Title of Invention

"A PROVISIONING METHOD, SYSTEM AND APPARATUS FOR A COMMUNICATION NETWORK"

Abstract In the area of network provisioning, there is a problem of selecting a suitable traffic-provisioning model for large networks due to the high management complexity of the resource-efficient trunk model and the poor bandwidth efficiency of the easy-to-configure hose model. The invention is based on the idea of partioning (S1) at least part of the network into multi-node clusters, and defining (S2) traffic limitations on at least two levels, including the intra-cluster level and the inter-cluster level, where the traffic limitations include one or more node-to-cluster traffic limitations for inter-cluster traffic. Subsequently, cluster-based provisioning (S3) of the network is performed based on the traffic limitations. The novel node-to-cluster limitations proposed by the invention are preferably applied in a cluster-based trunk or hose model on the inter-cluster level. In other words, for the description of the inter-cluster traffic (traffic between the clusters) cluster-based trunk or hose models can be used preferably depending on the available information about the traffic. The cluster-based provisioning makes it possible to find a trade-off between management complexity and over provisioning.
Full Text TECHNICAL FIELD
The present invention generally relates to network provisioning for networks such as mobile core networks and Virtual Private Networks (VPNs), and more particularly to dimensioning and admission control in such networks.
BACKGROUND
Network provisioning generally relates to resource allocation and management in a network and often includes issues such as admission control and/or dimensioning of the network.
A substantial tendency is that the number of network nodes that form a network is growing fast, resulting in a large, complex network structure and virtual topology. In parallel with this tendency, the traffic volume between the network nodes is also growing continuously and is often difficult to predict. Traffic between nodes is also hard to measure because of the large number of nodes and traffic trunks. Therefore, the calculation of the traffic matrix is very complicated. In most of the cases it is not even possible to calculate the traffic matrix. Furthermore, the degree of traffic changes, requiring reconfiguration of the network, is also very hard to forecast.
The area of resource management includes some currently open problems. To achieve good network utilization, the best possible characterization of the customer's traffic flows is required. Supporting a variety of customer applications typically requires a Service Level Agreement (SLA) between the network provider and the customer, specifying the Quality of Service (QoS) and bandwidth requirements. Currently there are two ways to define the SLA and exercise admission control, namely the trunk-based (customer-pipe) model and the hose-based model, which both are static models.
Admission control is an essential component of any network provisioning architecture, and is generally a question of controlling the number of connections that utilize a given set of resources in a communication network, thereby ensuring that admitted connections

of Service (QoS)
have access to the resources that are required to fulfil their Quality
requirements. On the link level, admission control normally serves to restrict the number of connections simultaneously present on a transport link in the network. This means that new connections may be rejected in order to protect connections that are already admitted for transport over the link.

complex, and for UMTS), Virtual
main problem is to ame time fulfils
The issue of connection admission control is generally quite networks such as Universal Mobile Telecommunications System Private Networks (VPNs) and similar communication networks the find an efficient admission control strategy that works and at the practical requirements such as limited complexity and high accuracy.

network is to to specify the ir. This model,
Trunk model
A simple service model, or traffic provisioning model, for a transport emulate the private line service. This would require a client nodp bandwidth requirement between every possible source-destination pair the trunk model, is depicted in Fig. 1.

When a transport network is based on the trunk model, then a mesh of trunks is created, each trunk extending from one customer endpoint to another. A customer endpoint must maintain a logical interface for each of its trunks. In the context of a UMTS core transport network for example, the customer endpoint is typically a Media Gateway (MGW) or equivalent node.

For the trunk model it is normally expected to give the point-to-point

traffic demands.

In other words, the specification of the traffic matrix is needed. This miodel enables the network provider to utilize the network in the best way, since the known traffic matrix

and routing strategy exactly determine the required link capacities. On the other hand, a critical part of this model is that the communication pattern between the end-points is very difficult to describe. It is a justified assumption that the network provider has very limited information about the traffic matrix, and the customer is unable to exactly predict and define the loads between the nodes. Consequently, in case of an unknown traffic matrix, the application of the trunk or customer-pipe model is quite limited, especially in the VPN context. Another problem with this model is the significant management complexity. In each node, incoming and outgoing traffic description parameters have to be defined for each associated node to define the required capacities in relation to the associated nodes. In case of a full mesh logical network, the sum of parameters to be configured is proportional to the square of the number N of nodes in the considered network or part of the network.
In
set speci
Hose model
the hose model, which is another traffic provisioning model, a customer specifies a of endpoints to be connected. The connectivity between endpoints in the network is fied by a hose, comprising:

The
capacity required for aggregate outgoing traffic from the endpoint into the rk (to the other end-points),
networ.
The capacity required for aggregate incoming traffic from the network to the endpoint (from the other end-points).

When transport
en
2 shows
network dimensioning is based on the hose model, then a customer dpoint maintains just one logical interface, a hose, to the provider access router. Fig. exemplary implementation of a hose using edge-to-edge pipes.
Using the hose model, the traffic matrix is not required, only the incoming and outgoing traffic volumes need to be known for each node. These traffic parameters can

model. Thus, the but it is not so uncertainty in that the worst case traffic etwork. From the significantly less incoming and outgoing parameters to be
be measured or predicted in a more exact way compared to the trunk hose model is very attractive from the viewpoint of the customer, advantageous for the network provider since it implies traffic sink nodes are not known. The network must be dimensioned for the distribution, winch may cause significant overdimensioning in the n viewpoint of management complexity, the hose model requires parameters than the trunk model. Since only the aggregated i traffic volumes have to be defined in each node, the number of configured is proportional to the number of nodes in the network.

Based Admission i-to-end [1] and [2]. In
admission control packet flows per Transfer Protocol gestion in the IP out-of-sequence
the remote site in ays are likely to
Measurement Based Admission Control
Yet another type of traffic provisioning model is Measurement
Control (MB AC). In particular, drop-based MB AC, winch is an example of end
measurement based admission control, is known from references
MBAC, a node measures the network performance to guide the
decisions. For example, the data receiver monitors the user plane
remote site and detects dropped packets by comparing the Real-time
(RTF) sequence numbers. A dropped packet is an indication of con
backbone and RTF provides a mechanism to detect dropped or
packets. The node admits a new call only if the loss rate towards
question is below a given threshold value. Given that the queuing de
be quite small, the quality of service is measured strictly in terms of packet loss

in multiple-fault ocks further calls
Admission control decisions in the case of measurement-based provisioning are always based on the actual performance of the network, so all unexpected situations
are handled properly. For example, if congestion occurs on a link situations then packet loss is measured in the data receiver, winch bl until the congestion disappears.

However, may not be network of applications
measurement-based admission control has the drawback that proper QoS guaranteed if the drop requirement is strict, for example in the backbone UMTS system. Tins may prevent the use of drop-based MB AC in many

features
The main table below.

of the prior art traffic provisioning models are summarized in the

(Table Removed)


In summary,

static admission control can be based on trunk or hose models.

The trunk defined in way, resulting a lot
sink nodes fast, actually therefore car the network, other nodes, is not
the
model, where admission control is based on virtual point-to-point trunks nodes, enables the network provider to utilize the network in the best in more effective network operation. However, the trunk model requires of configuration parameters in all nodes to describe the traffic towards the other according to the SLA. The complexity of the trunk configuration grows it is proportional to the square of the number of network nodes, and generally not be used in a large-scale network. If a new node is added to a new trunk must be defined and configured with a capacity limit in all Another important problem with the trunk model is that the traffic matrix or just partly known. On the other hand, the main advantage of the trunk model

is that it offers the best bandwidth efficiency among the available methods.

static provisioning

not check the incoming and . Furthermore, . The major overdimensioning in is very simple; a new node is s not affected, that of the trunk
way.
Using the hose model, where admission control in the nodes does destination of the calls, the configuration is much simpler. Only outgoing traffic description entries need to be configured in the nodes the hose parameters can be measured or predicted in a simple drawback of the hose model is that it normally causes significant the network. Configuration of network nodes in the case of hose mode in fact only two parameters should be configured in each node. When added to the system, then the configuration of the other nodes However, bandwidth efficiency of the hose model is worse than model.

Therefore, there could be large core networks, large VPNs or other

large networks

where neither trunk nor hose provisioning is applicable due to management complexity or poor bandwidth efficiency, respectively.
RELATED ART
In the literature, papers dealing with hose or trunk model based network dimensioning can be found.
The main concept of the hose model has long been present in the literature under the theory of "non-blocking networks". For example, reference [3] presents a network design methodology based on just the same resource-provisioning concept as the hose model.
Reference [4] presents an analysis of the bandwidth efficiency of the pose model for provisioning IP Virtual Private Networks. The evaluation is based on trace-driven

network.
different
traditional
overprovi
network.
simulations of traffic derived from a voice network and from a large corporate They provide numerical results for network-wide capacity demand for lose realizations. The comparison of the bandwidth efficiency of the pipe and hose models is limited to the access links, although the real sioning required by the hose model will be present witinn the backbone

In reference be based hoses (dif erent capacities
on
[5] it is argued that an optimal cost solution for hose realizations should a tree topology, and it is proved that the general problem with asymmetric amount of traffic sent and received by the hose) and constrained link is NP-hard (NP, Non-Polynomial). In view thereof, approximation algorithms' with provable performance bounds were presented in [5].

The most winch pro

recent important contribution in tins field can be found in reference [6], oses restoration algorithms to improve the tree-based hose realization.

case of tree the size of model for LSPs. CSPF.
gives
Reference [7] provides a detailed comparison of the resource efficiency of the hose and the trunk resource allocation models. It was concluded that the overprovisioning factor of the hose model can be reasonably low for smaller networks (especially in the routing). However, the overprovisioning factor increases considerably with the network in the case of shortest path routing. It is shown that the hose poor bandwidth efficiency if it is combined with bandwidth reservation Its bandwidth efficiency is further degraded when routing is done with

A number
Reference related to

of representative papers regarding the trunk model are given below.
[8] provides a detailed survey of various possible network design tasks the trunk model. A general framework is proposed and several special cases

that are relevant in the design of telecommunication networks are method is also able to handle different cost models.

identified. The

References [9], [10] and [11] concern methods to solve various telecommunication network design tasks.

