Invention Grant
US09160669B2 Method and device for leaky bucket speed-limitation 有权
漏斗速度限制的方法和装置

  • Patent Title: Method and device for leaky bucket speed-limitation
  • Patent Title (中): 漏斗速度限制的方法和装置
  • Application No.: US14127862
    Application Date: 2011-06-28
  • Publication No.: US09160669B2
    Publication Date: 2015-10-13
  • Inventor: Junjie YinYi Liu
  • Applicant: Junjie YinYi Liu
  • Applicant Address: CN Shenzhen, Guangdong
  • Assignee: ZTE CORPORATION
  • Current Assignee: ZTE CORPORATION
  • Current Assignee Address: CN Shenzhen, Guangdong
  • Agency: Neifeld IP Law, PC
  • International Application: PCT/CN2011/076465 WO 20110628
  • International Announcement: WO2013/000116 WO 20130103
  • Main IPC: H04L1/00
  • IPC: H04L1/00 H04L12/819
Method and device for leaky bucket speed-limitation
Abstract:
The disclosure discloses a method for traffic limitation by a leaky bucket, including that: during traffic-limitation of a group of packets sharing a same leaky bucket and having separate weighted priorities, the overall leaky bucket is divided into multiple sub-buckets according to priority parameters of the packets including a number of the weighted priorities and ratios between the weighted priorities; after packet information is received, parameters relevant to traffic-limitation by a leaky bucket is acquired; a total number of tokens to be added to the overall leaky bucket is calculated; token-addition is performed on the sub-buckets according to a state of the overall leaky bucket after addition of the total number of tokens and the weighted priorities corresponding to the sub-buckets; a packet is forwarded, or discarded, or marked according to a length of the packet and a number of tokens in a sub-bucket corresponding to a weighted priority, wherein in performing token-addition on the sub-buckets, after token-addition is performed on all the sub-buckets, any overrunning token is allocated to another sub-bucket not overrun with tokens. The disclosure further discloses a device for traffic limitation by a leaky bucket. With the disclosure, it is possible to limit packet traffic flexibly according to weighted priorities and improve resource utilization.
Public/Granted literature
Information query
Patent Agency Ranking
0/0