Token bucket management method and device

A management method and token bucket technology, applied in the field of network communication, can solve the problems of large data flow, large computing resources, occupation, etc., and achieve the effect of reducing consumption and reducing the probability of access conflicts

Active Publication Date: 2019-05-07
HANGZHOU DPTECH TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a token bucket management method and device to solve the problem that the existing token bucket management method cannot satisfy the situation of large data traffic, and cannot have multiple processors accessing the same segment of memory at the same time and performing write operations. computing resource issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token bucket management method and device
  • Token bucket management method and device
  • Token bucket management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0026] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a token bucket management method and device. The method includes: receiving an operation instruction triggered by a user to configure the token addition rate; analyzing the token addition rate configured by the user from the operation instruction, and adding the parsed token to The rate is determined as the first addition rate CIR; according to the first addition rate CIR, determine the second addition rate CIR_new; according to the second addition rate CIR_new, add tokens to the token buckets of the preset number for CPU_C processors to forward reports Modify the number of tokens in the token bucket corresponding to the message without concurrent lock protection. In this application, by changing the token addition rate and decomposing the token bucket, the token bucket is processed accordingly, so that multiple processors can simultaneously access a section of memory and perform write operations without lock protection.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to a token bucket management method and device. Background technique [0002] Token bucket is the most commonly used technology in network traffic shaping (Traffic Shaping) and rate limiting (RateLimiting) in a multi-core environment. The token bucket involves two parameters: 2 parameters are involved: the token generation rate (Committed Information Rate, CIR) and the token bucket size (Committed Burst Size, CBS). [0003] The working process of the token bucket is: (1) Add tokens to the token bucket according to a specific token adding rate; (2) When receiving a message, when there are enough tokens in the token bucket, the message is forwarded, and at the same time Consume tokens corresponding to the packet length. During the execution of steps (1) and (2), the processor needs to access the memory to change the value of the token in the token bucket, but...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/819H04L47/21
CPCH04L47/215
Inventor 杨金良薛雄超
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products