Modeling packet traffic using an inverse leaky bucket
First Claim
Patent Images
1. A method of determining Leaky Bucket parameters for modeling packet traffic, wherein the packet traffic includes a plurality of provided packets, the method comprising:
- for at least one packet among the plurality of provided packets,obtaining packet traffic information associated with the packet;
comparing the obtained packet traffic information with stored Leaky Bucket parameters;
determining, based on the comparing, whether the packet associated with the packet traffic information conforms to a Leaky Bucket defined by the stored Leaky Bucket parameters, including at least a tolerance parameter L;
if it is determined that the packet does not conform based on a value of the packet information being determined to be greater than the tolerance parameter L, modifying one or more of the Leaky Bucket parameters, without discarding the packet, to make the packet conform;
storing the one or more modified Leaky Bucket parameters in a non-transitory computer-readable storage medium;
consolidating packet information of consecutive packets of the packet traffic; and
updating the packet traffic information to include the consolidated packet information,whereinthe Leaky Bucket parameters include the tolerance parameter L and a target packet inter-arrival interval,the determining includesdetermining, based on the obtained packet traffic information, whether the packet would be a conforming packet in the Leaky Bucket parameterized by the tolerance parameter L and the target packet inter-arrival interval, andthe modifying includesgenerating, if the determining determines that the packet would not be a conforming packet, a new target packet inter-arrival interval for which the packet would be a conforming packet.
4 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, method, and computer program of modeling packet traffic in terms of Leaky Bucket parameters. The Leaky Bucket parameters are tested based on conformance of packet traffic. If a result of the testing is nonconformance of the packet traffic, one or more of the Leaky Bucket parameters is modified such that the packet traffic is conforming. The one or more modified Leaky Bucket parameters is stored in a computer-readable storage medium.
18 Citations
20 Claims
-
1. A method of determining Leaky Bucket parameters for modeling packet traffic, wherein the packet traffic includes a plurality of provided packets, the method comprising:
for at least one packet among the plurality of provided packets, obtaining packet traffic information associated with the packet; comparing the obtained packet traffic information with stored Leaky Bucket parameters; determining, based on the comparing, whether the packet associated with the packet traffic information conforms to a Leaky Bucket defined by the stored Leaky Bucket parameters, including at least a tolerance parameter L; if it is determined that the packet does not conform based on a value of the packet information being determined to be greater than the tolerance parameter L, modifying one or more of the Leaky Bucket parameters, without discarding the packet, to make the packet conform; storing the one or more modified Leaky Bucket parameters in a non-transitory computer-readable storage medium; consolidating packet information of consecutive packets of the packet traffic; and updating the packet traffic information to include the consolidated packet information, wherein the Leaky Bucket parameters include the tolerance parameter L and a target packet inter-arrival interval, the determining includes determining, based on the obtained packet traffic information, whether the packet would be a conforming packet in the Leaky Bucket parameterized by the tolerance parameter L and the target packet inter-arrival interval, and the modifying includes generating, if the determining determines that the packet would not be a conforming packet, a new target packet inter-arrival interval for which the packet would be a conforming packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. An apparatus for determining Leaky Bucket parameters for modeling packet traffic, wherein the packet traffic includes a plurality of provided packets, the apparatus comprising:
-
an obtainer that obtains packet traffic information associated with at least one packet among the plurality of packet; a comparer that compares the obtained packet traffic information with stored Leaky Bucket parameters, including at least a tolerance parameter L; a determiner that, based on the comparison of the comparer, determines whether the packet associated with the packet traffic information conforms to a Leaky Bucket defined by the stored Leaky Bucket parameters; a modifier that, if it is determined that the packet does not conform based on a value of the packet information being determined to be greater than the tolerance parameter L, modifies one or more of the Leaky Bucket parameters, without discarding the packet, to make the packet conform; a storage unit that stores the one or more modified Leaky Bucket parameters; and a packet consolidator that consolidates packet information of consecutive packets of the packet traffic, and updates the packet traffic information to include the consolidated packet information, wherein the Leaky Bucket parameters include a tolerance parameter L and a target packet inter-arrival interval, the determiner determines, based on the obtained packet traffic information, whether the packet would be a conforming packet in the Leaky Bucket parameterized by the tolerance parameter L and the target packet inter-arrival interval, and the modifier generates, if the determiner determines that the packet would not be a conforming packet, a new target packet inter-arrival interval for which the provided packet would be a conforming packet. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium having computer-executable program instructions stored thereon, for determining Leaky Bucket parameters for modeling packet traffic, wherein the packet traffic includes a plurality of provided packets, the program instructions being executable by a computer to perform the method of
for each packet, obtaining packet traffic information associated with the packet; -
comparing the obtained packet traffic information with stored Leaky Bucket parameters; determining, based on the comparing, whether the packet associated with the packet traffic information conforms to a Leaky Bucket defined by the stored Leaky Bucket parameters, including at least a tolerance parameter L; if it is determined that the packet does not conform based on a value of the packet information being determined to be greater than the tolerance parameter L, modifying one or more of the Leaky Bucket parameters, without discarding the packet, to make the packet conform; storing the one or more modified Leaky Bucket parameters in the non-transitory computer-readable storage medium; consolidating packet information of consecutive packets of the packet traffic; and updating the packet traffic information to include the consolidated packet information, wherein the Leaky Bucket parameters include tolerance parameter L and a target packet inter-arrival interval, the determining includes determining, based on the obtained packet traffic information, whether the packet would be a conforming packet in the Leaky Bucket parameterized by the tolerance parameter L and the target packet inter-arrival interval, and the modifying includes generating, if the determining determines that the packet would not be a conforming packet, a new target packet inter-arrival interval for which the packet would be a conforming packet. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification