Flow control technique for X.25 traffic in a high speed packet switching network
First Claim
1. A method for controlling X.25 data traffic at an access node of a packet switching network, said X.25 data traffic being provided from sources which continue to transmit traffic only where acknowledgments of previously-transmitted traffic are received on a predetermined basis, said access node implementing a leaky bucket admission control mechanism in which tokens are added to a pool at a predetermined rate, said method comprising the steps of:
- receiving and temporarily storing each incoming packet;
testing the number of tokens available in the token pool against first and second thresholds having values greater than zero;
where the test reveals the number of available tokens is less than the first threshold and packet acknowledgments are being provided to the packet source, discontinuing such acknowledgments;
where the number of available tokens is greater than a second threshold and acknowledgments are not being provided to the packet source, resuming acknowledgments of received packets; and
transmitting the stored packet and decrementing the token pool.
3 Assignments
0 Petitions
Accused Products
Abstract
A preventive X.25 flow control mechanism for use in a high speed packet switching network where calls are multiplexed on network trunks with each connection using a reserved amount of the total bandwidth. X.25 data terminal equipments access the network via access nodes. Each access node includes a Leaky Bucket component which maintains a refillable token pool. Each time an incoming packet is received by the leaky bucket component, the number of available tokens is compared to two predetermined threshold values. If the number of tokens is less than the low threshold, acknowledgments of received packets are stopped, inducing an interruption of packets transmitted by the emitting attached X.25 terminals. Interrupting packet transmission will lead to a regeneration of the number of tokens in the token pool. If the number of tokens reaches the high threshold, acknowledgments are again generated to restore packet transmissions. The first and second thresholds are greater than zero, reducing the chances that a packet will be marked as being discardable.
67 Citations
13 Claims
-
1. A method for controlling X.25 data traffic at an access node of a packet switching network, said X.25 data traffic being provided from sources which continue to transmit traffic only where acknowledgments of previously-transmitted traffic are received on a predetermined basis, said access node implementing a leaky bucket admission control mechanism in which tokens are added to a pool at a predetermined rate, said method comprising the steps of:
-
receiving and temporarily storing each incoming packet; testing the number of tokens available in the token pool against first and second thresholds having values greater than zero; where the test reveals the number of available tokens is less than the first threshold and packet acknowledgments are being provided to the packet source, discontinuing such acknowledgments; where the number of available tokens is greater than a second threshold and acknowledgments are not being provided to the packet source, resuming acknowledgments of received packets; and transmitting the stored packet and decrementing the token pool. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for controlling X.25 data traffic at an access node of a packet switching network, said X.25 data traffic being provided from sources which continue to transmit traffic only where acknowledgements of previously-transmitted traffic are received on a predetermined basis, said access node implementing a leaky bucket admission control mechanism in which tokens are added to a token pool at a predetermined rate, said method comprising:
-
receiving and temporarily storing each incoming packet in a packet buffer; comparing for testing the number of tokens available in the token pool against first and second thresholds having values greater than zero; using acknowledgement controlling logic which is responsive where the test reveals the number of available tokens is less than the first threshold and packet acknowledgements are being provided to the packet source to discontinue generating such acknowledgements and which is responsive where the number of available tokens is greater than a second threshold and acknowledgements are not being provided to the packet source, for resuming generation of such acknowledgements; transmitting the packet stored in the buffer; and decrementing the token pool by using logic which is responsive to transmission of the packet. - View Dependent Claims (7, 8, 9)
-
-
10. A system for controlling X.25 data traffic at an access node of a packet switching network, said X.25 data traffic being provided from sources which continue to transmit traffic only where acknowledgements of previously-transmitted traffic are received on a predetermined basis, said access node implementing a leaky bucket admission control mechanism in which tokens are added to a token pool at a predetermined rate, said system comprising:
-
a packet buffer for receiving and temporarily storing each incoming packet; a comparator for testing the number of tokens available in the token pool against first and second thresholds having values greater than zero; acknowledgement controlling logic which is responsive where the test reveals the number of available tokens is less than the first threshold and packet acknowledgements are being provided to the packet source to discontinue generating such acknowledgements and which is responsive where the number of available tokens is greater than a second threshold and acknowledgements are not being provided to the packet source, for resuming generation of such acknowledgements; means for transmitting the packet stored in the buffer; and means for decrementing the token pool by using logic which is responsive to transmission of the packet. - View Dependent Claims (11, 12, 13)
-
Specification