Summary of the invention
Technical problem to be solved by this invention provides a kind of network teleconference system that quickens based on the video signal flow, it is by being provided with mark module in the client that network teleconference software is installed, and in router, packet is handled, filtered, realize the preferential forwarding of network teleconference packet, thereby guarantee the quality of the network teleconference.
Technical problem to be solved by this invention provides a kind of accelerated method of network teleconference system of video signal flow acceleration, it is by processing that packet is classified, and the formation module with priority is set in router, according to priority principle filtering data bag, the packet of preferential transmission network video conference, thereby the quality of the assurance network teleconference.
Purpose of the present invention is achieved through the following technical solutions: based on the network teleconference system of video signal flow acceleration, comprise the client that network teleconference software is installed more than, the router that is connected with client by network, in order to strengthen preferential forwarding to some packet, on described client, also be provided with mark module, and in described router, be provided with formation module and the data dispatch module that is connected with mark module successively.
The quantity of described router is more than two, and all adopts cable network or wireless network to connect between the all-router.
A kind of accelerated method of the network teleconference system that quickens based on the video signal flow may further comprise the steps:
(a) client drives the last mark of packet notes that mark module sends client;
(b) in the formation module on router priority query is set;
(c) the client data bag is according to mark value, and coupling enters the priority query of router respectively;
(d) adopt the Weight Round Robin algorithm to transmit packet by the data dispatch module according to the priority principle in the formation module.
The packet that client driving mark module sends client in the described step (a) is annotated the subscript note and further comprised: with the packet marking of network teleconference software is the packet that has the SYN mark.
The priority query of formation module is in the described step (b):
Formation 1: have lowest latency and obtain idle bandwidth at first;
Formation 2: the packet that is used for handling browsing page;
Formation 3: be the packet that has maximum throughput type of service field position;
Formation 4: the data flow that is mail and type of service field requirement minimum cost;
Formation 5: be the machine that transmits through Network address translators.
The client data bag mates the priority query that enters router respectively and further comprises according to mark value in the described step (c):
(c1) after the packet of client sent, default data led to walk by the formation in the formation module 5;
(c2) router is according to the mark value of packet, and coupling enters the priority query of formation module respectively.
Router mates the priority query that enters the formation module respectively and specifically may further comprise the steps according to the mark value of packet in the described step (c2):
(c2.1) packet, Secure Shell safe socket character agreement, Telnet, domain name retransmission protocol, Internet chat agreement, file transfer protocol (FTP) control, Simple Mail Transfer protocol order, the affirmation bag data that will have the SYN mark are all put into formation 1;
(c2.2) packet that will handle browsing page is put into formation 2;
(c2.3) the file connection protocol is put into formation 3;
(c2.4) require the data flow of minimum cost to put into formation 4 mail data bag and type of service field;
(c2.5) the above-mentioned packet of not beating mark is stayed formation 5;
(c2.6) circulation step (c2.1) repeats above-mentioned setting to step (c2.5) in discharging chain.
The peak rate that formation 1 is set in the described formation module is 384kbps.
The present invention compared with prior art has following advantage and beneficial effect:
(1) the present invention is by being provided with the priority level in the formation module, allows the interaction data bag keep minimum time of delay, that is to say to upload or file in download can not bothered SECURE SHELL safe socket character agreement/Telnet etc.
(2) the present invention guarantees to have during uploading or downloading rational speed to be used for web page browsing by the peak rate of formation 1 is set, even http belongs to a kind of mass data transmission, it is too big also not influenced by other transmission.
(3) the present invention is to mail protocol and non-classified packet speed limits such as file connection protocol, Simple Mail Transfer protocol/Post Office Protocol 3s, make it can not take all bandwidth, in order to avoid influence the transmission of priority higher data bag, but also can distribute to its reasonable bandwidth simultaneously, to guarantee its normal operation; The present invention is divided into the up-downgoing formation with formation, and flowing to guarantee to upload data not to influence data download stream; Simultaneously, the present invention limits by the downloading rate of Intranet to each IP, guarantees the transmission of priority higher data once more; When idle bandwidth occurring, the present invention is provided with the priority level that obtains idle bandwidth in router, as: interaction data, file connection protocol, Simple Mail Transfer protocol, Post Office Protocol 3; Web page browsing, other service priority is not minimum, that is to say whenever, and the packet of the network teleconference is all preferentially obtained bandwidth, to guarantee the quality of the network teleconference, be embodied in clear picture, sound continuously, signal do not lag behind, picture is unobstructed etc.
Embodiment
Below in conjunction with embodiment the present invention is described in further detail, but embodiments of the present invention are not limited thereto.
Embodiment
As shown in Figure 1, network teleconference system based on the acceleration of video signal flow, comprise the client that network teleconference software is installed more than, the router that is connected with client by network, on described client, also be provided with mark module, and in described router, be provided with formation module and the data dispatch module that is connected with mark module successively; The data dispatch module is transmitted packet according to the priority principle in the formation module.
Environment of the present invention and requirement: circuit is ADSL (3M/512K); Eth0 is the outer network interface of pppoe; Eth1 is a network interface in the 192.168.0.1.
Business demand of the present invention is: discern normal video conference flow, guarantee that this type of flow is routed device and preferentially transmits, other all application are limited, in order to avoid influence the use of regular traffic.Forwarding queue is divided into 5 grades, and recognition accuracy is 100%.The file transfer protocol (FTP) that identifies, Simple Mail Transfer protocol etc. are entered formation 3 to postponing less demanding flow, and the P2P flow enters formation 4, and the video conference flow enters formation 1 and preferentially transmits.Concrete is presented as: (1) allows the interaction data bag keep lower time of delay, that is to say to upload or file in download can not bothered SECURE SHELL safe socket character agreement/Telnet etc.; (2) rational speed is arranged during uploading or downloading, total up speed is no more than 160Kbps, descending total speed is no more than 2000Kbps and is used for web page browsing, even http belongs to a kind of mass data transmission, it is too big also not influenced by other transmission; (3) to file connection protocol (ftp-data) speed limit, the up total speed of file connection protocol is no more than 100Kbps, can not take all bandwidth; (4) to Simple Mail Transfer protocol, Post Office Protocol 3's speed limit, Simple Mail Transfer protocol is mainly uploaded, and up total speed is no more than 80Kbps, and Post Office Protocol 3 downloads, and descending total speed is no more than 1000Kbps; (5) limit non-classified, non-classified may be P2P flow or other rarer flows, and up total rate limit is to 80Kbps, and descending total rate limit is to 300KBps, in order to avoid influence the transmission of interaction data; (6) guarantee not upload to influence download, uploading data fails to be convened for lack of a quorum influences the speed of downloading, and this is suitable general phenomenon; (7) downloading rate to each IP limits, and just running environment of the present invention rule of thumb is worth, and recommends the up 80Kbps that is restricted to, the descending 320Kbps that is restricted to; (8) priority level that obtains idle bandwidth is as interaction data, file connection protocol, Simple Mail Transfer protocol, Post Office Protocol 3; Web page browsing, other service priority is not minimum.
As shown in Figure 2, the present invention realizes that the accelerated method of above-mentioned requirements may further comprise the steps: (a) client drives the last mark of packet notes that mark module sends client; (b) in the formation module on router priority query is set; (c) the client data bag is according to mark value, and coupling enters the priority query of router respectively; (d) adopt the Weight Round Robin algorithm to transmit packet by the data dispatch module according to the priority principle in the formation module, the Weight Round Robin algorithm is a prior art, uses comparatively widely in computer realm.
As shown in Figure 3, further, the client data bag is according to mark value in the described step (c), and mate the priority query that enters router respectively and further comprise: after (c1) packet of client sent, default data led to walk by 1 this class of formation in the formation module; (c2) router is according to the mark value of packet, and coupling enters the priority query of formation module respectively.
As shown in Figure 4, outer network interface eth0 of the present invention uses the traffic management function (HTB) of algorithm to be divided into formation 1, formation 2, formation 3, formation 4,5 five classes of formation; These five classes are defined as classid 1:11, classid 1:12, classid 1:13, classid 1:14, classid 1:15 respectively, also be to determine priority principle in the formation module in the step (b) according to above-mentioned five classes, described HTB is the traffic management function of algorithm, wherein
Formation 1 (classid 1:11):
(1) this class priority is the highest.Have minimum delay and obtain idle bandwidth at first, therefore the peak rate of this class will be set, setting its peak rate is 384kbps;
Secure Shell safe socket character agreement (Ssh), Telnet (telnet), domain name retransmission protocol (dns), Post Office Protocol 3 (POP3), Internet chat agreement (irc), file transfer protocol (FTP) (ftp), Simple Mail Transfer protocol (smtp) and the packet that has a SYN mark all should belong to this class, packet to the network teleconference carries out mark in program for convenience, and the packet of the described SYN of having mark is the packet of the network teleconference.
(2) in order to guarantee that upstream can not injure downstream, we also will be confirming that packet comes the formation front.Here it is when data flow in enormous quantities takes place, the reason that transmitted in both directions is all had a strong impact on.Because the affirmation bag (ACK) of downlink data must be competed with up stream, and is delayed in processing procedure.
(3) the restriction upload rate is limited in upload rate than on the smaller slightly position of available bandwidth, so just can not form formation in your router (MODEM).
(4) got rid of down queue (except burst once in a while), guaranteed that the interaction data bag comes the foremost of upstream queue forever.
Formation 2 (classid 1:12):
The class of transmission in enormous quantities is mainly used to handle the packet of browsing page, target port 80,8080,443,8443 bag.
Formation 3 (classid 1:13):
This type of is the packet of gathering around with maximum throughput type of service field (TOS) position, is used to handle the file connection protocol.
Formation 4 (classid 1:14):
Here be the data flow that the relevant and type of service field of mail (Simple Mail Transfer protocol, Post Office Protocol 3) requires minimum cost.Be used to handle Simple Mail Transfer protocol, Post Office Protocol 3's service.
Formation 5 (classid 1:15):
Be the machine that transmits in enormous quantities through Network address translators at last, can not hinder normal service to guarantee them.
Should in step (a), classify based on the network teleconference system accelerating method that the video signal flow quickens, and classified data packages was carried out mark successively the advanced row of data.Qos chained list (qidsc) is divided into two kinds in the system, a kind of is the qos chained list that classification (classful) is arranged, another kind is the qos chained list that does not have classification (classless), have the classification and ataxonomic qos chained list can be as the root qos chained list (root qidsc) of equipment, but the qos chained list that classification arranged can grafting go out sub-qos chained list again by its classification (class), and sub-qos chained list is according to the particular type of the packet further sub-qos chained list of grafting again.Therefore can adopt the characteristic utilization of this combination to have classification qdisc and nothing classification qdisc to be combined into complicated scheduling mode.
A, identification flow:
Can flow with Access Control List (ACL) and based on network application identification technological synthesis definition of data.The access control list (ACL) definition can be adopted following parameter: source IP address, purpose IP address, layer 4 protocol (as User Datagram Protoco (UDP) UDP), source port number and destination interface number etc.Overlap the packet that defined parameters is complementary and all be regarded as belonging to homogeneous turbulence mutually with one, based on network application identification (NBAR) technology can be discerned application-level flow; Set up Access Control List (ACL) and be used for discerning p2p application port or server ip address, can dispose according to actual conditions, for example:
ip?a
ccess-list?extended?edonkey
permit?tcp?any?any?range?4661?4662
permit?tcp?any?any?range?4242?4243
permit?udp?any?any?eq?4665
Use the pdlm bag simultaneously
The based on network application identification pdlm bittorrent.pdlm of ip
The based on network application identification pdlm eDonkey.pdlm of ip
B, foundation strategy:
During concrete enforcement, need the strategy (Policing) of a customization of configuration earlier, this strategy should comprise following three parameters: Mean Speed, max-burst and the processing of being carried out when surpassing restriction.For bandwidth constraints more flexibly is provided, strategy is divided into two kinds again: miniflow strategy (Microflow) and total strategy (Aggregate).The miniflow strategy can provide single stream utilized bandwidth restriction, and the total strategy then can flow total utilized bandwidth to all to be limited.
The strategy of customization is put in the Access Control List (ACL), and is defined on a port or the VLAN, promptly can realize Bandwidth Management the user.If simultaneously set of applications and microflow policer, the then QoS implementation strategy device the most serious behavior of being formulated always.For example, if a tactful device requires packet discard, another one strategy device is designation data bag degradation then, and packet will be dropped so.Under the default conditions, microflow policer only works to (the 3rd layer) flow that is routed.If (the 2nd layer) flow of bridge joint is also worked, then need to enable bridge joint miniflow strategy (mls qos bridged).
Strategy in the system architecture can be implemented according to " leaking bucket " notion: all be placed into (each token is represented 1, thereby big packet is than the corresponding more token of small data packets) in the bucket with Incoming data on flows bag corresponding token.Normal time at interval in, the token number of some will take out from bucket and be sent out.If there are not more spaces to hold the packet of input in the bucket, then packet is regarded as exceeding the configuration file scope and is dropped or handles according to configured strategy operation implementation degradation.
Calculating parameter, the behavior of multiple parameter control token bucket:
Speed (Rate) defines will have take out for how many tokens in each time interval.All flows of being lower than speed all are considered to be and meet configuration requirement.
How long (Interval) definition token takes out once every in bucket at interval.Fixed interval was at 0.00025 second, thereby token will take out from bucket 4000 times each second.The time interval can not be changed.
Burst value (Burst) is defined in the highest number of tokens that can hold in any one moment bucket.In order to keep the flow rate of regulation, the size of burst rate should not be lower than the product in the speed and the time interval.The maximum sized packet of another consideration also must be able to be inserted in the bucket.
When the definition burst rate, need to consider that some agreements (as TCP) can adopt flow-control mechanism at packet loss.For example, TCP will dwindle half to the window of each packet that will lose, and correspondingly, when certain speed was carried out strategy, effectively junctor usage will be lower than the speed of configuration.Thereby you can increase burst rate and realize higher utilance.Concerning these flows, relatively simple mode is exactly that size with burst rate doubles (can be increased to 26Kbits from 13Kbits in our example), and monitoring performance is adjusted then as required.
mls?qos
---activate QoS
mls?qos?flow-policing
class-map?match-any?bit
match?protocol?bittorrent
match?protocol?eDonkey
match?access-group?edonkey
Match-user defines according to actual conditions
policy-map?p2p
class?bit
police?flow?100000?2000?conform-action?transmit?exceed-action?drop
---definition miniflow manager, limiting each p2p application stream is the micrometeor of 100Kbps
police?20000000?13000?26000?conform-action?transmit?exceed-action?drop
---definition cohesively managed device is the 20Mbps polymerization traffic so that limit all p2p application streams
C, on interface application strategy (equipment may only be supported the input direction)
interface?gigabitEthernet0/2
service-policy?input?p2p
service-policy?output?p2p
If implement QoS configuration based on VLAN, need be in the service quality (mls qos vlan-based) of two layer interfaces configuration based on VLAN
D, authentication policy performance
sh?mls?qos
sh?mls?qos?ip?gigabitEthernet?0/2
Sh mls ip detail# carries out microflow policing statistics
sh?int?g0/2rate-limit
show?policy-map?interface?g0/2
The based on network application identification unclassified-port-stats of show ip
The based on network application identification protocol stats of show ip byte-count
The based on network application identification port-map|include custom of show ip
The processing of being somebody's turn to do network teleconference system accelerating method formation in step (b) of quickening based on the video signal flow specifically may further comprise the steps: (1) as peak rate, adjusting CEIL is 75% of upstream rate with 384kbps; (2) empty existing formation, and error messages is emptied; (3) set up traffic management function (HTB) parent of algorithm, default data is led to walk by this class of 1:15; (4) maximum rate of setting up (uplink) is 70% of a peak value, about about 260kbps; (5) classification, classid 1:11 is that limit priority is other, stmp, Post Office Protocol 3, the file connection protocol takes second place, and web page browsing is taken second place again; And each class limited flank speed; (6) can another queue discipline of affix again below class, to guarantee the fair use of bandwidth.
Because above-mentioned formation has all been given classid 1:15 all packets that send, and should need to tell those packets of machine which way to go now; Filter is set so that packet is classified with IP packet filtration system; Can avoid traveling through all rules by the RETURN method.
Packet has a specific markers value (hanlde x fw) like this, shows it should give which class (classid x).The packet marking will be given in the back:
Lose those too near the packet that comes, do not allow them cause the speed of TCP/IP to be lower than the speed that we expect,, hold burst transfer so we will dispose " burst " because we do not wish packet discard easily.
By eth1, promptly the IP speed that network interface is internally netted in the 192.168.0.1 limits among the present invention.
Now packet being carried out mark, at first enable ip and transmit, do Network address translators (NAT) conversion, and set acquiescence iptable strategy, secondly is exactly the processing that type of service field is set: the minimum delay return the first kind; Mail (SMTP, pop3 etc.) data flow relevant and type of service field requirement minimum cost is returned the 4th class; Be the machine that router back process Network address translators transmits in enormous quantities at last, can not hinder normal service to guarantee them.Router mates the priority query that enters the formation module respectively and specifically may further comprise the steps according to the mark value of packet in the described step (c2): packet, Secure Shell safe socket character agreement, Telnet, domain name retransmission protocol, Internet chat agreement, file transfer protocol (FTP) control, Simple Mail Transfer protocol order, the affirmation bag data that (c2.1) will have the SYN mark are all put into the classid1:11 class; (c2.2) packet that will handle browsing page is put into classid 1:12 class; (c2.3) the file connection protocol is put into classid 1:13 class; (c2.4) require the data flow of minimum cost to put into classid 1:14 class mail data bag and type of service field; (c2.5) the above-mentioned packet of not beating mark is stayed classid 1:15 class; (c2.6) circulation step (c2.1) repeats above-mentioned setting to step (c2.5) in discharging chain.
Preparation iptables strategy filters the good packet of above-mentioned mark, guarantees that interaction data (packet that comprises band SYN mark, the i.e. packet of the network teleconference) priority level is the highest, transmits data after the data dispatch module is pressed priority principle.
The above only is preferred embodiment of the present invention, is not the present invention is done any pro forma restriction, to any simple modification, equivalent variations that above embodiment did, all falls within protection scope of the present invention on every foundation technical spirit of the present invention.