the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
specific Embodiment 1
[0057] See figure 1 , figure 2 , a kind of ACS system overload protection method based on token bucket of the present invention, comprises the following steps:
[0058] Step 1: Create two token buckets in the ACS system: full-speed token bucket and half-speed token bucket, inject first-level tokens into the full-speed token bucket, and inject second-level tokens into the half-speed token bucket;
[0059] Step 2: According to the hardware utilization rate of the ACS system, determine the bucket depth and the number of injected tokens of the full-speed token bucket and the half-speed token bucket respectively.
[0060] Step 3: The CPE device accesses the ACS system to send a CPE request, and the ACS system tries to obtain the token stored in the cookie requested by the CPE. If the acquisition is successful, perform step 7, otherwise perform step 4;
[0061] Step 4: Try to obtain a first-level token from the full-speed token bucket, and judge whether the number of first-level ...
specific Embodiment 2
[0095] See figure 1 , figure 2 , a kind of ACS system overload protection method based on token bucket of the present invention, comprises the following steps:
[0096] Step 1: Create two token buckets in the ACS system: full-speed token bucket and half-speed token bucket, inject first-level tokens into the full-speed token bucket, and inject second-level tokens into the half-speed token bucket;
[0097] Step 2: According to the hardware utilization rate of the ACS system, determine the bucket depth and the number of injected tokens of the full-speed token bucket and the half-speed token bucket respectively.
[0098] Step 3: The CPE device accesses the ACS system to send a CPE request, and the ACS system tries to obtain the token stored in the cookie requested by the CPE. If the acquisition is successful, perform step 7, otherwise perform step 4;
[0099] Step 4: Try to obtain a first-level token from the full-speed token bucket, and judge whether the number of first-level ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a token bucket-based ACS system overload protection method, which can effectively allocate ACS system resources and reduce the service pressure of the ACS system, including the following steps: establishing two token buckets in the ACS system: a full-speed token bucket and half-speed token bucket, inject the first-level token into the full-speed token bucket, and inject the second-level token into the half-speed token bucket; for the access request sent by the CPE device to the ACS system, try to obtain a token from the full-speed token bucket If the first-level token is successfully obtained, the TR069 request will be executed at full speed, and the TR069 business will be processed according to the standard process; If the card is successful, the half-speed TR069 request is executed to process the Inform information; if the second-level token fails to be obtained, the ACS system outputs an HTTP 403 response, indicating that the ACS system prohibits the request.
Description
technical field [0001] The invention relates to the technical field of ACS systems, in particular to a token bucket-based ACS system overload protection method. Background technique [0002] CWMP (CPE WAN Management Protocol, CPE Wide AreaNetwork Management Protocol) is one of the technical specifications initiated and developed by the DSL (Digital Subscriber's Line, Digital Subscriber Line) Forum. The number is TR-069, so it is also called the TR-069 protocol. It provides a general framework, message specification, management method and data model for the management and configuration of home network devices in the next generation network. [0003] CWMP is mainly used in DSL access network environment. In the DSL access network, due to the large number of user equipment and scattered deployment, it is usually located on the user side, and it is difficult to manage and maintain the equipment. User-side equipment) for remote centralized management, solves the management dif...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.