FLOW CONTROL IN NETWORK DEVICES
    11.
    发明专利

    公开(公告)号:MY133313A

    公开(公告)日:2007-11-30

    申请号:MYPI20034435

    申请日:2003-11-19

    Applicant: IBM

    Abstract: METHODS AND APPARATUS ARE PROVIDED FOR CONTROLLING FLOW RATES OF A PLURALITY OF DATA PACKET FLOWS INTO A QUEUE 4 CORRESPONDING TO A RESOURCE 3 OF A NETWORK DEVICE 1. THE FLOWS COMPRISE A SET 7 OF NON-RESPONSIVE FLOWS, AND A SET 8 OF OTHER FLOWS WHICH MAY COMPRISE RESPONSIVE FLOWS AND/OR FLOWS WHOSE RESPONSIVENESS IS UNKNOWN. THE FLOW RATES ARE MANAGED IN ACCORDANCE WITH A QUEUE MANAGEMENT SCHEMESUCH ADJUSTMENTS ARE MADE TO EACH FLOW RATE IN DEPENDENCE ON EXCESS BANDWIDTH IN THE RESOURCE, THE AMOUNTS OF THE ADJUSTMENTS BEING DEPENDENT ON ONE OR MORE ADJUSTMENT PARAMETERS FOR EACH FLOW. AN ERROR SIGNAL IS GENERATED BASED ON THE DEVIATION FROM A DESIRED ALLOCATION RATIO OF THE RATIO OF THE TOTAL FLOW RATES INTO THE EQUEUE 4 FOR THE SETS OF FLOWS 7, 8. AT LEAST ONE ADJUSTMENT PARAMETER FOR AT LEAST ONE FLOW IS THEN VERIED IN DEPENDENCE ON THE ERROR SIGNAL IN SUCH A MANNER AS TO REDUCE THE AFOREMENTIONED DEVIATION. A CLOSED-LOOP CONTROL SCHEME THUS OPERATES IN CONJUCTION WITH THE UNDERLYING QUEUE MANAGEMENT SCHEME TO PROMOTE FAIR BANDWIDTH ALLOCATION EVEN IN THE PRESENCE OF A MIX OF RESPONSIVE AND NON-RESPONSIVE FLOWS.(FIG. 1)

    12.
    发明专利
    未知

    公开(公告)号:DE60303384D1

    公开(公告)日:2006-04-13

    申请号:DE60303384

    申请日:2003-06-20

    Applicant: IBM

    Abstract: Load balancing apparatus for a data communications network comprises hash logic for computing a hash function on incoming data packets. A threshold detector is connected to the hash logic for triggering, in response to utilization of the downstream objects exceeding a predefined threshold, redefinition in the hash logic of parameters of the hash function from a first set of parameters to a second set of parameters for redistributing the data packets amongst the downstream objects. In use, the hash logic, directs the packets for routing to downstream objects in the network via a first routing path based on a hash computation using the first set of parameters, and, if the threshold is exceeded, selectively directs the packets to one of the first routing path and a second routing path in dependence on separate hash computations using the first and the second sets of parameters for subsequent routing of the packets via the selected one of the first and second routing paths based on the results of one of the separate hash computations.

Patent Agency Ranking