Other heuristics were proposed in reference [12] for designing networks.

failure-tolerant

Further references [13], [14], [15] and [16] deal with the questions of designing Virtual Private Networks with or without failure protection capability.
A common attribute of all the above trunk reservation methods is that they do not take the complexity of the configuration into the account but they aim at designing networks requiring least capacity devices.

admission control o-end resource in inerarcincal scenario The in order establish traffic on a full traffic
ISP
In reference [17], the objective is to implement existing connection (CAC) in a distributed control arcintecture to regulate end-1 provisioning over IP networks. The proposed technique is applicabl networks based on basic domains, especially for the multiple technique is based on the traditional trunk model and clustering is employed to make it possible to implement the distributed CAC method and to aggregation. In particular, they use an admission control strategy based matrix with an aggregate reservation based on a Gaussian traffic predictor
SUMMARY OF THE INVENTION
It is a general object of the invention to provide an improved network provisioning strategy.

It is an well as

object of the invention to provide a new efficient admission control strategy, as a corresponding network dimensioning mechanism.



It is a at the


same
particular object to provide a scalable (in terms of management complexity) and time resource-efficient admission control and dimensioning strategy.

It is a specific object to provide an improved method and arrangement for provisioning
commu lication networks.

can
It is another tinngs
specific object to provide a design and/or support tool that among other be used for network dimensioning purposes.

Yet another specific object of the invention is to provide a novel admission controller for operation in a communication network.
In the prior art, as we have seen, there is a general problem of selecting a suitable traffic provisioning model for large networks due to the ingh management complexity of the re source-efficient trunk model and the poor bandwidth efficiency of the easy-to-configure hose model.
The invention is based on the idea of partitioning at least part of the network into

clusters,
where each cluster has at least two nodes, and defining traffic limitations on
at least two levels, including the intra-cluster level and the inter-cluster level, where the traffic limitations include one or more novel node-to-cluster traffic limitations for the inter-cluster traffic. Finally, cluster-based provisioning of the network is performed based on the defined traffic limitations. Using cluster-based provisioning in tins way makes it possible to find an optimal equilibrium or trade-off between management complexity and overprovisioning.

s, winle in the tations. In the to one or more sion "node-to-given cluster, of general, the
In the traditional trunk model there are node-to-node traffic limitatioi traditional hose model there are only node-to-anywhere traffic lim model proposed by the invention, the traffic can (also) be subjected node-to-cluster limitations. It should be understood that the expre cluster limitation" normally means a limitation, for a given node in a the amount of traffic in relation to at least one other cluster. 1 limitation(s) may be related to traffic in the incoming and/or outgoing direction.

invention are model on •-cluster traffic
can be used, s also possible
or inter-trunk
The novel node-to-cluster limitation or limitations proposed by th preferably applied in a so-called cluster-based trunk or a cluster-based hose the inter-cluster level. In other words, for the description of the inte (traffic between the clusters) a cluster-based trunk or hose mode' preferably depending on the available information about the traffic. It to group the clusters and independently selecting so-called inter-hosi provisioning for each group of clusters.

mmon cluster) 3ntly cluster by bandwidth allocation providing a
The intra-cluster traffic (traffic between the nodes that belong to a c may be described by the traditional trunk or hose models, independ cluster if desired. Tins implies that a traffic description model or model can be selected independently for each cluster in the netwo ingher degree of flexibility compared to prior art network provisioning.

Selecting between trunk and hose models for intra-cluster provisioning cluster-based trunk and hose models for inter-cluster provisioning givejs basic combinations:

and between the following

mtra-trunk, inter-trunk; intra-hose, inter-trunk; intra-trunk, niter-hose; and intra-hose, inter-hose.

There is trunk model model is proposed
also another trade-off between the traditional trunk and hose models. The is quite sensitive to changes in the structure of the traffic, winle the hose very robust and thus less sensitive to such changes. The provisioning strategy by the invention is also capable of controlling tins trade-off.

Extensive! research and simulations have shown that the infra-hose, inter-trunk provisioning provides the best overall performance in many traffic applications and
scenarios

The proposed
Service
more flexible
of netwoi
inter-cluster provisioning
service model thus allows us to define service level definitions such as Agreements (SLAs) - based on the concept of site/node clusters - in a way than the pure hose and trunk models. By defining a cluster as a set k sites/nodes, we can differentiate between intra-cluster provisioning and in the service level definition.

The clust r-based provisioning generally relates to resource allocation and/or network management, and preferably includes admission control and/or network dimensioning.

in the the inter-c defined in
semce
For cluster-based admission control, the node-to-cluster traffic limitation or limitations level definition or SLA are preferably applied for admission control on uster level. On the intra-cluster level, supplementary ultra-traffic limitations the SLA may be applied as and when desired.

For
preferably on the i suppleme
inter-
clusteir-based dimensioning, the capacity of a number of links in the network is dimensioned based at least partly on the node-to-cluster traffic limitation(s) r-cluster level. Typically, the dimensioning task is also based on at least one entary traffic limitation on the intra-cluster level.

The dimensioning task is preferably performed by a network design or support tool that calculates the required link capacities based on at least a subset of the traffic

Integrating such admission control SLA ensures that
limitations given in the cluster-based service level definition or SLA. a design tool in a network management module having cluster-based functionality operating based on the same traffic limitations in the the network resources and the CAC configurations are in fact aligned.
Some advantages of the invention:

nodes;
if the operator
Simple implementation - only a few changes are required in the Scalable management complexity; Near-optimal trade-off between scalability and bandwidth efficiency; The proposed provisioning model is applicable effectively ever has no exact information about the traffic distribution in the network.
BRIEF DESCRIPTION OF THE DRAWINGS

will be best icr with the
The invention, together with further objects and advantages thereof understood by reference to the following description taken togetheer accompanying drawings, in winch:
Fig. 1 is a schematic illustration of the traditional trunk model; Fig. 2 is a schematic illustration of the traditional hose model;

Fig. 3 is a schematic flow diagram of an exemplary provisioning method according to an embodiment of the invention;
Fig. 4 is a schematic diagram showing a simple example of a network divided into clusters;

Fig. 5 is a schematic block diagram of network design tool according to an exemplary embodiment of the invention;

Fig. 6 is a an exempl

schematic simplified block diagram of an admission controller according to iry embodiment of the invention;

Fig. 7 illustrates an exemplary cluster definition for an illustrative core transport network;
Fig. 8 illustrates the number of average CAC entries as a function of number of clusters for an exemplary network;
Fig. 9 illustrates a comparison of the proposed provisioning models on the basis of the summed capacity for an exemplary network;

Fig. 10 illustrates used without network;
the overprovisioning when intra-hose, inter-trunk provisioning is protection, as well as with link and node protection, for an exemplary

Fig. 11 illustrates the overprovisioning factor as a function of the number of clusters with different dimensioning variants, for a large backbone reference network;
Fig. 12 illustrates the management complexity as a function of the number of clusters with different dimensioning variants, for a large backbone reference network;
Fig. 13 illustrates the management complexity as a function of the overprovisioning factor with different dimensioning variants, for a large backbone reference network;

Fig. 14 illustrates the overprovisioning factor as a function of the number of clusters for different routing strategies with the infra-hose, inter-trunk model for a large backbone reference network;
Fig. 15 illustrates the minimal acinevable management complexity 4s a function of link density with different dimensioning variants; and

Fig. 16 illustrates the minimal acinevable management complexity fo networks.

different scale

DESCRIPTION OF EMBODIMENTS OF THE INVENTION

The invention proposes cluster-based provisioning, winch implementations basically requires only minor modification to the design and preferably no new functionality in the routers.

in preferred network node

into multi-node at least two oned into basic ifj desired, and so the inerarcincal optional super
A basic idea is to partition the network or at least part of the network clusters or logical resource domains. Each such cluster hence includes nodes. At the bottom level we have the network nodes, winch are parti clusters, winch in turn may be divided into so-called super clusters i forth for any number of ingher levels. In a basic scenario, however, structure comprises network nodes partitioned into basic clusters, wit] clusters.

The idea then is to perform cluster-based provisioning of the network, including at least the intra-cluster level and the inter-cluster level, with the configuration and application of one or more novel node-to-cluster traffic limitations on
the inter-cluster
level. Tins provisioning strategy applies well to large-scale networks, and the clustering makes it possible to define the node-to-cluster limitations and find an appropriate equilibrium between management complexity and overprovisioning.

SLAs in flexible • network traffic in
The proposed service model allows us to configure service level definitions such as the the VPN context - based on the concept of site/node clusters - in a more 'ay than the pure hose and trunk models. By defining a cluster as a set of ites/nodes, we can differentiate between intra-cluster traffic and inter-cluster the service level definition (e.g. SLAs).

