CN104270408B - The accelerated method of non-intrusion type WEB requests - Google Patents

The accelerated method of non-intrusion type WEB requests Download PDF

Info

Publication number
CN104270408B
CN104270408B CN201410445047.9A CN201410445047A CN104270408B CN 104270408 B CN104270408 B CN 104270408B CN 201410445047 A CN201410445047 A CN 201410445047A CN 104270408 B CN104270408 B CN 104270408B
Authority
CN
China
Prior art keywords
file
static resource
server
update
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410445047.9A
Other languages
Chinese (zh)
Other versions
CN104270408A (en
Inventor
王航
赵俊辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Youpi Network Technology Co ltd
Original Assignee
Yunnan Stockholm Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan Stockholm Digital Technology Co Ltd filed Critical Yunnan Stockholm Digital Technology Co Ltd
Priority to CN201410445047.9A priority Critical patent/CN104270408B/en
Publication of CN104270408A publication Critical patent/CN104270408A/en
Application granted granted Critical
Publication of CN104270408B publication Critical patent/CN104270408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to software technology fields, more particularly to a kind of accelerated method of non-intrusion type WEB requests, it is characterised in that by using each system or module, can all form a deployment package, system extracts these contents automatically, then changes the network equipment and routing.The accelerated method of non-intrusion type WEB requests using the present invention, Web request accelerator is applied to using MD5 algorithms, the difficulty of comparison is greatly saved, need not cycle and compare each file, it need not compare every time and either carry out file update, reduce file transport overhead;Using event notification mechanism, the maintenance of cluster environment is greatly simplified.

