throbber
Internet Draft March 25th, 1996
`
` Yasuhiro Katsube
` Ken-ichi Nagami
` Hiroshi Esaki
` (Toshiba R&D Center)
`
` Router Architecture Extensions for ATM : Overview
` <draft-katsube-router-atm-overview-02.txt>
`
`Status of this memo
`
` This document is an Internet-Draft. Internet-Drafts are working
` documents of the Internet Engineering task Force (IETF), its areas,
` and its working groups. Note that other groups may also distribute
` working documents as Internet-Drafts.
`
` Internet-Drafts are draft documents valid for a maximum of six months
` and may be updated, replaced, or obsoleted by other documents at any
` time. It is inappropriate to use Internet-Drafts as reference
` material or to cite them other than as "work in progress".
`
` To learn the current status of any Internet-Draft, please check the
` "1id-abstract.txt" listing contained in the Internet-Drafts Shadow
` Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
` munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
` ftp.isi.edu (US West Coast).
`
`Abstract
`
` This memo describes a new internetworking architecture which makes
` better use of the property of ATM. IP datagrams are transferred
` along hop-by-hop path via routers, but datagram assembly/disassembly
` and IP header processing are not necessarily carried out at
` individual routers in the proposed architecture. A concept of "Cell
` Switch Router (CSR)" is introduced as a new internetworking
` equipment, which has ATM cell switching capabilities in addition to
` conventional IP datagram forwarding. Proposed architecture can
` provide applications with high-throughput and low-latency ATM pipes
` while retaining current router-based internetworking concept. It
` also provides applications with specific QoS/bandwidth by
` cooperating with internetworking level resource reservation protocols
` such as RSVP.
`
`1. Introduction
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 1
`
`

`

`Katsube, et al. Expires Sept. 25th, 1996 [Page 1]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 2
`
`

`

`Internet Draft March 25th, 1996
`
` The Internet is growing both in its size and its traffic volume.
` In addition, recent applications often require guaranteed bandwidth
` and QoS rather than best effort. Such changes make the current
` hop-by-hop datagram forwarding paradigm inadequate, then accelerate
` investigations on new internetworking architectures.
`
` Roughly two distinct approaches can be seen as possible solutions;
` the use of ATM to convey IP datagrams, and the revision of IP to
` support flow concept and resource reservation. Integration or
` interworking of these approaches will be necessary to provide end
` hosts with high throughput and QoS guaranteed internetworking
` services over any datalink platforms as well as ATM.
`
` New internetworking architecture proposed in this draft is based on
` "Cell Switch Router (CSR)" which has the following properties.
`
` - It makes the best use of ATM's property while retaining current
` router-based internetworking and routing architecture.
`
` - It takes into account interoperability with future IP that
` supports flow concept and resource reservations.
`
` Section 2 of this draft explains background and motivations of our
` proposal. Section 3 describes an overview of the proposed
` internetworking architecture and its several remarkable features.
` Section 4 discusses control architectures for CSR, which will need to
` be further investigated.
`
`2. Background and Motivation
`
` It is considered that the current hop-by-hop best effort datagram
` forwarding paradigm will not be adequate to support future large
` scale Internet which accommodates huge amount of traffic with certain
` QoS requirements. Two major schools of investigations can be seen in
` IETF whose main purpose is to improve ability of the Internet with
` regard to its throughput and QoS. One is to utilize ATM technology
` as much as possible, and the other is to introduce the concept of
` resource reservation and flow into IP.
`
`1) Utilization of ATM
`
` Although basic properties of ATM; necessity of connection setup,
` necessity of traffic contract, etc.; is not necessarily suited to
` conventional IP datagram transmission, its excellent throughput and
` delay characteristics let us to investigate the realization of IP
` datagram transmission over ATM.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 2]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 3
`
`

`

`Internet Draft March 25th, 1996
`
` A typical internetworking architecture specified by the IETF
` IPoverATM WG is the "Classical IP Model"[RFC1577]. This model allows
` direct ATM connectivities only between nodes that share the same IP
` address prefix. IP datagrams should traverse routers whenever they
` go beyond IP subnet boundaries even though their source and
` destination are accommodated in the same ATM cloud. Although an
` ATMARP is introduced which is not based on legacy datalink broadcast
` but on centralized ATMARP servers, this model does not require
` drastic changes to the legacy internetworking architectures with
` regard to the IP datagram forwarding process. This model still has
` problems of limited throughput and large latency, compared with the
` ability of ATM, due to IP header processing at every router. It will
` become more critical when multimedia applications that require much
` larger bandwidth and lower latency become dominant in the near
` future.
`
` Another internetworking model is currently under discussion in the
` IETF ROLC WG[KAT95]. The model, that we call "NHRP (Next Hop
` Resolution Protocol) Model" here, aims at resolving throughput and
` latency problems in the Classical IP Model and making the best use of
` ATM. ATM connections can be directly established from an ingress
` point to an egress point of an ATM cloud even when they do not share
` the same IP address prefix. In order to enable it, the Next Hop
` Server[KAT95] is introduced which can find an egress point of the ATM
` cloud nearest to the given destination and resolves its ATM address.
` A sort of query/response protocols between the server(s) and clients
` and possibly server and server will be specified. After the ATM
` address of a desired egress point is resolved, the client
` establishes a direct ATM connection to that point through ATM
` signaling procedures.[ATM3.1] Once a direct ATM connection has been
` set up through this procedure, IP datagrams do not have to experience
` hop-by-hop IP processing but can be transmitted over the direct ATM
` connection. Therefore, high throughput and low latency
` communications become possible even if they go beyond IP subnet
` boundaries. It should be noted that the provision of such direct ATM
` connections does not mean disappearance of legacy routers which
` interconnect distinct ATM-based IP subnets. For example, hop-by-hop
` IP datagram forwarding function would still be required in the
` following cases:
`
` - When you want to transmit IP datagrams before direct ATM connection
` from an ingress point to an egress point of the ATM cloud is
` established
`
` - When you neither require a certain QoS nor transmit large amount of
` IP datagrams for some communication
`
` - When the direct ATM connection is not allowed by security or policy
` reasons
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 3]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 4
`
`

`

`Internet Draft March 25th, 1996
`
`2) IP level resource reservation and flow support
`
` Apart from investigation on specific datalink technology such as ATM,
` resource reservation technologies for desired IP level flows have
` been studied and are still under discussion. Their typical examples
` are RSVP[BRADEN96] and STII[RFC1819].
`
` RSVP itself is not a connection oriented technology since datagrams
` can be transmitted regardless of the result of the resource
` reservation process. After a resource reservation process from a
` receiver (or receivers) to a sender (or senders) is successfully
` completed, RSVP-capable routers along the path of the flow reserve
` their resources for datagram forwarding according to the requested
` flow spec.
`
` STII is regarded as a connection oriented IP which requires
` connection setup process from a sender to a receiver (or receivers)
` before transmitting datagrams. STII-capable routers along the path
` of the requested connection reserve their resources for datagram
` forwarding according to the flow spec.
`
` Neither RSVP nor STII restrict underlying datalink networks since
` their primary purpose is to let routers provide each IP flow with
` desired forwarding quality (by controlling their datagram scheduling
` rules). Since various datalink networks will coexist as well as ATM
` in the future, these IP level resource reservation technologies would
` be necessary in order to provide end-to-end IP flow with desired
` bandwidth and QoS.
`
` Taking this background into consideration, we should be aware of
` several issues which motivate our proposal.
`
` - As of the time of writing, the ATM specific internetworking
` architecture proposed does not take into account interoperability
` with IP level resource reservation or connection setup protocols.
` In particular, operating RSVP in the NHRP-based ATM cloud seems to
` require much effort since RSVP is a soft-state receiver-oriented
` protocol with multicast capability as a default, while ATM with
` NHRP is a hard-state sender-oriented protocol which does not
` support multicast yet.
`
` - Although RSVP or STII-based routers will provide each IP flow with
` a desired bandwidth and QoS, they have some native throughput
` limitations due to the processor-based IP forwarding mechanism
` compared with the switching mechanism of ATM.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 4]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 5
`
`

`

`Internet Draft March 25th, 1996
`
` The main objective of our proposal is to resolve the above issues.
` The proposed internetworking architecture makes the best use of the
` property of ATM by extending legacy routers to handle future IP
` features such as flow support and resource reservation with the help
` of ATM's cell switching capabilities.
`
`3. Internetworking Architecture Based On the Cell Switch Router (CSR)
`
`3.1 Overview
`
` The Cell Switch Router (CSR) is a key network element of the proposed
` internetworking architecture. The CSR provides cell switching
` functionality in addition to conventional IP datagram forwarding.
` Communications with high throughput and low latency, that are native
` properties of ATM, become possible by using this cell switching
` functionality even when the communications pass through IP subnetwork
` boundaries. In an ATM internet composed of CSRs, VPI/VCI-based cell
` switching which bypasses datagram assembly/disassembly and IP header
` processing is possible at every CSR for communications which lend
` themselves to such (e.g., communications which require certain amount
` of bandwidth and QoS), while hop-by-hop datagram forwarding based on
` the IP header is also possible at every CSR for other conventional
` communications.
`
` By using such cell-level switching capabilities, the CSR is able to
` concatenate incoming and outgoing ATM VCs, although the concatenation
` in this case is controlled outside the ATM cloud (ATM's control/
` management-plane) unlike conventional ATM switch nodes. That is, the
` CSR is attached to ATM networks via an ATM-UNI instead of NNI. By
` carrying out such VPI/VCI concatenations at multiple CSRs
` consecutively, ATM level connectivity composed of multiple ATM VCs,
` each of which connects adjacent CSRs (or CSR and hosts/routers), can
` be provided. We call such an ATM pipe "ATM Bypass-pipe" to
` differentiate it from "ATM VCC (VC connection)" provided by a single
` ATM datalink cloud through ATM signaling.
`
` Example network configurations based on CSRs are shown in figure 1.
` An ATM datalink network may be a large cloud which accommodates
` multiple IP subnets X, Y and Z. Or several distinct ATM datalinks
` may accommodate single IP subnet X, Y and Z respectively[OHTA95].
` The latter configuration would be straightforward in discussing the
` CSR, but the CSR is also applicable to the former configuration as
` well. In addition, the CSR would be applicable as a router which
` interconnects multiple NHRP-based ATM clouds.
`
` Two different kinds of ATM VCs are defined between adjacent CSRs or
` between CSR and ATM-attached hosts/routers.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 5]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 6
`
`

