WO1999044335A2 - Predictive bandwidth allocation method and apparatus - Google Patents

Predictive bandwidth allocation method and apparatus Download PDF

Info

Publication number
WO1999044335A2
WO1999044335A2 PCT/US1999/004381 US9904381W WO9944335A2 WO 1999044335 A2 WO1999044335 A2 WO 1999044335A2 US 9904381 W US9904381 W US 9904381W WO 9944335 A2 WO9944335 A2 WO 9944335A2
Authority
WO
WIPO (PCT)
Prior art keywords
data
bandwidth
stream
packets
packet
Prior art date
Application number
PCT/US1999/004381
Other languages
French (fr)
Other versions
WO1999044335A3 (en
WO1999044335A9 (en
WO1999044335A8 (en
Inventor
Yukihiro Mikami
David Spell
Dave Roland
Ajay Rai
Dale Ellis
Original Assignee
Seiko Epson Corporation
Turnkey Solutions Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seiko Epson Corporation, Turnkey Solutions Corporation filed Critical Seiko Epson Corporation
Priority to JP54395999A priority Critical patent/JP2002515217A/en
Priority to CN99800192A priority patent/CN1272297A/en
Priority to EP99911017A priority patent/EP0988770A2/en
Publication of WO1999044335A2 publication Critical patent/WO1999044335A2/en
Publication of WO1999044335A8 publication Critical patent/WO1999044335A8/en
Publication of WO1999044335A9 publication Critical patent/WO1999044335A9/en
Publication of WO1999044335A3 publication Critical patent/WO1999044335A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00586Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
    • G11B20/00594Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium wherein the shape of recording marks is altered, e.g. the depth, width, or length of pits

Definitions

  • the present invention permits prioritizing packets or other communications and/or allocation of bandwidth, such as allocation of ISDN-bearer channels to be based on a prediction of the size or other characteristics of a data stream, preferably with consideration of the effect of allocation on telecommunication costs.
  • POTS plain old telephone service
  • PBX private branch exchange
  • modern users can select among a variety of services, each having associated advantages, disadvantages and costs, including (in addition to POTS) ISDN (Integrated Services Digital Network) service, Tl service, cellular service and the like.
  • POTS plain old telephone service
  • PBX private branch exchange
  • Services such as ISDN and Tl which provide a potential for large- bandwidth telecommunications have become particularly important as telecommunications use has expanded beyond voice traffic to include telefacsimile (fax), digital (or audio-modulated digital) signals (used, e.g., for network or Internet communications), and the like.
  • telefacsimile fax
  • digital or audio-modulated digital signals
  • high-bandwidth services such as ISDN have not widely supplanted older, less-suitable telecommunications options, primarily because of the costs associated with high-bandwidth services (which may include not only installation fees, but connection fees and tariffs).
  • Part of the cost associated with ISDN and other high-bandwidth options arises from the fact that, in many such systems, a large -bandwidth channel is allocated to each subscriber who must therefore bear the cost of the entire bandwidth for extended periods even though the user may only be able to benefit from, or use, the large bandwidth intermittently and for relatively short periods (e.g. during times when relatively large files are being transferred).
  • systems have been proposed which bear a rough (and imperfect) analogy to a "party line" in which a given bandwidth is allocated for use by multiple users, but at different times, as their needs dictate.
  • AO/DI Automatic On/Dynamic ISDN
  • the "D" channel is continuously available (Always On).
  • the relatively low bandwidth D channel serves as the "home" channel for a user and one or more B channels are utilized for relatively large transmissions and are closed as they are no longer needed.
  • Such a system permits costs to be shared among a plurality of users, and cost to an individual user is reduced in a number of fashions. A given user need not bear the cost of a large-bandwidth channel during times it is not being used or is not needed by that end-user.
  • ISDN lines are shared, a reduced number of lines is necessary to supply a given group of users, leading to reduced line charges and usage of equipment.
  • MLPPP multi-link point-to-point protocol
  • ACP bandwidth allocation control protocol
  • a queue-depth system which allocates a large- bandwidth channel when the number of communication packets that have accumulated in a processing queue has reached a predetermined threshold.
  • a queue-depth system is based on a consideration of past traffic volume only. If traffic which has already occurred has reached a predetermined volume in a given period of time, a wider-bandwidth channel is allocated.
  • Such a system will function at a certain level, it will not necessarily achieve the goals of lowering costs and providing for ease of use. Indeed, there are situations in which a queue-depth system would increase costs over those that would be incurred if no bandwidth switching or allocation took place.
  • a queue-depth system will nevertheless allocate additional bandwidth (and, typically, cause costs to be incurred for the end user) even though the end user will receive little or no benefit from the additional bandwidth, (since the file transfer will be complete before or shortly after such additional bandwidth is allocated). Because such thresholds would be predetermined and fixed, these problems cannot be solved by merely selecting a different threshold value. For example, although raising the threshold might have avoided unnecessary charges from a futile B channel allocation in the example above, transfers with other characteristics (e.g., frequent large but short data transfers) would receive no benefit from the system with a high threshold.
  • a queue-depth system thus requires, for efficient use, that the threshold should be established so as to accommodate the particular mix of traffic for a given end- user.
  • a typical end-user will have neither the skills nor the time to achieve an optimal or even useful threshold value.
  • the queue-depth system in addition to being unable to achieve cost savings goals in many situations, also imposes relatively heavy administrative costs in implementing the system.
  • a queue-depth system is inflexible and cannot adjust to changes in the characteristics of the data traffic, (e.g. as traffic changes throughout the day or for a longer period of time.)
  • any adjustments to the threshold in a queue-depth system would require a significant expenditure of time by a relatively highly-skilled administrator.
  • a queue-depth system can not allocate bandwidth early in a given data stream (e.g. can not allocate bandwidth after only the first few -- such as 1 to 4 - packets) but must wait at least until enough packets have arrived to reach the predetermined queue threshold.
  • Some systems for providing wide-bandwidth access place substantial burdens on end users such as requiring end users to invest in significant additional hardware or software. Accordingly, it would be useful to provide a system which achieves cost effective and efficient provision of wide bandwidth capability for telecommunications without requiring significant installation of additional equipment or software at the end user location (client side) in order for such a system to operate.
  • bandwidth allocation procedures which depend on a certain level of interaction with vendor equipment or software could, in some situations require different versions to interoperate, depending on which vendor supplies the basic routing or other telecommunications equipment and software (i.e., will be vendor-dependent) imposing costs which involve selecting the proper version required for interoperability and the development and implementation costs associated with providing multiple different versions of a bandwidth allocation system to operate in connection with multiple router vendor devices and software.
  • bandwidth allocation apparatus and procedures which reduce or minimize costs to telecommunications companies and developers, such as systems which reduce or avoid recertification costs and which are at least partially vendor-independent.
  • the present invention includes a recognition of at least some of the problems of previous procedures and apparatus, including as described above.
  • the present invention involves making bandwidth allocation procedures decisions based at least partially on a predictive scheme, i.e. using characteristics other than (or in addition to) queue-depth to increase the likelihood that, on average, bandwidth allocations will achieve more efficient bandwidth utilization and, preferably, lower costs to users (at least on average).
  • a predictive scheme i.e. using characteristics other than (or in addition to) queue-depth to increase the likelihood that, on average, bandwidth allocations will achieve more efficient bandwidth utilization and, preferably, lower costs to users (at least on average).
  • the present invention can be used to provide and manage a level of service for data and signal communications.
  • data packets are identified as belonging to particular data streams.
  • a characteristic of the data stream e.g. its classification related to a type of data being transferred, such as GIF data, streaming video data, text E-mail or batch binary downloads
  • GIF data e.g. its classification related to a type of data being transferred
  • text E-mail e.g. its classification related to a type of data being transferred, such as GIF data, streaming video data, text E-mail or batch binary downloads
  • receipt of the first few packets of a GIF stream may result in allocating additional bandwidth (if, e.g., the system predicts that a relatively large amount of GIF data will be forthcoming during the remainder of the data stream) whereas receipt of the same amount of data classified as text E-mail (i.e. which has achieved the same queue-depth as the above-described GIF stream) may not be allocated additional bandwidth if the system predicts that the text stream will be relatively short-lived or unnoticed, e.g. if not received immediately.
  • the system can access various components or fields of data packets to associate a packet with a particular stream (such as source/destination/port information, or, in some cases, data field information).
  • the system can use various procedures for classifying a particular data stream as to the type of data.
  • other information useful in predicting future bandwidth requirements for a data stream are employed (such as knowledge, for a given user, that a particular type of data stream occurring during a certain time period is likely to be relatively long or relatively short).
  • the present system is preferably a heuristics-based system and, in one embodiment, such additional predictive information is developed and used by a self-learning or artificial intelligence system.
  • the system may accommodate itself to changes over time in a fashion that is automatic.
  • "automatic" means that the goals are achieved by a computer or computer system without a requirement for analysis, decisions or other inputs from human operators or administrators (although, if desired, the system can be configured to permit human input to supplement or override the automatic analysis).
  • Providing at least certain portions of the invention as byte code systems is believed to assist in more easily modifying rules (as described below), e.g. to more easily achieve self-modification or self-learning.
  • the system is substantially modularized.
  • the module which directly monitors or is coupled to the telecommunications line is configured so that it contains only, or substantially only, those items which must be performed in real-time and is preferably configured to operate rapidly, such as by operating as a byte code system, preferably an efficient or optimized byte code system.
  • Other components of the system such as those configured to analyze system operation (e.g.
  • the system is substantially vendor-independent preferably by employing vendor APIs. Vendor-independence is preferably assisted by code modularization and by restricting vendor-dependent components, e.g. to several well-defined functions.
  • Fig. 1 is a block diagram of a telecommunications system useful in connection with an AODI networking application
  • Fig. 2 is a timing diagram depicting an example of channel use allocated by queue depth
  • Fig. 3 is a block diagram depicting the flow of information useful for bandwidth allocation according to an embodiment of the present invention.
  • Fig. 4 is a block diagram depicting a modular implementation of an embodiment of the present invention.
  • Fig. 5 is a block diagram similar to the diagram of Fig. 4 but depicting additional client side components
  • Figs. 6A and 6B are a block diagram and a flow chart, respectively, illustrating procedures using the components of Fig. 4;
  • Figs. 7A and 7B are a block diagram and a flow chart, respectively, illustrating procedures in connection with a real time component according to an embodiment of the present invention
  • Figs. 8A and 8B are a block diagram and a flow chart, respectively, depicting procedures in connection with an implementation component according to an embodiment of the present invention
  • Figs. 9A and 9B are a block diagram and a flow chart, respectively, depicting procedures in connection with an adaptation component according to an embodiment of the present invention
  • Fig. 10 illustrates a display of network router information in connection with an embodiment of the present invention
  • Fig. 11 illustrates a display of router statistics usable in connection with an embodiment of the present invention
  • Fig. 12 depicts a display of policy options usable in connection with an embodiment of the present invention
  • Fig. 13 depicts a display of a policy editor usable in connection an embodiment of the present invention
  • Figs 14A and 14B are a block diagram and a flow chart, respectively, of an embodiment of the present invention illustrating self- learning
  • Figs. 15 is a flow chart of an example, according to an embodiment of the present invention, involving increasing bandwidth following classification of a data stream;
  • Fig. 16 is a flow chart of an example, according to an embodiment of the present invention, involving increasing bandwidth when a data stream is not identified;
  • Fig. 17 is a flow chart of an example, according to an embodiment of the present invention, involving increasing bandwidth in response to data volume.
  • Fig 18A is a schematic block diagram of counter used in a pegboard self-learning system.
  • Fig. 19 is a schematic diagram of a table for tracking unknown-type data streams usable in accordance with an embodiment of the present invention.
  • Fig. 20 is a schematic block diagram illustrating opening according to one embodiment of the present invention.
  • Fig. 21 is a schematic block diagram illustrating packet rate control according to an embodiment of the present invention.
  • Fig. 22 is a schematic block diagram illustrating security features according to an embodiment of the presentation.
  • Fig. 23 is a schematic block diagram illustrating media routing according to an embodiment of the present invention.
  • Fig. 24 is a schematic block diagram illustrating out-of-stream process according to embodiments of the present invention.
  • references to types of lines or communications links includes, with reference to the OSI model, any "layer one" physical medium.
  • a data server 112 (which may include one or many computers) and client 114 are coupled, to a router 116, with one side of the router 116, in the illustrated configuration, being coupled to the server side using an ISDN communications link 118.
  • the illustrated ISDN link includes a D channel 122 and first and second B (bearer) channels 124, 126.
  • the D channel 122 has a relatively narrow bandwidth e.g. for accommodating data rates of up to about 9.6 kilobytes per second (KBPS).
  • Each B channel 124, 126 has a relatively wide bandwidth, capable of accommodating 64 KBPS (for a total of 128 KBPS when both B channels are in use).
  • the B channels are circuit-switched (e.g. according to BACP and MLPPP protocols).
  • the D channel 122 is always on (always off- hook).
  • calls are initially placed and handled over the D channel, using packetized procedures such as those known as X.25 (which is described, e.g., in RFC-0874). Because the D channel is always-on, it is possible to provide always-available service, including, e.g., "push-mail".
  • MLPPP Mobility Protocol Packet Transfer Protocol
  • AO/DI The usefulness of AO/DI will be related to the manner in which bandwidth is allocated, i.e. the manner in which decisions to add or drop B channels are made. It is possible to base decisions on recent volume of data traffic, such as by basing the decision on whether the depth of data in a router queue 128 has reached a predetermined threshold.
  • Fig. 2 presents a (simplified) example of queue-depth decision-making, and also illustrates one of the shortcomings of such a system.
  • the queue depth 212 is initially low but begins rising relatively rapidly when data communication commences at time Tl. As noted above, the communication will initially be carried by the D channel 214.
  • the queue-depth rapidly rises after Tl, reaching a pre-defined queue-depth threshold 216 at time T2.
  • the event of reaching the threshold 216 at time T2 triggers a decision to switch-in B channel number 1.
  • Implementation of this decision takes a certain amount of time and thus, in the illustration of Fig. 2, the B channel number 1 is switched-in at time T3 218.
  • the bandwidth of the B channel is relatively large, the queue depth rapidly falls 222 to a level below the threshold 216.
  • the data being transferred has a relatively large bandwidth requirement and, after a time T3, the queue depth continues to rise, although more slowly than during the period following time Tl.
  • the queue depth once again reaches the threshold 216 at time T4 224 triggering a decision to add the second B channel.
  • B channel number 2 in the illustrated example, is switched in at time T5 and is not switched out until time T6.
  • the user will be charged for use of B channel number 2 between time T5 and T6, even though the user received no benefit from use of B channel number 2 (since data transfer was completed before the B channel was switched in).
  • Fig. 3 depicts, in block form, a system which, according to the present invention, can base bandwidth allocation decisions on information other than (or in addition to) queue depth. Details of the system will be described below.
  • information related to characteristics of the data is passed 312 to a decision system 314.
  • the decision system determines whether and when bandwidth should be allocated or deallocated and these decisions are executed 316 using MLPPP 318 and BACP 322 to implement such switching in a manner to avoid disrupting data flow while achieving the desired bandwidth allocation.
  • the decision system 314 uses a rules base for making decisions and, preferably, provides a development environment for building the rules base.
  • the decision system 314 provides self-learning capability (artificial intelligence) e.g. so that it can modify its own rules base to meet changing environmental demands.
  • the rules base architecture is preferably vendor-independent and preferably contains a management tool which is identical across various vendors' hardware systems, e.g. permitting administrators to manage varied systems from a single console at the same time.
  • heuristic analysis is used to achieve a self-learning system.
  • a heuristic analysis is a so-called "pegboard" system.
  • a system is provided which (a) determines when to perform an evaluation of the performance of the system; (b) how performance is to be evaluated; and (c) how to revise the rules when performance is deemed sufficiently poor.
  • pegboard-type heuristic method a system is provided which (a) determines when to perform an evaluation of the performance of the system; (b) how performance is to be evaluated; and (c) how to revise the rules when performance is deemed sufficiently poor.
  • separate counts of the total number of messages such as the total number of messages of a particular type
  • the number of such messages or data streams that are handled correctly are accumulated in a software (or in some cases a hardware) counter.
  • first and second pegboards 1812, 1814 as illustrated in Fig. 18A in which darkened circles in the first pegboard 1812 represent the number of data streams of a particular type (in the illustration, the number of e-mail sessions) in a particular period (e.g. since the last evaluation of performance) and darkened circles in the second pegboard 1814 depict the number of e-mail sessions which were handled correctly.
  • the currently-operating rules base is configured on the basis of an assumption that e-mail sessions are relatively small and thus provides for rules which do not increase the bandwidth for e-mail sessions.
  • each time a new e-mail data stream is handled the counter or pegboard 1812 is incremented.
  • the handling of the e-mail session is evaluated to determine whether the e-mail session was handled correctly and, if correct handling is determined, the second counter or pegboard 1814 is incremented.
  • the evaluation procedures can be configured in a number of ways for determining whether handling of a e-mail session was correct. For example, since the rule that specifies not increasing bandwidth for e-mail sessions is based on an assumption that an e-mail session is small, it is possible to configure the evaluation software such that handling of a particular e-mail session under the current rules base is considered "correct" if, in fact, the particular e-mail session is small (less than a threshold amount).
  • the software may be configured to automatically maintain a count in pegboards 1812, 1814.
  • the software may be configured to automatically maintain a count in pegboards 1812, 1814.
  • evaluation is performed whenever either of the counters or pegboards 1812, 1814 has reached a maximum value, i.e. when either of the pegboards 1812, 1814 is "full" 1816.
  • Other criteria for initiating the evaluation can also be used such as passage of a predetermined period of time, reaching a threshold in the first (but not second) pegboard, reaching a threshold in the second (but not first) pegboard, a perceived change in performance of the system as a whole, the cost of the system as a whole, a user-initiated request to evaluate performance, reaching thresholds which are variable (such as thresholds which vary by time of day) and the like.
  • the "correct" handling of each individual e-mail session was individually and preferably continuously evaluated, once the evaluation period has been reached, performing the system evaluation can be achieved merely by comparing the number of correctly-handled sessions (1814) to the total number of sessions (1812) in a given timeframe. For example, it is possible to configure the software such that if the ratio of correctly handled e- mail sessions to total number of e-mail sessions in the timeframe is less than a predetermined ratio, the system will initiate a change to the rules base in an attempt to improve performance.
  • the system will modify the rules base to, e.g., allow for an increase in bandwidth in response to e-mail traffic, such as a predetermined minimum of e-mail traffic.
  • e-mail traffic such as a predetermined minimum of e-mail traffic.
  • Fig. 18A illustrates a pegboard-type heuristic method
  • other types of self-learning preferably heuristic self-learning methods can also be used.
  • a more general heuristics method may involve obtaining information on a plurality of different characteristics of data streams (such as date, time, effective data rate, port number and handling under current rules base) which may then be analyzed to determine, over a number of data streams, which factors appear most pertinent to the performance of the system.
  • the system may be configured to obtain and store information relative to those data streams or messages which are of an unknown type.
  • this system typically will have some procedure in the current rules base for handling unknown-type data streams, resulting either in a decision to switch to a higher bandwidth or not to switch to a higher bandwidth for these data streams.
  • the system may, for example, keep track of the port number for such unknown-type data streams and store (e.g. in a table 1912 such as that illustrated in Fig. 19) the frequency of unknown data types associated with each port and whether switching occurred.
  • an analysis is performed to evaluate handling of unknown data streams under the current rules base. For example, the information illustrated in Fig.
  • this decision regarding how to revise the rules base is based on a further analysis which correlates the correct and incorrect switching decisions to a number of different possible correlates (such as predetermined potential correlates that had been determined as likely candidates). Examples include attempting to correlate correct and incorrect switching decisions to date and/or time the packets were sent, the "bursty/continuous" behavior of packets, the effective data rate over a given transmission period and the like.
  • one or more of the correlates are identified as having a relatively significant correlation to the correctness of handling and such correlation is used as a basis for modifying the rules base. For example, if it is determined that most of the incorrectly handled unknown-type data streams occurred between the hours of noon and 3 p.m., and/or for a particular port number the rules base would be modified to make different (e.g. opposite) switching decisions for unknown data streams which occur during those hours. The system will then temporarily add new rules for this unknown data type and will use this new rule set to replace the previous rule set for the unknown session types. The counters (such as those depicted in Fig. 19) are then reset, at least for the categories relevant to the changed rules, and the system continues to operate and accumulate information for later heuristics-based performance analysis.
  • data type can be used for other purposes.
  • data stream types are identified and used for queuing of data streams (such as weighted fair queuing). Such queuing can be used in place of or in addition to the above- described band selection or switching.
  • the system 2012 is placed in the data stream such as being placed in a router 2014 which in the illustrated embodiment, receives an inbound 10 Mbps LAN packet stream 2016 and outputs a 128 Kbps WAN packet stream 2018.
  • voice and video data packets are provided with the highest priority 2022 while e-mail and Internet "web" packets are provided lesser priority 2024, 2026.
  • packets of packet stream 2016 are placed onto the output line 2018 substantially without buffering. However, if the bandwidth of the output stream 2018 is being fully utilized, the system queues packets as they arrive e.g. by placing the packets in d fferent queues 2028a,b,c.
  • the different queues are provided with different priorities, such as by providing the queue 2028a corresponding to voice and video with the highest priority 2022.
  • the router 2014 outputs packets from the queues 2028a,b,c but does not necessarily output the packets in a manner which reflects the order in which they arrived or necessarily providing equal distribution from the various queues.
  • packets in the queue 2028a with the highest priority are output with a greater frequency (compound the input frequency or equal or proportional frequency) than packets in lower-priority queues 2028b, c.
  • the voice and video packets are output more frequently so that in the output stream 2018 illustrated in the example of Fig. 20, they represent 50 percent of the output packets.
  • Fig. 21 presents another fashion in which a system 2112 in a data stream (such as in a router 2114) can be used to enhance performance and/or reduce cost.
  • the example illustrated in Fig. 21 relates to a situation in which a video receiver sends, e.g. over a 10 Mbps LAN packet stream 2116 to a video sender (e.g. over 128 Kbps WAN packet stream 2118) requests (such as in the form of an acknowledged "ACK" message) for video packet data of a particular size.
  • the system 2112 is used for packet rate control. For example, it may be that the video receiver requests a particular amount of video data but that it would not be most efficient to transmit all of the packets necessary to fulfill the data request at once.
  • the system takes into consideration a "virtual" data rate for video, such as a data rate that has been previously requested by an administrator.
  • a "virtual" data rate for video such as a data rate that has been previously requested by an administrator.
  • the administrator might request video data at a rate of 64 Kbps or, e.g. 8 Kbps.
  • the system 2112 calculates the maximum "chunk" size of data in order to maintain rate control. For video (for packet rate control over a link such as 2118 which is 128 Kbps), this might be set, e.g., at 4 KB chunks requested two times per second This chunk size may be adjusted as needed to prevent time-outs.
  • the system 2112 resizes the amount of data requested. For example, the system may select a size which is the minimum value that falls between the maximum chunk size calculated above and the data requested. As one example, if the video receiver sends a request for 32 KB, the system 2112 instead, outputs a request, to the sender, for 4 KB. When the system 2112 notes that the requested 4 KB has been sent from the sender 2126, thus leaving a remaining amount of 28 KB 2128, the system 2112 then outputs another request for 4 KB. This procedure is then repeated until the requested 32 KB have been provided to the receiver.
  • the system 2112 in response to receiving a particular request 2122, converts this into a series of different requests 2124, 2132, etc. in order to provide control of the packet rate in a fashion which is consistent with the overall desired and economical performance of data transfer.
  • Fig. 22 provides an illustration of another manner in which data stream type information may be used, e.g. to provide security, such as "firewall", functions.
  • the system 2212 is positioned in the data stream (such as in a router 2214).
  • the illustration of Fig. 22 provides an example in which the desired security features include rejecting all file transfer protocol (FTP) packets 2216 from within a satellite bank unless the time is between 4 p.m. and 8 p.m. and a secure software key has been sent to the router.
  • FTP file transfer protocol
  • FTP packets 2216 on the 10 Mbps LAN packet stream are not provided on the 128 Kbps WAN packet stream because, in the illustration, either the time is not between 4 p.m. and 8 p.m. or the secure software key has not been sent to the router.
  • the system can be configured, e.g., to allow access to the satellite banks systems by HQ systems only if HQ systems first "unlock" a secure connection to the router allowing, e.g., up to a 15-minute transmission window.
  • Fig. 23 illustrates an example of a use of a system 2312 in a router 2314 for routing different types of data streams on different communications media.
  • packets on a LAN packet stream 2316 may be routed over a low-speed, low-cost dial-up WAN 2318, over a mid-speed, mid-cost ISDN WAN 2322, or a high-speed, high-cost fiber-optic WAN 2324.
  • Other types pf possible media will occur to those of skill in the art.
  • the LAN packet stream can include a number of different types of packets including voice and video packets 2326 which are, in this example, considered to be timing-critical data, requiring maximum performance, e-mail packets 2328, considered in this example, to be not time- critical and requiring treatment so as to minimize cost, and web packets 2332, considered in this example, to be of average importance.
  • the system 2312 can operate to route packets, depending on the packet type, to the various media 2318, 2322, 2324, e.g. via buffers 2334a,b,c associated with each medium.
  • the rules base for the system 2312 is configured such that, when timing-sensitive or mission-critical packets are received, e.g.
  • the decision system 314 includes a number of components which, in one embodiment, are distributed. Some components reside on vendor's equipment while others reside on system developers' and/or administrators' work stations.
  • the system preferably operates on a stream-based rather than packet-based level.
  • X.25, multi-link protocol and similar systems transfer a given data stream by transferring a plurality of data packets, each of which contains a portion of the data stream.
  • the present system rather than attempting to make separate decisions for each data packet, identifies the data streams which the packets make-up and makes decisions based on information regarding each different data stream.
  • the decision system 314 can determine any or all of the size, start time, end time of a data stream e.g. through an ISDN interface.
  • the system can make this determination after obtaining information from only the first few packets of a data stream, and in some cases after obtaining information from only one (such as the first) packet of a stream (which may contain sufficient header or other information to identify the data type of the stream).
  • the decision system 314 can identify other characteristics of a stream.
  • the decision system 314 can determine if a particular stream represents an FTP (File Transfer Protocol) session, an HTTP (Hypertext Transfer Protocol) request to a server, or some other type of transmission.
  • FTP File Transfer Protocol
  • HTTP Hypertext Transfer Protocol
  • This information about stream-type can be used in making decisions about predicted needs on the underlying ISDN lines and thus serve as a basis for deciding, e.g., when to add channels and/or when to close channels.
  • Table I provides for purposes of illustration, a list of selected data stream types and certain characteristics of the data streams which, in a given environment, may be useful in predicting future bandwidth needs for that data stream.
  • Other data types and characteristics are well known to those of skill in the art, including, for example, HTTP (hypertext transfer protocol), SMTP, SNMP and H.323.
  • predictions regarding future bandwidth needs for a data stream are implemented by a rules base.
  • the rules base preferably can be modified, either automatically or manually, e.g. based on traffic statistics.
  • the decision system 314 automatically collects statistics useable for modifying the rules base.
  • implementation by a rules base configuration is believed to allow system developers to more readily program the decision system 314 to deal with different data streams and, preferably, in a relatively intuitive fashion such as via a series of yes/no decisions (with certain decisions providing the conditions for other decisions).
  • system design or programming is independent of the underlying hardware and thus can be used with any of the variety of hardware configurations.
  • reprogramming or modifications of the rules can be accomplished without interrupting operation of the system, e.g. without the need to re-boot the router 116.
  • the rules base system is compiled into vendor-independent byte code before being downloaded to vendor equipment.
  • the byte code is specifically developed for operating on packets and for making binary (yes/no) decisions. Additional efficiency is preferably implemented by automatically ordering the binary decisions for optimum or increased efficiency. In one implementation, some or all binary decisions, as they are made, result in setting up flags for that session, so that decisions, once made, do not have to be repeated unless necessary.
  • the byte code can be provided without the need for compiling (such as when an interpreter, rather than a compiler, provides the byte code).
  • This approach can be useful in providing new or modified byte code which can be loaded on the real time component without the need to interrupt or re-boot the system or components thereof.
  • a real time component RTC 412 interfaces to the ISDN 119 data streams (preferably to a router vendors' protocol stack) to obtain information regarding packets as they pass through the router 116.
  • the RTC 412 does not reside in such stack but, instead, obtains information regarding packets through vendor application programming interfaces (API's). Since the protocol stack itself is not modified, there is no need to recertify a protocol stack when the present system is implemented, provided the vendor provides the necessary API's.
  • API's vendor application programming interfaces
  • the RTC 412 includes substantially all of the real time operations of the decision system 314.
  • the RTC 412 performs a number of functions. It is capable of identifying start, middle and end packets of particular data streams.
  • the RTC 412 makes decisions on when to switch channels, open channels and close channels using rules provided in a byte-code system or engine.
  • the RTC 412 further collects statistics about data traffic. The type of statistics which are collected are determined, preferably, by the byte code engine.
  • the byte code engine which is executed by the RTC is provided to the RTC 414 by an adaptation component (AC) 416.
  • AC adaptation component
  • This architecture permits modifying or updating the byte code engine executed by RTC.
  • the AC 416 receives statistics on data stream characteristics as well as the channel switch/open/close decisions made by RTC 422. By comparing the received statistics against the existing rules base which the RTC is currently using, the AC 416 can determine if the rules base might be better adapted to the current environment.
  • the AC 416 can automatically (without human intervention) generate a revised or modified version of a byte code engine and download the improved or adapted engine 414 to the RTC 412.
  • the AC 416 modifies or adapts the RTC to meet specific needs of a changing environment.
  • the statistics used by the AC are also preferably passed on to an administrator console 424 (in the depicted embodiment, via an Implementation Component (IC) 428.
  • IC Implementation Component
  • the AC 416 need not operate in real time (or put another way, a slowdown or stoppage of the AC 416 will not have an immediate effect on current data flow).
  • Modularizing or compartmentalizing those components, such as AC 416, which need not run in real time provides the opportunity to avoid placing excessive computational loads on the router computer since non-real time components such as the AC 416 can be configured to operate only as router processor cycles are available (i.e. to use the router processor during times when the router processor would otherwise be idle).
  • Use of cycle-stealing permits relatively complex and time-consumptive analysis to be accomplished without affecting overall performance and without the need for significant (or, in many cases, for any) addition or upgrading of routing processors or other hardware.
  • the AC 416 also passes-on the switch/open/close channel decisions (made by the RTC) 425 to the IC 428.
  • a major function of the IC 428 is to implement the decisions made by the RTC by interfacing to vendors' implementations of BACP 322 and MLPPP 318.
  • the IC 428 makes calls to BACP using vendors API's in order to switch channels, open channels and tear down channels, as decided by RTC and conveyed through the AC 416.
  • IC 428 also stores statistical information 424 and passes it on 432 to the administrator console 426.
