Network flow detection method
A control method and network flow technology, applied in the network field, to achieve the effect of flexible and convenient configuration, satisfying control requirements and realizing flow control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] Before performing flow control, the user first determines the protocol that needs to be controlled. The control strategy can distinguish different protocols / applications, and can set the preset threshold of each protocol flow. The user can also set different preset thresholds in different time periods. Set thresholds for more efficient use of bandwidth. Protocol analysis is the premise of the present invention, but does not belong to the scope of the present invention. After the protocol has been identified, using the present invention can effectively and accurately control the protocol flow of the multi-connection feature.
[0047] The flow control method of this embodiment adopts the bypass access mode, and its network topology is as follows figure 1 As shown, in the bypass access model, use the network monitoring equipment of this embodiment (ie figure 1 The flow control system in the network) is in the middle of the internal / external network, but is independent ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com