`

`Internet Draft March 25th, 1996
`
`1) Default-VC
`
` It is a general purpose VC used by any communications which select
` conventional hop-by-hop IP routed paths. All incoming cells received
` from this VC are assembled to IP datagrams and handled based on their
` IP headers. VCs set up in the Classical IP Model are classified into
` this category.
`
`2) Dedicated-VC
`
` It is used by specific communications (IP flows) which are specified
` by, for example, any combination of the destination IP address/port,
` the source IP address/port or IPv6 flow label. It can be
` concatenated with other Dedicated-VCs which accommodate the same IP
` flow as it, and can constitute an ATM Bypass-pipe for those IP flows.
`
` Ingress/egress nodes of the Bypass-pipe can be either CSRs or ATM-
` attached routers/hosts both of which speak a Bypass-pipe control
` protocol. (we call that "Bypass-capable nodes") On the other hand,
` intermediate nodes of the Bypass-pipe should be CSRs since they need
` to have cell switching capabilities as well as speak the Bypass-pipe
` control protocol.
`
` The route for a Bypass-pipe follows IP routing information in each
` CSR. In figure 1, IP datagrams from a source host or router X.1 to
` a destination host or router Z.1 are transferred over the route X.1
` -> CSR1 -> CSR2 -> Z.1 regardless of whether the communication is
` on a hop-by-hop basis or Bypass-pipe basis. Routes for individual
` Dedicated-VCs which constitutes the Bypass-pipe X.1 --> Z.1 (X.1 ->
` CSR1, CSR1 -> CSR2, CSR2 -> Z.1) would be determined based on ATM
` routing protocols such as PNNI[PNNI95], and would be independent of
` IP level routing.
`
` An example of IP datagram transmission mechanism is as follows.
`
` o The host/router X.1 checks an identifier of each IP datagram,
` which may be the "destination IP address (prefix)",
` "source/destination IP address (prefix) pair", "destination IP
` address and port", "source IP address and Flow label (in IPv6)",
` and so on. Based on either of those identifiers, it determines
` over which VC the datagram should be transmitted.
`
` o The CSR1/2 checks the VPI/VCI value of each incoming cell. When
` the mapping from the incoming interface/VPI/VCI to outgoing
` interface/VPI/VCI is found in an ATM routing table, it is directly
` forwarded to the specified interface through an ATM switch module.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 6]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 7
`
`

`

`Internet Draft March 25th, 1996
`
` When the mapping in not found in the ATM routing table (or the
` table shows an IP module as an output interface), the cell is
` assembled to an IP datagram and then forwarded to an appropriate
` outgoing interface/VPI/VCI based on an identifier of the datagram.
`
` IP subnet X IP subnet Y IP subnet Z
` <---------------------> <-----------------> <--------------------->
`
` +-------+ Default +-------+ Default +-------+ Default +-------+
` | | -VC | CSR 1 | -VC | CSR 2 | -VC | |
` | Host +=============+ +===============+ +=============+ Host |
` | X.1 +-------------+++++---------------+++++-------------+ Z.1 |
` | +-------------+++++---------------+++++-------------+ |
` | +-------------+++++---------------+++++-------------+ |
` | |Dedicated | | Dedicated | |Dedicated | |
` +-------+ -VCs +-------+ -VCs +-------+ -VCs +-------+
` <--------------------------------------------------->
` Bypass-pipe
`
` Figure 1 Internetworking Architecture based on CSR
`
`3.2 Features
`
` The main feature of the CSR-based internetworking architecture is the
` same as that of the NHRP-based architecture in the sense that they
` both provide direct ATM level connectivity beyond IP subnet
` boundaries. There are, however, several notable differences in the
` CSR-based architecture compared with the NHRP-based one as follows.
`
` 1) Relationship between IP routing and ATM routing
`
` In the NHRP model, an egress point of the ATM network is first
` determined in the next hop resolution phase based on IP level routing
` information. Then the actual route for an ATM-VC to the obtained
` egress point is determined in the ATM connection setup phase based on
` ATM level routing information. Both kinds of routing information
` would be calculated according to factors such as network topology and
` available bandwidth for the large ATM cloud. The ATM routing will be
` based on PNNI phase1[PNNI] while the IP routing will be based on
` OSPF, BGP, IS-IS, etc. We need to manage two different routing
` protocols over the large ATM cloud until Integtrated-PNNI[IPNNI]
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 7]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 8
`
`

