Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Message forwarding method and device

A packet forwarding and packet technology, applied in the field of communication, can solve problems such as discarding high-priority packets, and achieve the effect of improving satisfaction and service quality

Active Publication Date: 2018-03-13
ZTE CORP
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a message forwarding method and device to at least solve the problem in the related art that low-priority messages are forwarded in leaky bucket speed limit, resulting in high-priority messages being discarded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message forwarding method and device
  • Message forwarding method and device
  • Message forwarding method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In this embodiment, a message forwarding method is provided, figure 2 is a flowchart of a message forwarding method according to an embodiment of the present invention, such as figure 2 As shown, the process includes the following steps:

[0050] Step S201, when the leaky bucket cache cannot accommodate the message to be forwarded, mark the message in the leaky bucket cache with a lower priority than the message to be forwarded;

[0051]In this step, before marking the packets in the leaky bucket cache with a lower priority than the packets to be forwarded, it further includes: judging whether the leaky bucket cache can accommodate the packets to be forwarded. When the sum of the number of tokens corresponding to the cached message in the above leaky bucket cache and the number of tokens corresponding to the above message to be forwarded is greater than the maximum number of tokens corresponding to the leaky bucket cache capacity, it is determined that the above leak...

Embodiment 2

[0056] Based on the technical solution of the above embodiment, the above technical solution will be described in detail below in conjunction with an embodiment.

[0057] In this embodiment, a message forwarding method is provided, and the process of the method includes the following steps:

[0058] A: When configuring the scheduling mode first, if it is SP strict priority scheduling, and the leaky bucket rate limit is valid, initialize the module parameters. (The refresh rate V of the leaky bucket, the bucket depth setting B, the refresh cycle t, and calculate the refresh token T for a refresh interval.)

[0059] B: Each queue at the exit of the device receives data packets, and forwards the packet P according to the scheduling algorithm (SP mode, forwards the high-priority queue first, and forwards the next priority queue when the high-priority queue is empty). First judge whether to enter the pre-buffer area, enter the pre-buffer area to wait when the pre-buffer area is no...

Embodiment 3

[0067] In this example, a message forwarding method is also provided, image 3 It is a flowchart of a message forwarding method according to an example of the present invention, such as image 3 As shown, the method includes the following processes:

[0068] Step 301: Obtain the leaky bucket refresh rate V, bucket depth B, refresh cycle t, and configure leaky bucket parameters. Computes the refresh token T for one refresh interval. Pre-buffer Bp.

[0069] Step 302: In SP scheduling mode, the high-priority queue buffer is not empty, and the scheduling message enters the next leaky bucket process.

[0070] Step 303: Determine whether the pre-buffer is empty? When the pre-buffer is not empty, go to step 304; if the pre-buffer is empty, go to step 305.

[0071] Step 304: Enter the pre-buffer queue, discard the message directly when the queue is full, and wait in line when the queue is not full.

[0072] Step 305: Calculate the token Ta required by the message. Formula Ta=P-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a message forwarding method and device, and the method comprises the steps: marking a message with the priority being lower than the priority of a to-be-forwarded message in a leaky bucket buffer memory when the leaky bucket buffer memory cannot accommodate the to-be-forwarded message; discarding the marked message in the leaky bucket buffer memory, so as to enable the to-be-forwarded message to enter the leaky bucket buffer memory for forwarding. According to the invention, the method solves a problem in the related technologies that the forwarding of a message with thelower priority causes the discarding of a message with the higher priority, enables the message with the higher priority not to be discarded in an SP scheduling scene, improves the service quality ofkey services, and improves the satisfaction of customers.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular, to a message forwarding method and device. Background technique [0002] With the continuous development of communication technology, the types and quantities of Internet services are increasing rapidly, and high-speed network data transmission requires high-quality services. The traffic model in the actual network is mostly this kind of burst traffic, and the leaky bucket algorithm is an algorithm often used in traffic shaping or rate limiting in the network environment. Its main purpose is to control the rate at which data is injected into the network. Smooth out bursty traffic on the network. The leaky bucket algorithm provides a mechanism by which bursty traffic can be shaped to provide a steady flow for the network. [0003] In communication equipment, leaky bucket rate limiting is usually implemented as a token method, but the principle is different from ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/819H04L12/851H04L47/21
CPCH04L47/21H04L47/24H04L47/2433
Inventor 王晓舟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products