Description

The accelerated method of non-intrusion type WEB requests
Technical field
The present invention relates to software technology field, more particularly to a kind of accelerated method of non-intrusion type WEB requests.
Background technology
With going deep into for enterprise operation system application, business system scale constantly expands, and software complexity is constantly promoted.This It to the developing of information system, integrates, dispose, upgrade etc. and to propose new problem, the high efficiency and autgmentability of system architecture are carried New requirement is gone out.
Information system is generally divided into several parts:1)Background program connects database, does business.2)Some industry on foreground Business logic, control etc., 3)It is presented to the page info of user(UI parts), including picture, layout, pattern, js files.Js files Service logic can also be included.Picture, layout, pattern, the js files of program in itself are typically static.Common static money Source part contains picture file(.jpg .gif .png .bmp), pattern file(.css), js files (.js).
For good user experience, the page info in system(UI parts)With picture, pattern and client script JS files are increasingly complicated, and such Web request occupies substantial amounts of network traffics.And these contents are generally only to be to increase The effect of system, not comprising service logic.
In existing information system, there are substantial amounts of picture (.jpg .gif .png etc.), pattern (.css), client scripts (.js).According to J2EE specifications, these files all exist under the WEB-INF catalogues of software deployment bag for accessing.Deployment is completed Afterwards, program and these static files are all placed in the vessel, and when user accesses, container directly responds user.Such side Formula just brings drawback:
1. static resource file needs network transmission file, therefore can occupy more network bandwidths.Service logic and These static resources occupy identical bandwidth, therefore substantial amounts of bandwidth is occupied by static resource file in same container.Business The bandwidth of logic is with regard to occupied.So traffic handing capacity, concurrent capability will decline.
2. on the one hand network bandwidth is, the second aspect is server thread.Because the page of a usual system, comprising Many static resources such as picture and pattern, since script deployment way is all placed on together.Each to access, operation container can all account for With a server thread.The thread that so service logic needs in itself is with regard to occupied.
3. it is also contemplated for separating static resource during many large business system optimizations.But need manually to be recognized, it takes out It takes., it is necessary to manually build static resource server after extraction, complicated configuration is carried out.
The content of the invention
There are problems that for existing non-intrusion type WEB requests ..., the present invention proposes a kind of non-intrusion type WEB requests Accelerated method.
The present invention provides a kind of accelerated methods of non-intrusion type WEB requests, and based on J2EE application standards, feature exists In:
1)The High Availabitity relevant parameter of program is defined by the page of manager:Minimum and maximum operation node interval;
2)After the completion of definition, deployment package upload is carried out by system;
3)After the completion of uploading verification, system background is decompressed and verified:Verifying content includes bibliographic structure, Engineering describing Accord with file and static resource catalogue;
4)System and state server communicate, and update state server state, write newest deployment package informatin;
5)After the update of state server state, all static resource servers perceive event notice, carry out static Resource TOC compares, synchronous or update, and comparing result determines whether file is updated, and covers and deletes;
6)Change the routing rule of network.User is automatically separated static resource server for the access of static resource On and service logic access link separation.
The step 3)In decompression and checking procedure, it is characterised in that system carry out logical operation, analyze pack arrangement Normalization, judges whether bibliographic structure meets specification, with the presence or absence of WEB-INF, with the presence or absence of Engineering describing file and whether deposit In static resource catalogue.
The step 4)In more new strategy, it is characterised in that after extracted file, compare current static Resource Server on Whether there is the catalogue of the application system, compared using MD5 algorithms and determine whether file needs to change or update:If file MD5 condition codes do not change, then need not separate this document again, improve the performance of program, ensure that separated correct Property;Identifying system title and access address automatically extract static resource file, automatically visit service logic and static resource file It asks and is balanced to different terminals;
The step 5)In event notification mechanism, it is characterised in that it is first when some application program dispose/update First Deployment Manager can first inform state recording module, record current state, the version of system;Then bag verification is carried out, is verified After without exception, it is sent on the server of system and is disposed;Change state server state simultaneously.All static resources Server because employing action listener mechanism, can all receive the event notice of system code variation;Once receive this variation Static resource server just directly into Deployment Manager catalogue, carries out file comparison;MD5 codes, which are not met, then directly carries out file Covering update;If MD5 codes are consistent, then it is assumed that file does not change.
Specifically, it is to static resource file abstracting method:Scan image, static, css below WEB-INF etc. often Catalogue is advised, finds all files of the name with js, css, jpg, bmp, png, gif form, this class file is disposed from Java It is decompressed in bag, and copies the file to static resource server;It first compares on current static Resource Server, if had this The catalogue of a application system;If so, it has not been to dispose for the first time to be proved to be this application, then need under documents catalogue Each file;Comparison is carried out using MD5 condition codes, and MD5 codes are if it does not match, program thinks to need re-synchronization file.
The access address of identifying system, the method that automatic modification accesses balanced device are:After each information system deployment There is the web access address of response;Likewise, static resource is also required for the access address of oneself;For seamless docking, use is allowed Family is imperceptible, and system will change network equilibrium and routing rule automatically;If Operational Visit, then balanced road business service Device if needing to access static resource, then jumps to static resource server.
The accelerated method of the non-intrusion type WEB requests of the present invention, its advantage are:
1)It is applied to Web request accelerator with MD5 algorithms, greatlys save the difficulty of comparison, it is every that comparison need not be cycled One file need not compare and either carry out file update, reduce file transport overhead every time.Either new deployment is still Update below, programmed logic can be unified:The file lacked is just directly subject to Deployment Manager, and alternative document is with newest File MD5 codes subject to.
2)With event notification mechanism, the maintenance of cluster environment is greatly simplified.Institute is stateful to be all sent to state server, Other action listeners person listens to event, is just handled.
Description of the drawings
Fig. 1 is the logic diagram of the non-intrusion type web request accelerated method of the present invention.
Specific embodiment
Embodiment 1:The non-intrusion type web request accelerated method of the present invention carries out under following environment:Client uses Readware hardware is balanced, balanced using Nginx softwares.
1)The High Availabitity relevant parameter of program is defined by the page of manager:Minimum and maximum operation node interval;
2)After the completion of definition, deployment package upload is carried out by system.A deployment package is established to each system or module, Each deployment package contains service logic and static resource file;Deployment package is uploaded by system, system scanning deployment package is right Static resource file is extracted.
3)After the completion of uploading verification, system background is decompressed and verified:Verifying content includes bibliographic structure, Engineering describing Accord with file and static resource catalogue.System carries out logical operation, analyzes the normalization of pack arrangement, judges whether bibliographic structure meets Specification, with the presence or absence of WEB-INF, with the presence or absence of Engineering describing file and with the presence or absence of static resource catalogue.
4)System and state server communicate, and update state server state, write newest deployment package informatin;
5)After the update of state server state, all static resource servers perceive event notice, carry out static Resource TOC compares, synchronous or update, and comparing result determines whether file is updated, and covers and deletes.Comparison is current quiet Whether there is the catalogue of the application system on state Resource Server, compared using MD5 algorithms and determine whether file needs to change Or update:If file MD5 condition codes do not change, this document need not be separated again, improves the performance of program, ensured Separated correctness;Identifying system title and access address automatically extract static resource file, automatically by service logic and quiet The access of state resource file is balanced to different terminals;When some application program dispose/update, Deployment Manager can be first first It informs state recording module, records current state, the version of system;Then bag verification is carried out, after verification is without exception, is sent to It is disposed on the server of system;Change state server state simultaneously.All static resource servers, because employing Action listener mechanism can all receive the event notice of system code variation;Once this variation static resource server is received Directly into Deployment Manager catalogue, file comparison is carried out;MD5 codes, which are not met, then directly carries out file covering update
6)Change the routing rule of network.User is automatically separated static resource server for the access of static resource On and service logic access link separation.
Specifically, it is to static resource file abstracting method:Scan image, static, css below WEB-INF etc. often Catalogue is advised, finds all files of the name with js, css, jpg, bmp, png, gif form, this class file is disposed from Java It is decompressed in bag, and copies the file to static resource server;It first compares on current static Resource Server, if had this The catalogue of a application system;If so, it has not been to dispose for the first time to be proved to be this application, then need under documents catalogue Each file;Comparison is carried out using MD5 condition codes, and MD5 codes are if it does not match, program thinks to need re-synchronization file.
The access address of identifying system, the method that automatic modification accesses balanced device are:After each information system deployment There is the web access address of response;Likewise, static resource is also required for the access address of oneself;For seamless docking, use is allowed Family is imperceptible, and system will change network equilibrium and routing rule automatically;If Operational Visit, then balanced road business service Device if needing to access static resource, then jumps to static resource server.

