CN100502315C - Business flow monitoring method and system - Google Patents

Business flow monitoring method and system Download PDF

Info

Publication number
CN100502315C
CN100502315C CNB2006100782589A CN200610078258A CN100502315C CN 100502315 C CN100502315 C CN 100502315C CN B2006100782589 A CNB2006100782589 A CN B2006100782589A CN 200610078258 A CN200610078258 A CN 200610078258A CN 100502315 C CN100502315 C CN 100502315C
Authority
CN
China
Prior art keywords
user
byte number
token
intended service
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006100782589A
Other languages
Chinese (zh)
Other versions
CN101051936A (en
Inventor
陈武茂
左文树
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2006100782589A priority Critical patent/CN100502315C/en
Publication of CN101051936A publication Critical patent/CN101051936A/en
Application granted granted Critical
Publication of CN100502315C publication Critical patent/CN100502315C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The supervision system (SS) determines maximal transmission byte number (MTBN) possible to be provided for prearranged service (PS) of user currently, as well as determines MTBN possible to be provided for total service of user currently. When determining that byte number of user's PS needed to transfer is smaller than both of MTBNs, SS allows transferring user's PS. When determining that byte number of user's not prearranged service (NPS) needed to transfer is smaller than or equal to MTBN corresponding to user's total service, SS allows transferring user's NPS. The invention guarantees that user's service total flux does not exceed total bandwidth (TB) agreed on, and flux of user's PS does not exceed bandwidth agreed on. Moreover, NPS can use remnant bandwidth of PS. When total flux of user service exceeds TB. The invention guarantees flux of user's PS. The invention reaches purpose of supervising flux of user service reasonably, and improving method for supervising service flux.

