Network security policy management method, device and equipment
A network security and policy management technology, applied in the field of network security policy management, can solve the problems of a single network distribution method and waste of broadband resources, and achieve the effect of reducing the waste of broadband resources and realizing network security policy settings
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0057] In a possible implementation manner, determining the first indicator data of the mapped network requirements corresponding to different terminals includes:
[0058] Determine the average network speed corresponding to the terminal according to the amount of data transmitted between the terminal and the network server and the transmission time;
[0059] The benchmark indicator data includes a benchmark network speed, and the benchmark network speed is determined according to a file transfer request sent by the terminal.
[0060] like image 3 As shown, the network transmission data monitoring includes the detection of the upload data volume and the upload time, and the download data volume and the download time monitoring.
[0061] For example, the amount of data transmitted between the terminal and the network server is 100M and the transmission time is 10s, then the average network speed corresponding to the terminal is 100 / 10=10M / s.
[0062] The determination of the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


