CN1293725C - Message inserting rate monitoring method in communication system - Google Patents
Message inserting rate monitoring method in communication system Download PDFInfo
- Publication number
- CN1293725C CN1293725C CNB031366295A CN03136629A CN1293725C CN 1293725 C CN1293725 C CN 1293725C CN B031366295 A CNB031366295 A CN B031366295A CN 03136629 A CN03136629 A CN 03136629A CN 1293725 C CN1293725 C CN 1293725C
- Authority
- CN
- China
- Prior art keywords
- rate
- bucket
- token
- message
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The present invention belongs to the technical field of service quality of data communication and relates to a message inserting rate monitoring method in a communication system. The present invention is characterized in that the present invention adopts a method that double-rate monitoring simulates single-rate monitoring. The method comprises the following steps: a user interface of a system is provided with two configuring interfaces of a single-rate three-color marker algorithm and a double-rate three-color marker algorithm; a double-rate three-color marker algorithm arithmetic logic is realized in the system; when a user configures the single-rate three-color marker algorithm, the configuration is adapted, which leads the configuration and the double-rate three-color marker algorithm to be consistent; a message which comes is completely signed and calculated according to the double-rate three-color marker algorithm, and an analog result is outputted. The present invention can reduce the workload of a software program and can lower the design complexity of a system in a hardware forwarding system.
Description
Technical field
The invention belongs to data communication QoS (Quality of Service, service quality) technical field, specially refer to the realization technology of the speed monitoring and managing method among the Diffserv (Differentiated Service, differential service).
Background technology
In current data network, along with the network evolution trend of unification of three nets (voice, video, data) is further deepened, and the establishment of the de facto standard of TCP/IP network technology, improving service quality on the original data network of doing one's best more and more becomes operator to the active demand of IP network equipment.IP network equipment is wanted to distinguish voice, video, data service, and at the characteristics of these different business, provides different transfer qualities just to become the important subject of IP QoS.Because Internet resources are limited, therefore in the network planning and operation management, the management and use of Internet resources become the most important thing of QoS research topic again simultaneously.For the service that can ensure the quality of products is provided, general at present " on-demand service " model that adopts, the user according to self actual needs such as business model (real-time or non real-time), flow size (minimum-rate or peak rate) and operator sign the service convention, simultaneously in order to guarantee that other users and whole Internet resources are not are not occupied, customer access equipment must carry out committed rate restriction, just CAR (Commitment Access Rate) according to the service convention.
In realization, the committed rate restriction is generally carried out rate controlled and metering according to RFC2697 and two kinds of canonical algorithms of RFC2698, the former full name is single-rate three-color marker algorithm (Single Rate ThreeColor Marker, be called for short srTCM:RFC2697), latter's full name is dual rate tricolor marker algorithm (Two Rate Three Color Marker is called for short trTCM:RFC2698).From in essence, the two all is a kind of token bucket algorithm, injects token according to certain speed to a flow bucket that is:, everyly reaches a packet, just therefrom takes out and wrap a long corresponding token, if there is not the residue token in the flow bucket, then abandons this bag.The difference of the two is mainly relevant with application, the former limits a customer flow with committed rate and excessive size, generally can be applicable to Internet and browse similar business, the latter limits a customer flow with committed rate and peak rate, generally can be applicable to similar business such as video request program.Specifically, two kinds of algorithms are all different on the processing mode after token accumulative total and the message arrival, are summarized as follows:
(1) token accumulative total
For two token accumulative totals of leaking bucket, the single-rate token bucket algorithm is to add token with same speed, and is after filling it up with first bucket, just adds second bucket.The dual rate token bucket algorithm is to leak in the bucket to two with two speed respectively independently to add token, all expires up to two.
(2) message rate limit calculation
The a certain moment, for the message in the stream of a needs metering, the single-rate token bucket algorithm is to see earlier whether token number is enough in first leakage bucket, see again whether token number is enough in second leakage bucket, according to the whether enough situations of token number, message is inserted green or yellow or red-label: from first leakage bucket, get token and then message is inserted green, from second leakage bucket, get token and then message is inserted yellow, do not have enough token numbers then message to be inserted redness.The dual rate token bucket algorithm is to see earlier whether second token number that leaks in the bucket be enough, see again whether first leaks the bucket token number enough, according to the whether enough situations of token, message is inserted redness or yellow or Green Marker: do not have enough token numbers that message is inserted redness, leak from second and to get token the bucket message is inserted yellow, leak from first and second and all get token the bucket message is inserted green.
The above-mentioned green that message inserts, yellow, redness of giving is by such realization: a TOS territory is arranged in the IP of message head, two BITS are wherein arranged, the color of expression message, the RFC regulation is to AF1/AF2/AF3/AF4 (first three BITS of corresponding TO S is 001 010 011 100 respectively) stream, and it represents the BITS position of color; Wherein, 01 represents green, 10 yellow, 11 redness, and marking is exactly the color value that this two BITS to message inserts the front respectively.
In the existing equipment, a certain token bucket algorithm is used in explicit selection during the committed rate limitation arrangement, algorithm has been carried out the description of computational process and false code because of RFC2697 and RFC2698 in the realization, simultaneously all different on two kinds of algorithms processing mode after token accumulative total and bag literary composition arrive, so generally strictly all realized two kinds of different processes according to wherein arthmetic statement.Though like this in strict accordance with the realization of RFC, shortcoming is two kinds of different processing logic processes, if can be said to be little with the influence of software implementation algorithm, only need to realize just passable with the different function of two covers respectively, if but realize that with hardware two kinds of different logics will double the complexity of system.And present present situation is no matter to consider from cost or performance, and the repeater system of hardware is quite general.So just had on the correct basis of assurance function, simplified necessity that integrated system realizes.
Summary of the invention
The objective of the invention is for overcoming the weak point that two kinds of different logics of employing increase the complexity of system in the prior art, the method that a kind of new access rate is supervised is proposed, this method can be simulated the method for single-rate supervision with the dual rate supervision, thereby available same dual rate token bucket algorithm implementation model, realize two kinds of speed monitoring and managing methods simultaneously, can in hardware forwarding system, reduce the design complexities of system.
The access rate monitoring and managing method of message is characterized in that in a kind of communication system that the present invention proposes, and the method with the supervision of dual rate supervision simulation single-rate may further comprise the steps:
User interface in system provides single-rate three-color marker algorithm and two kinds of configuration interfaces of dual rate tricolor marker algorithm;
Realize a kind of dual rate tricolor marker algorithm arithmetic logic in internal system;
When the user carries out the single-rate three-color marker algorithm configuration, this configuration is carried out adaptive, make it consistent with dual rate tricolor marker algorithm;
The message that arrives is carried out the mark computing according to dual rate tricolor marker algorithm fully, the output Simulation result.
Describedly realize that in internal system a kind of specific implementation method of dual rate tricolor marker algorithm arithmetic logic can do following change to the single-rate token bucket algorithm:
(1) token bucket initialization: two leak the initialization respectively of bucket token, and first is initialized as the promise size, and second is initialized as promise size and excessive size sum;
(2) token accumulative total: two leak bucket and independently add token simultaneously;
(3) message rate restriction is handled: to the message that arrives, whether the token number that detects second bucket earlier is enough, if inadequately then stamp red-label output to message; If enough, whether the token number that detects first barrel again is enough, if the token number of first barrel is not enough, then stamps yellow mark output to message; If the token number of first barrel is enough, then from first and second bucket, deduct the long corresponding token number of message bag respectively, stamp Green Marker output to message.
Describedly adaptive method is carried out in configuration can be: when configuration single-rate token bucket algorithm, leak bucket in dual rate of bottom corresponding configuration, and order:
(1) committed rate of dual rate leakage bucket and peak rate equate, are equal to the committed rate that single-rate is leaked bucket simultaneously;
(2) size of first of dual rate barrel equals first barrel size of single-rate; The size of second bucket of dual rate equals second bucket size that first barrel of single-rate adds single-rate.
Effect of the present invention:
The algorithm of dual rate simulation single-rate of the present invention is by actual hardware environment checking, reach the Limit Rate effect identical fully with the single-rate algorithm, when realizing the traffic policing token bucket algorithm, just can support two kinds of algorithms with unified logical construction, the present invention can reduce the software program workload and reduce the design complexities of system in hardware forwarding system.
Embodiment
The access rate monitoring and managing method embodiment of message in a kind of communication system that the present invention proposes specifically may further comprise the steps:
1) user interface in system provides two kinds of configuration interfaces, single-rate three-color marker algorithm and dual rate tricolor marker algorithm;
2) internal system only realizes a kind of arithmetic logic of dual rate tricolor marker algorithm, dual rate tricolor marker algorithm is described according to RFC fully realized that concrete steps are:
The single-rate token bucket algorithm is done following change:
(1) token bucket initialization
Two leakage bucket (being designated as Tc and Te) tokens are initialized as promises to undertake size (being designated as CBS) and promises to undertake that size adds excessive size (being designated as CBS+EBS) sum, rather than original C BS and EBS;
(2) token accumulative total
Whether full two leak bucket (being designated as Tc and Te) and independently add token simultaneously, no longer carry out first barrel (Tc) judgement, and the speed that adds token all equals the committed rate (being designated as CIR) of single-rate algorithm;
(3) the message rate restriction is handled
To the message that arrives, whether the token number that detects second bucket earlier is enough, if inadequately then stamp red-label output to message; If enough, whether the token number that detects first barrel again is enough, if the token number of first barrel is not enough, then stamps yellow mark output to message; If the token number of first barrel is enough, then from first and second bucket, deduct the long corresponding token number of message bag respectively, stamp Green Marker output to message.
According to above change, then the implementation procedure of the simulation implementation procedure of single-rate token bucket algorithm and dual rate token bucket algorithm is just consistent, just can only realize the speed supervision with a cover hardware logic like this in hardware forwarding system.But therefrom also find out, it is extra adaptive to carry out some in configuration single-rate supervision algorithm parameter, so just can shield the difference of the two in user level, the configuration interface that the user is presented still is single-rate token bucket algorithm and dual rate token bucket algorithm configuration parameter separately;
3) when the user carries out the single-rate three-color marker algorithm configuration, adaptive, adaptive method carried out in this configuration be:
When configuration single-rate token bucket algorithm, leak bucket in dual rate of bottom corresponding configuration, and order:
(1) committed rate of dual rate leakage bucket and peak rate equate, are equal to the committed rate that single-rate is leaked bucket simultaneously.
(2) size of first of dual rate barrel equals first barrel size of single-rate; The size of second bucket of dual rate equals second bucket size that first barrel of single-rate adds single-rate;
By default these conditions, the single-rate token bucket algorithm can be simulated fully with the dual rate token bucket algorithm;
4) message that arrives is carried out the mark computing according to dual rate tricolor marker algorithm fully, the output Simulation result.
Claims (4)
1, the access rate monitoring and managing method of message in a kind of communication system is characterized in that, the method with the supervision of dual rate supervision simulation single-rate may further comprise the steps:
User interface in system provides single-rate three-color marker algorithm and two kinds of configuration interfaces of dual rate tricolor marker algorithm;
Realize a kind of dual rate tricolor marker algorithm arithmetic logic in internal system;
When the user carries out the single-rate three-color marker algorithm configuration, this configuration is carried out adaptive, make it consistent with dual rate tricolor marker algorithm;
The message that arrives is carried out the mark computing according to dual rate tricolor marker algorithm fully, the output Simulation result.
2, the method for a kind of access rate supervision as claimed in claim 1 is characterized in that, describedly realizes that in internal system a kind of specific implementation method of dual rate tricolor marker algorithm arithmetic logic is that the single-rate token bucket algorithm is done following change:
(1) token bucket initialization: two leak the initialization respectively of bucket token, and first is initialized as the promise size, and second is initialized as promise size and excessive size sum;
(2) token accumulative total: two leak bucket and independently add token simultaneously;
(3) message rate restriction is handled: to the message that arrives, whether the token number that detects second bucket earlier is enough, if inadequately then stamp red-label output to message; If enough, whether the token number that detects first barrel again is enough, if the token number of first barrel is not enough, then stamps yellow mark output to message; If the token number of first barrel is enough, then from first and second bucket, deduct the long corresponding token number of message bag respectively, stamp Green Marker output to message.
3, the method for access rate as claimed in claim 2 supervision is characterized in that, and is described when the single-rate token bucket algorithm is made token accumulative total and changed, and two leak the speed that bucket adds token and all equal committed rate.
4, the method for access rate as claimed in claim 1 supervision is characterized in that, describedly adaptive method is carried out in configuration is: when configuration single-rate token bucket algorithm, leak bucket in dual rate of bottom corresponding configuration, and order:
(1) committed rate of dual rate leakage bucket and peak rate equate, are equal to the committed rate that single-rate is leaked bucket simultaneously;
(2) size of first of dual rate barrel equals first barrel size of single-rate; The size of second bucket of dual rate equals second bucket size that first barrel of single-rate adds single-rate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031366295A CN1293725C (en) | 2003-05-21 | 2003-05-21 | Message inserting rate monitoring method in communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031366295A CN1293725C (en) | 2003-05-21 | 2003-05-21 | Message inserting rate monitoring method in communication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1549515A CN1549515A (en) | 2004-11-24 |
CN1293725C true CN1293725C (en) | 2007-01-03 |
Family
ID=34323402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031366295A Expired - Fee Related CN1293725C (en) | 2003-05-21 | 2003-05-21 | Message inserting rate monitoring method in communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1293725C (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100459589C (en) * | 2006-12-04 | 2009-02-04 | 杭州华三通信技术有限公司 | A method to monitor flow and flow monitoring equipment |
CN103858470A (en) * | 2011-10-14 | 2014-06-11 | 瑞典爱立信有限公司 | Optimised packet delivery across a transport network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002007381A2 (en) * | 2000-07-18 | 2002-01-24 | Alcatel | Domain based congestion management |
WO2002052800A1 (en) * | 2000-12-22 | 2002-07-04 | Nokia Corporation | Flow control in a packet-switched communication network using a leaky bucket algorithm |
US6456593B1 (en) * | 1996-10-23 | 2002-09-24 | Cisco Technology, Inc. | Communicating packetized data over a channel using a dual leaky bucket priority scheme for assigning priorities to ports assigned to channels in a channel bank |
WO2003009541A1 (en) * | 2001-07-20 | 2003-01-30 | Thomson Licensing S.A. | Dynamic traffic bandwidth management system and method for a communication network |
-
2003
- 2003-05-21 CN CNB031366295A patent/CN1293725C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6456593B1 (en) * | 1996-10-23 | 2002-09-24 | Cisco Technology, Inc. | Communicating packetized data over a channel using a dual leaky bucket priority scheme for assigning priorities to ports assigned to channels in a channel bank |
WO2002007381A2 (en) * | 2000-07-18 | 2002-01-24 | Alcatel | Domain based congestion management |
WO2002052800A1 (en) * | 2000-12-22 | 2002-07-04 | Nokia Corporation | Flow control in a packet-switched communication network using a leaky bucket algorithm |
WO2003009541A1 (en) * | 2001-07-20 | 2003-01-30 | Thomson Licensing S.A. | Dynamic traffic bandwidth management system and method for a communication network |
Also Published As
Publication number | Publication date |
---|---|
CN1549515A (en) | 2004-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100384156C (en) | Method for multiplexing residual bandwidth and network equipment | |
CN100384157C (en) | Method for multiplexing residual bandwidth and network equipment | |
EP2803168B1 (en) | Network device control in a software defined network | |
CN102497362B (en) | The network attack trace back method and device of Abnormal network traffic | |
CN101159675B (en) | Method of implementing improvement of user service quality in IP multimedia subsystem | |
CN101478494B (en) | Data packet processing method and apparatus based on token barrel algorithm | |
EP2679048A1 (en) | Method for introducing network congestion predictions in policy decision | |
CN101420461B (en) | Adaptive token barrel marking method based on service sensing | |
CN108282419A (en) | A kind of network flow dispatching method and device | |
CN1588946A (en) | Managing system for providing service quality assuranced on internet and its realizing method | |
CN1293725C (en) | Message inserting rate monitoring method in communication system | |
CN100579059C (en) | Parallel data link layer controllers in the network switching equipment | |
CN101242394B (en) | Method and device for realizing promised access rate | |
CN110291764A (en) | Identify and adjust invalid firewall rule | |
CN102404226A (en) | Method for dispatching absolute priority of data frame based on 802.1 p under Linux system | |
CN1520101A (en) | Method for determining relation between routers at fringe of client site and virtual private network | |
CN107920024A (en) | A kind of SDN controllers dynamic stream table management method | |
WO2001099400A2 (en) | Network charging | |
CN1549496A (en) | Statistical method for internetwork protocol message | |
CN103684881B (en) | Network modeling method and device | |
CN102891810A (en) | Method for dynamically distributing satellite channels by modifying Internet protocol (IP) message header | |
CN107493241A (en) | A kind of token distribution method and device | |
CN1344093A (en) | Business establishing of network processor and business logic executive environment | |
Karamchati et al. | A novel architecture to enhance Quality of Service in IP networks | |
CN105827479A (en) | Flow management platform and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20170921 Address after: Wei Town South Street 056000 Hebei city of Handan province Weixian Weidu No. 800 unit 6 No. 602 Patentee after: Chen Junxi Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Patentee before: Huawei Technologies Co., Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070103 Termination date: 20180521 |