CN100403747C - Method for controlling data flux - Google Patents

Method for controlling data flux Download PDF

Info

Publication number
CN100403747C
CN100403747C CNB2003101092873A CN200310109287A CN100403747C CN 100403747 C CN100403747 C CN 100403747C CN B2003101092873 A CNB2003101092873 A CN B2003101092873A CN 200310109287 A CN200310109287 A CN 200310109287A CN 100403747 C CN100403747 C CN 100403747C
Authority
CN
China
Prior art keywords
data
buffer
threshold
occupancy volume
data flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB2003101092873A
Other languages
Chinese (zh)
Other versions
CN1627745A (en
Inventor
梁宗闯
晁华
吕玲
桂洛宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Shanghai Bell Co Ltd
Original Assignee
Alcatel Lucent Shanghai Bell Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent Shanghai Bell Co Ltd filed Critical Alcatel Lucent Shanghai Bell Co Ltd
Priority to CNB2003101092873A priority Critical patent/CN100403747C/en
Publication of CN1627745A publication Critical patent/CN1627745A/en
Application granted granted Critical
Publication of CN100403747C publication Critical patent/CN100403747C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The present invention provides a method of controlling data flux for new data transmission or exchange. The present invention can effectively maintain the transmission and the exchange of data, reduce the possibility of the interrupt state of a system, and effectively decrease the transmission delay of the system. The present invention mainly comprises: judging a current state of the occupied quantity of a buffer; limiting the flux of current data according to a first control algorithm when the occupied quantity of the buffer exceeds specified upper limit; limiting the flux of the current data as zero when the occupied quantity of the buffer exceeds the highest specified upper limit; making no limit to the flux of the current data when the occupied quantity of the buffer is below the lowest specified lower limit; limiting the flux of the current data according to a second control algorithm when the occupied quantity of the buffer is lower than specified lower limit but higher than the lowest specified lower limit.

