WO2014134958A1 - 一种流量监管的方法及装置 - Google Patents

一种流量监管的方法及装置 Download PDF

Info

Publication number
WO2014134958A1
WO2014134958A1 PCT/CN2013/090579 CN2013090579W WO2014134958A1 WO 2014134958 A1 WO2014134958 A1 WO 2014134958A1 CN 2013090579 W CN2013090579 W CN 2013090579W WO 2014134958 A1 WO2014134958 A1 WO 2014134958A1
Authority
WO
WIPO (PCT)
Prior art keywords
token
token bucket
tokens
data packet
traffic
Prior art date
Application number
PCT/CN2013/090579
Other languages
English (en)
French (fr)
Inventor
胡学权
杨倩
周一新
周干民
王春雷
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014134958A1 publication Critical patent/WO2014134958A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/22Traffic shaping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/215Flow control; Congestion control using token-bucket

Definitions

  • the present invention relates to traffic policing techniques in the field of network communications, and in particular, to a method and apparatus for traffic policing. Background technique
  • the total bandwidth of the transmission is limited, and a certain bandwidth needs to be agreed with each user in advance.
  • the excess data needs to be discarded to prevent the user data from occupying the bandwidth of other users.
  • the token bucket algorithm is an important method to implement traffic policing.
  • the token bucket algorithm is: Adding a token to a token bucket at a certain rate. Token; When the packet arrives at the supervisory device, the packet length is compared with the token. If the token is greater than or equal to the packet length, the packet is allowed to pass; otherwise, the packet is prohibited from passing.
  • the token in the token bucket when the input traffic is greater than the supervisory traffic, the token in the token bucket usually maintains a low level, so the probability that the short packet entering the supervisory device is allowed to pass is greater than the long data. The probability of passing the package causes regulatory defects.
  • the purpose of the embodiments of the present invention is to provide a method and a device for monitoring traffic, which can ensure that when the data input amount is greater than the supervisory traffic, the probability of passing packets of different lengths is equal, thereby ensuring the QoS of the data transmission.
  • the embodiment of the invention provides a method for traffic policing, the method comprising:
  • the packet When receiving a data packet, if it is determined that the number of remaining tokens in the token bucket is not less than the maximum package of the system Long, the packet is sent to the destination address.
  • the method before the receiving the data packet, the method further includes: generating a token corresponding to the traffic according to the supervised traffic set by the user, and adding the token to the token bucket.
  • the method further includes: detecting the number of remaining tokens in the token bucket in real time, and when the number of remaining tokens is greater than a threshold, Discard the excess token.
  • the method further includes: updating the remaining token in the token bucket.
  • the updating the remaining tokens in the token bucket includes: subtracting the remaining tokens in the current token bucket by the same number of tokens as the currently sent data packet, to obtain the updated remaining tokens. .
  • the embodiment of the invention further provides a device for traffic supervision, the device comprising: a discriminating module and a token bucket; wherein
  • the discriminating module is configured to: when the data packet is received, if it is determined that the number of remaining tokens in the token bucket is not less than the maximum packet length of the system, the data packet is sent to the destination address;
  • a token bucket configured to provide a residual token for the discriminating module.
  • the device further includes: a token generator configured to generate a token corresponding to the traffic according to the monitored traffic set by the user, and add the token to the token bucket;
  • the token bucket is configured to receive and save a token sent by the token generator.
  • the device further includes: a burst bandwidth detecting module, configured to detect the number of remaining tokens in the token bucket in real time, and notify the token bucket when the number of remaining tokens is greater than a threshold value Discard tokens that exceed the threshold;
  • the token bucket is configured to receive a token sent by the burst bandwidth detection module and discarding the threshold exceeding the threshold.
  • the device further includes: a token update module, configured to update a remaining token in the token bucket;
  • the token bucket is configured to update itself according to the control of the token update module. Remaining token.
  • the token update module is configured to acquire, from the discriminating module, the length of the currently sent data packet, and notify the token bucket to subtract the same number of tokens as the currently transmitted data packet; correspondingly, the The token bucket is configured to subtract the same number of tokens as the currently transmitted data packet according to the notification of the token update module, and obtain the updated remaining token.
  • the method and device for monitoring traffic compares the number of remaining tokens in the token bucket with the maximum packet length of the system when receiving the data packet, if the remaining token is not less than the maximum packet length of the system , then send the packet.
  • the correlation between the packet length and the supervision result is removed, so that the probability of passing the data packet is independent of the data packet length, and is only related to the total traffic of the data packet, ensuring that the transmission control of the data packet is not affected by the length of the data packet.
  • FIG. 1 is a schematic flowchart of a method for traffic policing according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a device for monitoring traffic according to an embodiment of the present invention.
  • Figure 3 is a schematic diagram of the regulatory flow rate
  • FIG. 4 is a schematic diagram of traffic passing through a device for traffic policing according to an embodiment of the present invention. detailed description
  • the basic idea of the embodiment of the present invention is: When receiving a data packet, if it is determined that the number of remaining tokens in the token bucket is not less than the maximum packet length of the system, the data packet is sent to the destination address.
  • the method for traffic policing in the embodiment of the present invention includes the following steps:
  • Step 101 When receiving the data packet, determine whether the number of remaining tokens in the token bucket is not less than the maximum packet length of the system, and if yes, perform step 102; otherwise, discard the data packet, and end the processing flow.
  • the receiving the data packet further includes: simultaneously acquiring the length of the received data packet;
  • the length of the received data packet is obtained in the prior art, and may be extracted from a corresponding length field in the data packet, and details are not described herein.
  • the method before performing step 101, the method further includes: generating a token corresponding to the traffic according to the supervised traffic set by the user, adding the token to the token bucket; detecting the number of remaining tokens in the token bucket in real time, when When the number of remaining tokens is greater than the threshold, the excess token is discarded to prevent excessive accumulated tokens.
  • the burst traffic is too large, causing a large impact on the network.
  • the threshold value is a preset value according to actual conditions.
  • the maximum packet length of the system is a parameter obtained from the management device of the system in the prior art, and is not described here.
  • Step 102 Send the data packet to a destination address.
  • the sending to the destination address is a prior art, and the data packet may be sent to the next-level network device according to the destination address in the data packet, and details are not described herein.
  • the method further includes: updating the remaining tokens in the token bucket; specifically: subtracting the remaining tokens in the current token bucket from the currently sent data packets. The same number of tokens in length, resulting in the updated remaining token.
  • the token in the token bucket may also be updated according to the prior art.
  • the token may be added to the token bucket periodically.
  • the device for traffic policing includes: a discriminating module 21 and a token bucket 22;
  • the discriminating module 21 is configured to: when the data packet is received, if it is determined that the number of remaining tokens in the token bucket 22 is not less than the maximum packet length of the system, the data packet is sent to the destination address;
  • the token bucket 22 is configured to provide the discriminating module 21 with a remaining token.
  • the discriminating module 21 is configured to: when receiving the data packet, obtain the length of the received data packet; wherein the length of the received data packet is obtained in the prior art, and may be from a corresponding length field in the data packet. Extracted in, do not repeat here.
  • the apparatus further includes: a token generator 23 configured to generate a regulatory flow rate according to a user A token corresponding to the traffic is added to the token bucket 22; correspondingly, the token bucket 22 is configured to receive and save the token sent by the token generator 23.
  • a token generator 23 configured to generate a regulatory flow rate according to a user A token corresponding to the traffic is added to the token bucket 22; correspondingly, the token bucket 22 is configured to receive and save the token sent by the token generator 23.
  • the device further includes: a burst bandwidth detecting module 24 configured to detect the number of remaining tokens in the token bucket 22 in real time, and notify the token bucket 22 when the number of remaining tokens is greater than a threshold value.
  • the token bucket 22 is configured to receive the token sent by the burst bandwidth detecting module 24 and discarding the threshold exceeding the threshold.
  • the device further includes: a token update module 25 configured to update the remaining tokens in the token bucket 22; correspondingly, the token bucket 22 is configured to update the remaining saved by the token update module 25 according to the control Token.
  • the token update module 25 is configured to acquire the length of the currently sent data packet from the discriminating module, and notify the token bucket 22 to subtract the same number of tokens as the currently transmitted data packet; correspondingly, the token The bucket 22 is configured to subtract the same number of tokens as the currently transmitted data packet according to the notification of the token update module 25 to obtain the updated remaining token.
  • Figure 3 shows the supervised method of comparing the token with the actual packet length during the supervision to determine whether the packet passes or not, respectively sending a 10 Mbps 100-byte fixed-length data stream and a 500-byte fixed-length data stream at a regulatory rate from 0. When the 20Mbps changes, the two data streams pass.
  • Figure 4 shows the supervised method of comparing the maximum packet length of the token with the maximum packet length of the system to determine whether the packet passes or not.
  • the 10 Mbps 100-byte fixed-length data stream and the 500-byte fixed-length data stream are respectively transmitted at the regulatory rate. When the data flow changes from 0 to 20 Mbps, the two data streams pass.
  • the present invention has almost the same discarding probability for different packet lengths, whereas in the conventional method, when the supervisory traffic is smaller than the actual packet traffic, the short packet has an absolute priority.
  • the discriminating module 21 and the burst bandwidth detecting module 24 in the above solution may be implemented by hardware such as a CPU or an ASIC; the token bucket 22 may be implemented by a CPU and a memory; the token generator 23 and the token updating module 25 may be implemented by a CPU. And memory implementation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种流量监管的方法及装置,包括:当收到数据包时,若确定令牌桶中的剩余令牌的数量不小于系统最大包长,则将所述数据包发送至目的地址。

Description

一种流量监管的方法及装置 技术领域
本发明涉及网络通信领域的流量监管技术, 尤其涉及一种流量监管的方法 及装置。 背景技术
在通讯系统中,传输的总带宽有限, 需要预先与每个用户协定一定的带宽, 当用户发送的数据大于协定的带宽时, 需要将多余的数据丟弃, 防止该用户数 据挤占其他用户的带宽, 保证其他用户的合法流量, 因此, 在网络入口处对用 户的流量进行限制, 以保证网络的正常运行是非常必要的。
目前, 流量监管是提高传输服务质量(QoS, Quality of Service ) 重要手段 之一, 令牌桶算法是实现流量监管的重要方法; 所述令牌桶算法为: 向令牌桶 中按一定速率添加令牌; 当数据包到达监管装置时, 将数据包长度与令牌进行 比较, 如果令牌大于等于数据包长度, 则允许数据包通过; 否则, 禁止数据包 通过。 但是, 使用上述令牌桶算法进行流量监管时, 在输入流量大于监管流量 时, 令牌桶中令牌通常会维持一个低的水平, 因而进入监管装置的短数据包允 许通过的概率大于长数据包的通过概率, 造成监管缺陷。
可见,现有技术中流量监管的装置无法保证当数据输入量大于监管流量时, 不同长度的数据包的通过概率平等, 从而无法保证数据传输的 QoS。 发明内容
有鉴于此, 本发明实施例的目的在于提供一种流量监控的方法及装置, 能 保证当数据输入量大于监管流量时, 不同长度的数据包的通过概率平等, 进而 保证数据传输的 QoS。
本发明实施例提供了一种流量监管的方法, 该方法包括:
当收到数据包时,若确定令牌桶中的剩余令牌的数量不小于系统最大包 长, 则将所述数据包发送至目的地址。
上述方案中, 所述当收到数据包之前, 该方法还包括: 根据用户设定的 监管流量产生与流量相当的令牌, 将令牌添加到令牌桶。
上述方案中, 所述将令牌添加到令牌桶之后, 该方法还包括: 实时检测 所述令牌桶中的剩余令牌的数量, 当所述剩余令牌数量大于门限值时, 丟弃 超出的令牌。
上述方案中, 所述将所述数据包发送至目的地址之后, 该方法还包括: 更新令牌桶中的剩余令牌。
上述方案中, 所述更新令牌桶中的剩余令牌, 包括: 将当前令牌桶中剩 余令牌减去与当前发送的数据包的长度相同数量的令牌,得到更新后的剩余 令牌。
本发明实施例还提供了一种流量监管的装置, 该装置包括: 判别模块和 令牌桶; 其中,
判别模块, 配置为当收到数据包时, 若确定令牌桶中的剩余令牌的数量 不小于系统最大包长, 则将所述数据包发送至目的地址;
令牌桶, 配置为为判别模块提供剩余令牌。
上述方案中, 所述装置还包括: 令牌发生器, 配置为根据用户设定的监 管流量产生与流量相当的令牌, 添加到令牌桶;
相应的, 所述令牌桶, 配置为接收并保存令牌发生器发来的令牌。 上述方案中, 所述装置还包括: 突发带宽检测模块, 配置为实时检测令 牌桶中的剩余令牌的数量, 当所述剩余令牌数量大于门限值时, 通知所述令 牌桶丟弃超出门限值的令牌;
相应的, 所述令牌桶, 配置为接收突发带宽检测模块发来的丟弃超出门 限值的令牌。
上述方案中, 所述装置还包括: 令牌更新模块, 配置为更新令牌桶中的 剩余令牌;
相应的, 所述令牌桶, 配置为根据令牌更新模块的控制更新自身保存的 剩余令牌。
上述方案中, 所述令牌更新模块, 配置为从判别模块获取当前发送的数 据包的长度, 通知令牌桶减去与当前发送的数据包的长度相同数量的令牌; 相应的, 所述令牌桶, 配置为根据令牌更新模块的通知, 减去与当前发 送的数据包的长度相同数量的令牌, 得到更新后的剩余令牌。
本发明实施例所提供的流量监控的方法及装置, 在收到数据包时, 比较令 牌桶中的剩余令牌的数量与系统最大包长的大小, 若剩余令牌不小于系统最 大包长, 则发送数据包。 如此, 将包长与监管结果之间的相关度去除, 从而使 数据包通过的概率与数据包长度无关, 只与数据包总流量有关, 保证数据包的 发送控制不受数据包的长度的影响, 这样, 就能够最大程度的保证当数据输入 量大于监管流量时, 不同长度的数据包的通过概率平等, 进而保证数据传输的
QoS。 附图说明
图 1为本发明实施例流量监管的方法流程示意图;
图 2为本发明实施例流量监管的装置组成结构示意图;
图 3为监管通过流量示意图;
图 4为本发明实施例流量监管的装置中通过流量的示意图。 具体实施方式
本发明实施例的基本思想是: 当收到数据包时, 若确定令牌桶中的剩余 令牌的数量不小于系统最大包长, 则将所述数据包发送至目的地址。
本发明实施例流量监管的方法, 如图 1所示, 包括以下步驟:
步驟 101 : 当收到数据包时, 判断令牌桶中的剩余令牌的数量是否不小 于系统最大包长, 若是, 则执行步驟 102; 否则, 丟弃所述数据包, 结束处 理流程。
这里, 所述当收到数据包时还包括: 同时获取接收到的数据包的长度; 其中, 所述获取接收到的数据包的长度为现有技术, 可以从数据包中对应的 长度字段中提取, 这里不做赘述。
优选地, 执行步驟 101之前还包括: 根据用户设定的监管流量产生与流 量相当的令牌, 将令牌添加到令牌桶; 实时检测所述令牌桶中的剩余令牌的 数量, 当所述剩余令牌数量大于门限值时, 丟弃超出的令牌, 以防止累积令 牌过多, 当有突发数据到达时, 突发的流量太大, 对网络造成较大沖击。
其中, 所述根据用户设定的监管流量产生与流量相当的令牌为现有技 术, 这里不做赘述; 所述门限值为根据实际情况预置的数值。
所述系统最大包长为现有技术规定从所在系统的管理设备中获取的参 数, 这里不做赘述。
步驟 102: 将所述数据包发送至目的地址。
这里, 所述发送至目的地址为现有技术, 可以为根据数据包中的目的地 址发送数据包至下一级网络设备, 这里不做赘述。
另外, 执行所述步驟 102的同时、 或完成步驟 102后, 还包括: 更新令 牌桶中的剩余令牌; 具体为: 将当前令牌桶中剩余令牌减去与当前发送的数 据包的长度相同数量的令牌, 得到更新后的剩余令牌。
优选地, 步驟 102完成后, 还可以按照现有技术更新令牌桶中的令牌, 比如, 可以为周期性的向令牌桶中添加令牌。
本发明实施例流量监管的装置, 如图 2所示, 包括: 判别模块 21和令 牌桶 22; 其中,
判别模块 21 , 配置为当收到数据包时, 若确定令牌桶 22中的剩余令牌 的数量不小于系统最大包长, 则将所述数据包发送至目的地址;
令牌桶 22 , 配置为为判别模块 21提供剩余令牌。
所述判别模块 21 , 配置为当收到数据包时, 获取接收到的数据包的长 度; 其中, 所述获取接收到的数据包的长度为现有技术, 可以从数据包中对 应的长度字段中提取, 这里不做赘述。
所述装置还包括: 令牌发生器 23 , 配置为根据用户设定的监管流量产 生与流量相当的令牌, 添加到令牌桶 22; 相应的, 所述令牌桶 22 , 配置为 接收并保存令牌发生器 23发来的令牌。
所述装置还包括: 突发带宽检测模块 24, 配置为实时检测令牌桶 22中 的剩余令牌的数量, 当所述剩余令牌数量大于门限值时, 通知所述令牌桶 22丟弃超出门限值的令牌; 相应的, 所述令牌桶 22 , 配置为接收突发带宽 检测模块 24发来的丟弃超出门限值的令牌。
所述装置还包括: 令牌更新模块 25 , 配置为更新令牌桶 22中的剩余令 牌; 相应的, 所述令牌桶 22 , 配置为根据令牌更新模块 25的控制更新自身 保存的剩余令牌。
所述令牌更新模块 25 , 配置为从判别模块获取当前发送的数据包的长 度, 通知令牌桶 22减去与当前发送的数据包的长度相同数量的令牌; 相应 的, 所述令牌桶 22 , 配置为根据令牌更新模块 25的通知, 减去与当前发送 的数据包的长度相同数量的令牌, 得到更新后的剩余令牌。
图 3 为在监管时将令牌与实际包长比较判断数据包是否通过的监管方 法下, 分别发送 10Mbps 100字节固定长的数据流和 500字节固定长的数据 流, 在监管速率从 0到 20Mbps变化时, 两种数据流通过的情况。
图 4 为在监管时将令牌与系统最大包长比较来判断数据包是否通过的 监管方法下, 分别发送 10Mbps 100字节固定长的数据流和 500字节固定长 的数据流, 在监管速率从 0到 20Mbps变化时, 两种数据流通过的情况。
从图 3和图 4对比可以看出,本发明对不同包长的监管丟弃概率几乎相 等, 而传统方法在监管流量小于实际发包流量时, 短包有绝对的优先级。
上述方案中的判别模块 21、 突发带宽检测模块 24可以由 CPU或 ASIC 等硬件实现; 所述令牌桶 22可以由 CPU及存储器实现; 令牌发生器 23及 令牌更新模块 25可以由 CPU及存储器实现。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保护 范围。

Claims

权利要求书
1、 一种流量监管的方法, 所述方法包括:
当收到数据包时,若确定令牌桶中的剩余令牌的数量不小于系统最大包 长, 则将所述数据包发送至目的地址。
2、 根据权利要求 1所述的方法, 其中, 所述当收到数据包之前, 该方法 还包括: 根据用户设定的监管流量产生与流量相当的令牌, 将令牌添加到令 牌桶。
3、 根据权利要求 2所述的方法, 其中, 所述将令牌添加到令牌桶之后, 该方法还包括: 实时检测所述令牌桶中的剩余令牌的数量, 当所述剩余令牌 数量大于门限值时, 丟弃超出的令牌。
4、 根据权利要求 1所述的方法, 其中, 所述将所述数据包发送至目的 地址之后, 该方法还包括: 更新令牌桶中的剩余令牌。
5、 根据权利要求 4所述的方法, 其中, 所述更新令牌桶中的剩余令牌, 包括:将当前令牌桶中剩余令牌减去与当前发送的数据包的长度相同数量的 令牌, 得到更新后的剩余令牌。
6、 一种流量监管的装置, 所述装置包括: 判别模块和令牌桶; 其中, 判别模块, 配置为当收到数据包时, 若确定令牌桶中的剩余令牌的数量 不小于系统最大包长, 则将所述数据包发送至目的地址;
令牌桶, 配置为为判别模块提供剩余令牌。
7、 根据权利要求 6所述的装置, 其中, 所述装置还包括: 令牌发生器, 配置为根据用户设定的监管流量产生与流量相当的令牌, 添加到令牌桶; 相应的, 所述令牌桶, 配置为接收并保存令牌发生器发来的令牌。
8、 根据权利要求 7所述的装置, 其中, 所述装置还包括: 突发带宽检 测模块, 配置为实时检测令牌桶中的剩余令牌的数量, 当所述剩余令牌数量 大于门限值时, 通知所述令牌桶丟弃超出门限值的令牌;
相应的, 所述令牌桶, 配置为接收突发带宽检测模块发来的丟弃超出门 限值的令牌。
9、 根据权利要求 8所述的装置, 其中, 所述装置还包括: 令牌更新模 块, 配置为更新令牌桶中的剩余令牌;
相应的, 所述令牌桶, 配置为根据令牌更新模块的控制更新自身保存的 剩余令牌。
10、 根据权利要求 6所述的装置, 其中, 所述令牌更新模块, 配置为从判 别模块获取当前发送的数据包的长度,通知令牌桶减去与当前发送的数据包 的长度相同数量的令牌;
相应的, 所述令牌桶, 配置为根据令牌更新模块的通知, 减去与当前发 送的数据包的长度相同数量的令牌, 得到更新后的剩余令牌。
PCT/CN2013/090579 2013-03-08 2013-12-26 一种流量监管的方法及装置 WO2014134958A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310075880.4 2013-03-08
CN201310075880.4A CN104038434A (zh) 2013-03-08 2013-03-08 一种流量监管的方法及装置

Publications (1)

Publication Number Publication Date
WO2014134958A1 true WO2014134958A1 (zh) 2014-09-12

Family

ID=51469026

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/090579 WO2014134958A1 (zh) 2013-03-08 2013-12-26 一种流量监管的方法及装置

Country Status (2)

Country Link
CN (1) CN104038434A (zh)
WO (1) WO2014134958A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116266824A (zh) * 2021-12-17 2023-06-20 慧与发展有限责任合伙企业 具有主动队列管理的令牌桶

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083062A (zh) * 2019-12-17 2020-04-28 深圳前海环融联易信息科技服务有限公司 基于权重机制的限流方法、装置、计算机设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021773A2 (en) * 2000-09-08 2002-03-14 Netscreen Technologies, Inc. Guaranteed bandwidth sharing in a traffic shaping system
CN1536815A (zh) * 2003-04-03 2004-10-13 华为技术有限公司 采用令牌漏桶进行报文限流的方法
CN1835447A (zh) * 2005-03-16 2006-09-20 华为技术有限公司 一种数据流量约束控制的实现方法
CN1964326A (zh) * 2006-12-04 2007-05-16 杭州华为三康技术有限公司 流量监管方法及流量监管设备

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100512207C (zh) * 2004-12-10 2009-07-08 华为技术有限公司 一种流量控制方法
US8743693B2 (en) * 2005-09-30 2014-06-03 Alcatel Lucent Method for dynamically adjusting token bucket sizes
JP5497541B2 (ja) * 2010-06-04 2014-05-21 株式会社メガチップス 通信制御装置およびシェイピング装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021773A2 (en) * 2000-09-08 2002-03-14 Netscreen Technologies, Inc. Guaranteed bandwidth sharing in a traffic shaping system
CN1536815A (zh) * 2003-04-03 2004-10-13 华为技术有限公司 采用令牌漏桶进行报文限流的方法
CN1835447A (zh) * 2005-03-16 2006-09-20 华为技术有限公司 一种数据流量约束控制的实现方法
CN1964326A (zh) * 2006-12-04 2007-05-16 杭州华为三康技术有限公司 流量监管方法及流量监管设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116266824A (zh) * 2021-12-17 2023-06-20 慧与发展有限责任合伙企业 具有主动队列管理的令牌桶

Also Published As

Publication number Publication date
CN104038434A (zh) 2014-09-10

Similar Documents

Publication Publication Date Title
US9860147B2 (en) Method and device for generating CNM
US10135740B2 (en) Method and apparatus for limiting rate by means of token bucket, and computer storage medium
US10129115B2 (en) Method and system for network monitoring using signature packets
US8989002B2 (en) System and method for controlling threshold testing within a network
US9306858B2 (en) Network apparatus, communication system, abnormal traffic detection method, and program
US20150172198A1 (en) Methods and network device for oversubscription handling
RU2009144127A (ru) Управление качеством обслуживания на основе контроля состояния потока без сигнализации пользователя
CN105357137B (zh) 报文过滤方法及所适用的fpga、智能变电站
WO2013182137A1 (zh) 一种吞吐量测试的方法及装置
US7953007B2 (en) Excessive flow detection device, excessive flow detection circuit, terminal apparatus and network node
US20150236955A1 (en) Congestion Notification in a Network
CN106034131A (zh) 一种基于流Flow分析的业务合规检测方法和系统
US20220263761A1 (en) Systems and Methods for Adapting a WAN Egress Shaper Rate
US20150195209A1 (en) Congestion Notification in a Network
US20090238211A1 (en) Method, system and computer program product involving congestion detection in ethernet
WO2014134958A1 (zh) 一种流量监管的方法及装置
WO2012071851A1 (zh) 根据网络抖动调整bfd发送间隔的方法及装置
JP2009296304A (ja) Tcp通信品質推定方法およびtcp通信品質推定装置
JP4282556B2 (ja) フローレベル通信品質管理装置と方法およびプログラム
RU2728948C1 (ru) Способ скорейшего обнаружения момента возникновения перегрузки пуассоновского IP телетрафика
WO2013097421A1 (zh) 序号检测消息的发送方法及装置
JP2005110038A (ja) 輻輳検知装置、tcpトラヒックの輻輳検知方法およびプログラム
KR101049289B1 (ko) 비동기 전송 시스템에서의 전송속도 제어 장치 및 그 방법
CN118138375A (zh) 一种用于检测网络入侵的网络遥测方法及系统
Kumar et al. Identification of Packet Losses in TCP Over Wired & Wireless Networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13877344

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13877344

Country of ref document: EP

Kind code of ref document: A1