`
` Yasuhiro Katsube
` Ken-ichi Nagami
` Hiroshi Esaki
` (Toshiba R&D Center)
`
` Router Architecture Extensions for ATM : Overview
` <draft-katsube-router-atm-overview-02.txt>
`
`Status of this memo
`
` This document is an Internet-Draft. Internet-Drafts are working
` documents of the Internet Engineering task Force (IETF), its areas,
` and its working groups. Note that other groups may also distribute
` working documents as Internet-Drafts.
`
` Internet-Drafts are draft documents valid for a maximum of six months
` and may be updated, replaced, or obsoleted by other documents at any
` time. It is inappropriate to use Internet-Drafts as reference
` material or to cite them other than as "work in progress".
`
` To learn the current status of any Internet-Draft, please check the
` "1id-abstract.txt" listing contained in the Internet-Drafts Shadow
` Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
` munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
` ftp.isi.edu (US West Coast).
`
`Abstract
`
` This memo describes a new internetworking architecture which makes
` better use of the property of ATM. IP datagrams are transferred
` along hop-by-hop path via routers, but datagram assembly/disassembly
` and IP header processing are not necessarily carried out at
` individual routers in the proposed architecture. A concept of "Cell
` Switch Router (CSR)" is introduced as a new internetworking
` equipment, which has ATM cell switching capabilities in addition to
` conventional IP datagram forwarding. Proposed architecture can
` provide applications with high-throughput and low-latency ATM pipes
` while retaining current router-based internetworking concept. It
` also provides applications with specific QoS/bandwidth by
` cooperating with internetworking level resource reservation protocols
` such as RSVP.
`
`1. Introduction
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 1
`
`
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 1]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 2
`
`
`
`Internet Draft March 25th, 1996
`
` The Internet is growing both in its size and its traffic volume.
` In addition, recent applications often require guaranteed bandwidth
` and QoS rather than best effort. Such changes make the current
` hop-by-hop datagram forwarding paradigm inadequate, then accelerate
` investigations on new internetworking architectures.
`
` Roughly two distinct approaches can be seen as possible solutions;
` the use of ATM to convey IP datagrams, and the revision of IP to
` support flow concept and resource reservation. Integration or
` interworking of these approaches will be necessary to provide end
` hosts with high throughput and QoS guaranteed internetworking
` services over any datalink platforms as well as ATM.
`
` New internetworking architecture proposed in this draft is based on
` "Cell Switch Router (CSR)" which has the following properties.
`
` - It makes the best use of ATM's property while retaining current
` router-based internetworking and routing architecture.
`
` - It takes into account interoperability with future IP that
` supports flow concept and resource reservations.
`
` Section 2 of this draft explains background and motivations of our
` proposal. Section 3 describes an overview of the proposed
` internetworking architecture and its several remarkable features.
` Section 4 discusses control architectures for CSR, which will need to
` be further investigated.
`
`2. Background and Motivation
`
` It is considered that the current hop-by-hop best effort datagram
` forwarding paradigm will not be adequate to support future large
` scale Internet which accommodates huge amount of traffic with certain
` QoS requirements. Two major schools of investigations can be seen in
` IETF whose main purpose is to improve ability of the Internet with
` regard to its throughput and QoS. One is to utilize ATM technology
` as much as possible, and the other is to introduce the concept of
` resource reservation and flow into IP.
