The ATM Block Transfer ABT Scheme
4.7.1 The Generic Cell Rate Algorithm GCRA
Unlike the leaky bucket mechanism, GCRA is a deterministic algorithm and it does catch all of the violating cells. However, for this it requires an additional new traffic parameter known as the cell delay variation tolerance CDVT. Note that this parameter is different from the peak-to-peak cell delay variation parameter described in Section 4.2. Let us assume that a source is transmitting at peak cell rate and it produces a cell every T units of time, where T = 1PCR. Due to multiplexing with cells from other sources and with signaling and network management cells, the inter-arrival time of successive cells belonging to the same UNI source could potentially vary around T see Figure 4.15. That is, for some cells it might be greater than T , and for others it might be less than T . In the former case, there is no penalty in arriving late. However, in the latter case, the cells will appear to the UNI that they were transmitted at a higher rate, even though they were transmitted conformally to the peak cell rate. In this case, these cells should not be penalized by the network. The cell delay variation tolerance is a parameter that permits the network to tolerate a number of cells arriving at a rate which is faster than the agreed upon peak cell rate. This parameter is not source dependent. Rather, it depends on the number of sources that use the same UNI and the access to the UNI. It is specified by a network administrator. GCRA can be used to monitor the peak cell rate and the sustained cell rate. There are two implementations of GCRA: the virtual scheduling algorithm and the continuous-state leaky bucket algorithm . These two algorithms are equivalent to each other. Policing the peak cell rate In order to monitor the peak cell rate, the following two parameters are required: peak emission interval T and cell delay variation tolerance τ . T = 1PCR. This is obtained from the user’s declared peak cell rate and the network administrator’s τ . t s T t s t s t s transmission time Arrival time at the UNI Figure 4.15 Arrival times at the UNI. BANDWIDTH ENFORCEMENT 103 TAT = t s TAT = TAT + T Cell compliant Cell not compliant TAT t s + t ? yes no no yes TAT ≤ t s Start TAT unchanged Figure 4.16 The virtual scheduling algorithm. A flowchart of the virtual scheduling algorithm is shown in Figure 4.16. Variable TAT is the theoretical arrival time of a cell and t s is the actual arrival time of a cell. At the time of arrival of the first cell, TAT = t s . Each time a cell arrives, the algorithm calculates the theoretical time TAT of the next arrival. If the next cell arrives late i.e., TAT t s , then the next theoretical arrival time is set to TAT = t s + T . If the next arrival is early i.e., TAT t s , then the cell is either accepted or classified as noncompliant. The decision is based on the cell delay variation tolerance τ and also on previously arrived cells that were late but they were accepted as compliant. Specifically, if TAT t s + τ , then the cell is considered as compliant. Notice, however, that the next theoretical arrival time TAT is set equal to the theoretical arrival time of the current cell plus T i.e., TAT = TAT + T . If the next arrival occurs before the theoretical arrival time TAT, then it can still be accepted if TAT t s + τ However, if cells continue to arrive early, then the cell delay variation will be used up and eventually a cell will be classified as noncompliant. As