Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access rate limiting method based on token pail algorithm

A token bucket algorithm and access rate technology, applied in the field of network communication, can solve the problems of the normal operation of the network access equipment, the large performance degradation of the network access equipment, and the consumption of large microcode resources.

Inactive Publication Date: 2005-03-30
HUAWEI TECH CO LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] Therefore, although the double leaky-bucket CAR algorithm can well meet the needs of flow control, its implementation needs to consume a large amount of microcode resources, which leads to a large decline in the overall performance of the network access device, which is a problem for network access. The normal operation of the equipment has a greater impact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access rate limiting method based on token pail algorithm
  • Access rate limiting method based on token pail algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Because the realization of double leaky bucket increases the number of times of reading and writing memory according to the network processor, it has a great impact on the performance of the whole machine. Therefore, the present invention adopts the basic algorithm of double leaky bucket, but only uses one token bucket, allowing the token Negative tokens in the bucket are represented by one's complement.

[0039] The specific embodiment of the method of the present invention is shown in Fig. 1, comprises the following steps:

[0040] Step 11: Read the current time of the timer.

[0041] Step 12: Read the time value of the timer when the last packet left from the CAR table.

[0042] Step 13: Calculate the difference between the current time of the timer and the time value of the timer when the last data packet leaves.

[0043] Step 14: Add the difference obtained in step 13 to the number of tokens remaining in the token bucket when a data packet leaves, as the number o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

When available number of token is less than number of token needed to carry out forwarding process of data to be treated. Based on whether the data to be treated are a data packet in high priority, the relevant process is carried out; if yes, the forwarding process is carried out, and adding a negative value of number of token to the token bucket; otherwise, the data packet to be treated is discarded. Basic algorithm of dual leaking bucket is adopted in the invention, but only one token bucket is in use for implementing flow control. Thus, based on message created from access user, CAR in different priorities is carried out in order to implement flow control for access user so as to guarantee lowered complete performance of network access device is minimal.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to an access rate limiting method based on a token bucket algorithm. Background technique [0002] In the process of network communication, it is usually necessary to control the flow of users in the NP (Network Processor). The so-called flow control is to control the transmission of data packets transmitted in the network by using different CARs (Access Rate Limit). However, in the network access device, the WEB (World Wide Web) user needs to periodically send a heartbeat message to shake hands with the Portal server (portal server) through the downloaded control to determine whether the user is in a connected state. In this way, when a user transmits a large flow of heartbeat packets, the network processor cannot treat the data packets and heartbeat packets differently, but treats the heartbeat packets and data packets as CAR processing, resulting in the user being f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/08H04L12/24H04L29/02H04Q3/64
Inventor 侯超龚钧
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products