CN101350764B - Network flow control method - Google Patents

Network flow control method Download PDF

Info

Publication number
CN101350764B
CN101350764B CN2007101193406A CN200710119340A CN101350764B CN 101350764 B CN101350764 B CN 101350764B CN 2007101193406 A CN2007101193406 A CN 2007101193406A CN 200710119340 A CN200710119340 A CN 200710119340A CN 101350764 B CN101350764 B CN 101350764B
Authority
CN
China
Prior art keywords
agreement
packet
blocking
flow control
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007101193406A
Other languages
Chinese (zh)
Other versions
CN101350764A (en
Inventor
范鹏飞
唐晖
周旭
赵志军
谭红艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Acoustics CAS
Original Assignee
Institute of Acoustics CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Acoustics CAS filed Critical Institute of Acoustics CAS
Priority to CN2007101193406A priority Critical patent/CN101350764B/en
Publication of CN101350764A publication Critical patent/CN101350764A/en
Application granted granted Critical
Publication of CN101350764B publication Critical patent/CN101350764B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention provides a network flow detection method, and comprises the following steps: a) adopting a flow control system to calculate the average rate of protocols according to the historical information of the protocol of the data packet and the information carried by the data packet; b) judging whether the data packet of the protocol should be controlled according to the average rate of protocols, which is calculated in the step a); and c) controlling the data packet which satisfies the control condition. Compared with the prior art, the method has the following advantages: the rate estimation algorithm based on the historical time window is adopted to accurately calculate the rate of the current protocol flow; the flexible and convenient configuration can be used for simultaneously controlling a plurality of protocols which are combined freely; the efficiency of the system is improved; only the protocol to be controlled needs processing, while others need no processing; the bypass type access brings convenience and can not form network bottlenecks; the system is simple and can be easily realized; and the system can achieve the accurate flow control.

Description

A kind of method for controlling network flow
Technical field
The invention belongs to networking technology area, specifically, the present invention relates to a kind of flow control methods.
Background technology
Along with the high speed development of internet service, network traffics sharply increase, and network application continues to bring out, and its application form is also shifted to forms such as P2P, Web2.0 by traditional business such as FTP, Web.This trend has also caused some problems simultaneously, and for example the P2P that occurs recent years uses and consumed limited Internet resources greatly.
P2P is a kind of distributed network, has broken traditional Client/Server (C/S) pattern, and the status of each node in network all is reciprocity.Each node had both served as server, for other nodes provide service, also enjoyed the service that other nodes provide simultaneously.But P2P uses and has taken massive band width, statistical results show, P2P uses and accounts for 50%~60% (daytime) of broadband flow to 90% (evening), the service quality of some important application (as Web, E-Mail) is had a strong impact on, and brings very burden and increased its operation cost (OPEX) also for the network management of operator.If can not effectively control, the sound development of internet will be had a strong impact on to the application layer traffic of network.Therefore, effective management and the control to some network application flow has become problem demanding prompt solution in the network management.
The network application layer flow control technique mainly is divided into series connection access and bypass access dual mode at present.It mainly is according to some data packet discarding algorithms or technology such as TCP rate controlled, traffic shaping at present that series connection inserts, and realizes by series connection inbound traffics control appliance in network.Series connection insert can be effective, sensitive network traffics are controlled, but in a single day flow-control equipment collapses or breaks down, it may become network bottleneck, hinders the transmission of whole network data flow.Bypass access control technology is to send the blocking-up message by monitoring network traffics, and under this access way, the performance state of control system can not exert an influence to the network normal communication.
Present bypass access control technology is not also than mature technique, and the method for the Mean Speed of its calculated data bag is simple (being byte/certain period of receiving in certain period) comparatively, do not have the historical information with reference to agreement.In the existing TCP flow bypass interrupter technique, its flow rate calculation only is provided by the current information that provides in the packet that reaches, and can not reflect the average discharge in a period of time well.And as long as flow has surpassed predetermined threshold value, just directly blocking-up so very likely causes having blocked most connection quickly, goes down so continuously in the existing method, certainly will cause flow significantly fluctuation up and down, also is kind of a waste for effective bandwidth.Moreover the configuration of existing flow control strategy is also not enough flexibly with comprehensive.Therefore, also there is bigger room for improvement in existing TCP flow control.
Summary of the invention
Therefore, task of the present invention is to overcome the deficiencies in the prior art, a kind of flow control methods based on the bypass blocking-up has been proposed, this method adopts bypass access network technology, carry out the strategy of dynamic-configuration according to the protocol traffic demand for control, realize flexibly, network application-level protocol flow control accurately.
A kind of method for controlling network flow that the present invention proposes comprises the steps:
A) catch the packet of flowing through in the network, calculate the agreement Mean Speed;
B) the agreement Mean Speed that calculates according to step a) judges whether that needs control the packet of this agreement; Judging whether need be as follows to the method that the packet of this agreement is controlled:
B1) to each agreement, set rate-valve value respectively, on threshold value, set peak value and overall situation blocking-up probability P that an agreement speed allows appearance simultaneously;
B2) when the average agreement speed that calculates in the described step a) exceeds described peak value, then mark is directly blocked in the connection under this packet;
When b3) the average agreement speed that calculates when described step a) is between described threshold value and peak value, gives to connect according to overall situation blocking-up probability P and blocked mark;
C) taked control measure to adding the packet of blocking mark.
In the technique scheme, in the described step a), behind the packet of in catching network, flowing through, at first this packet is carried out protocal analysis, then the information of carrying according to historical information and this packet itself of agreement under this packet.
In the technique scheme, in the described step a), the computational methods of described agreement Mean Speed are as follows:
A1), set historical time window respectively with certain time length to each agreement;
A2) calculate the byte number of the affiliated current arrival of agreement of current data packet with the byte number sum B in the historical time window;
A3) calculate the time interval that current arrival bag and last arrives bag, add the duration of historical time window, obtain a time value T;
A4) calculate agreement Mean Speed V=B/T.
In the technique scheme, described step b3) in, if described overall situation blocking-up probability P dynamic-configuration is the current step b3 that is connected) in added the blocking-up mark, then block probability P and reduce; If current connection is not at step b3) in added the blocking-up mark, the increase of blocking-up probability P.
In the technique scheme, described flow control system adopts the series connection access way.
In the technique scheme, described flow control system adopts the bypass access way.
In the technique scheme, described flow control system is connected the interface of Intranet and outer net.
In the technique scheme, in the described step c), the control measure that packet is taked are: to being added the connection of blocking mark, according to the flow direction of catching bag, construct in the same way or the reverse blocking bag, will block to wrap to send again connection is blocked.
The technique effect that the present invention can reach comprises:
The first, adopt speed algorithm for estimating based on the historical time window, can calculate accurately the speed of current protocol traffic;
The second, adopt the connection blocking-up method of the overall probability of a kind of combination can effectively avoid the sudden change of flow, make flow balanced more, bandwidth has obtained more efficient use;
The 3rd, construct TCP blocking-up bag respectively according to the up-downgoing direction of the traffic of packet, effectively blocking TCP connects, control application layer protocol flow;
Useful result of the present invention is:
The first, flexible configuration is convenient, can a plurality of agreements of optional combination control simultaneously; Allow the needs of network manager, carry out Dynamic Bandwidth Allocation, adjust the predetermined threshold value of certain agreement using agreement according to network management.
The second, improved system effectiveness, only the agreement of needs control to be taken measures, other agreements are let pass;
The 3rd, bypass mode inserts convenient, and can not form network bottleneck;
The 4th, architecture is simple, is easy to realize that required network capital construction cost and operation cost are less.
The 5th, can realize accurate flow control, satisfy multi-level control requirement.Can remain near the predetermined threshold value the actual flow that makes some application layer Business Stream (PPLive, BT etc.), realize accurate flow control.
Description of drawings
Below, describe embodiments of the invention in conjunction with the accompanying drawings in detail, wherein:
Fig. 1 is the network insertion topological diagram of the preferred embodiment of the present invention
Fig. 2 is the flow control process structure schematic diagram of the preferred embodiment of the present invention
Fig. 3 is the detail flowchart of the flow control of the preferred embodiment of the present invention
Fig. 4 is the blocking-up bag structure flow chart in the preferred embodiment of the present invention
Fig. 5 blocks bag structural map schematic diagram in the same way
Fig. 6 is a reverse blocking bag structural map schematic diagram
Embodiment
Embodiment 1
Before carrying out flow control, the at first definite agreement that need carry out flow control of user, its control strategy can be distinguished different protocol/application, and the predetermined threshold value of each protocol traffic can be set, the user can also be provided with different predetermined threshold value in the different time periods, so that the more efficient use bandwidth.Protocal analysis is a prerequisite of the present invention, but does not belong to category of the present invention.After agreement was discerned, utilization the present invention can be effectively, accurately the protocol traffic of multi-link feature is controlled.
The flow control methods of present embodiment adopts the bypass access module, its network topology as shown in Figure 1, in the bypass access model, use the network monitoring device (being the flow control system among Fig. 1) of present embodiment to be in the middle of the inside/outside network, but but be independent of both.All data of inside/outside network communication are all received by network monitor, just can analyze then, judge, operations necessary such as statistics.This model biggest advantage is can not produce any influence to the network normal communication, and all transfer of data are just carried out as this surveillance is abnormal, inserts so its network performance is better than series connection.And under the situation that series connection inserts, all flows of network all can transmit by blocking server.Although the reliability that series connection inserts is higher, blocking server may become fault point or network bottleneck, will hinder the transmission of whole network data flow.The bypass type that present embodiment adopts inserts just this problem can not occur.
The flow control methods of this enforcement comprises the steps (as shown in Figure 2):
A) combine according to the packet that receives (i.e. grouping) information, and with historical information and to estimate to arrive the Mean Speed of packet.
In this step, flow control system at first receives packet and it is carried out protocal analysis, according to the difference of affiliated agreement, each packet is classified, and notes the flow historical information of corresponding each agreement.For the current packet that receives, calculate the Mean Speed of its affiliated agreement in accordance with the following methods: the byte number that calculates the affiliated current arrival of agreement of current data packet is designated as B with the byte number sum in the historical time window; Calculate the bag and a last time interval (time differences between two packets of same application layer protocol) that arrives bag of current arrival, and added the historical time window and obtain a time value, be designated as T.Obtain agreement Mean Speed V=B/T then.Wherein, the historical time window needs to be adjusted to a desired value according to the network actual flow.
B) the agreement Mean Speed that calculates according to step a) judges whether that needs control protocol speed;
C) packet that meets controlled condition is taked control measure.
D) receive new packet, repeating step is a)-c) until system's end of run.
Further, the detailed process of present embodiment is as shown in Figure 3:
1) judge at first whether this packet (i.e. grouping) can be identified, as to be judged as is then to enter step 2).
2) judge whether agreement needs speed limit under this packet, as to be judged as be then to enter step 3).
3) judge whether the connection of agreement has been stamped the blocking-up mark under this packet, as be judged as and be, then directly enter step 7), as be judged as not, then enter step 4).
4) utilize rate estimator in the system to calculate the Mean Speed of agreement under the current data packet, its computational methods provide hereinbefore, repeat no more here.
5) judge whether to satisfy flag condition according to the agreement Mean Speed, as to be judged as be then to enter step 6).The detailed process of this step is described hereinafter.
6) the blocking-up mark is stamped in the connection of agreement under the current data packet.
7) structure is blocked packet and is sent.
In described step 5), judge whether and need adopt following method connecting marking:
According to the speed of agreement under this packet, judge whether speed surpasses the rate-limit (be the predetermined threshold value of agreement, can dynamically arrange) that will limit.
On the predetermined threshold value of agreement, set the peak value that an agreement speed allows appearance simultaneously.When packet exceeds peak value through the agreement Mean Speed that obtains after the rate estimator, then mark is directly blocked in the connection under this packet; When speed is between predetermined threshold value and peak value, blocked mark for connection according to overall situation blocking-up probability; Otherwise this connection of letting pass.Concrete steps are as follows:
51) according to the predetermined threshold value of agreement, calculate agreement speed and allow the peak value that occurs, computational methods are: peak value=predetermined threshold value+predetermined threshold value * a, wherein the span of a be (0, n], n can set up on their own according to different demands, but advises being no more than 1.
Set an overall probable value P, (as initialization P=1.0);
52) if the agreement Mean Speed surpasses the agreement peak value, then current TCP is connected and add the blocking-up mark, if do not surpass peak value, but surpassed the agreement predetermined threshold value, so according to the size of the value of overall probability P (on the specific implementation, can and 0.0 to 1.0 number Random producing at random of system make comparisons, as P〉Random), current TCP connected adds the blocking-up mark;
53) if connecting, current TCP added the blocking-up mark, later blocking-up probability P can reduce (as P=P/2) fast with forms such as indexes, thereby reduce a large amount of probability of being blocked simultaneously that connect, and work as Mean Speed between predetermined threshold value and peak value, but current TCP connects when not being blocked mark, the blocking-up probability P slowly increases (as P=P*1.2), increases the probability that later connection is blocked.
For different blocking-up demands, above-mentioned algorithm steps can reconfigure.
Structure blocking-up packet flow process among Fig. 3, promptly the specific implementation method of described step 7) is as follows:
The packet of being caught is resolved, calculated, obtain the raw information of packet: datagram length, sequence number, affirmation number and application layer label etc.; Resolve this packet, check the validity of packet, discern its network layer, transport layer and application layer protocol, and identify skew and length, the source address (MAC and IP) of packet and the TCP link information of destination address (MAC and IP) and correspondence of each layer data in raw data packets;
If connecting, the TCP at this packet place added the blocking-up mark, then according to the flow direction (up-downgoing) of this packet and above-mentioned information structuring in the same way or reverse TCP blocking-up packet (as structure TCPRST message or TCP FIN message) interrupt using and connect, thereby successful control application layer protocol flow.Wherein construct TCP RST message or the FIN method of message is as follows:
1. determine the source and destination port numbers;
2. the sequence of calculation number and confirmation code;
3. determine control mark (TH_RST mark: RST message, TH_FIN mark: the FIN message);
4. determine window size and check code;
5. the setting of urgent pointer, the size of TCP message is set, the setting of load and size thereof etc.
TCP message with structure carries out network layer header encapsulation (length, service quality, sign then, skew, life span, upper-layer protocol type, verification and, source IP address, purpose IP address, load, the load size), carry out ethernet layer head encapsulation (Ethernet destination address, ethernet source address, upper-layer protocol type, load, the load size), be sent at last on the network, basic procedure as shown in Figure 4.When present embodiment wraps in the transmission blocking-up, adopt the strategy of giving out a contract for a project to the Intranet machine, this just need construct in the same way or the reverse blocking bag according to the flow direction of catching bag.
Wherein, the structure of blocking-up bag is in the same way:
When the flow direction of the packet that listens to such as accompanying drawing 5, then construct a blocking-up bag in the same way.Building method is as follows: ethernet source address, and destination address, source IP, purpose IP, source port, destination interface==original packet; The TCP load length of sequence number=original packet sequence number+original packet; Ack=original packet ack;
The structure of reverse blocking bag is:
When the source data packet IP that listens to is interior net address, when promptly flowing to, then construct a reverse blocking bag as accompanying drawing 6.Blocking-up bag building method is as follows: ethernet source address, and destination address, source IP, purpose IP, source port, destination interface==opposite with original packet; The ack of sequence number=original packet; The sequence number of Ack=original packet+1.
Along with the high speed development of internet service, network traffics sharply increase, and network application continues to bring out, and use such as a large amount of P2P that occurs recent years.This trend has also caused some problems simultaneously, and for example P2P uses and consumed limited Internet resources greatly.Therefore, effective management and the control to some network application flow has become problem demanding prompt solution in the network management.A kind of flow control technique based on the bypass blocking-up that the present invention proposes can be realized flexible, accurate network application-level protocol flow control preferably, and the QOS control to operator all has great significance to the network management personnel.
In addition, agreement Mean Speed computational methods, agreement blocking-up mark thought and structure TCP RST message technology also can be conveniently used in the tandem flow-control equipment in the present embodiment.Why the present invention inserts with bypass is example, is because fail safe and stability influence that bypass inserts network environment itself are minimum, and the series connection access device has caused pressure to network itself, has brought many unsteadiness and potential safety hazard.But this is not to say that the technology of the present invention not can be applicable to the flow-control equipment that mode is gone in series connection.
It should be noted last that above embodiment is only unrestricted in order to technical scheme of the present invention to be described.Although the present invention is had been described in detail with reference to embodiment, those of ordinary skill in the art is to be understood that, technical scheme of the present invention is made amendment or is equal to replacement, do not break away from the spirit and scope of technical solution of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.

Claims (7)

1. a method for controlling network flow comprises the steps:
A) catch the packet of flowing through in the network, calculate the agreement Mean Speed of agreement under the packet of flowing through;
B) the agreement Mean Speed that calculates according to step a) judges whether that needs control the packet of this agreement; Judging whether need be as follows to the method that the packet of this agreement is controlled:
B 1) to each agreement, set rate-valve value respectively, on threshold value, set peak value and overall situation blocking-up probability P that an agreement speed allows appearance simultaneously;
B 2) when the average agreement speed that calculates in the described step a) exceeds described peak value, then mark is directly blocked in the connection under this packet;
B 3) the average agreement speed that calculates when described step a) is between described threshold value and peak value the time, blocked mark for the connection under this packet according to overall situation blocking-up probability P;
C) to being added the connection of blocking mark, according to the flow direction of catching bag, construct in the same way or the reverse blocking bag, will block bag again and sending this connection blocking-up.
2. flow control methods according to claim 1, it is characterized in that, in the described step a), behind the packet of in catching network, flowing through, at first this packet is carried out protocal analysis, the information of carrying then according to historical information and this packet itself of agreement under this packet, calculate the agreement Mean Speed of agreement under the packet of flowing through.
3. flow control methods according to claim 2 is characterized in that, in the described step a), the computational methods of described agreement Mean Speed are as follows:
A1), set historical time window respectively with certain time length to each agreement;
A2) calculate the byte number of the affiliated current arrival of agreement of current data packet with the byte number sum B in the historical time window;
A3) calculate the time interval that current arrival bag and last arrives bag, add the duration of historical time window, obtain a time value T;
A4) calculate agreement Mean Speed V=B/T.
4. flow control methods according to claim 1 is characterized in that, described step b3) in, described overall situation blocking-up probability P dynamic-configuration is if be connected step b3 under the current packet) in added the blocking-up mark, then block probability P and reduce; If the connection under the current data packet is not at step b3) in added the blocking-up mark, the increase of blocking-up probability P.
5. according to claim 1,2,3 or 4 described flow control methods, it is characterized in that flow control system adopts the series connection access way.
6. according to claim 1,2,3 or 4 described flow control methods, it is characterized in that flow control system adopts the bypass access way.
7. flow control methods according to claim 6 is characterized in that flow control system is connected the interface of Intranet and outer net.
CN2007101193406A 2007-07-20 2007-07-20 Network flow control method Expired - Fee Related CN101350764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101193406A CN101350764B (en) 2007-07-20 2007-07-20 Network flow control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101193406A CN101350764B (en) 2007-07-20 2007-07-20 Network flow control method

Publications (2)

Publication Number Publication Date
CN101350764A CN101350764A (en) 2009-01-21
CN101350764B true CN101350764B (en) 2011-03-16

Family

ID=40269354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101193406A Expired - Fee Related CN101350764B (en) 2007-07-20 2007-07-20 Network flow control method

Country Status (1)

Country Link
CN (1) CN101350764B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938484B (en) * 2010-09-09 2013-05-15 奇智软件(北京)有限公司 Distributed flow control method and system
CN103166807B (en) * 2011-12-15 2016-09-07 中国电信股份有限公司 Flux and flow direction analysis and processing method based on application and system
CN103312740B (en) * 2012-03-09 2018-04-17 腾讯科技(深圳)有限公司 A kind of generation method and device of P2P network strategies
CN103441905A (en) * 2013-09-22 2013-12-11 天津金栅科技有限公司 Network traffic monitoring system
CN103607354B (en) * 2013-11-26 2016-09-07 中国联合网络通信集团有限公司 A kind of flow control methods, DPI equipment and system
CN103873381B (en) * 2014-03-25 2017-12-19 安一恒通(北京)科技有限公司 Network traffics method for limiting speed and device
CN104348748B (en) * 2014-06-20 2018-07-13 珠海市君天电子科技有限公司 A kind of method and system of limitation network speed
CN110648535B (en) * 2019-09-26 2021-04-16 国家计算机网络与信息安全管理中心 Rail transit data reporting method and device based on traffic bypass acquisition

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968192A (en) * 2006-05-09 2007-05-23 华为技术有限公司 Flow control method and apparatus
CN101350765A (en) * 2007-07-20 2009-01-21 中国科学院声学研究所 Network flow detection method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968192A (en) * 2006-05-09 2007-05-23 华为技术有限公司 Flow control method and apparatus
CN101350765A (en) * 2007-07-20 2009-01-21 中国科学院声学研究所 Network flow detection method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
S.Blake等.An Architecture for Differentiated Services.RFC2475.1998,第14页-17页及图1. *
W.Fang等.A Time Sliding Window Three Colour Marker(TSWTCM).RFC2859.2000,第1页-第5页及图1-3. *
景志钢等.RED分组丢弃算法性能研究.电子学报.2000,28(4),全文. *

Also Published As

Publication number Publication date
CN101350764A (en) 2009-01-21

Similar Documents

Publication Publication Date Title
CN101350765B (en) Network flow detection method
CN101350764B (en) Network flow control method
US20220217078A1 (en) System and method for facilitating tracer packets in a data-driven intelligent network
JP7375068B2 (en) Data packet detection methods, devices, and systems
CN102098301B (en) The adaptive data transmission method of multilink and system
CN100382517C (en) Network QoS test method and system
US7902973B2 (en) Alarm reordering to handle alarm storms in large networks
CN106027412A (en) TCP (Transmission Control Protocol) congestion control method based on congestion queue length
WO2021109610A1 (en) Transmission quality test method and apparatus, system, and storage medium
US9084132B2 (en) Monitoring path characterisation information
CN103326884A (en) Service flow aware system and method combining flow detection and package detection in SDN
WO2009090387A1 (en) Network characterisation
JP4726978B2 (en) Congestion control device and congestion control method
WO2008011778A1 (en) A method and system for quality guarantee of end to end
WO2017132987A1 (en) Method and system for recognizing packet loss type in data transmission of reliable transmission protocol
Theoleyre et al. Operations, Administration and Maintenance (OAM) features for RAW
CN115118663A (en) Method for acquiring network congestion information by combining in-band network telemetry
Nabeshima et al. Improving the convergence time highspeed TCP
RU2687040C1 (en) Method and apparatus for monitoring a backbone network
CN102082735B (en) Method for managing passive queue by abandoning head for N times
Marbach et al. Active queue management and scheduling for wireless networks: The single-cell case
CN102123094B (en) Passive queue management method capable of realizing random packet loss twice
CN113923133B (en) Quality of experience index monitoring method for encrypted webpage traffic based on QUIC
Jie et al. Bf-red: a novel algorithm for improving bandwidth fairness of red
Hisch Performance evaluation of TCP flows

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110316

Termination date: 20130720