  • the Administrator Console 426 preferably may be configured to display, e.g. information about all routers in a network, such as status 1012, numbers of total, active and inactive routers 1014 and the like.
  • the Administrator Console 426 preferably may be configured to display, e.g. detailed customizable views of many types of statistics for various routers, such as status 1112, Bytes and Packets in various time periods 1114a, 1114b and the like.
  • New or modified rules bases can be developed by administrators using depicted administrative applications 426, 434. Such new rules bases are downloaded 436 by the IC 428 (e.g. via Internet Protocol (IP) Sockets) to the AC 416 where they are converted into (preferably optimized) byte code that the RTC 412 can use. Conversion into byte code, particularly efficient or optimized byte code, can be a difficult task. In one embodiment, the task is achieved or assisted using prime implicants theory-based procedures.
  • IP Internet Protocol
  • the administrator console 426 provides a graphical user interface (GUI) to assist an administrator in setting or changing parameters for rules bases running on routers in a network (or specific portions of rules bases such as router policies or user policies).
  • GUI graphical user interface
  • the administrator console 426 can be configured to facilitate selection of certain policies, such as by displaying drop-down boxes or other selection items, e.g. for setting maximum bandwidth for privileged users 1212, setting policies for certain data types 1214, naming policies 1216 and the like.
  • the administrator console 426 also provides an easily accessible and understandable view of the statistics 432.
  • a Policy Setting Component 434 is used, e.g. by a network engineer, to create and modify rules bases.
  • such policy setting is preferably facilitated by arranging in "tree" views 1312 of a type familiar to many programmers or network engineers
  • the administrator console permits simultaneous management of one or more decision systems 314 and multiple rules bases from a single location.
  • Use of an interface such as a sockets-level IP interface to all decision systems assists in accomplishing this task.
  • the interface presented on the administrator console, as well as the language used for creating and modifying rules bases is vendor-independent, and thus will appear the same to an administrator regardless of the type of vendor hardware present on a given IP network.
  • a client connection component 514 assists in setting up a users' ISDN connection to both a telephone company and the ISP (Internet Service Provider).
  • An administration component 516 can be provided to offer an end user a degree of control over his or her own ISDN usage (e.g. through use and modification of a user policy) which may then be integrated into the rules base running on the router to which the user is connecting.
  • a user may, for example, wish to indicate a particular balance between costs and level of service, or may wish to specify that, for example, e-mail messages are to receive top priority regardless of cost.
  • the server side may also wish to have some potential for influence on operation of the system.
  • the service provider can immediately "hot load" the modified options to the client side.
  • Figs. 6a and 6b depict components and process steps involved in making channel switching decisions according to one embodiment of the present invention.
  • a data packet reaches a router 612,614
  • a copy of the packet 616 is delivered to the switching system 618 and, in particular, to the RTC 622 by the router 624.
  • the RTC uses the rules base 626 to decipher the packet and determine whether or not to change the bandwidth 628. If the RTC does not change the bandwidth, the RTC will record this decision and do nothing further with regard to the packet 632. If the RTC determines that bandwidth should be changed, the RTC will record its decision and will send a command 634 to the IC 636 via the AC 638.
  • the IC 636 uses a bandwidth control method to request adjustments to the bandwidth by the router 642, essentially opening or closing bandwidth switches 644a,b,c. Regardless of whether a particular packet results in a change in bandwidth, the RTC 622 will occasionally or periodically report on the decisions it has made to the AC 646. The AC 638 will evaluate these decisions and may use its own larger rule set to modify the rules base 626 of the RTC 648.
  • FIGs. 7a and 7b illustrate operation of the RTC in greater detail.
  • a packet processor 712 places a newly-arrived packet copy into a packet queue such as a first in, first out (FIFO) queue 714 so that it can be processed by the rules base engine 716.
  • the rules base engine 718 when it receives a packet from the queue 714 resets any "per packet" instance variables 722 and starts processing 724 via the rules base 626.
  • the rules base 626 deciphers the packet, e.g. relying on an opcode list and/or parser 726, records statistics related to the packet and its status, and determines if a change in bandwidth should be made 728.
  • the RTC 622 records its decision, and sends a command 734 to the IC 636 (via the AC).
  • the IC 636 uses a bandwidth control method to request adjustments 736 to the bandwidth by the routers 612.
  • the RTC 622 as noted, periodically or occasionally reports its decisions 738 and statistics to the AC 742.
  • the RTC will determine if there is a new or modified rules base received from the AC 638. If so, the RTC will wait (i.e. will not process new packets from the queue 714) until completion of processing (using the old rules base) of the current packet, will replace the old rules base with a new rules base 746 and continue processing 748.
  • a comm manager 812 can receive, e.g., status information from administrative applications 426, 512 with policies being saved via a data manager 814 (e.g. on a mass storage device 816) and may request information, to be satisfied with recent data from the data manager.
  • the mass storage device 816 may be used for storing rules bases, data dictionaries, user parameters, statistics, and the like.
  • the comm manager 812 notifies an internal command controller 822 about events 824 such as new policies.
  • the command controller 822 may also receive new statistics and status updates from the AC 826 which it may save to the data manager 828.
  • the command controller 822 also receives commands from the RTC 832 such as commands to change bandwidth which it passes on 834 to a connection manager 836, 838.
  • the connection manager 836 coordinates requests to switch up and switch down, e.g. by communicating 842 with a router's 612 connection manager (e.g. a BACP or the like), and handles the progress of connection requests 844.
  • Figs. 9a and 9b illustrate operation and components of an AC according to an embodiment of the present invention.
  • the IC 636 may pass a set of policies 912 (which may be in the form of a new rules base, a data dictionary, or other forms) preferably in a platform-neutral format (i.e. which can be read by any implementation of the system 618) 914.
  • a loader 916 converts the policies into a platform-specific format, e.g., numbers are converted into 16-bit signed on Intel format, opcodes are stored in a more compressed format, and the like 918.
  • the loader passes the policies to 922 ACBM 924.
  • the ACBM 924 which may be provided, with a data dictionary 926a, a parser 926b, an opcode list 926c and the like, derives a rules base from the policy and passes it 928 to the prime implicant 932 of the analyzer 934.
  • the prime implicant 932 uses rules of logic to reduce, reorganize and compress the rules base so that it is more efficient 936.
  • the prime implicant 932 then passes the rules base 938 to the RTC 942.
  • the ACBM 924 may use its own set of policies and statistics received 944 from the RTC to generate a new rules base and send it to the prime implicant 946.
  • Figs. 14a and 14b illustrate a manner of facilitating self-modification or self- learning according to an embodiment of the present invention.
  • the IC downloads 1412 a data dictionary or rules base to the AC 1414. If the AC receives a data dictionary, it first extracts a rules base e.g. via the ACBM 924 before downloading to the RTC 622, 1416.
  • the RTC 622 processes and switches according to its rules base 626. Periodically or occasionally, the RTC passes statistics 944 and/or information (fingerprints) about unknown packets it has found, to the AC 638, 1418.
  • the AC 638 uses algorithms built into its data dictionary 926a or rules base to modify, add, or delete rules 1422.
  • Changes made to a data dictionary or rules base are passed up 1412 to the IC for storage 1424.
  • the AC 638 extracts and passes 1426 a new, unoptimized version of the rules base to the prime implicant 932.
  • the prime implicant 932 uses rules of logical reduction to optimize the new rules base before it passes an approved rules base to the RTC 1428.
  • Fig. 15 provides one example, of a relatively simple nature, of how a known packet may cause a switch up (or the addition of a channel).
  • the rules base 626 receives a packet and identifies the packet type of being of HTTP (hyper text transfer protocol) type 1512. The rules base determines that this packet is a header for a new connection 1514. The rules base then determines that the packet specifies a session length of 67OK bytes 1516. The rules base determines that this session length is greater than the maximum number of bytes needed to switch up 1518.
  • the session (data stream) is logged (information stored, associated with a data stream identifier) and the progress of the data stream or session is tracked 1522.
  • the RTC makes a note (e.g. by storing data, setting a flag, and the like) to report statistics regarding this data stream and/or packet to the AC, which will assist the AC in making a determination of whether the switch up was correct (resulted in the desired data transfer effect) and/or whether the rules base should be modified 1524.
  • the RTC will then send a message, via the AC, to the IC to switch up (add bandwidth) 1526.
  • Fig. 16 provides a simple example of a situation in which receipt of a packet of unknown type may result in a switch up.
  • a packet is received whose data type cannot be identified 1612.
  • the rules base will obtain information (fingerprint) regarding this packet such as data length, associated data streams, number of packets in a stream and the like, and, as before, will make a note to pass such fingerprint information on to the AC 1614.
  • there are two conditions 1616, 1618 which may cause the rules base to request a switch up.
  • the rules base may be configured to request a switch up when either of these conditions 1616, 1618 is fulfilled, or may require that both conditions 1616, 1618 be fulfilled before requesting a switch up.
  • the first condition is that the new data rate, including the new packet, is greater than the maximum data rate for the current bandwidth setting 1616.
  • the second condition is that the data rate has been too high (exceeding a threshold) for a longer period than a predetermined time for the current bandwidth setting 1618.
  • the rules base will send a message to the IC (via the AC) to switch up 1622.
  • Fig. 17 illustrates an example of how an aggregation of streams may cause a switch up.
  • the rules base first identifies a packet as signifying the start of an e-mail session 1712.
  • the rules base logs and tracks this session or data stream and makes a note to report statistics to the AC 1714.
  • the rules base determines that it should not request a switch up merely because of the data type, i.e. merely because this is an e-mail session 1716.
  • the rules base may be configured such that e-mail sessions are considered non-time critical, and thus normally do not result in a switch up.
  • it is determined that the new data rate, including the new packet, is greater than the maximum for the current bandwidth setting 1718 and/or that the data rate has been too high for longer than a predetermined time for this current bandwidth setting 1722.
  • Bandwidth aggregation can be used both in the context of aggregation of predicate bandwidth and aggregation of actual bandwidth.
  • the system preferably achieves more efficient use of available bandwidth thus permitting multiple users to share B channels or other high bandwidth media.
  • the present invention can provide a ratio of users to B channels greater than about 3:1, more preferably greater than about 5:1, even more preferably greater than about 8:1 and yet more preferably greater than about 10:1.
  • the system makes bandwidth allocation decisions based on considerations such as by considering the effect an allocation will have on a user's telecommunications charges, e.g. taking into account the current rate in variable-rate environments.
  • the present invention is capable of accommodating changes in data traffic and preferably is capable of automatically learning and adapting to changing conditions.
  • the present invention can be configured to configure and/or modify a decision rules base taking into account current tariffs and other charges so as to provide high bandwidth service as needed or desired while reducing or minimizing costs to end users.
  • the invention provides a vendor-independent mechanism for implementing and executing a bandwidth allocation decision. The same decision procedure can be run on different vendors' hardware interchangeably without modification. Such vendor independence further facilitates hardware upgrades since migration to new hardware can be achieved with little or no modification to the decision system of the present invention. In this way vendor investments in the described decision system are protected and new systems are compatible with procedures of previous systems.
  • the present invention provides an intuitive GUI development environment and language for creating and modifying rules bases used by the system. The development environment allows vendors to fully and easily integrate any decision algorithm work that has already been done into the rules base.
  • the rules bases themselves are preferably modular and reusable.
  • the present invention permits rules bases to be hot loaded to the router and implemented during normal operation i.e. without taking down or re-booting routers and without stopping the data streams.
  • the present invention facilitates development and testing, as well as modifications of algorithms since the ability to achieve hot loads permits frequent downloads during testing.
  • a single administrator console can control a relatively large number of widely distributed routers simultaneously.
  • Multiple administrator consoles can be used to manage the same group of locally and/or remotely connected routers (for example, different consoles could be used by administrators on different shifts, primary backup and tertiary consoles could be used for redundancy, or specific consoles can have responsibility for a separate portion of routers.
  • the present invention provides advantages directly to end users by facilitating connection to the users' telephone company and ISP and providing the end user with a certain level of control over his or her own ISDN usage.
  • client side applications may be used, client side installation is not required thus providing a desirable degree of flexibility, openness and future-proofing.
  • the present system preferably is compatible with any vendor hardware on remotely connected machines which supports BACP and MLPPP, e.g., if sufficient memory and processing resources are available.
  • the present invention provides a way to allocate bandwidth, such as ISDN bandwidth, without relying solely on queue depth, preferably using predictions of future bandwidth requirements based on data stream characteristics.
  • a number of variations and modifications of the system can also be used. It is possible to use some features of the invention without using others. For example, it is possible to implement a rules-based, data-stream oriented bandwidth allocation procedure without using automatic learning procedures.
  • the present invention can involve combining data-stream oriented bandwidth allocation with other approaches, such as using queue-depth of "level-of-service" allocation methods when the system is unable to (or lacks the time or other resources to) identify the data type of a data stream. In some embodiments, it may be preferable to permit aggregation of two or more data streams for purposes of allocating bandwidth for such data streams (e.g.
  • the present invention can be used in an environment in which there are multiple network transport media or in which there is only one network transport medium, e.g. as in an Ethernet or ADSL network.
  • the invention can be implemented using queues and assigning virtual or software channels.
  • the present invention has been described in the context of an ISDN implementation, the present invention can also be applied to other telecommunications systems or media including Tl, Frame Relay, ATM, Ethernet, Fiber and xDSL (e.g. by providing and using virtual channels).
  • the present invention can be used in connection with networks that combine fiber optics, frame relay, and Ethernet, and can be used in connection with networks that have only one type of medium (e.g. using virtual or software channels) Although it is believed that features such as modularization, real time segregation, byte code, decision flagging and the like, contribute to efficient execution, it is possible to implement an operable system which does not include one or more of these items. Although certain features of the present invention were described in the context of ISP usages, the present invention can be implemented in a number of other contexts. For example, for remote network access, the system can reside on a remote access router (e.g. owned by a company which uses ISDN to connect outside users to that router).
  • a remote access router e.g. owned by a company which uses ISDN to connect outside users to that router.
  • the system can precisely allocate bandwidth in e.g., a corporate environment for accommodating telecommuters (whose data transactions tend to be sporadic and patterned).
  • the present invention can be used in connection with router-to-router connections. For example, point of sale systems in satellite stores connecting to a central site.
  • the present invention may permit routers e.g. at satellite locations, to remain constantly connected to headquarters over switched connections without incurring incremental charges, even over long-haul lines.
  • low level throughput (such as price checks, credit card authorizations and the like) can take place over the always-on low-bandwidth D channels, with high level transactions such as price file transfers, coupon downloads, store transactions, summary uploads and the like utilizing additional bandwidth as needed on demand.
  • the present invention can be used in a number of different ways, including any or all of setting priorities for data streams, queuing and/or holding data streams (or packets thereof), providing firewall or other security features, and providing a policy engine.

