Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device used for speed limiting of message

A packet and rate-limiting technology, applied in the field of data network, can solve the problems of indiscriminate discarding, high-priority packet forwarding efficiency delay, link interruption, etc., to ensure no interruption, improve stability and efficiency The effect of ensuring the accuracy of speed limit

Active Publication Date: 2018-01-09
ZTE CORP
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Adopt above-mentioned leaky bucket to carry out the method that described message is speed-limited, do not differentiate and discard all incoming port flow, some quantity is not big but very important protocol message can be discarded without distinguishing; In order to solve this Problem, some processing methods are also proposed in the prior art, mainly after pre-distributing the service flow and distinguishing the priority marks for the packets, and then according to the principle of leaky buckets, according to the priority correspondence, different available space divisions are carried out to achieve different levels of packets. This method causes delay in the forwarding efficiency of high-priority packets, and even leads to link interruption in severe cases.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device used for speed limiting of message
  • Method and device used for speed limiting of message
  • Method and device used for speed limiting of message

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0059] see figure 2 As mentioned above, the first embodiment of the present invention proposes a packet rate limiting method, including:

[0060] Step 201: Obtain the parameters of the current leaky bucket speed limit configuration, and the number of leaky bucket tokens arriving at the PAUSE line P n , reaching the number of leaky bucket tokens D corresponding to the DISCARD line n ,, token bucket refresh cycle T, token removal rate V, token number P remaining in the previous cycle s1 .

[0061] Step 202: Get the number P of leaky bucket tokens available in the bucket of the processing cycle a .

[0062] The number of tokens that will be transferred out in this cycle is (T*V), and the number of tokens remaining in the leaky bucket of the previous cycle is P s , the total number of tokens in the current bucket P a =P s -(T*V). In each processing cycle, the number of leaky bucket tokens available at this time needs to be obtained.

[0063] Step 203: Receive the message...

no. 2 example

[0085] see image 3 As mentioned above, the second embodiment of the present invention proposes a message rate limiting device, the device comprising:

[0086] The forwarding module is used to transfer the packets discarded beyond the rate limit DISCARD line of the first leaky bucket into the filtering and forwarding bucket;

[0087] A filtering module, configured to perform ACL matching on the packets transferred into the filtering and forwarding bucket according to preset ACL rules, and redirect and forward the packets obtained by matching and filtering;

[0088] A rate limiting module, configured to determine the number of tokens corresponding to the secondary arrival DISCARD line according to the number of tokens corresponding to the message obtained by the matching filter, and limit the rate of the message passing through the first rate limiting bucket.

[0089] Obviously, those skilled in the art should understand that each module or each step of the above-mentioned pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device used for speed limiting of a message. The method comprises steps of forwarding a message which abandoned by a first leaky bucket speed limiting DISCARD lineinto a filtering forwarding bucket; according to a preset ACL matching keyword, carrying out ACL matching on the message forwarded into the filtering forwarding bucket, and carrying out redirection forwarding on the message obtained through the matching filtering; and according to a token number of the message obtained through the matching filtering, determining the corresponding token number forarriving at the DISCARD line for the second time, and carrying out speed limiting on the message passing the first speed limiting bucket. According to the invention, by combing the ACL, the importantprotocol message is prevented from being abandoned and can be rapidly forwarded outwards; it is ensured that a link will not be interrupted; stability and high efficiency of data forwarding are improved; data network service quality is improved; and by carrying out secondary speed limiting on the message passing the first speed limiting bucket, speed limiting accuracy is ensured in case of the unchanged bandwidth.

Description

technical field [0001] The invention relates to the field of data networks, in particular to a method and device for rate limiting of messages. Background technique [0002] With the development of data network technology, current network services are diverse, which often lead to network congestion. In order to avoid network congestion and improve the quality of service (QoS) of the data network, it is often effective to limit the rate of packets at the ingress port. If the rate of the packet is lower than the specified rate, it will be received normally. packets; if the packet rate exceeds the specified rate, subsequent packets will be discarded directly. [0003] At present, the commonly used method is to use leaky buckets to limit the rate of packets. The principle of leaky bucket rate limit is as follows: figure 1 As shown, specifically: remove tokens from the leaky bucket evenly and continuously at the speed limit until the leaky bucket is empty. When a message arriv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/819H04L47/21
Inventor 刘伟平
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products