WO2002019055A2 - Bandwidth broker for cellular radio access networks - Google Patents

Bandwidth broker for cellular radio access networks Download PDF

Info

Publication number
WO2002019055A2
WO2002019055A2 PCT/SE2001/001863 SE0101863W WO0219055A2 WO 2002019055 A2 WO2002019055 A2 WO 2002019055A2 SE 0101863 W SE0101863 W SE 0101863W WO 0219055 A2 WO0219055 A2 WO 0219055A2
Authority
WO
WIPO (PCT)
Prior art keywords
network
bandwidth broker
access control
node
control system
Prior art date
Application number
PCT/SE2001/001863
Other languages
French (fr)
Other versions
WO2002019055A3 (en
WO2002019055A8 (en
Inventor
Pontus Wallentin
David Partain
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to AU2001282824A priority Critical patent/AU2001282824A1/en
Publication of WO2002019055A2 publication Critical patent/WO2002019055A2/en
Publication of WO2002019055A3 publication Critical patent/WO2002019055A3/en
Publication of WO2002019055A8 publication Critical patent/WO2002019055A8/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5009Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5009Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
    • H04L41/5012Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF] determining service availability, e.g. which services are available at a certain point in time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0882Utilisation of link capacity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/101Server selection for load balancing based on network conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1036Load balancing of requests to servers for services different from user content provisioning, e.g. load balancing across domain name servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5077Network service management, e.g. ensuring proper service fulfilment according to agreements wherein the managed service relates to simple transport services, i.e. providing only network infrastructure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0829Packet loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • H04L43/087Jitter
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints

Definitions

  • This invention generally relates to access control to a network. More particularly, the present invention provides a mechanism for controlling access to a radio network based upon the current loading of the network.
  • GSM Global System for Mobile Communication
  • STM Synchronous Transport Mechanism
  • Admission control is needed when there are no transport resources available. After all, it is better to give a busy tone than to establish the call with a bad quality, since the user pays to get an expected quality of service.
  • DiffServ Differentiated Services
  • IETF Internet Engineering Task Force
  • DiffServ is defined by IETF RFC 2474, and it is expected that DiffServ will be the primary mechanism for implementing QoS mechanisms in IP-based networks.
  • An IP network that includes DiffServ functionality is called the DS domain and consists of boundary nodes and interior nodes.
  • the boundary nodes typically have full QoS functions, while the interior nodes have limited QoS functions.
  • Full QoS functionality includes packet classification, during which each incoming packet is classified into a DiffServ Codepoint (DSCP) that is marked in the IP header.
  • DSCP DiffServ Codepoint
  • Full QoS functionality also includes the policing and shaping of the incoming packets, so that the bandwidth of each QoS class (or DSCP) may be kept within configured bounds.
  • the interior router forwards packets according to the Per-Hop Behavior (PHB) that the given DSCP value is mapped to.
  • PHB Per-Hop Behavior
  • Per-Hop Behaviors QoS differentiation is provided. Examples of Per-Hop Behaviors specified by IETF are Assured Forwarding (AF) (RFC 2597) and Expedited Forwarding (EF) (RFC 2598).
  • the GSM RAN includes a number of different kinds of nodes, some of which are illustrated in Figure 1.
  • the BTS (Base Transceiver Station or "base station”) includes the RF (Radio Frequency) functionality and terminates the IP tunneling layer.
  • the area covered by one BTS is defined as a cell.
  • BTSs can be co-located, sharing the same antenna on the same base station site.
  • the transport between the BTS and BSC carries primarily airframes, which are tunneled through the IP network. These networks are large both in terms of the number of nodes as well as the geographic size. Many thousands of BTSs and BSCs could potentially be interconnected.
  • the transport from the BTS to the BSC is the part of the network that is most sensitive to delays and has the highest volume of real-time traffic.
  • the amount of real-time traffic corresponds to the amount of voice traffic, and the network must ensure appropriate QoS for approximately 90% voice traffic.
  • the traffic volume for voice carried in the network can vary from a few calls up to fifty voice calls per BTS, and up to several thousand simultaneous calls (Erlang) per BSC site. In this case, several BSCs may be co-located at the same site.
  • the transmission between BTSs (due to the wide area coverage of the cellular network) and the BSC is often on leased lines, which may be very expensive when compared to the cost of transmission in the backbone. Even if the cost for leased lines decreases over the years, the "last mile" to the BTS is likely to continue to be expensive when the BTS is located remotely (e.g., on a mountaintop). Dimensioning using over-provisioning might therefore be prohibitively expensive. As such, mechanisms that can be used to optimize the utilization of available bandwidth in these expensive links is very important. Dynamic allocation of resources and optimization of bandwidth to reduce the cost is, therefore, an important feature.
  • Handover is the process, generated by mobility, of establishing a radio link in a new cell and releasing the radio link in the old cell.
  • mobility usually generates handover for voice traffic an average of one to two times per call.
  • handover rate is typically much higher. Therefore, because of the handover rate, the admission control process has to cope with far more admission requests than call setups alone would generate.
  • Handover can also result in packet loss. If the processing of an admission request causes a delayed handover to the new BTS, some packets might be discarded, and the overall speech quality might be degraded significantly. Also, a delay in handover may cause degradation for other users. This is especially true for systems using macrodiversity and frequency reuse in every cell, where a handover delay will cause interference for other users in the same cell. Further, in the worst case, a delay in handover may cause the connection to be dropped, especially if the handover was made due to bad radio link quality.
  • an admission control request for handover be carried out very quickly. Since the processing of an admission control request is only one of many tasks performed during handover, the time to perform admission control should be a fraction of the time available for handover and may be on the order of 50 ms or less. This requirement will, of course, have a major influence on the architecture of resource management of the IP-based cellular access network.
  • the bandwidth broker performs the task of admission control for the packet switched (IP-based) transport network. It is believed that by introducing a bandwidth broker into the architecture, transmission costs can be saved by reducing the bandwidth margins while still maintaining quality of service.
  • a method of access control in a network includes the steps of determining a load status of at least two nodes in the network; determining whether the load status permits a specified quality of service; and if the specified quality of se ce is permitted, establishing a transport connection between the at least two nodes in the network.
  • the step of determining a load status may include sending a probe packet through the network from a first node to a second node, and updating a portion of the probe packet at each node based on the load status of the node.
  • the step of sending a probe packet through the network may be performed continuously, at pre-determined times, or in response to a network event.
  • the network event may include the loss of a communication path or a threshold increase in network usage since the last probe packet was sent.
  • a method of access control in a communication network includes the steps of determining a load status of the network between a call originating node and a call terminating node, determining whether the load status permits a specified quality of service, and if the specified quality of service is permitted, establishing a transport connection between the call originating node and the call terminating node.
  • an access control system in a network.
  • the access control system includes at least one load measurement proxy, which probes the network to determine the congestion state of the network; a bandwidth broker server in communication with the at least one load measurement proxy and that correlates the determined congestion state information; and a bandwidth broker client in communication with the bandwidth broker server and an application, wherein the bandwidth broker client queries the bandwidth broker server based on requirements of the application.
  • the requirements of the application include at least two node addresses and a quality of service.
  • the requirements of the application may further include at least one of an application traffic class, a peak bit rate, a packet delay, a delay variation, a packet loss, and a guaranteed bit rate.
  • the load measurement proxy of the access control system probes the network continuously, at predefined intervals, or in response to a network event.
  • an access control system in a network including at least one load measurement proxy, which probes the network to determine the congestion state of the network, and a bandwidth broker server in communication with the at least one load measurement proxy and correlating the determined congestion state information.
  • a plurality of bandwidth broker clients are in communication with the bandwidth broker server and a respective one of a plurality of applications. Each of the plurality of bandwidth broker clients queries the bandwidth broker server based on requirements of the respective one of a plurality of applications.
  • Figure 1 is a block diagram of a GSM Radio Access Network
  • Figure 2 is a block diagram of an embodiment of a measurement-based admission control process
  • Figure 3 is a block diagram of the bandwidth broker
  • Figure 4 is a flow diagram of the call admission process
  • Figure 5 is an exemplary embodiment of a transport network architecture
  • Figure 6 is a block diagram of a IP-based radio access network
  • Figure 7 is a signal diagram of the GSM connection setup procedure; and Figure 8 is a signal diagram of the GSM traffic channel setup procedure.
  • the Bandwidth Broker was introduced in the IETF RFC 2638 as the logical entity in charge of resource management in a given administrative domain.
  • a bandwidth broker is responsible for resource allocation within that domain. Resource allocation may be accomplished by using protocols to communicate with other entities in the domain and by making admission decisions based on domain policies.
  • the bandwidth broker may also communicate with neighboring bandwidth brokers for inter- domain resource management.
  • a bandwidth broker may manage the IP -based transport resources used between the BTS and the BSC.
  • network management may be seen as an edge-to-edge resource management problem rather than an end-to-end problem.
  • the BSC asks the bandwidth broker about availability of transport resources for one or several paths, where each path is defined by two addresses in the radio access network. Once a request for resources has been accepted, packets can be transmitted on the path between the BTS and the BSC for that call. Policing and shaping at the edges (such as in the BTS) will ensure that the limits defined for a given QoS class are respected.
  • the bandwidth broker needs to be able to notify the BSC so that it may release previously established calls.
  • Load Control of Real-Time Traffic.
  • the load control scheme is very simple and has good scaling properties. It was specifically designed to solve the edge-to-edge problem and does not purport to be a replacement for RSVP for end-to-end signaling.
  • the Resource Reservation Protocol, or RSVP is defined by RFC 2205.
  • Load control typically operates edge-to-edge in a DS (DiffServ) domain, where only the edge devices monitor flow state and do per-flow processing.
  • Load control provides functionality for performing measurement-based admission control and detection of exceptional events such as link failures.
  • a probe packet By sending a specially marked packet, denoted a "probe" packet, along the path from the ingress to the egress edge device, the resource state of interior routers is gathered.
  • the router At each hop in the network, the router will determine its congestion state for a particular DSCP and interface. If congestion is detected, the packet is marked accordingly (but never un-marked). As such, when the probe reaches the destination, it gives an aggregated view of the congestion state of the path.
  • ordinary traffic packets may be used to carry out load control probing. The probe result is then used as input to the admission control function.
  • a load control proxy injects a load control probe packet into the network, addressed to the egress edge device.
  • An ordinary traffic packet with payload can be used as a probe packet, but the header identifies the packet as having an additional purpose as a probe packet.
  • the probe packet passes along the path to the destination, where interior routers measure their state, and, if they encounter near exhaustion of resources, they mark passing probe packets to indicate congestion.
  • the probe packet reaches the egress edge device, its header will reflect the aggregated resource status along that path.
