the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
specific Embodiment 1
[0057] See figure 1 , figure 2 , a kind of ACS system overload protection method based on token bucket of the present invention, comprises the following steps:
[0058] Step 1: Create two token buckets in the ACS system: full-speed token bucket and half-speed token bucket, inject first-level tokens into the full-speed token bucket, and inject second-level tokens into the half-speed token bucket;
[0059] Step 2: According to the hardware utilization rate of the ACS system, determine the bucket depth and the number of injected tokens of the full-speed token bucket and the half-speed token bucket respectively.
[0060] Step 3: The CPE device accesses the ACS system to send a CPE request, and the ACS system tries to obtain the token stored in the cookie requested by the CPE. If the acquisition is successful, perform step 7, otherwise perform step 4;
[0061] Step 4: Try to obtain a first-level token from the full-speed token bucket, and judge whether the number of first-level ...
specific Embodiment 2
[0095] See figure 1 , figure 2 , a kind of ACS system overload protection method based on token bucket of the present invention, comprises the following steps:
[0096] Step 1: Create two token buckets in the ACS system: full-speed token bucket and half-speed token bucket, inject first-level tokens into the full-speed token bucket, and inject second-level tokens into the half-speed token bucket;
[0097] Step 2: According to the hardware utilization rate of the ACS system, determine the bucket depth and the number of injected tokens of the full-speed token bucket and the half-speed token bucket respectively.
[0098] Step 3: The CPE device accesses the ACS system to send a CPE request, and the ACS system tries to obtain the token stored in the cookie requested by the CPE. If the acquisition is successful, perform step 7, otherwise perform step 4;
[0099] Step 4: Try to obtain a first-level token from the full-speed token bucket, and judge whether the number of first-level ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides an overload protection method for ACS based on token bucket which can effectively allocate the ACS resources and reduces the service pressure of the ACS. The method comprises the following steps: creating two token buckets in the ACS referred to as a full-speed token bucket and a half-speed token bucket wherein the full-speed token bucket is injected with a first level token and the half-speed token bucket is injected with a second level token; for the access request sent by a CPE device to the ACS, attempts are made to obtain the first level token from the full-speed token bucket; when the first level token is successfully obtained, then the full-speed TR069 request is executed; and the TR069 business is processed according to standard procedures; when the first level token fails to be obtained, another attempt is made to obtain the second level token from the half-speed token bucket; when the second level token is successfully obtained, then the half-speed TR069 request is executed to process the Inform information; and when the second level token fails to be obtained, the ACS outputs the HTTP 403 response indicating that the ACS denies the request.
Description
technical field [0001] The invention relates to the technical field of ACS systems, in particular to a token bucket-based ACS system overload protection method. Background technique [0002] CWMP (CPE WAN Management Protocol, CPE Wide AreaNetwork Management Protocol) is one of the technical specifications initiated and developed by the DSL (Digital Subscriber's Line, Digital Subscriber Line) Forum. The number is TR-069, so it is also called the TR-069 protocol. It provides a general framework, message specification, management method and data model for the management and configuration of home network devices in the next generation network. [0003] CWMP is mainly used in DSL access network environment. In the DSL access network, due to the large number of user equipment and scattered deployment, it is usually located on the user side, and it is difficult to manage and maintain the equipment. User-side equipment) for remote centralized management, solves the management dif...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.