Unlock instant, AI-driven research and patent intelligence for your innovation.

A token bucket based acs system overload protection method

An overload protection and token bucket technology, applied in the field of ACS system, can solve problems such as sudden interruption

Active Publication Date: 2019-12-03
LOOTOM TELCOVIDEO NETWORK WUXI
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The TR069 protocol is based on the state machine: according to the common method of current limiting, it is easy to cause half of the data transmission and sudden interruption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A token bucket based acs system overload protection method
  • A token bucket based acs system overload protection method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0057] See figure 1 , figure 2 , a kind of ACS system overload protection method based on token bucket of the present invention, comprises the following steps:

[0058] Step 1: Create two token buckets in the ACS system: full-speed token bucket and half-speed token bucket, inject first-level tokens into the full-speed token bucket, and inject second-level tokens into the half-speed token bucket;

[0059] Step 2: According to the hardware utilization rate of the ACS system, determine the bucket depth and the number of injected tokens of the full-speed token bucket and the half-speed token bucket respectively.

[0060] Step 3: The CPE device accesses the ACS system to send a CPE request, and the ACS system tries to obtain the token stored in the cookie requested by the CPE. If the acquisition is successful, perform step 7, otherwise perform step 4;

[0061] Step 4: Try to obtain a first-level token from the full-speed token bucket, and judge whether the number of first-level ...

specific Embodiment 2

[0095] See figure 1 , figure 2 , a kind of ACS system overload protection method based on token bucket of the present invention, comprises the following steps:

[0096] Step 1: Create two token buckets in the ACS system: full-speed token bucket and half-speed token bucket, inject first-level tokens into the full-speed token bucket, and inject second-level tokens into the half-speed token bucket;

[0097] Step 2: According to the hardware utilization rate of the ACS system, determine the bucket depth and the number of injected tokens of the full-speed token bucket and the half-speed token bucket respectively.

[0098] Step 3: The CPE device accesses the ACS system to send a CPE request, and the ACS system tries to obtain the token stored in the cookie requested by the CPE. If the acquisition is successful, perform step 7, otherwise perform step 4;

[0099] Step 4: Try to obtain a first-level token from the full-speed token bucket, and judge whether the number of first-level ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a token bucket-based ACS system overload protection method, which can effectively allocate ACS system resources and reduce the service pressure of the ACS system, including the following steps: establishing two token buckets in the ACS system: a full-speed token bucket and half-speed token bucket, inject the first-level token into the full-speed token bucket, and inject the second-level token into the half-speed token bucket; for the access request sent by the CPE device to the ACS system, try to obtain a token from the full-speed token bucket If the first-level token is successfully obtained, the TR069 request will be executed at full speed, and the TR069 business will be processed according to the standard process; If the card is successful, the half-speed TR069 request is executed to process the Inform information; if the second-level token fails to be obtained, the ACS system outputs an HTTP 403 response, indicating that the ACS system prohibits the request.

Description

technical field [0001] The invention relates to the technical field of ACS systems, in particular to a token bucket-based ACS system overload protection method. Background technique [0002] CWMP (CPE WAN Management Protocol, CPE Wide Area Network Management Protocol) is one of the technical specifications initiated and developed by the DSL (Digital Subscriber's Line, Digital Subscriber Line) Forum. The number is TR-069, so it is also called the TR-069 protocol. It provides a general framework, message specification, management method and data model for the management and configuration of home network devices in the next generation network. [0003] CWMP is mainly used in DSL access network environment. In the DSL access network, due to the large number of user equipment and scattered deployment, it is usually located on the user side, and it is difficult to manage and maintain the equipment. User-side equipment) for remote centralized management, solves the management dif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/819H04L47/21
CPCH04L47/215
Inventor 尤克斌李刚马金满徐帆陈浩东孙明亮朱波王振兴
Owner LOOTOM TELCOVIDEO NETWORK WUXI