Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for supervising traffic based on token bucket

A token bucket and traffic technology, applied in the field of data transmission, can solve problems such as inapplicability, achieve good compatibility, high processing rate, and break through the bottleneck of processing capacity.

Inactive Publication Date: 2010-06-16
ZTE CORP
View PDF0 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] At present, people usually use a single single-rate three-color marking algorithm or a two-rate three-color marking algorithm for traffic monitoring. For different types of packets, this monitoring method using a single algorithm is not applicable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for supervising traffic based on token bucket
  • Method and device for supervising traffic based on token bucket
  • Method and device for supervising traffic based on token bucket

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0043] see figure 2 , which is a structural diagram of the traffic monitoring device proposed by the present invention, and the components of the device are:

[0044] The setting module is connected with the internal memory, and is used to pre-set various parameters of different leaky bucket algorithm rules, and simultaneously establishes a mapping relationship table between the flow ID and the leaky bucket algorithm rules, and lists the different leaky bucket algorithm rules and the mapping relationship The table is stored in internal memory;

[0045] The control module is connected to the traffic statistics module and the traffic supervision module respectively, and is used to obtain the packets to be supervised and send them to the traffic supervision module for processing; it is also used to receive the packets sent by the traffic supervis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for supervising traffic based on a token bucket. The device comprises a setting module, a memory, a control module and a traffic supervising module. The corresponding method comprises the following steps that: 1) setting different leaky bucket algorithm rules, and establishing a mapping relationship table between stream IDs and the leaky bucket algorithm rules; and 2) acquiring a message to be supervised; searching for the corresponding leaky bucket algorithm rule and a leaky bucket parameter by using a stream ID as an index; accordingly determining the number of available tokens in the current average leaky bucket and the peak leaky bucket; comparing the length of the message with the number of the available tokens in the current average leaky bucket and the peak leaky bucket respectively; coloring the message by adopting a corresponding leaky bucket algorithm rule and according to the comparison result; updating and storing the leaky bucket parameter serving as a standby parameter for processing the next stage of message with the same stream ID; and then discarding or forwarding the message according to the coloring result. The method and the device simultaneously support a single-rate marker algorithm and a double-rate marker algorithm, have excellent compatibility, break through the bottle neck of processing capacity and have high processing rate.

Description

technical field [0001] The invention relates to the field of data transmission, in particular to a token bucket-based flow monitoring method and equipment applied in a passive optical network (GPON). Background technique [0002] With the development of the Internet, IP services continue to grow rapidly. GPON technology has received widespread attention. It supports traditional telecommunication services in the original format with unprecedented economy, and also supports the future evolution to all-packet / all-IP networks. [0003] How to improve the quality (QoS) of information in transmission is also a key point. QoS technology is to provide end-to-end service quality assurance for user services, and has become a research hotspot in the industry in recent years. Currently there are many QoS service models, among which the most widely used is the differentiated service model (DiffServ). The DiffServ model implements quality of service control through packet classificatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/56H04L47/21
Inventor 吴文杰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products