Unlock instant, AI-driven research and patent intelligence for your innovation.

Overload protection method for ACS (access control system) based on token bucket

An overload protection and token bucket technology, applied in the field of ACS system, can solve problems such as sudden interruption

Active Publication Date: 2017-04-26
LOOTOM TELCOVIDEO NETWORK WUXI
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The TR069 protocol is based on the state machine: according to the common method of current limiting, it is easy to cause half of the data transmission and sudden interruption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Overload protection method for ACS (access control system) based on token bucket
  • Overload protection method for ACS (access control system) based on token bucket

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0057] See figure 1 , figure 2 , a kind of ACS system overload protection method based on token bucket of the present invention, comprises the following steps:

[0058] Step 1: Create two token buckets in the ACS system: full-speed token bucket and half-speed token bucket, inject first-level tokens into the full-speed token bucket, and inject second-level tokens into the half-speed token bucket;

[0059] Step 2: According to the hardware utilization rate of the ACS system, determine the bucket depth and the number of injected tokens of the full-speed token bucket and the half-speed token bucket respectively.

[0060] Step 3: The CPE device accesses the ACS system to send a CPE request, and the ACS system tries to obtain the token stored in the cookie requested by the CPE. If the acquisition is successful, perform step 7, otherwise perform step 4;

[0061] Step 4: Try to obtain a first-level token from the full-speed token bucket, and judge whether the number of first-level ...

specific Embodiment 2

[0095] See figure 1 , figure 2 , a kind of ACS system overload protection method based on token bucket of the present invention, comprises the following steps:

[0096] Step 1: Create two token buckets in the ACS system: full-speed token bucket and half-speed token bucket, inject first-level tokens into the full-speed token bucket, and inject second-level tokens into the half-speed token bucket;

[0097] Step 2: According to the hardware utilization rate of the ACS system, determine the bucket depth and the number of injected tokens of the full-speed token bucket and the half-speed token bucket respectively.

[0098] Step 3: The CPE device accesses the ACS system to send a CPE request, and the ACS system tries to obtain the token stored in the cookie requested by the CPE. If the acquisition is successful, perform step 7, otherwise perform step 4;

[0099] Step 4: Try to obtain a first-level token from the full-speed token bucket, and judge whether the number of first-level ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an overload protection method for ACS based on token bucket which can effectively allocate the ACS resources and reduces the service pressure of the ACS. The method comprises the following steps: creating two token buckets in the ACS referred to as a full-speed token bucket and a half-speed token bucket wherein the full-speed token bucket is injected with a first level token and the half-speed token bucket is injected with a second level token; for the access request sent by a CPE device to the ACS, attempts are made to obtain the first level token from the full-speed token bucket; when the first level token is successfully obtained, then the full-speed TR069 request is executed; and the TR069 business is processed according to standard procedures; when the first level token fails to be obtained, another attempt is made to obtain the second level token from the half-speed token bucket; when the second level token is successfully obtained, then the half-speed TR069 request is executed to process the Inform information; and when the second level token fails to be obtained, the ACS outputs the HTTP 403 response indicating that the ACS denies the request.

Description

technical field [0001] The invention relates to the technical field of ACS systems, in particular to a token bucket-based ACS system overload protection method. Background technique [0002] CWMP (CPE WAN Management Protocol, CPE Wide Area Network Management Protocol) is one of the technical specifications initiated and developed by the DSL (Digital Subscriber's Line, Digital Subscriber Line) Forum. The number is TR-069, so it is also called the TR-069 protocol. It provides a general framework, message specification, management method and data model for the management and configuration of home network devices in the next generation network. [0003] CWMP is mainly used in DSL access network environment. In the DSL access network, due to the large number of user equipment and scattered deployment, it is usually located on the user side, and it is difficult to manage and maintain the equipment. User-side equipment) for remote centralized management, solves the management dif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/819H04L47/21
CPCH04L47/215
Inventor 尤克斌李刚马金满徐帆陈浩东孙明亮朱波王振兴
Owner LOOTOM TELCOVIDEO NETWORK WUXI