Abstract

Allocation of telecommunication systems bandwidth is provided preferably in a predictive fashion. Packets are identified with particular data streams and characteristics of the data streams are used to predict probable future bandwidth requirements. Such predictions are used to allocate high-bandwidth channels, such as ISDN B channels and to close or switch channels as in accordance with predicted needs. Preferably the system is self-learning and can modify a rules base for making allocation decisions e.g. based on actual use statistics.

Description

PREDICTIVE BANDWIDTH ALLOCATION METHOD AND APPARATUS
FIELD OF THE INVENTION
The present invention permits prioritizing packets or other communications and/or allocation of bandwidth, such as allocation of ISDN-bearer channels to be based on a prediction of the size or other characteristics of a data stream, preferably with consideration of the effect of allocation on telecommunication costs.
BACKGROUND OF THE INVENTION
In the early days of telecommunications, users had few service options available, under what has now become known as POTS (plain old telephone service), often being restricted to choosing the number of incoming lines, private or "party line" service and, for larger users, selection of a private branch exchange (PBX). In contrast, modern users can select among a variety of services, each having associated advantages, disadvantages and costs, including (in addition to POTS) ISDN (Integrated Services Digital Network) service, Tl service, cellular service and the like. Services such as ISDN and Tl which provide a potential for large- bandwidth telecommunications have become particularly important as telecommunications use has expanded beyond voice traffic to include telefacsimile (fax), digital (or audio-modulated digital) signals (used, e.g., for network or Internet communications), and the like. Communication of some types of information, such as video information, digital file transfers, still images, streaming audio and the like, create heavy (if often short-lived) bandwidth demands.
Nevertheless, high-bandwidth services such as ISDN have not widely supplanted older, less-suitable telecommunications options, primarily because of the costs associated with high-bandwidth services (which may include not only installation fees, but connection fees and tariffs). Part of the cost associated with ISDN and other high-bandwidth options arises from the fact that, in many such systems, a large -bandwidth channel is allocated to each subscriber who must therefore bear the cost of the entire bandwidth for extended periods even though the user may only be able to benefit from, or use, the large bandwidth intermittently and for relatively short periods (e.g. during times when relatively large files are being transferred). Accordingly, systems have been proposed which bear a rough (and imperfect) analogy to a "party line" in which a given bandwidth is allocated for use by multiple users, but at different times, as their needs dictate.
One proposed system is referred to as (AO/DI) (Always On/Dynamic ISDN). In an AO/DI system, the "D" channel is continuously available (Always On). The relatively low bandwidth D channel serves as the "home" channel for a user and one or more B channels are utilized for relatively large transmissions and are closed as they are no longer needed. Such a system permits costs to be shared among a plurality of users, and cost to an individual user is reduced in a number of fashions. A given user need not bear the cost of a large-bandwidth channel during times it is not being used or is not needed by that end-user. Because ISDN lines are shared, a reduced number of lines is necessary to supply a given group of users, leading to reduced line charges and usage of equipment.
Certain protocols have been proposed in connection with an AO/DI system, including a multi-link point-to-point protocol (MLPPP) which allows aggregation of multiple channels, and a bandwidth allocation control protocol (BACP) which runs "on top" of MLPPP and provides a vendor-independent standard for initiation and management of opening and closing channels. Descriptions of the proposed AO/DI, MLPPP and BACP can found, e.g., at "Always On/Dynamic ISDN," RFC-1990 and RFC 2125 respectively, available from the Vendors' ISDN Association (VIA) (a non-profit California corporation located at Bishop Ranch 2, 2694 Bishop Drive, Suite 105, San Ramon, CA 94583) or on the Internet at http://ftp.via-isdn.org/, and incorporated herein by reference. These three systems, however, while they provide the capability of switching or allocating bandwidth, do not dictate a system for determining or deciding when to make such allocations or deallocations, much less suggesting a decision-making system which would be effective and efficient.
One possible approach is a queue-depth system which allocates a large- bandwidth channel when the number of communication packets that have accumulated in a processing queue has reached a predetermined threshold. Such a system, in essence, is based on a consideration of past traffic volume only. If traffic which has already occurred has reached a predetermined volume in a given period of time, a wider-bandwidth channel is allocated. Although such a system will function at a certain level, it will not necessarily achieve the goals of lowering costs and providing for ease of use. Indeed, there are situations in which a queue-depth system would increase costs over those that would be incurred if no bandwidth switching or allocation took place. For example, if a threshold is reached just before the end of, e.g., a file transfer, a queue-depth system will nevertheless allocate additional bandwidth (and, typically, cause costs to be incurred for the end user) even though the end user will receive little or no benefit from the additional bandwidth, (since the file transfer will be complete before or shortly after such additional bandwidth is allocated). Because such thresholds would be predetermined and fixed, these problems cannot be solved by merely selecting a different threshold value. For example, although raising the threshold might have avoided unnecessary charges from a futile B channel allocation in the example above, transfers with other characteristics (e.g., frequent large but short data transfers) would receive no benefit from the system with a high threshold.
A queue-depth system, thus requires, for efficient use, that the threshold should be established so as to accommodate the particular mix of traffic for a given end- user. However, a typical end-user will have neither the skills nor the time to achieve an optimal or even useful threshold value. Thus, the queue-depth system, in addition to being unable to achieve cost savings goals in many situations, also imposes relatively heavy administrative costs in implementing the system. Furthermore, a queue-depth system is inflexible and cannot adjust to changes in the characteristics of the data traffic, (e.g. as traffic changes throughout the day or for a longer period of time.) For effectiveness, any adjustments to the threshold in a queue-depth system would require a significant expenditure of time by a relatively highly-skilled administrator. Additionally, a queue-depth system can not allocate bandwidth early in a given data stream (e.g. can not allocate bandwidth after only the first few -- such as 1 to 4 - packets) but must wait at least until enough packets have arrived to reach the predetermined queue threshold.
Accordingly, it would be useful to provide a system which can achieve bandwidth allocation so as to fulfill the goal of lowering costs for high bandwidth telecommunications without imposing burdensome time and skill requirements to set up and maintain such a system. It would also be advantageous to provide a system which can accommodate to time- varying traffic or usage patterns. It would further be useful to provide a system that is capable of deciding on bandwidth allocation early in a data stream, such as after only the first few packets have been received.
Some systems for providing wide-bandwidth access place substantial burdens on end users such as requiring end users to invest in significant additional hardware or software. Accordingly, it would be useful to provide a system which achieves cost effective and efficient provision of wide bandwidth capability for telecommunications without requiring significant installation of additional equipment or software at the end user location (client side) in order for such a system to operate.
Additionally, some systems impose significant burdens on telecommunications companies in order to implement efficient bandwidth allocation. For example, implementing a system which modifies or "resides" in a protocol stack would require a vendor to recertify the protocol stack, adding to the vendor's costs to implement such a system. Because telecommunications systems use equipment and software from a wide variety of vendors, bandwidth allocation procedures which depend on a certain level of interaction with vendor equipment or software could, in some situations require different versions to interoperate, depending on which vendor supplies the basic routing or other telecommunications equipment and software (i.e., will be vendor-dependent) imposing costs which involve selecting the proper version required for interoperability and the development and implementation costs associated with providing multiple different versions of a bandwidth allocation system to operate in connection with multiple router vendor devices and software.
Accordingly, it would be useful to provide bandwidth allocation apparatus and procedures which reduce or minimize costs to telecommunications companies and developers, such as systems which reduce or avoid recertification costs and which are at least partially vendor-independent.
SUMMARY OF THE INVENTION
The present invention includes a recognition of at least some of the problems of previous procedures and apparatus, including as described above. The present invention involves making bandwidth allocation procedures decisions based at least partially on a predictive scheme, i.e. using characteristics other than (or in addition to) queue-depth to increase the likelihood that, on average, bandwidth allocations will achieve more efficient bandwidth utilization and, preferably, lower costs to users (at least on average). In this and other disclosed fashions, the present invention can be used to provide and manage a level of service for data and signal communications.
According to one embodiment, data packets are identified as belonging to particular data streams. A characteristic of the data stream (e.g. its classification related to a type of data being transferred, such as GIF data, streaming video data, text E-mail or batch binary downloads) enters into a decision regarding whether it is likely to be efficient and/or cost-effective to allocate additional bandwidth for use in transmitting future packets in this stream. For example, in one embodiment, receipt of the first few packets of a GIF stream may result in allocating additional bandwidth (if, e.g., the system predicts that a relatively large amount of GIF data will be forthcoming during the remainder of the data stream) whereas receipt of the same amount of data classified as text E-mail (i.e. which has achieved the same queue-depth as the above-described GIF stream) may not be allocated additional bandwidth if the system predicts that the text stream will be relatively short-lived or unnoticed, e.g. if not received immediately.
In one embodiment, the system can access various components or fields of data packets to associate a packet with a particular stream (such as source/destination/port information, or, in some cases, data field information). Preferably the system can use various procedures for classifying a particular data stream as to the type of data. In some implementations, in addition to (or in place of) using classifications of data streams as to type of data, other information useful in predicting future bandwidth requirements for a data stream are employed (such as knowledge, for a given user, that a particular type of data stream occurring during a certain time period is likely to be relatively long or relatively short). The present system is preferably a heuristics-based system and, in one embodiment, such additional predictive information is developed and used by a self-learning or artificial intelligence system. In this way, the system may accommodate itself to changes over time in a fashion that is automatic. In this context, "automatic" means that the goals are achieved by a computer or computer system without a requirement for analysis, decisions or other inputs from human operators or administrators (although, if desired, the system can be configured to permit human input to supplement or override the automatic analysis). Providing at least certain portions of the invention as byte code systems is believed to assist in more easily modifying rules (as described below), e.g. to more easily achieve self-modification or self-learning.
Preferably the system is substantially modularized. In one embodiment, the module which directly monitors or is coupled to the telecommunications line is configured so that it contains only, or substantially only, those items which must be performed in real-time and is preferably configured to operate rapidly, such as by operating as a byte code system, preferably an efficient or optimized byte code system. Other components of the system, such as those configured to analyze system operation (e.g. after-the-fact) and/or provide learning or other artificial intelligence capabilities, (and which typically do not operate in real-time) preferably are configured to reduce or minimize the load on routing computers, such as by operating substantially in a cycle-stealing mode (to employ routing computer facilities only during times when the routing computer would otherwise be idle) In one embodiment, the system is substantially vendor-independent preferably by employing vendor APIs. Vendor-independence is preferably assisted by code modularization and by restricting vendor-dependent components, e.g. to several well-defined functions.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block diagram of a telecommunications system useful in connection with an AODI networking application;
Fig. 2 is a timing diagram depicting an example of channel use allocated by queue depth;
Fig. 3 is a block diagram depicting the flow of information useful for bandwidth allocation according to an embodiment of the present invention;
Fig. 4 is a block diagram depicting a modular implementation of an embodiment of the present invention;
Fig. 5 is a block diagram similar to the diagram of Fig. 4 but depicting additional client side components;
Figs. 6A and 6B are a block diagram and a flow chart, respectively, illustrating procedures using the components of Fig. 4;
Figs. 7A and 7B are a block diagram and a flow chart, respectively, illustrating procedures in connection with a real time component according to an embodiment of the present invention;
Figs. 8A and 8B are a block diagram and a flow chart, respectively, depicting procedures in connection with an implementation component according to an embodiment of the present invention;
Figs. 9A and 9B are a block diagram and a flow chart, respectively, depicting procedures in connection with an adaptation component according to an embodiment of the present invention; Fig. 10 illustrates a display of network router information in connection with an embodiment of the present invention;
Fig. 11 illustrates a display of router statistics usable in connection with an embodiment of the present invention;
Fig. 12 depicts a display of policy options usable in connection with an embodiment of the present invention;
Fig. 13 depicts a display of a policy editor usable in connection an embodiment of the present invention;
Figs 14A and 14B are a block diagram and a flow chart, respectively, of an embodiment of the present invention illustrating self- learning;
Figs. 15 is a flow chart of an example, according to an embodiment of the present invention, involving increasing bandwidth following classification of a data stream;
Fig. 16 is a flow chart of an example, according to an embodiment of the present invention, involving increasing bandwidth when a data stream is not identified; and
Fig. 17 is a flow chart of an example, according to an embodiment of the present invention, involving increasing bandwidth in response to data volume.
Fig 18A is a schematic block diagram of counter used in a pegboard self-learning system.
Fig. 19 is a schematic diagram of a table for tracking unknown-type data streams usable in accordance with an embodiment of the present invention.
Fig. 20 is a schematic block diagram illustrating opening according to one embodiment of the present invention. Fig. 21 is a schematic block diagram illustrating packet rate control according to an embodiment of the present invention.
Fig. 22 is a schematic block diagram illustrating security features according to an embodiment of the presentation.
Fig. 23 is a schematic block diagram illustrating media routing according to an embodiment of the present invention.
Fig. 24 is a schematic block diagram illustrating out-of-stream process according to embodiments of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
Before describing features of the present invention, it is believed useful to describe certain features of an AODI networking application and an example of a queue-depth control. In the following, references to types of lines or communications links includes, with reference to the OSI model, any "layer one" physical medium. As will be apparent to those of skill in the art after understanding the present disclosure, some or all features of the invention can be implemented when the telecommunications line or communications link is a wireless link. In the system depicted in Fig. 1, a data server 112 (which may include one or many computers) and client 114 are coupled, to a router 116, with one side of the router 116, in the illustrated configuration, being coupled to the server side using an ISDN communications link 118. In a typical situation, the router 116 is coupled to a client that may involve a high bandwidth connection 133 to a Local Area Network (LAN) 135. The illustrated ISDN link includes a D channel 122 and first and second B (bearer) channels 124, 126. The D channel 122 has a relatively narrow bandwidth e.g. for accommodating data rates of up to about 9.6 kilobytes per second (KBPS). Each B channel 124, 126 has a relatively wide bandwidth, capable of accommodating 64 KBPS (for a total of 128 KBPS when both B channels are in use). As noted above, in an AODI system, the B channels are circuit-switched (e.g. according to BACP and MLPPP protocols).
In one implementation of AO/DI, the D channel 122 is always on (always off- hook). In one implementation of AO/DI, calls are initially placed and handled over the D channel, using packetized procedures such as those known as X.25 (which is described, e.g., in RFC-0874). Because the D channel is always-on, it is possible to provide always-available service, including, e.g., "push-mail". When it is determined that additional bandwidth should be provided, one or both of the bearer channels are switched to assist in transferring the data. Typically the bearer channels will use MLPPP (e.g. without the X.25 packetization used on the D channel). When it is determined that such additional bandwidth should be discontinued, one or both of the B channels should be disconnected.
The usefulness of AO/DI will be related to the manner in which bandwidth is allocated, i.e. the manner in which decisions to add or drop B channels are made. It is possible to base decisions on recent volume of data traffic, such as by basing the decision on whether the depth of data in a router queue 128 has reached a predetermined threshold. Fig. 2 presents a (simplified) example of queue-depth decision-making, and also illustrates one of the shortcomings of such a system. In Fig. 2, the queue depth 212 is initially low but begins rising relatively rapidly when data communication commences at time Tl. As noted above, the communication will initially be carried by the D channel 214. However, because the D channel is relatively low-bandwidth, the queue-depth rapidly rises after Tl, reaching a pre-defined queue-depth threshold 216 at time T2. The event of reaching the threshold 216 at time T2 triggers a decision to switch-in B channel number 1. Implementation of this decision takes a certain amount of time and thus, in the illustration of Fig. 2, the B channel number 1 is switched-in at time T3 218. Because the bandwidth of the B channel is relatively large, the queue depth rapidly falls 222 to a level below the threshold 216. In the example of Fig. 2, the data being transferred has a relatively large bandwidth requirement and, after a time T3, the queue depth continues to rise, although more slowly than during the period following time Tl. In the illustrated example, the queue depth once again reaches the threshold 216 at time T4 224 triggering a decision to add the second B channel. In the illustrated example, however, it happens that the data transfer is complete shortly after the time T4. Nevertheless, because of the delay involved in switching in a B channel and, subsequently, the delay involved in discontinuing or switching out a B channel, B channel number 2, in the illustrated example, is switched in at time T5 and is not switched out until time T6. Thus, in the example of Fig. 2, the user will be charged for use of B channel number 2 between time T5 and T6, even though the user received no benefit from use of B channel number 2 (since data transfer was completed before the B channel was switched in).
Fig. 3 depicts, in block form, a system which, according to the present invention, can base bandwidth allocation decisions on information other than (or in addition to) queue depth. Details of the system will be described below. In general, as shown in Fig. 3, information related to characteristics of the data is passed 312 to a decision system 314. The decision system determines whether and when bandwidth should be allocated or deallocated and these decisions are executed 316 using MLPPP 318 and BACP 322 to implement such switching in a manner to avoid disrupting data flow while achieving the desired bandwidth allocation. In the embodiment detailed below, the decision system 314 uses a rules base for making decisions and, preferably, provides a development environment for building the rules base. In one embodiment, the decision system 314 provides self-learning capability (artificial intelligence) e.g. so that it can modify its own rules base to meet changing environmental demands. The rules base architecture is preferably vendor-independent and preferably contains a management tool which is identical across various vendors' hardware systems, e.g. permitting administrators to manage varied systems from a single console at the same time.
