Method for flow controlling ATM traffic
First Claim
1. A method for implementing permission based flow control in a computer network having at least first, second and third network devices, where the first network device is downstream relative to the second network device and the third network device is upstream relative to the second network device, and wherein the second network device receives data units from and provides permission credits to the third network device and transmits data units to the first network device and receives permission credits from the first network device, comprising the steps of:
- receiving permission credits at the second network device from the first network device; and
granting permission credits from the second network device to the third network device based at least in part upon the credits received at the second network device from the first network device, and wherein, at least at some times, the credits granted from the second network device to the third network device are greater than the credits received at the second network device from the first network device, and wherein, at least at some other times, the credits granted from the second network device to the third network device are no greater than the credits received at the second network device from the first network device.
1 Assignment
0 Petitions
Accused Products
Abstract
Permission based flow control is implemented in a computer network having at least a downstream, intermediate and upstream network device by receiving credits at the intermediate network device from the downstream network device and granting credits from the intermediate network device to the upstream network device based at least in part upon the credits received at the intermediate network device from the downstream network device. Credit chaining as described above is employed to permit the granting of the right to transmit downstream to be predicated upon buffer availability downstream of the next downstream network device. Via the use of credit chaining, high utilization of network resources is achieved with minimal loss of data traffic.
78 Citations
20 Claims
-
1. A method for implementing permission based flow control in a computer network having at least first, second and third network devices, where the first network device is downstream relative to the second network device and the third network device is upstream relative to the second network device, and wherein the second network device receives data units from and provides permission credits to the third network device and transmits data units to the first network device and receives permission credits from the first network device, comprising the steps of:
-
receiving permission credits at the second network device from the first network device; and
granting permission credits from the second network device to the third network device based at least in part upon the credits received at the second network device from the first network device, and wherein, at least at some times, the credits granted from the second network device to the third network device are greater than the credits received at the second network device from the first network device, and wherein, at least at some other times, the credits granted from the second network device to the third network device are no greater than the credits received at the second network device from the first network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 18)
receiving the permission credits received at the second network device at the at least one input port of the second network device;
transmitting the permission credits granted by the second network device at the at least one output port of the second network device; and
receiving the permission credits granted by the second network device at the at least one input port of the third network device.
-
-
8. A network device for facilitating flow of data within a network including at least one network device that is upstream relative to the facilitating device and at least one network device that is downstream relative to the facilitating device, comprising:
-
a flow controller operative in response to a first transmit permission received from the downstream network device, and to provide a corresponding second transmit permission to the upstream network device based at least in part upon the first transmit permission, said first permission including a first number of permission credits, said second permission including a second number of permission credits, and wherein, at least at some times, said second number of permission credits is greater than said first number of permission credits, and wherein, at least at some other times, said second number of permission credits is not greater than said first number of permission credits. - View Dependent Claims (9, 10, 11, 12, 19)
at least one input port;
at least one output port; and
wherein the first transmit permission received from the downstream network device is received at the at least one input port, and the second transmit permission is transmitted at the at least one output port.
-
-
13. A method for performing flow control in a credit based flow controlled computer network having at least a first virtual connection for communication first information from a first computer network device to a second computer network device and further for communicating said first information from said second computer network device to a third computer network device and having at least a second virtual connection for communicating second information from said third computer network device to said second computer network device and further for communicating said second information from said second computer network device to said first computer network device, said method comprising the steps of:
-
forwarding a first credit message from said third computer network device for receipt by said second computer network device via said second virtual connection, said first credit message including at least a first number of credits indicative of buffer availability within said third computer network device;
forwarding a second credit message from said second computer network device for receipt by said first computer network device via said second virtual connection, said second credit message including a second number of credits, wherein said second number of credits is based, at least in part, upon the first number of credits contained within said first credit message, and wherein, at least at some times, said second number of credits is greater than said first number of credits, and wherein, at least at some other times, said second number of credits is not greater than said first number of credits; and
in response to receipt of said second credit message at said first computer network device, transmitting from said first computer network device for receipt by said second computer network device at least some of said first information wherein the amount of said first information transmitted is based, at least in part, upon the second number of credits specified in said second credit message. - View Dependent Claims (14, 15, 16, 17)
-
-
20. A method for implementing permission based flow control in a computer network in which transmission permission credits are chained between network devices, wherein said method includes over-subscription at a logical link level, comprising:
-
first, second and third network devices, wherein said first network device is downstream relative to said second network device, and said third network device is upstream relative to said second network device, wherein said second network device receives data units from said third network device and transmits permission credits to said third network device, and wherein said second network device transmits data units to said first network device and receives permission credits from said first network device;
wherein said transmission permission credits transmitted from said second network device to said third network device are based at least in part upon transmission permission credits provided from said first network device to said second network device;
wherein said second network device may, at least at sometimes, be over-subscribed at said logical link level by transmitting to said third network device a number of transmission permission credits exceeding a size of a logical link buffer in said second network device; and
wherein, at least at some other times, said second network device may transmit to said third network device a number of transmission permission credits not exceeding a size of a logical link buffer in said second network device.
-
Specification