US20070050492A1 - Method of operation for the integration of differentiated services (Diff-Serv) marked IP-flows into a quality of service (QoS) priorities in a wireless point to multi-point (PtMP) transmission system - Google Patents
Method of operation for the integration of differentiated services (Diff-Serv) marked IP-flows into a quality of service (QoS) priorities in a wireless point to multi-point (PtMP) transmission system Download PDFInfo
- Publication number
- US20070050492A1 US20070050492A1 US11/502,101 US50210106A US2007050492A1 US 20070050492 A1 US20070050492 A1 US 20070050492A1 US 50210106 A US50210106 A US 50210106A US 2007050492 A1 US2007050492 A1 US 2007050492A1
- Authority
- US
- United States
- Prior art keywords
- flow
- network
- data
- packet
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 238
- 238000000034 method Methods 0.000 title claims abstract description 93
- 230000010354 integration Effects 0.000 title description 4
- 238000004891 communication Methods 0.000 claims abstract description 99
- 230000006854 communication Effects 0.000 claims abstract description 99
- 230000003139 buffering effect Effects 0.000 claims description 4
- 239000000306 component Substances 0.000 description 104
- 230000006870 function Effects 0.000 description 72
- 230000007246 mechanism Effects 0.000 description 64
- 238000011144 upstream manufacturing Methods 0.000 description 63
- 238000010586 diagram Methods 0.000 description 59
- 239000002609 medium Substances 0.000 description 52
- 239000008186 active pharmaceutical agent Substances 0.000 description 42
- 230000032258 transport Effects 0.000 description 42
- 239000003795 chemical substances by application Substances 0.000 description 40
- 230000011664 signaling Effects 0.000 description 31
- 238000012546 transfer Methods 0.000 description 31
- 238000012545 processing Methods 0.000 description 27
- 238000007726 management method Methods 0.000 description 25
- 238000012913 prioritisation Methods 0.000 description 25
- 238000012384 transportation and delivery Methods 0.000 description 24
- 230000006855 networking Effects 0.000 description 23
- 238000012512 characterization method Methods 0.000 description 20
- 238000005516 engineering process Methods 0.000 description 18
- 239000000872 buffer Substances 0.000 description 17
- 238000004458 analytical method Methods 0.000 description 14
- 238000013459 approach Methods 0.000 description 14
- 238000013461 design Methods 0.000 description 12
- 230000005641 tunneling Effects 0.000 description 11
- 230000006399 behavior Effects 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- 238000013468 resource allocation Methods 0.000 description 10
- 230000002093 peripheral effect Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 8
- 238000009826 distribution Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 8
- 238000012986 modification Methods 0.000 description 8
- 230000004048 modification Effects 0.000 description 8
- 238000013519 translation Methods 0.000 description 8
- 230000014616 translation Effects 0.000 description 8
- 239000000969 carrier Substances 0.000 description 7
- 238000005266 casting Methods 0.000 description 7
- 229920006235 chlorinated polyethylene elastomer Polymers 0.000 description 7
- 238000000136 cloud-point extraction Methods 0.000 description 7
- 238000001514 detection method Methods 0.000 description 7
- 230000011218 segmentation Effects 0.000 description 7
- 230000004069 differentiation Effects 0.000 description 6
- 230000008520 organization Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000012937 correction Methods 0.000 description 4
- 230000001934 delay Effects 0.000 description 4
- 239000000835 fiber Substances 0.000 description 4
- 230000002452 interceptive effect Effects 0.000 description 4
- 238000004246 ligand exchange chromatography Methods 0.000 description 4
- 230000000670 limiting effect Effects 0.000 description 4
- 230000000737 periodic effect Effects 0.000 description 4
- 238000012163 sequencing technique Methods 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 3
- 230000003044 adaptive effect Effects 0.000 description 3
- 230000002411 adverse Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 230000002860 competitive effect Effects 0.000 description 3
- 125000004122 cyclic group Chemical group 0.000 description 3
- 230000001627 detrimental effect Effects 0.000 description 3
- 235000003642 hunger Nutrition 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 230000001404 mediated effect Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 238000005457 optimization Methods 0.000 description 3
- 230000002085 persistent effect Effects 0.000 description 3
- 238000007493 shaping process Methods 0.000 description 3
- 230000037351 starvation Effects 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 240000003537 Ficus benghalensis Species 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 230000002457 bidirectional effect Effects 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 230000010267 cellular communication Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 229910052802 copper Inorganic materials 0.000 description 2
- 239000010949 copper Substances 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 238000007626 photothermal therapy Methods 0.000 description 2
- BASFCYQUMIYNBI-UHFFFAOYSA-N platinum Chemical compound [Pt] BASFCYQUMIYNBI-UHFFFAOYSA-N 0.000 description 2
- 229920002215 polytrimethylene terephthalate Polymers 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 238000010561 standard procedure Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- KKIMDKMETPPURN-UHFFFAOYSA-N 1-(3-(trifluoromethyl)phenyl)piperazine Chemical compound FC(F)(F)C1=CC=CC(N2CCNCC2)=C1 KKIMDKMETPPURN-UHFFFAOYSA-N 0.000 description 1
- 229910001369 Brass Inorganic materials 0.000 description 1
- 241000145616 Chrosomus eos Species 0.000 description 1
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 1
- 240000002853 Nelumbo nucifera Species 0.000 description 1
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 1
- 101100478719 Postia placenta (strain ATCC 44394 / Madison 698-R) STS-18 gene Proteins 0.000 description 1
- 241001393742 Simian endogenous retrovirus Species 0.000 description 1
- 102100040338 Ubiquitin-associated and SH3 domain-containing protein B Human genes 0.000 description 1
- 101710143616 Ubiquitin-associated and SH3 domain-containing protein B Proteins 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000010951 brass Substances 0.000 description 1
- NNKKTZOEKDFTBU-YBEGLDIGSA-N cinidon ethyl Chemical compound C1=C(Cl)C(/C=C(\Cl)C(=O)OCC)=CC(N2C(C3=C(CCCC3)C2=O)=O)=C1 NNKKTZOEKDFTBU-YBEGLDIGSA-N 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000007596 consolidation process Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 239000008358 core component Substances 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000002074 deregulated effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000005713 exacerbation Effects 0.000 description 1
- 230000003090 exacerbative effect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000005206 flow analysis Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 229910052697 platinum Inorganic materials 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000009131 signaling function Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- UNFWWIHTNXNPBV-WXKVUWSESA-N spectinomycin Chemical compound O([C@@H]1[C@@H](NC)[C@@H](O)[C@H]([C@@H]([C@H]1O1)O)NC)[C@]2(O)[C@H]1O[C@H](C)CC2=O UNFWWIHTNXNPBV-WXKVUWSESA-N 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000036962 time dependent Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
- 239000006163 transport media Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 208000037820 vascular cognitive impairment Diseases 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/20—Arrangements for detecting or preventing errors in the information received using signal quality detector
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/163—In-band adaptation of TCP data exchange; In-band control procedures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/165—Combined use of TCP and UDP protocols; selection criteria therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/168—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP] specially adapted for link layer protocols, e.g. asynchronous transfer mode [ATM], synchronous optical network [SONET] or point-to-point protocol [PPP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/169—Special adaptations of TCP, UDP or IP for interworking of IP based networks with other networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q11/00—Selecting arrangements for multiplex systems
- H04Q11/04—Selecting arrangements for multiplex systems for time-division multiplexing
- H04Q11/0407—Selecting arrangements for multiplex systems for time-division multiplexing using a stored programme control
- H04Q11/0414—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
- H04W28/20—Negotiating bandwidth
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1836—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with heterogeneous network architecture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/189—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast in combination with wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/1305—Software aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13096—Digital apparatus individually associated with a subscriber line, digital line circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13097—Numbering, addressing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13098—Mobile subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13141—Hunting for free outlet, circuit or channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13166—Fault prevention
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13176—Common channel signaling, CCS7
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13196—Connection circuit/link/trunk/junction, bridge, router, gateway
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13204—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13216—Code signals, frame structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/1322—PBX
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13292—Time division multiplexing, TDM
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13296—Packet switching, X.25, frame relay
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13348—Channel/line reservation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13389—LAN, internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/24—Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/26—Resource reservation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0453—Resources in frequency domain, e.g. a carrier in FDMA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/06—Transport layer protocols, e.g. TCP [Transport Control Protocol] over wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/06—Airborne or Satellite Networks
Definitions
- the present invention relates generally to telecommunications and, more particularly, to a system and method for implementing a QoS aware wireless point-to-multi-point transmission system.
- Telecommunication networks such as voice, data and video networks have conventionally been customized for the type of traffic each is to transport.
- voice traffic is very latency sensitive but quality is less important, so voice networks are designed to transport voice traffic with limited latency.
- Traditional data traffic such as, e.g., a spreadsheet, on the other hand is not latency sensitive, but error-free delivery is required.
- Conventional telecommunications networks use circuit switching to achieve acceptable end user quality of service (QoS). With the advent of new packet switching high bandwidth data networks, different types of traffic can be transported over a data network. Specifically, convergence of separate voice, data and video networks into a single broadband telecommunications network is enabled. To ensure end user satisfaction, a system is desired that provides QoS for various types of traffic to be transported.
- Wireless networks present particular challenges over their wireline counterparts in delivering QoS. For example, wireless networks traditionally exhibit high bit error rates (BER) due to a number of reasons.
- BER bit error rates
- Conventional wireless networks also implement circuit switched connections to provide reliable communications channels. However the use of circuit switched connections allocates bandwidth between communicating nodes whether or not traffic is constantly being transferred between the nodes. Therefore, circuit switched connections use communications bandwidth rather inefficiently.
- Packet switching makes more efficient use of available bandwidth than does traditional circuit switching. Packet switching breaks up traffic into so-called “packets” which can then be transported from a source node to a destination for reassembly. Thus a particular portion of bandwidth can be shared by many sources and destinations yielding more efficient use of bandwidth.
- a wireless broadband access telecommunications system which can provide a QoS capability that is comparable to that delivered by wireline broadband access devices.
- one of the barriers to the deployment of wireless broadband access systems has been the absence of acceptable QoS characteristics, while at the same time delivering bandwidth sufficient to qualify as broadband. Delivery of raw bandwidth over wireless media without acceptable QoS would not benefit end users. Likewise, the delivery of a high level of QoS at the cost of sufficient bandwidth would also not benefit end users.
- the present invention is directed to a packet-centric wireless point to multi-point telecommunications system including: a wireless base station communicating via a packet-centric protocol to a first data network; one or more host workstations communicating via the packet-centric protocol to the first data network; one or more subscriber customer premise equipment (CPE) stations coupled with the wireless base station over a shared bandwidth via the packet-centric protocol over a wireless medium; and one or more subscriber workstations coupled via the packet-centric protocol to each of the subscriber CPE stations over a second network.
- the packet-centric protocol can be transmission control protocol/internet protocol (TCP/IP).
- the packet-centric protocol can be a user datagram protocol/internet protocol (UDP/IP).
- the system can include a resource allocation means for allocating shared bandwidth among the subscriber CPE stations.
- the resource allocation is performed to optimize end-user quality of service (QoS).
- the wireless communication medium can include at least one of: a radio frequency (RF) communications medium; a cable communications medium; and a satellite communications medium.
- the wireless communication medium can further include a telecommunications access method including at least one of: a time division multiple access (TDMA) access method; a time division multiple access/time division duplex (TDMA/TDD) access method; a code division multiple access (CDMA) access method; and a frequency division multiple access (FDMA) access method.
- TDMA time division multiple access
- TDMA/TDD time division multiple access/time division duplex
- CDMA code division multiple access
- FDMA frequency division multiple access
- the first data network includes at least one of: a wireline network; a wireless network; a local area network (LAN); and a wide area network (WAN).
- the second network includes at least one of: a wireline network; a wireless network; a local area network (LAN); and a wide area network (WAN).
- the system of claim 1 can include a resource allocator that allocates shared bandwidth among the subscriber CPE stations.
- the resource allocator optimizes end-user quality of service (QoS).
- QoS quality of service
- the resource allocator can be application aware as well.
- FIG. 1A is a block diagram providing an overview of a standard telecommunications network providing local exchange carrier services within one or more local access and transport areas;
- FIG. 1B depicts an exemplary network including workstations coupled to a data network
- FIG. 1C illustrates a conventional video network, such as for example a cable television (CATV) network;
- CATV cable television
- FIG. 2A is a block diagram illustrating an overview of a standard telecommunications network providing both local exchange carrier and interexchange carrier services between subscribers located in different local access and transport areas;
- FIG. 2B illustrates a signaling network in detail
- FIG. 2C illustrates an exemplary network carrying voice, data and video traffic over a data network
- FIG. 2D depicts a network including a point-to-multipoint wireless network coupled via a router to a data network;
- FIG. 3A depicts an exemplary perspective diagram of a point-to-multipoint network
- FIG. 3B depicts a block diagram further illustrating a wireless point-to-multipoint network
- FIG. 4 depicts a wireless Internet protocol network access architecture of the present invention
- FIG. 5A depicts Internet protocol flows from a subscriber host to a wireless base station, and through a wireline connection to a destination host;
- FIG. 5B illustrates a functional flow diagram including an example functional description of a transmission control protocol adjunct agent performing an outgoing transmission control protocol spoof function
- FIG. 5C illustrates a functional flow diagram including an exemplary functional description of a transmission control protocol adjunct agent performing an incoming transmission control protocol spoof function
- FIG. 6 illustrates a block diagram representing scheduling of mixed Internet protocol flows
- FIG. 7 illustrates packet header field information which can be used to identify Internet protocol flows and the quality of service requirements of the Internet protocol flows
- FIG. 8A is a block diagram summarizing an exemplary downlink analysis, prioritization and scheduling function
- FIG. 8B is a block diagram summarizing an exemplary uplink analysis prioritization and scheduling function
- FIG. 9 illustrates how a downlink flow scheduler can take into account a service level agreement in prioritizing a frame slot and scheduling resource allocation
- FIG. 10 depicts an embodiment of an inventive media access control hardware architecture
- FIG. 11 is an exemplary software organization for a packet-centric wireless point to multipoint telecommunications system
- FIG. 12A illustrates an exemplary time division multiple access media access control air frame
- FIG. 12B illustrates an exemplary structure for a time division multiple access/time division duplex air frame
- FIG. 12C illustrates an exemplary downstream transmission subframe
- FIG. 12D illustrates an exemplary upstream acknowledgment block field of a downstream transmission subframe
- FIG. 12E illustrates an exemplary acknowledgment request block field of a downstream transmission subframe
- FIG. 12F illustrates an exemplary frame descriptor block field of a downstream transmission subframe
- FIG. 12G illustrates an exemplary downstream media access control payload data unit of a downstream transmission subframe
- FIG. 12H illustrates an exemplary command and control block of a downstream transmission subframe
- FIG. 12I illustrates an exemplary upstream transmission subframe
- FIG. 12J illustrates an exemplary downstream acknowledgment block of an upstream transmission subframe
- FIG. 12K illustrates an exemplary reservation request block of an upstream transmission subframe 1204 ;
- FIG. 12L illustrates an exemplary media access control payload data unit of an upstream transmission subframe
- FIGS. 12M, 12N and 12 O illustrate an exemplary operations data block of an upstream transmission subframe
- FIG. 13 illustrates how an exemplary flow scheduler for the present invention functions
- FIG. 14 is an exemplary two-dimensional block diagram of an advanced reservation algorithm
- FIG. 15A is an exemplary logical flow diagram for a downlink flow analyzer
- FIG. 15B is an exemplary logical flow diagram for a downlink flow scheduler
- FIG. 16A is an exemplary logical flow diagram for an uplink flow analyzer
- FIG. 16B is an exemplary logical flow diagram for an uplink flow scheduler
- FIG. 17 illustrates Internet protocol flow in a downlink direction, including Internet protocol security encryption
- FIG. 18 illustrates an uplink direction of Internet protocol security support.
- the present invention is described in terms of an example environment.
- the example environment uses a fixed wireless point-to-multi-point (PtMP) connection to transmit packetized data information including for example, IP telephony, video, data, received from a telecommunications carrier.
- PtMP point-to-multi-point
- a telecommunications carrier can include US domestic entities (see Definitions below at section II) such as, e.g., ILECs, CLECs, IXCs, NGTs and Enhanced Service Providers (ESPs), as well as global entities such as PTTs and NEs, recognized by those skilled in the art.
- a telecommunications system includes domestic systems used by entities such as, e.g., ILECs, CLECs, IXCs and Enhanced Service Providers (ESPs), as well as global systems recognized by those skilled in the art.
- entities such as, e.g., ILECs, CLECs, IXCs and Enhanced Service Providers (ESPs), as well as global systems recognized by those skilled in the art.
- ILECs e.g., ILECs, CLECs, IXCs and Enhanced Service Providers (ESPs)
- ESPs Enhanced Service Providers
- the traffic arrives from a wide area network (WAN) connection.
- WAN wide area network
- IP internet protocol
- PGP point-to-point protocol
- Network routers can include, for example, a general purpose computer, such as the SUN workstation running routing software or a dedicated routing device such as various models from CISCO of San Jose, Calif., ASCEND of Alameda, Calif., NETOPIA of Alameda, Calif., or 3COM of Santa Clara, Calif.
- a virtual private networking protocol such as the point-to-point tunneling protocol (PPTP)
- PPTP point-to-point tunneling protocol
- a tunnel permits a network administrator to extend a virtual private network from a server (e.g., a Windows NT server) to a data network (e.g., the Internet).
- a server e.g., a Windows NT server
- a data network e.g., the Internet
- An AT is a class 3/4 switch used to switch calls between EOs in a LATA.
- An AT provides subscribers access to the IXCs, to provide long distance calling services.
- An access tandem is a network node.
- Other network nodes can include, for example, a CLEC, or other enhanced services provider (ESP), an international gateway or global point-of- presence (GPOP), or an intelligent peripheral (IP).
- ESP enhanced services provider
- GPOP global point-of- presence
- IP intelligent peripheral
- bearer (B) channels are digital channels used to carry both digital voice and digital data information.
- An ISDN bearer channel is 64,000 bits per second, which can carry PCM-digitized voice or data.
- CO central office
- a CO is a facility that houses an EO homed. EOs are often called COs.
- class 1 switch A class 1 switching office, the Regional Center(RC), is the highest level of local and long distance switching, or “office of last resort” to complete a call.
- class 3 switch A class 3 switching office was a Primary Center (PC); an access tandem (AT) has class 3 functionality.
- class 4 switch A class 4 switching office was a Toll Center (TC) if operators were present or else a Toll Point (TP); an access tandem (AT) has class 4 functionality.
- class 5 switch A class 5 switching office is an end office (EO) or the lowest level of local and long distance switching, a local central office. The switch closest to the end subscriber.
- competitive LEC CLECs are telecommunications services providers of local services that (CLEC) can compete with ILECs. Interprise and Century 21 are examples. A CLEC may or may not handle IXC services as well. competitive access Teligent and Winstar are examples.
- providers (CAPS) customer premises CPE refers to devices residing on the premises of a customer and used to equipment (CPE) connect to a telephone network, including ordinary telephones, key telephone systems, PBXs, video conferencing devices and modems.
- digitized data (or Digitized data refers to analog data that has been sampled into a binary digital data) representation (i.e., comprising sequences of 0's and 1's). Digitized data is less susceptible to noise and attenuation distortions because it is more easily regenerated to reconstruct the original signal.
- egress end office The egress EO is the node or destination EO with a direct connection to the called party, the termination point. The called party is “homed” to the egress EO.
- Egress Egress refers to the connection from a called party or termination at the destination end of a network, to the serving wire center (SWC). end office (EO)
- An EO is a class 5 switch used to switch local calls within a LATA.
- EOs Enhanced Service A network services provider.
- Provider equal access 1+ dialing as used in US domestic calling for access to any long distance carrier as required under the terms of the modified final judgment (MFJ) requiring divestiture of the Regional Bell Operating Companies (RBOCs) from their parent company, AT&T.
- global point of A GPOP refers to the location where international telecommunications presence (GPOP) facilities and domestic facilities interface, an international gateway POP.
- incumbent LEC ILECs are traditional LECs in the US, which are the Regional Bell (ILEC) Operating Companies (RBOCs). Bell South and US West are examples.
- ILEC can also stand for an independent LEC such as a GTE.
- ingress end office The ingress EO is the node or serving wire center (SVC) with a direct connection to the calling party, the origination point. The calling party is “homed” to the ingress EO.
- Ingress Ingress refers to the connection from a calling party or origination.
- integrated service An ISDN Basic Rate Interface (BRI) line provides 2 bearer B channels digital network (ISDN) and 1 data D line (known as “2B + D” over one or two pairs) to a basic rate interface subscriber.
- ISDN ISDN Basic Rate Interface
- ISDN line integrated services
- IMT inter machine trunk
- IXCs US domestic long distance telecommunications services (IXC) providers.
- AT&T, MCI, Sprint, are examples.
- IP internet protocol
- IP IP is part of the TCP/IP protocols. It is used to recognize incoming messages, route outgoing messages, and keep track of Internet node addresses (using a number to specify a TCP/IP host on the Internet).
- IP corresponds to the network layer of OSI.
- Internet service An ISP is a company that provides Internet access to subscribers.
- provider (ISP) ISDN primary rate
- An ISDN Primary Rate Interface (PRI) line provides the ISDN interface (PRI) equivalent of a Tl circuit.
- the PRI delivered to a customer's premises can provide 23B + D (in North America) or 30B + D (in Europe) channels running at 1.544 megabits per second and 2.048 megabits per second, respectively.
- local exchange carrier LECs are local telecommunications services providers. Bell Atlantic and (LEC) US West are examples. local access and A LATA is a region in which a LEC offers services. There are over 160 transport area (LATA) LATAs of these local geographical areas within the United States.
- a LAN is a communications network providing connections between (LAN) computers and peripheral devices (e.g., printers and modems) over a relatively short distance (e.g., within a building) under standardized control.
- modified final Modified final judgment was the decision requiring divestiture of judgment (MFJ) the Regional Bell Operating Companies (RBOCs) from their parent company, AT&T.
- network node A network node is a generic term for the resources in a telecommunications network, including switches, DACS, regenerators, etc. Network nodes essentially include all non-circuit (transport) devices.
- Other network nodes can include, for example, equipment of a CLEC, or other enhanced service provider (ESP), a point-of-presence (POP), an international gateway or global point-of-presence (GPOP).
- ESP enhanced service provider
- POP point-of-presence
- GPOP global point-of-presence
- new entrant (NE) A new generation global telecommunications.
- next generation A new telecommunications services provider, especially IP telephony telephone (NGT) providers. Examples are Level 3 and Qwest.
- packetized voice or One example of packetized voice is voice over internet protocol (VOIP).
- voice over a backbone Voice over packet refers to the carrying of telephony or voice traffic over a data network, e.g. voice over frame, voice over ATM, voice over Internet Protocol (IP), over virtual private networks (VPNs), voice over a backbone, etc.
- Pipe or dedicated A pipe or dedicated communications facility connects an ISP to the communications internet.
- facility point of presence A POP refers to the location within a LATA where the IXC and LEC (POP) facilities interface.
- point-to-point A virtual private networking protocol, point-to-point tunneling protocol tunneling protocol (PPTP), can be used to create a “tunnel” between a remote user and a (PPTP) data network.
- a tunnel permits a network administrator to extend a virtual private network (VPN) from a server (e.g., a Windows NT server) to a data network (e.g., the Internet).
- VPN virtual private network
- PPP point-to-point
- PPP is a protocol permitting a computer to establish a connection with protocol the Internet using a modem.
- PPP supports high-quality graphical front ends, like Netscape. postal telephone State regulated telephone companies, many of which are being telegraph (PTT) deregulated. NTT is an example.
- private branch A PBX is a private switch located on the premises of a user. The user is exchange (PBX) typically a private company which desires to provide switching locally.
- private line with a dial A private line is a direct channel specifically dedicated to a customer's tone use between two specified points.
- a private line with a dial tone can connect a PBX or an ISP's access concentrator to an end office (e.g. a channelized Tl or PRI).
- a private line can also be known as a leased line.
- public switched The PSTN is the worldwide switched voice network.
- PSTN public switched network
- SS7 is a type of common channel interoffice signaling (CCIS) used (SS7) widely throughout the world.
- CCIS common channel interoffice signaling
- the SS7 network provides the signaling functions of indicating the arrival of calls, transmitting routing and destination signals, and monitoring line and circuit status.
- switching hierarchy or An office class is a functional ranking of a telephone central office office classification switch depending on transmission requirements and hierarchical relationship to other switching centers. Prior to AT&T's divestiture of the RBOCs, an office classification was the number assigned to offices according to their hierarchical function in the U.S. public switched network (PSTN).
- PSTN public switched network
- class 1 Regional Center (RC)
- class 2 Sectional Center (SC)
- class 3 Primary Center (PC)
- class 4 Toll Center (TC) if operators are present or else Toll Point (TP)
- class 5 End Office (EO) a local central office. Any one center handles traffic from one to two or more centers lower in the hierarchy. Since divestiture and with more intelligent software in switching offices, these designations have become less firm.
- the class 5 switch was the closest to the end subscriber. Technology has distributed technology closer to the end user, diffusing traditional definitions of network switching hierarchies and the class of switches.
- transmission control TCP is an end-to-end protocol that operates at the transport and sessions protocol (TCP) layers of OSI, providing delivery of data bytes between processes running in host computers via separation and sequencing of IP packets.
- transmission control TCP/IP is a protocol that provides communications between protocol/internet interconnected networks. The TCP/IP protocol is widely used on the protocol (TCP/IP) Internet, which is a network comprising several large networks connected by high-speed connections. Trunk A trunk connects an access tandem (AT) to an end office (EO).
- a WAN is a data network that extends a LAN over the circuits of a (WAN) telecommunications carrier.
- the carrier is typically a common carrier.
- a bridging switch or a router is used to connect the LAN to the WAN.
- QOS Quality of Service
- QoS quality of service
- One network difficulty is due to a lack of network availability. Depending on the access technology being used, this can include a “modem no-answer” condition, “network busy” condition or a sudden unexpected “drop” of a network connection. These conditions would not be described as being consistent with high QoS.
- Once network connectivity is achieved slow traffic caused by congestion, local access bottlenecks, and network failures can be experienced as slow web page loading, slow file transfers, or poor voice/video quality in streaming multimedia applications. Poor quality in streaming multimedia applications can instead result from high “jitter,” or large and rapid variations in latency, leading to interruptions, distortion, or termination of session. Many different conditions can lead to actual data errors, which in some contexts can be catastrophic, such as in the file transfer of a spreadsheet. It is desirable that these problems of a data communications network be minimized or eliminated.
- QoS Quality of Service
- QoS can be a relative term, finding different meanings for different users.
- a casual user doing occasional web browsing, but no file transfer protocol (FTP) file downloads or real time multimedia sessions may have different a different definition of QoS than a power user doing many FTP file downloads of large database or financial files, frequent H.323 video conferencing and IP telephony calls.
- FTP file transfer protocol
- a user can pay a premium rate (i.e. a so-called service level agreement (SLA)) for high network availability, low latency, and low jitter, while another user can pay a low rate for occasional web surfing only, and on weekends only. Therefore, perhaps it is best to understand QoS as a continuum, defined by what network performance characteristic is most important to a particular user and the user's SLA. Maximizing the end-user experience is an essential component of providing wireless QoS.
- SLA service level agreement
- a service can be defined as a type of connection from one end of a network to another.
- protocol specific such as, e.g., IBM's systems network architecture (SNA), Novell's IPX, Digital's DECnet.
- SNA systems network architecture
- Novell's IPX Novell's IPX
- Digital's DECnet Digital's DECnet.
- TCP/IP i.e. including user datagram protocol (UDP)
- UDP user datagram protocol
- service can be defined to be a particular type of TCP/IP connection or transmission.
- Such service types might include, e.g., FTP file transfers, e-mail traffic, hypertext transfer protocol (HTTP) traffic, H.323 videoconferencing sessions. It is desirable that a QoS mechanism deal with these differing types of service, in addition to dealing with the different types of quality as discussed previously.
- QoS can be thought of as a mechanism to selectively allocate scarce networking, transmission and communications resources to differentiated classes of network traffic with appropriate levels of priority. Ideally, the nature of the data traffic, the demands of the users, the conditions of the network, and the characteristics of the traffic sources and destinations all modify how the QoS mechanism is operating at any given instant. Ultimately, however, it is desirable that the QoS mechanism operate in a manner that provides the user with optimal service, in whatever manner the user defines it.
- QoS In legacy networks created primarily for voice traffic by telephone companies, data transmission was accomplished with reference to a circuit-centric definition of QoS.
- QoS implied the ability to carry asynchronous (i.e. transmission of data through start and stop sequences without the use of a common clock) as well as isochronous (i.e. consistent timed access of network bandwidth for time-sensitive voice and video) traffic.
- Circuit-switched QoS was accomplished by dedicating an end-to-end circuit for each connection or service, whether it was voice (see FIG. 1A ) or data. The circuit-centric QoS mechanism was simply the provision of this circuit for exclusive use by the user.
- this approach dedicates the circuit, all transmission channels associated with the circuit, and the transport media itself to a single user for the entire duration of the session, regardless of whether data is actually being transmitted every instant of the session. It was generally believed that only in this manner could true QoS be achieved. Therefore, traditional designs for wireless broadband access systems (see FIG. 2A ) also used this approach, dedicating a wireless radio channel to each particular data connection, regardless of the application or whether indeed any data was being transmitted at any given moment. This circuit-centric approach to QoS is fairly expensive, in terms of the cost of the equipment, and the utilization factors for the transmission media itself.
- VPC virtual path or channel connection
- SVCs switched virtual connections
- VBR variable bit rate
- CBR constant bit rate
- URR unspecified bit rate
- Packet-switching is revolutionizing data communications, so conventional circuit-switch and ATM networking concepts and their legacy QoS mechanisms are in need of update.
- packet-switched data communications one cannot dedicate a circuit to a particular data communications session. Indeed, a strength of packet-switching lies in route flexibility and parallelism of its corresponding physical network. Therefore, the QoS mechanism cannot work in the same manner as the legacy circuit-centric QoS mechanism did.
- IP-flows are “bandwidth-sensitive,” other flows are latency- and/or jitter-sensitive. Real time or multimedia flows and applications cannot be guaranteed timely behavior by simply providing excessive bandwidth, even if it were not cost-prohibitive to do so. It is desirable that QoS mechanisms for an IP-centric wireless broadband access system recognize the detailed flow-by-flow requirements of the traffic, and allocate system and media resources necessary to deliver these flows in an optimal manner.
- the end-user experience is the final arbiter of QoS. It is desirable that an IP-centric wireless broadband access system assign and regulate system and media resources in a manner that can maximize the end-user experience.
- data transmission speed is the best measure of QoS.
- the best measure of QoS can be the minimization of transmission error.
- the best measure of QoS can be the optimization of both speed and error.
- the timely delivery of packets can be the best measure of QoS. It is important to note that fast data transmission may not be the same as timely delivery of packets.
- IP-centric wireless broadband access system provide a QoS mechanism that can dynamically optimize system behavior to each particular IP flow, and can also adapt to changes with changing network load, congestion and error rates.
- Service guarantees can be made and service level agreements (SLAs) can be entered into between a telecommunications service provider and a subscriber whereby a specified level of network availability can be described, and access charges can be based upon the specified level.
- SLAs service level agreements
- NSPs network service providers
- SLA service level agreement
- IP-centric wireless broadband access system can provide for SLAs, enabling service providers to have more opportunities for service differentiation and profitability.
- a system be able to differentiate between types of traffic or service types so that differing levels of system resources can be allocated to these types. It is customary to speak of “classes of service” as a means of grouping traffic types that can receive similar treatment or allocation of system and media resources.
- Example methods include traffic shaping, admission control, IP precedence, and differential congestion management. It is desired that an IP-centric wireless broadband access system use all of these methods to differentiate traffic into classes of service, to map these classes of service against a QoS matrix, and thereby to simplify the operation and administration of the QoS mechanism.
- a point-to-multipoint (PtMP) wireless system like the present invention, it is desirable that the QoS mechanism cope not only with wireline networking considerations, but also with considerations particular to the wireless environment.
- PtMP point-to-multipoint
- the QoS mechanism cope not only with wireline networking considerations, but also with considerations particular to the wireless environment.
- the inherent BER of wireless can be handled.
- the high BER can require that error detection, correction, and re-transmission be done in an efficient manner.
- a BER handling mechanism also work efficiently with the re-transmission algorithms of TCP/IP so as to not cause further unnecessary degradation of bandwidth utilization.
- An additional challenge of wireless is contention among users for limited wireless bandwidth. It is desirable that the system handle service requests from multiple users in a radio medium subject to interference and noise, which can make efficient allocation of radio bandwidth difficult.
- the present invention provides a novel QoS mechanism in a point-to-multi-point IP-centric wireless system for packet-switched network traffic.
- QoS As the underlying guide to system architecture and design constitutes an important, substantial and advantageous difference of the IP-centric wireless broadband access system of the present invention over existing wireless broadband access systems designed with traditional circuit-centric or ATM cell circuit-centric approaches such as those used by Teligent and Winstar.
- Queuing is a commonly accepted tool required for manipulating data communications flows. In order for packet headers to be examined or modified, for routing decisions to made, or for data flows to be output on appropriate ports, it is desirable that data packets be queued.
- queuing introduces, by definition, a delay in the traffic streams that can be detrimental, and can even totally defeat the intent of queuing. Excessive queuing can have detrimental effects on traffic by delaying time sensitive packets beyond their useful time frames, or by increasing the RTT (Round Trip Time), producing unacceptable jitter or even causing the time-out of data transport mechanisms. Therefore, it is desired that queuing be used intelligently and sparingly, without introducing undue delay in delay-sensitive traffic such as real-time sessions.
- TDMA time division multiple access
- FEC forward error detection
- queuing be used merely to enable packet and radio frame processing.
- the overall added delay in real-time traffic can preferably be held to below approximately 20 milliseconds.
- queue management as the primary QoS mechanism in providing QoS-based differentiated services is a simple and straight forward method for wireless broadband systems.
- wireless systems are usually more bandwidth constrained and therefore more sensitive to delay than their wireline counterparts. For this reason, it is desirable that QoS-based differentiated services be provided with mechanisms that go beyond what simple queuing can do. However, some queuing can still be required, and the different queuing methods are now discussed.
- First in, first out (FIFO) queuing can be used in wireless systems, like wireline systems, in buffering data packets when the downstream data channel becomes temporarily congested. If temporary congestion is caused by bursty traffic, a FIFO queue of reasonable depth can be used to smooth the flow of data into the congested communications segment. However, if the congestion becomes severe in extent, or relatively long in duration, FIFO can lead to the discarding of packets as the FIFO queues are filled to capacity and the network is not capable of accepting additional packets causing discarding of packets, i.e.
- packet-tossing Although this can have a detrimental effect on QoS in and of itself, the discarding of packets may cause future problems with traffic flow as the TCP protocol causes the retransmission of lost packets in the proper sequence, further exacerbating the problem.
- the problem of packet discards can be minimized by increasing the size of the FIFO buffers so that more time can pass before discards occur. Unfortunately, eventually the FIFO can become large enough that packets can become too old and the round-trip time (RTT) can increase to the point that the packets are useless, and the data connection is virtually lost.
- RTT round-trip time
- FIFO queuing In a wireless broadband environment, the requirement for FIFO queuing is partially dependent upon the type of RF access method being used.
- TDMA/TDD time division multiple access/time division duplex
- FDMA frequency division multiple access
- CDMA code-division multiple access
- noise and interference are factors that can lead to retransmissions, and therefore further delays and consequent adverse effect on QoS.
- shared wireless broadband systems can uniformly delay all traffic. This can seem to be the “fairest” method, but it is not necessarily the best method if the goal is to provide high QoS to users. By using different types of queue management, a much better base of overall QoS can be achieved.
- the shared wireless broadband environment can include a constricted bandwidth segment as data is transmitted over the RF medium. Therefore, regardless of access technique, these systems can require some amount of queuing. However, using FIFO queuing can result in a constant delay to all traffic, regardless of the priority or type of traffic. Most data communications environments can consist of a mixture of traffic, with combinations of real time interactive data, file and data downloads, web page access, etc. Some of these types of traffic are more sensitive to delay, and jitter, than others. Priority queuing simply reorders data packets in the queue based on their relative priorities and types, so that data from more latency- and jitter-sensitive traffic can be moved to the front of the queue.
- priority queuing can be not much better than FIFO queuing as a QoS mechanism.
- Each class can be defined to include of data flows with certain similar priorities and types. All classes can be given a certain minimum level of service so that one high priority data flow cannot monopolize all system resources.
- the source application can receive information about the traffic rate, and can be able to provide TCP-mediated transmission rate adjustment supporting smooth traffic flow.
- a weighted fair queuing method can attempt to provide low-volume flows with guaranteed queuing resources, and can then allow remaining flows, regardless of volume or priority, to have equal amounts of resource. Although this can prevent buffer starvation, and can lead to somewhat better latency and jitter performance, it can be difficult to attain stable performance in the face of rapidly changing RF downlink channel bandwidth availability.
- Providing a high quality of service can require a QoS mechanism that is more sophisticated than simple queue management.
- the TCP/IP protocol stack has become the standard method of transmitting data over the Internet, and increasingly it is becoming a standard in virtual private networks (VPNs).
- the TCP/IP protocol stack includes not only internet protocol (IP), but also transmission control protocol (TCP), user datagram protocol (UDP), and internet control message protocol (ICMP).
- IP internet protocol
- TCP transmission control protocol
- UDP user datagram protocol
- ICMP internet control message protocol
- a wireless QoS mechanism can optimize data flows in a manner that can enhance the end user experience when there is no severe wireline network congestion or bottleneck present.
- Data traffic can be handled based on classes of service, as discussed above.
- data traffic (or a sequence of data packets associated with a particular application, function, or purpose) can be classified into one of several classes of service. Differentiation can be done on the basis of some identifiable information contained in packet headers.
- One method can include analyzing several items in, e.g., an IP packet header, which can serve to uniquely identify and associate the packet and other packets from that packet flow with a particular application, function or purpose.
- a source IP address, a source TCP or UDP port, a destination IP address, and a destination IP or UDP port can serve to associate packets into a common flow, i.e. can be used to classify the packets into a class of service.
- IP flows can be consolidated and handled with a given set of QoS parameters by the QoS mechanisms.
- QoS Quality of Service
- a finite and discrete set of classes of service can enable QoS mechanisms to be less compute-intensive, to use less memory, fewer state machines, and therefore have better scaleability than having individual QoS mechanisms (or sets of parameters) for each individual IP flow.
- a network access device such as, e.g., a point to multi-point (PtMP) wireless broadband access system
- the total number of simultaneous IP flows typically will not exceed the range of 1000, and therefore the amount of processing overhead that could be required could permit a per-flow QoS differentiation without resorting to classes of service.
- class of service consolidation of IP flows provides advantages related to marketing, billing and administration.
- per-flow differentiation has not been used in a wireless environment (including radio frequencies transmitted over coaxial cables and satellite communications).
- IP precedence bits in a type of service (IP TOS) field can theoretically be used as a means to sort IP flows into classes of service.
- IETF RFC1349 proposed a set of 4-bit definitions with 5 different meanings: minimize delay; maximize throughput; maximize reliability; minimize monetary cost; and normal service.
- TOS type of service
- TCP governs transmission rate
- IP-centric wireless QoS mechanism An IP-centric wireless QoS mechanism. If a TCP mechanism is not managed, any wireless QoS mechanism can be overwhelmed or countered by wireless bandwidth factors. Before addressing the specific wireless factors that can impact TCP transmission speed, a review of TCP transmission rate mechanism is needed.
- TCP can control transmission rate by “sensing” when packet loss occurs. Because TCP/IP was created primarily for wireline environment with its extremely low inherent BER, such as those found over fiber optic lines, any packet loss is assumed by TCP to be due to network congestion, not loss through bit error. Therefore, TCP assumes that the transmission rate exceeded the capacity of the network, and responds by slowing the rate of transmission. However, packet loss in the wireless link segment is due primarily to inherently high BER, not congestion. The difference turns out to be not insubstantial.
- TCP can initially cause the transmission rate to ramp-up at the beginning of a packet flow, and is called slow-start mode.
- the rate can be continuously increased until there is a loss or time-out of the packet-receipt acknowledgment message.
- TCP can then “back-off, can decrease the transmission window size, and then can retransmit lost packets in the proper order at a significantly slower rate.
- TCP can then slowly increase the transmission rate in a linear fashion, which can be called congestion-avoidance mode.
- IP-centric wireless QoS mechanism preferably provides for packet retransmission without invoking TCP retransmission and consequent and unnecessary “whipsawing” of the transmission rate. This, along with several other factors, makes desirable creation of an IP-centric wireless media access control (MAC) layer.
- IP-centric MAC layer can be to mediate local retransmission of lost packets without signaling TCP and unnecessarily altering the TCP transmission speed.
- a primary task of the IP-centric wireless MAC layer is to provide for shared access to the wireless medium in an orderly and efficient manner.
- the MAC layer according to the present invention, Proactive Reservation-based Intelligent Multimedia-aware Media Access (PRIMMA) layer, available from Malibu Networks Inc., of Calabasas, Calif., can also schedule all packet transmissions across the wireless medium on the basis of, e.g., IP flow type, service level agreements (SLAs), and QoS considerations.
- PRIMMA Proactive Reservation-based Intelligent Multimedia-aware Media Access
- the inherently high bit error rate (BER) of wireless transmission can make an occurrence of problems known as congestion collapse or global synchronization collapse more likely than in a wireline environment.
- BER bit error rate
- the TCP senders can all go into TCP slow start mode by shrinking their transmission window sizes and by pausing momentarily. The multiple senders can then all attempt to retransmit the lost packets simultaneously. Because they can all start transmitting again in rough synchrony, a possibility of creating congestion can arise, and the cycle can start all over again.
- an occurrence of burst noise can cause packet loss from many IP streams simultaneously.
- the TCP transmission rate mechanisms of the TCP senders can assume that packet loss was due to congestion, and they can all back-off in synchrony.
- the senders can restart in rough synchrony, and indeed can now create real congestion in the wireless link segment.
- This cyclical behavior can continue for some time, and can possibly cause unpredictable system performance. This can be due in part to overflowing system queues which can cause more packets to be dropped and can cause more unproductive retransmissions. This can degenerate into a “race” state that could take many minutes before re-establishing stability; this can have an obvious negative impact on QoS.
- random early detection can be used to circumvent global synchronization. By randomly selecting packets from randomly selected packet flows before congestion collapse occurs, global synchronization can be avoided. Queues can be monitored, and when queue depth exceeds a preset limit, RED can be activated, activating asynchronously the TCP senders' transmission rate controllers. This can avoid the initial congestion which would otherwise result in collapse and then global synchronization.
- the packets to be discarded can be done with consideration to packet priority or type. While still random, the probability of discard for a given flow can be a function of the by packet priority or type.
- weighted random early detection WRED
- WRED weighted random early detection
- IP-centric wireless system separately manages the TCP transmission window of the TCP sender remotely by transmitting a packet receipt-acknowledgment before the TCP sender detects a lost packet and initiates retransmission along with an unnecessary reset of the transmission rate.
- This IP-centric wireless system TCP transmission window manager communicates with the MAC layer in order to be aware of the status of all packets transmitted over the wireless medium.
- IP-centric wireless system architecture and design range from queue buffer capacity to local congestion avoidance strategies. Because wireless systems have the added burden of a high inherent BER, the effect of network-wide congestion behavior on local (wireless media channel) congestion avoidance strategies must be properly gauged and countered. For this reason, it is desirable that congestion avoidance algorithms of the IP-centric wireless system be crafted to optimize traffic flow with new mathematical and engineering considerations that until very recently were not apparent or available to system designers.
- IP-centric wireless system design cannot be done with the conventional wireline system design approaches without resulting in very low system performance characteristics.
- bandwidth utilization, real time multimedia quality, and overall system QoS provide for a dramatically lower end-user experience.
- the IP-centric wireless system With a range of data flows, each having different bandwidth, latency and jitter requirements, for the achievement of high QoS as perceived by the end user, it is desirable that the IP-centric wireless system be able to manage QoS mechanism parameters over a wide range, and in real time.
- the QoS mechanism must be able to alter system behavior to the extent that one or more data flows corresponding to specific applications be switched on and off from appropriate end users in a transparent manner. This approach is in contrast to other QoS mechanisms that seek to achieve high QoS by establishing circuit-centric connections from end to end without regard for an underlying application's actual QoS requirements.
- providing a QoS mechanism that is application-specific rather than circuit-specific, scarce wireless bandwidth can be conserved and dynamically allocated where needed by the QoS mechanisms associated with each application type.
- the present invention's proactive reservation-based intelligent multimedia-aware media access (PRIMMA) media access control (MAC) layer provides an application switching function of the IP-centric wireless QoS mechanism. Once the nature and QoS requirements of each IP stream are determined by other portions of the system, this information is communicated to the PRIMMA MAC layer so that the IP flows of each application can be switched to appropriate destinations in a proper priority order.
- PRIMMA proactive reservation-based intelligent multimedia-aware media access
- MAC media access control
- IP streams that originate from a local user's CPE application-level information about the nature of the application can be used by the system to assign appropriate QoS mechanism parameters to the IP stream.
- information about the IP streams for use in configuring the appropriate QoS mechanism parameters can be extracted from packet headers.
- the information about the IP streams is communicated “vertically” in the protocol stack model from the application layer (i.e. OSI level 7) to the PRIMMA MAC layer (i.e. OSI level 2) for bandwidth reservation and application switching purposes.
- IP-centric wireless system Based on a specific set of QoS requirements of each IP application flow in the IP-centric wireless system, applications are switched in a “proactive” manner by appropriate reservations of bandwidth over the wireless medium.
- the wireless transmission frames in each direction are constructed in a manner dictated by the individual QoS requirements of each IP flow.
- QoS requirements By using QoS requirements to build the wireless transmission frames, optimal QoS performance can result over the entire range of applications being handled by the system. For example, latency and jitter sensitive IP telephony, other H.323 compliant IP streams, and real-time audio and video streams can be given a higher priority for optimal placement in the wireless transmission frames.
- HTTP hypertext transport protocol
- FTP file transfer protocol
- Wireless end users are separated from a high speed, low BER wireline backbone by a lower speed, high BER wireless segment which can be subject to burst error events.
- TCP/IP traffic that traverses the wireless segment can experience frequent packet loss that, without intervention, can create congestion collapse and global synchronization as previously discussed. Therefore, it is desirable that the present invention's IP-centric wireless system make use of a TCP transmission rate agent that can monitor packet loss over the wireless segment, and can manage the remote TCP transmission rate function by recreating and transmitting any lost packet acknowledgments.
- the PRIMMA MAC layer can itself retransmit any lost packets over the wireless medium.
- IP-centric wireless TCP transmission rate agent or “adjunct” can also flow-control the IP streams when necessary, and in accordance with the QoS requirements of the IP flows. All IP-centric wireless TCP transmission rate agent functionality can be transparent to both local and remote hosts and applications.
- FIG. 1A is a block diagram providing an overview of a standard telecommunications network 100 providing local exchange carrier (LEC) services within one or more local access and transport areas (LATAs).
- Telecommunications network 100 can provide a switched voice connection from a calling party 102 to a called party 110 .
- FIG. 1A is shown to also include a private branch exchange 112 which can provide multiple users access to LEC services by, e.g., a private line.
- Calling party 102 and called party 110 can be ordinary telephone equipment, key telephone systems, a private branch exchange (PBX) 112 , or applications running on a host computer.
- Network 100 can be used for modem access as a data connection from calling party 102 to, for example, an Internet service provider (ISP) (not shown).
- ISP Internet service provider
- Network 100 can also be used for access to, e.g., a private data network.
- calling party 102 can be an employee working on a notebook computer at a remote location who is accessing his employer's private data network through, for example, a dial-up modem connection.
- FIG. 1A includes end offices (EOs) 104 and 108 .
- EO 104 is called an ingress EO because it provides a connection from calling party 102 to public switched telephone network (PSTN) facilities.
- PSTN public switched telephone network
- EO 108 is called an egress EO because it provides a connection from the PSTN facilities to a called party 110 .
- the PSTN facilities associated with telecommunications network 100 include an access tandem (AT) (not shown) at points of presence (POPs) 132 and 134 that can provide access to, e.g., one or more inter-exchange carriers (IXCs) 106 for long distance traffic, see FIG. 2A .
- AT access tandem
- POPs points of presence
- IXCs inter-exchange carriers
- IXC 106 could also be, for example, a CLEC, or other enhanced service provider (ESP), an international gateway or global point-of-presence (GPOP), or an intelligent peripheral (IP).
- ESP enhanced service provider
- GPOP global point-of-presence
- IP intelligent peripheral
- FIG. 1A also includes a private branch exchange (PBX) 112 coupled to EO 104 .
- PBX 112 couples calling parties 124 and 126 , fax 116 , client computer 118 and associated modem 130 , and local area network 128 having client computer 120 and server computer 122 coupled via an associated modem 130 .
- PBX 112 is a specific example of a general class of telecommunications devices located at a subscriber site, commonly referred to as customer premises equipment (CPE).
- CPE customer premises equipment
- Network 100 also includes a common channel interactive signaling (CCIS) network for call setup and call tear down.
- FIG. 1 includes a Signaling System 7 (SS7) signaling network 114 .
- Signaling network 114 will be described further below with reference to FIG. 2B .
- FIG. 2A is a block diagram illustrating an overview of a standard telecommunications network 200 , providing both LEC and IXC carrier services between subscribers located in different LATAs.
- Telecommunications network 200 is a more detailed version of telecommunications network 100 .
- Calling party 102 a and called party 110 a are coupled to EO switches 104 a and 108 a , respectively.
- calling party 102 a is homed to ingress EO 104 a in a first LATA
- called party 110 a is homed to an egress EO 108 a in a second LATA.
- Calls between subscribers in different LATAs are long distance calls that are typically routed to IXCs.
- Sample IXCs in the United States include AT&T, MCI and Sprint.
- Telecommunications network 200 includes access tandems (AT) 206 and 208 .
- AT 206 provides connection to points of presence (POPs) 132 a , 132 b , 132 c and 132 d .
- POPs points of presence
- IXCs 106 a , 106 b and 106 c provide connection between POPs 132 a , 132 b and 132 c (in the first LATA) and POPs 134 a , 134 b and 134 c (in the second LATA).
- Competitive local exchange carrier (CLEC) 214 provides an alternative connection between POP 132 d and POP 134 d .
- POPs 134 a , 134 b , 134 c and 134 d are connected to AT 208 , which provides connection to egress EO 108 a .
- Called party 110 a can receive calls from EO 108 a , which is its homed EO.
- an AT 206 can also be, for example, a CLEC, or other enhanced service provider (ESP), an international gateway or global point-of-presence (GPOP), or an intelligent peripheral.
- ESP enhanced service provider
- GPOP global point-of-presence
- Network 200 also includes calling party 102 c homed to CLEC switch 104 c .
- CLECs gained permission to compete for access within the local RBOCs territory.
- RBOCs are now referred to as incumbent local exchange carriers (ILECs).
- ILECs incumbent local exchange carriers
- Network 200 further includes a fixed wireless CLEC 209 .
- Example fixed wireless CLECs are Teligent Inc., of Vienna, VA, WinStar Communications Inc., Advanced Radio Telecom Corp. And the BizTel unit of Teleport Communications Group Inc.
- Fixed wireless CLEC 209 includes a wireless transceiver/receiver radio frequency (RF) tower 210 in communication over an RF link to a subscriber transceiver RF tower 212 .
- Subscriber RF tower 212 is depicted coupled to a CPE box, PBX 112 b .
- PBX 112 b couples calling parties 124 b and 126 b , fax 116 b , client computer 118 b and associated modem 130 b , and local area network 128 b having client computer 120 b and server computer 122 b coupled via an associated modem 130 b.
- Network 200 also includes called party 110 a , a fax 116 a , client computer 118 a and associated modem 130 a , and cellular communications RF tower 202 and associated cellular subscriber called party 204 , all coupled to EO 108 a , as shown.
- EO 104 a , 108 a and AT 206 , 208 are part of a switching hierarchy.
- EO 104 a is known as a class 5 office and AT 208 is a class 3/4 office switch.
- An office classification was the number assigned to offices according to their hierarchical function in the U.S. public switched network (PSTN).
- PSTN public switched network
- An office class is a functional ranking of a telephone central office switch depending on transmission requirements and hierarchical relationship to other switching centers.
- a class 1 office was known as a Regional Center (RC), the highest level office, or the “office of last resort” to complete a call.
- a class 2 office was known as a Sectional Center (SC).
- RC Regional Center
- SC Sectional Center
- a class 3 office was known as a Primary Center (PC).
- a class 4 office was known as either a Toll Center (TC) if operators were present, or otherwise as a Toll Point (TP).
- a class 5 office was an End Office (EO), i.e., a local central office, the lowest level for local and long distance switching, and was the closest to the end subscriber. Any one center handles traffic from one or more centers lower in the hierarchy. Since divestiture and with more intelligent software in switching offices, these designations have become less firm. Technology has distributed functionality closer to the end user, diffusing traditional definitions of network hierarchies and the class of switches.
- ISPs Internet Service Providers
- the PSTN can provide calling party 102 a a data connection to an ISP (i.e. similar to client 118 b ).
- Network 200 can also include an Internet service provider (ISP) (not shown) which could include a server computer 122 coupled to a data network 142 as will be discussed further below with reference to FIG. 1B .
- ISP Internet service provider
- the Internet is a well-known, worldwide network comprising several large networks connected together by data links. These links can include, for example, Integrated Digital Services Network (ISDN), T1, T3, FDDI and SONET links.
- ISDN Integrated Digital Services Network
- T1, T3, FDDI and SONET links can include, for example, Integrated Digital Services Network (ISDN), T1, T3, FDDI and SONET links.
- ISDN Integrated Digital Services Network
- an internet can be a private network interconnecting a plurality of LANs and/or WANs, such as, for example, an intranet.
- An ISP can provide Internet access services for subscribers such as client 118 b.
- client 118 b can use a host computer connected to a modem (modulator/demodulator) 130 b .
- the modem can modulate data from the host computer into a form (traditionally an analog form) for transmission to the LEC facilities.
- the LEC facilities convert the incoming analog signal into a digital form.
- the data is converted into the point-to-point protocol (PPP) format.
- PPP is a well-known protocol that permits a computer to establish a connection with the Internet using a standard modem.
- TCP/IP internet protocol
- UDP/IP internet protocol
- ATM asynchronous transfer mode
- SIP serial line interface protocol
- PPP point-to-point
- PPTP point-to-point tunneling protocol
- NETBEUI NETBIOS extended user interface
- Appletalk protocol format a DECnet, BANYAN/VINES
- IPX internet packet exchange
- ICMP internet control message protocol
- FIGS. 1A, 2A and other figures described herein include lines which may refer to communications lines or which may refer to logical connections between network nodes, or systems, which are physically implemented by telecommunications carrier devices.
- These carrier devices include circuits and network nodes between the circuits including, for example, digital access and cross-connect system (DACS), regenerators, tandems, copper wires, and fiber optic cable.
- DAS digital access and cross-connect system
- regenerators regenerators
- tandems copper wires
- fiber optic cable fiber optic cable
- a telecommunications carrier as defined here, can include, for example, a LEC, a CLEC, an IXC, an Enhanced Service Provider (ESP), a global or international services provider such as a global point-of-presence (GPOP), and an intelligent peripheral.
- a LEC LEC
- CLEC CLEC
- IXC IXC
- ESP Enhanced Service Provider
- GPOP global point-of-presence
- EO 104 a and AT 206 are connected by a trunk.
- a trunk connects an AT to an EO.
- a trunk can be called an inter machine trunk (IMT).
- IMT inter machine trunk
- AT 208 and EO 108 a are connected by a trunk which can be an IMT.
- EO 104 and PBX 112 can be connected by a private line with a dial tone.
- a private line can also connect an ISP (not shown) to EO 104 , for example.
- a private line with a dial tone can be connected to a modem bay or access converter equipment at the ISP. Examples of a private line are a channelized T1 or integrated services digital network (ISDN) primary rate interface (PRI).
- ISDN integrated services digital network
- PRI primary rate interface
- An ISP can also attach to the Internet by means of a pipe or dedicated communications facility.
- a pipe can be a dedicated communications facility.
- a private line can handle data modem traffic to and from an ISP.
- Trunks can handle switched voice traffic and data traffic.
- trunks can include digital signals DS1-DS4 transmitted over T1-T4 carriers.
- Table 2 provides typical carriers, along with their respective digital signals, number of channels, and bandwidth capacities.
- TABLE 2 Bandwidth Digital Number of Designation in Megabits signal channels of carrier per second (Mbps) DS0 1 None 0.064 DS1 24 T1 1.544 DS2 96 T2 6.312 DS3 672 T3 44.736 DS4 4032 T4 274.176
- trunks can include optical carriers (OCs), such as OC-1, OC-3, etc.
- Table 3 provides typical optical carriers, along with their respective synchronous transport signals (STSs), ITU designations, and bandwidth capacities.
- STSs synchronous transport signals
- STS synchronous Union
- STS synchronous Union
- STS synchronous Union
- STS synchronous Union
- STS synchronous Union
- Mbps OC-1 STS-1 51.84 OC-3 STS-3 STM-1 155.52
- OC-9 STS-9 STM-3 466.56 OC-12 STS-12 STM-4 622.08 OC-18 STS-18 STM-6 933.12 OC-24 STS-24 STM-8 1244.16 OC-36 STS-36 STM-12 1866.24 OC-48 STS-48 STM-16 2488.32
- a private line is a connection that can carry data modem traffic.
- a private line can be a direct channel specifically dedicated to a customer's use between two specified points.
- a private line can also be known as a leased line.
- a private line is an ISDN/primary rate interface (ISDN PRI) connection.
- An ISDN PRI connection can include a single signal channel (called a data or D channel) on a T1, with the remaining 23 channels being used as bearer or B channels. (Bearer channels are digital channels that bear voice and data information.) If multiple ISDN PRI lines are used, the signaling for all of the lines can be carried over a single D channel, freeing up the remaining lines to carry only bearer channels.
- Telecommunications traffic can be sent and received from any network node of a telecommunications carrier.
- a telecommunications carrier can include, for example, a LEC, a CLEC, an IXC, and an Enhanced Service Provider (ESP).
- this traffic can be received from a network node which is, for example, a class 5 switch, such as EO 104 a , or from a class 3/4 switch, such as AT 206 .
- the network system can also be, for example, a CLEC, or other enhanced service provider (ESP), an international gateway or global point-of-presence (GPOP), or an intelligent peripheral.
- ESP Enhanced Service Provider
- Voice traffic refers, for example, to a switched voice connection between calling party 102 a and called party 110 a . It is important to note that this is on a point-to-point dedicated path, i.e., that bandwidth is allocated whether it is being used or not.
- a switched voice connection is established between calling party 102 a and EO 104 a , then to AT 206 then over an IXC's network such as that of IXC 106 a to AT 208 and then to EO 108 a and over a trunk to called party 110 a .
- AT 206 or IXC 106 a can also be, for example, a CLEC, or other enhanced service provider (ESP), an international gateway or global point-of-presence (GPOP), or an intelligent peripheral.
- ESP enhanced service provider
- GPOP global point-of-presence
- calling party 102 a is a computer with a data connection to a server over the voice network.
- Data traffic refers, for example, to a data connection between a calling party 102 a (using a modem) and a server 122 b that could be part of an ISP.
- a data connection can be established, e.g., between calling party 102 a and EO 104 a , then to AT 206 , then to CLEC 214 , then over a fixed wireless CLEC 209 link to PBX 112 b to a modem 130 b associated with server 122 b.
- FIG. 2B illustrates signaling network 114 in greater detail.
- Signaling network 114 is a separate network used to handle the set up, tear down, and supervision of calls between calling party 102 and called party 110 .
- Signaling network 114 in the given example is the Signaling System 7 (SS7) network.
- Signaling network 114 includes service switching points (SSPs) 236 , 238 , 240 and 242 , signal transfer points (STPs) 222 , 224 , 226 , 228 , 230 and 232 , and service control point (SCP) 234 .
- SSPs service switching points
- STPs signal transfer points
- SCP service control point
- the SSPs are the portions of the backbone switches providing SS7 functions.
- the SSPs can be, for example, a combination of a voice switch and an SS7 switch, or a computer connected to a voice switch.
- the SSPs communicate with the switches using primitives, and create packets for transmission over the SS7 network.
- EOs 104 a , 108 a and ATs 206 , 208 can be respectively represented in SS7 signaling network 114 as SSPs 236 , 238 , 240 and 242 . Accordingly, the connections between EOs 104 a , 108 a and ATs 206 , 208 (presented as dashed lines) can be represented by connections 254 , 256 , 258 and 268 . The types of these links are described below.
- the STPs act as routers in the SS7 network, typically being provided as adjuncts to in-place switches.
- the STPs route messages from originating SSPs to destination SSPs.
- STPs can and are typically provided in “mated pairs” to provide redundancy in the event of congestion or failure and to share resources (i.e., load sharing is done automatically).
- STPs can be arranged in hierarchical levels, to provide hierarchical routing of signaling messages. For example, mated STPs 222 , 224 and mated STPs 226 , 228 are at a first hierarchical level, while mated STPs 230 , 232 are at a second hierarchical level.
- SCPs provide database functions. SCPs can be used to provide advanced features in an SS7 network, including routing of special service numbers (e.g., 800 and 900 numbers), storing information regarding subscriber services, providing calling card validation and fraud protection, and offering advanced intelligent network (AIN) services. SCP 234 is connected to mated STPs 230 and 232 .
- special service numbers e.g. 800 and 900 numbers
- AIN advanced intelligent network
- mated STP pairs are connected by C links.
- STPs 222 , 224 , mated STPs 226 , 228 , and mated STPs 230 , 232 are connected by C links (not labeled).
- SSPs 236 , 238 and SSPs 240 , 242 are connected by F links 262 and 264 .
- Mated STPs 222 , 224 and mated STPs 226 , 228 which are at the same hierarchical level, are connected by B links 270 , 272 , 244 and 282 .
- Mated STPs 222 , 224 and mated STPs 230 , 232 which are at different hierarchical levels, are connected by D links 266 , 268 , 274 and 276 .
- mated STPs 226 , 228 and mated STPs 230 , 232 which are at different hierarchical levels, are connected by D links 278 , 280 , 246 and 248 .
- SSPs 236 , 238 and mated STPs 222 , 224 are connected by A links 254 and 256 .
- SSPs 240 , 242 and mated STPs 226 , 228 are connected by A links 258 and 260 .
- SSPs 236 , 238 can also be connected to mated STPs 230 , 232 by E links (not shown). Finally, mated STPs 230 , 232 are connected to SCP 234 by A links 250 and 252 .
- a links connect SSPs to STPs, or SCPs to STPs, providing network access and database access through the STPs.
- Bridge (B) links links connect mated STPs to other mated STPs.
- Cross (C) links C links connect the STPs in a mated pair to one another. During normal conditions, only network management messages are sent over C links.
- Diagonal (D) links connect the mated STPs at a primary hierarchical level to mated STPs at a secondary hierarchical level.
- Extended (E) links E links connect SSPs to remote mated STPs, and are used in the event that the A links to home mated STPs are congested.
- Fully associated (F) links F links provide direct connections between local SSPs (bypassing STPs) in the event there is much traffic between SSPs, or if a direct connection to an STP is not available. F links are used only for call setup and call teardown.
- a calling party using a telephone connected to an ingress EO switch dials a telephone number of a called party.
- the telephone number is passed from the telephone to the SSP at the ingress EO of the calling party's local exchange carrier (LEC).
- LEC local exchange carrier
- the SSP can process triggers and internal route rules based on satisfaction of certain criteria.
- the SSP can initiate further signaling messages to another EO or access tandem (AT), if necessary.
- the signaling information can be passed from the SSP to STPs, which route the signals between the ingress EO and the terminating end office, or egress EO.
- the egress EO has a port designated by the telephone number of the called party.
- the call is set up as a direct connection between the EOs through tandem switches if no direct trunking exists or if direct trunking is full. If the call is a long distance call, i.e., between a calling party and a called party located in different local access transport areas (LATAs), then the call is connected through an inter exchange carrier (IXC) switch. Such a long distance call is commonly referred to as an inter-LATA call. LECs and IXCs are collectively referred to as the public switched telephone network (PSTN).
- PSTN public switched telephone network
- Circuit switching dedicates a channel to a call for the duration of the call.
- circuit switching a large amount of switching bandwidth is required to handle the high volume of voice calls. This problem is compounded by the use of voice circuits to carry data communications over the same equipment that were designed to handle voice communications.
- TDM Time Division Multiplexed
- TDM circuit switching creates a full-time connection or a dedicated circuit between any two attached devices for the duration of the connection.
- TDM divides the bandwidth down int fixed time slots in which there can be multiple time slots, each with its own fixed capacity, available.
- Each attached device on the TDM network is assigned a fixed portion of the bandwidth using one or more time slots depending on the need for speed.
- the data is merely placed in this time slot without any extra overhead such as processing or translations. Therefore, TDM is protocol transparent to the traffic being carried. Unfortunately, however, when the device is not sending data, the time slots remain empty, thereby wasting the use of the bandwidth.
- a higher-speed device on the network can be slowed down or bottled up waiting to transmit data, but the capacity that sits idle cannot be allocated to this higher priority device for the duration of the transmission.
- TDM is not well suited for the bursts of data that are becoming the norm for the data needs in today's organization.
- FIG. 1B depicts an example network 148 including workstations 144 and 146 coupled to data network 142 .
- Data network 142 can act as a wide area network (WAN) for coupling a plurality of local area networks (LANs) together.
- Network 148 includes an example local area network including a plurality of host computers such as, e.g., client workstation 138 and server 136 , coupled together by wiring including network interface cards (NICs) and a hub, such as, e.g., an Ethernet hub.
- the LAN is coupled to data network 142 by a network router 140 which permits data traffic to be routed to workstations 144 and 146 from client 138 and server 136 .
- data network 148 transports traffic using packet switching.
- Packet switching provides for more efficient use of a communication channel than does circuit switching.
- Packet switched networks transport packets of information which can include various types of data such as, e.g., digitized voice, data, and video.
- packet switching many different calls can share a communication channel rather than the channel being dedicated to a single call.
- voice call for instance, digitized voice information might be transferred between the callers only 60% of the time, with silence being transferred the other 40% of the time.
- the voice call could tie-up a communications channel that could have 50% of its bandwidth, unused because of the silence.
- a data call information might be transferred between two computers only 10% of the time. With the data call, 90% of the channel's bandwidth may go unused. In contrast, a packet-switched connection would permit the voice call, the data call and possibly other call information to all be sent over the same channel.
- IP Internet Protocol
- a packet-switched network there is no single, unbroken physical connection between sender and receiver.
- the packets from many different calls share network bandwidth with other transmissions.
- the packets can be sent over many different routes at the same time toward the destination, and can then be reassembled at the receiving end. The result is much more efficient use of a telecommunications network's bandwidth than could be achieved with circuit-switching.
- Data network 142 can include a plurality of network routers 140 .
- Network routers are used to route information between multiple networks. Routers act as an interface between two or more networks. Routers can find the best path between any two networks, even if there are several different networks between the two networks.
- Network routers can include tables describing various network domains.
- a domain can be thought of as a local area network (LAN) or wide area network (WAN).
- Information can be transferred between a plurality of LANs and/or WANs via network routers.
- Routers look at a packet and determine from the destination address in the header of the packet, the destination domain of the packet. If the router is not directly connected to the destination domain, then the router can route the packet to the router's default router, i.e. a router higher in a hierarchy of routers. Since each router has a default router to which it is attached, a packet can be transmitted through a series of routers to the destination domain and to the destination host bearing the packet's final destination address.
- LAN local area network
- WAN wide area network
- LANs Local Area Networks
- WANs Wide Area Networks
- a local area network can be thought of as a plurality of host computers interconnected via network interface cards (NICs) in the host computers.
- NICs network interface cards
- the NICs are connected via, for example, copper wires so as to permit communication between the host computers.
- Examples of LANs include an ethernet bus network, an ethernet switch network, a token ring network, a fiber digital data interconnect (FDDI) network, and an ATM network.
- FDDI fiber digital data interconnect
- a wide area network is a network connecting host computers over a wide area.
- network interfaces interconnecting the LANs and WANs must exist.
- An example of a network interface is a router discussed above.
- a network designed to interconnect multiple LANs and/or WANs is known as an internet (with a lower case “i”).
- An internet can transfer data between any of a plurality of networks including both LANs and WANs. Communication occurs between host computers on one LAN and host computers on another LAN via, for example, an internet protocol (IP) protocol.
- IP internet protocol
- the IP protocol is used to assign each host computer of a network, a unique IP address enabling packets to be transferred over the internet to other host computers on other LANs and/or WANs that are connected to the internet.
- An internet can comprise a router interconnecting two or more networks.
- the “Internet” (with a capital “I”) is a global internet interconnecting networks all over the world.
- the Internet includes a global network of computers which intercommunicate via the internet protocol (IP) family of protocols.
- IP internet protocol
- IP internet protocol
- Routing is done at the middle network architecture levels on such protocols as IPX or TCP/IP. Switching is done at a lower level, at layer 2 of the OSI model, i.e. the media access control (MAC) layer.
- MAC media access control
- ATM Asynchronous Transfer Mode
- VCs virtual circuits
- VPs virtual paths
- TPs transmission paths
- a circuit-centric network like ATM sets up virtual circuits between source and destination nodes which provide QoS by dedicating the virtual circuit to a specific traffic type.
- Some networks are packet-centric networks. Unlike a circuit-centric network, a packet-centric network does not use dedicated circuits through which to transfer packets.
- TCP/IP performs a packetization of user data to be sent between and among the various systems on the IP network.
- IP i.e. network
- IP is in a sense a dumb protocol.
- IP does not specifically route the call across a specific channel. Instead, it places a header on the packet and lets the network deal with it.
- the outward bound packets can take various routes to get from a source to a destination.
- IP makes its best attempt to deliver the packets to the destination network interface; but it makes no assurances that data will arrive, that data will be free of errors, and that nodes along the way will concern themselves with the accuracy of the data and sequencing, or come back and alert the originator that something is wrong in the delivery mechanism.
- IP routing of a packet the packet can be sent along the network in a loop, so IP has a mechanism in its header information to allow a certain number of “hops” or what is called “time to live” on the network.
- IP has a counter mechanism that decrements every time the packet passes through a network node. If the counter expires, the node will discard the packet.
- TCP provides controls to ensure that a reliable data stream is sent and delivered.
- TCP puts a byte count header on information that will be delivered to the IP protocol layer and encapsulates it as part of the packet.
- the receiving end, when it gets packets is responsible for resequencing the packets and ensuring its accuracy.
- the byte count acknowledgment or nonacknowledgment message can be sent back to the sending end, prompting the sending end to resend the bytes necessary to fill in the remaining portions of the packet flow.
- TCP buffers additional packets until after resending the nonacknowledged packet.
- FIG. 1C illustrates a conventional video network 150 such as, e.g., a cable television (CATV) network.
- Video network 150 can include video network 160 coupled to various video capture, distribution links and video output monitors.
- Video input devices can include, e.g., conference cameras 154 and 158 .
- Video output devices can include, e.g., televisions 152 and 156 .
- Video network 160 can include a variety of head end (i.e. the serving end of the cable) and distribution link equipment such as, e.g., coaxial cable television (CATV) and national television standard code (NTSC) tuner equipment for multiplexing various video signals.
- Standard cable systems have an immense amount of bandwidth available to them.
- CATV is a wireless communication method.
- the frequencies of many video signals are distributed along the cable at the same time.
- a television tuner selects a particular channel by tuning into a specific frequency or a “frequency band.”
- a cable television CATV video network often includes only one physical cable, a number of channels can simultaneously be present on the cable. This accomplished by sharing the frequency spectrum of the cable and assigning different frequency ranges to different channels using frequency division multiplexing (FDM).
- FDM frequency division multiplexing
- a broadband cable communications system can operate exactly like a CATV system.
- a counter to this FDM technique is division of the cable not divided into frequency bands but into time slots using time-division multiplexing (TDM). With TDM, each transmitting video station can grab the entire bandwidth of the cable, but only for a very short period of time.
- the cable is currently capable of carrying up to 750 MHz.
- FDM techniques can be used to divide the channels into a number of dedicated logical channels. Innovations have allowed a time division multiple access (TDMA) within an FDM channel.
- TDMA time division multiple access
- a cable system can allow multiplexing on two separate dimensions to achieve data channels over a cable.
- the channels can be separated by FDM, and in a frequency band the channel can then be shared via TDMA among multiple users.
- the most common of the TDMA access methods on broadband cable is CSMA/CD developed by XEROX for Ethernet.
- a midsplit arrangement can accommodate two-way simultaneous transmission. Another way to accommodate this is to use a dual cable system.
- Broadband is inherently an analog signaling method. Because video cameras, e.g., are also analog devices, a signal from a video camera (or video recorder) can be directly transmitted onto a broadband cable channel in red/green/blue (RGB) format.
- RGB red/green/blue
- FIG. 2C illustrates an example network 286 carrying voice, data and video traffic over a data network.
- Network 286 includes calling party 102 b homed to EO 104 b , where EO 104 b is linked to a telephony gateway 288 b .
- Network 286 also includes called party 110 c homed to EO 108 c , where EO 108 c is linked to a telephony gateway 288 c .
- EOs 104 b and 108 c and telephony gateways 288 b and 288 c can be linked to signaling network 114 .
- Telephony gateways 288 b and 288 c can also be coupled to data network 142 via routers 140 b and 140 c , respectively.
- telephony gateways 288 b and 288 c can be used to packetize voice traffic and signaling information into a form appropriate for transport over data network 142 . It would be apparent to those skilled in the art that telephony gateways 288 b and 288 c can include various computer devices designed for controlling, setting up and tearing down calls. Voice calls delivered over the data network can include, e.g., voice over packet (VoP), voice over data (VoD), voice over internet protocol (VoIP), voice over asynchronous transfer mode (VoATM), voice over frame (VoF).
- VoIP voice over packet
- VoIP voice over internet protocol
- VoIP voice over asynchronous transfer mode
- VoF voice over frame
- a telephony gateway 288 b and 288 c is a media gateway control protocol (MGCP) compliant gateway available from various vendors such as, e.g., Lucent, of Parsippany, N.J., and CISCO of Palo Alto, Calif. It is important to note that other network devices such as a softswitch available from several member companies of the SoftSwitch Consortium, including Level 3 Communications of Louisville, Colo., could also be necessary to enable transport of, e.g., VoIP.
- MGCP media gateway control protocol
- Network 286 is depicted to include other devices coupled to data network 142 .
- an H.323 compliant video-conferencing system 289 is illustrated including a camera 154 g and television 152 g and router 140 g .
- a local area network (LAN) 128 a including a client workstation 138 a and a server 136 a are coupled to data network 142 via network router 140 a .
- LAN 128 f having a client workstation 138 f and a server 136 f are coupled via network router 140 f to data network 142 .
- Data Network 142 can provide for routing of packets of information through network routing devices from source locations to destination locations coupled to data network 142 .
- data network 142 can route internet protocol (IP) packets for transmission of voice and data traffic from telephony gateway 288 b to telephony gateway 288 c .
- IP internet protocol
- Data Network 142 represents any art-recognized packet centric data network.
- One well-known data network is the global Internet.
- Other examples include a private intranet, a packet-switched network, a frame relay network, and an asynchronous transfer mode (ATM) circuit-centric network.
- ATM asynchronous transfer mode
- data network 142 can be an IP packet-switched network.
- a packet-switched network such as, e.g., an IP network, unlike a circuit-switched network, does not require dedicated circuits between originating and terminating locations within the packet switched network.
- the packet-switched network instead breaks a message into pieces known as packets of information. Such packets can then be encapsulated with a header which designates a destination address to which the packet must be routed.
- the packet-switched network then takes the packets and routes them to the destination designated by the destination address contained in the header of the packet.
- Routers 140 a , 140 b , 140 c , 140 d , 140 e , 140 f and 140 g can be connected to one another via physical media such as, for example, optical fiber link connections, and copper wire connections. Routers 140 a - g transfer information between one another and intercommunicate according to routing protocols.
- Data network 142 could be implemented using any data network such as, e.g., IP networks, ATM virtual circuit-centric networks, frame relay networks, X.25 networks, and other kinds of LANs and WANs. Other data networks could be used interchangeably for data network 142 such as, for example, FDDI, Fast Ethernet, or an SMDS packet switched network.
- Frame relay and ATM are connection-oriented, circuit-centric services.
- Switched multi-megabyte data service (SMDS) is a connection-oriented mass packet service that offers speeds up to 45 Mbps.
- ATM Asynchronous Transfer Mode
- ATM is a high-bandwidth, low-delay, fixed-sized cell-based multiplexing network technology. Bandwidth capacity is segmented into 53-byte cells, having a header and payload fields. ATM uses fixed-length cells with the belief that the fixed length cells can be switched more easily in hardware than variable size packets and thus should result in faster transmissions in certain environments.
- the ATM environment sets up virtual circuits in a circuit-centric manner.
- ATM segments variable length IP packet flows into fixed size cells using a segmentation and resequencing algorithm (SAR).
- SAR segmentation and resequencing algorithm
- Each ATM cell contains a 48-byte payload field and a 5-byte header that identifies the so-called “virtual circuit” of the cell.
- ATM is thought suitable for high-speed combinations of voice, data, and video services.
- ATM has recently been doubling its maximum speed every year.
- ATM is defined by a protocol standardized by the International Telecommunications Union (ITU-T), American National Standards Institute (ANSI), ETSI, and the ATM Forum.
- ATM comprises a number of building blocks, including transmission paths, virtual paths, and virtual channels.
- Asynchronous transfer mode (ATM) is a cell based switching and multiplexing technology designed to be a general purpose connection-oriented transfer mode for a wide range of telecommunications services.
- ATM can also be applied to LAN and private network technologies as specified by the ATM Forum.
- ATM handles both connection-oriented traffic directly or through adaptation layers, or connectionless traffic through the use of adaptation layers.
- ATM virtual connections may operate at either a constant bit rate (CBR) or a variable bit rate (VBR).
- CBR constant bit rate
- VBR variable bit rate
- Each ATM cell sent into an ATM network contains a small header including information that establishes a virtual circuit-centric connection from origination to destination. All cells are transferred, in sequence, over this virtual connection.
- ATM provides either permanent or switched virtual connections (PVCs or SVCs).
- PVCs or SVCs switched virtual connections
- ATM is asynchronous because the transmitted cells need not be periodic as time slots of data are required to be in synchronous transfer mode (STM).
- ATM uses an approach by which a header field prefixes each fixed-length payload.
- the ATM header identifies the virtual channel (VC). Therefore, time slots are available to any host which has data ready for transmission. If no hosts are ready to transmit, then an empty, or idle, cell is sent.
- VC virtual channel
- ATM permits standardization on one network architecture defining a multiplexing and a switching method.
- Synchronous optical network provides the basis for physical transmission at very high-speed rates.
- ATM can also support multiple quality of service (QoS) classes for differing application requirements by providing separate virtual circuits for different types of traffic, depending on delay and loss performance.
- QoS quality of service
- ATM can also support LAN-like access to available bandwidth.
- Cells are mapped into a physical transmission path, such as the North American DS1, DS3, and SONET; European, E1, E3, and E4; ITU-T STM standards; and various local fiber and electrical transmission payloads. All information is multiplexed and switched in an ATM network via these fixed-length cells.
- the ATM cell header field identifies cell type, and priority, and includes six portions.
- An ATM cell header includes a generic flow control (GFC), a virtual path identifier (VPI), a virtual channel identifier (VCI), a payload type (PT), a call loss priority (CLP), and a header error check (HEC).
- GFC generic flow control
- VPI virtual path identifier
- VCI virtual channel identifier
- PT payload type
- CLP call loss priority
- HEC header error check
- VPI and VCI hold local significance only, and identify the destination.
- GFC allows a multiplexer to control the rate of an ATM terminal.
- PT indicates whether the cell contains user data, signaling data, or maintenance information.
- CLP indicates the relative priority of the cell, i.e., lower priority cells are discarded before higher priority cells during congested intervals.
- HEC detects and corrects errors in the header.
- the ATM cell payload field is passed through the network intact, with no error checking or correction.
- ATM relies on higher-layer protocols to perform error checking and correction on the payload.
- a transmission control protocol TCP
- TCP transmission control protocol
- the fixed cell size simplifies the implementation of ATM switches and multiplexers and enables implementations at high speeds.
- ATM switches take traffic and segment it into the fixed-length cells, and multiplex the cells into a single bit stream for transmission across a physical medium.
- different kinds of traffic can be transmitted over an ATM network including voice, video, and data traffic.
- Video and voice traffic are very time-sensitive, so delay cannot have significant variations.
- Data can be sent in either connection-oriented or connectionless mode. In either case, data is not nearly as delay-sensitive as voice or video traffic.
- Data traffic as e.g., spread sheet data requires accurate transmission. Therefore, ATM conventionally must discriminate between voice, video, and data traffic. Voice and video traffic requires priority and guaranteed delivery with bounded delay, while data traffic requires, simultaneously, assurance of low loss.
- data traffic can also carry voice traffic, making it also time-dependent.
- VP virtual path
- VCs virtual circuits
- a transmission path can include one or more VPs.
- Each VP can include one or more VCs.
- multiple VCs can be trunked over a single VP.
- Switching can be performed on a transmission path, VPs, or at the level of VCs.
- ATM The capability of ATM to switch to a virtual channel level is similar to the operation of a private or public branch exchange (PBX) or telephone switch in the telephone world.
- PBX public branch exchange
- a PBX switch each channel within a trunk group can be switched.
- VC switches Devices which perform VC connections are commonly called VC switches because of the analogy to telephone switches.
- ATM devices which connect VPs are commonly referred to as VP cross-connects, by analogy with the transmission network.
- the analogies are intended for explanatory reasons, but should not be taken literally.
- An ATM cell-switching machine need not be restricted to switching only VCs and cross-connection to only VPs.
- VPC virtual path connection
- VCC virtual channel connection
- VPIs and VCIs are used to route calls through a network. Note that VPI and VCI values must be unique on a specific transmission path (TP).
- data network 142 can be any of a number of other data-type networks, including various packet-switched data-type networks, in addition to an ATM network.
- data network 142 can be a frame relay network. It would be apparent to persons having ordinary skill in the art, that a frame relay network could be used as data network 142 . Rather than transporting data in ATM cells, data could be transported in frames.
- Frame relay is a packet-switching protocol used in WANs that has become popular for LAN-to-LAN connections between remote locations. Formerly frame relay access would top out at about 1.5 Mbps. Today, so-called “high-speed” frame relay offers around 45 Mbps. This speed is still relatively slow as compared with other technology such as ATM.
- Frame relay services employ a form of packet-switching analogous to a streamlined version of X.25 networks.
- the packets are in the form of frames, which are variable in length.
- a frame relay network can accommodate data packets of various sizes associated with virtually any native data protocol.
- a frame relay network is completely protocol independent.
- a frame relay network embodiment of data network 142 does not undertake a lengthy protocol conversion process, and therefore offers faster and less-expensive switching than some alternative networks.
- Frame relay also is faster than traditional X.25 networks because it was designed for the reliable circuits available today and performs less-rigorous error detection.
- IP Internet Protocol
- data network 142 can be an internet protocol (IP) network over an ATM network. It would be apparent to those skilled in the art, that an internet protocol (IP) network over various other data link layer network such as, e.g., Ethernet, could be used as data network 142 . Rather than transporting data in fixed length ATM circuit-centric cells, data could be transported in variable length IP datagram packet-centric packets as segmented by TCP.
- IP data network can lie above any of a number of physical networks such as, for example, a SONET optical network.
- VPNs Virtual Private Networks
- a virtual private network is a wide area communications network operated by a telecommunications carrier that provides what appears to be dedicated lines when used, but that actually includes trunks shared among all customers as in a public network.
- a VPN can be provided as a service through a wireline network
- a VPN can be provided in a wireless network.
- a VPN can allow a private network to be configured within a public network.
- VPNs can be provided by telecommunications carriers to customers to provide secure, guaranteed, long-distance bandwidth for their WANs. These VPNs generally use frame relay or switched multi-megabyte data service (SMDS) as a protocol of choice because those protocols define groups of users logically on the network without regard to physical location.
- SMDS switched multi-megabyte data service
- ATM has gained favor as a VPN protocol as companies require higher reliability and greater bandwidth to handle more complex applications.
- VPNs using ATM offer networks of companies with the same virtual security and QoS as WANs designed with dedicated circuits.
- the Internet has created an alternative to VPNs, at a much lower cost, i.e. the virtual private Internet.
- the virtual private Internet (VPI) lets companies connect disparate LANs via the Internet.
- a user installs either a software-only or a hardware-software combination that creates a shared, secure intranet with VPN-style network authorizations and encryption capabilities.
- a VPI normally uses browser-based administration interfaces.
- the H.323 Recommendation for video conferencing will now be briefly overviewed.
- the H.323 standard provides a foundation for, for example, audio, video, and data communications across IP-based networks, including the Internet.
- multimedia products and applications from multiple vendors can interoperate, allowing users to communicate without concern for compatibility.
- H.323 promises to be the foundation of future LAN-based products multimedia applications.
- H.323 is an umbrella recommendation from the International Telecommunications Union (ITU) that sets standards for multimedia communications over Local Area Networks (LANs) that do not provide a guaranteed Quality of Service (QoS). These networks dominate today's corporate desktops and include packet-switched TCP/IP and IPX over Ethernet, Fast Ethernet and Token Ring network technologies. Therefore, the H.323 standards are important building blocks for a broad new range of collaborative, LAN-based applications for multimedia communications.
- ITU International Telecommunications Union
- LANs Local Area Networks
- QoS Quality of Service
- H.323 The H.323 specification was approved in 1996 by the ITU's Study Group 16. Version 2 was approved in January 1998.
- the standard is broad in scope and includes both stand-alone devices and embedded personal computer technology as well as point-to-point and multipoint conferences.
- H.323 also addresses call control, multimedia management, and bandwidth management as well as interfaces between LANs and other networks.
- H.323 is part of a series of communications standards that enable videoconferencing across a range of networks. Known as H.32X, this series includes H.320 and H.324, which address ISDN and PSTN communications, respectively.
- the H.323 architecture defines four major components for network-based communications, including terminals, gateways, gatekeepers, and multipoint control units (MCUs).
- terminals including terminals, gateways, gatekeepers, and multipoint control units (MCUs).
- MCUs multipoint control units
- Terminals are client endpoints on the LAN that provide real-time, two-way communications. All terminals support voice communications; video and data are optional.
- H.323 specifies the modes of operation required for different audio, video, and/or data terminals to work together. H.323 is the standard of next generation Internet phones, audio conferencing terminals, and video conferencing technologies.
- All H.323 terminals also support H.245, which is used to negotiate channel usage and capabilities.
- H.245 is used to negotiate channel usage and capabilities.
- Three other components are required: Q.931 for call signaling and call setup, a component called Registration/Admission/Status (RAS), which is a protocol used to communicate with a gatekeeper; and support for RTP/RTCP for sequencing audio and video packets.
- RAS Registration/Admission/Status
- Optional components in an H.323 terminal are video codecs, T.120 data conferencing protocols, and MCU capabilities.
- a gateway is an optional element in an H.323 conference.
- An H.323 gateway can provide many services, the most common being a translation function between H.323 conferencing endpoints and other terminal types. This function includes translation between transmission formats (i.e. H.225.0 to H.221) and between communications procedures (i.e. H.245 to H.242).
- a gateway also translates between audio and video codecs and performs call setup and clearing on both the LAN side and the switched-circuit network side.
- the purpose of the H.323 gateway is to reflect characteristics of a LAN endpoint to an SCN endpoint and vice versa.
- the primary applications of gateways are likely to be establishing links with analog PSTN terminals, establishing links with remote H.320 compliant terminals over ISDN-based switched-circuit networks, and establishing links with remote H.324-compliant terminals over PSTN networks.
- Gateways are not required if connections to other networks are not needed, since endpoints may directly communicate with other endpoints on the same LAN. Terminals communicate with gateways using the H.245 and Q.931 protocols.
- H.323 gateways 5806 can support terminals that comply with H.310, H.321, H.322, and V.70.
- H.323 gateway functions are left to the designer. For example, the actual number of H.323 terminals that can communicate through the gateway is not subject to standardization. Similarly, the number of SCN connections, the number of simultaneous independent conferences supported, the audio/video/data conversion functions, and inclusion of multipoint functions are left to the manufacturer.
- H.323 gateway technology By incorporating H.323 gateway technology into the H.323 specification, the ITU has positioned H.323 as the means to hold standards-based conferencing endpoints together.
- the gatekeeper is the most important component of an H.323 enabled network. It can act as the central point for all calls within its zone and provides call control services to registered endpoints. In many ways, an H.323 gatekeeper acts as a virtual switch.
- Gatekeepers perform two important call control functions. The first is address translation from LAN aliases for terminals and gateways to IP or IPX addresses, as defined in the RAS specification. The second function is bandwidth management, which is also designated within RAS. For instance, if a network manager has specified a threshold for the number of simultaneous conferences on the LAN, the gatekeeper can refuse to make any more connections once the threshold is reached. The effect is to limit the total conferencing bandwidth to some fraction of the total available; the remaining capacity is left for e-mail, file transfers, and other LAN protocols.
- a collection of all terminals, gateways, and multipoint control units which can be managed by a single gatekeeper are known as an H.323 Zone.
- An optional, but valuable feature of a gatekeeper is its ability to route H.323 calls. By routing a call through a gatekeeper, it can be controlled more effectively. Service providers need this ability in order to bill for calls placed through their network. This service can also be used to re-route a call to another endpoint if a called endpoint is unavailable.
- a gatekeeper capable of routing H.323 calls can help make decisions involving balancing among multiple gateways. For instance, if a call is routed through a gatekeeper, that gatekeeper can then re-route the call to one of many gateways based on some proprietary routing logic.
- gatekeeper While a gatekeeper is logically separate from H.323 endpoints, vendors can incorporate gatekeeper functionality into the physical implementation of gateways and MCUs.
- a gatekeeper is not required in an H.323 system. However, if a gatekeeper is present, terminals must make use of the services offered by gatekeepers. RAS defines these as address translation, admissions control, bandwidth control, and zone management.
- Gatekeepers can also play a role in multipoint connections. To support multipoint conferences, users would employ a gatekeeper to receive H.245 control channels from two terminals in a point-to-point conference. When the conference switches to multipoint, the gatekeeper can redirect the H.245 Control Channel to a multipoint controller, the MC. A gatekeeper need not process the H.245 signaling; it only needs to pass it between the terminals or between the terminals and the MC.
- H.323 entities that contain an internal gatekeeper can require a mechanism to disable the internal, function so that when there are multiple H.323 entities that contain a gatekeeper on a LAN, the entities can be configured into the same Zone.
- the Multipoint Control Unit supports conferences between three or more endpoints.
- an MCU consists of a Multipoint Controller (MC), which is required, and zero or more Multipoint Processors (MP).
- the MC handles H.245 negotiations between all terminals to determine common capabilities for audio and video processing.
- the MC also controls conference resources by determining which, if any, of the audio and video streams will be multicast.
- the MC does not deal directly with any of the media streams. This is left to the MP, which mixes, switches, and processes audio, video, and/or data bits. MC and MP capabilities can exist in a dedicated component or be part of other H.323 components.
- the present invention supports multicast for wireless base station 302 , including providing: compatibility with RFC 1112, 1584; recognition and support of multicasting applications, including: multimedia, teleconferencing, database, distributed computing, real-time workgroups; support of broadcasting function over wireless link; preserves bandwidth, retains QoS latency performance; support of IPv6 IGMP and IPv4 IGMP multicast; group membership query, group membership report messages.
- version 2 of the H.323 standard addresses deficiencies in version 1 and introduces new functionality within existing protocols, such as Q.931, H.245 and H.225, as well as entirely new protocols.
- the most significant advances were in security, fast call setup, supplementary services and T.120/H.323 integration.
- FIG. 2D depicts network 296 including a point-to-multipoint (PtMP) wireless network 298 coupled via router 140 d to data network 142 .
- PtMP wireless network 298 enables customer premise equipment (CPE) at a subscriber location to gain access to the various voice, data and video resources coupled to data network 142 by means of wireless connectivity over a shared bandwidth.
- the wireless PtMP network 298 is a packet switched network which is TCP/IP packet-centric (i.e. no dedicated circuit is created in delivering a communication IP flow) and QoS aware.
- PtMP wireless network 298 includes a wireless access point (WAP) 290 d coupled to router 140 d by, e.g., a wireline connection.
- a wireless access point 290 e can be similarly coupled to router 140 e by a wireline connection.
- WAP 290 d is in wireless communication, such as, e.g., radio frequency (RF) communication, with one or more wireless transceiver subscriber antennae 292 d and 292 e .
- RF radio frequency
- RF communication is accomplished over cable television (CATV) coaxial cable.
- CATV cable television
- a coaxial cable functions as a waveguide over which RF waves propagate. Accordingly, it is possible for the communications link between RF transceiver subscriber antenna 292 d and WAP 290 d to be a coaxial cable. Therefore, a coaxial cable connection is analogous to a wireless connection, and is referred to as an alternative form of wireless connection in the present invention.
- RF communication is accomplished over a satellite connection, such as, e.g., a low earth orbit (LEO) satellite connection or a high earth orbit satellite.
- a satellite connection such as, e.g., a low earth orbit (LEO) satellite connection or a high earth orbit satellite.
- LEO low earth orbit
- WAP 290 d and RF transceiver subscriber antenna 292 d function as satellite gateways, with the additional functionalities described in the present invention.
- WAPs 290 d and 290 e can be coupled to a wireless base station 302 where “IP flow” traffic can be queued, analyzed, characterized, classified, prioritized and scheduled, as described more fully below with reference to the ensuing figures.
- antennae 292 d and 292 e are coupled to subscriber customer premise equipment (CPE) stations 294 d and 294 e , respectively (also referred to as CPEs 294 d , 294 e ).
- CPE subscriber customer premise equipment
- Subscriber CPE stations 294 d and 294 e are coupled to various other CPE equipment via wireline or wireless connections.
- CPE stations 290 d and 290 e can be coupled to voice calling parties 124 d , 124 e , 126 d and 126 e , fax machines 116 d and 116 e , video conferencing equipment including video monitors 152 d and 152 e , and cameras 154 d and 154 e , host computers including client computers 120 d and 120 e and servers 122 d and 122 e .
- Various legacy devices such as PBXs can be coupled to CPEs 294 d and 294 e .
- next generation technologies such as Ethernet phones available from Selsius, a subsidiary of CISCO Systems from San Jose, Calif. and other Internet appliances can be coupled via LAN connections to CPEs 294 d and 294 e .
- Other video conferencing equipment as well as H.323 compliant conferencing equipment can also be coupled to CPEs 294 d and 294 e.
- either of antennae 292 d and 292 e can communicate with both WAPs 290 d and 290 e for alternate or backup wireless communications paths.
- Diagram 300 includes a wireless base station 302 shown in wireless communication with subscriber locations 306 a , 306 b , 306 c , 306 d , 306 e , 306 f , 306 g , 306 h , 306 i and 306 j .
- wireless base station 302 communicates via wireless access point 290 d to subscriber antennae 292 a - j of subscriber locations 306 a - j.
- Wireless base station 302 is coupled at interface 320 to network router 140 d by, e.g., a wireline connection.
- Network router 140 d is coupled to data network 142 which includes various other network routers 140 b for routing traffic to other nodes on data network 142 such as, e.g., telephony gateway 288 b.
- Diagram 310 includes wireless base station 302 coupled at interface 320 to data network 142 . Also coupled to data network 142 are router 140 d and telephony gateway 288 b which is in turn coupled to a class 5 central office (CO) switch at EO 104 b . IP telephony gateway 288 b can terminate telephony traffic to PSTN facilities by, e.g., translating packets into time domain multiplexed (TDM) standard telephone signals.
- Wireless base station 302 is in communication with wireless CPE 294 d at subscriber location 306 d via antenna WAP 290 d and 292 d .
- CPE 294 d configurations of CPE 294 d are possible, such as, e.g., one or more host computers with no telephone devices, one or more telephones with no host computers, one or more host computers and one or more telephone devices, and one or more H.323 capable video-conferencing platforms which could include a host computer with monitor and camera.
- CPE 294 d is shown with several telephone devices 124 d and 126 d , e.g., analog phones, and host computers, client 120 d and server 122 d .
- Client 120 d and server 122 d can be coupled to CPE 294 d via a LAN connection such as, e.g., an Ethernet LAN, or via a legacy V.35 device 322 d providing a high speed data connection.
- Other Internet appliances capable of attachment to a data network can also be coupled to CPE 294 d.
- FIG. 4 depicts the wireless IP network access architecture (WINAAR) 400 of the present invention.
- Architecture 400 illustrates the networking protocol stack which is a version of a TCP/IP protocol stack enhanced to support IP-centric, QoS over a packet switched, shared bandwidth, wireless PtMP connection.
- the networking protocol stack will be described in terms of the Open Systems Interconnect (OSI) 7 layer networking protocol stack standard which includes physical layer (OSI layer 1 ) 402 , data link layer (OSI layer 2 ) 404 , network layer (OSI layer 7 ) 406 and 408 , transport layer (OSI layer 4 ) 410 and applications layer (OSI layer 7 ) 412 .
- OSI Open Systems Interconnect
- physical layer 402 can be implemented using several wireless application specific integrated circuits (wASICs), an off-the-shelf 16QAM/QPSK 416 ASIC; an Interference Mitigation and Multipath Negation (IMMUNE)/RF 418 algorithm ASIC for minimizing and/or eliminating harmful interference; and a frequency hopping (FH) 419 ASIC for providing dynamic and adaptive multi-channel transmission that optimizes data link integrity by changing frequency levels depending on the noise level of a given frequency.
- Physical layer 402 can include the radio frequency (RF) signal 415 .
- Data link layer 404 lies on top of physical layer 402 .
- Data link layer 404 can include a media access control (MAC) layer 414 which is depicted graphically in diagram 400 as MAC layer portion 414 a and proactive reservation-based intelligent multi-media access (PRIMMA) technology portions 414 b and 414 c .
- Arrows 426 , 428 and 430 respectively, illustrate that MAC layer 414 can read header information from data and multimedia applications 425 , TCP/UDP 427 and IP 429 layers to analyze and schedule an IP packet of an “IP flow.”
- IP packets of the IP flow are identified by analyzing the header information to determine QoS requirements of the IP flow, so that the IP flow can be characterized, classified, presented, prioritized and scheduled.
- IP Internet Protocol
- IP Internet protocol
- IP header fields 702 can include, e.g., source and destination IP addresses, IP type of service (TOS), IP time to live (TTL), and protocol fields.
- IP is a datagram protocol that is highly resilient to network failures, but does not guarantee sequence delivery.
- Routers send error and control messages to other routers using the Internet control message protocol (ICMP).
- ICMP can also provide a function in which a user can send a “ping” (echo packet) to verify reachability and round trip delay of an IP-addressee host.
- Another OSI layer 3 protocol is address resolution protocol (ARP) which can directly interface to the data link layer.
- ARP maps a physical address, e.g., an Ethernet MAC address, to an IP address.
- IP 429 of network layer 408 can be, e.g., an IP version 4 (IPv4) or an IP version 6 (IPv6).
- IPv6 (sometimes called next-generation internet protocol or IPng) is a backward-compatible extension of the current version of the Internet protocol, IPv4.
- IPv6 is designed to solve problems brought on by the success of the Internet (such as running out of address space and router tables). IPv6 also adds needed features, including circuiting security, auto-configuration, and real-time services similar to QoS. Increased Internet usage and the allocation of many of the available IP addresses has created an urgent need for increased addressing capacity.
- IPv4 uses a 32-byte number to form an address, which can offer about 4 billion distinct network addresses. In comparison, IPv6 uses 128-bytes per address, which provides for a much larger number of available addresses.
- IP 429 of network layer 408 can have RSVP enhancement.
- RSVP is supposed to let network managers allocate bandwidth based on the bandwidth requirements of an application.
- RSVP is an emerging communications protocol that is hoped to signal a router to reserve bandwidth for real-time transmission of data, video, and audio traffic.
- RSVP Resource reservation protocols that operate on a per-connection basis can be used in a network to elevate the priority of a given user temporarily.
- RSVP runs end to end to communicate application requirements for special handling. RSVP identifies a session between a client and a server and asks the routers handling the session to give its communications a priority in accessing resources. When the session is completed, the resources reserved for the session are freed for the use of others.
- RSVP RSVP unfortunately offers only two levels of priority in its signaling scheme. Packets are identified at each router hop as either low or high priority. However, in crowded networks, two-level classification may not be sufficient. In addition, packets prioritized at one router hop might be rejected at the next.
- RSVP does not attempt to govern who should receive bandwidth, and questions remain about what will happen when several users all demand a large block of bandwidth at the same time.
- the technology outlines a first-come, first-served response to this situation.
- the IETF has formed a task force to consider the issue.
- RSVP provides a special level of service
- many people equate QoS with the protocol.
- RSVP is only a small part of the QoS picture because it is effective only as far as it is supported within a given client/server connection.
- RSVP allows an application to request latency and bandwidth
- RSVP does not provide for congestion control or network-wide priority with the traffic flow management needed to integrate QoS across an enterprise.
- RSVP does not address the particular challenges related to delivering packets over a wireless medium.
- the present invention supports RSVP by providing: (1) compatibility with RFC 2205; (2) recognition and support of RSVP messages, including: Path messages, Reservation (Resv), Path teardown messages, Resv teardown messages, Path error messages, Resv error messages, and Confirmation messages; (3) recognition and support of RSVP objects, including: Null, Session, RSVP_Hop, Time_Values, Style, Flowspec, Sender_Template, Sender_Tspec, Adspec, Error_Spec, Policy_Data, Integrity, and Scope, Resv_Confirm; (4) configurable translation of RSVP Flowspecs for QoS resource allocation in wireless base station 302 .
- RSVP messages including: Path messages, Reservation (Resv), Path teardown messages, Resv teardown messages, Path error messages, Resv error messages, and Confirmation messages
- recognition and support of RSVP objects including: Null, Session, RSVP_Hop, Time_Values, Style, Flowspec, Sender_Template, Sender_Tspec, Adspec, Error_
- the present invention provides support of DiffServ and RSVP/int-serv by providing: (1) support of RFC 2474 and 2475; (2) DiffServ in the core of Internet; (3) RSVP/int-serv for hosts and edge networks; (4) admission control capability for DiffServ compatibility; (5) differentiated services (DSs) (a field marking supported for use by DiffServ, and translation into a wireless base station 302 resource allocation); and (6) support for binding of multiple end-to-end sessions to one tunnel session.
- DSs differentiated services
- RTP Real-Time Transport Protocol
- RTCP Real-Time Control Protocol
- TCP of transport layer 410 can have a RTP and RTCP enhancement.
- Real-time transport protocol is an emerging protocol for the Internet championed by the audio/video transport workgroup of the IETF.
- RTP and RTCP header fields 708 can include several sub fields of information.
- RTP supports real-time transmission of interactive voice and video over packet-switched networks.
- RTP is a thin protocol that provides content identification, packet sequencing, timing reconstruction, loss detection, and security. With RTP, data can be delivered to one or more destinations, with a limit on delay.
- RTP and other Internet real-time protocols focus on the efficiency of data transport.
- RTP and other Internet real-time protocols like RTCP are designed for communications sessions that are persistent and that exchange large amounts of data.
- RTP does not handle resource reservation or QoS control. Instead, RTP relies on resource reservation protocols such as RSVP, communicating dynamically to allocate appropriate bandwidth.
- RTP adds a time stamp and a header that distinguishes whether an IP packet is data or voice, allowing prioritization of voice packets, while RSVP allows networking devices to reserve bandwidth for carrying unbroken multimedia data streams.
- Real-time Control Protocol is a companion protocol to RTP that analyzes network conditions.
- RTCP operates in a multi-cast fashion to provide feedback to RTP data sources as well as all session participants.
- RTCP can be adopted to circumvent datagram transport of voice-over-IP in private IP networks.
- software can adjust to changing network loads by notifying applications of spikes, or variations, in network transmissions.
- telephony software can switch compression algorithms in response to degraded connections.
- IP 429 of network layer 408 can also support multi-casting protocols.
- Digital voice and video comprise of large quantities of data that, when broken up into packets, must be delivered in a timely fashion and in the right order to preserve the qualities of the original content.
- Protocol developments have been focused on providing efficient ways to send content to multiple recipients, transmission referred to as multi-casting.
- Multi-casting involves the broadcasting of a message from one host to many hosts in a one-to-many relationship.
- a network device broadcasts a message to a select group of other devices such as PCS or workstations on a LAN, WAN, or the Internet. For example, a router might send information about a routing table update to other routers in a network.
- IP multi-casting Several protocols are being implemented for IP multi-casting, including upgrades to the Internet protocol itself. For example, some of the changes in the newest version of IP, IPv6, will support different forms of addressing for uni-cast (point-to-point communications), any cast (communications with the closest member of a device group), and multi-cast. Support for IP multi-casting comes from several protocols, including the Internet group management protocol (IGMP), protocol-independent multi-cast (PIM) and distance vector multi-cast routing protocol (DVMRP). Queuing algorithms can also be used to ensure that video or other multi-cast data types arrive when they are supposed to without visible or audible distortion.
- IGMP Internet group management protocol
- PIM protocol-independent multi-cast
- DVMRP distance vector multi-cast routing protocol
- Real-time transport protocol is currently an IETF draft, designed for end-to-end, real-time delivery of data such as video and voice.
- RTP works over the user datagram protocol (UDP), providing no guarantee of in-time delivery, quality of service (QoS), delivery, or order of delivery.
- UDP user datagram protocol
- QoS quality of service
- RTP works in conjunction with a mixer and translator and supports encryption and security.
- the real-time control protocol (RTCP) is a part of the RTP definition that analyzes network conditions. RTCP provides mandatory monitoring of services and collects information on participants.
- RTP communicates with RSVP dynamically to allocate appropriate bandwidth.
- RSVP Resource Reservation Protocol
- the RSVP protocol can be used by a host, on behalf of an application, to request a specific QoS from the network for particular data streams or flows. Routers can use the RSVP protocol to deliver QoS control requests to all necessary network nodes to establish and maintain the state necessary to provide the requested service. RSVP requests can generally, although not necessarily, result in resources being reserved in each node along the data path.
- RSVP is not itself a routing protocol. RSVP is designed to operate with current and future uni-cast and multi-cast routing protocols. An RSVP process consults the local routing database to obtain routes. In the multi-cast case for example, the host sends IGMP messages to join a multi-cast group and then sends RSVP messages to reserve resources along the delivery paths of that group. Routing protocols determine where packets are forwarded. RSVP is concerned with only the QoS of those packets as they are forwarded in accordance with that routing.
- the present invention delivers QoS-aware wireless PtMP access to users over a shared wireless bandwidth, and can take into account priority information provided within packet headers of packets in IP flows received for transmission over the wireless base station's bandwidth.
- VPN virtual private network
- PPP point to point protocol
- IPsec IPsec
- IP security IP security
- PPTP point-to-point tunneling protocol
- L2F layer 2 forwarding protocol
- L2TP layer 2 tunneling protocol
- IPsec facilitates secure private sessions across the Internet between organizational firewalls by encrypting traffic as it enters the Internet and decrypting it at the other end, while allowing vendors to use many encryption algorithms, key lengths and key escrow techniques.
- the goal of IPsec is to let companies mix-and-match the best firewall, encryption, and TCP/IP protocol products.
- IPsec is designed to link two LANs together via an encrypted data stream across the Internet.
- Point-to-point tunneling protocol provides an alternate approach to VPN security than the use of IPsec. Unlike IPsec, which is designed to link two LANs together via an encrypted data stream across the Internet, PPTP allows users to connect to a network of an organization via the Internet by a PPTP server or by an ISP that supports PPTP. PPTP was proposed as a standard to the IETF in early 1996. Firewall vendors are expected to support PPTP.
- PPTP was developed by Microsoft along with 3Com, Ascend and US Robotics and is currently implemented in WINDOWS NT SERVER 4.0, WINDOWS NT WORKSTATION 4.0, WINDOWS 95 via an upgrade and WINDOWS 98, available from Microsoft Corporation of Redmond, Wash.
- the “tunneling” in PPTP refers to encapsulating a message so that the message can be encrypted and then transmitted over the Internet.
- PPTP by creating a tunnel between the server and the client, can tie up processing resources.
- L2F layer 2 forwarding protocol
- PPTP layer 2 forwarding protocol
- L2F Unlike PPTP, L2F requires a special L2F-compliant router (which can require changes to a LAN or WAN infrastructure), runs at a lower level of the network protocol stack and does not require TCP/IP routing to function. L2F also provides additional security for user names and passwords beyond that found in PPTP.
- L2TP Layer 2 Tunneling Protocol
- L2TP The layer 2 tunneling protocol
- Cisco is putting L2TP into its Internet operating system software and Microsoft is incorporating it into WINDOWS NT 5.0.
- a key advantage of L2TP over IPsec, which covers only TCP/IP communications, is that L2TP can carry multiple protocols.
- L2TP also offers transmission capability over non-IP networks. L2TP however ignores data encryption, an important security feature for network administrators to employ VPNs with confidence.
- IP flows using the security encryption features of IPsec 422 are supported by the present invention.
- the integration of IPsec 422 flows of WINAAR architecture 400 are described below in the downlink and uplink directions with reference to FIGS. 17A and 17B , respectively.
- Wireless base station 302 supports prioritization of IPsec encrypted streams by placing the firewall at the wireless base station and unencrypting the datastream and packet header information prior to identification analysis.
- the frame stream already includes encryption of the frame data and implements frequency hopping.
- IPsec provides for secure data transmission for, e.g., VPNs and eCommerce security. IPsec is compatible with RFC 2401-2407. IPsec is supported with IPv4 and IPv6, and also IPsec tunnel mode.
- Wireless base station 302 security protocol support includes authentication header (AH) and encapsulating security payload (ESP).
- Wireless base station 302 supports IPsec authentication (MD5), encryption algorithms, and automatic key management (IKE and ISAKMP/Oakley).
- Wireless base station 302 provides for a choice of transport mode or tunnel mode and selectable granularity of security service, such as, e.g., providing a single encrypted tunnel for all traffic between two hosts, or providing separate encrypted tunnel for each TCP connection between hosts.
- TCP/IP Transmission Control Protocol/Internet Protocol
- UDP/IP User Datagram Protocol/Internet Protocol
- IP internet protocol
- TCP/IP transmission control protocol/internet protocol
- IPX/SPX from Novell's NetWare network operating system (NOS).
- NOS Novell's NetWare network operating system
- IPX/SPX is losing ground to TCP/IP.
- Novell now incorporates native IP support into NetWare, ending NetWare's need to encapsulate IPX packets when carrying them over TCP/IP connections.
- Both UNIX and Windows NT servers can use TCP/IP.
- Banyan's VINES, IBM's OS/2 and other LAN server operating systems can also use TCP/IP.
- Transport layer four 410 can include transmission control protocol (TCP) or user datagram protocol (UDP) 427 part of the standard TCP/UDP/IP protocol family suite of networking protocols.
- TCP transmission control protocol
- UDP user datagram protocol
- TCP header fields 706 can include, e.g., source and destination port numbers, window size, urgent pointer, flags (SYN, ISN, PSH, RST, FIN), and maximum segment size (MSS).
- TCP and UDP provide a capability for the TCP/IP host to distinguish among multiple applications through port numbers.
- TCP can provide for a reliable, sequenced delivery of data to applications.
- TCP can also provide adaptive flow control, segmentation, and reassembly, and prioritization of data flows.
- UDP only provides unacknowledged datagram capability.
- the recently defined real time protocol (RTP), RFC 1889, can provide real time capabilities in support of multimedia, applications, for example.
- TCP uses a window-based flow control.
- Each TCP source has a dynamically changing transmit window that determines how many packets it can transmit during each successive round-trip time (RTT).
- RTT round-trip time
- the TCP source can continue increasing its transmit window if no packets were lost within the last RTT.
- the source TCP throttles back its transmission, i.e. it “backs-off,” via a multiplicative decrease.
- An increasing width of the so-called TCP window versus time corresponds to increasingly longer bursts of packets.
- TCP's window flow-controlled protocol exhibits this effect of increasing throughput and buffer utilization until terminated by loss, followed by a period of rapid backoff.
- TCP works over IP to provide end-to-end reliable transmission of data across data network 142 .
- TCP controls the amount of unacknowledged data in transit by dynamically reducing either window size or segment size. The reverse is also true in that increased window or segment size values achieve higher throughput if all intervening network elements have low error rates, support the larger packets, and have sufficient buffering to support larger window sizes.
- Applications layer seven 412 can include applications 426 such as, e.g., over TCP, hypertext transport protocol (HTTP), file transfer protocol (FTP), TELNET remote terminal login, and simple mail transfer protocol (SMTP); and over UDP, simple network management protocol (SNMP), RPC, NFS, and TFTP.
- Other applications can also run over the network stack such as, e.g., a world wide web browser such as NETSCAPE NAVIGATOR available from AOL of Reston, Va., a spreadsheet application program such as LOTUS 123 available from IBM of Armonk, N.Y. or a video teleconferencing program such as MS NetMeeting available from MICROSOFT of Redmond, Wash. Packets transmitted from such applications could require special handling and prioritization to achieve an appropriate end-user QoS.
- FIG. 6 illustrates block diagram 600 representing scheduling of mixed IP flows.
- Block diagram 600 shows the scheduling of wireless base station 302 .
- the functionality of block diagram 600 includes PRIMMA management of Internet, VPN, and realtime IP flows.
- wireless IP flows are coming from data network 142 via network router 140 d to interface 320 of wireless base station 302 .
- IP flows are then scheduled for transmission from wireless base station 302 via antenna 290 d through subscriber location 306 d via antenna 292 d.
- IP flow refers to a series of related packets of data transmitted from a source to a destination post computer.
- IP flow 630 from data network 142 (over interface 320 ) comprises Internet IP flows 608 , VPN IP flows 610 , and realtime IP flows 612 .
- IP flow 630 is in the downlink direction.
- Downlink IP flow analyzer 602 (hereinafter downlink flow analyzer 602 ) analyzes Internet IP flow 608 , VPN IP flow 610 and realtime IP flow 612 .
- IP flow analyzer 602 is described further below with reference to FIGS. 8A and 15A .
- IP flow analyzer 602 receives packets and analyzes packet header fields to identify new or existing IP flows.
- IP flow analyzer 602 can also characterize QoS requirements for the IP flow depending on packet header field contents.
- IP flow analyzer 602 can classify the IP flow and associate a given packet with other packets from an existing IP flow and can group together IP flows with similar QoS requirements.
- IP flow analyzer 602 can also present the IP flows to a flow scheduler.
- Downlink PRIMMA MAC IP flow scheduler 604 schedules received IP flows 608 , 610 , and 612 for transmission in the downlink direction.
- Downlink flow scheduler 604 can prioritize the different classes of IP flows. For example, scheduler 604 can reserve slots in downlink frames for latency sensitive IP flows; for FTP type IP flows 608 , scheduler 604 can allocate large amounts of bandwidth for file transfer; and for e-mail type IP flows 608 , a lower priority can be given to packets.
- downlink flow scheduler 604 can take into account the fact that an IP flow 630 is a VPN IP flow 610 from a virtual private network (VPN), such as, e.g., a remote branch office tieing into a corporate network. All traffic from a VPN can be given a higher priority or specific types of VPN traffic can request particular service levels. Downlink flow scheduler 604 can prioritize realtime IP flows 612 such that their arrival at CPEs 294 at CPE subscriber locations 306 will occur as required.
- VPN virtual private network
- Downlink PRIMMA MAC segmentation and resequencing (SAR) and framer 606 segments and frames the data packets of received IP flows into frames for transmission over the wireless medium to CPEs 294 at CPE subscriber locations 306 .
- IP flow 616 , 624 can be transmitted to CPE 294 d at CPE subscriber location 306 d , via base station antenna 290 d over a wireless medium to subscriber antenna 292 d and CPE 294 d at CPE subscriber location 306 d .
- the term wireless medium is used to broadly encompass not only propagation of RF transmissions over cellular communications, but also RF transmissions over satellite communications and cable (e.g., coaxial cable) communications.
- IP flow 626 from CPE 294 d at CPE subscriber station 306 d is received at wireless base station antenna 290 d .
- IP flow 626 can include Internet IP flow 618 , VPN IP flow 620 and realtime IP flow 622 .
- Uplink IP flow analyzer 632 (hereinafter uplink flow analyzer 632 ) analyzes Internet IP flow 618 , VPN IP flow 620 and realtime IP flow 622 . Uplink flow analyzer 632 is described further below with reference to FIGS. 8B and 15B .
- IP flow analyzer 632 occurs at the CPE 294 d at subscriber CPE location 306 d and sends a request to transmit data up to wireless base station 302 , including information about an IP flow for which CPE 294 d would like to schedule an uplink slot.
- Uplink PRIMMA MAC IP flow scheduler 634 can schedule the requested IP flow.
- the functionality of scheduler 634 can be performed at CPE 294 d at subscriber CPE location 306 d .
- the functionality of scheduler 634 can be performed at the wireless base station 302 .
- An advantage of placing uplink flow scheduler 634 at the wireless base station is that this provides efficiencies particularly in a point-to-multi-point architecture. It is more efficient to have one centralized scheduler at the base station 302 rather than to place multiple uplink flow schedulers 634 at CPEs 294 of subscriber CPE locations 306 .
- Uplink PRIMMA MAC segmentation and resequencing (SAR) and framer 636 can segment and frame the data packets of IP flows into frames for transmission over the wireless medium from CPE 294 at CPE subscriber locations 306 to wireless base station 302 for further transmission over data network 142 .
- IP flow 626 from CPE 294 d at CPE subscriber location 306 d can be transmitted to base station antenna 290 d over a wireless medium such as, e.g., RF communication, cable modem and satellite communication, from subscriber antenna 292 d coupled to CPE 294 d at CPE subscriber location 306 d.
- Block diagram 800 of FIG. 8A summarizes an exemplary downlink analysis, prioritization and scheduling function.
- block diagram 830 of FIG. 8B summarizes an exemplary uplink analysis prioritization and scheduling function.
- Block diagram 800 and 830 are more detailed views of the function of block diagram 600 of FIG. 6 .
- block diagram 800 depicts how IP flow prioritization and scheduling of a shared wireless bandwidth is performed in the downlink path, from data network 142 —to router 140 d —to interface 320 —to wireless base station 302 —WAP 290 d —over a wireless medium—to wireless transceiver subscriber antenna 292 d —to subscriber CPE station 294 d at subscriber CPE location 306 d.
- IP flow analyzer 602 performs the function of identifying, characterizing, classifying, and presenting data packets to a downlink frame scheduler. The functions of identifying, characterizing, classifying and presenting the data packets are described with respect to FIG. 15A .
- Identification it is determined whether a data packet of an incoming IP data flow is known to the system, i.e. is an “existing IP flow”, or rather is the first data packet of a new IP data flow, based on fields in a packet header section. Identification can also include, e.g., determining the source of the packet in order to extrapolate the type of information in the packet payload.
- a new data packet (of a new IP data flow) previously unknown to the system is characterized based on the packet header information to determine the QoS requirements for the IP data flow, and to identify the subscriber CPE station that will receive the IP data flow.
- IP classes 810 a - 810 g are illustrated as IP classes 810 a - 810 g.
- the new IP data flow is initialized and presented to a downlink flow scheduler 604 .
- Downlink flow scheduler places the data packets of an IP data flow into a class queue based on class queue priorities, and using a set of rules, schedules the data packets for transmission over a wireless medium to a subscriber CPE station 294 at subscriber CPE location 306 with an advanced reservation algorithm.
- the rules are determined by inputs to the downlink flow scheduler based on, e.g., a hierarchical class-based prioritization, a virtual private network (VPN) directory enabled data priority (such as, for example, directory enabled networking (DEN)), and a service level agreement priority.
- VPN virtual private network
- DEN directory enabled networking
- the advanced reservation algorithm for use in scheduling e.g., isochronous traffic, is described with respect to FIG. 14 below.
- SAR and framer 606 breaks up, sequences, and frames the data packets for wireless transmission from WAP 290 d over the wireless medium to a wireless transceiver subscriber antenna 292 .
- Illustrated in block diagram 800 are a number of subscriber applications 820 a - 820 e running on devices such as, e.g., subscriber workstation 120 d (not shown), connected to subscriber CPE stations 294 a - e (not shown) located at subscriber CPE locations 306 a - 306 e .
- Each subscriber CPE location 306 can house one or more subscriber CPE stations 294 , and each subscriber CPE station 294 can receive and transmit one or more IP data flows to and from one or more subscriber workstations 120 .
- each application connected to a single CPE station can receive or transmit multiple IP data flows.
- a CPE SAR and framer 814 a resequences the received data and transmits it through CPE flow scheduler 816 a , and CPE IP flow analyzer 818 a , to subscriber application 820 a .
- CPE IP flow schedulers 816 a - 816 e can perform the same function as downlink flow scheduler 604 for uplink traffic.
- CPE IP flow analyzers 818 a - 818 e perform the same function as downlink flow analyzer 602 .
- CPE IP flow schedulers 816 a - 816 e and CPE IP flow analyzers 818 a - 818 e perform no function.
- Block diagram 800 illustrates the logical functions performed on the downlink path, not necessarily the physical locations of these functions.
- subscriber applications 820 a - 820 e , and CPE SAR and framers 814 a - 814 e can be performed in the actual subscriber CPE stations 294 connected over a wireless connection to wireless base station 302 .
- Block diagram 800 lists an exemplary set of priorities 812 used by downlink flow scheduler 604 to place received data packets into priority class queues. Listed are the following set of example priorities: latency-sensitive UDP priority 812 a , high priority 812 b , intermediate priority 812 c , initial hypertext transfer protocol (HTTP) screens priority 812 d , latency-neutral priority 812 e , file transfer protocol (FTP), simple mail transfer protocol (SMTP) and other e-mail traffic priority 812 f and low priority 812 g .
- HTTP hypertext transfer protocol
- FTP file transfer protocol
- SMTP simple mail transfer protocol
- other e-mail traffic priority 812 f and low priority 812 g Persons skilled in the art will recognize that many different priority classes are possible, depending upon the QoS requirements of the end-users.
- Latency-sensitive UDP priority data can refer to data that has the highest priority because it is sensitive to jitter (i.e., time synchronization is important) and latency (i.e., the amount of time passage between IP data flows in reverse directions).
- High priority 812 b can refer to, e.g., premium VPN service, and a high priority SLA service.
- Intermediate priority 812 c can refer to, e.g., a value VPN service level and an intermediate level SLA service.
- HTTP screens priority 812 d can refer to the download of HTTP data, for example, an initial HTTP screen, which is important for making an Internet user feel as if he has a great deal of bandwidth available for his Internet session.
- Latency-neutral priority 812 e can refer to data that is neutral to latency, such as, e.g., e-mail traffic.
- FTP, SMTP priority 812 f data includes data that is insensitive to latency and jitter, but requires a large amount of bandwidth to be downloaded accurately because of the size of a transmission.
- low priority data 812 g can refer to data that can be transmitted over a long period of time, as when one network device transmits its status information to another network device on a 24 hour basis.
- Block diagram 830 depicts how IP flow analysis, prioritization and scheduling of the shared wireless bandwidth is performed in the uplink path, from subscriber CPE station 294 d -to wireless transceiver subscriber antenna 292 d -over the wireless medium-to WAP 290 d -to wireless base station 302 -to interface 320 -to router 140 d -to data network 140 .
- Block diagram 830 includes uplink flow analyzer 632 , uplink flow scheduler 634 and uplink SAR and framer 636 . These components are similar in function to downlink flow analyzer 602 , downlink flow scheduler 604 and downlink SAR and framer 606 , but instead analyze, schedule and sequence and frame data packets being transmitted from subscriber workstations 120 of subscriber CPE stations 294 (at subscriber CPE locations 306 a - 306 e ) over the wireless medium, and transmit the data packets to interface 320 for transmission to data network 142 .
- subscriber applications 820 a - 820 e Illustrated in FIG. 8B are subscriber applications 820 a - 820 e , which are the same applications shown in FIG. 8A . Also shown therein are CPE IP flow analyzers 819 a - 819 e , CPE IP flow schedulers 817 a - 817 e , and CPE SAR and framers 815 a - 815 e . These components function analogously to subscriber applications 820 a - 820 e , CPE IP flow analyzers 818 a - 818 e , CPE IP flow schedulers 816 a - 816 e , and CPE SAR and framers 814 a - 814 e .
- these components function to analyze, schedule and transmit IP flows in the uplink path, from subscriber CPE stations (at subscriber CPE locations 306 a - 306 e ) to wireless base station 302 for routing to destination host workstations 136 (not shown).
- multiple applications can be connected to one or more subscriber CPE stations at subscriber CPE locations 306 a - 306 e .
- a reservation scheduling system is used.
- the bandwidth allocations for data packets are called frame slots, and are described below with respect to FIGS. 12A-12Q , 14 , 16 A and 16 B.
- Block diagram 830 illustrates the logical functions performed on the uplink path, not necessarily the physical locations of these functions.
- the analysis function of IP flow analyzer 632 which identifies a packet for uplink, characterizes and classifies the packet, can occur in a preferred embodiment in CPE IP flow analyzers 819 a - 819 e at the CPE subscriber stations 294 a - 294 e (not shown) at subscriber locations 306 a - 306 e.
- CPE IP flow schedulers 817 a - 817 f for scheduling uplinks subframe slots can be performed in wireless base station 302 for each of the subscriber CPE stations 294 connected over the wireless connection to wireless base station 302 .
- the scheduling function is performed at uplink flow scheduler 634 at wireless base station 302 based on classification information provided to the wireless base station 302 through an uplink IP flow reservation request from the CPE station.
- each subscriber CPE station requests the reservation of frame slots for its uplink transmissions using a reservation request block (RRB) of the TDMA airframe, described further below with reference to FIGS. 12A-12O , before it is permitted to communicate in the uplink path with interface 320 .
- uplink flow scheduler 634 transmits, as indicated by line 640 , to the requesting subscriber CPE station 294 a description of one or more slots which the CPE station 294 can use to transmit its uplink data packets from source subscriber workstations 120 , over the wireless medium, which are directed toward destination host workstations 136 , over data network 142 .
- FIG. 9 illustrates how PRIMMA MAC IP flow scheduler 604 can also take into account a Service Level Agreement in prioritizing frame slot scheduling and resource allocation.
- FIG. 9 depicts SLA-mediated IP flow management diagram 900 including prioritization of uplink traffic being transmitted to wireless base station 302 from CPE subscriber locations 306 a , 306 b , 306 c and 306 d . For example, suppose subscribers of telecommunications services have subscribed to one of four SLA levels, P 1 902 a , P 2 904 a , P 3 906 a and P 4 908 a .
- IP flows 902 b are being sent to a subscriber at CPE location 306 a and have an SLA priority level of P 1 902 a .
- IP flows 904 b , 906 b and 908 b are being sent to subscribers at CPE locations 306 b , 306 c and 306 d and have SLA priority levels of P 2 904 a , 906 a and 908 a , respectively.
- PRIMMA MAC scheduler 604 , 634 of wireless base station 302 can take into account SLA-based priorities in allocating available bandwidth to the subscriber CPE IP flows 902 b , 904 b , 906 b and 908 b .
- IP flow 902 b can be allocated frame slot 902 c based on SLA priority 902 a .
- Frame slots 904 c , 906 c and 908 c can be similarly scheduled taking into account SLA priorities. Uplinked IP flow traffic can then be transmitted on to data network 142 .
- SLA-based prioritization can provide a valuable means for a telecommunications provider to provide differentiated services to a variety of customers. For example, it is possible that low priority traffic from a subscriber who has purchased a premium SLA service agreement, can be scheduled at a higher priority than high priority traffic from a subscriber which has only signed up for a value level or low cost SLA service priority.
- FIG. 7 illustrates packet header field information 700 which can be used to identify IP flows and the QoS requirements of the IP flows.
- IP header fields 702 can include, e.g., source and destination IP addresses, helpful in providing application aware preferential resource allocation; IP type of service (TOS), a useful field for assisting PRIMMA MAC in classifying a packet or IP flow; IP time to live (TTL), a useful field for anticipating application packet discards; and protocol fields which can be used in identifying IP flows.
- TOS IP type of service
- TTL IP time to live
- protocol fields which can be used in identifying IP flows.
- Packet header information 700 also includes UDP header fields 704 . Included in UDP packet header fields 704 are source and destination port numbers.
- Packet header information 700 also includes TCP header fields 706 . Included in TCP packet header fields 706 are source and destination port numbers; TCP sliding window size; urgent pointer; SYN, ISN, PSH, RST and FIN flags; and maximum segment size (MSS).
- TCP packet header fields 706 include source and destination port numbers; TCP sliding window size; urgent pointer; SYN, ISN, PSH, RST and FIN flags; and maximum segment size (MSS).
- Packet header information 700 also includes realtime protocol RTP and RTCP header fields 708 .
- IP flow analyzer 602 and 632 of wireless base station 302 could also be useful to IP flow analyzer 602 and 632 of wireless base station 302 .
- FIGS. 12A-12O illustrate an exemplary time domain multiple access (TDMA) media access control (MAC) transmission air frame.
- TDMA time domain multiple access
- MAC media access control
- FIG. 12A illustrates an entire TDMA MAC transmission air frame.
- Air frame 1202 includes downstream transmission subframe 1202 and upstream transmission subframe 1204 .
- the TDMA MAC air frame of FIG. 12A includes upstream acknowledgment block (UAB) 1206 , acknowledgment request block (ARB) 1208 , frame descriptor block (FDB) 1210 , data slot (DS) 1 1212 a , DS 2 1212 b , DS 3 1212 c , DS 4 1212 d , DS 5 1212 e , DS 6 1212 f , DS 7 1212 g , DS 8 1212 h , DS 9 1212 i , DS 10 1212 j , DS 11 1212 k , DS m 1212 l , downstream acknowledgment block (DAB) 1214 , reservation request block (RRB) 1216 , UA 1 1218 a , UA 2 1218 b , UA 3 1218 c , UA 4 1218 U, UA 5 1218 e , UA 6 1218 f , UA 7 1218 g , UA 8 1218
- the type of TDMA used is TDMA/time division duplex (TDMA/TDD).
- TDMA/TDD for one interval of time, transmission is from a CPE station 294 to a wireless base station 302 , and in another instance of time, it is from a wireless base station 302 to a CPE station 194 .
- Any number of slots can be used for the uplink or for the downlink.
- the number of slots is dynamically assigned for both the uplink and the downlink. However, because the downlink data rate is usually higher than the uplink data rate, more slots are assigned to the downlink.
- distribution of slots between the downlink and uplink is dynamically assigned, the total number of slots for a frame is fixed in this embodiment.
- FIG. 12B is a symbolic illustration of an exemplary TDMA/TDD air frame 1220 of the present invention.
- TDMA/TDD air frame structure 1220 depicts a frame of frame size 1228 , which can be, e.g., 16 slots or 32 slots. It would be apparent to those skilled in the art that frame structures 1220 having other numbers of slots could be used without departing from the spirit and scope of the invention.
- Frame structure 1220 includes, e.g., various TDMA slots 1222 a , 1222 b , 1222 c and 1222 d .
- each TDMA slot 1222 a - c can be included a data slot 1224 a , 1224 b , 1224 c and 1224 d which in turn can contain a control packet 1226 a , or a data packet 1226 b - d , respectively.
- the sum of all TDMA slots 1222 within a frame of frame size 1228 is fixed.
- using the resource allocation methodologies of the present invention it is possible to dynamically allocate a subset of the entire number of TDMA slots 1222 to an uplink direction, where all the uplink TDMA slots are known collectively as an uplink subframe or an upstream transmission subframe 1204 , and to dynamically allocate a subset of the entire number of TDMA slots 1222 to a downlink direction, where all the downlink TDMA slots are known collectively as a downlink subframe or an downlink transmission subframe 1202 .
- Using the resource allocation method of the present invention it is possible to allocate all TDMA slots 1222 to a given upstream or downstream direction.
- the wireless base station 302 has a state machine, and knows the state of each CPE station 294 having a connection therewith (i.e., having an IP flow recognized by the wireless base station 294 ).
- Downstream transmission subframe 1202 and upstream transmission subframe 1204 are described in detail below.
- FIG. 12C depicts an exemplary downstream transmission subframe 1202 .
- the downstream transmission subframe of FIG. 12C includes transmitter turnaround time 1230 , UAB 1206 , ARB 1208 , FDB 1210 , a variable number of DSs per frame (e.g., 16) 1212 , and command and control block (CCB) 1232 .
- transmitter turnaround time 1230 UAB 1206 , ARB 1208 , FDB 1210 , a variable number of DSs per frame (e.g., 16) 1212 , and command and control block (CCB) 1232 .
- a variable number of DSs per frame e.g. 16
- CCB command and control block
- the DS transmissions 1212 include DS 1 1212 a , DS 2 1212 b , DS 3 1212 c , DS 4 1212 d , DS 5 1212 e , DS 6 1212 f , DS 7 1212 g , DS 8 1212 h , DS 9 1212 i , DS 10 1212 j , DS 11 1212 k , and DS m 1212 l.
- FIG. 12D depicts an exemplary UAB 1206 of a downstream transmission subframe 1202 .
- the downstream transmission subframe of FIG. 12D includes UAB 1206 , ARB 1208 , FDB 1210 , DS 1 1212 a , DS 2 1212 b , DS 3 1212 c , DS 4 1212 d , DS 5 1212 e , DS 6 1212 f , DS 7 1212 g , DS n 1212 h , DS 9 1212 i , DS 10 1212 j , DS 11 1212 k , DS m 1212 l , and CCB 1232 .
- UAB 1206 includes subslots UAB 1 1206 a , UAB 2 1206 b , UAB 3 1206 c , UAB 4 1206 d , UAB 5 1206 e , UAB 6 1206 f , UAB 7 1206 g , and UAB n 1206 h .
- UAB 1 1206 a includes a preamble 1234 a , subscriber ID 1234 b , IP-flow identifier 1234 c , slot sequence number 1234 d , and cyclical redundancy check (CRC) 1234 e.
- CRC cyclical redundancy check
- the UAB field is an acknowledgment by a wireless base station 302 to a CPE station 294 that the slots (e.g., US 1 -US 16 ) of an upstream transmission subframe have been received.
- the reader is referred to the discussion of the upstream transmission subframe below.
- preamble 1234 a includes data used for link integrity purposes; subscriber ID 1234 b identifies which CPE station 294 is making the reservation request; IP-flow identifier 1234 c identifies the IP data flow; quality of service data class 1234 a identifies the priority class of the IP data flow, if known to the CPE station 294 ; IP-flow priority and type 1234 b is an indicator of a new IP data flow; and CRC 1234 e , which stands for cyclic redundancy code, provides error checking bits for subslot RRB 1 1216 a.
- FIG. 12E depicts an exemplary ARB 1208 of a downstream transmission subframe 1202 .
- the downstream transmission subframe of FIG. 12E includes UAB 1206 , ARB 1208 , FDB 1210 , DS 1 1212 a , DS 2 1212 b , DS 3 1212 c , DS 4 1212 d , DS 5 1212 e , DS 6 1212 f , DS 7 1212 g , DS n 1212 h , DS 9 1212 i , DS 10 1212 j , DS 11 1212 k , DS m 1212 l , and CCB 1232 .
- ARB 1208 includes subslots ARB 1 1208 a , ARB 2 1208 b , ARB 3 1208 c , ARB 4 1208 d , ARB 5 1208 e , ARB 6 1208 f , ARB 7 1208 g , and ARB n 1208 h .
- ARB 1 1208 a includes a preamble 1234 a , subscriber ID 1234 b , IP-flow identifier 1234 c , slot sequence number 1234 d , and CRC 1234 e.
- the ARB field is an acknowledgment by a wireless base station 302 to a CPE station 294 that the wireless base station 302 has received an upstream reservation request from the CPE station 294 .
- the reader is referred to the discussion of the upstream transmission sub frame below.
- preamble 1234 a includes data used for link integrity purposes; subscriber ID 1234 b identifies which CPE station 294 is making the reservation request; IP-flow identifier 1234 c identifies the IP data flow; quality of service data class 1234 a identifies the priority class of the IP data flow, if known to the CPE station 294 ; IP-flow priority and type 1234 b is an indicator of a new IP data flow; and CRC 1234 e , which stands for cyclic redundancy code, provides error checking bits for subslot RRB 1 1216 a.
- FIG. 12F depicts an exemplary FDB 1210 of a downstream transmission subframe 1202 .
- the downstream transmission subframe of FIG. 12F includes UAB 1206 , ARB 1208 , FDB 1210 , DS 1 1212 a , DS 2 1212 b , DS 3 1212 c , DS 4 1212 d , DS 5 1212 e , DS 6 1212 f , DS 7 1212 g , DS n 1212 h , DS 9 1212 i , DS 10 1212 j , DS 11 1212 k , DS m 1212 l , and CCB 1232 .
- the FDB includes detailed information pertaining to the slots (e.g., DS 2 -DS 16 ) of the downstream transmission subframe.
- FDB 1210 includes a preamble subslot 1236 a , number of downstream slots subslot, 1236 b , IP-flow ID for upstream reservation 1 subslot 1236 c , IP-flow ID for upstream reservation 2 subslot 1236 d , IP-flow ID for upstream reservation n subslot 1236 e , and contention slot count for next upstream sub frame subslot 1236 f.
- preamble subslot 1236 a includes data used for link integrity purposes; number of downstream slots subslot 1236 b includes the number of downstream slots (DSs), IP-flow ID for downstream reservation subslot 1236 c includes an IP flow identification for DS 1 ; IP-flow ID for downstream reservation subslot 1236 d includes a second IP flow identification for DS 2 ; IP-flow ID for downstream reservation n subslot 1236 e includes another IP flow identification for DS m ; contention slot count for next upstream subframe subslot 1236 f provides a count for the next available upstream subframe.
- FIG. 12G depicts an exemplary downstream MAC payload data unit (PDU).
- the downstream MAC PDU includes information regarding the actual structure of the payload.
- the downstream MAC PDU of FIG. 12G includes MAC linked list sequence number 1238 a (the sequence, number of the MAC linked list), reservation request index number 1238 b (an index to the downstream IP flow); compressed IP-flow identifier 1238 c , compressed IP-flow priority and type 1238 d (identifying the priority and type of a compressed IP flow), slot payload 1238 e (the amount of data in a downstream data slot), and CRC 1234 e (error checking information).
- FIG. 12H depicts an exemplary CCB of a downstream transmission subframe 1202 .
- the CCB comprises OAM&P commands sequenced by subscriber CPE station 294 per frame and frame synchronization.
- CCB 1232 includes a mode command subslot 1240 a (includes options of what mode the CPE station is to take), profile command subslot 1240 b (includes specific system commands, such as a patch for a module), control data index subslot 1240 c (including download locations and memory requirements or other information needed by the CPE stations to download data), datablock 1 subslot 1240 d (includes specific system data), datablock 2 subslot 1240 e (same), datablock n subslot 1240 f (same), and CRC subslot 1234 e (error checking information).
- mode command subslot 1240 a includes options of what mode the CPE station is to take
- profile command subslot 1240 b includes specific system commands, such as a
- FIG. 121 depicts an exemplary upstream transmission subframe 1204 .
- the upstream transmission subframe of FIG. 121 includes transmitter turnaround time 1230 , DAB 1214 , RRB 1216 , a variable number of USs per frame, e.g., 16 , 1218 , and operations data block (ODB) 1242 , consisting of OAM&P data from subscribers, sequenced by subscriber per frame.
- ODB operations data block
- the US transmissions 1218 include US 1 1218 a , US 2 1218 b , US 3 1218 c , US 4 1218 d , US 5 1218 e , US 6 1218 f , US 7 1218 g , US 8 1218 h , US 9 1218 i , US 10 1218 j , US 11 1218 k , US 12 1218 l , and US n 1218 m.
- FIG. 12K depicts an exemplary RRB 1216 of an upstream transmission subframe 1204 .
- the upstream transmission subframe of FIG. 12K also shows DAB 1214 , RRB 1216 , US 1 1218 a , US 2 1218 b , US 3 1218 c , US 4 1218 d , US 5 1218 e , US 6 1218 f , US 7 1218 g , US 8 1218 h , US 9 1218 i , US 10 1218 j , US 11 1218 k , US 12 1218 l , US n 1218 m , and ODB 1242 .
- RRB 1216 includes subslots RRB 1 1216 a , RRB 2 1216 b , RRB 3 1216 c , RRB 4 1216 d , RRB 5 1216 e , RRB 6 1216 f , RRB 7 1216 g , and RRB n 1216 h .
- RRB 1 1216 a includes a preamble 1234 a , subscriber ID 1234 b , IP-flow identifier 1234 c , quality of service data class 1244 a , IP-flow priority and type 1244 b , and CRC 1234 e.
- a CPE station 294 uses one of the subslots (RRB 1 1216 a , RRB 2 1216 b , RRB 3 1216 c , RRB 4 1216 d , RRB 5 1216 e , RRB 6 1216 f , RRB 7 1216 g , and RRB n 1216 h ) of RRB 1216 to make a reservation request, which is a request by the CPE station 294 for bandwidth in a future uplink transmission subframe.
- RRB 1 1216 a , RRB 2 1216 b , RRB 3 1216 c , RRB 4 1216 d , RRB 5 1216 e , RRB 6 1216 f , RRB 7 1216 g , and RRB n 1216 h uses one of the subslots (RRB 1 1216 a , RRB 2 1216 b , RRB 3 1216 c , RRB 4 1216 d , RRB 5 1216 e ,
- Reservation request slots can be provided on an IP flow basis. Rather than allocate a reservation request slot to every CPE subscriber station, a default number (e.g., 5) are made available as contention slots. If collisions are detected by a greater number of requesting subscribers than the number of reservation request slots, then the slots allocated can be dynamically varied to provide additional RRB slots. (Collisions are analogous to CSMA/CD collisions in Ethernet, where colliding devices on an Ethernet network attempt to retransmit over the bus architecture by retrying at a random time.)
- the radio contention method of the present invention builds upon aspects of the “Slotted Aloha” method developed by L. Roberts in 1972, as a refinement of the “Aloha” method developed by N. Abramson in the early 1970's, and so-called bit-mapped reservation protocols.
- the present invention provides for discrete slots for transmission of data, rather than allowing the transmission of data at any point.
- the present invention advantageously transmits only a “reservation request” describing the actual data payload contents.
- the number of slots for reservation requests can advantageously be dynamically altered according to the frequency of detected collisions in the recent past.
- the present method advantageously does not require that subscriber CPE station 294 d “sense” the carrier (the radio channel) before transmission. Instead, a subscriber CPE station 294 d selects a “subslot” to transmit through a pseudo-random number selection, without a prior carrier sense. If a collision is detected, the subscriber CPE station 294 d will try again in the next frame using the pseudo-random number process.
- CSMA Carrier Sense Multiple Access
- the wireless base station can explicitly grant reservation requests.
- the standard bit-map protocol can require that all stations can receive signals from all other stations so that the subsequent order of transmission can be implicitly determined from the resulting bitmap pattern.
- the present method advantageously does not require the receipt of reservation request signals from other CPE subscriber stations 294 d . This is advantageous because, at higher frequencies (such as, e.g., 2 GHz to 30 GHz) where there may be line-of-sight and distance constraints, the requirement for receipt of the transmissions of other CPE subscriber stations 294 d could unduly constrain the topology, locations and distances of CPE subscriber stations.
- the wireless base station 302 by allowing the wireless base station 302 to explicitly grant the requested reservation, other factors such as relative or dynamic CPE subscriber station 294 d (or IP-flow) priority factors can be considered. Therefore, the present invention's reservation protocol with a dynamically adjustable number of contention subslots and explicit wireless base station reservation grants, allows a more optimal means of providing for the allocation of wireless, such as, e.g., radio, bandwidth in response to QoS requirements of IP-flows than any prior method.
- wireless such as, e.g., radio
- RRB 1 1216 a includes the following fields: a preamble 1234 a , subscriber ID 1234 b , IP-flow identifier 1234 c , quality of service data class 1244 a , IP-flow priority and type 1244 b , and CRC 1234 e .
- preamble 1234 a includes data used for link integrity purposes; subscriber ID 1234 b identifies which CPE station 294 is making the reservation request; IP-flow identifier 1234 c identifies the IP data flow; quality of service data class 1234 a identifies the priority class of the IP data flow, if known to the CPE station 294 ; IP-flow priority and type 1234 b is an indicator of a new IP data flow; and CRC 1234 e , which stands for cyclic redundancy code, provides error checking bits for subslot RRB 1 1216 a .
- an additional field can be provided in subslot RRB 1216 a which includes the number of data packets CPE station 294 will transmit in its IP data flow.
- FIG. 12J depicts an exemplary DAB 1214 of an upstream transmission subframe 1204 , where a CPE acknowledges receipt of a slot from base.
- the DAB is an acknowledgment from a subscriber CPE station 294 to the wireless base station that downstream slots have been received in a previous subframe.
- the DAB 1214 includes subslots DAB 1 1214 a , DAB 2 1214 b , DAB 3 1214 c , DAB 4 1214 d , DAB 5 1214 e , DAB 6 1214 f , DAB 7 1214 g , and DAB n 1214 h .
- Subslot DAB 1 1214 a includes a preamble 1234 a , subscriber ID 1234 b , IP-flow identifier 1234 c , slot sequence number 1234 d , and CRC 1234 e . (These fields have the same information as described with respect to the RRB.)
- FIG. 12L depicts an exemplary MAC PDU upstream slot.
- the upstream MAC PDU is similar to the downstream MAC PDU, but is used instead for upstream subframe payload information.
- FIGS. 12M, 12N and 12 O depict an exemplary ODB 1242 in detail. This field is used to store information regarding the connection between the wireless base station 302 and the CPE station 294 .
- ODB 1242 includes preamble 1234 a (including link integrity data), subscriber ID 1234 b (identifies which CPE station 294 is making the reservation request), system state 1248 a (information about the status of the CPE station 294 ), performance data 1248 b (how full the buffer statistics, cpe processor performance statistics, system state), antenna data 1248 c (information pertaining to the antenna), CRC 1234 e (error checking information) and synchronization pattern 1248 d (error checking information).
- preamble 1234 a including link integrity data
- subscriber ID 1234 b identifies which CPE station 294 is making the reservation request
- system state 1248 a information about the status of the CPE station 294
- performance data 1248 b show full the buffer statistics, cpe processor performance statistics, system state
- system state subslot 1248 a comprises system mode 1250 a (the mode of the CPE station, e.g., command mode, operations mode, or initialization mode of the system), system status 1250 b (the status of the CPE station), system resources 1250 a (the mode of the CPE station), system power 1250 b (the mode of the CPE station), system temperature 1250 a (the temperature of the CPE station).
- the CPE stations 294 are required to take turns using ODB 1242 to transmit their information.
- performance data 1248 a comprises the number of comrepeats 1252 a (the number of repeats of communication attempts), number of frameslips 1252 b (the number of frames that have slipped), waitstate index 1252 c (an index to the waiting state).
- FIG. 13 shows block diagram 1300 , illustrating how an exemplary flow scheduler for the present invention functions to schedule products.
- Block diagram 1300 includes: flow scheduler 604 , 634 (which is a combination of downlink flow scheduler 604 and uplink flow scheduler 634 ), downlink transmission subframe 1202 (i.e., the next MAC downstream subframe), uplink transmission subframe 1204 (i.e., the current MAC upstream subframe).
- Block diagram 1300 also includes the following downstream components: downstream reservation first-in-first-out queue 1322 , class 1 downstream queue 1302 , class 2 downstream queue 1304 , and class 3 downstream queue 1306 .
- Block diagram 1300 also includes the following upstream reservation components: current upstream subframe 1344 (with the current upstream subframe 1204 about to be stored in it), previous upstream sub frames 1346 , 1348 , 1350 , class 1 upstream reservation request queue 1308 , class 2 upstream reservation request queue 1310 , and class 3 upstream reservation request queue 1312 .
- an IP flow QoS class queuing processor (described below with respect to FIGS. 15A and 15B ) queues the received data packets into class 1 packet flow queues 1324 , 1326 and 1328 , class 2 packet flow queues 1330 , 1332 , 1334 , and class 3 packet flow queues 1336 , 1338 , 1340 and 1342 .
- a virtual private network (VPN) directory enabled (DEN) data table and a service level agreement (SLA) priority data table (described below with respect to FIGS. 15A and 15B )
- the class 1, class 2, and class 3 packet flow queues are respectively assigned to class 1 downstream queue 1302 , class 2 downstream queue 1304 , and class 3 downstream queue 1306 .
- Flow scheduler 604 , 634 schedules these downlink data packets onto the downlink transmission subframe 1202 .
- additional processing is used to minimize latency and jitter.
- Packet flow queue 1324 creates, e.g., 4 equal time spaced slot reservations in future frames, as shown in class 1 downstream queue 1302 and described with respect to FIG. 14 below.
- the reservations are fed to downstream reservation first-in-first-out queue 1322 , and are scheduled onto a future downstream frame 1202 by flow scheduler 604 , 634 .
- reservation requests for future upstream slots arrive at wireless base station 302 as part of the current upstream subframe 1204 received from CPE subscriber stations 294 over the wireless medium.
- Current upstream subframe 1344 can temporarily store reservation requests for analysis and scheduling of uplink packets in accord with the description of FIG. 8B above.
- Previous upstream subframes 1346 , 1348 , 1350 include upstream reservation requests awaiting upstream frame slot allocations in future upstream sub frames 1204 .
- Reservation request blocks (RRBs) described further above with reference to FIG. 12 ***, include a request for a number of slots for a single IP flow with an IP flow identifier # and class of the flow.
- the upstream reservation requests (by IP flow and class) are queued onto class 1 upstream reservation request queue 1308 , class 2 upstream reservation request queue 1310 , and class 3 upstream reservation request queue 1312 by an IP flow QoS class queuing processor (described below with respect to FIGS. 16A and 16B ).
- IP flow QoS class queuing processor described below with respect to FIGS. 16A and 16B .
- Flow scheduler 604 and 1566 , and 634 and 1666 uses these downstream reservations and upstream reservation requests to assign slots to data packets in the next downstream transmission subframe 1202 and upstream transmission sub frame 1204 , respectively.
- FIG. 14 is an exemplary two-dimensional block diagram 1400 of the advanced reservation algorithm.
- FIG. 14 includes MAC subframe scheduler 1566 , 1666 , frames current frame, n 1402 , and future frames, n+1 1404 , n+2 1406 , n+3 1408 , n+4 1410 , n+5 1412 , n+6 1414 . . . n+x 1416 , representing frames of data packets to be transmitted at times n, n+1, n+2 . . . n+x.
- Each frame is divided into a variable length downlink subframe 1202 and a variable length uplink subframe 1204 .
- the lengths of downlink subframe 1202 and uplink subframe 1204 together comprise the length of an entire frame.
- Each frame n 1402 includes a number of slots ( 1418 - 1478 ). Slots 1418 - 1446 comprise the downlink subframe 1202 , and slots 1448 - 1478 comprise the uplink subframe 1204 . In one embodiment, the slots are fixed in length, with each slot capable of storing a single data packet. The total number of frame slots in a frame remains constant. For example, if a given frame includes 64 frame slots, the slots can be allocated dynamically in either the uplink or downlink directions, such as, e.g., 32 up and 32 down, 64 up and 0 down, 0 up and 64 down.
- Block diagram 1400 can be thought of as a two dimensional matrix with each slot having a time value (i.e., a slot-to-slot time interval), e.g., 0.01 ms, and each frame having a total frame interval time value (i.e., a frame-to-frame time interval), e.g., 0.5 ms.
- a time value i.e., a slot-to-slot time interval
- a total frame interval time value i.e., a frame-to-frame time interval
- an advanced reservation algorithm assigns future slots to data packets based on the priority of the IP data flow with which the packet is associated. Exemplary priorities are described above with respect to FIGS. 8A and 8B .
- For calls that are sensitive to jitter meaning calls that are time sensitive, it is important to maintain an isochronous (i.e., in phase with respect to time) connection. With such signals, it is important that the data be dispersed in the same slot between frames, or in slots having a periodic variation between frames.
- vertical reservation 1480 shows a jitter sensitive signal receiving the same slot for downlink communications in each frame. Specifically, the signal is assigned slot 1422 in. frames 1402 - 1416 .
- diagonal reservation 1482 shows a jitter sensitive signal receiving a slot varying by a period of one between sequential frames. Specifically, the signal is assigned slot 1440 in frame 1402 , slot 1438 in slot 1404 , . . . slot 1426 in frame 1416 , to create a “diagonal.” If the frame-to-frame interval is 0.5 ms and the slot-to-slot interval is 0.01 ms, then a slot can be provided to the IP flow every 0.5 minus 0.01, equals 0.49 mms. Thus, to decrease the frame interval, a diagonal reservation of positive slope can be used.
- a diagonal of negative slope such as, e.g., negative slope diagonal uplink reservation 1486 .
- the diagonal reservation 1482 can also be more pronounced (i.e., using a greater or lesser slope), depending on the period between sequential frames desired.
- Reservation patterns 1480 , 1482 , 1484 and 1486 are useful patterns for jitter sensitive communications. Also illustrated is a vertical reservation 1486 , similar to vertical reservation 1480 , useful for a jitter sensitive communication in the uplink direction.
- one or more slots can be guaranteed in each frame.
- each frame can be assigned one (or more) slots for communications.
- the slot(s) need not be periodic between frames, as with jitter sensitive calls. The greater the number of slots allocated per frame to an IP flow, the greater total bandwidth per frame rate for the IP flow.
- fewer slots per frame can be assigned for the communication. For example, a communication that is less latency sensitive can receive a guaranteed bandwidth of one slot every four frames. A call that is even less latency sensitive can receive, e.g., a single slot every ten frames.
- the advanced reservation algorithm can assign the slots from highest priority to lowest priority, exhausting the number of available slots in future frames.
- IP data flows that are both jitter and latency sensitive can be assigned slots with periodic patterns first (e.g., patterns 1480 , 1482 , 1484 and 1486 ), followed by flows that are highly latency sensitive (but not jitter sensitive), et cetera, until the flows of lowest latency sensitivity are assigned to slots.
- Prioritization of different classes of IP flows by scheduler 604 , 634 , 1566 , 1666 is described further below with reference to FIGS. 15A, 15B , 16 A and 16 B.
- FIGS. 15A and 15B are exemplary logical flow diagrams for analysis and scheduling of the shared wireless bandwidth for the downlink direction.
- the logical flow pertains to IP packet flows arriving from data network 140 , at the wireless base station 302 , for transmission down to a subscriber CPE station 294 d over the wireless medium.
- FIG. 15A is an exemplary logical flow diagram 1500 for downlink IP analyzer 602 .
- FIG. 15B is an exemplary logical flow diagram 1560 for the downlink flow scheduler 604 .
- FIGS. 15A and 15B are explained by way of method modules, which can be viewed as physical units (e.g., comprising software, hardware, or a combination thereof) or logical vehicles (e.g., used for explanatory purposes only). Those skilled in the art will recognize that the modules are used only to explain an exemplary embodiment, and are not to be considered limiting.
- the exemplary logical flow diagram 1500 for downlink IP flow analyzer of FIG. 15A includes packet header identification component 1502 , packet characterization component 1504 , packet classification component 1506 , and IP flow presentation component 1508 . The functions of these components are explained in detail below.
- downlink IP flow analyzer 602 is physically located in wireless base station 302 , although those skilled in the art will recognize that the same functionality can be located remotely from wireless base station 302 .
- FIGS. 2D, 3A and 3 B are helpful to the reader for an understanding of the downlink IP flow analyzer.
- IP flow analyzer 602 performs the function of identifying, characterizing, classifying, and presenting data packets to a downlink frame scheduler 604 .
- the functions of identifying, characterizing, classifying and presenting the data packets are respectively performed by packet header identification component 1502 , packet characterization component 1504 , packet classification component 1506 and IP flow presentation component 1508 of downlink IP flow analyzer 602 .
- Packet header identification component 1502 determines whether a data packet of an incoming IP data flow is part of an IP flow that is known to the system, or is the first data packet of a new IP data flow, based on the contents of fields of the packet header section. Packet header identification component 1502 also identifies, e.g., the source of the packet using the packet header field contents. Packet characterization component 1504 characterizes a new data packet (of a new IP data flow) to determine the QoS requirements for the IP data flow, and identifies the subscriber CPE station associated with the subscriber workstation that will receive the IP data flow. Packet classification component 1506 classifies the new IP data flow into a communications priority class, grouping the packet together with similar type IP flows. IP data flow presentation 1508 initializes the new IP data flow and presents it to downlink flow scheduler 604 .
- Downlink flow scheduler 604 places the data packets of an IP data flow into a class queue, and based on a set of rules, schedules the data packets for transmission over the wireless medium to a subscriber CPE station using, e.g., an advanced reservation algorithm.
- the rules can be determined by inputs to the downlink flow scheduler from a hierarchical class-based priority processor module 1574 , a virtual private network (VPN) directory enabled (DEN) data table 1572 , and a service level agreement (SLA) priority data table 1570 .
- the advanced reservation algorithm is described further above with respect to FIG. 14 .
- Packet header identification component 1502 identifies the IP flow received from data network 142 at data interface 320 based on the packet header.
- An IP flow packet stream from data network 142 including packets from various IP flows (where each IP flow is associated with a single data “call”) is received at packet header identification component 1502 .
- An IP flow can include packetized data including any type of digital information such as, e.g., packetized voice, video, audio, data, IP flows, VPN flows, and real time flows.
- the IP flow is transmitted over data network 142 from, e.g., a host workstation 136 d and arrives at interface 302 of wireless base station 320 .
- Interface 302 transmits the packets of the IP flow to packet header identification component 1502 .
- the received packets are buffered into a storage area.
- the contents of the packet header fields are extracted and parsed.
- IP flows known to the system so-called “existing IP flows,” there are entries in a table 1526 .
- An IP flow is in the system if there is an existing characterized IP data call.
- module 1522 it is determined if there is a match between the incoming packet and an existing IP flow call in an entry in existing IP flow identification table 1526 . If so, then the IP flow is” known to the system, and control passes to module 1530 of the packet characterization component 1504 .
- Module 1524 analyzes the packet header source field and determines from source application packet header data table 1528 the type of source application making the data call or transmitting the IP packet.
- the application can be any of the applications described with respect to FIG. 2D or known to those skilled in the art.
- Examples include a file transfer protocol (FTP) download from another client workstation 138 f , an IP voice telephony call (over telephony gateway 288 b ), a voice telephony call from a caller 124 d (connected over a modem), an e-mail from a LAN 128 a attached host workstation 136 a , a fax machine call, and a conference call from multiple callers 124 d and 126 d (connected over a modem), to name a few.
- FTP file transfer protocol
- IP flow IP flow identifier number
- control passes to module 1526 where the IP flow identifier number is added to the existing IP flow identification table 1526 .
- any type of service (TOS) or differentiated service (DiffServ) field can also be analyzed.
- Packet characterization component 1504 characterizes new IP flows and passes them to packet classification component 1506 for classification.
- bandwidth allocation i.e., allocating an appropriate amount of bandwidth
- jitter i.e., time synchronizing the received data
- latency i.e., the amount of time passage between responses
- a destination CPE subscriber station ID lookup from subscriber CPE IP address table 1538 is performed for the IP flow.
- Each subscriber CPE station 294 d can have one or more applications, running on one or more subscriber workstations 120 d , homed to it. Accordingly, the IP flows can be directed to one or more applications on one or more subscriber workstations of one or more CPE stations 294 d .
- a subscriber workstation can be any device coupled to a subscriber CPE station 294 d .
- Module 1536 looks up the IP flow in table 1538 , to determine the identity of the subscriber CPE station 294 d that will receive the packets of the new IP flow from data network 142 . Control then passes from module 1536 to module 1542 of the packet classification component 1506 .
- Packet classification component 1506 classifies the IP flow and passes it to IP flow presentation component 1508 for presentment.
- module 1542 the packet is classified into a QoS class by performing a table lookup into IP flow QoS class table module 1544 , where the types of QoS classes are stored depending on the QoS requirements for packets. Similar IP flows, (i.e., IP flows having similar QoS requirements) can be grouped together in module 1542 . In classifying packets and IP flows, QoS class groupings, any DiffServ priority markings, and any TOS priority markings can be taken into account. From the module 1542 , control passes to module 1548 of IP flow presentation component 1508 .
- IP flow presentation component 1508 prepares and presents the IP flow packets to downlink flow scheduler 604 .
- control passes to module 1546 from module 1540 of the packet classification component 1540 .
- module 1546 the packet is added to the associated existing IP flow queue, which is the queue for the current IP flow.
- control passes to IP flow QoS class queuing processor module 1562 of downlink flow scheduler 604 .
- this new IP flow can be initialized for presentation to module 1552 .
- the IP flow QoS class is presented to frame scheduler 604 to be placed in an appropriate class queue.
- Module 1552 presents the IP flow (in particular, the data packet) and IP flow identifier to IP flow QoS class queuing processor module 1562 of downlink flow scheduler 604 .
- the exemplary logical flow diagram 1560 for the downlink flow scheduler 604 of FIG. 15B comprises IP flow QoS class queuing processor module 1562 , MAC downlink subframe scheduler module 1566 , hierarchical class-based priority processor module 1574 , VPN DEN data table module 1572 , SLA priority data table 1570 , CPE IP flow queue depth status processor 1582 and link layer acknowledgment processor module 1578 .
- Downlink flow scheduler 604 of FIG. 15B also includes QoS class queues as follows: class 1 , 1564 a ; class 2 , 1564 b ; class 3 , 1564 c ; class 4 , 1564 d ; class 5 , 1564 e ; and class 6 , 1564 f ; and MAC downlink subframes: frame n, 1568 a ; frame n+1, 1568 b ; frame n+2, 1568 c ; frame n+3, 1568 d ; . . . frame n+p, 1568 k.
- downlink flow scheduler 604 is physically located in wireless base station 302 , although those skilled in the art will recognize that the same functionality can be located remotely from wireless base station 302 .
- Downlink flow scheduler 604 is used to schedule the downlink subframe.
- An entire frame can be divided into an uplink portion (called an uplink subframe) for transmitting uplink frames, and a downlink portion (called a downlink subframe) for transmitting downlink frames.
- WAP antenna the wireless medium, 290 d , RF transceiver subscriber antenna 292 d , subscriber CPE station 294 d and subscriber workstation 120 d .
- WAP antenna 290 d and RF transceiver subscriber antenna 292 d respectively provide a wireless connection between wireless base station 302 (where downlink flow scheduler 604 resides in one embodiment) and subscriber CPE station 294 d , which can transmit an IP flow to an application running on subscriber workstation 120 d .
- WAP antenna 290 d serves as a wireless gateway for data network 142
- RF transceiver subscriber antenna serves as a wireless gateway for subscriber CPE station 294 d .
- the connection is also illustrated in FIGS. 2D and 3B .
- IP flow QoS class queuing processor module 1562 receives the packets from IP flow presentation component 1508 . Module 1562 then creates class queues 1564 a - 1564 f , which is a variable number of queues, and places the packets in these class queues. How packets are placed in class queues 1564 a - 1564 f is determined by the inputs to module 1562 .
- Module 1562 can receive inputs from hierarchical class-based priority processor module 1574 , VPN DEN data table 1572 and service level agreement (SLA) priority data table 1570 .
- the queuing function of module 1562 can be based on these inputs.
- SLA priority data table 1570 can use predetermined service level agreements for particular customers to affect the queuing function.
- a customer can be provided a higher quality of telecommunications service by, for example, paying additional money to receive such premium service.
- An algorithm running on module 1562 can increase the queuing priority for messages transmitted to such customers.
- Virtual private network (VPN) directory enabled networking (DEN) data table 1572 can provide prioritization for a predetermined quality of service for a VPN for a company that pays for the VPN function.
- a VPN is understood by those skilled in the relevant art to be a private network, including a guaranteed allocation of bandwidth on the network, provided by the telecommunications service provider.
- VPN DEN data table 1572 permits module 1562 to provide higher quality of service for customer-purchased VPNs.
- SLA priority data table 1570 the queuing priority can be increased for such VPNs. For example, a platinum level VPN's lowest priority IP flow classes could also be given a higher priority than a high priority brass level VPN.
- Both SLA priority data table 1570 and VPN DEN data table 1572 receive input from operations, administration, maintenance and provisioning (OAM&P) module 1108 .
- OAM&P operations, administration, maintenance and provisioning
- This is a module that is kept off-line, and includes storage and revision of administrative information regarding new customers, or updates of information pertaining to existing customers. For example, the SLA priority of the customers and VPN information is updated from OAM&P module 1108 .
- Hierarchical class-based priority processor module 1574 is a module that operates under the principles of hierarchical class-based queuing. Hierarchical class-based queuing was created by Sally Floyd and Van Jacobson, considered early architects of the Internet.
- Hierarchical class-based queuing class ifies different types of IP flows using a tree structure at the edge access device routers. Each branch of the tree signifies a different class of IP flows, and each class is dedicated a set limited amount of bandwidth. In this manner, different classes of flows are guaranteed minimum bandwidth, so that no single IP data flow within a class, and no single class of IP flows, can use up all available bandwidth.
- the present invention adds a prioritization feature enabling class based priority reservations to be made using the hierarchical class queue concept, as discussed above with respect to FIGS. 13 and 14 .
- MAC downlink subframe scheduler 1566 is a processor module that takes the packets queued in class queues 1564 a - 1564 f , and can make frame slot reservations to fill up subframes 1568 a - 1568 k based on priorities 1570 , 1572 and 1574 , which is a variable number of frames.
- each subframe is scheduled (filled) with up to a predetermined number of packets from each of the classes 1564 a - 1564 f according to priorities 1570 , 1572 and 1574 .
- the subframes are scheduled according to the inventive advanced reservation algorithm method described with respect to FIGS. 13 and 14 for isochronous reservations.
- the subframes are scheduled according to a combination of known methods and the advanced reservation algorithm method of the present invention.
- the subframes can then be sent to WAP antenna 290 d for wireless transmission over the wireless medium to RF transceiver subscriber antenna 292 d coupled to subscriber CPE station 294 d , which in turn can send the packets contained in the subframes to subscriber workstation 120 d at CPE subscriber location 306 d .
- the subframes can be scheduled from highest priority to lowest priority.
- Hierarchical class-based priority (HCBP) processor module 1574 receives as input the subframes that have been scheduled and transmitted from WAP antenna 290 d . By maintaining awareness of the status of the packets (i.e., by knowing which packets have been sent out), HCBP processor module 1574 knows which packets from which class queues 1564 a - 1564 f must yet be scheduled.
- HCBP Hierarchical class-based priority
- MAC downlink subframe scheduler 1566 informs MAC downlink subframe scheduler 1566 of this condition, which in turn reschedules the requested packets from the appropriate class queues 1564 a - 1564 f for retransmission.
- Link layer acknowledgment ARQ processor 1578 also awaits positive acknowledgments from subscriber CPE station 294 d , to determine that the data packets-have been properly received. Only after receiving a positive receipt acknowledgment does MAC downlink subframe scheduler 1566 remove the packet from class queues 1564 a - 1564 f.
- Each subscriber CPE station 294 d has a limited amount of memory available for received data packets in an IP flow.
- the devices coupled to the subscriber CPE station 294 d e.g., subscriber workstation 120 d
- the CPE data packet queues in CPE subscriber station 294 d are quickly filled up.
- subscriber CPE station 294 d transmits a CPE IP flow queue depth message 1580 indicating that the queue is filled up, which can be received by CPE IP flow queue depth status processor 1582 .
- CPE queue depth processor 1582 informs MAC downlink subframe scheduler 1566 of this condition, which stops scheduling downlink sub frames directed to subscriber CPE station 294 d .
- Processor 1582 can also send messages to MAC downlink subframe scheduler 1566 to flush particular IP flows from class queues 1564 a - 1564 f.
- FIGS. 16A and 16B are exemplary logical flow diagrams for the uplink.
- the logical flow pertains to analysis and scheduling of shared wireless bandwidth to IP packet flows from a subscriber workstation 120 d coupled to a subscriber CPE station 294 d , being transmitted over the wireless medium up to the wireless base station 302 , and on to data network 142 for transmission to a destination host workstation 136 a .
- FIG. 16A is an exemplary logical flow diagram 1600 for uplink IP flow analyzer 632 .
- FIG. 16B is an exemplary logical flow diagram 1660 for the uplink flow scheduler 634 .
- FIGS. 16A and 16B are explained by way of method modules, which can be viewed as physical units (e.g., comprising software, hardware, or a combination thereof) or logical vehicles (e.g., used for explanatory purposes only). Those skilled in the art will recognize that the modules are used only to explain an exemplary embodiment, and are not to be considered limiting.
- the exemplary logical flow diagram 1600 for uplink IP flow analyzer 632 of FIG. 16A includes packet header identification component 1602 , packet characterization component 1604 , packet classification component 1606 , and IP flow presentation component 1608 . The functions of these components are explained in detail below.
- uplink IP flow analyzer 632 is physically located in wireless base station 302 , although those skilled in the art will recognize that the same functionality can be located remotely from wireless base station 302 .
- the function of IP flow analyzer 632 is performed at a subscriber CPE station 294 d desiring an uplink reservation slot for uplinking a packet/IP flow up to base station 302 .
- a reservation request block (RRB) request detailing the IP flow identifier, number of packets and classification of the IP flow can be created then by IP flow analyzer 632 and can be uplinked via preferably a contention RRB slot for scheduling by uplink frame scheduler 634 in future uplink subframe slots up at wireless base station 302 .
- FIGS. 2D, 3A and 3 B are helpful to the reader for an understanding of the uplink IP flow analyzer.
- IP flow analyzer 632 performs the function of identifying, characterizing, classifying, and presenting data packets to an uplink frame scheduler 634 .
- the functions of identifying, characterizing, classifying and presenting the data packets can be respectively performed by packet header identification component 1602 , packet characterization component 1604 , packet classification component 1606 and IP flow presentation component 1608 of uplink IP flow analyzer 632 .
- Packet header identification component 1602 determines whether a packet of an incoming IP flow is known to the system (i.e. is an existing IP flow), or if it is the first data packet of a new IP data flow, and determines the source application based on fields in the header section of the packet. Identification 1602 can include buffering packets and extracting and parsing the header contents. Packet characterization component 1604 characterizes a new data packet (of a new IP flow) to determine the QoS requirements for the IP flow based on the source application, and to identify the subscriber CPE station that will receive the IP flow. Packet classification component 1606 classifies the new IP data flow into one of several priority classes. Classification 1606 can include, e.g., grouping packets having similar QoS requirements. IP data flow presentation 1608 initializes the new IP data flow and presents it to uplink flow scheduler 634 .
- Uplink frame scheduler 634 schedules the reservation request in a future uplink subframe and notifies the CPE station 294 d of the reservation.
- uplink flow scheduler 634 located preferably at wireless base station 302 , transmits a reservation slot in a particular future frame for the requesting subscriber CPE station 294 d to transmit its uplink data.
- Uplink flow scheduler 634 assigns the reservation based on the same parameters as the downlink flow scheduler 604 uses in the downlink.
- uplink flow scheduler 634 determines the reservation slots based on the queue class priority and based on a set of rules, schedules the reservations for uplink transmissions from subscriber CPE station 294 d using, e.g., an advanced reservation algorithm.
- the rules are determined by inputs to the uplink flow scheduler 634 from a hierarchical class-based priority processor module 1674 , a virtual private network (VPN) directory enabled (DEN) data table 1672 , and a service level agreement (SLA) priority data table 1670 .
- the advanced reservation algorithm is described with respect to FIG. 14 .
- Packet header identification component 1602 identifies the IP flow received from a subscriber CPE station 294 d based on the packet's header contents.
- a stream of packets also known as packets from several IP flows (i.e. each IP flow is associated with a single “call”) is received at packet header identification component 1602 .
- the IP flow in one embodiment is transmitted to subscriber CPE station 294 d from one or more subscriber workstations 120 d for uplink to host computers 136 a coupled to wireless base station 302 by data network 142 .
- Subscriber CPE station 294 d can transmit the data packets of the IP flow to packet buffer module 1610 of packet header identification component 1602 .
- packet header identification component is within CPE subscriber station 294 d .
- the received packets are buffered in a storage area for transfer to header extraction module 1620 .
- the packet header files are extracted and parsed to obtain the contents of the packet header fields.
- Relevant fields can include, e.g., source, destination, type of service (TOS) and differentiated service (DiffServ) markings, if any exist.
- TOS type of service
- DiffServ differentiated service
- IP flow identification table 1626 For IP flows known to the system, there are entries in existing IP flow identification table 1626 . An IP flow is in the system if a previous packet of the IP flow of the existing IP data call has already been identified. In module 1622 , it is determined if there is a match between the incoming IP flow and an entry in table 1626 . If so, then the IP flow is known to the system, and control passes to module 1630 of the packet characterization component 1604 .
- Packet header analysis module 1624 determines from source application packet header table 1628 the type of source application making the IP flow.
- the application can be any of the types of applications described with respect to FIG. 2D or known to those skilled in the art. Examples include a file transfer protocol (FTP) download from another client workstation 138 f , a voice telephony call from a caller 124 d (connected over a modem), a fax machine call, and a conference call from multiple callers 124 d and 126 d (connected over a modem), to name a few.
- FTP file transfer protocol
- Packet characterization component 1604 characterizes the IP flow and passes it to packet classification component 1606 for classification.
- IP flow QoS requirements lookup module 1632 the QoS requirements for the application associated with the IP flow are determined. Module 1632 performs this operation by looking up the application in IP flow QoS requirement table 1634 .
- bandwidth allocation i.e., allocating an appropriate amount of bandwidth
- jitter i.e., time synchronizing the received data
- latency i.e., the amount of time passage between responses.
- jitter and latency are important to voice telephony and conference calls, and bandwidth allocation is not.
- CPE subscriber station identifier (ID) lookup module 1636 a subscriber CPE ID lookup is performed for the new IP data flow.
- Each subscriber CPE station 294 d can have one or more applications, running on one or more subscriber workstations 120 d , homed to it. Accordingly, one or many subscribers can generate or receive an IP flow directed from or at a subscriber CPE station 294 d .
- a subscriber workstation 120 d can be any device coupled to a subscriber CPE station 294 d .
- Module 1636 looks up the CPE station identifier for the IP flow in table 1638 , to provide the CPE ID in the reservation request block (RRB). Control then passes from module 1636 to module 1648 of the packet classification component 1606 .
- RRB reservation request block
- Packet classification component 1606 classifies the IP flow and passes it to IP flow presentation component 1608 for presentment.
- module 1642 the packet is classified or grouped into a QoS class by performing an IP flow QoS requirement table 1644 lookup where the QoS classes are stored depending on the QoS requirements for packets.
- IP flow presentation component 1608 prepares and presents the IP data flow packets to flow scheduler 634 .
- a reservation request block (RRB) is created and uplinked via a contention slot to the wireless base station 302 for scheduling by IP flow scheduler 634 .
- the scheduler is located at the CPE station 294 d so no reservation request is needed.
- the packet is added to the IP flow queue, which is the queue for the current existing IP flow. In one embodiment, this can include preparation of a RRB.
- this new IP flow is initialized for presentation to module 1652 .
- Module 1652 presents the IP data flow (in particular, the reservation request block data packet) to module 1662 of uplink flow scheduler 634 .
- the QoS class for the IP flow is presented to scheduler 634 , preferably by inclusion in a RRB.
- the exemplary logical flow diagram for the uplink flow scheduler 634 of FIG. 16B comprises IP flow QoS class queuing processor module 1662 , MAC uplink subframe scheduler module 1666 , hierarchical class-based priority processor module 1674 , VPN DEN data table module 1672 , SLA priority data table 1670 , CPE IP flow queue depth status processor 1682 and link layer acknowledgment processor module 1678 .
- Uplink flow scheduler 634 of FIG. 16B also includes QoS class queues for class 1 , 1664 a ; class 2 , 1664 b ; class 3 , 1664 c ; class 4 , 1664 d ; class 5 , 1664 e ; and class 6 , 1664 f ; and MAC uplink subframes: frame n 1668 a ; frame n+1, 1668 b ; frame n+2, 1668 c ; frame n+3, 1668 d , . . . frame n+p, 1668 k.
- uplink flow scheduler 634 is physically located in wireless base station 302 , although those skilled in the art will recognize that the same functionality can be located remotely from wireless base station 302 .
- uplink flow scheduler 634 can be located at CPE station 294 d and is in communication with other CPE stations 294 and the wireless base station 302 .
- Uplink flow scheduler 634 is used to schedule the uplink subframe.
- the entire frame is divided into an uplink portion (called an uplink subframe) for transmitting uplink frames, and a downlink portion (called a downlink subframe) for transmitting downlink frames.
- WAP antenna 290 d Illustrated in FIG. 16B are WAP antenna 290 d , the wireless medium, RF transceiver subscriber antenna 292 d , subscriber CPE station 294 d and subscriber workstation 120 d .
- WAP 290 d and RF transceiver subscriber antenna 292 d respectively provide a wireless connection between wireless base station 302 (where uplink flow scheduler 634 resides in one embodiment) and subscriber CPE station 294 d , which can transmit upstream an IP flow from an application running on client computer 120 d .
- WAP 290 d serves as a wireless gateway for data network 142
- RF transceiver subscriber antenna 292 d serves as a wireless gateway for subscriber CPE station 294 d to uplink the IP flow packet data.
- data interface 320 which provides a connection from uplink flow scheduler 634 for sending uplinked IP flow packets on to data router 140 d of data network 142 and on to a destination host computer 136 a . These connections are also illustrated in FIGS. 2D and 3B .
- the previous frame includes an uplink reservation request which is received by the wireless base station from a subscriber CPE station 294 d .
- the reservation request block has been identified, characterized, classified, and presented, preferably at the CPE station 294 d , and has been transmitted to uplink flow scheduler 634 from uplink flow analyzer 632 at the CPE 294 d .
- the reservation request block is presented to IP flow QoS class queuing processor module 1662 from module 1650 .
- Module 1662 informs MAC uplink subframe scheduler 1666 of the reservation.
- MAC uplink subframe scheduler 1666 uses a slot in the subframe to acknowledge receipt of the request called the acknowledgment request block (ARB).
- ARB acknowledgment request block
- An exemplary slot used to convey the frame, slot, and IP flow identifier for this reservation is described with respect to FIG. 12 .
- Scheduler 1666 transmits in this reservation slot the CPE identification data, along with which future slot(s) and frame(s) the requesting subscriber CPE station 294 d is permitted to use for uplink of the requested data packet IP flow transmissions.
- the future slot(s) in the future frame(s) are assigned, e.g., based on inputs from hierarchical class-based priority processor module 1674 , VPN DEN data table 1672 and service level agreement (SLA) priority data table 1670 .
- These components function in a similar manner to hierarchical class-based priority processor module 1574 , VPN DEN data table 1572 and service level agreement (SLA) priority data table 1570 , described with respect to the downlink flow scheduler 604 .
- IP flow QoS class queuing processor module 1662 When IP flow QoS class queuing processor module 1662 receives packets of an existing or new IP flow from IP flow presentation module 1608 , it then creates class queues 1664 a - 1664 f , which is a variable number of queues, and places the packets in these class queues. In a preferred embodiment there are between 3 and 10 classes. These queues hold reservation request packets for scheduling. Packets are placed in class queues 1664 a - 1664 f according to the contents of the reservation request block for input to module 1662 .
- Module 1662 receives inputs from hierarchical class-based priority processor module 1674 , VPN DEN data table 1672 and service level agreement (SLA) priority data table 1670 .
- the queuing function of module 1662 is based on these inputs.
- SLA priority data table 1670 and VPN DEN data table 1672 receive input from operations, administration, maintenance and provisioning (OAM&P) module 1108 .
- OAM&P module 1108 provides updates to priorities when, e.g., a subscriber modifies its service level agreement or a VPN subscription is changed.
- MAC uplink subframe scheduler 1666 takes the requests queued in class queues 1664 a - 1664 f , and schedules reservations of slots in frames 1668 a - 1668 k , which is a variable number of frames.
- each frame is scheduled with up to a predetermined number limit or percentage limit of packets from each of the classes 1664 a - 1664 f .
- the requests can be scheduled as shown in FIG. 13 , taking into account certain priorities.
- the frames are scheduled according to the inventive advanced reservation algorithm method for scheduling isochronous type traffic described with respect to FIG. 14 .
- the frames are scheduled according to a combination of known methods and the advanced reservation algorithm method of the present invention.
- the reservation slot schedule can then be sent down to the CPE stations 294 using, e.g., FDB slots such as 1236 g and 1236 h of FIG. 12F .
- the uplink slots can then be inserted by CPE station 294 d into the uplink subframe as scheduled.
- the frame slots are then transmitted up from CPE station 294 d to wireless base station 302 and are then sent on as packets to their destination addresses. For example, from wireless, base station 302 the packets can be transmitted over data network 142 to a host computer 136 a.
- the wireless base station 302 After the uplink packets are received by the wireless base station 302 , the wireless base station 302 sends an upstream acknowledgment data block (UAB) message back down to the transmitting subscriber CPE station 294 d , to acknowledge receipt of the transmitted data packets.
- UAB upstream acknowledgment data block
- the subscriber CPE station 294 d determines that it has not received a UAB data acknowledgment, so it sends a retransmit request requesting another uplink reservation slot to wireless base station 302 via WAP 290 d , which transmits the request to link layer acknowledgment (ARQ) processor 1678 .
- ARQ processor 1678 informs MAC uplink subframe scheduler 1666 of the need of retransmission (i.e. the need of a frame slot reservation for resending the uplink packet).
- CPE subscriber station 294 d can also send to ARQ processor 1678 , other data messages about nonreceipt of uplink transmission acknowledgments.
- the ARQ 1678 can forward such messages on to the uplink subframe scheduler 1666 .
- the uplink subframe scheduler 1666 in turn reschedules the requested uplink reservation from the appropriate class queues 1664 a - 1664 f .
- link layer acknowledgment processor 1678 can also send a positive UAB acknowledgment to the subscriber CPE station 294 d , to indicate that the data packets have been properly received.
- uplink scheduler 1666 in addition to scheduling first time reservations, also can schedule repeat reservations for lost packets.
- Each subscriber CPE station 294 d has a limited amount of memory space available for queuing packets received from subscriber workstations 120 d awaiting reservation slots of uplink from the CPE 294 d to wireless base station 302 .
- the queue of subscriber CPE station 294 d becomes full from a backup of packets awaiting upstream reservations, IP data flows can potentially be lost, or packets may become stale.
- subscriber CPE station 294 d transmits a CPE IP flow queue depth message 1680 to the wireless base station 302 indicating that the queue is filled up, which can be received by CPE IP flow queue depth status processor 1682 .
- Processor 1682 can inform MAC uplink subframe scheduler 1666 of this condition, which can, e.g., increase temporarily the priority of IP flows at subscriber CPE station 294 d to overcome the backlog or can, e.g., stop transmitting additional downlink packets to the CPE station 294 d until the queue depth backlog is decreased to an acceptable level again.
- Processor 1682 can also send messages to MAC uplink subframe scheduler 1666 to flush reservation requests from the subscriber CPE station 294 d in class queues 1664 a - 1664 f.
- TCP is a reliable transport protocol tuned to perform well in traditional networks where congestion is the primary cause of packet loss.
- networks with wireless links incur significant losses due to bit-errors.
- the wireless environment violates many assumptions made by TCP, causing degraded end-to-end performance. See for example, Balakrishnan, H., Seshan, S. and Katz, R. H., “Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks,” University of California at Berkeley, Berkeley, Calif., accessible over the Internet at URL, http://www.cs.berkeley.edu/ ⁇ ss/papers/winet/html/winet.html, dealing more directly with handoffs and bit errors in a narrowband wireless environment, the contents of which are incorporated by reference. Attempts to address this problem have modified TCP in order to overcome it. However, this is not a commercially feasible means of overcoming this challenge. It is impracticable to implement any solution that requires a change to the standard operation of TCP.
- the present invention uses an enhanced MAC layer which interfaces with a TCP adjunct agent to intercept TCP layer requests to manipulate the TCP layers at either a source or destination end of a transmission, to modify TCP behavior at the source and destination of the TCP/IP transmission which includes an intermediary wireless link.
- Packets can be queued at the wireless base station awaiting receipt acknowledgment and the base station can perform local retransmissions across the wireless link to overcome packet loss caused by high bit-error rates.
- Communication over wireless links is characterized by limited bandwidth, high latencies, sporadic high bit-error rates and temporary disconnections which must be dealt with by network protocols and applications.
- TCP Reliable transport protocols
- TCP performs very well on such networks by adapting to end-to-end delays and packet losses caused by congestion.
- TCP provides reliability by maintaining a running average of estimated round-trip delay and mean deviation, and by retransmitting any packet whose acknowledgment is not received within four times the deviation from the average. Due to the relatively low bit-error rates over wired networks, all packet losses are correctly assumed to be caused by congestion.
- TCP reacts to packet losses as it would in the wired environment, i.e. it drops its transmission window size before retransmitting packets, initiates congestion control or avoidance mechanisms (e.g., slow start) and resets its retransmission timer.
- congestion control or avoidance mechanisms e.g., slow start
- the present invention maintains packets in class queues awaiting acknowledgment of receipt from the subscriber CPE stations. Unacknowledged data slots can then be resent by having the wireless base station perform local retransmissions to the subscriber CPE station. By using duplicate acknowledgments to identify a packet loss and performing local retransmissions as soon as the loss is detected, the wireless base station can shield the sender from the inherently high bit error rate of the wireless link. In particular, transient situations of very low communication quality and temporary disconnectivity can be hidden from the sender.
- missing packets are detected at the wireless base station and negative acknowledgments can be generated for them.
- the negative acknowledgments can request that the packet be resent from the CPE subscriber host (the sender).
- the CPE subscriber host can then process the negative acknowledgment and retransmit corresponding missing packets.
- no modifications to the sender TCP or receiver TCP is necessary, since the present invention places TCP aware functionality in the MAC layer.
- FIG. 5A illustrates flow 500 depicting IP flows from a source TCP at a subscriber host, down a protocol stack for transmission through a CPE subscriber station, through a wireless medium to a wireless base station, up and through a protocol stack at the wireless base station having an example TCP adjunct agent, then through a wireline connection and through a protocol stack to a destination host.
- the adjunct TCP agent modifies operation of a TCP sliding window algorithm at the transmitting TCP and in cooperation with proactive reservation-based intelligent multi-media access technology (PRIMMA) media access control (MAC) enables local retransmission over the wireless medium in accord with the present invention.
- PRIMMA proactive reservation-based intelligent multi-media access technology
- MAC media access control
- flow 500 illustrates IP packet flow from subscriber workstation 120 d , through CPE subscriber station 294 d at CPE subscriber location 306 d , then over a wireless transmission medium to wireless base station 302 , and eventually over a wireline link over data network 142 to host workstation 136 a.
- TCP adjunct agent 510 e makes sure transport is reliable by modifying operation of the TCP sliding window algorithm at the transmitting TCP in a manner that optimizes the window for the wireless medium.
- TCP adjunct agent 510 e advantageously is transparent to industry standard protocols as agent 510 e does not require modification of the standard TCP/UDP layer of client subscriber workstation 120 d or host workstation 136 a.
- Flow 500 includes IP flows from application layer 512 a , down the protocol stack through TCP/UDP layer 510 a , through IP layer 508 a , then through point-to-point (PPP) layer 520 a , then through data link Ethernet layer 504 a , then through 10BaseT Ethernet network interface card (NIC) physical layer 502 a , over a wire line connection to 10BaseT Ethernet NIC physical layer 502 b of subscriber CPE 294 d.
- IP IP flows from application layer 512 a , down the protocol stack through TCP/UDP layer 510 a , through IP layer 508 a , then through point-to-point (PPP) layer 520 a , then through data link Ethernet layer 504 a , then through 10BaseT Ethernet network interface card (NIC) physical layer 502 a , over a wire line connection to 10BaseT Ethernet NIC physical layer 502 b of subscriber CPE 294 d.
- PPP point-to-point
- Subscriber CPE 294 d flows packets coming in from NIC 502 b , back up its protocol stack through Ethernet layer 504 b , through PPP layers 520 b and 520 c , back down through PRIMMA MAC 504 c to wireless physical layer 502 c including antenna 292 d , then over the wireless medium to antenna 290 d of wireless base station 302 .
- Wireless base station 302 flows packet IP flows up from antenna 290 d at physical layer 502 d through PRIMMA MAC layer 504 d , through PPP layer 520 a , through IP layer 508 d to TCP adjunct agent 510 e , which can flow IP flows down through IP layer 508 e , through PPP layer 520 e , through wide area network (WAN) layer 504 e , through wireline physical layer 502 e , through interface 320 , over routers 140 d , through data network 142 , via wireline connections to wireline layer 502 f of WAN host workstation 136 a.
- WAN wide area network
- Host workstation 136 a flows IP flows from wireline layer 502 f , up through its protocol stack through WAN layer 504 f , through PPP layer 520 f , through IP layer 508 f , to TCP/UDP layer 510 f and on to application layer 512 f.
- TCP/UDP layers 510 a and 510 f act to provide such transport functions as, e.g., segmentation, managing a transmission window, resequencing, and requesting retransmission of lost packet flows.
- Normally TCP layers 510 a and 510 f would send a window of packets and then await acknowledgment or requests for retransmission.
- a TCP sliding window algorithm is normally used to vary the transmission flow to provide optimized transport and to back off when congestion is detected by receipt of requests for retransmission.
- Unfortunately in the wireless environment due to high bit error rates, not all packets may reach the destination address, not because of congestion, but rather because of high bit error rates, so as to prompt a retransmission request from the destination IP host to the source.
- TCP adjunct agent 510 e modifies operation of the TCP sliding window algorithm to optimize operation over wireless.
- PRIMMA MAC layer 504 d interacts with TCP adjunct agent 510 e permitting the agent to intercept, e.g., retransmission requests, from TCP layer 510 a of subscriber workstation 120 d intended for host 136 a , and allowing the wireless base station to retransmit the desired packets or flows to subscriber workstation 120 d rather than forwarding on the retransmission request to host 136 a , since the packets could still be stored in the queue of PRIMMA 504 d and would not be discarded until an acknowledgment of receipt is received from the subscriber CPE.
- retransmission can be performed according to the present invention at the PRIMMA MAC data link layer, i.e. layer 2 , retransmission can occur from the base station to the CPE subscriber, rather than requiring a retransmission from all the way over at the transmitting source TCP which would cause TCP to backoff its sliding window algorithm.
- the inherently high bit error rate can be overcome, while maintaining an optimal TCP window.
- a TCP transmitter transmits a TCP sliding window block of packets and alters the size of the window upon detection of congestion.
- the TCP transmitter transports a block of packets in a window, and then awaits acknowledgment from the receiver. If transmission is going smoothly, i.e. no congestion or lost packets occur, then the transmitter TCP ramps up the transmission rate. This increased transmission rate continues until the transmitting TCP detects congestion or packet loss. When notified of congestion, the transmitting TCP stops transmitting, backs off and sends a smaller block (i.e. a smaller window) of packets.
- TCP adjunct agent modifies normal TCP operation by tricking the transmitting TCP and its transmitting window algorithm.
- the TCP adjunct agent prevents the transmitter from being notified of loss, i.e. receiving congestion notification, from the receiving TCP by, e.g., preventing duplicate retransmission requests. Since the transmitting TCP does not receive such notification, it does not modify the TCP sliding window and transmission continues at the higher rate.
- the TCP adjunct agent can let the retransmission request go through to the transmitting TCP.
- the MAC link layer of the present invention is in communication with the higher protocol layers, it is application aware, transport aware and network aware.
- PRIMMA MAC layer 504 d communicates with the TCP adjunct agent 510 e at layer 4 .
- the MAC layer 504 d knows whether an inter-TCP layer communication, e.g., a request for retransmission, is sent from a client computer TCP at the CPE station is created because the lost packet was lost in wireless transmission, or because of real congestion.
- an inter-TCP layer communication e.g., a request for retransmission
- PRIMMA MAC 504 d does not receive an acknowledgment from 504 c , then the PRIMMA MAC 504 d of wireless base station 302 can retransmit the contents of the lost packet to the subscriber CPE station 294 d . If the PRIMMA MAC 504 c of the subscriber CPE station 294 d acknowledges receipt and still requests a retransmission, then real congestion could have occurred and the PRIMMA MAC 504 d of the wireless base station 302 can let the TCP adjunct agent 510 e know that it should allow the retransmission request to be sent to the transmitting TCP 510 f of host workstation 136 a.
- TCP adjunct agent 510 e of the present invention can modify operation of the TCP sliding window algorithm in a manner that is optimal for the wireless medium, without requiring any change to commercially available TCP layers 510 a and 510 f at the receiver and sender hosts.
- TCP adjunct agent 510 e obviates the need for any modification of the TCP layers at either the sending (i.e. transmitting) host or client.
- the host and client TCP layers are unaware of the modification of operation by the TCP adjunct agent, i.e. it is transparent to source and destination TCP layers.
- TCP adjunct agent 510 e intercepts retransmission requests between a TCP layer of the client computer coupled to the subscriber CPE station and the TCP layer of the host workstation coupled to the data network.
- FIG. 5B illustrates functional flow diagram 522 including an example functional description of TCP adjunct agent 510 e performing an outgoing TCP spoof function.
- diagram 522 assumes that a TCP layer 510 f at a transmitting host 136 a has transmitted a windowful of packet data to subscriber workstation 120 d , and awaits acknowledgment.
- Diagram 522 illustrates receipt of an outgoing TCP message 524 in TCP adjunct agent 510 e at wireless base station 302 which has been sent from subscriber workstation 120 d via subscriber CPE station 294 d.
- step 526 the TCP header contents of outgoing TCP message 524 is parsed in order to reveal the contents of the message being sent from subscriber workstation 120 d through the wireless network toward the transmitting host 136 a.
- step 528 it is determined whether the TCP header contents includes a duplicate acknowledgment message from the CPE station. Receiving a duplicate acknowledgment request from the CPE subscriber location could be indicative of a lost message in the wireless medium, or a real congestion problem. If in step 528 the TCP packet is determined to be a duplicate acknowledgment message, then processing can continue with step 532 , if not, then processing can continue with step 530 .
- step 530 it is determined that there was real congestion, i.e., this was not a duplicate acknowledgment message caused by retransmission attempts at the wireless link layer.
- the TCP message is permitted to pass through TCP adjunct 510 e without modification, and can continue through flow 500 to TCP layer 510 f of FIG. 5A .
- step 532 since there was a duplicate acknowledgment detected in step 528 , it is determined whether the packet was successfully transmitted, or not.
- Step 532 is performed via intercommunication between TCP adjunct agent 510 e and PRIMMA MAC layer 504 d .
- PRIMMA MAC layer 504 d can identify whether a packet was successfully sent from wireless base station 302 to CPE station 294 d since, as illustrated in FIG.
- requests for retransmission 1576 are received from CPE station 294 d at link layer acknowledgment (ARQ) processor 1578 to MAC downlink subframe scheduler 1566 alerting the scheduler 1566 to retransmit the lost packet in a future frame 1568 .
- ARQ link layer acknowledgment
- TCP adjunct agent 510 e can suppress transmission of TCP message 524 since it can be assumed that the packet was lost in the wireless medium. Processing can continue with step 536 .
- TCP adjunct agent 510 e can wait for notification from PRIMMA MAC 504 d that a successful link layer retransmission of the lost packet was received at link layer acknowledgment processor 1578 . From step 536 , processing can continue with step 538 .
- step 538 upon receipt of acknowledgment of a successful PRIMMA MAC 504 d link layer retransmission, then normal TCP messages can be resumed.
- TCP adjunct agent and PRIMMA MAC layers can set a limit of a threshold number of retransmission attempts, and if that threshold is reached, then processing can continue with step 530 to permit the TCP message to pass without modification.
- FIG. 5C illustrates functional flow diagram 540 including an example functional description of TCP adjunct agent 510 e performing an incoming TCP spoof function.
- diagram 540 assumes that a TCP layer 510 a at a transmitting subscriber workstation 120 d has transmitted a windowful of packet data to host 136 a , and awaits acknowledgment.
- Diagram 544 illustrates receipt of an incoming TCP message 542 in TCP adjunct agent 510 e at wireless base station 302 which has been sent from host workstation 136 a via data network 142 for transmission over the wireless medium to subscriber CPE 294 d to subscriber workstation 120 d.
- step 544 the TCP header contents of ingoing TCP message 542 is parsed in order to reveal the contents of the message being sent from host 136 a through the wireless network toward the transmitting subscriber workstation 120 d.
- step 546 it is determined whether the TCP header contents include a duplicate acknowledgment message from host 136 a . Receiving a duplicate acknowledgment request from the host could be indicative of a lost message in the wireless medium, or a real congestion problem. If in step 546 the TCP packet is determined to be a duplicate acknowledgment message, then processing can continue with step 550 , if not, then processing can continue with step 548 .
- step 548 it is determined that there was real congestion, i.e., this was not a duplicate acknowledgment message caused by retransmission attempts at the wireless link layer.
- the TCP message is permitted to pass through TCP adjunct 510 e without modification, and can continue through flow 500 to TCP layer 510 a of FIG. 5A .
- Step 550 since there was a duplicate acknowledgment detected in step 546 , it can be determined whether the packet was successfully transmitted, or not.
- Step 550 can be performed via intercommunication between TCP adjunct agent 510 e and PRIMMA MAC layer 504 d . This is an example of the interactivity between PRIMMA MAC and higher layer protocols illustrated as line 428 in FIG. 4 .
- PRIMMA MAC layer 504 d can identify whether a packet was successfully sent from CPE station 294 d to wireless base station 302 , as illustrated in FIG.
- requests for retransmission 1676 are received from CPE station 294 d at link layer acknowledgment (ARQ) processor 1678 to MAC downlink subframe scheduler 1666 alerting the scheduler 1666 to retransmit the lost packet in a future frame 1668 .
- ARQ link layer acknowledgment
- TCP adjunct agent 510 e can suppress transmission of TCP message 542 since it can be assumed that the packet was lost in the wireless medium. Processing can continue with step 554 .
- TCP adjunct agent 510 e can wait for notification from PRIMMA MAC 504 d that a successful link layer retransmission of the lost packet was received at link layer acknowledgment processor 1678 . From step 554 , processing can continue with step 556 .
- step 556 upon receipt of acknowledgment of a successful PRIMMA MAC 504 d link layer retransmission, then normal TCP messages can be resumed.
- TCP adjunct agent and PRIMMA MAC layers can set a limit of a threshold number of retransmission attempts, and if that threshold is reached, then processing can continue with step 548 to permit the TCP message to pass without modification.
- FIG. 10 illustratively depicts an embodiment of PRIMMA MAC hardware architecture 1000 .
- Architecture 1000 shows data network 142 coupled by a wireline bidirectional connection to WAN interface 320 .
- WAN interface 320 is bidirectionally linked to a bidirectional data frame FIFO 1002 which is bidirectionally coupled to both segmentation and resequencing (SAR) 1004 and QoS/SLA rules engine and processor 1008 .
- SAR segmentation and resequencing
- QoS/SLA rules engine and processor 1008 QoS/SLA rules engine and processor 1008 .
- QoS/SLA rules engine and processor 1008 is also bidirectionally coupled to IP flow buffers 1014 and flash random access memory (RAM) 1010 .
- SAR 1004 is bidirectionally coupled to IP flow buffers 1014 , flash RAM 1010 , QoS/SLA rules engine and processor 1008 and PRIMA MAC scheduler ASIC 1012 .
- PRIMA MAC scheduler ASIC 1012 is also bidirectionally coupled to an RF interface 290 , a static RAM (SRAM) radio cell buffer 1018 and IP blow buffer 1014 .
- SRAM static RAM
- FIG. 11 is an exemplary software organization for a packet-centric wireless point to multi-point telecommunications system.
- the software organization of FIG. 11 includes wireless transceiver and RF application specific integrated circuit (ASIC) module 290 , IP flow control component 1102 , WAN interface management component 1104 , QoS and SLA administration component 1106 , system and OAM&P component 1108 , customer billing and logging component 1110 , directory enabled networking (DEN) component 1112 , and wireless base station 320 .
- ASIC application specific integrated circuit
- IP flow control module 1102 includes transmission queuing control module 1102 a , TCP rate control and class of service module 1102 b , wireless PRIMMA MAC layer engine 1102 c and IP flow identification and analysis module 1102 d.
- WAN interface management component 1104 includes WAN ingress/egress queuing control module 1104 a , WAN interface ports (e.g., for T1, T3, OC3 ports) 1104 b , firewall and security module 1104 c , and WAN traffic shaping module 1104 d.
- the IP Flow control component 1102 and WAN interface management component 1104 represent the “core” of the system, where the packet processing, MAC layer scheduling, TCP proxy agent, and WAN I/F control functions are located. Much of the activities of the “non-core” components described above support and control these core components.
- QoS and SLA administration component 1106 includes QoS performance monitoring and control module 1106 a , service level agreements module 1106 b , policy manager module 1106 c and encryption administration module 1106 d.
- the QoS and SLA administration component 1106 provides the static data needed by the system in order to properly group particular IP-flows into QoS classes.
- the service provider will (remotely) download pertinent information about the subscriber CPE station 294 , including the subscriber CPE stations's SLA, any policy-based information (such as hours of operation or peak data transmission rate allowance.). Encryption keys or “strengths” can also be downloaded, which may be subscriber CPE station or service provider specific.
- System OAM&P component 1108 includes SNMP proxy client for WAP module 1108 a , SNMP proxy clients for CPE module 1108 b , and system operations, administration, management arid provisioning module 1108 c.
- the OAM&P component 1108 allows remote service personnel and equipment to monitor, control, service, modify and repair the system. System performance levels can be automatically monitored, and system traps and traces can be set. Subscriber complaints can be addressed with the use of remote test and debug services controlled by OAM&P component 1108 . System capacity limits can be monitored, and proactive provisioning of additional WAN connectivity can occur, as the result of automatic trend analysis functions in OAM&P component 1108 .
- Customer billing and logging module 1110 includes account logging and database management module 1110 a , transaction query and processing control module 1110 b , billing and account control module 111 c , and user authentication module 1110 d.
- the customer billing and logging component 1110 allows the service provider to receive account, billing and transaction information pertaining to subscribers in the system. For service providers who bill on the basis of usage, cumulative system resource utilization data can be gathered. For specific types of activities (e.g., video conferencing, multi-casting, etc.) there may be special billing data that is collected and transmitted to the service provider.
- This component also controls the availability of the system to subscribers through the operation of the subscriber authentication function. Once a subscriber is authorized to use the system, a new subscriber authentication entry is made (remotely) by the service provider. Likewise, a subscriber can be denied further access to the system for delinquent payment for services, or for other reasons.
- the service provider can also remotely query the system for specific account-related transactions.
- DEN component 1112 includes DEN QoS 1112 a module, DEN management and provisioning 1112 b module, DEN IPSEC module 1112 c and IP-based VPN control and administration module 1112 d.
- the DEN component 1112 allows the service provider the means to input into the system relevant information regarding the operation of DEN-based VPN's of subscribers. Subscriber VPNs need to be “initialized” and “provisioned” so that the system properly allocates system resources to subscribers with these VPNs, and provides for the recognition and operation of these VPNs. Data from DEN component 1112 are utilized by the system to apply the appropriate priorities to IP-flows of the subject subscribers.
- the invention's packet-centric wireless base station supports directory enabled networking (DEN), a MICROSOFT, INTEL and CISCO standard for providing a standard structure for how distributed sites manage IP flows.
- the present invention prioritizes VPN traffic in a lightweight directory access protocol (LDAP)-compliant (LDAP is available from MICROSOFT of Redmond, Wash.) manner which allows remote administration, provisioning and management.
- LDAP lightweight directory access protocol
- the present invention is also LDAP version 2 compliant.
- the present invention also complies with the X.500 standard promulgated by the international telecommunications union/telecommunications section (ITU/T), and with the RFC 1777.
- DEN provides policy-based network management, IPsec compatible network security, and IPsec based VPNs.
- the DEN of the wireless base station 302 is planned to be common information model (CIM) 3.0 compatible (once the specification is finalized).
- the wireless base station 302 can provide native DEN support and supports directory based DEN QoS mechanisms including reservation model (i.e. RSVP, per-flow queuing), and precedence/priority/differentiated model (i.e. packet marking).
- Wireless base station 302 can plan support of DEN network policy QoS, and until DEN is complete, can support internal QoS and network extensions.
- IPsec is introduced above with reference to FIG. 4 .
- IPsec provides a standard method of encrypting packets.
- an entire header can be encoded, i.e. encrypted.
- the wireless base station needs to be able to analyze the contents of header fields of the packets. Therefore, analysis of unencrypted packets is desirable.
- IPsec already encrypts the data stream prior to transmitting frames over the wireless medium, so IPsec does not really need to be used over the wireless link to provide for encrypted transmission.
- IPsec can be used for authentication and secure encapsulation of the header and payload, or just the payload data.
- IPsec is normally integrated at a firewall. If a service provider desires to implement the present invention and IPsec, then the present invention should be implemented behind the firewall, i.e. the firewall can be moved to the wireless base station. This permits ending the IPsec stream at the base station which can provide the base station access to packet header fields.
- FIG. 17 illustrates IP flow in the downlink direction including IPsec encryption.
- FIG. 18 illustratively depicts an uplink direction of IPsec support of the present invention.
- FIG. 17 illustrates downlink flow 1700 depicting downlink direction IP flows from a source host workstation 136 a , down a protocol stack which supports IPsec, for transmission up and through wireless base station 302 which is coupled to data network 142 , through encryption layers, then through the wireless link to subscriber CPE 294 d , up and through a protocol stack at the subscriber CPE 294 d , then through a wireline connection to data network 142 and up through the protocol stack to the destination subscriber workstation 120 d at subscriber location 306 d.
- flow 1700 illustrates IP packet flow from host workstation 136 a , through wireless base station 302 , then over a wireless transmission link to subscriber CPE 294 d , and over a wireline link to subscriber workstation 120 d.
- Host workstation 136 a flows IP flows down from application layer 1712 h , down through TCP/UDP layer 1710 h , through IP layer 1708 h , through optional PPP layer 1706 h , through Ethernet layer 1705 h , down through 10BaseT layer 1702 h , over data network 142 to 10BaseT layer 1702 g , then up through Ethernet 1704 g , up its protocol stack through optional PPP layer 1706 g to IP layer 1708 g and 1708 h , back down through Internet firewall and IPsec security gateway 1706 f , down through WAN layer 1704 f , to wireline layer 1702 f to data network 142 to wireline physical layer 1702 e.
- Wireline physical layer 1702 e of wireless base station 302 flows IP flows up the protocol stack through WAN layer 1704 e through IPsec security gateway 1706 e and firewall to IP network layer 1708 e and 1708 d and then down through encryption layer 1706 d , PRIMMA MAC layer 1704 d and down to wireless link to subscriber CPE 294 d.
- Subscriber CPE 294 d flows packet IP flows up from antenna 292 d at physical wireless layer 1702 c up through MAC layer 1704 c , through encryption layer 1706 c , through IP layers 1708 b and 1708 c , then down through optional layer 1706 b to Ethernet layer 1704 b to 10BaseT connection 1702 b to 10BaseT connection.
- Subscriber workstation 120 d flows IP flows up from 10BaseT layer 1702 a up through its protocol stack through Ethernet layer 1704 a , through optional PPP layer 1706 a , through IP layer 1708 a , to TCP/UDP layer 1710 a and on up to application layer 1712 a.
- FIG. 18 illustrates uplink flow 1800 depicting uplink direction IP flows from a source TCP at subscriber workstation 120 d at CPE location 306 d , down a protocol stack for transmission through Ethernet coupled CPE subscriber station 294 d through wireless medium to wireless base station 302 , up and through a protocol stack at the wireless base station 302 which supports IPsec, then through a wireline connection to data network 142 and through a protocol stack to a destination host.
- flow 1800 illustrates IP packet flow from subscriber workstation 120 d , through subscriber CPE 294 d , then over a wireless transmission medium to wireless base station 302 , and eventually over a wireline link to host workstation 136 a.
- Flow 1800 includes IP flows from application layer 1812 a , down the protocol stack through TCP/UDP layer 1810 a , through IP layer 1808 a , then through optional point-to-point (PPP) layer 1806 a , then through data link Ethernet layer 1804 a , then through 10BaseT Ethernet, network interface card (NIC) physical layer 1802 a , over a wire line connection to 10BaseT Ethernet NIC physical layer 1802 b of subscriber CPE 294 d.
- PPP point-to-point
- NIC network interface card
- Subscriber CPE 294 d flows packets coming in from NIC 1802 b , back up its protocol stack through Ethernet layer 1804 b , through optional PPP layer 1806 b to IP layer 1808 b and 1808 c , back down through an Internet firewall and IPsec security gateway 1806 c , down through PRIMMA MAC 1804 c to wireless physical layer 1802 c including antenna 292 d , then over the wireless medium, such as, e.g., RF communication, cable RF, and satellite link, to antenna 290 d of wireless base station 302 at wireless physical layer 1802 d.
- the wireless medium such as, e.g., RF communication, cable RF, and satellite link
- Wireless base station 302 flows packet IP flows up from antenna 290 d at physical wireless layer 1802 d up through MAC layer 1804 d , through IPsec layers 1806 d and 1806 d , which can encapsulate packets and encrypt them. From IPsec layer 1806 e , IP flows can flow down through WAN layer 1804 e and through wireline physical layer 1802 e over data network 142 .
- Wireline physical layer 1802 f flows IP flows up the protocol stack through WAN layer 1804 f through IPsec security gateway 1806 f and firewall to IP network layer 1808 f and 1808 g and then down through optional PPP layer 1806 h , Ethernet layer 1804 h and down through 10BaseT layer 1802 g , through interface 320 , over routers 140 d , through data network 142 , via wireline connections to 10BaseT physical layer 1802 h of host workstation 136 a.
- Host workstation 136 a flows IP flows up from 10BaseT layer 1802 h up through its protocol stack through Ethernet layer 1805 h , through optional PPP layer 1806 h , through IP layer 1808 h , to TCP/UDP layer 1810 h and on to application layer 1812 h.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- This application is a continuation of currently pending U.S. application Ser. No. 11/068,719, filed Feb. 28, 2005, entitled TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE, which is a continuation of U.S. application Ser. No. 09/349,477, filed Jul. 9, 1999, entitled TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE, which issued as U.S. Pat. No. 6,862,622, on Mar. 1, 2005, and which claims the benefit of priority from U.S. Provisional Patent Application No. 60/092,452, filed Jul. 10, 1998, the disclosures of each are incorporated herein by reference thereto.
- The following applications of common assignee contain common disclosure:
-
- U.S. patent application entitled “Quality of Service (QoS)-Aware Wireless Point to Multi-Point (PtMP) Transmission System Architecture,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,480, now abandoned.
- U.S. patent application entitled “Method for Providing Dynamic Bandwidth Allocation Based on IP-Flow Characteristics in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/350,126, now abandoned.
- U.S. patent application entitled “Method for Providing for Quality of Service (QoS)-Based Handling of IP-Flows in a Wireless Point to Multi-Point Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/350,118, now abandoned.
- U.S. patent application entitled “IP-Flow Identification in a Wireless Point to Multi-Point Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/347,856, issued as U.S. Pat. No. 6,594,246.
- U.S. patent application entitled “IP-Flow Characterization in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/350,150, issued as U.S. Pat. No. 6,590,885.
- U.S. patent application entitled “IP-Flow Classification in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/350,156, issued as U.S. Pat. No. 6,452,915.
- U.S. patent application entitled “IP-Flow Prioritization in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,476, now abandoned.
- U.S. patent application entitled “Method of Operation for Providing for Service Level Agreement (SLA) Based Prioritization in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/350,170, now abandoned.
- U.S. patent application entitled “Method for Transmission Control Protocol (TCP) Rate Control With Link-Layer Acknowledgments in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,481, now abandoned.
- U.S. patent application entitled “Transmission Control Protocol/Internet Protocol (TCP/IP)-Centric QoS Aware Media Access Control (MAC) Layer in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 350,159, now abandoned.
- U.S. patent application entitled “Use of Priority-Based Scheduling for the Optimization of Latency and Jitter Sensitive IP Flows in a Wireless Point to Multi-Point Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/347,857, now abandoned.
- U.S. patent application entitled “Time Division Multiple Access/Time Division Duplex (TDMA/TDD) Access Method for a Wireless Point to Multi-Point Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,475, now abandoned.
- U.S. patent application entitled “Reservation Based Prioritization Method for Wireless Transmission of Latency and Jitter Sensitive IP-Flows in a Wireless Point to Multi-Point Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,483, issued as U.S. Pat. No. 6,628,629.
- U.S. patent application entitled “Translation of Internet-Prioritized Internet Protocol (IP)-Flows into Wireless System Resource Allocations in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,479, now abandoned.
- U.S. patent application entitled “Method of Operation for the Integration of Differentiated services (Diff-serv) Marked IP-Flows into a Quality of Service (QoS) Priorities in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/350,162, now abandoned.
- U.S. patent application entitled “Method for the Recognition and Operation of Virtual Private Networks (VPNs) over a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,975, issued as U.S. Pat. No. 6,680,922.
- U.S. patent application entitled “Time Division Multiple Access/Time Division Duplex (TDMA/TDD) Transmission Media Access Control (MAC) Air Frame,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/350,173, now abandoned.
- U.S. patent application entitled “Application-Aware, Quality of Service (QoS) Sensitive, Media Access Control (MAC) Layer,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,482, issued as U.S. Pat. No. 6,640,248.
- U.S. patent application entitled “Transmission Control Protocol/Internet Protocol (TCP/IP) Packet-Centric Wireless Point to Point (PtP) Transmission System Architecture,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,478, now abandoned.
- U.S. patent application entitled “Transmission Control Protocol/Internet Protocol (TCP/IP) Packet-Centric Cable Point to Multi-Point (PtMP) Transmission System Architecture,” filed Jul. 9, 1999, assigned U.S. application Ser. No. 09/349,474, now abandoned.
- U.S. patent application entitled “Method and Computer Program Product for Internet Protocol (IP)-Flow Classification in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Oct. 24, 2002, assigned U.S. application Ser. No. 10/241,454.
- U.S. patent application entitled “Method for Providing Dynamic Bandwidth Allocation based on IP-Flow Characteristics in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Aug. 10, 2006, assigned U.S. application Ser. No. 11/502,331.
- U.S. patent application entitled “Use of Priority-Based Scheduling for the Optimization of Latency and Jitter Sensitive IP Flows in a Wireless Point to Multi-Point Transmission System,” filed Aug. 10, 2006, assigned U.S. application Ser. No. 11/502,583.
- U.S. patent application entitled “Quality of Service (QoS)-Aware Wireless Point to Multi-Point (PtMP) Transmission System Architecture,” filed Aug. 10, 2006, assigned U.S. application Ser. No. 11/502,596.
- U.S. patent application entitled “Method for Providing for Quality of Service (QoS)-Based Handling of IP-Flows in a Wireless Point to Multi-Point Transmission System,” filed Aug. 10, 2006, assigned U.S. application Ser. No. 11/502,348.
- U.S. patent application entitled “Transmission Control Protocol/Internet Protocol (TCP/IP)-Centric QoS Aware Media Access Control (MAC) Layer in a Wireless Point to Multi-Point (PtMP) Transmission System,” filed Aug. 10, 2006, assigned U.S. application Ser. No. 11/502,599.
- U.S. patent application entitled “Time Division Multiple Access/Time Division Duplex (TDMA/TDD) Transmission Media Access Control (MAC) Air Frame,” Aug. 10, 2006, assigned U.S. application Ser. No. 11/502,601.
- The present invention relates generally to telecommunications and, more particularly, to a system and method for implementing a QoS aware wireless point-to-multi-point transmission system.
- Telecommunication networks such as voice, data and video networks have conventionally been customized for the type of traffic each is to transport. For example, voice traffic is very latency sensitive but quality is less important, so voice networks are designed to transport voice traffic with limited latency. Traditional data traffic, such as, e.g., a spreadsheet, on the other hand is not latency sensitive, but error-free delivery is required. Conventional telecommunications networks use circuit switching to achieve acceptable end user quality of service (QoS). With the advent of new packet switching high bandwidth data networks, different types of traffic can be transported over a data network. Specifically, convergence of separate voice, data and video networks into a single broadband telecommunications network is enabled. To ensure end user satisfaction, a system is desired that provides QoS for various types of traffic to be transported.
- Wireless networks present particular challenges over their wireline counterparts in delivering QoS. For example, wireless networks traditionally exhibit high bit error rates (BER) due to a number of reasons. Conventional wireless networks also implement circuit switched connections to provide reliable communications channels. However the use of circuit switched connections allocates bandwidth between communicating nodes whether or not traffic is constantly being transferred between the nodes. Therefore, circuit switched connections use communications bandwidth rather inefficiently.
- Packet switching makes more efficient use of available bandwidth than does traditional circuit switching. Packet switching breaks up traffic into so-called “packets” which can then be transported from a source node to a destination for reassembly. Thus a particular portion of bandwidth can be shared by many sources and destinations yielding more efficient use of bandwidth.
- A wireless broadband access telecommunications system is desired which can provide a QoS capability that is comparable to that delivered by wireline broadband access devices. Conventionally, one of the barriers to the deployment of wireless broadband access systems has been the absence of acceptable QoS characteristics, while at the same time delivering bandwidth sufficient to qualify as broadband. Delivery of raw bandwidth over wireless media without acceptable QoS would not benefit end users. Likewise, the delivery of a high level of QoS at the cost of sufficient bandwidth would also not benefit end users.
- Conventional efforts to provide wireless broadband access systems have not granted sufficient priority to QoS as a guiding principle in architecting the wireless systems, resulting in sub-optimal designs. With the rapid emergence of the Internet, the packet switching paradigm, and transmission control protocol/internet protocol (TCP/IP) as a universal data protocol, it has become clear that a new wireless system design has become necessary.
- What is needed then is an IP-centric wireless broadband access system with true QoS capabilities.
- The present invention is directed to a packet-centric wireless point to multi-point telecommunications system including: a wireless base station communicating via a packet-centric protocol to a first data network; one or more host workstations communicating via the packet-centric protocol to the first data network; one or more subscriber customer premise equipment (CPE) stations coupled with the wireless base station over a shared bandwidth via the packet-centric protocol over a wireless medium; and one or more subscriber workstations coupled via the packet-centric protocol to each of the subscriber CPE stations over a second network. The packet-centric protocol can be transmission control protocol/internet protocol (TCP/IP). The packet-centric protocol can be a user datagram protocol/internet protocol (UDP/IP).
- The system can include a resource allocation means for allocating shared bandwidth among the subscriber CPE stations. The resource allocation is performed to optimize end-user quality of service (QoS). The wireless communication medium can include at least one of: a radio frequency (RF) communications medium; a cable communications medium; and a satellite communications medium. The wireless communication medium can further include a telecommunications access method including at least one of: a time division multiple access (TDMA) access method; a time division multiple access/time division duplex (TDMA/TDD) access method; a code division multiple access (CDMA) access method; and a frequency division multiple access (FDMA) access method.
- The first data network includes at least one of: a wireline network; a wireless network; a local area network (LAN); and a wide area network (WAN). The second network includes at least one of: a wireline network; a wireless network; a local area network (LAN); and a wide area network (WAN).
- The system of
claim 1 can include a resource allocator that allocates shared bandwidth among the subscriber CPE stations. The resource allocator optimizes end-user quality of service (QoS). The resource allocator can be application aware as well. - The cross-referenced applications listed above are incorporated herein by reference in their entireties.
- The present invention will be described with reference to the accompanying figures, wherein:
-
FIG. 1A is a block diagram providing an overview of a standard telecommunications network providing local exchange carrier services within one or more local access and transport areas; -
FIG. 1B depicts an exemplary network including workstations coupled to a data network; -
FIG. 1C illustrates a conventional video network, such as for example a cable television (CATV) network; -
FIG. 2A is a block diagram illustrating an overview of a standard telecommunications network providing both local exchange carrier and interexchange carrier services between subscribers located in different local access and transport areas; -
FIG. 2B illustrates a signaling network in detail; -
FIG. 2C illustrates an exemplary network carrying voice, data and video traffic over a data network; -
FIG. 2D depicts a network including a point-to-multipoint wireless network coupled via a router to a data network; -
FIG. 3A depicts an exemplary perspective diagram of a point-to-multipoint network, -
FIG. 3B depicts a block diagram further illustrating a wireless point-to-multipoint network; -
FIG. 4 depicts a wireless Internet protocol network access architecture of the present invention; -
FIG. 5A depicts Internet protocol flows from a subscriber host to a wireless base station, and through a wireline connection to a destination host; -
FIG. 5B illustrates a functional flow diagram including an example functional description of a transmission control protocol adjunct agent performing an outgoing transmission control protocol spoof function; -
FIG. 5C illustrates a functional flow diagram including an exemplary functional description of a transmission control protocol adjunct agent performing an incoming transmission control protocol spoof function; -
FIG. 6 illustrates a block diagram representing scheduling of mixed Internet protocol flows; -
FIG. 7 illustrates packet header field information which can be used to identify Internet protocol flows and the quality of service requirements of the Internet protocol flows; -
FIG. 8A is a block diagram summarizing an exemplary downlink analysis, prioritization and scheduling function; -
FIG. 8B is a block diagram summarizing an exemplary uplink analysis prioritization and scheduling function; -
FIG. 9 illustrates how a downlink flow scheduler can take into account a service level agreement in prioritizing a frame slot and scheduling resource allocation; -
FIG. 10 depicts an embodiment of an inventive media access control hardware architecture; -
FIG. 11 is an exemplary software organization for a packet-centric wireless point to multipoint telecommunications system; -
FIG. 12A illustrates an exemplary time division multiple access media access control air frame; -
FIG. 12B illustrates an exemplary structure for a time division multiple access/time division duplex air frame; -
FIG. 12C illustrates an exemplary downstream transmission subframe; -
FIG. 12D illustrates an exemplary upstream acknowledgment block field of a downstream transmission subframe; -
FIG. 12E illustrates an exemplary acknowledgment request block field of a downstream transmission subframe; -
FIG. 12F illustrates an exemplary frame descriptor block field of a downstream transmission subframe; -
FIG. 12G illustrates an exemplary downstream media access control payload data unit of a downstream transmission subframe; -
FIG. 12H illustrates an exemplary command and control block of a downstream transmission subframe; -
FIG. 12I illustrates an exemplary upstream transmission subframe; -
FIG. 12J illustrates an exemplary downstream acknowledgment block of an upstream transmission subframe; -
FIG. 12K illustrates an exemplary reservation request block of anupstream transmission subframe 1204; -
FIG. 12L illustrates an exemplary media access control payload data unit of an upstream transmission subframe; -
FIGS. 12M, 12N and 12O illustrate an exemplary operations data block of an upstream transmission subframe; -
FIG. 13 illustrates how an exemplary flow scheduler for the present invention functions; -
FIG. 14 is an exemplary two-dimensional block diagram of an advanced reservation algorithm; -
FIG. 15A is an exemplary logical flow diagram for a downlink flow analyzer; -
FIG. 15B is an exemplary logical flow diagram for a downlink flow scheduler; -
FIG. 16A is an exemplary logical flow diagram for an uplink flow analyzer; -
FIG. 16B is an exemplary logical flow diagram for an uplink flow scheduler; -
FIG. 17 illustrates Internet protocol flow in a downlink direction, including Internet protocol security encryption; and -
FIG. 18 illustrates an uplink direction of Internet protocol security support. - In the figures, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements. The figure in which an element first appears is indicated by the leftmost digit(s) in the reference number.
- The present invention is described in terms of an example environment. The example environment uses a fixed wireless point-to-multi-point (PtMP) connection to transmit packetized data information including for example, IP telephony, video, data, received from a telecommunications carrier. As used herein, a telecommunications carrier can include US domestic entities (see Definitions below at section II) such as, e.g., ILECs, CLECs, IXCs, NGTs and Enhanced Service Providers (ESPs), as well as global entities such as PTTs and NEs, recognized by those skilled in the art. In addition, as used herein a telecommunications system includes domestic systems used by entities such as, e.g., ILECs, CLECs, IXCs and Enhanced Service Providers (ESPs), as well as global systems recognized by those skilled in the art.
- In the preferred embodiment, the traffic arrives from a wide area network (WAN) connection.
- Data traffic is received from a data network through a network router and can be demodulated from internet protocol (IP) format to, for example, the point-to-point protocol (PPP). Network routers can include, for example, a general purpose computer, such as the SUN workstation running routing software or a dedicated routing device such as various models from CISCO of San Jose, Calif., ASCEND of Alameda, Calif., NETOPIA of Alameda, Calif., or 3COM of Santa Clara, Calif.
- In the alternative, a virtual private networking protocol, such as the point-to-point tunneling protocol (PPTP), can be used to create a “tunnel” between a remote user and a corporate data network. A tunnel permits a network administrator to extend a virtual private network from a server (e.g., a Windows NT server) to a data network (e.g., the Internet).
- Although the invention is described in terms of this example environment, it is important to note that description in these terms is provided for purposes of illustration only. It is not intended that the invention be limited to this example environment or to the precise inter-operations between the above-noted devices. In fact, after reading the following description, it will become apparent to a person skilled in the relevant art how to implement the invention in alternative environments.
- Table 1 below defines common telecommunications terminology. These terms are used throughout the remainder of the description of the invention.
TABLE 1 Term Definition access tandem (AT) An AT is a class 3/4 switch used to switch calls between EOs in aLATA. An AT provides subscribers access to the IXCs, to provide long distance calling services. An access tandem is a network node. Other network nodes can include, for example, a CLEC, or other enhanced services provider (ESP), an international gateway or global point-of- presence (GPOP), or an intelligent peripheral (IP). bearer (B) channels Bearer (B) channels are digital channels used to carry both digital voice and digital data information. An ISDN bearer channel is 64,000 bits per second, which can carry PCM-digitized voice or data. called party The called party is the caller receiving a call sent over a network at the destination or termination end. calling party The calling party is the caller placing a call over any kind of network from the origination end. central office (CO) A CO is a facility that houses an EO homed. EOs are often called COs. class 1 switchA class 1 switching office, the Regional Center(RC), is the highest levelof local and long distance switching, or “office of last resort” to complete a call. class 3 switchA class 3 switching office was a Primary Center (PC); an access tandem(AT) has class 3 functionality.class 4 switchA class 4 switching office was a Toll Center (TC) if operators werepresent or else a Toll Point (TP); an access tandem (AT) has class 4functionality. class 5 switchA class 5 switching office is an end office (EO) or the lowest level oflocal and long distance switching, a local central office. The switch closest to the end subscriber. competitive LEC CLECs are telecommunications services providers of local services that (CLEC) can compete with ILECs. Interprise and Century 21 are examples. A CLEC may or may not handle IXC services as well. competitive access Teligent and Winstar are examples. providers (CAPS) customer premises CPE refers to devices residing on the premises of a customer and used to equipment (CPE) connect to a telephone network, including ordinary telephones, key telephone systems, PBXs, video conferencing devices and modems. digitized data (or Digitized data refers to analog data that has been sampled into a binary digital data) representation (i.e., comprising sequences of 0's and 1's). Digitized data is less susceptible to noise and attenuation distortions because it is more easily regenerated to reconstruct the original signal. egress end office The egress EO is the node or destination EO with a direct connection to the called party, the termination point. The called party is “homed” to the egress EO. Egress Egress refers to the connection from a called party or termination at the destination end of a network, to the serving wire center (SWC). end office (EO) An EO is a class 5 switch used to switch local calls within a LATA.Subscribers of the LEC are connected (“homed”) to EOs, meaning that EOs are the last switches to which the subscribers are connected. Enhanced Service A network services provider. Provider (ESP) equal access 1+ dialing as used in US domestic calling for access to any long distance carrier as required under the terms of the modified final judgment (MFJ) requiring divestiture of the Regional Bell Operating Companies (RBOCs) from their parent company, AT&T. global point of A GPOP refers to the location where international telecommunications presence (GPOP) facilities and domestic facilities interface, an international gateway POP. incumbent LEC ILECs are traditional LECs in the US, which are the Regional Bell (ILEC) Operating Companies (RBOCs). Bell South and US West are examples. ILEC can also stand for an independent LEC such as a GTE. ingress end office The ingress EO is the node or serving wire center (SVC) with a direct connection to the calling party, the origination point. The calling party is “homed” to the ingress EO. Ingress Ingress refers to the connection from a calling party or origination. integrated service An ISDN Basic Rate Interface (BRI) line provides 2 bearer B channels digital network (ISDN) and 1 data D line (known as “2B + D” over one or two pairs) to a basic rate interface subscriber. (BRI) line integrated services ISDN is a network that provides a standard for communications (voice, digital network (ISDN) data and signaling), end-to-end digital transmission circuits, out-of-band signaling, and a features significant amount of bandwidth. inter machine trunk An inter-machine trunk (IMT) is a circuit between two commonly- (IMT) connected switches. inter-exchange carrier IXCs are US domestic long distance telecommunications services (IXC) providers. AT&T, MCI, Sprint, are examples. internet protocol (IP) IP is part of the TCP/IP protocols. It is used to recognize incoming messages, route outgoing messages, and keep track of Internet node addresses (using a number to specify a TCP/IP host on the Internet). IP corresponds to the network layer of OSI. Internet service An ISP is a company that provides Internet access to subscribers. provider (ISP) ISDN primary rate An ISDN Primary Rate Interface (PRI) line provides the ISDN interface (PRI) equivalent of a Tl circuit. The PRI delivered to a customer's premises can provide 23B + D (in North America) or 30B + D (in Europe) channels running at 1.544 megabits per second and 2.048 megabits per second, respectively. local exchange carrier LECs are local telecommunications services providers. Bell Atlantic and (LEC) US West are examples. local access and A LATA is a region in which a LEC offers services. There are over 160 transport area (LATA) LATAs of these local geographical areas within the United States. local area network A LAN is a communications network providing connections between (LAN) computers and peripheral devices (e.g., printers and modems) over a relatively short distance (e.g., within a building) under standardized control. modified final Modified final judgment (MFJ) was the decision requiring divestiture of judgment (MFJ) the Regional Bell Operating Companies (RBOCs) from their parent company, AT&T. network node A network node is a generic term for the resources in a telecommunications network, including switches, DACS, regenerators, etc. Network nodes essentially include all non-circuit (transport) devices. Other network nodes can include, for example, equipment of a CLEC, or other enhanced service provider (ESP), a point-of-presence (POP), an international gateway or global point-of-presence (GPOP). new entrant (NE) A new generation global telecommunications. next generation A new telecommunications services provider, especially IP telephony telephone (NGT) providers. Examples are Level 3 and Qwest.packetized voice or One example of packetized voice is voice over internet protocol (VOIP). voice over a backbone Voice over packet refers to the carrying of telephony or voice traffic over a data network, e.g. voice over frame, voice over ATM, voice over Internet Protocol (IP), over virtual private networks (VPNs), voice over a backbone, etc. Pipe or dedicated A pipe or dedicated communications facility connects an ISP to the communications internet. facility point of presence A POP refers to the location within a LATA where the IXC and LEC (POP) facilities interface. point-to-point A virtual private networking protocol, point-to-point tunneling protocol tunneling protocol (PPTP), can be used to create a “tunnel” between a remote user and a (PPTP) data network. A tunnel permits a network administrator to extend a virtual private network (VPN) from a server (e.g., a Windows NT server) to a data network (e.g., the Internet). point-to-point (PPP) PPP is a protocol permitting a computer to establish a connection with protocol the Internet using a modem. PPP supports high-quality graphical front ends, like Netscape. postal telephone State regulated telephone companies, many of which are being telegraph (PTT) deregulated. NTT is an example. private branch A PBX is a private switch located on the premises of a user. The user is exchange (PBX) typically a private company which desires to provide switching locally. private line with a dial A private line is a direct channel specifically dedicated to a customer's tone use between two specified points. A private line with a dial tone can connect a PBX or an ISP's access concentrator to an end office (e.g. a channelized Tl or PRI). A private line can also be known as a leased line. public switched The PSTN is the worldwide switched voice network. telephone network (PSTN) regional Bell operating RBOCs are the Bell operating companies providing LEC services after companies (RBOCs) being divested from AT&T. signaling system 7SS7 is a type of common channel interoffice signaling (CCIS) used (SS7) widely throughout the world. The SS7 network provides the signaling functions of indicating the arrival of calls, transmitting routing and destination signals, and monitoring line and circuit status. switching hierarchy or An office class is a functional ranking of a telephone central office office classification switch depending on transmission requirements and hierarchical relationship to other switching centers. Prior to AT&T's divestiture of the RBOCs, an office classification was the number assigned to offices according to their hierarchical function in the U.S. public switched network (PSTN). The following class numbers are used: class 1 = RegionalCenter (RC), class 2 = Sectional Center (SC),class 3 = PrimaryCenter (PC), class 4 = Toll Center (TC) if operators are presentor else Toll Point (TP), class 5 = End Office (EO) a local central office.Any one center handles traffic from one to two or more centers lower in the hierarchy. Since divestiture and with more intelligent software in switching offices, these designations have become less firm. The class 5switch was the closest to the end subscriber. Technology has distributed technology closer to the end user, diffusing traditional definitions of network switching hierarchies and the class of switches. telecommunications A LEC, a CLEC, an IXC, an Enhanced Service Provider (ESP), an carrier intelligent peripheral (IP), an international/global point-of-presence (GPOP), i.e., any provider of telecommunications services. transmission control TCP is an end-to-end protocol that operates at the transport and sessions protocol (TCP) layers of OSI, providing delivery of data bytes between processes running in host computers via separation and sequencing of IP packets. transmission control TCP/IP is a protocol that provides communications between protocol/internet interconnected networks. The TCP/IP protocol is widely used on the protocol (TCP/IP) Internet, which is a network comprising several large networks connected by high-speed connections. Trunk A trunk connects an access tandem (AT) to an end office (EO). wide area network A WAN is a data network that extends a LAN over the circuits of a (WAN) telecommunications carrier. The carrier is typically a common carrier. A bridging switch or a router is used to connect the LAN to the WAN. - A. Quality of Service (QOS) in a Wireless Environment
- The concept of quality of service (QoS) is one of the most difficult and least understood topics in data networking. Although a common term in data networking, there are many different usages and definitions for QoS, leading to confusion regarding an exact meaning in precise or quantitative terms. Even further confusion is found when attempts are made to measure or specify numeric quantities sufficient to allow comparison of equipment or network performance with respect to QoS.
- The confusion about QoS in general data networking is transferred and magnified when applied to wireless data communications. Wireless transmission has a higher inherent bit error rate (BER) than does wireline transmission. The addition of, e.g., a point-to-multipoint (PtMP) topology for multiple users sharing a wireless medium makes it desirable that QoS be defined in a manner that specifically addresses the multiple complicating factors in wireless data communications.
- To provide a non-ambiguous definition of QoS that applies to wireless data communications, the nature of the problem that QoS is meant to solve is helpful. Many of the problems of data communications over wireless are unique and distinct from those of wireline data communications, while some are in fact shared. For wireless broadband access systems, the problems of quality delivery are somewhat more complex than for the wireline analog. Like its wireline counterpart, the problems encountered in wireless delivery of data include, e.g., slow peripheral access, data errors, “drop-outs,” unnecessary retransmissions, traffic congestion, out-of-sequence data packets, latency, and jitter. In addition to these problems, wireless delivery adds problems including, e.g., high inherent bit error rates (BERs), limited bandwidth, user contention, radio interference, and TCP traffic rate management. A QoS-aware wireless system is desired to address all these problems.
- There are a number of ways in which users or subscribers to a data network experience difficulties. One network difficulty is due to a lack of network availability. Depending on the access technology being used, this can include a “modem no-answer” condition, “network busy” condition or a sudden unexpected “drop” of a network connection. These conditions would not be described as being consistent with high QoS. Once network connectivity is achieved, slow traffic caused by congestion, local access bottlenecks, and network failures can be experienced as slow web page loading, slow file transfers, or poor voice/video quality in streaming multimedia applications. Poor quality in streaming multimedia applications can instead result from high “jitter,” or large and rapid variations in latency, leading to interruptions, distortion, or termination of session. Many different conditions can lead to actual data errors, which in some contexts can be catastrophic, such as in the file transfer of a spreadsheet. It is desirable that these problems of a data communications network be minimized or eliminated.
- 1. Quality
- In data networking, quality usually implies the process of delivering data in a reliable and timely manner. What is reliable and timely is dependent on the nature of the traffic being addressed. These terms may include references to limitations in data loss, expectations of data accuracy, limitations of data latency variations (also known as jitter), and limitations of data retransmissions and limitations of data packet order inversions. Therefore, QoS is a complex concept, which can require a correspondingly complex mechanism to implement it.
- QoS can be a relative term, finding different meanings for different users. A casual user doing occasional web browsing, but no file transfer protocol (FTP) file downloads or real time multimedia sessions may have different a different definition of QoS than a power user doing many FTP file downloads of large database or financial files, frequent H.323 video conferencing and IP telephony calls. Also, a user can pay a premium rate (i.e. a so-called service level agreement (SLA)) for high network availability, low latency, and low jitter, while another user can pay a low rate for occasional web surfing only, and on weekends only. Therefore, perhaps it is best to understand QoS as a continuum, defined by what network performance characteristic is most important to a particular user and the user's SLA. Maximizing the end-user experience is an essential component of providing wireless QoS.
- 2. Service
- In data networking, a service can be defined as a type of connection from one end of a network to another. Formerly, this could have been further defined to be protocol specific, such as, e.g., IBM's systems network architecture (SNA), Novell's IPX, Digital's DECnet. However, it appears that TCP/IP (i.e. including user datagram protocol (UDP)) has evolved to become the overwhelming protocol of choice, and will continue to be in the foreseeable future. Therefore, service can be defined to be a particular type of TCP/IP connection or transmission. Such service types might include, e.g., FTP file transfers, e-mail traffic, hypertext transfer protocol (HTTP) traffic, H.323 videoconferencing sessions. It is desirable that a QoS mechanism deal with these differing types of service, in addition to dealing with the different types of quality as discussed previously.
- 3. QOS as a Mechanism
- QoS can be thought of as a mechanism to selectively allocate scarce networking, transmission and communications resources to differentiated classes of network traffic with appropriate levels of priority. Ideally, the nature of the data traffic, the demands of the users, the conditions of the network, and the characteristics of the traffic sources and destinations all modify how the QoS mechanism is operating at any given instant. Ultimately, however, it is desirable that the QoS mechanism operate in a manner that provides the user with optimal service, in whatever manner the user defines it.
- a. Circuit-Switched QoS
- In legacy networks created primarily for voice traffic by telephone companies, data transmission was accomplished with reference to a circuit-centric definition of QoS. In this definition, QoS implied the ability to carry asynchronous (i.e. transmission of data through start and stop sequences without the use of a common clock) as well as isochronous (i.e. consistent timed access of network bandwidth for time-sensitive voice and video) traffic. Circuit-switched QoS was accomplished by dedicating an end-to-end circuit for each connection or service, whether it was voice (see
FIG. 1A ) or data. The circuit-centric QoS mechanism was simply the provision of this circuit for exclusive use by the user. Of course, this approach dedicates the circuit, all transmission channels associated with the circuit, and the transport media itself to a single user for the entire duration of the session, regardless of whether data is actually being transmitted every instant of the session. It was generally believed that only in this manner could true QoS be achieved. Therefore, traditional designs for wireless broadband access systems (seeFIG. 2A ) also used this approach, dedicating a wireless radio channel to each particular data connection, regardless of the application or whether indeed any data was being transmitted at any given moment. This circuit-centric approach to QoS is fairly expensive, in terms of the cost of the equipment, and the utilization factors for the transmission media itself. - b. Asynchronous Transfer Mode (ATM) QoS
- With ATM networking, telephone companies could continue to provide a circuit-centric QoS mechanism with the establishment of permanent virtual connections (PVCs) (i.e. a virtual path or channel connection (VPC or VCC) provisioned for indefinite use) and switched virtual connections (SVCs) (i.e. a logical connection between endpoints established by an ATM network on demand based upon signaling messages received from the end user or another network) in an analogous manner to the legacy voice circuit mechanism. However, several new concepts were needed, including admission policy, traffic shaping, and mechanisms such as, e.g., leaky-buckets, in order to handle traffic that was now categorized as variable bit rate (VBR), constant bit rate (CBR), and unspecified bit rate (UBR).
- Virtual circuits were to be established for data transmission sessions, again regardless of the data application or whether data was being transmitted at any given moment. Although ATM provides QoS for broadband network traffic, the underlying assumptions of ATM design include the low BER characteristic of wireline networks, not the high BER of the wireless medium. Without a recognition of the characteristics of the traffic that is being carried by the ATM mechanism and the high inherent BER of wireless, true QoS can not be provided. ATM QoS mechanisms do not address the unique challenges associated with wireless communication.
- c. Packet-Switched QoS
- Packet-switching is revolutionizing data communications, so conventional circuit-switch and ATM networking concepts and their legacy QoS mechanisms are in need of update. With packet-switched data communications, one cannot dedicate a circuit to a particular data communications session. Indeed, a strength of packet-switching lies in route flexibility and parallelism of its corresponding physical network. Therefore, the QoS mechanism cannot work in the same manner as the legacy circuit-centric QoS mechanism did.
- Simply providing “adequate” bandwidth is not a sufficient QoS mechanism for packet-switched networks, and certainly not for wireless broadband access systems. Although some IP-flows are “bandwidth-sensitive,” other flows are latency- and/or jitter-sensitive. Real time or multimedia flows and applications cannot be guaranteed timely behavior by simply providing excessive bandwidth, even if it were not cost-prohibitive to do so. It is desirable that QoS mechanisms for an IP-centric wireless broadband access system recognize the detailed flow-by-flow requirements of the traffic, and allocate system and media resources necessary to deliver these flows in an optimal manner.
- d. Summary—QoS Mechanisms
- Ultimately, the end-user experience is the final arbiter of QoS. It is desirable that an IP-centric wireless broadband access system assign and regulate system and media resources in a manner that can maximize the end-user experience. For some applications such as an initial screen of a Web page download, data transmission speed is the best measure of QoS. For other applications, such as the download or upload of a spreadsheet, the best measure of QoS can be the minimization of transmission error. For some applications, the best measure of QoS can be the optimization of both speed and error. For some applications, the timely delivery of packets can be the best measure of QoS. It is important to note that fast data transmission may not be the same as timely delivery of packets. For instance, data packets that are already “too old” can be transmitted rapidly, but by being too old can be of no use to the user. The nature of the data application itself and the desired end-user experience then can provide the most reliable criteria for the QoS mechanism. It is desired that an IP-centric wireless broadband access system provide a QoS mechanism that can dynamically optimize system behavior to each particular IP flow, and can also adapt to changes with changing network load, congestion and error rates.
- 4. Service Guarantees and Service Level Agreements (SLAs)
- Service guarantees can be made and service level agreements (SLAs) can be entered into between a telecommunications service provider and a subscriber whereby a specified level of network availability can be described, and access charges can be based upon the specified level. Unfortunately, it is difficult to quantify the degree of network availability at any given time, and therefore this becomes a rather crude measure of service performance. It is desired that data delivery rate, error rate, retransmissions, latency, and jitter be used as measures of network availability, but measuring these quantities on a real-time basis can be beyond the capability of conventional network service providers (NSPs).
- Another level of service discrimination desired by network service providers is a service level agreement (SLA) that provides for differing traffic rates, network availability, bandwidth, error rate, latency and jitter guarantees. It is desired that an IP-centric wireless broadband access system be provided that can provide for SLAs, enabling service providers to have more opportunities for service differentiation and profitability.
- 5. Class of Service and Quality of Service
- In order to implement a practical QoS mechanism, it is desired that a system be able to differentiate between types of traffic or service types so that differing levels of system resources can be allocated to these types. It is customary to speak of “classes of service” as a means of grouping traffic types that can receive similar treatment or allocation of system and media resources.
- Currently, there are several methods that can be used in wireline network devices to implement differentiated service classes. Example methods include traffic shaping, admission control, IP precedence, and differential congestion management. It is desired that an IP-centric wireless broadband access system use all of these methods to differentiate traffic into classes of service, to map these classes of service against a QoS matrix, and thereby to simplify the operation and administration of the QoS mechanism.
- B. QoS and IP-Centric Wireless Environment
- In a point-to-multipoint (PtMP) wireless system like the present invention, it is desirable that the QoS mechanism cope not only with wireline networking considerations, but also with considerations particular to the wireless environment. As stated earlier, it is desired that the inherent BER of wireless be handled. The high BER can require that error detection, correction, and re-transmission be done in an efficient manner. It is desired that a BER handling mechanism also work efficiently with the re-transmission algorithms of TCP/IP so as to not cause further unnecessary degradation of bandwidth utilization. An additional challenge of wireless is contention among users for limited wireless bandwidth. It is desirable that the system handle service requests from multiple users in a radio medium subject to interference and noise, which can make efficient allocation of radio bandwidth difficult.
- As discussed above, the change from circuit-switched and ATM data networks to packet-switched data networks has impacted the definition of QoS mechanisms. The present invention provides a novel QoS mechanism in a point-to-multi-point IP-centric wireless system for packet-switched network traffic. In order for the system to provide optimal QoS performance, it desirable that it include a novel approach to QoS mechanisms. The use of QoS as the underlying guide to system architecture and design constitutes an important, substantial and advantageous difference of the IP-centric wireless broadband access system of the present invention over existing wireless broadband access systems designed with traditional circuit-centric or ATM cell circuit-centric approaches such as those used by Teligent and Winstar.
- C. IP-Centric Wireless Broadband Access QoS and Queuing Disciplines
- 1. Managing Queues
- Queuing is a commonly accepted tool required for manipulating data communications flows. In order for packet headers to be examined or modified, for routing decisions to made, or for data flows to be output on appropriate ports, it is desirable that data packets be queued. However, queuing introduces, by definition, a delay in the traffic streams that can be detrimental, and can even totally defeat the intent of queuing. Excessive queuing can have detrimental effects on traffic by delaying time sensitive packets beyond their useful time frames, or by increasing the RTT (Round Trip Time), producing unacceptable jitter or even causing the time-out of data transport mechanisms. Therefore, it is desired that queuing be used intelligently and sparingly, without introducing undue delay in delay-sensitive traffic such as real-time sessions.
- In a wireless environment where time division multiple access (TDMA), forward error detection (FEC), and other such techniques can be necessary, it is desirable that queuing be used merely to enable packet and radio frame processing. However, in the case of real-time flows, the overall added delay in real-time traffic can preferably be held to below approximately 20 milliseconds.
- The use of queue management as the primary QoS mechanism in providing QoS-based differentiated services is a simple and straight forward method for wireless broadband systems. However, wireless systems are usually more bandwidth constrained and therefore more sensitive to delay than their wireline counterparts. For this reason, it is desirable that QoS-based differentiated services be provided with mechanisms that go beyond what simple queuing can do. However, some queuing can still be required, and the different queuing methods are now discussed.
- 2. First In, First Out (FIFO) Queuing
- First in, first out (FIFO) queuing can be used in wireless systems, like wireline systems, in buffering data packets when the downstream data channel becomes temporarily congested. If temporary congestion is caused by bursty traffic, a FIFO queue of reasonable depth can be used to smooth the flow of data into the congested communications segment. However, if the congestion becomes severe in extent, or relatively long in duration, FIFO can lead to the discarding of packets as the FIFO queues are filled to capacity and the network is not capable of accepting additional packets causing discarding of packets, i.e. so-called “packet-tossing.” Although this can have a detrimental effect on QoS in and of itself, the discarding of packets may cause future problems with traffic flow as the TCP protocol causes the retransmission of lost packets in the proper sequence, further exacerbating the problem. The problem of packet discards can be minimized by increasing the size of the FIFO buffers so that more time can pass before discards occur. Unfortunately, eventually the FIFO can become large enough that packets can become too old and the round-trip time (RTT) can increase to the point that the packets are useless, and the data connection is virtually lost.
- In a wireless broadband environment, the requirement for FIFO queuing is partially dependent upon the type of RF access method being used. For time division multiple access/time division duplex (TDMA/TDD), it can be desirable that data be queued even for collecting enough data for the construction of data frames for transmission. Frequency division multiple access (FDMA) and code-division multiple access (CDMA) are not as “sequential” in nature as TDMA, and therefore have less of a requirement for FIFO queuing. However, generally for all wireless access techniques, noise and interference are factors that can lead to retransmissions, and therefore further delays and consequent adverse effect on QoS.
- Using FIFO queuing, shared wireless broadband systems can uniformly delay all traffic. This can seem to be the “fairest” method, but it is not necessarily the best method if the goal is to provide high QoS to users. By using different types of queue management, a much better base of overall QoS can be achieved.
- 3. Priority Queuing
- The shared wireless broadband environment can include a constricted bandwidth segment as data is transmitted over the RF medium. Therefore, regardless of access technique, these systems can require some amount of queuing. However, using FIFO queuing can result in a constant delay to all traffic, regardless of the priority or type of traffic. Most data communications environments can consist of a mixture of traffic, with combinations of real time interactive data, file and data downloads, web page access, etc. Some of these types of traffic are more sensitive to delay, and jitter, than others. Priority queuing simply reorders data packets in the queue based on their relative priorities and types, so that data from more latency- and jitter-sensitive traffic can be moved to the front of the queue.
- Unfortunately, if there is downlink data channel congestion, or congestion caused by an overabundance of high priority traffic, the condition of “buffer starvation” can occur. Because of the relative volume of high priority packets consuming a majority of buffer space, little room is left for lower priority packets. These lower priority packets can experience significant delays while system resources are devoted to the high priority packets. In addition to low priority packets being held in buffers for long periods of time, or never reaching the buffers, resulting in significantly delayed data flows for these packets, the actual applications corresponding to these low priority packets can also be disrupted, and stop working. Because of the nature of this queuing approach, overall latency and jitter and RTT for lower priority packets can be unpredictable, having an adverse effect on QoS.
- If queue sizes are small, reordering data within the queues can have little beneficial effect on the QoS. In fact, processing required to examine packet headers in order to obtain the information necessary to reorder the queues may itself add significant delay to the data stream. Therefore, particularly for wireless broadband data environments, priority queuing can be not much better than FIFO queuing as a QoS mechanism.
- 4. Classed Based Queuing
- By allocating queue space and system resources to packets based on the class of the packets, buffer starvation can be avoided. Each class can be defined to include of data flows with certain similar priorities and types. All classes can be given a certain minimum level of service so that one high priority data flow cannot monopolize all system resources. With the classification approach, because no data flow is ever completely shut off, the source application can receive information about the traffic rate, and can be able to provide TCP-mediated transmission rate adjustment supporting smooth traffic flow.
- Although this approach can work better than FIFO queuing in wireless broadband systems, latency and jitter sensitive flows can still be adversely affected by high priority flows of large volume.
- 5. Weighted Fair Queuing
- A weighted fair queuing method can attempt to provide low-volume flows with guaranteed queuing resources, and can then allow remaining flows, regardless of volume or priority, to have equal amounts of resource. Although this can prevent buffer starvation, and can lead to somewhat better latency and jitter performance, it can be difficult to attain stable performance in the face of rapidly changing RF downlink channel bandwidth availability.
- Providing a high quality of service can require a QoS mechanism that is more sophisticated than simple queue management.
- D. IP-Centric Wireless Broadband Access QoS and TCP/IP
- 1. TCP/IP
- The TCP/IP protocol stack has become the standard method of transmitting data over the Internet, and increasingly it is becoming a standard in virtual private networks (VPNs). The TCP/IP protocol stack includes not only internet protocol (IP), but also transmission control protocol (TCP), user datagram protocol (UDP), and internet control message protocol (ICMP). By assuming that the TCP/IP protocol stack is the standard network protocol for data communications, the creation of a set of optimal QoS mechanisms for the wireless broadband data environment is more manageable. QoS mechanisms can be created that can span the entire extent of the network, including both the wireline and the wireless portions of the network. These mechanisms can integrate in a smooth and transparent manner with TCP rate control mechanisms and provide end-to-end QoS mechanisms that are adaptive to both the wireline and wireless portions of the network. Of course, segments of the wireline network that are congested or are experiencing other transport problems cannot be solved by a wireless QoS mechanism. However, a wireless QoS mechanism can optimize data flows in a manner that can enhance the end user experience when there is no severe wireline network congestion or bottleneck present.
- 2. Differentiation by Class
- Data traffic can be handled based on classes of service, as discussed above. To differentiate traffic by class, data traffic (or a sequence of data packets associated with a particular application, function, or purpose) can be classified into one of several classes of service. Differentiation can be done on the basis of some identifiable information contained in packet headers. One method can include analyzing several items in, e.g., an IP packet header, which can serve to uniquely identify and associate the packet and other packets from that packet flow with a particular application, function or purpose. As a minimum, a source IP address, a source TCP or UDP port, a destination IP address, and a destination IP or UDP port can serve to associate packets into a common flow, i.e. can be used to classify the packets into a class of service.
- By creating a finite and manageable number of discrete classes of service, multiple IP flows can be consolidated and handled with a given set of QoS parameters by the QoS mechanisms. These classes can be defined to provide common and useful characteristics for optimal management in the combined wireline and wireless network segments.
- 3. Per-Flow Differentiation
- A finite and discrete set of classes of service, can enable QoS mechanisms to be less compute-intensive, to use less memory, fewer state machines, and therefore have better scaleability than having individual QoS mechanisms (or sets of parameters) for each individual IP flow. However, in a network access device such as, e.g., a point to multi-point (PtMP) wireless broadband access system, the total number of simultaneous IP flows typically will not exceed the range of 1000, and therefore the amount of processing overhead that could be required could permit a per-flow QoS differentiation without resorting to classes of service. However, class of service consolidation of IP flows provides advantages related to marketing, billing and administration.
- Prior to the present invention, per-flow differentiation has not been used in a wireless environment (including radio frequencies transmitted over coaxial cables and satellite communications).
- 4. Using IP Precedence for Class of Service
- IP precedence bits in a type of service (IP TOS) field, as described in Internet Engineering Task Force (IETF) 1992b, can theoretically be used as a means to sort IP flows into classes of service. IETF RFC1349 proposed a set of 4-bit definitions with 5 different meanings: minimize delay; maximize throughput; maximize reliability; minimize monetary cost; and normal service.
- These definitions could add significantly to networks, routers and access devices in differentiating different types of flow so that resources could be appropriately allocated, resulting in improved QoS. However, the proposal has not been widely used. Several proposals in the IETF could make use of this field, along with resource reservation protocol (RSVP), to improve network handling of packets.
- Although the type of service (TOS) field has been an integral component of the TCP/IP specification for many years, the field is not commonly used. Absent appropriate bits in the field being set by a source processor, the access devices, the network and network routers cannot implement QoS mechanisms.
- 5. TCP-Mediated Transmission Rate Mechanisms
- The manner in which TCP governs transmission rate can be incorporated and managed by an IP-centric wireless QoS mechanism. If a TCP mechanism is not managed, any wireless QoS mechanism can be overwhelmed or countered by wireless bandwidth factors. Before addressing the specific wireless factors that can impact TCP transmission speed, a review of TCP transmission rate mechanism is needed.
- TCP can control transmission rate by “sensing” when packet loss occurs. Because TCP/IP was created primarily for wireline environment with its extremely low inherent BER, such as those found over fiber optic lines, any packet loss is assumed by TCP to be due to network congestion, not loss through bit error. Therefore, TCP assumes that the transmission rate exceeded the capacity of the network, and responds by slowing the rate of transmission. However, packet loss in the wireless link segment is due primarily to inherently high BER, not congestion. The difference turns out to be not insubstantial.
- TCP can initially cause the transmission rate to ramp-up at the beginning of a packet flow, and is called slow-start mode. The rate can be continuously increased until there is a loss or time-out of the packet-receipt acknowledgment message. TCP can then “back-off, can decrease the transmission window size, and then can retransmit lost packets in the proper order at a significantly slower rate. TCP can then slowly increase the transmission rate in a linear fashion, which can be called congestion-avoidance mode.
- If multiple users share a wireless radio link as with the present invention, the inherently high BER of the medium could potentially cause frequent packet loss leading to unproductive TCP retransmission in congestion avoidance mode. Because wireless bandwidth can be a precious commodity, a IP-centric wireless QoS mechanism preferably provides for packet retransmission without invoking TCP retransmission and consequent and unnecessary “whipsawing” of the transmission rate. This, along with several other factors, makes desirable creation of an IP-centric wireless media access control (MAC) layer. One function of an IP-centric MAC layer can be to mediate local retransmission of lost packets without signaling TCP and unnecessarily altering the TCP transmission speed. A primary task of the IP-centric wireless MAC layer is to provide for shared access to the wireless medium in an orderly and efficient manner. The MAC layer according to the present invention, Proactive Reservation-based Intelligent Multimedia-aware Media Access (PRIMMA) layer, available from Malibu Networks Inc., of Calabasas, Calif., can also schedule all packet transmissions across the wireless medium on the basis of, e.g., IP flow type, service level agreements (SLAs), and QoS considerations.
- 6. TCP Congestion Avoidance in an IP-Centric Wireless System
- a. Network Congestion Collapse, Global Synchronization and IP-Centric Wireless TCP Congestion Avoidance
- The inherently high bit error rate (BER) of wireless transmission can make an occurrence of problems known as congestion collapse or global synchronization collapse more likely than in a wireline environment. When multiple TCP senders simultaneously detect congestion because of packet loss, the TCP senders can all go into TCP slow start mode by shrinking their transmission window sizes and by pausing momentarily. The multiple senders can then all attempt to retransmit the lost packets simultaneously. Because they can all start transmitting again in rough synchrony, a possibility of creating congestion can arise, and the cycle can start all over again.
- In the wireless environment, an occurrence of burst noise can cause packet loss from many IP streams simultaneously. The TCP transmission rate mechanisms of the TCP senders can assume that packet loss was due to congestion, and they can all back-off in synchrony. When the TCP senders restart, the senders can restart in rough synchrony, and indeed can now create real congestion in the wireless link segment. This cyclical behavior can continue for some time, and can possibly cause unpredictable system performance. This can be due in part to overflowing system queues which can cause more packets to be dropped and can cause more unproductive retransmissions. This can degenerate into a “race” state that could take many minutes before re-establishing stability; this can have an obvious negative impact on QoS.
- In the wireline world, random early detection (RED) can be used to circumvent global synchronization. By randomly selecting packets from randomly selected packet flows before congestion collapse occurs, global synchronization can be avoided. Queues can be monitored, and when queue depth exceeds a preset limit, RED can be activated, activating asynchronously the TCP senders' transmission rate controllers. This can avoid the initial congestion which would otherwise result in collapse and then global synchronization.
- Instead of purely random packet discards, the packets to be discarded can be done with consideration to packet priority or type. While still random, the probability of discard for a given flow can be a function of the by packet priority or type. In a wireless system, weighted random early detection (WRED) can be used without the concern of retransmission and TCP rate reset by preferentially selecting UDP packets of real time IP flows such as streaming audio, and H.323 flows with a more critical packet Time-to-Live parameter. These IP flows are more sensitive to latency and jitter, and less sensitive to packet loss.
- In the wireless environment, with an appropriately designed MAC layer, packet loss due to BER that might otherwise trigger congestion collapse and global synchronization can best be managed with local retransmission of lost packets according to the present invention and without RED and the unnecessary retransmission of packets by the TCP sender and the resulting reset of TCP transmission rate. The IP-centric wireless system separately manages the TCP transmission window of the TCP sender remotely by transmitting a packet receipt-acknowledgment before the TCP sender detects a lost packet and initiates retransmission along with an unnecessary reset of the transmission rate. This IP-centric wireless system TCP transmission window manager communicates with the MAC layer in order to be aware of the status of all packets transmitted over the wireless medium.
- b. The Effect of Fractal Self-Similar Network Traffic Characteristics vs. Poisson Distributions on Network Congestion
- Conventionally, it has been believed that network traffic can be modeled with a Poisson distribution. Using this distribution leads to the conclusion, through system simulations, that the sum of thousands of individual traffic flows with Poisson distributions results in a uniform overall network traffic distribution. In other words, the overall network can “average-out” the burstiness of individual traffic flows. Using this model, network congestion behavior, burst behavior, and dynamic traffic characteristics have been used to create conventional congestion avoidance strategies, design queue buffer sizes in network devices, and traffic and capacity limitation predictions.
- More recent studies have demonstrated that TCP/IP-based traffic causes networks to behave in a fractal, or self-similar fashion. With this model, when the burstiness of individual traffic flows is summed for the entire network, the entire network becomes bursty. The bursty nature of network traffic flow is seen over all time scales and flow scales of the network. This has huge implications both in design of an IP-centric wireless broadband system according to the present invention, and in the design of congestion avoidance strategies in the network as a whole. With this new perspective on network behavior, it has become clear that network routers, switches and transmission facilities in many cases have been “under-engineered.” This under-engineering has led to a further exacerbation of the congestion behavior of the network.
- The implications for IP-centric wireless system architecture and design range from queue buffer capacity to local congestion avoidance strategies. Because wireless systems have the added burden of a high inherent BER, the effect of network-wide congestion behavior on local (wireless media channel) congestion avoidance strategies must be properly gauged and countered. For this reason, it is desirable that congestion avoidance algorithms of the IP-centric wireless system be crafted to optimize traffic flow with new mathematical and engineering considerations that until very recently were not apparent or available to system designers.
- With these considerations in mind, IP-centric wireless system design cannot be done with the conventional wireline system design approaches without resulting in very low system performance characteristics. With traditional design approaches of a circuit-centric wireless system, bandwidth utilization, real time multimedia quality, and overall system QoS provide for a dramatically lower end-user experience.
- 7. Application-Specific Flow Control in an IP-Centric Wireless System
- With a range of data flows, each having different bandwidth, latency and jitter requirements, for the achievement of high QoS as perceived by the end user, it is desirable that the IP-centric wireless system be able to manage QoS mechanism parameters over a wide range, and in real time. The QoS mechanism must be able to alter system behavior to the extent that one or more data flows corresponding to specific applications be switched on and off from appropriate end users in a transparent manner. This approach is in contrast to other QoS mechanisms that seek to achieve high QoS by establishing circuit-centric connections from end to end without regard for an underlying application's actual QoS requirements. By using the present invention, providing a QoS mechanism that is application-specific rather than circuit-specific, scarce wireless bandwidth can be conserved and dynamically allocated where needed by the QoS mechanisms associated with each application type.
- B. QoS and IP-Centric Wireless Media Access Control
- 1. Proactive Reservation-Based Intelligent Multimedia-Aware Media Access (PRIMMA) MAC Layer
- The present invention's proactive reservation-based intelligent multimedia-aware media access (PRIMMA) media access control (MAC) layer provides an application switching function of the IP-centric wireless QoS mechanism. Once the nature and QoS requirements of each IP stream are determined by other portions of the system, this information is communicated to the PRIMMA MAC layer so that the IP flows of each application can be switched to appropriate destinations in a proper priority order.
- 2. PRIMMA IP Protocol Stack Vertical Signaling
- For IP streams that originate from a local user's CPE, application-level information about the nature of the application can be used by the system to assign appropriate QoS mechanism parameters to the IP stream. For IP streams that originate from a non-local host, information about the IP streams for use in configuring the appropriate QoS mechanism parameters can be extracted from packet headers. The information about the IP streams is communicated “vertically” in the protocol stack model from the application layer (i.e. OSI level 7) to the PRIMMA MAC layer (i.e. OSI level 2) for bandwidth reservation and application switching purposes. Although this violates the conventional practice of providing isolation and independence to each layer of the protocol stack, thereby somewhat limiting the degree of interchangeability for individual layers of the stack, the advantages far outweigh the negatives in an IP-centric wireless broadband access system.
- 3. PRIMMA IP Flow Control and Application Switching
- Based on a specific set of QoS requirements of each IP application flow in the IP-centric wireless system, applications are switched in a “proactive” manner by appropriate reservations of bandwidth over the wireless medium. The wireless transmission frames in each direction are constructed in a manner dictated by the individual QoS requirements of each IP flow. By using QoS requirements to build the wireless transmission frames, optimal QoS performance can result over the entire range of applications being handled by the system. For example, latency and jitter sensitive IP telephony, other H.323 compliant IP streams, and real-time audio and video streams can be given a higher priority for optimal placement in the wireless transmission frames. On the other hand, hypertext transport protocol (HTTP) traffic, such as, e.g., initial web page transmissions, can be given higher bandwidth reservation priorities for that particular application task. Other traffic without latency, jitter, or bandwidth requirements such as, e.g., file transfer protocol (FTP) file downloads, email transmissions, can be assigned a lower priority for system resources and placement in the wireless transmission frame.
- 4. PRIMMA TCP Transmission Rate Agent
- Wireless end users are separated from a high speed, low BER wireline backbone by a lower speed, high BER wireless segment which can be subject to burst error events. TCP/IP traffic that traverses the wireless segment can experience frequent packet loss that, without intervention, can create congestion collapse and global synchronization as previously discussed. Therefore, it is desirable that the present invention's IP-centric wireless system make use of a TCP transmission rate agent that can monitor packet loss over the wireless segment, and can manage the remote TCP transmission rate function by recreating and transmitting any lost packet acknowledgments. The PRIMMA MAC layer can itself retransmit any lost packets over the wireless medium.
- The IP-centric wireless TCP transmission rate agent or “adjunct” can also flow-control the IP streams when necessary, and in accordance with the QoS requirements of the IP flows. All IP-centric wireless TCP transmission rate agent functionality can be transparent to both local and remote hosts and applications.
- F. Telecommunications Networks
- 1. Voice Network
- a. Simple Voice Network
-
FIG. 1A is a block diagram providing an overview of astandard telecommunications network 100 providing local exchange carrier (LEC) services within one or more local access and transport areas (LATAs).Telecommunications network 100 can provide a switched voice connection from a callingparty 102 to a calledparty 110.FIG. 1A is shown to also include aprivate branch exchange 112 which can provide multiple users access to LEC services by, e.g., a private line. Callingparty 102 and calledparty 110 can be ordinary telephone equipment, key telephone systems, a private branch exchange (PBX) 112, or applications running on a host computer.Network 100 can be used for modem access as a data connection from callingparty 102 to, for example, an Internet service provider (ISP) (not shown).Network 100 can also be used for access to, e.g., a private data network. For example, callingparty 102 can be an employee working on a notebook computer at a remote location who is accessing his employer's private data network through, for example, a dial-up modem connection. -
FIG. 1A includes end offices (EOs) 104 and 108.EO 104 is called an ingress EO because it provides a connection from callingparty 102 to public switched telephone network (PSTN) facilities.EO 108 is called an egress EO because it provides a connection from the PSTN facilities to a calledparty 110. In addition toingress EO 104 andegress EO 108, the PSTN facilities associated withtelecommunications network 100 include an access tandem (AT) (not shown) at points of presence (POPs) 132 and 134 that can provide access to, e.g., one or more inter-exchange carriers (IXCs) 106 for long distance traffic, seeFIG. 2A . Alternatively, it would be apparent to a person having ordinary skill in the art that IXC 106 could also be, for example, a CLEC, or other enhanced service provider (ESP), an international gateway or global point-of-presence (GPOP), or an intelligent peripheral (IP). -
FIG. 1A also includes a private branch exchange (PBX) 112 coupled toEO 104.PBX 112couples calling parties client computer 118 and associatedmodem 130, andlocal area network 128 havingclient computer 120 andserver computer 122 coupled via an associatedmodem 130.PBX 112 is a specific example of a general class of telecommunications devices located at a subscriber site, commonly referred to as customer premises equipment (CPE). -
Network 100 also includes a common channel interactive signaling (CCIS) network for call setup and call tear down. Specifically,FIG. 1 includes a Signaling System 7 (SS7) signalingnetwork 114.Signaling network 114 will be described further below with reference toFIG. 2B . - b. Detailed Voice Network
-
FIG. 2A is a block diagram illustrating an overview of astandard telecommunications network 200, providing both LEC and IXC carrier services between subscribers located in different LATAs.Telecommunications network 200 is a more detailed version oftelecommunications network 100. Callingparty 102 a and called party 110 a are coupled to EO switches 104 a and 108 a, respectively. In other words, callingparty 102 a is homed to ingress EO 104 a in a first LATA, whereas called party 110 a is homed to an egress EO 108 a in a second LATA. Calls between subscribers in different LATAs are long distance calls that are typically routed to IXCs. Sample IXCs in the United States include AT&T, MCI and Sprint. -
Telecommunications network 200 includes access tandems (AT) 206 and 208.AT 206 provides connection to points of presence (POPs) 132 a, 132 b, 132 c and 132 d.IXCs POPs POPs POP 132 d and POP 134 d.POPs AT 208, which provides connection to egress EO 108 a. Called party 110 a can receive calls from EO 108 a, which is its homed EO. - Alternatively, it would be apparent to a person having ordinary skill in the art that an
AT 206 can also be, for example, a CLEC, or other enhanced service provider (ESP), an international gateway or global point-of-presence (GPOP), or an intelligent peripheral. -
Network 200 also includes callingparty 102 c homed toCLEC switch 104 c. Following the 1996 Telecommunications Act in the U.S., CLECs gained permission to compete for access within the local RBOCs territory. RBOCs are now referred to as incumbent local exchange carriers (ILECs). - i. Fixed Wireless CLECs
-
Network 200 further includes a fixedwireless CLEC 209. Example fixed wireless CLECs are Teligent Inc., of Vienna, VA, WinStar Communications Inc., Advanced Radio Telecom Corp. And the BizTel unit of Teleport Communications Group Inc.Fixed wireless CLEC 209 includes a wireless transceiver/receiver radio frequency (RF) tower 210 in communication over an RF link to a subscribertransceiver RF tower 212.Subscriber RF tower 212 is depicted coupled to a CPE box,PBX 112 b.PBX 112 bcouples calling parties 124 b and 126 b, fax 116 b,client computer 118 b and associatedmodem 130 b, and local area network 128 b havingclient computer 120 b andserver computer 122 b coupled via an associatedmodem 130 b. -
Network 200 also includes called party 110 a, a fax 116 a, client computer 118 a and associated modem 130 a, and cellularcommunications RF tower 202 and associated cellular subscriber calledparty 204, all coupled to EO 108 a, as shown. - EO 104 a, 108 a and AT 206, 208 are part of a switching hierarchy. EO 104 a is known as a
class 5 office andAT 208 is aclass 3/4 office switch. Prior to the divestiture of the regional Bell Operating Companies (RBOCs) from AT&T following the modified final judgment, an office classification was the number assigned to offices according to their hierarchical function in the U.S. public switched network (PSTN). An office class is a functional ranking of a telephone central office switch depending on transmission requirements and hierarchical relationship to other switching centers. Aclass 1 office was known as a Regional Center (RC), the highest level office, or the “office of last resort” to complete a call. Aclass 2 office was known as a Sectional Center (SC). Aclass 3 office was known as a Primary Center (PC). Aclass 4 office was known as either a Toll Center (TC) if operators were present, or otherwise as a Toll Point (TP). Aclass 5 office was an End Office (EO), i.e., a local central office, the lowest level for local and long distance switching, and was the closest to the end subscriber. Any one center handles traffic from one or more centers lower in the hierarchy. Since divestiture and with more intelligent software in switching offices, these designations have become less firm. Technology has distributed functionality closer to the end user, diffusing traditional definitions of network hierarchies and the class of switches. - ii. Connectivity to Internet Service Providers (ISPs)
- In addition to providing a voice connection from calling
party 102 a to called party 110 a, the PSTN can provide callingparty 102 a a data connection to an ISP (i.e. similar toclient 118 b). -
Network 200 can also include an Internet service provider (ISP) (not shown) which could include aserver computer 122 coupled to adata network 142 as will be discussed further below with reference toFIG. 1B . The Internet is a well-known, worldwide network comprising several large networks connected together by data links. These links can include, for example, Integrated Digital Services Network (ISDN), T1, T3, FDDI and SONET links. Alternatively, an internet can be a private network interconnecting a plurality of LANs and/or WANs, such as, for example, an intranet. An ISP can provide Internet access services for subscribers such asclient 118 b. - To establish a connection with an ISP,
client 118 b can use a host computer connected to a modem (modulator/demodulator) 130 b. The modem can modulate data from the host computer into a form (traditionally an analog form) for transmission to the LEC facilities. Typically, the LEC facilities convert the incoming analog signal into a digital form. In one embodiment, the data is converted into the point-to-point protocol (PPP) format. (PPP is a well-known protocol that permits a computer to establish a connection with the Internet using a standard modem. It supports high-quality, graphical user-interfaces.) As those skilled in the art will recognize, other formats are available, including, e.g., a transmission control program, internet protocol (TCP/IP) packet format, a user datagram protocol, internet protocol (UDP/IP) packet format, an asynchronous transfer mode (ATM) cell packet format, a serial line interface protocol (SLIP) protocol format, a point-to-point (PPP) protocol format, a point-to-point tunneling protocol (PPTP) format, a NETBIOS extended user interface (NETBEUI) protocol format, an Appletalk protocol format, a DECnet, BANYAN/VINES, an internet packet exchange (IPX) protocol format, and an internet control message protocol (ICMP) protocol format. - iii. Communications Links
- Note that
FIGS. 1A, 2A and other figures described herein include lines which may refer to communications lines or which may refer to logical connections between network nodes, or systems, which are physically implemented by telecommunications carrier devices. These carrier devices include circuits and network nodes between the circuits including, for example, digital access and cross-connect system (DACS), regenerators, tandems, copper wires, and fiber optic cable. It would be apparent to persons having ordinary skill in the art that alternative communications lines can be used to connect one or more telecommunications systems devices. Also, a telecommunications carrier as defined here, can include, for example, a LEC, a CLEC, an IXC, an Enhanced Service Provider (ESP), a global or international services provider such as a global point-of-presence (GPOP), and an intelligent peripheral. - EO 104 a and
AT 206 are connected by a trunk. A trunk connects an AT to an EO. A trunk can be called an inter machine trunk (IMT).AT 208 and EO 108 a are connected by a trunk which can be an IMT. - Referring to
FIG. 1A ,EO 104 andPBX 112 can be connected by a private line with a dial tone. A private line can also connect an ISP (not shown) toEO 104, for example. A private line with a dial tone can be connected to a modem bay or access converter equipment at the ISP. Examples of a private line are a channelized T1 or integrated services digital network (ISDN) primary rate interface (PRI). An ISP can also attach to the Internet by means of a pipe or dedicated communications facility. A pipe can be a dedicated communications facility. A private line can handle data modem traffic to and from an ISP. - Trunks can handle switched voice traffic and data traffic. For example, trunks can include digital signals DS1-DS4 transmitted over T1-T4 carriers. Table 2 provides typical carriers, along with their respective digital signals, number of channels, and bandwidth capacities.
TABLE 2 Bandwidth Digital Number of Designation in Megabits signal channels of carrier per second (Mbps) DS0 1 None 0.064 DS1 24 T1 1.544 DS2 96 T2 6.312 DS3 672 T3 44.736 DS4 4032 T4 274.176 - Alternatively, trunks can include optical carriers (OCs), such as OC-1, OC-3, etc. Table 3 provides typical optical carriers, along with their respective synchronous transport signals (STSs), ITU designations, and bandwidth capacities.
TABLE 3 Optical International Bandwidth in carrier Electrical signal, Telecommunications Megabits (OC) or synchronous Union (ITU) per second signal transport signal (STS) terminology (Mbps) OC-1 STS-1 51.84 OC-3 STS-3 STM-1 155.52 OC-9 STS-9 STM-3 466.56 OC-12 STS-12 STM-4 622.08 OC-18 STS-18 STM-6 933.12 OC-24 STS-24 STM-8 1244.16 OC-36 STS-36 STM-12 1866.24 OC-48 STS-48 STM-16 2488.32 - As noted, a private line is a connection that can carry data modem traffic. A private line can be a direct channel specifically dedicated to a customer's use between two specified points. A private line can also be known as a leased line. In one embodiment, a private line is an ISDN/primary rate interface (ISDN PRI) connection. An ISDN PRI connection can include a single signal channel (called a data or D channel) on a T1, with the remaining 23 channels being used as bearer or B channels. (Bearer channels are digital channels that bear voice and data information.) If multiple ISDN PRI lines are used, the signaling for all of the lines can be carried over a single D channel, freeing up the remaining lines to carry only bearer channels.
- iv. Telecommunications Traffic
- Telecommunications traffic can be sent and received from any network node of a telecommunications carrier. A telecommunications carrier can include, for example, a LEC, a CLEC, an IXC, and an Enhanced Service Provider (ESP). In an embodiment, this traffic can be received from a network node which is, for example, a
class 5 switch, such as EO 104 a, or from aclass 3/4 switch, such asAT 206. Alternatively, the network system can also be, for example, a CLEC, or other enhanced service provider (ESP), an international gateway or global point-of-presence (GPOP), or an intelligent peripheral. - Voice traffic refers, for example, to a switched voice connection between calling
party 102 a and called party 110 a. It is important to note that this is on a point-to-point dedicated path, i.e., that bandwidth is allocated whether it is being used or not. A switched voice connection is established between callingparty 102 a and EO 104 a, then toAT 206 then over an IXC's network such as that of IXC 106 a toAT 208 and then to EO 108 a and over a trunk to called party 110 a. In another embodiment,AT 206 or IXC 106 a can also be, for example, a CLEC, or other enhanced service provider (ESP), an international gateway or global point-of-presence (GPOP), or an intelligent peripheral. - It is possible that calling
party 102 a is a computer with a data connection to a server over the voice network. Data traffic refers, for example, to a data connection between a callingparty 102 a (using a modem) and aserver 122 b that could be part of an ISP. A data connection can be established, e.g., between callingparty 102 a and EO 104 a, then toAT 206, then toCLEC 214, then over a fixedwireless CLEC 209 link to PBX 112 b to amodem 130 b associated withserver 122 b. - c. Signaling Network
-
FIG. 2B illustrates signalingnetwork 114 in greater detail.Signaling network 114 is a separate network used to handle the set up, tear down, and supervision of calls between callingparty 102 and calledparty 110.Signaling network 114 in the given example is the Signaling System 7 (SS7) network.Signaling network 114 includes service switching points (SSPs) 236, 238, 240 and 242, signal transfer points (STPs) 222, 224, 226, 228, 230 and 232, and service control point (SCP) 234. - In the SS7 network, the SSPs are the portions of the backbone switches providing SS7 functions. The SSPs can be, for example, a combination of a voice switch and an SS7 switch, or a computer connected to a voice switch. The SSPs communicate with the switches using primitives, and create packets for transmission over the SS7 network.
- EOs 104 a, 108 a and
ATs SS7 signaling network 114 asSSPs ATs 206, 208 (presented as dashed lines) can be represented byconnections - The STPs act as routers in the SS7 network, typically being provided as adjuncts to in-place switches. The STPs route messages from originating SSPs to destination SSPs. Architecturally, STPs can and are typically provided in “mated pairs” to provide redundancy in the event of congestion or failure and to share resources (i.e., load sharing is done automatically). As illustrated in
FIG. 2B , STPs can be arranged in hierarchical levels, to provide hierarchical routing of signaling messages. For example, matedSTPs STPs STPs - SCPs provide database functions. SCPs can be used to provide advanced features in an SS7 network, including routing of special service numbers (e.g., 800 and 900 numbers), storing information regarding subscriber services, providing calling card validation and fraud protection, and offering advanced intelligent network (AIN) services.
SCP 234 is connected to matedSTPs - In the SS7 network, there are unique links between the different network elements. Table 4 provides definitions for common SS7 links.
- Referring to
FIG. 2B , mated STP pairs are connected by C links. For example,STPs STPs STPs SSPs 236, 238 andSSPs F links - Mated
STPs STPs B links STPs STPs D links STPs STPs D links -
SSPs 236, 238 and matedSTPs links SSPs STPs links -
SSPs 236, 238 can also be connected to matedSTPs STPs SCP 234 by Alinks - For a more elaborate description of SS7 network topology, the reader is referred to Russell, Travis,
Signaling System # 7, McGraw-Hill, New York, N.Y. 10020, ISBN 0-07-054991-5, which is incorporated herein by reference in its entirety.TABLE 4 SS7 link terminology Definitions Access (A) links A links connect SSPs to STPs, or SCPs to STPs, providing network access and database access through the STPs. Bridge (B) links B links connect mated STPs to other mated STPs. Cross (C) links C links connect the STPs in a mated pair to one another. During normal conditions, only network management messages are sent over C links. Diagonal (D) links D links connect the mated STPs at a primary hierarchical level to mated STPs at a secondary hierarchical level. Extended (E) links, E links connect SSPs to remote mated STPs, and are used in the event that the A links to home mated STPs are congested. Fully associated (F) links F links provide direct connections between local SSPs (bypassing STPs) in the event there is much traffic between SSPs, or if a direct connection to an STP is not available. F links are used only for call setup and call teardown. - d. SS7 Signaled Call Flow
- To initiate a call in an SS7 telecommunications network, a calling party using a telephone connected to an ingress EO switch, dials a telephone number of a called party. The telephone number is passed from the telephone to the SSP at the ingress EO of the calling party's local exchange carrier (LEC). First, the SSP can process triggers and internal route rules based on satisfaction of certain criteria. Second, the SSP can initiate further signaling messages to another EO or access tandem (AT), if necessary. The signaling information can be passed from the SSP to STPs, which route the signals between the ingress EO and the terminating end office, or egress EO. The egress EO has a port designated by the telephone number of the called party. The call is set up as a direct connection between the EOs through tandem switches if no direct trunking exists or if direct trunking is full. If the call is a long distance call, i.e., between a calling party and a called party located in different local access transport areas (LATAs), then the call is connected through an inter exchange carrier (IXC) switch. Such a long distance call is commonly referred to as an inter-LATA call. LECs and IXCs are collectively referred to as the public switched telephone network (PSTN).
- Passage of the Telecommunications Act of 1996, authorizing competition in the local phone service market, has permitted CLECs to compete with ILECs in providing local exchange services. This competition, however, has still not provided the bandwidth necessary to handle the large volume of voice and data communications. This is due to the limitations of circuit switching technology which limits the bandwidth of the equipment being used by the LECs, and to the high costs of adding additional equipment.
- e. Circuit-Switching
- Circuit switching dedicates a channel to a call for the duration of the call. Thus, using circuit switching, a large amount of switching bandwidth is required to handle the high volume of voice calls. This problem is compounded by the use of voice circuits to carry data communications over the same equipment that were designed to handle voice communications.
- i. Time Division Multiplexed (TDM) Circuit Switching
- TDM circuit switching creates a full-time connection or a dedicated circuit between any two attached devices for the duration of the connection. TDM divides the bandwidth down int fixed time slots in which there can be multiple time slots, each with its own fixed capacity, available. Each attached device on the TDM network is assigned a fixed portion of the bandwidth using one or more time slots depending on the need for speed. When the device is in transmit mode, the data is merely placed in this time slot without any extra overhead such as processing or translations. Therefore, TDM is protocol transparent to the traffic being carried. Unfortunately, however, when the device is not sending data, the time slots remain empty, thereby wasting the use of the bandwidth. A higher-speed device on the network can be slowed down or bottled up waiting to transmit data, but the capacity that sits idle cannot be allocated to this higher priority device for the duration of the transmission. TDM is not well suited for the bursts of data that are becoming the norm for the data needs in today's organization.
- 2. Data Network
-
FIG. 1B depicts anexample network 148 includingworkstations data network 142.Data network 142 can act as a wide area network (WAN) for coupling a plurality of local area networks (LANs) together.Network 148 includes an example local area network including a plurality of host computers such as, e.g.,client workstation 138 andserver 136, coupled together by wiring including network interface cards (NICs) and a hub, such as, e.g., an Ethernet hub. The LAN is coupled todata network 142 by anetwork router 140 which permits data traffic to be routed toworkstations client 138 andserver 136. - a. Packet-Switching
- Unlike
voice networks FIGS. 1A and 2A which transport traffic over circuit-switched connections,data network 148 transports traffic using packet switching. - Currently, internets, intranets, and similar public or private data networks that interconnect computers generally use packet switching technology. Packet switching provides for more efficient use of a communication channel than does circuit switching. Packet switched networks transport packets of information which can include various types of data such as, e.g., digitized voice, data, and video. With packet switching, many different calls can share a communication channel rather than the channel being dedicated to a single call. During a voice call, for instance, digitized voice information might be transferred between the callers only 60% of the time, with silence being transferred the other 40% of the time. With a circuit switched connection, the voice call could tie-up a communications channel that could have 50% of its bandwidth, unused because of the silence. For a data call, information might be transferred between two computers only 10% of the time. With the data call, 90% of the channel's bandwidth may go unused. In contrast, a packet-switched connection would permit the voice call, the data call and possibly other call information to all be sent over the same channel.
- Packet switching breaks a media stream into pieces known as, for example, packets, cells or frames. Each packet can then be encoded with address information for delivery to the proper destination and can be sent through the network. The packets can be received at the destination and the media stream is reassembled into its original form for delivery to the recipient. This process is made possible using an important family of communications protocols, commonly called the Internet Protocol (IP).
- In a packet-switched network, there is no single, unbroken physical connection between sender and receiver. The packets from many different calls share network bandwidth with other transmissions. The packets can be sent over many different routes at the same time toward the destination, and can then be reassembled at the receiving end. The result is much more efficient use of a telecommunications network's bandwidth than could be achieved with circuit-switching.
- b. Routers
-
Data network 142 can include a plurality ofnetwork routers 140. Network routers are used to route information between multiple networks. Routers act as an interface between two or more networks. Routers can find the best path between any two networks, even if there are several different networks between the two networks. - Network routers can include tables describing various network domains. A domain can be thought of as a local area network (LAN) or wide area network (WAN). Information can be transferred between a plurality of LANs and/or WANs via network routers. Routers look at a packet and determine from the destination address in the header of the packet, the destination domain of the packet. If the router is not directly connected to the destination domain, then the router can route the packet to the router's default router, i.e. a router higher in a hierarchy of routers. Since each router has a default router to which it is attached, a packet can be transmitted through a series of routers to the destination domain and to the destination host bearing the packet's final destination address.
- c. Local Area Networks (LANs) and Wide Area Networks (WANs)
- A local area network (LAN) can be thought of as a plurality of host computers interconnected via network interface cards (NICs) in the host computers. The NICs are connected via, for example, copper wires so as to permit communication between the host computers. Examples of LANs include an ethernet bus network, an ethernet switch network, a token ring network, a fiber digital data interconnect (FDDI) network, and an ATM network.
- A wide area network (WAN) is a network connecting host computers over a wide area. In order for host computers on a particular LAN to communicate with a host computer on another LAN or on a WAN, network interfaces interconnecting the LANs and WANs must exist. An example of a network interface is a router discussed above.
- A network designed to interconnect multiple LANs and/or WANs is known as an internet (with a lower case “i”). An internet can transfer data between any of a plurality of networks including both LANs and WANs. Communication occurs between host computers on one LAN and host computers on another LAN via, for example, an internet protocol (IP) protocol. The IP protocol is used to assign each host computer of a network, a unique IP address enabling packets to be transferred over the internet to other host computers on other LANs and/or WANs that are connected to the internet. An internet can comprise a router interconnecting two or more networks.
- The “Internet” (with a capital “I”) is a global internet interconnecting networks all over the world. The Internet includes a global network of computers which intercommunicate via the internet protocol (IP) family of protocols.
- An “intranet” is an internet which is a private network that uses internet software and internet standards, such as the internet protocol (IP). An intranet can be reserved for use by parties who have been given the authority necessary to use that network.
- d. Switching vs. Routing
- Routing is done at the middle network architecture levels on such protocols as IPX or TCP/IP. Switching is done at a lower level, at
layer 2 of the OSI model, i.e. the media access control (MAC) layer. - e. TCP/IP Packet-Centric vs. ATM Circuit-Centric Data Networks
- Asynchronous Transfer Mode (ATM) is a fixed-size cell switched circuit-centric data network. ATM implements virtual circuits (VCs), virtual paths (VPs) and transmission paths (TPs). A circuit-centric network like ATM sets up virtual circuits between source and destination nodes which provide QoS by dedicating the virtual circuit to a specific traffic type.
- Some networks are packet-centric networks. Unlike a circuit-centric network, a packet-centric network does not use dedicated circuits through which to transfer packets. TCP/IP performs a packetization of user data to be sent between and among the various systems on the IP network. When a large file is sent down the protocol stack, the IP function is responsible for segmentation and packetization of the data. Then a header is placed on the packet for delivery to the data link. The routing and switching of this data is handled at the IP (i.e. network) layer. IP is in a sense a dumb protocol. When a packet is prepared for transmission across the medium, IP does not specifically route the call across a specific channel. Instead, it places a header on the packet and lets the network deal with it. Therefore, the outward bound packets can take various routes to get from a source to a destination. This means that the packets are in a datagram form and not sequentially numbered as they are in other protocols. IP makes its best attempt to deliver the packets to the destination network interface; but it makes no assurances that data will arrive, that data will be free of errors, and that nodes along the way will concern themselves with the accuracy of the data and sequencing, or come back and alert the originator that something is wrong in the delivery mechanism. It is possible that in IP routing of a packet, the packet can be sent along the network in a loop, so IP has a mechanism in its header information to allow a certain number of “hops” or what is called “time to live” on the network. Rather than permit an undeliverable pack to loop around the network, IP has a counter mechanism that decrements every time the packet passes through a network node. If the counter expires, the node will discard the packet. Working together with IP is TCP which provides controls to ensure that a reliable data stream is sent and delivered. At the sending end, TCP puts a byte count header on information that will be delivered to the IP protocol layer and encapsulates it as part of the packet. The receiving end, when it gets packets is responsible for resequencing the packets and ensuring its accuracy. If all of the IP flow is not received correctly, the byte count acknowledgment or nonacknowledgment message can be sent back to the sending end, prompting the sending end to resend the bytes necessary to fill in the remaining portions of the packet flow. TCP buffers additional packets until after resending the nonacknowledged packet.
- 3. Video Network
-
FIG. 1C illustrates aconventional video network 150 such as, e.g., a cable television (CATV) network.Video network 150 can includevideo network 160 coupled to various video capture, distribution links and video output monitors. Video input devices can include, e.g.,conference cameras televisions Video network 160 can include a variety of head end (i.e. the serving end of the cable) and distribution link equipment such as, e.g., coaxial cable television (CATV) and national television standard code (NTSC) tuner equipment for multiplexing various video signals. Standard cable systems have an immense amount of bandwidth available to them. - It is important to note that CATV is a wireless communication method. The frequencies of many video signals are distributed along the cable at the same time. A television tuner selects a particular channel by tuning into a specific frequency or a “frequency band.”
- Although a cable television CATV video network often includes only one physical cable, a number of channels can simultaneously be present on the cable. This accomplished by sharing the frequency spectrum of the cable and assigning different frequency ranges to different channels using frequency division multiplexing (FDM). A broadband cable communications system can operate exactly like a CATV system. A counter to this FDM technique is division of the cable not divided into frequency bands but into time slots using time-division multiplexing (TDM). With TDM, each transmitting video station can grab the entire bandwidth of the cable, but only for a very short period of time. The cable is currently capable of carrying up to 750 MHz. FDM techniques can be used to divide the channels into a number of dedicated logical channels. Innovations have allowed a time division multiple access (TDMA) within an FDM channel.
- A cable system can allow multiplexing on two separate dimensions to achieve data channels over a cable. The channels can be separated by FDM, and in a frequency band the channel can then be shared via TDMA among multiple users. The most common of the TDMA access methods on broadband cable is CSMA/CD developed by XEROX for Ethernet.
- Using a single cable, a midsplit arrangement can accommodate two-way simultaneous transmission. Another way to accommodate this is to use a dual cable system.
- Broadband is inherently an analog signaling method. Because video cameras, e.g., are also analog devices, a signal from a video camera (or video recorder) can be directly transmitted onto a broadband cable channel in red/green/blue (RGB) format.
- G. Convergence of Voice/Data/Video Networks
- Recognizing the inherent efficiency of packet-switched data networks such as the Internet, attention has recently focused on the digitization and transmission of voice, data, video and other information over converged packet-switched data networks. In order to deliver a high quality of service (QoS) end-user experience, the data networks attempt to provide mechanisms to deliver the different types of information timely and with appropriate bandwidth to provide an acceptable end-user experience.
-
FIG. 2C illustrates anexample network 286 carrying voice, data and video traffic over a data network.Network 286 includes callingparty 102 b homed toEO 104 b, whereEO 104 b is linked to atelephony gateway 288 b.Network 286 also includes calledparty 110 c homed toEO 108 c, whereEO 108 c is linked to atelephony gateway 288 c.EOs telephony gateways network 114.Telephony gateways data network 142 viarouters - Still referring to
FIG. 2C ,telephony gateways data network 142. It would be apparent to those skilled in the art thattelephony gateways telephony gateway Level 3 Communications of Louisville, Colo., could also be necessary to enable transport of, e.g., VoIP. -
Network 286 is depicted to include other devices coupled todata network 142. First, an H.323 compliant video-conferencing system 289 is illustrated including acamera 154 g andtelevision 152 g androuter 140 g. Second, a local area network (LAN) 128 a including aclient workstation 138 a and aserver 136 a are coupled todata network 142 vianetwork router 140 a. Similarly,LAN 128 f having aclient workstation 138 f and aserver 136 f are coupled vianetwork router 140 f todata network 142. -
Data Network 142 can provide for routing of packets of information through network routing devices from source locations to destination locations coupled todata network 142. For example,data network 142 can route internet protocol (IP) packets for transmission of voice and data traffic fromtelephony gateway 288 b totelephony gateway 288 c.Data Network 142 represents any art-recognized packet centric data network. One well-known data network is the global Internet. Other examples include a private intranet, a packet-switched network, a frame relay network, and an asynchronous transfer mode (ATM) circuit-centric network. - In an example embodiment,
data network 142 can be an IP packet-switched network. A packet-switched network such as, e.g., an IP network, unlike a circuit-switched network, does not require dedicated circuits between originating and terminating locations within the packet switched network. The packet-switched network instead breaks a message into pieces known as packets of information. Such packets can then be encapsulated with a header which designates a destination address to which the packet must be routed. The packet-switched network then takes the packets and routes them to the destination designated by the destination address contained in the header of the packet. -
Routers Routers 140 a-g transfer information between one another and intercommunicate according to routing protocols. -
Data network 142 could be implemented using any data network such as, e.g., IP networks, ATM virtual circuit-centric networks, frame relay networks, X.25 networks, and other kinds of LANs and WANs. Other data networks could be used interchangeably fordata network 142 such as, for example, FDDI, Fast Ethernet, or an SMDS packet switched network. Frame relay and ATM are connection-oriented, circuit-centric services. Switched multi-megabyte data service (SMDS) is a connection-oriented mass packet service that offers speeds up to 45 Mbps. - 1. Example Data Networks
- a. Asynchronous Transfer Mode (ATM)
- ATM is a high-bandwidth, low-delay, fixed-sized cell-based multiplexing network technology. Bandwidth capacity is segmented into 53-byte cells, having a header and payload fields. ATM uses fixed-length cells with the belief that the fixed length cells can be switched more easily in hardware than variable size packets and thus should result in faster transmissions in certain environments.
- The ATM environment sets up virtual circuits in a circuit-centric manner. Thus, ATM segments variable length IP packet flows into fixed size cells using a segmentation and resequencing algorithm (SAR).
- Each ATM cell contains a 48-byte payload field and a 5-byte header that identifies the so-called “virtual circuit” of the cell. ATM is thought suitable for high-speed combinations of voice, data, and video services. Currently, ATM access can perform at speeds as high as 622 Mbps or higher. ATM has recently been doubling its maximum speed every year.
- ATM is defined by a protocol standardized by the International Telecommunications Union (ITU-T), American National Standards Institute (ANSI), ETSI, and the ATM Forum. ATM comprises a number of building blocks, including transmission paths, virtual paths, and virtual channels. Asynchronous transfer mode (ATM) is a cell based switching and multiplexing technology designed to be a general purpose connection-oriented transfer mode for a wide range of telecommunications services. ATM can also be applied to LAN and private network technologies as specified by the ATM Forum.
- ATM handles both connection-oriented traffic directly or through adaptation layers, or connectionless traffic through the use of adaptation layers. ATM virtual connections may operate at either a constant bit rate (CBR) or a variable bit rate (VBR). Each ATM cell sent into an ATM network contains a small header including information that establishes a virtual circuit-centric connection from origination to destination. All cells are transferred, in sequence, over this virtual connection. ATM provides either permanent or switched virtual connections (PVCs or SVCs). ATM is asynchronous because the transmitted cells need not be periodic as time slots of data are required to be in synchronous transfer mode (STM).
- ATM uses an approach by which a header field prefixes each fixed-length payload. The ATM header identifies the virtual channel (VC). Therefore, time slots are available to any host which has data ready for transmission. If no hosts are ready to transmit, then an empty, or idle, cell is sent.
- ATM permits standardization on one network architecture defining a multiplexing and a switching method. Synchronous optical network (SONET) provides the basis for physical transmission at very high-speed rates. ATM can also support multiple quality of service (QoS) classes for differing application requirements by providing separate virtual circuits for different types of traffic, depending on delay and loss performance. ATM can also support LAN-like access to available bandwidth.
- Cells are mapped into a physical transmission path, such as the North American DS1, DS3, and SONET; European, E1, E3, and E4; ITU-T STM standards; and various local fiber and electrical transmission payloads. All information is multiplexed and switched in an ATM network via these fixed-length cells.
- The ATM cell header field identifies cell type, and priority, and includes six portions. An ATM cell header includes a generic flow control (GFC), a virtual path identifier (VPI), a virtual channel identifier (VCI), a payload type (PT), a call loss priority (CLP), and a header error check (HEC). VPI and VCI hold local significance only, and identify the destination. GFC allows a multiplexer to control the rate of an ATM terminal. PT indicates whether the cell contains user data, signaling data, or maintenance information. CLP indicates the relative priority of the cell, i.e., lower priority cells are discarded before higher priority cells during congested intervals. HEC detects and corrects errors in the header.
- The ATM cell payload field is passed through the network intact, with no error checking or correction. ATM relies on higher-layer protocols to perform error checking and correction on the payload. For example, a transmission control protocol (TCP) can be used to perform error correction functions. The fixed cell size simplifies the implementation of ATM switches and multiplexers and enables implementations at high speeds.
- When using ATM, longer packets cannot delay shorter packets as in other packet-switched networks, because long packets are separated into many fixed length cells. This feature enables ATM to carry CBR traffic, such as voice and video, in conjunction with VBR data traffic, potentially having very long packets, within the same network.
- ATM switches take traffic and segment it into the fixed-length cells, and multiplex the cells into a single bit stream for transmission across a physical medium. As an example, different kinds of traffic can be transmitted over an ATM network including voice, video, and data traffic. Video and voice traffic are very time-sensitive, so delay cannot have significant variations. Data, on the other hand, can be sent in either connection-oriented or connectionless mode. In either case, data is not nearly as delay-sensitive as voice or video traffic. Data traffic, as e.g., spread sheet data requires accurate transmission. Therefore, ATM conventionally must discriminate between voice, video, and data traffic. Voice and video traffic requires priority and guaranteed delivery with bounded delay, while data traffic requires, simultaneously, assurance of low loss. In a converged data network, data traffic can also carry voice traffic, making it also time-dependent. Using ATM, in one embodiment, multiple types of traffic can be combined over a single ATM virtual path (VP), with virtual circuits (VCs) being assigned to separate data, voice, and video traffic.
- A transmission path can include one or more VPs. Each VP can include one or more VCs. Thus, multiple VCs can be trunked over a single VP. Switching can be performed on a transmission path, VPs, or at the level of VCs.
- The capability of ATM to switch to a virtual channel level is similar to the operation of a private or public branch exchange (PBX) or telephone switch in the telephone world. In a PBX switch, each channel within a trunk group can be switched. Devices which perform VC connections are commonly called VC switches because of the analogy to telephone switches. ATM devices which connect VPs are commonly referred to as VP cross-connects, by analogy with the transmission network. The analogies are intended for explanatory reasons, but should not be taken literally. An ATM cell-switching machine need not be restricted to switching only VCs and cross-connection to only VPs.
- At the ATM layer, users are provided a choice of either a virtual path connection (VPC) or a virtual channel connection (VCC). Virtual path connections (VPCs) are switched based upon the virtual path identifier (VPI) value only. Users of a VPC can assign VCCs within a VPI transparently, since they follow the same route. Virtual channel connections (VCCs) are switched upon a combined VPI and virtual channel identifier (VCI) value.
- Both VPIs and VCIs are used to route calls through a network. Note that VPI and VCI values must be unique on a specific transmission path (TP).
- It is important to note that
data network 142 can be any of a number of other data-type networks, including various packet-switched data-type networks, in addition to an ATM network. - b. Frame Relay
- Alternatively,
data network 142 can be a frame relay network. It would be apparent to persons having ordinary skill in the art, that a frame relay network could be used asdata network 142. Rather than transporting data in ATM cells, data could be transported in frames. - Frame relay is a packet-switching protocol used in WANs that has become popular for LAN-to-LAN connections between remote locations. Formerly frame relay access would top out at about 1.5 Mbps. Today, so-called “high-speed” frame relay offers around 45 Mbps. This speed is still relatively slow as compared with other technology such as ATM.
- Frame relay services employ a form of packet-switching analogous to a streamlined version of X.25 networks. The packets are in the form of frames, which are variable in length. The key advantage to this approach it that a frame relay network can accommodate data packets of various sizes associated with virtually any native data protocol. A frame relay network is completely protocol independent. A frame relay network embodiment of
data network 142 does not undertake a lengthy protocol conversion process, and therefore offers faster and less-expensive switching than some alternative networks. Frame relay also is faster than traditional X.25 networks because it was designed for the reliable circuits available today and performs less-rigorous error detection. - C. Internet Protocol (IP)
- In an embodiment,
data network 142 can be an internet protocol (IP) network over an ATM network. It would be apparent to those skilled in the art, that an internet protocol (IP) network over various other data link layer network such as, e.g., Ethernet, could be used asdata network 142. Rather than transporting data in fixed length ATM circuit-centric cells, data could be transported in variable length IP datagram packet-centric packets as segmented by TCP. The IP data network can lie above any of a number of physical networks such as, for example, a SONET optical network. - 2. Virtual Private Networks (VPNs)
- A virtual private network (VPN) is a wide area communications network operated by a telecommunications carrier that provides what appears to be dedicated lines when used, but that actually includes trunks shared among all customers as in a public network. Just as a VPN can be provided as a service through a wireline network, a VPN can be provided in a wireless network. A VPN can allow a private network to be configured within a public network.
- VPNs can be provided by telecommunications carriers to customers to provide secure, guaranteed, long-distance bandwidth for their WANs. These VPNs generally use frame relay or switched multi-megabyte data service (SMDS) as a protocol of choice because those protocols define groups of users logically on the network without regard to physical location. ATM has gained favor as a VPN protocol as companies require higher reliability and greater bandwidth to handle more complex applications. VPNs using ATM offer networks of companies with the same virtual security and QoS as WANs designed with dedicated circuits.
- The Internet has created an alternative to VPNs, at a much lower cost, i.e. the virtual private Internet. The virtual private Internet (VPI) lets companies connect disparate LANs via the Internet. A user installs either a software-only or a hardware-software combination that creates a shared, secure intranet with VPN-style network authorizations and encryption capabilities. A VPI normally uses browser-based administration interfaces.
- 3. H.323 Video Conferencing
- The H.323 Recommendation for video conferencing will now be briefly overviewed. The H.323 standard provides a foundation for, for example, audio, video, and data communications across IP-based networks, including the Internet. By complying with the H.323 Recommendation, multimedia products and applications from multiple vendors can interoperate, allowing users to communicate without concern for compatibility. H.323 promises to be the foundation of future LAN-based products multimedia applications.
- H.323 is an umbrella recommendation from the International Telecommunications Union (ITU) that sets standards for multimedia communications over Local Area Networks (LANs) that do not provide a guaranteed Quality of Service (QoS). These networks dominate today's corporate desktops and include packet-switched TCP/IP and IPX over Ethernet, Fast Ethernet and Token Ring network technologies. Therefore, the H.323 standards are important building blocks for a broad new range of collaborative, LAN-based applications for multimedia communications.
- The H.323 specification was approved in 1996 by the ITU's
Study Group 16.Version 2 was approved in January 1998. The standard is broad in scope and includes both stand-alone devices and embedded personal computer technology as well as point-to-point and multipoint conferences. H.323 also addresses call control, multimedia management, and bandwidth management as well as interfaces between LANs and other networks. - H.323 is part of a series of communications standards that enable videoconferencing across a range of networks. Known as H.32X, this series includes H.320 and H.324, which address ISDN and PSTN communications, respectively.
- The H.323 architecture defines four major components for network-based communications, including terminals, gateways, gatekeepers, and multipoint control units (MCUs).
- Terminals are client endpoints on the LAN that provide real-time, two-way communications. All terminals support voice communications; video and data are optional. H.323 specifies the modes of operation required for different audio, video, and/or data terminals to work together. H.323 is the standard of next generation Internet phones, audio conferencing terminals, and video conferencing technologies.
- All H.323 terminals also support H.245, which is used to negotiate channel usage and capabilities. Three other components are required: Q.931 for call signaling and call setup, a component called Registration/Admission/Status (RAS), which is a protocol used to communicate with a gatekeeper; and support for RTP/RTCP for sequencing audio and video packets.
- Optional components in an H.323 terminal are video codecs, T.120 data conferencing protocols, and MCU capabilities.
- A gateway is an optional element in an H.323 conference. An H.323 gateway can provide many services, the most common being a translation function between H.323 conferencing endpoints and other terminal types. This function includes translation between transmission formats (i.e. H.225.0 to H.221) and between communications procedures (i.e. H.245 to H.242). In addition, a gateway also translates between audio and video codecs and performs call setup and clearing on both the LAN side and the switched-circuit network side.
- In general, the purpose of the H.323 gateway is to reflect characteristics of a LAN endpoint to an SCN endpoint and vice versa. The primary applications of gateways are likely to be establishing links with analog PSTN terminals, establishing links with remote H.320 compliant terminals over ISDN-based switched-circuit networks, and establishing links with remote H.324-compliant terminals over PSTN networks.
- Gateways are not required if connections to other networks are not needed, since endpoints may directly communicate with other endpoints on the same LAN. Terminals communicate with gateways using the H.245 and Q.931 protocols.
- With the appropriate transcoders, H.323 gateways 5806 can support terminals that comply with H.310, H.321, H.322, and V.70.
- Many gateway functions are left to the designer. For example, the actual number of H.323 terminals that can communicate through the gateway is not subject to standardization. Similarly, the number of SCN connections, the number of simultaneous independent conferences supported, the audio/video/data conversion functions, and inclusion of multipoint functions are left to the manufacturer. By incorporating H.323 gateway technology into the H.323 specification, the ITU has positioned H.323 as the means to hold standards-based conferencing endpoints together.
- The gatekeeper is the most important component of an H.323 enabled network. It can act as the central point for all calls within its zone and provides call control services to registered endpoints. In many ways, an H.323 gatekeeper acts as a virtual switch.
- Gatekeepers perform two important call control functions. The first is address translation from LAN aliases for terminals and gateways to IP or IPX addresses, as defined in the RAS specification. The second function is bandwidth management, which is also designated within RAS. For instance, if a network manager has specified a threshold for the number of simultaneous conferences on the LAN, the gatekeeper can refuse to make any more connections once the threshold is reached. The effect is to limit the total conferencing bandwidth to some fraction of the total available; the remaining capacity is left for e-mail, file transfers, and other LAN protocols. A collection of all terminals, gateways, and multipoint control units which can be managed by a single gatekeeper are known as an H.323 Zone.
- An optional, but valuable feature of a gatekeeper is its ability to route H.323 calls. By routing a call through a gatekeeper, it can be controlled more effectively. Service providers need this ability in order to bill for calls placed through their network. This service can also be used to re-route a call to another endpoint if a called endpoint is unavailable. In addition, a gatekeeper capable of routing H.323 calls can help make decisions involving balancing among multiple gateways. For instance, if a call is routed through a gatekeeper, that gatekeeper can then re-route the call to one of many gateways based on some proprietary routing logic.
- While a gatekeeper is logically separate from H.323 endpoints, vendors can incorporate gatekeeper functionality into the physical implementation of gateways and MCUs.
- A gatekeeper is not required in an H.323 system. However, if a gatekeeper is present, terminals must make use of the services offered by gatekeepers. RAS defines these as address translation, admissions control, bandwidth control, and zone management.
- Gatekeepers can also play a role in multipoint connections. To support multipoint conferences, users would employ a gatekeeper to receive H.245 control channels from two terminals in a point-to-point conference. When the conference switches to multipoint, the gatekeeper can redirect the H.245 Control Channel to a multipoint controller, the MC. A gatekeeper need not process the H.245 signaling; it only needs to pass it between the terminals or between the terminals and the MC.
- LANs which contain gateways could also contain a gatekeeper to translate incoming E. 164 addresses into Transport Addresses. Because a Zone is defined by its gatekeeper, H.323 entities that contain an internal gatekeeper can require a mechanism to disable the internal, function so that when there are multiple H.323 entities that contain a gatekeeper on a LAN, the entities can be configured into the same Zone.
- The Multipoint Control Unit (MCU) supports conferences between three or more endpoints. Under H.323, an MCU consists of a Multipoint Controller (MC), which is required, and zero or more Multipoint Processors (MP). The MC handles H.245 negotiations between all terminals to determine common capabilities for audio and video processing. The MC also controls conference resources by determining which, if any, of the audio and video streams will be multicast.
- The MC does not deal directly with any of the media streams. This is left to the MP, which mixes, switches, and processes audio, video, and/or data bits. MC and MP capabilities can exist in a dedicated component or be part of other H.323 components.
- The present invention supports multicast for
wireless base station 302, including providing: compatibility withRFC 1112, 1584; recognition and support of multicasting applications, including: multimedia, teleconferencing, database, distributed computing, real-time workgroups; support of broadcasting function over wireless link; preserves bandwidth, retains QoS latency performance; support of IPv6 IGMP and IPv4 IGMP multicast; group membership query, group membership report messages. - Approved in January of 1998,
version 2 of the H.323 standard addresses deficiencies inversion 1 and introduces new functionality within existing protocols, such as Q.931, H.245 and H.225, as well as entirely new protocols. The most significant advances were in security, fast call setup, supplementary services and T.120/H.323 integration. - G. Packet-Centric QoS-Aware Wireless Point-To-MultiPoint (PtMP) Telecommunications System
- 1. Wireless Point-To-MultiPoint Telecommunications System
-
FIG. 2D depictsnetwork 296 including a point-to-multipoint (PtMP)wireless network 298 coupled viarouter 140 d todata network 142. It is important to note thatnetwork 296 includesnetwork 286 fromFIG. 2C , plusPtMP wireless network 298.PtMP wireless network 298 enables customer premise equipment (CPE) at a subscriber location to gain access to the various voice, data and video resources coupled todata network 142 by means of wireless connectivity over a shared bandwidth. Thewireless PtMP network 298 is a packet switched network which is TCP/IP packet-centric (i.e. no dedicated circuit is created in delivering a communication IP flow) and QoS aware. - Specifically,
PtMP wireless network 298 includes a wireless access point (WAP) 290 d coupled torouter 140 d by, e.g., a wireline connection. Awireless access point 290 e can be similarly coupled torouter 140 e by a wireline connection.WAP 290 d is in wireless communication, such as, e.g., radio frequency (RF) communication, with one or more wirelesstransceiver subscriber antennae - In an alternative embodiment, RF communication is accomplished over cable television (CATV) coaxial cable. As those skilled in the relevant art will understand, a coaxial cable functions as a waveguide over which RF waves propagate. Accordingly, it is possible for the communications link between RF
transceiver subscriber antenna 292 d andWAP 290 d to be a coaxial cable. Therefore, a coaxial cable connection is analogous to a wireless connection, and is referred to as an alternative form of wireless connection in the present invention. - In another alternative embodiment, RF communication is accomplished over a satellite connection, such as, e.g., a low earth orbit (LEO) satellite connection or a high earth orbit satellite. Taking the example of an LEO satellite connection,
WAP 290 d and RFtransceiver subscriber antenna 292 d function as satellite gateways, with the additional functionalities described in the present invention. - As would be apparent to those skilled in the art, although the present invention has been described in the context of a point-to-multi-point network, the invention is equally applicable to a point-to-point network environment.
- Referring to
FIG. 3 A , in an embodiment of the invention,WAPs wireless base station 302 where “IP flow” traffic can be queued, analyzed, characterized, classified, prioritized and scheduled, as described more fully below with reference to the ensuing figures. - Referring to
FIG. 3B , one embodiment of the invention,antennae stations CPEs Subscriber CPE stations CPE stations parties fax machines 116 d and 116 e, video conferencing equipment including video monitors 152 d and 152 e, andcameras client computers servers CPEs CPEs - In an embodiment of the invention, either of
antennae WAPs - Returning to
FIG. 3A , it depicts an example perspective diagram 300 of a PtMP network of the present invention. Diagram 300 includes awireless base station 302 shown in wireless communication withsubscriber locations wireless base station 302 communicates viawireless access point 290 d tosubscriber antennae 292 a-j of subscriber locations 306 a-j. -
Wireless base station 302 is coupled atinterface 320 tonetwork router 140 d by, e.g., a wireline connection.Network router 140 d is coupled todata network 142 which includes variousother network routers 140 b for routing traffic to other nodes ondata network 142 such as, e.g.,telephony gateway 288 b. - Returning to
FIG. 3B , it depicts block diagram 310 further illustrating the wireless PtMP of the present invention. Diagram 310 includeswireless base station 302 coupled atinterface 320 todata network 142. Also coupled todata network 142 arerouter 140 d andtelephony gateway 288 b which is in turn coupled to aclass 5 central office (CO) switch atEO 104 b.IP telephony gateway 288 b can terminate telephony traffic to PSTN facilities by, e.g., translating packets into time domain multiplexed (TDM) standard telephone signals.Wireless base station 302 is in communication withwireless CPE 294 d atsubscriber location 306 d viaantenna WAP CPE 294 d are possible, such as, e.g., one or more host computers with no telephone devices, one or more telephones with no host computers, one or more host computers and one or more telephone devices, and one or more H.323 capable video-conferencing platforms which could include a host computer with monitor and camera. -
CPE 294 d is shown withseveral telephone devices client 120 d andserver 122 d.Client 120 d andserver 122 d can be coupled toCPE 294 d via a LAN connection such as, e.g., an Ethernet LAN, or via a legacy V.35device 322 d providing a high speed data connection. Other Internet appliances capable of attachment to a data network can also be coupled toCPE 294 d. - 2. Networking Protocol Stack Architecture—Wireless IP Network Access Architecture (WINAAR)
-
FIG. 4 depicts the wireless IP network access architecture (WINAAR) 400 of the present invention. Architecture 400 illustrates the networking protocol stack which is a version of a TCP/IP protocol stack enhanced to support IP-centric, QoS over a packet switched, shared bandwidth, wireless PtMP connection. The networking protocol stack will be described in terms of the Open Systems Interconnect (OSI) 7 layer networking protocol stack standard which includes physical layer (OSI layer 1) 402, data link layer (OSI layer 2) 404, network layer (OSI layer 7) 406 and 408, transport layer (OSI layer 4) 410 and applications layer (OSI layer 7) 412. - a. Physical Layer
- In an example embodiment,
physical layer 402 can be implemented using several wireless application specific integrated circuits (wASICs), an off-the-shelf 16QAM/QPSK 416 ASIC; an Interference Mitigation and Multipath Negation (IMMUNE)/RF 418 algorithm ASIC for minimizing and/or eliminating harmful interference; and a frequency hopping (FH) 419 ASIC for providing dynamic and adaptive multi-channel transmission that optimizes data link integrity by changing frequency levels depending on the noise level of a given frequency.Physical layer 402 can include the radio frequency (RF)signal 415. - b. Data Link Layer
-
Data link layer 404 lies on top ofphysical layer 402.Data link layer 404 can include a media access control (MAC) layer 414 which is depicted graphically in diagram 400 as MAC layer portion 414 a and proactive reservation-based intelligent multi-media access (PRIMMA)technology portions Arrows multimedia applications 425, TCP/UDP 427 andIP 429 layers to analyze and schedule an IP packet of an “IP flow.” IP packets of the IP flow are identified by analyzing the header information to determine QoS requirements of the IP flow, so that the IP flow can be characterized, classified, presented, prioritized and scheduled. - c. Network Layer
- 1. Internet Protocol (IP)
-
Network layer 408 is the Internet protocol (IP) 429. As will be discussed further below and as already discussed above with reference todata network 142, IP is a standard protocol for addressing packets of information. Referring now toFIG. 7 , IP header fields 702 can include, e.g., source and destination IP addresses, IP type of service (TOS), IP time to live (TTL), and protocol fields. IP is a datagram protocol that is highly resilient to network failures, but does not guarantee sequence delivery. Routers send error and control messages to other routers using the Internet control message protocol (ICMP). ICMP can also provide a function in which a user can send a “ping” (echo packet) to verify reachability and round trip delay of an IP-addressee host. AnotherOSI layer 3 protocol is address resolution protocol (ARP) which can directly interface to the data link layer. ARP maps a physical address, e.g., an Ethernet MAC address, to an IP address. - 2. Internet Protocol (IP)v4 and IPv6
-
IP 429 ofnetwork layer 408 can be, e.g., an IP version 4 (IPv4) or an IP version 6 (IPv6). IPv6 (sometimes called next-generation internet protocol or IPng) is a backward-compatible extension of the current version of the Internet protocol, IPv4. IPv6 is designed to solve problems brought on by the success of the Internet (such as running out of address space and router tables). IPv6 also adds needed features, including circuiting security, auto-configuration, and real-time services similar to QoS. Increased Internet usage and the allocation of many of the available IP addresses has created an urgent need for increased addressing capacity. IPv4 uses a 32-byte number to form an address, which can offer about 4 billion distinct network addresses. In comparison, IPv6 uses 128-bytes per address, which provides for a much larger number of available addresses. - 3. Resource Reservation Protocol (RSVP)
-
IP 429 ofnetwork layer 408 can have RSVP enhancement. Developed to enhance IPv4 with QoS features, RSVP is supposed to let network managers allocate bandwidth based on the bandwidth requirements of an application. Basically, RSVP is an emerging communications protocol that is hoped to signal a router to reserve bandwidth for real-time transmission of data, video, and audio traffic. - Resource reservation protocols that operate on a per-connection basis can be used in a network to elevate the priority of a given user temporarily. RSVP runs end to end to communicate application requirements for special handling. RSVP identifies a session between a client and a server and asks the routers handling the session to give its communications a priority in accessing resources. When the session is completed, the resources reserved for the session are freed for the use of others.
- RSVP unfortunately offers only two levels of priority in its signaling scheme. Packets are identified at each router hop as either low or high priority. However, in crowded networks, two-level classification may not be sufficient. In addition, packets prioritized at one router hop might be rejected at the next.
- Accepted as an IETF standard in 1997, RSVP does not attempt to govern who should receive bandwidth, and questions remain about what will happen when several users all demand a large block of bandwidth at the same time. Currently, the technology outlines a first-come, first-served response to this situation. The IETF has formed a task force to consider the issue.
- Because RSVP provides a special level of service, many people equate QoS with the protocol. For example, Cisco currently uses RSVP in its IPv4-based internetwork router operating system to deliver IPv6-type QoS features. However, RSVP is only a small part of the QoS picture because it is effective only as far as it is supported within a given client/server connection. Although RSVP allows an application to request latency and bandwidth, RSVP does not provide for congestion control or network-wide priority with the traffic flow management needed to integrate QoS across an enterprise. Further, RSVP does not address the particular challenges related to delivering packets over a wireless medium.
- The present invention supports RSVP by providing: (1) compatibility with RFC 2205; (2) recognition and support of RSVP messages, including: Path messages, Reservation (Resv), Path teardown messages, Resv teardown messages, Path error messages, Resv error messages, and Confirmation messages; (3) recognition and support of RSVP objects, including: Null, Session, RSVP_Hop, Time_Values, Style, Flowspec, Sender_Template, Sender_Tspec, Adspec, Error_Spec, Policy_Data, Integrity, and Scope, Resv_Confirm; (4) configurable translation of RSVP Flowspecs for QoS resource allocation in
wireless base station 302. - The present invention provides support of DiffServ and RSVP/int-serv by providing: (1) support of RFC 2474 and 2475; (2) DiffServ in the core of Internet; (3) RSVP/int-serv for hosts and edge networks; (4) admission control capability for DiffServ compatibility; (5) differentiated services (DSs) (a field marking supported for use by DiffServ, and translation into a
wireless base station 302 resource allocation); and (6) support for binding of multiple end-to-end sessions to one tunnel session. - 4. Real-Time Transport Protocol (RTP) and Real-Time Control Protocol (RTCP)
- TCP of transport layer 410 can have a RTP and RTCP enhancement. Real-time transport protocol (RTP) is an emerging protocol for the Internet championed by the audio/video transport workgroup of the IETF. Referring to
FIG. 7 , RTP and RTCP header fields 708 can include several sub fields of information. RTP supports real-time transmission of interactive voice and video over packet-switched networks. RTP is a thin protocol that provides content identification, packet sequencing, timing reconstruction, loss detection, and security. With RTP, data can be delivered to one or more destinations, with a limit on delay. - RTP and other Internet real-time protocols, such as the Internet stream protocol version 2 (ST2), focus on the efficiency of data transport. RTP and other Internet real-time protocols like RTCP are designed for communications sessions that are persistent and that exchange large amounts of data. RTP does not handle resource reservation or QoS control. Instead, RTP relies on resource reservation protocols such as RSVP, communicating dynamically to allocate appropriate bandwidth.
- RTP adds a time stamp and a header that distinguishes whether an IP packet is data or voice, allowing prioritization of voice packets, while RSVP allows networking devices to reserve bandwidth for carrying unbroken multimedia data streams.
- Real-time Control Protocol (RTCP) is a companion protocol to RTP that analyzes network conditions. RTCP operates in a multi-cast fashion to provide feedback to RTP data sources as well as all session participants. RTCP can be adopted to circumvent datagram transport of voice-over-IP in private IP networks. With RTCP, software can adjust to changing network loads by notifying applications of spikes, or variations, in network transmissions. Using RTCP network feedback, telephony software can switch compression algorithms in response to degraded connections.
- 5. IP Multi-Casting Protocols
-
IP 429 ofnetwork layer 408 can also support multi-casting protocols. Digital voice and video comprise of large quantities of data that, when broken up into packets, must be delivered in a timely fashion and in the right order to preserve the qualities of the original content. Protocol developments have been focused on providing efficient ways to send content to multiple recipients, transmission referred to as multi-casting. Multi-casting involves the broadcasting of a message from one host to many hosts in a one-to-many relationship. A network device broadcasts a message to a select group of other devices such as PCS or workstations on a LAN, WAN, or the Internet. For example, a router might send information about a routing table update to other routers in a network. - Several protocols are being implemented for IP multi-casting, including upgrades to the Internet protocol itself. For example, some of the changes in the newest version of IP, IPv6, will support different forms of addressing for uni-cast (point-to-point communications), any cast (communications with the closest member of a device group), and multi-cast. Support for IP multi-casting comes from several protocols, including the Internet group management protocol (IGMP), protocol-independent multi-cast (PIM) and distance vector multi-cast routing protocol (DVMRP). Queuing algorithms can also be used to ensure that video or other multi-cast data types arrive when they are supposed to without visible or audible distortion.
- Real-time transport protocol (RTP) is currently an IETF draft, designed for end-to-end, real-time delivery of data such as video and voice. RTP works over the user datagram protocol (UDP), providing no guarantee of in-time delivery, quality of service (QoS), delivery, or order of delivery. RTP works in conjunction with a mixer and translator and supports encryption and security. The real-time control protocol (RTCP) is a part of the RTP definition that analyzes network conditions. RTCP provides mandatory monitoring of services and collects information on participants. RTP communicates with RSVP dynamically to allocate appropriate bandwidth.
- Internet packets typically move on a first-come, first-serve basis. When the network becomes congested, Resource Reservation Protocol (RSVP) can enable certain types of traffic, such as video conferences, to be delivered before less time-sensitive traffic such as E-mail for potentially a premium price. RSVP could change the Internet's pricing structure by offering different QoS at different prices. Using SLAs, different QoS levels can be provided to users at CPE location stations depending on SLA subscription level.
- The RSVP protocol can be used by a host, on behalf of an application, to request a specific QoS from the network for particular data streams or flows. Routers can use the RSVP protocol to deliver QoS control requests to all necessary network nodes to establish and maintain the state necessary to provide the requested service. RSVP requests can generally, although not necessarily, result in resources being reserved in each node along the data path.
- RSVP is not itself a routing protocol. RSVP is designed to operate with current and future uni-cast and multi-cast routing protocols. An RSVP process consults the local routing database to obtain routes. In the multi-cast case for example, the host sends IGMP messages to join a multi-cast group and then sends RSVP messages to reserve resources along the delivery paths of that group. Routing protocols determine where packets are forwarded. RSVP is concerned with only the QoS of those packets as they are forwarded in accordance with that routing. The present invention delivers QoS-aware wireless PtMP access to users over a shared wireless bandwidth, and can take into account priority information provided within packet headers of packets in IP flows received for transmission over the wireless base station's bandwidth.
- d. VPN Networks (Example Optional Protocols) at Network Layer
- Also at
network layer 406 are depicted example optional virtual private network (VPN) protocols point to point protocol (PPP) 420 andIPsec 422, discussed below. - A plurality of protocol standards exist today for VPNs. For example, IP security (IPsec), point-to-point tunneling protocol (PPTP),
layer 2 forwarding protocol (L2F) andlayer 2 tunneling protocol (L2TP). The IETE has proposed a security architecture for the Internet protocol (IP) that can be used for securing Internet-based VPNs. IPsec facilitates secure private sessions across the Internet between organizational firewalls by encrypting traffic as it enters the Internet and decrypting it at the other end, while allowing vendors to use many encryption algorithms, key lengths and key escrow techniques. The goal of IPsec is to let companies mix-and-match the best firewall, encryption, and TCP/IP protocol products. - IPsec is designed to link two LANs together via an encrypted data stream across the Internet.
- 1. Point-To-Point Tunneling Protocol (PPTP)
- Point-to-point tunneling protocol (PPTP) provides an alternate approach to VPN security than the use of IPsec. Unlike IPsec, which is designed to link two LANs together via an encrypted data stream across the Internet, PPTP allows users to connect to a network of an organization via the Internet by a PPTP server or by an ISP that supports PPTP. PPTP was proposed as a standard to the IETF in early 1996. Firewall vendors are expected to support PPTP.
- PPTP was developed by Microsoft along with 3Com, Ascend and US Robotics and is currently implemented in WINDOWS NT SERVER 4.0, WINDOWS NT WORKSTATION 4.0, WINDOWS 95 via an upgrade and WINDOWS 98, available from Microsoft Corporation of Redmond, Wash.
- The “tunneling” in PPTP refers to encapsulating a message so that the message can be encrypted and then transmitted over the Internet. PPTP, by creating a tunnel between the server and the client, can tie up processing resources.
- 2.
Layer 2 Forwarding (L2F) Protocol - Developed by Cisco,
layer 2 forwarding protocol (L2F) resembles PPTP in that it also encapsulates other protocols inside a TCP/IP packet for transport across the Internet, or any other TCP/IP network, such asdata network 112. Unlike PPTP, L2F requires a special L2F-compliant router (which can require changes to a LAN or WAN infrastructure), runs at a lower level of the network protocol stack and does not require TCP/IP routing to function. L2F also provides additional security for user names and passwords beyond that found in PPTP. - 3.
Layer 2 Tunneling Protocol (L2TP) - The
layer 2 tunneling protocol (L2TP) combines specifications from L2F with PPTP. In November 1997, the IETF approved the L2TP standard. Cisco is putting L2TP into its Internet operating system software and Microsoft is incorporating it into WINDOWS NT 5.0. A key advantage of L2TP over IPsec, which covers only TCP/IP communications, is that L2TP can carry multiple protocols. L2TP also offers transmission capability over non-IP networks. L2TP however ignores data encryption, an important security feature for network administrators to employ VPNs with confidence. - 4. IPsec
- IP flows using the security encryption features of
IPsec 422 are supported by the present invention. The integration ofIPsec 422 flows of WINAAR architecture 400 are described below in the downlink and uplink directions with reference toFIGS. 17A and 17B , respectively.Wireless base station 302 supports prioritization of IPsec encrypted streams by placing the firewall at the wireless base station and unencrypting the datastream and packet header information prior to identification analysis. Through the wireless transmission medium, the frame stream already includes encryption of the frame data and implements frequency hopping. - IPsec provides for secure data transmission for, e.g., VPNs and eCommerce security. IPsec is compatible with RFC 2401-2407. IPsec is supported with IPv4 and IPv6, and also IPsec tunnel mode.
Wireless base station 302 security protocol support includes authentication header (AH) and encapsulating security payload (ESP).Wireless base station 302 supports IPsec authentication (MD5), encryption algorithms, and automatic key management (IKE and ISAKMP/Oakley).Wireless base station 302 provides for a choice of transport mode or tunnel mode and selectable granularity of security service, such as, e.g., providing a single encrypted tunnel for all traffic between two hosts, or providing separate encrypted tunnel for each TCP connection between hosts. - e. Transport Layer
- 1. Transmission Control Protocol/Internet Protocol (TCP/IP) and User Datagram Protocol/Internet Protocol (UDP/IP)
- As already discussed, internet protocol (IP) has become the primary networking protocol used today. This success is largely a part of the Internet, which is based on the transmission control protocol/internet protocol (TCP/IP) family of protocols. TCP/IP is the most common method of connecting PCs, workstations, and servers. TCP/IP is included as part of many software products, including desktop operating systems (e.g., Microsoft's Windows 95 or Windows NT) and LAN operating systems.
- The most pervasive LAN protocol to date, has been IPX/SPX from Novell's NetWare network operating system (NOS). However, IPX/SPX is losing ground to TCP/IP. Novell now incorporates native IP support into NetWare, ending NetWare's need to encapsulate IPX packets when carrying them over TCP/IP connections. Both UNIX and Windows NT servers can use TCP/IP. Banyan's VINES, IBM's OS/2 and other LAN server operating systems can also use TCP/IP.
- Transport layer four 410 can include transmission control protocol (TCP) or user datagram protocol (UDP) 427 part of the standard TCP/UDP/IP protocol family suite of networking protocols. As will be discussed further below and as already mentioned briefly above with reference to
data network 142, TCP is a standard protocol for segmenting traffic into packets, transmitting, reassembling and retransmitting packets of information between a source and destination IP address. Referring now toFIG. 7 , TCP header fields 706 can include, e.g., source and destination port numbers, window size, urgent pointer, flags (SYN, ISN, PSH, RST, FIN), and maximum segment size (MSS). Both TCP and UDP provide a capability for the TCP/IP host to distinguish among multiple applications through port numbers. TCP can provide for a reliable, sequenced delivery of data to applications. TCP can also provide adaptive flow control, segmentation, and reassembly, and prioritization of data flows. UDP only provides unacknowledged datagram capability. The recently defined real time protocol (RTP), RFC 1889, can provide real time capabilities in support of multimedia, applications, for example. - TCP uses a window-based flow control. Each TCP source has a dynamically changing transmit window that determines how many packets it can transmit during each successive round-trip time (RTT). The TCP source can continue increasing its transmit window if no packets were lost within the last RTT. Once congestion is detected, the source TCP throttles back its transmission, i.e. it “backs-off,” via a multiplicative decrease. An increasing width of the so-called TCP window versus time corresponds to increasingly longer bursts of packets. TCP's window flow-controlled protocol exhibits this effect of increasing throughput and buffer utilization until terminated by loss, followed by a period of rapid backoff.
- TCP works over IP to provide end-to-end reliable transmission of data across
data network 142. TCP controls the amount of unacknowledged data in transit by dynamically reducing either window size or segment size. The reverse is also true in that increased window or segment size values achieve higher throughput if all intervening network elements have low error rates, support the larger packets, and have sufficient buffering to support larger window sizes. - f. Application Layer
- Applications layer seven 412 can include
applications 426 such as, e.g., over TCP, hypertext transport protocol (HTTP), file transfer protocol (FTP), TELNET remote terminal login, and simple mail transfer protocol (SMTP); and over UDP, simple network management protocol (SNMP), RPC, NFS, and TFTP. Other applications can also run over the network stack such as, e.g., a world wide web browser such as NETSCAPE NAVIGATOR available from AOL of Reston, Va., a spreadsheet application program such as LOTUS 123 available from IBM of Armonk, N.Y. or a video teleconferencing program such as MS NetMeeting available from MICROSOFT of Redmond, Wash. Packets transmitted from such applications could require special handling and prioritization to achieve an appropriate end-user QoS. - 3. PRIMMA—System IP Flow Prioritization
- a. Scheduling of Mixed IP Flows
-
FIG. 6 illustrates block diagram 600 representing scheduling of mixed IP flows. Block diagram 600 shows the scheduling ofwireless base station 302. The functionality of block diagram 600 includes PRIMMA management of Internet, VPN, and realtime IP flows. Referring back toFIG. 3A , wireless IP flows are coming fromdata network 142 vianetwork router 140 d to interface 320 ofwireless base station 302. IP flows are then scheduled for transmission fromwireless base station 302 viaantenna 290 d throughsubscriber location 306 d viaantenna 292 d. - Referring back to block diagram 600 of
FIG. 6 , illustrated therein are the downlink and uplink flows betweeninterface 320 and wirelessbase station antenna 290 d. An IP flow, as described herein, refers to a series of related packets of data transmitted from a source to a destination post computer.IP flow 630 from data network 142 (over interface 320) comprises Internet IP flows 608, VPN IP flows 610, and realtime IP flows 612.IP flow 630 is in the downlink direction. - Downlink IP flow analyzer 602 (hereinafter downlink flow analyzer 602) analyzes
Internet IP flow 608,VPN IP flow 610 andrealtime IP flow 612.IP flow analyzer 602 is described further below with reference toFIGS. 8A and 15A .IP flow analyzer 602 receives packets and analyzes packet header fields to identify new or existing IP flows.IP flow analyzer 602 can also characterize QoS requirements for the IP flow depending on packet header field contents.IP flow analyzer 602 can classify the IP flow and associate a given packet with other packets from an existing IP flow and can group together IP flows with similar QoS requirements.IP flow analyzer 602 can also present the IP flows to a flow scheduler. - Downlink PRIMMA MAC IP flow scheduler 604 (hereinafter downlink flow scheduler 604) schedules received IP flows 608, 610, and 612 for transmission in the downlink direction.
Downlink flow scheduler 604 can prioritize the different classes of IP flows. For example,scheduler 604 can reserve slots in downlink frames for latency sensitive IP flows; for FTP type IP flows 608,scheduler 604 can allocate large amounts of bandwidth for file transfer; and for e-mail type IP flows 608, a lower priority can be given to packets. In prioritizing allocation of wireless bandwidth frame slots,downlink flow scheduler 604 can take into account the fact that anIP flow 630 is aVPN IP flow 610 from a virtual private network (VPN), such as, e.g., a remote branch office tieing into a corporate network. All traffic from a VPN can be given a higher priority or specific types of VPN traffic can request particular service levels.Downlink flow scheduler 604 can prioritize realtime IP flows 612 such that their arrival at CPEs 294 at CPE subscriber locations 306 will occur as required. - Downlink PRIMMA MAC segmentation and resequencing (SAR) and framer 606 (hereinafter downlink SAR and framer 606) segments and frames the data packets of received IP flows into frames for transmission over the wireless medium to CPEs 294 at CPE subscriber locations 306. For
example IP flow CPE 294 d atCPE subscriber location 306 d, viabase station antenna 290 d over a wireless medium tosubscriber antenna 292 d andCPE 294 d atCPE subscriber location 306 d. In the present invention, the term wireless medium is used to broadly encompass not only propagation of RF transmissions over cellular communications, but also RF transmissions over satellite communications and cable (e.g., coaxial cable) communications. - In the uplink direction,
IP flow 626 fromCPE 294 d atCPE subscriber station 306 d is received at wirelessbase station antenna 290 d.IP flow 626 can includeInternet IP flow 618,VPN IP flow 620 andrealtime IP flow 622. Uplink IP flow analyzer 632 (hereinafter uplink flow analyzer 632) analyzesInternet IP flow 618,VPN IP flow 620 andrealtime IP flow 622.Uplink flow analyzer 632 is described further below with reference toFIGS. 8B and 15B . In one embodiment, the functionality ofIP flow analyzer 632 occurs at theCPE 294 d atsubscriber CPE location 306 d and sends a request to transmit data up towireless base station 302, including information about an IP flow for whichCPE 294 d would like to schedule an uplink slot. - Uplink PRIMMA MAC IP flow scheduler 634 (hereinafter uplink flow scheduler 634) can schedule the requested IP flow. In one embodiment, the functionality of
scheduler 634 can be performed atCPE 294 d atsubscriber CPE location 306 d. In another embodiment, the functionality ofscheduler 634 can be performed at thewireless base station 302. An advantage of placinguplink flow scheduler 634 at the wireless base station is that this provides efficiencies particularly in a point-to-multi-point architecture. It is more efficient to have one centralized scheduler at thebase station 302 rather than to place multipleuplink flow schedulers 634 at CPEs 294 of subscriber CPE locations 306. - Uplink PRIMMA MAC segmentation and resequencing (SAR) and framer 636 (hereinafter SAR and framer 636) can segment and frame the data packets of IP flows into frames for transmission over the wireless medium from CPE 294 at CPE subscriber locations 306 to
wireless base station 302 for further transmission overdata network 142.IP flow 626 fromCPE 294 d atCPE subscriber location 306 d can be transmitted tobase station antenna 290 d over a wireless medium such as, e.g., RF communication, cable modem and satellite communication, fromsubscriber antenna 292 d coupled toCPE 294 d atCPE subscriber location 306 d. - b. Summary of Downlink and Uplink SubFrame Prioritization
- Block diagram 800 of
FIG. 8A summarizes an exemplary downlink analysis, prioritization and scheduling function. Similarly, block diagram 830 ofFIG. 8B summarizes an exemplary uplink analysis prioritization and scheduling function. Block diagram 800 and 830 are more detailed views of the function of block diagram 600 ofFIG. 6 . - Beginning with block diagram 800 (of
FIG. 8A ), it depicts how IP flow prioritization and scheduling of a shared wireless bandwidth is performed in the downlink path, fromdata network 142—torouter 140 d—to interface 320—towireless base station 302—WAP 290 d—over a wireless medium—to wirelesstransceiver subscriber antenna 292 d—tosubscriber CPE station 294 d atsubscriber CPE location 306 d. -
IP flow analyzer 602 performs the function of identifying, characterizing, classifying, and presenting data packets to a downlink frame scheduler. The functions of identifying, characterizing, classifying and presenting the data packets are described with respect toFIG. 15A . - During identification, it is determined whether a data packet of an incoming IP data flow is known to the system, i.e. is an “existing IP flow”, or rather is the first data packet of a new IP data flow, based on fields in a packet header section. Identification can also include, e.g., determining the source of the packet in order to extrapolate the type of information in the packet payload.
- During characterization, a new data packet (of a new IP data flow) previously unknown to the system is characterized based on the packet header information to determine the QoS requirements for the IP data flow, and to identify the subscriber CPE station that will receive the IP data flow.
- During classification, the new IP data flow is classified into a communications priority class. Classification can also include grouping together packets from different IP flows having similar characteristics into a single class. Example class groupings of IP flows 630 are illustrated as IP classes 810 a-810 g.
- During presentation, the new IP data flow is initialized and presented to a
downlink flow scheduler 604. - Downlink flow scheduler places the data packets of an IP data flow into a class queue based on class queue priorities, and using a set of rules, schedules the data packets for transmission over a wireless medium to a subscriber CPE station 294 at subscriber CPE location 306 with an advanced reservation algorithm. The rules are determined by inputs to the downlink flow scheduler based on, e.g., a hierarchical class-based prioritization, a virtual private network (VPN) directory enabled data priority (such as, for example, directory enabled networking (DEN)), and a service level agreement priority. The advanced reservation algorithm for use in scheduling, e.g., isochronous traffic, is described with respect to
FIG. 14 below. - SAR and
framer 606 breaks up, sequences, and frames the data packets for wireless transmission fromWAP 290 d over the wireless medium to a wirelesstransceiver subscriber antenna 292. Illustrated in block diagram 800 are a number of subscriber applications 820 a-820 e running on devices such as, e.g.,subscriber workstation 120 d (not shown), connected to subscriber CPE stations 294 a-e (not shown) located at subscriber CPE locations 306 a-306 e. Each subscriber CPE location 306 can house one or more subscriber CPE stations 294, and each subscriber CPE station 294 can receive and transmit one or more IP data flows to and from one ormore subscriber workstations 120. In fact, each application connected to a single CPE station can receive or transmit multiple IP data flows. - Referring to
subscriber CPE location 306 a ofFIG. 8A , a CPE SAR and framer 814 a resequences the received data and transmits it through CPE flow scheduler 816 a, and CPE IP flow analyzer 818 a, to subscriber application 820 a. CPE IP flow schedulers 816 a-816 e can perform the same function asdownlink flow scheduler 604 for uplink traffic. Similarly, CPE IP flow analyzers 818 a-818 e perform the same function asdownlink flow analyzer 602. - In an embodiment of the invention, in downlink mode, CPE IP flow schedulers 816 a-816 e and CPE IP flow analyzers 818 a-818 e perform no function.
- Block diagram 800 illustrates the logical functions performed on the downlink path, not necessarily the physical locations of these functions.
- The functions of subscriber applications 820 a-820 e, and CPE SAR and framers 814 a-814 e can be performed in the actual subscriber CPE stations 294 connected over a wireless connection to
wireless base station 302. - Block diagram 800 lists an exemplary set of
priorities 812 used bydownlink flow scheduler 604 to place received data packets into priority class queues. Listed are the following set of example priorities: latency-sensitive UDP priority 812 a,high priority 812 b,intermediate priority 812 c, initial hypertext transfer protocol (HTTP) screenspriority 812 d, latency-neutral priority 812 e, file transfer protocol (FTP), simple mail transfer protocol (SMTP) and othere-mail traffic priority 812 f andlow priority 812 g. Persons skilled in the art will recognize that many different priority classes are possible, depending upon the QoS requirements of the end-users. Latency-sensitive UDP priority data can refer to data that has the highest priority because it is sensitive to jitter (i.e., time synchronization is important) and latency (i.e., the amount of time passage between IP data flows in reverse directions).High priority 812 b can refer to, e.g., premium VPN service, and a high priority SLA service.Intermediate priority 812 c can refer to, e.g., a value VPN service level and an intermediate level SLA service. HTTP screenspriority 812 d can refer to the download of HTTP data, for example, an initial HTTP screen, which is important for making an Internet user feel as if he has a great deal of bandwidth available for his Internet session. Latency-neutral priority 812 e can refer to data that is neutral to latency, such as, e.g., e-mail traffic. FTP,SMTP priority 812 f data includes data that is insensitive to latency and jitter, but requires a large amount of bandwidth to be downloaded accurately because of the size of a transmission. Finally,low priority data 812 g can refer to data that can be transmitted over a long period of time, as when one network device transmits its status information to another network device on a 24 hour basis. - Block diagram 830 (of
FIG. 8B ) depicts how IP flow analysis, prioritization and scheduling of the shared wireless bandwidth is performed in the uplink path, fromsubscriber CPE station 294 d-to wirelesstransceiver subscriber antenna 292 d-over the wireless medium-to WAP 290 d-to wireless base station 302-to interface 320-torouter 140 d-todata network 140. - Block diagram 830 includes
uplink flow analyzer 632,uplink flow scheduler 634 and uplink SAR andframer 636. These components are similar in function todownlink flow analyzer 602,downlink flow scheduler 604 and downlink SAR andframer 606, but instead analyze, schedule and sequence and frame data packets being transmitted fromsubscriber workstations 120 of subscriber CPE stations 294 (at subscriber CPE locations 306 a-306 e) over the wireless medium, and transmit the data packets to interface 320 for transmission todata network 142. - Illustrated in
FIG. 8B are subscriber applications 820 a-820 e, which are the same applications shown inFIG. 8A . Also shown therein are CPE IP flow analyzers 819 a-819 e, CPE IP flow schedulers 817 a-817 e, and CPE SAR and framers 815 a-815 e. These components function analogously to subscriber applications 820 a-820 e, CPE IP flow analyzers 818 a-818 e, CPE IP flow schedulers 816 a-816 e, and CPE SAR and framers 814 a-814 e. However, these components function to analyze, schedule and transmit IP flows in the uplink path, from subscriber CPE stations (at subscriber CPE locations 306 a-306 e) towireless base station 302 for routing to destination host workstations 136 (not shown). - As noted, multiple applications can be connected to one or more subscriber CPE stations at subscriber CPE locations 306 a-306 e. To prevent collisions between multiple applications contending for a fixed number of bandwidth allocations for uplink communication, in one embodiment of the present invention a reservation scheduling system is used. The bandwidth allocations for data packets are called frame slots, and are described below with respect to
FIGS. 12A-12Q , 14, 16A and 16B. - Block diagram 830 illustrates the logical functions performed on the uplink path, not necessarily the physical locations of these functions.
- For example, in one embodiment, the analysis function of
IP flow analyzer 632 which identifies a packet for uplink, characterizes and classifies the packet, can occur in a preferred embodiment in CPE IP flow analyzers 819 a-819 e at the CPE subscriber stations 294 a-294 e (not shown) at subscriber locations 306 a-306 e. - Also, one embodiment, the functions of CPE IP flow schedulers 817 a-817 f for scheduling uplinks subframe slots can be performed in
wireless base station 302 for each of the subscriber CPE stations 294 connected over the wireless connection towireless base station 302. - In this embodiment, the scheduling function is performed at
uplink flow scheduler 634 atwireless base station 302 based on classification information provided to thewireless base station 302 through an uplink IP flow reservation request from the CPE station. By placing all scheduling function at thewireless base station 302, overall system quality of service can be optimized by centralizing the control of scheduling. - In another embodiment, however, their respective functions can be performed in the actual subscriber CPE stations.
- In the reservation scheduling function of this embodiment, each subscriber CPE station requests the reservation of frame slots for its uplink transmissions using a reservation request block (RRB) of the TDMA airframe, described further below with reference to
FIGS. 12A-12O , before it is permitted to communicate in the uplink path withinterface 320. After the reservation request,uplink flow scheduler 634 transmits, as indicated byline 640, to the requesting subscriber CPE station 294 a description of one or more slots which the CPE station 294 can use to transmit its uplink data packets fromsource subscriber workstations 120, over the wireless medium, which are directed towarddestination host workstations 136, overdata network 142. - c. Service Level Requests
-
FIG. 9 illustrates how PRIMMA MACIP flow scheduler 604 can also take into account a Service Level Agreement in prioritizing frame slot scheduling and resource allocation.FIG. 9 depicts SLA-mediated IP flow management diagram 900 including prioritization of uplink traffic being transmitted towireless base station 302 fromCPE subscriber locations P1 902 a,P2 904 a,P3 906 a andP4 908 a. In the illustrated example, suppose IP flows 902 b are being sent to a subscriber atCPE location 306 a and have an SLA priority level ofP1 902 a. Similarly, IP flows 904 b, 906 b and 908 b are being sent to subscribers atCPE locations P2 PRIMMA MAC scheduler wireless base station 302 can take into account SLA-based priorities in allocating available bandwidth to the subscriber CPE IP flows 902 b, 904 b, 906 b and 908 b. In the example illustration,IP flow 902 b can be allocatedframe slot 902 c based onSLA priority 902 a.Frame slots data network 142. - SLA-based prioritization can provide a valuable means for a telecommunications provider to provide differentiated services to a variety of customers. For example, it is possible that low priority traffic from a subscriber who has purchased a premium SLA service agreement, can be scheduled at a higher priority than high priority traffic from a subscriber which has only signed up for a value level or low cost SLA service priority.
- d. Identification of Headers
-
FIG. 7 illustrates packetheader field information 700 which can be used to identify IP flows and the QoS requirements of the IP flows. Specifically, IP header fields 702 can include, e.g., source and destination IP addresses, helpful in providing application aware preferential resource allocation; IP type of service (TOS), a useful field for assisting PRIMMA MAC in classifying a packet or IP flow; IP time to live (TTL), a useful field for anticipating application packet discards; and protocol fields which can be used in identifying IP flows. -
Packet header information 700 also includes UDP header fields 704. Included in UDP packet header fields 704 are source and destination port numbers. -
Packet header information 700 also includes TCP header fields 706. Included in TCP packet header fields 706 are source and destination port numbers; TCP sliding window size; urgent pointer; SYN, ISN, PSH, RST and FIN flags; and maximum segment size (MSS). -
Packet header information 700 also includes realtime protocol RTP and RTCP header fields 708. - It would be apparent to those skilled in the art that other packet header fields could be useful in identifying an IP flow. The fields have been given by way of example and are not intended to be an exhaustive list of useful packet header fields. Other fields, such as, e.g., fields from IP v6 relating to differentiated services (DIFF SERV) could also be useful to
IP flow analyzer wireless base station 302. - e. TDMA MAC Air Frame
-
FIGS. 12A-12O illustrate an exemplary time domain multiple access (TDMA) media access control (MAC) transmission air frame. The fields described herein merely refer to one embodiment for the present invention, and are not limiting to the numerous implementations of the present invention. -
FIG. 12A illustrates an entire TDMA MAC transmission air frame.Air frame 1202 includesdownstream transmission subframe 1202 andupstream transmission subframe 1204. - The TDMA MAC air frame of
FIG. 12A includes upstream acknowledgment block (UAB) 1206, acknowledgment request block (ARB) 1208, frame descriptor block (FDB) 1210, data slot (DS)1 1212 a,DS 2 1212 b,DS 3 1212 c,DS 4 1212 d,DS 5 1212 e,DS 6 1212 f,DS 7 1212 g,DS 8 1212 h,DS 9 1212 i,DS 10 1212 j,DS 11 1212 k,DS m 1212 l, downstream acknowledgment block (DAB) 1214, reservation request block (RRB) 1216,UA 1 1218 a,UA 2 1218 b,UA 3 1218 c, UA4 1218U,UA 5 1218 e,UA 6 1218 f,UA 7 1218 g,UA 8 1218 h,UA 9 1218 i,UA 10 1218 j,UA 11 1218 k, UA12 1218 l, andUA n 1218 m. - In the embodiment described herein, the type of TDMA used is TDMA/time division duplex (TDMA/TDD). In TDMA/TDD, for one interval of time, transmission is from a CPE station 294 to a
wireless base station 302, and in another instance of time, it is from awireless base station 302 to a CPE station 194. Any number of slots can be used for the uplink or for the downlink. The number of slots is dynamically assigned for both the uplink and the downlink. However, because the downlink data rate is usually higher than the uplink data rate, more slots are assigned to the downlink. Although distribution of slots between the downlink and uplink is dynamically assigned, the total number of slots for a frame is fixed in this embodiment.TABLE 5 MAC Air Block/ Frame Slots SubFrame Name Description 0 1-8 DAB/ Downstream Acknowledgments from subscribers Upstream Acknowledgment CPE stations to wireless base station Request Block of receipt of downstream slots in previous downstream subframe 0 1-8 RRB/ Reservation Request Requests from subscriber CPE stations Upstream Block for transmission reservations in later frames with dynamically adjustable number of contention slots 0 up to US1-US16/ Upstream Slot Data slots in the upstream subframe, 16 Upstream Transmissions which is a variable number per frame (up to 16 in one embodiment) 0 1-3 ODB/ Operations Data Block OA&MP data from subscribers Upstream sequenced by a subscriber CPE station per frame 0 0 UAB/ Upstream Acknowledgments from wireless base Downstream Acknowledgment Block station to subscriber CPE stations of receipt of upstream slots in a previous subframe 0 0 ARB/ Acknowledgment Acknowledgments of subscriber CPE Downstream Request Block requests of having received reservation requests in a previous subframe 0 0 FD/ Frame Descriptor Block Describes the contents of the Downstream for current frame downstream transmission subframe 0 up to DS1-DS16/ Downstream Slot Data slots in the downstream 16 Downstream Transmissions subframe, which is variable per frame (up to 16 in one embodiment) 0 0 CCB/ Command and Control OA&MP commands sequenced by Downstream Block subscribers per frame and frame synchronization -
FIG. 12B is a symbolic illustration of an exemplary TDMA/TDD air frame 1220 of the present invention. TDMA/TDDair frame structure 1220 depicts a frame offrame size 1228, which can be, e.g., 16 slots or 32 slots. It would be apparent to those skilled in the art thatframe structures 1220 having other numbers of slots could be used without departing from the spirit and scope of the invention.Frame structure 1220 includes, e.g.,various TDMA slots data slot control packet 1226 a, or adata packet 1226 b-d, respectively. - In the present embodiment the sum of all TDMA slots 1222 within a frame of
frame size 1228 is fixed. However, as noted, using the resource allocation methodologies of the present invention it is possible to dynamically allocate a subset of the entire number of TDMA slots 1222 to an uplink direction, where all the uplink TDMA slots are known collectively as an uplink subframe or anupstream transmission subframe 1204, and to dynamically allocate a subset of the entire number of TDMA slots 1222 to a downlink direction, where all the downlink TDMA slots are known collectively as a downlink subframe or andownlink transmission subframe 1202. Using the resource allocation method of the present invention, it is possible to allocate all TDMA slots 1222 to a given upstream or downstream direction. It is further possible to allocate all data slots 1224 to a single CPE station. Thewireless base station 302 has a state machine, and knows the state of each CPE station 294 having a connection therewith (i.e., having an IP flow recognized by the wireless base station 294). -
Downstream transmission subframe 1202 andupstream transmission subframe 1204 are described in detail below. - 1. Downstream Transmission SubFrames
-
FIG. 12C depicts an exemplarydownstream transmission subframe 1202. The downstream transmission subframe ofFIG. 12C includestransmitter turnaround time 1230,UAB 1206,ARB 1208,FDB 1210, a variable number of DSs per frame (e.g., 16) 1212, and command and control block (CCB) 1232. TheDS transmissions 1212 includeDS 1 1212 a,DS 2 1212 b,DS 3 1212 c,DS 4 1212 d,DS 5 1212 e,DS 6 1212 f,DS 7 1212 g,DS 8 1212 h,DS 9 1212 i,DS 10 1212 j,DS 11 1212 k, andDS m 1212 l. -
FIG. 12D depicts anexemplary UAB 1206 of adownstream transmission subframe 1202. The downstream transmission subframe ofFIG. 12D includesUAB 1206,ARB 1208,FDB 1210,DS 1 1212 a,DS 2 1212 b,DS 3 1212 c,DS 4 1212 d,DS 5 1212 e,DS 6 1212 f,DS 7 1212 g,DS n 1212 h,DS 9 1212 i,DS 10 1212 j,DS 11 1212 k,DS m 1212 l, andCCB 1232. -
UAB 1206 includes subslotsUAB 1 1206 a,UAB 2 1206 b,UAB 3 1206 c,UAB 4 1206 d,UAB 5 1206 e,UAB 6 1206 f,UAB 7 1206 g, andUAB n 1206 h.UAB 1 1206 a includes apreamble 1234 a,subscriber ID 1234 b, IP-flow identifier 1234 c,slot sequence number 1234 d, and cyclical redundancy check (CRC) 1234 e. - The UAB field is an acknowledgment by a
wireless base station 302 to a CPE station 294 that the slots (e.g., US1-US16) of an upstream transmission subframe have been received. The reader is referred to the discussion of the upstream transmission subframe below. - In
subslot UAB 1 1206 a of ARB 1206:preamble 1234 a includes data used for link integrity purposes;subscriber ID 1234 b identifies which CPE station 294 is making the reservation request; IP-flow identifier 1234 c identifies the IP data flow; quality ofservice data class 1234 a identifies the priority class of the IP data flow, if known to the CPE station 294; IP-flow priority andtype 1234 b is an indicator of a new IP data flow; andCRC 1234 e, which stands for cyclic redundancy code, provides error checking bits for subslot RRB1 1216 a. -
FIG. 12E depicts anexemplary ARB 1208 of adownstream transmission subframe 1202. The downstream transmission subframe ofFIG. 12E includesUAB 1206,ARB 1208,FDB 1210,DS 1 1212 a,DS 2 1212 b,DS 3 1212 c,DS 4 1212 d,DS 5 1212 e,DS 6 1212 f,DS 7 1212 g,DS n 1212 h,DS 9 1212 i,DS 10 1212 j,DS 11 1212 k,DS m 1212 l, andCCB 1232. -
ARB 1208 includes subslots ARB1 1208 a,ARB 2 1208 b,ARB 3 1208 c,ARB 4 1208 d,ARB 5 1208 e,ARB 6 1208 f,ARB 7 1208 g, andARB n 1208 h. ARB1 1208 a includes apreamble 1234 a,subscriber ID 1234 b, IP-flow identifier 1234 c,slot sequence number 1234 d, andCRC 1234 e. - The ARB field is an acknowledgment by a
wireless base station 302 to a CPE station 294 that thewireless base station 302 has received an upstream reservation request from the CPE station 294. The reader is referred to the discussion of the upstream transmission sub frame below. - In subslot ARB, 1208 a of ARB 1208:
preamble 1234 a includes data used for link integrity purposes;subscriber ID 1234 b identifies which CPE station 294 is making the reservation request; IP-flow identifier 1234 c identifies the IP data flow; quality ofservice data class 1234 a identifies the priority class of the IP data flow, if known to the CPE station 294; IP-flow priority andtype 1234 b is an indicator of a new IP data flow; andCRC 1234 e, which stands for cyclic redundancy code, provides error checking bits for subslot RRB1 1216 a. -
FIG. 12F depicts anexemplary FDB 1210 of adownstream transmission subframe 1202. The downstream transmission subframe ofFIG. 12F includesUAB 1206,ARB 1208,FDB 1210,DS 1 1212 a,DS 2 1212 b,DS 3 1212 c,DS 4 1212 d,DS 5 1212 e,DS 6 1212 f,DS 7 1212 g,DS n 1212 h,DS 9 1212 i,DS 10 1212 j,DS 11 1212 k,DS m 1212 l, andCCB 1232. - The FDB includes detailed information pertaining to the slots (e.g., DS2-DS16) of the downstream transmission subframe.
-
FDB 1210 includes a preamble subslot 1236 a, number of downstream slots subslot, 1236 b, IP-flow ID forupstream reservation 1 subslot 1236 c, IP-flow ID forupstream reservation 2 subslot 1236 d, IP-flow ID for upstreamreservation n subslot 1236 e, and contention slot count for next upstreamsub frame subslot 1236 f. - In
FDB 1210, the fields are defined as follows: preamble subslot 1236 a includes data used for link integrity purposes; number of downstream slots subslot 1236 b includes the number of downstream slots (DSs), IP-flow ID fordownstream reservation subslot 1236 c includes an IP flow identification for DS1; IP-flow ID fordownstream reservation subslot 1236 d includes a second IP flow identification for DS2; IP-flow ID for downstreamreservation n subslot 1236 e includes another IP flow identification for DSm; contention slot count for nextupstream subframe subslot 1236 f provides a count for the next available upstream subframe. -
FIG. 12G depicts an exemplary downstream MAC payload data unit (PDU). The downstream MAC PDU includes information regarding the actual structure of the payload. The downstream MAC PDU ofFIG. 12G includes MAC linkedlist sequence number 1238 a (the sequence, number of the MAC linked list), reservationrequest index number 1238 b (an index to the downstream IP flow); compressed IP-flow identifier 1238 c, compressed IP-flow priority andtype 1238 d (identifying the priority and type of a compressed IP flow),slot payload 1238 e (the amount of data in a downstream data slot), andCRC 1234 e (error checking information). -
FIG. 12H depicts an exemplary CCB of adownstream transmission subframe 1202. The CCB comprises OAM&P commands sequenced by subscriber CPE station 294 per frame and frame synchronization.CCB 1232 includes amode command subslot 1240 a (includes options of what mode the CPE station is to take),profile command subslot 1240 b (includes specific system commands, such as a patch for a module), controldata index subslot 1240 c (including download locations and memory requirements or other information needed by the CPE stations to download data),datablock 1 subslot 1240 d (includes specific system data),datablock 2 subslot 1240 e (same), datablock n subslot 1240 f (same), andCRC subslot 1234 e (error checking information). - 2. Upstream Transmission SubFrames
-
FIG. 121 depicts an exemplaryupstream transmission subframe 1204. The upstream transmission subframe ofFIG. 121 includestransmitter turnaround time 1230,DAB 1214,RRB 1216, a variable number of USs per frame, e.g., 16, 1218, and operations data block (ODB) 1242, consisting of OAM&P data from subscribers, sequenced by subscriber per frame. TheUS transmissions 1218 includeUS 1 1218 a,US 2 1218 b,US 3 1218 c,US 4 1218 d,US 5 1218 e,US 6 1218 f,US 7 1218 g,US 8 1218 h,US 9 1218 i,US 10 1218 j,US 11 1218 k, US12 1218 l, andUS n 1218 m. -
FIG. 12K depicts anexemplary RRB 1216 of anupstream transmission subframe 1204. The upstream transmission subframe ofFIG. 12K also showsDAB 1214,RRB 1216,US 1 1218 a,US 2 1218 b,US 3 1218 c,US 4 1218 d,US 5 1218 e,US 6 1218 f,US 7 1218 g,US 8 1218 h,US 9 1218 i,US 10 1218 j,US 11 1218 k, US12 1218 l,US n 1218 m, andODB 1242. -
RRB 1216 includes subslots RRB1 1216 a,RRB 2 1216 b,RRB 3 1216 c,RRB 4 1216 d,RRB 5 1216 e,RRB 6 1216 f,RRB 7 1216 g, andRRB n 1216 h. RRB1 1216 a includes apreamble 1234 a,subscriber ID 1234 b, IP-flow identifier 1234 c, quality of service data class 1244 a, IP-flow priority andtype 1244 b, andCRC 1234 e. - A CPE station 294 uses one of the subslots (RRB1 1216 a,
RRB 2 1216 b,RRB 3 1216 c,RRB 4 1216 d,RRB 5 1216 e,RRB 6 1216 f,RRB 7 1216 g, andRRB n 1216 h) ofRRB 1216 to make a reservation request, which is a request by the CPE station 294 for bandwidth in a future uplink transmission subframe. If twoCPE stations RRB 1216, which can occur because their pseudorandom number generators select the same subslot, then a “collision” occurs and the data is not readable bywireless base station 302. The twoCPE stations - Reservation request slots can be provided on an IP flow basis. Rather than allocate a reservation request slot to every CPE subscriber station, a default number (e.g., 5) are made available as contention slots. If collisions are detected by a greater number of requesting subscribers than the number of reservation request slots, then the slots allocated can be dynamically varied to provide additional RRB slots. (Collisions are analogous to CSMA/CD collisions in Ethernet, where colliding devices on an Ethernet network attempt to retransmit over the bus architecture by retrying at a random time.)
- The radio contention method of the present invention builds upon aspects of the “Slotted Aloha” method developed by L. Roberts in 1972, as a refinement of the “Aloha” method developed by N. Abramson in the early 1970's, and so-called bit-mapped reservation protocols. Like the Slotted Aloha method, the present invention provides for discrete slots for transmission of data, rather than allowing the transmission of data at any point. However, instead of transmitting the actual “payload” of data, the present invention advantageously transmits only a “reservation request” describing the actual data payload contents. Also, the number of slots for reservation requests can advantageously be dynamically altered according to the frequency of detected collisions in the recent past.
- Unlike various Carrier Sense Multiple Access (CSMA) techniques previously used in wireless, both persistent and non-persistent, the present method advantageously does not require that
subscriber CPE station 294 d “sense” the carrier (the radio channel) before transmission. Instead, asubscriber CPE station 294 d selects a “subslot” to transmit through a pseudo-random number selection, without a prior carrier sense. If a collision is detected, thesubscriber CPE station 294 d will try again in the next frame using the pseudo-random number process. - Instead of using a bit-map protocol for the resolution of contention, as is used in some reservation protocols, the wireless base station can explicitly grant reservation requests. The standard bit-map protocol can require that all stations can receive signals from all other stations so that the subsequent order of transmission can be implicitly determined from the resulting bitmap pattern. The present method advantageously does not require the receipt of reservation request signals from other
CPE subscriber stations 294 d. This is advantageous because, at higher frequencies (such as, e.g., 2 GHz to 30 GHz) where there may be line-of-sight and distance constraints, the requirement for receipt of the transmissions of otherCPE subscriber stations 294 d could unduly constrain the topology, locations and distances of CPE subscriber stations. - Advantageously, by allowing the
wireless base station 302 to explicitly grant the requested reservation, other factors such as relative or dynamicCPE subscriber station 294 d (or IP-flow) priority factors can be considered. Therefore, the present invention's reservation protocol with a dynamically adjustable number of contention subslots and explicit wireless base station reservation grants, allows a more optimal means of providing for the allocation of wireless, such as, e.g., radio, bandwidth in response to QoS requirements of IP-flows than any prior method. - As noted, RRB1 1216 a includes the following fields: a
preamble 1234 a,subscriber ID 1234 b, IP-flow identifier 1234 c, quality of service data class 1244 a, IP-flow priority andtype 1244 b, andCRC 1234 e. In subslot RRB1 1216 a of RRB 1216:preamble 1234 a includes data used for link integrity purposes;subscriber ID 1234 b identifies which CPE station 294 is making the reservation request; IP-flow identifier 1234 c identifies the IP data flow; quality ofservice data class 1234 a identifies the priority class of the IP data flow, if known to the CPE station 294; IP-flow priority andtype 1234 b is an indicator of a new IP data flow; andCRC 1234 e, which stands for cyclic redundancy code, provides error checking bits for subslot RRB1 1216 a. Optionally, an additional field can be provided in subslot RRB 1216 a which includes the number of data packets CPE station 294 will transmit in its IP data flow. -
FIG. 12J depicts anexemplary DAB 1214 of anupstream transmission subframe 1204, where a CPE acknowledges receipt of a slot from base. The DAB is an acknowledgment from a subscriber CPE station 294 to the wireless base station that downstream slots have been received in a previous subframe. - The
DAB 1214 includes subslots DAB1 1214 a,DAB 2 1214 b,DAB 3 1214 c,DAB 4 1214 d,DAB 5 1214 e,DAB 6 1214 f,DAB 7 1214 g, and DABn 1214 h. Subslot DAB1 1214 a includes apreamble 1234 a,subscriber ID 1234 b, IP-flow identifier 1234 c,slot sequence number 1234 d, andCRC 1234 e. (These fields have the same information as described with respect to the RRB.)FIG. 12L depicts an exemplary MAC PDU upstream slot. The MAC PDU upstream slot ofFIG. 12L includes a CPE linked-list sequence number 1246, reservationrequest index number 1236 b, compressed IP-flow identifier 1238 c, compressed IP-flow priority andtype 1238 d,slot payload 1238 e, andCRC 1234 e. The upstream MAC PDU is similar to the downstream MAC PDU, but is used instead for upstream subframe payload information. -
FIGS. 12M, 12N and 12O depict anexemplary ODB 1242 in detail. This field is used to store information regarding the connection between thewireless base station 302 and the CPE station 294.ODB 1242 includespreamble 1234 a (including link integrity data),subscriber ID 1234 b (identifies which CPE station 294 is making the reservation request),system state 1248 a (information about the status of the CPE station 294),performance data 1248 b (how full the buffer statistics, cpe processor performance statistics, system state),antenna data 1248 c (information pertaining to the antenna),CRC 1234 e (error checking information) andsynchronization pattern 1248 d (error checking information). - Referring to
FIG. 12M , system state subslot 1248 a comprisessystem mode 1250 a (the mode of the CPE station, e.g., command mode, operations mode, or initialization mode of the system),system status 1250 b (the status of the CPE station),system resources 1250 a (the mode of the CPE station),system power 1250 b (the mode of the CPE station),system temperature 1250 a (the temperature of the CPE station). The CPE stations 294 are required to taketurns using ODB 1242 to transmit their information. - Referring to
FIG. 12N ,performance data 1248 a comprises the number of comrepeats 1252 a (the number of repeats of communication attempts), number offrameslips 1252 b (the number of frames that have slipped),waitstate index 1252 c (an index to the waiting state). - f. Exemplary Class-Based Frame Prioritization
-
FIG. 13 shows block diagram 1300, illustrating how an exemplary flow scheduler for the present invention functions to schedule products. Block diagram 1300 includes: flowscheduler 604, 634 (which is a combination ofdownlink flow scheduler 604 and uplink flow scheduler 634), downlink transmission subframe 1202 (i.e., the next MAC downstream subframe), uplink transmission subframe 1204 (i.e., the current MAC upstream subframe). Block diagram 1300 also includes the following downstream components: downstream reservation first-in-first-out queue 1322,class 1downstream queue 1302,class 2downstream queue 1304, andclass 3downstream queue 1306. Block diagram 1300 also includes the following upstream reservation components: current upstream subframe 1344 (with the currentupstream subframe 1204 about to be stored in it), previous upstream sub frames 1346, 1348, 1350,class 1 upstream reservation request queue 1308,class 2 upstream reservation request queue 1310, andclass 3 upstreamreservation request queue 1312. - In the downlink path, an IP flow QoS class queuing processor (described below with respect to
FIGS. 15A and 15B ) queues the received data packets intoclass 1packet flow queues class 2packet flow queues class 3packet flow queues - Based on inputs from a hierarchical class-based priority processor, a virtual private network (VPN) directory enabled (DEN) data table and a service level agreement (SLA) priority data table (described below with respect to
FIGS. 15A and 15B ), theclass 1,class 2, andclass 3 packet flow queues are respectively assigned toclass 1downstream queue 1302,class 2downstream queue 1304, andclass 3downstream queue 1306.Flow scheduler downlink transmission subframe 1202. - In one embodiment, additional processing is used to minimize latency and jitter. For example, suppose the data packets of
class 1packet flow queue 1324 require jitter-free and latency-free delivery, i.e., delivery of packets must be at constant time intervals and in real-time.Packet flow queue 1324 creates, e.g., 4 equal time spaced slot reservations in future frames, as shown inclass 1downstream queue 1302 and described with respect toFIG. 14 below. The reservations are fed to downstream reservation first-in-first-out queue 1322, and are scheduled onto a futuredownstream frame 1202 byflow scheduler - In the uplink path, reservation requests for future upstream slots arrive at
wireless base station 302 as part of the currentupstream subframe 1204 received from CPE subscriber stations 294 over the wireless medium. Currentupstream subframe 1344 can temporarily store reservation requests for analysis and scheduling of uplink packets in accord with the description ofFIG. 8B above. Previousupstream subframes FIG. 12 ***, include a request for a number of slots for a single IP flow with an IP flow identifier # and class of the flow. The upstream reservation requests (by IP flow and class) are queued ontoclass 1 upstream reservation request queue 1308,class 2 upstream reservation request queue 1310, andclass 3 upstreamreservation request queue 1312 by an IP flow QoS class queuing processor (described below with respect toFIGS. 16A and 16B ).Flow scheduler downstream transmission subframe 1202 and upstreamtransmission sub frame 1204, respectively. -
FIG. 14 is an exemplary two-dimensional block diagram 1400 of the advanced reservation algorithm.FIG. 14 includesMAC subframe scheduler length downlink subframe 1202 and a variablelength uplink subframe 1204. The lengths ofdownlink subframe 1202 anduplink subframe 1204 together comprise the length of an entire frame. - Each
frame n 1402 includes a number of slots (1418-1478). Slots 1418-1446 comprise thedownlink subframe 1202, and slots 1448-1478 comprise theuplink subframe 1204. In one embodiment, the slots are fixed in length, with each slot capable of storing a single data packet. The total number of frame slots in a frame remains constant. For example, if a given frame includes 64 frame slots, the slots can be allocated dynamically in either the uplink or downlink directions, such as, e.g., 32 up and 32 down, 64 up and 0 down, 0 up and 64 down. Block diagram 1400 can be thought of as a two dimensional matrix with each slot having a time value (i.e., a slot-to-slot time interval), e.g., 0.01 ms, and each frame having a total frame interval time value (i.e., a frame-to-frame time interval), e.g., 0.5 ms. - In the present invention, an advanced reservation algorithm assigns future slots to data packets based on the priority of the IP data flow with which the packet is associated. Exemplary priorities are described above with respect to
FIGS. 8A and 8B . For calls that are sensitive to jitter, meaning calls that are time sensitive, it is important to maintain an isochronous (i.e., in phase with respect to time) connection. With such signals, it is important that the data be dispersed in the same slot between frames, or in slots having a periodic variation between frames. For example,vertical reservation 1480 shows a jitter sensitive signal receiving the same slot for downlink communications in each frame. Specifically, the signal is assigned slot 1422 in. frames 1402-1416. If the frame-to-frame interval is 0.5 ms, then a slot will be provided to the IP flow every 0.5 ms. As another example,diagonal reservation 1482 shows a jitter sensitive signal receiving a slot varying by a period of one between sequential frames. Specifically, the signal is assigned slot 1440 inframe 1402,slot 1438 inslot 1404, . . . slot 1426 inframe 1416, to create a “diagonal.” If the frame-to-frame interval is 0.5 ms and the slot-to-slot interval is 0.01 ms, then a slot can be provided to the IP flow every 0.5 minus 0.01, equals 0.49 mms. Thus, to decrease the frame interval, a diagonal reservation of positive slope can be used. To obtain an increased frame interval, a diagonal of negative slope such as, e.g., negative slopediagonal uplink reservation 1486. Thediagonal reservation 1482 can also be more pronounced (i.e., using a greater or lesser slope), depending on the period between sequential frames desired.Reservation patterns vertical reservation 1486, similar tovertical reservation 1480, useful for a jitter sensitive communication in the uplink direction. - For latency sensitivity, one or more slots can be guaranteed in each frame. For example, for a call that is latency sensitive, but not jitter sensitive, each frame can be assigned one (or more) slots for communications. However, the slot(s) need not be periodic between frames, as with jitter sensitive calls. The greater the number of slots allocated per frame to an IP flow, the greater total bandwidth per frame rate for the IP flow.
- For calls that are less latency sensitive, fewer slots per frame can be assigned for the communication. For example, a communication that is less latency sensitive can receive a guaranteed bandwidth of one slot every four frames. A call that is even less latency sensitive can receive, e.g., a single slot every ten frames.
- Using these principles, the advanced reservation algorithm can assign the slots from highest priority to lowest priority, exhausting the number of available slots in future frames. IP data flows that are both jitter and latency sensitive can be assigned slots with periodic patterns first (e.g.,
patterns scheduler FIGS. 15A, 15B , 16A and 16B. - g. Downlink SubFrame Prioritization
- 1. Overview
-
FIGS. 15A and 15B are exemplary logical flow diagrams for analysis and scheduling of the shared wireless bandwidth for the downlink direction. The logical flow pertains to IP packet flows arriving fromdata network 140, at thewireless base station 302, for transmission down to asubscriber CPE station 294 d over the wireless medium.FIG. 15A is an exemplary logical flow diagram 1500 fordownlink IP analyzer 602.FIG. 15B is an exemplary logical flow diagram 1560 for thedownlink flow scheduler 604. - The functional components for
FIGS. 15A and 15B are explained by way of method modules, which can be viewed as physical units (e.g., comprising software, hardware, or a combination thereof) or logical vehicles (e.g., used for explanatory purposes only). Those skilled in the art will recognize that the modules are used only to explain an exemplary embodiment, and are not to be considered limiting. - The exemplary logical flow diagram 1500 for downlink IP flow analyzer of
FIG. 15A includes packetheader identification component 1502,packet characterization component 1504, packet classification component 1506, and IPflow presentation component 1508. The functions of these components are explained in detail below. - In one embodiment, downlink
IP flow analyzer 602 is physically located inwireless base station 302, although those skilled in the art will recognize that the same functionality can be located remotely fromwireless base station 302. -
FIGS. 2D, 3A and 3B are helpful to the reader for an understanding of the downlink IP flow analyzer. - 2. Introduction
-
IP flow analyzer 602 performs the function of identifying, characterizing, classifying, and presenting data packets to adownlink frame scheduler 604. The functions of identifying, characterizing, classifying and presenting the data packets are respectively performed by packetheader identification component 1502,packet characterization component 1504, packet classification component 1506 and IPflow presentation component 1508 of downlinkIP flow analyzer 602. - Packet
header identification component 1502 determines whether a data packet of an incoming IP data flow is part of an IP flow that is known to the system, or is the first data packet of a new IP data flow, based on the contents of fields of the packet header section. Packetheader identification component 1502 also identifies, e.g., the source of the packet using the packet header field contents.Packet characterization component 1504 characterizes a new data packet (of a new IP data flow) to determine the QoS requirements for the IP data flow, and identifies the subscriber CPE station associated with the subscriber workstation that will receive the IP data flow. Packet classification component 1506 classifies the new IP data flow into a communications priority class, grouping the packet together with similar type IP flows. IPdata flow presentation 1508 initializes the new IP data flow and presents it to downlinkflow scheduler 604. -
Downlink flow scheduler 604 places the data packets of an IP data flow into a class queue, and based on a set of rules, schedules the data packets for transmission over the wireless medium to a subscriber CPE station using, e.g., an advanced reservation algorithm. The rules can be determined by inputs to the downlink flow scheduler from a hierarchical class-basedpriority processor module 1574, a virtual private network (VPN) directory enabled (DEN) data table 1572, and a service level agreement (SLA) priority data table 1570. The advanced reservation algorithm is described further above with respect toFIG. 14 . - 3. Identification
- Packet
header identification component 1502 identifies the IP flow received fromdata network 142 atdata interface 320 based on the packet header. - An IP flow packet stream from
data network 142, including packets from various IP flows (where each IP flow is associated with a single data “call”) is received at packetheader identification component 1502. An IP flow can include packetized data including any type of digital information such as, e.g., packetized voice, video, audio, data, IP flows, VPN flows, and real time flows. The IP flow is transmitted overdata network 142 from, e.g., a host workstation 136 d and arrives atinterface 302 ofwireless base station 320.Interface 302 transmits the packets of the IP flow to packetheader identification component 1502. Atmodule 1510, the received packets are buffered into a storage area. Atmodule 1520, the contents of the packet header fields are extracted and parsed. - For IP flows known to the system, so-called “existing IP flows,” there are entries in a table 1526. An IP flow is in the system if there is an existing characterized IP data call. In
module 1522, it is determined if there is a match between the incoming packet and an existing IP flow call in an entry in existing IP flow identification table 1526. If so, then the IP flow is” known to the system, and control passes tomodule 1530 of thepacket characterization component 1504. - If not, meaning that the IP flow is a new IP data flow, then control passes to
module 1524, where the packet header fields are analyzed.Module 1524 analyzes the packet header source field and determines from source application packet header data table 1528 the type of source application making the data call or transmitting the IP packet. The application can be any of the applications described with respect toFIG. 2D or known to those skilled in the art. Examples include a file transfer protocol (FTP) download from anotherclient workstation 138 f, an IP voice telephony call (overtelephony gateway 288 b), a voice telephony call from acaller 124 d (connected over a modem), an e-mail from aLAN 128 a attachedhost workstation 136 a, a fax machine call, and a conference call frommultiple callers module 1526 where the IP flow identifier number is added to the existing IP flow identification table 1526. - Once the type source application has been determined by packet header information or by another means, such as direct application identification, then control passes from
module 1524 tomodule 1532 of thepacket characterization component 1504. In order to identify the type of source application of the IP flow, any type of service (TOS) or differentiated service (DiffServ) field can also be analyzed. - 4. Characterization
-
Packet characterization component 1504 characterizes new IP flows and passes them to packet classification component 1506 for classification. - For an existing IP flow, control passes to
module 1530 frommodule 1522 of the packetheader identification component 1502. If inmodule 1522 it is determined that the IP data flow is known to the system, inmodule 1530 it is determined whether the packet is old (i.e., stale). This can include, e.g., determining from a time-to-live field (a field in the IP packet header) the age of the packet, and comparing the field to a threshold age value. If the packet is determined to be stale, it can be discarded. Based on the age of the packet, client application discards can be anticipated. Otherwise, control can pass to module. 1540 of the packet classification component 1506. - For a new IP flow, control passes to
module 1532 frommodule 1524 of the packetheader identification component 1502. If inmodule 1524 it is determined that the IP flow is not known to the system, inmodule 1532 the QoS requirements for the application are determined using the source application information identified inmodules Module 1532 performs this operation by looking up the QoS requirements for the identified source application in the QoS requirement table 1534. Different applications have different QoS requirements in order to provide an acceptable end-user experience. For example, bandwidth allocation (i.e., allocating an appropriate amount of bandwidth) is important to an application performing FTP file transfer downloads, and not jitter (i.e., time synchronizing the received data) and latency (i.e., the amount of time passage between responses). On the other hand, jitter and latency are important to voice telephony and conference calls, while bandwidth allocation is not. - After processing by
module 1532, in module 1536 a destination CPE subscriber station ID lookup from subscriber CPE IP address table 1538, is performed for the IP flow. Eachsubscriber CPE station 294 d can have one or more applications, running on one ormore subscriber workstations 120 d, homed to it. Accordingly, the IP flows can be directed to one or more applications on one or more subscriber workstations of one ormore CPE stations 294 d. A subscriber workstation can be any device coupled to asubscriber CPE station 294 d.Module 1536 looks up the IP flow in table 1538, to determine the identity of thesubscriber CPE station 294 d that will receive the packets of the new IP flow fromdata network 142. Control then passes frommodule 1536 tomodule 1542 of the packet classification component 1506. - 5. Classification
- Packet classification component 1506 classifies the IP flow and passes it to IP
flow presentation component 1508 for presentment. - For an existing IP flow, control passes to
module 1540 frommodule 1530 of thepacket characterization component 1504. If inmodule 1530 it is determined that the packet is not stale, then inmodule 1540 the packet is associated with its existing IP flow. As illustrated inFIG. 15A , the packet processed herein was determined to be a portion of an IP flow known to the system. Therefore, the QoS processing ofmodules module 1540, control can continue withmodule 1546 ofIP flow presentation 1508. - For the new IP flow, control passes to
module 1542 frommodule 1536 of thepacket characterization component 1504. Inmodule 1542 the packet is classified into a QoS class by performing a table lookup into IP flow QoSclass table module 1544, where the types of QoS classes are stored depending on the QoS requirements for packets. Similar IP flows, (i.e., IP flows having similar QoS requirements) can be grouped together inmodule 1542. In classifying packets and IP flows, QoS class groupings, any DiffServ priority markings, and any TOS priority markings can be taken into account. From themodule 1542, control passes tomodule 1548 of IPflow presentation component 1508. - 6. IP Flow Presentation
- IP
flow presentation component 1508 prepares and presents the IP flow packets todownlink flow scheduler 604. - For existing IP flows, control passes to
module 1546 frommodule 1540 of thepacket classification component 1540. Inmodule 1546 the packet is added to the associated existing IP flow queue, which is the queue for the current IP flow. Frommodule 1546, control passes to IP flow QoS class queuingprocessor module 1562 ofdownlink flow scheduler 604. - For the new IP flow, control passes to
module 1548 frommodule 1542 of the packet classification component 1506. Inmodule 1548, this new IP flow can be initialized for presentation to module 1552. Inmodule 1550, the IP flow QoS class is presented to framescheduler 604 to be placed in an appropriate class queue. Module 1552 presents the IP flow (in particular, the data packet) and IP flow identifier to IP flow QoS class queuingprocessor module 1562 ofdownlink flow scheduler 604. - 7. Downlink Flow Scheduler
- The exemplary logical flow diagram 1560 for the
downlink flow scheduler 604 ofFIG. 15B comprises IP flow QoS class queuingprocessor module 1562, MAC downlinksubframe scheduler module 1566, hierarchical class-basedpriority processor module 1574, VPN DENdata table module 1572, SLA priority data table 1570, CPE IP flow queuedepth status processor 1582 and link layeracknowledgment processor module 1578. -
Downlink flow scheduler 604 ofFIG. 15B also includes QoS class queues as follows:class 1, 1564 a;class class class class class - In one embodiment,
downlink flow scheduler 604 is physically located inwireless base station 302, although those skilled in the art will recognize that the same functionality can be located remotely fromwireless base station 302. -
Downlink flow scheduler 604 is used to schedule the downlink subframe. An entire frame can be divided into an uplink portion (called an uplink subframe) for transmitting uplink frames, and a downlink portion (called a downlink subframe) for transmitting downlink frames. - Also illustrated on
FIG. 15B are WAP antenna, the wireless medium, 290 d, RFtransceiver subscriber antenna 292 d,subscriber CPE station 294 d andsubscriber workstation 120 d.WAP antenna 290 d and RFtransceiver subscriber antenna 292 d respectively provide a wireless connection between wireless base station 302 (wheredownlink flow scheduler 604 resides in one embodiment) andsubscriber CPE station 294 d, which can transmit an IP flow to an application running onsubscriber workstation 120 d.WAP antenna 290 d serves as a wireless gateway fordata network 142, and RF transceiver subscriber antenna serves as a wireless gateway forsubscriber CPE station 294 d. The connection is also illustrated inFIGS. 2D and 3B . - IP flow QoS class queuing
processor module 1562 receives the packets from IPflow presentation component 1508.Module 1562 then creates class queues 1564 a-1564 f, which is a variable number of queues, and places the packets in these class queues. How packets are placed in class queues 1564 a-1564 f is determined by the inputs tomodule 1562. -
Module 1562 can receive inputs from hierarchical class-basedpriority processor module 1574, VPN DEN data table 1572 and service level agreement (SLA) priority data table 1570. The queuing function ofmodule 1562 can be based on these inputs. - SLA priority data table 1570 can use predetermined service level agreements for particular customers to affect the queuing function. A customer can be provided a higher quality of telecommunications service by, for example, paying additional money to receive such premium service. An algorithm running on
module 1562 can increase the queuing priority for messages transmitted to such customers. - Virtual private network (VPN) directory enabled networking (DEN) data table 1572 can provide prioritization for a predetermined quality of service for a VPN for a company that pays for the VPN function. A VPN is understood by those skilled in the relevant art to be a private network, including a guaranteed allocation of bandwidth on the network, provided by the telecommunications service provider. VPN DEN data table 1572 permits
module 1562 to provide higher quality of service for customer-purchased VPNs. As with SLA priority data table 1570, the queuing priority can be increased for such VPNs. For example, a platinum level VPN's lowest priority IP flow classes could also be given a higher priority than a high priority brass level VPN. - Both SLA priority data table 1570 and VPN DEN data table 1572 receive input from operations, administration, maintenance and provisioning (OAM&P)
module 1108. This is a module that is kept off-line, and includes storage and revision of administrative information regarding new customers, or updates of information pertaining to existing customers. For example, the SLA priority of the customers and VPN information is updated fromOAM&P module 1108. - Hierarchical class-based
priority processor module 1574 is a module that operates under the principles of hierarchical class-based queuing. Hierarchical class-based queuing was created by Sally Floyd and Van Jacobson, considered early architects of the Internet. - Hierarchical class-based queuing classifies different types of IP flows using a tree structure at the edge access device routers. Each branch of the tree signifies a different class of IP flows, and each class is dedicated a set limited amount of bandwidth. In this manner, different classes of flows are guaranteed minimum bandwidth, so that no single IP data flow within a class, and no single class of IP flows, can use up all available bandwidth. The present invention adds a prioritization feature enabling class based priority reservations to be made using the hierarchical class queue concept, as discussed above with respect to
FIGS. 13 and 14 . - MAC
downlink subframe scheduler 1566 is a processor module that takes the packets queued in class queues 1564 a-1564 f, and can make frame slot reservations to fill up subframes 1568 a-1568 k based onpriorities priorities FIGS. 13 and 14 for isochronous reservations. In yet another embodiment, the subframes are scheduled according to a combination of known methods and the advanced reservation algorithm method of the present invention. - The subframes can then be sent to
WAP antenna 290 d for wireless transmission over the wireless medium to RFtransceiver subscriber antenna 292 d coupled tosubscriber CPE station 294 d, which in turn can send the packets contained in the subframes tosubscriber workstation 120 d atCPE subscriber location 306 d. The subframes can be scheduled from highest priority to lowest priority. - Hierarchical class-based priority (HCBP)
processor module 1574 receives as input the subframes that have been scheduled and transmitted fromWAP antenna 290 d. By maintaining awareness of the status of the packets (i.e., by knowing which packets have been sent out),HCBP processor module 1574 knows which packets from which class queues 1564 a-1564 f must yet be scheduled. - Every once in a while, a packet is lost through, e.g., noise. When this situation arises, the
subscriber CPE station 294 d sends aretransmit request 1576 to WAP 290 d, which transmits the request to link layer acknowledgment (ARQ)processor 1578.ARQ processor 1578 informs MACdownlink subframe scheduler 1566 of this condition, which in turn reschedules the requested packets from the appropriate class queues 1564 a-1564 f for retransmission. Link layeracknowledgment ARQ processor 1578 also awaits positive acknowledgments fromsubscriber CPE station 294 d, to determine that the data packets-have been properly received. Only after receiving a positive receipt acknowledgment does MACdownlink subframe scheduler 1566 remove the packet from class queues 1564 a-1564 f. - Each
subscriber CPE station 294 d has a limited amount of memory available for received data packets in an IP flow. When, for example, the devices coupled to thesubscriber CPE station 294 d (e.g.,subscriber workstation 120 d) stop receiving IP data flows (e.g.,subscriber workstation 120 d goes down), the CPE data packet queues inCPE subscriber station 294 d are quickly filled up. In this scenario,subscriber CPE station 294 d transmits a CPE IP flowqueue depth message 1580 indicating that the queue is filled up, which can be received by CPE IP flow queuedepth status processor 1582. CPEqueue depth processor 1582 informs MACdownlink subframe scheduler 1566 of this condition, which stops scheduling downlink sub frames directed tosubscriber CPE station 294 d.Processor 1582 can also send messages to MACdownlink subframe scheduler 1566 to flush particular IP flows from class queues 1564 a-1564 f. - h. Uplink SubFrame Prioritization
- 1. Overview
-
FIGS. 16A and 16B are exemplary logical flow diagrams for the uplink. The logical flow pertains to analysis and scheduling of shared wireless bandwidth to IP packet flows from asubscriber workstation 120 d coupled to asubscriber CPE station 294 d, being transmitted over the wireless medium up to thewireless base station 302, and on todata network 142 for transmission to adestination host workstation 136 a.FIG. 16A is an exemplary logical flow diagram 1600 for uplinkIP flow analyzer 632.FIG. 16B is an exemplary logical flow diagram 1660 for theuplink flow scheduler 634. - The functional components for
FIGS. 16A and 16B are explained by way of method modules, which can be viewed as physical units (e.g., comprising software, hardware, or a combination thereof) or logical vehicles (e.g., used for explanatory purposes only). Those skilled in the art will recognize that the modules are used only to explain an exemplary embodiment, and are not to be considered limiting. - The exemplary logical flow diagram 1600 for uplink
IP flow analyzer 632 ofFIG. 16A includes packetheader identification component 1602,packet characterization component 1604, packet classification component 1606, and IPflow presentation component 1608. The functions of these components are explained in detail below. - In one embodiment, uplink
IP flow analyzer 632 is physically located inwireless base station 302, although those skilled in the art will recognize that the same functionality can be located remotely fromwireless base station 302. In a preferred embodiment of the present invention, the function ofIP flow analyzer 632 is performed at asubscriber CPE station 294 d desiring an uplink reservation slot for uplinking a packet/IP flow up tobase station 302. A reservation request block (RRB) request detailing the IP flow identifier, number of packets and classification of the IP flow can be created then byIP flow analyzer 632 and can be uplinked via preferably a contention RRB slot for scheduling byuplink frame scheduler 634 in future uplink subframe slots up atwireless base station 302. -
FIGS. 2D, 3A and 3B are helpful to the reader for an understanding of the uplink IP flow analyzer. - 2. Introduction
-
IP flow analyzer 632 performs the function of identifying, characterizing, classifying, and presenting data packets to anuplink frame scheduler 634. The functions of identifying, characterizing, classifying and presenting the data packets can be respectively performed by packetheader identification component 1602,packet characterization component 1604, packet classification component 1606 and IPflow presentation component 1608 of uplinkIP flow analyzer 632. - Packet
header identification component 1602 determines whether a packet of an incoming IP flow is known to the system (i.e. is an existing IP flow), or if it is the first data packet of a new IP data flow, and determines the source application based on fields in the header section of the packet.Identification 1602 can include buffering packets and extracting and parsing the header contents.Packet characterization component 1604 characterizes a new data packet (of a new IP flow) to determine the QoS requirements for the IP flow based on the source application, and to identify the subscriber CPE station that will receive the IP flow. Packet classification component 1606 classifies the new IP data flow into one of several priority classes. Classification 1606 can include, e.g., grouping packets having similar QoS requirements. IPdata flow presentation 1608 initializes the new IP data flow and presents it to uplinkflow scheduler 634. - Each time a
subscriber CPE station 294 d attempts to communicate in the uplink direction withwireless base station 302, it requests a reservation by inserting an RRB in the uplink subframe.Uplink frame scheduler 634 then schedules the reservation request in a future uplink subframe and notifies theCPE station 294 d of the reservation. In a downlink signal,uplink flow scheduler 634 located preferably atwireless base station 302, transmits a reservation slot in a particular future frame for the requestingsubscriber CPE station 294 d to transmit its uplink data.Uplink flow scheduler 634 assigns the reservation based on the same parameters as thedownlink flow scheduler 604 uses in the downlink. In other words,uplink flow scheduler 634 determines the reservation slots based on the queue class priority and based on a set of rules, schedules the reservations for uplink transmissions fromsubscriber CPE station 294 d using, e.g., an advanced reservation algorithm. The rules are determined by inputs to theuplink flow scheduler 634 from a hierarchical class-basedpriority processor module 1674, a virtual private network (VPN) directory enabled (DEN) data table 1672, and a service level agreement (SLA) priority data table 1670. The advanced reservation algorithm is described with respect toFIG. 14 . - 3. Identification
- Packet
header identification component 1602 identifies the IP flow received from asubscriber CPE station 294 d based on the packet's header contents. - A stream of packets, also known as packets from several IP flows (i.e. each IP flow is associated with a single “call”) is received at packet
header identification component 1602. The IP flow in one embodiment is transmitted tosubscriber CPE station 294 d from one ormore subscriber workstations 120 d for uplink to hostcomputers 136 a coupled towireless base station 302 bydata network 142.Subscriber CPE station 294 d can transmit the data packets of the IP flow topacket buffer module 1610 of packetheader identification component 1602. In one embodiment, packet header identification component is withinCPE subscriber station 294 d. Atmodule 1610, the received packets are buffered in a storage area for transfer toheader extraction module 1620. Atmodule 1620, the packet header files are extracted and parsed to obtain the contents of the packet header fields. - Relevant fields can include, e.g., source, destination, type of service (TOS) and differentiated service (DiffServ) markings, if any exist.
- For IP flows known to the system, there are entries in existing IP flow identification table 1626. An IP flow is in the system if a previous packet of the IP flow of the existing IP data call has already been identified. In
module 1622, it is determined if there is a match between the incoming IP flow and an entry in table 1626. If so, then the IP flow is known to the system, and control passes tomodule 1630 of thepacket characterization component 1604. - If the IP flow is not an existing flow known to the system, meaning that the IP flow is a new IP flow, then control passes to
module 1624, where the packet header fields are analyzed to identify the source application of the IP flow. - Packet
header analysis module 1624 determines from source application packet header table 1628 the type of source application making the IP flow. The application can be any of the types of applications described with respect toFIG. 2D or known to those skilled in the art. Examples include a file transfer protocol (FTP) download from anotherclient workstation 138 f, a voice telephony call from acaller 124 d (connected over a modem), a fax machine call, and a conference call frommultiple callers analysis module 1624 tomodule 1632 of thepacket characterization component 1604. - 4. Characterization
-
Packet characterization component 1604 characterizes the IP flow and passes it to packet classification component 1606 for classification. - If the IP flow is an existing IP flow, control passes to
module 1630 frommodule 1622 of the packetheader identification component 1602. If inmodule 1622 it is determined that the IP data flow is known to the system, inmodule 1630 it is determined whether the packet is old (i.e., stale). This can include determining from a time-to-live field (a field in the IP packet header) the age of the packet, and comparing the field to a threshold age value. If the packet is determined to be stale, it is discarded.Module 1630 can anticipate application packet discards. Frommodule 1630, control passes tomodule 1640 of the packet classification component 1606. - If the IP flow is new, control passes to
module 1632 frommodule 1624 of the packetheader identification component 1602. If inmodule 1624 it is determined that the application associated with the IP flow application is not known to the system, in IP flow QoSrequirements lookup module 1632 the QoS requirements for the application associated with the IP flow are determined.Module 1632 performs this operation by looking up the application in IP flow QoS requirement table 1634. Different applications have different requirements. For example, bandwidth allocation (i.e., allocating an appropriate amount of bandwidth) is important to an application performing FTP downloads, and not jitter (i.e., time synchronizing the received data) and latency (i.e., the amount of time passage between responses). On the other hand, jitter and latency are important to voice telephony and conference calls, and bandwidth allocation is not. - After processing by
module 1632, control passes to module 163 b. In CPE subscriber station identifier (ID) lookup module 1636 a subscriber CPE ID lookup is performed for the new IP data flow. Eachsubscriber CPE station 294 d can have one or more applications, running on one ormore subscriber workstations 120 d, homed to it. Accordingly, one or many subscribers can generate or receive an IP flow directed from or at asubscriber CPE station 294 d. Asubscriber workstation 120 d can be any device coupled to asubscriber CPE station 294 d.Module 1636 looks up the CPE station identifier for the IP flow in table 1638, to provide the CPE ID in the reservation request block (RRB). Control then passes frommodule 1636 tomodule 1648 of the packet classification component 1606. - 5. Classification
- Packet classification component 1606 classifies the IP flow and passes it to IP
flow presentation component 1608 for presentment. - For existing IP flows, control passes to
module 1640 frommodule 1630 of thepacket characterization component 1604. If inmodule 1630 it is determined that the packet is not stale, then inmodule 1640 the packet is associated with its IP flow. As illustrated inFIG. 16A , the packet processed herein was determined to be a portion of an IP flow known to the system. Therefore, the QoS processing ofmodules - For new IP flows, control passes to
module 1642 frommodule 1636 of thepacket characterization component 1604. Inmodule 1642 the packet is classified or grouped into a QoS class by performing an IP flow QoS requirement table 1644 lookup where the QoS classes are stored depending on the QoS requirements for packets. Frommodule 1642, control passes tomodule 1648 of IPflow presentation component 1608. - 6. IP Flow Presentation
- IP
flow presentation component 1608 prepares and presents the IP data flow packets to flowscheduler 634. In one embodiment of the uplink direction, a reservation request block (RRB) is created and uplinked via a contention slot to thewireless base station 302 for scheduling byIP flow scheduler 634. In another embodiment, the scheduler is located at theCPE station 294 d so no reservation request is needed. - For existing IP flows, control passes to
module 1646 frommodule 1640 of thepacket classification component 1640. Inmodule 1646, the packet is added to the IP flow queue, which is the queue for the current existing IP flow. In one embodiment, this can include preparation of a RRB. Frommodule 1646, control passes tomodule 1662 ofuplink flow scheduler 634. In one embodiment, this can include uplink of the RRB fromCPE 294 d towireless base station 302. - For a new IP flow, control passes to
module 1648 frommodule 1642 of the packet classification component 1606. In initializeIP flow module 1648, this new IP flow is initialized for presentation tomodule 1652.Module 1652 presents the IP data flow (in particular, the reservation request block data packet) tomodule 1662 ofuplink flow scheduler 634. Inmodule 1650, the QoS class for the IP flow is presented toscheduler 634, preferably by inclusion in a RRB. - 7. Uplink Flow Scheduler
- The exemplary logical flow diagram for the
uplink flow scheduler 634 ofFIG. 16B comprises IP flow QoS class queuingprocessor module 1662, MAC uplinksubframe scheduler module 1666, hierarchical class-basedpriority processor module 1674, VPN DENdata table module 1672, SLA priority data table 1670, CPE IP flow queuedepth status processor 1682 and link layeracknowledgment processor module 1678. -
Uplink flow scheduler 634 ofFIG. 16B also includes QoS class queues forclass 1, 1664 a;class class class class class - In one embodiment,
uplink flow scheduler 634 is physically located inwireless base station 302, although those skilled in the art will recognize that the same functionality can be located remotely fromwireless base station 302. For example, in another embodiment,uplink flow scheduler 634 can be located atCPE station 294 d and is in communication with other CPE stations 294 and thewireless base station 302. -
Uplink flow scheduler 634 is used to schedule the uplink subframe. The entire frame is divided into an uplink portion (called an uplink subframe) for transmitting uplink frames, and a downlink portion (called a downlink subframe) for transmitting downlink frames. - Illustrated in
FIG. 16B areWAP antenna 290 d, the wireless medium, RFtransceiver subscriber antenna 292 d,subscriber CPE station 294 d andsubscriber workstation 120 d.WAP 290 d and RFtransceiver subscriber antenna 292 d respectively provide a wireless connection between wireless base station 302 (whereuplink flow scheduler 634 resides in one embodiment) andsubscriber CPE station 294 d, which can transmit upstream an IP flow from an application running onclient computer 120 d.WAP 290 d serves as a wireless gateway fordata network 142, and RFtransceiver subscriber antenna 292 d serves as a wireless gateway forsubscriber CPE station 294 d to uplink the IP flow packet data. - Also illustrated in
FIG. 16B isdata interface 320, which provides a connection fromuplink flow scheduler 634 for sending uplinked IP flow packets on todata router 140 d ofdata network 142 and on to adestination host computer 136 a. These connections are also illustrated inFIGS. 2D and 3B . - The previous frame includes an uplink reservation request which is received by the wireless base station from a
subscriber CPE station 294 d. At this point, the reservation request block has been identified, characterized, classified, and presented, preferably at theCPE station 294 d, and has been transmitted to uplinkflow scheduler 634 fromuplink flow analyzer 632 at theCPE 294 d. In particular, the reservation request block is presented to IP flow QoS class queuingprocessor module 1662 frommodule 1650.Module 1662 informs MACuplink subframe scheduler 1666 of the reservation. - In turn, MAC
uplink subframe scheduler 1666 uses a slot in the subframe to acknowledge receipt of the request called the acknowledgment request block (ARB). An exemplary slot used to convey the frame, slot, and IP flow identifier for this reservation is described with respect toFIG. 12 .Scheduler 1666 transmits in this reservation slot the CPE identification data, along with which future slot(s) and frame(s) the requestingsubscriber CPE station 294 d is permitted to use for uplink of the requested data packet IP flow transmissions. - The future slot(s) in the future frame(s) are assigned, e.g., based on inputs from hierarchical class-based
priority processor module 1674, VPN DEN data table 1672 and service level agreement (SLA) priority data table 1670. These components function in a similar manner to hierarchical class-basedpriority processor module 1574, VPN DEN data table 1572 and service level agreement (SLA) priority data table 1570, described with respect to thedownlink flow scheduler 604. - When IP flow QoS class queuing
processor module 1662 receives packets of an existing or new IP flow from IPflow presentation module 1608, it then creates class queues 1664 a-1664 f, which is a variable number of queues, and places the packets in these class queues. In a preferred embodiment there are between 3 and 10 classes. These queues hold reservation request packets for scheduling. Packets are placed in class queues 1664 a-1664 f according to the contents of the reservation request block for input tomodule 1662. -
Module 1662 receives inputs from hierarchical class-basedpriority processor module 1674, VPN DEN data table 1672 and service level agreement (SLA) priority data table 1670. The queuing function ofmodule 1662 is based on these inputs. These components function analogously to their counterparts in the downlink flow scheduling method. SLA priority data table 1670 and VPN DEN data table 1672 receive input from operations, administration, maintenance and provisioning (OAM&P)module 1108.OAM&P module 1108 provides updates to priorities when, e.g., a subscriber modifies its service level agreement or a VPN subscription is changed. - MAC
uplink subframe scheduler 1666 takes the requests queued in class queues 1664 a-1664 f, and schedules reservations of slots in frames 1668 a-1668 k, which is a variable number of frames. In one embodiment, each frame is scheduled with up to a predetermined number limit or percentage limit of packets from each of the classes 1664 a-1664 f. The requests can be scheduled as shown inFIG. 13 , taking into account certain priorities. In another embodiment, the frames are scheduled according to the inventive advanced reservation algorithm method for scheduling isochronous type traffic described with respect toFIG. 14 . In yet another embodiment, the frames are scheduled according to a combination of known methods and the advanced reservation algorithm method of the present invention. - The reservation slot schedule can then be sent down to the CPE stations 294 using, e.g., FDB slots such as 1236 g and 1236 h of
FIG. 12F . The uplink slots can then be inserted byCPE station 294 d into the uplink subframe as scheduled. The frame slots are then transmitted up fromCPE station 294 d towireless base station 302 and are then sent on as packets to their destination addresses. For example, from wireless,base station 302 the packets can be transmitted overdata network 142 to ahost computer 136 a. - After the uplink packets are received by the
wireless base station 302, thewireless base station 302 sends an upstream acknowledgment data block (UAB) message back down to the transmittingsubscriber CPE station 294 d, to acknowledge receipt of the transmitted data packets. - Every once in a while, a packet is lost through noise or other interference in the wireless medium. When this situation arises, the
subscriber CPE station 294 d determines that it has not received a UAB data acknowledgment, so it sends a retransmit request requesting another uplink reservation slot towireless base station 302 viaWAP 290 d, which transmits the request to link layer acknowledgment (ARQ)processor 1678.ARQ processor 1678 informs MACuplink subframe scheduler 1666 of the need of retransmission (i.e. the need of a frame slot reservation for resending the uplink packet).CPE subscriber station 294 d can also send toARQ processor 1678, other data messages about nonreceipt of uplink transmission acknowledgments. TheARQ 1678 can forward such messages on to theuplink subframe scheduler 1666. Theuplink subframe scheduler 1666 in turn reschedules the requested uplink reservation from the appropriate class queues 1664 a-1664 f. Alternatively, in another embodiment, linklayer acknowledgment processor 1678 can also send a positive UAB acknowledgment to thesubscriber CPE station 294 d, to indicate that the data packets have been properly received. Thusuplink scheduler 1666 in addition to scheduling first time reservations, also can schedule repeat reservations for lost packets. - Each
subscriber CPE station 294 d has a limited amount of memory space available for queuing packets received fromsubscriber workstations 120 d awaiting reservation slots of uplink from theCPE 294 d towireless base station 302. When, for example, the queue ofsubscriber CPE station 294 d becomes full from a backup of packets awaiting upstream reservations, IP data flows can potentially be lost, or packets may become stale. In this scenario,subscriber CPE station 294 d transmits a CPE IP flowqueue depth message 1680 to thewireless base station 302 indicating that the queue is filled up, which can be received by CPE IP flow queuedepth status processor 1682.Processor 1682 can inform MACuplink subframe scheduler 1666 of this condition, which can, e.g., increase temporarily the priority of IP flows atsubscriber CPE station 294 d to overcome the backlog or can, e.g., stop transmitting additional downlink packets to theCPE station 294 d until the queue depth backlog is decreased to an acceptable level again.Processor 1682 can also send messages to MACuplink subframe scheduler 1666 to flush reservation requests from thesubscriber CPE station 294 d in class queues 1664 a-1664 f. - 4. TCP Adjunct Agent
- TCP is a reliable transport protocol tuned to perform well in traditional networks where congestion is the primary cause of packet loss. However, networks with wireless links incur significant losses due to bit-errors. The wireless environment violates many assumptions made by TCP, causing degraded end-to-end performance. See for example, Balakrishnan, H., Seshan, S. and Katz, R. H., “Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks,” University of California at Berkeley, Berkeley, Calif., accessible over the Internet at URL, http://www.cs.berkeley.edu/˜ss/papers/winet/html/winet.html, dealing more directly with handoffs and bit errors in a narrowband wireless environment, the contents of which are incorporated by reference. Attempts to address this problem have modified TCP in order to overcome it. However, this is not a commercially feasible means of overcoming this challenge. It is impracticable to implement any solution that requires a change to the standard operation of TCP.
- The present invention uses an enhanced MAC layer which interfaces with a TCP adjunct agent to intercept TCP layer requests to manipulate the TCP layers at either a source or destination end of a transmission, to modify TCP behavior at the source and destination of the TCP/IP transmission which includes an intermediary wireless link. Packets can be queued at the wireless base station awaiting receipt acknowledgment and the base station can perform local retransmissions across the wireless link to overcome packet loss caused by high bit-error rates. Communication over wireless links is characterized by limited bandwidth, high latencies, sporadic high bit-error rates and temporary disconnections which must be dealt with by network protocols and applications.
- Reliable transport protocols such as TCP have been tuned for traditional wired line networks. TCP performs very well on such networks by adapting to end-to-end delays and packet losses caused by congestion. TCP provides reliability by maintaining a running average of estimated round-trip delay and mean deviation, and by retransmitting any packet whose acknowledgment is not received within four times the deviation from the average. Due to the relatively low bit-error rates over wired networks, all packet losses are correctly assumed to be caused by congestion.
- In the presence of the high bit-error rates characteristic of wireless environments, TCP reacts to packet losses as it would in the wired environment, i.e. it drops its transmission window size before retransmitting packets, initiates congestion control or avoidance mechanisms (e.g., slow start) and resets its retransmission timer. These measures result in an unnecessary reduction in the link's bandwidth utilization, thereby causing a significant degradation in performance in the form of poor throughput and very high interactive delays.
- The present invention maintains packets in class queues awaiting acknowledgment of receipt from the subscriber CPE stations. Unacknowledged data slots can then be resent by having the wireless base station perform local retransmissions to the subscriber CPE station. By using duplicate acknowledgments to identify a packet loss and performing local retransmissions as soon as the loss is detected, the wireless base station can shield the sender from the inherently high bit error rate of the wireless link. In particular, transient situations of very low communication quality and temporary disconnectivity can be hidden from the sender.
- For transfer of data from a CPE subscriber host to a wireless base station host, missing packets are detected at the wireless base station and negative acknowledgments can be generated for them. The negative acknowledgments can request that the packet be resent from the CPE subscriber host (the sender). The CPE subscriber host can then process the negative acknowledgment and retransmit corresponding missing packets. Advantageously, no modifications to the sender TCP or receiver TCP is necessary, since the present invention places TCP aware functionality in the MAC layer.
-
FIG. 5A illustratesflow 500 depicting IP flows from a source TCP at a subscriber host, down a protocol stack for transmission through a CPE subscriber station, through a wireless medium to a wireless base station, up and through a protocol stack at the wireless base station having an example TCP adjunct agent, then through a wireline connection and through a protocol stack to a destination host. The adjunct TCP agent modifies operation of a TCP sliding window algorithm at the transmitting TCP and in cooperation with proactive reservation-based intelligent multi-media access technology (PRIMMA) media access control (MAC) enables local retransmission over the wireless medium in accord with the present invention. - Specifically,
flow 500 illustrates IP packet flow fromsubscriber workstation 120 d, throughCPE subscriber station 294 d atCPE subscriber location 306 d, then over a wireless transmission medium towireless base station 302, and eventually over a wireline link overdata network 142 tohost workstation 136 a. - TCP
adjunct agent 510 e makes sure transport is reliable by modifying operation of the TCP sliding window algorithm at the transmitting TCP in a manner that optimizes the window for the wireless medium. TCPadjunct agent 510 e advantageously is transparent to industry standard protocols asagent 510 e does not require modification of the standard TCP/UDP layer ofclient subscriber workstation 120 d orhost workstation 136 a. -
Flow 500 includes IP flows from application layer 512 a, down the protocol stack through TCP/UDP layer 510 a, throughIP layer 508 a, then through point-to-point (PPP) layer 520 a, then through data link Ethernet layer 504 a, then through 10BaseT Ethernet network interface card (NIC) physical layer 502 a, over a wire line connection to 10BaseT Ethernet NICphysical layer 502 b ofsubscriber CPE 294 d. -
Subscriber CPE 294 d flows packets coming in fromNIC 502 b, back up its protocol stack throughEthernet layer 504 b, throughPPP layers physical layer 502c including antenna 292 d, then over the wireless medium toantenna 290 d ofwireless base station 302. -
Wireless base station 302 flows packet IP flows up fromantenna 290 d atphysical layer 502 d throughPRIMMA MAC layer 504 d, through PPP layer 520 a, throughIP layer 508 d to TCPadjunct agent 510 e, which can flow IP flows down throughIP layer 508 e, through PPP layer 520 e, through wide area network (WAN) layer 504 e, through wirelinephysical layer 502 e, throughinterface 320, overrouters 140 d, throughdata network 142, via wireline connections towireline layer 502 f ofWAN host workstation 136 a. -
Host workstation 136 a flows IP flows fromwireline layer 502 f, up through its protocol stack throughWAN layer 504 f, throughPPP layer 520 f, throughIP layer 508 f, to TCP/UDP layer 510 f and on toapplication layer 512 f. - TCP/UDP layers 510 a and 510 f act to provide such transport functions as, e.g., segmentation, managing a transmission window, resequencing, and requesting retransmission of lost packet flows. Normally TCP layers 510 a and 510 f would send a window of packets and then await acknowledgment or requests for retransmission. A TCP sliding window algorithm is normally used to vary the transmission flow to provide optimized transport and to back off when congestion is detected by receipt of requests for retransmission. Unfortunately in the wireless environment, due to high bit error rates, not all packets may reach the destination address, not because of congestion, but rather because of high bit error rates, so as to prompt a retransmission request from the destination IP host to the source. Rather than slow transport, TCP
adjunct agent 510 e modifies operation of the TCP sliding window algorithm to optimize operation over wireless.PRIMMA MAC layer 504 d interacts with TCPadjunct agent 510 e permitting the agent to intercept, e.g., retransmission requests, fromTCP layer 510 a ofsubscriber workstation 120 d intended forhost 136 a, and allowing the wireless base station to retransmit the desired packets or flows tosubscriber workstation 120 d rather than forwarding on the retransmission request to host 136 a, since the packets could still be stored in the queue ofPRIMMA 504 d and would not be discarded until an acknowledgment of receipt is received from the subscriber CPE. Since retransmission can be performed according to the present invention at the PRIMMA MAC data link layer, i.e.layer 2, retransmission can occur from the base station to the CPE subscriber, rather than requiring a retransmission from all the way over at the transmitting source TCP which would cause TCP to backoff its sliding window algorithm. Thus, by havingwireless base station 302 retransmit until receipt is acknowledged over the wireless link, the inherently high bit error rate can be overcome, while maintaining an optimal TCP window. - Recall, a TCP transmitter transmits a TCP sliding window block of packets and alters the size of the window upon detection of congestion. The TCP transmitter transports a block of packets in a window, and then awaits acknowledgment from the receiver. If transmission is going smoothly, i.e. no congestion or lost packets occur, then the transmitter TCP ramps up the transmission rate. This increased transmission rate continues until the transmitting TCP detects congestion or packet loss. When notified of congestion, the transmitting TCP stops transmitting, backs off and sends a smaller block (i.e. a smaller window) of packets.
- TCP adjunct agent modifies normal TCP operation by tricking the transmitting TCP and its transmitting window algorithm. The TCP adjunct agent prevents the transmitter from being notified of loss, i.e. receiving congestion notification, from the receiving TCP by, e.g., preventing duplicate retransmission requests. Since the transmitting TCP does not receive such notification, it does not modify the TCP sliding window and transmission continues at the higher rate.
- In the event that real congestion occurs, i.e. if the TCP adjunct agent recognizes packets really were lost, then the TCP adjunct agent can let the retransmission request go through to the transmitting TCP. This is advantageously accomplished because the MAC link layer of the present invention is in communication with the higher protocol layers, it is application aware, transport aware and network aware. In this case, because the MAC layer is transport layer aware,
PRIMMA MAC layer 504 d communicates with the TCPadjunct agent 510 e atlayer 4. Since the MAC requires acknowledgment of receipt of wireless transmissions sent to theCPE subscriber station 294 d for every packet sent from thewireless base station 302, theMAC layer 504 d knows whether an inter-TCP layer communication, e.g., a request for retransmission, is sent from a client computer TCP at the CPE station is created because the lost packet was lost in wireless transmission, or because of real congestion. - If
PRIMMA MAC 504 d does not receive an acknowledgment from 504 c, then thePRIMMA MAC 504 d ofwireless base station 302 can retransmit the contents of the lost packet to thesubscriber CPE station 294 d. If the PRIMMA MAC 504 c of thesubscriber CPE station 294 d acknowledges receipt and still requests a retransmission, then real congestion could have occurred and thePRIMMA MAC 504 d of thewireless base station 302 can let the TCPadjunct agent 510 e know that it should allow the retransmission request to be sent to the transmittingTCP 510 f ofhost workstation 136 a. - Thus, TCP
adjunct agent 510 e of the present invention can modify operation of the TCP sliding window algorithm in a manner that is optimal for the wireless medium, without requiring any change to commercially available TCP layers 510 a and 510 f at the receiver and sender hosts. In an embodiment, TCPadjunct agent 510 e obviates the need for any modification of the TCP layers at either the sending (i.e. transmitting) host or client. In another embodiment the host and client TCP layers are unaware of the modification of operation by the TCP adjunct agent, i.e. it is transparent to source and destination TCP layers. In another embodiment, TCPadjunct agent 510 e intercepts retransmission requests between a TCP layer of the client computer coupled to the subscriber CPE station and the TCP layer of the host workstation coupled to the data network. -
FIG. 5B illustrates functional flow diagram 522 including an example functional description of TCPadjunct agent 510 e performing an outgoing TCP spoof function. Referring toFIGS. 5B and 5A , diagram 522 assumes that aTCP layer 510 f at a transmittinghost 136 a has transmitted a windowful of packet data tosubscriber workstation 120 d, and awaits acknowledgment. Diagram 522 illustrates receipt of anoutgoing TCP message 524 in TCPadjunct agent 510 e atwireless base station 302 which has been sent fromsubscriber workstation 120 d viasubscriber CPE station 294 d. - In
step 526, the TCP header contents ofoutgoing TCP message 524 is parsed in order to reveal the contents of the message being sent fromsubscriber workstation 120 d through the wireless network toward the transmittinghost 136 a. - In
step 528, it is determined whether the TCP header contents includes a duplicate acknowledgment message from the CPE station. Receiving a duplicate acknowledgment request from the CPE subscriber location could be indicative of a lost message in the wireless medium, or a real congestion problem. If instep 528 the TCP packet is determined to be a duplicate acknowledgment message, then processing can continue withstep 532, if not, then processing can continue withstep 530. - In
step 530, it is determined that there was real congestion, i.e., this was not a duplicate acknowledgment message caused by retransmission attempts at the wireless link layer. Thus, instep 530, the TCP message is permitted to pass through TCP adjunct 510 e without modification, and can continue throughflow 500 toTCP layer 510 f ofFIG. 5A . - In
step 532, since there was a duplicate acknowledgment detected instep 528, it is determined whether the packet was successfully transmitted, or not. Step 532 is performed via intercommunication between TCPadjunct agent 510 e andPRIMMA MAC layer 504 d. This is an example of the interactivity between PRIMMA MAC and higher layer protocols illustrated asline 428 inFIG. 4 .PRIMMA MAC layer 504 d can identify whether a packet was successfully sent fromwireless base station 302 toCPE station 294 d since, as illustrated inFIG. 15B , requests forretransmission 1576 are received fromCPE station 294 d at link layer acknowledgment (ARQ)processor 1578 to MACdownlink subframe scheduler 1566 alerting thescheduler 1566 to retransmit the lost packet in a future frame 1568. If instep 532, it is determined that the packet was successfully transmitted, then processing can continue withstep 530, as described above. If however it is determined that the packet was not successfully transmitted, then processing continues withstep 534. - In
step 534, since the packet was not successfully transmitted, TCPadjunct agent 510 e can suppress transmission ofTCP message 524 since it can be assumed that the packet was lost in the wireless medium. Processing can continue withstep 536. - In
step 536, TCPadjunct agent 510 e can wait for notification fromPRIMMA MAC 504 d that a successful link layer retransmission of the lost packet was received at linklayer acknowledgment processor 1578. Fromstep 536, processing can continue withstep 538. - In
step 538, upon receipt of acknowledgment of asuccessful PRIMMA MAC 504 d link layer retransmission, then normal TCP messages can be resumed. - In another step (not shown), TCP adjunct agent and PRIMMA MAC layers can set a limit of a threshold number of retransmission attempts, and if that threshold is reached, then processing can continue with
step 530 to permit the TCP message to pass without modification. -
FIG. 5C illustrates functional flow diagram 540 including an example functional description of TCPadjunct agent 510 e performing an incoming TCP spoof function. Referring toFIGS. 5C and 5A , diagram 540 assumes that aTCP layer 510 a at a transmittingsubscriber workstation 120 d has transmitted a windowful of packet data to host 136 a, and awaits acknowledgment. Diagram 544 illustrates receipt of anincoming TCP message 542 in TCPadjunct agent 510 e atwireless base station 302 which has been sent fromhost workstation 136 a viadata network 142 for transmission over the wireless medium tosubscriber CPE 294 d tosubscriber workstation 120 d. - In
step 544, the TCP header contents ofingoing TCP message 542 is parsed in order to reveal the contents of the message being sent fromhost 136 a through the wireless network toward the transmittingsubscriber workstation 120 d. - In
step 546, it is determined whether the TCP header contents include a duplicate acknowledgment message fromhost 136 a. Receiving a duplicate acknowledgment request from the host could be indicative of a lost message in the wireless medium, or a real congestion problem. If instep 546 the TCP packet is determined to be a duplicate acknowledgment message, then processing can continue withstep 550, if not, then processing can continue withstep 548. - In
step 548, it is determined that there was real congestion, i.e., this was not a duplicate acknowledgment message caused by retransmission attempts at the wireless link layer. Thus, instep 548, the TCP message is permitted to pass through TCP adjunct 510 e without modification, and can continue throughflow 500 toTCP layer 510 a ofFIG. 5A . - In
step 550, since there was a duplicate acknowledgment detected instep 546, it can be determined whether the packet was successfully transmitted, or not. Step 550 can be performed via intercommunication between TCPadjunct agent 510 e andPRIMMA MAC layer 504 d. This is an example of the interactivity between PRIMMA MAC and higher layer protocols illustrated asline 428 inFIG. 4 .PRIMMA MAC layer 504 d can identify whether a packet was successfully sent fromCPE station 294 d towireless base station 302, as illustrated inFIG. 16B , requests for retransmission 1676 are received fromCPE station 294 d at link layer acknowledgment (ARQ)processor 1678 to MACdownlink subframe scheduler 1666 alerting thescheduler 1666 to retransmit the lost packet in a future frame 1668. If instep 550, it is determined that the packet was successfully transmitted, then processing can continue withstep 548, as described above. If however it is determined that the packet was not successfully transmitted, then processing continues withstep 552. - In
step 552, since the packet was not successfully transmitted, TCPadjunct agent 510 e can suppress transmission ofTCP message 542 since it can be assumed that the packet was lost in the wireless medium. Processing can continue withstep 554. - In
step 554, TCPadjunct agent 510 e can wait for notification fromPRIMMA MAC 504 d that a successful link layer retransmission of the lost packet was received at linklayer acknowledgment processor 1678. Fromstep 554, processing can continue withstep 556. - In
step 556, upon receipt of acknowledgment of asuccessful PRIMMA MAC 504 d link layer retransmission, then normal TCP messages can be resumed. - In another step (not shown), TCP adjunct agent and PRIMMA MAC layers can set a limit of a threshold number of retransmission attempts, and if that threshold is reached, then processing can continue with
step 548 to permit the TCP message to pass without modification. - 5. Wireless QoS Aware PRIMMA Media Access Control (MAC) Hardware Architecture
-
FIG. 10 illustratively depicts an embodiment of PRIMMAMAC hardware architecture 1000.Architecture 1000 showsdata network 142 coupled by a wireline bidirectional connection toWAN interface 320. -
WAN interface 320 is bidirectionally linked to a bidirectionaldata frame FIFO 1002 which is bidirectionally coupled to both segmentation and resequencing (SAR) 1004 and QoS/SLA rules engine andprocessor 1008. - QoS/SLA rules engine and
processor 1008 is also bidirectionally coupled toIP flow buffers 1014 and flash random access memory (RAM) 1010. -
SAR 1004 is bidirectionally coupled toIP flow buffers 1014,flash RAM 1010, QoS/SLA rules engine andprocessor 1008 and PRIMAMAC scheduler ASIC 1012. - PRIMA
MAC scheduler ASIC 1012 is also bidirectionally coupled to anRF interface 290, a static RAM (SRAM)radio cell buffer 1018 andIP blow buffer 1014. - 6. Wireless Base Station Software Organization
-
FIG. 11 is an exemplary software organization for a packet-centric wireless point to multi-point telecommunications system. The software organization ofFIG. 11 includes wireless transceiver and RF application specific integrated circuit (ASIC)module 290, IPflow control component 1102, WANinterface management component 1104, QoS andSLA administration component 1106, system andOAM&P component 1108, customer billing andlogging component 1110, directory enabled networking (DEN)component 1112, andwireless base station 320. - IP
flow control module 1102 includes transmission queuingcontrol module 1102 a, TCP rate control and class of service module 1102 b, wireless PRIMMAMAC layer engine 1102 c and IP flow identification andanalysis module 1102 d. - WAN
interface management component 1104 includes WAN ingress/egressqueuing control module 1104 a, WAN interface ports (e.g., for T1, T3, OC3 ports) 1104 b, firewall andsecurity module 1104 c, and WAN traffic shaping module 1104 d. - The IP
Flow control component 1102 and WANinterface management component 1104 represent the “core” of the system, where the packet processing, MAC layer scheduling, TCP proxy agent, and WAN I/F control functions are located. Much of the activities of the “non-core” components described above support and control these core components. - QoS and
SLA administration component 1106 includes QoS performance monitoring and control module 1106 a, servicelevel agreements module 1106 b,policy manager module 1106 c andencryption administration module 1106 d. - The QoS and
SLA administration component 1106 provides the static data needed by the system in order to properly group particular IP-flows into QoS classes. Typically, during the provisioning phase of installing the system, the service provider will (remotely) download pertinent information about the subscriber CPE station 294, including the subscriber CPE stations's SLA, any policy-based information (such as hours of operation or peak data transmission rate allowance.). Encryption keys or “strengths” can also be downloaded, which may be subscriber CPE station or service provider specific. -
System OAM&P component 1108 includes SNMP proxy client forWAP module 1108 a, SNMP proxy clients forCPE module 1108 b, and system operations, administration, managementarid provisioning module 1108 c. - The
OAM&P component 1108 allows remote service personnel and equipment to monitor, control, service, modify and repair the system. System performance levels can be automatically monitored, and system traps and traces can be set. Subscriber complaints can be addressed with the use of remote test and debug services controlled byOAM&P component 1108. System capacity limits can be monitored, and proactive provisioning of additional WAN connectivity can occur, as the result of automatic trend analysis functions inOAM&P component 1108. - Customer billing and
logging module 1110 includes account logging and database management module 1110 a, transaction query andprocessing control module 1110 b, billing and account control module 111 c, and user authentication module 1110 d. - The customer billing and
logging component 1110 allows the service provider to receive account, billing and transaction information pertaining to subscribers in the system. For service providers who bill on the basis of usage, cumulative system resource utilization data can be gathered. For specific types of activities (e.g., video conferencing, multi-casting, etc.) there may be special billing data that is collected and transmitted to the service provider. This component also controls the availability of the system to subscribers through the operation of the subscriber authentication function. Once a subscriber is authorized to use the system, a new subscriber authentication entry is made (remotely) by the service provider. Likewise, a subscriber can be denied further access to the system for delinquent payment for services, or for other reasons. The service provider can also remotely query the system for specific account-related transactions. - Directory Enabled Networking (DEN)
component 1112 includesDEN QoS 1112 a module, DEN management andprovisioning 1112 b module,DEN IPSEC module 1112 c and IP-based VPN control andadministration module 1112 d. - The
DEN component 1112 allows the service provider the means to input into the system relevant information regarding the operation of DEN-based VPN's of subscribers. Subscriber VPNs need to be “initialized” and “provisioned” so that the system properly allocates system resources to subscribers with these VPNs, and provides for the recognition and operation of these VPNs. Data fromDEN component 1112 are utilized by the system to apply the appropriate priorities to IP-flows of the subject subscribers. - The invention's packet-centric wireless base station supports directory enabled networking (DEN), a MICROSOFT, INTEL and CISCO standard for providing a standard structure for how distributed sites manage IP flows. The present invention prioritizes VPN traffic in a lightweight directory access protocol (LDAP)-compliant (LDAP is available from MICROSOFT of Redmond, Wash.) manner which allows remote administration, provisioning and management. The present invention is also
LDAP version 2 compliant. The present invention also complies with the X.500 standard promulgated by the international telecommunications union/telecommunications section (ITU/T), and with the RFC 1777. - In one embodiment, DEN provides policy-based network management, IPsec compatible network security, and IPsec based VPNs. The DEN of the
wireless base station 302 is planned to be common information model (CIM) 3.0 compatible (once the specification is finalized). Thewireless base station 302 can provide native DEN support and supports directory based DEN QoS mechanisms including reservation model (i.e. RSVP, per-flow queuing), and precedence/priority/differentiated model (i.e. packet marking).Wireless base station 302 can plan support of DEN network policy QoS, and until DEN is complete, can support internal QoS and network extensions. - 6. IPsec Support
- IPsec is introduced above with reference to
FIG. 4 . IPsec provides a standard method of encrypting packets. In VPN tunnel mode, an entire header can be encoded, i.e. encrypted. In order for the present invention to be able to implement its packet-centric, QoS aware prioritization, during identification of a packet/IP flow, the wireless base station needs to be able to analyze the contents of header fields of the packets. Therefore, analysis of unencrypted packets is desirable. - The present invention already encrypts the data stream prior to transmitting frames over the wireless medium, so IPsec does not really need to be used over the wireless link to provide for encrypted transmission. Where a service provider finds it desirable to use IPsec, IPsec can be used for authentication and secure encapsulation of the header and payload, or just the payload data. IPsec is normally integrated at a firewall. If a service provider desires to implement the present invention and IPsec, then the present invention should be implemented behind the firewall, i.e. the firewall can be moved to the wireless base station. This permits ending the IPsec stream at the base station which can provide the base station access to packet header fields.
-
FIG. 17 illustrates IP flow in the downlink direction including IPsec encryption. Similarly,FIG. 18 illustratively depicts an uplink direction of IPsec support of the present invention. -
FIG. 17 illustratesdownlink flow 1700 depicting downlink direction IP flows from asource host workstation 136 a, down a protocol stack which supports IPsec, for transmission up and throughwireless base station 302 which is coupled todata network 142, through encryption layers, then through the wireless link tosubscriber CPE 294 d, up and through a protocol stack at thesubscriber CPE 294 d, then through a wireline connection todata network 142 and up through the protocol stack to thedestination subscriber workstation 120 d atsubscriber location 306 d. - Specifically,
flow 1700 illustrates IP packet flow fromhost workstation 136 a, throughwireless base station 302, then over a wireless transmission link tosubscriber CPE 294 d, and over a wireline link tosubscriber workstation 120 d. -
Host workstation 136 a flows IP flows down fromapplication layer 1712 h, down through TCP/UDP layer 1710 h, throughIP layer 1708 h, throughoptional PPP layer 1706 h, through Ethernet layer 1705 h, down through10BaseT layer 1702 h, overdata network 142 to10BaseT layer 1702 g, then up throughEthernet 1704 g, up its protocol stack through optional PPP layer 1706 g toIP layer WAN layer 1704 f, towireline layer 1702 f todata network 142 to wirelinephysical layer 1702 e. - Wireline
physical layer 1702 e ofwireless base station 302, flows IP flows up the protocol stack throughWAN layer 1704 e throughIPsec security gateway 1706 e and firewall toIP network layer encryption layer 1706 d,PRIMMA MAC layer 1704 d and down to wireless link tosubscriber CPE 294 d. -
Subscriber CPE 294 d flows packet IP flows up fromantenna 292 d atphysical wireless layer 1702 c up throughMAC layer 1704 c, throughencryption layer 1706 c, throughIP layers optional layer 1706 b toEthernet layer 1704 b to10BaseT connection 1702 b to 10BaseT connection. -
Subscriber workstation 120 d flows IP flows up from 10BaseT layer 1702 a up through its protocol stack through Ethernet layer 1704 a, throughoptional PPP layer 1706 a, through IP layer 1708 a, to TCP/UDP layer 1710 a and on up toapplication layer 1712 a. -
FIG. 18 illustratesuplink flow 1800 depicting uplink direction IP flows from a source TCP atsubscriber workstation 120 d atCPE location 306 d, down a protocol stack for transmission through Ethernet coupledCPE subscriber station 294 d through wireless medium towireless base station 302, up and through a protocol stack at thewireless base station 302 which supports IPsec, then through a wireline connection todata network 142 and through a protocol stack to a destination host. - Specifically,
flow 1800 illustrates IP packet flow fromsubscriber workstation 120 d, throughsubscriber CPE 294 d, then over a wireless transmission medium towireless base station 302, and eventually over a wireline link to hostworkstation 136 a. -
Flow 1800 includes IP flows from application layer 1812 a, down the protocol stack through TCP/UDP layer 1810 a, through IP layer 1808 a, then through optional point-to-point (PPP)layer 1806 a, then through datalink Ethernet layer 1804 a, then through 10BaseT Ethernet, network interface card (NIC)physical layer 1802 a, over a wire line connection to 10BaseT Ethernet NICphysical layer 1802 b ofsubscriber CPE 294 d. -
Subscriber CPE 294 d flows packets coming in fromNIC 1802 b, back up its protocol stack throughEthernet layer 1804 b, throughoptional PPP layer 1806 b toIP layer IPsec security gateway 1806 c, down throughPRIMMA MAC 1804 c to wirelessphysical layer 1802c including antenna 292 d, then over the wireless medium, such as, e.g., RF communication, cable RF, and satellite link, toantenna 290 d ofwireless base station 302 at wirelessphysical layer 1802 d. -
Wireless base station 302 flows packet IP flows up fromantenna 290 d atphysical wireless layer 1802 d up throughMAC layer 1804 d, throughIPsec layers IPsec layer 1806 e, IP flows can flow down through WAN layer 1804 e and through wirelinephysical layer 1802 e overdata network 142. - Wireline
physical layer 1802 f flows IP flows up the protocol stack throughWAN layer 1804 f throughIPsec security gateway 1806 f and firewall toIP network layer optional PPP layer 1806 h,Ethernet layer 1804 h and down through10BaseT layer 1802 g, throughinterface 320, overrouters 140 d, throughdata network 142, via wireline connections to 10BaseTphysical layer 1802 h ofhost workstation 136 a. -
Host workstation 136 a flows IP flows up from10BaseT layer 1802 h up through its protocol stack through Ethernet layer 1805 h, throughoptional PPP layer 1806 h, throughIP layer 1808 h, to TCP/UDP layer 1810 h and on toapplication layer 1812 h. - While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/502,101 US20070050492A1 (en) | 1998-07-10 | 2006-08-10 | Method of operation for the integration of differentiated services (Diff-Serv) marked IP-flows into a quality of service (QoS) priorities in a wireless point to multi-point (PtMP) transmission system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US9245298P | 1998-07-10 | 1998-07-10 | |
US09/349,477 US6862622B2 (en) | 1998-07-10 | 1999-07-09 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PTMP) transmission system architecture |
US11/068,719 US7409450B2 (en) | 1998-07-10 | 2005-02-28 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture |
US11/502,101 US20070050492A1 (en) | 1998-07-10 | 2006-08-10 | Method of operation for the integration of differentiated services (Diff-Serv) marked IP-flows into a quality of service (QoS) priorities in a wireless point to multi-point (PtMP) transmission system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/068,719 Continuation US7409450B2 (en) | 1998-07-10 | 2005-02-28 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070050492A1 true US20070050492A1 (en) | 2007-03-01 |
Family
ID=46203644
Family Applications (12)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/349,477 Expired - Lifetime US6862622B2 (en) | 1998-07-10 | 1999-07-09 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PTMP) transmission system architecture |
US11/068,719 Expired - Lifetime US7409450B2 (en) | 1998-07-10 | 2005-02-28 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture |
US11/502,348 Expired - Fee Related US7496674B2 (en) | 1998-07-10 | 2006-08-10 | System, method, and base station using different security protocols on wired and wireless portions of network |
US11/502,596 Abandoned US20070038752A1 (en) | 1998-07-10 | 2006-08-10 | Quality of Service (QoS) - aware wireless Point to Multi-Point (PtMP) transmission system architecture |
US11/502,583 Expired - Fee Related US7359971B2 (en) | 1998-07-10 | 2006-08-10 | Use of priority-based scheduling for the optimization of latency and jitter sensitive IP flows in a wireless point to multi-point transmission system |
US11/502,601 Expired - Fee Related US7359972B2 (en) | 1998-07-10 | 2006-08-10 | Time division multiple access/time division duplex (TDMA/TDD) transmission media access control (MAC) air frame |
US11/502,101 Abandoned US20070050492A1 (en) | 1998-07-10 | 2006-08-10 | Method of operation for the integration of differentiated services (Diff-Serv) marked IP-flows into a quality of service (QoS) priorities in a wireless point to multi-point (PtMP) transmission system |
US11/502,331 Expired - Fee Related US7412517B2 (en) | 1998-07-10 | 2006-08-10 | Method for providing dynamic bandwidth allocation based on IP-flow characteristics in a wireless point to multi-point (PtMP) transmission system |
US11/502,599 Abandoned US20070038753A1 (en) | 1998-07-10 | 2006-08-10 | Transmission Control Protocol/Internet Protocol (TCP/IP) - centric "Quality of Service(QoS)" aware Media Access Control (MAC) Layer in a wireless Point to Multi-Point (PtMP) transmission system |
US12/184,902 Abandoned US20090271512A1 (en) | 1998-07-10 | 2008-08-01 | TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE |
US13/494,904 Expired - Fee Related US9712289B2 (en) | 1998-07-10 | 2012-06-12 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture |
US15/653,161 Abandoned US20180069668A1 (en) | 1998-07-10 | 2017-07-18 | TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE |
Family Applications Before (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/349,477 Expired - Lifetime US6862622B2 (en) | 1998-07-10 | 1999-07-09 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PTMP) transmission system architecture |
US11/068,719 Expired - Lifetime US7409450B2 (en) | 1998-07-10 | 2005-02-28 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture |
US11/502,348 Expired - Fee Related US7496674B2 (en) | 1998-07-10 | 2006-08-10 | System, method, and base station using different security protocols on wired and wireless portions of network |
US11/502,596 Abandoned US20070038752A1 (en) | 1998-07-10 | 2006-08-10 | Quality of Service (QoS) - aware wireless Point to Multi-Point (PtMP) transmission system architecture |
US11/502,583 Expired - Fee Related US7359971B2 (en) | 1998-07-10 | 2006-08-10 | Use of priority-based scheduling for the optimization of latency and jitter sensitive IP flows in a wireless point to multi-point transmission system |
US11/502,601 Expired - Fee Related US7359972B2 (en) | 1998-07-10 | 2006-08-10 | Time division multiple access/time division duplex (TDMA/TDD) transmission media access control (MAC) air frame |
Family Applications After (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/502,331 Expired - Fee Related US7412517B2 (en) | 1998-07-10 | 2006-08-10 | Method for providing dynamic bandwidth allocation based on IP-flow characteristics in a wireless point to multi-point (PtMP) transmission system |
US11/502,599 Abandoned US20070038753A1 (en) | 1998-07-10 | 2006-08-10 | Transmission Control Protocol/Internet Protocol (TCP/IP) - centric "Quality of Service(QoS)" aware Media Access Control (MAC) Layer in a wireless Point to Multi-Point (PtMP) transmission system |
US12/184,902 Abandoned US20090271512A1 (en) | 1998-07-10 | 2008-08-01 | TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE |
US13/494,904 Expired - Fee Related US9712289B2 (en) | 1998-07-10 | 2012-06-12 | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture |
US15/653,161 Abandoned US20180069668A1 (en) | 1998-07-10 | 2017-07-18 | TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE |
Country Status (1)
Country | Link |
---|---|
US (12) | US6862622B2 (en) |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040143653A1 (en) * | 2003-01-21 | 2004-07-22 | Bellsouth Intellectual Property Corporation | Method and system for provisioning and maintaining a circuit in a data network |
US20050135237A1 (en) * | 2003-12-23 | 2005-06-23 | Bellsouth Intellectual Property Corporation | Method and system for automatically rerouting logical circuit data in a data network |
US20050135254A1 (en) * | 2003-12-23 | 2005-06-23 | Bellsouth Intellectual Property Corporation | Method and system for automatically rerouting data from an overbalanced logical circuit in a data network |
US20050138476A1 (en) * | 2003-12-23 | 2005-06-23 | Bellsouth Intellectual Property Corporation | Method and system for prioritized rerouting of logical circuit data in a data network |
US20050135238A1 (en) * | 2003-12-23 | 2005-06-23 | Bellsouth Intellectual Property Corporation | Method and system for providing a failover circuit for rerouting logical circuit data in a data network |
US20050141491A1 (en) * | 1995-12-11 | 2005-06-30 | Hewlett-Packard Development Company, L.P. | Method and apparatus for accessing communication data relevant to a target entity identified by a number string |
US20050172160A1 (en) * | 2003-12-23 | 2005-08-04 | Bellsouth Intellectual Property Corporation | Method and system for automatically rerouting logical circuit data in a virtual private network |
US20050172174A1 (en) * | 2003-12-23 | 2005-08-04 | Bellsouth Intellectual Property Corporation | Method and system for automatically identifying a logical circuit failure in a data network |
US20050223114A1 (en) * | 1998-10-09 | 2005-10-06 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US20050223115A1 (en) * | 1998-10-09 | 2005-10-06 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US20050238024A1 (en) * | 2004-04-22 | 2005-10-27 | Bellsouth Intellectual Property Corporation | Method and system for provisioning logical circuits for intermittent use in a data network |
US20070133584A1 (en) * | 2005-12-08 | 2007-06-14 | Youn Ji W | Ethernet line card and method of providing various services using the same |
US20070268832A1 (en) * | 2006-05-16 | 2007-11-22 | Shih-Chung Tom Soon | System and method to achieve sub-second routing performance |
US20080117821A1 (en) * | 2006-11-20 | 2008-05-22 | Rajiv Asati | Adaptive quality of service in an easy virtual private network environment |
US20090041012A1 (en) * | 2004-04-22 | 2009-02-12 | William Taylor | Method and system for automatically tracking the rerouting of logical circuit data in a data network |
US20090086626A1 (en) * | 2004-04-22 | 2009-04-02 | William Taylor | Methods and systems for automatically rerouting logical circuit data from a logical circuit failure to a dedicated backup circuit in a data network |
US20090310613A1 (en) * | 2008-06-12 | 2009-12-17 | Motorola, Inc. | Method and system for intermediate node quality of service negotiations |
US7646707B2 (en) | 2003-12-23 | 2010-01-12 | At&T Intellectual Property I, L.P. | Method and system for automatically renaming logical circuit identifiers for rerouted logical circuits in a data network |
US20100046380A1 (en) * | 2003-12-23 | 2010-02-25 | William Taylor | Method and system for real time simultaneous monitoring of logical circuits in a data network |
US20100069536A1 (en) * | 2008-07-17 | 2010-03-18 | Sau Arjun C | Process for tailoring water-borne coating compositions |
US20100099388A1 (en) * | 2008-10-16 | 2010-04-22 | At & T Delaware Intellectual Property, Inc., A Corporation Of The State Of Delaware | Devices, methods, and computer-readable media for providing broad quality of service optimization using policy-based selective quality degradation |
US20100100613A1 (en) * | 2008-10-16 | 2010-04-22 | At&T Delaware Intellectual Property, Inc., A Corporation Of The State Of Delaware | Devices, Methods, and Computer-Readable Media for Providing Quality of Service Optimization via Policy-Based Rearrangements |
US20100100519A1 (en) * | 2008-10-16 | 2010-04-22 | At&T Delaware Intellectual Property, Inc. | Devices, methods, and computer-readable media for providing calendar-based communication system services |
US20100100822A1 (en) * | 2008-10-16 | 2010-04-22 | At&T Delaware Intellectual Property, Inc. | Devices, Methods and Computer-Readable Media for Providing Control of Switching Between Media Presentation Screens |
US20100099392A1 (en) * | 2008-10-16 | 2010-04-22 | At&T Delaware Intellectual Property, Inc., A Corporation Of The State Of Delaware | Devices, methods, and computer-readable media for providing sevices based upon identification of decision makers and owners associated with communication services |
US7768904B2 (en) | 2004-04-22 | 2010-08-03 | At&T Intellectual Property I, L.P. | Method and system for fail-safe renaming of logical circuit identifiers for rerouted logical circuits in a data network |
US20110047271A1 (en) * | 2006-03-27 | 2011-02-24 | Thales | Method and system for allocating resources |
US20110185052A1 (en) * | 2010-01-28 | 2011-07-28 | Oki Electric Industry Co., Ltd. | COMMUNICATION CONTROL APPARATUS FOR CONTROLLING QoS ACCORDING TO APPLICATIONS AND NETWORK STATE |
US20120317246A1 (en) * | 2007-09-06 | 2012-12-13 | Andrew Hickmott | Method and apparatus for cooperative file distribution with receiver determined quality of services |
US9191505B2 (en) | 2009-05-28 | 2015-11-17 | Comcast Cable Communications, Llc | Stateful home phone service |
US9256900B2 (en) | 2010-11-15 | 2016-02-09 | International Business Machines Corporation | Managing service demand load relative to infrastructure capacity in a networked computing environment |
USRE46206E1 (en) | 1998-07-10 | 2016-11-15 | Intellectual Ventures I Llc | Method and computer program product for internet protocol (IP)—flow classification in a wireless point to multi-point (PTMP) transmission system |
US9712289B2 (en) | 1998-07-10 | 2017-07-18 | Intellectual Ventures I Llc | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture |
CN108024290A (en) * | 2016-11-03 | 2018-05-11 | 中兴通讯股份有限公司 | A kind of tunnel method of adjustment and device |
US10887172B2 (en) | 2015-07-28 | 2021-01-05 | British Telecommunications Public Limited Company | Network function virtualization |
Families Citing this family (959)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6069890A (en) * | 1996-06-26 | 2000-05-30 | Bell Atlantic Network Services, Inc. | Internet telephone service |
US6154445A (en) | 1996-04-18 | 2000-11-28 | Bell Atlantic Network Services, Inc. | Telephony communication via varied redundant networks |
US6078582A (en) | 1996-12-18 | 2000-06-20 | Bell Atlantic Network Services, Inc. | Internet long distance telephone service |
US6137869A (en) | 1997-09-16 | 2000-10-24 | Bell Atlantic Network Services, Inc. | Network session management |
US6574216B1 (en) | 1997-03-11 | 2003-06-03 | Verizon Services Corp. | Packet data network voice call quality monitoring |
US6870827B1 (en) | 1997-03-19 | 2005-03-22 | Verizon Services Corp. | Voice call alternative routing through PSTN and internet networks |
US6292479B1 (en) | 1997-03-19 | 2001-09-18 | Bell Atlantic Network Services, Inc. | Transport of caller identification information through diverse communication networks |
US6747959B1 (en) | 1998-10-07 | 2004-06-08 | At&T Corp. | Voice data integrated mulitaccess by self-reservation and blocked binary tree resolution |
US6963545B1 (en) | 1998-10-07 | 2005-11-08 | At&T Corp. | Voice-data integrated multiaccess by self-reservation and stabilized aloha contention |
US10511573B2 (en) | 1998-10-30 | 2019-12-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US6442169B1 (en) | 1998-11-20 | 2002-08-27 | Level 3 Communications, Inc. | System and method for bypassing data from egress facilities |
US6757250B1 (en) * | 1999-04-12 | 2004-06-29 | Mindspeed Technologies, Inc. | Methods and apparatus for data communications through packet networks |
US6832250B1 (en) * | 1999-04-13 | 2004-12-14 | Lexmark International, Inc. | Usage-based billing and management system and method for printers and other assets |
EP1059781B1 (en) * | 1999-05-06 | 2007-09-05 | Siemens Aktiengesellschaft | Communication device with real-time transmission data processing means |
US6925068B1 (en) | 1999-05-21 | 2005-08-02 | Wi-Lan, Inc. | Method and apparatus for allocating bandwidth in a wireless communication system |
US20090219879A1 (en) | 1999-05-21 | 2009-09-03 | Wi-Lan, Inc. | Method and apparatus for bandwidth request/grant protocols in a wireless communication system |
US8462810B2 (en) * | 1999-05-21 | 2013-06-11 | Wi-Lan, Inc. | Method and system for adaptively obtaining bandwidth allocation requests |
US7006530B2 (en) * | 2000-12-22 | 2006-02-28 | Wi-Lan, Inc. | Method and system for adaptively obtaining bandwidth allocation requests |
GB9913697D0 (en) * | 1999-06-11 | 1999-08-11 | Adaptive Broadband Ltd | Dynamic channel allocation in a wireless network |
US6611348B1 (en) * | 1999-07-30 | 2003-08-26 | Banta Corporation | System and method for communication over a TCP/IP network with an appletalk network for publishing and printing services |
US6804211B1 (en) | 1999-08-03 | 2004-10-12 | Wi-Lan Inc. | Frame structure for an adaptive modulation wireless communication system |
FI19991847A (en) * | 1999-08-31 | 2001-02-28 | Nokia Networks Oy | Utilization of subscriber data in a telecommunications system |
US6708034B1 (en) * | 1999-09-13 | 2004-03-16 | Nortel Networks Ltd. | End-to-end quality of service guarantee in a wireless environment |
US6526034B1 (en) | 1999-09-21 | 2003-02-25 | Tantivy Communications, Inc. | Dual mode subscriber unit for short range, high rate and long range, lower rate data communications |
US6598034B1 (en) * | 1999-09-21 | 2003-07-22 | Infineon Technologies North America Corp. | Rule based IP data processing |
US7346022B1 (en) * | 1999-09-28 | 2008-03-18 | At&T Corporation | H.323 user, service and service provider mobility framework for the multimedia intelligent networking |
US6778517B1 (en) * | 1999-10-14 | 2004-08-17 | Bellsouth Intellectual Property Corporation | Wireless broadband service |
US6654384B1 (en) * | 1999-12-30 | 2003-11-25 | Aperto Networks, Inc. | Integrated self-optimizing multi-parameter and multi-variable point to multipoint communication system |
US8019991B1 (en) * | 1999-12-30 | 2011-09-13 | Samsung Electronics Co., Ltd. | System and method for secure provisioning of a mobile station from a provisioning server using IP address translation at the BTS/BSC |
US8483225B2 (en) * | 2000-01-20 | 2013-07-09 | Verizon Business Global Llc | Intelligent policy server system and method for bandwidth control in an ATM network |
US8090856B1 (en) | 2000-01-31 | 2012-01-03 | Telecommunication Systems, Inc. | Intelligent messaging network server interconnection |
US8370435B1 (en) | 2000-01-31 | 2013-02-05 | Telecommunication Systems, Inc. | System and method for servers to send alerts to connectionless devices |
US6435164B1 (en) | 2000-12-07 | 2002-08-20 | Ford Global Technologies, Inc. | Fuel weathering method for vehicle evaporative emission system |
US7003571B1 (en) * | 2000-01-31 | 2006-02-21 | Telecommunication Systems Corporation Of Maryland | System and method for re-directing requests from browsers for communication over non-IP based networks |
US7689696B2 (en) * | 2000-01-31 | 2010-03-30 | Telecommunication Systems, Inc. | System and method for re-directing requests from browsers for communications over non-IP based networks |
US6850530B1 (en) * | 2000-02-04 | 2005-02-01 | Cisco Technology, Inc. | Methods and apparatus for providing and obtaining resource usage information |
IL134424A0 (en) * | 2000-02-07 | 2001-04-30 | Congruency Inc | A switching unit |
US7093026B2 (en) * | 2000-02-14 | 2006-08-15 | Matsushita Electric Industrial, Co. Ltd | Data transmission system |
FI20000342A (en) * | 2000-02-16 | 2001-08-16 | Nokia Networks Oy | network control |
US7444669B1 (en) | 2000-05-05 | 2008-10-28 | Microsoft Corporation | Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet |
US6834341B1 (en) | 2000-02-22 | 2004-12-21 | Microsoft Corporation | Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet |
US7032241B1 (en) * | 2000-02-22 | 2006-04-18 | Microsoft Corporation | Methods and systems for accessing networks, methods and systems for accessing the internet |
US6880017B1 (en) * | 2000-03-20 | 2005-04-12 | International Business Machines Corporation | System and method for providing an adaptive streaming flow control mechanism between the TCP and IP layers of the TCP/IP suite of protocols |
US6980526B2 (en) | 2000-03-24 | 2005-12-27 | Margalla Communications, Inc. | Multiple subscriber videoconferencing system |
US6674717B1 (en) * | 2000-03-30 | 2004-01-06 | Network Physics, Inc. | Method for reducing packet loss and increasing internet flow by feedback control |
US20050195743A1 (en) * | 2000-04-03 | 2005-09-08 | P-Cube Ltd. | Real time charging of pre-paid accounts |
CN1199477C (en) * | 2000-04-06 | 2005-04-27 | 西门子公司 | Telecommunications system with a packet-switching communications network and a method for operating the same telecommunication system |
US7106737B1 (en) * | 2000-04-10 | 2006-09-12 | Siemens Communications, Inc. | System and method for reinterpreting TOS bits |
US6941551B1 (en) * | 2000-04-11 | 2005-09-06 | Microsoft Corporation | Method and system for creating a quality of service message |
US8321542B1 (en) * | 2000-05-05 | 2012-11-27 | Ipr Licensing, Inc. | Wireless channel allocation in a base station processor |
US7162540B2 (en) | 2000-05-15 | 2007-01-09 | Catchfire Systems, Inc. | Method and system for prioritizing network services |
US6804252B1 (en) * | 2000-05-19 | 2004-10-12 | Ipr Licensing, Inc. | Automatic reverse channel assignment in a two-way TDM communication system |
US7275262B1 (en) * | 2000-05-25 | 2007-09-25 | Bull S.A. | Method and system architecture for secure communication between two entities connected to an internet network comprising a wireless transmission segment |
JP3464644B2 (en) * | 2000-06-23 | 2003-11-10 | 松下電器産業株式会社 | Wireless communication system and multicast communication method |
US9444785B2 (en) * | 2000-06-23 | 2016-09-13 | Cloudshield Technologies, Inc. | Transparent provisioning of network access to an application |
US7630721B2 (en) | 2000-06-27 | 2009-12-08 | Ortiz & Associates Consulting, Llc | Systems, methods and apparatuses for brokering data between wireless devices and data rendering devices |
US7812856B2 (en) | 2000-10-26 | 2010-10-12 | Front Row Technologies, Llc | Providing multiple perspectives of a venue activity to electronic wireless hand held devices |
US8583027B2 (en) * | 2000-10-26 | 2013-11-12 | Front Row Technologies, Llc | Methods and systems for authorizing computing devices for receipt of venue-based data based on the location of a user |
GB0016700D0 (en) * | 2000-07-10 | 2000-08-23 | Ibm | Multi-platform application |
US7111163B1 (en) | 2000-07-10 | 2006-09-19 | Alterwan, Inc. | Wide area network using internet with quality of service |
US7068633B1 (en) | 2000-07-14 | 2006-06-27 | At&T Corp. | Enhanced channel access mechanisms for QoS-driven wireless lans |
US6950397B1 (en) * | 2000-07-14 | 2005-09-27 | At&T Corp. | RSVP/SBM based side-stream session setup, modification, and teardown for QoS-driven wireless lans |
US7039032B1 (en) | 2000-07-14 | 2006-05-02 | At&T Corp. | Multipoll for QoS-Driven wireless LANs |
US7031287B1 (en) | 2000-07-14 | 2006-04-18 | At&T Corp. | Centralized contention and reservation request for QoS-driven wireless LANs |
US7151762B1 (en) * | 2000-07-14 | 2006-12-19 | At&T Corp. | Virtual streams for QoS-driven wireless LANs |
US6804222B1 (en) * | 2000-07-14 | 2004-10-12 | At&T Corp. | In-band Qos signaling reference model for QoS-driven wireless LANs |
US7068632B1 (en) | 2000-07-14 | 2006-06-27 | At&T Corp. | RSVP/SBM based up-stream session setup, modification, and teardown for QOS-driven wireless LANs |
US7756092B1 (en) | 2000-07-14 | 2010-07-13 | At&T Intellectual Property Ii, L.P. | In-band QoS signaling reference model for QoS-driven wireless LANs connected to one or more networks |
US20020010765A1 (en) * | 2000-07-21 | 2002-01-24 | John Border | Method and system for prioritizing traffic in a network |
US6404772B1 (en) * | 2000-07-27 | 2002-06-11 | Symbol Technologies, Inc. | Voice and data wireless communications network and method |
US6976571B2 (en) * | 2000-07-31 | 2005-12-20 | Otis Elevator Company | Comb plate for people mover |
DE60045098D1 (en) * | 2000-08-04 | 2010-11-25 | Alcatel Lucent | Method for real-time data communication |
EP1320971B1 (en) * | 2000-09-05 | 2009-06-17 | NetSocket, Inc. | Method for, and a topology aware resource manager in an ip-telephony system |
US8692695B2 (en) | 2000-10-03 | 2014-04-08 | Realtime Data, Llc | Methods for encoding and decoding data |
US6636488B1 (en) | 2000-10-11 | 2003-10-21 | Aperto Networks, Inc. | Automatic retransmission and error recovery for packet oriented point-to-multipoint communication |
JP3729051B2 (en) * | 2000-10-18 | 2005-12-21 | 日本電気株式会社 | Inter-domain routing apparatus, system and method |
US7254605B1 (en) * | 2000-10-26 | 2007-08-07 | Austen Services Llc | Method of modulating the transmission frequency in a real time opinion research network |
US6901429B2 (en) * | 2000-10-27 | 2005-05-31 | Eric Morgan Dowling | Negotiated wireless peripheral security systems |
US7035932B1 (en) * | 2000-10-27 | 2006-04-25 | Eric Morgan Dowling | Federated multiprotocol communication |
US6965914B2 (en) * | 2000-10-27 | 2005-11-15 | Eric Morgan Dowling | Negotiated wireless peripheral systems |
WO2002037301A1 (en) * | 2000-11-02 | 2002-05-10 | Polycom, Inc. | Conferencing network resource management for call connectivity |
US7095754B2 (en) * | 2000-11-03 | 2006-08-22 | At&T Corp. | Tiered contention multiple access (TCMA): a method for priority-based shared channel access |
JP2002152259A (en) * | 2000-11-13 | 2002-05-24 | Yozan Inc | Communication terminal and charging processing unit |
CA2467700C (en) * | 2000-11-15 | 2012-03-20 | Ensemble Communications, Inc. | Improved frame structure for a communication system using adaptive modulation |
US6925493B1 (en) * | 2000-11-17 | 2005-08-02 | Oblicore Ltd. | System use internal service level language including formula to compute service level value for analyzing and coordinating service level agreements for application service providers |
CA2326851A1 (en) * | 2000-11-24 | 2002-05-24 | Redback Networks Systems Canada Inc. | Policy change characterization method and apparatus |
US6847629B2 (en) | 2000-11-30 | 2005-01-25 | Qualcomm Incorporated | Method and apparatus for scheduling packet data transmissions in a wireless communication system |
US20020078341A1 (en) * | 2000-12-14 | 2002-06-20 | Genty Denise M. | System and method for applying quality of service policies to internet protocol security to avoid bandwidth limitations on a computer network |
US6925063B2 (en) * | 2000-12-14 | 2005-08-02 | Shmuel Goldshtein | Voice over internet communications algorithm and related method for optimizing and reducing latency delays |
DK1402350T3 (en) * | 2000-12-15 | 2011-10-31 | Nokia Siemens Networks Oy | Method and system for access in an open service architecture |
FI115361B (en) * | 2000-12-28 | 2005-04-15 | Nokia Corp | Procedure for performing link adaptation |
US7027462B2 (en) * | 2001-01-02 | 2006-04-11 | At&T Corp. | Random medium access methods with backoff adaptation to traffic |
US8009667B1 (en) | 2001-01-16 | 2011-08-30 | Wi—LAN, Inc. | Packing source data packets into transporting packets with fragmentation |
US7002985B2 (en) * | 2001-01-16 | 2006-02-21 | Motorola, Inc. | Method and apparatus for organizing and scheduling multimedia data transfers over a wireless channel |
US20020093956A1 (en) * | 2001-01-16 | 2002-07-18 | Gurin Michael H. | Dynamic communication and method of use |
GB2371177B (en) * | 2001-01-16 | 2003-02-19 | Ericsson Telefon Ab L M | Automatic repetition request mechanism in a radio access network |
US6765885B2 (en) * | 2001-02-09 | 2004-07-20 | Asustek Computer Inc. | Determination of acceptable sequence number ranges in a communications protocol |
US7801953B1 (en) | 2001-02-12 | 2010-09-21 | Nortel Networks Limited | Push-to-talk wireless telecommunications system utilizing an voice-over-IP network |
US7461148B1 (en) * | 2001-02-16 | 2008-12-02 | Swsoft Holdings, Ltd. | Virtual private server with isolation of system components |
US7606909B1 (en) * | 2001-02-20 | 2009-10-20 | Michael Ely | Method and apparatus for a business contact center |
US6973071B1 (en) * | 2001-03-06 | 2005-12-06 | Rfmd Wpan, Inc. | Method and apparatus for controlling the flow of data in a wireless communication system |
US20030115480A1 (en) * | 2001-12-17 | 2003-06-19 | Worldcom, Inc. | System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks |
US8200577B2 (en) * | 2001-03-20 | 2012-06-12 | Verizon Business Global Llc | Systems and methods for retrieving and modifying data records for rating and billing purposes |
US6978308B2 (en) * | 2001-03-21 | 2005-12-20 | International Business Machines Corporation | System and method for nesting virtual private networking connections with coincident endpoints |
US7046733B2 (en) * | 2001-03-30 | 2006-05-16 | Matsushita Electric Industrial Co., Ltd. | Data sequencing method to improve transmission of self-similar data in a multi-node network |
US7542419B2 (en) * | 2001-04-02 | 2009-06-02 | International Business Machines Corporation | Method and apparatus for managing aggregate bandwidth at a server |
US6657980B2 (en) * | 2001-04-12 | 2003-12-02 | Qualcomm Incorporated | Method and apparatus for scheduling packet data transmissions in a wireless communication system |
US7707300B1 (en) * | 2001-04-13 | 2010-04-27 | Cisco Technology, Inc. | Methods and apparatus for transmitting information in a network |
JP4075318B2 (en) * | 2001-04-18 | 2008-04-16 | 株式会社日立製作所 | Protocol conversion method and address conversion server |
US7551560B1 (en) | 2001-04-30 | 2009-06-23 | Opnet Technologies, Inc. | Method of reducing packet loss by resonance identification in communication networks |
US7546122B1 (en) * | 2001-05-03 | 2009-06-09 | Dark Air, Inc. | Method and apparatus for providing a wireless interoffice facility |
US6928471B2 (en) * | 2001-05-07 | 2005-08-09 | Quest Software, Inc. | Method and apparatus for measurement, analysis, and optimization of content delivery |
US7489918B2 (en) | 2003-05-09 | 2009-02-10 | Intel Corporation | System and method for transferring wireless network access passwords |
US6795701B1 (en) * | 2002-05-31 | 2004-09-21 | Transat Technologies, Inc. | Adaptable radio link for wireless communication networks |
JP4501310B2 (en) * | 2001-05-28 | 2010-07-14 | 株式会社日立製作所 | Packet transfer device |
US20020188732A1 (en) * | 2001-06-06 | 2002-12-12 | Buckman Charles R. | System and method for allocating bandwidth across a network |
US7747165B2 (en) * | 2001-06-13 | 2010-06-29 | Alcatel-Lucent Usa Inc. | Network operating system with topology autodiscovery |
US7339903B2 (en) * | 2001-06-14 | 2008-03-04 | Qualcomm Incorporated | Enabling foreign network multicasting for a roaming mobile node, in a foreign network, using a persistent address |
JP4728511B2 (en) * | 2001-06-14 | 2011-07-20 | 古河電気工業株式会社 | Data relay method, apparatus thereof, and data relay system using the apparatus |
US7664873B1 (en) * | 2001-06-20 | 2010-02-16 | Juniper Networks, Inc | Generating path-centric traffic information for analysis using an association of packet-centric information to path-centric information |
US7027400B2 (en) * | 2001-06-26 | 2006-04-11 | Flarion Technologies, Inc. | Messages and control methods for controlling resource allocation and flow admission control in a mobile communications system |
US8000241B2 (en) * | 2001-06-26 | 2011-08-16 | Qualcomm Incorporated | Methods and apparatus for controlling access link packet flow aggregation and resource allocation in a mobile communications system |
US7315892B2 (en) * | 2001-06-27 | 2008-01-01 | International Business Machines Corporation | In-kernel content-aware service differentiation |
GB0115996D0 (en) * | 2001-06-29 | 2001-08-22 | Nokia Corp | Circuit-switched and packet-switched communications |
US7369564B1 (en) * | 2001-06-29 | 2008-05-06 | Cisco Technology, Inc. | Method and system for service flow mobility in a wireless network |
US7095715B2 (en) | 2001-07-02 | 2006-08-22 | 3Com Corporation | System and method for processing network packet flows |
US7277413B2 (en) | 2001-07-05 | 2007-10-02 | At & T Corp. | Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation |
US7136361B2 (en) | 2001-07-05 | 2006-11-14 | At&T Corp. | Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation |
DE10133648A1 (en) * | 2001-07-11 | 2003-01-30 | Siemens Ag | Procedures to support quality of service features in heterogeneous communication networks |
US7526572B2 (en) * | 2001-07-12 | 2009-04-28 | Research In Motion Limited | System and method for providing remote data access for a mobile communication device |
US20030014532A1 (en) * | 2001-07-16 | 2003-01-16 | Shean-Guang Chang | Method and apparatus for multicast support |
US7327720B2 (en) * | 2001-07-18 | 2008-02-05 | Emerson Iii Harry E | Integrated telephone central office systems for integrating the internet with the public switched telephone network |
US7577118B2 (en) * | 2001-07-24 | 2009-08-18 | Intel Corporation | System and method of classifying remote users according to link quality, and scheduling wireless transmission of information to the to the users based upon the classifications |
US6775533B2 (en) * | 2001-07-27 | 2004-08-10 | Nokia Corporation | Apparatus, and associated method, for transferring data between a first target entity and a second target entity of a mobile radio communication system |
US20030028410A1 (en) * | 2001-08-01 | 2003-02-06 | House Michael Brynn | Method and apparatus for wireless workforce mobilization and management |
US7173905B1 (en) * | 2001-08-02 | 2007-02-06 | Utstarcom, Inc. | PDSN fast tunnel lookup |
US7738407B2 (en) * | 2001-08-03 | 2010-06-15 | At&T Intellectual Property Ii, L.P. | Method and apparatus for delivering IPP2T (IP-push-to-talk) wireless LAN mobile radio service |
US7307963B2 (en) | 2001-08-03 | 2007-12-11 | At&T Corp. | Architecture and method for using IEEE 802.11-like wireless LAN system to emulate private land mobile radio system (PLMRS) radio service |
US6961539B2 (en) * | 2001-08-09 | 2005-11-01 | Hughes Electronics Corporation | Low latency handling of transmission control protocol messages in a broadband satellite communications system |
US20030032451A1 (en) * | 2001-08-10 | 2003-02-13 | Jianhong Hu | Architecture for converged broadband wireless communications |
US20030033519A1 (en) * | 2001-08-13 | 2003-02-13 | Tippingpoint Technologies,Inc. | System and method for programming network nodes |
US7017138B2 (en) * | 2001-08-15 | 2006-03-21 | National Instruments Corporation | Dynamically determining a route through one or more switch devices at program execution time |
US20030050060A1 (en) * | 2001-08-31 | 2003-03-13 | William Leslie | Communications architecture utilizing local satellite processors |
US20030046532A1 (en) * | 2001-08-31 | 2003-03-06 | Matthew Gast | System and method for accelerating cryptographically secured transactions |
US7580424B2 (en) * | 2001-09-25 | 2009-08-25 | Hughes Network System, Llc | System and method for providing real-time and non-real-time services over a communications system |
US7088702B2 (en) * | 2001-10-03 | 2006-08-08 | Freescale Semiconductor Inc. | Method for controlling a data stream in a wireless network |
US7061880B2 (en) * | 2001-10-11 | 2006-06-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Systems and methods for multicast communications |
JP3901487B2 (en) * | 2001-10-18 | 2007-04-04 | 富士通株式会社 | VPN service management system, VPN service manager and VPN service agent |
US6788687B2 (en) * | 2001-10-30 | 2004-09-07 | Qualcomm Incorporated | Method and apparatus for scheduling packet data transmissions in a wireless communication system |
US7245604B2 (en) | 2001-11-02 | 2007-07-17 | At&T Corp. | Fixed deterministic post-backoff for cyclic prioritized multiple access (CPMA) contention-free sessions |
US7248600B2 (en) | 2001-11-02 | 2007-07-24 | At&T Corp. | ‘Shield’: protecting high priority channel access attempts in overlapped wireless cells |
US7245605B2 (en) | 2001-11-02 | 2007-07-17 | At&T Corp. | Preemptive packet for maintaining contiguity in cyclic prioritized multiple access (CPMA) contention-free sessions |
CN1254998C (en) * | 2001-11-08 | 2006-05-03 | 三菱电机株式会社 | Wireless communication meethod and mobile terminal used therefor |
US7310672B2 (en) * | 2001-11-13 | 2007-12-18 | Hewlett-Packard Development Company, L.P. | Method and system for exploiting service level objectives to enable resource sharing in a communication network having a plurality of application environments |
US7603518B2 (en) | 2005-12-19 | 2009-10-13 | Commvault Systems, Inc. | System and method for improved media identification in a storage device |
US8346733B2 (en) | 2006-12-22 | 2013-01-01 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US7356596B2 (en) * | 2001-12-07 | 2008-04-08 | Architecture Technology Corp. | Protecting networks from access link flooding attacks |
US7239639B2 (en) * | 2001-12-27 | 2007-07-03 | 3Com Corporation | System and method for dynamically constructing packet classification rules |
JP2003204326A (en) * | 2002-01-09 | 2003-07-18 | Nec Corp | Communication system, lan controller equipped with encryption function and communication control program |
FR2834840B1 (en) * | 2002-01-14 | 2005-06-24 | Sofedit Sa | DETERMINING THE PROBABLE CAUSE OF A REDUCTION IN THE QUALITY OF A SERVICE BASED ON THE EVOLUTION OF A SET OF SERVICES |
US6658091B1 (en) | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
US7068610B2 (en) | 2002-02-26 | 2006-06-27 | Unruh Lincoln J | System and method for reliable communications over multiple packet RF networks |
JP3898965B2 (en) * | 2002-03-06 | 2007-03-28 | 株式会社エヌ・ティ・ティ・ドコモ | Radio resource allocation method and base station |
US8260907B2 (en) * | 2002-04-04 | 2012-09-04 | Ca, Inc. | Methods, systems and computer program products for triggered data collection and correlation of status and/or state in distributed data processing systems |
US7171479B2 (en) * | 2002-04-26 | 2007-01-30 | International Business Machines Corporation | Efficient delivery of boot code images from a network server |
US20030208609A1 (en) * | 2002-05-01 | 2003-11-06 | Verizon Services, Corp. | Automatic configuration of advanced services over DSL |
US7346076B1 (en) * | 2002-05-07 | 2008-03-18 | At&T Corp. | Network controller and method to support format negotiation between interfaces of a network |
US20030210711A1 (en) * | 2002-05-08 | 2003-11-13 | Faust Albert William | Data transfer method and apparatus |
US8089879B2 (en) * | 2002-05-15 | 2012-01-03 | Alcatel Lucent | In-band flow control methods for communications systems |
US7356687B2 (en) * | 2002-05-21 | 2008-04-08 | General Instrument Corporation | Association of security parameters for a collection of related streaming protocols |
US7490148B1 (en) | 2002-05-30 | 2009-02-10 | At&T Intellectual Property I, L.P. | Completion performance analysis for internet services |
US7512120B2 (en) * | 2002-07-09 | 2009-03-31 | Ntt Docomo, Inc. | Node, correspondent node, mobility anchor point, and home agent in packet communication system, packet communication system, and path MTU discovery method |
US8266270B1 (en) * | 2002-07-16 | 2012-09-11 | At&T Intellectual Property I, L.P. | Delivery performance analysis for internet services |
DE60202763T2 (en) * | 2002-07-17 | 2006-01-05 | Alcatel | Method, computer program, customer terminal and network for the efficient use of network resources through the "just-in-time" adjustment of the quality of service is based on the use of the service and the behavior of the user |
US7321383B2 (en) * | 2002-07-19 | 2008-01-22 | The Boeing Company | Method and apparatus for bi-directional video teleconferencing on mobile platforms |
US7418494B2 (en) | 2002-07-25 | 2008-08-26 | Intellectual Ventures Holding 40 Llc | Method and system for background replication of data objects |
US8707406B2 (en) * | 2002-07-26 | 2014-04-22 | Sierra Wireless, Inc. | Always-on virtual private network access |
AU2003257158A1 (en) * | 2002-08-01 | 2004-02-23 | Interwave Communications, Inc. | METHOD AND APPARATUS FOR INCREASED QoS AND REDUCED INTERFERENCE IN MESH ARCHITECTURE RADIO TELECOMMUNICATIONS SYSTEMS |
US8015303B2 (en) * | 2002-08-02 | 2011-09-06 | Astute Networks Inc. | High data rate stateful protocol processing |
US20040031056A1 (en) * | 2002-08-07 | 2004-02-12 | Wolff Christopher J. | Method and system for delivering service provider content to subscribers |
US20040066935A1 (en) * | 2002-10-02 | 2004-04-08 | Marino Francis C. | Method and apparatus for providing a message sequence count in a security system |
US20040121778A1 (en) * | 2002-10-08 | 2004-06-24 | Interdigital Technology Corporation | Quality of service mapping between various types of wireless communication systems |
US7596621B1 (en) * | 2002-10-17 | 2009-09-29 | Astute Networks, Inc. | System and method for managing shared state using multiple programmed processors |
US8151278B1 (en) | 2002-10-17 | 2012-04-03 | Astute Networks, Inc. | System and method for timer management in a stateful protocol processing system |
US7814218B1 (en) | 2002-10-17 | 2010-10-12 | Astute Networks, Inc. | Multi-protocol and multi-format stateful processing |
US7599323B2 (en) * | 2002-10-17 | 2009-10-06 | Alcatel-Lucent Usa Inc. | Multi-interface mobility client |
JP2004147117A (en) * | 2002-10-24 | 2004-05-20 | Nec Corp | Ip network system and h.323 gatekeeper |
US7769873B1 (en) | 2002-10-25 | 2010-08-03 | Juniper Networks, Inc. | Dynamically inserting filters into forwarding paths of a network device |
US8051211B2 (en) | 2002-10-29 | 2011-11-01 | Cisco Technology, Inc. | Multi-bridge LAN aggregation |
JP3821086B2 (en) * | 2002-11-01 | 2006-09-13 | ソニー株式会社 | Streaming system, streaming method, client terminal, data decoding method, and program |
US20040095381A1 (en) * | 2002-11-14 | 2004-05-20 | Mcdowell David H. | Graphical user interface for a remote spectrum analyzer |
US7508846B2 (en) * | 2002-11-22 | 2009-03-24 | Nortel Networks Ltd. | Physical capacity aggregation system and method |
US7761598B1 (en) * | 2002-12-26 | 2010-07-20 | Juniper Networks, Inc. | Systems and methods for connecting large numbers of cable modems |
EP1578262A4 (en) | 2002-12-31 | 2007-12-05 | Therasense Inc | Continuous glucose monitoring system and methods of use |
US7657222B2 (en) * | 2003-01-02 | 2010-02-02 | Agere Systems Inc. | Wireless cable networking gateway and Wi-Fi system incorporating the same |
US7792121B2 (en) * | 2003-01-03 | 2010-09-07 | Microsoft Corporation | Frame protocol and scheduling system |
US7181701B2 (en) * | 2003-01-03 | 2007-02-20 | Microsoft Corporation | Glanceable information system and method |
GB2397466B (en) * | 2003-01-16 | 2006-08-09 | Hewlett Packard Co | Wireless LAN |
EP1588526A1 (en) * | 2003-01-28 | 2005-10-26 | Telefonaktiebolaget LM Ericsson (publ) | Method and device for congestion notification in packet networks indicating several different congestion causes |
US7558265B2 (en) * | 2003-01-31 | 2009-07-07 | Intel Corporation | Methods and apparatus to limit transmission of data to a localized area |
US7191231B2 (en) * | 2003-02-12 | 2007-03-13 | Cisco Technology, Inc. | System and method for consistent forwarding of packets across wireless and wireline networks |
US6970518B2 (en) * | 2003-03-11 | 2005-11-29 | Motorola, Inc. | Method and apparatus for electronic item identification in a communication system using known source parameters |
US7023817B2 (en) | 2003-03-11 | 2006-04-04 | Motorola, Inc. | Method and apparatus for source device synchronization in a communication system |
US7218641B2 (en) | 2003-03-11 | 2007-05-15 | Motorola, Inc. | Method and apparatus for adaptive processing gain for multiple source devices in a communications system |
US7761876B2 (en) * | 2003-03-20 | 2010-07-20 | Siemens Enterprise Communications, Inc. | Method and system for balancing the load on media processors based upon CPU utilization information |
WO2004090789A2 (en) * | 2003-04-03 | 2004-10-21 | Commvault Systems, Inc. | System and method for extended media retention |
US7246207B2 (en) | 2003-04-03 | 2007-07-17 | Commvault Systems, Inc. | System and method for dynamically performing storage operations in a computer network |
US20050021737A1 (en) * | 2003-05-01 | 2005-01-27 | Ellison Carl M. | Liveness protocol |
US7646724B2 (en) * | 2003-05-12 | 2010-01-12 | International Business Machines Corporation | Dynamic blocking in a shared host-network interface |
US6973654B1 (en) * | 2003-05-27 | 2005-12-06 | Microsoft Corporation | Systems and methods for the repartitioning of data |
US8078758B1 (en) | 2003-06-05 | 2011-12-13 | Juniper Networks, Inc. | Automatic configuration of source address filters within a network device |
WO2005006708A1 (en) * | 2003-06-30 | 2005-01-20 | Thomson Licensing S.A. | Method and apparatus for mapping prioritized qos packets to parameterized qos channels and vice versa |
US20050004793A1 (en) * | 2003-07-03 | 2005-01-06 | Pasi Ojala | Signal adaptation for higher band coding in a codec utilizing band split coding |
US7801038B2 (en) * | 2003-07-14 | 2010-09-21 | Siemens Corporation | Method and apparatus for providing a delay guarantee for a wireless network |
US20100011090A1 (en) * | 2008-07-14 | 2010-01-14 | Limelight Networks, Inc. | Network-aware download manager |
US8805966B2 (en) | 2003-07-28 | 2014-08-12 | Limelight Networks, Inc. | Rich content download |
US7379471B2 (en) * | 2003-07-29 | 2008-05-27 | Level 3 Communications, Llc | System and method for generating reports in a network |
US20050030951A1 (en) * | 2003-08-06 | 2005-02-10 | Christian Maciocco | Reservation protocol signaling extensions for optical switched networks |
US7308267B2 (en) * | 2003-08-12 | 2007-12-11 | At&T Knowledge Ventures, L.P. | Wireless direct routing service |
US8121112B2 (en) * | 2003-08-29 | 2012-02-21 | Arris Group, Inc. | Method and system for processing voice traffic from a multi-channel link into a VoIP network over a broadband network |
JP4476292B2 (en) * | 2003-09-02 | 2010-06-09 | ファーウェイチーシュヨウシェンゴンス | Real-time service data transmission line selection method |
DE602004011539T2 (en) * | 2003-09-03 | 2009-01-29 | Koninklijke Philips Electronics N.V. | Fair Bandwidth Allocation in an IEEE 802.11E Communication Medium |
US7870268B2 (en) * | 2003-09-15 | 2011-01-11 | Intel Corporation | Method, system, and program for managing data transmission through a network |
US8644321B2 (en) * | 2003-09-16 | 2014-02-04 | Qualcomm Incorporated | Scheduling packet transmissions |
US7752550B2 (en) * | 2003-09-23 | 2010-07-06 | At&T Intellectual Property I, Lp | System and method for providing managed point to point services |
US20050068968A1 (en) * | 2003-09-30 | 2005-03-31 | Shlomo Ovadia | Optical-switched (OS) network to OS network routing using extended border gateway protocol |
AU2003304646A1 (en) * | 2003-09-30 | 2005-04-21 | Mitsubishi Electric Corp | Time-division synchronization radio modem apparatus |
US7119676B1 (en) | 2003-10-09 | 2006-10-10 | Innovative Wireless Technologies, Inc. | Method and apparatus for multi-waveform wireless sensor network |
US9614772B1 (en) * | 2003-10-20 | 2017-04-04 | F5 Networks, Inc. | System and method for directing network traffic in tunneling applications |
US7206581B2 (en) * | 2003-11-05 | 2007-04-17 | Interdigital Technology Corporation | Method and apparatus for processing data blocks during soft handover |
JP2005150866A (en) * | 2003-11-12 | 2005-06-09 | Nec Corp | Wireless communication system, wireless base station accommodating apparatus, and data packet transfer method |
EP1749376B1 (en) * | 2003-11-19 | 2011-12-28 | Honeywell International Inc. | Voting mechanism for transmission schedule enforcement in a hub-based tdma network |
US7543052B1 (en) * | 2003-12-22 | 2009-06-02 | Packeteer, Inc. | Automatic network traffic discovery and classification mechanism including dynamic discovery thresholds |
US20050141425A1 (en) * | 2003-12-24 | 2005-06-30 | Foulds Christopher T. | Method, system, and program for managing message transmission through a network |
US7773620B2 (en) * | 2003-12-24 | 2010-08-10 | Intel Corporation | Method, system, and program for overrun identification |
US7461149B2 (en) * | 2004-01-13 | 2008-12-02 | International Business Machines Corporation | Ordering provisioning request execution based on service level agreement and customer entitlement |
US20050169221A1 (en) * | 2004-02-03 | 2005-08-04 | Sharp Laboratories Of America, Inc. | Decentralized bandwidth reservation mechanism for wireless networks |
US7788451B2 (en) | 2004-02-05 | 2010-08-31 | Micron Technology, Inc. | Apparatus and method for data bypass for a bi-directional data bus in a hub-based memory sub-system |
JP4415317B2 (en) * | 2004-02-23 | 2010-02-17 | セイコーエプソン株式会社 | Information equipment and control method thereof |
KR20070053654A (en) * | 2004-03-05 | 2007-05-25 | 넥스트넷 와이어리스 인크. | Method and apparatus for isochronous datagram delivery over contention-based data link |
WO2005086802A2 (en) | 2004-03-08 | 2005-09-22 | Proxense, Llc | Linked account system using personal digital key (pdk-las) |
DE102004012036B3 (en) * | 2004-03-11 | 2005-10-20 | Infineon Technologies Ag | Data flow control of wireless LAN connections for the impairment of Internet telephony |
US20090077623A1 (en) | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrating Security System and Network Devices |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
CA2559842C (en) | 2004-03-16 | 2014-05-27 | Icontrol Networks, Inc. | Premises management system |
US9531593B2 (en) | 2007-06-12 | 2016-12-27 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11190578B2 (en) | 2008-08-11 | 2021-11-30 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US7711796B2 (en) | 2006-06-12 | 2010-05-04 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US9729342B2 (en) | 2010-12-20 | 2017-08-08 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US9141276B2 (en) | 2005-03-16 | 2015-09-22 | Icontrol Networks, Inc. | Integrated interface for mobile device |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US12063220B2 (en) | 2004-03-16 | 2024-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US8635350B2 (en) | 2006-06-12 | 2014-01-21 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10127802B2 (en) | 2010-09-28 | 2018-11-13 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
GB2412823B (en) * | 2004-03-31 | 2006-03-15 | Siemens Ag | A method of optimising connection set-up times between nodes in a centrally controlled network |
US8041797B2 (en) * | 2004-03-31 | 2011-10-18 | International Business Machines Corporation | Apparatus and method for allocating resources based on service level agreement predictions and associated costs |
US7818392B1 (en) | 2004-04-07 | 2010-10-19 | Cisco Technology, Inc. | Hierarchical posting systems and methods with social network filtering |
KR100701383B1 (en) * | 2004-04-07 | 2007-03-28 | 엘지전자 주식회사 | Method for synchronizing network profiles stored in a plurality of managing devices in a home network and a network system for the synchronizing method |
US7620041B2 (en) * | 2004-04-15 | 2009-11-17 | Alcatel-Lucent Usa Inc. | Authentication mechanisms for call control message integrity and origin verification |
US7818475B2 (en) * | 2004-04-30 | 2010-10-19 | Emc Corporation | Storage switch mirrored write sequence count management |
US7809375B2 (en) * | 2004-05-14 | 2010-10-05 | Broadcom Corporation | Home wireless router VoIP bandwidth management |
KR20050114556A (en) * | 2004-06-01 | 2005-12-06 | 삼성전자주식회사 | Apparatus and method of setting up talk session in ptt service providing system |
US8870639B2 (en) | 2004-06-28 | 2014-10-28 | Winview, Inc. | Methods and apparatus for distributed gaming over a mobile device |
US8376855B2 (en) | 2004-06-28 | 2013-02-19 | Winview, Inc. | Methods and apparatus for distributed gaming over a mobile device |
US8503340B1 (en) * | 2004-07-11 | 2013-08-06 | Yongyong Xu | WiFi phone system |
US10226698B1 (en) | 2004-07-14 | 2019-03-12 | Winview, Inc. | Game of skill played by remote participants utilizing wireless devices in connection with a common game event |
KR100585327B1 (en) * | 2004-07-29 | 2006-06-01 | 삼성전자주식회사 | Method for adaptively reassigning addresses of nodes according to changes in volumn of wireless network |
CN1728578A (en) * | 2004-07-30 | 2006-02-01 | 俞隽 | Broadband wired access system and method in multiple addresses possessing discontinuous mobile characteristics |
JP4480512B2 (en) * | 2004-08-10 | 2010-06-16 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile communication system and service control apparatus |
US7933985B2 (en) * | 2004-08-13 | 2011-04-26 | Sipera Systems, Inc. | System and method for detecting and preventing denial of service attacks in a communications system |
US8707419B2 (en) * | 2006-06-29 | 2014-04-22 | Avaya Inc. | System, method and apparatus for protecting a network or device against high volume attacks |
US20090094671A1 (en) * | 2004-08-13 | 2009-04-09 | Sipera Systems, Inc. | System, Method and Apparatus for Providing Security in an IP-Based End User Device |
US7804790B1 (en) | 2004-08-30 | 2010-09-28 | Juniper Networks, Inc. | Aggregate multicast trees for virtual private local area network (LAN) service multicast |
US20060044725A1 (en) * | 2004-08-31 | 2006-03-02 | Cisco Technology, Inc. | Monolithic solid state relay circuit for telecom wireline applications |
EP1790131B1 (en) | 2004-09-09 | 2012-12-05 | Avaya Inc. | Methods of and systems for network traffic security |
US8666816B1 (en) | 2004-09-14 | 2014-03-04 | Google Inc. | Method and system for access point customization |
US20060059043A1 (en) * | 2004-09-14 | 2006-03-16 | Chan Wesley T | Method and system to provide wireless access at a reduced rate |
US20060058019A1 (en) * | 2004-09-15 | 2006-03-16 | Chan Wesley T | Method and system for dynamically modifying the appearance of browser screens on a client device |
EP1892901A3 (en) * | 2004-10-01 | 2011-07-13 | Panasonic Corporation | Quality-of-service (qos)-aware scheduling for uplink transmission on dedicated channels |
US7620006B2 (en) * | 2004-10-05 | 2009-11-17 | Hughes Network Systems, Inc. | Method and apparatus for providing quality of service guarantees using stateful monitoring of network load |
US8135861B1 (en) * | 2004-10-06 | 2012-03-13 | Emc Corporation | Backup proxy |
US7739244B2 (en) * | 2004-10-14 | 2010-06-15 | Oracle International Corporation | Operating logging for online recovery in shared memory information systems |
US7460476B1 (en) * | 2004-10-18 | 2008-12-02 | Ubicom, Inc. | Automatic adaptive network traffic prioritization and shaping |
US7433319B2 (en) * | 2004-10-27 | 2008-10-07 | At&T Intellectual Property I, L.P. | System and method for collecting and presenting service level agreement metrics in a switched metro ethernet network |
US7765369B1 (en) | 2004-11-05 | 2010-07-27 | Commvault Systems, Inc. | Method and system for selectively deleting stored data |
US20060114855A1 (en) * | 2004-11-30 | 2006-06-01 | Haihong Zheng | Quality of service (QOS) signaling for a wireless network |
US7561521B2 (en) * | 2004-12-09 | 2009-07-14 | The Boeing Company | Network centric quality of service using active network technology |
WO2006064454A1 (en) * | 2004-12-15 | 2006-06-22 | Koninklijke Philips Electronics N.V. | Method and system for the transmission of digital video over a wireless network |
EP1829283A2 (en) | 2004-12-20 | 2007-09-05 | Proxense, LLC | Biometric personal data key (pdk) authentication |
CN100403794C (en) * | 2004-12-29 | 2008-07-16 | 华为技术有限公司 | Video terminal and method of implementing services of stream media |
CN100414905C (en) * | 2004-12-30 | 2008-08-27 | 华为技术有限公司 | Broadband access network of ensuring QoS of survice, and method |
US7571250B2 (en) * | 2005-01-14 | 2009-08-04 | Microsoft Corporation | Method and apparatus for distributing messages |
US7724656B2 (en) * | 2005-01-14 | 2010-05-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Uplink congestion detection and control between nodes in a radio access network |
JP2006197461A (en) * | 2005-01-17 | 2006-07-27 | Nec Corp | Multi-address communication system using portable communication terminal and portable communication terminal |
US7761609B1 (en) * | 2005-01-20 | 2010-07-20 | Oracle America, Inc. | Socket level packet scheduling for connectionless protocols |
US20080072035A1 (en) * | 2005-01-31 | 2008-03-20 | Johnson Robert A | Securing multicast data |
US7602702B1 (en) | 2005-02-10 | 2009-10-13 | Juniper Networks, Inc | Fast reroute of traffic associated with a point to multi-point network tunnel |
US20060218620A1 (en) * | 2005-03-03 | 2006-09-28 | Dinesh Nadarajah | Network digital video recorder and method |
EP1859583A1 (en) * | 2005-03-08 | 2007-11-28 | Koninklijke Philips Electronics N.V. | Quality of service provisioning using periodic channel time allocation |
US7609700B1 (en) | 2005-03-11 | 2009-10-27 | At&T Mobility Ii Llc | QoS channels for multimedia services on a general purpose operating system platform using data cards |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US9306809B2 (en) | 2007-06-12 | 2016-04-05 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US20110128378A1 (en) | 2005-03-16 | 2011-06-02 | Reza Raji | Modular Electronic Display Platform |
US20170180198A1 (en) | 2008-08-11 | 2017-06-22 | Marc Baum | Forming a security network including integrated security system components |
US20120324566A1 (en) | 2005-03-16 | 2012-12-20 | Marc Baum | Takeover Processes In Security Network Integrated With Premise Security System |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
RU2007135827A (en) * | 2005-03-30 | 2009-05-10 | Уэлч Аллин, Инк. (Us) | EXCHANGE OF INFORMATION BY A SET OF NETWORK ELEMENTS |
US8036597B2 (en) * | 2005-04-01 | 2011-10-11 | Interdigital Technology Corporation | Method and apparatus for determining a level of involvement of mesh points in a wireless communication system |
WO2006109151A2 (en) * | 2005-04-13 | 2006-10-19 | Nokia Corporation | Techniques for radio link resource management in wireless networks carrying packet traffic |
KR100636281B1 (en) * | 2005-05-11 | 2006-10-19 | 삼성전자주식회사 | Apparatus and method of ssession resource reservation in ipv4/ipv6 combination network |
US8842666B2 (en) * | 2005-05-13 | 2014-09-23 | Qualcomm Incorporated | Methods and apparatus for packetization of content for transmission over a network |
US20060262738A1 (en) * | 2005-05-17 | 2006-11-23 | Lilian Fernandes | Administering acknowledgment messages in the transmission control protocol |
US20060274723A1 (en) * | 2005-06-01 | 2006-12-07 | Cisco Technology, Inc. | Method and system for customer-managed call routing |
US7664493B1 (en) * | 2005-06-03 | 2010-02-16 | At&T Intellectual Property I, L.P. | Redundancy mechanisms in a push-to-talk realtime cellular network |
US10721543B2 (en) | 2005-06-20 | 2020-07-21 | Winview, Inc. | Method of and system for managing client resources and assets for activities on computing devices |
US8090084B2 (en) * | 2005-06-30 | 2012-01-03 | At&T Intellectual Property Ii, L.P. | Automated call router for business directory using the world wide web |
US8074248B2 (en) | 2005-07-26 | 2011-12-06 | Activevideo Networks, Inc. | System and method for providing video content associated with a source image to a television in a communication network |
US7990965B1 (en) | 2005-07-28 | 2011-08-02 | Juniper Networks, Inc. | Transmission of layer two (L2) multicast traffic over multi-protocol label switching networks |
US9166807B2 (en) * | 2005-07-28 | 2015-10-20 | Juniper Networks, Inc. | Transmission of layer two (L2) multicast traffic over multi-protocol label switching networks |
WO2007019583A2 (en) * | 2005-08-09 | 2007-02-15 | Sipera Systems, Inc. | System and method for providing network level and nodal level vulnerability protection in voip networks |
US8533308B1 (en) | 2005-08-12 | 2013-09-10 | F5 Networks, Inc. | Network traffic management through protocol-configurable transaction processing |
US7564803B1 (en) | 2005-08-29 | 2009-07-21 | Juniper Networks, Inc. | Point to multi-point label switched paths with label distribution protocol |
US20070047478A1 (en) * | 2005-08-30 | 2007-03-01 | Lucent Technologies Inc. | Method for access assurance in a wireless communication system |
US20070054741A1 (en) * | 2005-09-07 | 2007-03-08 | Morrow James W | Network gaming device peripherals |
KR100715673B1 (en) * | 2005-09-07 | 2007-05-09 | 한국전자통신연구원 | A method for processing subscriber packet using subscriber identification tags |
US7990945B1 (en) | 2005-09-14 | 2011-08-02 | At&T Intellectual Property Ii, L.P. | Method and apparatus for provisioning a label switched path across two or more networks |
WO2007033344A2 (en) * | 2005-09-14 | 2007-03-22 | Sipera Systems, Inc. | System, method and apparatus for classifying communications in a communications system |
EP1771021A1 (en) * | 2005-09-29 | 2007-04-04 | Telefonaktiebolaget LM Ericsson (publ) | A method and apparatus for allocation of radio resources |
US20070076692A1 (en) * | 2005-09-30 | 2007-04-05 | Marian Croak | Method and apparatus for providing virtual private access links in a communication network |
US20070091907A1 (en) * | 2005-10-03 | 2007-04-26 | Varad Seshadri | Secured media communication across enterprise gateway |
US9919210B2 (en) | 2005-10-03 | 2018-03-20 | Winview, Inc. | Synchronized gaming and programming |
US9511287B2 (en) | 2005-10-03 | 2016-12-06 | Winview, Inc. | Cellular phone games based upon television archives |
US8149530B1 (en) | 2006-04-12 | 2012-04-03 | Winview, Inc. | Methodology for equalizing systemic latencies in television reception in connection with games of skill played in connection with live television programming |
US7558859B2 (en) * | 2005-10-17 | 2009-07-07 | Microsoft Corporation | Peer-to-peer auction based data distribution |
US8243630B2 (en) * | 2005-10-19 | 2012-08-14 | Microsoft Corporation | Application-level routing protocol for multiparty audio-video conferencing |
US20070118664A1 (en) * | 2005-10-24 | 2007-05-24 | International Business Machines Corporation | Mail dispatch system |
US7983295B2 (en) * | 2005-10-28 | 2011-07-19 | Broadcom Corporation | Optimizing packet queues for channel bonding over a plurality of downstream channels of a communications management system |
US8433919B2 (en) | 2005-11-30 | 2013-04-30 | Proxense, Llc | Two-level authentication for secure transactions |
US8635450B2 (en) * | 2005-12-28 | 2014-01-21 | Intel Corporation | IP encapsulation with exposed classifiers |
JP4200456B2 (en) * | 2005-12-28 | 2008-12-24 | ブラザー工業株式会社 | Peripheral device, program, and control method |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US9113464B2 (en) | 2006-01-06 | 2015-08-18 | Proxense, Llc | Dynamic cell size variation via wireless link parameter adjustment |
US9056251B2 (en) | 2006-01-10 | 2015-06-16 | Winview, Inc. | Method of and system for conducting multiple contests of skill with a single performance |
US10556183B2 (en) | 2006-01-10 | 2020-02-11 | Winview, Inc. | Method of and system for conducting multiple contest of skill with a single performance |
US8002618B1 (en) | 2006-01-10 | 2011-08-23 | Winview, Inc. | Method of and system for conducting multiple contests of skill with a single performance |
EP2052511B1 (en) * | 2006-01-13 | 2019-08-14 | QUALCOMM Incorporated | Localized and distributed allocation multiplexing and control |
CN101611604A (en) * | 2006-01-13 | 2009-12-23 | 高通股份有限公司 | Localization and distributed allocation multiplexing and control |
US7839850B2 (en) * | 2006-01-30 | 2010-11-23 | Juniper Networks, Inc. | Forming equal cost multipath multicast distribution structures |
US8270395B2 (en) * | 2006-01-30 | 2012-09-18 | Juniper Networks, Inc. | Forming multicast distribution structures using exchanged multicast optimization data |
US8149771B2 (en) * | 2006-01-31 | 2012-04-03 | Roundbox, Inc. | Reliable event broadcaster with multiplexing and bandwidth control functions |
US20070209057A1 (en) * | 2006-03-01 | 2007-09-06 | Broadband Wizard Inc. | Wireless delivery of broadband cable signals |
CN100579024C (en) * | 2006-03-02 | 2010-01-06 | 华为技术有限公司 | Intermediate-transferring system and method for allocating and scheduling band width |
JP4781880B2 (en) * | 2006-03-31 | 2011-09-28 | 富士通株式会社 | Relay device, relay method, relay program, and communication system |
US11082746B2 (en) * | 2006-04-12 | 2021-08-03 | Winview, Inc. | Synchronized gaming and programming |
US8755675B2 (en) * | 2006-04-20 | 2014-06-17 | Texas Instruments Incorporated | Flexible and efficient memory utilization for high bandwidth receivers, integrated circuits, systems, methods and processes of manufacture |
US7756134B2 (en) | 2006-05-02 | 2010-07-13 | Harris Corporation | Systems and methods for close queuing to support quality of service |
US20070258459A1 (en) * | 2006-05-02 | 2007-11-08 | Harris Corporation | Method and system for QOS by proxy |
US20070258445A1 (en) * | 2006-05-02 | 2007-11-08 | Harris Corporation | Systems and methods for protocol filtering for quality of service |
US8576882B2 (en) * | 2006-05-11 | 2013-11-05 | Blackberry Limited | Media access control protocol for multi-hop network systems and method therefore |
US7894509B2 (en) | 2006-05-18 | 2011-02-22 | Harris Corporation | Method and system for functional redundancy based quality of service |
US20070276945A1 (en) * | 2006-05-23 | 2007-11-29 | Microsoft Corporation | Fault-Tolerant Resource Committal |
WO2007139841A2 (en) * | 2006-05-24 | 2007-12-06 | Nortel Networks Limited | Radio resource reservation for wireless networks |
US8437352B2 (en) * | 2006-05-30 | 2013-05-07 | Broadcom Corporation | Method and system for power control based on application awareness in a packet network switch |
US12063221B2 (en) | 2006-06-12 | 2024-08-13 | Icontrol Networks, Inc. | Activation of gateway device |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US7493406B2 (en) * | 2006-06-13 | 2009-02-17 | International Business Machines Corporation | Maximal flow scheduling for a stream processing system |
US20080317241A1 (en) * | 2006-06-14 | 2008-12-25 | Derek Wang | Code-based echo cancellation |
US20090016333A1 (en) * | 2006-06-14 | 2009-01-15 | Derek Wang | Content-based adaptive jitter handling |
US20080140767A1 (en) * | 2006-06-14 | 2008-06-12 | Prasad Rao | Divitas description protocol and methods therefor |
US7990860B2 (en) | 2006-06-16 | 2011-08-02 | Harris Corporation | Method and system for rule-based sequencing for QoS |
US8516153B2 (en) * | 2006-06-16 | 2013-08-20 | Harris Corporation | Method and system for network-independent QoS |
US8064464B2 (en) | 2006-06-16 | 2011-11-22 | Harris Corporation | Method and system for inbound content-based QoS |
US7856012B2 (en) * | 2006-06-16 | 2010-12-21 | Harris Corporation | System and methods for generic data transparent rules to support quality of service |
US20070291767A1 (en) * | 2006-06-16 | 2007-12-20 | Harris Corporation | Systems and methods for a protocol transformation gateway for quality of service |
US20070291768A1 (en) * | 2006-06-16 | 2007-12-20 | Harris Corporation | Method and system for content-based differentiation and sequencing as a mechanism of prioritization for QOS |
US7916626B2 (en) | 2006-06-19 | 2011-03-29 | Harris Corporation | Method and system for fault-tolerant quality of service |
US8730981B2 (en) * | 2006-06-20 | 2014-05-20 | Harris Corporation | Method and system for compression based quality of service |
US20070291765A1 (en) * | 2006-06-20 | 2007-12-20 | Harris Corporation | Systems and methods for dynamic mode-driven link management |
US7769028B2 (en) * | 2006-06-21 | 2010-08-03 | Harris Corporation | Systems and methods for adaptive throughput management for event-driven message-based data |
US7787380B1 (en) | 2006-06-30 | 2010-08-31 | Juniper Networks, Inc. | Resource reservation protocol with traffic engineering point to multi-point label switched path hierarchy |
US7839862B1 (en) | 2006-06-30 | 2010-11-23 | Juniper Networks, Inc. | Upstream label assignment for the label distribution protocol |
US8793361B1 (en) * | 2006-06-30 | 2014-07-29 | Blue Coat Systems, Inc. | Traffic synchronization across multiple devices in wide area network topologies |
US7742482B1 (en) | 2006-06-30 | 2010-06-22 | Juniper Networks, Inc. | Upstream label assignment for the resource reservation protocol with traffic engineering |
WO2008008863A2 (en) * | 2006-07-12 | 2008-01-17 | Sipera Systems, Inc. | System, method and apparatus for troubleshooting an ip network |
US20080013559A1 (en) * | 2006-07-14 | 2008-01-17 | Smith Donald L | Systems and methods for applying back-pressure for sequencing in quality of service |
US20080019376A1 (en) * | 2006-07-21 | 2008-01-24 | Sbc Knowledge Ventures, L.P. | Inline network element which shares addresses of neighboring network elements |
JP4064429B2 (en) * | 2006-07-26 | 2008-03-19 | 株式会社コナミデジタルエンタテインメント | GAME SYSTEM, GAME TERMINAL, AND SERVER DEVICE |
JP4064430B2 (en) * | 2006-07-26 | 2008-03-19 | 株式会社コナミデジタルエンタテインメント | GAME SYSTEM, GAME TERMINAL, AND SERVER DEVICE |
US8300653B2 (en) * | 2006-07-31 | 2012-10-30 | Harris Corporation | Systems and methods for assured communications with quality of service |
US20100241759A1 (en) * | 2006-07-31 | 2010-09-23 | Smith Donald L | Systems and methods for sar-capable quality of service |
US20080025318A1 (en) * | 2006-07-31 | 2008-01-31 | Harris Corporation | Systems and methods for dynamically customizable quality of service on the edge of a network |
US20100238801A1 (en) * | 2006-07-31 | 2010-09-23 | Smith Donald L | Method and system for stale data detection based quality of service |
KR100948799B1 (en) * | 2006-08-07 | 2010-03-24 | 삼성전자주식회사 | Apparatus and method for allocating resource for simplex transmission in wideband wireless communication system |
JP4913502B2 (en) * | 2006-08-16 | 2012-04-11 | 株式会社エヌ・ティ・ティ・ドコモ | Communication control method, radio base station, and radio control station |
GB0616476D0 (en) * | 2006-08-18 | 2006-09-27 | Fujitsu Ltd | Communication systems |
US8015467B2 (en) * | 2006-08-30 | 2011-09-06 | Kyocera Corporation | Communication system, communication apparatus and communication method |
US8041806B2 (en) * | 2006-09-11 | 2011-10-18 | Alcatel Lucent | Targeted electronic content delivery control systems and methods |
US7539783B2 (en) | 2006-09-22 | 2009-05-26 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library, including removable media |
EP2384043B1 (en) | 2006-10-02 | 2015-07-08 | Panasonic Intellectual Property Corporation of America | Sequence allocation method in mobile communication system |
US8484612B2 (en) * | 2006-10-04 | 2013-07-09 | Welch Allyn, Inc. | Application generator for a dynamic medical object information base |
US7885214B2 (en) * | 2006-10-17 | 2011-02-08 | Intel Corporation | Device, system, and method for partitioning and framing communication signals in broadband wireless access networks |
US8233565B2 (en) * | 2006-10-20 | 2012-07-31 | Broadcom Corporation | Method and system for high speed wireless data transmission between communication devices |
KR100911123B1 (en) * | 2006-11-01 | 2009-08-11 | 삼성전자주식회사 | Apparatus and method for resource allocation for multicast data in broadband wireless access system |
US20080112349A1 (en) * | 2006-11-13 | 2008-05-15 | Motorola, Inc. | System and method for providing internet protocol multicast communications over a wireless broadband data network |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
JP4189422B2 (en) * | 2006-11-14 | 2008-12-03 | 株式会社東芝 | Broadcast TS distribution system, broadcast TS distribution device, user terminal device and distribution method used in this system |
TWI336189B (en) * | 2006-12-07 | 2011-01-11 | Inst Information Industry | Heterogeneous network transmission apparatus,method,application program and computer readable medium capable of transmitting a packet with a plurality of network paths according to a dispatch ratio |
KR20080052042A (en) * | 2006-12-07 | 2008-06-11 | 삼성전자주식회사 | Method and apparatus for multicasting data |
US8559610B2 (en) * | 2006-12-13 | 2013-10-15 | Qualcomm Incorporated | Method and apparatus for allocating network resources in a group communication system |
EP1936853B1 (en) * | 2006-12-20 | 2018-11-21 | Panasonic Intellectual Property Corporation of America | Avoidance of feedback collision in mobile communications |
US7831566B2 (en) * | 2006-12-22 | 2010-11-09 | Commvault Systems, Inc. | Systems and methods of hierarchical storage management, such as global management of storage operations |
WO2008078394A1 (en) * | 2006-12-26 | 2008-07-03 | Fujitsu Limited | Wireless communication method, wireless control station, and wireless base station |
US9826197B2 (en) | 2007-01-12 | 2017-11-21 | Activevideo Networks, Inc. | Providing television broadcasts over a managed network and interactive content over an unmanaged network to a client device |
US9355681B2 (en) | 2007-01-12 | 2016-05-31 | Activevideo Networks, Inc. | MPEG objects and systems and methods for using MPEG objects |
US8045527B2 (en) * | 2007-01-18 | 2011-10-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Load estimation for a cell in a wireless network |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US9106606B1 (en) | 2007-02-05 | 2015-08-11 | F5 Networks, Inc. | Method, intermediate device and computer program code for maintaining persistency |
US7768923B2 (en) * | 2007-02-09 | 2010-08-03 | Cisco Technology, Inc. | Packet aging in a wireless network |
US20080199894A1 (en) | 2007-02-15 | 2008-08-21 | Abbott Diabetes Care, Inc. | Device and method for automatic data acquisition and/or detection |
US8014322B2 (en) * | 2007-02-26 | 2011-09-06 | Cisco, Technology, Inc. | Diagnostic tool for troubleshooting multimedia streaming applications |
US7633385B2 (en) | 2007-02-28 | 2009-12-15 | Ucontrol, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
JP4894563B2 (en) * | 2007-03-07 | 2012-03-14 | 日本電気株式会社 | Communication device |
US20080220746A1 (en) * | 2007-03-08 | 2008-09-11 | Nokia Corporation | Key establishment utilizing link privacy |
EP1968251A1 (en) * | 2007-03-09 | 2008-09-10 | NTT DoCoMo, Inc. | Method and apparatus for QoS resource reservation and configuration of multicast network resources |
BRPI0721398A2 (en) | 2007-03-14 | 2014-03-04 | Hewlett Packard Development Co | "MIDIA COLLABORATION SYSTEM AND MIDIA COLLABORATION METHOD" |
EP2135376A4 (en) * | 2007-03-22 | 2012-12-19 | Nielsen Co Us Llc | Digital rights management and audience measurement systems and methods |
US9338024B2 (en) * | 2007-04-11 | 2016-05-10 | Arris Enterprises, Inc. | Extended layer two tunneling protocol applications and architectures |
US7768387B2 (en) | 2007-04-14 | 2010-08-03 | Abbott Diabetes Care Inc. | Method and apparatus for providing dynamic multi-stage signal amplification in a medical device |
US8451986B2 (en) | 2007-04-23 | 2013-05-28 | Icontrol Networks, Inc. | Method and system for automatically providing alternate network access for telecommunications |
EP2153673B1 (en) * | 2007-05-02 | 2020-01-01 | Tyco Fire & Security GmbH | Wireless communication system |
CN103220095B (en) * | 2007-05-04 | 2016-04-20 | 诺基亚通信公司 | Aggregated HARQ report |
US8665091B2 (en) | 2007-05-08 | 2014-03-04 | Abbott Diabetes Care Inc. | Method and device for determining elapsed sensor life |
US8456301B2 (en) | 2007-05-08 | 2013-06-04 | Abbott Diabetes Care Inc. | Analyte monitoring system and methods |
MX2009012199A (en) * | 2007-05-10 | 2010-01-18 | Xg Technology Inc | Mobile handset information stream. |
US9209982B2 (en) * | 2007-05-18 | 2015-12-08 | Cisco Technology, Inc. | Charging for network services based on delivered quality of service |
EP2159976A4 (en) * | 2007-05-21 | 2014-03-12 | Fujitsu Ltd | Relay device and relay method |
WO2008144087A1 (en) * | 2007-05-21 | 2008-11-27 | Nielsen Media Research, Inc. | Methods and apparatus to monitor content distributed by the internet |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11646907B2 (en) * | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US12003387B2 (en) | 2012-06-27 | 2024-06-04 | Comcast Cable Communications, Llc | Control system user interface |
US20080311903A1 (en) * | 2007-06-14 | 2008-12-18 | Microsoft Corporation | Techniques for managing dual-channel wireless devices |
US20080318630A1 (en) * | 2007-06-25 | 2008-12-25 | Qualcomm Incorporated | Graceful coexistence for multiple communication protocols |
US20090010259A1 (en) * | 2007-07-08 | 2009-01-08 | Alexander Sirotkin | Device, system, and method of classification of communication traffic |
WO2009014706A1 (en) | 2007-07-23 | 2009-01-29 | Rod Brittner | Quality of service and streaming attributes for a data storage device |
GB2453771B (en) * | 2007-07-31 | 2009-08-05 | Hewlett Packard Development Co | Synthetic bridging |
US8014400B2 (en) * | 2007-08-10 | 2011-09-06 | Sharp Laboratories Of America, Inc. | Method for allocating data packet transmission among multiple links of a network, and network device and computer program product implementing the method |
WO2009022295A2 (en) * | 2007-08-13 | 2009-02-19 | Nokia Corporation | Mapping of uplink ack in tdd with asymmetric frame structure |
US7720986B2 (en) * | 2007-08-24 | 2010-05-18 | At&T Intellectual Property I, L.P. | Method and system for media adaption |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US8706976B2 (en) | 2007-08-30 | 2014-04-22 | Commvault Systems, Inc. | Parallel access virtual tape library and drives |
KR101548026B1 (en) | 2007-09-11 | 2015-08-27 | 와이-랜, 인코포레이티드 | Persistent resource allocation |
US20090077256A1 (en) * | 2007-09-17 | 2009-03-19 | Mbit Wireless, Inc. | Dynamic change of quality of service for enhanced multi-media streaming |
US7996520B2 (en) | 2007-09-19 | 2011-08-09 | Cisco Technology, Inc. | Behavioral classification of communication sessions using active session initiation |
US8565137B2 (en) * | 2007-09-24 | 2013-10-22 | Qualcomm Incorporated | Tracking locations of multicast group members within a wireless communication system |
JP2009076172A (en) * | 2007-09-25 | 2009-04-09 | Hitachi Ltd | Data transmission method, optical disk recording method and optical disk recording apparatus |
CN102217228B (en) | 2007-09-26 | 2014-07-16 | Nicira股份有限公司 | Network operating system for managing and securing networks |
US8713393B2 (en) * | 2007-10-02 | 2014-04-29 | Lantiq Deutschland Gmbh | Retransmission and retransmission request in data communication systems |
US9092380B1 (en) * | 2007-10-11 | 2015-07-28 | Norberto Menendez | System and method of communications with supervised interaction |
US8125926B1 (en) | 2007-10-16 | 2012-02-28 | Juniper Networks, Inc. | Inter-autonomous system (AS) virtual private local area network service (VPLS) |
US7978646B2 (en) * | 2007-10-19 | 2011-07-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Hybrid contention-based and schedule-based access to a communication link |
WO2009054822A1 (en) * | 2007-10-23 | 2009-04-30 | Thomson Licensing | Method and apparatus for adaptive forward error correction with merged automatic repeat request for reliable multicast in wireless local area networks |
US9479967B1 (en) * | 2007-10-26 | 2016-10-25 | Genband Us Llc | Enhanced media gateway |
CN101426267B (en) * | 2007-11-02 | 2013-11-06 | 中国移动通信集团公司 | Resource scheduling method and apparatus |
US8659427B2 (en) | 2007-11-09 | 2014-02-25 | Proxense, Llc | Proximity-sensor supporting multiple application services |
FR2923972B1 (en) * | 2007-11-15 | 2010-02-26 | Radiotelephone Sfr | METHOD AND SYSTEM FOR MANAGING COMMUNICATIONS |
FR2924242B1 (en) * | 2007-11-23 | 2009-12-25 | Thales Sa | METHOD FOR RESERVATION WITH LATENCY AND FLOW GUARANTEE IN A DYNAMIC ALLOCATION NETWORK OF TIME CRANES |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US8687650B2 (en) | 2007-12-07 | 2014-04-01 | Nsgdatacom, Inc. | System, method, and computer program product for connecting or coupling analog audio tone based communications systems over a packet data network |
KR100962533B1 (en) | 2007-12-17 | 2010-06-14 | 한국전자통신연구원 | Resource allocation method and apparatus in distributed mac for wireless personal area networks |
US9251332B2 (en) | 2007-12-19 | 2016-02-02 | Proxense, Llc | Security system and method for controlling access to computing resources |
EP2223501B1 (en) * | 2007-12-19 | 2015-02-18 | Telefonaktiebolaget LM Ericsson (publ) | Publish/subscribe networks |
US8400971B1 (en) * | 2008-01-10 | 2013-03-19 | Sprint Spectrum L.P. | Reclamation of EV-DO sessions based on latency-sensitivity |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
WO2009102979A2 (en) | 2008-02-14 | 2009-08-20 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US20090215438A1 (en) * | 2008-02-23 | 2009-08-27 | Ajay Mittal | Methods for performing transparent callback |
US9497494B1 (en) * | 2008-02-29 | 2016-11-15 | Clearwire Ip Holdings Llc | Broadcast service channel optimization for TV services |
US8363641B2 (en) | 2008-03-07 | 2013-01-29 | At&T Intellectual Property I, Lp | Methods and apparatus to control a flash crowd event in a voice over Internet protocol (VoIP) network |
US7936780B1 (en) | 2008-03-12 | 2011-05-03 | Juniper Networks, Inc. | Hierarchical label distribution protocol for computer networks |
EP2106193A1 (en) * | 2008-03-28 | 2009-09-30 | Nokia Siemens Networks Oy | Gateway device for coupling a local network with a wireless access network, base station of a wireless access network and method for exchanging information between a local network and a wireless access network |
CN102016975A (en) * | 2008-03-28 | 2011-04-13 | 寇平公司 | Handheld wireless display device having high-resolution display suitable for use as a mobile internet device |
WO2009126732A2 (en) | 2008-04-08 | 2009-10-15 | Proxense, Llc | Automated service-based order processing |
US8005095B2 (en) * | 2008-04-29 | 2011-08-23 | Arris Group, Inc. | Carrier ethernet over DOCSIS |
WO2009135290A1 (en) * | 2008-05-09 | 2009-11-12 | Research In Motion Limited | Methods and apparatus for prioritizing assignment of a packet data session for a plurality of applications of a mobile communication device |
JP5058072B2 (en) * | 2008-05-26 | 2012-10-24 | 株式会社東芝 | Wireless communication device |
US20090296737A1 (en) * | 2008-06-03 | 2009-12-03 | Ram Arye | Method and system for connecting two nodes over multiple communication links |
US8265078B2 (en) * | 2008-06-08 | 2012-09-11 | Apple Inc. | Routing table build algorithm for a routing table that uses a search key constructed from packet destination address and outbound interface |
US20170185278A1 (en) | 2008-08-11 | 2017-06-29 | Icontrol Networks, Inc. | Automation system user interface |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US9838750B2 (en) * | 2008-08-20 | 2017-12-05 | At&T Intellectual Property I, L.P. | System and method for retrieving a previously transmitted portion of television program content |
US8626822B2 (en) * | 2008-08-28 | 2014-01-07 | Hewlett-Packard Development Company, L.P. | Method for implementing network resource access functions into software applications |
KR101019713B1 (en) * | 2008-09-02 | 2011-03-07 | 한국과학기술원 | Method of resource allocation for orthogonal frequency division multiple access wireless systems |
US8737930B2 (en) * | 2008-09-05 | 2014-05-27 | Honeywell International Inc. | Handheld apparatus and method for determining the reliability of a network connection at a site |
US20100070466A1 (en) * | 2008-09-15 | 2010-03-18 | Anand Prahlad | Data transfer techniques within data storage devices, such as network attached storage performing data migration |
WO2010032533A1 (en) * | 2008-09-19 | 2010-03-25 | 日本電気株式会社 | Network protocol processing system and network protocol processing method |
US9716918B1 (en) | 2008-11-10 | 2017-07-25 | Winview, Inc. | Interactive advertising system |
EP2347611A4 (en) * | 2008-11-11 | 2014-12-17 | Aeronix Inc | Method and apparatus for improved secure transmission between wireless communication components |
US7929557B2 (en) * | 2008-11-14 | 2011-04-19 | Juniper Networks, Inc. | Summarization and longest-prefix match within MPLS networks |
KR101599845B1 (en) * | 2008-12-05 | 2016-03-04 | 엘지전자 주식회사 | Method for executing CoMP |
US8077726B1 (en) | 2008-12-10 | 2011-12-13 | Juniper Networks, Inc. | Fast reroute for multiple label switched paths sharing a single interface |
US8121129B2 (en) * | 2008-12-15 | 2012-02-21 | International Business Machines Corporation | Optimizing throughput of data in a communications network |
US9414401B2 (en) * | 2008-12-15 | 2016-08-09 | At&T Intellectual Property I, L.P. | Opportunistic service management for elastic applications |
US10737149B2 (en) | 2008-12-18 | 2020-08-11 | Karsten Manufacturing Corporation | Golf clubs and golf club heads having interchangeable rear body members |
KR101152958B1 (en) * | 2008-12-19 | 2012-06-08 | 한국전자통신연구원 | apparatus and method for hierarchical packet inspection |
US9049141B2 (en) * | 2008-12-22 | 2015-06-02 | At&T Intellectual Property I, L.P. | User-controlled network video management |
US20100159916A1 (en) * | 2008-12-24 | 2010-06-24 | Ezer Oren | Reducing Radio Frequency Radiation Intensity Near Users of a Cellular Network |
US20100177080A1 (en) * | 2009-01-13 | 2010-07-15 | Metrologic Instruments, Inc. | Electronic-ink signage device employing thermal packaging for outdoor weather applications |
US20100177076A1 (en) * | 2009-01-13 | 2010-07-15 | Metrologic Instruments, Inc. | Edge-lit electronic-ink display device for use in indoor and outdoor environments |
US8457013B2 (en) | 2009-01-13 | 2013-06-04 | Metrologic Instruments, Inc. | Wireless dual-function network device dynamically switching and reconfiguring from a wireless network router state of operation into a wireless network coordinator state of operation in a wireless communication network |
US20100177750A1 (en) * | 2009-01-13 | 2010-07-15 | Metrologic Instruments, Inc. | Wireless Diplay sensor communication network |
US8234507B2 (en) | 2009-01-13 | 2012-07-31 | Metrologic Instruments, Inc. | Electronic-ink display device employing a power switching mechanism automatically responsive to predefined states of device configuration |
JP4650573B2 (en) * | 2009-01-22 | 2011-03-16 | ソニー株式会社 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, PROGRAM, AND COMMUNICATION METHOD |
US20100218191A1 (en) * | 2009-02-24 | 2010-08-26 | Kannan Shivkumar | Apparatus and Method for Processing Management Requests |
US8780762B2 (en) * | 2009-03-11 | 2014-07-15 | Sony Corporation | Node query in ad hoc home mesh network |
US8761174B2 (en) * | 2009-03-11 | 2014-06-24 | Sony Corporation | Quality of service traffic recognition and packet classification home mesh network |
US8861445B2 (en) * | 2009-03-11 | 2014-10-14 | Sony Cororation | Multi-channel single radio communication in home mesh network |
US20100232400A1 (en) * | 2009-03-11 | 2010-09-16 | Sony Corporation | Virtualizing single radio for multiple wireless interfaces in home mesh network |
US7974297B2 (en) * | 2009-03-11 | 2011-07-05 | Sony Corporation | Quality of service queue management in home mesh network |
US8223786B2 (en) * | 2009-03-11 | 2012-07-17 | Sony Corporation | Quality of service scheduling for home mesh network |
US8194593B2 (en) | 2009-03-11 | 2012-06-05 | Sony Corporation | Quality of service architecture for home mesh network |
AU2010232526B2 (en) * | 2009-04-01 | 2014-06-26 | Nicira, Inc. | Method and apparatus for implementing and managing virtual switches |
EP2493134B1 (en) | 2009-04-02 | 2017-06-07 | Telefonaktiebolaget LM Ericsson (publ) | Techniques for Handling Network Traffic |
US8638211B2 (en) | 2009-04-30 | 2014-01-28 | Icontrol Networks, Inc. | Configurable controller and interface for home SMA, phone and multimedia |
US8311207B2 (en) * | 2009-05-04 | 2012-11-13 | Avaya Inc. | Efficient and cost-effective distribution call admission control |
EP2433392B1 (en) * | 2009-05-19 | 2014-07-23 | Telefonaktiebolaget L M Ericsson (publ) | Establishing a communication session |
US8665724B2 (en) | 2009-06-12 | 2014-03-04 | Cygnus Broadband, Inc. | Systems and methods for prioritizing and scheduling packets in a communication network |
US9065779B2 (en) | 2009-06-12 | 2015-06-23 | Wi-Lan Labs, Inc. | Systems and methods for prioritizing and scheduling packets in a communication network |
US8854992B2 (en) * | 2009-07-09 | 2014-10-07 | Motorola Mobility Llc | Artificial delay inflation and jitter reduction to improve TCP throughputs |
JP5721713B2 (en) * | 2009-07-23 | 2015-05-20 | ノキア コーポレイション | Method and apparatus for reducing power consumption when operating as a Bluetooth Low Energy device |
AU2010275473C1 (en) | 2009-07-24 | 2014-02-27 | Welch Allyn, Inc. | Configurable health-care equipment apparatus |
WO2011018868A1 (en) * | 2009-08-10 | 2011-02-17 | 日本電気株式会社 | Distribution server |
US8548417B2 (en) * | 2009-08-10 | 2013-10-01 | Freeport Technologies, Inc. | Secure control for desktop secure video teleconferencing |
WO2011026147A1 (en) | 2009-08-31 | 2011-03-03 | Abbott Diabetes Care Inc. | Analyte signal processing device and methods |
US10836483B2 (en) | 2009-09-11 | 2020-11-17 | Aerovironment, Inc. | Ad hoc dynamic data link repeater |
US9084276B2 (en) | 2009-09-11 | 2015-07-14 | Aerovironment, Inc. | Dynamic transmission control for a wireless network |
KR101263380B1 (en) * | 2009-11-11 | 2013-05-23 | 한국전자통신연구원 | System and method for supporting Logical Sensor Networks |
JP5415625B2 (en) * | 2009-11-24 | 2014-02-12 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | Data traffic control in communication networks |
US8861357B2 (en) * | 2009-11-30 | 2014-10-14 | Entropic Communications, Inc. | Method and apparatus for communicating unicast PQoS DFID information |
US8010677B2 (en) * | 2009-12-02 | 2011-08-30 | Avaya Inc. | Alternative bandwidth management algorithm |
US20110154420A1 (en) | 2009-12-17 | 2011-06-23 | Level 3 Communications, Llc | Data Feed Resource Reservation System |
US9268813B2 (en) * | 2009-12-24 | 2016-02-23 | Samsung Electronics Co., Ltd. | Terminal device based on content name, and method for routing based on content name |
US8422514B1 (en) | 2010-02-09 | 2013-04-16 | Juniper Networks, Inc. | Dynamic configuration of cross-domain pseudowires |
US20110206033A1 (en) * | 2010-02-22 | 2011-08-25 | Electronics And Telecommunications Research Institute | Communication method between wireless nodes |
US9967632B2 (en) * | 2010-03-08 | 2018-05-08 | Rovi Technologies Corporation | Emulated television tuner via execution of software by a computing device |
US8310957B1 (en) | 2010-03-09 | 2012-11-13 | Juniper Networks, Inc. | Minimum-cost spanning trees of unicast tunnels for multicast distribution |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US8971345B1 (en) * | 2010-03-22 | 2015-03-03 | Riverbed Technology, Inc. | Method and apparatus for scheduling a heterogeneous communication flow |
JP5628408B2 (en) | 2010-03-24 | 2014-11-19 | トムソン ライセンシングThomson Licensing | Method and apparatus for monitoring network service quality |
US9455897B2 (en) | 2010-04-06 | 2016-09-27 | Qualcomm Incorporated | Cooperative bandwidth aggregation using multipath transport |
US8848626B2 (en) | 2010-04-07 | 2014-09-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Scheduling retransmissions for contention-based access |
US8238924B2 (en) | 2010-04-30 | 2012-08-07 | The United States Of America As Represented By The Secretary Of The Navy | Real-time optimization of allocation of resources |
US20110267948A1 (en) * | 2010-05-03 | 2011-11-03 | Koc Ali T | Techniques for communicating and managing congestion in a wireless network |
CN102985915B (en) | 2010-05-10 | 2016-05-11 | 网际网路控制架构网络有限公司 | Control system user interface |
US20110282980A1 (en) * | 2010-05-11 | 2011-11-17 | Udaya Kumar | Dynamic protection of a resource during sudden surges in traffic |
US9183560B2 (en) | 2010-05-28 | 2015-11-10 | Daniel H. Abelow | Reality alternate |
EP2391173B1 (en) * | 2010-05-31 | 2013-06-05 | Research In Motion Limited | Method and apparatus for back-off algorithm having different retry time classes |
US9832107B2 (en) * | 2010-06-10 | 2017-11-28 | Infinera Corporation | Misconnection avoidance on networks |
US8750164B2 (en) | 2010-07-06 | 2014-06-10 | Nicira, Inc. | Hierarchical managed switch architecture |
US10103939B2 (en) | 2010-07-06 | 2018-10-16 | Nicira, Inc. | Network control apparatus and method for populating logical datapath sets |
US9525647B2 (en) | 2010-07-06 | 2016-12-20 | Nicira, Inc. | Network control apparatus and method for creating and modifying logical switching elements |
US8964528B2 (en) | 2010-07-06 | 2015-02-24 | Nicira, Inc. | Method and apparatus for robust packet distribution among hierarchical managed switching elements |
US9680750B2 (en) | 2010-07-06 | 2017-06-13 | Nicira, Inc. | Use of tunnels to hide network addresses |
US9322974B1 (en) | 2010-07-15 | 2016-04-26 | Proxense, Llc. | Proximity-based system for object tracking |
USD632397S1 (en) | 2010-07-22 | 2011-02-08 | Welch Allyn, Inc. | Portions of a patient-monitor housing |
USD671222S1 (en) | 2010-07-22 | 2012-11-20 | Welch Allyn, Inc. | Module for a patient-monitor or the like |
USD635681S1 (en) | 2010-07-22 | 2011-04-05 | Welch Allyn, Inc. | Patient-monitor housing |
ES2742425T3 (en) | 2010-07-29 | 2020-02-14 | Ericsson Telefon Ab L M | Network traffic management through fixed access |
TWI427994B (en) * | 2010-08-23 | 2014-02-21 | Hon Hai Prec Ind Co Ltd | Object of data model deleting identification device and using the same |
US10027508B2 (en) * | 2010-08-31 | 2018-07-17 | Siklu Communication ltd. | Extended ring-like communication architecture |
WO2012037707A1 (en) * | 2010-09-24 | 2012-03-29 | Intel Corporation | Method and system for access point congestion detection and reduction |
US8836467B1 (en) | 2010-09-28 | 2014-09-16 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US9244779B2 (en) | 2010-09-30 | 2016-01-26 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
US8843600B1 (en) * | 2010-09-30 | 2014-09-23 | Amazon Technologies, Inc. | Providing private access to network-accessible services |
US11030305B2 (en) | 2010-10-04 | 2021-06-08 | Unisys Corporation | Virtual relay device for providing a secure connection to a remote device |
US9021541B2 (en) | 2010-10-14 | 2015-04-28 | Activevideo Networks, Inc. | Streaming digital video between video devices using a cable television system |
US8601133B1 (en) | 2010-12-14 | 2013-12-03 | Juniper Networks, Inc. | Highly scalable data center architecture with address resolution protocol (ARP)-free servers |
US8699344B2 (en) * | 2010-12-15 | 2014-04-15 | At&T Intellectual Property I, L.P. | Method and apparatus for managing a degree of parallelism of streams |
CN102546388B (en) | 2010-12-16 | 2014-08-13 | 国际商业机器公司 | Method and system for packet QOS level attribution |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US9147337B2 (en) | 2010-12-17 | 2015-09-29 | Icontrol Networks, Inc. | Method and system for logging security event data |
US9094483B2 (en) * | 2011-01-14 | 2015-07-28 | Apple Inc. | System and method for collecting and evaluating statistics to establish network connections |
JP5691543B2 (en) * | 2011-01-18 | 2015-04-01 | 富士通株式会社 | Optical transmission equipment |
IL210900A (en) | 2011-01-27 | 2015-08-31 | Verint Systems Ltd | System and method for efficient classification and processing of network traffic |
US9292329B2 (en) * | 2011-02-10 | 2016-03-22 | Microsoft Technology Licensing, Llc | Virtual switch interceptor |
US8857716B1 (en) | 2011-02-21 | 2014-10-14 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US8825900B1 (en) | 2011-04-05 | 2014-09-02 | Nicira, Inc. | Method and apparatus for stateless transport layer tunneling |
EP2695388B1 (en) * | 2011-04-07 | 2017-06-07 | ActiveVideo Networks, Inc. | Reduction of latency in video distribution networks using adaptive bit rates |
US9043452B2 (en) | 2011-05-04 | 2015-05-26 | Nicira, Inc. | Network control apparatus and method for port isolation |
US9246838B1 (en) | 2011-05-27 | 2016-01-26 | Juniper Networks, Inc. | Label switched path setup using fast reroute bypass tunnel |
US9451415B2 (en) | 2011-06-17 | 2016-09-20 | Qualcomm Incorporated | Cooperative data transport |
US8718261B2 (en) | 2011-07-21 | 2014-05-06 | Avaya Inc. | Efficient and cost-effective distributed call admission control |
US8918102B2 (en) | 2011-07-29 | 2014-12-23 | At&T Intellectual Property I, L.P. | Method and system for selecting from a set of candidate frequency bands associated with a wireless access point |
US9264353B2 (en) * | 2011-09-22 | 2016-02-16 | Qualcomm Incorporated | Dynamic subflow control for a multipath transport connection in a wireless communication network |
EP2764680B1 (en) * | 2011-10-06 | 2017-04-26 | Telefonaktiebolaget LM Ericsson (publ) | Transmission of data to or from a node of a mobile network |
KR20130040090A (en) * | 2011-10-13 | 2013-04-23 | 삼성전자주식회사 | Apparatus and method for delivering multimedia data in hybrid network |
US9178833B2 (en) | 2011-10-25 | 2015-11-03 | Nicira, Inc. | Chassis controller |
CN103108329B (en) * | 2011-11-09 | 2015-12-16 | 华为技术有限公司 | The method of facilitating communications, terminal and base station |
ES2628520T3 (en) * | 2011-11-14 | 2017-08-03 | Alcatel Lucent | Procedure and equipment to establish a connection through a virtual private network |
US9225614B2 (en) * | 2011-11-17 | 2015-12-29 | Google Inc. | Service and application layer optimization using variable rate optical transmission |
WO2013079225A1 (en) * | 2011-11-28 | 2013-06-06 | Telefonaktiebolaget L M Ericsson (Publ) | Building topology in communications networks |
WO2013106390A1 (en) | 2012-01-09 | 2013-07-18 | Activevideo Networks, Inc. | Rendering of an interactive lean-backward user interface on a television |
US8553639B2 (en) | 2012-02-07 | 2013-10-08 | Hitachi, Ltd. | Allocation of subframes for uplink and downlink transmission in TDD-LTE |
US8832274B2 (en) * | 2012-03-09 | 2014-09-09 | Business Objects Software Limited | Apportioned queue for resource allocation |
US9515942B2 (en) | 2012-03-15 | 2016-12-06 | Intel Corporation | Method and system for access point congestion detection and reduction |
AU2013202553B2 (en) | 2012-03-30 | 2015-10-01 | Commvault Systems, Inc. | Information management of mobile device data |
US9123084B2 (en) | 2012-04-12 | 2015-09-01 | Activevideo Networks, Inc. | Graphical application integration with MPEG objects |
EP2748993B1 (en) | 2012-04-18 | 2015-09-02 | Nicira Inc. | Using transactions to compute and propagate network forwarding state |
US9300570B2 (en) * | 2012-05-22 | 2016-03-29 | Harris Corporation | Multi-tunnel virtual private network |
US8792347B2 (en) * | 2012-06-01 | 2014-07-29 | Opera Software Ireland Limited | Real-time network monitoring and subscriber identification with an on-demand appliance |
US8837479B1 (en) | 2012-06-27 | 2014-09-16 | Juniper Networks, Inc. | Fast reroute between redundant multicast streams |
US9231892B2 (en) | 2012-07-09 | 2016-01-05 | Vmware, Inc. | Distributed virtual switch configuration and state management |
JP2015179882A (en) * | 2012-07-23 | 2015-10-08 | パナソニック株式会社 | Electronic apparatus |
US9049148B1 (en) | 2012-09-28 | 2015-06-02 | Juniper Networks, Inc. | Dynamic forwarding plane reconfiguration in a network device |
US8711690B2 (en) | 2012-10-03 | 2014-04-29 | LiveQoS Inc. | System and method for a TCP mapper |
US9143454B2 (en) * | 2012-10-03 | 2015-09-22 | LiveQoS Inc. | System and method for a TCP mapper |
US10917299B2 (en) | 2012-10-05 | 2021-02-09 | Aaa Internet Publishing Inc. | Method of using a proxy network to normalize online connections by executing computer-executable instructions stored on a non-transitory computer-readable medium |
US11050669B2 (en) * | 2012-10-05 | 2021-06-29 | Aaa Internet Publishing Inc. | Method and system for managing, optimizing, and routing internet traffic from a local area network (LAN) to internet based servers |
US11838212B2 (en) | 2012-10-05 | 2023-12-05 | Aaa Internet Publishing Inc. | Method and system for managing, optimizing, and routing internet traffic from a local area network (LAN) to internet based servers |
USRE49392E1 (en) | 2012-10-05 | 2023-01-24 | Aaa Internet Publishing, Inc. | System and method for monitoring network connection quality by executing computer-executable instructions stored on a non-transitory computer-readable medium |
US8989008B2 (en) * | 2012-10-26 | 2015-03-24 | Verizon Patent And Licensing Inc. | Wirespeed TCP packet window field modification for networks having radio segments |
US9100698B2 (en) * | 2012-10-26 | 2015-08-04 | Motorola Solutions, Inc. | Systems and methods for sharing bandwidth across multiple video streams |
WO2014074650A2 (en) | 2012-11-08 | 2014-05-15 | Q Factor Communications Corp. | Method & apparatus for improving the performance of tcp and other network protocols in a communications network using proxy servers |
CA2891599A1 (en) | 2012-11-08 | 2014-05-15 | Q Factor Communications Corp. | Method & apparatus for improving the performance of tcp and other network protocols in a communications network |
US9113347B2 (en) | 2012-12-05 | 2015-08-18 | At&T Intellectual Property I, Lp | Backhaul link for distributed antenna system |
US10009065B2 (en) | 2012-12-05 | 2018-06-26 | At&T Intellectual Property I, L.P. | Backhaul link for distributed antenna system |
GB2510556A (en) | 2012-12-12 | 2014-08-13 | Microsoft Corp | Aggregating data prior to transmission using timer events |
US9069799B2 (en) | 2012-12-27 | 2015-06-30 | Commvault Systems, Inc. | Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system |
US9980114B2 (en) | 2013-03-15 | 2018-05-22 | Elwha Llc | Systems and methods for communication management |
US9713013B2 (en) | 2013-03-15 | 2017-07-18 | Elwha Llc | Protocols for providing wireless communications connectivity maps |
US8965288B2 (en) | 2012-12-31 | 2015-02-24 | Elwha Llc | Cost-effective mobile connectivity protocols |
US9832628B2 (en) | 2012-12-31 | 2017-11-28 | Elwha, Llc | Cost-effective mobile connectivity protocols |
US9635605B2 (en) | 2013-03-15 | 2017-04-25 | Elwha Llc | Protocols for facilitating broader access in wireless communications |
US9876762B2 (en) | 2012-12-31 | 2018-01-23 | Elwha Llc | Cost-effective mobile connectivity protocols |
US9781664B2 (en) | 2012-12-31 | 2017-10-03 | Elwha Llc | Cost-effective mobile connectivity protocols |
WO2014106199A1 (en) * | 2012-12-31 | 2014-07-03 | Elwha Llc | Cost-effective mobile connectivity protocols |
US9451394B2 (en) | 2012-12-31 | 2016-09-20 | Elwha Llc | Cost-effective mobile connectivity protocols |
US20140195102A1 (en) * | 2013-01-09 | 2014-07-10 | Martin D. Nathanson | Vehicle communications via wireless access vehicle environment |
US9602569B2 (en) * | 2013-02-14 | 2017-03-21 | Metaswitch Networks Limited | Management of a remote digital terminal |
US10314091B2 (en) | 2013-03-14 | 2019-06-04 | Microsoft Technology Licensing, Llc | Observation assisted bandwidth management |
US9596584B2 (en) | 2013-03-15 | 2017-03-14 | Elwha Llc | Protocols for facilitating broader access in wireless communications by conditionally authorizing a charge to an account of a third party |
US9843917B2 (en) | 2013-03-15 | 2017-12-12 | Elwha, Llc | Protocols for facilitating charge-authorized connectivity in wireless communications |
US9781554B2 (en) | 2013-03-15 | 2017-10-03 | Elwha Llc | Protocols for facilitating third party authorization for a rooted communication device in wireless communications |
US9807582B2 (en) | 2013-03-15 | 2017-10-31 | Elwha Llc | Protocols for facilitating broader access in wireless communications |
US9706382B2 (en) | 2013-03-15 | 2017-07-11 | Elwha Llc | Protocols for allocating communication services cost in wireless communications |
WO2014145921A1 (en) | 2013-03-15 | 2014-09-18 | Activevideo Networks, Inc. | A multiple-mode system and method for providing user selectable video content |
US9706060B2 (en) | 2013-03-15 | 2017-07-11 | Elwha Llc | Protocols for facilitating broader access in wireless communications |
US9813887B2 (en) | 2013-03-15 | 2017-11-07 | Elwha Llc | Protocols for facilitating broader access in wireless communications responsive to charge authorization statuses |
US9866706B2 (en) | 2013-03-15 | 2018-01-09 | Elwha Llc | Protocols for facilitating broader access in wireless communications |
US9693214B2 (en) | 2013-03-15 | 2017-06-27 | Elwha Llc | Protocols for facilitating broader access in wireless communications |
US20150304997A1 (en) * | 2013-03-26 | 2015-10-22 | Lg Electronics Inc. | Method for transmitting and receiving signal in multiple cell-based wireless communication system, and apparatus for same |
US8953500B1 (en) | 2013-03-29 | 2015-02-10 | Juniper Networks, Inc. | Branch node-initiated point to multi-point label switched path signaling with centralized path computation |
US9544205B2 (en) * | 2013-04-09 | 2017-01-10 | Twin Prime, Inc. | Cognitive data delivery optimizing system |
US9405898B2 (en) | 2013-05-10 | 2016-08-02 | Proxense, Llc | Secure element as a digital pocket |
US9432215B2 (en) | 2013-05-21 | 2016-08-30 | Nicira, Inc. | Hierarchical network managers |
JP6236221B2 (en) * | 2013-05-22 | 2017-11-22 | 富士通株式会社 | Management program, management device, and network system |
US9999038B2 (en) | 2013-05-31 | 2018-06-12 | At&T Intellectual Property I, L.P. | Remote distributed antenna system |
US9525524B2 (en) | 2013-05-31 | 2016-12-20 | At&T Intellectual Property I, L.P. | Remote distributed antenna system |
US9294785B2 (en) | 2013-06-06 | 2016-03-22 | Activevideo Networks, Inc. | System and method for exploiting scene graph information in construction of an encoded video sequence |
EP3005712A1 (en) | 2013-06-06 | 2016-04-13 | ActiveVideo Networks, Inc. | Overlay rendering of user interface onto source video |
US9219922B2 (en) | 2013-06-06 | 2015-12-22 | Activevideo Networks, Inc. | System and method for exploiting scene graph information in construction of an encoded video sequence |
US9276867B2 (en) * | 2013-06-28 | 2016-03-01 | Cisco Technology, Inc. | Hierarchical scheduling system with layer bypass including updating scheduling information of a scheduling layer for each item whether or not it bypasses the scheduling layer |
US9571304B2 (en) | 2013-07-08 | 2017-02-14 | Nicira, Inc. | Reconciliation of network state across physical domains |
US10218564B2 (en) | 2013-07-08 | 2019-02-26 | Nicira, Inc. | Unified replication mechanism for fault-tolerance of state |
US9973382B2 (en) | 2013-08-15 | 2018-05-15 | Nicira, Inc. | Hitless upgrade for network control applications |
WO2015035232A2 (en) | 2013-09-06 | 2015-03-12 | Vid Scale, Inc. | Quality of experience based queue management for routers for real-time video applications |
KR101484059B1 (en) | 2013-09-17 | 2015-01-20 | 성균관대학교산학협력단 | Method and apparatus for high speed wlan using multi-rate aware partitioning and cooperative transmission |
US9596126B2 (en) | 2013-10-10 | 2017-03-14 | Nicira, Inc. | Controller side method of generating and updating a controller assignment list |
US8897697B1 (en) | 2013-11-06 | 2014-11-25 | At&T Intellectual Property I, Lp | Millimeter-wave surface-wave communications |
US9209902B2 (en) | 2013-12-10 | 2015-12-08 | At&T Intellectual Property I, L.P. | Quasi-optical coupler |
CN110071905B (en) | 2013-12-20 | 2021-08-03 | 瑞典爱立信有限公司 | Method for providing a connection, border network and IP server |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
JP2015207819A (en) * | 2014-04-17 | 2015-11-19 | 株式会社リコー | Information processing apparatus, information processing system, communication control method, and program |
US9602422B2 (en) | 2014-05-05 | 2017-03-21 | Nicira, Inc. | Implementing fixed points in network state updates using generation numbers |
KR102344656B1 (en) * | 2014-07-11 | 2021-12-30 | 소니그룹주식회사 | Information processing device, information processing method, and program |
US9875127B2 (en) | 2014-08-22 | 2018-01-23 | Nicira, Inc. | Enabling uniform switch management in virtual infrastructure |
US9692101B2 (en) | 2014-08-26 | 2017-06-27 | At&T Intellectual Property I, L.P. | Guided wave couplers for coupling electromagnetic waves between a waveguide surface and a surface of a wire |
US9768833B2 (en) | 2014-09-15 | 2017-09-19 | At&T Intellectual Property I, L.P. | Method and apparatus for sensing a condition in a transmission medium of electromagnetic waves |
US10063280B2 (en) | 2014-09-17 | 2018-08-28 | At&T Intellectual Property I, L.P. | Monitoring and mitigating conditions in a communication network |
CN105517157A (en) * | 2014-09-24 | 2016-04-20 | 中兴通讯股份有限公司 | Uplink multi-user data transmission method and system in wireless local area network, and site |
EP3198464B1 (en) * | 2014-09-25 | 2019-02-06 | Hughes Network Systems, LLC | Application-aware multihoming for data traffic acceleration in data communications networks |
US9628854B2 (en) | 2014-09-29 | 2017-04-18 | At&T Intellectual Property I, L.P. | Method and apparatus for distributing content in a communication network |
US9615269B2 (en) | 2014-10-02 | 2017-04-04 | At&T Intellectual Property I, L.P. | Method and apparatus that provides fault tolerance in a communication network |
US9685992B2 (en) | 2014-10-03 | 2017-06-20 | At&T Intellectual Property I, L.P. | Circuit panel network and methods thereof |
US9503189B2 (en) | 2014-10-10 | 2016-11-22 | At&T Intellectual Property I, L.P. | Method and apparatus for arranging communication sessions in a communication system |
US9762289B2 (en) | 2014-10-14 | 2017-09-12 | At&T Intellectual Property I, L.P. | Method and apparatus for transmitting or receiving signals in a transportation system |
US9973299B2 (en) | 2014-10-14 | 2018-05-15 | At&T Intellectual Property I, L.P. | Method and apparatus for adjusting a mode of communication in a communication network |
CN104302008B (en) * | 2014-10-20 | 2019-03-26 | 上海电机学院 | A kind of wireless multi-hop network bandwidth allocation methods of comprehensive time-division and caching accounting |
US9564947B2 (en) | 2014-10-21 | 2017-02-07 | At&T Intellectual Property I, L.P. | Guided-wave transmission device with diversity and methods for use therewith |
US9769020B2 (en) | 2014-10-21 | 2017-09-19 | At&T Intellectual Property I, L.P. | Method and apparatus for responding to events affecting communications in a communication network |
US9520945B2 (en) | 2014-10-21 | 2016-12-13 | At&T Intellectual Property I, L.P. | Apparatus for providing communication services and methods thereof |
US9312919B1 (en) | 2014-10-21 | 2016-04-12 | At&T Intellectual Property I, Lp | Transmission device with impairment compensation and methods for use therewith |
US9577306B2 (en) | 2014-10-21 | 2017-02-21 | At&T Intellectual Property I, L.P. | Guided-wave transmission device and methods for use therewith |
US9780834B2 (en) | 2014-10-21 | 2017-10-03 | At&T Intellectual Property I, L.P. | Method and apparatus for transmitting electromagnetic waves |
US9653770B2 (en) | 2014-10-21 | 2017-05-16 | At&T Intellectual Property I, L.P. | Guided wave coupler, coupling module and methods for use therewith |
US9627768B2 (en) | 2014-10-21 | 2017-04-18 | At&T Intellectual Property I, L.P. | Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith |
US9350772B2 (en) | 2014-10-24 | 2016-05-24 | Ringcentral, Inc. | Systems and methods for making common services available across network endpoints |
US9398085B2 (en) | 2014-11-07 | 2016-07-19 | Ringcentral, Inc. | Systems and methods for initiating a peer-to-peer communication session |
DE102014222840A1 (en) * | 2014-11-10 | 2016-05-12 | Robert Bosch Gmbh | Predictive reservation of radio cells for uninterrupted communication with a data cloud |
US9544006B2 (en) | 2014-11-20 | 2017-01-10 | At&T Intellectual Property I, L.P. | Transmission device with mode division multiplexing and methods for use therewith |
US9997819B2 (en) | 2015-06-09 | 2018-06-12 | At&T Intellectual Property I, L.P. | Transmission medium and method for facilitating propagation of electromagnetic waves via a core |
US9461706B1 (en) | 2015-07-31 | 2016-10-04 | At&T Intellectual Property I, Lp | Method and apparatus for exchanging communication signals |
US10243784B2 (en) | 2014-11-20 | 2019-03-26 | At&T Intellectual Property I, L.P. | System for generating topology information and methods thereof |
US9800327B2 (en) | 2014-11-20 | 2017-10-24 | At&T Intellectual Property I, L.P. | Apparatus for controlling operations of a communication device and methods thereof |
US9654173B2 (en) | 2014-11-20 | 2017-05-16 | At&T Intellectual Property I, L.P. | Apparatus for powering a communication device and methods thereof |
US9680670B2 (en) | 2014-11-20 | 2017-06-13 | At&T Intellectual Property I, L.P. | Transmission device with channel equalization and control and methods for use therewith |
US10340573B2 (en) | 2016-10-26 | 2019-07-02 | At&T Intellectual Property I, L.P. | Launcher with cylindrical coupling device and methods for use therewith |
US9742462B2 (en) | 2014-12-04 | 2017-08-22 | At&T Intellectual Property I, L.P. | Transmission medium and communication interfaces and methods for use therewith |
US9954287B2 (en) | 2014-11-20 | 2018-04-24 | At&T Intellectual Property I, L.P. | Apparatus for converting wireless signals and electromagnetic waves and methods thereof |
US10009067B2 (en) | 2014-12-04 | 2018-06-26 | At&T Intellectual Property I, L.P. | Method and apparatus for configuring a communication interface |
EP3235177B1 (en) * | 2014-12-15 | 2020-09-30 | Nokia Solutions and Networks Oy | Measurement coordination in communications |
US9825734B2 (en) * | 2014-12-17 | 2017-11-21 | Cisco Technology, Inc. | VoIP system |
US9787594B2 (en) | 2015-01-08 | 2017-10-10 | Coriant Operations, Inc. | Procedures, apparatuses, systems, and computer program products for adaptive tunnel bandwidth by using software defined networking |
US10144036B2 (en) | 2015-01-30 | 2018-12-04 | At&T Intellectual Property I, L.P. | Method and apparatus for mitigating interference affecting a propagation of electromagnetic waves guided by a transmission medium |
US20160227229A1 (en) * | 2015-02-04 | 2016-08-04 | Harris Corporation | Mobile ad hoc network media aware networking element |
US9876570B2 (en) | 2015-02-20 | 2018-01-23 | At&T Intellectual Property I, Lp | Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith |
JP6338010B2 (en) | 2015-02-27 | 2018-06-06 | 日本電気株式会社 | Control apparatus, traffic control method, and computer program |
US9806895B1 (en) | 2015-02-27 | 2017-10-31 | Juniper Networks, Inc. | Fast reroute of redundant multicast streams |
US9749013B2 (en) | 2015-03-17 | 2017-08-29 | At&T Intellectual Property I, L.P. | Method and apparatus for reducing attenuation of electromagnetic waves guided by a transmission medium |
US9928144B2 (en) | 2015-03-30 | 2018-03-27 | Commvault Systems, Inc. | Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage |
US9967134B2 (en) | 2015-04-06 | 2018-05-08 | Nicira, Inc. | Reduction of network churn based on differences in input state |
US9948561B2 (en) | 2015-04-14 | 2018-04-17 | Cisco Technology, Inc. | Setting delay precedence on queues before a bottleneck link based on flow characteristics |
EP3318102A4 (en) * | 2015-04-20 | 2019-03-20 | Shoelace Wireless, Inc. | Systems for improved mobile internet speed and security |
US10224981B2 (en) | 2015-04-24 | 2019-03-05 | At&T Intellectual Property I, Lp | Passive electrical coupling device and methods for use therewith |
US9705561B2 (en) | 2015-04-24 | 2017-07-11 | At&T Intellectual Property I, L.P. | Directional coupling device and methods for use therewith |
US9948354B2 (en) | 2015-04-28 | 2018-04-17 | At&T Intellectual Property I, L.P. | Magnetic coupling device with reflective plate and methods for use therewith |
US9793954B2 (en) | 2015-04-28 | 2017-10-17 | At&T Intellectual Property I, L.P. | Magnetic coupling device and methods for use therewith |
US9490869B1 (en) | 2015-05-14 | 2016-11-08 | At&T Intellectual Property I, L.P. | Transmission medium having multiple cores and methods for use therewith |
US9748626B2 (en) | 2015-05-14 | 2017-08-29 | At&T Intellectual Property I, L.P. | Plurality of cables having different cross-sectional shapes which are bundled together to form a transmission medium |
US9871282B2 (en) | 2015-05-14 | 2018-01-16 | At&T Intellectual Property I, L.P. | At least one transmission medium having a dielectric surface that is covered at least in part by a second dielectric |
US10650940B2 (en) | 2015-05-15 | 2020-05-12 | At&T Intellectual Property I, L.P. | Transmission medium having a conductive material and methods for use therewith |
US10679767B2 (en) | 2015-05-15 | 2020-06-09 | At&T Intellectual Property I, L.P. | Transmission medium having a conductive material and methods for use therewith |
US9917341B2 (en) | 2015-05-27 | 2018-03-13 | At&T Intellectual Property I, L.P. | Apparatus and method for launching electromagnetic waves and for modifying radial dimensions of the propagating electromagnetic waves |
US10154493B2 (en) | 2015-06-03 | 2018-12-11 | At&T Intellectual Property I, L.P. | Network termination and methods for use therewith |
US10348391B2 (en) | 2015-06-03 | 2019-07-09 | At&T Intellectual Property I, L.P. | Client node device with frequency conversion and methods for use therewith |
US10812174B2 (en) | 2015-06-03 | 2020-10-20 | At&T Intellectual Property I, L.P. | Client node device and methods for use therewith |
US9866309B2 (en) | 2015-06-03 | 2018-01-09 | At&T Intellectual Property I, Lp | Host node device and methods for use therewith |
US9912381B2 (en) | 2015-06-03 | 2018-03-06 | At&T Intellectual Property I, Lp | Network termination and methods for use therewith |
US10103801B2 (en) | 2015-06-03 | 2018-10-16 | At&T Intellectual Property I, L.P. | Host node device and methods for use therewith |
US9913139B2 (en) | 2015-06-09 | 2018-03-06 | At&T Intellectual Property I, L.P. | Signal fingerprinting for authentication of communicating devices |
US9608692B2 (en) | 2015-06-11 | 2017-03-28 | At&T Intellectual Property I, L.P. | Repeater and methods for use therewith |
US10142086B2 (en) | 2015-06-11 | 2018-11-27 | At&T Intellectual Property I, L.P. | Repeater and methods for use therewith |
US9820146B2 (en) | 2015-06-12 | 2017-11-14 | At&T Intellectual Property I, L.P. | Method and apparatus for authentication and identity management of communicating devices |
US9667317B2 (en) | 2015-06-15 | 2017-05-30 | At&T Intellectual Property I, L.P. | Method and apparatus for providing security using network traffic adjustments |
US9640850B2 (en) | 2015-06-25 | 2017-05-02 | At&T Intellectual Property I, L.P. | Methods and apparatus for inducing a non-fundamental wave mode on a transmission medium |
US9865911B2 (en) | 2015-06-25 | 2018-01-09 | At&T Intellectual Property I, L.P. | Waveguide system for slot radiating first electromagnetic waves that are combined into a non-fundamental wave mode second electromagnetic wave on a transmission medium |
US9509415B1 (en) | 2015-06-25 | 2016-11-29 | At&T Intellectual Property I, L.P. | Methods and apparatus for inducing a fundamental wave mode on a transmission medium |
US9871666B2 (en) | 2015-06-25 | 2018-01-16 | AvaLAN Wireless Systems, Inc. | Intermediate unicast network and method for multicast data networks |
KR102554560B1 (en) * | 2015-07-07 | 2023-07-13 | 소니그룹주식회사 | Communication device and communication method |
US10044409B2 (en) | 2015-07-14 | 2018-08-07 | At&T Intellectual Property I, L.P. | Transmission medium and methods for use therewith |
US9853342B2 (en) | 2015-07-14 | 2017-12-26 | At&T Intellectual Property I, L.P. | Dielectric transmission medium connector and methods for use therewith |
US10341142B2 (en) | 2015-07-14 | 2019-07-02 | At&T Intellectual Property I, L.P. | Apparatus and methods for generating non-interfering electromagnetic waves on an uninsulated conductor |
US10205655B2 (en) | 2015-07-14 | 2019-02-12 | At&T Intellectual Property I, L.P. | Apparatus and methods for communicating utilizing an antenna array and multiple communication paths |
US9836957B2 (en) | 2015-07-14 | 2017-12-05 | At&T Intellectual Property I, L.P. | Method and apparatus for communicating with premises equipment |
US9722318B2 (en) | 2015-07-14 | 2017-08-01 | At&T Intellectual Property I, L.P. | Method and apparatus for coupling an antenna to a device |
US9628116B2 (en) | 2015-07-14 | 2017-04-18 | At&T Intellectual Property I, L.P. | Apparatus and methods for transmitting wireless signals |
US10033108B2 (en) | 2015-07-14 | 2018-07-24 | At&T Intellectual Property I, L.P. | Apparatus and methods for generating an electromagnetic wave having a wave mode that mitigates interference |
US10148016B2 (en) | 2015-07-14 | 2018-12-04 | At&T Intellectual Property I, L.P. | Apparatus and methods for communicating utilizing an antenna array |
US10320586B2 (en) | 2015-07-14 | 2019-06-11 | At&T Intellectual Property I, L.P. | Apparatus and methods for generating non-interfering electromagnetic waves on an insulated transmission medium |
US10033107B2 (en) | 2015-07-14 | 2018-07-24 | At&T Intellectual Property I, L.P. | Method and apparatus for coupling an antenna to a device |
US9847566B2 (en) | 2015-07-14 | 2017-12-19 | At&T Intellectual Property I, L.P. | Method and apparatus for adjusting a field of a signal to mitigate interference |
US9882257B2 (en) | 2015-07-14 | 2018-01-30 | At&T Intellectual Property I, L.P. | Method and apparatus for launching a wave mode that mitigates interference |
US10170840B2 (en) | 2015-07-14 | 2019-01-01 | At&T Intellectual Property I, L.P. | Apparatus and methods for sending or receiving electromagnetic signals |
US9608740B2 (en) | 2015-07-15 | 2017-03-28 | At&T Intellectual Property I, L.P. | Method and apparatus for launching a wave mode that mitigates interference |
US10090606B2 (en) | 2015-07-15 | 2018-10-02 | At&T Intellectual Property I, L.P. | Antenna system with dielectric array and methods for use therewith |
US9793951B2 (en) | 2015-07-15 | 2017-10-17 | At&T Intellectual Property I, L.P. | Method and apparatus for launching a wave mode that mitigates interference |
US10484513B2 (en) | 2015-07-17 | 2019-11-19 | Nsgdatacom, Inc. | System, method, and computer program product for connecting or coupling audio communications systems over a software defined wide area network |
US10784670B2 (en) | 2015-07-23 | 2020-09-22 | At&T Intellectual Property I, L.P. | Antenna support for aligning an antenna |
US9749053B2 (en) | 2015-07-23 | 2017-08-29 | At&T Intellectual Property I, L.P. | Node device, repeater and methods for use therewith |
US9871283B2 (en) | 2015-07-23 | 2018-01-16 | At&T Intellectual Property I, Lp | Transmission medium having a dielectric core comprised of plural members connected by a ball and socket configuration |
US9912027B2 (en) | 2015-07-23 | 2018-03-06 | At&T Intellectual Property I, L.P. | Method and apparatus for exchanging communication signals |
US9948333B2 (en) | 2015-07-23 | 2018-04-17 | At&T Intellectual Property I, L.P. | Method and apparatus for wireless communications to mitigate interference |
US9967173B2 (en) | 2015-07-31 | 2018-05-08 | At&T Intellectual Property I, L.P. | Method and apparatus for authentication and identity management of communicating devices |
US10020587B2 (en) | 2015-07-31 | 2018-07-10 | At&T Intellectual Property I, L.P. | Radial antenna and methods for use therewith |
US9735833B2 (en) | 2015-07-31 | 2017-08-15 | At&T Intellectual Property I, L.P. | Method and apparatus for communications management in a neighborhood network |
US10080000B2 (en) * | 2015-08-06 | 2018-09-18 | Panasonic Intellectual Property Management Co., Ltd. | Intercom system |
US10101913B2 (en) | 2015-09-02 | 2018-10-16 | Commvault Systems, Inc. | Migrating data to disk without interrupting running backup operations |
US10079746B2 (en) * | 2015-09-11 | 2018-09-18 | Nvidia Corporation | System and method for testing data channel bandwidth, packet loss, latency and jitter |
US9904535B2 (en) | 2015-09-14 | 2018-02-27 | At&T Intellectual Property I, L.P. | Method and apparatus for distributing software |
US10136434B2 (en) | 2015-09-16 | 2018-11-20 | At&T Intellectual Property I, L.P. | Method and apparatus for use with a radio distributed antenna system having an ultra-wideband control channel |
EP3145269A1 (en) * | 2015-09-16 | 2017-03-22 | Alcatel Lucent | Method, devices and system for a hybrid bearer service |
US10009063B2 (en) | 2015-09-16 | 2018-06-26 | At&T Intellectual Property I, L.P. | Method and apparatus for use with a radio distributed antenna system having an out-of-band reference signal |
US10051629B2 (en) | 2015-09-16 | 2018-08-14 | At&T Intellectual Property I, L.P. | Method and apparatus for use with a radio distributed antenna system having an in-band reference signal |
US9705571B2 (en) | 2015-09-16 | 2017-07-11 | At&T Intellectual Property I, L.P. | Method and apparatus for use with a radio distributed antenna system |
US10009901B2 (en) | 2015-09-16 | 2018-06-26 | At&T Intellectual Property I, L.P. | Method, apparatus, and computer-readable storage medium for managing utilization of wireless resources between base stations |
US10079661B2 (en) | 2015-09-16 | 2018-09-18 | At&T Intellectual Property I, L.P. | Method and apparatus for use with a radio distributed antenna system having a clock reference |
US9769128B2 (en) | 2015-09-28 | 2017-09-19 | At&T Intellectual Property I, L.P. | Method and apparatus for encryption of communications over a network |
US10204122B2 (en) | 2015-09-30 | 2019-02-12 | Nicira, Inc. | Implementing an interface between tuple and message-driven control entities |
US9729197B2 (en) | 2015-10-01 | 2017-08-08 | At&T Intellectual Property I, L.P. | Method and apparatus for communicating network management traffic over a network |
US9882277B2 (en) | 2015-10-02 | 2018-01-30 | At&T Intellectual Property I, Lp | Communication device and antenna assembly with actuated gimbal mount |
US10074890B2 (en) | 2015-10-02 | 2018-09-11 | At&T Intellectual Property I, L.P. | Communication device and antenna with integrated light assembly |
US9876264B2 (en) | 2015-10-02 | 2018-01-23 | At&T Intellectual Property I, Lp | Communication system, guided wave switch and methods for use therewith |
US10665942B2 (en) | 2015-10-16 | 2020-05-26 | At&T Intellectual Property I, L.P. | Method and apparatus for adjusting wireless communications |
US10355367B2 (en) | 2015-10-16 | 2019-07-16 | At&T Intellectual Property I, L.P. | Antenna structure for exchanging wireless signals |
US10051483B2 (en) | 2015-10-16 | 2018-08-14 | At&T Intellectual Property I, L.P. | Method and apparatus for directing wireless signals |
US10999345B2 (en) * | 2015-10-19 | 2021-05-04 | At&T Intellectual Property I, L.P. | Real-time video delivery for connected home applications |
WO2017100664A1 (en) * | 2015-12-09 | 2017-06-15 | Unify Square, Inc. | Automated detection and analysis of call conditions in communication system |
US11115994B2 (en) * | 2016-02-17 | 2021-09-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Triggering/initiating backoff procedure(s) based on congestion indication(s) to defer scheduling request transmission |
US11019167B2 (en) | 2016-04-29 | 2021-05-25 | Nicira, Inc. | Management of update queues for network controller |
US10348576B2 (en) * | 2016-04-29 | 2019-07-09 | Microsoft Technology Licensing, Llc | Modeling resiliency strategies for streaming queries |
US9560209B1 (en) * | 2016-06-17 | 2017-01-31 | Bandwith.com, Inc. | Techniques for troubleshooting IP based telecommunications networks |
US10277663B1 (en) | 2016-06-24 | 2019-04-30 | Amazon Technologies, Inc. | Management of asynchronous media file transmissions |
US10783151B1 (en) | 2016-06-29 | 2020-09-22 | Amazon Technologies, Inc. | Popularity-based content feed management system |
US10728291B1 (en) * | 2016-06-29 | 2020-07-28 | Amazon Technologies, Inc. | Persistent duplex connections and communication protocol for content distribution |
US11551529B2 (en) | 2016-07-20 | 2023-01-10 | Winview, Inc. | Method of generating separate contests of skill or chance from two independent events |
US9912419B1 (en) | 2016-08-24 | 2018-03-06 | At&T Intellectual Property I, L.P. | Method and apparatus for managing a fault in a distributed antenna system |
US9860075B1 (en) | 2016-08-26 | 2018-01-02 | At&T Intellectual Property I, L.P. | Method and communication node for broadband distribution |
US10831545B2 (en) * | 2016-08-29 | 2020-11-10 | Vmware, Inc. | Efficient queueing and scheduling of backups in a multi-tenant cloud computing environment |
US10798559B1 (en) * | 2016-09-07 | 2020-10-06 | CSC Holdings, LLC | Collecting configuration information of subscriber devices of a point-to-multipoint communication system |
CN107809747B (en) * | 2016-09-09 | 2021-06-04 | 松下电器(美国)知识产权公司 | Communication method, radio base station, server, and radio distribution system |
US10291311B2 (en) | 2016-09-09 | 2019-05-14 | At&T Intellectual Property I, L.P. | Method and apparatus for mitigating a fault in a distributed antenna system |
CN107809746B (en) * | 2016-09-09 | 2021-06-04 | 松下电器(美国)知识产权公司 | Communication method, server and wireless distribution system |
US11032819B2 (en) | 2016-09-15 | 2021-06-08 | At&T Intellectual Property I, L.P. | Method and apparatus for use with a radio distributed antenna system having a control channel reference signal |
US10333614B2 (en) * | 2016-10-11 | 2019-06-25 | Ciena Corporation | Partial survivability for multi-carrier and multi-module optical interfaces |
US11843414B2 (en) * | 2016-10-11 | 2023-12-12 | Ciena Corporation | FlexO/ZR subrating and partial survivability |
US10135146B2 (en) | 2016-10-18 | 2018-11-20 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching guided waves via circuits |
US10135147B2 (en) | 2016-10-18 | 2018-11-20 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching guided waves via an antenna |
US10340600B2 (en) | 2016-10-18 | 2019-07-02 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching guided waves via plural waveguide systems |
US10811767B2 (en) | 2016-10-21 | 2020-10-20 | At&T Intellectual Property I, L.P. | System and dielectric antenna with convex dielectric radome |
US10374316B2 (en) | 2016-10-21 | 2019-08-06 | At&T Intellectual Property I, L.P. | System and dielectric antenna with non-uniform dielectric |
US9876605B1 (en) | 2016-10-21 | 2018-01-23 | At&T Intellectual Property I, L.P. | Launcher and coupling system to support desired guided wave mode |
US9991580B2 (en) | 2016-10-21 | 2018-06-05 | At&T Intellectual Property I, L.P. | Launcher and coupling system for guided wave mode cancellation |
US10312567B2 (en) | 2016-10-26 | 2019-06-04 | At&T Intellectual Property I, L.P. | Launcher with planar strip antenna and methods for use therewith |
US10498044B2 (en) | 2016-11-03 | 2019-12-03 | At&T Intellectual Property I, L.P. | Apparatus for configuring a surface of an antenna |
US10225025B2 (en) | 2016-11-03 | 2019-03-05 | At&T Intellectual Property I, L.P. | Method and apparatus for detecting a fault in a communication system |
US10291334B2 (en) | 2016-11-03 | 2019-05-14 | At&T Intellectual Property I, L.P. | System for detecting a fault in a communication system |
US10224634B2 (en) | 2016-11-03 | 2019-03-05 | At&T Intellectual Property I, L.P. | Methods and apparatus for adjusting an operational characteristic of an antenna |
EP3531631A1 (en) * | 2016-11-11 | 2019-08-28 | Huawei Technologies Co., Ltd. | Data transmission method and apparatus |
US10535928B2 (en) | 2016-11-23 | 2020-01-14 | At&T Intellectual Property I, L.P. | Antenna system and methods for use therewith |
US10178445B2 (en) | 2016-11-23 | 2019-01-08 | At&T Intellectual Property I, L.P. | Methods, devices, and systems for load balancing between a plurality of waveguides |
US10340601B2 (en) | 2016-11-23 | 2019-07-02 | At&T Intellectual Property I, L.P. | Multi-antenna system and methods for use therewith |
US10090594B2 (en) | 2016-11-23 | 2018-10-02 | At&T Intellectual Property I, L.P. | Antenna system having structural configurations for assembly |
US10340603B2 (en) | 2016-11-23 | 2019-07-02 | At&T Intellectual Property I, L.P. | Antenna system having shielded structural configurations for assembly |
US10305190B2 (en) | 2016-12-01 | 2019-05-28 | At&T Intellectual Property I, L.P. | Reflecting dielectric antenna system and methods for use therewith |
US10361489B2 (en) | 2016-12-01 | 2019-07-23 | At&T Intellectual Property I, L.P. | Dielectric dish antenna system and methods for use therewith |
US10694379B2 (en) | 2016-12-06 | 2020-06-23 | At&T Intellectual Property I, L.P. | Waveguide system with device-based authentication and methods for use therewith |
US10439675B2 (en) | 2016-12-06 | 2019-10-08 | At&T Intellectual Property I, L.P. | Method and apparatus for repeating guided wave communication signals |
US10637149B2 (en) | 2016-12-06 | 2020-04-28 | At&T Intellectual Property I, L.P. | Injection molded dielectric antenna and methods for use therewith |
US10819035B2 (en) | 2016-12-06 | 2020-10-27 | At&T Intellectual Property I, L.P. | Launcher with helical antenna and methods for use therewith |
US10382976B2 (en) | 2016-12-06 | 2019-08-13 | At&T Intellectual Property I, L.P. | Method and apparatus for managing wireless communications based on communication paths and network device positions |
US10326494B2 (en) | 2016-12-06 | 2019-06-18 | At&T Intellectual Property I, L.P. | Apparatus for measurement de-embedding and methods for use therewith |
US9927517B1 (en) | 2016-12-06 | 2018-03-27 | At&T Intellectual Property I, L.P. | Apparatus and methods for sensing rainfall |
US10727599B2 (en) | 2016-12-06 | 2020-07-28 | At&T Intellectual Property I, L.P. | Launcher with slot antenna and methods for use therewith |
US10020844B2 (en) | 2016-12-06 | 2018-07-10 | T&T Intellectual Property I, L.P. | Method and apparatus for broadcast communication via guided waves |
US10755542B2 (en) | 2016-12-06 | 2020-08-25 | At&T Intellectual Property I, L.P. | Method and apparatus for surveillance via guided wave communication |
US10135145B2 (en) | 2016-12-06 | 2018-11-20 | At&T Intellectual Property I, L.P. | Apparatus and methods for generating an electromagnetic wave along a transmission medium |
US10389029B2 (en) | 2016-12-07 | 2019-08-20 | At&T Intellectual Property I, L.P. | Multi-feed dielectric antenna system with core selection and methods for use therewith |
US10359749B2 (en) | 2016-12-07 | 2019-07-23 | At&T Intellectual Property I, L.P. | Method and apparatus for utilities management via guided wave communication |
US10446936B2 (en) | 2016-12-07 | 2019-10-15 | At&T Intellectual Property I, L.P. | Multi-feed dielectric antenna system and methods for use therewith |
US10139820B2 (en) | 2016-12-07 | 2018-11-27 | At&T Intellectual Property I, L.P. | Method and apparatus for deploying equipment of a communication system |
US10243270B2 (en) | 2016-12-07 | 2019-03-26 | At&T Intellectual Property I, L.P. | Beam adaptive multi-feed dielectric antenna system and methods for use therewith |
US10168695B2 (en) | 2016-12-07 | 2019-01-01 | At&T Intellectual Property I, L.P. | Method and apparatus for controlling an unmanned aircraft |
US10547348B2 (en) | 2016-12-07 | 2020-01-28 | At&T Intellectual Property I, L.P. | Method and apparatus for switching transmission mediums in a communication system |
US10027397B2 (en) | 2016-12-07 | 2018-07-17 | At&T Intellectual Property I, L.P. | Distributed antenna system and methods for use therewith |
US9893795B1 (en) | 2016-12-07 | 2018-02-13 | At&T Intellectual Property I, Lp | Method and repeater for broadband distribution |
US9998870B1 (en) | 2016-12-08 | 2018-06-12 | At&T Intellectual Property I, L.P. | Method and apparatus for proximity sensing |
US10916969B2 (en) | 2016-12-08 | 2021-02-09 | At&T Intellectual Property I, L.P. | Method and apparatus for providing power using an inductive coupling |
US10601494B2 (en) | 2016-12-08 | 2020-03-24 | At&T Intellectual Property I, L.P. | Dual-band communication device and method for use therewith |
US10938108B2 (en) | 2016-12-08 | 2021-03-02 | At&T Intellectual Property I, L.P. | Frequency selective multi-feed dielectric antenna system and methods for use therewith |
US10777873B2 (en) | 2016-12-08 | 2020-09-15 | At&T Intellectual Property I, L.P. | Method and apparatus for mounting network devices |
US10326689B2 (en) | 2016-12-08 | 2019-06-18 | At&T Intellectual Property I, L.P. | Method and system for providing alternative communication paths |
US10389037B2 (en) | 2016-12-08 | 2019-08-20 | At&T Intellectual Property I, L.P. | Apparatus and methods for selecting sections of an antenna array and use therewith |
US10103422B2 (en) | 2016-12-08 | 2018-10-16 | At&T Intellectual Property I, L.P. | Method and apparatus for mounting network devices |
US10069535B2 (en) | 2016-12-08 | 2018-09-04 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching electromagnetic waves having a certain electric field structure |
US10411356B2 (en) | 2016-12-08 | 2019-09-10 | At&T Intellectual Property I, L.P. | Apparatus and methods for selectively targeting communication devices with an antenna array |
US10530505B2 (en) | 2016-12-08 | 2020-01-07 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching electromagnetic waves along a transmission medium |
US9911020B1 (en) | 2016-12-08 | 2018-03-06 | At&T Intellectual Property I, L.P. | Method and apparatus for tracking via a radio frequency identification device |
US10340983B2 (en) | 2016-12-09 | 2019-07-02 | At&T Intellectual Property I, L.P. | Method and apparatus for surveying remote sites via guided wave communications |
US9838896B1 (en) | 2016-12-09 | 2017-12-05 | At&T Intellectual Property I, L.P. | Method and apparatus for assessing network coverage |
US10264586B2 (en) | 2016-12-09 | 2019-04-16 | At&T Mobility Ii Llc | Cloud-based packet controller and methods for use therewith |
US9800514B1 (en) | 2016-12-15 | 2017-10-24 | Red Hat, Inc. | Prioritizing data packets in a network |
US10419354B2 (en) * | 2017-01-27 | 2019-09-17 | Verizon Patent And Licensing Inc. | Congestion avoidance over a transmission control protocol (TCP) flow that involves one or more devices using active queue management (AQM), based on one or more TCP state conditions |
US9973940B1 (en) | 2017-02-27 | 2018-05-15 | At&T Intellectual Property I, L.P. | Apparatus and methods for dynamic impedance matching of a guided wave launcher |
US10298293B2 (en) | 2017-03-13 | 2019-05-21 | At&T Intellectual Property I, L.P. | Apparatus of communication utilizing wireless network devices |
CN108696434B (en) * | 2017-04-11 | 2022-01-14 | 华为技术有限公司 | Method, equipment and system for forwarding data message |
EP3442162B1 (en) * | 2017-08-11 | 2020-02-19 | KONE Corporation | Device management system |
US10461886B2 (en) * | 2017-10-16 | 2019-10-29 | Cisco Technology, Inc. | Transport layer identifying failure cause and mitigation for deterministic transport across multiple deterministic data links |
EP3711346A4 (en) * | 2017-11-17 | 2021-07-07 | Nokia Technologies Oy | Method and apparatus for synchronization between different data packet streams |
US10742735B2 (en) | 2017-12-12 | 2020-08-11 | Commvault Systems, Inc. | Enhanced network attached storage (NAS) services interfacing to cloud storage |
CN108111509B (en) * | 2017-12-19 | 2020-11-06 | 北京百度网讯科技有限公司 | Data transmission method |
US11223933B2 (en) * | 2018-01-12 | 2022-01-11 | Uatc, Llc | Telecommunications network for vehicles |
US10742338B2 (en) * | 2018-01-26 | 2020-08-11 | Clip Interactive, Llc | Seamless integration of radio broadcast audio with streaming audio |
US11558626B2 (en) * | 2018-02-20 | 2023-01-17 | Netgear, Inc. | Battery efficient wireless network connection and registration for a low-power device |
US11191060B2 (en) * | 2018-03-15 | 2021-11-30 | Sprint Communications Company L.P. | Dynamic wireless network architecture to serve uplink-centric and downlink-centric user applications |
US20190313311A1 (en) * | 2018-04-09 | 2019-10-10 | Mediatek Inc. | Apparatuses, service networks, and methods for handling plmn-specific parameters for an inter-plmn handover |
US10999167B2 (en) * | 2018-04-13 | 2021-05-04 | At&T Intellectual Property I, L.P. | Varying data flow aggregation period relative to data value |
CN110601999B (en) * | 2018-06-12 | 2022-03-04 | 华为技术有限公司 | Method and device for reserving resources |
US10827416B2 (en) | 2018-06-21 | 2020-11-03 | At&T Intellectual Property I, L.P. | Multi-operator spectrum resource sharing management |
US10999220B2 (en) | 2018-07-05 | 2021-05-04 | Vmware, Inc. | Context aware middlebox services at datacenter edge |
US11184327B2 (en) | 2018-07-05 | 2021-11-23 | Vmware, Inc. | Context aware middlebox services at datacenter edges |
EP3606213B1 (en) * | 2018-08-02 | 2020-12-30 | Mitsubishi Electric R&D Centre Europe B.V. | Method for managing a network and apparatus for implementing the same |
US11308765B2 (en) | 2018-10-08 | 2022-04-19 | Winview, Inc. | Method and systems for reducing risk in setting odds for single fixed in-play propositions utilizing real time input |
EP3881461A4 (en) * | 2018-11-14 | 2022-08-10 | Skywave Networks LLC | Communication system and method of using variable-length messages |
US10735541B2 (en) | 2018-11-30 | 2020-08-04 | Vmware, Inc. | Distributed inline proxy |
CN111278049B (en) * | 2019-01-11 | 2022-02-18 | 维沃移动通信有限公司 | Method and communication device for supporting time-sensitive communication service quality |
CN111614574A (en) * | 2019-02-26 | 2020-09-01 | 华为技术有限公司 | Communication method, device and system |
CN110311894A (en) * | 2019-05-24 | 2019-10-08 | 帷幄匠心科技(杭州)有限公司 | A kind of method that local area network internal dynamic penetrates |
CN113966651B (en) | 2019-05-27 | 2024-03-29 | 赛多纳西斯系统有限公司 | System and method for network migration with minimal traffic impact |
JOP20220005A1 (en) * | 2019-07-17 | 2023-01-30 | L3Vel Llc | Systems and methods for designing and powering wireless communication mesh network nodes |
US11575609B2 (en) * | 2019-07-19 | 2023-02-07 | Intel Corporation | Techniques for congestion management in a network |
CN110532108B (en) * | 2019-08-15 | 2022-10-11 | 北京拉勾网络技术有限公司 | Resume delivery task processing method, device, server and system |
KR102666354B1 (en) * | 2019-11-13 | 2024-05-20 | 삼성전자 주식회사 | Electronic device for managing coexistence of a plurality of communication method and operating method thereof |
US11445570B1 (en) | 2019-11-25 | 2022-09-13 | Sprint Communications Company L.P. | Transmission control protocol (TCP) control over radio communications |
US11641305B2 (en) | 2019-12-16 | 2023-05-02 | Vmware, Inc. | Network diagnosis in software-defined networking (SDN) environments |
US11233715B1 (en) * | 2020-07-14 | 2022-01-25 | Juniper Networks, Inc. | Dynamic prediction and management of application service level agreements |
WO2022026367A1 (en) * | 2020-07-25 | 2022-02-03 | Silver Spoon Animation Inc. | System and method for populating a virtual crowd in real-time using augmented and virtual reality |
US11979339B1 (en) * | 2020-08-19 | 2024-05-07 | Cable Television Laboratories, Inc. | Modular schedulers and associated methods |
US11741228B2 (en) | 2020-08-25 | 2023-08-29 | Bank Of America Corporation | System for generating computing network segmentation and isolation schemes using dynamic and shifting classification of assets |
US11290516B1 (en) | 2020-12-21 | 2022-03-29 | Cisco Technology, Inc. | Prioritized MSRP transmissions to reduce traffic interruptions |
