)中利用C_lant函數的特定提供訊 一量換K函數式&quot;⑴修改移動參數估計U步驟 (1311)中利用下列關係式更新該s値:Item Zai / &gt;! Fill in% to break the clothes I Ordered by the Ministry of Economic Affairs Central Bureau of Accuracy Bureau of Consumer Labor Cooperative Printed from 1 Ϊ: ^ Step (13 11) using the specific C_lant function to provide a specific amount of information for the K function &quot; (1) Modify the motion parameter estimation U step (1311) to update the s value using the following relationship:

As. (方程式32) 其中當S j幸父小時,可·南丨.田s _L· 〇 Λ Λ 万程式30來計算變換參數丨 的 -49-297公釐) A7 B7 318944 五、發明説明(47 改變 重複反覆步骤(1305 - 1311) ’直到至少—個剩餘實體缝 路的未分配容量減少到低於預設誤差或終止條件爲止。當 在步驟(1312)中決定此種條件時,已找出—個或多個實^ 鏈路爲關鍵鏈路。 在偵測到一個關赛鏈路之後,本適應性v p路徑容量配置 演算法的作業與基本演算法相同,且本計算程序進入步驟 (13 13 )。如果並未發現任一實體鏈路爲關鍵鏈路,則重複 執行步驟(1j05- 1311)或其等效步驟,直到發現一關鍵鏈 路爲止。在所提供的訊息流量模型具有一截去右尾的少見 狀況中,此反覆程序有時可能無法任何其他的關鍵鏈路。 在此種情況中,當平均訊息量比率函數到達一預設最大値 1 M A X時,本計算程序即自動終止。 每當在步驟(1312)中識別一個或多個實體鏈路爲關鍵鏈 路時,本vp路徑容量配置演算法即進入步驟(1313)產生輸 出,詳細列出通過一關鍵鏈路的每一vp上目前已分配之容 量在步驟(1314)中自路徑容量配置集合中去掉那些通過 —關鍵鏈路的VP。如果在步驟(1315)中並無任何vp等待 經濟部中央標準局負工消費合作社印製 路徑容量配置,則本路徑容量配置演算法終止於步驟(1317) 〇 如果仍有一個或多個VP等待路徑容量配置,則在步驟 (b 16 )中重新界定路徑容量配置集合,以便只包含此類 因爲已自路徑容量配置集合中去掉通過關鍵鏈路的各乂卩 ,且因爲這些去掉的VP分配到部分的實體鏈路容量,所以 _尺度揉準(CNS)峨格(g 50 X 297公釐) A7 B7 五、發明説明_(48 ) 路徑容量配置工作簡化成對仍留在路徑容量配置集合的各 VP分配尚未分配的實體鏈路容量。在步驟(1316)中,將各 實體鏈路的可用容量減掉分配给對應於上次在步骤(1312) 中發現的各關鍵鏈路的已去掉VP之容量,即可完成上述目 標。在步驟(13 16)中重新將問題公式化之後,本適應性vp 路&amp;谷量配置演算;声回到步骤(1305 ),且如上文所述,對 仍留在路徑容量配置集合的所有V P執行容量分配。 參照圖1 4及1 5 ,即可對本適應性v p路徑容量配置演算 法之作業有直覺式的了解。圖14示出:縱使不同的νρ通 過一個共同的實體鏈路,但這些VP的特徵在於可能有不同 的平均訊息量容量曲線..。如圖1 4所示,不同v p的平均訊 息量容量曲線在不同的所分配容量値上有其最小値。此種 結果係由於所不這些不同v P上的所提供訊息流量是不同的 。因此,每一 VP在不同的所分配容量値上有其最小無平均 訊息量。 針對通過相同實體鏈路的兩個虛擬路徑VPi及VP2的情 形,在圖1 5中示出本適應性v p t路徑容量配置演算法之容 量分配程序。此私序開始時係選擇平均訊息量比率函.數I v t 的一組小而非零之起始値。已分配给V p i及V p 2的對應容 量分別是C i及C 2。然後在V p i及V p 2平均訊息量容量曲線 的座k ( c 1 ’ I k t)及(c 21,I k t)上分別畫出切線。圖J 5中 之代號s/及s/指示這些切線,而且這些切線對應於這些 虛擬路徑的移動參數之現有反覆式估計値。 第t次反覆開始時的未分配容量△ c k t等於總容量己二與已 ________- 51 - 本紙伕尺度適用中國國家梯準(CNS ) A4規格(210X297公釐) 請 先 閲· 讀 背, 面·, 冬 I i-t 填 寫 本 頁 裝 訂 經濟部中央標準局員工消費合作社印製 五 、發明説明(49 A7 B7 分配容ΙΓ 及c/總和間之差矣。 及s2t時,可利^ 此外,在已知斜率st 値之遞增量如下: 均矾心量比率函數估計 ΔΧ ?As. (Equation 32) where S j is lucky when his father is small, it is possible to calculate the transformation parameters of -49-297 mm by Nan Nan tian s _L · 〇Λ Λ 10000 Formula 30) A7 B7 318944 V. Description of invention ( 47 Change and repeat the repeated steps (1305-1311) 'until the unallocated capacity of at least one remaining physical seam decreases below the preset error or termination condition. When such condition is determined in step (1312), it has been found Out of one or more real links are critical links. After detecting a customs link, the operation of the adaptive vp path capacity configuration algorithm is the same as the basic algorithm, and the calculation procedure enters the step (13 13 ). If no physical link is found to be a critical link, repeat the steps (1j05-1311) or its equivalent steps until a critical link is found. The provided message traffic model has a cut In the rare situation at the right end, this iterative procedure may sometimes fail any other critical links. In this case, when the average message volume ratio function reaches a preset maximum value of 1 MAX, the calculation procedure is automatically terminated. whenever When one or more physical links are identified as key links in step (1312), the vp path capacity configuration algorithm enters step (1313) to generate output, detailing the current status of each vp passing through a key link In step (1314), the allocated capacity removes those VPs that pass through the critical link from the path capacity configuration set. If there is no vp in step (1315), wait for the path printed by the consumer labor cooperative of the Central Bureau of Standards of the Ministry of Economy Capacity configuration, the path capacity configuration algorithm ends at step (1317). If there are still one or more VPs waiting for path capacity configuration, then redefine the path capacity configuration set in step (b 16) so that only such types are included Because each node passing through the critical link has been removed from the path capacity configuration set, and because these removed VPs are allocated to part of the physical link capacity, the standard scale (CNS) Ege (g 50 X 297 mm ) A7 B7 V. Description of the invention _ (48) The path capacity configuration work is simplified to allocate the unallocated physical link capacity to each VP that remains in the path capacity configuration set. In step (1316) , The available capacity of each physical link is reduced to the capacity corresponding to the key link found in step (1312) that has been removed last time, and the above goal can be completed. Restart in step (13 16) After formulating the problem, the adaptive vp path & valley configuration calculation; the sound returns to step (1305), and as described above, the capacity allocation is performed for all VPs that remain in the path capacity configuration set. Refer to Figure 14 And 15, you can intuitively understand the operation of this adaptive vp path capacity allocation algorithm. Figure 14 shows that even though different νρs pass through a common physical link, the characteristics of these VPs may be different Average message capacity curve ... As shown in Figure 14, the average information capacity curve of different v p has its minimum value at different allocated capacity values. This result is due to the fact that the message traffic provided on these different VPs is different. Therefore, each VP has its smallest non-average message volume on different allocated capacity values. For the situation of two virtual paths VPi and VP2 passing through the same physical link, the capacity allocation procedure of this adaptive vpt path capacity configuration algorithm is shown in Fig. 15. At the beginning of this private sequence, the average message volume ratio function. The starting value of a group of small numbers I v t rather than zero is selected. The corresponding capacities allocated to V p i and V p 2 are C i and C 2, respectively. Then draw tangent lines on the bases k (c 1 ′ I k t) and (c 21, I k t) of the average information capacity curves of V p i and V p 2 respectively. The symbols s / and s / in Figure J5 indicate these tangents, and these tangents correspond to the existing iterative estimates of the movement parameters of these virtual paths. The unallocated capacity at the beginning of the t-th iteration △ ckt is equal to the total capacity and has been ________- 51-The paper scale is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm). Please read first. ·, Winter I it, fill out this page, binding, printed by the Ministry of Economy, Central Bureau of Standards, Employee's Consumer Cooperative. V. Description of invention (49 A7 B7 distribution capacity ΓΓ and the difference between c / sum. And s2t, it can be profitable. The incremental increment of the known slope st is as follows: The average alum heart rate ratio function estimates ΔΧ?

CC

Phys c.c + —+ -IL· 仁 s t 1 -2 . (方程式3 2 A ) 經濟部中央標準局貝工消費合作社印製 模刑' 1 1)在其崎情形中,係使用-特定 路;算無平均訊息量比率函數估計値之特定鏈 k 然後識別第請實體鏈路的遞增量Δν之最小値^_, 最小値遞增平均訊息量比率函數估計値。當然, 尸有實.體鏈路的平均訊息量比率.函數係遞増相同量。 及V Ρ 2的對應遞增容量分配是a' c· 11及△ c t。 /然後將平均訊息量比率.函數估計値γ遞2増此δι^値,而 得到1 k 。.凊'/主意,我們並不爲每一實體鏈路計算一個不 同的V + 1,而且使用△。乍爲平均訊息量比率函數先前 估計値之共同遞增量。平均訊息量比率函數之反關係式被 用來決定待分配给虛.擬路徑VPi&amp;Vp2的容量c/“及 c/q,且同時決定新的斜_Sit + 1&amp;S2t + 1。然後重複此 反覆步驟,以便得到平均訊息量比率函數估計値的次一遞 增量ΔΙ/—1。 此计算步樣是穩定的’因爲△ I k t被低估了。這是因爲如 請I I 閲-ί 讀 背《 I iS··- I 'ί I iΙΑ 填 I 寫焚 本衣 頁 訂Phys cc + — + -IL · Ren st 1 -2. (Equation 3 2 A) The Ministry of Economic Affairs, Central Standards Bureau, Beigong Consumer Cooperative Printed Model Penalties' 1 1) In the case of Qiqi, it uses the -specific way; The estimated value of the specific chain k without the average message volume ratio function then identifies the minimum value of the incremental increment Δν of the second physical link, and the minimum value increasing average message volume ratio function estimate value. Of course, the corpse has the ratio of the average message volume of the physical link. The function is to increase the same volume. The corresponding incremental capacity allocations for V Ρ 2 are a 'c · 11 and △ c t. / Then the average message volume ratio. The function estimates the value of γ by 2 and increases the value of δι ^, and gets 1k. .Sorry / idea, we do not calculate a different V + 1 for each physical link, and use △. At first, it is the co-incremental increment of the previously estimated value of the average message volume ratio function. The inverse relationship of the average message volume ratio function is used to determine the capacity c / "and c / q to be allocated to the virtual VPI &amp; Vp2, and at the same time determine the new slope_Sit + 1 &amp; S2t + 1. Then repeat This iterative step, in order to get the next increment of the average message volume ratio function estimate value ΔΙ / -1. This calculation step is stable 'because △ I kt is underestimated. This is because if you ask II READ-ί Reading back "I iS ··-I 'ί I iΙΑ Fill in I to write a book

K 52 本紙張尺度適用中國國家橾準(CNS ) A4規格(210X297公釐) A7 B7 五、發明説明(50 圖15所示的已分配容量之遞增量Δ(:ι4Δ(ν分別小於在 每一反覆步驟中計算△;[/所用的數値AC”及△C,*。 利用平均訊息量比率函數推導其他的操作參數 2 在某些環境中,網路操作員可能希望規定諸如已分配資 源阻塞等不同於平均訊息量量測之網路參數。在呼叫層級 時,標度上,冑卜瓦松分配提供訊息流量的阻塞性能規格 •^最常用量測是依據歐蘭阻塞公式的時間擁擠量測。 歐蘭阻塞公式E(p,C)將阻塞的特徵表示爲具有兩個參 數的函數,這兩個參數是負載p、及所分配容量c。因爲 已發現依據平均訊息量量測的路徑容量配置技術遠快於其 他的路徑容量配置方法,所以計算時間擁擠量測最終値的 最有效率方式就是利用平均訊息量量測得到所分配容量之 最佳値,然後利用這些容量的最佳値及訊息流量負載的已 知値計算出歐蘭阻塞値。 可將同樣方式用於諸如多等級(亦即非均勻)卜瓦松分配 訊息流量的時間擁擠阻塞量測等其他的阻塞量測。如果爲 了配置路徑容量而使用其他的阻塞量測將得到複雜且無效 率的路徑容量配置演算法,則可使用以平均訊息量比率函 數作爲阻塞量測之基本VP路徑容量配置演算法或適應性 VP路徑容量配置演算法替代之。 利用平均訊息量比率函數之比較性結果 若考慮下列實例,將可更易於了解上文所述的技術。圖 1 6示出一個具有六個節點(1601 - 1606)之例示實體網路。 如圖1 6所示,節點(1601)係經分別由鏈路(1611 )及(1616 ) -53- 木紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) 請 r i. δ*.* I 填 ί裝 頁K 52 This paper scale is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) A7 B7 5. Description of the invention (50 The incremental increment of the allocated capacity shown in Figure 15 is Δ (: ι4Δ (ν are less than each Calculate △ in the iterative steps; [/ values used AC ”and △ C, *. Use the average message volume ratio function to derive other operating parameters 2 In some environments, network operators may wish to specify such as blocking of allocated resources It is different from the network parameters of the average message measurement. At the call level, on the scale, the Bwason distribution provides the blocking performance specification of the message traffic. The most commonly used measurement is the amount of time congestion based on the Oulan blocking formula The Eulerian blocking formula E (p, C) expresses the characteristics of blocking as a function of two parameters, which are the load p and the allocated capacity c. Because a path measured based on the average message volume has been found The capacity allocation technology is much faster than other path capacity allocation methods, so the most efficient way to calculate the final value of the time congestion measurement is to use the average message volume measurement to obtain the best value of the allocated capacity, and then The best value of these capacities and the known value of the message traffic load are used to calculate the Oulan congestion value. The same method can be used for time congestion and congestion measurement of multi-level (ie non-uniform) Bwason distribution message traffic Other congestion measurements. If other congestion measurements are used to configure the path capacity, a complex and inefficient path capacity configuration algorithm can be obtained. The average message volume ratio function can be used as the basic VP path capacity configuration for the congestion measurement The algorithm or the adaptive VP path capacity configuration algorithm is used instead. The comparative results using the average message volume ratio function can be more easily understood by considering the following examples. Figure 16 shows one with six An example of a physical network of nodes (1601-1606). As shown in Figure 16, the node (1601) is composed of links (1611) and (1616) -53- wooden paper scale applicable to the Chinese National Standard (CNS) Α4 Specification (210X297mm) Please fill in the i. Δ *. * I

IT 、-Ά 經濟部中央標準局員工消費合作社印製 3i S944 Α7 Β7 五、發明説明(51 ) 而連接到節點(1602 )及(1606 ),而節點(1604 )係分別經由 鏈路(1613)及(1614)而連接到節點(1603 )及(1606)。節點 (1602)及( 1605 )又經由鏈路(1612)、(1615)、(1617)、及 (1618)而連接到節點(^03)及(16〇6)。假設該實體網路的 這些鏈路可載送雙向訊息。然而,假設此實體網路上界定 的各虛擬路徑是單向的。 ,· · 下文所述之表3界定此例示六個節點的實體網路上十個不 同的虛擬路徑V P i到V P i 〇。因此,諸如虛擬路徑V P 3係自 節點(1602 )經由節點(1603 )到節點(16〇5 )。這些虛擬路徑 的連接拓撲係示於圖1 7。圖1 7中節點(170 1 - 1706 )相當於 圖1 6中之節點(1601 - 1606 )。所示之虛擬路徑v P3係自節 點( 1702)經由節點( 1703 )到節點( 1705 )。在所考慮的例予 中,假設圖16所示八個實體鏈路(1611 1618)的每—實體 鏈路之傳輸容量爲50單位的傳輸容量。可任意選擇每—實 體鏈路的單位傳輸容量,例如每秒2 〇個百萬位元。 VPi VP2 VP3 vp4 VP5 vp6 VP7 1-2-3-4 1-6-5-4 2-3-5 2-6-5 6-2-3 6-5-3 2-3-4 經濟部中央梂準局員工消費合作社印褽IT, -Ά Printed 3i S944 Α7 Β7 by the employee consumer cooperative of the Central Bureau of Standards of the Ministry of Economy V. Description of the invention (51) and connected to the nodes (1602) and (1606), and the nodes (1604) are via links (1613) And (1614) and connected to the nodes (1603) and (1606). Nodes (1602) and (1605) are connected to nodes (^ 03) and (16〇6) via links (1612), (1615), (1617), and (1618). It is assumed that these links of the physical network can carry two-way messages. However, it is assumed that each virtual path defined on this physical network is unidirectional. ... Table 3 described below defines ten different virtual paths V P i to V P i on the physical network of this example of six nodes. Therefore, such as the virtual path V P 3 is from the node (1602) to the node (16〇5) via the node (1603). The connection topology of these virtual paths is shown in Figure 17. The nodes (170 1-1706) in Figure 17 are equivalent to the nodes (1601-1606) in Figure 16. The virtual path v P3 shown is from node (1702) to node (1705) via node (1703). In the considered example, it is assumed that the transmission capacity of each physical link of the eight physical links (1611 1618) shown in FIG. 16 is a transmission capacity of 50 units. The unit transmission capacity per physical link can be arbitrarily selected, for example, 20 million bits per second. VPi VP2 VP3 vp4 VP5 vp6 VP7 1-2-3-4 1-6-5-4 2-3-5 2-6-5 6-2-3 6-5-3 2-3-4 Central Ministry of Economic Affairs The quasi-bureau employee consumer cooperative printed

