Network flow detection method

A control method and network flow technology, applied in the network field, to achieve the effect of flexible and convenient configuration, satisfying control requirements and realizing flow control

Inactive Publication Date: 2012-07-04
INST OF ACOUSTICS CHINESE ACAD OF SCI
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006]The current bypass access control technology is not yet relatively mature. In addition to the shortcomings in flow detection, in existing methods, as long as the flow exceeds the preset threshold, Just block it directly, which is very likely to block most of the connections at once. If this continues, it will inevitably cause large fluctuations in traffic, which is also a waste of effective bandwidth
Furthermore, the configuration of the existing traffic control strategy is not flexible and comprehensive enough
Therefore, there is still a large room for improvement in the existing TCP flow control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network flow detection method
  • Network flow detection method
  • Network flow detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Before performing flow control, the user first determines the protocol that needs to be controlled. The control strategy can distinguish different protocols / applications, and can set the preset threshold of each protocol flow. The user can also set different preset thresholds in different time periods. Set thresholds for more efficient use of bandwidth. Protocol analysis is the premise of the present invention, but does not belong to the scope of the present invention. After the protocol has been identified, using the present invention can effectively and accurately control the protocol flow of the multi-connection feature.

[0047] The flow control method of this embodiment adopts the bypass access mode, and its network topology is as follows figure 1 As shown, in the bypass access model, use the network monitoring equipment of this embodiment (ie figure 1 The flow control system in the network) is in the middle of the internal / external network, but is independent ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a network flow detection method, and comprises the following steps: a) adopting a flow control system to calculate the average rate of protocols according to the historical information of the protocol of the data packet and the information carried by the data packet; b) judging whether the data packet of the protocol should be controlled according to the average rate of protocols, which is calculated in the step a); and c) controlling the data packet which satisfies the control condition. Compared with the prior art, the method has the following advantages: the rate estimation algorithm based on the historical time window is adopted to accurately calculate the rate of the current protocol flow; the flexible and convenient configuration can be used for simultaneously controlling a plurality of protocols which are combined freely; the efficiency of the system is improved; only the protocol to be controlled needs processing, while others need no processing;the bypass type access brings convenience and can not form network bottlenecks; the system is simple and can be easily realized; and the system can achieve the accurate flow control.

Description

technical field [0001] The invention belongs to the field of network technology, in particular, the invention relates to a flow control method. [0002] Background technique [0003] With the rapid development of Internet services, network traffic increases sharply, network applications continue to emerge, and their application forms are shifting from traditional services such as FTP and Web to P2P and Web2.0. At the same time, this trend has also caused some problems, for example, the P2P applications that have emerged in recent years have greatly consumed limited network resources. [0004] P2P is a distributed network that breaks the traditional Client / Server (C / S) model, and the status of each node in the network is equal. Each node not only acts as a server, provides services for other nodes, but also enjoys the services provided by other nodes. However, P2P applications occupy a large amount of bandwidth. Statistical analysis shows that P2P applications account for a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L12/801
Inventor 周旭唐晖范鹏飞赵志军谭红艳
Owner INST OF ACOUSTICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products