Method for multiplexing residual bandwidth and network equipment

A technology of network equipment and bandwidth, which is applied in the field of communication, can solve problems such as the reuse of the remaining bandwidth that cannot be used for business, and the reuse of the remaining bandwidth that cannot be used for business, and achieve the effect of avoiding waste

Inactive Publication Date: 2006-11-08
HUAWEI TECH CO LTD
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] The present invention provides a method for multiplexing the remaining bandwidth, which is used to solve the defect that the prior art single-rate single-bucket and single-rate double-bucket technologies cannot m...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for multiplexing residual bandwidth and network equipment
  • Method for multiplexing residual bandwidth and network equipment
  • Method for multiplexing residual bandwidth and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In the present invention, on the basis of respectively limiting the bandwidth of the flow of various services, the remaining bandwidth is provided to other services exceeding the limited bandwidth by using the leaky bucket technology, so as to realize the statistical multiplexing between the flows of different services. use.

[0046] Figure 4 Shown is a communication network with subscribers 12 accessing the network through an edge router 14 that collects traffic from subscribers 12 and multiplexes the traffic into a backbone network comprising a plurality of interconnected routers / switches 16 . By using appropriate protocols and exchanges, data can be exchanged between different users 12, or resources can be accessed and passed through users 12. The method and device for multiplexing the remaining bandwidth in the embodiment of the present invention can be used in the edge router 14, the router / switch 16 or other network elements on the communication network.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a residual bandwidth multiplexing method. It contains respectively configuring limitation bandwidth to miscellaneous service using plurality of leak pails, collecting overflowed token from said plurality of leak pails to sharing leak pail, taking out token from sharing leak pail, to make service message exceed limitation bandwidth passing. The present invention relates to network equipment. The present invented technical proposal is used for collecting other leak pail overflowed token to realize bandwidth multiplexing through configuring a sharing leak pail. The use of sharing leak pail can be used in miscellaneous service limitation band width, taking out token when the token number is not enough, avoiding band width wastage.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and network equipment for multiplexing remaining bandwidth. Background technique [0002] Leaky bucket technology is widely used in routers and Ethernet switches, and can be implemented by software or hardware. It is used to limit and mark traffic when network traffic is congested. The typical role of traffic policy is to limit the traffic and burst of a certain connection entering a certain network. When the packet meets certain conditions, such as the packet traffic of a certain connection is too large, the supervision can take different measures for the packet. Processing actions, such as discarding packets or resetting the priority of packets, etc. A common usage is to use CAR (Committed Access Rate, Committed Access Rate) to limit the flow of certain types of packets, and CAR uses token buckets for flow control. [0003] The basic process of CAR using the token bucket fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24
Inventor 董书友姚娉
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products