Method, device and equipment for current limiting based on token leaky bucket

A token and leaky bucket technology, applied in the field of computer networks, can solve problems such as waste of system resources, achieve the effect of reducing waste of system resources and making full use of system resources

Active Publication Date: 2020-12-22
ADVANCED NEW TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, after the current limit value is set, the user's access is often limited before the system performance of the computer equipment is reached, resulting in a waste of system resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for current limiting based on token leaky bucket
  • Method, device and equipment for current limiting based on token leaky bucket
  • Method, device and equipment for current limiting based on token leaky bucket

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0028] figure 1 It is a flowchart of a method for performing current limiting based on a token leaky bucket in an embodiment of the present application. figure 1 The method is performed by a current limiting device. The method can include:

[0029] S102. Obtain the performance index of the monitored device and the current current limit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses a method, device and device for current limiting based on a token leaky bucket. The current limiting threshold of the leaky bucket is the token insertion rate of the token leaky bucket, and the token leaky bucket is used to control the access request flow of the application in the monitored device not to exceed the current limiting threshold; if the monitored The relationship between the first performance index and the threshold value of the first performance index in the performance index of the device satisfies the current limiting threshold adjustment condition, then according to the current limiting threshold value of the token leaky bucket, adjust the condition according to the current limiting threshold value The corresponding current-limit threshold adjustment method adjusts the current-limit threshold of the token leaky bucket.

Description

technical field [0001] The present application relates to the field of computer networks, in particular to a method, device and equipment for current limiting based on a token leaky bucket. Background technique [0002] In an existing current limiting solution, a fixed configuration method is usually used to limit the interface current, so as to prevent the system crash of the computer equipment caused by excessive access traffic. [0003] However, after the current limiting value is set, the user's access is often limited before the system performance of the computer equipment is reached, thereby causing a waste of system resources. [0004] There is an urgent need for a solution that can not only limit the current, but also make full use of system resources and reduce the waste of system resources. Contents of the invention [0005] The purpose of the embodiments of the present application is to provide a method, device and device for current limiting based on a token l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/819H04L47/21
Inventor 康家邦
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products