CN116155827A - Data transmission method, device, router, electronic equipment and storage medium - Google Patents

Data transmission method, device, router, electronic equipment and storage medium Download PDF

Info

Publication number
CN116155827A
CN116155827A CN202310080056.1A CN202310080056A CN116155827A CN 116155827 A CN116155827 A CN 116155827A CN 202310080056 A CN202310080056 A CN 202310080056A CN 116155827 A CN116155827 A CN 116155827A
Authority
CN
China
Prior art keywords
preset threshold
data message
data
threshold value
network node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310080056.1A
Other languages
Chinese (zh)
Other versions
CN116155827B (en
Inventor
刘思聪
郑圣
邱佳慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310080056.1A priority Critical patent/CN116155827B/en
Publication of CN116155827A publication Critical patent/CN116155827A/en
Application granted granted Critical
Publication of CN116155827B publication Critical patent/CN116155827B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/29Flow control; Congestion control using a combination of thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/32Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a data transmission method, a data transmission device, a router, electronic equipment and a storage medium. The method comprises the following steps: receiving a data message; five-layer protocol analysis is carried out on the data message, and a target network node of the data message is determined; carrying out packet loss on the data message exceeding a first preset threshold value; and sending the data message which does not exceed the first preset threshold value to the target network node. The method improves the utilization rate of the transmission channel.

Description

Data transmission method, device, router, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a data transmission method, a data transmission device, a router, an electronic device, and a storage medium.
Background
With the increasing perfection of communication network facilities and the improvement of intelligent terminal manufacturing level, the scale of internet users is continuously increased, and data transmission is also more frequent.
Data transmission is the process of communicating data from one place to another through a transmission channel. At present, when data is transmitted, after receiving data to be transmitted, the routing equipment performs protocol analysis on the data to obtain a target network node, and then transmits the data to the target network node.
However, as network traffic increases greatly, and the protocol types of traffic are complex and diverse and change in real time, fluctuations in traffic flow rate impact stability of the transmission channel, resulting in lower utilization rate of the transmission channel.
Disclosure of Invention
The application provides a data transmission method, a data transmission device, a router, electronic equipment and a storage medium, which are used for solving the problem of low utilization rate of a transmission channel.
In a first aspect, the present application provides a data transmission method, including:
receiving a data message;
five-layer protocol analysis is carried out on the data message, and a target network node of the data message is determined;
packet loss is carried out on the data messages exceeding a first preset threshold, wherein the first preset threshold is the number of the data messages receivable by the target network node;
and sending the data message which does not exceed the first preset threshold value to the target network node.
Optionally, performing five-layer protocol parsing on the data message includes:
and carrying out protocol analysis on the data message in a physical layer, a data link layer, a network layer, a transmission layer and an application layer.
Optionally, the method further comprises:
five-layer protocol analysis is carried out on the data message to obtain service type and/or priority information of the data message;
packet loss is carried out on the data message exceeding a first preset threshold value, and the method comprises the following steps:
and according to the service type and/or the priority information, carrying out packet loss on the data message exceeding the first preset threshold value.
Optionally, before the packet loss of the data packet exceeding the first preset threshold, the method further includes:
acquiring the link utilization rate of a target network node;
and determining a first preset threshold according to the link utilization.
Optionally, the first preset threshold includes a fourth preset threshold, a fifth preset threshold and a sixth preset threshold, where values represented by the fourth preset threshold, the fifth preset threshold and the sixth preset threshold decrease in sequence;
determining a first preset threshold according to the link utilization, including:
determining a first preset threshold according to a second preset threshold and a third preset threshold of the link utilization rate, wherein the link utilization rate represented by the second preset threshold is lower than the link utilization rate represented by the third preset threshold;
when the link utilization rate is smaller than or equal to the second preset threshold value, the first preset threshold value is a fourth preset threshold value;
when the link utilization rate is larger than the second preset threshold value and smaller than the third preset threshold value, the first preset threshold value is a fifth preset threshold value;
when the link utilization rate is greater than or equal to a third preset threshold, the first preset threshold is a sixth preset threshold.
Optionally, after receiving the data packet, the method further includes:
converting the data message from an optical signal to an electrical signal;
before sending the data message which does not exceed the first preset threshold to the target network node, the method further comprises the following steps:
and converting the data message which does not exceed the first preset threshold value into an optical signal from the electric signal.
In a second aspect, the present application provides a data transmission apparatus, comprising:
the receiving module is used for receiving the data message;
the determining module is used for carrying out five-layer protocol analysis on the data message and determining a target network node of the data message;
the processing module is used for carrying out packet loss on the data message exceeding a first preset threshold value;
and the sending module is used for sending the data message which does not exceed the first preset threshold value to the target network node.
In a third aspect, the present application provides a router comprising:
the first network interface is used for receiving the data message and converting the data message into an electric signal from an optical signal;
the identification chip is used for identifying the data message and determining a target network node of the data message;
the main control chip is used for carrying out packet loss on the data message exceeding a first preset threshold value;
the second network interface is used for converting the data message which does not exceed the first preset threshold value into an optical signal from an electric signal and transmitting the optical signal to the target network node.
In a fourth aspect, the present application provides an electronic device, comprising: a memory and a processor;
the memory is used for storing a computer program; the processor is configured to execute a computer program stored in the memory, and implement the data transmission method in the first aspect and any embodiment of the first aspect.
In a fifth aspect, the present application provides a computer readable storage medium having a computer program stored therein, which when executed by a processor, implements the data transmission method in the first aspect and any one of the embodiments of the first aspect.
The data transmission method, the device, the router, the electronic equipment and the storage medium provided by the application are used for carrying out five-layer protocol analysis on the data message after receiving the data message, so as to determine a target network node of the data message; and then, carrying out packet loss on the data message exceeding the first preset threshold value, and sending the data message which does not exceed the first preset threshold value to the target network node, thereby realizing the effect of improving the utilization rate of the transmission channel.