Description

A kind of business flow monitoring method and system
Technical field
The present invention relates to the network communications technology field, be specifically related to a kind of business flow monitoring method and system.
Background technology
In communication system, relying on the user is very unpractical according to the service regulation transmission data flow among its SLA (service level agreement) that signs with the service provider consciously, the user service flow amount surpasses the highest service traffics of stipulating among the SLA possibly, thereby cause this user to tie up other users' legal bandwidth, the legitimate traffic of other customer services can not be guaranteed, therefore, at the Web portal place user service flow amount is limited, be very important with the normal operation that guarantees network.
Traffic policing is the technology of the user service flow amount being carried out rate limit, is important QoS technology.
In some application scenarios, need carry out multistage traffic policing, the bandwidth of 1G altogether is provided for its 1000 users as a system, still, wherein the bandwidth of high-priority service such as VoIP business etc. has only 100M.Under this application scenario, to carry out traffic policing to each user on the one hand, each user's total flow is restricted to designated bandwidth such as 1M, simultaneously, VoIP business to each user also will be supervised, user's VoIP service traffics are restricted to designated bandwidth such as 100K, can share by all users to guarantee these high-priority service bandwidth, rather than be monopolized by a few users.
Monitoring and managing method to user traffic mainly contains following two kinds at present:
Method one: the service with different priority levels flow to the user is supervised respectively, as shown in Figure 1.
Among Fig. 1, the bandwidth that guarantees of setting certain user is N, wherein the bandwidth that guarantees of high-priority service is L, and N〉L, this method is when supervising this user's high-priority service, and restriction high-priority service flow is up to L, simultaneously, when promptly the service traffics of all except high-priority service were supervised, restriction general service flow was up to N-L at the low priority traffice flow to the user, thereby all service traffics sums that guarantee this user can not surpass N.
In this method, because the bandwidth of low priority traffice is limited to N-L, so no matter whether the user uses high-priority service, the flow of low priority traffice all can not surpass N-L, thereby user's assurance bandwidth can not be fully utilized.
Method two: user's high-priority service flow and total service traffics of user are supervised respectively, as shown in Figure 2.
Among Fig. 2, the bandwidth that guarantees of setting certain user is N, wherein the bandwidth that guarantees of high-priority service is L, and N〉L, this method is when supervising this user's high-priority service, and restriction high-priority service flow is up to L, simultaneously, when total service traffics of user are supervised, limit total service traffics and be up to N, thereby all service traffics sums that guarantee this user can not surpass N.
Though this method can make the user make full use of it and guarantee bandwidth, but, when the flow sum of high-priority service and low priority traffice surpasses N, in total business flow monitoring process, can abandon a part of business datum, because when total business flow monitoring, can not effectively distinguish high-priority service and low priority traffice, therefore, this method can't guarantee the assurance bandwidth of user's high-priority service.
Summary of the invention
The objective of the invention is to, a kind of business flow monitoring method and system are provided, by respectively the intended service of needs transmission, the byte number of non-intended service being compared in many ways, under the situation of effective limited subscriber total flow and intended service flow, guaranteed the bandwidth of intended service.
For achieving the above object, a kind of business flow monitoring method provided by the invention comprises:
Current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user are provided for a, supervisory systems;
B, supervisory systems during simultaneously smaller or equal to described two maximum transmitted byte numbers, allow described user's intended service transmission at the byte number of consumer premise business that need to determine transmission;
C, supervisory systems during smaller or equal to the total professional corresponding maximum transmitted byte number of described user, allow described user's non-intended service transmission at the byte number of the non-intended service of user that need to determine transmission;
Described intended service is to have the business that traffic threshold is set specially at its flow, the business of described non-intended service for carrying out flow control by the total service traffics thresholding of user.
Described step a comprises:
Supervisory systems is determined current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user according to token bucket algorithm or token bucket algorithm.
Among the described step a: when intended service when being a plurality of, all corresponding token bucket algorithm of each intended service or token bucket algorithm.
Described step a specifically comprises:
A1, supervisory systems are provided with the traffic threshold of first token bucket according to the bursts of traffic degree of consumer premise business, the token formation speed of first token bucket is set according to the average bandwidth of consumer premise business, and the traffic threshold of second token bucket is set according to the total professional bursts of traffic degree of user, the token formation speed of second token bucket is set according to the total professional average bandwidth of user;
A2, supervisory systems the current maximum transmitted byte number that can provide for user's intended service are provided and are determined the current maximum transmitted byte number that can provide for total business of user according to the token number in second token bucket according to the token number in first token bucket.
Described step b, c comprise: supervisory systems is in byte number while of the consumer premise business of determining needs transmission during smaller or equal to the byte number of the token quantity correspondence in first token bucket, second token bucket, allow the professional transmission of this consumer premise, and from first token bucket, second token bucket, deduct corresponding token number respectively according to the byte number of this intended service; Otherwise, abandon described user's intended service;
Supervisory systems is at the byte number of the non-intended service of user that determine to need transmission during smaller or equal to the byte number of the token quantity correspondence in second token bucket, allow the non-intended service transmission of this user, and from second token bucket, deduct corresponding token number according to the byte number of this non-intended service;
Otherwise, abandon described user's non-intended service.
Described step a specifically comprises:
A3, supervisory systems are provided with the capacity of the first leakage bucket according to the bursts of traffic degree of consumer premise business, average bandwidth according to the consumer premise business is provided with first speed that spills of leaking bucket, and second capacity that leaks bucket is set according to the total professional bursts of traffic degree of user, according to the total professional average bandwidth of user second speed that spills of leaking bucket is set;
A4, supervisory systems the current maximum transmitted byte number that can provide for user's intended service are provided and are determined the current maximum transmitted byte number that can provide for total business of user according to second residual capacity of leaking in the bucket according to first residual capacity of leaking in the bucket.
Described step b, c comprise:
When supervisory systems is leaked the residual capacity that bucket, second leaks in the bucket less than first simultaneously at the byte number of the consumer premise business that determine to need transmission, allow the professional transmission of this consumer premise, and the residual capacity in the first leakage bucket, the second leakage bucket is deducted the byte number of this intended service respectively; Otherwise, abandon described user's intended service;
Supervisory systems the byte number of the non-intended service of user that determine to need transmission less than second leak in the bucket residual capacity the time, allow the non-intended service transmission of this user, and leak the byte number that residual capacity in the bucket deducts this non-intended service second; Otherwise, abandon described user's non-intended service.
The present invention also provides a kind of business flow monitoring system, comprising:
Determine maximum transmitted byte number module: determine current maximum transmitted byte number that can provide and the current maximum transmitted byte number that can provide for total business of user for user's intended service;
Traffic policing module: during simultaneously smaller or equal to described two maximum transmitted byte numbers, allow described user's intended service transmission at the byte number of the consumer premise business that determine to need transmission; During smaller or equal to the total professional corresponding maximum transmitted byte number of described user, allow described user's non-intended service transmission at the byte number of the non-intended service of user that determine to need transmission;
Described intended service is to have the business that traffic threshold is set specially at its flow, the business of described non-intended service for carrying out flow control by the total service traffics thresholding of user.
Described definite maximum transmitted byte number module is determined current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user according to token bucket algorithm or token bucket algorithm.
When described intended service is a plurality of, all corresponding token bucket algorithm of each intended service or token bucket algorithm.
Description by technique scheme as can be known, by the intended service that respectively needs is transmitted, the byte number of non-intended service compares in many ways, make one aspect of the present invention can guarantee that the customer service total flow is no more than the agreement total bandwidth, on the other hand, can guarantee user's intended service such as the bandwidth that the high-priority service flow is no more than agreement, and, when user's intended service flow during less than the bandwidth of agreement, non-intended service such as low priority traffice can utilize the remaining bandwidth of intended service, simultaneously, when the customer service total flow surpasses the agreement total bandwidth, guaranteed user's intended service flow; The present invention can realize business flow monitoring by the mode of token bucket or leakage bucket; Thereby realized reasonable supervision user traffic, improved the purpose of business flow monitoring method by technical scheme provided by the invention.
Description of drawings
Fig. 1 is business flow monitoring method one schematic diagram of prior art;
Fig. 2 is business flow monitoring method two schematic diagrames of prior art;
Fig. 3 is the flow chart of token bucket deposits tokens;
Fig. 4 is a business flow monitoring method schematic diagram of the present invention;
Fig. 5 is a business flow monitoring method flow chart of the present invention.
Embodiment
Method and system core of the present invention all is: supervisory systems is provided by current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user; Supervisory systems during simultaneously smaller or equal to described two maximum transmitted byte numbers, allows described user's intended service transmission at the byte number of the consumer premise business that determine to need transmission; Supervisory systems during smaller or equal to the total professional corresponding maximum transmitted byte number of described user, allows described user's non-intended service transmission at the byte number of the non-intended service of user that determine to need transmission.
Based on core concept of the present invention technical scheme provided by the invention is further described below.
Intended service among the present invention is to have the business that traffic threshold is set specially at its flow, and as high-priority service etc., the business of non-intended service for carrying out flow control by the total service traffics thresholding of user is as low priority traffice.
Intended service can be one or more, and promptly high-priority service can be a plurality of business with different brackets.When intended service is multiple intended service with different brackets, every kind of all corresponding traffic threshold of intended service, the present invention is all identical to the flow control methods of each intended service.
Flow control process with a kind of high-priority service and low priority traffice is an example below, and business flow monitoring method of the present invention is described.
At first, the supervisory systems of the present invention maximum transmitted byte number that the current maximum transmitted byte number that can provide for user's high-priority service need be provided, can provide for total business of user.Total business here is meant high-priority service and low priority traffice.The maximum transmitted byte number that supervisory systems can adopt the mode of token algorithm or token bucket algorithm the current maximum transmitted byte number that can provide for user's high-priority service to be provided, can be provided for total business of user.The present invention does not limit the method that supervisory systems obtains two maximum transmitted byte numbers.
When supervisory systems adopted the token algorithm to realize the service traffics monitoring, supervisory systems was that high-priority service is provided with first token bucket and the first token maker, is user's total business setting second token bucket and the second token maker.The capacity of first token bucket can be provided with according to the burstiness of high-priority service, because the burstiness of high-priority service is higher than the burstiness of low priority traffice in the ordinary course of things, so, the capacity of second token bucket can be provided with according to the burstiness of high-priority service, and, second token bucket can also be provided with a burstiness again, and this burstiness is used to limit the burst degree of low priority traffice.
The flow chart of token bucket deposits tokens as shown in Figure 3.
Among Fig. 3, in step 300, the token maker constantly generates token with set rate.
To step 310, judge whether the current token of depositing of token bucket is full, if the current token of depositing of token bucket is not full, to step 320, the token that the token maker is generated leaves in the token bucket.
In step 310,,, abandon the token that the token maker generates to step 330 if the current token of depositing of token bucket is full.
The first token maker constantly generates token with certain speed, and the token that the first token maker generates is put in first token bucket.Each token in first token bucket is all represented certain byte number.If the byte number of the token number correspondence in first token bucket arrives the burstiness of first token bucket, then newly-generated token will be dropped.The token generating rate of the first token maker can that is to say that the first token maker produces the speed of token and represents the average discharge of first token bucket permission by high-priority service according to the traffic threshold setting of high-priority service.
The second token maker constantly generates token with certain speed, the token that the second token maker generates is put in second token bucket, if the byte number of the token number correspondence in second token bucket arrives the burstiness of second token bucket, then newly-generated token will be dropped.The token generating rate of the second token maker can be according to the total professional traffic threshold setting of user, i.e. on behalf of second token bucket, the speed of second token maker generation token allow total professional average discharge by the user.
Each token in first token bucket and second token bucket is all represented certain byte number, as the token generating rate that disposes the first token maker is 1Mbps, set the first token maker and produce a token for per 1 millisecond, then the byte number of a token representative is: 1M/1000/8=125 (byte bytes).
After supervisory systems is provided with token bucket and token maker respectively for total business of user's high-priority service and user, supervisory systems is when the high-priority service of transmission user, need compare by the byte number that the byte number of user's high-priority service is corresponding with token number in first token bucket, second token bucket, and determine whether to transmit the business of this high priority according to comparative result.Since supervisory systems with the byte number of high-priority service respectively with first, second token bucket in byte number compare, so, when the present invention surpasses the agreement total bandwidth in the customer service total flow, can guarantee the bandwidth that user's high-priority service flow obtains arranging.
Supervisory systems need compare the byte number of user's low priority traffice and the byte number of the token number correspondence in second token bucket, and determine whether to transmit the business of this low priority according to comparative result when the low priority traffice of transmission user.Because supervisory systems only will need the byte number of the low priority traffice that transmits and the token number in second token bucket to compare, so, when user's high-priority service flow during less than the bandwidth of agreement, low priority traffice can utilize the remaining bandwidth of high-priority service, has improved bandwidth availability ratio.
Be described in detail below in conjunction with 4 pairs of business flow monitoring methods of the present invention of accompanying drawing.
Among Fig. 4, the token bucket on right side is second token bucket, it is the total service traffics token bucket of user, the token bucket in left side is first token bucket, be user's high-priority service flow token bucket, be provided with 2 burstiness B1 and B2 in the total service traffics token bucket of user, wherein B1 is provided with at the low priority traffice burstiness, B2 is provided with at the high-priority service burstiness, and B2〉B1.User's high-priority service flow token bucket is provided with 1 burstiness Bh.
The token that the first token maker generates is put in first token bucket, and when the byte number of the token number correspondence in first token bucket arrives burstiness Bh, the newly-generated token of the first token maker will be dropped.The token that the second token maker generates is put in second token bucket, and when the byte number of the token number correspondence in second token bucket arrives burstiness B2, the newly-generated token of the second token maker will be dropped.B1 only uses as restriction low priority traffice burstiness.
Supervisory systems is when carrying out traffic policing to user's high-priority service, the byte number of token number correspondence in the byte number that at first judge to need the byte number of the high-priority service of transmission whether to be lower than simultaneously to equal token number correspondence in first token bucket, second token bucket, if above-mentioned two conditions all satisfy, supervisory systems allows the transmission of this high-priority service, supervisory systems all deducts the token that is equivalent to the high-priority service byte number from two token buckets in this high-priority service transmission; Supervisory systems also can promptly when determining this high-priority service transmission of permission, all deduct the token that is equivalent to the high-priority service byte number from two token buckets before the transmission high-priority service; In addition, supervisory systems is when determining this high-priority service transmission of permission, can be with message transmission such as this high-priority service information such as professional length to next module, supervisory systems also can all deduct the token that is equivalent to the high-priority service byte number from two token buckets after this high-priority service message transmission is finished; If there is a condition satisfied or satisfied in above-mentioned two conditions, supervisory systems is forbidden the transmission of this high-priority service, and it is abandoned.
When supervisory systems is carried out traffic policing at the low priority traffice to the user, whether the byte number of at first judging the low priority traffice that needs transmission is lower than the byte number that equals token number correspondence in second token bucket, if above-mentioned condition satisfies, supervisory systems allows the transmission of this low priority traffice, supervisory systems is in this low priority traffice transmission, from second token bucket, deduct the token that is equivalent to the low priority traffice byte number, supervisory systems also can be before the transmission low priority traffice, promptly when determining this low priority traffice transmission of permission, from second token bucket, deduct the token that is equivalent to the low priority traffice byte number; In addition, supervisory systems is when determining this low priority traffice transmission of permission, can be with message transmission such as this low priority traffice information such as professional length to next module, supervisory systems also can deduct the token that is equivalent to the high-priority service byte number from second token bucket after this low priority traffice message transmission is finished; If above-mentioned condition does not satisfy, supervisory systems is forbidden the transmission of this low priority traffice, and it is abandoned.
By above-mentioned traffic policing, one aspect of the present invention can guarantee that the customer service total flow is no more than the agreement total bandwidth, on the other hand, can guarantee that user's high-priority service flow is no more than the bandwidth of agreement, and, when user's high-priority service flow during less than the bandwidth of agreement, low priority traffice can utilize the remaining bandwidth of high-priority service, simultaneously, when the customer service total flow surpasses the agreement total bandwidth, guaranteed user's high-priority service flow.
Describe below in conjunction with 5 pairs of monitoring and managing methods of the present invention of accompanying drawing.
Among Fig. 5, in step 500, the user grouping message that need carry out business flow monitoring inserts supervisory systems.
To step 510, supervisory systems judges whether this user grouping message is high-priority service, if the user grouping message is a high-priority service, to step 520, supervisory systems is that the corresponding byte number Ttoken_len of current token total amount, the magnitude relationship between user's high-priority service burstiness Bh compare in the message length Pkt_len of the user grouping message total professional token bucket of byte number Htoken_len, user corresponding with current token total amount in user's high-priority service token bucket to the byte number of this user grouping message correspondence.
If Pkt_len<=Htoken_len and Pkt_len<=Ttoken_len then arrive step 530, supervisory systems allows this high-priority service transmission.Next, to step 540, in the high-priority service transmission, from user's high-priority service token bucket, in the total professional token bucket of user, all deduct the token that is equivalent to this high-priority service byte number Pkt_len.This business flow monitoring process is finished, if also have other message to need supervision, returns step 500.
In step 520, if Pkt_len〉Htoken_len or Pkt_len〉Ttoken_len, then arrive step 521, supervisory systems abandons this high-priority service.
In step 510, if it is low priority traffice that supervisory systems is determined this user grouping message, to step 550, supervisory systems is that magnitude relationship between the message length Pkt_len of the user grouping message byte number Ttoken_len corresponding with current token total amount in the total professional token bucket of user compares to the byte number of this user grouping message correspondence.
If Pkt_len<=Ttoken_len then arrives step 560, supervisory systems allows this low priority traffice transmission.To step 570, in the low priority traffice transmission, from the total professional token bucket of user, deduct the token that is equivalent to this low priority traffice byte number.This business flow monitoring process is finished, if also have other message to need supervision, returns step 500.
In step 550, if Pkt_len〉Ttoken_len, then arrive step 521, supervisory systems abandons this low priority traffice.
The present invention also can adopt Lou the mode of bucket to realize business flow monitoring, and its implementation procedure is:
