Method for making message flow limitation by adopting token leakage cylinder

A leaky bucket and packet technology, applied in the field of packet current limiting based on token leaky buckets, can solve problems such as low efficiency, save system resources, improve efficiency, and reduce operating load

Inactive Publication Date: 2004-10-13
HUAWEI TECH CO LTD
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the efficiency of the above method is very l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for making message flow limitation by adopting token leakage cylinder
  • Method for making message flow limitation by adopting token leakage cylinder
  • Method for making message flow limitation by adopting token leakage cylinder

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] refer to figure 2 A preferred implementation of the packet current limiting method of the present invention is described.

[0016] In this embodiment, the present invention, as mentioned above, uses a new trigger mechanism for injecting tokens in order to prevent the network processor from using timed interrupts to inject tokens, that is, the arrival of a message is used as a trigger to inject token. This scheme will be described in detail below.

[0017] Let the arrival time of a certain message be Tn, and the time difference between this message and the previous message is set as dT. Then, when the message arrives, the operation of injecting tokens into the bucket is triggered, and the number of tokens injected into the bucket within the time interval dT is calculated. Then, it is judged whether the number of tokens that can be claimed from the bucket is greater than or equal to the number of tokens required by the message length. If the number of tokens in the b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a kind of report current-limiting method based on token leakage barrel. The method includes: ignites the operation of token filling when current message comes; calculates the token amounts filled into the token barrel in the interval between the current message and the former message; judges that if the amount of tokens meeting the message transmission demands; if yes, draws the token amount needed by the message transmission, and allows the message passing through, otherwise, aborts the message. The invention can save system resources of the network device, and upgrades the process efficiency of small flow message.

Description

technical field [0001] The invention relates to a network message transmission method, in particular to a message flow limiting method based on a token leaky bucket. Background technique [0002] In data communication networks, the traffic model mostly belongs to the burst mode. Therefore, it is necessary to adopt some methods of restricting network traffic to avoid many problems caused by sudden traffic to the network, and the typical one is network communication congestion. Ordinary traffic limiting mechanisms may cause many packets to be unreasonably discarded during traffic bursts, so using the token leaky bucket model is a common method for network devices to limit traffic at present. Generally, network processor-based devices add tokens to the leaky bucket by means of timed interrupts. [0003] The following example illustrates the conventional token leaky bucket algorithm. figure 1 is a schematic diagram of this conventional token leaky bucket algorithm. Such as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L12/04H04L12/24
Inventor 欧阳光
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products