Drawings
For a clearer description of the present application or of the prior art, the drawings that are used in the description of the embodiments or of the prior art will be briefly described, it being apparent that the drawings in the description below are some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a scenario of data transmission according to an embodiment of the present application;
fig. 2 is a flowchart of a data transmission method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data transmission device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a router according to an embodiment of the present application;
fig. 5 is a schematic hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the present application more apparent, the technical solutions in the present application will be clearly and completely described below with reference to the drawings in the present application, and it is apparent that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The terms first, second, third, fourth and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged where appropriate. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein.
The word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination", depending on the context.
Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise.
It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups.
With the increasing perfection of communication network facilities and the improvement of intelligent terminal manufacturing level, the scale of internet users continues to increase, and data transmission in the network is also frequent.
Data transmission refers to a communication process in which data is transferred from one place to another via a transmission channel. Along with the great increase of network traffic, the protocol types of the traffic are complex and various and change in real time, and the fluctuation of the traffic rate brings impact to the stability of a transmission channel, so that the utilization rate of the transmission channel is lower.
In view of the above problems, the present application proposes a data transmission method, apparatus, router, electronic device, and storage medium. After receiving the data message, the method carries out five-layer protocol analysis on the data message to determine a target network node of the data message; and then carrying out packet loss on the data message exceeding the first preset threshold value, and sending the data message which does not exceed the first preset threshold value to the target network node. By shaping the traffic, the effect of improving the utilization rate of the transmission channel is achieved.
The technical scheme of the present application is described in detail below with specific examples. The following embodiments may be combined with each other, and some embodiments may not be repeated for the same or similar concepts or processes.
Fig. 1 shows a schematic diagram of a scenario of data transmission according to an embodiment of the present application. As shown in fig. 1, after the router 1 receives the data, it determines the destination address or the next hop address of the data, and then transmits the data via the transmission channel, or the router 2 continues to transmit the data. When the flow rate fluctuation is too large, impact may be caused on the transmission channel, and the utilization rate of the transmission channel is greatly reduced.
In the present application, the data transmission method of the following embodiment is performed with the electronic device as an execution body. In particular, the execution body may be a hardware device of the electronic apparatus, or a software application implementing the embodiments described below in the electronic apparatus, or a computer-readable storage medium on which the software application implementing the embodiments described below is installed, or code of the software application implementing the embodiments described below.
Fig. 2 shows a flowchart of a data transmission method according to an embodiment of the present application. As shown in fig. 2, with the electronic device as an execution body, the method of the present embodiment may include the following steps:
s201, receiving the data message.
In this embodiment, the data packet may be a service data packet or a signaling interaction packet, which is not limited in this embodiment.
S202, five-layer protocol analysis is carried out on the data message, and a target network node of the data message is determined.
In this embodiment, the target network node is a network node that is to receive the data packet. Each data message has its corresponding target network node, and the target network nodes of different data messages may be the same or different.
Optionally, the five-layer protocol parsing refers to protocol parsing of a physical layer, a data link layer, a network layer, a transport layer, and an application layer, so as to obtain a target network node of the data packet.
In addition, the five-layer protocol parsing may also obtain other data packet information, such as a transmission port, a service type, etc., which may be understood with reference to the related art of the five-layer protocol parsing, and will not be described herein.
According to the information obtained by five-layer protocol analysis, whether the data message to be transmitted is lost or not can be determined.
S203, packet loss is carried out on the data messages exceeding a first preset threshold, wherein the first preset threshold is the number of the data messages receivable by the target network node.
In this embodiment, a first preset threshold may be preset to limit the number of data packets that may be transmitted.
In one example, five-layer protocol parsing is performed on the data message, so that service type and/or priority information of the data message can be obtained. In this example, according to the service type and/or priority information, the packet of the data packet exceeding the first preset threshold may be lost.
For example, the service types of the data message include a service type a and a service type B, and the data message with the service type B exceeding the first preset threshold may be set to perform packet loss according to the need. For another example, packet loss is performed on the data packets exceeding the first preset threshold and having lower priority. Here, the priority is high or low, and the user can set the priority according to the needs, when the data packets are relative to each other.
Or, the data message with the service type B comprises a message with high priority and a message with low priority, and the packet of the message with low priority is lost in the data message with the service type B exceeding the first preset threshold.