Description

Data flow control method
Technical field
The present invention relates to the data flow control method in a kind of transfer of data or the exchange, be specifically related to a kind of control method that can dynamically control the data flows according to the state of buffer.
Background technology
In transfer of data or exchange, the control of the data traffic of data flow is unusual critical technical problems always.
In the present invention, alleged " data traffic " is meant: the data volume of input buffer in the unit interval.
For the flow control problem of data, generally adopt the mechanism of buffer to come the transmission rate of data is carried out smoothly, to avoid occurring excessive shake.The exchanges data schematic diagram of buffer as shown in Figure 1, when data flow passed to receiving terminal from transmitting terminal, the data that receive constantly entered the buffer (Buffer) that is arranged in receiving terminal.Simultaneously, the data that will wherein store of buffer are exported to the application program or the user of receiving terminal.Yet because the data traffic of data flow is unpredictable, when mass data was poured into receiving terminal suddenly, the occupancy volume of buffer will raise rapidly.At this moment, if there is not the active data flow control methods that the data flow is limited, buffer will be filled, thereby cause the obstruction of transfer of data.
After blocking generation, the data that transmitting terminal has transmitted can't enter buffer, will be received end and abandon, and the notice transmitting terminal retransmits.So just increased the work load that is used to transmit data of system.Simultaneously, also strengthened the resource consumption that system is used for communicating control information.
Along with the user to the continuous increase of data volume of business demand and the continuous increase of number of users, big data quantity, public transfer of data or the exchange of multi-user become more general, this has increased the possibility of data jamming in transfer of data or the exchange undoubtedly.Therefore be necessary to take the data flow control method that suits, the appearance of avoiding data to abandon and retransmit as far as possible.
With reference to Fig. 2 and Fig. 3, traditional data flow control method is: each transmission cycle in system, judge the current occupancy volume state of buffer, and when the occupancy volume of buffer surpassed the Upper threshold of regulation, the data of ending transmitting terminal transmitted.Usually, the Upper threshold with the buffer occupancy volume is defined as 90% of buffer heap(ed) capacity.Like this, when the occupancy volume of buffer reaches the Upper threshold of regulation, also remain with 10% buffer space and can store the data that transmitting terminal has sent.
Accordingly, after the System Halt transfer of data, continue to judge the current occupancy volume state of buffer that when the occupancy volume of buffer was lower than the Lower Threshold of regulation, the data of recovering transmitting terminal transmitted.Common Lower Threshold is defined as 40% of buffer heap(ed) capacity.
This binary data flow control method has very simple controlled condition and job step.But this method only is to end the transmission of data when the occupancy volume of buffer surpasses the Upper threshold of stipulating, therefore if when having mass data to transmit to cause data traffic big, in case system's restore data transmits the Upper threshold that the buffer occupancy volume will reach regulation immediately.System is constantly switched between abort state and transmission state at short notice like this, can't recover normal data flow at all.The critical defect of this method just is, does not utilize the stored information of buffer itself that buffer input data transfer rate is effectively controlled.
In order to address the above problem, can adopt a kind of improved data flow control method.With reference to figure 4 and Fig. 5, wherein on the basis of Upper threshold and Lower Threshold, increase a Upper threshold.Concrete control method is: when the occupancy volume of buffer surpassed the Upper threshold of regulation, the data of ending transmitting terminal transmitted; When the occupancy volume of buffer is lower than Upper threshold and surpasses the Upper threshold of regulation, transmit according to the data of data traffic control algolithm restriction transmitting terminal; Under the state of restricting data transmission, when the occupancy volume of buffer is lower than aforesaid Upper threshold, the restriction of cancellation transfer of data; After transfer of data was ended, when the occupancy volume of buffer was lower than the Lower Threshold of regulation, the data that no transfer rate is restrictedly recovered transmitting terminal transmitted.
Usually, the Upper threshold with the buffer occupancy volume is defined as 60%~70% of buffer heap(ed) capacity.After the occupancy volume of buffer reached the Upper threshold of regulation, the flow control mechanism by data made data traffic reduce.So just avoided mass data to pour in and caused obstruction, thus make that system can be continuous carry out transfer of data or exchange, significantly reduced the possibility of System Halt transfer of data.
Yet still there is deficiency in this improved data flow control method.Subject matter is, after the System Halt transfer of data, must wait for that the data occupancy volume in the buffer is reduced to below the Lower Threshold.Therefore, if will Lower Threshold regulation low excessively, for example 10%, just must wait for long time resume data transmission.On the contrary, if improve the value of Lower Threshold, for example 40%, may make system after resume data transmission, enter abort state soon once more again.
In order to overcome the defective of these above-mentioned existing data flow control methods, need provide a kind of new transfer of data or the data flow control method in the exchange.
Summary of the invention
Primary and foremost purpose of the present invention provides a kind of new transfer of data or the data flow control method in the exchange, can keep the transmission or the exchange of data effectively, and the minimizing system enters the possibility of abort state and the propagation delay time that reduces system.
In order to achieve the above object, data flow control method of the present invention comprises step: (a) the current data flow is not done restriction and carry out transfer of data; (b) judge that whether data occupancy volume in the buffer surpasses Upper threshold, if then skip to step (e), otherwise execution in step (c); (c) judge that whether the data occupancy volume in the buffer surpasses Upper threshold, if execution in step (d) then, otherwise rebound step (a); (d) carry out transfer of data according to first control algolithm restriction current data flow, and rebound step (b); (e) restriction current data flow is zero, ends transfer of data, and execution in step (f); (f) judge whether the data occupancy volume in the buffer is lower than Lower Threshold, if execution in step (g) then, otherwise rebound step (e); (g) judge whether the data occupancy volume in the buffer is lower than Lower Threshold, if then rebound step (a), otherwise execution in step (h); (h) carry out transfer of data according to second control algolithm restriction current data flow, and execution in step (i); (i) judge that whether data occupancy volume in the buffer surpasses Upper threshold, if then rebound step (e), otherwise rebound step (g).
By above-mentioned data flow control method, the present invention has reached the purpose of the data flow being carried out linear dynamic control, thereby has improved the flexibility and the robustness (Robust) of data traffic controlling mechanism.In addition, data flow control method of the present invention can be applicable to various transfer of data or switching systems with buffer (Buffer) structure.
Description of drawings
Fig. 1 is the schematic diagram of the exchanges data of buffer;
Fig. 2 is the schematic diagram that the traditional data flow control methods is provided with the buffer thresholding;
Fig. 3 is the flow chart of the traditional data flow control methods that uses of thresholding that corresponding diagram 2 is provided with;
Fig. 4 is the schematic diagram of the threshold setting of the buffer behind the increase Upper threshold in the traditional data flow control methods;
Fig. 5 is the flow chart of the traditional data flow control methods of corresponding diagram 4 uses;