an example, let us consider the case where T = 10, τ = 15, and the actual arrival times of the first five cells are: 0, 12, 18, 20 and 25. For cell 1, we have that t s = TAT = 0. The cell is accepted, and TAT is set to TAT + 10 = 10. For cell 2, t s = 12 and since TAT ≤ t s , the cell is accepted and TAT is set equal to t s + T = 22. Cell 3 arrives at time t s = 18, and so TAT t s . Since TAT ≤ t s + τ , the cell is accepted and TAT is set equal to TAT + T = 32. Cell 4 arrives at time t s = 20, and TAT t s . Since TAT ≤ t s + τ , the cell is accepted, and TAT is set equal to TAT + T = 42. Cell 5 is not as lucky as cells 3 and 4. Its arrival time is t s = 25, which makes TAT t s . Since TAT t s + τ , the cell is considered to be noncompliant. A flowchart of the continuous state leaky bucket algorithm is shown in Figure 4.17. In this algorithm, a finite-capacity leaky bucket is implemented whose real-value content is drained out at a continuous rate of one unit of content per unit-time. Its content isParts
» COMMUNICATION NETWORKS Connection Oriented Network
» An ATM Connection EXAMPLES OF CONNECTIONS
» An MPLS Connection EXAMPLES OF CONNECTIONS
» A Telephone Connection EXAMPLES OF CONNECTIONS
» A Wavelength Routing Optical Network Connection
» The American National Standards Institute ANSI
» The Institute of Electrical and Electronics Engineering IEEE
» The Internet Engineering Task Force IETF
» The ATM Forum STANDARDS COMMITTEES
» The MPLS and Frame Relay Alliance The Optical Internetworking Forum OIF
» The DSL Forum STANDARDS COMMITTEES
» The Section, Line, and Path Overheads
» The STS-1 Section, Line, and Path Overheads
» THE SONET STS-3 FRAME STRUCTURE
» SONETSDH DEVICES Connection Oriented Network
» Two-fiber Unidirectional Path Switched Ring 2F-UPSR
» Two-fiber Bidirectional Line Switched Ring 2F-BLSR
» Four-fiber Bidirectional Line Switched Ring 4F-BLSR
» GFP Client-independent Functions THE GENERIC FRAMING PROCEDURE GFP
» GFP Client-dependent Functions THE GENERIC FRAMING PROCEDURE GFP
» Virtual Concatenation DATA OVER SONETSDH DOS
» Link Capacity Adjustment Scheme LCAS
» INTRODUCTION Connection Oriented Network
» THE STRUCTURE OF THE HEADER OF THE ATM CELL
» The Transmission Convergence TC Sublayer
» The Physical Medium-Dependent PMD Sublayer
» THE ATM LAYER Connection Oriented Network
» Scheduling Algorithms THE ATM SWITCH ARCHITECTURE
» ATM Adaptation Layer 1 AAL 1
» ATM Adaptation Layer 2 AAL 2
» ATM Adaptation Layer 5 AAL 5
» ATMARP CLASSICAL IP AND ARP OVER ATM
» Types of Parameters TRAFFIC CHARACTERIZATION
» Standardized Traffic Descriptors
» Empirical Models TRAFFIC CHARACTERIZATION
» Probabilistic Models TRAFFIC CHARACTERIZATION
» QUALITY OF SERVICE QOS PARAMETERS
» The CBR Service ATM SERVICE CATEGORIES
» The RT-VBR Service ATM SERVICE CATEGORIES
» The NRT-VBR Service ATM SERVICE CATEGORIES
» The UBR Service ATM SERVICE CATEGORIES
» The ABR Service ATM SERVICE CATEGORIES
» The GFR Service ATM SERVICE CATEGORIES
» CONGESTION CONTROL Connection Oriented Network
» PREVENTIVE CONGESTION CONTROL Connection Oriented Network
» Equivalent Bandwidth CALL ADMISSION CONTROL CAC
» The ATM Block Transfer ABT Scheme
» Virtual Path Connections CALL ADMISSION CONTROL CAC
» The Generic Cell Rate Algorithm GCRA
» Packet Discard Schemes BANDWIDTH ENFORCEMENT
» The Available Bit Rate ABR Service
» THE SIGNALING PROTOCOL STACK
» The SSCOP THE SIGNALING ATM ADAPTATION LAYER SAAL
» Primitives THE SIGNALING ATM ADAPTATION LAYER SAAL
» THE SIGNALING CHANNEL Connection Oriented Network
» ATM ADDRESSING Connection Oriented Network
» THE FORMAT OF THE SIGNALING MESSAGE
» Information Elements IE THE SIGNALING PROTOCOL Q.2931
» Q.2931 Messages THE SIGNALING PROTOCOL Q.2931
» The IP Header THE INTERNET PROTOCOL IP: A PRIMER
» IP Addresses THE INTERNET PROTOCOL IP: A PRIMER
» Label Allocation Schemes THE MULTI-PROTOCOL LABEL SWITCHING MPLS ARCHITECTURE
» The Next Hop Label Forwarding Entry NHLFE
» Explicit Routing THE MULTI-PROTOCOL LABEL SWITCHING MPLS ARCHITECTURE
» An Example of the Use of the Label Stack
» Schemes for Setting up an LSP
» Hybrid ATM Switches MPLS OVER ATM
» Label Spaces, LDP Sessions, and Hello Adjacencies
» The LDP Messages THE LABEL DISTRIBUTION PROTOCOL LDP
» CR-LSP Setup Procedure THE CONSTRAINED-BASED ROUTING LABEL DISTRIBUTION
» The Label Mapping Message The Traffic Parameters TLV
» Classes of Service THE CONSTRAINED-BASED ROUTING LABEL DISTRIBUTION
» Reservation Styles THE RESOURCE RESERVATION PROTOCOL RSVP
» Soft State THE RESOURCE RESERVATION PROTOCOL RSVP
» The Path Message THE RESOURCE RESERVATION PROTOCOL RSVP
» The Resv Message THE RESOURCE RESERVATION PROTOCOL RSVP
» Service Classes and Reservation Styles
» The RSVP-TE Path and Resv Messages
» RSVP-TE Extensions THE RESOURCE RESERVATION PROTOCOL – TRAFFIC
» WDM OPTICAL NETWORKS Connection Oriented Network
» Multi-mode and Single-mode Optical Fibers
» Impairments HOW LIGHT IS TRANSMITTED THROUGH AN OPTICAL FIBER
» Photo-detectors and Optical Receivers
» Optical Amplifiers COMPONENTS
» Optical Cross-connects OXCs COMPONENTS
» Lightpaths WAVELENGTH ROUTING NETWORKS
» Traffic Grooming WAVELENGTH ROUTING NETWORKS
» Point-to-point Links WDM Optical Rings
» Mesh Optical Networks PROTECTION SCHEMES
» The Optical Channel Och Frame
» Overhead Types THE ITU-T G.709 STANDARD – THE DIGITAL WRAPPER
» CONTROL PLANE ARCHITECTURES Connection Oriented Network
» RSVP-TE Extensions For GMPLS
» LDP Extensions for UNI Signaling
» RSVP Extensions For UNI Signaling
» A Space Switch OPTICAL PACKET SWITCHING
» Reservation and Release of Resources in an OXC
» Scheduling of Bursts at an OBS Node
» Lost Bursts OPTICAL BURST SWITCHING OBS
» Signaling Messages THE JUMPSTART PROJECT
» The Signaling Message Structure
» Addressing THE JUMPSTART PROJECT
» The Routing Architecture THE JUMPSTART PROJECT
» The Discrete Multi-tone DMT Technique
» Bearer Channels THE ADSL-BASED ACCESS NETWORKS
» The ADSL Super Frame Schemes for Accessing Network Service Providers
» The ADSL2 and ADSL2+ Standards
» The Physical Layer THE CABLE-BASED ACCESS NETWORK
» The DOCSIS MAC Protocol Operation
» Frame Structures for Downstream and Upstream Transmission
» The PLOAM Cell THE ATM PASSIVE OPTICAL NETWORK
» The Divided-slots Cell THE ATM PASSIVE OPTICAL NETWORK
» Churning THE ATM PASSIVE OPTICAL NETWORK
» Ranging THE ATM PASSIVE OPTICAL NETWORK
» Channel-Associated Signaling CAS BACKGROUND
» Narrowband ISDN N-ISDN BACKGROUND
» Digital Subscriber Signaling System No. 1 DSS1
» VOICE OVER ATM SPECIFICATIONS
» Structured DS1E1J2 N × 64 Kbps Service DS1E1J2 Unstructured Service
» Switched and Non-Switched Trunking
» IWF Functionality for Switched Trunking
» IWF Functionality for Non-switched Trunking
» User Functions THE AAL 2 SERVICE-SPECIFIC CONVERGENCE SUBLAYER SSCS
» The Service-Specific Convergence Sublayer
» SSSAR THE SEGMENTATION AND REASSEMBLY SSCS FOR AAL 2
» SSTED THE SEGMENTATION AND REASSEMBLY SSCS FOR AAL 2
» SSADT THE SEGMENTATION AND REASSEMBLY SSCS FOR AAL 2
Show more