`

`Internet Draft March 25th, 1996
`
` which takes both ATM level metric and IP level metric into account
` will be phased in in the future.
`
` In the CSR model, IP level routing determines an egress point of the
` ATM cloud as well as determines inter-subnet level path to the point
` that shows which CSRs it should pass through. ATM level routing
` determines an intra-subnet level path for ATM-VCs (both Dedicated-VC
` and Default-VC) only between adjacent nodes (CSRs or ATM-attached
` hosts/routers). Since the roles of routing are hierarchically
` subdevided into inter-subnet level (router level) and intra-subnet
` level (ATM SW level), ATM routing does not have to operate all over
` the ATM cloud but only in individual IP subnets independent from each
` other. This will decrease the amount of information for ATM routing
` protocol handling. But an end-to-end ATM path may not be optimal
` compared with the NHRP model since the path should go through routers
` at subnet boundaries in the CSR model.
`
` 2) Dynamic routing and redundancy support
`
` A CSR-based network can dynamically change routes for Bypass-pipes
` when related IP level routing information changes. Bypass-pipes
` related to the routing changes do not have to be torn down nor
` established from from scratch since intermediate CSRs related to IP
` routing changes can follow them and change routes for related
` Bypass-pipes by themselves.
`
` The same things apply when some error or outage happens in any ATM
` nodes/links/routers on the route of a Bypass-pipe. CSRs that have
` noticed such errors or outages would change routes for related
` Bypass-pipes by themselves.
`
` 3) Interoperability with IP level resource reservation protocols in
` multicast environments
`
` As current NHRP specification assumes application of NHRP to unicast
` environments only, multicast IP flows should still be carried based
` on a hop-by-hop manner with multicast routers. In addition,
` realization of IP level resource reservation protocols such as RSVP
` over NHRP environments requires further investigation.
`
` The CSR-based internetworking architecture which keeps subnet-by-
` subnet internetworking with regard to any control protocol sequence
` can provide multicast Bypass-pipes without requiring any
` modifications in IP multicast over ATM[ARM96] or multicast routing
` techniques. In addition, since the CSR can handle RSVP messages
` which are transmitted in a hop-by-hop manner, it can provide Bypass-
` pipes which satisfy QoS requirements by the cooperation of the RSVP
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 8]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 9
`
`

`

`Internet Draft March 25th, 1996
`
` and the Bypass-pipe control protocol.
`
`4. Control Architecture for CSR
`
` Several issues with regard to a control architecture for the CSR are
` discussed in this section.
`
`4.1 Network Reference Model
`
` In order to help understanding discussions in this section, the
` following network reference model is assumed. Source hosts S1, S2,
` and destination hosts D1, D2 are attached to Ethernets, while S3 and
` D3 are attached to the ATM. Routers R1 and R5 are attached to
` Ethernets only, while R2, R3 and R4 are attached to the ATM. The ATM
` datalink for subnet #3 and subnet #4 can either be physically
` separated datalinks or be the same datalink. In other words, R3 can
` be either one-port or multi-port router.
`
` Ether Ether ATM ATM Ether Ether
` | | +-----+ +-----+ | |
` | | | | | | | |
` S1--| S2---| S3---| | | |---D3 |---D2 |--D1
` | | | | | | | |
` |---R1---|---R2---| |--R3--| |---R4---|---R5---|
` | | | | | | | |
` | | +-----+ +-----+ | |
` subnet subnet subnet subnet subnet subnet
` #1 #2 #3 #4 #5 #6
`
` Figure 2 Network Reference Model
`
` Bypass-pipes can be configured [S3 or R2]-->R3-->[D3 or R4]. That
` means that S3, D3, R2, R3 and R4 need to speak Bypass-pipe control
` protocol, and means that R3 needs to be the CSR. We use term
` "Bypass-capable nodes" for hosts/routers which can speak Bypass-pipe
` control protocol but are not necessarily CSRs.
`
` As shown in this reference model, Bypass-pipe can be configured from
` host to host (S3-->R3-->D3), router to host (R2-->R3-->D3), host to
` router (S3-->R3-->R4), and router to router (R2-->R3-->R4).
`
`4.2 Possible Use of Bypass-pipe
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 9]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 10
`
`

`

`
`Internet Draft March 25th, 1996
`
` Possible use (or purposes) of Bypass-pipe provided by CSRs, in other
` words, possible triggers that initiate Bypass-pipe setup procedure,
` is discussed in this subsection.
`
` Following two purposes for Bypass-pipe setup are assumed at present;
`
`a) Provision of low latency path
`
` This indicates cases in which end hosts or routers initiate a
` Bypass-pipe setup procedure when they will transmit large amount of
` datagrams toward a specific destination. For instance,
`
` - End hosts or routers initiate Bypass-pipe setup procedures based
` on the measurement of IP datagrams transmitted toward a certain
` destination.
`
` - End hosts or routers initiate Bypass-pipe setup procedures when
` it detects datagrams with certain higher layer information such as
` TCP SYN-flag for ftp, nntp, http, etc.
`
` Other triggers may be possible depending on the policy in each
` network. In any case, the purpose of Bypass-pipe setup in each of
` these cases is to reduce IP processing burden at intermediate routers
` as well as to provide a communication path with low latency for burst
` data transfer, rather than to provide end host applications with
` specific bandwidth/QoS.
`
` There would be no rule for determining bandwidth for such kinds of
` Bypass-pipes since no explicit information about bandwidth/QoS
` requirement by end hosts is available without IP-level resource
` reservation protocols such as RSVP. Using UBR VCs as components of
` the Bypass-pipe would be the easiest choice although there is no
` guarantees for cell loss quality, while using other services such as
` CBR/VBR/ABR with an adequate parameter tuning would be possible.
`
`b) Provision of specific bandwidth/QoS requested by hosts
`
` This indicates cases in which routers or end hosts initiate a
` Bypass-pipe setup procedure by triggers related to IP-level
` bandwidth/QoS request from end hosts. The "resource management
` entity" in the host or router, which has received bandwidth/QoS
` requests from applications or adjacent nodes may choose to
` accommocate the requested IP flow to an existing VC or choose to
` allocate a new Dedicated-VC for the requested IP flow. Selecting
` the latter choice at each router can correspond to the trigger for
` constituting a Bypass-pipe. When both an incoming VC and an outgoing
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 10]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 11
`
`

`

`
`Internet Draft March 25th, 1996
`
` VC (or VCs) are dedicated to the same IP flow(s), those VCs can be
` concatenated at the CSR (ATM cut-through) to constitute a Bypass-
` pipe. Bandwidth for the Bypass-pipe (namely, individual VCs
` constituting the Bypass-pipe) in this case would be determined based
` on the bandwidth/QoS requirements by the end host which is conveyed
` by, e.g., RSVP messages. Which of the ATM service classes; e.g.,
` CBR/VBR/ABR; that would be selected depends on the IP-level service
` classes requested by the end hosts.
`
` Bypass-pipe provision for the purpose of b) will surely be beneficial
` in the near future when related IP-level resource reservation
` protocol will become available as well as when definitions of
` individual service classes and flow specs offered to applications
` become clear. On the other hand, Bypass-pipe setup for the purpose
` of a) may be beneficial right now since it does not require
` availability of IP-level resource reservation protocols. In that
` sense, a) can be regarded as a kind of short-term use while b) is a
` long-term use.
`
`4.3 Variations of Bypass-pipe Control Architecture
`
` A number of variations regarding Bypass-pipe control architecture
` are introduced. Items which are related to architectural variations
` are;
`
` o Ways of providing Dedicated-VCs
`
` o Channels for Bypass-pipe control message transfer
`
` o Bypass-pipe control procedures
`
` Each of these items are discussed below.
`
`4.3.1 Ways of Providing Dedicated-VCs
`
` There are roughly three alternatives regarding the way of providing
` Dedicated-VCs in individual IP subnets as components of a Bypass-
` pipe.
`
`a) On-demand SVC setup
`
` Dedicated-VCs are set up in individual IP subnets each time you want
` to set up a Bypass-pipe through the ATM signaling procedure. Each
` Dedicated-VC is released when the corresponding Bypass-pipe is
` released.
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 11]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 12
`
`