Claims (4)

1. a kind of accelerated method of non-intrusion type WEB requests, based on J2EE application standards, it is characterised in that:
1)The High Availabitity relevant parameter of program is defined by the page of manager:Minimum and maximum operation node interval;
2)After the completion of definition, deployment package upload is carried out by system;
3)After the completion of uploading verification, system background is decompressed and verified:Verifying content includes bibliographic structure, Engineering describing symbol text Part and static resource catalogue;
4)System and state server communicate, and update state server state, write newest deployment package informatin;
5)After the update of state server state, all static resource servers perceive event notice, carry out static resource Catalogue compares, synchronous or update, and comparing result determines whether file is updated, and covers and deletes;
6)Change the routing rule of network;
User is automatically separated for the access of static resource on static resource server and the access link of service logic is divided From.
2. the accelerated method of non-intrusion type WEB requests as described in claim 1, it is characterised in that step 3)In decompression and school Process is tested, system carries out logical operation, analyzes the normalization of pack arrangement, judge whether bibliographic structure meets specification, whether there is WEB-INF, with the presence or absence of Engineering describing file and with the presence or absence of static resource catalogue.
3. the accelerated method of non-intrusion type WEB requests as described in claim 1, it is characterised in that step 4)In more new strategy It is that the catalogue for whether having had the application system on current static server is compared after extracted file, is compared using MD5 algorithms true Determine whether file needs to change or update:If file MD5 spy detects codes do not change, this document need not be separated again, The performance of program is improved, ensure that separated correctness;Identifying system title and access address automatically extract static resource text Service logic and static resource file access are balanced to different terminals by part automatically.
4. the accelerated method of the non-intrusion type WEB requests as described in claim 1 or 3, it is characterised in that step 5)In event Informing mechanism, when some application program dispose/update, Deployment Manager can first inform state recording module first, note The current state of recording system, version;Then bag verification is carried out, after verification is without exception, is sent on the server of system and carries out Deployment;Change state server state simultaneously;
All static resource servers, because employing action listener mechanism, the event that can all receive system code variation is led to Know;Once this variation static server is received directly into Deployment Manager catalogue, file comparison is carried out;MD5 codes are not inconsistent It closes and then directly carries out file covering update;If MD5 codes are consistent, then it is assumed that file does not change.
CN201410445047.9A 2014-09-03 2014-09-03 The accelerated method of non-intrusion type WEB requests Active CN104270408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410445047.9A CN104270408B (en) 2014-09-03 2014-09-03 The accelerated method of non-intrusion type WEB requests

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410445047.9A CN104270408B (en) 2014-09-03 2014-09-03 The accelerated method of non-intrusion type WEB requests

Publications (2)

Publication Number Publication Date
CN104270408A CN104270408A (en) 2015-01-07
CN104270408B true CN104270408B (en) 2018-06-05

Family

ID=52161897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410445047.9A Active CN104270408B (en) 2014-09-03 2014-09-03 The accelerated method of non-intrusion type WEB requests

Country Status (1)

Country Link
CN (1) CN104270408B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110389931A (en) * 2018-04-12 2019-10-29 北京京东尚科信息技术有限公司 A kind of method and apparatus that file end to end is issued based on container

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101126977A (en) * 2007-08-28 2008-02-20 激动集团股份有限公司 ISAPI based WEB static page generation method
US7788291B2 (en) * 2007-09-25 2010-08-31 Barracuda Networks, Inc. Web accelerator apparatus, system, and method
CN102184266A (en) * 2011-06-27 2011-09-14 武汉大学 Method for automatically generating dynamic wireless application protocol (WAP) website for separation of page from data
CN102804166A (en) * 2009-06-03 2012-11-28 克德科软件股份有限公司 Web page optimization
CN102915327A (en) * 2012-09-05 2013-02-06 吴小军 Double track synchronous synergy website system with dynamic/static webpage
CN103347089A (en) * 2013-07-16 2013-10-09 星云融创(北京)信息技术有限公司 Method and device for separating and accelerating dynamic resources and static resources of website
CN103905472A (en) * 2012-12-25 2014-07-02 中国移动通信集团江苏有限公司 Cloud storage method and system for access through webpage mode

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101126977A (en) * 2007-08-28 2008-02-20 激动集团股份有限公司 ISAPI based WEB static page generation method
US7788291B2 (en) * 2007-09-25 2010-08-31 Barracuda Networks, Inc. Web accelerator apparatus, system, and method
CN102804166A (en) * 2009-06-03 2012-11-28 克德科软件股份有限公司 Web page optimization
CN102184266A (en) * 2011-06-27 2011-09-14 武汉大学 Method for automatically generating dynamic wireless application protocol (WAP) website for separation of page from data
CN102915327A (en) * 2012-09-05 2013-02-06 吴小军 Double track synchronous synergy website system with dynamic/static webpage
CN103905472A (en) * 2012-12-25 2014-07-02 中国移动通信集团江苏有限公司 Cloud storage method and system for access through webpage mode
CN103347089A (en) * 2013-07-16 2013-10-09 星云融创(北京)信息技术有限公司 Method and device for separating and accelerating dynamic resources and static resources of website

Also Published As

Publication number Publication date
CN104270408A (en) 2015-01-07

Similar Documents

Publication Publication Date Title
US10621212B2 (en) Language tag management on international data storage
CN102135892B (en) Application program running method, device and system
CN106462430B (en) Application upgrade package obtaining method and device
US8640251B1 (en) Methods and systems for classifying computer documents into confidential levels using log information
CN106991035A (en) A kind of Host Supervision System based on micro services framework
JP5575071B2 (en) Information processing apparatus, information processing method, and program
JP6301256B2 (en) Processing method, computer program, and metadata support server
US20130227085A1 (en) Terminal and method for using cloud services
CN109800005B (en) Client hot update method and device
CN104615598B (en) The emigration processing method and device of meta data server
US9420070B2 (en) Streaming zip
US10564961B1 (en) Artifact report for cloud-based or on-premises environment/system infrastructure
WO2015172451A1 (en) Software upgrade method, server and terminal
US20080178173A1 (en) Enhanced Flexibility in Deployment of Patches to Fix Errors in Pre-installed Software
JP6615071B2 (en) Computer system and test case management method
US20170270031A1 (en) Information processing apparatus, test execution method, and computer-readable recording medium
CN104270408B (en) The accelerated method of non-intrusion type WEB requests
US9176974B1 (en) Low priority, multi-pass, server file discovery and management
US20160224650A1 (en) Method for performing file synchronization control, and associated apparatus
CN112799682B (en) Data acquisition and processing system and method for operating multi-version application thereof
US8347315B1 (en) Configuration console for messaging middleware
CN115640066A (en) Security detection method, device, equipment and storage medium
US11630742B2 (en) System and method of performing recovery using a backup image
CN112667491B (en) Function test method and device for virtual machine
CN112887352B (en) Image file uploading method and device for Docker container

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 650000 Yunnan province Haiyuan Kunming high tech Development Zone, Road No. 1520, Yunnan University of science and Technology Park, Overseas Students Pioneer Park a A building fourth floor No. 422-5

Applicant after: Yunnan Stockholm Digital Technology Co.,Ltd.

Address before: 650000 Yunnan province Kunming Chuncheng Road No. 219 Yunnan far letter digital communication technology Co. Ltd.

Applicant before: YUNNAN YUANXIN SHUTONG TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230801

Address after: Room 02, 6th Floor, Building 1, No. 5709 Shenjiang Road and No. 26 Qiuyue Road, China (Shanghai) Pilot Free Trade Zone, Pudong New Area, Shanghai, 200020

Patentee after: Shanghai Youpi Network Technology Co.,Ltd.

Address before: No. 422-5, 4th Floor, Building A, Phase I, University Science Park, No. 1520 Haiyuan Middle Road, High tech Development Zone, Kunming City, Yunnan Province, 650000

Patentee before: Yunnan Stockholm Digital Technology Co.,Ltd.

TR01 Transfer of patent right