CN1549511A - Flow shaping processing method - Google Patents

Flow shaping processing method Download PDF

Info

Publication number
CN1549511A
CN1549511A CNA03131337XA CN03131337A CN1549511A CN 1549511 A CN1549511 A CN 1549511A CN A03131337X A CNA03131337X A CN A03131337XA CN 03131337 A CN03131337 A CN 03131337A CN 1549511 A CN1549511 A CN 1549511A
Authority
CN
China
Prior art keywords
burst
data message
message
bandwidth
traffic shaping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA03131337XA
Other languages
Chinese (zh)
Other versions
CN100499477C (en
Inventor
Զ����
苏征远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB03131337XA priority Critical patent/CN100499477C/en
Publication of CN1549511A publication Critical patent/CN1549511A/en
Application granted granted Critical
Publication of CN100499477C publication Critical patent/CN100499477C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The method includes the following steps: a) data message is received, b)whether burst is carried on for data message or not is judged and step c) is applied if it is or step d) is applied if it is not; c) bandwidth required for bursting is calculated, d) whether FRTS token is satisfied to requirement of bandwidth or not is judged and step e) is applied if it is or step f) is applied if it is not, e) data message is bursted and transmitted, and f) data message is not transmitted.

Description

A kind of traffic shaping processing method
Technical field
The present invention relates to the communications field, relate in particular to when frame relay burst and frame relay traffic shaping applied in any combination, the processing method of burst occupied bandwidth.
Technical background
VoFR has expanded the application of frame relay, makes the terminal use to carry out different business such as data, voice and fax simultaneously on a lease line, improves bandwidth availability ratio greatly.When the speech data simultaneous interpretation, cause voice delay time to increase for fear of sending big data message, shake tangible phenomenon, introduced the method for data fragmentation.By being split as big data message a plurality of and the sizable small messages of voice, voice and fragment data send at interval, and voice are in time handled, and have avoided the generation of delay variation.
In order to send data traffic with uniform speed to network, frame relay has been introduced the method for traffic shaping (Traffic Shaping), controls the data flows by the mechanism of token bucket in addition.Token bucket algorithm employing token bucket comes the administration queue controller, allows bursty data to exist, and it can also guarantee a kind of long-time interior stable average transmission rate simultaneously.Token bucket algorithm produces token with constant speed, leaks bucket and can keep token.Input data data flow out token bucket after entering bucket with Louing and obtaining token, if do not obtain the just generation of the next token of wait in bucket of token.Each token can transmit a grouping, and data message flows out the corresponding token in bucket back and just disappeared.The speed that produces by the control token like this, the Mean Speed of data that just can the control flows dequeue.By the mechanism of this token bucket, can make Virtual network operator guarantee service for the user provides minimum committed information rate (MinCIR).When network was idle, the user can be with the speed multiplexing bandwidth greater than MinCIR, and when network congestion, operator can guarantee to provide for the user bandwidth of MinCIR.Its schematic diagram is as shown in Figure 1:
Fig. 1 is the processing procedure of traffic shaping, as can be seen from the figure, and during existing traffic shaping is handled, when data message arrives, at first the data message is classified, handle, then data message is sent into traffic shaping queue if data message need carry out traffic shaping.If formation is empty, then enters in the token bucket and handle.If there are enough tokens can be used for sending datagram in the token bucket, then data message can pass through, and can be continued to send.If the token in the token bucket does not satisfy the transmission condition of data message, then data message goes into to get back in the traffic shaping queue; If queue full then data message is dropped.When in the traffic shaping queue data message being arranged, traffic shaping takes out data message by certain cycle and sends from formation, when sending datagram, will all send the data volume of the representative of the token in the traffic shaping token bucket at every turn.
When frame relay burst and traffic shaping applied in any combination,, can take than original higher bandwidth because behind the data data fragmentation, fragment message will add extra heading.After for example the data message of one 1500 byte arrived the frame relay link layer, if do not dispose burst, according to protocol encapsulation form Q.922, the byte that needs to add comprises: 2 byte DLCI heads+2 byte protocol numbers+2 byte FCS, total length was 1506 bytes.If disposed frame relay FRF.12 burst, and the burst size is 30 words, the protocol number (NLPID) that the data message of 1500 bytes adds 2 bytes 1502 bytes altogether must be split as 51, the extra byte that each burst need add comprises: 2 byte DLCI heads+2 byte slotted protocols number+2 byte fragment message heads+2 byte FCS, just each burst will consume 8 bytes.The bandwidth that the data actual needs of such 1500 bytes takies is: the 51*8+1502=1910 byte has increased by 26.8% than 1506 original bytes.And during with the traffic shaping applied in any combination,, can cause flow and the serious deviation of expection after the shaping if do not consider the extra bandwidth that burst takies.
In the existing flow shape technique field, company of Cisco (CISCO) has adopted elder generation that the data message is carried out burst and then has done the method for traffic shaping.The token of the extra heading that all like this bursts take in yet can consumed flow shaping token bucket can not cause the flow rate calculation mistake.This first burst of Cisco is done the method for traffic shaping again, can avoid the inaccurate phenomenon of flow rate calculation, can't successfully send the problem that causes the opposite end to recombinate but occur fragment message easily.The data message of one 1500 byte for example recited above, split into 51 after, need take 1910 bytes.If the current size of traffic shaping token bucket this moment can only send 20 bursts, remaining 31 bursts can only be gone into formation earlier, if formation can't be deposited all 31 data messages, must abandon some fragment message, suppose to have abandoned 50 and 51 two bursts.All the other 49 bursts arrive behind opposite ends owing to can't receive the burst end message all the time like this, so burst can't be recombinated, can only abandon at last, and these 49 bursts can be thought " rubbish message ", have taken meaningless bandwidth.So must " complete send out full the receipts " at frame relay burst reorganization, any one burst abandon the disabled characteristics that all can cause whole group.
Summary of the invention
Purpose of the present invention is exactly to do at first burst in the above-mentioned prior art to occur fragment message easily in the method for traffic shaping and can't successfully send again, and the problem that causes the opposite end to recombinate proposes the method that a kind of first burst is done traffic shaping again.
A kind of traffic shaping processing method is characterized in that may further comprise the steps:
A, receiving data packets;
B, judge whether and need carry out burst the data message, if, enter step c, if not, enter steps d;
The bandwidth that c, calculating burst need enters steps d;
D, judge whether the FRTS token meets the demand of bandwidth, if, enter step e, if not, enter step f;
E, with the data message burst and send;
F, data message is not sent processing.
The step of the bandwidth that described calculating burst needs, calculate by following formula:
Total byte behind the burst=(forward rounds (fragmented message length/burst size)) * (fragment message head length degree+slotted protocol byte+frame relay heading+frame relay FCS byte)+fragmented message length.
Described step f is that data message is abandoned.
Described step f is that data message is gone into formation again, returns steps d.
Owing to adopted traffic shaping processing method of the present invention, can avoid fragment message all to send, the problem that causes receiving terminal correctly not recombinate.Simultaneously, because the bandwidth that accurate calculating burst need consume is avoided traffic statistics problem less than normal.
Description of drawings
Fig. 1 is a traffic shaping processing procedure schematic diagram in the prior art;
Fig. 2 is a sliced bandwidth computing flow chart of the present invention;
Fig. 3 is another sliced bandwidth computing flow chart of the present invention.
Embodiment
Below in conjunction with Figure of description the specific embodiment of the present invention is described.
The advantage that elder generation's traffic shaping is done the data message stripping strategy again is: processing represents that promptly transmitting terminal has enough bandwidth to guarantee the transmission of data message if data message has passed through shaping, data message is done burst at this moment again and is handled, just can guarantee that all bursts can both send at transmitting terminal, avoid the generation of " rubbish message ".Here the problem that will solve is: owing to will consume more bandwidth behind the burst, how during at burst not this part extra bandwidth is counted accurately, avoid surpassing target flow.
Shown in Fig. 2 and 3, it is the flow chart that adopts traffic shaping processing method of the present invention, as can be seen from the figure, the method that the present invention adopts is, when data message process traffic shaping, when calculating the token number that needs consumption, judge that according to the slotted protocol type, the extra bandwidth that need consume burst counts in advance if need the data message of burst, if token enough data message can send, otherwise go into formation or abandon.The bandwidth calculation of data message, traffic shaping, burst unification are all finished by router.
In view of the above, traffic shaping processing method of the present invention may further comprise the steps:
A, receiving data packets;
Receive data message earlier from the upper strata.
B, judge whether and need carry out burst the data message, if, enter step c, if not, enter steps d;
This step will judge earlier whether the data message that receives among this step a needs to carry out burst, according to design philosophy of the present invention, carries out burst if desired, the step that then enters the computation bandwidth of back, otherwise directly this data message is entered token bucket.
The bandwidth that c, calculating burst need enters steps d;
This is a key point place of the present invention, and promptly the extra bandwidth that need consume burst in advance counts.In the present invention, adopt following bandwidth calculation method:
Total byte behind the burst=(forward rounds (fragmented message length/burst size)) * (fragment message head length degree+slotted protocol byte+frame relay heading+frame relay FCS byte)+fragmented message length.
Like this, just can guarantee that all bursts can both send at transmitting terminal, avoid the generation of " rubbish message ".
D, judge whether the FRTS token meets the demand of bandwidth, if, enter step e, if not, enter step f;
The FRTS frame relay traffic shaping is to control the data flows by the method for token bucket, and token can be understood as the ability that data send.The present invention is not specifically limited the token mechanism that adopts.
E, with the data message burst and send;
F, data message is not sent processing.
Wherein, do not send processing among the step f, can comprise following situation:
1, data message is abandoned;
This is actually the transmission flow of the data message that is through with, and this is comparatively common a kind of processing mode during message sends, and usually adopts when the data message generation is congested.
2, data message is gone into formation again, return steps d.
This mode is that a postponement that sends message is sent, and the data message that can't normally send at present is included into formation again, waits for when Internet resources allow that resend, this also is a kind of comparatively common mode again.
Below we see an object lesson that adopts traffic shaping processing method of the present invention:
If disposed the FRF.12 burst, the burst size is 50 bytes, and then the total bandwidth of the fragmented message needs of 800 bytes is,
Total byte behind the burst=
Forward rounds (800/50) * (2+2+2+2)+800=16*8+800=928
The concrete length of above fragment message head length degree and slotted protocol byte is with reference to the definition of each agreement.
The present invention can avoid fragment message all to send, the problem that causes receiving terminal correctly not recombinate in the process that data message sends by the strength reshaping treatment method of above narration.Simultaneously, because the bandwidth that accurate calculating burst need consume can avoid traffic statistics less than normal.Because the method for frame relay bandwidth accurate Calculation is used to control local terminal router transmission rate, do not have the inter-communicating problem between the different vendor, so other routers adopts this algorithm also can realize corresponding function.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.

Claims (4)

1, a kind of traffic shaping processing method is characterized in that may further comprise the steps:
A, receiving data packets;
B, judge whether and need carry out burst the data message, if, enter step c, if not, advance
Go into steps d;
The bandwidth that c, calculating burst need enters steps d;
D, judge whether the FRTS token meets the demand of bandwidth, if, enter step e, if not, advance
Go into step f;
E, with the data message burst and send;
F, data message is not sent processing.
2, traffic shaping processing method as claimed in claim 1 is characterized in that the step of the bandwidth of described calculating burst needs, calculates by following formula:
Total byte behind the burst=(forward rounds (fragmented message length/burst size)) * (fragment message head length degree+slotted protocol byte+frame relay heading+frame relay frame verification and byte)+fragmented message length.
3, traffic shaping processing method as claimed in claim 2 is characterized in that described step f, is that data message is abandoned.
4, traffic shaping processing method as claimed in claim 2 is characterized in that described step f, is that data message is gone into formation again, returns steps d.
CNB03131337XA 2003-05-13 2003-05-13 Flow shaping processing method Expired - Fee Related CN100499477C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB03131337XA CN100499477C (en) 2003-05-13 2003-05-13 Flow shaping processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB03131337XA CN100499477C (en) 2003-05-13 2003-05-13 Flow shaping processing method

Publications (2)

Publication Number Publication Date
CN1549511A true CN1549511A (en) 2004-11-24
CN100499477C CN100499477C (en) 2009-06-10

Family

ID=34322840

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB03131337XA Expired - Fee Related CN100499477C (en) 2003-05-13 2003-05-13 Flow shaping processing method

Country Status (1)

Country Link
CN (1) CN100499477C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119492B (en) * 2007-08-20 2011-03-16 武汉烽火网络有限责任公司 Jitter restriction based data cache reshaping method
CN102271086A (en) * 2011-07-25 2011-12-07 华为技术有限公司 Data transmission method and device
CN103780907A (en) * 2014-01-27 2014-05-07 浙江宇视科技有限公司 Method and device for video data flow shaping

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119492B (en) * 2007-08-20 2011-03-16 武汉烽火网络有限责任公司 Jitter restriction based data cache reshaping method
CN102271086A (en) * 2011-07-25 2011-12-07 华为技术有限公司 Data transmission method and device
US9225654B2 (en) 2011-07-25 2015-12-29 Huawei Technologies Co., Ltd. Method and apparatus for sending packet
CN103780907A (en) * 2014-01-27 2014-05-07 浙江宇视科技有限公司 Method and device for video data flow shaping
CN103780907B (en) * 2014-01-27 2018-01-16 浙江宇视科技有限公司 A kind of method and apparatus of video data flow shaping

Also Published As

Publication number Publication date
CN100499477C (en) 2009-06-10

Similar Documents

Publication Publication Date Title
US6694471B1 (en) System and method for periodic retransmission of messages
US8027344B2 (en) Transmission of data packets of different priority levels using pre-emption
CN1778079B (en) Methods and devices for the coordination of flow control between a TCP/IP network and other networks
JP3321043B2 (en) Data terminal in TCP network
CN107979449B (en) Data transmission method and device
US8509080B2 (en) Network traffic accelerator
CN100534069C (en) Accelerating method for asymmetric and multi-concurrency network
CN1926816A (en) Communication quality management method and apparatus
CN101080914A (en) Method, system and article for improved network performance by avoiding data corruption
CN1842052A (en) Data transmission method for wireless link control layer
US7321557B1 (en) Dynamic latency assignment methodology for bandwidth optimization of packet flows
CN1248465C (en) Management method of data fransmission/receiving butter region in network communication
CN1633796A (en) Modifications to TCP/IP for broadcast or wireless networks
CN1152313C (en) Section-by-section congestion control method based on random early detection
CN1194509C (en) Method for controlling message transmitting spped rate in router interface
CN1549511A (en) Flow shaping processing method
EP2002609B1 (en) Method and termination node for bundling multiple messages into a packet
US7633947B2 (en) Method and apparatus for performing active packet bundling in a Voice over-IP communications system based on source location in talk spurts
CN115695582A (en) Low-delay transmission control method, receiving terminal and transmitting terminal
CN1719801A (en) Method for improving connecting performance of multi-non-connecting layer in wireless network
CN1901519A (en) Optimizing system and method for medium transmission on different transmission channels
CN113038530A (en) High-efficiency transmission method for packet service of QoS guarantee of satellite mobile communication system
US7088738B1 (en) Dynamic fragmentation of information
KR101040780B1 (en) ??????? based Real-time Multimedia Data Transmission for QoS enhancement
CN1630270A (en) Method for dynamically adjusting data packet length based on network service quality

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090610

Termination date: 20160513