Method and device for packet flux monitoring

A message and flow technology, applied in the field of communication, can solve the problems of message discarding and obtaining enough tokens, etc.

Inactive Publication Date: 2010-12-08
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the dual-token bucket mechanism is used to implement traffic monitoring. If the CBS (Committed Burst Size, agreed burst size) and PBS (Peak Burst Size, peak burst size) of the C bucket are set to be smaller than the length of the packet to be forwarded, Since the packets cannot obtain enough tokens from the token bucket, these packets whose length is greater than the depth of the bucket are discarded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for packet flux monitoring
  • Method and device for packet flux monitoring
  • Method and device for packet flux monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] see image 3 , the embodiment of the present invention provides a method for traffic monitoring of messages. This embodiment takes obtaining tokens from a single token bucket as an example for illustration, and the details are as follows:

[0036] 101: Set the maximum overdraft limit of the token bucket according to the maximum length of the forwardable message of the token bucket.

[0037] Wherein, the maximum length of the message that can be forwarded by the token bucket is set as the maximum overdraft amount of the token itself, for example, the maximum length of the message that can be forwarded by the token bucket is 10240 bytes, then the maximum length of the token bucket The overdraft limit is 10240 bytes. When an overdraftable token is set for the token bucket, correspondingly, the value BL(tj) of the number of tokens in the token bucket can be negative. When it is negative, it means that the set overdraft token has been overdrawn, so , for token buckets, the...

Embodiment 2

[0054] see Figure 5 , the embodiment of the present invention provides a method for traffic monitoring of messages. This embodiment takes token acquisition from a double token bucket (C bucket and P bucket) as an example, and uses the double token bucket as the color sense mode For example, please refer to the following content for details:

[0055] 201: According to the maximum length of the forwardable message of each token bucket, respectively set the maximum overdraft quota of the C token bucket and the P token bucket.

[0056] Among them, when setting the maximum overdraft quota of the C token bucket and the P token bucket, their values ​​can be the same or different. For example, the maximum length of the message that can be forwarded by the C token bucket and the P token bucket is 10240 bytes , the maximum overdraft limit of the C token bucket and the P token bucket is 10240 bytes.

[0057] 202: Receive a message, judge whether the value of the token number in the P ...

Embodiment 3

[0068] see Figure 7 , the embodiment of the present invention provides a device for traffic monitoring of messages, the device includes:

[0069] The setting module is used to set the overdraft token in the token bucket;

[0070] The receiving module is used to receive the message and obtain the length of the message;

[0071] The acquisition module is used to determine whether the overdraft token of the token bucket is overdrawn when the length of the message is greater than the bucket depth of the token bucket, and if the judgment result is that the overdraft token of the token bucket is not overdrawn, then from the token bucket Obtain an overdraft token;

[0072] The forwarding module is configured to forward the message according to the token obtained from the token bucket, the token at least includes an overdraft token and corresponds to the length of the message.

[0073] In traffic monitoring, the single-token bucket mechanism and the double-token bucket mechanism a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for supervising the flux of messages, which pertains to the communication field. The method comprises the steps as follows: overdraft tokens are arranged in a token bucket; a message is received and the length of the message is obtained; when the length of the message is larger than the depth of the bucket, the overdraft tokens in the token bucket arechecked whether overdraft; if the overdraft tokens in the token bucket do not overdraft, the overdraft tokens are obtained from the token bucket; the message is transmitted according to the tokens obtained from the token bucket; the tokens obtained include at least the overdraft tokens and are corresponding to the length of the message. The device comprises an arranging module, a receiving module, an obtaining module and a transmitting module. By virtue of the design of the overdraft tokens to the token bucket, when receiving a message and in case of insufficient positive tokens or no token in the token bucket, the message can also be conditionally and normally transmitted.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for flow monitoring of messages. Background technique [0002] Due to the limitation of network resources, in order to balance the load of the network, it is necessary for the ISP (Internet Service Provider, Internet Service Provider) to control the traffic and load sent by users to the network. The usual method is to use traffic policing The (Policing) method supervises and controls the traffic accessing a certain network. The so-called traffic regulation refers to restricting the data flow and burst of a certain connection entering a certain network. Its typical function is to limit it within an allowable range by supervising If the message flow of the connection is too large, the message is discarded, or the priority of the message is reset (such as limiting the HTTP (Hypertext Transfer Protocol, Hypertext Transfer Protocol) message cannot occupy more than 50% of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L12/26H04L12/811
Inventor 莫大明
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products