`
`1) Utilization of ATM
`
` Although basic properties of ATM; necessity of connection setup,
` necessity of traffic contract, etc.; is not necessarily suited to
` conventional IP datagram transmission, its excellent throughput and
` delay characteristics let us to investigate the realization of IP
` datagram transmission over ATM.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 2]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 3
`
`
`
`Internet Draft March 25th, 1996
`
` A typical internetworking architecture specified by the IETF
` IPoverATM WG is the "Classical IP Model"[RFC1577]. This model allows
` direct ATM connectivities only between nodes that share the same IP
` address prefix. IP datagrams should traverse routers whenever they
` go beyond IP subnet boundaries even though their source and
` destination are accommodated in the same ATM cloud. Although an
` ATMARP is introduced which is not based on legacy datalink broadcast
` but on centralized ATMARP servers, this model does not require
` drastic changes to the legacy internetworking architectures with
` regard to the IP datagram forwarding process. This model still has
` problems of limited throughput and large latency, compared with the
` ability of ATM, due to IP header processing at every router. It will
` become more critical when multimedia applications that require much
` larger bandwidth and lower latency become dominant in the near
` future.
`
` Another internetworking model is currently under discussion in the
` IETF ROLC WG[KAT95]. The model, that we call "NHRP (Next Hop
` Resolution Protocol) Model" here, aims at resolving throughput and
` latency problems in the Classical IP Model and making the best use of
` ATM. ATM connections can be directly established from an ingress
` point to an egress point of an ATM cloud even when they do not share
` the same IP address prefix. In order to enable it, the Next Hop
` Server[KAT95] is introduced which can find an egress point of the ATM
` cloud nearest to the given destination and resolves its ATM address.
` A sort of query/response protocols between the server(s) and clients
` and possibly server and server will be specified. After the ATM
` address of a desired egress point is resolved, the client
` establishes a direct ATM connection to that point through ATM
` signaling procedures.[ATM3.1] Once a direct ATM connection has been
` set up through this procedure, IP datagrams do not have to experience
` hop-by-hop IP processing but can be transmitted over the direct ATM
` connection. Therefore, high throughput and low latency
` communications become possible even if they go beyond IP subnet
` boundaries. It should be noted that the provision of such direct ATM
` connections does not mean disappearance of legacy routers which
` interconnect distinct ATM-based IP subnets. For example, hop-by-hop
` IP datagram forwarding function would still be required in the
` following cases:
`
` - When you want to transmit IP datagrams before direct ATM connection
` from an ingress point to an egress point of the ATM cloud is
` established
`
` - When you neither require a certain QoS nor transmit large amount of
` IP datagrams for some communication
`
` - When the direct ATM connection is not allowed by security or policy
` reasons
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 3]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 4
`
`
`
`Internet Draft March 25th, 1996
`
`2) IP level resource reservation and flow support
`
` Apart from investigation on specific datalink technology such as ATM,
` resource reservation technologies for desired IP level flows have
` been studied and are still under discussion. Their typical examples
` are RSVP[BRADEN96] and STII[RFC1819].
`
` RSVP itself is not a connection oriented technology since datagrams
` can be transmitted regardless of the result of the resource
` reservation process. After a resource reservation process from a
` receiver (or receivers) to a sender (or senders) is successfully
` completed, RSVP-capable routers along the path of the flow reserve
` their resources for datagram forwarding according to the requested
` flow spec.
`
` STII is regarded as a connection oriented IP which requires
` connection setup process from a sender to a receiver (or receivers)
` before transmitting datagrams. STII-capable routers along the path
` of the requested connection reserve their resources for datagram
` forwarding according to the flow spec.
`
` Neither RSVP nor STII restrict underlying datalink networks since
` their primary purpose is to let routers provide each IP flow with
` desired forwarding quality (by controlling their datagram scheduling
` rules). Since various datalink networks will coexist as well as ATM
` in the future, these IP level resource reservation technologies would
` be necessary in order to provide end-to-end IP flow with desired
` bandwidth and QoS.
`
` Taking this background into consideration, we should be aware of
` several issues which motivate our proposal.
`
` - As of the time of writing, the ATM specific internetworking
` architecture proposed does not take into account interoperability
` with IP level resource reservation or connection setup protocols.
` In particular, operating RSVP in the NHRP-based ATM cloud seems to
` require much effort since RSVP is a soft-state receiver-oriented
` protocol with multicast capability as a default, while ATM with
` NHRP is a hard-state sender-oriented protocol which does not
` support multicast yet.
`
` - Although RSVP or STII-based routers will provide each IP flow with
` a desired bandwidth and QoS, they have some native throughput
` limitations due to the processor-based IP forwarding mechanism
` compared with the switching mechanism of ATM.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 4]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 5
`
`
`
`Internet Draft March 25th, 1996
`
` The main objective of our proposal is to resolve the above issues.
` The proposed internetworking architecture makes the best use of the
` property of ATM by extending legacy routers to handle future IP
` features such as flow support and resource reservation with the help
` of ATM's cell switching capabilities.
`
`3. Internetworking Architecture Based On the Cell Switch Router (CSR)
`
`3.1 Overview
`
` The Cell Switch Router (CSR) is a key network element of the proposed
` internetworking architecture. The CSR provides cell switching
` functionality in addition to conventional IP datagram forwarding.
` Communications with high throughput and low latency, that are native
` properties of ATM, become possible by using this cell switching
` functionality even when the communications pass through IP subnetwork
` boundaries. In an ATM internet composed of CSRs, VPI/VCI-based cell
` switching which bypasses datagram assembly/disassembly and IP header
` processing is possible at every CSR for communications which lend
` themselves to such (e.g., communications which require certain amount
` of bandwidth and QoS), while hop-by-hop datagram forwarding based on
` the IP header is also possible at every CSR for other conventional
` communications.
`
` By using such cell-level switching capabilities, the CSR is able to
` concatenate incoming and outgoing ATM VCs, although the concatenation
` in this case is controlled outside the ATM cloud (ATM's control/
` management-plane) unlike conventional ATM switch nodes. That is, the
` CSR is attached to ATM networks via an ATM-UNI instead of NNI. By
` carrying out such VPI/VCI concatenations at multiple CSRs
` consecutively, ATM level connectivity composed of multiple ATM VCs,
` each of which connects adjacent CSRs (or CSR and hosts/routers), can
` be provided. We call such an ATM pipe "ATM Bypass-pipe" to
` differentiate it from "ATM VCC (VC connection)" provided by a single
` ATM datalink cloud through ATM signaling.
`
` Example network configurations based on CSRs are shown in figure 1.
` An ATM datalink network may be a large cloud which accommodates
` multiple IP subnets X, Y and Z. Or several distinct ATM datalinks
` may accommodate single IP subnet X, Y and Z respectively[OHTA95].
` The latter configuration would be straightforward in discussing the
` CSR, but the CSR is also applicable to the former configuration as
` well. In addition, the CSR would be applicable as a router which
` interconnects multiple NHRP-based ATM clouds.
`
` Two different kinds of ATM VCs are defined between adjacent CSRs or
` between CSR and ATM-attached hosts/routers.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 5]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 6
`
`
`
`Internet Draft March 25th, 1996
`
`1) Default-VC
`
` It is a general purpose VC used by any communications which select
` conventional hop-by-hop IP routed paths. All incoming cells received
` from this VC are assembled to IP datagrams and handled based on their
` IP headers. VCs set up in the Classical IP Model are classified into
` this category.
`
`2) Dedicated-VC
`
` It is used by specific communications (IP flows) which are specified
` by, for example, any combination of the destination IP address/port,
` the source IP address/port or IPv6 flow label. It can be
` concatenated with other Dedicated-VCs which accommodate the same IP
` flow as it, and can constitute an ATM Bypass-pipe for those IP flows.
`
` Ingress/egress nodes of the Bypass-pipe can be either CSRs or ATM-
` attached routers/hosts both of which speak a Bypass-pipe control
` protocol. (we call that "Bypass-capable nodes") On the other hand,
` intermediate nodes of the Bypass-pipe should be CSRs since they need
` to have cell switching capabilities as well as speak the Bypass-pipe
` control protocol.
`
` The route for a Bypass-pipe follows IP routing information in each
` CSR. In figure 1, IP datagrams from a source host or router X.1 to
` a destination host or router Z.1 are transferred over the route X.1
` -> CSR1 -> CSR2 -> Z.1 regardless of whether the communication is
` on a hop-by-hop basis or Bypass-pipe basis. Routes for individual
` Dedicated-VCs which constitutes the Bypass-pipe X.1 --> Z.1 (X.1 ->
` CSR1, CSR1 -> CSR2, CSR2 -> Z.1) would be determined based on ATM
` routing protocols such as PNNI[PNNI95], and would be independent of
` IP level routing.
`
` An example of IP datagram transmission mechanism is as follows.
`
` o The host/router X.1 checks an identifier of each IP datagram,
` which may be the "destination IP address (prefix)",
` "source/destination IP address (prefix) pair", "destination IP
` address and port", "source IP address and Flow label (in IPv6)",
` and so on. Based on either of those identifiers, it determines
` over which VC the datagram should be transmitted.
`
` o The CSR1/2 checks the VPI/VCI value of each incoming cell. When
` the mapping from the incoming interface/VPI/VCI to outgoing
` interface/VPI/VCI is found in an ATM routing table, it is directly
` forwarded to the specified interface through an ATM switch module.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 6]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 7
`
`
`
`Internet Draft March 25th, 1996
`
` When the mapping in not found in the ATM routing table (or the
` table shows an IP module as an output interface), the cell is
` assembled to an IP datagram and then forwarded to an appropriate
` outgoing interface/VPI/VCI based on an identifier of the datagram.
`
` IP subnet X IP subnet Y IP subnet Z
` <---------------------> <-----------------> <--------------------->
`
` +-------+ Default +-------+ Default +-------+ Default +-------+
` | | -VC | CSR 1 | -VC | CSR 2 | -VC | |
` | Host +=============+ +===============+ +=============+ Host |
` | X.1 +-------------+++++---------------+++++-------------+ Z.1 |
` | +-------------+++++---------------+++++-------------+ |
` | +-------------+++++---------------+++++-------------+ |
` | |Dedicated | | Dedicated | |Dedicated | |
` +-------+ -VCs +-------+ -VCs +-------+ -VCs +-------+
` <--------------------------------------------------->
` Bypass-pipe
`
` Figure 1 Internetworking Architecture based on CSR
`
`3.2 Features
`
` The main feature of the CSR-based internetworking architecture is the
` same as that of the NHRP-based architecture in the sense that they
` both provide direct ATM level connectivity beyond IP subnet
` boundaries. There are, however, several notable differences in the
` CSR-based architecture compared with the NHRP-based one as follows.
`
` 1) Relationship between IP routing and ATM routing
`
` In the NHRP model, an egress point of the ATM network is first
` determined in the next hop resolution phase based on IP level routing
` information. Then the actual route for an ATM-VC to the obtained
` egress point is determined in the ATM connection setup phase based on
` ATM level routing information. Both kinds of routing information
` would be calculated according to factors such as network topology and
` available bandwidth for the large ATM cloud. The ATM routing will be
` based on PNNI phase1[PNNI] while the IP routing will be based on
` OSPF, BGP, IS-IS, etc. We need to manage two different routing
` protocols over the large ATM cloud until Integtrated-PNNI[IPNNI]
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 7]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 8
`
`
`
`Internet Draft March 25th, 1996
`
` which takes both ATM level metric and IP level metric into account
` will be phased in in the future.
`
` In the CSR model, IP level routing determines an egress point of the
` ATM cloud as well as determines inter-subnet level path to the point
` that shows which CSRs it should pass through. ATM level routing
` determines an intra-subnet level path for ATM-VCs (both Dedicated-VC
` and Default-VC) only between adjacent nodes (CSRs or ATM-attached
` hosts/routers). Since the roles of routing are hierarchically
` subdevided into inter-subnet level (router level) and intra-subnet
` level (ATM SW level), ATM routing does not have to operate all over
` the ATM cloud but only in individual IP subnets independent from each
` other. This will decrease the amount of information for ATM routing
` protocol handling. But an end-to-end ATM path may not be optimal
` compared with the NHRP model since the path should go through routers
` at subnet boundaries in the CSR model.
`
` 2) Dynamic routing and redundancy support
`
` A CSR-based network can dynamically change routes for Bypass-pipes
` when related IP level routing information changes. Bypass-pipes
` related to the routing changes do not have to be torn down nor
` established from from scratch since intermediate CSRs related to IP
` routing changes can follow them and change routes for related
` Bypass-pipes by themselves.
`
` The same things apply when some error or outage happens in any ATM
` nodes/links/routers on the route of a Bypass-pipe. CSRs that have
` noticed such errors or outages would change routes for related
` Bypass-pipes by themselves.
`
` 3) Interoperability with IP level resource reservation protocols in
` multicast environments
`
` As current NHRP specification assumes application of NHRP to unicast
` environments only, multicast IP flows should still be carried based
` on a hop-by-hop manner with multicast routers. In addition,
` realization of IP level resource reservation protocols such as RSVP
` over NHRP environments requires further investigation.
`
` The CSR-based internetworking architecture which keeps subnet-by-
` subnet internetworking with regard to any control protocol sequence
` can provide multicast Bypass-pipes without requiring any
` modifications in IP multicast over ATM[ARM96] or multicast routing
` techniques. In addition, since the CSR can handle RSVP messages
` which are transmitted in a hop-by-hop manner, it can provide Bypass-
` pipes which satisfy QoS requirements by the cooperation of the RSVP
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 8]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 9
`
`
`
`Internet Draft March 25th, 1996
`
` and the Bypass-pipe control protocol.
`
`4. Control Architecture for CSR
`
` Several issues with regard to a control architecture for the CSR are
` discussed in this section.
`
`4.1 Network Reference Model
`
` In order to help understanding discussions in this section, the
` following network reference model is assumed. Source hosts S1, S2,
` and destination hosts D1, D2 are attached to Ethernets, while S3 and
` D3 are attached to the ATM. Routers R1 and R5 are attached to
` Ethernets only, while R2, R3 and R4 are attached to the ATM. The ATM
` datalink for subnet #3 and subnet #4 can either be physically
` separated datalinks or be the same datalink. In other words, R3 can
` be either one-port or multi-port router.
`
` Ether Ether ATM ATM Ether Ether
` | | +-----+ +-----+ | |
` | | | | | | | |
` S1--| S2---| S3---| | | |---D3 |---D2 |--D1
` | | | | | | | |
` |---R1---|---R2---| |--R3--| |---R4---|---R5---|
` | | | | | | | |
` | | +-----+ +-----+ | |
` subnet subnet subnet subnet subnet subnet
` #1 #2 #3 #4 #5 #6
`
` Figure 2 Network Reference Model
`
` Bypass-pipes can be configured [S3 or R2]-->R3-->[D3 or R4]. That
` means that S3, D3, R2, R3 and R4 need to speak Bypass-pipe control
` protocol, and means that R3 needs to be the CSR. We use term
` "Bypass-capable nodes" for hosts/routers which can speak Bypass-pipe
` control protocol but are not necessarily CSRs.
`
` As shown in this reference model, Bypass-pipe can be configured from
` host to host (S3-->R3-->D3), router to host (R2-->R3-->D3), host to
` router (S3-->R3-->R4), and router to router (R2-->R3-->R4).
`
`4.2 Possible Use of Bypass-pipe
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 9]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 10
`
`
`
`
`Internet Draft March 25th, 1996
`
` Possible use (or purposes) of Bypass-pipe provided by CSRs, in other
` words, possible triggers that initiate Bypass-pipe setup procedure,
` is discussed in this subsection.
`
` Following two purposes for Bypass-pipe setup are assumed at present;
`
`a) Provision of low latency path
`
` This indicates cases in which end hosts or routers initiate a
` Bypass-pipe setup procedure when they will transmit large amount of
` datagrams toward a specific destination. For instance,
`
` - End hosts or routers initiate Bypass-pipe setup procedures based
` on the measurement of IP datagrams transmitted toward a certain
` destination.
`
` - End hosts or routers initiate Bypass-pipe setup procedures when
` it detects datagrams with certain higher layer information such as
` TCP SYN-flag for ftp, nntp, http, etc.
`
` Other triggers may be possible depending on the policy in each
` network. In any case, the purpose of Bypass-pipe setup in each of
` these cases is to reduce IP processing burden at intermediate routers
` as well as to provide a communication path with low latency for burst
` data transfer, rather than to provide end host applications with
` specific bandwidth/QoS.
`
` There would be no rule for determining bandwidth for such kinds of
` Bypass-pipes since no explicit information about bandwidth/QoS
` requirement by end hosts is available without IP-level resource
` reservation protocols such as RSVP. Using UBR VCs as components of
` the Bypass-pipe would be the easiest choice although there is no
` guarantees for cell loss quality, while using other services such as
` CBR/VBR/ABR with an adequate parameter tuning would be possible.
`
`b) Provision of specific bandwidth/QoS requested by hosts
`
` This indicates cases in which routers or end hosts initiate a
` Bypass-pipe setup procedure by triggers related to IP-level
` bandwidth/QoS request from end hosts. The "resource management
` entity" in the host or router, which has received bandwidth/QoS
` requests from applications or adjacent nodes may choose to
` accommocate the requested IP flow to an existing VC or choose to
` allocate a new Dedicated-VC for the requested IP flow. Selecting
` the latter choice at each router can correspond to the trigger for
` constituting a Bypass-pipe. When both an incoming VC and an outgoing
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 10]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 11
`
`
`
`
`Internet Draft March 25th, 1996
`
` VC (or VCs) are dedicated to the same IP flow(s), those VCs can be
` concatenated at the CSR (ATM cut-through) to constitute a Bypass-
` pipe. Bandwidth for the Bypass-pipe (namely, individual VCs
` constituting the Bypass-pipe) in this case would be determined based
` on the bandwidth/QoS requirements by the end host which is conveyed
` by, e.g., RSVP messages. Which of the ATM service classes; e.g.,
` CBR/VBR/ABR; that would be selected depends on the IP-level service
` classes requested by the end hosts.
`
` Bypass-pipe provision for the purpose of b) will surely be beneficial
` in the near future when related IP-level resource reservation
` protocol will become available as well as when definitions of
` individual service classes and flow specs offered to applications
` become clear. On the other hand, Bypass-pipe setup for the purpose
` of a) may be beneficial right now since it does not require
` availability of IP-level resource reservation protocols. In that
` sense, a) can be regarded as a kind of short-term use while b) is a
` long-term use.
`
`4.3 Variations of Bypass-pipe Control Architecture
`
` A number of variations regarding Bypass-pipe control architecture
` are introduced. Items which are related to architectural variations
` are;
`
` o Ways of providing Dedicated-VCs
`
` o Channels for Bypass-pipe control message transfer
`
` o Bypass-pipe control procedures
`
` Each of these items are discussed below.
`
`4.3.1 Ways of Providing Dedicated-VCs
`
` There are roughly three alternatives regarding the way of providing
` Dedicated-VCs in individual IP subnets as components of a Bypass-
` pipe.
`
`a) On-demand SVC setup
`
` Dedicated-VCs are set up in individual IP subnets each time you want
` to set up a Bypass-pipe through the ATM signaling procedure. Each
` Dedicated-VC is released when the corresponding Bypass-pipe is
` released.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 11]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 12
`
`
`
`
`Internet Draft March 25th, 1996
`
`b) Picking up one from a bunch of (semi-)PVCs
`
` Several VCs are set up beforehand between CSR and CSR, or CSR and
` other ATM-attached nodes (hosts/router) in each IP subnet.