In one embodiment, heuristic analysis is used to achieve a self-learning system. One example of a heuristic analysis is a so-called "pegboard" system. In one example of a pegboard-type heuristic method, a system is provided which (a) determines when to perform an evaluation of the performance of the system; (b) how performance is to be evaluated; and (c) how to revise the rules when performance is deemed sufficiently poor. In one pegboard system, separate counts of the total number of messages (such as the total number of messages of a particular type) and of the number of such messages or data streams that are handled correctly, are accumulated in a software (or in some cases a hardware) counter. The counters of total data stream of a particular type and of a total number which are handled "correctly" can be visualized as first and second pegboards 1812, 1814 as illustrated in Fig. 18A in which darkened circles in the first pegboard 1812 represent the number of data streams of a particular type (in the illustration, the number of e-mail sessions) in a particular period (e.g. since the last evaluation of performance) and darkened circles in the second pegboard 1814 depict the number of e-mail sessions which were handled correctly. For purposes of illustration, it may be supposed that the currently-operating rules base is configured on the basis of an assumption that e-mail sessions are relatively small and thus provides for rules which do not increase the bandwidth for e-mail sessions. Thus, in the illustration of Fig. 18A, each time a new e-mail data stream is handled, the counter or pegboard 1812 is incremented. The handling of the e-mail session is evaluated to determine whether the e-mail session was handled correctly and, if correct handling is determined, the second counter or pegboard 1814 is incremented. The evaluation procedures can be configured in a number of ways for determining whether handling of a e-mail session was correct. For example, since the rule that specifies not increasing bandwidth for e-mail sessions is based on an assumption that an e-mail session is small, it is possible to configure the evaluation software such that handling of a particular e-mail session under the current rules base is considered "correct" if, in fact, the particular e-mail session is small (less than a threshold amount). Other types of evaluation of performance are also possible. For example, it would be possible to configure software such that the actual handling of the e-mail was compared to one or more possible alternative ways of handling the e-mail (such as increasing bandwidth) and to determine whether the actual handling could have been improved (in a sense of , e.g., providing better performance at relatively low cost, or providing closer compliance to user-established performance criteria) had an alternative handling procedure been used.
In any case, it can be seen from the above how the software may be configured to automatically maintain a count in pegboards 1812, 1814. As will be clear to those of skill in the art, it is also possible to provide a set of counters or pegboards for other types of messages (e.g. in addition to the illustrated e-mail pegboards).
In order to perform function (b), at some point the information effectively accumulated in the pegboards is considered ripe for evaluation. A number of systems can be used for determining when evaluations are to take place. In the illustration of Fig. 18A, evaluation is performed whenever either of the counters or pegboards 1812, 1814 has reached a maximum value, i.e. when either of the pegboards 1812, 1814 is "full" 1816. Other criteria for initiating the evaluation can also be used such as passage of a predetermined period of time, reaching a threshold in the first (but not second) pegboard, reaching a threshold in the second (but not first) pegboard, a perceived change in performance of the system as a whole, the cost of the system as a whole, a user-initiated request to evaluate performance, reaching thresholds which are variable (such as thresholds which vary by time of day) and the like.
Because, in the illustrated embodiment, the "correct" handling of each individual e-mail session was individually and preferably continuously evaluated, once the evaluation period has been reached, performing the system evaluation can be achieved merely by comparing the number of correctly-handled sessions (1814) to the total number of sessions (1812) in a given timeframe. For example, it is possible to configure the software such that if the ratio of correctly handled e- mail sessions to total number of e-mail sessions in the timeframe is less than a predetermined ratio, the system will initiate a change to the rules base in an attempt to improve performance. In the illustrated example, since the current rules base involves not increasing the bandwidth for e-mail sessions, in response to detection of unacceptably poor performance (a relatively low ratio of correctly- handled e-mail sessions to total e-mail sessions) the system will modify the rules base to, e.g., allow for an increase in bandwidth in response to e-mail traffic, such as a predetermined minimum of e-mail traffic. As will be clear to those of skill in the art, other ways of modifying the rules base upon detecting poor performance can also be provided such as initiating queuing of the e-mail messages or the like.
Although Fig. 18A illustrates a pegboard-type heuristic method, other types of self-learning, preferably heuristic self-learning methods can also be used. For example, a more general heuristics method may involve obtaining information on a plurality of different characteristics of data streams (such as date, time, effective data rate, port number and handling under current rules base) which may then be analyzed to determine, over a number of data streams, which factors appear most pertinent to the performance of the system. As one example, the system may be configured to obtain and store information relative to those data streams or messages which are of an unknown type. As noted above, this system typically will have some procedure in the current rules base for handling unknown-type data streams, resulting either in a decision to switch to a higher bandwidth or not to switch to a higher bandwidth for these data streams. In one example of a more general heuristics method, the system may, for example, keep track of the port number for such unknown-type data streams and store (e.g. in a table 1912 such as that illustrated in Fig. 19) the frequency of unknown data types associated with each port and whether switching occurred. According to this example, periodically (or at user initiated or otherwise selected times) an analysis is performed to evaluate handling of unknown data streams under the current rules base. For example, the information illustrated in Fig. 19 can be used to select those sessions or session types which appear to have the largest impact on the system (e.g. the most packets). In this illustration, the category of unknown data streams having the largest impact (such as unknown data streams with a particular port address which occurred most frequently) are then analyzed to determine whether they were handled "correctly". Analysis of "correct" handling can be performed by a number of methods, including those as described above in connection with the example of Fig. 18. For example, it may be determined whether different switching decisions would have resulted in acceptable performance but at a lower cost (e.g. if the system has been configured, or users have indicated a desire, to keep costs at the minimum level consistent with a desired level of performance). In one example, if it is determined that a relatively large number (e.g. exceeding a threshold) of unknown-type data streams was not handled correctly, a decision is automatically made regarding how to modify the rules base in order to attempt to improve performance.
In one embodiment, this decision regarding how to revise the rules base is based on a further analysis which correlates the correct and incorrect switching decisions to a number of different possible correlates (such as predetermined potential correlates that had been determined as likely candidates). Examples include attempting to correlate correct and incorrect switching decisions to date and/or time the packets were sent, the "bursty/continuous" behavior of packets, the effective data rate over a given transmission period and the like.
On the basis of this analysis, one or more of the correlates are identified as having a relatively significant correlation to the correctness of handling and such correlation is used as a basis for modifying the rules base. For example, if it is determined that most of the incorrectly handled unknown-type data streams occurred between the hours of noon and 3 p.m., and/or for a particular port number the rules base would be modified to make different (e.g. opposite) switching decisions for unknown data streams which occur during those hours. The system will then temporarily add new rules for this unknown data type and will use this new rule set to replace the previous rule set for the unknown session types. The counters (such as those depicted in Fig. 19) are then reset, at least for the categories relevant to the changed rules, and the system continues to operate and accumulate information for later heuristics-based performance analysis.
In addition using identification of data stream type for purposes of bandwidth switching, data type can be used for other purposes. In one example, data stream types are identified and used for queuing of data streams (such as weighted fair queuing). Such queuing can be used in place of or in addition to the above- described band selection or switching. In the illustration of Fig. 20, the system 2012 is placed in the data stream such as being placed in a router 2014 which in the illustrated embodiment, receives an inbound 10 Mbps LAN packet stream 2016 and outputs a 128 Kbps WAN packet stream 2018. In the illustrated embodiment, voice and video data packets are provided with the highest priority 2022 while e-mail and Internet "web" packets are provided lesser priority 2024, 2026. If the bandwidth of the output stream 2018 is not fully utilized, packets of packet stream 2016 are placed onto the output line 2018 substantially without buffering. However, if the bandwidth of the output stream 2018 is being fully utilized, the system queues packets as they arrive e.g. by placing the packets in d fferent queues 2028a,b,c. The different queues are provided with different priorities, such as by providing the queue 2028a corresponding to voice and video with the highest priority 2022. The router 2014 outputs packets from the queues 2028a,b,c but does not necessarily output the packets in a manner which reflects the order in which they arrived or necessarily providing equal distribution from the various queues. Instead, packets in the queue 2028a with the highest priority are output with a greater frequency (compound the input frequency or equal or proportional frequency) than packets in lower-priority queues 2028b, c. Thus, whereas the incoming packet stream 2016, voice and video represent approximately one-third of the packets, the voice and video packets are output more frequently so that in the output stream 2018 illustrated in the example of Fig. 20, they represent 50 percent of the output packets.
Fig. 21 presents another fashion in which a system 2112 in a data stream (such as in a router 2114) can be used to enhance performance and/or reduce cost. The example illustrated in Fig. 21 relates to a situation in which a video receiver sends, e.g. over a 10 Mbps LAN packet stream 2116 to a video sender (e.g. over 128 Kbps WAN packet stream 2118) requests (such as in the form of an acknowledged "ACK" message) for video packet data of a particular size. In this example, the system 2112 is used for packet rate control. For example, it may be that the video receiver requests a particular amount of video data but that it would not be most efficient to transmit all of the packets necessary to fulfill the data request at once. According to the example of Fig. 12, after determining the effective incoming and outgoing data rates of packet streams 2116, 2118, the system takes into consideration a "virtual" data rate for video, such as a data rate that has been previously requested by an administrator. For example, the administrator might request video data at a rate of 64 Kbps or, e.g. 8 Kbps. The system 2112 calculates the maximum "chunk" size of data in order to maintain rate control. For video (for packet rate control over a link such as 2118 which is 128 Kbps), this might be set, e.g., at 4 KB chunks requested two times per second This chunk size may be adjusted as needed to prevent time-outs. In this situation, when a request "ACK" for video packet data is received, the system 2112 resizes the amount of data requested. For example, the system may select a size which is the minimum value that falls between the maximum chunk size calculated above and the data requested. As one example, if the video receiver sends a request for 32 KB, the system 2112 instead, outputs a request, to the sender, for 4 KB. When the system 2112 notes that the requested 4 KB has been sent from the sender 2126, thus leaving a remaining amount of 28 KB 2128, the system 2112 then outputs another request for 4 KB. This procedure is then repeated until the requested 32 KB have been provided to the receiver. In this way, the system 2112, in response to receiving a particular request 2122, converts this into a series of different requests 2124, 2132, etc. in order to provide control of the packet rate in a fashion which is consistent with the overall desired and economical performance of data transfer.
Fig. 22 provides an illustration of another manner in which data stream type information may be used, e.g. to provide security, such as "firewall", functions. In the illustration of Fig. 22, the system 2212 is positioned in the data stream (such as in a router 2214). The illustration of Fig. 22 provides an example in which the desired security features include rejecting all file transfer protocol (FTP) packets 2216 from within a satellite bank unless the time is between 4 p.m. and 8 p.m. and a secure software key has been sent to the router.
In the illustration of Fig. 22, FTP packets 2216 on the 10 Mbps LAN packet stream are not provided on the 128 Kbps WAN packet stream because, in the illustration, either the time is not between 4 p.m. and 8 p.m. or the secure software key has not been sent to the router. In one embodiment, the system can be configured, e.g., to allow access to the satellite banks systems by HQ systems only if HQ systems first "unlock" a secure connection to the router allowing, e.g., up to a 15-minute transmission window.
Fig. 23 illustrates an example of a use of a system 2312 in a router 2314 for routing different types of data streams on different communications media. For example, in the illustrated embodiment, packets on a LAN packet stream 2316 may be routed over a low-speed, low-cost dial-up WAN 2318, over a mid-speed, mid-cost ISDN WAN 2322, or a high-speed, high-cost fiber-optic WAN 2324. Other types pf possible media will occur to those of skill in the art. In the illustrated embodiment, the LAN packet stream can include a number of different types of packets including voice and video packets 2326 which are, in this example, considered to be timing-critical data, requiring maximum performance, e-mail packets 2328, considered in this example, to be not time- critical and requiring treatment so as to minimize cost, and web packets 2332, considered in this example, to be of average importance. The system 2312 can operate to route packets, depending on the packet type, to the various media 2318, 2322, 2324, e.g. via buffers 2334a,b,c associated with each medium. In the example of Fig. 23, the rules base for the system 2312 is configured such that, when timing-sensitive or mission-critical packets are received, e.g. 2326, these are sent through the highest-speed link or WAN 2324 available. When less time- critical packets are received, such as web packets 2332, and packets for interactive applications, these are sent through a less expensive medium-speed link or WAN 2322, and when e-mail packets and other time-insensitive packets are received, these are sent through the lowest cost link or WAN 2318.
Although illustrations of the use of a system have been provided including illustrations involving switching, it is possible to provide a number of applications of a system outside of switching. Many such applications involve providing to a system 2412, copies of packets in the data stream 2416 and/or inserting generated packets 2418 into the packet stream, as illustrated in Fig. 24. Examples of applications of a system outside of switching include monitoring the line e.g. for over-utilization; tracking traffic types and reporting to the administrator; tracking usage characteristics of users who connect remotely; comparing efficiency and cost of a current connection to a theoretical connection type (e.g. given a profile of the theoretical connection type); acting as an enhanced intelligent firewall (to analyze security and recommend improvements); simulating and/or replaying data for diagnostic purposes; improving transmission efficiency of data sent through the system (e.g. to diminish traffic latency); investigating unforseen ways to improve efficiency; communicating with other systems to automatically provide redundancy; and/or tracking byte patterns within packets e.g. to identify and prevent viruses, identifying and acting upon tunneled protocols, secure protocols and the like.
The decision system 314 includes a number of components which, in one embodiment, are distributed. Some components reside on vendor's equipment while others reside on system developers' and/or administrators' work stations.
The system preferably operates on a stream-based rather than packet-based level. As is known to those of skill in the art, X.25, multi-link protocol and similar systems transfer a given data stream by transferring a plurality of data packets, each of which contains a portion of the data stream. The present system, rather than attempting to make separate decisions for each data packet, identifies the data streams which the packets make-up and makes decisions based on information regarding each different data stream. The decision system 314 can determine any or all of the size, start time, end time of a data stream e.g. through an ISDN interface. Preferably, the system can make this determination after obtaining information from only the first few packets of a data stream, and in some cases after obtaining information from only one (such as the first) packet of a stream (which may contain sufficient header or other information to identify the data type of the stream).
In addition, the decision system 314 can identify other characteristics of a stream. In an ISP (Internet Service Provider) environment, for example, the decision system 314 can determine if a particular stream represents an FTP (File Transfer Protocol) session, an HTTP (Hypertext Transfer Protocol) request to a server, or some other type of transmission. This information about stream-type can be used in making decisions about predicted needs on the underlying ISDN lines and thus serve as a basis for deciding, e.g., when to add channels and/or when to close channels. Table I provides for purposes of illustration, a list of selected data stream types and certain characteristics of the data streams which, in a given environment, may be useful in predicting future bandwidth needs for that data stream. Other data types and characteristics are well known to those of skill in the art, including, for example, HTTP (hypertext transfer protocol), SMTP, SNMP and H.323.
Table I
Figure imgf000018_0001
In one embodiment, predictions regarding future bandwidth needs for a data stream are implemented by a rules base. The rules base preferably can be modified, either automatically or manually, e.g. based on traffic statistics. Preferably, the decision system 314 automatically collects statistics useable for modifying the rules base. Although it is possible to implement a decisions system 314 according to the present invention in a number of fashions, implementation by a rules base configuration is believed to allow system developers to more readily program the decision system 314 to deal with different data streams and, preferably, in a relatively intuitive fashion such as via a series of yes/no decisions (with certain decisions providing the conditions for other decisions). Preferably such system design or programming is independent of the underlying hardware and thus can be used with any of the variety of hardware configurations. In one embodiment, reprogramming or modifications of the rules can be accomplished without interrupting operation of the system, e.g. without the need to re-boot the router 116.
Preferably, to assist in achieving efficient execution of the decision system 314, at least portions of the decision system 314 are executed as byte code. Preferably, the rules base system is compiled into vendor-independent byte code before being downloaded to vendor equipment. Preferably the byte code is specifically developed for operating on packets and for making binary (yes/no) decisions. Additional efficiency is preferably implemented by automatically ordering the binary decisions for optimum or increased efficiency. In one implementation, some or all binary decisions, as they are made, result in setting up flags for that session, so that decisions, once made, do not have to be repeated unless necessary.
Preferably, the byte code can be provided without the need for compiling (such as when an interpreter, rather than a compiler, provides the byte code). This approach can be useful in providing new or modified byte code which can be loaded on the real time component without the need to interrupt or re-boot the system or components thereof.
Efficiency of execution is further promoted by the componentized or modularized structure of the decision system 314, such as the embodiment depicted in Fig. 4. In the embodiment of Fig. 4, a real time component RTC 412 interfaces to the ISDN 119 data streams (preferably to a router vendors' protocol stack) to obtain information regarding packets as they pass through the router 116. Preferably the RTC 412 does not reside in such stack but, instead, obtains information regarding packets through vendor application programming interfaces (API's). Since the protocol stack itself is not modified, there is no need to recertify a protocol stack when the present system is implemented, provided the vendor provides the necessary API's.
Preferably, the RTC 412 includes substantially all of the real time operations of the decision system 314. In the depicted embodiment, the RTC 412 performs a number of functions. It is capable of identifying start, middle and end packets of particular data streams. The RTC 412 makes decisions on when to switch channels, open channels and close channels using rules provided in a byte-code system or engine. The RTC 412 further collects statistics about data traffic. The type of statistics which are collected are determined, preferably, by the byte code engine.
In the embodiment of Fig. 4, the byte code engine which is executed by the RTC is provided to the RTC 414 by an adaptation component (AC) 416. This architecture permits modifying or updating the byte code engine executed by RTC. In particular, the AC 416 receives statistics on data stream characteristics as well as the channel switch/open/close decisions made by RTC 422. By comparing the received statistics against the existing rules base which the RTC is currently using, the AC 416 can determine if the rules base might be better adapted to the current environment. Preferably the AC 416 can automatically (without human intervention) generate a revised or modified version of a byte code engine and download the improved or adapted engine 414 to the RTC 412. In this way, the AC 416 modifies or adapts the RTC to meet specific needs of a changing environment. The statistics used by the AC are also preferably passed on to an administrator console 424 (in the depicted embodiment, via an Implementation Component (IC) 428.
Preferably the AC 416 need not operate in real time (or put another way, a slowdown or stoppage of the AC 416 will not have an immediate effect on current data flow). Modularizing or compartmentalizing those components, such as AC 416, which need not run in real time provides the opportunity to avoid placing excessive computational loads on the router computer since non-real time components such as the AC 416 can be configured to operate only as router processor cycles are available (i.e. to use the router processor during times when the router processor would otherwise be idle). Use of cycle-stealing permits relatively complex and time-consumptive analysis to be accomplished without affecting overall performance and without the need for significant (or, in many cases, for any) addition or upgrading of routing processors or other hardware. Cycle-stealing and other efficiency-enhancing measures as described herein make it feasible to employ the learning or artificial intelligence approaches described herein which, it is believed, were previously generally considered infeasible for telecommunications routers because of the computational load involved. The AC 416 also passes-on the switch/open/close channel decisions (made by the RTC) 425 to the IC 428. A major function of the IC 428 is to implement the decisions made by the RTC by interfacing to vendors' implementations of BACP 322 and MLPPP 318. Preferably the IC 428 makes calls to BACP using vendors API's in order to switch channels, open channels and tear down channels, as decided by RTC and conveyed through the AC 416. IC 428 also stores statistical information 424 and passes it on 432 to the administrator console 426. As depicted in Fig. 10, the Administrator Console 426 preferably may be configured to display, e.g. information about all routers in a network, such as status 1012, numbers of total, active and inactive routers 1014 and the like. As depicted in Fig 11, the Administrator Console 426 preferably may be configured to display, e.g. detailed customizable views of many types of statistics for various routers, such as status 1112, Bytes and Packets in various time periods 1114a, 1114b and the like.
New or modified rules bases can be developed by administrators using depicted administrative applications 426, 434. Such new rules bases are downloaded 436 by the IC 428 (e.g. via Internet Protocol (IP) Sockets) to the AC 416 where they are converted into (preferably optimized) byte code that the RTC 412 can use. Conversion into byte code, particularly efficient or optimized byte code, can be a difficult task. In one embodiment, the task is achieved or assisted using prime implicants theory-based procedures.
Preferably the administrator console 426 provides a graphical user interface (GUI) to assist an administrator in setting or changing parameters for rules bases running on routers in a network (or specific portions of rules bases such as router policies or user policies). For example, in one embodiment, as depicted in Fig 12, the administrator console 426 can be configured to facilitate selection of certain policies, such as by displaying drop-down boxes or other selection items, e.g. for setting maximum bandwidth for privileged users 1212, setting policies for certain data types 1214, naming policies 1216 and the like. Preferably the administrator console 426 also provides an easily accessible and understandable view of the statistics 432. In the depicted embodiment a Policy Setting Component 434 is used, e.g. by a network engineer, to create and modify rules bases. As depicted in Fig 13, such policy setting is preferably facilitated by arranging in "tree" views 1312 of a type familiar to many programmers or network engineers
Preferably the administrator console permits simultaneous management of one or more decision systems 314 and multiple rules bases from a single location. Use of an interface such as a sockets-level IP interface to all decision systems assists in accomplishing this task. In such a configuration, the interface presented on the administrator console, as well as the language used for creating and modifying rules bases, is vendor-independent, and thus will appear the same to an administrator regardless of the type of vendor hardware present on a given IP network.
As illustrated in Fig. 4, it is possible to implement the present invention in the absence of modification to hardware or software of an end user or client 114. However, it is also possible, and in some cases advantageous, to provide a system which includes certain client-side applications e.g. as depicted in Fig. 5. In one embodiment, a client connection component 514 assists in setting up a users' ISDN connection to both a telephone company and the ISP (Internet Service Provider). An administration component 516 can be provided to offer an end user a degree of control over his or her own ISDN usage (e.g. through use and modification of a user policy) which may then be integrated into the rules base running on the router to which the user is connecting. This may be used, e.g., to permit users to further increase efficiency and reduce costs of data transmission based on their special knowledge of their own requirements. A user may, for example, wish to indicate a particular balance between costs and level of service, or may wish to specify that, for example, e-mail messages are to receive top priority regardless of cost. The server side may also wish to have some potential for influence on operation of the system. In one embodiment, when an ISP wishes to change or add options available to an end user, the service provider can immediately "hot load" the modified options to the client side.
Figs. 6a and 6b depict components and process steps involved in making channel switching decisions according to one embodiment of the present invention. In the depicted configuration, when a data packet reaches a router 612,614, a copy of the packet 616 is delivered to the switching system 618 and, in particular, to the RTC 622 by the router 624. The RTC uses the rules base 626 to decipher the packet and determine whether or not to change the bandwidth 628. If the RTC does not change the bandwidth, the RTC will record this decision and do nothing further with regard to the packet 632. If the RTC determines that bandwidth should be changed, the RTC will record its decision and will send a command 634 to the IC 636 via the AC 638. The IC 636 uses a bandwidth control method to request adjustments to the bandwidth by the router 642, essentially opening or closing bandwidth switches 644a,b,c. Regardless of whether a particular packet results in a change in bandwidth, the RTC 622 will occasionally or periodically report on the decisions it has made to the AC 646. The AC 638 will evaluate these decisions and may use its own larger rule set to modify the rules base 626 of the RTC 648.
Figs. 7a and 7b illustrate operation of the RTC in greater detail. A packet processor 712 places a newly-arrived packet copy into a packet queue such as a first in, first out (FIFO) queue 714 so that it can be processed by the rules base engine 716. The rules base engine 718, when it receives a packet from the queue 714 resets any "per packet" instance variables 722 and starts processing 724 via the rules base 626. The rules base 626 deciphers the packet, e.g. relying on an opcode list and/or parser 726, records statistics related to the packet and its status, and determines if a change in bandwidth should be made 728. If execution of the rules base results in a change in bandwidth, the RTC 622 records its decision, and sends a command 734 to the IC 636 (via the AC). As noted above, the IC 636 uses a bandwidth control method to request adjustments 736 to the bandwidth by the routers 612. The RTC 622 as noted, periodically or occasionally reports its decisions 738 and statistics to the AC 742. Before processing the next packet, the RTC will determine if there is a new or modified rules base received from the AC 638. If so, the RTC will wait (i.e. will not process new packets from the queue 714) until completion of processing (using the old rules base) of the current packet, will replace the old rules base with a new rules base 746 and continue processing 748.
Figs. 8a and 8b depict processing and components of an IC 636 according to an embodiment of the invention. In the depicted embodiment, a comm manager 812 can receive, e.g., status information from administrative applications 426, 512 with policies being saved via a data manager 814 (e.g. on a mass storage device 816) and may request information, to be satisfied with recent data from the data manager. The mass storage device 816 may be used for storing rules bases, data dictionaries, user parameters, statistics, and the like. The comm manager 812 notifies an internal command controller 822 about events 824 such as new policies. The command controller 822 may also receive new statistics and status updates from the AC 826 which it may save to the data manager 828. The command controller 822 also receives commands from the RTC 832 such as commands to change bandwidth which it passes on 834 to a connection manager 836, 838. The connection manager 836 coordinates requests to switch up and switch down, e.g. by communicating 842 with a router's 612 connection manager (e.g. a BACP or the like), and handles the progress of connection requests 844.
Figs. 9a and 9b illustrate operation and components of an AC according to an embodiment of the present invention. The IC 636 may pass a set of policies 912 (which may be in the form of a new rules base, a data dictionary, or other forms) preferably in a platform-neutral format (i.e. which can be read by any implementation of the system 618) 914. A loader 916 converts the policies into a platform-specific format, e.g., numbers are converted into 16-bit signed on Intel format, opcodes are stored in a more compressed format, and the like 918. The loader passes the policies to 922 ACBM 924. The ACBM 924 which may be provided, with a data dictionary 926a, a parser 926b, an opcode list 926c and the like, derives a rules base from the policy and passes it 928 to the prime implicant 932 of the analyzer 934. The prime implicant 932 uses rules of logic to reduce, reorganize and compress the rules base so that it is more efficient 936. The prime implicant 932 then passes the rules base 938 to the RTC 942. In addition to or in place of basing a rules base on information received from the IC, the ACBM 924 may use its own set of policies and statistics received 944 from the RTC to generate a new rules base and send it to the prime implicant 946.
Figs. 14a and 14b illustrate a manner of facilitating self-modification or self- learning according to an embodiment of the present invention. In the depicted embodiment, the IC downloads 1412 a data dictionary or rules base to the AC 1414. If the AC receives a data dictionary, it first extracts a rules base e.g. via the ACBM 924 before downloading to the RTC 622, 1416. The RTC 622 processes and switches according to its rules base 626. Periodically or occasionally, the RTC passes statistics 944 and/or information (fingerprints) about unknown packets it has found, to the AC 638, 1418. The AC 638 uses algorithms built into its data dictionary 926a or rules base to modify, add, or delete rules 1422. Changes made to a data dictionary or rules base are passed up 1412 to the IC for storage 1424. The AC 638 extracts and passes 1426 a new, unoptimized version of the rules base to the prime implicant 932. The prime implicant 932 uses rules of logical reduction to optimize the new rules base before it passes an approved rules base to the RTC 1428.
Fig. 15 provides one example, of a relatively simple nature, of how a known packet may cause a switch up (or the addition of a channel). In the example of Fig. 15, the rules base 626 receives a packet and identifies the packet type of being of HTTP (hyper text transfer protocol) type 1512. The rules base determines that this packet is a header for a new connection 1514. The rules base then determines that the packet specifies a session length of 67OK bytes 1516. The rules base determines that this session length is greater than the maximum number of bytes needed to switch up 1518. The session (data stream) is logged (information stored, associated with a data stream identifier) and the progress of the data stream or session is tracked 1522. The RTC makes a note (e.g. by storing data, setting a flag, and the like) to report statistics regarding this data stream and/or packet to the AC, which will assist the AC in making a determination of whether the switch up was correct (resulted in the desired data transfer effect) and/or whether the rules base should be modified 1524. The RTC will then send a message, via the AC, to the IC to switch up (add bandwidth) 1526.
Fig. 16 provides a simple example of a situation in which receipt of a packet of unknown type may result in a switch up. In the example of Fig. 16, a packet is received whose data type cannot be identified 1612. The rules base will obtain information (fingerprint) regarding this packet such as data length, associated data streams, number of packets in a stream and the like, and, as before, will make a note to pass such fingerprint information on to the AC 1614. In the depicted embodiment, there are two conditions 1616, 1618, which may cause the rules base to request a switch up. The rules base may be configured to request a switch up when either of these conditions 1616, 1618 is fulfilled, or may require that both conditions 1616, 1618 be fulfilled before requesting a switch up. In the depicted embodiment, the first condition is that the new data rate, including the new packet, is greater than the maximum data rate for the current bandwidth setting 1616. The second condition is that the data rate has been too high (exceeding a threshold) for a longer period than a predetermined time for the current bandwidth setting 1618. Depending on the configuration of the rules base, when either or both of these conditions are fulfilled, the rules base will send a message to the IC (via the AC) to switch up 1622. Fig. 17 illustrates an example of how an aggregation of streams may cause a switch up. In the example of Fig. 17, the rules base first identifies a packet as signifying the start of an e-mail session 1712. As before, the rules base logs and tracks this session or data stream and makes a note to report statistics to the AC 1714. The rules base determines that it should not request a switch up merely because of the data type, i.e. merely because this is an e-mail session 1716. In some configurations, the rules base may be configured such that e-mail sessions are considered non-time critical, and thus normally do not result in a switch up. In the depicted example, it is determined that the new data rate, including the new packet, is greater than the maximum for the current bandwidth setting 1718 and/or that the data rate has been too high for longer than a predetermined time for this current bandwidth setting 1722. As a result, even though the packet is identified as an e-mail packet, the rules base sends a message to the IC (via the AC) to switch up 1724. Bandwidth aggregation can be used both in the context of aggregation of predicate bandwidth and aggregation of actual bandwidth.
In light of the above description, a number of advantages of the present invention can be seen. The system preferably achieves more efficient use of available bandwidth thus permitting multiple users to share B channels or other high bandwidth media. In one embodiment, the present invention can provide a ratio of users to B channels greater than about 3:1, more preferably greater than about 5:1, even more preferably greater than about 8:1 and yet more preferably greater than about 10:1. Preferably the system makes bandwidth allocation decisions based on considerations such as by considering the effect an allocation will have on a user's telecommunications charges, e.g. taking into account the current rate in variable-rate environments. The present invention is capable of accommodating changes in data traffic and preferably is capable of automatically learning and adapting to changing conditions. The present invention can be configured to configure and/or modify a decision rules base taking into account current tariffs and other charges so as to provide high bandwidth service as needed or desired while reducing or minimizing costs to end users. The invention provides a vendor-independent mechanism for implementing and executing a bandwidth allocation decision. The same decision procedure can be run on different vendors' hardware interchangeably without modification. Such vendor independence further facilitates hardware upgrades since migration to new hardware can be achieved with little or no modification to the decision system of the present invention. In this way vendor investments in the described decision system are protected and new systems are compatible with procedures of previous systems. The present invention provides an intuitive GUI development environment and language for creating and modifying rules bases used by the system. The development environment allows vendors to fully and easily integrate any decision algorithm work that has already been done into the rules base. The rules bases themselves are preferably modular and reusable. The present invention permits rules bases to be hot loaded to the router and implemented during normal operation i.e. without taking down or re-booting routers and without stopping the data streams. The present invention facilitates development and testing, as well as modifications of algorithms since the ability to achieve hot loads permits frequent downloads during testing. In one embodiment, a single administrator console can control a relatively large number of widely distributed routers simultaneously. Multiple administrator consoles can be used to manage the same group of locally and/or remotely connected routers (for example, different consoles could be used by administrators on different shifts, primary backup and tertiary consoles could be used for redundancy, or specific consoles can have responsibility for a separate portion of routers. The present invention provides advantages directly to end users by facilitating connection to the users' telephone company and ISP and providing the end user with a certain level of control over his or her own ISDN usage. Although client side applications may be used, client side installation is not required thus providing a desirable degree of flexibility, openness and future-proofing. The present system preferably is compatible with any vendor hardware on remotely connected machines which supports BACP and MLPPP, e.g., if sufficient memory and processing resources are available. The present invention provides a way to allocate bandwidth, such as ISDN bandwidth, without relying solely on queue depth, preferably using predictions of future bandwidth requirements based on data stream characteristics.
A number of variations and modifications of the system can also be used. It is possible to use some features of the invention without using others. For example, it is possible to implement a rules-based, data-stream oriented bandwidth allocation procedure without using automatic learning procedures. The present invention can involve combining data-stream oriented bandwidth allocation with other approaches, such as using queue-depth of "level-of-service" allocation methods when the system is unable to (or lacks the time or other resources to) identify the data type of a data stream. In some embodiments, it may be preferable to permit aggregation of two or more data streams for purposes of allocating bandwidth for such data streams (e.g. in cases where neither of two (or more) co-existing data streams by itself justifies additional bandwidth, but overall efficiency is promoted if the aggregated data streams are provided with additional bandwidth). The present invention can be used in an environment in which there are multiple network transport media or in which there is only one network transport medium, e.g. as in an Ethernet or ADSL network. In one embodiment, the invention can be implemented using queues and assigning virtual or software channels. Although the present invention has been described in the context of an ISDN implementation, the present invention can also be applied to other telecommunications systems or media including Tl, Frame Relay, ATM, Ethernet, Fiber and xDSL (e.g. by providing and using virtual channels). The present invention can be used in connection with networks that combine fiber optics, frame relay, and Ethernet, and can be used in connection with networks that have only one type of medium (e.g. using virtual or software channels) Although it is believed that features such as modularization, real time segregation, byte code, decision flagging and the like, contribute to efficient execution, it is possible to implement an operable system which does not include one or more of these items. Although certain features of the present invention were described in the context of ISP usages, the present invention can be implemented in a number of other contexts. For example, for remote network access, the system can reside on a remote access router (e.g. owned by a company which uses ISDN to connect outside users to that router). The system can precisely allocate bandwidth in e.g., a corporate environment for accommodating telecommuters (whose data transactions tend to be sporadic and patterned). The present invention can be used in connection with router-to-router connections. For example, point of sale systems in satellite stores connecting to a central site. The present invention may permit routers e.g. at satellite locations, to remain constantly connected to headquarters over switched connections without incurring incremental charges, even over long-haul lines. In such a system, low level throughput (such as price checks, credit card authorizations and the like) can take place over the always-on low-bandwidth D channels, with high level transactions such as price file transfers, coupon downloads, store transactions, summary uploads and the like utilizing additional bandwidth as needed on demand. The present invention can be used in a number of different ways, including any or all of setting priorities for data streams, queuing and/or holding data streams (or packets thereof), providing firewall or other security features, and providing a policy engine.
Although an embodiment of the present invention can be provided in the C language and/or using known artificial intelligence language principals such as those of Prolog, it is possible to implement the present invention using other programming languages and approaches.
Although the present invention has been described by way of preferred embodiments and certain variations and modifications, other variations and modifications can also be used, the invention being defined by the following claims.

Claims

What is claimed is:
1. A computer-implemented process, in a telecommunications system for switching at least some packets, making up a telecommunications stream, comprising: identifying at least one packet, being transmitted on a medium having a first bandwidth, as a component of said stream; identifying a first characteristic of said stream, using at least said packet, wherein said characteristic is at least partially predictive of likely data size of said stream; identifying additional packets as components of said stream; and deciding, based on at least said first characteristic, whether to switch at least some of said additional packets to a second medium having a bandwidth larger than said first bandwidth.
2. A process as claimed in claim 1 wherein said step of identifying said at least one packet is based on at least one of source, destination and port information included in said packet.
3. A process, as claimed in claim 1, wherein said step of identifying said at least one packet is based on information in a data portion of said packet.
4. A process as claimed in claim 1, 2 or 3 wherein said first characteristic is obtained from packet header information.
5. A process as claimed in any one of claims 1 to 4 wherein said first characteristic is a data type of said stream.
6. A process as claimed in claim 5 wherein said data type is selected from among a file transfer protocol type; a GIF type; a streaming video type; a streaming audio type; a hypertext transfer protocol type; an SMTP type; an SNMP type; and an H.323 type.
7. A process as claimed in any one of claims 1 to 4 wherein said first characteristic is a usage characteristic.
8. A process as claimed in claim 7 wherein said usage characteristic is associated with one or more time periods for a given destination.
9. A process as claimed in claim 7 wherein said usage characteristic is associated with status of communications links in said telecommunications system.
10. A process as claimed in claim 9 wherein said status includes current throughput.
11. A process as claimed in any one of claims 1 to 9, wherein said first medium is a D channel of an ISDN line and said second medium is a bearer channel of an ISDN line.
12. A process as claimed in any one of claims 1 to 9 wherein said telecommunications system includes a medium having at least a D channel and a bearer channel and said step of deciding comprises deciding whether to initiate or discontinue use of said bearer channel.
13. A process as claimed in claim 12 wherein said medium is used to provide an ISDN service or an AO/DI service.
14. A process as claimed in claim 12 wherein said medium is used to provide Tl service.
15. A process as claimed in claim 14 wherein said medium is used to provide service other than Tl service.
16. A computer-implemented process, in a telecommunications system for switching at least some data in a telecommunications stream, comprising: identifying a first characteristic of said stream, wherein said characteristic is at least partially predictive of likely data size of said stream; deciding, based on at least said first characteristic, whether to switch at least some additional data so as to provide different data transmission properties, wherein said deciding is performed using a first stored rules base; automatically evaluating the effectiveness of said step of deciding.
17. A process, as claimed in claim 16, further comprising modifying said rules base, based on said step of evaluating.
18. A process, as claimed in claim 17, wherein said step of modifying said rules base is performed automatically, to provide a self-learning computer implemented telecommunications switching process.
19. A process, as claimed in any one of claims 16 to 18, wherein said step of deciding is implemented using a heuristic process.
20. A process, as claimed in any one of claims 16 to 19, wherein said step of evaluating comprises evaluating both cost and level of service.
21. A process, as claimed in any one of claim 16 to 19, wherein said step of evaluating comprises evaluating aggregate predicate bandwidth.
22. A process, as claimed in claim 16, wherein said step of evaluating comprises evaluating on the basis of user-identified criteria.
23. A method, as claimed in any one of claims 16 to 22, wherein said different data transmission properties are selected from the group consisting of different bandwidth properties and different effective data transmission speed properties.
24. A computer implemented process, in a telecommunications system, for queuing data streams, comprising: identifying at least first and second different data types of first and second input data streams wherein said input data streams define a first frequency of data packets of said first data stream with respect to the packets of the second data stream. queuing at least said packets of said first and second data steams; and outputting packets of at least one of said first and second data streams wherein said one of said data streams is output at a frequency, different from said first frequency
25. A computer implemented process in a telecommunication system for controlling packet rate comprising: receiving at least a first request for data which includes a first data size indicator; outputting, in response to said receipt, a plurality of data requests having second data size indicators different from said first data size indicator.
26. A process as claimed in Claim 25 further comprising: calculating a calculated size of data required to maintain rate control and wherein said second data size is the lesser of said calculated data size and said first data size.
27. A computer implemented process, in a telecommunication system, for providing security, comprising: identifying the data stream type of substantially all packets transmitted on said telecommunications system; forwarding only those packets which meet predefined criteria, wherein said predefined criteria include criteria relating to the data stream type of a packet.
28. A process as claimed in Claim 27 further comprising forwarding packets for at least a first data stream type only if a predefined password has been received.
PCT/US1999/004381 1998-02-27 1999-02-26 Predictive bandwidth allocation method and apparatus WO1999044335A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP54395999A JP2002515217A (en) 1998-02-27 1999-02-26 Predicted bandwidth allocation method and apparatus
CN99800192A CN1272297A (en) 1998-02-27 1999-02-26 Predictive bandwidth allocation method and apparatus
EP99911017A EP0988770A2 (en) 1998-02-27 1999-02-26 Predictive bandwidth allocation method and apparatus

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US3193398A 1998-02-27 1998-02-27
US09/031,933 1998-02-27
US25816999A 1999-02-25 1999-02-25
US09/258,169 1999-02-25

Publications (4)

Publication Number Publication Date
WO1999044335A2 true WO1999044335A2 (en) 1999-09-02
WO1999044335A8 WO1999044335A8 (en) 1999-11-04
WO1999044335A9 WO1999044335A9 (en) 1999-12-02
WO1999044335A3 WO1999044335A3 (en) 2000-01-20

Family

ID=26707789

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/004381 WO1999044335A2 (en) 1998-02-27 1999-02-26 Predictive bandwidth allocation method and apparatus

Country Status (5)

Country Link
EP (1) EP0988770A2 (en)
JP (1) JP2002515217A (en)
KR (1) KR20010020340A (en)
CN (1) CN1272297A (en)
WO (1) WO1999044335A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1094646A2 (en) * 1999-10-22 2001-04-25 Virtual Access Ireland Limited Multi channel communication control system and method
EP1383284A1 (en) * 2002-07-17 2004-01-21 Alcatel Method, computer software products, client terminal, network element and network for efficient use of network resources by just-in-time modulation of quality of service based on service usage and user behavior
GB2393355A (en) * 1999-10-22 2004-03-24 Virtual Access Ireland Ltd Multichannel communication bandwidth control
US7849117B2 (en) 2000-01-12 2010-12-07 Knowledge Sphere, Inc. Multi-term frequency analysis
US9578362B1 (en) 2015-12-17 2017-02-21 At&T Intellectual Property I, L.P. Channel change server allocation

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3906911B2 (en) * 2002-04-18 2007-04-18 ソニー株式会社 Recording apparatus and recording method
KR100486713B1 (en) * 2002-09-17 2005-05-03 삼성전자주식회사 Apparatus and method for streaming multimedia data
FR2852762B1 (en) * 2003-03-19 2005-06-17 Acterna Ipms METHOD FOR EVALUATING THE BANDWIDTH OF A DIGITAL LINK
EP1628443A1 (en) * 2004-08-16 2006-02-22 Universite Pierre Et Marie Curie Method for making a network equipment proactive
JP5061619B2 (en) 2007-01-24 2012-10-31 日本電気株式会社 Resource securing method, relay device, distribution system, and program
CN113194007B (en) * 2021-04-22 2023-03-28 西安交通大学 Method, system and equipment for measuring available bandwidth of network and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0512174A1 (en) * 1991-05-08 1992-11-11 Semaphore, Inc. Parallel rule-based data transmission method and apparatus
GB2265793A (en) * 1992-04-01 1993-10-06 Plessey Telecomm Bandwidth allocation on DPNSS networks
EP0788258A2 (en) * 1996-02-02 1997-08-06 Fuji Xerox Co., Ltd. System and method for data transmission and contention control
WO1998017079A1 (en) * 1996-10-15 1998-04-23 Siemens Aktiengesellschaft Method of handling service connections in a communication network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0512174A1 (en) * 1991-05-08 1992-11-11 Semaphore, Inc. Parallel rule-based data transmission method and apparatus
GB2265793A (en) * 1992-04-01 1993-10-06 Plessey Telecomm Bandwidth allocation on DPNSS networks
EP0788258A2 (en) * 1996-02-02 1997-08-06 Fuji Xerox Co., Ltd. System and method for data transmission and contention control
WO1998017079A1 (en) * 1996-10-15 1998-04-23 Siemens Aktiengesellschaft Method of handling service connections in a communication network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MULLER C ET AL: "ARTIFICIAL INTELLIGENCE IN TELECOMMUNICATIONS" PROCEEDINGS OF THE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), vol. 2, 29 November 1993 - 2 December 1993, HOUSTON, pages 883-887, XP000427934 *
PUCHER F: "GIVING STUDENTS AT HOME ACCESS TO THE INTERNET OVER ISDN" COMPUTER BASED LEARNING IN SCIENCE PROCEEDINGS, CBLIS '95, 30 June 1995 - 4 July 1995, OPAVA, CZECH REPUBLIC, pages 537-548, XP002029719 *
TAO J ET AL: "INTERNET ACCESS VIA BASEBAND AND BROADBAND ISDN GATEWAYS" PROCEEDINGS OF THE 13TH ANNUAL INTERNATIONAL CONFERENCE ON COMPUTERS AND COMMUNICATIONS, 12 - 15 April 1994, PHOENIX, pages 485-490, XP000462600 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1094646A2 (en) * 1999-10-22 2001-04-25 Virtual Access Ireland Limited Multi channel communication control system and method
EP1094646A3 (en) * 1999-10-22 2003-09-17 Virtual Access Ireland Limited Multi channel communication control system and method
GB2393355A (en) * 1999-10-22 2004-03-24 Virtual Access Ireland Ltd Multichannel communication bandwidth control
GB2393355B (en) * 1999-10-22 2004-06-30 Virtual Access Ireland Ltd Multi channel communication control system and method
EP1786169A1 (en) * 1999-10-22 2007-05-16 Virtual Access Technology Limited Multi channel communication control system and method
US7849117B2 (en) 2000-01-12 2010-12-07 Knowledge Sphere, Inc. Multi-term frequency analysis
EP1383284A1 (en) * 2002-07-17 2004-01-21 Alcatel Method, computer software products, client terminal, network element and network for efficient use of network resources by just-in-time modulation of quality of service based on service usage and user behavior
US8046462B2 (en) 2002-07-17 2011-10-25 Alcatel Lucent Method, computer software products, client terminal, network element and network for efficient use of network resources by just-in-time modulation of quality of service based on service usage and user behavior
US9578362B1 (en) 2015-12-17 2017-02-21 At&T Intellectual Property I, L.P. Channel change server allocation
US10045059B2 (en) 2015-12-17 2018-08-07 At&T Intellectual Property I, L.P. Channel change server allocation
US10728600B2 (en) 2015-12-17 2020-07-28 At&T Intellectual Property I, L.P. Channel change server allocation

Also Published As

Publication number Publication date
EP0988770A2 (en) 2000-03-29
KR20010020340A (en) 2001-03-15
WO1999044335A3 (en) 2000-01-20
WO1999044335A9 (en) 1999-12-02
CN1272297A (en) 2000-11-01
JP2002515217A (en) 2002-05-21
WO1999044335A8 (en) 1999-11-04

Similar Documents

Publication Publication Date Title
US6208640B1 (en) Predictive bandwidth allocation method and apparatus
US7283468B1 (en) Method and system for controlling network traffic within the same connection with different packet tags by varying the policies applied to a connection
US7260635B2 (en) Software, systems and methods for managing a distributed network
US6829649B1 (en) Method an congestion control system to allocate bandwidth of a link to dataflows
Mosberger et al. Making paths explicit in the Scout operating system
CN1685661B (en) Per user per service traffic provisioning
CA2358525C (en) Dynamic assignment of traffic classes to a priority queue in a packet forwarding device
US6459682B1 (en) Architecture for supporting service level agreements in an IP network
US6456630B1 (en) Method for data rate control for heterogenous or peer internetworking
US6981052B1 (en) Dynamic behavioral queue classification and weighting
US20040103193A1 (en) Response time and resource consumption management in a distributed network environment
US20020049608A1 (en) Systems and methods for providing differentiated business services in information management environments
US20070043738A1 (en) Methods and systems for reputation based resource allocation for networking
US6988235B2 (en) Checksum engine and a method of operation thereof
EP1242884A1 (en) Software, systems and methods for managing a distributed network
WO2002039275A2 (en) Systems and methods for using distributed interconnects in information management environments
WO2002039261A2 (en) Systems and methods for prioritization in information management environments
WO1999034544A1 (en) Traffic monitoring tool for bandwidth management
WO2002043364A2 (en) Systems and methods for billing in information management environments
WO2002039695A2 (en) System and method for configuration of information management systems
WO2002041575A2 (en) Systems and method for managing differentiated service in inform ation management environments
WO2004062206A2 (en) Method and apparatus for managing packet flows for multiple network services
WO1999044335A2 (en) Predictive bandwidth allocation method and apparatus
WO2002039693A2 (en) System and method for providing differentiated business services in information management
WO2008121690A2 (en) Data and control plane architecture for network application traffic management device

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 99800192.9

Country of ref document: CN

AK Designated states

Kind code of ref document: A2

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

ENP Entry into the national phase

Ref document number: 1999 543959

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1999911017

Country of ref document: EP

Ref document number: 1019997009956

Country of ref document: KR

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: C1

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: C1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i

Free format text: PAT. BUL. 35/99 UNDER (30) REPLACE "NOT FURNISHED" BY "09/258169"

AK Designated states

Kind code of ref document: C2

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: C2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

COP Corrected version of pamphlet

Free format text: PAGES 1/21-21/21, DRAWINGS, REPLACED BY NEW PAGES 1/20-20/20; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

AK Designated states

Kind code of ref document: A3

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

WWP Wipo information: published in national office

Ref document number: 1999911017

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1019997009956

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1019997009956

Country of ref document: KR