Flow monitoring method and flow monitoring equipment

A technology of equipment and traffic, applied in the field of network communication, can solve the problems of idle bandwidth not being used by other users, waste of bandwidth resources, etc.

Inactive Publication Date: 2008-07-23
NEW H3C TECH CO LTD
View PDF0 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the above scheme can limit the traffic of each user very well, it has the following defects: since the traffic allocated to each user, that is, the bandw

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow monitoring method and flow monitoring equipment
  • Flow monitoring method and flow monitoring equipment
  • Flow monitoring method and flow monitoring equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0037] In order to overcome the problem of low bandwidth resource utilization in the prior art, the present invention proposes a flow monitoring method. In this method, two levels of token buckets need to be set: 1. User token buckets, which correspond to users to be supervised one-to-one, and are used to limit the traffic of each user to be supervised; 2. Total token buckets, used to limit all users of the total flow. Among them, the capacities of the user token bucket and the total token bucket can be set according to actual needs.

[0038] Usually, the configuration parameters of the token bucket include: Committed Information Rate (CIR) and Committed Burst Size (CBS), CIR indicates the rate at which tokens are placed in the bucket, and CBS indicate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for monitoring flow, the method comprises aiming at each user who is waiting to be monitored, respectively setting user token buckets, aiming at all users who are waiting to be monitored, setting a total token bucket, respectively adding tokens in each user token bucket, adding token which is overflowed from user token buckets in the total token bucket, judging whether a user token bucket of a user has enough buckets to transmit the message after receiving message of users which are waiting to be monitored, if has enough buckets, transmitting the message, taking out tokens whose number are equal to message transmitting authority from the user token bucket of the user, if not, judging whether tokes which are enough to transmit the message are existed in the total token bucket, if the tokes are enough, and then transmitting the message, and taking tokens whose number are equal to the message transmitting authority from the total token bucket. In addition, the invention also provides flow monitoring equipment. The invention can improve bandwidth resource utilization ratio.

Description

technical field [0001] The invention relates to network communication technology, in particular to a flow monitoring method and flow monitoring equipment. Background technique [0002] In the process of network communication, in order to make limited network resources play a better role and prevent a large amount of sudden user data from congesting the network, user traffic must be supervised. A typical application of traffic policing is to monitor the specification of a certain traffic entering the network, limit it within a reasonable range, or "punish" the excess traffic, so as to protect network resources and operators' interests. [0003] To implement traffic regulation, it is first necessary to evaluate whether the traffic exceeds the specification, and then implement regulation policies based on the evaluation results. Usually, the traffic specification evaluation is carried out in the token bucket mode. The token bucket can be regarded as a container with a certain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L12/26H04L12/801
Inventor 常慧锋
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products