` Unused VC is picked up as a Dedicated-VC from these PVCs in each IP
` subnet when a Bypass-pipe is set up. Each VC turns into an idle
` state when the corresponding Bypass-pipe is released. A sort of
` "Unused VC list" will be managed by the peer nodes which share these
` PVCs.
`
`c) Picking up one VCI in PVP/SVP
`
` PVPs or SVPs are set up between CSR and CSR, or CSR and other ATM-
` attached nodes (hosts/routers) in each IP subnet. PVPs would be set
` up as a router/host initialization procedure, while SVPs, on the
` other hand, would be set up through ATM signaling when the first VC
` (either Default- or Dedicated-) setup request is initiated by either
` of some peer nodes. Then, Unused VCI value is picked up as a
` Dedicated-VC in the PVP/SVP in each IP subnet when a Bypass-pipe is
` set up. Each VC turns into an idle state when the corresponding
` Bypass-pipe is released. A sort of "Unused VC list" will be managed
` by the peer nodes which share the PVP/SVP. The SVP can be released
` through ATM signaling when no VCI value is in active state.
`
` The best choice will be a) with regard to efficient network resource
` usage. However, you may go through three steps, ATMARP (for unicast
` [RFC1577] or multicast[ARM96] in each IP subnet), SVC setup (in each
` IP subnet) and Bypass-pipe setup in this case. Whether a) is
` practical choice or not will depend on whether you can allow larger
` Bypass-pipe setup time due to three-step procedure mentioned above,
` or whether you can send datagrams over Default-VCs in a hop-by-hop
` manner while waiting for the Bypass-pipe set up.
`
` In the case of b) or c), the issue of Bypass-pipe setup time will be
` improved since SVC setup step can be skipped. In b), each node (CSR
` or ATM-attached host/router) should specify some traffic descriptors
` even for unused VCs, and the ATM datalink should reserve its desired
` resource (such as VCI value and bandwidth) for them. In addition,
` the ATM datalink may have to carry out UPC functions for those unused
` VCs. Such burden would be reduced when you use UBR-PVCs and set
` peak cell rate for each of them equal to link rate, but bandwidth/QoS
` for the Bypass-pipe is not provided in this case. In c), on the
` other hand, traffic descriptors which should be specified by each
` node for the ATM datalink is not each VC's but VP's only. Resource
` reservations for individual VCs will be carried out not as a
` functionality of the ATM datalink but of each CSR or ATM-attached
` host/router if necessary. A functionality which need to be provided
` by the ATM datalink is control of VPs' bandwidth only such as UPC and
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 12]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 13
`
`
`
`
`Internet Draft March 25th, 1996
`
` dynamic bandwidth negotiation if it is available.
`
`4.3.2 Channels for Bypass-pipe Control Message Transfer
`
` There are several alternatives regarding the channels for managing
` (setting up, releasing, and possibly changing route) a Bypass-pipe.
` This subsection explains these alternatives and discusses their
` properties.
`
` Three alternatives are discussed, Inband control message, Outband
` control message, and use of ATM signaling.
`
`i) Inband Control Message
`
` When setting up a Bypass-pipe, control messages are transmitted over
` a Dedicated-VC which will eventually be used as a component of the
` Bypass-pipe. These messages are handled at each CSR and forwarded
` over a Dedicated-VC along the selected route (based on IP routing
` table) for the requested Bypass-pipe. Unlike outband message
` protocol described in ii), each message does not have to indicate a
` Dedicated-VC which will be used since the message itself is carried
` over that VC.
`
` The inband control message can be either "datagram dedicated for
` Bypass-pipe control" or "actual IP datagram" sent by user
` application. Actual IP datagrams can be transmitted over Bypass-pipe
` after it has been set up in the former case. In the latter case, on
` the other hand, the first (or several) IP datagram(s) received from
` an unused Dedicated-V