Fig. 6 is the schematic diagram of the buffer threshold setting of one embodiment of the invention;
Fig. 7 is the flow chart of data flow control method of the present invention;
Fig. 8 is the data flow transmission schematic diagram of first application example of the present invention;
Fig. 9 is the work schematic diagram of the transmission buffer device of SRNC end among Fig. 8;
Figure 10 is the work schematic diagram of the transmission buffer device of DRNC end among Fig. 8;
Figure 11 is the data flow transmission schematic diagram of second application example of the present invention;
Figure 12 is the data flow transmission schematic diagram of the 3rd application example of the present invention.
Embodiment
Introduce the concrete working method of data flow control method of the present invention in detail below in conjunction with accompanying drawing 6,7.
Fig. 6 is the present invention is provided with thresholding to buffer a schematic diagram.
Wherein, data are temporarily stored in the buffer after entering buffer successively by the right side from left to right.Simultaneously, the data that are temporarily stored in high order end are exported from buffer, offer application program or superstructure.Along with the high order end data are constantly exported from buffer, the data on right side flow left successively.The just constantly fluctuation in such dynamic process of the occupancy volume of buffer.
In the present invention, in order to reach the purpose of data traffic control, buffer is provided with 4 thresholdings, is followed successively by Upper threshold (Max Up Threshold), Upper threshold (Upper Threshold), Lower Threshold (Downer Threshold) and Lower Threshold (Max Down Threshold) by the occupancy volume order from high to low of correspondence.
Wherein, the value of Upper threshold should be lower than the actual heap(ed) capacity of buffer, generally can be made as 90% of heap(ed) capacity.Upper threshold is lower than Upper threshold, is generally 60%~70% of heap(ed) capacity.Lower Threshold is lower, can be 10% of heap(ed) capacity.The value of Lower Threshold between between Lower Threshold and Upper threshold, thereby the higher resume data transmission as early as possible that helps of its setting can be generally 40% of heap(ed) capacity.After being provided with 4 thresholdings, just can the data flow be controlled according to the relation between buffer current data occupancy volume and 4 thresholdings.Concrete controlled step is with reference to figure 7.
When the buffer occupancy volume was low, when for example being lower than Upper threshold, system works was in the normal condition shown in the step 10.At this moment transfer of data is not made the data flow restriction, the peak of perhaps controlling the data flows and allowing into system.
Then, execution in step 20 judges that whether data occupancy volume in the buffer surpasses Upper threshold.In case the data occupancy volume has surpassed Upper threshold, system changes step 50 immediately over to.Otherwise, carry out determining step 30.
In step 30, judge whether the buffer occupancy volume has surpassed Upper threshold.If surpass, system enters step 40.Otherwise rotate back into step 10, work on the normal transmission state.
Enter step 40 as system, the current data occupancy volume is between Upper threshold and Upper threshold so.This explanation: on the one hand, buffer can also receive new data, therefore needn't end the transmission of data; On the other hand, also should not continue normal operating conditions, otherwise finally can cause the termination of transfer of data.Therefore after entering step 40, system reportedly is input into the row restriction according to the control algolithm logarithm, by reducing data traffic, prevents that the buffer occupancy volume from surpassing Upper threshold and causing transfer of data to end.Simultaneously, reduce data traffic and also help making the buffer occupancy volume to drop under the Upper threshold, make system get back to the normal transmission state.
In step 40, the control algolithm that reduces data traffic can be simple static control, as controls the data flows and be certain fixed value.But more preferably use dynamic control algolithm, adopt the data traffic control algolithm that changes, for example reduce the data traffic of data gradually along with the raising of buffer occupancy volume.Specifically can adopt various linearities or nonlinear algorithm controlled, will be introduced in more detail in the practical application later.
If system has entered step 50, show that the buffer occupancy volume has surpassed Upper threshold, the remaining space of buffer is few, must end the transmission of data immediately, and just the restricting data flow is 0.Can prevent that so just data from continuing transmission and can not enter buffer, finally causes to be dropped and to require re-transmission.Simultaneously, because maximum upper limit is lower than the actual heap(ed) capacity of buffer, therefore, the data of having sent before the System Halt can enter buffer, can not be dropped.
After system enters abort state 50, show that data traffic is excessive, therefore need to end transmission, wait for the cache restoring ability to work.Then change determining step 60 over to.
In step 60, judge whether the buffer occupancy volume is lower than Lower Threshold.If do not satisfy condition, show that after the System Halt transfer of data occupancy volume of buffer is still high, can't resume data transmission.Therefore rebound step 50 continues to keep abort state.
If the buffer occupancy volume has been lower than Lower Threshold, showing can resume data transmission.But because that Lower Threshold is provided with is higher, therefore need further execution in step 70, judge whether to be lower than Lower Threshold.If surpass Lower Threshold, in resume data transmission, still to the data data traffic be limited, avoid that the data occupancy volume increases too fast in the buffer.Concrete steps are as follows.
In step 70, judge whether the buffer occupancy volume is lower than Lower Threshold.If be lower than Lower Threshold, show that buffer has recovered ability to work fully, can rotate back into step 10 immediately, with the unrestricted normal condition work of data traffic.If the buffer occupancy volume surpasses Lower Threshold, then enter step 80.
In step 80, system reportedly is input into the row restriction according to the control algolithm logarithm when carrying out transfer of data, progressively increase data traffic, and it is too fast to prevent that the buffer occupancy volume from increasing.
The control algolithm of institute's foundation can be identical with the algorithm of use in the step 40 in the step 80, also can be different.When two kinds of control algolithms not simultaneously, what claim to use in the step 40 is first control algolithm, what use in the step 80 is second control algolithm.
For preventing that data occupancy volume in the buffer from surpassing Upper threshold, carries out determining step 90.In case the data occupancy volume has surpassed Upper threshold, system enters step 50 immediately, ends transfer of data.Otherwise, jump back to determining step 70, judge whether the buffer occupancy volume is lower than Lower Threshold.
In the method for the invention, " surpassing " can be understood as " greater than ", also can be understood as " more than or equal to "; " be lower than " and can be understood as " less than ", also can be understood as " smaller or equal to ".
More than be exactly data flow control method of the present invention, the data traffic when using first control algolithm control buffer occupancy volume higher can be kept the transmission and the exchange of data effectively, and the minimizing system enters the possibility of abort state.Simultaneously, the data traffic when using second control algolithm that transfer of data is recovered is controlled, thereby has shortened the stand-by period after the transfer of data termination greatly, and a kind of data traffic controlling mechanism that has flexibility and robustness (Robust) concurrently is provided.In addition, data flow control method of the present invention can be applicable to various transfer of data or switching systems with buffer (Buffer) structure.
Below just introduce the application of data flow control method of the present invention in multiple different pieces of information transmission or switching system in conjunction with the accompanying drawings in detail.
First application example of the present invention is the application in the transfer of data on the media access control layer (MAC) in 3G (Third Generation) Moblie (3GPP) system.
In the radio network controller (RNC) of new generation of wireless mobile communication system, data flow control method be one important and also have the decision meaning technical problem.Especially in the MAC layer, the data flow control method between MAC-d logic entity and MAC-c/sh logic entity.Its major function is: in down link, data in the proprietary logic channel (Dedicated Traffic Channel DTCH/ Dedicated Control Channel DCCH) on the MAC-d logic entity among the SRNC (main RNC) through Iur protocol interface (connecting interface between RNC), are stablized, are sent to efficiently, as far as possible glibly on the Common transport channel on the MAC-c/sh logic entity the DRNC (from RNC) (forward direction inserts transmission channel FACH/ downlink sharied signal channel DSCH); Perhaps in same RNC, directly be sent on the MAC-c/sh through the data traffic controlling mechanism by MAC-d without the Iur interface.
In this example, be primarily aimed in the MAC layer of RNC, between MAC-d entity and the MAC-c/sh entity, in down link, be mapped to the data traffic control problem that will occur when forward direction inserts transmission channel (FACH) by dedicated logical channel (DTCH/DCCH).Especially between different RNCs, data after the Iur interface is handled, are imported the situation of the FACH channel of MAC-c/sh among the DRNC by the proprietary logic channel (DTCH/DCCH) of MAC-d among the SRNC into.In same RNC, the proprietary logic channel (DTCH/DCCH) of data from MAC-d maps directly to the FACH channel among the MAC-c/sh, and the situation that need not to handle through the Iur interface is identical for data flow control method, only is that data message and data traffic control information are directly transmitted between MAC-d and MAC-c/sh without the Iur interface.
Fig. 8 is exactly the data flow transmission schematic diagram between the MAC-c/sh among MAC-d and the DRNC among the SRNC.Flow in the process of MAC-c/sh among the DRNC at data flow MAC-d from SRNC, other data of same priority in the transmission buffer device 110 of the interior different user of MAC-d among the SRNC, through the Iur interface, under the control of flow control methods, flow among the DRNC of appointment and have in the transmission buffer device 120 of respective priority in the MAC-c/sh.
Fig. 9 holds the work schematic diagram of certain user's transmission buffer device 110 for SRNC among Fig. 8.This transmission buffer device 110 is arranged in the MAC-d logic entity of SRNC end.From the data flow of proprietary logic channel (DTCH/DCCH) under the control of MAC-d controller, through transmission channel kinds switch and C/T multiplexing/after priority is provided with, according to the height difference of priority, trigger in the transmission buffer device 110 of constantly data being sent into corresponding each priority at each.And wait at the next one and triggering constantly, data are sent among the MAC-c/sh by this buffer 110.Wherein, according to protocol parameter, priority be provided with that number is the highest can be 15.The data capacity size of this buffer 110 can be set in a transmission triggers constantly, maximum PDU (protocol Data Unit) number of transmission and the product of maximum PDU capacity, and promptly each triggers the maximum data capacity that constantly can transmit.In real work, for guaranteeing the job stability of buffer 110, its capacity can be stipulated more biggerly.
Figure 10 is the work schematic diagram of the transmission buffer device 120 of DRNC end among Fig. 8.After the processing of data flow from the buffer 110 in the SRNC end MAC-d logic entity, enter in the MAC-c/sh layer of DRNC end through the Iur protocol interface.Under the control of MAC-c/sh controller, through TCIF multiplexing/UE Id is multiplexing, at last the difference according to priority enters in the transmission buffer device 120 that has respective priority among the MAC-c/sh.In addition, in order to support subsequently sequential/priority operation and TFC to select to handle, corresponding to each transmission buffer device 120, all be provided with an auxiliary cache device (not showing on the figure), this auxiliary cache device is used for storing number and the capacity of the SDU (service data unit) of the data flow that enters into transmission buffer device 120.The structure of the transmission buffer device 120 of each priority correspondence as shown in Figure 6 among the MAC-c/sh.
Though in said system, number of users, priority and data traffic thereof have unpredictability separately, by adopting data flow control method of the present invention, can effectively avoid more abandoning and retransmitting the appearance of probability.
In the 3GPP agreement, stipulated that the message mechanism of standard is transmitted and relevant various parameters and the state information of data traffic control.For example, in the Iur interface, can adopt FACH FLOW CONTROL and FACH CAPACITY REQUEST message to being used for transmitting the control frame that comprises the data traffic Control Parameter.In FACH FLOW CONTROL control frame, the setting that length is 8 parameters C redits has only stipulated not have the transmission restriction when its value is 0, is then to end transmission at 255 o'clock, and other value can be defined by user oneself.Therefore can utilize FACH FLOW CONTROL control frame to realize control method of the present invention by oneself definition Credits value.
Concrete control method is:
For transmitting terminal (MAC-d of SRNC):
At new data delivery time, transmitting terminal will send a control frame information FACH CAPACITY REQUEST to receiving terminal, informs the size of the capacity register that receiving terminal oneself needs, and waits for that DRNC sends FACH FLOW CONTROL control frame.Wherein, the form of FACH CAPACITY REQUEST control frame and FACH FLOW CONTROL control frame sees the following form 1 and table 2.
The form of table one FACH CAPACITY REQUEST control frame
The form of table two FACH FLOW CONTROL control frame
Figure C20031010928700101
If in the stand-by period of regulation, receive FACH FLOW CONTROL control frame, enter (a), otherwise enter (b).
(a) according to the information in the FACH FLOW CONTROL control frame, the number of the PDU of MAC-d among the SRNC that decision will send; (b) send a FACH CAPACITY REQUEST to receiving terminal.According to this control frame structure, comprise the transmission capacity requirement in the transmission request, and demand is for sending the minimum value of capacity.
Wherein, the above-mentioned stand-by period can determine according to different system.As a concrete example, can be made as M * TTI (Transmission Time Interval), and parameter M can be set as the case may be by product designer.
For receiving terminal (MAC-c/sh of DNRC),, receive the capacity occupancy volume Q that the current cache device is observed in triggering constantly at each with reference to figure 7 and aforementioned flow process.
Execution in step 20, whether the data volume of differentiating this Q value+reception is greater than Upper threshold (Max Up Threshold).
If jump to step 50; If not, then jump to step 30.
Step 30, whether the data volume of differentiating this Q value+reception is greater than Upper threshold (Upper Threshold).
If then execution in step 40, according to the computation rule of introducing later, send FACH FLOW CONTROL control frame, with the transmission number of the SDU of the Credits parameter adjustment MAC-c/sh in this frame to the current MAC-d that uses this buffer; If not, then execution in step 10, proceed to send and receive according to original various parameters.Then return 20.
Enter step 50, send a Credit value and be 0 FACH FLOW CONTROL control frame, end transfer of data to the current MAC-d that uses this buffer; Write down termination information simultaneously, form sees the following form 3.
Table 3
Figure C20031010928700111
Step 60 judges that whether this Q value is less than Lower Threshold (Downer Threshold), if then enter step 70; If not, then jump to step 50.
Step 70, judge that whether this Q value is less than Lower Threshold (Max Down Threshold), if, then according to termination information (according to table 3 format record), send a Credit value and be 255 FACH FLOW CONTROL control frame (according to table 2 format record) and use the MAC-d of this buffer to all, enter step 10, MAC-d resends data;
If not, enter step 80,,, send FACH FLOWCONTROL control frame, adjust the transmission number of the SDU of MAC-c/sh among the DRNC to the current MAC-d that uses this buffer according to the computation rule that provides according to the termination information of record in the table 3.
Wherein, the regulation rule of the SDU number of MAC-c/sh is in the step 40 of use and 80:
Under the identical condition of each user's of supposition priority level, estimate the transmission capacity that each user can have according to formula (1).
m ind = 1 N ( Q Max - Q Cur ) - - - ( 1 )
Wherein:
Q Max: the available heap(ed) capacity of buffer promptly equals Upper threshold;
Q Cur: the current occupied capacity of buffer;
m Ind: the operable amount of capacity of the user of current this buffer of use;
N: the number of users of current this buffer of use.
The number of the SDU that can transmit according to the capacity estimation of the SDU of this capacity and transmission then, send this information to transmitting terminal by the Credits parameter in the FACHFLOW CONTROL control frame at last, be used for controlling the size of the data capacity that transmitting terminal should send.
All thresholdings are by the designed size of buffer and the relevant concrete parameter setting of system.As an example, we provide the quantification of this each parameter of data traffic control algolithm and set.Q MaxSet according to the concrete condition of product by product designer.For guaranteeing certain redundancy, setting Max Up Threshold is 0.9 * Q MaxAnd Max Down Thresho1d is 0.1 * Q MaxUpper Threshold is 0.6 * Q in the second order thresholding MaxAnd Downer Threshold is 0.4 * Q Max
Like this, just utilized the rule that provides among the 3GPP fully, neatly, avoided as far as possible in sending data procedures, control information frequent between the MAC-d of SRNC and the MAC-c/sh of DRNC exchanges.This method sends solicited message FACH CAPACITYREQUEST and only just enables when new data delivery time or system set again, has reduced the exchange of control information, help improving control algolithm complexity, improve the stability of system;
In concrete the application, can also algorithm and each threshold value of above-mentioned data traffic control be changed, thereby be applicable to different systems.
For example can adopt the control algolithm of step, for example: 0.6Q Max<Q Cur<0.7Q MaxThe time, m ind = 1 N ( Q Max - Q Cur ) ; 0.7Q Max<Q Cur<0.8Q MaxThe time, m ind = 1 2 N ( Q Max - Q Cur ) ; 0.8Q Max<Q Cur<0.9Q MaxThe time, m ind = 1 3 N ( Q Max - Q Cur ) ; Also can adopt with Q CurIncrease, m IndBe other algorithms such as parabola algorithm that parabola descends, even adopt state algorithm, for example the specified data flow is less than 5% of capacity register in the unit transmission time.
Further, step 40 can be used different control algolithms respectively with 80.For example, the algorithm shown in the step 40 use formula (1) is as first control algolithm, and step 80 uses above-mentioned state algorithm as second control algolithm.
In addition, each threshold value also can make a change.For example setting Max Up Threshold is 0.85 * Q MaxAnd Min DownThreshold is 0.2 * Q MaxUpper Threshold is 0.7 * Q in the second order thresholding MaxAnd Downer Threshold is 0.5 * Q MaxAs long as satisfy Upper threshold>Upper threshold>Lower Threshold>Lower Threshold.
Second application example of the present invention is in the queuing mechanism of ISDN (Integrated Services Digital Network) switching technology.
Isdn switch is to finish exchange according to the information of letter head and basic cell.Isdn switch uses the letter head how to decide forwarding information.The ISDN exchange has two basic characteristics: the statistic multiplexing between cell switching and each virtual connections.For solving the competition of cell to transfer resource, must rank to cell, go up from the time each cell is separated.Use Circuit-switched thought, ISDN is presented as time-division switching in exchange, and realizes by the buffer memory queuing mechanism.Basic queue machine is shaped on three kinds: input queue, output work queue and central authorities' queuing.
We are with the embodiment of central queuing mechanism as our caching mechanism.As shown in figure 11.
Therefrom we find out that its buffer queue also must solve the congested problem of formation.Can use control method as shown in Figure 7 for this reason.
When the buffer occupancy volume was low, when for example being lower than Upper threshold, system works was in the normal condition shown in the step 10.At this moment transfer of data is not made the data flow restriction, the peak of perhaps controlling the data flows and allowing into system.
Then, execution in step 20 judges that whether data occupancy volume in the buffer surpasses Upper threshold.In case the data occupancy volume has surpassed Upper threshold, system enters step 50 immediately.Otherwise, carry out determining step 30.
In step 30, judge whether the buffer occupancy volume has surpassed Upper threshold.If surpass, system enters step 40.Otherwise get back to step 10, work on the normal transmission state.
After system enters abort state 50, carry out determining step 60.
In the step 60, judge whether the buffer occupancy volume is lower than Lower Threshold.If do not satisfy condition, rebound step 50.If the buffer occupancy volume has been lower than Lower Threshold, further execution in step 70 judges whether to be lower than Lower Threshold.If be lower than Lower Threshold, get back to step 10 immediately, with the unrestricted normal condition work of data traffic.If the buffer occupancy volume surpasses Lower Threshold, then enter step 80.
In step 80, system reportedly is input into the row restriction according to the control algolithm logarithm, and carries out determining step 90.
Other two kinds of queuing policys also can use such buffer queue mechanism to finish the data traffic control of Network Transmission equally, block in case locking system produces.
The data traffic control that the 3rd application examples of the present invention is ATM (asynchronous transfer mode) switching fabric.
Buffering strategy or queuing policy are important contents in the atm switching fabric design, and it mainly comprises buffering set-up mode, the quantity of buffer, the access control of formation and the management of buffer.And how to be the effective reasonably problem of thresholding of buffer design with regard to comprising in the management of buffer.As shown in figure 12.
Therefore, use concrete control method of the present invention effectively to address the above problem.
When the buffer occupancy volume was low, system works was in the normal condition shown in the step 10.At this moment transfer of data is not made the data flow restriction, the peak of perhaps controlling the data flows and allowing into system.
Then, execution in step 20 judges that whether data occupancy volume in the buffer surpasses Upper threshold.In case the data occupancy volume has surpassed Upper threshold, system enters step 50 immediately.Otherwise, carry out determining step 30.
In step 30, judge whether the buffer occupancy volume has surpassed Upper threshold.If surpass, system enters step 40.Otherwise get back to step 10, work on the normal transmission state.
After system enters abort state 50, carry out determining step 60.
In the step 60, judge whether the buffer occupancy volume is lower than Lower Threshold.If do not satisfy condition, rebound step 50.If the buffer occupancy volume has been lower than Lower Threshold, further execution in step 70 judges whether to be lower than Lower Threshold.If be lower than Lower Threshold, get back to step 10 immediately, with the unrestricted normal condition work of data traffic.If the buffer occupancy volume is higher than Lower Threshold, then enter step 80.
In step 80, system reportedly is input into the row restriction according to the control algolithm logarithm, and carries out determining step 90.
Below describe embodiments of the present invention and multiple concrete application in conjunction with the accompanying drawings in detail, these descriptions and accompanying drawing only are for thought of the present invention, content and application are described.For those skilled in the art in the present technique field, it is conspicuous making variations and modifications according to content described above, therefore, all can not break away from the spirit and scope of the present invention.Protection range of the present invention is as the criterion with the record of claim.