At first, supervisory systems is provided with the capacity of the first leakage bucket according to the bursts of traffic degree of consumer premise business, and the speed that spills of the first leakage bucket is set according to the average bandwidth of consumer premise business; Supervisory systems also needs according to the total professional bursts of traffic degree of user second capacity that leaks bucket to be set, and according to the total professional average bandwidth of user second speed that spills of leaking bucket is set.
Like this, supervisory systems just can be determined the current maximum transmitted byte number that can provide for user's intended service according to first residual capacity of leaking in the bucket, just can determine the current maximum transmitted byte number that can provide for total business of user according to second residual capacity of leaking in the bucket.
Be user's intended service and user total business setting after leaking bucket, supervisory systems is when carrying out traffic policing to user's high-priority service, whether the byte number of at first judging the high-priority service that needs transmission is lower than residual capacity, second residual capacity of leaking in the bucket that equals in the first leakage bucket simultaneously, if above-mentioned two conditions all satisfy, supervisory systems allows the transmission of this high-priority service, supervisory systems all deducts the capacity that is equivalent to the high-priority service byte number from the residual capacity of two leakage buckets in this high-priority service transmission; If there is a condition not satisfy in above-mentioned two conditions, perhaps two conditions all do not satisfy, and supervisory systems is forbidden the transmission of this high-priority service, and it is abandoned.
When supervisory systems is carried out traffic policing at the low priority traffice to the user, whether the byte number of at first judging the low priority traffice that needs transmission is lower than the residual capacity that equals in the second leakage bucket, if this condition satisfies, supervisory systems allows the transmission of this low priority traffice, supervisory systems deducts the capacity that is equivalent to the low priority traffice byte number from the residual capacity of the second leakage bucket in this low priority traffice transmission; If above-mentioned condition does not satisfy, supervisory systems is forbidden the transmission of this low priority traffice, and it is abandoned.Adopt the leakage bucket different business to be realized the realization principle of traffic policing is basic identical with the principle of using token bucket realization traffic policing, be not described in detail at this.
The present invention can be in the traffic policing process, token bucket promptly is set Lou bucket is set again, as business setting token bucket to some priority, bucket etc. is leaked in business setting to some priority, no matter adopt any method that above-mentioned maximum transmitted byte number is provided, it realizes that the traffic policing process of intended service all is that the byte number of the intended service of needs transmission and the current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user are compared, and the specific implementation process is not described in detail at this.
Supervisory systems of the present invention mainly comprises: storage maximum transmitted byte number module and traffic policing module.
Storage maximum transmitted byte number module is mainly used in: current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user are provided.Storage maximum transmitted byte number module can adopt token algorithm or token bucket algorithm to realize, that is to say, storage maximum transmitted byte number module can be passed through intended service corresponding token bucket, token maker, and the total professional corresponding token bucket of user, token maker are realized; Storage maximum transmitted byte number module also can be by the leakage bucket of intended service correspondence, and the total professional corresponding leakage bucket of user is realized.When token bucket/leakage bucket was set, the speed of the number of token bucket/leakages bucket, capacity, token maker generation token etc. were identical with the description of foregoing description method, are not described in detail at this.
The traffic policing module is mainly used in: when two maximum transmitted byte numbers that the byte number of the consumer premise business that determine to need transmission is set in simultaneously smaller or equal to above-mentioned storage maximum transmitted byte number module, allow this user's intended service transmission, otherwise, forbid the transmission of this intended service; During the total professional corresponding maximum transmitted byte number of the user who sets in smaller or equal to storage maximum transmitted byte number module at the byte number of the non-intended service of user that determine to need transmission, allow user's non-intended service transmission, otherwise, forbid the transmission of this intended service.As when storage maximum transmitted byte number module adopts token bucket algorithm, the traffic policing module equals less than the token quantity in two token buckets simultaneously at the byte number of the high-priority service of needs transmission, and the burstiness of high-priority service is during less than the burstiness of high-priority service token bucket, the transmission of permission high-priority service, otherwise, forbid the high-priority service transmission, abandon this high-priority service; The traffic policing module the byte number of the low priority traffice of needs transmission smaller or equal to the user token quantity in total professional token bucket, and the burstiness of low priority traffice is during smaller or equal to the burstiness of low priority traffice token bucket, the transmission of permission low priority traffice, otherwise, forbid the low priority traffice transmission, abandon this low priority traffice.Concrete as the description in the above-mentioned method.
Though described the present invention by embodiment, those of ordinary skills know, the present invention has many distortion and variation and do not break away from spirit of the present invention, and the claim of application documents of the present invention comprises these distortion and variation.

Claims (10)

1, a kind of business flow monitoring method is characterized in that, comprising:
Current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user are provided for a, supervisory systems;
B, supervisory systems during simultaneously smaller or equal to described two maximum transmitted byte numbers, allow described user's intended service transmission at the byte number of consumer premise business that need to determine transmission;
C, supervisory systems during smaller or equal to the total professional corresponding maximum transmitted byte number of described user, allow described user's non-intended service transmission at the byte number of the non-intended service of user that need to determine transmission;
Described intended service is to have the business that traffic threshold is set specially at its flow, the business of described non-intended service for carrying out flow control by the total service traffics thresholding of user.
2, the method for claim 1 is characterized in that, described step a comprises:
Supervisory systems is determined current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user according to token bucket algorithm or token bucket algorithm.
3, method as claimed in claim 2 is characterized in that, among the described step a: when intended service when being a plurality of, all corresponding token bucket algorithm of each intended service or token bucket algorithm.
4, method as claimed in claim 2 is characterized in that, described step a specifically comprises:
A1, supervisory systems are provided with the traffic threshold of first token bucket according to the bursts of traffic degree of consumer premise business, the token formation speed of first token bucket is set according to the average bandwidth of consumer premise business, and the traffic threshold of second token bucket is set according to the total professional bursts of traffic degree of user, the token formation speed of second token bucket is set according to the total professional average bandwidth of user;
A2, supervisory systems the current maximum transmitted byte number that can provide for user's intended service are provided and are determined the current maximum transmitted byte number that can provide for total business of user according to the token number in second token bucket according to the token number in first token bucket.
5, method as claimed in claim 4 is characterized in that, described step b, c comprise:
Supervisory systems is at the byte number of the consumer premise business that determine to need transmission during simultaneously smaller or equal to the byte number of the token quantity correspondence in first token bucket, second token bucket, allow the professional transmission of this consumer premise, and from first token bucket, second token bucket, deduct corresponding token number respectively according to the byte number of this intended service;
Otherwise, abandon described user's intended service;
Supervisory systems is at the byte number of the non-intended service of user that determine to need transmission during smaller or equal to the byte number of the token quantity correspondence in second token bucket, allow the non-intended service transmission of this user, and from second token bucket, deduct corresponding token number according to the byte number of this non-intended service;
Otherwise, abandon described user's non-intended service.
6, method as claimed in claim 2 is characterized in that, described step a specifically comprises:
A3, supervisory systems are provided with the capacity of the first leakage bucket according to the bursts of traffic degree of consumer premise business, average bandwidth according to the consumer premise business is provided with first speed that spills of leaking bucket, and second capacity that leaks bucket is set according to the total professional bursts of traffic degree of user, according to the total professional average bandwidth of user second speed that spills of leaking bucket is set;
A4, supervisory systems the current maximum transmitted byte number that can provide for user's intended service are provided and are determined the current maximum transmitted byte number that can provide for total business of user according to second residual capacity of leaking in the bucket according to first residual capacity of leaking in the bucket.
7, method as claimed in claim 6 is characterized in that, described step b, c comprise:
When supervisory systems is leaked the residual capacity that bucket, second leaks in the bucket less than first simultaneously at the byte number of the consumer premise business that determine to need transmission, allow the professional transmission of this consumer premise, and the residual capacity in the first leakage bucket, the second leakage bucket is deducted the byte number of this intended service respectively;
Otherwise, abandon described user's intended service;
Supervisory systems the byte number of the non-intended service of user that determine to need transmission less than second leak in the bucket residual capacity the time, allow the non-intended service transmission of this user, and leak the byte number that residual capacity in the bucket deducts this non-intended service second;
Otherwise, abandon described user's non-intended service.
8, a kind of business flow monitoring system is characterized in that, comprising:
Determine maximum transmitted byte number module: determine current maximum transmitted byte number that can provide and the current maximum transmitted byte number that can provide for total business of user for user's intended service;
Traffic policing module: during simultaneously smaller or equal to described two maximum transmitted byte numbers, allow described user's intended service transmission at the byte number of the consumer premise business that determine to need transmission; During smaller or equal to the total professional corresponding maximum transmitted byte number of described user, allow described user's non-intended service transmission at the byte number of the non-intended service of user that determine to need transmission;
Described intended service is to have the business that traffic threshold is set specially at its flow, the business of described non-intended service for carrying out flow control by the total service traffics thresholding of user.
9, system as claimed in claim 8 is characterized in that: described definite maximum transmitted byte number module is determined current maximum transmitted byte number that can provide for user's intended service and the current maximum transmitted byte number that can provide for total business of user according to token bucket algorithm or token bucket algorithm.
10, a kind of business flow monitoring as claimed in claim 9 system is characterized in that, when described intended service is a plurality of, and all corresponding token bucket algorithm of each intended service or token bucket algorithm.
CNB2006100782589A 2006-05-18 2006-05-18 Business flow monitoring method and system Expired - Fee Related CN100502315C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100782589A CN100502315C (en) 2006-05-18 2006-05-18 Business flow monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100782589A CN100502315C (en) 2006-05-18 2006-05-18 Business flow monitoring method and system

Publications (2)

Publication Number Publication Date
CN101051936A CN101051936A (en) 2007-10-10
CN100502315C true CN100502315C (en) 2009-06-17

Family

ID=38783146

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100782589A Expired - Fee Related CN100502315C (en) 2006-05-18 2006-05-18 Business flow monitoring method and system

Country Status (1)

Country Link
CN (1) CN100502315C (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009246904A (en) * 2008-03-31 2009-10-22 Casio Hitachi Mobile Communications Co Ltd Communication equipment, communicating method and program
CN102368738B (en) * 2011-11-30 2015-04-22 盛科网络(苏州)有限公司 Network rating traffic policing method and system thereof
CN104144131B (en) * 2013-05-10 2017-12-08 中国电信股份有限公司 The method and apparatus that flow control is carried out to number type business
US9262505B2 (en) * 2013-05-17 2016-02-16 Amazon Technologies, Inc. Input-output prioritization for database workload
CN104703203B (en) * 2013-12-06 2018-05-11 中国电信股份有限公司 locating platform traffic scheduling method and device
CN103997467B (en) * 2014-05-20 2017-11-14 深圳市共进电子股份有限公司 A kind of method and device of data flow Stochastic Fair share of bandwidth
CN104702528B (en) * 2015-04-09 2018-07-10 深圳中兴网信科技有限公司 Flow control methods and flow control system
CN105939285A (en) * 2015-08-21 2016-09-14 杭州迪普科技有限公司 Message forwarding method and device
CN105763478A (en) * 2015-12-21 2016-07-13 中国电子科技集团公司第十五研究所 Token bucket algorithm-based satellite data ground transmission network flow control system
CN106982167A (en) * 2017-04-19 2017-07-25 深圳金三立视频科技股份有限公司 Flow managing method and its system
CN112953848B (en) * 2021-03-12 2023-05-02 西安电子科技大学 Traffic supervision method, system and equipment based on strict priority
CN113938435B (en) * 2021-08-30 2024-01-16 奇安信科技集团股份有限公司 Data transmission method, device, electronic equipment, storage medium and program product

Also Published As

Publication number Publication date
CN101051936A (en) 2007-10-10

Similar Documents

Publication Publication Date Title
CN100502315C (en) Business flow monitoring method and system
JP2909165B2 (en) Broadband communication network, end user terminal, communication network, broadband communication node, communication node, interface adapter, multipoint connection interface, multipoint connection control device and access unit
US7908390B2 (en) Packet forwarding apparatus using token bucket algorithm and leaky bucket algorithm
CN102238068B (en) Message transmitting method and system
CN100384156C (en) Method for multiplexing residual bandwidth and network equipment
CA2077027C (en) Packet communications network and communications method
CN103999414B (en) A kind of method and apparatus of attribution for the congestion contribution of the shared resource of relative users register
JPH0514410A (en) Traffic control method
JPS63176045A (en) Method and apparatus for width control type packet exchange
JPH0744542B2 (en) Bandwidth allocation method of virtual path in asynchronous transfer mode
CN101599905B (en) Method, device and system for realizing addition of traffic shaping token
CN102811176B (en) A kind of data flow control method and device
CN101917646B (en) Message transmitting method and device
Fendick Evolution of controls for the available bit rate service
CN101478495B (en) Flow limitation method and apparatus
CN101009637A (en) Service quality control method and system
CN100450103C (en) Method and device for flux plastic
US20110211448A1 (en) Per-class scheduling with rate limiting
US7672242B2 (en) Traffic management device and method thereof
CN111786928A (en) Hierarchical encryption method and system for operation and maintenance of power world-space integrated quantum network
Low et al. Burst reducing servers in ATM networks
JP2004289780A (en) Optical subscriber's line terminal station device, optical subscriber's line termination apparatus and band assignment method to be used thereby
Liu et al. Limited acceleration mechanism for cell loss free flow control in ATM networks
CN107370682A (en) A kind of bit rate control method and server
JPH0637792A (en) Traffic monitor system in asynchronous transfer mode communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090617

Termination date: 20190518