6-5-4 首先考慮所提供訊息流量均勻時之情形。表4之首列 十個虛擬路徑(VPl - VPl〇)之訊息流量需求。如此1 示,這代表訊息流量需求在各個實體鏈路之間分配均/ 情形,因爲在不同虛擬路徑間之訊息流量需求變化較 -54 - 紙張尺度適用中國國家標準(CNS ) A4規格(210X297公变 A7 B7 五、發明説明(52 ) 較連績,而不是雙模態或多模態的情形。由三種不同演算 法所得到的路徑容量配置結果係列於表5。 表4 VPi VP2 VP3 VP4 VP5 vp6 VP7 VP8 VP9 VPi〇 訊息流量需求 4 6 3 1 6 4 3 6 5 2 虛擬路徑容量 演算法I 9.89 13.64 7.99 5.10 12.86 10.44 7.99 13.64 11.24 7.16 演算法II 9.75 13.53 8.19 5.29 12.64 10.50 8.19 13.53 11.18 7.11 演算法III 9.72 13.83 8.07 4.79 12.82 10.59 8.07 13.83 11.30 6.96 歐蘭阻塞機率(%) 演算法I 0.623 0.330 0.863 0.443 0.607 0.388 0.863 0.330 0.715 0.350 演算法II 0.743 0.366 0.743 0.366 0.743 0.366 0.743 0.366 0.743 0.366 演算法III 0.768 0.275 0.818 0.890 0.635 0.338 0.818 0.275 0.689 0.439 閱· 讀 背, if·3 之 注 意 事 填 I 寫 本衣 頁 訂 經濟部中央標隼局員工消費合作社印製 張 紙 表5 鏈路 Cl-2 c2 -6 Ci-6 C2 - 3 - 5 C3 -5 C3 -4 C5 -4 鏈路容量 50 50 50 50 50 50 50 50 键路寿1 用率(%) 演算法I 42.28 35.92 41.60 100 100 36.96 35.78 54.56 演算法II 41.86 35.88 41.28 100 100 37.40 35.88 54.14 演算法III 42.04 35.22 41.58 100 100 37.31 35.58 55.32 -55- L度適用中國國家標準(CNS ) A4规格(210X297公釐) A7 B7 319944 ----- —__ 五、發明説明(53 从演算法I是-凸函數規劃型演算法,其目標在於使利用歐 闌:塞公式計算出的總載送訊息流量最大。此演算法的類 型疋由 A. Farago、s. Blaabjerg、w. Holender、τ· Henk 、及LMalomsoky所著的會議論文&quot;最佳虛擬路徑之頻寬管 理&quot;中述及之類型:該論文係於1994年5月送交US,%,本 發明特此引用以供參照。演算如是—採用前文所述歐 蘭阻塞量測㈣的推下式演算法。演算法ΙΠ是—亦於前文 中述及的平均訊息量VP路徑容量配置演算法。 爲了使這三種演算法的結果可以比較,所有三種演算法 的頻寬需求參數ρ被設定成具有單位値”匕外,亦假設訊 息流量需求Α値低於各鏈路之實際容量。 表4亦示出在利用演算法ΠΙ所計算出的所分配各容量下 這三種演算法採用歐蘭阻塞公式所得到的阻塞機率。比較 演算法II與III之路徑容量配置結果後,我們可看出:使^ 演算法II (採用歐蘭阻塞量測之推下式演算法)之路徑容量 配置結果接近使用演算法111(採用平均訊息量比率函數之 適應性路徑容量配置演算法)所得到的路徑容量配置結果。 經濟部中央橾準局貝工消費合作社印装 因此,配置路徑容量問題對阻塞量測的選擇顯然並不敏感 〇 表5 7F出各虛擬路徑的鏈路利用率之對應結果。由表5可 看出,對應於實體鏈路(1612)及(1615)的c2_3&amp;C6鏈路 疋關鍵鍵路’因爲這些實體鍵路是利用率是1QQ%。 表6示出兩種具有特徵且可比較三種演算法的整體性效能 -56 - 本紙法尺度適用尹國國家揉準(CNS ) A4規格(210X297公釐) Ά19944 A7 五、發明説明(54 ) 參數:最大VP阻塞機4、及總載送訊急流量。 表6 比較 演算法I 演算法II 演算法III 最大VP阻塞機率 0.8639 0.7437 〇 8901 總載送訊息流量 39.7843 39.7748 39.7834 亦針對各虛擬路徑間之訊息流量需求相當發散的 之訊息 流量模式。調查同樣三種演算法之效能。表7中示出對不 均勻訊息流量需求可造成低阻塞的所分配V p容量之比較表 。如表7的首例所示,虛擬路徑νρ ^上所提供之訊息流量 與虚擬路徑VP2到VP1〇上所提供之訊息流量大有不同。 表7 VP! VP2 VP3 VP4 VP5 VP6 VP7 vp8 VP9 VPi〇 訊息流量需求 12 1 1 1 2 2 1 2 1 2 虛擬路々 呈容量 演算法I 23.80 5.73 5.73 5.73 8.00 8.00 5.73 8.00 5.73 8.00 演算法II 23.89 8.47 5.98 8.47 8.15 10.99 5.98 10.99 5.98 10 99 演算法III 24.81 8.21 5.69 8.21 8.09 11.19 5.69 11.19 5.69 11.19 經濟部中央橾準局貝工消費合作社印製 以前文所述同樣三種演算法對1 0個虛擬路徑上鏈路利用 率的對應比較結果示於表8。我們可看出,當使用演算法j工 -57- 本紙張尺度適用中國國家標準(CNS ) A4规格(21〇X 297公釐) A7 ______B7 五、發明説明(55 ) 及ΠΙ來配置網路的路徑容量時,實體鏈路(〗612)及(1618) 是關鍵鏈路。這三種演算法的整體性效能評估參數之比較 係示於表9。表7、8、及9列出的結果示出不均勻訊息流量 需求造成低阻塞之情形。 表8 表9 比較 演算法I 演算法II 演算法ΠΙ 總載送訊息流量(;Σ DEMAND=25) 24.971 24.985 24.986 鏈路 Cl - 2 ^2-6 Ci-6 - 3 ^6-5 C3 - 5 C3 -4 C5-4 鏈路容量 50 50 50 50 50 50 50 50 鏈路寿丨 用率(%) 演算法I 59.1 27.5 27.5 98 71 27.5 59.1 27.5 演算法II 59.8 38.9 100 100 34.0 59.8 38.9 演算法ΙΠ 61.0 32.6 38.8 100 100 33.8 61.0 38.8 經濟部中央橾隼局貝工消费合作社印袈 相反地,表10、1 1、及12示出不均勻提供訊息流量造成 高阻塞之情形。表10示出分配給首列所示訊息流量需求之 容量。表1 1示出1 〇個虛擬路徑的對應鏈路利用率結果。表 1 2利用總載送訊息流量作爲整體性效能評估參數而總結三 種演算法的比較分析。 ______-58- - 本紙張尺度適用中國國家橾準(CNS ) A4規格(210X 2们公釐) A7 B7 五、發明説明(56 κ ―― 一 VP9 VPi〇 VPl VP2 VP3 VP4 VP5 VP6 VP7 VP8 訊息流量需求 16 2 3 20 19 2 4 2 1 2 虛擬路4 至容哥 演算法I 18.00 5.25 3.99 28.97 21.02 5.25 4.99 5.25 1.99 5.25 演算法II 16.98 5.65 4.75 27.37 19.71 5.65 5.73 5.65 2.82 5.65 演算法III 18.11 5.09 3.94 28.69 21.30 5.09 5.08 5.09 1.56 5.09 請 面· 之 注 意 填 寫裝 本衣 頁 表1 1 鏈路 C卜2 -6 C卜6 - 3 ^6 - 5 C3 -5 C3 - 4 C5 ·4 鏈路容量 50 50 50 50 50 50 50 50 鏈路矛 用率(%) 演算法I 40.0 100 21.0 100 100 18.5 46.0 21.0 演算法II 39.6 94.2 22.6 100 100 20.8 45.4 22.6 演算法III 39.4 100 20.4 100 98.1 18.1 46.4 20.4 訂 表12 經濟部中央標準局負工消资合作社印裝 比較 演算法I 演算法II 演算法m 總載送訊息流量(Σ DEMAND=71) 64.8137 64.2233 64.6251 由表6、9 '及1 2可看出,以整體性效能而論,這三種演 算法得到相當類似的結果。 -59- 本紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ 297公釐) A7 B7 319944 五、發明説明(57 虛擬網路的路徑容量配置 可將VP路徑容量配置問題一般化成一虛擬網路之路徑容 量配置問題’因爲虚擬路徑是虛擬網路之特殊情形。以實 用的觀點而論,此種-般化是相當重要的,因爲有許多虚 擬網路觀念的應用。例如,可在不同的虛擬網路上提 同的服務。某些用户可能需要可提供保證服務品質(㈣ 參數之專用虛擬網路。其他的用户可能要求可提供某種水 準的傳輸資源及安全性之虛擬網路,因而必須使這些虛擬 網路獨立於其他的虛擬網路。爲了提供這些服務,我們必 須解決虛擬網路(VN)的路徑容量配置問題。 虚擬網路觀念亦可適用於某一電訊營運業者轉隹自另一 業者講得的傳輸容量之情形。第一個業者可能想:崎 益最大或維持服務品質標準之方式,將所講得的傳輸容量 分配給其客户。爲了達到上述目#,第—業者將需要配置 其租用虛擬網路之路徑容量。而一轉售業者的客户可能又 是更低層級的轉售業者。因此,例如—利用長期契約購買 大量傳輸容量的大型組織可能希望依據組織中各部門的訊 息流量需求變化而將傳輸容量重新分配到各部門。此種重 新分配就是一 V N路徑容量配置問題。 ,應用虛擬網路觀念的另-簡單例子與經由一 atm網路傳 送網際網路通訊協定㈣咖^购心簡稱⑺封包有關 。執行上述工作的一種方式即是分配ΑΤΜ網路上的一組 VP,以便完成封包的連接導向傳送。然而,亦可視爲:分 配一虚擬網路,而非只分配一組虛擬路徑,即可在此虛擬 -60 Μ氏張尺度適用中國國家標準(CNS ) Α4規格(210Χ297公董) 請 閏 讀 背. 面 ί 事 項 再〆 填 寫 本 頁 裝 訂 經濟部中央榇準局貝工消費合作社印製 $ Α7 _______Β7 五、發明説明(58 ) 網路中經由不同的路徑繞送不同的封包。此種較少連接的 傳輸模式將可提供比連接導向技術所能獲得的更多之多工 化增益。 VN路徑容量配置問题之抽象模型 可將整個路徑容量配置問題之描述分解成一種多層表示 法,此種表示法可,一種獨立於其他各層描述的形式在每 一層上描述路徑容量配置問題。 在本發明的一實施例中,使用一種三層模型來解決虛擬 網路(virtual network ;簡稱VN)之路徑容量配置問題。此 種二層模型係示於圖1 8。此三層模型的最低層是實體層, 在該實體層上已規定實體網路拓撲及實體鏈路資源。通常 這些規定構成了 VN路徑容量配置問題的限制條件。然而 ,本發明所詳述的解決技術並不限於實體網路不變的情形 ,而是亦可適用於解決網路計畫問題。在本文的用法中, 網路計畫問題係有關在已知一所提供訊息流量模式下在一 網路的各實體鏈路上找出最佳的容量分配。 經濟部中央標隼局員工消費合作社印製 圖1 8所示的三層模型之中間層是虛擬網路層,在該虚擬 網路層上描述一個或多個虛擬網路及虛擬鏈路之拓撲。每 一虛擬網路係由一個或多個虛擬鏈路所構成。請注意,虛 擬網路層上的每一虛擬鏈路代表實體層上的一組一個或多 個實體鏈路。在本發明已解決的模型問題中,假設各虛擬 網路是不同的。 圖18所示三層模型之頂層是虛擬路徑層。在虚擬路徑層 上所界定之各虛擬路徑以抽象方式描述在下層各虛擬網路 --- -61 -__ 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) A7 B7 五、發明说明(59 上的m動。請注意’在頂層上對應於下層不同的虛擬 網路之各虛擬路徑在例示模型中並未重^。然而,可將此 模型延伸以涵蓋不同的虛擬網路共同下層資源的情形,或 涵蓋對應於不同虛擬網路的各虛擬路徑被整合成載用整合 訊息流量的虛擬幹線之情形。 α 將三層VN路徑容量配置問題一般化成Ν層 請注意,可將三層抽象模型無限制地一般化成一Ν層抽 象模型,此處的Ν是一正整數。在此種]^層的情形中,本 發明所述之技術可在Ν_2層的資源限制下配置Ν_丨層各鏈 路之容量。 爲了 了解將VN路徑容量配置問題自三層一般化成ν層, 現在將考慮一種某一業者維護一ΑΤΜ網路之模型情形。可 將此ATM網路視爲一多層階層之底層(即&quot;基礎設施。。並 假設此ATM網路的拓撲及實際資源是固定的,因而構成整 個路徑容量配置問題的限制條件。 &amp; 經濟部中央梂準局員工消費合作社印製 我們可以遞迴風是在ATM網路層之上構建一個或多個,, 夹層’'(&quot;sandwich” layers)。可將本文中所用的”夹層”定義 成若干相鄰層之整合層。可將每一夾層視爲—個與本模型 相同而用來解決VN路徑容量配置問題的三層式結構。二 以遞迴方式將夾層下的層視爲以遞迴方式公式化MN: 徑容量配置問題之有限實體基礎設施。可利用一具有單一 夹層結構之例子説明此種觀念。 ' 假設係在A T Μ網路層之上界定複數個專線(這些專線等 效於虛擬路徑或邏輯鏈路)。現在可將這些專線視爲構建 -62- 匕紙張尺度適用中國國家棣準^奶)六4^格(2丨0乂297公釐) A7 B7 五、發明説明(60 ) 一個在夾層存在的持續時間中不變的新夾層實體基礎設施 。然後可將這些邏輯鏈路(logicallink ;簡稱LL)視爲構建 在LL·層之上的虛擬網路(VN)層之有限資源。此vn層與 L L層不同,且又是可變的,亦即在夾層結構的持續時間中 可接受各種重新配置。 隨時變化的用户多求可能需要此種重新配置。例如,— 家具有分佈在各地的若干部門之大型公司之電訊需求可能 因某些部門的成長或其他部門的縮编而隨時發生變化。係 在每一夾層的頂層上界定傳輸服務。網路營運業者負有重 新配置各關係式之貴任。此種夾層模型的各虛擬網路可代 表諸如相互連接的諸區域網路或廣域網路。在每一虛擬網 路之上’可以有一層對應於整合訊息流路徑之V p。將於本 申請案後文討論基本三層式VN路徑容量配置問題的章節 申定義這些對映的VP。 請注意,分析路徑容量配置問題時邏輯鏈路層並不是必 要的。仍然包含該層的主要理由是使夾層結構與A T Μ網路 層隔離。在此種方式下,夾層營運業者無須關照營運 業者即可執行虛擬網路的重新配置。此種方式簡化了 Α τ μ 經濟部中央樣準局員工消費合作社印繁 網路層的管理,因爲各邏輯鏈路的持續時間將相當於夾層 結構的持續時間。 V Ν路徑容量配置問題 可將本發明所解決的虛擬網路(VN)路徑容量配置問題表 達如下:我們以一實體網路開始,該實體網路具有一以成 分實體鏈路(physical link ;簡稱PL)及規定實體鏈路容量 本紙張尺110X297公釐) ' --- 3iS944 A7 ;________ B7 五、發明説明(61 ) 表示的規定拓撲。A 1 &amp; 在此實體網路上界定若干共用實際資源 乏不同虛擬網路。件w I ^ 、 你以每一虛擬網路的成分虛擬鏈路規定 該虛擬網路之扭擔纟士 &amp;6-5-4 First consider the situation when the provided message flow is uniform. The first column of Table 4 shows the traffic requirements of the ten virtual paths (VPl-VPl〇). As shown in Figure 1, this means that the message traffic demand is evenly distributed between each physical link / situation, because the change in message traffic demand between different virtual paths is more than -54-the paper standard applies the Chinese National Standard (CNS) A4 specification (210X297 Variant A7 B7 V. Description of invention (52) More consecutive results, not a dual-modal or multi-modal situation. The path capacity configuration results obtained by three different algorithms are listed in Table 5. Table 4 VPi VP2 VP3 VP4 VP5 vp6 VP7 VP8 VP9 VPi〇 Message flow requirement 4 6 3 1 6 4 3 6 5 2 Virtual path capacity algorithm I 9.89 13.64 7.99 5.10 12.86 10.44 7.99 13.64 11.24 7.16 algorithm II 9.75 13.53 8.19 5.29 12.64 10.50 8.19 13.53 11.18 7.11 algorithm III 9.72 13.83 8.07 4.79 12.82 10.59 8.07 13.83 11.30 6.96 Ouland blocking probability (%) Algorithm I 0.623 0.330 0.863 0.443 0.607 0.388 0.863 0.330 0.715 0.350 Algorithm II 0.743 0.366 0.743 0.366 0.743 0.366 0.743 0.366 0.743 0.366 Algorithm III 0.768 0.275 0.818 0.890 0.635 0.338 0.818 0.275 0.689 0.439 Read · read the back, if · 3 notes fill in I write Printed Sheet Sheet Printed by the Central Standard Falcon Bureau Employee Consumer Cooperative of the Ministry of Economic Affairs 5 Link Cl-2 c2 -6 Ci-6 C2-3-5 C3 -5 C3 -4 C5 -4 Link Capacity 50 50 50 50 50 50 50 50 Bond lifetime 1 utilization rate (%) Algorithm I 42.28 35.92 41.60 100 100 36.96 35.78 54.56 Algorithm II 41.86 35.88 41.28 100 100 37.40 35.88 54.14 Algorithm III 42.04 35.22 41.58 100 100 37.31 35.58 55.32 -55- L Applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) A7 B7 319944 ----- —__ V. Description of invention (53 Subalgorithm I is a convex function programming type algorithm, its goal is to make use of the European L: The total flow of carrying messages calculated by the plug formula is the largest. The type of this algorithm is the type described in the conference paper "Quality Bandwidth Management of the Best Virtual Path" by A. Farago, s. Blaabjerg, w. Holender, τ · Henk, and LMalomsoky: The paper It was sent to US,% in May 1994, and the present invention is hereby incorporated by reference. The calculation is the same-using the push-down algorithm described above for the European blockage measurement. Algorithm ΙΠ is an average message volume VP path capacity allocation algorithm also mentioned in the previous section. In order to make the results of these three algorithms comparable, the bandwidth demand parameter ρ of all three algorithms is set to have a unit value. In addition, it is also assumed that the message traffic demand A value is lower than the actual capacity of each link. Table 4 also Shows the blocking probability obtained by the three algorithms using the Oulan blocking formula under the allocated capacities calculated by the algorithm ΠΙ. After comparing the path capacity configuration results of algorithms II and III, we can see: ^ The path capacity configuration result of Algorithm II (the push-down algorithm using Oulan's congestion measurement) is close to the path capacity configuration obtained using Algorithm 111 (adaptive path capacity configuration algorithm using the average message volume ratio function) Results. Printed by the Beigong Consumer Cooperative of the Central Bureau of Economic Affairs of the Ministry of Economics. Therefore, the configuration path capacity issue is obviously not sensitive to the choice of congestion measurement. Table 5 7F shows the corresponding results of the link utilization of each virtual path. Table 5 It can be seen that the c2_3 &amp; C6 links corresponding to the physical links (1612) and (1615) are critical key links because the utilization rate of these physical links is 1QQ%. Table 6 shows The overall performance of the two algorithms with characteristics and comparable to the three algorithms -56-The paper method scale is applicable to the Yin Guo National Standard (CNS) A4 specification (210X297 mm) Ά19944 A7 V. Description of the invention (54) Parameters: Maximum VP blocking Machine 4, and the total traffic carrying urgent messages. Table 6 Comparison Algorithm I Algorithm II Algorithm III Maximum VP Blocking Probability 0.8639 0.7437 〇8901 Total Carrying Message Traffic 39.7843 39.7748 39.7834 Also corresponding to the demand for message traffic between virtual paths Scattered message traffic patterns. Investigate the effectiveness of the same three algorithms. Table 7 shows a comparison table of the allocated V p capacity that can cause low blocking for uneven message traffic requirements. As shown in the first example of Table 7, the virtual The message flow provided on the path νρ ^ is very different from the message flow provided on the virtual paths VP2 to VP1〇. Table 7 VP! VP2 VP3 VP4 VP5 VP6 VP7 vp8 VP9 VPi〇 Message flow requirements 12 1 1 1 2 2 1 2 1 2 Virtual road rendering volume algorithm I 23.80 5.73 5.73 5.73 8.00 8.00 5.73 8.00 5.73 8.00 algorithm II 23.89 8.47 5.98 8.47 8.15 10.99 5.98 10.99 5.98 10 99 Algorithm III 24.81 8.21 5.69 8.21 8.09 11.19 5.69 11.19 5.69 11.19 Printed by the Ministry of Economic Affairs, Central Bureau of Customs and Industry Beigong Consumer Cooperatives. The comparison results of the same three algorithms described above for the link utilization on 10 virtual paths are shown in the table. 8. We can see that when using the algorithm j 工 -57- this paper scale is applicable to the Chinese National Standard (CNS) A4 specification (21〇X 297 mm) A7 ______B7 V. Invention description (55) and ΠΙ to configure the network In path capacity, physical links (〗 612) and (1618) are critical links. The comparison of the overall performance evaluation parameters of these three algorithms is shown in Table 9. The results listed in Tables 7, 8, and 9 show the situation where the non-uniform message traffic demand causes low congestion. Table 8 Table 9 Comparison Algorithm I Algorithm II Algorithm II I Total Carrying Message Traffic (; Σ DEMAND = 25) 24.971 24.985 24.986 Link Cl-2 ^ 2-6 Ci-6-3 ^ 6-5 C3-5 C3 -4 C5-4 Link capacity 50 50 50 50 50 50 50 50 Link life rate (%) Algorithm I 59.1 27.5 27.5 98 71 27.5 59.1 27.5 Algorithm II 59.8 38.9 100 100 34.0 59.8 38.9 Algorithm Π 61.0 32.6 38.8 100 100 33.8 61.0 38.8 Ministry of Economic Affairs, Central Falcon Bureau Beigong Consumer Cooperative Society. On the contrary, Tables 10, 11, 1 and 12 show the situation of high blocking caused by uneven provision of information traffic. Table 10 shows the capacity allocated to the message flow requirements shown in the first column. Table 11 shows the corresponding link utilization results for 10 virtual paths. Table 12 summarizes the comparative analysis of the three algorithms by using the total message traffic as a parameter for overall performance evaluation. ______- 58--This paper scale is applicable to China National Standard (CNS) A4 specification (210X 2 mm) A7 B7 V. Invention description (56 κ —— 1 VP9 VPi〇VPl VP2 VP3 VP4 VP5 VP6 VP7 VP8 message flow Requirement 16 2 3 20 19 2 4 2 1 2 Virtual way 4 to Rongo algorithm I 18.00 5.25 3.99 28.97 21.02 5.25 4.99 5.25 1.99 5.25 algorithm II 16.98 5.65 4.75 27.37 19.71 5.65 5.73 5.65 2.82 5.65 algorithm III 18.11 5.09 3.94 28.69 21.30 5.09 5.08 5.09 1.56 5.09 Please pay attention to please fill out the table on the clothing page 1 1 Link C Bu 2 -6 C Bu 6-3 ^ 6-5 C3 -5 C3-4 C5 · 4 Link capacity 50 50 50 50 50 50 50 50 Link utilization rate (%) Algorithm I 40.0 100 21.0 100 100 18.5 46.0 21.0 Algorithm II 39.6 94.2 22.6 100 100 20.8 45.4 22.6 Algorithm III 39.4 100 20.4 100 98.1 18.1 46.4 20.4 Schedule 12 Economy Printed comparison algorithm of the Central Bureau of Standards of the Ministry of Labor and Economic Cooperation I algorithm II algorithm m Total message flow (Σ DEMAND = 71) 64.8137 64.2233 64.6251 As can be seen from Tables 6, 9 'and 1 2 as a whole In terms of sexual performance, these three calculations The method obtains quite similar results. -59- This paper scale is applicable to the Chinese National Standard (CNS) Α4 specification (210Χ 297 mm) A7 B7 319944 V. Invention description (57 Virtual network path capacity configuration can be configured with VP path capacity The problem is generalized to a virtual network's path capacity allocation problem 'because the virtual path is a special case of the virtual network. From a practical point of view, this generalization is very important because there are many applications of the virtual network concept For example, the same service can be provided on different virtual networks. Some users may require a dedicated virtual network that can provide guaranteed service quality ((iv) parameters. Other users may require a certain level of transmission resources and security Virtual network, so these virtual networks must be independent of other virtual networks. In order to provide these services, we must solve the problem of virtual network (VN) path capacity allocation. The concept of virtual network can also be applied to the situation where a telecommunications operator transfers the transmission capacity from another operator. The first player may want to allocate the transmission capacity mentioned to its customers in a way that maximizes or maintains service quality standards. In order to achieve the above objective # 1, the first operator will need to configure the path capacity of its leased virtual network. A reseller's customer may be a lower-level reseller. Therefore, for example, a large organization that uses a long-term contract to purchase a large amount of transmission capacity may want to redistribute transmission capacity to each department based on changes in the information flow requirements of each department in the organization. This kind of redistribution is a problem of one V N path capacity configuration. , Another example of the application of the concept of virtual network-a simple example is related to the transmission of Internet protocol via an atm network (Café ^ purchase heart abbreviation ⑺ packet). One way to perform the above work is to allocate a set of VPs on the ATM network to complete the connection-oriented transmission of packets. However, it can also be regarded as: allocating a virtual network instead of only allocating a set of virtual paths, which can be applied to the China National Standards (CNS) Α4 specification (210Χ297 dong) at the virtual -60 M Zhang scale. Please read back面 ί Matters and then fill out this page to be printed by the Ministry of Economic Affairs, Central Bureau of Economics and Technology, Beigong Consumer Cooperative Printed $ Α7 _______ Β7 V. Description of Invention (58) Different packets are sent around the network through different paths. This less-connected transmission mode will provide more versatile gain than connection-oriented technology. Abstract model of VN path capacity configuration problem The description of the entire path capacity configuration problem can be decomposed into a multi-layer representation, which can describe the path capacity configuration problem on each layer in a form independent of the description of other layers. In an embodiment of the present invention, a three-layer model is used to solve the path capacity allocation problem of a virtual network (VN for short). This two-layer model is shown in Figure 18. The lowest layer of this three-layer model is the physical layer, on which physical network topology and physical link resources have been specified. Usually these regulations constitute the limiting conditions for VN path capacity allocation issues. However, the solution technique detailed in the present invention is not limited to the case where the physical network is unchanged, but can also be applied to solve the network planning problem. In the usage of this article, the network planning problem is related to finding the optimal capacity allocation on each physical link of a network under a given message traffic pattern. The Central Falcon Bureau Employee Consumer Cooperative printed the three-layer model shown in Figure 18. The middle layer is the virtual network layer. The virtual network layer describes the topology of one or more virtual networks and virtual links. . Each virtual network is composed of one or more virtual links. Please note that each virtual link on the virtual network layer represents a set of one or more physical links on the physical layer. In the model problem solved by the present invention, it is assumed that each virtual network is different. The top layer of the three-layer model shown in Figure 18 is the virtual path layer. The virtual paths defined on the virtual path layer are described in an abstract way in the virtual networks on the lower layer ----61 -__ This paper scale is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) A7 B7 V. Invention Description (Motion on 59. Please note that the virtual paths on the top layer that correspond to different virtual networks in the lower layer are not duplicated in the illustrated model. However, this model can be extended to cover different virtual networks in common. The case of lower-layer resources, or cover the case where the virtual paths corresponding to different virtual networks are integrated into a virtual trunk carrying integrated message traffic. Α Generalize the problem of capacity allocation of Layer 3 VN paths to Layer N. Please note that the three The layer abstraction model is generalized into an N layer abstraction model without limitation, where N is a positive integer. In this case of layer ^, the technology described in the present invention can be configured under the resource limitation of the N_2 layer. The capacity of each link in the layer. In order to understand the generalization of the VN path capacity configuration problem from the third layer to the ν layer, we will now consider a model scenario in which an operator maintains an ATM network. This ATM network can be used It is regarded as the bottom layer of a multi-level hierarchy (that is, &quot; infrastructure ... and assumes that the topology and actual resources of this ATM network are fixed, and thus constitutes the limiting condition for the entire path capacity allocation problem. &Amp; Central Bureau of Economics Printed by employee consumer cooperatives, we can recursively build one or more layers on top of the ATM network layer, "sandwich" layers. The "sandwich" used in this article can be defined as several The integration layer of adjacent layers. Each interlayer can be regarded as a three-layer structure that is the same as this model and used to solve the problem of VN path capacity configuration. Second, the layer under the interlayer is regarded as recursive Formulation of MN: The limited physical infrastructure of the capacity allocation problem. An example with a single mezzanine structure can be used to illustrate this concept. It is assumed that a number of dedicated lines are defined above the AT M network layer (these dedicated lines are equivalent to (Virtual path or logical link). These special lines can now be regarded as the construction of -62- dagger paper scale applicable to the Chinese national standard ^ milk) six 4 ^ grid (2 丨 0 297 mm) A7 B7 V. Description of invention ( 60) A new mezzanine physical infrastructure that does not change over the duration of the mezzanine. These logical links (logical links; LL for short) can then be regarded as the limited resources of the virtual network (VN) layer built on the LL · layer This vn layer is different from the LL layer and is variable, that is, various reconfigurations can be accepted during the duration of the sandwich structure. Users who change at any time may require this reconfiguration. For example,-home has distribution The telecommunications needs of large companies in several departments in various regions may change at any time due to the growth of some departments or the downsizing of other departments. The transmission services are defined on the top layer of each mezzanine. The value of the relationship. The virtual networks of this mezzanine model can represent, for example, interconnected regional networks or wide area networks. Above each virtual network, there can be a layer of Vp corresponding to the integrated message flow path. These mapping VPs will be defined in the chapter that discusses the basic three-tier VN path capacity configuration later in this application. Please note that the logical link layer is not necessary when analyzing path capacity configuration issues. The main reason for still including this layer is to isolate the sandwich structure from the ATM network layer. In this way, the mezzanine operator can perform virtual network reconfiguration without caring for the operator. This method simplifies the management of the network layer of the Indian Consumers' Cooperative of the Central Sample Bureau of the Ministry of Economic Affairs, because the duration of each logical link will be equivalent to the duration of the mezzanine structure. The V Ν path capacity configuration problem can be expressed as follows: The virtual network (VN) path capacity configuration problem solved by the present invention is as follows: we start with a physical network, which has a component physical link (abbreviated physical link; abbreviated as PL) and the specified physical link capacity (paper size 110X297 mm) '--- 3iS944 A7; ________ B7 V. The specified topology indicated by the invention description (61). A 1 &amp; define a number of shared actual resources on this physical network and lack of different virtual networks. File w I ^, you specify the virtual link of each virtual network with the virtual link of the virtual network &amp;

