Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protocol-independent network redundant flow eliminating method

A redundant traffic, protocol-independent technology, used in data exchange networks, special data processing applications, instruments, etc., can solve problems such as not working well, improve the matching success rate, reduce storage capacity requirements, and save storage resources. Effect

Active Publication Date: 2014-06-25
SOUTHWEAT UNIV OF SCI & TECH
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Object caches, including web proxy caches and peer-to-peer media caches, can be used to respond to frequent and repeated requests instead of origin servers where resources reside. Level caching doesn't work well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol-independent network redundant flow eliminating method
  • Protocol-independent network redundant flow eliminating method
  • Protocol-independent network redundant flow eliminating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0043] figure 1 It is a flow chart of a specific embodiment of the protocol-independent network redundant traffic elimination method of the present invention. Such as figure 1 As shown, the protocol-independent network redundant traffic elimination method of the present invention comprises the following steps:

[0044] S101: Preset fingerprint library and data block library:

[0045]In the present invention, what is stored in the fingerprint library is the fingerprint corresponding to the data block, that is, the unique identifier of the data block, and what is stored in the data block library is the data block that will be repeatedly transmitted in the network. Therefore, to adopt the communication network of the present invention, a fingerprint library and a data block library need to be pre-set in the network, and the fingerprints in the fingerprint library correspond to the data blocks in the data block library one by one. The physical storage devices of the fingerprint...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protocol-independent network redundant flow eliminating method. According to the method, a certain number of data packets are grabbed from a network in advance, the data packets are grouped according to the magnitudes of loads, statistics of the data size cumulative probability of grouping is conducted, a corresponding load threshold value is determined, and a sending end conducts redundant flow elimination on the data packet the load of which is larger than the load threshold value; the loads are partitioned according to the weak Hash values, the strong Hash value of each data block is taken as a fingerprint to be matched with a fingerprint in a fingerprint base, the fingerprint which is not matched with the fingerprint in the fingerprint base and the corresponding data block are updated to the fingerprint base and a data block base, the sending end takes the initial positions of all the data blocks in the data packets and the positions of all the data blocks in the data block base as loads to regenerate data packets and sends the data packets to a receiving end, and the receiving end conducts recovery on the data packets after receiving the data block information in the data packets. The method is used for processing redundant data among the data packets without being affected by the application layer communication protocol and has a good redundant flow elimination effect and a good processing time effect.

Description

technical field [0001] The invention belongs to the technical field of network flow management, and more specifically relates to a protocol-independent method for eliminating redundant network flow. Background technique [0002] With the rapid development of Internet technology applications, network traffic such as web browsing, file sharing, video distribution, and entertainment games has shown a rapid growth trend. A large number of identical or similar content on the Internet has been repeatedly requested by users at the edge of the network, resulting in data in the network. The repeated transmission on the network leads to the generation of a large amount of redundant traffic, which not only consumes network bandwidth, but also reduces the efficiency of the Internet. Network redundant traffic elimination has become a new research hotspot in network traffic management technology. [0003] Most traditional redundancy elimination schemes operate at the application layer an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/801G06F17/30
Inventor 邢玲马强何燕玲郑鸿
Owner SOUTHWEAT UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products