  • the egress device will then copy the status of incoming probe packets and may either send a report packet back to the ingress device or check for bi-directional resources by echoing the probe packet on the reverse path to the ingress device.
  • a probe or report packet is returned to the initiating ingress edge device, it uses the result of the probe for admission control and potentially other purposes.
  • Load control does not specify how an interior router decides whether to mark the packet, but one approach may be to use buffer measurements. Also, if an interior router does not implement load control, it simply treats the load control packet as an ordinary packet, which will mean that the packet is left untouched and is forwarded to the destination. In this way, there may be over-provisioned segments within the network.
  • the DSCP (DiffServ codepoint) of the probe packet is used to indicate the DiffServ class for which a measurement is done and thus the QoS requirements. In this way, load control can be used to measure the load for any path and QoS class.
  • the DSCP real-time traffic can be further divided into classes based on resource requirements. Further, the DSCP may denote not only the PHB, but implicitly also the bandwidth requirements for a specific class.
  • FIG. 3 depicts a high-level view of the bandwidth broker.
  • the application 101 inquires whether a particular path is congested. This inquiry is sent from the application 101 to the bandwidth broker client 102 over an application programming interface (API).
  • API application programming interface
  • the bandwidth broker client 102 takes this inquiry and formulates an API call to the bandwidth broker server 103 with the appropriate parameters. These parameters may include, for example, the address of a destination node and the desired QoS.
  • the bandwidth broker server 103 collects information from various load measurement proxies 104 located at various points in the network. This information is used to determine the congestion state of various paths through the network.
  • the bandwidth broker may make decisions based upon cached information rather than re-compiling network status information from the load measurement proxies each time an application makes an inquiry. Thus, the bandwidth broker's information may not always reflect the real-time state of the network.
  • Figure 4 depicts the steps that may be taken to determine whether to admit a call.
  • the term "call” is used as a generic term for an application-specific on- demand related event that requires a transport network resource.
  • a typical "call" for a radio access network in GSM may be a radio connection that needs a path from a gateway node to the base station.
  • the appropriate application-level signaling takes place to prepare to set up the call.
  • the application asks the bandwidth broker whether a call from an ingress point to an egress point using a particular class of service can be admitted (step 202).
  • the bandwidth broker may map the QoS requested by the application to the appropriate DiffServ traffic class of the DiffServ domain.
  • the QoS demand of the application may be specified using one or more of the following parameters: application traffic class, peak bit rate, packet delay, delay variation, packet loss, and guaranteed bit rate.
  • the application traffic class may be defined as conversational, streaming, interactive, or background. As one would expect, a conversational traffic class would demand the highest QoS and a background traffic class would require a lower QoS.
  • the application traffic class may be mapped to a DiffServ traffic class (also known as Per-Hop Behavior), as shown in Table 1.
  • Table 1 Typical mapping between application traffic class and DiffServ traffic class
  • the bandwidth broker looks up those two endpoints and the traffic class, and notifies the application whether that desired link is currently congested or not (step 203).
  • the application either completes or aborts the call setup.
  • the load measurement proxy is probing the network to determine the congestion state for each pair of endpoints and also for various traffic classes.
  • the pictures of the network that the proxies build are compiled by the bandwidth broker to be used as the basis for the decision taken in step 203 above.
  • the load measurement proxy continues to probe the network to determine the congestion state of the network. This may be accomplished as a background process and may be done continuously, at predetermined times, or in response to particular network events.
  • the bandwidth broker may be employed in a variety of types of networks.
  • the bandwidth broker may be used in a radio access network having IP-based transport between network nodes.
  • This type of network architecture is commonly referred to as a transport network architecture.
  • Figure 4 is an exemplary embodiment of a transport network architecture.
  • the IP -based transport network is divided into domains. In one domain, the aggregation domain (or lower RAN), the traffic for a number of RBSs is aggregated together, and the bandwidth is reserved on-demand per radio link. In another domain, the trunk domain (or upper RAN), a number of "trunks" are semi-statically allocated between nodes.
  • the transport network architecture may include several components.
  • the IP router (R) is known to the art, and may have different functionality depending on whether it is an edge router, a core router, or an aggregation router. This varying functionality is not unique to the bandwidth broker application.
  • the IP layer manager (ILM) controls the configuration management, fault management, and performance management of the IP-based transport network.
  • BB bandwidth broker
  • the bandwidth broker may only be aware of the nodes at the edges of the transport network. That is, from the bandwidth broker's point of view, the transport network is a "black box" with paths between endpoints.
  • the bandwidth broker may also be implemented to have a complete understanding of the IP network topology. Thus, the degree to which the bandwidth broker is aware of the network topology may be chosen by the network management operator.
  • the transport network architecture may be applied to various bandwidth broker applications, including IP-based radio access networks, as shown in Figure 6.
  • IP-based radio access networks as shown in Figure 6.
  • Examples of such networks are GSM and UTRAN (Universal Mobile Telecommunications System Terrestrial Radio Access Network) mobile networks.
  • the Radio Network Server controls the radio resources for a part of the radio network (a number of "cells"), which includes the control of the radio connections.
  • the RNS may ask the BB if a call and its related resources can be admitted into the network.
  • the Radio Network Controller is responsible for radio resource management for the UTRAN application, and also performs some user data processing. Accordingly, the node is one of the endpoints for on-demand user data paths. In a UTRAN network, the RNC may ask the BB for resources.
  • the Gateway provides, among other things, the capability for converting between circuit-switched transport and IP-based transport.
  • the location and exact functionality of this node conventionally known to the art.
  • the GW router is one of the endpoints in the path for which resources may be requested.
  • the Radio Base Station provides the capability for radio transmission, radio reception, and related functions.
  • An RBS belongs to either GSM or the UTRAN application.
  • the router in the RBS is one of the endpoints in the path for which resources are requested.
  • the BSC may be functionally divided into two nodes. One node would perform the tasks of the RNS and the other would perform the tasks of the GW.
  • the RNS may contain the logic for radio resource control, such as handover and establishment of connections for calls.
  • the GW may contain the equipment for processing user data packets, including a termination of the circuit-based legacy transmission toward the core network nodes.
  • the same transport network resources may be shared by several independent applications (like UTRAN and GSM) and also several application nodes may ask for the same transport network resources.
  • a combined network topology such as that shown in Figure 6 may exist.
  • each application may have its own independent bandwidth broker, and each router would be responsible for dividing the available resources as necessary.
  • One benefit of having independent bandwidth brokers is that the implementation of the bandwidth broker may be simplified by minimizing the need for co-ordination between bandwidth brokers to perform the execution of an admission control request.
  • each application node may perform probing independently of the other applications.
  • the bandwidth broker should be located as close as possible to the application node.
  • each application node should have its own independent bandwidth broker, but the routers would conduct load control polling on behalf of all application and divide the bandwidth between the various applications.
  • the on-demand user data paths are typically between an RBS and a GW.
  • Each GW may have paths to many RBSs, but each RBS may have a path to just one GW.
  • the RNS is typically located near the GW and since the bandwidth broker should be located as near as possible to the application (i.e., the RNS), the BB should be located near the GW as well.
  • the situation in somewhat different, since the path is divided into two parts, with the RNC in the middle. From the GW there may be a path to the RNC. The path is then split into several paths to each RBS. Typically, the bandwidth broker is located near the RNC.
  • FIG. 7 depicts the conventional call set-up signaling for GSM.
  • the mobile station (MS) sends a channel request to the BTS.
  • the BTS notifies the RNS that a channel is required. If a channel is available, the RNS responds by sending a channel activation message to the BTS, which the BTS acknowledges.
  • the BTS then assigns the channel to the MS and the MS establishes a signaling connection with the MSC.
  • the BB At no point during the signaling connection setup procedure is the BB involved, since the control plane signaling connection uses a common transport resource in GSM. It is when the traffic channel (e.g., for speech) is established that the BB is queried. For example, as shown in Figure 8, when the MS wishes to establish a connection, the MS and MSC communicate over the signaling channel. These messages are transparent to the RAN.
  • the MSC begins the process of establishing a traffic channel by sending an assignment request message to the RNS.
  • the RNS responds to the assignment request by sending a connection request to the MGW, which the MGW confirms.
  • the RNS Upon receiving confirmation from the MGW, the RNS queries the BB to determine if bandwidth is available that satisfies the parameters requested by the MS. If the bandwidth is available, the traffic channel is established. If the bandwidth is not available, then the traffic channel establishment procedure ends.
  • the RNS understands the kind of service requested, as well as the two endpoints for the conversation.
  • Those two endpoints are the IP address and port in the RIBS and the IP address and port in the GW.
  • the first pair is sent to the GW in the connection request and the latter pair is sent to the RBS in the channel activation but is known to the RNS after the connection confirm from the GW to the RNS.
  • the architecture enables a very short response time for admission control requests. This means that handover can be performed very quickly, since the delay added by admission control for the IP transport resources is minimal. Nonetheless, the admission control result is believed to be reasonably accurate.
  • the load control proxy could ping the edge devices rather than injecting a load control probe packet into the network.
  • the transit times to edge devices could be determined and the network congestion estimated.

Abstract

An architecture for resource management of an IP-based cellular radio access network is presented. A measurement-based admission control scheme is used to monitor the load for each path in the network and QoS (quality of service) class and resource decisions are made based upon that information. A bandwidth broker processes the on-demand admission requests for iP resources by using the results of load control measurements. Since the requests can be processed very quickly using a simple table look-up, response times are fast, and the architecture is thus suitable for the cellular environment.

Description

BANDWIDTH BROKER FOR CELLULAR RADIO ACCESS NETWORKS
BACKGROUND
This invention generally relates to access control to a network. More particularly, the present invention provides a mechanism for controlling access to a radio network based upon the current loading of the network.
A fundamental principle in the design of mobile wireless systems is that the radio spectrum is the scarcest resource. Accordingly, the network should be dimensioned in such a way that resources within the network are always available. In second-generation systems, such as Global System for Mobile Communication (GSM), which are typically optimized for speech-like services, network dimensioning to provide available resources is simple to achieve when the transport is based on STM (Synchronous Transport Mechanism) circuits. For each radio channel, a timeslot is assigned on the STM circuit to match the bit rate of the radio channel. The quality of service (QoS) can be guaranteed, but statistical multiplexing can not be used to save transport resources. This limitation on the use of statistical multiplexing is not a significant problem when the variance in bit rate is moderate, as it is in the case when speech is the dominating service.
When introducing packet switched services, where data rates vary in a greater span (for example, up to 384 kbps), a packet switched transport network is introduced to efficiently handle the variable bit rate services as well as speech. However, to dimension a packet switched transport network and still maintain the principle that the radio spectrum is the scarcest resource is not an easy task. The transmission links to the base station sites are often expensive, so over-provisioning is not necessarily the best option, especially if bandwidth can be saved by introducing some degree of resource control. Introducing QoS requirements on user connections, as opposed to best effort, makes dimensioning even harder.
Admission control is needed when there are no transport resources available. After all, it is better to give a busy tone than to establish the call with a bad quality, since the user pays to get an expected quality of service.
As such, it is essential that we have a simple and scalable resource management scheme for realtime traffic in a packet switched network. In order for real-time services, such as voice, to function satisfactorily in an IP-based radio access network (RAN), for example, there need to be adequate transport resources in the RAN to handle the particular instance of that service (e.g., a phone call).
The Differentiated Services (DiffServ) working group of the Internet Engineering Task Force (IETF) has established scalable QoS mechanisms, commonly known as
Differentiated Services, which have now been implemented by various router vendors. DiffServ is defined by IETF RFC 2474, and it is expected that DiffServ will be the primary mechanism for implementing QoS mechanisms in IP-based networks.
An IP network that includes DiffServ functionality is called the DS domain and consists of boundary nodes and interior nodes. The boundary nodes typically have full QoS functions, while the interior nodes have limited QoS functions. Full QoS functionality includes packet classification, during which each incoming packet is classified into a DiffServ Codepoint (DSCP) that is marked in the IP header. Full QoS functionality also includes the policing and shaping of the incoming packets, so that the bandwidth of each QoS class (or DSCP) may be kept within configured bounds.
The interior router forwards packets according to the Per-Hop Behavior (PHB) that the given DSCP value is mapped to. By using several different Per-Hop Behaviors in an interior router, QoS differentiation is provided. Examples of Per-Hop Behaviors specified by IETF are Assured Forwarding (AF) (RFC 2597) and Expedited Forwarding (EF) (RFC 2598).
As an example of a cellular radio access network, we describe the RAN for Global System for Mobile Communication (GSM). The GSM RAN includes a number of different kinds of nodes, some of which are illustrated in Figure 1.
The BTS (Base Transceiver Station or "base station") includes the RF (Radio Frequency) functionality and terminates the IP tunneling layer. The area covered by one BTS is defined as a cell. Several BTSs can be co-located, sharing the same antenna on the same base station site. The transport between the BTS and BSC (Base Station Controller) carries primarily airframes, which are tunneled through the IP network. These networks are large both in terms of the number of nodes as well as the geographic size. Many thousands of BTSs and BSCs could potentially be interconnected.
The transport from the BTS to the BSC is the part of the network that is most sensitive to delays and has the highest volume of real-time traffic. In some configurations, the amount of real-time traffic corresponds to the amount of voice traffic, and the network must ensure appropriate QoS for approximately 90% voice traffic. The traffic volume for voice carried in the network can vary from a few calls up to fifty voice calls per BTS, and up to several thousand simultaneous calls (Erlang) per BSC site. In this case, several BSCs may be co-located at the same site.
The transmission between BTSs (due to the wide area coverage of the cellular network) and the BSC is often on leased lines, which may be very expensive when compared to the cost of transmission in the backbone. Even if the cost for leased lines decreases over the years, the "last mile" to the BTS is likely to continue to be expensive when the BTS is located remotely (e.g., on a mountaintop). Dimensioning using over-provisioning might therefore be prohibitively expensive. As such, mechanisms that can be used to optimize the utilization of available bandwidth in these expensive links is very important. Dynamic allocation of resources and optimization of bandwidth to reduce the cost is, therefore, an important feature.
In addition to traffic volume, mobility can significantly impact network resources. Handover (or handoff) is the process, generated by mobility, of establishing a radio link in a new cell and releasing the radio link in the old cell. In the GSM context, mobility usually generates handover for voice traffic an average of one to two times per call. For third generation networks, such as WCDMA and cdma2000, where it is necessary to keep radio links to several cells simultaneously to provide macrodiversity, the handover rate is typically much higher. Therefore, because of the handover rate, the admission control process has to cope with far more admission requests than call setups alone would generate.
Handover can also result in packet loss. If the processing of an admission request causes a delayed handover to the new BTS, some packets might be discarded, and the overall speech quality might be degraded significantly. Also, a delay in handover may cause degradation for other users. This is especially true for systems using macrodiversity and frequency reuse in every cell, where a handover delay will cause interference for other users in the same cell. Further, in the worst case, a delay in handover may cause the connection to be dropped, especially if the handover was made due to bad radio link quality.
Therefore, it is critical that an admission control request for handover be carried out very quickly. Since the processing of an admission control request is only one of many tasks performed during handover, the time to perform admission control should be a fraction of the time available for handover and may be on the order of 50 ms or less. This requirement will, of course, have a major influence on the architecture of resource management of the IP-based cellular access network. The bandwidth broker performs the task of admission control for the packet switched (IP-based) transport network. It is believed that by introducing a bandwidth broker into the architecture, transmission costs can be saved by reducing the bandwidth margins while still maintaining quality of service.
Accordingly, there is a need to provide a scalable admission control process having a fast response time.
SUMMARY
In accordance with the present invention, a method of access control in a network is provided. The method includes the steps of determining a load status of at least two nodes in the network; determining whether the load status permits a specified quality of service; and if the specified quality of se ce is permitted, establishing a transport connection between the at least two nodes in the network. The step of determining a load status may include sending a probe packet through the network from a first node to a second node, and updating a portion of the probe packet at each node based on the load status of the node. The step of sending a probe packet through the network may be performed continuously, at pre-determined times, or in response to a network event. The network event may include the loss of a communication path or a threshold increase in network usage since the last probe packet was sent. In accordance with another aspect of the present invention, a method of access control in a communication network is defined. The method includes the steps of determining a load status of the network between a call originating node and a call terminating node, determining whether the load status permits a specified quality of service, and if the specified quality of service is permitted, establishing a transport connection between the call originating node and the call terminating node.
In accordance with another aspect of the invention, there is an access control system in a network. The access control system includes at least one load measurement proxy, which probes the network to determine the congestion state of the network; a bandwidth broker server in communication with the at least one load measurement proxy and that correlates the determined congestion state information; and a bandwidth broker client in communication with the bandwidth broker server and an application, wherein the bandwidth broker client queries the bandwidth broker server based on requirements of the application. The requirements of the application include at least two node addresses and a quality of service. The requirements of the application may further include at least one of an application traffic class, a peak bit rate, a packet delay, a delay variation, a packet loss, and a guaranteed bit rate.
In accordance with yet another aspect of the invention, the load measurement proxy of the access control system probes the network continuously, at predefined intervals, or in response to a network event.
In accordance with still another aspect of the invention, there is an access control system in a network including at least one load measurement proxy, which probes the network to determine the congestion state of the network, and a bandwidth broker server in communication with the at least one load measurement proxy and correlating the determined congestion state information. A plurality of bandwidth broker clients are in communication with the bandwidth broker server and a respective one of a plurality of applications. Each of the plurality of bandwidth broker clients queries the bandwidth broker server based on requirements of the respective one of a plurality of applications.
It should be emphasized that the term "comprises" or "comprising," when used in this specification, is taken to specify the presence of stated features, integers, steps, or components, but does not preclude the presence or addition of one or more other features, integers, steps, components, or groups thereof.
BRIEF DESCRIPTION OF DRAWINGS The objects and advantages of the invention will be understood by reading the following detailed description in conjunction with the drawings, in which: Figure 1 is a block diagram of a GSM Radio Access Network; Figure 2 is a block diagram of an embodiment of a measurement-based admission control process;
Figure 3 is a block diagram of the bandwidth broker; Figure 4 is a flow diagram of the call admission process; Figure 5 is an exemplary embodiment of a transport network architecture; Figure 6 is a block diagram of a IP-based radio access network;
Figure 7 is a signal diagram of the GSM connection setup procedure; and Figure 8 is a signal diagram of the GSM traffic channel setup procedure.
DETAILED DESCRIPTION The Bandwidth Broker (BB) was introduced in the IETF RFC 2638 as the logical entity in charge of resource management in a given administrative domain. According to the general definition, a bandwidth broker is responsible for resource allocation within that domain. Resource allocation may be accomplished by using protocols to communicate with other entities in the domain and by making admission decisions based on domain policies. The bandwidth broker may also communicate with neighboring bandwidth brokers for inter- domain resource management.
In the context of a GSM radio access network, a bandwidth broker may manage the IP -based transport resources used between the BTS and the BSC. As such, network management may be seen as an edge-to-edge resource management problem rather than an end-to-end problem. At call setup, or in the event of handover, the BSC asks the bandwidth broker about availability of transport resources for one or several paths, where each path is defined by two addresses in the radio access network. Once a request for resources has been accepted, packets can be transmitted on the path between the BTS and the BSC for that call. Policing and shaping at the edges (such as in the BTS) will ensure that the limits defined for a given QoS class are respected. However, in the event of unexpected events such as severe congestion or a link failure in the transport network, the bandwidth broker needs to be able to notify the BSC so that it may release previously established calls.
The current definition of Differentiated Services does not contain a simple, scalable solution to the problem of resource provisioning and control in the context of a cellular RAN. One solution, the load control scheme, has been proposed in a draft to the
IETF, entitled "Load Control of Real-Time Traffic." The load control scheme is very simple and has good scaling properties. It was specifically designed to solve the edge-to-edge problem and does not purport to be a replacement for RSVP for end-to-end signaling. The Resource Reservation Protocol, or RSVP, is defined by RFC 2205. Load control typically operates edge-to-edge in a DS (DiffServ) domain, where only the edge devices monitor flow state and do per-flow processing.
Load control provides functionality for performing measurement-based admission control and detection of exceptional events such as link failures. By sending a specially marked packet, denoted a "probe" packet, along the path from the ingress to the egress edge device, the resource state of interior routers is gathered. At each hop in the network, the router will determine its congestion state for a particular DSCP and interface. If congestion is detected, the packet is marked accordingly (but never un-marked). As such, when the probe reaches the destination, it gives an aggregated view of the congestion state of the path. As a probe packet can be piggybacked in any IP packet, ordinary traffic packets may be used to carry out load control probing. The probe result is then used as input to the admission control function.
To determine the load status between an ingress and an egress edge device, the following steps are taken, as illustrated in Figure 2. First, at the initiating ingress edge device, a load control proxy injects a load control probe packet into the network, addressed to the egress edge device. An ordinary traffic packet with payload can be used as a probe packet, but the header identifies the packet as having an additional purpose as a probe packet. Next, the probe packet passes along the path to the destination, where interior routers measure their state, and, if they encounter near exhaustion of resources, they mark passing probe packets to indicate congestion. When the probe packet reaches the egress edge device, its header will reflect the aggregated resource status along that path. Finally, the egress device will then copy the status of incoming probe packets and may either send a report packet back to the ingress device or check for bi-directional resources by echoing the probe packet on the reverse path to the ingress device. When a probe or report packet is returned to the initiating ingress edge device, it uses the result of the probe for admission control and potentially other purposes.
Load control does not specify how an interior router decides whether to mark the packet, but one approach may be to use buffer measurements. Also, if an interior router does not implement load control, it simply treats the load control packet as an ordinary packet, which will mean that the packet is left untouched and is forwarded to the destination. In this way, there may be over-provisioned segments within the network.
The DSCP (DiffServ codepoint) of the probe packet is used to indicate the DiffServ class for which a measurement is done and thus the QoS requirements. In this way, load control can be used to measure the load for any path and QoS class. By using the DSCP, real-time traffic can be further divided into classes based on resource requirements. Further, the DSCP may denote not only the PHB, but implicitly also the bandwidth requirements for a specific class.
Figure 3 depicts a high-level view of the bandwidth broker. The application 101 inquires whether a particular path is congested. This inquiry is sent from the application 101 to the bandwidth broker client 102 over an application programming interface (API). The bandwidth broker client 102 takes this inquiry and formulates an API call to the bandwidth broker server 103 with the appropriate parameters. These parameters may include, for example, the address of a destination node and the desired QoS. The bandwidth broker server 103 collects information from various load measurement proxies 104 located at various points in the network. This information is used to determine the congestion state of various paths through the network. As can be appreciated, the bandwidth broker may make decisions based upon cached information rather than re-compiling network status information from the load measurement proxies each time an application makes an inquiry. Thus, the bandwidth broker's information may not always reflect the real-time state of the network.
Figure 4 depicts the steps that may be taken to determine whether to admit a call. As can be appreciated, the term "call" is used as a generic term for an application-specific on- demand related event that requires a transport network resource. A typical "call" for a radio access network in GSM may be a radio connection that needs a path from a gateway node to the base station.
In step 201, the appropriate application-level signaling takes place to prepare to set up the call. At the appropriate time, the application asks the bandwidth broker whether a call from an ingress point to an egress point using a particular class of service can be admitted (step 202). The bandwidth broker may map the QoS requested by the application to the appropriate DiffServ traffic class of the DiffServ domain. As can be appreciated, the QoS demand of the application may be specified using one or more of the following parameters: application traffic class, peak bit rate, packet delay, delay variation, packet loss, and guaranteed bit rate. The application traffic class may be defined as conversational, streaming, interactive, or background. As one would expect, a conversational traffic class would demand the highest QoS and a background traffic class would require a lower QoS. The application traffic class may be mapped to a DiffServ traffic class (also known as Per-Hop Behavior), as shown in Table 1.
Figure imgf000008_0001
Table 1 : Typical mapping between application traffic class and DiffServ traffic class
The bandwidth broker looks up those two endpoints and the traffic class, and notifies the application whether that desired link is currently congested or not (step 203).
Depending on the result of the inquiry, the application either completes or aborts the call setup. In the meantime, the load measurement proxy is probing the network to determine the congestion state for each pair of endpoints and also for various traffic classes. The pictures of the network that the proxies build are compiled by the bandwidth broker to be used as the basis for the decision taken in step 203 above. As can be appreciated, the load measurement proxy continues to probe the network to determine the congestion state of the network. This may be accomplished as a background process and may be done continuously, at predetermined times, or in response to particular network events.
The bandwidth broker may be employed in a variety of types of networks. For example, the bandwidth broker may be used in a radio access network having IP-based transport between network nodes. This type of network architecture is commonly referred to as a transport network architecture. Figure 4 is an exemplary embodiment of a transport network architecture. Generally speaking, the IP -based transport network is divided into domains. In one domain, the aggregation domain (or lower RAN), the traffic for a number of RBSs is aggregated together, and the bandwidth is reserved on-demand per radio link. In another domain, the trunk domain (or upper RAN), a number of "trunks" are semi-statically allocated between nodes.
As shown in Figure 5, the transport network architecture may include several components. The IP router (R) is known to the art, and may have different functionality depending on whether it is an edge router, a core router, or an aggregation router. This varying functionality is not unique to the bandwidth broker application. The IP layer manager (ILM) controls the configuration management, fault management, and performance management of the IP-based transport network. Finally, there is a bandwidth broker (BB). As can be appreciated, the bandwidth broker may only be aware of the nodes at the edges of the transport network. That is, from the bandwidth broker's point of view, the transport network is a "black box" with paths between endpoints. The bandwidth broker may also be implemented to have a complete understanding of the IP network topology. Thus, the degree to which the bandwidth broker is aware of the network topology may be chosen by the network management operator.
The transport network architecture may be applied to various bandwidth broker applications, including IP-based radio access networks, as shown in Figure 6. Examples of such networks are GSM and UTRAN (Universal Mobile Telecommunications System Terrestrial Radio Access Network) mobile networks.
In GSM, the Radio Network Server (RNS) controls the radio resources for a part of the radio network (a number of "cells"), which includes the control of the radio connections. The RNS may ask the BB if a call and its related resources can be admitted into the network.
The Radio Network Controller (RNC) is responsible for radio resource management for the UTRAN application, and also performs some user data processing. Accordingly, the node is one of the endpoints for on-demand user data paths. In a UTRAN network, the RNC may ask the BB for resources.
The Gateway (GW) provides, among other things, the capability for converting between circuit-switched transport and IP-based transport. The location and exact functionality of this node conventionally known to the art. The GW router is one of the endpoints in the path for which resources may be requested.
The Radio Base Station (RBS) provides the capability for radio transmission, radio reception, and related functions. An RBS belongs to either GSM or the UTRAN application. The router in the RBS is one of the endpoints in the path for which resources are requested. In GSM networks, the BSC may be functionally divided into two nodes. One node would perform the tasks of the RNS and the other would perform the tasks of the GW. The RNS may contain the logic for radio resource control, such as handover and establishment of connections for calls. The GW may contain the equipment for processing user data packets, including a termination of the circuit-based legacy transmission toward the core network nodes.
Generally speaking, the same transport network resources may be shared by several independent applications (like UTRAN and GSM) and also several application nodes may ask for the same transport network resources. Thus, a combined network topology such as that shown in Figure 6 may exist. In this case, each application may have its own independent bandwidth broker, and each router would be responsible for dividing the available resources as necessary. One benefit of having independent bandwidth brokers is that the implementation of the bandwidth broker may be simplified by minimizing the need for co-ordination between bandwidth brokers to perform the execution of an admission control request. In addition, each application node may perform probing independently of the other applications.
Because a short response time is desired, the bandwidth broker should be located as close as possible to the application node. Generally speaking, each application node should have its own independent bandwidth broker, but the routers would conduct load control polling on behalf of all application and divide the bandwidth between the various applications.
For GSM, the on-demand user data paths are typically between an RBS and a GW. Each GW may have paths to many RBSs, but each RBS may have a path to just one GW. The RNS is typically located near the GW and since the bandwidth broker should be located as near as possible to the application (i.e., the RNS), the BB should be located near the GW as well.
For UTRAN, the situation in somewhat different, since the path is divided into two parts, with the RNC in the middle. From the GW there may be a path to the RNC. The path is then split into several paths to each RBS. Typically, the bandwidth broker is located near the RNC.
Figure 7 depicts the conventional call set-up signaling for GSM. The mobile station (MS) sends a channel request to the BTS. The BTS, in turn, notifies the RNS that a channel is required. If a channel is available, the RNS responds by sending a channel activation message to the BTS, which the BTS acknowledges. The BTS then assigns the channel to the MS and the MS establishes a signaling connection with the MSC.
At no point during the signaling connection setup procedure is the BB involved, since the control plane signaling connection uses a common transport resource in GSM. It is when the traffic channel (e.g., for speech) is established that the BB is queried. For example, as shown in Figure 8, when the MS wishes to establish a connection, the MS and MSC communicate over the signaling channel. These messages are transparent to the RAN. Once the bearer capabilities have been established between the MS and MSC, the MSC begins the process of establishing a traffic channel by sending an assignment request message to the RNS. The RNS responds to the assignment request by sending a connection request to the MGW, which the MGW confirms. Upon receiving confirmation from the MGW, the RNS queries the BB to determine if bandwidth is available that satisfies the parameters requested by the MS. If the bandwidth is available, the traffic channel is established. If the bandwidth is not available, then the traffic channel establishment procedure ends.
It is at this point that the RNS understands the kind of service requested, as well as the two endpoints for the conversation. Those two endpoints are the IP address and port in the RIBS and the IP address and port in the GW. The first pair is sent to the GW in the connection request and the latter pair is sent to the RBS in the channel activation but is known to the RNS after the connection confirm from the GW to the RNS.
We have described an architecture for resource management of transport resources in IP -based cellular radio access networks. The architecture enables a very short response time for admission control requests. This means that handover can be performed very quickly, since the delay added by admission control for the IP transport resources is minimal. Nonetheless, the admission control result is believed to be reasonably accurate.
The invention has now been described generally and with respect to a radio access network. In light of this disclosure, those skilled in the art will likely make alternate embodiments of this invention. For example, to determine the load status between an ingress and an egress edge device, the load control proxy could ping the edge devices rather than injecting a load control probe packet into the network. The transit times to edge devices could be determined and the network congestion estimated. These and other alternate embodiments are intended to fall within the scope of the claims which follow.

Claims

CLAIMSWhat Is Claimed Is:
1. A method of access control in a communication network comprising the steps of: determining a load status of the network between a call originating node and a call terminating node; determining whether the load status permits a specified quality of service; and if the specified quality of service is permitted, establishing a transport connection between the call originating node and the call terminating node.
2. A method of access control in a network comprising the steps of: sending a probe packet through the network from a first node to at least one other node; updating a portion of the probe packet at each node based on the load status of the node; determining whether the load status permits a specified quality of service; and if the specified quality of service is permitted, establishing a transport connection between the at least two nodes in the network.
3. The method of claim 2, wherein the step of sending a probe packet through the network is performed continuously.
4. The method of claim 2, wherein the step of sending a probe packet through the network is performed at pre-determined times.
5. The method of claim 2, wherein the step of sending a probe packet through the network is performed in response to a network event.
6. The method of claim 2, wherein the step of sending a probe packet is performed for each of a plurality of traffic classes.
7. An access control system in a network comprising: at least one load measurement proxy, which probes the network to determine the congestion state of the network; a bandwidth broker server in communication with the at least one load measurement proxy and correlating the determined congestion state information; and a bandwidth broker client in communication with the bandwidth broker server and an application, wherein the bandwidth broker client queries the bandwidth broker server based on requirements of the application.
8. The access control system of claim 7, wherein the requirements of the application include at least two node addresses and a quality of service.
9. The access control system of claim 7, wherein the requirements of the application include at least one of an application traffic class, a peak bit rate, a packet delay, a delay variation, a packet loss, and a guaranteed bit rate.
10. The access control system of claim 7, wherein the load measurement proxy continuously probes the network.
11. The access control system of claim 7, wherein the load measurement proxy probes the network at predefined intervals.
12. The access control system of claim 7, wherein the load measurement proxy probes the network in response to a network event.
13. The access control system of claim 7, wherein the load measurement proxy determines the congestion state of the network for each of a plurality of traffic classes.
14. An access control system in a network comprising: at least one load measurement proxy, which probes the network to determine the congestion state of the network; a bandwidth broker server in communication with the at least one load measurement proxy and correlating the determined congestion state information; and a plurality of bandwidth broker clients in communication with the bandwidth broker server and a respective one of a plurality of applications, wherein each of the plurality of bandwidth broker clients queries the bandwidth broker server based on requirements of the respective one of a plurality of applications .
PCT/SE2001/001863 2000-08-31 2001-08-31 Bandwidth broker for cellular radio access networks WO2002019055A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001282824A AU2001282824A1 (en) 2000-08-31 2001-08-31 Bandwidth broker for cellular radio access networks

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US22905600P 2000-08-31 2000-08-31
US60/229,056 2000-08-31

Publications (3)

Publication Number Publication Date
WO2002019055A2 true WO2002019055A2 (en) 2002-03-07
WO2002019055A3 WO2002019055A3 (en) 2002-10-17
WO2002019055A8 WO2002019055A8 (en) 2003-06-05

Family

ID=22859676

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2001/001863 WO2002019055A2 (en) 2000-08-31 2001-08-31 Bandwidth broker for cellular radio access networks

Country Status (3)

Country Link
US (1) US7068607B2 (en)
AU (1) AU2001282824A1 (en)
WO (1) WO2002019055A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005022851A1 (en) * 2003-08-28 2005-03-10 Telefonaktiebolaget Lm Ericsson (Publ) Call admission control system and method for interpreting signaling messages and controlling traffic load in internet protocol differentiated services networks
WO2009107116A2 (en) * 2008-02-29 2009-09-03 Alcatel Lucent In-bound mechanism that verifies end-to-end service configuration with application awareness
DE102011011400A1 (en) * 2011-02-17 2012-08-23 Innoroute Gmbh Data connection system for website for e.g. registration of plug-ins for application programs of e.g. voice over internet protocol client, has packet stream forming unit formed in data path to adjust to data stream to terminals

Families Citing this family (112)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001154903A (en) * 1999-11-26 2001-06-08 Nec Corp Radio network communication system
US7307954B1 (en) * 2000-06-23 2007-12-11 Nokia Corporation Differentiated service network and method of operating a differentiated service network
DE60115108T2 (en) * 2001-08-01 2006-07-27 Nokia Corp. DEVICE AND METHOD FOR FLOW CONTROL BASED ON PRIORITIES IN A MOBILE NETWORK
US20030074452A1 (en) * 2001-10-11 2003-04-17 Nokia Corporation System and method of determining QoS establishment mode
US7626932B2 (en) * 2001-12-21 2009-12-01 Nokia Corporation Traffic control in an IP based network
US7489632B2 (en) * 2002-03-22 2009-02-10 Nokia Corporation Simple admission control for IP based networks
US6631269B1 (en) * 2002-05-23 2003-10-07 Interdigital Technology Corporation Signaling connection admission control in a wireless network
WO2004034680A1 (en) * 2002-10-07 2004-04-22 Interdigital Technology Corporation System and method for simulation of performance of measurement-based algorithms for slotted wireless communications
JP2004207840A (en) * 2002-12-24 2004-07-22 Nec Corp Method of managing radio resource, managing apparatus used therefor, base station and terminal
US7225267B2 (en) 2003-01-27 2007-05-29 Microsoft Corporation Reactive bandwidth control for streaming data
KR100493108B1 (en) * 2003-01-29 2005-06-02 삼성전자주식회사 Call processing service method in a traffic-channel congestion state
EP1443717B1 (en) * 2003-02-03 2005-12-21 Alcatel Bandwidth broker for a telecommunication system
DE10315066B4 (en) * 2003-04-02 2006-06-01 Siemens Ag Method for controlling the transmission of data
US7768946B2 (en) * 2003-04-07 2010-08-03 Nokia Corporation Resource determination in IP-based networks
US8521889B2 (en) * 2003-05-15 2013-08-27 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for modifying bandwidth and/or quality of service for a user session in a network
US8204042B2 (en) * 2003-05-15 2012-06-19 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for establishing VoIP service in a network
US7092358B2 (en) * 2003-10-24 2006-08-15 Nokia Corporation System and method for facilitating flexible quality of service
ES2383998T3 (en) 2003-11-17 2012-06-28 Telecom Italia S.P.A. Architecture of quality of service supervision, related procedure, network and computer program product
US7519006B1 (en) 2003-11-26 2009-04-14 Cisco Technology, Inc. Method and apparatus for measuring one-way delay at arbitrary points in network
US7729267B2 (en) * 2003-11-26 2010-06-01 Cisco Technology, Inc. Method and apparatus for analyzing a media path in a packet switched network
US20060031082A1 (en) * 2004-08-06 2006-02-09 Amaitis Lee M System and method for trading wireless spectrum rights
US20060143111A1 (en) * 2004-08-06 2006-06-29 Cfph, Llc System and method for trading spectrum rights
US7945656B1 (en) * 2004-10-18 2011-05-17 Cisco Technology, Inc. Method for determining round trip times for devices with ICMP echo disable
ATE484167T1 (en) * 2004-12-03 2010-10-15 Ericsson Telefon Ab L M SETTING AN UPWARD TRANSMISSION RATE LIMIT FOR MOBILE TERMINALS TRANSMITTING OVER A SHARED FAST DOWNLOOK CHANNEL
US8155014B2 (en) * 2005-03-25 2012-04-10 Cisco Technology, Inc. Method and system using quality of service information for influencing a user's presence state
US8015403B2 (en) * 2005-03-28 2011-09-06 Cisco Technology, Inc. Method and system indicating a level of security for VoIP calls through presence
EP1708424A1 (en) * 2005-03-31 2006-10-04 THOMSON Licensing Prioritising video streams in a wireless LAN (WLAN)
US7697421B2 (en) * 2005-04-21 2010-04-13 Avaya Inc. Method and apparatus for quality-of-service-based admission control
US8081565B2 (en) * 2005-04-21 2011-12-20 Avaya Inc. Method and apparatus for adaptive control of system parameters for admission control
US7957276B2 (en) 2005-04-28 2011-06-07 Telcordia Licensing Company, Llc Call admission control and preemption control over a secure tactical network
US7764699B2 (en) * 2005-05-16 2010-07-27 Cisco Technology, Inc. Method and system using shared configuration information to manage network access for network users
US7920847B2 (en) * 2005-05-16 2011-04-05 Cisco Technology, Inc. Method and system to protect the privacy of presence information for network users
US8079062B2 (en) * 2005-05-16 2011-12-13 Cisco Technology, Inc. Method and system using presence information to manage network access
CN100417070C (en) * 2005-05-30 2008-09-03 华为技术有限公司 Method and system for realization of content charging
US7933237B2 (en) 2005-12-23 2011-04-26 Telcordia Licensing Company, Llc Ensuring quality of service of communications in networks
US7726309B2 (en) * 2006-06-05 2010-06-01 Ric Investments, Llc Flexible connector
US9094257B2 (en) 2006-06-30 2015-07-28 Centurylink Intellectual Property Llc System and method for selecting a content delivery network
US8194643B2 (en) 2006-10-19 2012-06-05 Embarq Holdings Company, Llc System and method for monitoring the connection of an end-user to a remote network
US8000318B2 (en) 2006-06-30 2011-08-16 Embarq Holdings Company, Llc System and method for call routing based on transmission performance of a packet network
US8488447B2 (en) 2006-06-30 2013-07-16 Centurylink Intellectual Property Llc System and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance
US8289965B2 (en) 2006-10-19 2012-10-16 Embarq Holdings Company, Llc System and method for establishing a communications session with an end-user based on the state of a network connection
US8717911B2 (en) 2006-06-30 2014-05-06 Centurylink Intellectual Property Llc System and method for collecting network performance information
US7948909B2 (en) 2006-06-30 2011-05-24 Embarq Holdings Company, Llc System and method for resetting counters counting network performance information at network communications devices on a packet network
US8184549B2 (en) 2006-06-30 2012-05-22 Embarq Holdings Company, LLP System and method for selecting network egress
US8228791B2 (en) 2006-08-22 2012-07-24 Embarq Holdings Company, Llc System and method for routing communications between packet networks based on intercarrier agreements
US7684332B2 (en) 2006-08-22 2010-03-23 Embarq Holdings Company, Llc System and method for adjusting the window size of a TCP packet through network elements
US8750158B2 (en) 2006-08-22 2014-06-10 Centurylink Intellectual Property Llc System and method for differentiated billing
US8307065B2 (en) 2006-08-22 2012-11-06 Centurylink Intellectual Property Llc System and method for remotely controlling network operators
US8619600B2 (en) 2006-08-22 2013-12-31 Centurylink Intellectual Property Llc System and method for establishing calls over a call path having best path metrics
US8549405B2 (en) 2006-08-22 2013-10-01 Centurylink Intellectual Property Llc System and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally
US8576722B2 (en) 2006-08-22 2013-11-05 Centurylink Intellectual Property Llc System and method for modifying connectivity fault management packets
US9479341B2 (en) 2006-08-22 2016-10-25 Centurylink Intellectual Property Llc System and method for initiating diagnostics on a packet network node
US8194555B2 (en) 2006-08-22 2012-06-05 Embarq Holdings Company, Llc System and method for using distributed network performance information tables to manage network communications
US8144586B2 (en) 2006-08-22 2012-03-27 Embarq Holdings Company, Llc System and method for controlling network bandwidth with a connection admission control engine
US8531954B2 (en) 2006-08-22 2013-09-10 Centurylink Intellectual Property Llc System and method for handling reservation requests with a connection admission control engine
US8407765B2 (en) 2006-08-22 2013-03-26 Centurylink Intellectual Property Llc System and method for restricting access to network performance information tables
US8144587B2 (en) 2006-08-22 2012-03-27 Embarq Holdings Company, Llc System and method for load balancing network resources using a connection admission control engine
US8537695B2 (en) 2006-08-22 2013-09-17 Centurylink Intellectual Property Llc System and method for establishing a call being received by a trunk on a packet network
US8064391B2 (en) 2006-08-22 2011-11-22 Embarq Holdings Company, Llc System and method for monitoring and optimizing network performance to a wireless device
US8224255B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc System and method for managing radio frequency windows
US8189468B2 (en) 2006-10-25 2012-05-29 Embarq Holdings, Company, LLC System and method for regulating messages between networks
US8098579B2 (en) 2006-08-22 2012-01-17 Embarq Holdings Company, LP System and method for adjusting the window size of a TCP packet through remote network elements
US8274905B2 (en) 2006-08-22 2012-09-25 Embarq Holdings Company, Llc System and method for displaying a graph representative of network performance over a time period
US8040811B2 (en) 2006-08-22 2011-10-18 Embarq Holdings Company, Llc System and method for collecting and managing network performance information
US8238253B2 (en) 2006-08-22 2012-08-07 Embarq Holdings Company, Llc System and method for monitoring interlayer devices and optimizing network performance
US8015294B2 (en) 2006-08-22 2011-09-06 Embarq Holdings Company, LP Pin-hole firewall for communicating data packets on a packet network
US7940735B2 (en) 2006-08-22 2011-05-10 Embarq Holdings Company, Llc System and method for selecting an access point
US8107366B2 (en) 2006-08-22 2012-01-31 Embarq Holdings Company, LP System and method for using centralized network performance tables to manage network communications
US8743703B2 (en) 2006-08-22 2014-06-03 Centurylink Intellectual Property Llc System and method for tracking application resource usage
US7843831B2 (en) 2006-08-22 2010-11-30 Embarq Holdings Company Llc System and method for routing data on a packet network
US8130793B2 (en) 2006-08-22 2012-03-06 Embarq Holdings Company, Llc System and method for enabling reciprocal billing for different types of communications over a packet network
US8125897B2 (en) 2006-08-22 2012-02-28 Embarq Holdings Company Lp System and method for monitoring and optimizing network performance with user datagram protocol network performance information packets
US8223655B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc System and method for provisioning resources of a packet network based on collected network performance information
US8199653B2 (en) 2006-08-22 2012-06-12 Embarq Holdings Company, Llc System and method for communicating network performance information over a packet network
US8223654B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc Application-specific integrated circuit for monitoring and optimizing interlayer network performance
US9438521B2 (en) * 2006-10-03 2016-09-06 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement in a telecommunication system
US8417826B2 (en) * 2006-10-12 2013-04-09 Alcatel Lucent Method and system of overload control in packetized communication networks
WO2008090414A2 (en) * 2006-10-16 2008-07-31 Bridgewater Systems Corp. Systems and methods for subscriber-centric dynamic spectrum management
US7852783B2 (en) * 2006-12-07 2010-12-14 Cisco Technology, Inc. Identify a secure end-to-end voice call
US7738383B2 (en) 2006-12-21 2010-06-15 Cisco Technology, Inc. Traceroute using address request messages
US7706278B2 (en) 2007-01-24 2010-04-27 Cisco Technology, Inc. Triggering flow analysis at intermediary devices
US8385194B2 (en) * 2007-03-13 2013-02-26 Alcatel Lucent Quality of service admission control network
US8111692B2 (en) 2007-05-31 2012-02-07 Embarq Holdings Company Llc System and method for modifying network traffic
US8190750B2 (en) * 2007-08-24 2012-05-29 Alcatel Lucent Content rate selection for media servers with proxy-feedback-controlled frame transmission
US8068425B2 (en) 2008-04-09 2011-11-29 Embarq Holdings Company, Llc System and method for using network performance information to determine improved measures of path states
US7773513B2 (en) * 2008-10-30 2010-08-10 Motorola, Inc. Admission control for a heterogeneous communication system
ES2341521B1 (en) * 2008-12-18 2011-04-29 Vodafone España, S.A.U. BANDWIDTH MANAGEMENT PROCEDURE IN PACKAGE NETWORKS.
US7916636B2 (en) * 2009-01-05 2011-03-29 Corrigent Systems Ltd. Ring network aggregate rates
US8248943B2 (en) * 2009-12-21 2012-08-21 Motorola Solutions, Inc. Method and apparatus for ensuring access in a communication system for a plurality of groups
US8233449B2 (en) * 2009-12-29 2012-07-31 Motorola Solutions, Inc. Method and apparatus for resource allocation in a shared wireless network
US8335161B2 (en) 2010-02-03 2012-12-18 Bridgewater Systems Corp. Systems and methods for network congestion management using radio access network congestion indicators
US8971258B2 (en) 2010-07-31 2015-03-03 Motorola Solutions, Inc. Policy determination for user equipment providng mutual aid in a visited enterprise operating area of a long term evolution system
US9414265B2 (en) 2010-07-31 2016-08-09 Motorola Solutions, Inc. Location based policy for user equipment operating in different areas of a shared home long term evolution system
US8774010B2 (en) 2010-11-02 2014-07-08 Cisco Technology, Inc. System and method for providing proactive fault monitoring in a network environment
US8559341B2 (en) 2010-11-08 2013-10-15 Cisco Technology, Inc. System and method for providing a loop free topology in a network environment
US8982733B2 (en) 2011-03-04 2015-03-17 Cisco Technology, Inc. System and method for managing topology changes in a network environment
US8670326B1 (en) 2011-03-31 2014-03-11 Cisco Technology, Inc. System and method for probing multiple paths in a network environment
US8724517B1 (en) 2011-06-02 2014-05-13 Cisco Technology, Inc. System and method for managing network traffic disruption
US8830875B1 (en) 2011-06-15 2014-09-09 Cisco Technology, Inc. System and method for providing a loop free topology in a network environment
EP2904834B1 (en) 2012-10-02 2017-12-20 Telefonaktiebolaget LM Ericsson (publ) Method and system for radio service optimization using active probing over transport networks
US9450846B1 (en) 2012-10-17 2016-09-20 Cisco Technology, Inc. System and method for tracking packets in a network environment
US9301211B2 (en) 2013-08-20 2016-03-29 Telefonaktiebolaget L M Ericsson (Publ) Reporting performance and controlling mobility between different radio access technologies
WO2015027465A1 (en) * 2013-08-30 2015-03-05 华为技术有限公司 Resource allocation method, device and system
US9923965B2 (en) 2015-06-05 2018-03-20 International Business Machines Corporation Storage mirroring over wide area network circuits with dynamic on-demand capacity
US10057327B2 (en) 2015-11-25 2018-08-21 International Business Machines Corporation Controlled transfer of data over an elastic network
US9923839B2 (en) 2015-11-25 2018-03-20 International Business Machines Corporation Configuring resources to exploit elastic network capability
US10581680B2 (en) 2015-11-25 2020-03-03 International Business Machines Corporation Dynamic configuration of network features
US10177993B2 (en) 2015-11-25 2019-01-08 International Business Machines Corporation Event-based data transfer scheduling using elastic network optimization criteria
US9923784B2 (en) 2015-11-25 2018-03-20 International Business Machines Corporation Data transfer using flexible dynamic elastic network service provider relationships
US10216441B2 (en) 2015-11-25 2019-02-26 International Business Machines Corporation Dynamic quality of service for storage I/O port allocation
CN108541023A (en) * 2017-03-03 2018-09-14 株式会社理光 Load-balancing method and system and access controller
US10383002B2 (en) * 2017-05-01 2019-08-13 University Of Notre Dame Du Lac Systems and methods for rapidly estimating available bandwidth in a WiFi link

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1026855A2 (en) * 1999-02-04 2000-08-09 Fujitsu Limited Measuring network communication performance
WO2000049824A1 (en) * 1999-02-16 2000-08-24 Nokia Networks Oy An admission control method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6216006B1 (en) * 1997-10-31 2001-04-10 Motorola, Inc. Method for an admission control function for a wireless data network
US6404738B1 (en) * 1998-01-21 2002-06-11 Nec Usa, Inc. Dynamic network bandwidth allocation for multimedia applications with soft quality-of-service requirements
US20010027490A1 (en) * 2000-01-25 2001-10-04 Gabor Fodor RSVP handling in 3G networks
US7054938B2 (en) * 2000-02-10 2006-05-30 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for network service reservations over wireless access networks
US6647412B1 (en) * 2000-06-23 2003-11-11 Nokia Internet Communications Inc. Method and network for propagating status information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1026855A2 (en) * 1999-02-04 2000-08-09 Fujitsu Limited Measuring network communication performance
WO2000049824A1 (en) * 1999-02-16 2000-08-24 Nokia Networks Oy An admission control method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005022851A1 (en) * 2003-08-28 2005-03-10 Telefonaktiebolaget Lm Ericsson (Publ) Call admission control system and method for interpreting signaling messages and controlling traffic load in internet protocol differentiated services networks
US7660242B2 (en) 2003-08-28 2010-02-09 Telefonaktiebolaget L M Ericsson (Publ) Call admission control system and method for interpreting signaling messages and controlling traffic load in internet protocol differentiated services networks
WO2009107116A2 (en) * 2008-02-29 2009-09-03 Alcatel Lucent In-bound mechanism that verifies end-to-end service configuration with application awareness
WO2009107116A3 (en) * 2008-02-29 2009-11-12 Alcatel Lucent In-bound mechanism that verifies end-to-end service configuration with application awareness
US7940683B2 (en) 2008-02-29 2011-05-10 Alcatel Lucent In-bound mechanism that verifies end-to-end service configuration with application awareness
DE102011011400A1 (en) * 2011-02-17 2012-08-23 Innoroute Gmbh Data connection system for website for e.g. registration of plug-ins for application programs of e.g. voice over internet protocol client, has packet stream forming unit formed in data path to adjust to data stream to terminals
DE102011011400B4 (en) * 2011-02-17 2012-10-11 Innoroute Gmbh Method and arrangement for avoiding overload on the subscriber line

Also Published As

Publication number Publication date
AU2001282824A1 (en) 2002-03-13
US7068607B2 (en) 2006-06-27
WO2002019055A3 (en) 2002-10-17
WO2002019055A8 (en) 2003-06-05
US20020181394A1 (en) 2002-12-05

Similar Documents

Publication Publication Date Title
US7068607B2 (en) Bandwidth broker for cellular radio access networks
JP3977331B2 (en) Method and apparatus in IP communication network
KR100822707B1 (en) Apparatus and method for managing quality of service in integrated network of heterogeneous mobile networks
US7626932B2 (en) Traffic control in an IP based network
US7616601B2 (en) Network resource manager in a mobile telecommunication system
US7787414B2 (en) Reserving network resources for a communication session
US6714515B1 (en) Policy server and architecture providing radio network resource allocation rules
EP1312226B1 (en) DYNAMIC QoS MANAGEMENT IN DIFFERENTIATED SERVICES USING BANDWIDTH BROKERS, RSVP AGGREGATION AND LOAD CONTROL PROTOCOLS
US8804532B2 (en) Method and arrangement for adapting to variations in an available bandwidth to a local network
KR100748095B1 (en) Method and system of guarantee qos in broadband convergence network deployed mobile ip
Mirhakkak et al. A new Approach for providing Quality-of-Service in a Dynamic Network Environment
Shih et al. A transparent QoS mechanism to support IntServ/DiffServ networks
Császár et al. A practical method for the efficient resolution of congestion in an on-path reduced-state signalling environment
GB2386283A (en) Packet data communications network
Koivula et al. Differentiated services and vertical handovers supporting multimedia in heterogeneous networks
KR100705493B1 (en) Apparatus and method for cotrolling quality of service in muti-cell network systems
Simone et al. Context transfer for Quality of Service in radio access networks
Kim et al. Domain based approach for QoS provisioning over Mobile IP
Mirhakkak et al. Dynamic Quality of Service and Adaptive Applications for a Variable Bandwidth Environment
GB2386284A (en) Packet data communications networks
Balkanci Requirements and Current Work of QoS for Mobile IP and Wireless Internet
Zivkovic et al. QoS attributes for packet switched services in 3rd generation mobile systems (UMTS)
Nafisi et al. QoS-aware path selection in a B3G system
Qu et al. A QoS provision architecture for mobile IPv6 over MPLS using HMAT
Conforto et al. QoS-aware mobility management: solutions and performance evaluation

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i

Free format text: IN PCT GAZETTE 10/2002 UNDER (72) ADD ""PARTAIN, DAVID, BYSKIFTESGATAN 8, S-583 34 LINKOEPING (SE).""

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP