Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless network traffic control method

A flow control, wireless network technology, applied in the direction of network flow/resource management, wireless communication, electrical components, etc., can solve problems such as wireless access point network congestion, achieve the effect of convenient use, reasonable design, and avoid network congestion

Inactive Publication Date: 2015-02-04
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The same wireless hotspot device can create multiple virtual access points, and different virtual access points can be used by different user groups. In this way, the network bandwidth between user groups has a competitive relationship. In the case of too many access terminals will cause network congestion for the entire wireless access point

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network traffic control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0011] The steps of this method are as follows:

[0012] Set tokens in the system, the system generates tokens at a certain frequency, each token represents the number of bytes allowed to pass, when the data packet arrives, compare the size of the data packet with the number of characters that can be represented by the number of tokens currently generated Section number. The number of tokens in the system is controlled by the token bucket structure. The burst size is set in the system to reduce the fluctuation of flow control. The size of the token bucket is determined by the burst size. When the number of tokens stored in the token bucket exceeds Once the size of the token bucket is exceeded, no new tokens will be generated until the tokens are reduced. Each terminal and virtual access point of the system are respectively equipped with a token bucket. Data packets first enter the token bucket of the terminal according to the hardware address of the terminal for flow ...

Embodiment 2

[0014] Set tokens in the system, the system generates tokens at a frequency of 100Hz, that is, tokens are generated once every 10ms, and each token represents the number of bytes allowed to pass. When the data packet arrives, compare the size of the data packet with the currently generated The number of bytes represented by the number of tokens. The number of tokens in the system is controlled by the token bucket structure. The burst size is set in the system to reduce the fluctuation of flow control. The size of the token bucket is determined by the burst size. Token bucket size = burst size / each order The number of bytes the card is allowed to pass through. When the number of tokens stored in the token bucket exceeds the size of the token bucket, no new tokens will be generated until the number of tokens decreases. Each terminal and virtual access point of the system are respectively equipped with a token bucket. Data packets first enter the token bucket of the terminal a...

Embodiment 3

[0016] Take the deployment of an independent kernel module to a wireless network device as an example:

[0017] An independent kernel module is deployed to the wireless network device, and will not affect the existing network processing flow without loading. At the beginning of the bridge module receiving the message, the ingress rate limit is imposed on the message from the virtual access point, and the egress rate limit is imposed on the message sent to the virtual access point at the end of the forwarding process. The administrator configures the speed limit value and burst size, the kernel module creates a token bucket structure for each configured terminal and virtual access point, determines the number of tokens added each time and the size of the token bucket, and sets the timer Adds the number of tokens at a set frequency. When the data packet arrives, the size of the data packet will be compared with the number of bytes represented by the currently generated token nu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless network traffic control method. The method comprising the following steps: setting a token in the system; producing the token by the system based on a certain frequency, wherein each token represents the byte count allowed to passing; comparing the size of a data packet and the byte count represented by the currently generated token number after the data packet arrives; allowing to release the data packet and reducing the corresponding byte count at the same time when the byte count represented by the token number is not less than the size of the data packet; including the data packet into a cache list or giving up when the byte count represented by the token number is less than the size of the data packet. Compared with the prior art, the wireless network traffic control method has the characteristics of being reasonable in design and convenient to use; the network speed limitation is performed for different virtual access points to ensure that some important virtual access points are not influenced by other virtual access points, and as a result, the influence of the network congestion on some important users can be avoided.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method for wireless network flow control. Background technique [0002] With the rapid development of wireless network technology, the application of wireless network becomes more and more extensive. In the case of wireless hotspots accessing multiple terminals, each terminal may occupy different network resources due to executing different types of services. When some users occupy too many network resources, it will affect the services of other terminals and cause network congestion, seriously affecting user experience. Through flow control technology, the network bandwidth occupied by each user can be limited within a certain range. The same wireless hotspot device can create multiple virtual access points, and different virtual access points can be used by different user groups. In this way, the network bandwidth between user groups has a competitive relation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W28/14
CPCH04W28/14
Inventor 张光华闫永刚吴庆民
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More