The selection allocatioi
of traffic provisioning model, also commonly referred to as bandwidth or admission control model, is preferably based on the available information about the traffic distribution. As a simple rule of thumb, for "known" traffic, it may be beneficial to use a trunk or trunk-like model, winle for "unknown" traffic a hose or hose-like model can be applied.
We can use trunk and hose models for intra-cluster provisioning. Trunk provisioning witinn a cluster normally means that die service level definitions (e.g. SLAs) include point-to-point limitations between each node pair in the cluster. Hose provisioning for intra-clusier traffic normally means that the total traffic to any other nodes/sites in the same cluster is limited at each node/site.
the
each clus provision! inter-cluster traffic
If external clusters are considered as if they were a single entity, then we could use so-called chster-based trunk or hose modeling for inter-cluster provisioning. Trunk provisioning in the context of inter-cluster traffic may for example be applied such that bandwidth for traffic aggregates to each cluster from each site/node and/or from er to each site/node is being limited. Hose provisioning for inter-cluster ng may for example be applied to impose bandwidth limitations for the total
One of tine benefits of cluster-based provisioning is that the service level definition such as th SLA can be adjusted to the traffic information available.

ictwork is hence traffic limitations invention associated traffic
As indicated in the schematic exemplary flow diagram of Fig. 3, the divided or partitioned into clusters (SI). In the next step (S2), including the novel node-to-cluster limitation or limitations proposed by the are configured or defined. Based on the clustering and the limitations, cluster-based provisioning of the network is performed (S

o the invention efficiency and e of finding a
As mentioned above, the novel provisioning strategy according typically scales well to large networks with regard to both bandwidllh configuration complexity. The provisioning strategy is also capatl balance between sensitivity to changes in the structure of the traffic anp robustness

model,
independently of flexibility in an initial s defined witinn of intra-given between i-cluster traffic from) any other
In each considered cluster, i.e. for infra-cluster traffic, hose, trunk or a)ny other suitable
traffic provisioning model may be used. Tins implies that a traffic provisioning
sometimes referred to as an admission control model, can be selected
for each cluster in the network if desired, thus providing a ingher degree
compared to prior art network provisioning. Tins is normally performed
configuration phase. Preferably, trunk or hose type characterization
the scope of a cluster for intra-cluster traffic. Trunk-type characterization
cluster traffic typically means that node-to-node traffic demands ar£
each node pair in the cluster. Hose type characterization of intfa
typically means that the total traffic demand from (to) the node to
node in the same cluster is specified.

between the ming model can epending on the trunk or hose Trunk type traffic from (to) a
traffic
based
Similarly, for the description of the inter-cluster traffic (the clusters) a so-called cluster-based hose, trunk or other traffic provisi be used in the network (or for each group of clusters), preferably d available information about the traffic. Tins means that cluster-! type characterization may be applied to inter-cluster traffi characterization of inter-cluster traffic typically means that the total

node to (fi cluster traf Preferably, appropriate provisionii example, a cluster
traffic
m) another cluster is specified, winle hose type characterization of inter-c typically specifies the total inter-cluster traffic from (to) a given node, the overall provisioning strategy of the invention enables selection of an provisioning model for both infra-cluster provisioning and inter-cluster . Primarily, static traffic provisioning models are considered. For plying the concept of trunk and/or hose models to intra-cluster and inter-makes it possible to simplify traffic characterization and management without significantly degrading the bandwidth efficiency of the network.
Selecting between trunk and hose models for intra-cluster provisioning and between cluster-based trunk and hose models for inter-cluster provisioning gives the following basic comb nations:
Intra-trunk, inter-trunk: In tins case, the trunk model is used both inside the clusters and between the clusters.
Intra-hose, inter-trunk: Inside clusters, hose-based provisioning is used, and between clusters the cluster-based trunk model is used.
Intra-trunk, inter-hose: Inside clusters the trunk model is used, and for inter-cluster traffic the cluster-based hose model is used.
\ Intra-hose, inter-hose: In tins case, hose-model-based provisioning is
used both inside the clusters and between the clusters.
As previou y mentioned, the novel provisioning strategy is preferably based on a logical divi on of the network into clusters, and a differentiation between inter-cluster andintra-cl Ister traffic.

Infra-cluster traffic
Consider a given cluster Q and a node « sitting in that cluster. Th
give the infra-cluster traffic of tins node, for example in the follow
ways.
Intra-trunk: In tins case we exactly limit the amount of traffic of u inQ.

n it is possible to ig two exemplary
:o/from each node

traffic of node u that sutn of the incoming same cluster.
Intra-hose: In tins case we limit only the sum of the outgoing goes to the other nodes in the same cluster, and the traffic of node u that comes from the other nodes in th

a so introduce two s follows.
of node u to/from erally a weaker
Inter-cluster traffic
Consider again the node u sitting in cluster Q. Here we can
exemplary ways for describing the traffic of u outside its cluster Ck,
Inter*trunk: In tins case we preferably limit the amount of traffic each of the other clusters. Note, that tins is ge description than the traditional point-to-point trunks.

Inter-hose: In tins case for each node we limit only the sum of t that goes to (any node in) any other cluster, and the su|m traffic that comes from (any node in) any other cluster

outgoing traffic of the incoming



There may be unity between the limitations for incoming traffic an winch basically implies that we have a bi-directional limitation in pr
For the purpose of illustrating how blocks of a cluster-based servi (e.g. SLA) can be built, reference is now made to Fig. 4, winc

outgoing traffic, ctice.
e level definition shows a simple

example of a network divided into clusters. Fig. 4 shows an exemplary network, winch

is divided into three clusters, denoted 10.0.1.0, 10.0.2.0 and 10.0.3.0, respectively. The squares represent nodes such as backbone routers, and next to them the IP addresses
specific Similar
cated. The tables below list exemplary intra-cluster and inter-cluster paramel) rs, winch can be used to specify a service level definition (e.g. SLA) in the
node bearing the IP address 10.0.2.1 (indicated as a gray square in Fig. 4).
onfigurations are made in each concerned node.
(Table Removed)


One of the benefits of cluster-based provisioning is that the required traffic information in the service level definition such as Ihe SLA can be adjusted to the

i, the number of hose model and 3 limitations for Imitations will be ns. In the novel nitations varies 1) and each of for infra-cluster e model and the trunk model and 2 for ind inter-cluster
traffic information available. In a network with a number N of node bandwidth elements to be specified at a node is 2 for the traditiona 2(N- 1) for the traditional trunk model, assuming that there may both in-bound and out-going traffic. Naturally, the number of li reduced by a factor 2 if a single entry is employed for both directi cluster-based provisioning method, the number of bandwidth 1 between these two extremes. Given that there are M clusters (N M them have the same size (N/M 1), the number of traffic limitation traffic in a node is 2(N/M- 1) for the trunk model and 2 for the ho number of limitations for inter-cluster traffic is 2(M' - 1) for the the hose model. Thus, for the four combinations of the intra-provisioning, the total number of traffic limitations is as follows:
• ultra-trunk and inter-trunk: 2M+ 2N/M- 4.
• intra-hose and inter-trunk: 2M
• infra-trunk and inter-hose: 2N/M.
• infra-hose and inter-hose: 4.

For the specific example of N = 9 nodes and M = 3 clusters, the size N/M = 3 nodes, and the total number of traffic limitations is then e infra-trunk and inter-trunk case, 6 for the infra-hose and inter-frun infra-trunk and inter-hose, and finally 4 for the infra-hose and inter-hc

f each cluster is [ual to 8 for the case, 6 for the e case.

for a bandwidth bandwidth value. In the number of /hen a cluster is than in
cumbersome
If clusters are identified based on DP prefixes, the configuration entrj limitation normally includes a list of IP address prefixes and a such a case, the configuration complexity not only depends or bandwidth values but also on the number of IP address prefixes, mapped to a single IP prefix, the configuration is clearly less cases when a cluster is defined by a number of disjoint IP prefixes.

Definit on of clusters may for example follow the rules below:
A cluster is preferably defined by a set of IP addresses. Tins set can be a single IP subnet or a set of IP subnets. Naturally, other connectionless networks than IP-based networks can be used, with a corresponding cluster definition.
There could be multiple overlapping layers of clusters. In other words, one node may be part of multiple clusters.
A resource cluster is normally not restricted to be mapped to a single part of the network. It may contain multiple network parts. In most cases, a cluster includes nodes in proximity, but cases when a cluster includes disjoint network parts are not excluded.
Resources are preferably provisioned statically.
The cluster-based provisioning generally relates to resource allocation and/or network management, and preferably includes admission control and/or link capacity

dimensi

nmg.

The optmal selection of clusters and the corresponding dimensioning is a complex task, winch makes the application of a support tool advantageous. For example, the selectioi/configuration of the clusters may be defined as an optimization task, in winch the objective function has two components: a) minimizing the number of CAC entries/parameters and b) maximizing the bandwidth efficiency. Alternatively, the selection of clusters is preferably chosen such that bandwidth efficiency is better than a predef ned value and the number of CAC configuration parameters is less than a predefined critical value. Note that we then normally assume that the acinevable utilization increases if the number of configuration parameters increases. Note that not

just the number of CAC entries/parameters but also the number definition of clusters affects management complexity.

f subnets in the

such that the below a certain minimize the r 4 parameters in
For example, the number of configuration parameters can be minimised resulting overprovisioning compared to pure trunk provisioning is threshold percentage (say 50%). Another alternative is to overprovisioning with a fixed number of configuration parameters (sa each node).

ptimization task of clusters, and minimum
The tool then preferably includes an algorithm that performs tins given that the requirements on cluster definitions, such as mmiber inerarchy levels, maximum number of CAC entries/parameters bandwidth efficiency are specified.

The cluster selection procedure may consider one or several selecti examples of such criteria are listed below:
• Traffic:
Cluster selection on the basis of the traffic distribution b
• IP-subnet address plan:
Cluster selection on the basis of the IP-subnet address p
• Topology:
Cluster selection on the basis of the network topology.

n criteria! Some
stween nodes.
an.

Number of CAC entries:
Cluster selection for minimizing the number of CAC entries/parameters
in the nodes.

Thedes

Bandwidth efficiency:
Cluster selection for maximizing bandwidth efficiency.
gn tool preferably supports any combination of the above possibilities.

Dimensioning is preferably based on an off-line traffic-engineering tool to dimension the network according to the proposed provisioning model. As mentioned above, the cluster selection procedure finds the given number of clusters and splits the nodes betweer them, for example with respect to a well-defined optimization task such as minimizing the number of CAC entries/parameters. Alternatively, clusters are configured more or less directly in accordance with network topology or other similar factors.
In case of hose modeling, the dimensioning should preferably be based on global optimization taking into account all topology information and routing at the same time to provide the best bandwidth efficiency. In case of both hose and trunk model shortest path roui ing may be used.

In a pre
erred embodiment, the dimensioning algorithm calculates the required link
capacities based on the determined inter-cluster and infra-cluster traffic limitations/configurations, and is preferably performed by a dimensioning tool that optimize required traffic values by linear programming.

the nove Typicall traffic m designin
The dimensioning task based on intra- and inter-cluster provisioning models requires node-to-cluster constraints/limitations for computing the required capacities.
, the network dimensioning does not assume the knowledge of the actual
itrix, but only assumes some side constraints on the traffic matrix and aims at
a network that is able to carry any traffic that meets the given side
constrain! s

the traffic or we may set of nodes in case, two values another one for
about
limitations,
and
The side constraints typically express what we know in advance what we can measure. In addition to the traditional hose and trunk li also limit the traffic between a node in a given cluster and an arbitral y another cluster or a set of other clusters. Similarly to the traditional are normally used for describing the traffic, one for the outgoing the incoming traffic.

In the following, a mere illustrative example of how the links capacities required by the cluster based bandwidth reservation method can be computed vrill be described. •The proposed algorithm is an extension of the method proposed in [71
We are given a network represented by a directed graph G = (V, E). The set V of vertices denotes the set of nodes of the network, winle the physical links are represented by the set E of edges. In tins example, it is also assumed that we are given the actual routing between any pair of nodes. Tins would basically be done by giving a for each pair of nodes u and v.
However, we use a more general way to give the routing. For each pair of nodes u and v we introduce the flow function ruv : E - [0, 1], where ruv(e) denotes the portion of the traffic between u and v that goes on the link e. In tins way, we can handle the single path routing (by setting ruv(e) to 1 on the edges of the path between u and v and to 0 on the other edges) and the shared routing as well. Once the routing is given, a given traffic matrix determines the load on the links. If tw denotes Ihe amount of the traffic from u to v then the traffic of a certain link e is:
The approach suggested by the invention does not assume knowledge of the actual traffic matrix, but only assumes a set of side constraints, and the network is preferably

dimensioned in such a way that the capacity will be sufficient for any traffic matrix that meets the side constraints. The invention preferably employs cluster-based side constraints to describe the real traffic in a more exact manner to avoid the unnecessary overdim msioning.

The side

constraints can be classified as follows.

Trunk Parameter. Here we know the maximum amount of the traffic from a certain given node u to another one v. We denote the maximal value with Tu_v. Tins constraint can be formalized as follows.



Hose Parameter. In case of the traditional hose traffic description we limit the traffic originated from and directed to a certain node u, denoted by Tu_,v and TV-.u respectively. In mathematical formulae it means:
and

Cluster Bcsed Parameter. Here we limit the traffic between a node u and an arbitrary set S of ncdes (regarded as one or more other clusters). Similarly to the previous case, two values used for describing the traffic, one for the outgoing and another one for the incoming traffic, Tu_s and TSUJ respectively. In mathematical formulae:







Note that all the above constraints are linear making it possible to s optimization problems that use these constraints. Our capacity res based on a clustering of the nodes. Thus, the set of the nodes is pre; into k disjoint subsets called clusters, i.e. V = Ct u €2 u...u Ck whenever
The idea is to differentiate between the intra-cluster and the inter previously outlined, in both cases there are two natural possibilities.

Ive efficiently the
Irvation method is
ierably partitioned
and Q n Cj = 0
cluster traffic. As

Intra-cluster traffic
Consider a given cluster Ck and a node u sitting in that cluster. Thn we can give the
intra-cluster traffic of tins node in the following two exemplary way|

Intra-trunk: In tins case we preferably limit the amount of traffic node in Q, by using the parameter Tu_v for each v e

of u to/from each
fa U V.

Intra-hose: In tins case we limit only the sum of the outgoing traffic of node u that goes to the other nodes in the same cluster, and the sum of the incoming traffic of node u that comes from the other nodes in ttye same cluster, by using the parameters Tu_,ck and Tck_u.

Inter-clu Considei exemp
ter traffic
again the node u sitting in cluster Q. Here we can also introduce two laiy ways for describing the traffic of u outside its cluster Q, as follows.

Inter-trunk: In tins case, we limit the amount of traffic of node u to each of a first set of other clusters and the amount of traffic of node u from each of a second set of other clusters, e.g. by using the parameters Tu_q and TCj-u for each j * k. Note that is generally a weaker description than the traditional point-to-point trunks. The first set of other clusters and the second set of other clusters are typically equal to each other, but may differ from each other.
Inter-hosi
In tins case, for each node u we limit only the sum of the outgoing traffic that goes to (any node in) any other cluster, and the sum of the incoming traffic that comes from (any node in) any other cluster than Q, by using the parameters Tu_w\ck and Tv\ck-u, respectively.
The inter-model, based hos
and
trunk limitations normally correspond to what is called a cluster-based trunk the inter-hose limitations normally correspond to what is called a cluster-model.

As we carry any dimension maximum maximize constraint! efficiently package [
ied, our aim is to dimension the network in such a way that it is able to possible traffic scenario that meets our preconditions. Thus we may each individual link considering the worst-case scenario. To compute tins traffic of a link e, the traffic matrix tuv that meets our preconditions and the traffic value (1) should be found. As the objective function (1) and the (2), (3), and (4) are linear functions, the value of (1) can be maximized by any linear programming method, e.g. the simple lp_solve software 8], Of course we have to repeat tins process for each edge e 6 E in order to

get the total necessary bandwidth.

Note, that ruv(e) is zero for most of the u,v pairs, so the size of the re to solve can be largely reduced by omitting each variable tuv who route does not use the edge e. It is also possible to omit the constr affect any remaining variables.
As an example, let us see the linear program when we use the intra traffic description.

linear program ; corresponding ints that do not
trunk/inter-hose





It has been shown that the choice of routing may have a signific bandwidth efficiency, both in trunk and hose dimensioning, dimensioning the best choice is when the traffic is routed via the leas tree routing (i.e. when the traffic is routed via a spanning tree performance for hose dimensioning. In the cluster-based provisioning the clustering divides the network into two levels, winch motivates th
the effect of multi-level routing solutions. Applying for example shorlfest-path and tree routing, gives the following additional routing scenarios:

Experi: routing

Shortest path intra-cluster / Shortest path inter-cluster. Shortest path mtra-cluster / Tree inter-cluster. Tree intra-cluster / Shortest path inter-cluster. Tree intra-cluster Tree inter-cluster.
ents and simulations have shown that bandwidth efficiency can be increased if is adjusted to the selected provisioning method. Therefore, routing

also be later in
optimisation in connection with calculation and configuration of explicit routes may function of a design tool. More details on routing optimization will be given
onnection with the VPN context.

Fig. 5 i

a schematic block diagram of network design tool according to an exemplary

embodiment of the invention. The exemplary network design tool 100 is preferably an interact ve design or support tool, and basically comprises a user interface 110, a configurations module 120 and preferably also a dimensioning module 130. The configurations module 120 typically includes a cluster selection unit 122, a provisioning model selection unit 124, a service level definition unit 126 and an

optiona

routing scheme selection unit 128. The operator may enter input information

and/or configuration settings via the user interface 110, and information may also be input from the network, including the edge routers. Cluster selection is performed by cluster sslection unit 122 in response to the relevant input information, for example as describe! above. Suitable provisioning model(s) such as (cluster-based) hose and/or trunk models are configured in selection unit 124. Both inter-cluster and intra-cluster service 1 jvel definitions are typically configured (input) in the service level definition unit 126 In the optional routing scheme selector 128, routing may be adjusted to the selected provisioning model(s) to increase bandwidth efficiency. The design tool may then inchde functionality for routing optimization in connection with calculation and configuration of explicit routes. Based on the configuration settings and the cluster-based service level definition, the dimensioning module 130 preferably performs constrained link capacity dimensioning. Tins typically means that the links are

c limitations on ementary traffic eijisioning module gramming. The executed in a Resign tool from
dimensioned based at least partly on one or more node-to-cluster traf the inter-cluster level, and preferably also based on one or more supp limitations on the intra-cluster level. As mentioned above, the dim may be configured to optimize required traffic values by linear pr design tool functionality is typically implemented in software an network management computer, but there is notinng that prevents the being implemented in hardware or firmware.

Her according to n controller )200 fubction 220. The loning model(s), ter definition is mechanism. The ihe service level .dmission control limitations for the s related to real-s processed by the bandwidth •uld be rejected, node or edge
edge
Fig. 6 is a schematic simplified block diagram of an admission contn an exemplary embodiment of the invention. The exemplary admissi includes a configurations module 210 and an admission control configurations module includes means 212 for defining suitable provi and a cluster-based service level definition module 214. The chu normally done manually node by node or centrally by some remote admission control function is assumed to reflect the structure of definitions, such as the SLAs in the VPN context. In other words, the function normally includes or operates based on the same bandwidth same traffic aggregates as the part of the service level definition that time traffic. For admission control, a new connection request identifying the appropriate bandwidth limitation, and then applyin limitation to determine whether the connection can be accepted or sty The CAC functionality is normally arranged in each concerned router.

:o an exemplary
In the following, the invention will be described with reference
icreto, but rather lobile networks,
implementation for so-called media gateway nodes in a mobile core t -ansport network. It should however be understood that the invention is not limited t
applicable to general communication networks including fixed and VPN networks as well as other types of networks.