In one example, setting the first preset threshold may be obtaining a link utilization of the target network node, and determining the first preset threshold according to the link utilization.
In this example, the link utilization of the target network node may represent its congestion status, and the higher the link utilization, the more congested the link, and the fewer the number of data messages that the target network node may receive.
According to the method, the first preset threshold value is determined according to the link utilization rate, so that the number of data messages sent to the target network node cannot impact the transmission channel, and meanwhile, the utilization rate of the transmission channel is improved.
Optionally, the first preset threshold includes a fourth preset threshold, a fifth preset threshold, and a sixth preset threshold, where values represented by the fourth preset threshold, the fifth preset threshold, and the sixth preset threshold decrease in sequence.
Based on the above example, according to the link utilization, a first preset threshold is determined, and the specific implementation manner may be: and determining a first preset threshold according to a second preset threshold and a third preset threshold of the link utilization rate, wherein the link utilization rate represented by the second preset threshold is lower than the link utilization rate represented by the third preset threshold.
When the link utilization rate is smaller than or equal to the second preset threshold value, the first preset threshold value is a fourth preset threshold value;
when the link utilization rate is larger than the second preset threshold value and smaller than the third preset threshold value, the first preset threshold value is a fifth preset threshold value;
when the link utilization rate is greater than or equal to a third preset threshold, the first preset threshold is a sixth preset threshold.
For example, the link utilization P is P1, P2, and P1< P2. The first preset threshold is N, the fourth preset threshold, the fifth preset threshold and the sixth preset threshold are N1, N2 and N3 respectively, and N1> N2> N3.
When P < P1, n=n1 is set; setting n=n2 when P1< P2; when P2< P, n=n3 is set.
According to the method, the threshold value is set for the link utilization rate, and different first preset threshold values are set for different link utilization rates, so that the transmission channel is not impacted by excessive flow fluctuation, and meanwhile, the utilization rate is higher.
S204, the data message which does not exceed the first preset threshold value is sent to the target network node.
In this embodiment, in the process of sending the data packet that does not exceed the first preset threshold to the target network node, the traffic fluctuation is small, so that impact on the transmission channel is not caused.
Optionally, if the data packet is converted from an optical signal to an electrical signal after receiving the data packet, the data packet which does not exceed the first preset threshold is converted from the electrical signal to the optical signal before being sent. Photoelectric conversion is to facilitate signal processing inside the device.
According to the data transmission method, the data messages exceeding the threshold value are lost according to the number of the data messages receivable by the target network node, and the data messages not exceeding the threshold value are transmitted to the target network node, so that the impact on a transmission channel caused by overlarge flow is avoided, and the utilization rate of the transmission channel is improved.
Fig. 3 is a schematic structural diagram of a data transmission device according to an embodiment of the present application. As shown in fig. 3, the data transmission device 30 of the present embodiment is configured to implement the operations corresponding to the electronic device in any of the above method embodiments, where the data transmission device 30 of the present embodiment includes:
a receiving module 301, configured to receive a data packet;
the determining module 302 is configured to perform five-layer protocol analysis on the data packet, and determine a target network node of the data packet;
a processing module 303, configured to discard a packet of a data packet exceeding a first preset threshold;
a sending module 304, configured to send a data packet that does not exceed a first preset threshold to a target network node.
The data transmission device 30 provided in the embodiment of the present application may execute the above-mentioned method embodiment, and the specific implementation principle and technical effects of the method embodiment may be referred to the above-mentioned method embodiment, which is not described herein again.
Fig. 4 is a schematic structural diagram of a router according to an embodiment of the present application. As shown in fig. 4, the router 40 of the present embodiment is configured to implement the operations corresponding to the electronic device in any of the above method embodiments, and the router 40 of the present embodiment may include:
a first network interface 401, configured to receive a data packet and convert the data packet from an optical signal to an electrical signal;
an identification chip 402, configured to identify the data packet and determine a target network node of the data packet;
the main control chip 403 is configured to discard packets of the data packet exceeding the first preset threshold;
the second network interface 404 is configured to convert the data packet that does not exceed the first preset threshold from an electrical signal to an optical signal, and send the optical signal to the target network node.
The router 40 of the present embodiment may further include: a switching chip 405 and a statistics chip 406. Wherein the switching chip 405 is used to forward interaction and data messages in the router 40. The statistics chip 406 is configured to sort the recognition result of the recognition chip 402 and package the data message and send the data message to the main control chip 403.
Specifically, the second end of the first network interface 401 is connected to the first end of the switch chip 405, the third end of the switch chip 405 is connected to the third end of the master control chip 403, and the routing table information of the master control chip is learned by means of signaling interaction, and a forwarding table is formed and stored, and the forwarding table can guide specific forwarding of data.
The second end of the switching chip 405 is connected to the first end of the identification chip 402, and the switching chip 405 transmits the data message to the identification chip without changing the content of the data message.
The identification process of the identification chip 402 may be port identification, feature word identification, association identification, behavior identification, etc. Port identification refers to the use of a fixed, well-known port for communication for some conventional network application protocols, so that port detection techniques may be employed for this part of the protocol. Feature word recognition refers to determining the protocol type by analyzing specific fields and states of an application layer protocol. The association identification refers to extracting and counting the flow on the channel through analyzing the negotiation message of the protocol, thereby judging the protocol type. Behavior recognition refers to a method for recognizing a protocol with fuzzy characteristic keywords through specific behavior analysis.
The second end of the identification chip 402 is connected to the first end of the statistics chip 406, and the identification chip 402 transmits the data message and the identification result to the statistics chip 406 without changing the content of the data message.
The second end of the statistics chip 406 is connected to the first end of the main control chip 403, and the statistics chip 406 does not process the data message, but only sends the statistics content and the data message to the main control chip 403.
Unlike the conventional router device, the main control chip 403 of the router 40 of this embodiment can process the data packet according to the requirements, such as traffic shaping.
The main control chip 403 can selectively lose packets of the data message through the token bucket technology, thereby achieving the effects of bandwidth control and flow shaping. After the token bucket is set, only the data messages with corresponding tokens can be transmitted, and the data messages without tokens are discarded. The main control chip 403 may set the number of tokens N, and may also adjust the size of N during the router use process. N represents the number of messages that can pass smoothly through the chip without being discarded. The larger the value of N, the more data messages are transmitted.
The first end of the second network interface 404 is connected to the second end of the main control chip 403. The primary purpose of the second network interface 404 is to electro-optically convert the data packets and send the data packets in the form of optical signals to the next-hop device.
The router 40 of the embodiment can make it unnecessary to configure special traffic shaping equipment during traffic shaping, and can flexibly configure the router 40 in the network, so that an operator can flexibly build the network.
The router 40 provided in this embodiment of the present application may perform the above method embodiment, and details of the specific implementation principles and technical effects described in the above method embodiment may be referred to in not-exhaustive detail, and this embodiment will not be described herein.
Fig. 5 shows a schematic hardware structure of an electronic device according to an embodiment of the present application. As shown in fig. 5, the electronic device 50, configured to implement operations corresponding to the electronic device in any of the above method embodiments, the electronic device 50 of this embodiment may include: a memory 501 and a processor 502.
A memory 501 for storing a computer program. The Memory 501 may include a high-speed random access Memory (Random Access Memory, RAM), and may further include a Non-Volatile Memory (NVM), such as at least one magnetic disk Memory, and may also be a U-disk, a removable hard disk, a read-only Memory, a magnetic disk, or an optical disk.
A processor 502 for executing a computer program stored in a memory to implement the data transmission method in the above embodiment. Reference may be made in particular to the relevant description of the embodiments of the method described above. The processor 502 may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
Alternatively, the memory 501 may be separate or integrated with the processor 502.
When memory 501 is a separate device from processor 502, electronic device 50 may also include a bus. The bus is used to connect the memory 501 and the processor 502. The bus may be an industry standard architecture (Industry Standard Architecture, ISA) bus, an external device interconnect (Peripheral Component Interconnect, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, the buses in the drawings of the present application are not limited to only one bus or one type of bus.
The electronic device 50 may also include a communication interface that may be coupled to the processor 502 via a bus. The processor 502 may control the communication interface to perform the functions of receiving and transmitting signals.
The electronic device 50 provided in this embodiment may be used to execute the data transmission method described above, and its implementation manner and technical effects are similar, and this embodiment will not be repeated here.
The present application also provides a computer readable storage medium having stored therein a computer program/instruction which when executed by a processor is adapted to carry out the methods provided by the various embodiments described above.
The computer readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media can be any available media that can be accessed by a general purpose or special purpose computer. For example, a computer-readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the computer-readable storage medium. In the alternative, the computer-readable storage medium may be integral to the processor. The processor and the computer readable storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuits, ASIC). In addition, the ASIC may reside in a user device. The processor and the computer-readable storage medium may also reside as discrete components in a communication device.
In particular, the computer readable storage medium may be implemented by any type or combination of volatile or non-volatile Memory devices, such as Static Random-Access Memory (SRAM), electrically erasable programmable Read-Only Memory (EEPROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic or optical disk. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The present application also provides a computer program product comprising a computer program/instructions stored in a computer readable storage medium. At least one processor of the device may read the computer program/instructions from a computer-readable storage medium, execution of the computer program/instructions by at least one processor causing the device to perform the methods provided by the various embodiments described above.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of modules is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple modules may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or modules, which may be in electrical, mechanical, or other forms.
Wherein the individual modules may be physically separated, e.g. mounted in different locations of one device, or mounted on different devices, or distributed over a plurality of network elements, or distributed over a plurality of processors. The modules may also be integrated together, e.g. mounted in the same device, or integrated in a set of codes. The modules may exist in hardware, or may also exist in software, or may also be implemented in software plus hardware. The purpose of the embodiment scheme can be achieved by selecting part or all of the modules according to actual needs.
It should be understood that, although the steps in the flowcharts in the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily occurring in sequence, but may be performed alternately or alternately with other steps or at least a portion of the other steps or stages.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region, and provide corresponding operation entries for the user to select authorization or rejection.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limited thereto. Although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments may be modified or some or all of the technical features may be replaced with equivalents. Such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method of data transmission, the method comprising:
receiving a data message;
five-layer protocol analysis is carried out on the data message, and a target network node of the data message is determined;
packet loss is carried out on the data messages exceeding a first preset threshold, wherein the first preset threshold is the number of the data messages receivable by the target network node;
and sending the data message which does not exceed the first preset threshold value to the target network node.
2. The method according to claim 1, wherein said performing five-layer protocol parsing on said data message comprises:
and carrying out protocol analysis of a physical layer, a data link layer, a network layer, a transmission layer and an application layer on the data message.
3. The method according to claim 2, characterized in that the method further comprises:
five-layer protocol analysis is carried out on the data message to obtain service type and/or priority information of the data message;
the packet loss of the data message exceeding the first preset threshold value comprises the following steps:
and according to the service type and/or the priority information, carrying out packet loss on the data message exceeding a first preset threshold value.
4. The method of claim 1, wherein before the packet loss of the data packet exceeding the first preset threshold, further comprising:
acquiring the link utilization rate of the target network node;
and determining a first preset threshold according to the link utilization.
5. The method of claim 4, wherein the first preset threshold comprises a fourth preset threshold, a fifth preset threshold, and a sixth preset threshold, wherein the values represented by the fourth preset threshold, the fifth preset threshold, and the sixth preset threshold decrease in sequence;
the determining a first preset threshold according to the link utilization rate includes:
determining the first preset threshold according to a second preset threshold and a third preset threshold of the link utilization rate, wherein the link utilization rate represented by the second preset threshold is lower than the link utilization rate represented by the third preset threshold;
when the link utilization rate is smaller than or equal to the second preset threshold value, the first preset threshold value is the fourth preset threshold value;
when the link utilization rate is greater than the second preset threshold value and smaller than the third preset threshold value, the first preset threshold value is the fifth preset threshold value;
and when the link utilization rate is greater than or equal to the third preset threshold, the first preset threshold is the sixth preset threshold.
6. The method according to any one of claims 1-5, further comprising, after receiving the data message:
converting the data message from an optical signal to an electrical signal;
before the data message which does not exceed the first preset threshold is sent to the target network node, the method further includes:
and converting the data message which does not exceed the first preset threshold value from an electric signal to an optical signal.
7. A data transmission apparatus, comprising:
the receiving module is used for receiving the data message;
the determining module is used for carrying out five-layer protocol analysis on the data message and determining a target network node of the data message;
the processing module is used for carrying out packet loss on the data message exceeding a first preset threshold value;
and the sending module is used for sending the data message which does not exceed the first preset threshold value to the target network node.
8. A router, comprising:
the first network interface is used for receiving the data message and converting the data message into an electric signal from an optical signal;
the identification chip is used for identifying the data message and determining a target network node of the data message;
the main control chip is used for carrying out packet loss on the data message exceeding a first preset threshold value;
and the second network interface is used for converting the data message which does not exceed the first preset threshold value from an electric signal to an optical signal and sending the optical signal to the target network node.
9. An electronic device, the device comprising: a memory and a processor;
the memory is used for storing a computer program;
the processor is configured to execute a computer program stored in the memory, and implement the data transmission method according to any one of claims 1 to 6.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the data transmission method according to any one of claims 1-6.
CN202310080056.1A 2023-01-17 2023-01-17 Data transmission method, device, router, electronic equipment and storage medium Active CN116155827B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310080056.1A CN116155827B (en) 2023-01-17 2023-01-17 Data transmission method, device, router, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310080056.1A CN116155827B (en) 2023-01-17 2023-01-17 Data transmission method, device, router, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116155827A true CN116155827A (en) 2023-05-23
CN116155827B CN116155827B (en) 2024-08-27

Family

ID=86373034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310080056.1A Active CN116155827B (en) 2023-01-17 2023-01-17 Data transmission method, device, router, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116155827B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060045008A1 (en) * 2004-08-27 2006-03-02 City University Of Hong Kong Queue-based active queue management process
CN101286996A (en) * 2008-05-30 2008-10-15 北京星网锐捷网络技术有限公司 Storm attack resisting method and apparatus
CN101426014A (en) * 2008-12-02 2009-05-06 中兴通讯股份有限公司 Method and system for multicast source attack prevention
CN102447711A (en) * 2012-01-18 2012-05-09 中兴通讯股份有限公司 Method and device for sending protocol messages
CN103023816A (en) * 2011-09-20 2013-04-03 盛科网络(苏州)有限公司 Method and device for realizing control of resources at network access
CN107547567A (en) * 2017-09-29 2018-01-05 新华三技术有限公司 A kind of anti-attack method and device
CN109474538A (en) * 2018-12-29 2019-03-15 北京达佳互联信息技术有限公司 A kind of data transmission method, device, terminal device and storage medium
US20220256396A1 (en) * 2019-06-17 2022-08-11 Huawei Technologies Co.,Ltd. Congestion control method and apparatus

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060045008A1 (en) * 2004-08-27 2006-03-02 City University Of Hong Kong Queue-based active queue management process
CN101286996A (en) * 2008-05-30 2008-10-15 北京星网锐捷网络技术有限公司 Storm attack resisting method and apparatus
CN101426014A (en) * 2008-12-02 2009-05-06 中兴通讯股份有限公司 Method and system for multicast source attack prevention
CN103023816A (en) * 2011-09-20 2013-04-03 盛科网络(苏州)有限公司 Method and device for realizing control of resources at network access
CN102447711A (en) * 2012-01-18 2012-05-09 中兴通讯股份有限公司 Method and device for sending protocol messages
CN107547567A (en) * 2017-09-29 2018-01-05 新华三技术有限公司 A kind of anti-attack method and device
CN109474538A (en) * 2018-12-29 2019-03-15 北京达佳互联信息技术有限公司 A kind of data transmission method, device, terminal device and storage medium
US20220256396A1 (en) * 2019-06-17 2022-08-11 Huawei Technologies Co.,Ltd. Congestion control method and apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LUGENGHONG等: ""Hidden Markov Model-Based Attack Detection for Networked Control System Subject to Random Packet Dropouts"", 《IEEE》, 17 January 2022 (2022-01-17) *
曲大鹏;黄东军;: ""一种新的适用于异构网络的TCP算法"", 《计算机应用》, no. 10, 1 October 2007 (2007-10-01) *

Also Published As

Publication number Publication date
CN116155827B (en) 2024-08-27

Similar Documents

Publication Publication Date Title
US7042848B2 (en) System and method for hierarchical policing of flows and subflows of a data stream
US7206284B2 (en) Method and apparatus for automatic congestion avoidance for differentiated service flows
CN101547159B (en) Method and device for preventing network congestion
JP2001197111A (en) Multilayer class identifying communication equipment and communication equipment
CN112953848B (en) Traffic supervision method, system and equipment based on strict priority
US20020114327A1 (en) Packet length classification
CN111181873A (en) Data transmission method, data transmission device, storage medium and electronic equipment
JPS6135652A (en) Method of controlling data byte
CN113347096B (en) Transmission processing method of third party payment data
CN116155827B (en) Data transmission method, device, router, electronic equipment and storage medium
CN111064768B (en) Printer data transmission control method, device, equipment and storage medium
CN114422617A (en) Message processing method, system and computer readable storage medium
CN111740922B (en) Data transmission method, device, electronic equipment and medium
CN1973503A (en) Flow processing
CN105553876B (en) The method and network node of Message processing
CN113676423A (en) Port flow control method and device, exchange chip and storage medium
EP4181479A1 (en) Method for identifying flow, and apparatus
CN103795648A (en) Method, device and system for scheduling queue
CN111865723A (en) Network data acquisition system based on big data
CN116192761A (en) Message forwarding method, forwarding layer device, system, electronic device and storage medium
CN115914115A (en) Network congestion control method, device and communication system
WO2014101047A1 (en) Method, device, and system for identifying network packet loss type
CN110336759A (en) Protocol message transfer method and device based on RDMA
CN114827020B (en) Data packet transmission path customization method, system and readable storage medium
JP2001111556A (en) Device and method for avoiding congestion according to red

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant