Realizing method of data stream constraint control

A technology of constraint control and implementation method, applied in the field of communication, can solve the problems of defective burst flow control, low pass rate of long data packets, large storage space occupied by token buckets, etc., so as to improve the pass rate, reduce storage space, The effect of cycle shortening

Active Publication Date: 2006-09-20
HUAWEI TECH CO LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] The technical problem to be solved by the present invention is: to overcome the shortcomings of the prior art when the data flow is constrained, the token bucket occupies a large storage space, the control of short-term burst flow is defective, and the pass rate of long data packets is relatively low, and provides a A method for implementing data flow constraint control, improving the pass rate of long data packets, effectively controlling short-term burst traffic, and reducing the storage space occupied by token buckets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realizing method of data stream constraint control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Below according to accompanying drawing and embodiment the present invention will be described in further detail:

[0027] The present invention provides a method for implementing data flow constraint control, constructing a token bucket, including token bucket depth parameters and bandwidth parameters, and the token bucket depth is a fixed token bucket depth value plus a dynamic token bucket depth value , the fixed token bucket depth is below the dynamic token bucket depth. According to the traffic allocated to the user, the corresponding number of tokens is periodically added to the token bucket, and at the same time, the token is subtracted from the token bucket according to the actual traffic of the user. When the number is less than the fixed token bucket depth value, the traffic is illegal; when adding tokens next time, the fixed token bucket depth value must be filled up first, and then user traffic can pass. The dynamic token bucket depth value can be 2 times t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: constructing a token bucket that includes depth parameter and bandwidth parameter; the depth of the token bucket is sum of the fixing token bucket value and the dynamical token bucket depth value; in term of flow rate allocating to users, the relevant token numbers are added into the token bucket, and meanwhile in term of actual flow rate of users, the token numbers is subtracted from the token bucket; before subtracting the token numbers, it is made illegal that the token numbers is small than the depth value of fixing token bucket; when the token is added at the next time, firstly the depth value of fixing token bucket is filled up, and then the flow rate of users is allowed to pass through; it also can be implemented by adding tokens based on flow rate; the depth value of dynamical token bucket varies along with maximum bandwidth; the depth value of fixing token bucket can be a token numbers corresponding to a length of packet with maximum data length.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for realizing data flow constraint control. Background technique [0002] CAR (Committed Access Rate) is an allowed access rate technology used to restrict user traffic, and it is an effective bandwidth management method for IP networks. CAR is mainly used in the communication field to limit traffic for customers. [0003] It is unrealistic to rely on users to consciously send data streams according to service rules. The user's traffic is likely to exceed the service level agreement (SLA) signed with the service provider, which will occupy the bandwidth of other users, resulting in other legitimate traffic. services. In this case, in order to ensure the normal operation of the network, user traffic needs to be restricted at the network entrance to ensure that user traffic does not violate regulations and that users do not receive additional services beyond the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/56H04L12/801
Inventor 胡容国
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products