Font Size: a A A

Research And Implement Of Network Traffic Shaping Based On Leak Bucket Method And Token Bucket Algorithm

Posted on:2009-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y F LiuFull Text:PDF
GTID:2178360245454508Subject:Probability theory and mathematical statistics
Abstract/Summary:PDF Full Text Request
Traffic Shaping technology was firstly used in device on which packets were swiched and delivered. This technology mainly aim to resolve the network traffic congest as a result of traffic burst forth. Beacaus the traffic that burst forth may be not the key traffic, thus traffic shaping technology can limit the general traffic amount when traffic burst forth taking place. As result, the percent of general traffic bandwidth was limited to a preset range and prove the performance of QoS of network.This paper introduced the development and researching of traffic shaping of network device in our country and other countries in detail. While this paper also gives the nessisarity and signification of traffic shaping technology to network entironment nowadays. On the base of analyzing sufficiency traffic shaping technology which were studied by the academe, this paper gives the analyzing and collecting of traffic shaping technology which were adapted by the industrial circles. Finally this paper s mainly attention was focus on Leak Bucket Method and Token Bucket Algorithm which were observed by both academe and industrial circles. After do comparing with these two method, this paper gives one traffic shaping method which fits inline network security appliance(eg. IDS/IPS). This method is based on Leak Bucket Method and Token Bucket Algorithm, but we also did some improvement on them, and our method did some conformity to these two method. To verify the rationality of our method, we implement a demo of our method. As our method mainly aim at inline network security appliance which will consume much I/O and computation of system resource, thus the throughput rate and performance will be the key of this method. To resolve it, we adapt the traffic shaping technology and paralleling computation technology on Intel muti-core platform. So, this method can be adapted by the commercialization network security appliance.
Keywords/Search Tags:traffic shaping, Bucket Method, Token Bucket Algorithm
PDF Full Text Request
Related items