Method for multiplexing residual bandwidth and network equipment

A technology of network equipment and bandwidth, applied in the field of communication, can solve the problems of not supporting flow queue cascading, complexity and cost increase, and achieve the effect of orderly multiplexing, low bandwidth limitation and multiplexing, and flexible cost

Inactive Publication Date: 2006-11-08
刘慧敏
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] Since it does not support features such as flow queue cascading, the functions implemented by NP (Network Processor, network processor) har

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for multiplexing residual bandwidth and network equipment
  • Method for multiplexing residual bandwidth and network equipment
  • Method for multiplexing residual bandwidth and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention distinguishes the priority levels of the traffic of multiple services, and on the basis of limiting the bandwidth respectively, uses the leaky bucket technology to provide the remaining bandwidth to other services exceeding the limited bandwidth in sequence, thereby realizing different Orderly statistical multiplexing between business flows. In the present invention, the remaining bandwidth can be set to be used sequentially by the services of the next level exceeding the limited bandwidth, or set to be used by the services of the previous level exceeding the limited bandwidth in sequence, mainly depending on the agreement signed between the user and the operator. SLAs. In the following embodiments, the technical solution of the present invention is described in detail by taking the example that the remaining bandwidth of high-level services is sequentially used by low-level services exceeding the limited bandwidth.

[0041] Figure 4 Shown is a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a residual band width multiplexing method, which contains A, configuring plurality of leak pails, said plurality of leak pails respectively corresponding different grade service; B, using overflowed token from said leak pail in order impregnating to other grade service corresponded leak according to service grade. The present invention realizes user total bandwidth limitation and different kinds of service bandwidth limitation through leak pail technology, the rest part capable of shared using by other service according to \priority grad, to realize band width in order multiplexing, solving tradition leak pail technologic shortage.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and network equipment for multiplexing remaining bandwidth. Background technique [0002] Leaky bucket technology is widely used in routers and Ethernet switches, and can be implemented by software or hardware. It is used to limit and mark traffic when network traffic is congested. The typical role of traffic policy is to limit the traffic and burst of a certain connection entering a certain network. When the packet meets certain conditions, such as the packet traffic of a certain connection is too large, the supervision can take different measures for the packet. Processing actions, such as discarding packets or resetting the priority of packets, etc. A common usage is to use CAR (Committed Access Rate, Committed Access Rate) to limit the flow of certain types of packets, and CAR uses token buckets for flow control. [0003] The basic process of CAR using the token bucket fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24
Inventor 董书友姚娉
Owner 刘慧敏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products