復,構。VN拓撲係與PN拓撲有關,而VP ',係與對應的各VN有關。最後,亦已知各虚擬路徑上 斤提供(訊心流量。VN路徑容量配置問題之目標即是在 不違反拓撲或貝源$制下將傳輸容量分配給各。 區隔架構 一般而言,路徑交番❽班、 ^奋量配置心目的在於將實體基礎設施分 割成若干區隔,且分割之方式爲不同—隔之間並無互動( 亦即夕工化)’且每—區隔内有某些互動(亦即多工化)。在 整口訊心机而要比其每—成分訊息流所需容量的總和小 的傳輸容量時,乡工化增益有所助益。 +在本發明所考慮的模型V N路徑容量配置問題中,假設已 完成不同的虛擬網路間之資源區隔。因此,縱使兩個或更 多個虚擬網路共用相同的實際資源,但是本路徑容量配置 杈型並不處理屬於不同虛擬網路的訊息流多工化。只容許 在單一虛擬網路内讓多個訊息流共同可用的實際資源。 經濟部中央樣準局—工消費合作社印製 至少有二種虛擬網路路徑容量配置問題的區隔架構符合 上述模型的多工化規則: a_虛擬路fe(vp)區隔架構,其中每—虛擬網路上的每一 虛擬路徑自其他的虛擬路徑中區隔出來,使任何兩個 不同的虛擬路徑之間沒有多工化。 b.虛擬鏈路(VL)區隔架構,其中每一虛擬網路上的每一 虛擬鏈路自其他的虚擬鏈路中區隔出來,使不同的虚 -______B7 五、發明説明(62 ) 擬鏈路之間沒有多工化,且容許通過同一虛擬鏈路的 不同vp共用下層的資源。 c.實體鏈路(PL)區隔架構,其中每一虚擬網路自其他的 虛擬網路中區隔出來。此處,不同的虛擬網路之間沒 有多工化’且容許單一虛擬網路内的虛擬鏈路共用下 層的資源。 以網路管理的觀點而論,VP區隔架構是最不複雜的。然而 ’此種架構將使可用實際資源之利用率低於其他兩種區隔 架構。相反地,PL區隔架構在運算上是最複雜的,但是提 供了三種區隔架構中最高的可用實際資源利用率。下文中 將詳述這三種區隔架構。 首先考慮採用V P區隔架構的V N路徑容量配置問題。然 後在不容許各虛擬鏈路共用實際資源時,考慮VN路徑容 量配置問題。此種方式相當於使用上文中界定的v L區隔架 構。最後,在容許不同的虛擬鏈路共用實際資源的情形中 ,考慮VN路徑容量配置問題。此種方式相當於使用上文 中界疋的PL區隔架構。如下文所示,可將vn路徑容量配 經濟部中央標準局負工消費合作社印製 置問題簡化爲一適用於全部三種區隔架構的等效vp路徑容 量配置問題。 可利用别文中詳述的任何一種解決技術解此等效的V p路 徑容量配置問題,而得到各虚擬鏈路的資源分配。利用_ 平均訊息量V P路徑容量配置演算法配置一组採用p L區隔 架構的虚擬網路之路徑容量,而舉例説明本發明之系統及 方法。將平均訊息量路徑容量配置演算法之效能與其他 本^^度適用中國國家標準(CNS) a^-(-21〇x29^ j 319944 A7 . ___——--------B7 五、發明説明(63 ) ' ~~~ -- 種習知的演算法比較,即订却彳士 即了汗估前者的精確性及速度。 VN路徑容量配置觀念 爲、句且有效率之方式處理V N路徑容量配置問題的 分層描述,我們首先需要定義模型及一些記法。可利用一 特疋VN構矩陣描述_虛擬網路的各虛擬缝路與各對應 的實體鏈路間之成員關係。此結構矩陣在觀念上類似於先 前在解VP路徑容量配置問題所定義的路由矩陣。我們還記 得:路由矩陣描述—基礎網路之上所界定的各虛擬路徑與 該基礎網路的各鏈路間之成員關係。 可將按照階層分解的VN路徑容量配置問題簡化爲將於下 又中説明的V P路徑容量配置問題。此種簡化程序類似於編 譯程序。可將虛擬網路結構及此結構上界定的訊息流量需 求視爲一高階規格。可將vp路徑容量配置問題視爲一低階 規格。本發明程序之系統及方法將一高階規格,,編譯”成一 低階規格。下文中將此種簡化後之Vp結構稱爲編譯後結構 ,而強調此種類似性。請注意,可配合任何一種V P路徑容 量配置演算法使用此編譯程序。 經濟部中央標準局員工消費合作杜印製 虛擬網路(VN)結構矩陣描述構成一虛擬網路的各虛擬鏈 路之拓撲結構。因爲每一虛擬網路是一組虚擬鏈路,且因 爲任何虛擬網路中之各虛擬鏈路是下層實體網路上所界定 各實體鏈路之抽象概念,所以VN結構矩陣描述實體網路 上的一组路徑》 V N結構矩陣包含若干零及一’且描述—组成員關係。結 構矩陣之列數與實體鏈路之數目相同,行數則與虚擬鏈路 本紙張尺度適用中國囤家標準(CNS ) A4規格(210X297公釐) B7 五、發明説明(64 ) 數目結構矩陣的每_行界定—個此類成員 ,且代表單一虛擬鏈路。 ,、 沾人加枯人 將此成員關係表不所有實體鏈路 的:#集&amp;心一子集。因此,行向量列中之 該虛擬鏈路VL.通過音値表不 1 實體鏈路pLp,而零値表示該VL.並去 通過實體鏈路PLp。 1禾 構成對應子集的f實體鏈路元素以數學方式界定每 擬鍵路。此子集是虛擬鏈路的數學記法。每-虛擬網路有 其自己的結構矩陣’用以描述屬於該虛擬網路的所有虛擬 鏈路。請注意,此種㈣表料可料—虛㈣路成爲任 何實體鏈路集合體(例如子網路)之抽象概念。一虛擬路徑 只是一種特殊類型的子網路。因此,vp路徑容量配置問題 只是VN路徑容量配置問題的一種特殊情形。 界定虛擬網路層及實體網路層的鏈路容量向量,即可得 到各虛擬鏈路的容量與分配給各實體鏈路的對應容量間之 定量關係。若以矩陣記法表示,則該關係式的形式如下:Complex, structure. The VN topology is related to the PN topology, and VP 'is related to the corresponding VNs. Finally, it is also known that each virtual path is provided with (heartbeat traffic. The goal of the VN path capacity configuration problem is to allocate transmission capacity to each without violating the topology or the source system. Segmentation architecture Generally speaking, paths The ❽ shift, ^ effort allocation goal is to divide the physical infrastructure into several segments, and the way of segmentation is different-there is no interaction between the segments (that is, evening industrialization) 'and there is a certain within each segment These interactions (that is, multi-tasking). When the transmission capacity of the whole message is smaller than the sum of the required capacity of each component stream, the rural industrialization gain is helpful. + Considered in the present invention In the model VN path capacity allocation problem, it is assumed that the resource separation between different virtual networks has been completed. Therefore, even though two or more virtual networks share the same actual resources, this path capacity allocation type does not Handle the multiplexing of message streams belonging to different virtual networks. Only allow the actual resources available for multiple message streams within a single virtual network. The Central Sample Bureau of the Ministry of Economic Affairs-Industrial Consumer Cooperatives prints at least two types of virtual The partition architecture of the proposed network path capacity allocation problem conforms to the multiplexing rules of the above model: a_ virtual road fe (vp) partition architecture, where each-each virtual path on the virtual network is from the middle of other virtual paths Isolate it so that there is no multiplexing between any two different virtual paths. B. Virtual link (VL) partition architecture, where each virtual link on each virtual network is from another virtual link Separated to make different virtual -______ B7 V. Description of the invention (62) There is no multiplexing between the proposed links, and different vp through the same virtual link are allowed to share the lower layer resources. C. Physical link (PL) area Separate architecture, where each virtual network is separated from other virtual networks. Here, there is no multiplexing between different virtual networks' and allows virtual links within a single virtual network to share underlying resources From a network management point of view, the VP partition architecture is the least complicated. However, this kind of architecture will make the utilization of available actual resources lower than the other two partition architectures. On the contrary, the PL partition architecture is The most computationally complex, It provides the highest available actual resource utilization rate among the three partitioned architectures. The three partitioned architectures will be described in detail below. First, consider the VN path capacity configuration problem using the VP partitioned architecture. Then, the virtual links are not allowed to share When considering actual resources, consider VN path capacity configuration. This method is equivalent to using the v L partition architecture defined above. Finally, in the case of allowing different virtual links to share actual resources, consider VN path capacity configuration. This method is equivalent to using the PL partition architecture mentioned above. As shown below, the vn path capacity can be reduced to the printing and placement problem of the negative work consumer cooperative of the Central Bureau of Standards of the Ministry of Economy to one for all three partition architectures. Equivalent vp path capacity configuration problem. You can use any of the solutions detailed in other articles to solve this equivalent Vp path capacity configuration problem, and get the resource allocation of each virtual link. Using the _ average message volume VP path capacity allocation algorithm to configure the path capacity of a group of virtual networks using the PL partition architecture, and exemplify the system and method of the present invention. The performance of the algorithm for allocating the average message volume path capacity and other values are applied to the Chinese National Standard (CNS) a ^-(-21〇x29 ^ j 319944 A7. ___——-------- B7 Five 3. Description of the invention (63) '~~~-A comparison of conventional algorithms, that is, ordering the order to estimate the accuracy and speed of the former. The concept of VN path capacity configuration is to deal with sentences and efficiently For the hierarchical description of the VN path capacity configuration problem, we first need to define the model and some notation. A special VN configuration matrix can be used to describe the membership relationship between each virtual seam of the virtual network and each corresponding physical link. This The structural matrix is similar in concept to the routing matrix previously defined in solving the VP path capacity allocation problem. We still remember: routing matrix description-between the virtual paths defined on the basic network and the links of the basic network Membership relationship. The VN path capacity allocation problem decomposed according to hierarchy can be simplified to the VP path capacity allocation problem that will be explained in the following. This simplified procedure is similar to the compiler procedure. The virtual network structure and this structure can be defined of The traffic demand is regarded as a high-level specification. The problem of vp path capacity configuration can be regarded as a low-level specification. The system and method of the program of the present invention compiles a high-level specification into a low-level specification. The Vp structure is called the post-compilation structure, and this similarity is emphasized. Please note that this compiler can be used in conjunction with any kind of VP path capacity configuration algorithm. The Ministry of Economic Affairs Central Standards Bureau employee consumption cooperation du printed virtual network (VN ) The structure matrix describes the topology of each virtual link that constitutes a virtual network. Because each virtual network is a set of virtual links, and because each virtual link in any virtual network is defined on the underlying physical network The abstract concept of each physical link, so the VN structure matrix describes a set of paths on the physical network. "The VN structure matrix contains a number of zeros and ones and describes the group membership. The number of columns in the structure matrix is the same as the number of physical links. The number of lines and the virtual link are based on the Chinese paper hoarding standard (CNS) A4 specification (210X297mm) B7 5. Invention description (64) Each row of the matrix defines a member of this type and represents a single virtual link. ,, and Zhanren Jiakui list this member relationship as all physical links: # 集 &amp; 心 一 subset. Therefore, the row The virtual link VL in the vector column represents the physical link pLp through the sound value, and the zero value represents the VL. It goes through the physical link PLp. 1 and the physical link elements that constitute the corresponding subset are mathematically The way to define each pseudo-link. This subset is the mathematical notation of virtual links. Each virtual network has its own structure matrix to describe all virtual links belonging to the virtual network. Please note that this type of (iv) Predictable materials-virtual paths become the abstract concept of any physical link aggregation (such as subnet). A virtual path is just a special type of subnet. Therefore, the vp path capacity configuration problem is just a special case of the VN path capacity configuration problem. By defining the link capacity vectors of the virtual network layer and the physical network layer, a quantitative relationship between the capacity of each virtual link and the corresponding capacity allocated to each physical link can be obtained. If expressed in matrix notation, the form of the relationship is as follows:

C ck phys (方程式3 3 ) 經濟部中央樣準局負工消費合作社印製 此處的S k是虛擬網路k的結構矩陣,C k是界定虚擬網路k的 各虛擬鏈路容量之虛擬容量向量’ Ckphys是分配給虛擬網路 k的各虛擬鏈路的實際容量之對應向量。 分配给所有虛擬網路的累積實際容量不得超過實體網路 的可用容量。可將上述限制條件表示爲下列限制關係式: -67- 本紙乐尺度適用中國國家標準(CNS ) ( 210X297公釐) A7 B7 五、發明説明(65C ck phys (Equation 3 3) Printed by the Consumer Labor Cooperative of the Central Prototype Bureau of the Ministry of Economic Affairs where S k is the structure matrix of the virtual network k, and C k is the definition of the virtual link capacity of the virtual network Capacity vector 'Ckphys is the corresponding vector of the actual capacity of each virtual link allocated to the virtual network k. The cumulative actual capacity allocated to all virtual networks must not exceed the available capacity of the physical network. The above restriction conditions can be expressed as the following restriction relationship: -67- This paper music scale is applicable to the Chinese National Standard (CNS) (210X297mm) A7 B7 V. Invention description (65

i2(sk-ck) ^ C phy.r (方程式34) 經濟部中央標準局員工消費合作社印製 此處的CphysS—描述可用實際容量之向量,且是對所有^^個 虛擬網路執行此加總。因爲這是一向量不等式,所以每— 向量的對應成分元章必須個別滿足該不等式。 採用VP區隔架構之VN路徑容量配置問題 在使用VP區隔架構時,Vn路徑容量配置問題變成:決 定各虛擬路徑及虛擬鏈路之容量分配,以便在不達反實際 容量限制下將實際網路資源作最大的利用。 VN路徑容量配置問題的VP區、隔架構之結構與標準Vp路 徑容量配置問題之結構相同。因爲事先並不知道每—虛擬 網路上的虛擬鏈路容量,所以必須將VN層上指定的一 vp 路徑容量配置問題對.映到實體網路層上指定的一轉換後vp 路徑容量配置問題。 · · 利用一使每一虛擬網路_之結構與下層實體網路之結構相 關聯之結構矩陣Sk、及以一虛擬鏈路描述每一虛擬網路上 的各VP之路由矩陣X k,即可完成上述之對映作業。請注 意,可將各虛擬鏈路視爲實體網路上的諸路徑,正如同將 各虛擬路徑視爲虛擬網路上的各路徑。可將此種遞迴式定 義延伸到N層網路的路徑容量配置·模型。 因爲路由矩陣將各虛擬路徑對映到諸虚擬鍵路,且 VN結構矩陣Sk將各虛擬鏈路對映到諸實體轉路,所以這 兩個矩,Sk及;c k顯然有某種重疊關係,而可直接以各實 -68 本纸張尺度適用中國國家標準(CNS ) A4规格(210X 297公釐) (請4'閲讀背^之注意事項再填寫本頁}i2 (sk-ck) ^ C phy.r (Equation 34) The CphysS printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs-a vector describing the available actual capacity, and this is performed for all ^^ virtual networks total. Because this is a vector inequality, the corresponding component chapter of each vector must satisfy the inequality individually. VN path capacity configuration problem using the VP partition architecture When using the VP partition architecture, the Vn path capacity configuration problem becomes: determining the capacity allocation of each virtual path and virtual link, so that the actual network can Road resources for maximum use. The structure of the VP area and partition structure of the VN path capacity configuration problem is the same as that of the standard Vp path capacity configuration problem. Because the virtual link capacity on each virtual network is not known in advance, it is necessary to map a vp path capacity configuration problem specified on the VN layer to a converted vp path capacity configuration problem specified on the physical network layer. · Use a structure matrix Sk that associates the structure of each virtual network with the structure of the underlying physical network, and a routing matrix X k that describes each VP on each virtual network with a virtual link. Complete the above mapping operation. Note that each virtual link can be considered as paths on the physical network, just as each virtual path is considered as paths on the virtual network. This recursive definition can be extended to the path capacity configuration and model of the N-layer network. Because the routing matrix maps the virtual paths to the virtual links, and the VN structure matrix Sk maps the virtual links to the physical routes, the two moments, Sk and ck obviously have some overlapping relationship. However, the Chinese National Standard (CNS) A4 specification (210X 297mm) can be directly applied to the actual -68 paper standard (please read the notes on the back ^ and then fill out this page)

T 裝T outfit

、1T 3iS944 五、發明説明(66 ) A7 B7 體鍵路定義諸虛擬路徑。‘所堂 吖寓 &lt; 重疊關係疋這兩個麵陣合 布爾乘積(B〇〇lpr〇duct),表示如下: Γ k (方程式3 5 ) 若已知兩個有匹配行列奪而得以進行正常矩陣乘法之央 降MS ’且這兩個矩陣的所有元素都是零或_,則以则 N表示這兩個矩㈣布耳乘積,絲該布耳乘積定義爲菊 陣Μ及N的重新換算後之正成矩陣乘積,其中係將結果努 陣中之每一非零元素重新換算成一。 合併後的結構矩陣Γ k亦稱爲叠合結構矩陣( structure matdx),可將此結合後的結構矩p車視爲指定_ -虚擬網路上的固定路由投影到實體層。利用此種程序, 可將VN層上-特定虛擬網路之vp路徑容量配置問題對映 到實體網路層上之一轉換後VP路徑蓉量配置問題。 因爲虛擬網路層上的所有虚擬網路競爭同一實體網路上 所分配的資源、所以必須將所有疊合結構矩陣r k集中到— 個結構矩陣: concat 經濟部中央揉準局貝工消費合作社印製 Γ phys, 1T 3iS944 V. Description of the invention (66) A7 B7 body links define virtual paths. 'Suo Tang Ai Yu &lt; overlapping relationship between these two area matrix Boolean product (B〇〇lpr〇duct), expressed as follows: Γ k (Equation 3 5) If two are known to have matching rows and ranks can be normal Matrix multiplication reduces MS 'and all elements of these two matrices are zero or _, then N represents the two moments Boolean product, which is defined as the re-conversion of daisy arrays M and N After the product of the positive matrix, each non-zero element in the resulting matrix is converted back to one. The combined structure matrix Γ k is also known as a superimposed structure matrix (structure matdx), and the combined structure moment p car can be regarded as a designated _-fixed route on the virtual network projected to the physical layer. Using this kind of procedure, the problem of allocating the vp path capacity of a specific virtual network on the VN layer can be mapped to the problem of VP path configuration after conversion on one of the physical network layers. Because all the virtual networks on the virtual network layer compete for the resources allocated on the same physical network, all the superimposed structural matrix rk must be concentrated into a structural matrix: printed by the Concat Central Bureau of Economics and Economic Cooperation of the Concat Ministry of Economic Affairs Γ phys

k = l,K Γ (方程式3 6 ) 該序連運算表示:Γ phys是所有奏合結構矩陣ρ k的—個: 合體。可將此矩陣稱爲编譯後結構矩陣。實體上,各矩丨 的序連產生一個包含序連後矩陣的所有行之新矩陣。雖) 本紙張夂度適用中國國家標準(CNS ) A4規格(210X297公釐) 經濟部中央樣準局員工消費合作社印製 A7 ---------B7 五、發明説明p ) 此序連的順序對路徑容量配s程序並不重要,但是爲計算 精確度而保存有關序連順序的資料仍是重要的。 可將上文對編譯後結構矩陣Γ p㈣之定義視爲:描述在實 體網路層上界定的這组所有的對映路徑,而每一疊合結構 六車r /、描述此種對映路徑的一個子集。編譯後ν Ν路徑 ,量配置問題之各辦映路徑類似於基本V ρ路徑容量配置問 嘁的各虛擬路徑。必須集中這些對映路徑的所有子集,·以 便得到所有對映路徑的全部集合,正如編譯後結構矩陣Γ phys中所得到者。 因爲已經定義了 r phys,所以現在可應用任何vp路徑容 量配1凟算法來配置整合後各vp之路徑容量,並決定分配 給Γ phys所定義的每一 V P之容量。利用路由矩陣z k,可計 算k個虛擬.網路的每一虚擬網路上分配的對應虛擬鏈路容 量c k如下式: (方程式3 7 ) 此處的Vk表示分配给虚擬網路k上界定的各路徑之容量向 量。方程式3 7描述VN路徑容量配置演算法之輸出。 编譯程序 一個三層模型係示於圖18,其中係在—實體網路之上界 定一虛擬網路,並在該虛擬網路之上界定若干虛擬路徑。 在方程式1及相關文4*説明中定義了使VN層與vp層相關 聯之路由矩陣。對一具有三條鏈路Li、乙2、及' \^^層 -70- ^紙張尺度通用中國國家標準(CNS ) A4規格(210 X 297公釐) —--------―裝-- (請先閲讀背’面之注意事項4·填寫本頁) 、11k = l, K Γ (Equation 3 6) The sequential operation means: Γ phys is a combination of all the ensemble structure matrices ρ k. This matrix can be called the structure matrix after compilation. Physically, the sequence of the moments produces a new matrix containing all the rows of the sequenced matrix. Although) This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) Printed by A7 --------- B7 of the Employees' Consumer Cooperative of the Central Prototype Bureau of the Ministry of Economic Affairs 5. Description of the invention p) This order The order of the links is not important for the path capacity allocation program, but it is still important to save the information about the order of the links in order to calculate the accuracy. The above definition of the compiled structure matrix Γ p ㈣ can be regarded as: describing all the set of mapping paths defined on the physical network layer, and each superimposed structure of six vehicles r A subset. After compilation, the paths of the ν Ν path and volume configuration problems are similar to the virtual paths of the basic V ρ path capacity configuration problems. All subsets of these antipodal paths must be collected, in order to get the full set of all antipodal paths, as obtained in the structure matrix Γ phys after compilation. Because r phys has already been defined, any vp path capacity can be applied with a one-time algorithm to configure the path capacity of each integrated vp and decide to allocate the capacity of each V P defined by Γ phys. Using the routing matrix zk, it is possible to calculate k virtual. The corresponding virtual link capacity ck allocated on each virtual network of the network is as follows: (Equation 3 7) where Vk represents the allocation to each defined on the virtual network k The capacity vector of the path. Equation 37 describes the output of the VN path capacity allocation algorithm. Compiler A three-layer model is shown in Figure 18, in which a virtual network is defined above the physical network, and a number of virtual paths are defined on the virtual network. The routing matrix that associates the VN layer with the vp layer is defined in Equation 1 and the related text 4 *. For one with three links Li, B2, and '\ ^^ layer -70- ^ paper standard General Chinese National Standard (CNS) A4 specifications (210 X 297 mm) —-------- -(Please read the precautions on the back side 4 · Fill in this page), 11

T ^19944T ^ 19944

五、發明説明(68 而言,VN結 構矩陣具有下列形 式V. Description of the invention (in terms of 68, the VN structure matrix has the following form

S 10 0 110 0 11 0 0 1 (方程式38) 舉圖1 8所示之例子而+ · ^ , ',直接以實體網路界定各虚擬路 ί工的編澤後結構矩陣Γ 關辦沾具人aw 以及使各虛擬鏈路與各實.體鏈路相 關如的疊合結構矩陣 ,7XT 疋相间的,因爲在本例中只有一個S 10 0 110 0 11 0 0 1 (Equation 38) Taking the example shown in Figure 18 and + ^, ', the physical matrix is used to directly define the edited structure matrix of each virtual router. Human aw and the superimposed structure matrix that associates each virtual link with each real link, such as 7XT, because in this example there is only one

VNVN

[10 0] 110 0 1 1 0 0 1 (g) Γ . (方程式3 9 ) ------ (諳办閱請背&quot;之注意事項再填寫本頁)[10 0] 110 0 1 1 0 0 1 (g) Γ. (Equation 3 9) ------ (If you want to read it, please read the "Notes on &quot; before filling out this page)

、1T 經濟部中央揉準局貝工消費合作社印製 可將万程式39視爲表示:虛擬網路層包含三個虚擬鏈路Li j 、L2、及Ls,每—虛擬鏈路是兩個實體鏈路之集合體。如 ^ 果虛擬鏈路VLj通過實體鏈路pp,料用VN結構矩陣§巾 j p列及j行的一個.一表示此種情形^每一虛擬路徑vh及 :丨 VP2是四條實體鏈路中三條實體鏈路之集合體。如果虛擬 ·丨1 路徑νρ〖通過實體鏈路Pp,則以編譯後結構矩陣厂中p列 | 及i行的一個一表示此種情形。 | VP區隔架構的編譯程序概述於圖μ。首先在步驟(19〇2) |, 1T Printed by the Ministry of Economic Affairs Central Bureau of Precision Industry Beigong Consumer Cooperative can regard Wancheng 39 as a representation: The virtual network layer contains three virtual links Li j, L2, and Ls, each virtual link is two entities A collection of links. If the virtual link VLj passes through the physical link pp, the VN structure matrix § column jp and one of the j rows are used. One indicates this situation ^ Each virtual path vh and: 丨 VP2 is three of the four physical links A collection of physical links. If the virtual · 丨 1 path νρ 〖passes the physical link Pp, then this is represented by one of column p | and row i in the structure matrix factory after compilation. | The compiler of the VP partition architecture is outlined in Figure μ. First in step (19〇2) |

中選擇一個N層VN路徑容量配置問題的最上面三層,而界 I -------· -71 - 本紙張尺度適用中國國家標準(CNS )八4規格(21〇乂 297公釐) 經濟部中央揉準局員工消費合作社印製 A7 ______________B7 五、發明説明(69 ) 一 ' ' -* 定-個三層式階層結構。最低層對應地描述實體網路拓捷 及限制,中間層描述待配置路徑容量的虛擬網路,頂層描 述在每一虚擬網路之上界定的各路由結構(亦即各vp)。同 時也在步驟(1902 )中構建對應的v N結構矩陣及v p路由矩 陣。然後在步驟( 1903 )中將此三層式問題構想疊合成—對 應的兩層問題。因多每—虛擬網路起始頂層上的每一路徑( 亦即VP)使用實體網路的同一實際容量,所以可推導一對 應的疊合路由矩陣,用以描述分配給疊合結構中每一對映 路徑之實際資源。 然後在步驟(19〇4)中將各對映路徑的疊合結構矩陣序連 成單一編譯後結構矩陣,該編譯後結構矩陣係以各實體鏈 路描述每一對映VP的拓撲。然後在步驟(19〇5)中可將任何 v P路徑谷量配置演算法應用於v N路徑容量配置問題的编 譯後描述,以便決定待分配給每一疊合vp的傳輸容量。此 類V P路杈谷量配置演算法的例子包括(但不限於)··圖9所 示之推下式演算法、圖12所示之基本平均訊息量vp路徑 谷量配置演算法、及圖i 3所示之適應性v p路徑容量配置 演算法。最後,於步驟( 1906)中利用VP路由矩陣計算待分 配給每一虛擬網路的每一虛擬鏈路之容量値。 VL及PL區隔架構概論: 一般而言,不同的虛擬鏈路可以彼此互動,亦即這些虛 擬鏈路可共用相同的實際資源。因而容許分配給這些鏈路 的訊息流量之多工化。在各虛擬鏈路彼此並未互動的情形 中’必須界定每一邏輯鏈路的整合訊息流量。另一方面, —__-72- 本紙俵尺度ϋ用f SI S家標率(CNS ) Α4· ( 21GX297公董) (請知聞讀背面之注意事項再填寫本頁) 訂 經濟部中央樣準局員工消费合作社印製 3iS944 A7 --------- B7 五、發明説明(70 ) 一 ' ' ~—' 如果容許各虛擬鏈路彼此互動,則必須界定每-實體鏈路 々整合訊息流量。在不容許各虛擬鏈路之間有多上化之情 形中,I擬網路(作業將類似於一租用實體網路。此種 網路的管理較爲簡單,但此種網路對所分配資源的利用率 低於各虚擬鏈路間容許有多工化的網路之利用率。 V L區隔架構 可將無互動的各虛擬鏈路視爲實體層之上的各vp。此時 的路徑谷量配置工作在於決定待分配给每一虛擬鏈路之整 合提供訊息流量。利用路由矩陣即可得到此一整合提供訊 息流量,因爲係在每一虛擬網路之上的各虛擬路徑規定所 提供之訊息泥量。下一.步驟在於得到所有虛擬鏈路的整體 集合,並決疋忒整體集合與所有實體鏈路的集合之關係。 此整體集合是每一虛擬網路的各虛擬鏈路之集合體。 請注意,虛擬網路的結構只影響到所提供之整合訊息流 量,但與配置虛擬鏈路容量的工作無關。以實體層的觀點 而論’每一虛擬鏈路構成一虛擬路徑,因而採用區隔 架構的VN路徑容量配置問題亦簡化成—vP路徑容量配置 問題’因而可使用先前討論過的任何v P路徑容量配置演算 法。 可將R個對映路徑上所提供的訊息流量Xr集合到一路徑 訊息流量向量X。同樣地,可將j個虛擬鏈路上所提供的訊 息流量U j及河道一鏈路訊息流量向量u。可利用路由矩障 /使該路徑訊息流量向量與該鏈路訊息流量向量相關聨如 下式: -73- 本紙張尺度適用中國國家^M CNS ) A4规格(210X 297公釐) —扣衣-- (请史閱讀t.面之注意事項#填寫本頁)Choose one of the top three layers of the N-layer VN path capacity configuration problem, and the boundary I ------- · -71-This paper scale is applicable to the Chinese National Standard (CNS) 84 specifications (21〇297 297 mm ) A7 ______________B7 printed by the Employee Consumer Cooperative of the Central Bureau of Economic Development of the Ministry of Economic Affairs 5. Description of the invention (69) One ''-* Three-tier structure. The lowest layer correspondingly describes the extension and limitation of the physical network, the middle layer describes the virtual network of the path capacity to be configured, and the top layer describes the routing structures (that is, vp) defined on each virtual network. At the same time, the corresponding v N structure matrix and v p routing matrix are also constructed in step (1902). Then, in step (1903), the three-layer problem concept is superimposed into the corresponding two-layer problem. Due to the fact that each path on the top layer of the virtual network (that is, VP) uses the same actual capacity of the physical network, a corresponding overlapping routing matrix can be derived to describe the allocation of each path to the overlapping structure. The actual resources of the mapping path. Then, in step (19〇4), the superposed structure matrix of each antipodal path is sequentially connected into a single compiled structural matrix. The compiled structural matrix describes the topology of each antipodal VP with each physical link. Then in step (19〇5), any v P path valley configuration algorithm can be applied to the post-compilation description of the v N path capacity configuration problem in order to determine the transmission capacity to be allocated to each overlapping v p. Examples of such VP road valley configuration algorithms include (but are not limited to) ·· The push-down algorithm shown in Figure 9, the basic average message volume vp path valley configuration algorithm shown in Figure 12, and the graph The adaptive vp path capacity allocation algorithm shown in i 3. Finally, in step (1906), the VP routing matrix is used to calculate the capacity value of each virtual link to be allocated to each virtual network. Introduction to VL and PL partition architecture: Generally speaking, different virtual links can interact with each other, that is, these virtual links can share the same actual resources. Therefore, the multiplexing of the message traffic allocated to these links is allowed. In the case where the virtual links do not interact with each other, the integrated message traffic of each logical link must be defined. On the other hand, —__- 72- The standard size of this paper is f SI S home standard rate (CNS) Α4 · (21GX297 company director) (please read the precautions on the back and fill in this page). 3iS944 A7 --------- B7 printed by the Bureau ’s Consumer Co-operative Society V. Description of the invention (70) One '' ~ — 'If each virtual link is allowed to interact with each other, it is necessary to define the integration of every physical link 々 Message traffic. In a situation where multiple links between virtual links are not allowed, the virtual network (operation will be similar to a leased physical network. The management of such a network is relatively simple, but this network is allocated to The utilization rate of resources is lower than the utilization rate of the multiplexed network allowed between the virtual links. The VL partition architecture can treat each virtual link without interaction as each vp above the physical layer. The task of valley configuration is to determine the integrated provisioned traffic to be allocated to each virtual link. This integrated provisioned traffic can be obtained by using the routing matrix, because it is provided by the virtual path regulations on each virtual network The amount of information. The next step is to get the overall set of all virtual links and determine the relationship between the overall set and the set of all physical links. This overall set is the virtual link of each virtual network Aggregate. Please note that the structure of the virtual network only affects the integrated message traffic provided, but has nothing to do with the task of configuring the virtual link capacity. From the perspective of the physical layer, each virtual link constitutes a virtual path Therefore, the VN path capacity configuration problem using the partition architecture is also simplified to-vP path capacity configuration problem. Therefore, any v P path capacity configuration algorithm previously discussed can be used. The information provided on the R mapping paths can be used The traffic Xr is aggregated into a path message flow vector X. Similarly, the message flow U j provided on the j virtual links and the river-link message flow vector u can be used. The routing moment barrier can be used to make the path message flow vector The following is related to the message flow vector of this link: -73- This paper scale is applicable to the Chinese country ^ M CNS) A4 specification (210X 297mm) —Clothing --- (please read the t. 面 的 注解 #Fill in (This page)

'1T 1 五、發明説明(71 U,'1T 1 V. Description of the invention (71 U,

ht: X (方程式4 0 ) 在向量°己法中,方程式4〇變成下 式 u = A:ht: X (Equation 4 0) In the vector ° method, Equation 4 becomes the following formula u = A:

• X (方程式4 1) 方dj爲分配给虛擬鏈路j之容脣 應容量,則&amp; ,bj爲路徑r上所分配的對 d以上兩者將遵循下式 ,Χ. (方程式4 2 ) ----------^-裝-- f碕命聞靖背Φ'之注意事項再填寫本頁} 在向量,己法中,方程式42變成下式: -訂 經濟部中央標準局貝工消費合作杜印製 虛擬鍵路容、量dj之平均訊息量阻塞量 方程式表示:、(dj) = (方程式4 3 ) 測値lu/dj) '係以下列 (方程式4 4 ) ,,若已知所提供之訊息流量U」,則可計算出虛擬鏈路」上的 平均訊息量阻塞量測値㈣,因此,若已知在實體網路 -74- 本_尺度適用中關家橾华(CNS )八规格(210 X297公釐 7 ^19944 A7 B7 五、發明説明(72 上界定爲虚擬路徑的一组所有的虛擬鏈路,則亦可將採用 VL區隔架構的VN路徑容量配置問題對映到_vp路徑容量 配置問題,而__解決該VN路徑容量配置問題。 VP及VL區隔架構之比較: 如果我們定義-所分配之鏈路資源向量d爲對應於所 之路徑資源向量b:則dVL &lt; dvp,其中dvp表示vp區隔 架構的所分配鏈路資源向量,而、表示VL區隔架構的所 分配資源向量。此不等式反映了.在每—虚擬鏈路上使所提 供之整合訊息流量多工化所得到之增益。 PL區隔架構 .‘ 經濟部中央標準局員工消費合作社印装 然後考慮屬於同一虛擬網路的不同虛擬鏈路可以多工化 的情形。現在需要決定每一實體區隔的所提供之對應整合 訊息流量,且決定所有區隔的集合的所提供之對應整:: 息流量,。使用路由矩陣Ζ及虛擬網路結構矩陣§即可執行 上迷 &lt; 程序。每一實體區隔的巧提供乏整合訊息流量係定 義爲整合虛擬鏈路訊息流量之集合體。利用.VNg構矩陣 即可得到此額外的整合;因爲該VN結構矩陣界定了各片 擬鏈路與對應實體網路間之成員關係。如果向量冗表示j = 實體鏈路中每一實體鏈路上所提供之整合訊息流量,且向 量g表示分配給J個實體鏈路中每一實體鏈路之等效容量, 則使用前述之記法時可得到下列公式: Z. U, (方程式4 5 ;) -75- 木紙狀度適用家橾準(CNS) M規格(2丨^ 五、發明説明(73 以對應的向量記法表示時上式 變成:• X (Equation 4 1) The square dj is the capacity allocated to the virtual link j, then &amp;, bj is the pair d or more allocated on the path r. Both will follow the formula, Χ. (Equation 4 2 ) ---------- ^-installation-f 箕 命 闻 靖 背 Φ ''s notes and then fill in this page} In the vector and self method, equation 42 becomes the following: The Standard Bureau's consumer cooperation cooperation has printed the virtual link volume and the average message volume of dj. The equation is expressed as: ,, If the provided message flow U ”is known, the average message volume measurement on the virtual link” can be calculated. Therefore, if it is known to be in the physical network Homepage (CNS) Eight specifications (210 X297 mm 7 ^ 19944 A7 B7 V. Invention description (72 sets of all virtual links defined as virtual paths, you can also use VN paths with VL partition architecture The capacity configuration problem is mapped to the _vp path capacity configuration problem, and __ solves the VN path capacity configuration problem. Comparison of VP and VL partition architecture: If we define-allocated The link resource vector d corresponds to the path resource vector b: then dVL &lt; dvp, where dvp represents the allocated link resource vector of the vp partition architecture, and, represents the allocated resource vector of the VL partition architecture. The inequality reflects the gain obtained by multiplexing the integrated message traffic provided on each virtual link. The PL segmentation structure. 'Printed by the Staff Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs and then considering the differences belonging to the same virtual network The virtual link can be multiplexed. Now it is necessary to determine the corresponding integrated message flow provided by each physical segment, and the corresponding integral of the set provided by all the segments :: information flow, using the routing matrix Z And the virtual network structure matrix § can perform the above-mentioned &lt; procedure. Each physical partition provides a lack of integrated message traffic defined as a collection of integrated virtual link message traffic. This can be obtained using the .VNg matrix Extra integration; because the VN structure matrix defines the membership relationship between each piece of pseudo link and the corresponding physical network. If the vector is redundant, j = each entity in the physical link With the integrated message traffic provided on the road, and the vector g representing the equivalent capacity allocated to each of the J physical links, the following formula can be obtained using the aforementioned notation: Z. U, (Equation 4 5; ) -75- The wood paper shape degree is suitable for the family standard (CNS) M specification (2 丨 ^ V. Invention description (73 When expressed in the corresponding vector notation, the above formula becomes:

z = s · Uz = s · U

X · X (方程式46) 此處的複合矩陣s . %使所提供之vp 士 提供之PL整合訊息流量相關;:量X與所 應公式如下Γ ' +均讯息量比率函數之對 I.X · X (Equation 46) where the composite matrix s.

Lgi (方程式4 7 ) --------壯衣—— f靖^閑靖背-面之注意事項再填寫本頁} 利用在方程式3 5中被定義爲&amp; k Θ尤k之疊合結構矩陣「k ,即可決定用來界定實體區隔之成員矩陣。因此,再度證 明可將採用P L區隔架構的V N路徑麥量配置問題簡化成v p 路徑容量配置問題。 VL及PL·區隔架構之比較 ,' 現在將以舉例方.式比較V L及P L區隔架構,以便了解這 兩種方式間之差異,並顯示多工化整合訊息流量對所得到 容量分配的影響。現在將考慮圖2 〇及表1 3所示之網路結構 -丁 -°Lgi (Equation 4 7) -------- Strong clothing-f ^^ Jing Jing back-face considerations and then fill out this page} Use is defined as &amp; k Θ 尤 k 之 in equation 3 5 The superposition structure matrix "k" can be used to determine the member matrix used to define the physical partition. Therefore, it is proved again that the VN path wheat configuration problem using the PL partition architecture can be simplified to the vp path capacity configuration problem. VL and PL · Comparison of segmentation architectures, 'we will now compare the VL and PL segmentation architectures by way of example to understand the difference between the two methods and show the effect of multi-tasking integrated message traffic on the resulting capacity allocation. Now will Consider the network structure shown in Figure 2 and Table 13-D-°

T &quot; 經濟部中央橾準局負工消費合作社印製 -76- 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) A7 __B7 五、發明説明(74 ) 表13 虛擬鏈路 路徑 2-5 2-1-6-5 3-6 3-4-5-6 5-6 5-6 ,-3-5 3-5 2-6 2-6 2-3 2-3 (请#閱讀背筘之注意事項存填寫本 Τ .装. 假設將具有如表1 4所示特性的多等級訊息流量提供給所有 的虛擬鏈路。 表14 有效頻寬(百萬位元/秒) 呼叫到達速率(1/秒) —1 佔線時間(秒) 1 0.25 30 1 0.01 240 1 0.051 90 每一實體鏈路的容量假設爲每秒有15〇個百萬位元。 PL區隔架構之結果 如果我們使用P L區隔架構,則共有V L路徑容量配置問 題的八種實體區隔,這八種實體區隔對應於圖2〇所示且於 下表1 5中第—行列出的八種實體鏈路(2001 - 2008)。可自 各虛擬鏈路上所提供之訊息流量推導每一區隔上所提供之 ?錄尺CNS) Α4·( 210X297公釐) ~~ 、1r 經濟部中央梯準局貝工消費合作社印製 B7 五、發明説明(75 ) 整合訊息流量。例如,提供給實體鏈路P 5 · 6上區隔的整合 訊息流量是43.47單位。係以下列方式計算此値:表1 4所 列呼叫到達速率向量及佔線時間向量的純量乘積之三倍, 亦即 3 * (0.25 * 30 + 〇.〇1 * 240 + 0.051 * 90)。所提供之 整合訊息流量是這兩個向量的純量乘積之三倍,這是因爲 共有三條通過此區g的虛擬鏈路。現已利用平均訊息量V p 路徑容量配置演算法解決了該採用P L區隔架構之例示VN 路徑容量配置問題,並將結果示於下列表1 5 : 表15 區隔後之實體鏈路 分配給該區隔之容量 2-3 23.0 3-4 32.3 4-5 53.2 5-6 48.7 2-6 37.5 3-5 37.5 _ 6-1 53.2 2-1 53.2 經濟部中央揉準局員工消費合作社印裳 VL區隔架構之結果 如果在V N路徑容量配置問題上使用一 V L區隔架構,則 提供給每一虚擬鏈路之訊息流量與前文所述者相同’亦即 14.49 單位(0.25 * 30 + 〇_01 * 24〇 + 0.051 * 90)。當將虛擬 ---78 - __ - 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公董) ^19944 A7 -- ~~-_ _B7 五、發明説明(76 ) 缝路視爲區隔時,分配給不同虛擬鏈路的容量列於下列表 表16 虚擬鏈路 所分配之容量 2-5 16.7 3-6 16.7 2-3 21.4 2-6 69.1 3-5 69.1 6-5 16.7 凊注意’虛擬網路之路由結構與圖2 〇及表丨3所示者相同a 現在可研究多工化之效應。我們將考慮實體鏈路^ ^之 例子。在P L區隔架構的情形中,分配給使用此實體鏈路之 二條虛擬鏈路之總容量爲48.7單位,小於VL區隔架構中個 別分配到的容量之總和(亦即、16·7 + 16.7 + 16.7)。 與習用VN路徑容量配置演算法之比較 經濟部中央橾準局具工消費合作社印製T &quot; Printed by the Ministry of Economic Affairs, Central Bureau of Preservation and Consumer Cooperatives-76- This paper scale is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) A7 __B7 V. Description of invention (74) Table 13 Virtual chain Road path 2-5 2-1-6-5 3-6 3-4-5-6 5-6 5-6, -3-5 3-5 2-6 2-6 2-3 2-3 (please #Read the precautions of the reed and fill in this file. Assume that multi-level message traffic with the characteristics shown in Table 14 is provided to all virtual links. Table 14 Effective bandwidth (million bits / second) Call arrival rate (1 / sec) — 1 Busy time (sec) 1 0.25 30 1 0.01 240 1 0.051 90 The capacity of each physical link is assumed to be 15 million megabits per second. The result of the PL partition architecture If we use the PL partition architecture, there are eight physical partitions for the VL path capacity configuration problem. These eight physical partitions correspond to the eight physical partitions shown in FIG. 20 and listed in the-row of Table 15 below. Link (2001-2008). Derivation of the traffic provided on each segment from the information traffic provided on each virtual link? Recording rule CNS) Α4 · (210X297mm) ~~, 1r Central Ladder of Ministry of Economic Affairs Bureau of Consumer Cooperatives HIGHLAND printed B7 V. Description (75) invention integrated message traffic. For example, the integrated message traffic provided to the segment on the physical link P5.6 is 43.47 units. This value is calculated in the following manner: the scalar product of the call arrival rate vector and busy time vector listed in Table 14 is three times, that is, 3 * (0.25 * 30 + 〇.〇1 * 240 + 0.051 * 90). The integrated message traffic provided is three times the scalar product of these two vectors, because there are three virtual links passing through this area g. The average message volume V p path capacity allocation algorithm has been used to solve the example VN path capacity allocation problem using the PL partition architecture, and the results are shown in the following table 15: Table 15 The physical links after the partition are allocated to The capacity of the segment 2-3 23.0 3-4 32.3 4-5 53.2 5-6 48.7 2-6 37.5 3-5 37.5 _ 6-1 53.2 2-1 53.2 Employee Consumer Cooperative of the Central Bureau of Economic Development of the Ministry of Economic Affairs Printed VL Results of the partition architecture If a VL partition architecture is used for the VN path capacity configuration problem, the message traffic provided to each virtual link is the same as described above, that is, 14.49 units (0.25 * 30 + 〇_01 * 24〇 + 0.051 * 90). When the virtual --- 78-__-this paper scale is applicable to the Chinese National Standard (CNS) A4 specification (210X297 Gongdong) ^ 19944 A7-~~ -_ _B7 5. Description of the invention (76) The seam is regarded as a segment At the time, the capacity allocated to different virtual links is listed in the following table. 16 The capacity allocated to virtual links 2-5 16.7 3-6 16.7 2-3 21.4 2-6 69.1 3-5 69.1 6-5 16.7 The routing structure of the virtual network is the same as that shown in Figure 2 and Table 3a. The effect of multiplexing can now be studied. We will consider the example of a physical link ^ ^. In the case of the PL partition architecture, the total capacity allocated to the two virtual links using this physical link is 48.7 units, which is less than the sum of the individually allocated capacity in the VL partition architecture (ie, 16.7 + 16.7 + 16.7). Comparison with conventional VN path capacity allocation algorithm. Printed by the Central Industry Bureau of the Ministry of Economic Affairs

已將本演算法中所詳述的V N路徑容量配置技術之效能與 其他的演算法比較。下文所示出之結果係有關一種採用p L 區隔架構(也時亦稱爲完全區隔架構)之VN路徑容量配置問 題〇 現在考慮圖21所示的五個虛擬網路(21〇1 - 2105)。下層 實體網路的拓撲與前文中參照圖1 6及1 7所述者相同。假設 __ -79- 本紙張尺度適用中國國家標準(€奶)厶4洗格(210\297公釐) A7 B7 五、發明説明(77 具有圖21所示拓撲的五個虛擬子網路共用圖16乃 久丄/所示 的單一實體網路之資源= ' 圖21所示之虛擬網路(2丨03)代表各虚擬鏈路之間可以有 多工化之一例。下列三條虛擬鏈路通過實體鏈路ρ·. 節點3經由節點4及5到節點6的L3 _6、自節點2經點自5 及4到節點4的L2_4_、及L5_6。在PL區隔架構的情形中, 可將來自這三條虚擬鏈路之所提供訊息流整合到在實體鏈 路P5·6上的一個訊息流。路徑容量配置演算法亦對應二將 容量分配给實體鏈路P5_6。 “ 在此例子中,假設所有的實體鏈路具有相同的容量24〇〇 單位。可將n級卜瓦松分配訊息流量提供給這五個虛 擬子網路。在本文所分析的模型問題中,針對具有下文所 示特性的每一虛擬鏈路及每—虚擬子網路界定了四個等級 的訊急流量需求。假設等級i (i.爲自!•的整數値)之訊息 流量需求p i係以下列的函數關係式表示: 適用於3節點的虛擬子網路-_ 碕 讀 背 裝 訂 P,· 1 14000 (方程式4 8 ) 經濟部中央標準局員工消费合作社印製 適用於4節點的子網路__The performance of the V N path capacity allocation technique detailed in this algorithm has been compared with other algorithms. The results shown below are related to a VN path capacity configuration problem that uses a p L partition architecture (also sometimes referred to as a complete partition architecture). Now consider the five virtual networks (21〇1- 2105). The topology of the lower layer physical network is the same as that described above with reference to FIGS. 16 and 17. Suppose __ -79- This paper scale is applicable to the Chinese national standard (€ milk) 4 wash grids (210 \ 297 mm) A7 B7 V. Description of invention (77 shared by the five virtual subnets with the topology shown in FIG. 21 Figure 16 shows the resources of a single physical network for a long time / shown = 'The virtual network (2 丨 03) shown in Figure 21 represents an example of multiplexing between virtual links. The following three virtual links Through the physical link ρ ·. Node 3 via nodes 4 and 5 to node 6 L3 _6, from node 2 via points 5 and 4 to node 4 L2_4_, and L5_6. In the case of PL partition architecture, can be The provided message flows from these three virtual links are integrated into one message flow on the physical link P5 · 6. The path capacity allocation algorithm also corresponds to the two to allocate capacity to the physical link P5_6. "In this example, it is assumed All the physical links have the same capacity of 2400 units. The n-level Poisson distribution message traffic can be provided to these five virtual subnets. In the model problem analyzed in this paper, those with the characteristics shown below Each virtual link and each virtual subnet defines four levels of Urgent traffic demand. Assume that the message traffic demand pi of level i (i. Is an integer value from! •) is expressed by the following functional relationship: Applicable to a 3-node virtual subnet-_ 碕 读 背 Binding P, · 1 14000 (Equation 4 8) Printed by the Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs for a 4-node subnet__

Pi 1 7000 (方程式4 9 ) -80- 本紙張尺度適用中國國家揉準(CNS ) A4規格(210X297公釐) 經濟部中央標準局員工消费合作社印製 A7 &quot;--'__ _ B7 五、發明説明(78^ ~~ —---〜 同時可以下式表示訊息流量等級1的頻寬需求Η:Pi 1 7000 (Equation 4 9) -80- This paper scale is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) Printed by the Ministry of Economic Affairs Central Standards Bureau Staff Consumer Cooperative A7 &quot; --'__ _ B7 5. Description of the invention (78 ^ ~~ ---- ~ At the same time, the bandwidth requirement of the message flow level 1 can be expressed by the following formula Η:

Pi = 0.064 /?i (方程式5 0 ) 此處的參數卢界定所提供 * —伙 吓捉仏^心泥量又不均勻性,耶即在每 =辛級可自行載送多級訊息流量的情形下各不同等級的頻 買•需求間之差異0 ―翌/二枯&amp; ± ^ 、 早位値的P代表均勻訊息流量。參數 «界疋在四種訊息流量等級間訊息流量需求之分配。 :已將兩種其他的路徑容量配g方法與下文所述之方法比 較。這類其他的方法代表兩種極端的方式,其中一種在時 間上較慢,但係基於一嚴謹的理論架構;另一種在時間上 較快’但係基於粗略的理論簡化。 第一個基準路徑容量配置演算法使用定點演算法,該演 算法詳述於 A. Farago、S. Blaabjerg、W. Holender、T Henk、L. Ast、A. Szentesi、及Z_ Ziaga所著的”資源分隔 種使A T Μ網路组態最佳化的有效率工具”一文,該文 係刊登於,,NETWORKS94 International Network Planning Symposium Proceedings 83-88 (Budapest, 1994),該演算法 亦詳述於S.P. Chung及K.W_ Ross所著的”用於多級耗損網 路的降低負載近似法&quot;,該文係刊登於”41 IEEE/ACM Transactions on Communications 1222-31 (1993 ) 〇 此演算法 代表一種用於配置虛擬網路的路徑容量之已知方法。然而 ,此演算法的速度並不非常快,因而主要用於評估採用本 申請案所述新V Ν路徑容量配置技術所得到結果的精確性 _ -81 - _ _ _ _ 本紙張尺度適用中國國家揉準(CNS ) Α4規格(210Χ:297公釐) 1 I n H - I - ί^ί- I — (請知閱讀背Sr之注意Ϋ項再填寫本頁) 訂Pi = 0.064 /? I (Equation 5 0) The parameter defined here is provided by Lu definition * —coercion and unevenness of volume and non-uniformity, that is, it can carry multiple levels of message traffic by itself at each = Xin level In this case, the difference between frequency buying and demand at different levels is 0-the next / two dry &amp; ± ^, and the early value of P represents uniform message flow. The parameter «boundary distribution of message flow requirements among the four message flow levels. : Two other path capacity allocation methods have been compared with the methods described below. These other methods represent two extreme approaches, one of which is slow in time but based on a rigorous theoretical framework; the other is faster in time but based on rough theoretical simplification. The first reference path capacity allocation algorithm uses a fixed-point algorithm, which is detailed in A. Farago, S. Blaabjerg, W. Holender, T Henk, L. Ast, A. Szentesi, and Z_Ziaga " Resource Separation Species: An Effective Tool for Optimizing AT Μ Network Configuration ", this article is published in, NETWORKS94 International Network Planning Symposium Proceedings 83-88 (Budapest, 1994), the algorithm is also detailed in SP Chung and K.W_ Ross, "Approximation of load reduction for multi-level lossy networks", published in "41 IEEE / ACM Transactions on Communications 1222-31 (1993). This algorithm represents a kind of A known method for configuring the path capacity of a virtual network. However, the speed of this algorithm is not very fast, so it is mainly used to evaluate the accuracy of the results obtained by using the new V ΝPath capacity configuration technology described in this application _ -81-_ _ _ _ This paper scale is applicable to Chinese countries Kneading (CNS) Α4 specification (210Χ: 297mm) 1 I n H-I-ί ^ ί- I — (Please read the note on the back of Sr before filling in this page) Order

T B7 五、發明説明(79 ) 。此種基準演算法的理論架構是相當嚴謹的。然而,此架 構實施過度簡化路徑容量配置問題的鏈路獨立性及降低負 載這兩個假設。 第二種基準路徑容量配置方法使用等效鏈路阻塞 (equivalent link blocking ;簡稱ELB;)演算法,此種演算法 詳述於A. Fargo所考的論文”一種基於等效鏈路阻塞機率的 簡化路徑谷量配置模型&quot;,該論文係由Budapest技術大學電 訊及Telematics系出版。此演算法代表一種基對路徑容量 配置問題的理論性假設的粗略且現成之虛擬網路路徑容量 配置方法。此演算法主要係用來評估本新v N路徑容量配 置技術之計算速度(亦即執行時間)。 我們使用下列三個不同的評估參數來比較這三種方法: 網路收益、最大路徑阻塞、及執行時間。因爲新的V N路 栓谷量配置技術並不產生網路收益及最大路徑阻塞(作爲時 間擁擠量測),所以已额外的計算得到這些參數。 經濟部中央標準局貝工消費合作社印製 採用本申凊案的V N路徑容量配置技術而得到之所分配容 量係用來作爲基準路徑容量配置技術之輸入。在此種方式 y,利用相同的參數關係式作爲基準演算法中所用者,即 可將各料算參數計算作爲時間擁擠阻塞量測&amp;收益函數 。^本申請案;^前文中所詳述的,可自平均訊息量比率函 數得到其他的網路操作參數。 我二已經針對三種VN路徑容量配置演算法的每一種VN 路仏谷量配置演算法決定了在十六個所提供訊息流量例子 的收益函數及阻塞參數。這些比較結果示於表17到2〇的三 I--— . 〇〇 本纸張尺度適用公 1).- A7 B7 五、發明説明(8〇 ) 維圖中 表 17T B7 V. Description of the invention (79). The theoretical framework of this benchmark algorithm is quite rigorous. However, this architecture implements two assumptions that oversimplify the link independence of the path capacity configuration problem and reduce the load. The second reference path capacity configuration method uses the equivalent link blocking (equivalent link blocking; ELB;) algorithm, which is described in detail in the paper examined by A. Fargo "A method based on the probability of equivalent link blocking Simplified Path Valley Configuration Model, "This paper is published by the Department of Telecommunications and Telematics of Budapest University of Technology. This algorithm represents a rough and ready-made virtual network path capacity allocation method based on the theoretical assumptions of path capacity allocation problems. This algorithm is mainly used to evaluate the calculation speed (that is, execution time) of this new v N path capacity allocation technology. We use the following three different evaluation parameters to compare these three methods: network revenue, maximum path congestion, and Execution time. Because the new VN roadbolt volume configuration technology does not generate network revenue and maximum path congestion (as a measure of time congestion), these parameters have been calculated extra. Printed by Beigong Consumer Cooperatives, Central Bureau of Standards, Ministry of Economic Affairs The allocated capacity obtained by adopting the VN path capacity allocation technology of this application is used as a benchmark The input of the radial capacity configuration technology. In this way y, using the same parameter relationship as the reference algorithm, you can calculate each material calculation parameter as a time congestion congestion measurement &amp; income function. ^ This application ; ^ As detailed in the previous article, other network operating parameters can be obtained from the average message volume ratio function. I have already decided for each of the three VN path capacity configuration algorithms for each of the three VN path volume configuration algorithms. The profit function and blocking parameters of the provided information flow examples. The results of these comparisons are shown in Tables 17 to 20. Three I--. 〇〇 The paper size is applicable to public 1). ) Table 17 in the dimension chart

請 先-閲 讀I- i 事 填5裝 頁 訂 經濟部中夬標準局貝工消費合作杜印製Please read the I-i first, fill in 5 pages, and order it.

83- 本紙張尺度適用中國國家標準(CNS ) A4規格(210X 297公釐) A7 B7 五、發明説明(81 ) 表19.83- This paper scale is applicable to China National Standard (CNS) A4 specification (210X 297mm) A7 B7 V. Description of invention (81) Table 19.

表20 (請^^讀背*-之注意事項再填寫本頁) .裝. 訂 經濟部中央樣準局貝工消費合作社印製Table 20 (please ^^ read the back *-the precautions and then fill out this page). Pack. Order Printed by the Beige Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs

t 水 -84- 本紙張尺度適用中國國家標準(CNS ) A4思格(2丨0 X 297公釐) Λ7 B7 經濟部中央揉準局員工消費合作社印製 -85- 五、發明説明(82 ) 我們發現平均訊息量VN路栌交吾献苗&amp; ^ A , 略彳工合量配置演算法之計算速度 約比定點基準演算法快兩倍,比 ^ 比ELB基準演算法快—倍。 結論 本發明之系統及方法中已奴{裎+ τ 〇、.·二出並解決了兩個相關的問 題:V P路徑容量配置問題及v M ^ t及VN路fe各量配置問題。在本 申請案所詳述的解決技術中,佴將芈 -· τ 保和干均訊息量比率函數用 來作爲阻塞量測,並將負載平衡用來作爲路徑容量配置技 術。利用若干實例,並比較兩種基準演算法後,已證明本 發明所採用方式的可行性。此種新的路徑容量Μ方法的 計算速度比習用路徑容量配置技術快兩倍。此種顯然較快 的計算速度係'以計算的精確性爲代價。因&amp;,此種新方法 提供了比習用技術更佳的結果。此種方式在整體性上亦是 最佳的。孩方法係基於末端到末端的阻塞量測,並不需要 習用技術的鏈路獨立性及降低負載的假設。本方法在配置 ATM網路路徑容量的實用性上有其重要性,因爲該方法並 不假设任何特定的訊息流量分配,而可適用於一般的訊息 流量。 未來有可能依據實際的訊息流量量測來配置Α τ Μ網路的 路徑容量。本發明所詳述的路徑容量配置系統及方法提供 了 一種實用架構,用以實施可處理一般性提供訊息流量及 以量測決定的所提供訊息流量之路徑容量配置演算法。 雖然已參照各附圖及前文的詳細説明而示出並説明了本 發明方法及裝置之—較佳實施例,但是我們當可了解,本 發明並不限於所揭露的實施例,而是可在不脱離在下列申 本紐尺度適财關家梯準(CNS )〜祕狀297公# (請先閲讀背„面之注意事項再填寫本頁) •裝· A7 B7 五、發明説明(83〉 請專利範圍所述及與界定的本發明精神下,作出各種重新 配置、修改、及替代。 ---------i 裝— (請讀背杯之注意事項再填寫本頁) 訂 t 經濟部中央標準局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)t Shui-84- This paper scale is applicable to the Chinese National Standard (CNS) A4 Sige (2 丨 0 X 297 mm) Λ7 B7 Printed by the Employees Consumer Cooperative of the Central Bureau of Economic Development of the Ministry of Economic Affairs-85- V. Description of the invention (82) We found that the average message volume VN Lujiao Jiaowu Xianmiao &amp; ^ A, the calculation speed of the slightly-combined quantity allocation algorithm is about twice as fast as that of the fixed-point benchmark algorithm, and ^ -times faster than that of the ELB benchmark algorithm. Conclusion The system and method of the present invention have slaved {裎 + τ 〇,... Two out and solved two related problems: VP path capacity configuration problem and v M ^ t and VN path fe various configuration problems. In the solution technique detailed in this application, I use the ratio function of λ- · τ and the average message volume as the blocking measurement, and load balancing as the path capacity allocation technique. Using several examples and comparing the two benchmark algorithms, the feasibility of the method adopted by the present invention has been proved. The calculation method of this new path capacity M method is twice as fast as the conventional path capacity configuration technology. This obviously faster calculation speed comes at the cost of calculation accuracy. Because of &amp; this new method provides better results than conventional techniques. This approach is also the best overall. The child method is based on end-to-end congestion measurement and does not require the assumption of link independence and load reduction of conventional techniques. This method is of great importance in the practicality of configuring ATM network path capacity, because this method does not assume any specific message traffic distribution, but can be applied to general message traffic. In the future, it is possible to configure the path capacity of the A τ Μ network based on actual measurement of message traffic. The path capacity allocation system and method detailed in the present invention provide a practical architecture for implementing a path capacity allocation algorithm that can handle the general provision of message traffic and the provided message traffic determined by measurement. Although the preferred embodiments of the method and apparatus of the present invention have been shown and described with reference to the drawings and the detailed description above, we should understand that the present invention is not limited to the disclosed embodiments, but can be found in Don't deviate from the following application for the new financial standards: Shi Cai Guan Jia Ti Zhun (CNS) ~ 秘 状 297 公 # (please read the precautions before filling in this page) • Install · A7 B7 5. Description of the invention (83 〉 Under the spirit of the invention as described and defined in the patent scope, make various reconfigurations, modifications, and substitutions. --------- i outfit — (please read the notes on the back cup and fill out this page) The size of the paper printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs is applicable to the Chinese National Standard (CNS) A4 (210X297mm)

Claims (1)

A8 B8 C8 D8 ----------... /½年7取/ei私正 第851〇85〇6號專利申請案 j文申請專利範太⑽年7 E,) 申請專利範圍 1·種配置-載送—般性訊息流量的電說網路上所界定各 虛擬網路的路#容量之方法,該網路具有複數個傳輸容 量有限的互連鏠路,該路徑容量配置方法包含下列各步 驟: . 定義一個至少三層的階層,作爲網路資源及需求之模 型,其中第一層包含實體網路,第二層包含複數個虛擬 網路,第三層包含複數個虛擬路徑,該第二層上的該等 虛擬網路中之每一虛擬網路係與該第一層上的複數個實 體鏈路相關聯,且該第三層上的該等虛擬路徑之每一虛 擬路担係與該第二層上的複數個虛擬網路相關聯; 選擇一區隔架構,而界定資源共用之範圍; 將該三層式階層疊合成一個兩層式階層,其中新的第 一層包含該實體網路,且新的第二層包含複數個疊合虚 擬路徑; 爲每一疊合虛擬路徑推導對應的疊合結構矩陣; 序連該等疊合結構矩陣,以便產生一編譯後結構矩陣 ,用以代表將虛擬網路之路徑容量配置問題簡化成一個 等效的虛擬路筚之路徑容量配置問題; 經濟部中央標準局貝工消費合作社印装 在該等複數個實體鏈路的傳輸容量限制下,將容量分 配給各疊合虛擬路徑;以及 利用一個界定各虛擬路徑乾_各邏輯鏈路間關係的路由 矩陣,決定待分配給每一虛€朝路的每一虛擬鏈路之容 量0 2.根據申請專利範圍第1項之虛擬網路路徑容量配置方法 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 319944 as Β8 C8A8 B8 C8 D8 ----------... / ½ 年 7 取 / eiPuizheng No. 851〇85〇6 Patent Application Application for Patent Fantai ⑽ 年 7 E,) Patent Application Scope 1. A variety of configuration-carrying general information traffic telegrams. The method of defining the capacity of each virtual network on the network. The network has multiple interconnected channels with limited transmission capacity. The path capacity configuration The method includes the following steps:. Define a hierarchy of at least three layers as a model of network resources and needs. The first layer contains physical networks, the second layer contains multiple virtual networks, and the third layer contains multiple virtual networks. Path, each of the virtual networks on the second layer is associated with a plurality of physical links on the first layer, and each of the virtual paths on the third layer The virtual road network is associated with a plurality of virtual networks on the second layer; select a partitioned structure and define the scope of resource sharing; stack the three-tiered hierarchy into a two-tiered hierarchy, in which the new One layer contains the physical network, and the new second layer contains multiple superimposed virtual Path; derive the corresponding superposition structure matrix for each superposition virtual path; connect the superposition structure matrices in sequence to generate a compiled structure matrix, which is used to represent simplifying the virtual network's path capacity configuration problem into one The problem of effective virtual road traffic capacity allocation problem; The Beigong Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs prints and allocates the capacity to each superimposed virtual path under the transmission capacity limitations of these multiple physical links; The routing matrix of each virtual path_the relationship between each logical link determines the capacity of each virtual link to be allocated to each virtual route 0. 2. Virtual network path capacity configuration according to item 1 of the patent scope Method This paper scale applies the Chinese National Standard (CNS) A4 specification (210X297mm) 319944 as Β8 C8 經濟部中央揉準局員工消費合作社印製 ,其中用來界定資源共用範圍的該區隔架構是—虛擬路 徑區隔架構。 3·根據申請專利範固第丨項之虛擬網路路徑容 ,其中用來界定資源共用範圍的該區隔架構是—虛擬鏈 路區隔架構。 4. 根據申請專利範圍第〗項之虛擬網路路徑容量配置方法 ,其中用來界定資源共用範圍的該區隔架構是—實體鏈 路區隔架構。 5. 根據申請專利範圍第1項之色擬網路路徑容量配置方法 ,其中係由一演算法執行將容量分配給各虛擬路徑的該 步驟’該演算法包含下列各步驟: 選擇-適當的平均訊息量比率函數,作爲該電訊網路 的每一虛擬路徑上負載之模型; 選擇一解答演算法,該解答演算法可運算以解決該一 般性訊息流量之負載平衡問題;以及 利用該採用ϋ平均Μ息量比率函數之負載平衡演算法 ,在一電腦系統上執行計算,以便在該等虛擬路徑上產 生儘量均勻之負載分配。 6_根據申請專利範圍第丨項之虛擬網路路徑容量配置方法 ,其中係由一演算法執行將容量分配給各虛擬路徑的該 步驟,該演算法包含下列各步,: 選擇一適當的平均訊息量^卑函數,作爲該電訊網路 的每一虚擬路徑上負載之模型; 選擇一採用該平均訊息量比率函數作爲阻塞量測之解 -2- 本紙張尺度適用中國國豕標準(CNS ) ΑΑ規格(2丨Οχ297公慶) (請先聞讀背面之注意Ϋ項再填寫本頁) -裝 -* A8 B8 C8 D8Printed by the Employee Consumer Cooperative of the Central Bureau of Economic Development of the Ministry of Economic Affairs. The partition structure used to define the scope of resource sharing is the virtual path partition structure. 3. According to the virtual network path content of the patent application item No. 丨, the partition structure used to define the resource sharing range is a virtual link partition structure. 4. According to the method of virtual network path capacity allocation according to item〗 of the patent application scope, the partition architecture used to define the resource sharing scope is the physical link partition architecture. 5. According to the patent application scope item 1, the method of allocating network path capacity allocation method, in which an algorithm performs the step of allocating capacity to each virtual path, the algorithm includes the following steps: selection-proper averaging The message volume ratio function, as a model of the load on each virtual path of the telecommunications network; choose a solution algorithm, which can be calculated to solve the load balancing problem of the general message flow; and use the ϋ average The load balance algorithm of the M interest rate ratio function performs calculations on a computer system in order to generate as uniform a load distribution as possible on these virtual paths. 6_ The virtual network path capacity allocation method according to item 丨 of the patent application scope, in which an algorithm performs the step of allocating capacity to each virtual path. The algorithm includes the following steps: Select an appropriate average Message volume ^ humble function, as a model of the load on each virtual path of the telecommunications network; choose a solution that uses the average message volume ratio function as a blocking measurement ΑΑ specification (2 丨 Οχ297 Gongqing) (please read the note Ϋ on the back and then fill in this page) -install- * A8 B8 C8 D8 申請專利範圍 該解答演算法可運算以解決該-般性訊息流 量^負載平衡問題;以及 ,=該採用該平均訊息量比率函數之負載平衡演算法 %腦系Ή執行計算’以便在該等虛擬路徑上產 生4a量均勻之負載分配。 Τ根據申請專利範圍第6項之虛擬網路路徑容量配置方法 ’其中係利用訊息流量量測決定該平均訊息量比率函數 0 8·根據中請專利範圍第6項之0網路路徑容量配置方法 其中係以使一電訊網路上所提供訊息流量的特性理想 化而決定該平均訊息量比率函數。 9_根據申4專利範圍第8項之虛擬網路路徑容量配置方法 ,其中係針對一所提供訊息流量的均勻卜瓦松分配而使 該平均訊息量比率函數理想化。 10.根據申蜻專利範圍第8項之虛擬網路路徑容量配置方法 ,其中係針對一所提供訊息流量的多等級卜瓦松分配而 使該平均訊息量比率函數理想化。 11_根據申请專利範圍第8項之虛擬網路路徑容量配置方法 ’其中係針對一所提供訊息流量的常態分配而使該平均 訊息量比率函數理想化。 · 12_根據申请專利範圍第8項之虚/擬網路路徑容量配置方法 ’其中係針對一所提供訊息量的二項式分配而使該平 &lt;flrv 均訊息量比率函數理想化。 13.根據申請專利範圍第8項之虛擬網路路徑容量配置方法 -3- 用中關家標丰(CNS ) A4%#· ( 21GX297公釐) {請先Μ-讀背面之注意事項再填寫本頁) :裝- 訂 經濟部中央標準局負工消费合作社印裝 A8 B8 C8 D8The scope of the patent application The answer algorithm can be calculated to solve the general message flow ^ load balancing problem; and, = the load balancing algorithm using the average message volume ratio function% brain system Ή to perform calculations' A 4a uniform load distribution is generated on the path. ΤVirtual network path capacity allocation method according to item 6 of the patent application scope, which uses message traffic measurement to determine the average message volume ratio function 0 8 The average message volume ratio function is determined by idealizing the characteristics of the message traffic provided on a telecommunications network. 9_ The virtual network path capacity allocation method according to item 8 of the scope of the patent application 4, in which the average message volume ratio function is idealized for a uniform Poisson distribution of the provided message traffic. 10. The virtual network path capacity allocation method according to item 8 of Shenlong's patent scope, in which the average message volume ratio function is idealized for a multi-level Poisson distribution of the provided message traffic. 11_ The virtual network path capacity allocation method according to item 8 of the patent application scope ’where the average message volume ratio function is idealized for the normal distribution of a provided message flow. · 12_ The virtual / pseudo-network path capacity allocation method according to item 8 of the patent scope ’which is based on the binomial distribution of the amount of information provided to make the average &lt; flrv average information volume ratio function idealized. 13. Virtual network path capacity allocation method according to item 8 of the patent application scope -3-Use Zhongguanjiabiaofeng (CNS) A4% # · (21GX297mm) {Please read the precautions on the back before filling this page ): Packing-Order A8 B8 C8 D8 printed by the Consumer Labor Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 申請專利範圍 其中用來作爲所提供訊息流量模型的平均訊息量阻塞 量測是平均訊息量比率函數Ix(c),係將該平均訊息^ 請 先 閏 讀 背 面 之 注 意 事 項 再 I裝 X 比率函數計算作爲一任意分配的隨機變數X大於或等於 —預選數値C的機率的負對數之近似法,且該平均訊息 量比率函數又是一個在分配的平均數上得到其最小 凸函數。 14·根據申請專利範圍第丨項之虛擬網路路徑容量配置方法 ,其中係由一適應性虛擬路徑容量配置演算法執行將容 量分配給各虛擬路徑的該步驟,該演算法包含下列各步 壞: —^一 訂 ^該等複數個實體鏈路對映到一個或多個虚擬路徑, 忒等虛擬路徑中之每一虛擬路徑都提供一個在該電訊網 路的一對節點間可個別切換之連接; 規定每一實體鏈路的傳輸容量; 將經過選擇的複數個該等虛擬路徑集中到一路徑容量 配置集合; 甘利用点平均訊息量比率函數作爲阻塞量測,將傳輸容 量的起始値分配給該路徑容量配置集合中之每一虚擬路 經濟部中央標準局異工消費合作社印製 徑,該等起始値中之每一起始值都相同且經過選擇,使 阻塞較大; · 以遞迎方式將谷量已完全(分配给通過一實體鍵路的 各虛擬路㈣那些實體鏈路多別爲關鍵鏈路,該遞迴識 別步驟又包含下列各步驟: 利用先前的平均訊息量比率函數料値及先前計算The scope of the patent application. The average message volume measurement used as the provided message flow model is the average message volume ratio function Ix (c), which is the average message ^ Please read the notes on the back before I install the X ratio function Calculate the approximate method of the negative logarithm of the probability that a randomly assigned random variable X is greater than or equal to-the preselected value C, and the average message volume ratio function is a minimum convex function obtained on the average of the distribution. 14. The virtual network path capacity allocation method according to item 丨 of the patent application scope, in which an adaptive virtual path capacity allocation algorithm performs the step of allocating capacity to each virtual path, the algorithm includes the following steps: : — ^ 一定 ^ The plurality of physical links are mapped to one or more virtual paths, each of these virtual paths provides a switchable between a pair of nodes of the telecommunications network Connection; specifying the transmission capacity of each physical link; concentrating the selected plurality of these virtual paths into a path capacity configuration set; using the point average message volume ratio function as a blocking measurement to determine the initial value of the transmission capacity Allocated to each virtual road in the set of capacity allocations of this path by the Ministry of Economic Affairs Central Bureau of Standards, the Immigration Consumer Cooperative Printed Path, each of these start values is the same and is selected to make the blockage larger; The reciprocal approach will complete the valley volume (assigned to each virtual route through a physical link. Those physical links are mostly classified as key links. Do step further comprises the steps of: using a previous average ratio of the amount of information and the previously calculated function feedstock Zhi '申請專利範圍 — 出的移動參數値,計算待分配给每一虛擬路徑之容量; 將分配給每一實體鏈路的所有該等虛擬路徑之容量 加總,以便得到每一實體鏈路上所分配的總容量; 將孩平均訊息量比率函數估計値遞增一個計算量; 重新計算孩路徑容量配置集合中每一虛擬路徑之移 動參數; 將每一實體鏈路所分配的總容量與該實體鏈路之规 疋各量比較,以便決定該實體鏈路的未分配容量是否大 致爲零 輸出通過一被識別爲關&amp;路的每一虛擬路徑上目 前所分配的容量; 自孩路徑容量配置集合中去掉通過每—關鍵實體鏈 路的所有虛擬路徑;以及 重新界定該等實體鏈路之規定實際容量,以便補償 分配給該等已去掉的虚擬路彳呈之容量。 15. —種配置一載送—般性訊息流量的電訊網路上所界定各 虛擬網路的路徑容量之系統,該網路具有複數個傳輸容 量有限的互連鏈路,該系統包含: 經濟部中央標準局貝工消费合作社印製 定義一個至少三層的階層作爲網路資源及需求的模型 之裝置’其中第一層包含實體網路,第二層包含複數個 虛擬網路’第三層包含複數個―虛擬路徑,該第二層上的 該等虛擬網路中之每一虛擬纟翁為係與該第一層上的複數 個實體鏈路相關聯,且該第三層上的該等虚擬路徑之每 一虛擬路徑係與該第二層上的複數個虚擬網路相關聯; -5- 本紙張尺度適用中國國家標準(CNS ) A4規格(2H)X297公釐) A8 B8 C8 D8 六、申請專利範圍 選擇裝置,用以選擇-區隔架構,而界定資源共用之 範圍; 4合裝置,用以將該三層'式階層、疊合成—個兩層式階 層,其中新的第-層包含該實體網路,且新的第二層包 含複數個疊合虛擬路徑; 推導裝置,用以爲每一疊合虛擬路徑推導對應的疊合 結構矩陣; σ 序連裝置,用以序連該等疊合結構矩陣,以便產生一 編譯後結構矩陣,用以代表^虛擬網路之路徑容量配置 問題簡化成一個等效的虚擬路徑之路徑容量配置問題; 分配裝置,用以在該等複數個實體鏈路的傳輸容量限 制下將容量分配給各疊合虛擬路徑;以及 決定裝置,用以利用一個界定各虛擬路徑與各邏輯鏈 路間關係的路由矩陣,決定待分配給每—虛擬網路的每 一虛擬鏈路之容量。 16-根據申請專利範圍第I5項之虛擬網路路徑容量配置系統 ’其中用來界定資源共用範圍的該區隔架構是—虛擬路 徑區隔架構。 17_根據申請專利範圍第15項之虛擬網路路徨容量配置系統 ,其中用來界定資源共用範圍的該區隔架構是一虛擬鏈 路區隔架構。 _ 18.根據申請專利範圍第1 5項之#擬網路路徑容.量配置系統 ,其中用來界定資源共用範圍的該區隔架構是一實體鏈 路區隔架構。 請 先 閲,' 讀 背 ¢- ί 事 項 再 凑一 寫 本 頁 裝 訂 經濟部t央揉準局Μ工消费合作社印製 -6- A8 B8 C8 ----------D8 六、申請^範圍~ 一 ~ -- 1M艮據申請專利範目第! 5項之虛擬網路路捏容量配置系統 ,其中將容量分配給各虛擬路徑的該裝置包含: 選擇平均訊息量比率函數之裝置,用以選擇一適當 的平均訊息量比率函數,作爲該電訊網路的每一虛擬路 徑上負載之模型; 選擇解答演算法之裝置,該解答演算法可運算以解決 遠一般性訊息流量之負載平衡問題;以及 執行计算之裝置’用以利用該採用該平均訊息量比率 函數之負載平衡演算法,在一電腦系統上執行計算,以 便在該等虛擬路徑上產生儘量均勻之負載分配。 2〇·根據申請專利範圍第1 5項之虛擬網路路徑容量配置系統 ,其中將容量分配給各虛擬路徑的該裝置包含: 選擇平均訊息量比率函數之裝置,用以選擇一適當的 平均訊息量比率函數,作爲該電訊網路的每一虚擬路徑 上負載之模型; 選擇一解答演算法之裝置,用以選擇—採用該平均訊 息量比率函數作爲阻塞量測之解答演算法,該解答演算 法可運算以解決該一般性訊息流量之負載平衡問題;以 及 經濟部中央標準局具工消费合作社印製 執行計算之裝置’用以利用該採用該平均訊息量比率 函數之負載平衡演算法,在二電腦系統上執行計算,以 便在該等虛擬路徑上產生儘^均勻之負載分配。 21.根據申請專利範圍第2 〇項之虚擬網路路徑容量配置系統 ’其中係 '利用 '訊息流量量測決定該平均訊息量比率函數 本紙張尺度適用中國國家標準(CNS ) A4说格(210χ297公釐) 經濟部中央標準局貝工消費合作社印製 A8 B8 C8 ^ 申請專利範圍 一 ,=申吻專利範圍第2 〇項之虛擬網路路徑容量配置系统 二、中係以使一電訊網路上所提供訊息流量的特性理想 而決定該平均訊息量比率函數。 根據申β青專利範圍第22項之虚擬網路路徑容量配置系統 :’其中係針對—所提供訊息流量的均勻卜瓦松分配而使 該平均訊息量比率函數理想化。 24_根據巾請專利範圍第22項之虚擬網路路徑容量配置系統 '中係針對—所提供訊息流量的多等級卜瓦松分配而 使該平均説息量比率函數理想化。 25·根據中請專利範圍第22項之虛擬網路路徑容量配置系统 ’其中係針對一所提供訊息流量的常態分配而使該平均 訊息量比率函數理想化。 26·根據申請專利範圍第22項之虛擬網路路徑容量配置系統 ,其中係針對一所提供訊息流量的二項式分配而使該平 均訊息量比率函數理想化。 27·根據申請專利範圍第22項之虛擬網路路徑容量配置系統 其中用來作爲所提供訊息流量模型的平均訊息量阻塞 量測疋平均訊息量比率函數〗X (c ),係將該平均訊息量 比率函數計算作爲—任意分配的隨機變數χ大於或等於 —預選數値c的機率的負對數一之近似法,且該平均訊息 量比率函數又是一個在分配平均數上得到其最小値之 凸函數。 28‘根據申請專利範圍第1 5項之虛擬網路路徑容量配置系統 -8 - 本紙張尺度適用巾國國家辟(CNS )八4胁(21〇χ297公董) (请先閲讀背面之注意事項再填寫本頁) 、1T • —.^1 - - 申請專利範圍 其中將容量分配给各虛擬路經的該裝置包含: 對映裝置,以將該等複數個實體鏈路對映到一個或 夕個虛擬路徑,该等虛擬路徨中之每一虚擬路徑都提供 —個f該電訊網路的-對節點間可個別切換之連接; 規疋每一實體鏈路的傳輸容量之裝置,· 集中裝£ ’用以將&amp;過選擇的複數個該等虚擬路徑集 中到一路徑容量配置集合; /分配裝置’用以利用該平均訊息量比率函數作爲阻塞 I測,將傳輸容量的起始値^配給該路徑容量配置集合 中之每-虛擬路徑,該等起&amp;中之每―起始値都相二 且經過選擇,使阻塞較大; 遞迴識別裝置,用以利用遞迴方式將容量已完全被分 配給通過-實⑽路的各虛擬隸的那些f㈣路^ 爲關键鏈路,該遞迴識別裝置又包含: ,計算裝置,用以利用先前的平均訊息量比率函數估 计値及先W計算ά㈣動參數値,計算待分配给每 擬路徑之容量; 經濟部中央標隼局具工消費合作社印策 加總裝置,將分配給每-實體鍵路的所有該等虛擬 路徑之容量加總,以便得到每一實體鏈路上所 油 容量; . 將該平均訊息量比率函數一估計値遞増—個 裝置; 二 矸异量又 重新計算該路徑容量配置集合中每_虛擬 動參數之裝置; -9 - ------ 本紙張尺度適用中國國家標準(CNS ) Α4规格(210Χ297公釐) ABCD 六、申請專利範圍 比較裝置,用以將每一實體鏈路所分配的總容量與 該實體鏈路之規定容量比較,以便決定該實體鏈路的未 分配容量是否大致爲零; 輸出裝置,用以輸出通過一被識別爲關键鏈路的每 一虛擬路徑上目前所分配的容量; 去掉虛擬路徑之裝置,用以自該路徑容量配置集合 中去掉通過每一關鍵實體鏈路的所有虛擬路徑;以及 重新界定實際容量之裝置,用以重新界定該等實體 鏈路之規定實際容量,以便補償分配給該等已去掉的虛 擬路徑之容量。 請 先 閱 讀 背 面- 之 注 意 事 項 再'Patent application scope — the mobile parameter value calculated, to calculate the capacity to be allocated to each virtual path; add up the capacity of all such virtual paths allocated to each physical link, so as to obtain the allocation on each physical link The total capacity of the child; increase the estimated value of the average message volume ratio function by a calculation amount; recalculate the movement parameters of each virtual path in the child path capacity configuration set; the total capacity allocated to each physical link and the physical link Comparison of the various quantities in order to determine whether the unallocated capacity of the physical link is approximately zero. Output the capacity currently allocated on each virtual path identified as an off-amp; from the child path capacity configuration set Remove all virtual paths through each critical physical link; and redefine the specified actual capacity of these physical links to compensate for the capacity allocated to these removed virtual roads. 15. A system with a path capacity for each virtual network defined on a telecommunications network that carries general message traffic. The network has multiple interconnected links with limited transmission capacity. The system includes: Ministry of Economic Affairs Printed by the Central Standard Bureau's Beigong Consumer Cooperative, a device that defines at least three layers as a model of network resources and needs, where the first layer contains physical networks and the second layer contains multiple virtual networks. The third layer contains A plurality of—virtual paths, each of the virtual networks in the virtual networks on the second layer is associated with a plurality of physical links on the first layer, and those on the third layer Each virtual path of the virtual path is associated with a plurality of virtual networks on the second layer; -5- This paper standard is applicable to the Chinese National Standard (CNS) A4 specification (2H) X297mm) A8 B8 C8 D8 VI 、 Patent application range selection device, used to select-separate architecture, and define the scope of resource sharing; 4-in device, used to superimpose the three-tiered hierarchy into a two-tiered hierarchy, of which the new- The layer contains this Volume network, and the new second layer contains a plurality of superimposed virtual paths; a derivation device to derive the corresponding superimposed structure matrix for each superimposed virtual path; σ sequential devices to sequentially connect the superimposed virtual paths Structure matrix, so as to generate a compiled structure matrix, which is used to represent ^ the virtual network path capacity configuration problem is reduced to an equivalent virtual path path capacity configuration problem; the distribution device is used in the plurality of physical links The capacity is allocated to each superimposed virtual path under the limitation of the transmission capacity; and a decision device is used to determine each to be allocated to each virtual network using a routing matrix that defines the relationship between each virtual path and each logical link The capacity of the virtual link. 16-Virtual network path capacity allocation system according to item I5 of the patent application scope. The partition structure used to define the resource sharing range is a virtual path partition structure. 17_ The virtual network road capacity allocation system according to item 15 of the patent application scope, wherein the partition architecture used to define the resource sharing scope is a virtual link partition architecture. _ 18.According to # 15 of the scope of patent application, the proposed network path capacity allocation system, in which the partition structure used to define the resource sharing scope is a physical link partition structure. Please read first, 'Read back ¢-ί Matters and write this page Bound by the Ministry of Economic Affairs Printed by the Central Bureau of Industry and Commerce M-6 Consumer Cooperatives-6- A8 B8 C8 ---------- D8 VI. Application ^ Scope ~ 1 ~-1M Gen According to the patent application No. 1! A five-item virtual network path capacity allocation system, where the device that allocates capacity to each virtual path includes: a device that selects an average message volume ratio function to select an appropriate average message volume ratio function as the telecommunications network The model of the load on each virtual path of the road; select the device that answers the algorithm, which can be calculated to solve the load balance problem of far-general message traffic; and the device that performs the calculation to use the average message The load balancing algorithm of the volume ratio function performs calculations on a computer system in order to produce as uniform load distribution as possible on these virtual paths. 20. The virtual network path capacity allocation system according to item 15 of the patent application scope, wherein the device that allocates capacity to each virtual path includes: a device that selects an average message volume ratio function to select an appropriate average message The volume ratio function is used as a model of the load on each virtual path of the telecommunications network; a device that selects a solution algorithm is used to select-the average message volume ratio function is used as the solution algorithm for the blocking measurement, the solution algorithm The method can be calculated to solve the load balancing problem of the general message flow; and the Central Standards Bureau of the Ministry of Economic Affairs of the Ministry of Economic Affairs and Consumers Cooperative Printed the device to perform the calculation 'to use the load balance algorithm using the average message volume ratio function. Perform calculations on the two computer systems in order to generate a uniform load distribution on the virtual paths. 21. The virtual network path capacity allocation system according to item 2 of the patent application scope 'in which' uses' the information flow measurement to determine the average message volume ratio function. The paper scale is applicable to the Chinese National Standard (CNS) A4 said grid (210χ297 Mm) A8 B8 C8 printed by the Beigong Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs ^ Application for patent scope 1, = virtual kiss path capacity allocation system for item 2 of the patent scope of patent application 2 The characteristics of the provided message flow are ideal to determine the average message volume ratio function. The virtual network path capacity allocation system according to item 22 of the β-Shenzhen patent scope: 'Among them, the average message volume ratio function is idealized for the uniform Poisson distribution of the provided message traffic. 24_According to the 22nd item of the patent scope, the virtual network path capacity allocation system is aimed at the multi-level Poisson distribution of the provided message traffic to make the average speech volume ratio function ideal. 25. The virtual network path capacity allocation system according to item 22 of the Chinese patent application, where the average message volume ratio function is idealized for the normal distribution of a provided message flow. 26. The virtual network path capacity allocation system according to item 22 of the patent application scope, in which the average message volume ratio function is idealized for the binomial distribution of a provided message flow. 27. The virtual network path capacity allocation system according to item 22 of the patent application scope is used as the average message volume congestion measurement for the provided message flow model. The average message volume ratio function X (c) is the average message The volume ratio function is calculated as an approximation of the negative logarithm of the probability of a randomly distributed random variable χ greater than or equal to-the preselected number value c, and the average message volume ratio function is again a minimum value obtained on the distribution average Convex function. 28 'The virtual network path capacity allocation system according to item 15 of the patent application scope-8 This paper standard is applicable to the national government (CNS) 84 4 threat (21〇 297 public director) (please read the notes on the back first (Fill in this page again) 、 1T • —. ^ 1--The scope of patent application The device that allocates capacity to each virtual path includes: a mapping device to map these multiple physical links to one or more evenings A virtual path, each of these virtual paths provides-a connection that can be individually switched between the nodes of the telecommunications network; a device that regulates the transmission capacity of each physical link, centralized Install "to collect multiple selected virtual paths into a path capacity configuration set; / distribution device" to use the average message volume ratio function as a blocking I test to set the initial value of transmission capacity ^ Assigned to each virtual path in the path capacity configuration set, each of the starting &amp; starting values are two and selected to make the blockage larger; the recursive identification device is used to recursively Capacity is over The f ^ channels assigned to the virtual members passing through the real path are the key links, and the recursive identification device further includes: a computing device for estimating the value using the previous average message volume ratio function and calculating W first Dynamic parameter value, to calculate the capacity to be allocated to each proposed path; the Central Standard Falcon Bureau of the Ministry of Economic Affairs, the Consumer Cooperation Cooperative Institutional Summing Device, adds up the capacity of all such virtual paths allocated to each physical link, so that Obtain the oil capacity on each physical link;. Estimate the average message volume ratio function as a device; two different quantities and recalculate the device of each virtual virtual parameter in the path capacity configuration set;- 9------- This paper scale is applicable to China National Standard (CNS) Α4 specification (210Χ297mm) ABCD 6. Patent scope comparison device to compare the total capacity allocated by each physical link with that entity The specified capacity of the link is compared to determine whether the unallocated capacity of the physical link is approximately zero; an output device is used to output each virtual link that is identified as a critical link The currently allocated capacity on the proposed path; a device to remove the virtual path to remove all virtual paths through each critical physical link from the set of path capacity configurations; and a device to redefine the actual capacity to redefine the path The actual capacity of the physical link is required to compensate for the capacity allocated to the virtual paths that have been removed. Please read the notes on the back-first 訂 經濟部中央標準局員工消費合作社印製 -10- 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)Printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs -10- This paper scale applies the Chinese National Standard (CNS) A4 specification (210X297 mm)
TW85108506A 1995-08-11 1996-07-13 TW319944B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US2779095A 1995-08-11 1995-08-11

Publications (1)

Publication Number Publication Date
TW319944B true TW319944B (en) 1997-11-11

Family

ID=21839801

Family Applications (3)

Application Number Title Priority Date Filing Date
TW85108504A TW399380B (en) 1995-08-11 1996-07-13 System and method for optimal virtual path capacity dimensioning with broadband traffic
TW85108505A TW317054B (en) 1995-08-11 1996-07-13
TW85108506A TW319944B (en) 1995-08-11 1996-07-13

Family Applications Before (2)

Application Number Title Priority Date Filing Date
TW85108504A TW399380B (en) 1995-08-11 1996-07-13 System and method for optimal virtual path capacity dimensioning with broadband traffic
TW85108505A TW317054B (en) 1995-08-11 1996-07-13

Country Status (1)

Country Link
TW (3) TW399380B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI680662B (en) * 2013-11-27 2019-12-21 美商內數位Vc專利控股股份有限公司 Method for distributing available bandwidth of a network amongst ongoing traffic sessions run by devices of the network, corresponding device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI680662B (en) * 2013-11-27 2019-12-21 美商內數位Vc專利控股股份有限公司 Method for distributing available bandwidth of a network amongst ongoing traffic sessions run by devices of the network, corresponding device

Also Published As

Publication number Publication date
TW317054B (en) 1997-10-01
TW399380B (en) 2000-07-21

Similar Documents

Publication Publication Date Title
US5764740A (en) System and method for optimal logical network capacity dimensioning with broadband traffic
US6304639B1 (en) System and methods for controlling virtual paths within a network based on entropy rate function
US5727051A (en) System and method for adaptive routing on a virtual path broadband network
Szeto et al. A multi-commodity flow based approach to virtual network resource allocation
Medhi Multi-hour, multi-traffic class network design for virtual path-based dynamically reconfigurable wide-area ATM networks
Gursoy et al. A layered broadband switching architecture with physical or virtual path configurations
JPH10506243A (en) Network operation and performance enhancement
Soriano et al. Design and dimensioning of survivable SDH/SONET networks
TW319944B (en)
Hwang Routing in high-speed networks
Montgomery et al. Hierarchical source routing through clouds
Medhi Multi-hour, multi-traffic class network design for VP-based wide-area dynamically reconfigurable ATM networks
KR100459891B1 (en) Method for allocating bandwidth to the multi-users in a network and computer readable medium therefor
Levin et al. Improvement of regional telecommunications networks
Li et al. Performance analysis of path rerouting algorithms for handoff control in mobile ATM networks
Sen ATM Technology for Broadband Telecommunications Networks
Liu et al. Performance analysis using a hierarchical loss network model
Iliadis Optimal PNNI complex node representations for restrictive costs
Medhi et al. Dimensioning and computational results for wide-area broadband networks with two-level dynamic routing
Aydemir et al. Virtual path assignment in ATM networks
de Sousa et al. Dimensioning ATM Networks Using 2-Layer Hierarchical Virtual Path Layouts
Panicker et al. A new algorithm for virtual path network design in ATM networks
Bür et al. A virtual path routing algorithm for ATM networks based on the equivalent bandwidth concept
Montgomery Managing complexity in large-scale networks via flow and network aggregation
Ross et al. Product-Form Loss Networks