Wireless network traffic control method
A flow control, wireless network technology, applied in the direction of network flow/resource management, wireless communication, electrical components, etc., can solve problems such as wireless access point network congestion, achieve the effect of convenient use, reasonable design, and avoid network congestion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0011] The steps of this method are as follows:
[0012] Set tokens in the system, the system generates tokens at a certain frequency, each token represents the number of bytes allowed to pass, when the data packet arrives, compare the size of the data packet with the number of characters that can be represented by the number of tokens currently generated Section number. The number of tokens in the system is controlled by the token bucket structure. The burst size is set in the system to reduce the fluctuation of flow control. The size of the token bucket is determined by the burst size. When the number of tokens stored in the token bucket exceeds Once the size of the token bucket is exceeded, no new tokens will be generated until the tokens are reduced. Each terminal and virtual access point of the system are respectively equipped with a token bucket. Data packets first enter the token bucket of the terminal according to the hardware address of the terminal for flow ...
Embodiment 2
[0014] Set tokens in the system, the system generates tokens at a frequency of 100Hz, that is, tokens are generated once every 10ms, and each token represents the number of bytes allowed to pass. When the data packet arrives, compare the size of the data packet with the currently generated The number of bytes represented by the number of tokens. The number of tokens in the system is controlled by the token bucket structure. The burst size is set in the system to reduce the fluctuation of flow control. The size of the token bucket is determined by the burst size. Token bucket size = burst size / each order The number of bytes the card is allowed to pass through. When the number of tokens stored in the token bucket exceeds the size of the token bucket, no new tokens will be generated until the number of tokens decreases. Each terminal and virtual access point of the system are respectively equipped with a token bucket. Data packets first enter the token bucket of the terminal a...
Embodiment 3
[0016] Take the deployment of an independent kernel module to a wireless network device as an example:
[0017] An independent kernel module is deployed to the wireless network device, and will not affect the existing network processing flow without loading. At the beginning of the bridge module receiving the message, the ingress rate limit is imposed on the message from the virtual access point, and the egress rate limit is imposed on the message sent to the virtual access point at the end of the forwarding process. The administrator configures the speed limit value and burst size, the kernel module creates a token bucket structure for each configured terminal and virtual access point, determines the number of tokens added each time and the size of the token bucket, and sets the timer Adds the number of tokens at a set frequency. When the data packet arrives, the size of the data packet will be compared with the number of bytes represented by the currently generated token nu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