`

`
`Internet Draft March 25th, 1996
`
`b) Picking up one from a bunch of (semi-)PVCs
`
` Several VCs are set up beforehand between CSR and CSR, or CSR and
` other ATM-attached nodes (hosts/router) in each IP subnet.
` Unused VC is picked up as a Dedicated-VC from these PVCs in each IP
` subnet when a Bypass-pipe is set up. Each VC turns into an idle
` state when the corresponding Bypass-pipe is released. A sort of
` "Unused VC list" will be managed by the peer nodes which share these
` PVCs.
`
`c) Picking up one VCI in PVP/SVP
`
` PVPs or SVPs are set up between CSR and CSR, or CSR and other ATM-
` attached nodes (hosts/routers) in each IP subnet. PVPs would be set
` up as a router/host initialization procedure, while SVPs, on the
` other hand, would be set up through ATM signaling when the first VC
` (either Default- or Dedicated-) setup request is initiated by either
` of some peer nodes. Then, Unused VCI value is picked up as a
` Dedicated-VC in the PVP/SVP in each IP subnet when a Bypass-pipe is
` set up. Each VC turns into an idle state when the corresponding
` Bypass-pipe is released. A sort of "Unused VC list" will be managed
` by the peer nodes which share the PVP/SVP. The SVP can be released
` through ATM signaling when no VCI value is in active state.
`
` The best choice will be a) with regard to efficient network resource
` usage. However, you may go through three steps, ATMARP (for unicast
` [RFC1577] or multicast[ARM96] in each IP subnet), SVC setup (in each
` IP subnet) and Bypass-pipe setup in this case. Whether a) is
` practical choice or not will depend on whether you can allow larger
` Bypass-pipe setup time due to three-step procedure mentioned above,
` or whether you can send datagrams over Default-VCs in a hop-by-hop
` manner while waiting for the Bypass-pipe set up.
`
` In the case of b) or c), the issue of Bypass-pipe setup time will be
` improved since SVC setup step can be skipped. In b), each node (CSR
` or ATM-attached host/router) should specify some traffic descriptors
` even for unused VCs, and the ATM datalink should reserve its desired
` resource (such as VCI value and bandwidth) for them. In addition,
` the ATM datalink may have to carry out UPC functions for those unused
` VCs. Such burden would be reduced when you use UBR-PVCs and set
` peak cell rate for each of them equal to link rate, but bandwidth/QoS
` for the Bypass-pipe is not provided in this case. In c), on the
` other hand, traffic descriptors which should be specified by each
` node for the ATM datalink is not each VC's but VP's only. Resource
` reservations for individual VCs will be carried out not as a
` functionality of the ATM datalink but of each CSR or ATM-attached
` host/router if necessary. A functionality which need to be provided
` by the ATM datalink is control of VPs' bandwidth only such as UPC and
`
`Katsube, et al. Expires Sept. 25th, 1996 [Page 12]
`
`CISCO Exhibit 1008
`Cisco v. Bockstar
`Trial IPR2014 - 13
`
`

`

`
`Internet Draft March 25th, 1996
`
` dynamic bandwidth negotiation if it is available.
`
`4.3.2 Channels for Bypass-pipe Control Message Transfer
`
` There are several alternatives regarding the channels for managing
` (setting up, releasing, and possibly changing route) a Bypass-pipe.
` This subsection explains these alternatives and discusses their
` properties.
`
` Three alternatives are discussed, Inband control message, Outband
` control message, and use of ATM signaling.
`
`i) Inband Control Message
`
` When setting up a Bypass-pipe, control messages are transmitted over
` a Dedicated-VC which will eventually be used as a component of the
` Bypass-pipe. These messages are handled at each CSR and forwarded
` over a Dedicated-VC along the selected route (based on IP routing
` table) for the requested Bypass-pipe. Unlike outband message
` protocol described in ii), each message does not have to indicate a
` Dedicated-VC which will be used since the message itself is carried
` over that VC.
`
` The inband control message can be either "datagram dedicated for
` Bypass-pipe control" or "actual IP datagram" sent by user
` application. Actual IP datagrams can be transmitted over Bypass-pipe
` after it has been set up in the former case. In the latter case, on
` the other hand, the first (or several) IP datagram(s) received from
` an unused Dedicated-V

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket