Language selection

Search

Patent 2371930 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2371930
(54) English Title: METHOD FOR DETERMINING A COMMUNICATION PATH IN A COMMUNICATION NETWORK BETWEEN TWO NEIGHBORING NETWORK NODES
(54) French Title: PROCEDE POUR DETERMINER UNE VOIE DE COMMUNICATION DANS UN RESEAU DE COMMUNICATION ENTRE DEUX NOEUDS DE RESEAU VOISINS
Status: Dead
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04Q 11/04 (2006.01)
  • H04L 12/56 (2006.01)
(72) Inventors :
  • HAUBER, CLEMENS (Germany)
(73) Owners :
  • SIEMENS AKTIENGESELLSCHAFT (Germany)
(71) Applicants :
  • SIEMENS AKTIENGESELLSCHAFT (Germany)
(74) Agent: FETHERSTONHAUGH & CO.
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2000-02-02
(87) Open to Public Inspection: 2000-08-31
Examination requested: 2004-09-17
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/DE2000/000316
(87) International Publication Number: WO2000/051397
(85) National Entry: 2001-08-21

(30) Application Priority Data:
Application No. Country/Territory Date
199 07 924.2 Germany 1999-02-24

Abstracts

English Abstract




In order to authorize a connection between two neighboring network nodes in a
connecting line bundle consisting of several connecting lines, a search
algorithm determines in which of the connecting lines can the peak bit rate of
said connection be achieved. To this end, it is initially decided on the basis
of a bit rate threshold value whether the search algorithm is started either
from a fixed or a variable reference point. The search algorithm is then used
progressively on said connecting lines until a connecting line with sufficient
free residual transmission capacity is found or the connection is rejected.


French Abstract

Afin d'autoriser une communication entre deux noeuds de réseau voisins sur un faisceau de lignes de communication constitué de plusieurs lignes de communication, un algorithme de recherche détermine sur laquelle des lignes de communication le débit binaire maximal de cette communication peut être atteint. A cet effet, une valeur seuil de débit binaire maximal permet tout d'abord de décider si l'algorithme de recherche doit être démarré à partir d'un point de référence fixe ou variable. Ensuite, l'algorithme de recherche est appliqué progressivement aux lignes de communication, jusqu'à ce qu'une ligne de communication présentant une capacité de transmission suffisante soit trouvée ou jusqu'à ce que la communication soit refusée.

Claims

Note: Claims are shown in the official language in which they were submitted.




8A
claims

1. A method for determining a communication path
in a communication network, comprising

a plurality of connections which are in each case
conducted via a further plurality of trunks (T1...Tn)
between two neighboring network nodes (N1..N4) and which
reserve transmission capacities on these trunks (T1...Tn),
and comprising
at least one further connection (V) which is to be
additionally accommodated on one of the trunks (T1...Tn)
in that a hunting algorithm determines the trunk (T1...Tn)
on which this connection (V) can still be accommodate
in accordance with an acceptance criterion,
characterized in that
according to a bit rate threshold value, the hunting
algorithm is started from a fixed reference point when
the peak bit rate (Rpv) of the connection to be newly
accepted is greater than the bit rate threshold value,
or is started from a variable reference point when the
peak bit rate (Rpv) of the connection to be newly
accepted is less than the bit rate threshold value or
equal to the bit rate threshold value, and thereafter
the hunting algorithm is applied step by step to the
further plurality of trunks (T1...Tn) until a trunk
(T1...Tn) having sufficient free transmission capacity
is found and the connection is accepted or all trunks
(T1...Ta) have been checked and the connection must be
rejected.



9

claims



2. The method as claimed in claim 1, characterized
in that the fixed reference point is the first trunk
(T1) in the trunk group (TG).

3. The method as claimed in claim 1, characterized
in that the variable reference point is the trunk (T1)
in the trunk group (TG) which, in cyclic rotation, is
arranged immediately following the trunk at which the
hunting algorithm started from a variable reference
point has been terminated the last time previously.



-10-


4. The method as claimed in claim 1 to 3,
characterized in that the free residual transmission
capacity (C r (T i)) of a trunk (T1...T n) is obtained from
the physical transmission capacity (C s) of this trunk,
and this amount is reduced by the sum of the peak bit
rates (R pj) of the currently active m connections
(j=1...m) of this trunk.

5. The method as claimed in one of the preceding
claims, characterized in that the acceptance criterion
is designed in such a manner that a check is made
whether the freely available residual transmission
capacity C r(T i) is greater than or equal to the peak bit
rate (R pv) of this connection (V).


Description

Note: Descriptions are shown in the official language in which they were submitted.




GR 99 P 1265
Description
CA 02371930 2001-08-21
Method for determining a communication path in a
communication network between two neighboring network
nodes.
The invention relates to a method according to


the preamble of patent claim 1.


Contemporary communication networks have a


plurality of network nodes which are intermeshed via


communication paths. These are formed from a number of


trunks which are combined to form trunk groups.


In contemporary communication networks,


different traffic mixtures are conducted via the


communication paths arranged between two or more


network nodes. Thus, for example, information can be


transmitted by means of a synchronous transfer mode


(STM) or asynchronous mode (ATM). In this context, the


information can have different bandwidths. Thus, as a


rule, a distinction is made between information which


is transmitted as narrowband signals and that which is


transmitted as wideband or broadband signals. Thus,


special significance is attached to setting up a


connection between two neighboring network nodes, i.e.


those connected to one another via one trunk group.


When setting up a connection, two decisions


must be made, in general, for determining a


communication path between two neighboring network


nodes . On the one hand, it must be decided on which of


the trunks of the trunk group connecting the network


nodes in question sufficient capacity is still free in


order to be able to establish a connection.


On the other hand, one of the communication


paths which are conceivable with regard to the


available capacity, must be selected in such a manner


that





CA 02371930 2001-08-21
_ 2 _
an optimum grade of service is obtained. This is
necessary in as much as a selected communication path
should ensure the lowest possible blocking probability
and an associated low connection loss probability for
subsequent connections.
A method by means of which both of these tasks
(search and selection) can be performed is called a
hunting strategy method or hunting strategy.
Hunting strategy methods are known from the
printed document "Probability of Loss of Data Traffics
with different Bit Rates Hunting One Common PCM
Channel", Proceedings of the 8th International
Teletraffic Congress (ITC 8), 1976, pp. 525.1 - 525.8,
Lothar Katzschner and Reinhard Scheller.
Accordingly, a first hunting strategy method is
described by means of which a sequential hunt is
performed from a fixed zero position. In this process,
the hunting always begins with the first trunk in the
trunk group. Which one of the trunks is to be
considered as the first one can be freely defined. The
hunt is terminated as soon as a trunk has been found
which meets the acceptance criteria. The acceptance
criterion used here is the transmission capacity still
available on the trunk in relation to the peak bit rate
of the connection to be accommodated. The new
connection to be accommodated will thus be accepted if
a trunk is found the free available transmission
capacity of which is greater than or equal to the peak
bit rate of this connection. If this is so, the hunt is
terminated. The next hunt is again started at the first
trunk. If no free transmission capacity is found by the
last trunk, the hunt



CA 02371930 2001-08-21
- 3 -
is also terminated and the connection is question is
rejected.
The disadvantageous factor of such a procedure
is that~it results in a nonuniform load distribution on
the trunk group. The reason for this is that the hunt
is always started from the same position and is
terminated when a suitable trunk has been found. On
average, therefore, the trunks which have been hunted
first are used to high capacity whereas the remaining
trunks are used to low capacity ("unbalanced load").
According to this prior art, a second hunting
strategy method is described by means of which a
sequential hunt is performed from a variable zero
position. In this process, the hunting begins with a
specially marked trunk in the trunk group. The marking
has been performed by the immediately preceding hunt.
This defines the position at which the next hunt is to
be started. The new connection to be accepted is
accepted if a trunk is found, the freely available
transmission capacity of which is greater than or equal
to the peak bit rate of this connection. If this is so,
the hunt is terminated. At the same time as this, the
trunk immediately following is marked. The next hunt
thus begins at this trunk. If no free transmission
capacity is found by the last trunk, the connection in
. question will be rejected. The last trunk is defined as
the trunk which immediately precedes the marked trunk
after a cyclic rotation.
Although this prevents the disadvantage of the
first hunting strategy method (nonuniform load
distribution) because of the variable



CA 02371930 2001-08-21
_ 4 _
position which, on average, provides a more or less
uniform distribution on the trunk. The disadvantage of
such a procedure is, however, that, because of the
uniform load distribution, high-bit-rate connections
can no longer be accommodated it with greater
probability because of the lack of trunks with low
capacity utilization and a corresponding request for
connection setup must then be rejected.
These known methods were developed, in
particular, for a homogeneous traffic characteristic in
which each connection setup was associated with the
same capacity requirement of 64 kbit/s per connection.
However, this homogeneity of the traffic in connection
setup is often no longer given in contemporary
communication networks. Apart from the conventional
narrowband connections with 64 kbit/s,. for example,
wideband connections with. nx64 kbit/s occur (in the
case of STM-based connection-oriented multiple-rate
services) or even broadband connections with any bit
rate granularity in the case of ATM traffic.
However, this results in completely new
requirements for the connection setup. For example, the
traffic handling capacity for all types of traffic must
be, at the same time, as high and as rugged as possible
with the least possible interaction. In the case of ATM
traffic, this results in the requirement for the most
even load distribution possible over all trunks of a
trunk group. Otherwise, connections on trunks with high
capacity utilization would be subject to greater delay
in the associated queues than on trunks with low
capacity utilization.
The invention is based on the object of
demonstrating an approach of how communication paths in
a communication network can also be determined with
inhomogeneous traffic.
_ -_ __ _._... ............_._.. _r



CA 02371930 2001-08-21
. _ 5 _
The object is achieved by the features
specified in the characterizing clause on the basis of
the features specified in the preamble of patent
claim 1.
The advantageous factor of the invention is, in
particular, the provision of a bit rate threshold
value. According to this threshold value, a decision is
made as to which hunting strategy method is applied to
the trunks.
Advantageous further developments of the
invention are specified in the subclaims.
In the text which follows, the invention will
be explained in greater detail with reference to an
exemplary embodiment shown in the figures, in which:
Figure 1 shows the configuration in which the method
according to the invention is run,
Figure 2 shows the algorithm according to the
invention.
Figure 1 shows a communication network. In this
arrangement, only four network nodes N1 ... N4 are shown
for the sake of simplicity. Two network nodes, for
example network nodes N1, N4 are connected to one
another via a trunk TG. In the trunk group TG, a
plurality of trunks Tl ... Tn are arranged. Each of the
trunks Tl ... Tn has a specified transmission capacity Ca
as physical transmission parameter. The residual
transmission capacity Cr(T;,) (i=l...n) freely available
for further connections is obtained from the physical
connection capacity C$ minus the sum of the peak bit
rates Rp~ of the m connect ions ( j =1, 2..., m) current ly
conducted via this capacity.



CA 02371930 2001-08-21
- 6 -
In the text which follows, it is assumed that a
connection V is to be set up from network node N1 to
network node N4. According to the invention, a
sequential hunt is now started from a bit-rate-
dependent starting position if a connection setup
request is present. The corresponding conditions are
shown in Figure 2.
For this purpose, the two known hunting
algorithms, called hunting strategy methods in the text
which follows, are combined. Firstly, a criterion is
established for when which one of the known hunting
strategy methods will be run. The criterion provided is
a bit rate threshold value which can be arbitrarily
predetermined but should usually be of the order of
magnitude 1/10 C8...1/5 C8. Firstly, it is decided in a
first step whether the peak bit rate Rp of the
connection newly to be accepted is greater than or less
than this bit rate threshold value.
If the peak bit rate RpV (j=V) of the connection
V newly to be accepted is greater than the bit rate
threshold value, the hunting strategy method of the
sequential hunt from the fixed zero position is used.
It must be assumed, therefore, that this connection is
a high-bit-rate connection.
The hunting process is thus started with the
first trunk in the trunk group. Which one of the trunks
is the first one can be freely defined. The new
connection V to be accommodated is accepted if a trunk
Ti is found, the freely available residual transmission
capacity Cr(Ti) of which is greater than or equal to the
peak bit rate Rp~ of this connection. In this process,
the trunks in the trunk group are checked successively
step by step. Once a suitable trunk has been found,
this trunk is taken and the hunting is terminated. If
no free transmission capacity is found by the last
trunk, the connection



CA 02371930 2001-08-21
. _
in question is rejected. If a further connection V' is
provided for acceptance at a later time, another hunt
is started. This will only be started again at the
first trunk if the peak bit rate Rp~. of the connection
to be newly accepted is greater than the bit rate
threshold value.
If the peak bit rate Rp~ of the connection V to
be newly accepted is less than or equal to the bit rate
threshold value, the hunting strategy method of the
sequential hunt from a variable zero position is used.
It must thus be assumed that this connection is a low-
bit-rate connection.
The hunting is thus started with a marked trunk
in the trunk group. The marking has been performed by
the immediately preceding hunt. The new connection to
be accommodated is accepted if a trunk Ti is found, the
freely available residual transmission capacity Cr(Ti)
of which is greater than or equal to the peak bit rate
of this connection. If this is so, the hunt is
terminated. At the same time as this, the trunk
immediately following this is marked. The next hunt is
started at this trunk. If no free transmission capacity
is found by the last trunk the connection in question
is rejected. In this context, the trunk which is
arranged immediately preceding the marked trunk after a
cyclic rotation is defined as the last trunk.
The present exemplary embodiment generally
discussed connections. These can be connections of any
type. Thus connections which transmit information in
accordance with a synchronous transfer method (STM) can
be set up in accordance with the method according to
the invention



CA 02371930 2001-08-21
. . _
as can connections which transmit information in
accordance with asynchronous transfer method (ATM).

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date Unavailable
(86) PCT Filing Date 2000-02-02
(87) PCT Publication Date 2000-08-31
(85) National Entry 2001-08-21
Examination Requested 2004-09-17
Dead Application 2007-02-02

Abandonment History

Abandonment Date Reason Reinstatement Date
2006-02-02 FAILURE TO PAY APPLICATION MAINTENANCE FEE
2006-04-26 R30(2) - Failure to Respond
2006-04-26 R29 - Failure to Respond

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Registration of a document - section 124 $100.00 2001-08-21
Application Fee $300.00 2001-08-21
Maintenance Fee - Application - New Act 2 2002-02-04 $100.00 2002-01-21
Maintenance Fee - Application - New Act 3 2003-02-03 $100.00 2003-01-24
Maintenance Fee - Application - New Act 4 2004-02-02 $100.00 2004-01-16
Request for Examination $800.00 2004-09-17
Maintenance Fee - Application - New Act 5 2005-02-02 $200.00 2005-01-14
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
SIEMENS AKTIENGESELLSCHAFT
Past Owners on Record
HAUBER, CLEMENS
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative Drawing 2002-03-25 1 14
Abstract 2001-08-21 1 22
Claims 2001-08-21 3 107
Drawings 2001-08-21 2 33
Description 2001-08-21 8 335
Cover Page 2002-03-26 1 47
Prosecution-Amendment 2004-09-17 1 39
PCT 2001-08-21 14 627
Assignment 2001-08-21 3 126
PCT 2001-08-22 6 213
Prosecution-Amendment 2005-10-26 4 107