Exemplary implementation in the context of a mobile core network
In an sxemplary embodiment of the invention, winch is especially adapted for a mobile core network, an integrated combination of trunk, hose and MBAC-based network provisioning is exploited. The admission control is preferably divided in:
dmission during normal conditions and single fault events: Static provisioning visioning of clusters.
withpr

employ

nexpected congestion in multiple fault conditions: Preferably, MBAC is d in order to block calls if measured loss ratio exceeds the configured level. '

Static p In the s nodes(
ovisioning of clusters
me way as previously described, the core network with its media gateway
GWs) is divided into clusters or logical resource domains to limit the number
of confijjuration parameters in the MGWs in a large-scale topology. The configuration of the ac mission control preferably comprises entries of the following format:
cluster definition bandwidth limit(s)
where the cluster definition may be a list of IP subnets, and a cluster is defined as a set ofMGWs.
Example network
A possible cluster definition for an illustrative core transport network is shown in Fig. 7. It should be understood that more than two levels, i.e. the underlying nodes and the clusters, can be included in the logical network representation. In the example of Fig. 7, w(s have optional super-clusters indicated by ellipses. Note that sites can also be considered as clusters.

A possible set of entries of admission control in MOW 6 (in Site 6) is as

follows:

Inter-cluster trunk/intra-cluster trunk model
Inter:
Cluster A BW ClusterBlBW Cluster B2 BW
Intra:
Site Router 0 BW Site Router 3 BW Site Router 10 BW
In tins example, Cluster C should be dimensioned according to trunk model. The traffic between cluster A, Bl, B2 and C is also dimensioned according to the trunk model.
If the bandwidth efficiency of hose dimensioning is sufficient for the traffic of Cluster C then the above list can be replaced by:
Inter-cluster trunk/intra-cluster hose model
Inter:
Cluster A BW ClusterBlBW Cluster B2 BW
Intra:
Cluster C BW

Exampl

3S of other provisioning models include:

Inter-cluster hose/intra-cluster trunk model
Inter:

:iusterA,Bl,B2BW

(common hose parameters)

Intra:
Site Router 0BW Site Router 3 BW Site Router 10 BW
Inter-cluster hose/intra-cluster hose model
Inter:
:iusterA,Bl,B2BW
Intra:
ClusterOBW
Many oiher combinations of clusters could be configured in the MGWs, winch inherently imply different dimensioning of the links.
Requirements on the MGWs
The basic criterion for using the above network model is to distinguish clusters in the admission control of MGWs. Tins differentiation can for example be done using IP-subnet ad dresses, or based on any other suitable criteria.

e to define a ihould allow the
The addressing plan of the core network can be such that it is impssibl single IP subnet for a whole cluster. Therefore, the MGWs configuration of multiple IP subnets for a single CAC entry.

To use static admission control, bandwidth limits should be configu|red for each CAC entry.

statistics and drop statistics may connection can be limit AND if the
d'op
If desired, admission control could take into account packet bandwidth limit for the configured clusters in the MOW. Therefore, still be aggregated for the configured clusters in the CAC. A admitted if the measured loss ratio is smaller than the configured bandwidth of admitted connections does not exceed the configured liinit

From the viewpoint of fault tolerance three redundancy solutions ma;

be considered:

1. No redundancy
2. Single link failure
3. Single node failure
Results on an exemplary network
In the following, a brief performance analysis of the proposed provisioning model is
presented in case of a realistic mobile core network where the trafjfic parameters are
known.
From the viewpoint of the MGWs it is very important how many CAC entries/parameters should be configured in case of the different provisioning models and cluster numbers. In Fig. 8, the number of average CAC entries can be seen as a function of number of clusters.

On the
number
advantag
inter-trui
network.
In Fig. 9 capacity.
From the best, but importan clusters i
Based on off betwe inter-trun
pasis of Fig. 8 it can be noted that three clusters provide the lowest average f CAC entries per MOW. From the viewpoint of CAC entries, the most ous provisioning method is the intra-hose, inter-hose, but the intra-hose and c is also very suitable, especially in the interval of 2-4 clusters in the
the proposed provisioning models are compared on the basis of the summed
viewpoint of required bandwidth the intra-trunk, inter-trunk model is the be intra-hose, inter trunk-model also provides very attractive results. It is to note that from the viewpoint of summed capacity the suitable number of three, if the target-overprovisioning factor is around 20%.
the results of Figs. 8 and 9, it may be concluded that with regard to a trade-en the number of CAC entries and bandwidth efficiency, the intra-hose, model provides the best overall performance.

The i intra-hose routing o will be on.
impact
of different routing strategies has been investigated. In tins regard, the inter-trunk provisioning model may advantageously be combined with tree the intra-cluster level and shortest path routing on the inter-cluster level, as appreciated from the simulations on routing optimization to be described later

Protection for link and/or node failures may also be provided, e.g. by re-routing or by using back-up paths. The impact of link and node protection has also been investigated.

Fig. 10 sh without pr

ws the overprovisioning when intra-hose, inter-trunk provisioning is used lection, as well as with link and node protection.

A complementary description of the invention for the specific context Network (VPN) will now be described.

Df a Virtual Private

e in the enterprise in operating their
resources and exible bandwidth
goal of VPN ased management . On the other
increase the
Exemplary implementation in the VPN context
tasks
In general, Virtual Private Networks (WNs) play an important ro business mainly because they provide great flexibility for customers networks. Solutions are also developed to attract customers with limited infrastructure for network management. Offering simple and : management models for customers is also considered as an important providers. Simplicity for the customer, however, often means incr effort and less efficient network utilization for the network operator hand, reduced network efficiency and more management operational costs and yield more expensive services.

models are two me operation and known as trunk ch VPN site pair
each pair of sites.
. , est way, since the
acities if routing ic communication ers may be unable it difficult to Agreement (SLA), is hard to specify
ic management of
also
eac
winch nakes
As previously mentioned, hose and trunk resource provisionin examples of resolutions of the conflict between efficient backb flexible bandwidth model. In the customer-pipe model, winch is model, point-to-point traffic demands are specified between ea allowing the operator to independently reserve bandwidth between Tins model enables the VPN provider to utilize the network in the known traffic matrix determines exactly the required link ca information is also known. The critical part of tins model is that pattern between the end-points is very difficult to estimate. Custon to exactly predict and define traffic loads between the sites, specify the complete site-to-site traffic matrix for the Service Level Even if the estimation of the traffic matrix is supported by tools, i the proper bandwidth requirement due to traffic fluctuations.
Another drawback of the customer-pipe model is the complexity of

trunks. Resource reservations needs to be configured in each source node to each sink
node, including policing configuration for the provider and shaping/admission control configuration for the customer. If a full mesh logical network is assumed between the customer's sites then the sum of parameters to be configured is proportional to the square of the number of nodes in the VPN. Therefore, configuration complexity may become the main drawback of (he trunk model in case of large-scale networks.
The hose model takes a more pragmatic approach by requiring only the specification of the aggregated incoming and the aggregated outgoing traffic volumes at each node. These traffic parameters can be specified either according to the physical capacity of the link to the provider's network or based on measurements. Winchever approach is used, the estimation of traffic demand is easier and more precise compared to the customer-pipe model. Configuring hose parameters requires much less effort from both customers and providers man configuration of trunks. Only one incoming and one outgoing hose parameter should be configured in each source node. Thus, the number of configuration parameters is proportional to the number of VPN sites. These properties make the hose model definitely attractive for customers. On the other hand, the application of the hose model has a great impact on resource provisioning in the VPN backbone. Network dimensioning based on partial information on the traffic demands yields overdimensioning compared to trunk model, if the same service performance is required in both cases. Furthermore, the required overprovisioning increase! significantly with the size of the network, regarding both the number of nodes and the number of links.

Hence, i well to 1

can be seen that the conventional resource provisioning methods do not scale rge VPN networks.

descripti and
over] rovisionmg
By dividing the network into multi-node clusters, performing cluster-based provisioning of the network on at least two levels and using cluster-based traffic 0n we can find an appropriate equilibrium between management complexity in the same or similar manner as previously described. Such a

istering makes it nstead of simply and the poiit-to-everywhere to-cluster traffic e as the key to
provisioning strategy applies well to large-scale networks, and the c possible to characterize the VPN traffic by point-to-cluster demands, the point-to-point demands of the traditional trunk model demands of the traditional hose model. These new so-called node limitations are typically applied on the inter-cluster level, and sen improved performance in the VPN networks.

level agreement y has a policing SLA. The VPN same purpose, on for real-time specified in e structure of the aggregates as
For example, consider a QoS-enabled VPN with static service between the VPN provider and customer. The VPN provider typica function that controls the ingress/egress traffic in accordance with th customer may also have a shaper at the network edges for th Furthermore, the customer may operate an admission control func services to avoid QoS degradation due to exceeding the traffic limitations the SLA. The admission control function is also assumed to reflect th SLA, i.e. it includes the same bandwidth limitations for the same traffic the part of the SLA that is related to real-time traffic.

The management of a VPN arcintecture generally includes tasks for ti as well as for the VPN provider. It is often up to the VPN customer in the network and renegotiate SLAs when traffic exceeds a given 1 the admission control and shaping in accordance with the SLA is als of the VPN customer. On the other hand, it is normally the responsi provider to ensure that the bandwidth specified in the SLA is alway backbone. In case of re-negotiation, the provider has to check if he increased traffic or some of the links need to be upgraded. It is also to configure the policing function according to the SLAs.

e VPN customer measure traffic
mit. Configuring usually the task
ilityofthe VPN available in the
an cope with the
5 to the provider



The main interest of the VPN providers is to facilitate the tasks of ti offering simple SLAs. However, under-specified traffic d

sir customers by criptions yield

overprovisioning winch makes the offerings more expensive. Therefore, a reasonable

balance is requir
The prq based or trunk m between allows ti specific simplifie backbon
The firs measurement
etween WN management complexity and overprovisioning in the backbone d.
osed service model allows us to configure the SLAs in the VPN context -the concept of site clusters - in a more flexible way than the pure hoserand dels. By defining a cluster as a set of VPN sites/nodes, we can differentiate intra-cluster provisioning and inter-cluster provisioning in the SLAs. Tins e VPN operator to customize the service offering to the requirements of the VPN customer. Thus, traffic characterization and management could be i without significantly degrading the bandwidth efficiency of the WN
SLA, th previous! information customer
task, winch is affected by the cluster-based provisioning is traffic and SLA re-negotiation. The larger aggregates that are the subject of the easier to identify that the SLA needs to be renegotiated. As indicated , one of the benefits of cluster-based provisioning is that the required traffic in the SLA can be adjusted to the traffic information available for the

The othe mentioned task for the VPN customer is the configuration of admission control f r real-time traffic or shaping for best-effort traffic, shortly management complexiljy. In tins context, another advantage of cluster-based provisioning is its scalable management complexity.

The form cluster-1 elements may be multiple
com
clusters based
of SLA considerably affects the management complexity. An SLA for •based provisioning may include point-to-point elements, point-to-single-cluster ind point-to-multi-cluster elements. In other words, bandwidth limitations figured for a set of sites, winch may be a single site, a cluster or even lusters. As shaping and admission control at the customer often identify on the IP prefixes, the configuration entry for a bandwidth limitation in

and one or more ds on the number dress prefixes, as
prefix then the udes ?. number of
:-upofthe VPN
stiirt
any of these functions typically includes a list of IP address prefixe bandwidth values. Thus, the configuration complexity not only depe of bandwidth values but may also depend on the number of IP a already indicated before. When a cluster is mapped to a single configuration is clearly less cumbersome than in the case when it inc disjoint prefixes. Therefore, if clusters are already defined at the then the addressing plan should preferably take them into account.

VPNs are normally implemented with some kind of tunneling usually also assumes that the IP addressing of the VPN is in addressing of the IP backbone. Shaping and admission control a placed at the customer, so that they are based on the addressing independence of backbone and VPN addresses makes it possible to addressing plan tailored to the actual VPN independently of other V definitions can be local to the VPN.

technique, winch dependent of the e assumed to be of the VPN. The define an optimal 3Ns. Thus, cluster

uire slightly more tween IP address from a number tween bandwidth on complexity.
cgy
If IP addressing is fixed in the VPN, then cluster definitions should preferably consider the addressing plan. For example, it may be a better choice to req over-provisioning in the backbone to allow one-to-one mapping b prefixes and clusters than defining clusters based on physical topol of disjoint IP prefixes. Anyhow, it is clear that there is a trade-off b efficiency, number of SLA parameters to be estimated and configura

Returning to the responsibilities of the VPN provider. Besides th policing, whose management complexity is similar to that of shap control at the customer, the VPN provider has to check if the backb

configuration of ng and admission ne links can cope

with the traffic limited by ingress policers. In tins respect, the cluster-based method is somewhat similar to hose provisioning in that more complex calculations are needed to fulfill tins task due to the current lack of a resource reservation protocol supporting hose-based and clusters-based reservations. Checking network resources against trunk-

based n source requests is normally easier since all resource reservation protocols, such as aggregate RSVP or future NSIS protocol for routed IP VPNs and RSVP-TE for MPLS VPNs, support trunk reservations. The provider may also manage the task of optimizing routing, as previously described, so that the actually used network resources are minimized. Thus, it is desirable for the VPN provider to try to solve the optimization task with requirements or restrictions on minimum bandwidth efficiency, maximum number of bandwidth limitations and maximum number of IP prefixes. Preferaby, the basic link capacity algorithm described above is implemented in a network design tool by the VPN provider for calculating the necessary link capacities for traffic given by the selected cluster-based description, making it possible to design congestion-free networks.
The applicability and limitations of the proposed methodology and the effect of different routing strategies and fault tolerance have been examined by simulating several t st scenarios for VPN networks. In the following, we will briefly present a limited b t yet illustrative selection of these simulations.
Performance study
In the simulations, the AT&T reference backbone network with its publicly available topology Iwas used as a basis for the performance analysis. We mainly considered only the part of the network made up of the Gateway nodes, backbone nodes connected with N QC48 and N OC192 links, to obtain our test network comprising 25 sites connecte with 44 links.
First, we compare the proposed cluster based provisioning for the different variants without considering routing optimization and protection methods. We then study how routing optimization can be used to improve the bandwidth efficiency. Finally, we mention tie effect of protection methods on the results.

[umber of clusters iioning variants is jtion methods are lexity are the key ulate theifi fa* the T&T network, as dimensioning for each following names
Fig. 11 illustrates the overprovisioning factor as a function of the with different dimensioning variants. The comparison of the provi here based on shortest path routing and assumes that no protei applied. The capacity of required links and the management com measures characterizing the performance of the methods, so we cal evaluation. The studied network scenario is based on the 25 node mentioned, and a pre-calculated traffic matrix. We performed di possible number of clusters (from 1 to 25). From now on we use th for the cluster-based provisioning variants for short reference:

uster traffic, bster traffic.
• 'tt': Trunk for infra-cluster and inter-cluster traffic.
• 'th1: Trunk for infra-cluster traffic and hose for inter-c
• Tit1: Hose for infra-cluster traffic and trunk for inter-c
• Tin': Hose for infra-cluster and inter-cluster traffic.
k model, i.e. the visioning variant
Fig. 11 shows the overprovisioning factor compared to the frui relative difference between the capacity need for the evaluated pn and the pure trunk model.
, winch is closely hose and trunk he figures, as they ere is one cluster thods 'tt' and 'th1 when there are 25
model and 'tt1 and
Fig. 12 presents the average number of bandwidth limitations per si related to management complexity. Note, that although the pu: provisioning is not displayed explicitly, their results can be seen in are equivalent to specific cases of the cluster-based methods: If th then method 'hf and *hh' is equivalent to hose model and m correspond to trunk model. If each site is in a separate cluster (i.e. clusters in the AT&T network) then Tib' and 'th1 corresponds to "hf is the trunk model.
Results for all of the four variants of the cluster-based method are between the results of hose and trunk provisioning, regarding both link capacity and management

complexity. The figures also inghlight the trade-off between bandwidth efficiency and management complexity. To compare the variants, the real question is the necessary management complexity using a clustering that provides a certain targeted overprovisioning. The management complexity - overprovisioning scatterplot in Fig. 13 ccmpares the variant from tins point view. The dots represent the management comp exity and overprovisioning values for the above cluster configurations. It can be seen that method "hf is the best in tins sense on the AT&T network: it requires the least management complexity for any fixed overprovisioning. For example, by allowing 40% («tra bandwidth in the backbone over the requirement of the trunk model, the needol configuration parameters in a site decreases from 25 to 5. Note that the hose model would require 160% extra bandwidth with a single parameter in each site.
The reason why hose provisioning is better than trunk provisioning on the intra-cluster level is that link capacities inside the cluster are not very sensitive to the provisioning method, but trunk model needs much more configuration parameters than hose. The small difference in capacities is because the topology of a cluster is typically close to a tree, winch is the optimal scenario for the hose model, due to the sparse topology of the example AT&T backbone network.
For inter-cluster provisioning, trunk provisioning significantly overperforms the hose method because traffic to different clusters typically go via different paths. Thus, ignoring the destination clusters in the SLAs (i.e. using hose provisioning for inter-cluster traffic) means that the worst case traffic towards each cluster is the sum of all inter-cluster traffic as opposed to the trunk model where only the traffic of the specific destination cluster need to be considered.
In the f blowing, the main focus will be on the performance of tins intra-hose, inter-trunk variant from different aspects.

Similar tests were made for the other methods as well, and the results confirmed the expectation that using tree routing where hose dimensioning is applied and shortest path routing in network segments dimensioned based on trunk model are the best choices regarding the routing. Thus, there is a best routing type for each of our cluster-based methods, as follows:
• routing 'tt' for method 'hh'
• routing 'ts' for method 'ht'
• routing 'st' for method 'th'
• routing -'ss' for method 'tt'.
Tins confirmed the notion that performance such as bandwidth efficiency can be increased if routing is adjusted to the selected provisioning method.
We also investigated how the four methods perform with their best routing. With regard to management complexity as the function of overprovisioning at different dimensioning methods with optimal routing, the situation is very similar to that of using shortest path routing for each method. The most important difference is that one can not state that method 'ht' is the overall best, because it has been found that if the overprovisioning factor is 50% or ingher, some 'th' and 'hh' configurations requires less management complexity to acineve the same overprovisioning, though the difference is almost negligible.
One may suspect that the efficiency of routing strategies is sensitive to the underlying topology. To investigate tins, the proposed methods were also tested on randomly generated network topologies. First random topologies with the same number of nodes and links as the AT&T network were analyzed. The average link capacities of 10 different random graphs were computed for each of the four methods with their best routing, and it was found that there is no significant difference between the random

Similar tests were made for the other methods as well, and the results confirmed expectation that using tree routing where hose dimensioning is applied and short path routing in network segments dimensioned based on trunk model are the b choices regarding the routing. Thus, there is a best routing type for each of our clust jased methods, as follows:
• routing 'tt1 for method lib'
• routing 'ts1 for method 'ht1
• routing 'st1 for method 'thf
• routing 'ss1 for method 'tt1.
tins confirmed the notion that performance such as bandwidth efficiency can increased if routing is adjusted to the selected provisioning method.
We also investigated how the four methods perform with their best routing. W regard to management complexity as the function of overprovisioning at diffen dimensioning methods with optimal routing, the situation is very similar to mat i sing shortest path routing for each method. The most important difference is that o can not state that method 'ht' is the overall best, because it has been found that if 1 c verprovisioning factor is 50% or ingher, some 'th1 and 'hh' configurations requires 1 management complexity to acineve the same overprovisioning, though the differen in almost negligible.
One may suspect that the efficiency of routing strategies is sensitive to the underlyi topology. To investigate tins, the proposed methods were also tested on random generated network topologies. First random topologies with the same number of nod aid links as the AT&T network were analyzed. The average link capacities of d fferent random graphs were computed for each of the four methods with their b routing, and it was found that there is no significant difference between the randc

case and the AT&T network, the method 'ht1 apparently performs topology as well.

well on a generic

|ed by generating case) winle ic number of links ijom graphs for 11 imputed. Then the Ictor less than 50% best regardless of jurve of 'tt1 as the i' is missing the target 50%
exenkplary
ofmeljhod
fulfill
The effect of link density of the network were also investiga topologies with the same number of nodes (it was 25 in our varying the average degree of the nodes (or equivalently varying ti in the network). The average link capacities of 10 different ran different average node degree from 2.5 to 7.5 in 0.5 steps were o minimal management complexity providing an overdimensioning ft was determined. Fig. 15 shows that method Tit' still performs the link density, but its performance gets worse and approaches the number of link in the network increases. Note that the curve because there is no configuration of that method winch could overprovisioning at any network density.

Another important question is how the provisioning methods seal size. So, tins is the next step in the evaluation of the cluster-methods. The studied networks were generated randomly as previo the number of interfaces in a router is limited and networks usuall with similar capabilities, we compared such networks in winch the]

with the network
ased provisioning
sly mentioned. As
consist of routers
average degree of

50 nodes in steps
ic average of the
ased provisioning
the nodes were kept constant - in our case it was 4 - when changing the number of
nodes. During the test we investigated networks consisting of 10 t of 10. We investigated 10 different topologies and calculated (I network capacities for each scenario. We examined all four cluster]'
methods with their best routing strategy at all possible number of cljisters from 1 to the

number of nodes. We then looked up the minimum management

omplexity among

whole network, cannot fulfill the
those configurations where the resulted overprovisioning factor w|s below 50%. Fig.
16 shows the minimal number of parameters to be configured in The curve of the Tin1 method is missing again, winch means that
i
target 50% overprovisioning neither in small nor in large networks. The curves of

methods Tit' and 'tt' are linear winch indicates that the number of parameters to be configured increases proportionally to the number of nodes, the difference is that the 'ht1 method provides smaller complexity. In contrast to them, the curve of the 'th1 method is increases rapidly at ingher number of network nodes suggesting that the method should typically not be used in large networks.
In backbone networks one of the most important requirement is fault tolerance. Tins fact motivated some tests to examine how much overprovisioning is needed to provide certain fault tolerance using traditional dimensioning methods and the proposed cluster based i schemes. Tunneling techniques used for VPNs can be different. The major difference regarding protection methods is if the backbone is a routed IP network or an MPLS-based network.
If the VPN backbone is a routed IP network, then the route of packets is normally determined based on the actual content of the routing tables. As a result of a link

failure, protoco

the routing tables of the affected routers will be then updated by routing s. When all routing tables are updated based on the changed link state

uiformapon, the packets are routed via the shortest path considering only the remaining links. Tins process may take a few minutes. It also means that the protection path of a given flow depends on the failed link.
If the VPN backbone is an MPLS network, then the advanced failure handling features of MPLS can be used. One of the techniques for protection in MPLS is using backup label switched paths. In other words, two LSPs are usually set up between each pair of sites, a primary and a secondary. When all links are up then the primary LSP is used for communication. Whenever a link along the path of the primary LSP fails, traffic is rerouted to the secondary LSP. To ensure that the secondary LSP can be used in case of any failure along the path of the primary LSP, the two LSPs must be disjoint. As LSPs are set up before the actual link failure, the protection path of a given flow is independent of winch link is failed. An advantage of tins technique is the much faster

fail-over time than IP routing. Note that fast re-route is another protection in MPLS networks, winch is often used in combination w It has even faster fail-over time than switcinng over to the backup L local detour between the nodes connected by the failed link.
The effect of protection methods in routed IP networks and in MP LSPs was also examined, assuming shared protection for single link failures. In other words, network dimensioning was performed in such will support the rerouted traffic in case of any link or any node fails, time. In the case of a link failure the topology of the network and th change. When a node fails, then all of its links are removed from the traffic is also removed from the traffic matrix.
The effect of protection methods in the case of a routed native examined, and the results indicate that applying protection does n relative performance of the four variants of cluster-based provisioning the'effect of routing strategies for method Tit', the results suggest thai strategy among the investigated ones is simple shortest path administrative weights in the backbone are independent of clustering.

possibility for h backup LSPs. P by creating a
S with backup
nd single node
a way that links
ut only one at a
route of flows :opology and its
backbone was
t influence the
With respect to
the best routing
routing where

jvisioning as a thods is similar itrategies on the ed, and here one ifference in the
The effect of a path-protecting redundancy mechanism on the perfonjiance of cluster-based provisioning was also investigated. With respect to overp: function of the number of clusters, the efficiency of the protection rrj
for native IP VPNS and MPLS-based VPNs. The effect of routing required overprovisioning for the cluster-based methods was also stu can see that using different routing strategies makes no significant

e configured to h contrary, path
result. The reason for tins is that the applied routing strategies determ|ine only how the
administrative weights are set on the links in the network. Weights j force the primary route to the aimed path in a routed IP network.
protection is based on Edmonds1 algorithm that chooses the primary and secondary

paths such that the summed costs of the two paths will be minimal, so the shortest path and the primary path could be different.
summary, the cluster-based provisioning method makes it possible to define point-nt(cluster) SLAs between VPN providers and customers. The proposed dimensioning algorithm calculates, preferably using linear programming, link capacities such that none of the links could get congested even at worst case traffic distribution constrained by point-to-cluster traffic limitations at network edges and assuming that routing is known in advance. The congestion-free network design allows the VPN customer to use non-adaptive real-time services over the VPN, winch would be degraded in case of congestion. The dimensioning algorithm is clearly an inevitable tool for the VPN provider offering cluster-based SLAs and QoS guarantees, because the task bf checking the availability of network resources manually is complex and no IP based resource reservation protocol supports it.

Based on
four
coi
winch
inter-clus
scenario,
used
the studied network examples, it can be concluded that the best among the variants of the cluster-based-provisioning, winch needs the least number of nfigurajtion parameters to acineve the same overprovisioning target, was the one hose-like limitations for ultra-cluster traffic and trunk-like limitations for er traffic. Tins variant remained the best irrespectively of the network with and without protection and for optimized routing too.
It proved to be the best compromise between hose and trunk model. In the studied 25-node network, using five clusters decreased the number of bandwidth limitations per node froni 24 to 5, and increased the required link bandwidth by 40% without route optimization compared to trunk model. At the same network, the extra capacity needed by the hose model was 160%.
Route optimization further decreased the overdimensioning of the cluster-based provisioning, in the above example of rive clusters from 40% to 25%. A two-level

iter-cluster-tnmk path routing
routing strategy was the best for the selected intra-cluster-hose model, winch applied tree routing inside each cluster and shortest between clusters.

Tolerance for single failures in a routed IP network required 135% the trunk model. By using cluster-based provisioning with five clus capacity increased with another 35% (with 170% compared protection). Simple shortest path routing, winch is independent of and thus the same for all VPNS, was generally the best routing strate

xtra capacity for ;rs, the total link trunk without luster definitions y.

a close-optimal sites. If cluster
can be mapped the SLA can be 'N is rigid, then ch results in less addresses, winch d method can be
It was assumed during the simulations that clusters are selected wi heuristics, winch is followed by IP address allocation for VPN definition and address allocation has the above order then each clust r to a single IP prefix, winch means that each bandwidth limitation i assigned to a single IP prefix. However, if IP addressing of the V either the clusters need to be defined based on the IP addressing, wh gain-in bandwidth efficiency, or cluster definitions include a list of IP increases management complexity. So, the benefits of the cluster-bas fully exploited when IP addressing can be adjusted to clusters.

The embodiments described above are merely given as examples, understood that the present invention is not limited thereto. Furti changes and improvements winch retain the basic underlying principl are also witinn the scope of the invention.

and it should be er modifications, s disclosed herein

ABBREVIATIONS
ATM Asynchronous Transfer Mode
BW Bandwidth
CAC Connection Admission Control
CSPF Constraint based Shortest Path First
GGSN Gateway GPRS Support Node
HLR Home Location Register
LSP Label Switched Path
MBAC Measurement Based Connection Admission Control
MGW Media Gateway
MPLS Multiple Protocol Label Switcinng
O&M Operation and Maintenance
QoS Quality of Service
RNC Radio Network Controller
RTP Real-time Transfer Protocol
SGSN Serving GPRS Support Node
TIPI Transport IP Infrastructure
UMTS Universal Mobile Telecommunications System
VC/VP Virtual Circuit/ Virtual Path

REFERENCES

[1]
[2]

I. Szab6, "On call Admission Control for IP TelephoW in Best Effort Netwoi'-s", Computer Communications, 26 (2003) pp. 304-313.
Measurement Based Telephony", SCS, of Computer and

I. Szab6, "Performance evaluation of a New End-to-end Call Admission Control Scheme for Supporting IP International Symposium on Performance Evaluation Telecommunication Systems, Orlando, Florida, July 2001.



[3] J. A. Fingerhut, S. Suri, J. S. Turner, "Designing leas

-cost nonlocking

broadband networks", Journal of Algorithms, Vol. 24, ijo. 2, pp. 287-309, August 1997.

Mishra and K. K. for Resource (fcomm, San Diego,
[4]

N. G. Duffield and P. Goyal and A. Greenberg and P. Ramakrishnan and J. E. Van der Merwe, "A Flexible Management in Virtual Private Networks", ACM Sig California, USA, August 1999.



[5]

A. Kumar and R. Rastogi and A. Silberschatz and B. Yerer, "Algorithms for Provisioning Virtual Private Networks in the Hose Model", ACM Sigcomm, Cambridge, Massachusetts, USA, August 2001



Algorithms for Virtual York, USA, June
[6]
[7]

G. Italiano and R. Rastogi and B. Yener, "Restoration Private Networks in the Hose Model", IEEE Infocom, 2002.
Alpar Jttttner, Istvan Szabo, and Aron Szentesi. "On bandwidth efficiency of the hose resource management model in virtual private networks", IEEE Infocom, April 2003.

[8]
[9]
[10]
[11]
[12]
[13]

A. Minoux, "Network synthesis and optimum network design problems: Models, solution methods and applications", Networks, vol. 13, pp. 313-360, 989.
. Pioro, A. Juttner, J. Harmatos, A. Szentesi, P. Gajowniczek, and A. dyslek, "Topological design of telecommunication networks: Nodes and links realization under demand constraints", in 17th International Teletraffic ongress, Salvador de Baina, September 2001.
M.. Pidro, A. Myslek, A. Jiittner, J. Harmatos, and A. Szentesi, "Topological esign of MPLS networks", in Global Communication Conference LOBECOM 2001), San Antonio, Texas, USA, November 2001.
M.. Pioro and P. Gajowniczek, "Solving multicommodity integral flow problems by simulated allocation", Telecommunication Systems, vol. 1, no. 3, pp. 17 28, 1997.
Cinkler, T. Henk, and G. Gordos, "Stochastic algorithms for design of thrifty single-failure-protected networks", DRCN 2000,2000.
1. Maliosz and T. Cinkler, "Methods for Optical VPN Design over Multifiber avelength Routing Networks", in Proc. ONDM, Budapest, Hungary, ebruary2003.



[14] .

. Maliosz and T. Cinkler, "Optimizing Configuration of Virtual Private etworks", in Proc. Polish-Czech-Hungarian Workshop, September 2001, pp. 241 247.

[15] T. Cinkler and M. Maliosz, "Configuration of Protected Virtual Private Networks", in Proc. Tinrd International Workshop on DESIGN OF RELIABLE COMMUNICATION NETWORKS, October 2001.

PESIGNER: A , in Proc. 8th 98, Sorrento,
[16] K. G. Ramakrishnan, D. Mitra, and J. A. Morrison, "VPN Tool for Design of Multiservice Virtual Private Networks International Telecom. Network Planning Symp, NETWORKS Italy, 1998, pp. 153-158.

Resource ', University of
[17] Chen-Nee Chuah, "A Scalable Framework for IP-Nerwork Provisioning Through Aggregation and inerarcincal Control California, Berkeley, 2001.

[18] M. Berkelaar and J. Dirks, "lp_solve 4.0", to be found a|t the ftp-server ftp://ftp.es.ele.tue.nl/pub/lp_solve.














We Claim:
1. A method for improving bandwidth efficiency of a communication
network by resource allocation and management, wherein the communication
network has a set of network nodes (1,2, 3, 4, 5, 6, 7, 8, 9, 10), said method
comprising the steps of:
-partitioning a number of said network nodes (1, 2, 3, 4, 5, 6, 7, 8, 9, 10) into clusters (A, B, B1, B2, C1, C2), each cluster having at least two nodes;
characterized by
-defining traffic limitations on at least two levels, including defining traffic limitations on an intra-cluster level and defining traffic limitations on an inter-cluster level,
-associating traffic limitations on said levels, said traffic limitations including at least one node- to-cluster traffic limitation for inter-cluster traffic;
-allocating and managing resources in the communication network by performing cluster-based provisioning based on said traffic limitations, such that the bandwidth efficiency is improved.
2. The method as claimed in claim 1, wherein said step of allocating and managing resources comprises the step of applying one of a cluster-based trunk model and a cluster-based hose model involves said at least one node-to-cluster traffic limitation on the inter-cluster level.
3. The method as claimed in claim 2, wherein said step of allocating and managing resources comprises the step of applying at least one of a trunk model and a hose model involving at least one supplementary traffic limitation on the intra- cluster level.
4. The method as claimed in claim 1, wherein said step of allocating and managing resources comprises a cluster based service level definition module (214) for
-applying a cluster-based trunk model involving said at least one node-to-cluster traffic limitation on the inter-cluster level; and
-applying a cluster- based hose model involving at least one supplementary traffic limitation in at least one cluster on the intra-cluster level.
5. The method as claimed in claim 1, wherein said at least one node-to-cluster traffic limitation is defined to limit, for at least one given node (1, 2, 3, 4,5, 6, 7, 8, 9, 10) in a given cluster (A, B, B1, B2, C1, C2), the amount of traffic in relation to at least one other cluster.
6. The method as claimed in claim 5, wherein said at least one node-to-cluster traffic limitation includes:
-at least one limitation defined to limit, for a given node (1, 2, 3, 4,5, 6, 7, 8, 9, 10) in a given cluster (A, B, Bl, B2, C1, C2), the amount of traffic to at least one other cluster; and
-at least one limitation defined to limit, for said given node in said given cluster, the amount of traffic from at least one other cluster.
7. The method as claimed in claim 5, wherein a cluster-based hose model is
applied on the inter-cluster level and said at least one node-to-cluster limitation
includes:
-a first limitation defined to limit, for a given node (1, 2, 3, 4, 5, 6, 7, 8, 9, 10) in a given cluster (A, B, Bl, B2, C1, C2), the sum of outgoing traffic that goes to any other cluster; and
-a second limitation defined to limit, for said given node in said given cluster, the sum of incoming traffic that comes from any other cluster.
8. The method as claimed in claim 5, wherein a cluster-based trunk model is
applied on the inter-cluster level and said at least one node-to-cluster limitation
includes:
-a first set of limitations defined to limit, for a given node (1,2, 3, 4, 5, 6, 7, 8, 9, 10) in a given cluster (A, B, B1, B2, C1, C2), the amount of traffic to each of a first set of other clusters; and
-a second set of limitations defined to limit, for said given node in said given cluster, the amount of traffic from each of a second set of other clusters.
9. The method as claimed in claim 1, comprising the step of implementing cluster-based routing on at least two levels, including intra-cluster routing and inter-cluster routing.
10. The method as claimed in claim 9, wherein said step of allocating and managing resources comprises applying a cluster-based trunk model on the inter-cluster level; and
applying a hose model on the intra-cluster level; and wherein said step of implementing cluster-based routing comprises the steps of: applying shortest path routing on the inter-cluster level; and applying tree routing on the intra-cluster level.
11. The method as claimed in claim 1, wherein said step of partitioning a
number of said network nodes (1,2, 3, 4,5, 6, 7, 8, 9, 10) into clusters (A, B, Bl, B2,
C1, C2) comprises the step of defining said clusters based on at least one of:
- traffic distribution between nodes;
- subnet address planning;
- network topology;
minimization of the number of admission control parameters in the nodes; and maximization of bandwidth efficiency.
12. The method as claimed in claim 1, wherein an admission control unit
(220) exercises cluster-based admission control on at least two levels, including intra-
cluster admission control and inter-cluster admission control, based on the traffic
limitations in said cluster-based service-level definition.
13. A system for resource allocation and management in a communication
network having a set of network nodes (1,2, 3, 4,5, 6, 7, 8, 9, 10) for implementing the method claimed in claim 1, said system comprising:
-a cluster selection unit (122) for partitioning a number of said network nodes into clusters (A, B, Bl, B2, C1, C2), each cluster having at least two nodes;
-a service level definition unit (126; 214) for defining traffic limitations on at least two levels, including intra-cluster level and inter-cluster level, said traffic limitations including at least one node-to-cluster traffic limitation for inter-cluster traffic; and
-a dimensioning module (130; 220) for allocating and managing resources based on said traffic limitations.

Documents:

4713-DELNP-2006-Abstract-(01-06-2010).pdf

4713-delnp-2006-abstract.pdf

4713-DELNP-2006-Claims-(01-06-2010).pdf

4713-DELNP-2006-Claims-(12-10-2011).pdf

4713-delnp-2006-claims.pdf

4713-DELNP-2006-Correspondence Others-(12-10-2011).pdf

4713-DELNP-2006-Correspondence-Others-(01-06-2010).pdf

4713-delnp-2006-correspondence-others.pdf

4713-DELNP-2006-Description (Complete)-(01-06-2010).pdf

4713-delnp-2006-description (complete).pdf

4713-DELNP-2006-Drawings-(01-06-2010).pdf

4713-delnp-2006-drawings.pdf

4713-DELNP-2006-Form-1-(01-06-2010).pdf

4713-delnp-2006-form-1.pdf

4713-DELNP-2006-Form-2-(01-06-2010).pdf

4713-delnp-2006-form-2.pdf

4713-delnp-2006-form-26.pdf

4713-delnp-2006-form-3.pdf

4713-delnp-2006-form-5.pdf

4713-DELNP-2006-GPA-(12-10-2011).pdf

4713-delnp-2006-pct-210.pdf

4713-DELNP-2006-Petition 137-(01-06-2010).pdf

4713-DELNP-2006-Petition 137-(12-10-2011).pdf

abstract.jpg


Patent Number 251357
Indian Patent Application Number 4713/DELNP/2006
PG Journal Number 10/2012
Publication Date 09-Mar-2012
Grant Date 07-Mar-2012
Date of Filing 17-Aug-2006
Name of Patentee TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
Applicant Address SE-164 83 STOCKHOLM (SE)
Inventors:
# Inventor's Name Inventor's Address
1 WESTBERG, LARS LANGTORA, S-745 96 ENKOPING (SE)
2 HARMATOS JANOS KOLOZSVARI U 37, H-1102 BUDAPEST (HU)
3 ANTAL CSABA RAKOCZI UT 19,H-2340 KISKUNLACHAZA (HU)
4 JUTTNER ALPAR DEMBINSZKU U. 36 II/22, H-1071 BUDAPEST (HU)
PCT International Classification Number H04L 12/56
PCT International Application Number PCT/SE2004/001965
PCT International Filing date 2004-12-22
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 60/541,365 2004-02-04 U.S.A.
2 10/939,970 2004-09-14 U.S.A.