Network traffic control is a measure to control network data traffic through software or hardware.
Network traffic control is a method to control computer network traffic by using software or hardware. The main method is to introduce the concept of QoS, from marking different types of network packets to determining the priority of packet traffic.
The speed of DTE and DCE is very different, so it is very likely that the receiver will not receive the data during transmission and reception. At this time, it is necessary to control the sender to avoid data loss.
Used to control the data flow between the modem and the computer, which can prevent the data loss caused by the mismatch of communication processing speed between the computer and the modem. There are usually hardware flow control (RTS/CTS) and software flow control (XOFF).
DCE: data circuit-terminal equipment, data terminal equipment, equipment directly connected to the channel. DCE is modern when the channel is analog. When the channel is a digital channel, DCE is a bridge, switch, router, etc. [ 1]
DTE (Data Terminal Equipment) refers to the transmission speed from the local computer to the modem. If the telephone line transmission speed (DCE speed) is 56,000 bps, the modem decompresses 56,000× 4 =11000 bps according to the V.42 bis protocol after receiving the data. Then it is transmitted to the computer at this rate, so it can be seen that the DTE speed of a 56K cat (using V.42bis) should reach 1 15200bps in an ideal state.
flow control
Definition: Flow control is used to prevent frame loss when the port is blocked. This method is realized by sending the blocking signal back to the source address when the sending or receiving buffer begins to overflow. Flow control can effectively prevent the impact of a large number of instantaneous data on the network and ensure the efficient and stable operation of the user network.
Two methods to control the flow:
1, in half-duplex mode, flow control is realized by backrest pressure, which is what we usually call back pressure counting. This counting makes the information source slow down by sending an interference signal to the sending source.
2. In full-duplex mode, the flow control generally follows the IEEE 802.3X standard, and the switch sends a "pause" frame to the information source to make it stop sending.
The flow control of some switches will block the input of the whole LAN and greatly reduce the network performance; High-performance switches only block the ports of incoming frames to exchange congested ports. By using flow control, the data flow between sending and receiving nodes can be controlled, thus preventing packet loss.
Flight process editor
Airtrafficcontrol (ATC) means that air traffic controllers on the ground coordinate and guide the navigation routes and flight modes of different aircraft in airspace or airport to prevent accidents on the ground or in the air and ensure their smooth operation and maximum efficiency. In addition, the air traffic control system will also provide information such as weather, air traffic flow, navigation notices and special airport arrangements to help pilots and airlines make corresponding arrangements. Stepping into the 2nd/kloc-0th century, with the increase of terrorist attacks related to aviation activities, air traffic control systems also play the role of airspace defense and homeland security. In some countries, air traffic control systems are even operated by air forces (such as the Brazilian Air Force). Aircraft can still fly without air traffic control, but the existence of control can effectively ensure the safety of aircraft flying in the air.
Short for flow control. Flow control refers to maintaining safe air traffic flow by limiting the number of aircraft entering an air traffic control node per unit time. That is, planes queue up one after another on the tarmac or in the air to wait for instructions to take off or land. Just like when you check in, for flight safety, you need to queue up for security check one by one.
\
Reason: In order to ensure the safety of flight and passengers' lives and property, the weather at the departure airport, route and destination airport may be bad (such as thunderstorm in summer, typhoon in winter, snowfall and freezing), or there are military exercises or emergencies in this area, or there are too many take-off and landing flights in this airspace in a certain period of time, and the flight flow is limited (the air is not like a traffic jam on the ground, so once the plane cannot stay in the air,
Objective: Flight safety, passengers' life and property safety and smooth flight.
Data stream editing
It can also be understood as a kind of traffic shaping, which is a network traffic management technology of computer network. It is one of the main forms of rate limitation to delay some or all data packets to meet the network traffic rules that people need.
Network flow control is used to optimize or ensure performance, improve delay and/or increase the available bandwidth of certain types of packet delay to meet certain conditions. If a link approaches the saturation point, the network delay may rise sharply. Therefore, network flow control can be used to prevent this from happening and keep the inspection delayed.
Network traffic control provides a method to control the amount of data (bandwidth limitation) sent to the network within a specified time, or the maximum rate of data traffic transmission. There are many ways to achieve this control, but generally speaking, network traffic control is always achieved by delaying the delivery of data packets. This method is generally applied to the edge of the network to control the traffic entering the network, but it can also be directly applied to data sources (such as computers or network cards) or an element in the network.
Network flow control editing
Control realization
With the rapid development of network technology, network-based applications are becoming more and more complex. Various applications are devouring more and more network resources. As a new media carrier, the network is also being impacted by the media. In particular, the penetration of Internet by online video, personal media, traditional TV and other media has led to a sharp increase in network traffic and greatly increased the operation and management costs of operators. Operators can control network traffic by current limiting, but it also limits the development of network media, which is not conducive to the further development of the Internet. Therefore, developing a new technology to control network traffic has become a research hotspot.
At present, Internet traffic is mainly generated by P2P and HTTP. It is estimated that these two kinds of traffic have accounted for more than 70% of the total traffic, and they are still rising. Therefore, the focus of traffic control is P2P and HTTP, and reducing the traffic generated by these two protocols will effectively reduce the overall network traffic. By comparing various network flow control systems, an optimal system is adopted. The system is deployed at the network exit to cache P2P and HTTP traffic, and subsequent requests for the same resource will get cached responses, thus reducing network traffic, saving bandwidth and improving user experience.
trait
(1) Content-based session identification can identify the application of each network session through high-speed in-depth protocol analysis, intercept a certain protocol or formulate corresponding bandwidth allocation strategy, while traditional network devices such as routers and firewalls can only identify it at the primary level according to the port.
(2) The intelligent bandwidth adjustment function can intelligently adjust the bandwidth allocation mode of terminals in the network according to the network load. For example, terminals with heavy network load and large traffic will be automatically restricted to ensure that most users' network applications can respond normally and quickly; When the network load is light, the loose bandwidth processing strategy is adopted to make full use of the network bandwidth.
(3) Based on the resource control of terminals, only one rule needs to be set, which can limit the upper limit of bandwidth usage of each terminal, and at the same time, the number of sessions of each terminal can be set, so as to prevent the exhaustion of network resources caused by a virus and other prisoners.
(4) Dynamically allocate bandwidth on demand Because the HTTD bandwidth management system can understand the relationship between the sessions of the second and seventh protocol layers and even the network, it can automatically distinguish the applications of various protocols, services and depth rate control technologies.
(DeeperRateControl), according to the basic characteristics of 1P address, subnet, server location, protocol, application port, application type and the correlation analysis of applications, this information flow can be distinguished from other information flows, and then appropriate or appropriate bandwidth rights and bandwidth strategies can be given according to different needs. Bandwidth levels and bandwidth policies can be divided by intervals, and the implementation can be hard or flexible. According to different flexible implementations, bandwidth privileges and strategies can be given.