Claims (5)

1. a data flow control method that has buffer is used for the input data of buffer are carried out the dynamic control of data traffic, and the method comprising the steps of:
(a) the current data flow is not done restriction and carry out transfer of data;
(b) judge that whether data occupancy volume in the buffer surpasses Upper threshold, if then skip to step (e), otherwise execution in step (c);
(c) judge that whether the data occupancy volume in the buffer surpasses Upper threshold, if execution in step (d) then, otherwise rebound step (a);
(d) carry out transfer of data according to first control algolithm restriction current data flow, and rebound step (b);
(e) restriction current data flow is zero, ends transfer of data, and execution in step (f);
(f) judge whether the data occupancy volume in the buffer is lower than Lower Threshold, if execution in step (g) then, otherwise rebound step (e);
(g) judge whether the data occupancy volume in the buffer is lower than Lower Threshold, if then rebound step (a), otherwise execution in step (h);
(h) carry out transfer of data according to second control algolithm restriction current data flow, and execution in step (i);
(i) judge that whether data occupancy volume in the buffer surpasses Upper threshold, if then rebound step (e), otherwise rebound step (g).
2. data flow control method as claimed in claim 1 is characterized in that, described Upper threshold is lower than described Upper threshold, and described Lower Threshold is lower than this Upper threshold, and described Lower Threshold is lower than this Lower Threshold.
3. data flow control method as claimed in claim 1 or 2 is characterized in that, described first control algolithm and second control algolithm are identical or different.
4. data flow control method as claimed in claim 3 is characterized in that, described first control algolithm or second control algolithm are dynamic algorithm or state algorithm.
5. data flow control method as claimed in claim 4 is characterized in that, described dynamic algorithm is linear algorithm, parabola algorithm or step algorithm.
CNB2003101092873A 2003-12-11 2003-12-11 Method for controlling data flux Expired - Lifetime CN100403747C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2003101092873A CN100403747C (en) 2003-12-11 2003-12-11 Method for controlling data flux

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2003101092873A CN100403747C (en) 2003-12-11 2003-12-11 Method for controlling data flux

Publications (2)

Publication Number Publication Date
CN1627745A CN1627745A (en) 2005-06-15
CN100403747C true CN100403747C (en) 2008-07-16

Family

ID=34758923

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2003101092873A Expired - Lifetime CN100403747C (en) 2003-12-11 2003-12-11 Method for controlling data flux

Country Status (1)

Country Link
CN (1) CN100403747C (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1996935B (en) * 2006-01-04 2011-02-02 华为技术有限公司 A dynamic adjusting method for data packets in the buffer at the streaming receiving end
CN1983870B (en) * 2006-05-01 2011-04-27 华为技术有限公司 Method and system for transmitting data
CN101127692B (en) * 2006-08-17 2012-06-27 华为技术有限公司 A method and device for identifying and limiting network traffic
CN101340358B (en) * 2007-07-04 2011-04-20 鼎桥通信技术有限公司 Flow control method, system and flow control entity
CN101127713B (en) * 2007-09-05 2011-04-06 华为技术有限公司 General traffic control device and traffic control method
CN101911685B (en) * 2007-12-29 2012-06-27 中兴通讯股份有限公司 Method for receiving and playing back video data
CN101420462B (en) * 2008-12-11 2013-03-20 中国移动通信集团北京有限公司 Method and system for distributing data
CN101984594A (en) * 2010-10-25 2011-03-09 华为技术有限公司 Switching network flow control method and device
CN102811157A (en) * 2011-06-01 2012-12-05 阿尔卡特朗讯公司 Method and device for flow control
WO2014000172A1 (en) * 2012-06-27 2014-01-03 Qualcomm Incorporated Low overhead and highly robust flow control apparatus and method
CN103401807B (en) * 2013-06-27 2016-08-24 宇龙计算机通信科技(深圳)有限公司 USB data transmission method, device and mobile terminal
CN103401888A (en) * 2013-08-21 2013-11-20 杭州浦禾通信技术有限公司 Multimedia data receiving and processing method and device
CN112039686B (en) * 2019-06-03 2023-08-04 杭州海康威视系统技术有限公司 Data stream transmission control method, device, monitoring equipment and storage medium
CN112104667B (en) * 2020-11-09 2021-02-09 湖南戎腾网络科技有限公司 Flow control method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6192422B1 (en) * 1997-04-16 2001-02-20 Alcatel Internetworking, Inc. Repeater with flow control device transmitting congestion indication data from output port buffer to associated network node upon port input buffer crossing threshold level
JP2001203705A (en) * 2000-01-19 2001-07-27 Nec Corp Device and method for controlling flow and storage medium recording flow control program
CN1427582A (en) * 2001-12-19 2003-07-02 华为技术有限公司 Method of controlling Ethernet data flow quantity on synchronous numerical system transmission net

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6192422B1 (en) * 1997-04-16 2001-02-20 Alcatel Internetworking, Inc. Repeater with flow control device transmitting congestion indication data from output port buffer to associated network node upon port input buffer crossing threshold level
JP2001203705A (en) * 2000-01-19 2001-07-27 Nec Corp Device and method for controlling flow and storage medium recording flow control program
CN1427582A (en) * 2001-12-19 2003-07-02 华为技术有限公司 Method of controlling Ethernet data flow quantity on synchronous numerical system transmission net

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ATM网络的拥塞控制. 蒋志刚,李乐民.电信科学,第10卷第2期. 1994
ATM网络的拥塞控制. 蒋志刚,李乐民.电信科学,第10卷第2期. 1994 *
No.7信令中的业务流量控制方法. 梁焕.电信技术,第2期. 1997
No.7信令中的业务流量控制方法. 梁焕.电信技术,第2期. 1997 *

Also Published As

Publication number Publication date
CN1627745A (en) 2005-06-15

Similar Documents

Publication Publication Date Title
CN100403747C (en) Method for controlling data flux
CN1771686B (en) RLC window size reconfiguration
EP2204018B1 (en) Limiting the rlc window size in a hsdpa flow control
CN100551157C (en) A kind of base station switch method
US20040228285A1 (en) Packet communications system
CN101505260A (en) Message flow control method, system and apparatus
US20050105499A1 (en) Communication device
JP3866963B2 (en) Method and system for scheduling multiple data flows to coordinate quality of service in a CDMA system
US20090175222A1 (en) System and method for avoiding stall using timer for high-speed downlink packet access system
WO2005088917A1 (en) Control station apparatus, base station apparatus, terminal apparatus, packet communication system, and packet communication method
CN101507202A (en) Communications equipment
CN101547469A (en) Method, system and device for transmitting data
US7839787B2 (en) Delay-based overflow routing in communication systems
KR100415115B1 (en) Data congestion notifying method and apparatus in communication system
CN1954564A (en) Data transport in umts
WO2006006485A1 (en) Receiver apparatus and method for releasing memory thereof
WO2003017711A1 (en) Method and system for flow control for route switching
CN101610198A (en) A kind of dispatching method of Packet Service and dispatching device
JPH07135512A (en) Router
CN101170389B (en) Method for selecting first transmission block size of protocol data unit at radio link control layer
CN100466616C (en) Method for controlling reverse congestion of ABIS interface and transceiver base station
WO2008066429A1 (en) A method for improved handling of traffic congestion in a wireless telecommunications system
US20030139145A1 (en) Data transmitting method and apparatus for guaranteeing quality of service in a data communication system
CN100574505C (en) The user access method of high speed descending grouping access system and the communication equipment of application
CN100493081C (en) User plane data processing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: SHANGHAI ALCATEL-LUCENT CO., LTD.

Free format text: FORMER NAME: BEIER AERKATE CO., LTD., SHANGHAI

CP01 Change in the name or title of a patent holder

Address after: 201206 Pudong Jinqiao Export Processing Zone, Nanjing Road, No. 388, Shanghai

Patentee after: ALCATEL-LUCENT SHANGHAI BELL Co.,Ltd.

Address before: 201206 Pudong Jinqiao Export Processing Zone, Nanjing Road, No. 388, Shanghai

Patentee before: Shanghai Bell Alcatel Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 201206 Pudong Jinqiao Export Processing Zone, Nanjing Road, No. 388, Shanghai

Patentee after: NOKIA SHANGHAI BELL Co.,Ltd.

Address before: 201206 Pudong Jinqiao Export Processing Zone, Nanjing Road, No. 388, Shanghai

Patentee before: ALCATEL-LUCENT SHANGHAI BELL Co.,Ltd.

CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20080716