Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application layer traffic speed limiting method, terminal equipment and storage medium

An application layer and flow technology, applied in the field of communication, can solve problems such as inability to protect bandwidth, waste human resources, affect applications, etc., and achieve the effect of preventing network storms and protecting bandwidth resources

Active Publication Date: 2021-04-02
XIAMEN FUYUN INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Limiting traffic on network physical devices has the following problems: (1) The configuration of network physical devices cannot be easily modified, which will affect all applications on the network; (2) The business environment cannot modify the user network environment; (3) The application layer controls network physical devices Need to consider equipment, model, driver and other issues
There are the following problems with current limiting at the host network card level: (1) It can only limit the traffic of a single host, but cannot protect the entire bandwidth; (2) Distributed and cluster environments may involve a large number of hosts, and the configuration of each host is unreasonable, which wastes human resources , inconvenient to manage; (3) affect other applications on the host
However, the Nginx speed limit module has the following problems: the Nginx speed limit module supports two modes to limit the number of connections and limit the request rate, but cannot directly limit the size of the request traffic, and the request may occupy a large amount of bandwidth, which cannot avoid network storms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application layer traffic speed limiting method, terminal equipment and storage medium
  • Application layer traffic speed limiting method, terminal equipment and storage medium
  • Application layer traffic speed limiting method, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] In this embodiment, the allowed bandwidth is divided into multiple shares, and each share represents a bandwidth of 1 KB. Such as figure 1 As shown, the allowable bandwidth is divided into 80 parts, that is, 8*10 squares, white means used, gray means idle, then from figure 1 It can be obtained from , the system speed limit is 80KB / s, 14KB has been used, and one unit corresponds to 1KB.

[0027] The traffic used when the application layer transfers files needs to apply for a token first, and then apply for a buffer according to the number of tokens when the token application is successful, and then flush the bit stream of the buffer to the network output stream.

[0028] In order to make full use of the bandwidth, the number of tokens applied for each time is not fixed. The number of tokens applied for is mainly determined by two values, namely: a. the maximum value maxBandwith allowed by the flow rate limiting system; b. the application buffer size, buffer A zone that...

Embodiment 2

[0057] The present invention also provides an application-layer flow rate limiting terminal device, including a memory, a processor, and a computer program stored in the memory and operable on the processor, and the computer program is implemented when the processor executes the computer program. Steps in the above method embodiment of Embodiment 1 of the present invention.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an application layer traffic speed limiting method, terminal equipment and a storage medium. The method comprises the following steps: S1, receiving an input file stream; S2,initializing and setting a flow application proportion ratio ratio to be equal to 0.1 and a residual flow bandWidth to be equal to a maximum bandwidth MAX_BANDWIDTH; S3, applying rate*bandWidth tokensto the traffic speed limiting system, and if the application fails, entering S4; and if the application succeeds, entering S5; S4, according to the request number of the current flow speed limiting system and the residual flow of the flow speed limiting system returned when the application fails, resetting a flow application ratio ratio ratio ratio=1 / the request number of the current flow speed limiting system and a residual flow bandWidth=the residual flow of the flow speed limiting system, and returning to S3; S5, writing a file stream with the size of ratio*bandWidth*k into the network stream, wherein k represents a bandwidth corresponding to one token; and S6, judging whether the file is read or not, and if so, ending; otherwise, entering S3. Flow passing through the flow speed limiting system can be intercepted and then flows to the network, the speed limiting function is achieved, and network storm is avoided.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to an application layer traffic rate limiting method, terminal equipment and a storage medium. Background technique [0002] Common traffic limiting is mostly applied to network physical devices (such as routers, interactive machines), host network cards, and Nginx rate limiting modules at the application layer. Limiting traffic on network physical devices has the following problems: (1) The configuration of network physical devices cannot be easily modified, which will affect all applications on the network; (2) The business environment cannot modify the user network environment; (3) The application layer controls network physical devices You need to consider the device, model, driver and other issues. There are the following problems with current limiting at the host network card level: (1) It can only limit the traffic of a single host, but cannot protect the enti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/815H04L12/819H04L47/22H04L47/21
CPCH04L47/215H04L47/225
Inventor 张志灿陈奋陈荣有李伟彬
Owner XIAMEN FUYUN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products