US11546054B2 (en) * | 2020-12-29 | 2023-01-03 | Hughes Network Systems, Llc | Utilizing leftover return channel bandwidth in a satellite system |
TWI760171B (en) * | 2021-04-07 | 2022-04-01 | 聚騰科技股份有限公司 | Bandwidth Management Methods |
US20230024200A1 (en) * | 2021-07-16 | 2023-01-26 | Whatsapp Llc | Terminating empty joinable group calls |
US11593223B1 (en) | 2021-09-02 | 2023-02-28 | Commvault Systems, Inc. | Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants |
US11829618B2 (en) | 2021-09-03 | 2023-11-28 | Micron Technology, Inc. | Memory sub-system QOS pool management |
US11972125B2 (en) | 2021-09-03 | 2024-04-30 | Micron Technology, Inc. | Memory sub-system dynamic QOS pool |
US11403426B1 (en) * | 2021-09-14 | 2022-08-02 | Intercom, Inc. | Single path prioritization for a communication system |
US11716278B1 (en) | 2022-01-25 | 2023-08-01 | Bank Of America Corporation | System and method for determining the shortest data transfer path in data communication |
US11632271B1 (en) | 2022-02-24 | 2023-04-18 | T-Mobile Usa, Inc. | Location-based channel estimation in wireless communication systems |
US11902176B2 (en) | 2022-02-24 | 2024-02-13 | Bank Of America Corporation | System for detecting multi-dimensional linkage and layering of resource transfers using a distributed server network |
US11765052B1 (en) | 2022-03-11 | 2023-09-19 | T-Mobile Usa, Inc. | User equipment hosting for customizable 5G services |
US20240348705A1 (en) * | 2022-05-05 | 2024-10-17 | Arris Enterprises Llc | Pon system optimized for internet of things |
CN114844804B (en) * | 2022-06-01 | 2023-07-25 | 重庆奥普泰通信技术有限公司 | Network measurement method, system, electronic device and computer readable storage medium |
US20240244011A1 (en) * | 2023-01-18 | 2024-07-18 | Mediatek Inc. | Data Sending Control Method and Data Sending Control System Capable of Dynamically Allocating Log Data |
US12047459B1 (en) * | 2023-05-05 | 2024-07-23 | Dell Products L.P. | Tunneling a first protocol communication message through a second protocol communication channel |
US12120524B1 (en) | 2023-11-10 | 2024-10-15 | T-Mobile Usa, Inc. | Radio exposure function for telecommunications networks |
US12022383B1 (en) | 2023-11-10 | 2024-06-25 | T-Mobile Usa, Inc. | Radio exposure function for telecommunications networks |
Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4742512A (en) * | 1985-07-19 | 1988-05-03 | Nec Corporation | Multipoint communication system having polling and reservation schemes |
US4802836A (en) * | 1987-07-13 | 1989-02-07 | Gilles Whissell | Compaction device for concrete block molding machine |
US4907224A (en) * | 1986-10-17 | 1990-03-06 | Bydatel Corporation | Method for transmitting data in multiple access data communications networks |
US5231634A (en) * | 1991-12-18 | 1993-07-27 | Proxim, Inc. | Medium access protocol for wireless lans |
US5282222A (en) * | 1992-03-31 | 1994-01-25 | Michel Fattouche | Method and apparatus for multiple access between transceivers in wireless communications using OFDM spread spectrum |
US5337313A (en) * | 1992-11-12 | 1994-08-09 | Motorola, Inc. | Method and apparatus for preserving packet squencing in a packet transmission system |
US5420851A (en) * | 1993-11-24 | 1995-05-30 | At&T Corp. | Method of multiple access |
US5442625A (en) * | 1994-05-13 | 1995-08-15 | At&T Ipm Corp | Code division multiple access system providing variable data rate access to a user |
US5487061A (en) * | 1994-06-27 | 1996-01-23 | Loral Fairchild Corporation | System and method for providing multiple loss and service priorities |
US5493569A (en) * | 1993-03-12 | 1996-02-20 | Motorola Inc. | Method and apparatus for reducing the likelihood of contention and resource misallocation in a packet transmission system |
US5497504A (en) * | 1994-05-13 | 1996-03-05 | The Trustees Of Columbia University | System and method for connection control in mobile communications |
US5499243A (en) * | 1993-01-22 | 1996-03-12 | Hall; Dennis R. | Method and apparatus for coordinating transfer of information between a base station and a plurality of radios |
US5515363A (en) * | 1994-06-30 | 1996-05-07 | Digital Equipment Corporation | Traffic shaping system with transmit latency feedback for asynchronous transfer mode networks |
US5594720A (en) * | 1993-11-24 | 1997-01-14 | Lucent Technologies Inc. | Multiple access cellular communication with dynamic slot allocation and reduced co-channel interferences |
US5602836A (en) * | 1993-11-24 | 1997-02-11 | Lucent Technologies Inc. | Multiple access cellular communication with circular interleaving and reduced dropped-packet runlengths |
US5610910A (en) * | 1995-08-17 | 1997-03-11 | Northern Telecom Limited | Access to telecommunications networks in multi-service environment |
US5613198A (en) * | 1993-04-30 | 1997-03-18 | International Business Machines Corporation | Multiaccess scheme for mobile integrated local area networks |
US5625877A (en) * | 1995-03-15 | 1997-04-29 | International Business Machines Corporation | Wireless variable bandwidth air-link system |
US5638371A (en) * | 1995-06-27 | 1997-06-10 | Nec Usa, Inc. | Multiservices medium access control protocol for wireless ATM system |
US5640395A (en) * | 1994-05-03 | 1997-06-17 | Nokia Mobile Phones Ltd. | System for transmitting packet data in digital cellular time division multiple access (TDMA) air interface |
US5644576A (en) * | 1994-10-26 | 1997-07-01 | International Business Machines Corporation | Medium access control scheme for wireless LAN using a variable length interleaved time division frame |
US5648969A (en) * | 1995-02-13 | 1997-07-15 | Netro Corporation | Reliable ATM microwave link and network |
US5717689A (en) * | 1995-10-10 | 1998-02-10 | Lucent Technologies Inc. | Data link layer protocol for transport of ATM cells over a wireless link |
US5724513A (en) * | 1994-06-30 | 1998-03-03 | Digital Equipment Corporation | Traffic shaping system for asynchronous transfer mode networks |
US5729542A (en) * | 1995-06-28 | 1998-03-17 | Motorola, Inc. | Method and apparatus for communication system access |
US5732077A (en) * | 1995-11-13 | 1998-03-24 | Lucent Technologies Inc. | Resource allocation system for wireless networks |
US5734833A (en) * | 1996-03-12 | 1998-03-31 | Hewlett-Packard Company | Shared communications channel with enhanced reservation and collision resolution protocols allows any subset of stations to transmit data after collision occured in contention slot |
US5742847A (en) * | 1994-10-31 | 1998-04-21 | Intel Corporation | M&A for dynamically generating and maintaining frame based polling schedules for polling isochronous and asynchronous functions that guaranty latencies and bandwidths to the isochronous functions |
US5745551A (en) * | 1993-10-27 | 1998-04-28 | Tcsi Corporation | Telecommunication apparatus for receiving, storing and forwarding a plurality of voice signals to a wireless network, in response to a control signal therefrom |
US5745480A (en) * | 1996-04-03 | 1998-04-28 | Adicom Wireless, Inc. | Multi-rate wireless communications system |
US5751708A (en) * | 1995-10-25 | 1998-05-12 | Lucent Technologies Inc. | Access method for broadband and narrowband networks |
US5752193A (en) * | 1995-09-01 | 1998-05-12 | Motorola, Inc. | Method and apparatus for communicating in a wireless communication system |
US5758281A (en) * | 1992-03-05 | 1998-05-26 | Bell Atlantic Network Services, Inc. | Personal communications service using wireline/wireless integration |
US5774461A (en) * | 1995-09-27 | 1998-06-30 | Lucent Technologies Inc. | Medium access control and air interface subsystem for an indoor wireless ATM network |
US5787080A (en) * | 1996-06-03 | 1998-07-28 | Philips Electronics North America Corporation | Method and apparatus for reservation-based wireless-ATM local area network |
US5787077A (en) * | 1996-06-04 | 1998-07-28 | Ascom Tech Ag | Dynamic connection mapping in wireless ATM systems |
US5864540A (en) * | 1997-04-04 | 1999-01-26 | At&T Corp/Csi Zeinet(A Cabletron Co.) | Method for integrated traffic shaping in a packet-switched network |
US5872777A (en) * | 1997-09-30 | 1999-02-16 | Motorola, Inc. | Method and apparatus for conveying data packets in a packet data communication system |
US5889816A (en) * | 1996-02-02 | 1999-03-30 | Lucent Technologies, Inc. | Wireless adapter architecture for mobile computing |
US5905719A (en) * | 1996-09-19 | 1999-05-18 | Bell Communications Research, Inc. | Method and system for wireless internet access |
US5907822A (en) * | 1997-04-04 | 1999-05-25 | Lincom Corporation | Loss tolerant speech decoder for telecommunications |
US5909550A (en) * | 1996-10-16 | 1999-06-01 | Cisco Technology, Inc. | Correlation technique for use in managing application-specific and protocol-specific resources of heterogeneous integrated computer network |
US5920705A (en) * | 1996-01-31 | 1999-07-06 | Nokia Ip, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
US5930472A (en) * | 1998-04-29 | 1999-07-27 | Motorola, Inc. | Method and apparatus in a wireless communication system for splitting a browser functionality between a wireless client and an infrastructure portion |
US6014377A (en) * | 1998-08-05 | 2000-01-11 | Us West, Inc. | System and method for an integrated wireline/wireless service using private branch exchange lines |
US6016311A (en) * | 1997-11-19 | 2000-01-18 | Ensemble Communications, Inc. | Adaptive time division duplexing method and apparatus for dynamic bandwidth allocation within a wireless communication system |
US6018516A (en) * | 1997-11-14 | 2000-01-25 | Packeteer, Inc. | Method for minimizing unneeded retransmission of packets in a packet communication environment supporting a plurality of data link rates |
US6021158A (en) * | 1996-05-09 | 2000-02-01 | Texas Instruments Incorporated | Hybrid wireless wire-line network integration and management |
US6021439A (en) * | 1997-11-14 | 2000-02-01 | International Business Machines Corporation | Internet quality-of-service method and system |
US6028842A (en) * | 1996-12-23 | 2000-02-22 | Nortel Networks Corporation | Dynamic traffic conditioning |
US6031832A (en) * | 1996-11-27 | 2000-02-29 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for improving performance of a packet communications system |
US6031845A (en) * | 1997-05-14 | 2000-02-29 | Airspan Communications Corporation | Allocation of bandwidth to calls in a wireless telecommunications system |
US6038230A (en) * | 1998-07-22 | 2000-03-14 | Synchrodyne, Inc. | Packet switching with common time reference over links with dynamically varying delays |
US6038451A (en) * | 1997-06-18 | 2000-03-14 | Integrated Telecom Solutions, Inc. | Location based method of and system for forwarding wireless telephone calls |
US6038452A (en) * | 1997-08-29 | 2000-03-14 | Nortel Networks Corporation | Telecommunication network utilizing a quality of service protocol |
US6038216A (en) * | 1996-11-01 | 2000-03-14 | Packeteer, Inc. | Method for explicit data rate control in a packet communication environment without data rate supervision |
US6041051A (en) * | 1996-06-14 | 2000-03-21 | Lucent Technologies, Inc. | Method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network utilizing an adaptive digital access protocol |
US6047189A (en) * | 1996-10-11 | 2000-04-04 | Arraycomm, Inc. | Adaptive method for channel assignment in a cellular communication system |
US6046980A (en) * | 1996-12-09 | 2000-04-04 | Packeteer, Inc. | System for managing flow bandwidth utilization at network, transport and application layers in store and forward network |
US6052594A (en) * | 1997-04-30 | 2000-04-18 | At&T Corp. | System and method for dynamically assigning channels for wireless packet communications |
US6058114A (en) * | 1996-05-20 | 2000-05-02 | Cisco Systems, Inc. | Unified network cell scheduler and flow controller |
US6064649A (en) * | 1997-01-31 | 2000-05-16 | Nec Usa, Inc. | Network interface card for wireless asynchronous transfer mode networks |
US6072790A (en) * | 1999-05-13 | 2000-06-06 | Motorola, Inc. | Method and apparatus for performing distribution in a communication system |
US6075792A (en) * | 1997-06-16 | 2000-06-13 | Interdigital Technology Corporation | CDMA communication system which selectively allocates bandwidth upon demand |
US6075787A (en) * | 1997-05-08 | 2000-06-13 | Lucent Technologies Inc. | Method and apparatus for messaging, signaling, and establishing a data link utilizing multiple modes over a multiple access broadband communications network |
US6081524A (en) * | 1997-07-03 | 2000-06-27 | At&T Corp. | Frame relay switched data service |
US6081536A (en) * | 1997-06-20 | 2000-06-27 | Tantivy Communications, Inc. | Dynamic bandwidth allocation to transmit a wireless protocol across a code division multiple access (CDMA) radio link |
US6084855A (en) * | 1997-02-18 | 2000-07-04 | Nokia Telecommunications, Oy | Method and apparatus for providing fair traffic scheduling among aggregated internet protocol flows |
US6084867A (en) * | 1991-10-01 | 2000-07-04 | Intermec Ip Corp. | Apparatus and method of routing data in a radio frequency local area network |
US6091959A (en) * | 1999-06-02 | 2000-07-18 | Motorola, Inc. | Method and apparatus in a two-way wireless communication system for location-based message transmission |
US6092113A (en) * | 1996-08-29 | 2000-07-18 | Kokusai Denshin Denwa, Co., Ltd. | Method for constructing a VPN having an assured bandwidth |
US6175860B1 (en) * | 1997-11-26 | 2001-01-16 | International Business Machines Corporation | Method and apparatus for an automatic multi-rate wireless/wired computer network |
US6188671B1 (en) * | 1997-07-03 | 2001-02-13 | At&T Corp | Traffic management for frame relay switched data service |
US6192029B1 (en) * | 1998-01-29 | 2001-02-20 | Motorola, Inc. | Method and apparatus for performing flow control in a wireless communications system |
US6195565B1 (en) * | 1998-03-03 | 2001-02-27 | Lucent Technologies Inc. | Bandwidth control in a packet-based data system |
US6198728B1 (en) * | 1996-12-19 | 2001-03-06 | Phillips Electronics North America Corp. | Medium access control (MAC) protocol for wireless ATM |
US6201811B1 (en) * | 1998-03-24 | 2001-03-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Transferring Identifier information in a telecommunications system |
US6205120B1 (en) * | 1998-03-13 | 2001-03-20 | Packeteer, Inc. | Method for transparently determining and setting an optimal minimum required TCP window size |
US6208620B1 (en) * | 1999-08-02 | 2001-03-27 | Nortel Networks Corporation | TCP-aware agent sublayer (TAS) for robust TCP over wireless |
US6215769B1 (en) * | 1998-10-07 | 2001-04-10 | Nokia Telecommunications, Inc. | Enhanced acknowledgment pacing device and method for TCP connections |
US6219713B1 (en) * | 1998-07-07 | 2001-04-17 | Nokia Telecommunications, Oy | Method and apparatus for adjustment of TCP sliding window with information about network conditions |
US6236656B1 (en) * | 1998-03-19 | 2001-05-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Link-efficiency based scheduling in radio data communications systems |
US6235300B1 (en) * | 1999-01-19 | 2001-05-22 | Amway Corporation | Plant protecting adjuvant containing topped or peaked alcohol alkoxylates and conventional alcohol alkoxylates |
US6247058B1 (en) * | 1998-03-30 | 2001-06-12 | Hewlett-Packard Company | Method and apparatus for processing network packets using time stamps |
US6252857B1 (en) * | 1998-03-04 | 2001-06-26 | At&T Corp. | Method and apparatus for provisioned and dynamic quality of service in a communications network |
US6262980B1 (en) * | 1997-12-02 | 2001-07-17 | At&T Corp | Dynamic resource allocation method and apparatus for broadband services in a wireless communications system |
US6336143B1 (en) * | 1993-09-27 | 2002-01-01 | International Business Machines Corporation | Method and apparatus for multimedia data interchange with pacing capability in a distributed data processing system |
US6353616B1 (en) * | 1998-05-21 | 2002-03-05 | Lucent Technologies Inc. | Adaptive processor schedulor and method for reservation protocol message processing |
US6363209B2 (en) * | 1995-08-25 | 2002-03-26 | Sony Corporation | Signal recording/reproducing method and apparatus, signal record medium and signal |
US6363053B1 (en) * | 1999-02-08 | 2002-03-26 | 3Com Corporation | Method and apparatus for measurement-based conformance testing of service level agreements in networks |
US6377548B1 (en) * | 1997-10-14 | 2002-04-23 | Lucent Technologies Inc. | Method for admitting new connections based on measured quantities in a multiple access system for communications networks |
US6377782B1 (en) * | 1999-03-01 | 2002-04-23 | Mediacell, Inc. | Method and apparatus for communicating between a client device and a linear broadband network |
US6400722B1 (en) * | 1997-10-14 | 2002-06-04 | Lucent Technologies Inc. | Optimum routing system |
US6407992B1 (en) * | 1997-10-22 | 2002-06-18 | Netro Corporation | Multiplexing terminals in a distributed network |
US6412006B2 (en) * | 1998-02-10 | 2002-06-25 | 3Com Corporation | Method and apparatus for sending delay sensitive information assisted by packet switched networks |
US20020099949A1 (en) * | 2001-01-19 | 2002-07-25 | Fries Robert M. | Systems and methods for detecting tampering of a computer system by calculating a boot signature |
US6512751B1 (en) * | 1998-05-26 | 2003-01-28 | Paul F. Struhsaker | Method and system protocols for providing voice, data, and multimedia services in a wireless local loop system |
US6517614B1 (en) * | 1997-04-24 | 2003-02-11 | Filterwerk Mann & Hummel Gmbh | Plastic hollow structure |
US6546016B1 (en) * | 1997-12-31 | 2003-04-08 | At&T Corp. | Coaxial cable/twisted pair cable telecommunications network architecture |
Family Cites Families (164)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4472801A (en) | 1983-03-28 | 1984-09-18 | At&T Bell Laboratories | Distributed prioritized concentrator |
US4675863A (en) * | 1985-03-20 | 1987-06-23 | International Mobile Machines Corp. | Subscriber RF telephone system for providing multiple speech and/or data signals simultaneously over either a single or a plurality of RF channels |
US5861540A (en) * | 1986-10-29 | 1999-01-19 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Substituted 1,1,1-triaryl-2,2,2-trifuoroethanes and processes for their synthesis |
US4743512A (en) * | 1987-06-30 | 1988-05-10 | Carpenter Technology Corporation | Method of manufacturing flat forms from metal powder and product formed therefrom |
US5012469A (en) * | 1988-07-29 | 1991-04-30 | Karamvir Sardana | Adaptive hybrid multiple access protocols |
US5726984A (en) * | 1989-01-31 | 1998-03-10 | Norand Corporation | Hierarchical data collection network supporting packetized voice communications among wireless terminals and telephones |
US5295140A (en) * | 1991-03-28 | 1994-03-15 | Motorola, Inc. | Method for multi-purpose utilization of resources in a communication system |
US5379340A (en) | 1991-08-02 | 1995-01-03 | Betterprize Limited | Text communication system |
US5434920A (en) | 1991-12-09 | 1995-07-18 | At&T Corp. | Secure telecommunications |
US5502726A (en) * | 1992-01-31 | 1996-03-26 | Nellcor Incorporated | Serial layered medical network |
CA2064975C (en) | 1992-03-27 | 1999-07-27 | Michel T. Fattouche | Method and apparatus for multiple access between transceivers in wireless communications using ofdm spread spectrum |
JPH05336104A (en) | 1992-05-29 | 1993-12-17 | Toshiba Corp | Radio base station |
US5459761A (en) * | 1992-06-29 | 1995-10-17 | Motorola, Inc. | Intelligent repeater for trunked communications |
US6339143B1 (en) * | 1993-05-13 | 2002-01-15 | The Trustees Of Columbia University In The City Of New York | Methods of using antibodies against hormone-related determinants |
FI97517C (en) | 1993-09-06 | 1996-12-27 | Nokia Mobile Phones Ltd | Packet data transmission in a digital cellular network |
US5410602A (en) | 1993-09-27 | 1995-04-25 | Motorola, Inc. | Method for key management of point-to-point communications |
US5371794A (en) * | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5812955A (en) | 1993-11-04 | 1998-09-22 | Ericsson Inc. | Base station which relays cellular verification signals via a telephone wire network to verify a cellular radio telephone |
US5444718A (en) | 1993-11-30 | 1995-08-22 | At&T Corp. | Retransmission protocol for wireless communications |
DE69330065T2 (en) | 1993-12-08 | 2001-08-09 | International Business Machines Corp., Armonk | Method and system for key distribution and authentication in a data transmission system |
JPH07183888A (en) | 1993-12-24 | 1995-07-21 | Fujitsu Ltd | Atm multiplexing control system |
JP3248348B2 (en) * | 1994-03-15 | 2002-01-21 | 松下電器産業株式会社 | Communication method and communication device |
WO1995034153A1 (en) * | 1994-06-08 | 1995-12-14 | Hughes Aircraft Company | Apparatus and method for hybrid network access |
US5583914A (en) * | 1994-06-30 | 1996-12-10 | Lucent Technologies Inc. | Intelligent wireless signaling overlay for a telecommunication network |
US5628052A (en) | 1994-09-12 | 1997-05-06 | Lucent Technologies Inc. | Wireless communication system using distributed switched antennas |
US5742905A (en) * | 1994-09-19 | 1998-04-21 | Bell Communications Research, Inc. | Personal communications internetworking |
FI96557C (en) | 1994-09-27 | 1996-07-10 | Nokia Telecommunications Oy | Method for data transmission in a TDMA mobile radio system and a mobile radio system for carrying out the method |
US6914965B1 (en) * | 1994-09-30 | 2005-07-05 | Qualcomm Incorporated | Method and apparatus of providing a single state mobile unit in a modem connection comprising a wireless link |
JP3209646B2 (en) | 1994-10-05 | 2001-09-17 | 日本電信電話株式会社 | Wireless packet transceiver |
JP3271441B2 (en) | 1994-11-01 | 2002-04-02 | 株式会社日立製作所 | Control signal transmission slot assignment method and radio base station in mobile communication system |
US5570355A (en) | 1994-11-17 | 1996-10-29 | Lucent Technologies Inc. | Method and apparatus enabling synchronous transfer mode and packet mode access for multiple services on a broadband communication network |
FI98586C (en) | 1995-01-10 | 1997-07-10 | Nokia Telecommunications Oy | Packet radio system and methods for protocol-independent routing of a data packet in packet radio networks |
US5822324A (en) * | 1995-03-16 | 1998-10-13 | Bell Atlantic Network Services, Inc. | Simulcasting digital video programs for broadcast and interactive services |
US5572528A (en) | 1995-03-20 | 1996-11-05 | Novell, Inc. | Mobile networking method and apparatus |
US5706048A (en) * | 1995-04-24 | 1998-01-06 | Motorola, Inc. | Wireless digital data access system and method |
SE516556C2 (en) | 1995-04-24 | 2002-01-29 | Ericsson Telefon Ab L M | Method and apparatus of a telecommunications system |
US6097707A (en) | 1995-05-19 | 2000-08-01 | Hodzic; Migdat I. | Adaptive digital wireless communications network apparatus and process |
US5727064A (en) * | 1995-07-03 | 1998-03-10 | Lucent Technologies Inc. | Cryptographic system for wireless communications |
US5784597A (en) * | 1995-09-22 | 1998-07-21 | Hewlett-Packard Company | Communications network system including acknowledgement indicating successful receipt of request for reserved communication slots and start time for said reserved communication slots |
US5729531A (en) * | 1995-10-18 | 1998-03-17 | Telefonaktiebolaget Lm Ericsson | Bandwidth allocation |
US5806007A (en) | 1995-10-18 | 1998-09-08 | Telefonaktiebolaget Lm Ericsson | Activity control for a mobile station in a wireless communication system |
US5757813A (en) * | 1995-10-18 | 1998-05-26 | Telefonaktiebolaget Lm Ericsson | Method for achieving optimal channel coding in a communication system |
FI113223B (en) | 1995-10-23 | 2004-03-15 | Nokia Corp | Method, apparatus and telecommunications network for collision avoidance in radio communication |
US5701302A (en) | 1995-10-25 | 1997-12-23 | Motorola, Inc, | Method and apparatus for adaptively companding data packets in a data communication system |
US5684791A (en) | 1995-11-07 | 1997-11-04 | Nec Usa, Inc. | Data link control protocols for wireless ATM access channels |
US5790551A (en) | 1995-11-28 | 1998-08-04 | At&T Wireless Services Inc. | Packet data transmission using dynamic channel assignment |
US5826188A (en) | 1995-12-07 | 1998-10-20 | Motorola, Inc. | Method and apparatus for handing off calls between differing radio telecommunication networks |
JP3563886B2 (en) * | 1995-12-18 | 2004-09-08 | シャープ株式会社 | CATV system area shared block and CATV system using the block |
US5793416A (en) | 1995-12-29 | 1998-08-11 | Lsi Logic Corporation | Wireless system for the communication of audio, video and data signals over a narrow bandwidth |
US6111863A (en) | 1995-12-29 | 2000-08-29 | Lsi Logic Corporation | Method and apparatus for the dynamic allocation of signal bandwidth between audio, video and data signals |
US5801700A (en) | 1996-01-19 | 1998-09-01 | Silicon Graphics Incorporated | System and method for an iconic drag and drop interface for electronic file transfer |
US5742610A (en) * | 1996-02-06 | 1998-04-21 | Motorola, Inc. | Method and apparatus for use in a data communications network serving subscribers operating at a plurality of transmisson data rates |
EP0828398A4 (en) | 1996-03-08 | 2005-06-22 | Nippon Telegraph & Telephone | Packet data transferring method for mobile radio data communication system |
NZ331915A (en) | 1996-03-18 | 1999-05-28 | Gen Instrument Corp | Dynamic bandwidth allocation for a communication network |
US5828677A (en) | 1996-03-20 | 1998-10-27 | Lucent Technologies Inc. | Adaptive hybrid ARQ coding schemes for slow fading channels in mobile radio systems |
US5831975A (en) | 1996-04-04 | 1998-11-03 | Lucent Technologies Inc. | System and method for hierarchical multicast routing in ATM networks |
US5768527A (en) | 1996-04-23 | 1998-06-16 | Motorola, Inc. | Device, system and method of real-time multimedia streaming |
TW317058B (en) | 1996-04-23 | 1997-10-01 | Ibm | Data communication system for a wireless access to an atm network |
US5953344A (en) | 1996-04-30 | 1999-09-14 | Lucent Technologies Inc. | Method and apparatus enabling enhanced throughput efficiency by use of dynamically adjustable mini-slots in access protocols for shared transmission media |
JP2001501785A (en) | 1996-05-10 | 2001-02-06 | フジツウ ネットワーク コミュニケーションズ,インコーポレイテッド | Method and apparatus for enabling flow control over multiple networks with heterogeneous flow control capabilities |
US6373946B1 (en) | 1996-05-31 | 2002-04-16 | Ico Services Ltd. | Communication security |
US5884148A (en) | 1996-07-08 | 1999-03-16 | Omnipoint Corporation | Wireless local loop system and method |
US5793768A (en) * | 1996-08-13 | 1998-08-11 | At&T Corp | Method and apparatus for collapsing TCP ACKs on asymmetrical connections |
US5831971A (en) | 1996-08-22 | 1998-11-03 | Lucent Technologies, Inc. | Method for leaky bucket traffic shaping using fair queueing collision arbitration |
US5841777A (en) | 1996-08-30 | 1998-11-24 | Hewlett-Packard Company | System and method for accommodating ABR and CBR traffic on a shared communications channel |
US6330244B1 (en) | 1996-09-05 | 2001-12-11 | Jerome Swartz | System for digital radio communication between a wireless lan and a PBX |
US5936949A (en) | 1996-09-05 | 1999-08-10 | Netro Corporation | Wireless ATM metropolitan area network |
US5959999A (en) | 1996-09-20 | 1999-09-28 | Linkabit Wireless, Inc. | Providing control-function data in communication-data channel of a full-mesh satellite communication network by dynamic time-slot assignment in TDMA-frame communication channel |
JP2882384B2 (en) | 1996-09-27 | 1999-04-12 | 日本電気株式会社 | Traffic shaping device |
US5875395A (en) | 1996-10-09 | 1999-02-23 | At&T Wireless Services Inc. | Secure equipment automation using a personal base station |
DE69726697T2 (en) | 1996-10-25 | 2004-10-21 | Nokia Corp | Radio capacity control procedure |
US6304564B1 (en) | 1996-11-29 | 2001-10-16 | Lucent Technologies Inc. | Method for transmitting messages in wireless communication system using a server process |
KR100194577B1 (en) | 1996-12-02 | 1999-06-15 | 정선종 | Media Access Control Architecture and Method for Wireless ATM Network |
KR19980063990A (en) | 1996-12-11 | 1998-10-07 | 윌리엄비.켐플러 | How to allocate and deallocate transmission resources within the local multipoint distribution service system |
US6097722A (en) | 1996-12-13 | 2000-08-01 | Nortel Networks Corporation | Bandwidth management processes and systems for asynchronous transfer mode networks using variable virtual paths |
FI965138A (en) | 1996-12-20 | 1998-06-21 | Nokia Mobile Phones Ltd | A method for identifying a communication device |
US5923651A (en) | 1996-12-23 | 1999-07-13 | Alcatel Usa Sourcing, L.P. | Increasing data throughput in a wireless telecommunications environment |
US6324267B1 (en) | 1997-01-17 | 2001-11-27 | Scientific-Atlanta, Inc. | Two-tiered authorization and authentication for a cable data delivery system |
US5838670A (en) | 1997-01-29 | 1998-11-17 | Telefonaktiebolaget L M Ericsson | Point to multipoint radio access system |
WO1998037706A2 (en) | 1997-02-21 | 1998-08-27 | Motorola Inc. | Method and apparatus for allocating spectral resources in a wireless communication system |
US5974028A (en) | 1997-02-24 | 1999-10-26 | At&T Corp. | System and method for improving transport protocol performance in communication networks having lossy links |
FI970772A (en) | 1997-02-24 | 1998-08-25 | Nokia Telecommunications Oy | Channel allocation in the radio band |
JP3033510B2 (en) | 1997-02-26 | 2000-04-17 | 三菱電機株式会社 | Wireless packet transmission system |
US6167261A (en) | 1997-02-27 | 2000-12-26 | At&T Wireless Svcs. Inc. | Wireless communication service management |
TW359926B (en) | 1997-02-28 | 1999-06-01 | Motorola Inc | Method and system for operating multiple terminal equipment units using a fixed wireless terminal |
US5991292A (en) | 1997-03-06 | 1999-11-23 | Nortel Networks Corporation | Network access in multi-service environment |
US5956330A (en) | 1997-03-31 | 1999-09-21 | Resound Corporation | Bandwidth management in a heterogenous wireless personal communications system |
US6295285B1 (en) * | 1997-04-17 | 2001-09-25 | Lucent Technologies Inc. | Global packet dynamic resource allocation for wireless networks |
US6076114A (en) * | 1997-04-18 | 2000-06-13 | International Business Machines Corporation | Methods, systems and computer program products for reliable data transmission over communications networks |
US6002935A (en) | 1997-05-22 | 1999-12-14 | At&T Corp | Wireless communications cellular architecture for improving communications resource allocation |
US5960000A (en) | 1997-05-30 | 1999-09-28 | Motorola Inc. | System, device, and method for contention-based reservation in a shared medium network |
JPH10336202A (en) | 1997-06-03 | 1998-12-18 | Fuji Xerox Co Ltd | Data transfer device and its method |
US6097733A (en) | 1997-06-13 | 2000-08-01 | Nortel Networks Corporation | System and associated method of operation for managing bandwidth in a wireless communication system supporting multimedia communications |
JP3343054B2 (en) * | 1997-07-01 | 2002-11-11 | ケイディーディーアイ株式会社 | Internet compatible link monitor method |
US6115357A (en) | 1997-07-01 | 2000-09-05 | Packeteer, Inc. | Method for pacing data flow in a packet-based network |
US6151628A (en) | 1997-07-03 | 2000-11-21 | 3Com Corporation | Network access methods, including direct wireless to internet access |
GB2327568A (en) | 1997-07-18 | 1999-01-27 | Northern Telecom Ltd | Central office switch services for fixed wireless access communication systems |
US6385195B2 (en) | 1997-07-21 | 2002-05-07 | Telefonaktiebolaget L M Ericsson (Publ) | Enhanced interworking function for interfacing digital cellular voice and fax protocols and internet protocols |
US6138022A (en) * | 1997-07-23 | 2000-10-24 | Nortel Networks Corporation | Cellular communication network with vocoder sharing feature |
US6937566B1 (en) * | 1997-07-25 | 2005-08-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Dynamic quality of service reservation in a mobile communications network |
US6073029A (en) * | 1997-07-25 | 2000-06-06 | U S West, Inc. | Method and system for providing wireless communications to a subscriber of a private wireline network |
US6006264A (en) * | 1997-08-01 | 1999-12-21 | Arrowpoint Communications, Inc. | Method and system for directing a flow between a client and a server |
US6320846B1 (en) | 1997-08-05 | 2001-11-20 | Hi/Fm, Inc. | Method and apparatus for controlling network bandwidth |
US6049549A (en) * | 1997-08-14 | 2000-04-11 | University Of Massachusetts | Adaptive media control |
US6243577B1 (en) | 1997-08-15 | 2001-06-05 | Hewlett-Packard Corporation | Frequency translation to local multi-point distribution system for personal communications services |
US6310886B1 (en) | 1997-08-28 | 2001-10-30 | Tivo, Inc. | Method and apparatus implementing a multimedia digital network |
AUPO932297A0 (en) | 1997-09-19 | 1997-10-09 | Commonwealth Scientific And Industrial Research Organisation | Medium access control protocol for data communications |
US6608832B2 (en) * | 1997-09-25 | 2003-08-19 | Telefonaktiebolaget Lm Ericsson | Common access between a mobile communications network and an external network with selectable packet-switched and circuit-switched and circuit-switched services |
US6104928A (en) * | 1997-10-07 | 2000-08-15 | Nortel Dasa Network System Gmbh & Co. Kg | Dual network integration scheme |
US6005851A (en) | 1997-10-10 | 1999-12-21 | Nortel Networks Corporation | Adaptive channel control for data service delivery |
US6327254B1 (en) | 1997-10-14 | 2001-12-04 | Lucent Technologies Inc. | Method for bandwidth sharing in a multiple access system for communications networks |
US6115390A (en) | 1997-10-14 | 2000-09-05 | Lucent Technologies, Inc. | Bandwidth reservation and collision resolution method for multiple access communication networks where remote hosts send reservation requests to a base station for randomly chosen minislots |
US6757746B2 (en) * | 1997-10-14 | 2004-06-29 | Alacritech, Inc. | Obtaining a destination address so that a network interface device can write network data without headers directly into host memory |
US6414950B1 (en) | 1997-10-14 | 2002-07-02 | Lucent Technologies Inc. | Sequence delivery of messages |
US6141533A (en) | 1997-11-13 | 2000-10-31 | Motorola, Inc. | Method and apparatus for a mobile repeater |
US6104721A (en) | 1997-12-02 | 2000-08-15 | Symmetry Communcations System | DSP based dynamic resource allocation multiprocessor communications board |
IL127451A0 (en) | 1997-12-11 | 1999-10-28 | Floware System Solutions Ltd | Method for dynamic bandwidth allocation and fast setup method for airlink protocols |
US6154643A (en) | 1997-12-17 | 2000-11-28 | Nortel Networks Limited | Band with provisioning in a telecommunications system having radio links |
FI974558A (en) | 1997-12-18 | 1999-06-19 | Nokia Mobile Phones Ltd | Resource reservation in mobile Internet protocol |
US6393008B1 (en) * | 1997-12-23 | 2002-05-21 | Nokia Movile Phones Ltd. | Control structures for contention-based packet data services in wideband CDMA |
US6430174B1 (en) | 1997-12-26 | 2002-08-06 | Nortel Networks Ltd. | Communication system supporting simultaneous voice and multimedia communications and method of operation therefore |
US6131117A (en) | 1997-12-29 | 2000-10-10 | Cisco Technology, Inc. | Technique for correlating logical names with IP addresses on internetworking platforms |
US6131027A (en) | 1997-12-29 | 2000-10-10 | Motorola, Inc. | System for controlling network bandwidth |
FI108827B (en) | 1998-01-08 | 2002-03-28 | Nokia Corp | A method for implementing connection security in a wireless network |
US6381250B1 (en) * | 1998-01-23 | 2002-04-30 | Innovative Communications Technologies, Inc. | Capacity allocation system using semi-autonomous network elements to implement and control a transmission schedule |
US6154776A (en) | 1998-03-20 | 2000-11-28 | Sun Microsystems, Inc. | Quality of service allocation on a network |
US6459682B1 (en) | 1998-04-07 | 2002-10-01 | International Business Machines Corporation | Architecture for supporting service level agreements in an IP network |
US6714553B1 (en) | 1998-04-15 | 2004-03-30 | Top Layer Networks, Inc. | System and process for flexible queuing of data packets in network switching |
US5974085A (en) | 1998-04-17 | 1999-10-26 | Motorola, Inc. | Wireless modem and method therefor for routing data to an application or to storage |
US6331986B1 (en) | 1998-04-24 | 2001-12-18 | Lucent Technologies Inc. | Method for resource allocation and routing in multi-service virtual private networks |
US6046979A (en) | 1998-05-04 | 2000-04-04 | Cabletron Systems, Inc. | Method and apparatus for controlling the flow of variable-length packets through a multiport switch |
US6636485B1 (en) | 1998-05-14 | 2003-10-21 | 3Com Corporation | Method and system for providing quality-of-service in a data-over-cable system |
US6131012A (en) | 1998-05-26 | 2000-10-10 | Nera Wireless Broadband Access As | Method and system for a micro-channel bank for providing voice, data, and multimedia services in a wireless local loop system |
US6331987B1 (en) | 1998-05-27 | 2001-12-18 | 3Com Corporation | Method and system for bundling data in a data-over-cable system |
US6442158B1 (en) | 1998-05-27 | 2002-08-27 | 3Com Corporation | Method and system for quality-of-service based data forwarding in a data-over-cable system |
US6397259B1 (en) * | 1998-05-29 | 2002-05-28 | Palm, Inc. | Method, system and apparatus for packet minimized communications |
US6272333B1 (en) | 1998-06-12 | 2001-08-07 | Motorola, Inc. | Method and apparatus in a wireless communication system for controlling a delivery of data |
US6438370B1 (en) | 1998-06-16 | 2002-08-20 | Nokia Telecommunications, Oy | Location update method and inter core network entity handover method |
US6829242B2 (en) | 1998-06-30 | 2004-12-07 | Cisco Technology, Inc. | Method and apparatus for associating PVC identifiers with domain names of home gateways |
US6590885B1 (en) | 1998-07-10 | 2003-07-08 | Malibu Networks, Inc. | IP-flow characterization in a wireless point to multi-point (PTMP) transmission system |
US6680922B1 (en) | 1998-07-10 | 2004-01-20 | Malibu Networks, Inc. | Method for the recognition and operation of virtual private networks (VPNs) over a wireless point to multi-point (PtMP) transmission system |
US6628629B1 (en) | 1998-07-10 | 2003-09-30 | Malibu Networks | Reservation based prioritization method for wireless transmission of latency and jitter sensitive IP-flows in a wireless point to multi-point transmission system |
US6862622B2 (en) | 1998-07-10 | 2005-03-01 | Van Drebbel Mariner Llc | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PTMP) transmission system architecture |
US6452915B1 (en) | 1998-07-10 | 2002-09-17 | Malibu Networks, Inc. | IP-flow classification in a wireless point to multi-point (PTMP) transmission system |
US6640248B1 (en) | 1998-07-10 | 2003-10-28 | Malibu Networks, Inc. | Application-aware, quality of service (QoS) sensitive, media access control (MAC) layer |
US6594246B1 (en) * | 1998-07-10 | 2003-07-15 | Malibu Networks, Inc. | IP-flow identification in a wireless point to multi-point transmission system |
US6587684B1 (en) | 1998-07-28 | 2003-07-01 | Bell Atlantic Nynex Mobile | Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol |
US6160793A (en) | 1998-10-13 | 2000-12-12 | Nokia Telecommunications, Oy | ECN-based approach for congestion management in hybrid IP-ATM networks |
US6330451B1 (en) | 1998-10-13 | 2001-12-11 | Nortel Networks Limited | Selectively delaying data communications in a wireless communication system to provide voice communications capacity |
US6160804A (en) | 1998-11-13 | 2000-12-12 | Lucent Technologies Inc. | Mobility management for a multimedia mobile network |
US6272129B1 (en) | 1999-01-19 | 2001-08-07 | 3Com Corporation | Dynamic allocation of wireless mobile nodes over an internet protocol (IP) network |
US6449251B1 (en) * | 1999-04-02 | 2002-09-10 | Nortel Networks Limited | Packet mapper for dynamic data packet prioritization |
US7933295B2 (en) * | 1999-04-13 | 2011-04-26 | Broadcom Corporation | Cable modem with voice processing capability |
US6925068B1 (en) | 1999-05-21 | 2005-08-02 | Wi-Lan, Inc. | Method and apparatus for allocating bandwidth in a wireless communication system |
US7095708B1 (en) | 1999-06-23 | 2006-08-22 | Cingular Wireless Ii, Llc | Methods and apparatus for use in communicating voice and high speed data in a wireless communication system |
EP1796305B1 (en) | 1999-07-09 | 2016-02-17 | Intellectual Ventures I LLC | TCP/IP packet-centric wireless transmission system architecture |
AU5920000A (en) | 1999-07-09 | 2001-02-13 | Malibu Networks, Inc. | Method for transmission control protocol (tcp) rate control with link-layer acknowledgements in a wireless point to multi-point (ptmp) transmission system |
US6263209B1 (en) | 1999-07-28 | 2001-07-17 | Motorola, Inc. | Method and apparatus in a wireless communication system for creating a learning function |
US6466651B1 (en) | 2000-07-12 | 2002-10-15 | Telefonaktiebolaget Lm Ericsson | Call agents and systems and methods for providing emergency call services on heterogeneous networks |
US20020031115A1 (en) * | 2000-09-11 | 2002-03-14 | Petryna Brian J. | System and method for automatically establishing a telephone call over a computer network |
WO2002032053A2 (en) * | 2000-10-13 | 2002-04-18 | Astrolink International, Llc | Distributed ip over atm architecture |
US7095754B2 (en) | 2000-11-03 | 2006-08-22 | At&T Corp. | Tiered contention multiple access (TCMA): a method for priority-based shared channel access |
US7072650B2 (en) | 2000-11-13 | 2006-07-04 | Meshnetworks, Inc. | Ad hoc peer-to-peer mobile radio access system interfaced to the PSTN and cellular networks |
AU2002352744A1 (en) * | 2001-11-15 | 2003-06-10 | University Of Southern California | Optically boosted router |
-
1999
- 1999-07-09 US US09/349,477 patent/US6862622B2/en not_active Expired - Lifetime
-
2005
- 2005-02-28 US US11/068,719 patent/US7409450B2/en not_active Expired - Lifetime
-
2006
- 2006-08-10 US US11/502,348 patent/US7496674B2/en not_active Expired - Fee Related
- 2006-08-10 US US11/502,596 patent/US20070038752A1/en not_active Abandoned
- 2006-08-10 US US11/502,583 patent/US7359971B2/en not_active Expired - Fee Related
- 2006-08-10 US US11/502,601 patent/US7359972B2/en not_active Expired - Fee Related
- 2006-08-10 US US11/502,101 patent/US20070050492A1/en not_active Abandoned
- 2006-08-10 US US11/502,331 patent/US7412517B2/en not_active Expired - Fee Related
- 2006-08-10 US US11/502,599 patent/US20070038753A1/en not_active Abandoned
-
2008
- 2008-08-01 US US12/184,902 patent/US20090271512A1/en not_active Abandoned
-
2012
- 2012-06-12 US US13/494,904 patent/US9712289B2/en not_active Expired - Fee Related
-
2017
- 2017-07-18 US US15/653,161 patent/US20180069668A1/en not_active Abandoned
Patent Citations (100)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4742512A (en) * | 1985-07-19 | 1988-05-03 | Nec Corporation | Multipoint communication system having polling and reservation schemes |
US4907224A (en) * | 1986-10-17 | 1990-03-06 | Bydatel Corporation | Method for transmitting data in multiple access data communications networks |
US4802836A (en) * | 1987-07-13 | 1989-02-07 | Gilles Whissell | Compaction device for concrete block molding machine |
US6084867A (en) * | 1991-10-01 | 2000-07-04 | Intermec Ip Corp. | Apparatus and method of routing data in a radio frequency local area network |
US5231634A (en) * | 1991-12-18 | 1993-07-27 | Proxim, Inc. | Medium access protocol for wireless lans |
US5231634B1 (en) * | 1991-12-18 | 1996-04-02 | Proxim Inc | Medium access protocol for wireless lans |
US5758281A (en) * | 1992-03-05 | 1998-05-26 | Bell Atlantic Network Services, Inc. | Personal communications service using wireline/wireless integration |
US5282222A (en) * | 1992-03-31 | 1994-01-25 | Michel Fattouche | Method and apparatus for multiple access between transceivers in wireless communications using OFDM spread spectrum |
US5337313A (en) * | 1992-11-12 | 1994-08-09 | Motorola, Inc. | Method and apparatus for preserving packet squencing in a packet transmission system |
US5499243A (en) * | 1993-01-22 | 1996-03-12 | Hall; Dennis R. | Method and apparatus for coordinating transfer of information between a base station and a plurality of radios |
US5493569A (en) * | 1993-03-12 | 1996-02-20 | Motorola Inc. | Method and apparatus for reducing the likelihood of contention and resource misallocation in a packet transmission system |
US5613198A (en) * | 1993-04-30 | 1997-03-18 | International Business Machines Corporation | Multiaccess scheme for mobile integrated local area networks |
US6336143B1 (en) * | 1993-09-27 | 2002-01-01 | International Business Machines Corporation | Method and apparatus for multimedia data interchange with pacing capability in a distributed data processing system |
US5745551A (en) * | 1993-10-27 | 1998-04-28 | Tcsi Corporation | Telecommunication apparatus for receiving, storing and forwarding a plurality of voice signals to a wireless network, in response to a control signal therefrom |
US5602836A (en) * | 1993-11-24 | 1997-02-11 | Lucent Technologies Inc. | Multiple access cellular communication with circular interleaving and reduced dropped-packet runlengths |
US5594720A (en) * | 1993-11-24 | 1997-01-14 | Lucent Technologies Inc. | Multiple access cellular communication with dynamic slot allocation and reduced co-channel interferences |
US5420851A (en) * | 1993-11-24 | 1995-05-30 | At&T Corp. | Method of multiple access |
US5640395A (en) * | 1994-05-03 | 1997-06-17 | Nokia Mobile Phones Ltd. | System for transmitting packet data in digital cellular time division multiple access (TDMA) air interface |
US5497504A (en) * | 1994-05-13 | 1996-03-05 | The Trustees Of Columbia University | System and method for connection control in mobile communications |
US5442625A (en) * | 1994-05-13 | 1995-08-15 | At&T Ipm Corp | Code division multiple access system providing variable data rate access to a user |
US5487061A (en) * | 1994-06-27 | 1996-01-23 | Loral Fairchild Corporation | System and method for providing multiple loss and service priorities |
US5724513A (en) * | 1994-06-30 | 1998-03-03 | Digital Equipment Corporation | Traffic shaping system for asynchronous transfer mode networks |
US5515363A (en) * | 1994-06-30 | 1996-05-07 | Digital Equipment Corporation | Traffic shaping system with transmit latency feedback for asynchronous transfer mode networks |
US5644576A (en) * | 1994-10-26 | 1997-07-01 | International Business Machines Corporation | Medium access control scheme for wireless LAN using a variable length interleaved time division frame |
US5742847A (en) * | 1994-10-31 | 1998-04-21 | Intel Corporation | M&A for dynamically generating and maintaining frame based polling schedules for polling isochronous and asynchronous functions that guaranty latencies and bandwidths to the isochronous functions |
US5648969A (en) * | 1995-02-13 | 1997-07-15 | Netro Corporation | Reliable ATM microwave link and network |
US5625877A (en) * | 1995-03-15 | 1997-04-29 | International Business Machines Corporation | Wireless variable bandwidth air-link system |
US5638371A (en) * | 1995-06-27 | 1997-06-10 | Nec Usa, Inc. | Multiservices medium access control protocol for wireless ATM system |
US5729542A (en) * | 1995-06-28 | 1998-03-17 | Motorola, Inc. | Method and apparatus for communication system access |
US5610910A (en) * | 1995-08-17 | 1997-03-11 | Northern Telecom Limited | Access to telecommunications networks in multi-service environment |
US6363209B2 (en) * | 1995-08-25 | 2002-03-26 | Sony Corporation | Signal recording/reproducing method and apparatus, signal record medium and signal |
US5752193A (en) * | 1995-09-01 | 1998-05-12 | Motorola, Inc. | Method and apparatus for communicating in a wireless communication system |
US5774461A (en) * | 1995-09-27 | 1998-06-30 | Lucent Technologies Inc. | Medium access control and air interface subsystem for an indoor wireless ATM network |
US5717689A (en) * | 1995-10-10 | 1998-02-10 | Lucent Technologies Inc. | Data link layer protocol for transport of ATM cells over a wireless link |
US5751708A (en) * | 1995-10-25 | 1998-05-12 | Lucent Technologies Inc. | Access method for broadband and narrowband networks |
US5732077A (en) * | 1995-11-13 | 1998-03-24 | Lucent Technologies Inc. | Resource allocation system for wireless networks |
US5920705A (en) * | 1996-01-31 | 1999-07-06 | Nokia Ip, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
US5889816A (en) * | 1996-02-02 | 1999-03-30 | Lucent Technologies, Inc. | Wireless adapter architecture for mobile computing |
US5734833A (en) * | 1996-03-12 | 1998-03-31 | Hewlett-Packard Company | Shared communications channel with enhanced reservation and collision resolution protocols allows any subset of stations to transmit data after collision occured in contention slot |
US5745480A (en) * | 1996-04-03 | 1998-04-28 | Adicom Wireless, Inc. | Multi-rate wireless communications system |
US6021158A (en) * | 1996-05-09 | 2000-02-01 | Texas Instruments Incorporated | Hybrid wireless wire-line network integration and management |
US6058114A (en) * | 1996-05-20 | 2000-05-02 | Cisco Systems, Inc. | Unified network cell scheduler and flow controller |
US5787080A (en) * | 1996-06-03 | 1998-07-28 | Philips Electronics North America Corporation | Method and apparatus for reservation-based wireless-ATM local area network |
US5787077A (en) * | 1996-06-04 | 1998-07-28 | Ascom Tech Ag | Dynamic connection mapping in wireless ATM systems |
US6041051A (en) * | 1996-06-14 | 2000-03-21 | Lucent Technologies, Inc. | Method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network utilizing an adaptive digital access protocol |
US6092113A (en) * | 1996-08-29 | 2000-07-18 | Kokusai Denshin Denwa, Co., Ltd. | Method for constructing a VPN having an assured bandwidth |
US5905719A (en) * | 1996-09-19 | 1999-05-18 | Bell Communications Research, Inc. | Method and system for wireless internet access |
US6047189A (en) * | 1996-10-11 | 2000-04-04 | Arraycomm, Inc. | Adaptive method for channel assignment in a cellular communication system |
US5909550A (en) * | 1996-10-16 | 1999-06-01 | Cisco Technology, Inc. | Correlation technique for use in managing application-specific and protocol-specific resources of heterogeneous integrated computer network |
US6038216A (en) * | 1996-11-01 | 2000-03-14 | Packeteer, Inc. | Method for explicit data rate control in a packet communication environment without data rate supervision |
US6031832A (en) * | 1996-11-27 | 2000-02-29 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for improving performance of a packet communications system |
US6046980A (en) * | 1996-12-09 | 2000-04-04 | Packeteer, Inc. | System for managing flow bandwidth utilization at network, transport and application layers in store and forward network |
US6198728B1 (en) * | 1996-12-19 | 2001-03-06 | Phillips Electronics North America Corp. | Medium access control (MAC) protocol for wireless ATM |
US6028842A (en) * | 1996-12-23 | 2000-02-22 | Nortel Networks Corporation | Dynamic traffic conditioning |
US6064649A (en) * | 1997-01-31 | 2000-05-16 | Nec Usa, Inc. | Network interface card for wireless asynchronous transfer mode networks |
US6084855A (en) * | 1997-02-18 | 2000-07-04 | Nokia Telecommunications, Oy | Method and apparatus for providing fair traffic scheduling among aggregated internet protocol flows |
US5864540A (en) * | 1997-04-04 | 1999-01-26 | At&T Corp/Csi Zeinet(A Cabletron Co.) | Method for integrated traffic shaping in a packet-switched network |
US5907822A (en) * | 1997-04-04 | 1999-05-25 | Lincom Corporation | Loss tolerant speech decoder for telecommunications |
US6517614B1 (en) * | 1997-04-24 | 2003-02-11 | Filterwerk Mann & Hummel Gmbh | Plastic hollow structure |
US6052594A (en) * | 1997-04-30 | 2000-04-18 | At&T Corp. | System and method for dynamically assigning channels for wireless packet communications |
US6075787A (en) * | 1997-05-08 | 2000-06-13 | Lucent Technologies Inc. | Method and apparatus for messaging, signaling, and establishing a data link utilizing multiple modes over a multiple access broadband communications network |
US6031845A (en) * | 1997-05-14 | 2000-02-29 | Airspan Communications Corporation | Allocation of bandwidth to calls in a wireless telecommunications system |
US6075792A (en) * | 1997-06-16 | 2000-06-13 | Interdigital Technology Corporation | CDMA communication system which selectively allocates bandwidth upon demand |
US6038451A (en) * | 1997-06-18 | 2000-03-14 | Integrated Telecom Solutions, Inc. | Location based method of and system for forwarding wireless telephone calls |
US6081536A (en) * | 1997-06-20 | 2000-06-27 | Tantivy Communications, Inc. | Dynamic bandwidth allocation to transmit a wireless protocol across a code division multiple access (CDMA) radio link |
US6188671B1 (en) * | 1997-07-03 | 2001-02-13 | At&T Corp | Traffic management for frame relay switched data service |
US6081524A (en) * | 1997-07-03 | 2000-06-27 | At&T Corp. | Frame relay switched data service |
US6038452A (en) * | 1997-08-29 | 2000-03-14 | Nortel Networks Corporation | Telecommunication network utilizing a quality of service protocol |
US5872777A (en) * | 1997-09-30 | 1999-02-16 | Motorola, Inc. | Method and apparatus for conveying data packets in a packet data communication system |
US6400722B1 (en) * | 1997-10-14 | 2002-06-04 | Lucent Technologies Inc. | Optimum routing system |
US6377548B1 (en) * | 1997-10-14 | 2002-04-23 | Lucent Technologies Inc. | Method for admitting new connections based on measured quantities in a multiple access system for communications networks |
US6407992B1 (en) * | 1997-10-22 | 2002-06-18 | Netro Corporation | Multiplexing terminals in a distributed network |
US6021439A (en) * | 1997-11-14 | 2000-02-01 | International Business Machines Corporation | Internet quality-of-service method and system |
US6018516A (en) * | 1997-11-14 | 2000-01-25 | Packeteer, Inc. | Method for minimizing unneeded retransmission of packets in a packet communication environment supporting a plurality of data link rates |
US6016311A (en) * | 1997-11-19 | 2000-01-18 | Ensemble Communications, Inc. | Adaptive time division duplexing method and apparatus for dynamic bandwidth allocation within a wireless communication system |
US6175860B1 (en) * | 1997-11-26 | 2001-01-16 | International Business Machines Corporation | Method and apparatus for an automatic multi-rate wireless/wired computer network |
US6262980B1 (en) * | 1997-12-02 | 2001-07-17 | At&T Corp | Dynamic resource allocation method and apparatus for broadband services in a wireless communications system |
US6546016B1 (en) * | 1997-12-31 | 2003-04-08 | At&T Corp. | Coaxial cable/twisted pair cable telecommunications network architecture |
US6192029B1 (en) * | 1998-01-29 | 2001-02-20 | Motorola, Inc. | Method and apparatus for performing flow control in a wireless communications system |
US6412006B2 (en) * | 1998-02-10 | 2002-06-25 | 3Com Corporation | Method and apparatus for sending delay sensitive information assisted by packet switched networks |
US6195565B1 (en) * | 1998-03-03 | 2001-02-27 | Lucent Technologies Inc. | Bandwidth control in a packet-based data system |
US6252857B1 (en) * | 1998-03-04 | 2001-06-26 | At&T Corp. | Method and apparatus for provisioned and dynamic quality of service in a communications network |
US6205120B1 (en) * | 1998-03-13 | 2001-03-20 | Packeteer, Inc. | Method for transparently determining and setting an optimal minimum required TCP window size |
US6236656B1 (en) * | 1998-03-19 | 2001-05-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Link-efficiency based scheduling in radio data communications systems |
US6201811B1 (en) * | 1998-03-24 | 2001-03-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Transferring Identifier information in a telecommunications system |
US6247058B1 (en) * | 1998-03-30 | 2001-06-12 | Hewlett-Packard Company | Method and apparatus for processing network packets using time stamps |
US5930472A (en) * | 1998-04-29 | 1999-07-27 | Motorola, Inc. | Method and apparatus in a wireless communication system for splitting a browser functionality between a wireless client and an infrastructure portion |
US6353616B1 (en) * | 1998-05-21 | 2002-03-05 | Lucent Technologies Inc. | Adaptive processor schedulor and method for reservation protocol message processing |
US6512751B1 (en) * | 1998-05-26 | 2003-01-28 | Paul F. Struhsaker | Method and system protocols for providing voice, data, and multimedia services in a wireless local loop system |
US6219713B1 (en) * | 1998-07-07 | 2001-04-17 | Nokia Telecommunications, Oy | Method and apparatus for adjustment of TCP sliding window with information about network conditions |
US6038230A (en) * | 1998-07-22 | 2000-03-14 | Synchrodyne, Inc. | Packet switching with common time reference over links with dynamically varying delays |
US6014377A (en) * | 1998-08-05 | 2000-01-11 | Us West, Inc. | System and method for an integrated wireline/wireless service using private branch exchange lines |
US6215769B1 (en) * | 1998-10-07 | 2001-04-10 | Nokia Telecommunications, Inc. | Enhanced acknowledgment pacing device and method for TCP connections |
US6235300B1 (en) * | 1999-01-19 | 2001-05-22 | Amway Corporation | Plant protecting adjuvant containing topped or peaked alcohol alkoxylates and conventional alcohol alkoxylates |
US6363053B1 (en) * | 1999-02-08 | 2002-03-26 | 3Com Corporation | Method and apparatus for measurement-based conformance testing of service level agreements in networks |
US6377782B1 (en) * | 1999-03-01 | 2002-04-23 | Mediacell, Inc. | Method and apparatus for communicating between a client device and a linear broadband network |
US6072790A (en) * | 1999-05-13 | 2000-06-06 | Motorola, Inc. | Method and apparatus for performing distribution in a communication system |
US6091959A (en) * | 1999-06-02 | 2000-07-18 | Motorola, Inc. | Method and apparatus in a two-way wireless communication system for location-based message transmission |
US6208620B1 (en) * | 1999-08-02 | 2001-03-27 | Nortel Networks Corporation | TCP-aware agent sublayer (TAS) for robust TCP over wireless |
US20020099949A1 (en) * | 2001-01-19 | 2002-07-25 | Fries Robert M. | Systems and methods for detecting tampering of a computer system by calculating a boot signature |
Cited By (96)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8204046B2 (en) | 1995-12-11 | 2012-06-19 | Comcast Ip Holdings I, Llc | Method and apparatus for accessing service resource items that are for use in a telecommunications system |
US7715371B2 (en) | 1995-12-11 | 2010-05-11 | Comcast Ip Holdings I, Llc | Method and apparatus for accessing communication data relevant to a target entity identified by a number string |
US7903641B2 (en) | 1995-12-11 | 2011-03-08 | Comcast Ip Holdings, I, Llc | Method and apparatus for accessing communication data relevant to a target entity identified by a number string |
US8938062B2 (en) | 1995-12-11 | 2015-01-20 | Comcast Ip Holdings I, Llc | Method for accessing service resource items that are for use in a telecommunications system |
US20050141491A1 (en) * | 1995-12-11 | 2005-06-30 | Hewlett-Packard Development Company, L.P. | Method and apparatus for accessing communication data relevant to a target entity identified by a number string |
US8223752B2 (en) | 1995-12-11 | 2012-07-17 | Comcast Ip Holdings I, Llc | Method for accessing service resource items that are for use in a telecommunications system |
US8189565B2 (en) | 1995-12-11 | 2012-05-29 | Comcast Ip Holdings I, Llc | Method and apparatus for accessing communication data relevant to a target entity identified by a number string |
US8170008B2 (en) | 1995-12-11 | 2012-05-01 | Comcast Ip Holdings I, Llc | Method and apparatus for accessing communication data relevant to a target entity identified by a number string |
US7804816B2 (en) | 1995-12-11 | 2010-09-28 | Comcast Ip Holdings I, Llc | Method and apparatus for accessing communication data relevant to a target entity identified by a number string |
USRE46206E1 (en) | 1998-07-10 | 2016-11-15 | Intellectual Ventures I Llc | Method and computer program product for internet protocol (IP)—flow classification in a wireless point to multi-point (PTMP) transmission system |
US9712289B2 (en) | 1998-07-10 | 2017-07-18 | Intellectual Ventures I Llc | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture |
US8060656B2 (en) | 1998-10-09 | 2011-11-15 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US20050223114A1 (en) * | 1998-10-09 | 2005-10-06 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US20050223115A1 (en) * | 1998-10-09 | 2005-10-06 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US8078727B2 (en) * | 1998-10-09 | 2011-12-13 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US9083622B2 (en) | 1998-10-09 | 2015-07-14 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US7469282B2 (en) * | 2003-01-21 | 2008-12-23 | At&T Intellectual Property I, L.P. | Method and system for provisioning and maintaining a circuit in a data network |
US20040143653A1 (en) * | 2003-01-21 | 2004-07-22 | Bellsouth Intellectual Property Corporation | Method and system for provisioning and maintaining a circuit in a data network |
US20090103544A1 (en) * | 2003-01-21 | 2009-04-23 | At&T Intellectual Property I, L.P. | Method and system for provisioning and maintaining a circuit in a data network |
US20110083045A1 (en) * | 2003-01-21 | 2011-04-07 | William Scott Taylor | Methods and systems for provisioning and maintaining a circuit in a data network |
US7890618B2 (en) | 2003-01-21 | 2011-02-15 | At&T Intellectual Property I, L.P. | Method and system for provisioning and maintaining a circuit in a data network |
US8200802B2 (en) | 2003-01-21 | 2012-06-12 | At&T Intellectual Property I, L.P. | Methods and systems for provisioning and maintaining a circuit in a data network |
US8730795B2 (en) | 2003-12-23 | 2014-05-20 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data |
US8203933B2 (en) | 2003-12-23 | 2012-06-19 | At&T Intellectual Property I, L.P. | Method and system for automatically identifying a logical circuit failure in a data network |
US20050135237A1 (en) * | 2003-12-23 | 2005-06-23 | Bellsouth Intellectual Property Corporation | Method and system for automatically rerouting logical circuit data in a data network |
US20050135254A1 (en) * | 2003-12-23 | 2005-06-23 | Bellsouth Intellectual Property Corporation | Method and system for automatically rerouting data from an overbalanced logical circuit in a data network |
US20050138476A1 (en) * | 2003-12-23 | 2005-06-23 | Bellsouth Intellectual Property Corporation | Method and system for prioritized rerouting of logical circuit data in a data network |
US9059900B2 (en) | 2003-12-23 | 2015-06-16 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data |
US8942086B2 (en) | 2003-12-23 | 2015-01-27 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data in a data network |
US20100046380A1 (en) * | 2003-12-23 | 2010-02-25 | William Taylor | Method and system for real time simultaneous monitoring of logical circuits in a data network |
US20050135238A1 (en) * | 2003-12-23 | 2005-06-23 | Bellsouth Intellectual Property Corporation | Method and system for providing a failover circuit for rerouting logical circuit data in a data network |
US8937856B2 (en) | 2003-12-23 | 2015-01-20 | At&T Intellectual Property I, L.P. | Methods and systems to reroute data in a data network |
US20100020677A1 (en) * | 2003-12-23 | 2010-01-28 | William Taylor | Methods and systems for automatically renaming logical circuit identifiers for rerouted logical circuits in a data network |
US7646707B2 (en) | 2003-12-23 | 2010-01-12 | At&T Intellectual Property I, L.P. | Method and system for automatically renaming logical circuit identifiers for rerouted logical circuits in a data network |
US8750102B2 (en) | 2003-12-23 | 2014-06-10 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data in a data network |
US20090323534A1 (en) * | 2003-12-23 | 2009-12-31 | William Taylor | Methods and systems for automatically rerouting data in a data network |
US20050172160A1 (en) * | 2003-12-23 | 2005-08-04 | Bellsouth Intellectual Property Corporation | Method and system for automatically rerouting logical circuit data in a virtual private network |
US8711679B2 (en) | 2003-12-23 | 2014-04-29 | At&T Intellectual Property I, L.P. | Methods and systems for automatically identifying a logical circuit failure in a data network |
US8031588B2 (en) | 2003-12-23 | 2011-10-04 | At&T Intellectual Property I, L.P. | Methods and systems for automatically renaming logical Circuit identifiers for rerouted logical circuits in a data network |
US8031620B2 (en) | 2003-12-23 | 2011-10-04 | At&T Intellectual Property I, L.P. | Method and system for real time simultaneous monitoring of logical circuits in a data network |
US8547830B2 (en) | 2003-12-23 | 2013-10-01 | At&T Intellectual Property I, L.P. | Methods and systems to reroute data in a data network |
US8547831B2 (en) | 2003-12-23 | 2013-10-01 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data |
US8345543B2 (en) | 2003-12-23 | 2013-01-01 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data |
US8243592B2 (en) | 2003-12-23 | 2012-08-14 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting data in a data network |
US20050172174A1 (en) * | 2003-12-23 | 2005-08-04 | Bellsouth Intellectual Property Corporation | Method and system for automatically identifying a logical circuit failure in a data network |
US8199638B2 (en) | 2003-12-23 | 2012-06-12 | At&T Intellectual Property I, L.P. | Method and system for automatically rerouting logical circuit data in a data network |
US8223632B2 (en) | 2003-12-23 | 2012-07-17 | At&T Intellectual Property I, L.P. | Method and system for prioritized rerouting of logical circuit data in a data network |
US8345537B2 (en) | 2004-04-22 | 2013-01-01 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data from a logical circuit failure to a dedicated backup circuit in a data network |
US8509058B2 (en) | 2004-04-22 | 2013-08-13 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data from a logical circuit failure to a dedicated backup circuit in a data network |
US8737196B2 (en) | 2004-04-22 | 2014-05-27 | At&T Intellectual Property I, L.P. | Methods and systems for automatically tracking the rerouting of logical circuit data in a data network |
US8953435B2 (en) | 2004-04-22 | 2015-02-10 | At&T Intellectual Property I, L.P. | Methods and systems for automatically tracking the rerouting of logical circuit data in a data network |
US8670348B2 (en) | 2004-04-22 | 2014-03-11 | At&T Intellectual Property I, L.P. | Methods and systems for provisioning logical circuits for intermittent use in a data network |
US8665705B2 (en) | 2004-04-22 | 2014-03-04 | At&T Intellectual Property I, L.P. | Methods and systems for automatically rerouting logical circuit data from a logical circuit failure to a dedicated backup circuit in a data network |
US9338051B2 (en) | 2004-04-22 | 2016-05-10 | At&T Intellectual Property I, L.P. | Methods and systems for automatically tracking the rerouting of logical circuit data in a data network |
US8953495B2 (en) | 2004-04-22 | 2015-02-10 | At&T Intellectual Property I, L.P. | Methods and systems for provisioning logical circuits for intermittent use in a data network |
US8339938B2 (en) | 2004-04-22 | 2012-12-25 | At&T Intellectual Property I, L.P. | Method and system for automatically tracking the rerouting of logical circuit data in a data network |
US8339988B2 (en) | 2004-04-22 | 2012-12-25 | At&T Intellectual Property I, L.P. | Method and system for provisioning logical circuits for intermittent use in a data network |
US9148365B2 (en) | 2004-04-22 | 2015-09-29 | At&T Intellectual Property I, L.P. | Methods and systems for automatically tracking the rerouting of logical circuit data in a data network |
US8565074B2 (en) | 2004-04-22 | 2013-10-22 | At&T Intellectual Property I, L.P. | Methods and systems for automatically tracking the rerouting of logical circuit data in a data network |
US20090086626A1 (en) * | 2004-04-22 | 2009-04-02 | William Taylor | Methods and systems for automatically rerouting logical circuit data from a logical circuit failure to a dedicated backup circuit in a data network |
US20050238024A1 (en) * | 2004-04-22 | 2005-10-27 | Bellsouth Intellectual Property Corporation | Method and system for provisioning logical circuits for intermittent use in a data network |
US20090041012A1 (en) * | 2004-04-22 | 2009-02-12 | William Taylor | Method and system for automatically tracking the rerouting of logical circuit data in a data network |
US7768904B2 (en) | 2004-04-22 | 2010-08-03 | At&T Intellectual Property I, L.P. | Method and system for fail-safe renaming of logical circuit identifiers for rerouted logical circuits in a data network |
US8509118B2 (en) | 2004-04-22 | 2013-08-13 | At&T Intellectual Property I, L.P. | Methods and systems for provisioning logical circuits for intermittent use in a data network |
US20070133584A1 (en) * | 2005-12-08 | 2007-06-14 | Youn Ji W | Ethernet line card and method of providing various services using the same |
US7724667B2 (en) * | 2005-12-08 | 2010-05-25 | Electronics And Telecommunications Research Institute | Ethernet line card and method of providing various services using the same |
US20110047271A1 (en) * | 2006-03-27 | 2011-02-24 | Thales | Method and system for allocating resources |
US8873379B2 (en) | 2006-05-16 | 2014-10-28 | At&T Intellectual Property I, L.P. | System and method to achieve sub-second routing performance |
US8295162B2 (en) | 2006-05-16 | 2012-10-23 | At&T Intellectual Property I, L.P. | System and method to achieve sub-second routing performance |
US20070268832A1 (en) * | 2006-05-16 | 2007-11-22 | Shih-Chung Tom Soon | System and method to achieve sub-second routing performance |
US20080117821A1 (en) * | 2006-11-20 | 2008-05-22 | Rajiv Asati | Adaptive quality of service in an easy virtual private network environment |
US8503453B2 (en) * | 2006-11-20 | 2013-08-06 | Cisco Technology, Inc. | Adaptive quality of service in an easy virtual private network environment |
US9154552B2 (en) * | 2007-09-06 | 2015-10-06 | Microsoft Technology Licensing, Llc | Method and apparatus for cooperative file distribution with receiver determined quality of services |
US20120317246A1 (en) * | 2007-09-06 | 2012-12-13 | Andrew Hickmott | Method and apparatus for cooperative file distribution with receiver determined quality of services |
US20090310613A1 (en) * | 2008-06-12 | 2009-12-17 | Motorola, Inc. | Method and system for intermediate node quality of service negotiations |
US9420494B2 (en) | 2008-06-12 | 2016-08-16 | Google Technology Holdings LLC | Method and system for intermediate node quality of service negotiations |
US8902821B2 (en) * | 2008-06-12 | 2014-12-02 | Motorola Mobility Llc | Method and system for intermediate node quality of service negotiations |
US20100069536A1 (en) * | 2008-07-17 | 2010-03-18 | Sau Arjun C | Process for tailoring water-borne coating compositions |
US8391880B2 (en) | 2008-10-16 | 2013-03-05 | At&T Intellectual Property I, L.P. | Broad quality of service optimization using policy-based selective quality degradation |
US8346233B2 (en) | 2008-10-16 | 2013-01-01 | At&T Intellectual Property I, L.P. | Devices, methods, and computer-readable media for providing sevices based upon identification of decision makers and owners associated with communication services |
US20100099392A1 (en) * | 2008-10-16 | 2010-04-22 | At&T Delaware Intellectual Property, Inc., A Corporation Of The State Of Delaware | Devices, methods, and computer-readable media for providing sevices based upon identification of decision makers and owners associated with communication services |
US20100099388A1 (en) * | 2008-10-16 | 2010-04-22 | At & T Delaware Intellectual Property, Inc., A Corporation Of The State Of Delaware | Devices, methods, and computer-readable media for providing broad quality of service optimization using policy-based selective quality degradation |
US20100100613A1 (en) * | 2008-10-16 | 2010-04-22 | At&T Delaware Intellectual Property, Inc., A Corporation Of The State Of Delaware | Devices, Methods, and Computer-Readable Media for Providing Quality of Service Optimization via Policy-Based Rearrangements |
US9015599B2 (en) | 2008-10-16 | 2015-04-21 | At&T Intellectual Property I, L.P. | Devices, methods and computer-readable media for providing control of switching between media presentation screens |
US20100100822A1 (en) * | 2008-10-16 | 2010-04-22 | At&T Delaware Intellectual Property, Inc. | Devices, Methods and Computer-Readable Media for Providing Control of Switching Between Media Presentation Screens |
US20100100519A1 (en) * | 2008-10-16 | 2010-04-22 | At&T Delaware Intellectual Property, Inc. | Devices, methods, and computer-readable media for providing calendar-based communication system services |
US8615575B2 (en) * | 2008-10-16 | 2013-12-24 | At&T Intellectual Property I, L.P. | Devices, methods, and computer-readable media for providing quality of service optimization via policy-based rearrangements |
US8825031B2 (en) | 2008-10-16 | 2014-09-02 | At&T Intellectual Property I, L.P. | Providing services based upon identification of decision makers and owners associated with communication services |
US8185489B2 (en) | 2008-10-16 | 2012-05-22 | At&T Intellectual Property, I, L.P. | Devices, methods, and computer-readable media for providing calendar-based communication system services |
US8320927B2 (en) | 2008-10-16 | 2012-11-27 | At&T Intellectual Property I, L.P. | Devices, methods, and computer-readable media for providing broad quality of service optimization using policy-based selective quality degradation |
US9191505B2 (en) | 2009-05-28 | 2015-11-17 | Comcast Cable Communications, Llc | Stateful home phone service |
US8650276B2 (en) * | 2010-01-28 | 2014-02-11 | Oki Electric Industry Co., Ltd. | Communication control apparatus for controlling QoS according to applications and network state |
US20110185052A1 (en) * | 2010-01-28 | 2011-07-28 | Oki Electric Industry Co., Ltd. | COMMUNICATION CONTROL APPARATUS FOR CONTROLLING QoS ACCORDING TO APPLICATIONS AND NETWORK STATE |
US9256900B2 (en) | 2010-11-15 | 2016-02-09 | International Business Machines Corporation | Managing service demand load relative to infrastructure capacity in a networked computing environment |
US10887172B2 (en) | 2015-07-28 | 2021-01-05 | British Telecommunications Public Limited Company | Network function virtualization |
CN108024290A (en) * | 2016-11-03 | 2018-05-11 | 中兴通讯股份有限公司 | A kind of tunnel method of adjustment and device |
Also Published As
Publication number | Publication date |
---|---|
US7412517B2 (en) | 2008-08-12 |
US7409450B2 (en) | 2008-08-05 |
US20120257527A1 (en) | 2012-10-11 |
US20070038751A1 (en) | 2007-02-15 |
US9712289B2 (en) | 2017-07-18 |
US7359971B2 (en) | 2008-04-15 |
US20020099854A1 (en) | 2002-07-25 |
US20070038736A1 (en) | 2007-02-15 |
US20050232193A1 (en) | 2005-10-20 |
US20070073805A1 (en) | 2007-03-29 |
US20090271512A1 (en) | 2009-10-29 |
US6862622B2 (en) | 2005-03-01 |
US20180069668A1 (en) | 2018-03-08 |
US20070038750A1 (en) | 2007-02-15 |
US7496674B2 (en) | 2009-02-24 |
US20070038753A1 (en) | 2007-02-15 |
US20070038752A1 (en) | 2007-02-15 |
US7359972B2 (en) | 2008-04-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7412517B2 (en) | Method for providing dynamic bandwidth allocation based on IP-flow characteristics in a wireless point to multi-point (PtMP) transmission system | |
US6594246B1 (en) | IP-flow identification in a wireless point to multi-point transmission system | |
US6640248B1 (en) | Application-aware, quality of service (QoS) sensitive, media access control (MAC) layer | |
US6628629B1 (en) | Reservation based prioritization method for wireless transmission of latency and jitter sensitive IP-flows in a wireless point to multi-point transmission system | |
US6680922B1 (en) | Method for the recognition and operation of virtual private networks (VPNs) over a wireless point to multi-point (PtMP) transmission system | |
US6590885B1 (en) | IP-flow characterization in a wireless point to multi-point (PTMP) transmission system | |
US7251218B2 (en) | Method and computer program product for internet protocol (IP)-flow classification in a wireless point to multi-point (PtMP) transmission system | |
EP1197040B1 (en) | Tcp/ip packet-centric wireless transmission system architecture | |
EP1775899B1 (en) | TCP/IP packet-centric wireless transmission system architecture | |
KR100825502B1 (en) | Tcp/ip packet-centric wireless transmission system architecture | |
KR100825507B1 (en) | Tcp/ip packet-centric wireless transmission system architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VAN DREBBEL MARINER LLC, CALIFORNIA Free format text: SECURED PARTY BILL OF SALE AND TRANSFER STATEMENT;ASSIGNOR:STAC NETWORKS CORPORATION C/O ARCH VENTURE PARTNERS;REEL/FRAME:018507/0391 Effective date: 20040519 Owner name: MALIBU NETWORKS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JORGENSEN, JACOB W.;REEL/FRAME:018508/0266 Effective date: 19990920 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: POLARIS VENTURE PARTNERS FOUNDERS' FUND II, L.P., Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: UNION CARBIDE EMPLOYEES' PENSION PLAN, MICHIGAN Free format text: SECURITY AGREEMENT;ASSIGNOR:DOW CHEMICAL COMPANY;REEL/FRAME:025498/0155 Effective date: 20031231 Owner name: FREMONT COMMUNICATIONS I SIDE-BY-SIDE, L.P., CALIF Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: TL VENTURES INTERFUND L.P., PENNSYLVANIA Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: ECP INTERFUND, L.P., PENNSYLVANIA Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: DOW CHEMICAL COMPANY, MICHIGAN Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: VAN DREBBEL MARINER LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025504/0746 Effective date: 20040519 Owner name: SECOND AVENUE PARTNERS, WASHINGTON Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: ARCH VENTURE FUND IV, L.P., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: MALIBU NETWORKS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JORGENSEN, JACOB W.;REEL/FRAME:025503/0827 Effective date: 19990920 Owner name: STAC NETWORKS CORPORATION, DELAWARE Free format text: SECURITY AGREEMENT;ASSIGNORS:TL VENTURES V L.P.;TL VENTURES INTERFUND L.P.;GABLES LIMITED;AND OTHERS;REEL/FRAME:025498/0197 Effective date: 20040113 Owner name: FREMONT COMMUNICATIONS I, L.P., CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: GABLES LIMITED, FRANCE Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: NEXTCOM VENTURE PARTNERS, L.P., VIRGINIA Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: ENERTECH CAPITAL PARTNERS II, L.P., PENNSYLVANIA Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: TL VENTURES V L.P., PENNSYLVANIA Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: POLARIS VENTURE PARTNERS II, L.P., MASSACHUSETTS Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 Owner name: MALIBU NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:STAC NETWORKS CORPORATION;REEL/FRAME:025498/0235 Effective date: 20040220 Owner name: ARCH ENTREPRENEURS FUND, L.P., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025498/0062 Effective date: 20020320 |
|
AS | Assignment |
Owner name: POLARIS VENTURE PARTNERS FOUNDERS' FUND II, L.P., Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: MALIBU NETWORKS, INC., CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYANCE TYPE, CONVEYING PARTY NAME, AND OMITTED PAGES FOR RELEASE OF SECURED PARTY PREVIOUSLY RECORDED ON REEL 025498 FRAME 0235. ASSIGNOR(S) HEREBY CONFIRMS THE CONVEYANCE TYPE AS "TERMINATION OF CREDITORS' CLAIMS," ASSIGNOR AS "BANKRUPTCY CREDITORS HOLDING CLAIMS." OMITTED PGS INSERTED;ASSIGNOR:BANKRUPTCY CREDITORS HOLDING CLAIMS;REEL/FRAME:025862/0242 Effective date: 20040220 Owner name: POLARIS VENTURE PARTNERS II, L.P., MASSACHUSETTS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: GABLES LIMITED, FRANCE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: SECOND AVENUE PARTNERS, WASHINGTON Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: FREMONT COMMUNICATIONS I, L.P., CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: FREMONT COMMUNICATIONS I SIDE-BY-SIDE, L.P., CALIF Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: NEXTCOM VENTURE PARTNERS, L.P., VIRGINIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: ARCH VENTURE FUND IV, L.P., TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: ECP II INTERFUND, L.P., PENNSYLVANIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: ARCH ENTREPRENEURS FUND, L.P., TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: STAC NETWORKS CORPORATION, DELAWARE Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR NAME "ECP INTERFUND, L.P." PREVIOUSLY RECORDED ON REEL 025498 FRAME 0197. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNOR NAME IS "ECP II INTERFUND, L.P.";ASSIGNORS:TL VENTURES V L.P.;TL VENTURES INTERFUND L.P.;GABLES LIMITED;AND OTHERS;REEL/FRAME:025856/0835 Effective date: 20040113 Owner name: TL VENTURES V L.P., PENNSYLVANIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: THE DOW CHEMICAL COMPANY, MICHIGAN Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: ENERTECH CAPITAL PARTNERS II, L.P., PENNSYLVANIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 Owner name: TL VENTURES INTERFUND L.P., PENNSYLVANIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAMES "ECP INTERFUND, L.P." AND "DOW CHEMICAL COMPANY" PREVIOUSLY RECORDED ON REEL 025498 FRAME 0062. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE NAMES SHOULD BE "ECP II INTERFUND, L.P." AND "THE DOW CHEMICAL COMPANY";ASSIGNOR:MALIBU NETWORKS, INC.;REEL/FRAME:025856/0559 Effective date: 20020320 |