CN114726806A - Intelligent device shadow management method, system, device, equipment and medium - Google Patents

Intelligent device shadow management method, system, device, equipment and medium Download PDF

Info

Publication number
CN114726806A
CN114726806A CN202210319886.0A CN202210319886A CN114726806A CN 114726806 A CN114726806 A CN 114726806A CN 202210319886 A CN202210319886 A CN 202210319886A CN 114726806 A CN114726806 A CN 114726806A
Authority
CN
China
Prior art keywords
shadow
copy
actual
actual copy
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210319886.0A
Other languages
Chinese (zh)
Inventor
杨包青
管凯琳
张晓濛
郭祖龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Uisee Shanghai Automotive Technologies Ltd
Original Assignee
Uisee Shanghai Automotive Technologies Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Uisee Shanghai Automotive Technologies Ltd filed Critical Uisee Shanghai Automotive Technologies Ltd
Priority to CN202210319886.0A priority Critical patent/CN114726806A/en
Publication of CN114726806A publication Critical patent/CN114726806A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • H04L41/0273Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP]
    • H04L41/0293Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP] for accessing web services by means of a binding identification of the management service or element
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present disclosure relates to a method, system, apparatus, device, and medium for intelligent device shadow management. The method is applied to a service group with a shadow service function, the service group consists of a plurality of actual copies, and the method specifically comprises the following steps: determining the unique identifier of the intelligent equipment sending the handshake message according to the handshake message by the target actual copy receiving the handshake message in the plurality of actual copies; the target actual copy determines a first actual copy corresponding to the shadow of the intelligent device to be created according to the unique identifier; the first actual copy creates a shadow of the smart device according to the unique identifier. The method provided by the invention can improve the management of the shadow of the intelligent equipment, thereby ensuring the complete mapping of the intelligent equipment on the actual copy, and being convenient for the follow-up comprehensive understanding of the running condition of the intelligent equipment through the shadow after the shadow is successfully created.

Description

Intelligent device shadow management method, system, device, equipment and medium
Technical Field
The present disclosure relates to the field of internet of things device management technologies, and in particular, to a method, a system, an apparatus, a device, and a medium for managing a shadow of an intelligent device.
Background
At present, the internet of things equipment is widely used, in the application process of the internet of things, the internet of things equipment needs to perform data interaction with a cloud end, before data interaction is performed, a shadow of the equipment needs to be created at the cloud end, the shadow can be understood as the mapping of the equipment at the cloud end, after the shadow is created successfully, relevant data of the equipment can be reflected through the shadow, a user can know the running condition of the equipment through the mapping of the equipment at the cloud end, but the existing method cannot effectively manage the shadow of the equipment and cannot ensure the complete mapping of the equipment at the cloud end, so that the user cannot comprehensively and accurately view the current condition of the equipment.
Disclosure of Invention
In order to solve the technical problem, the present disclosure provides a method, a system, an apparatus, a device, and a medium for managing a shadow of an intelligent device, which can completely map the intelligent device, and facilitate a comprehensive understanding of an operating status of the intelligent device.
In a first aspect, an embodiment of the present disclosure provides a method for shadow management of an intelligent device, where the method is applied to a service group having a shadow service function, where the service group includes multiple actual copies, and the method includes:
determining the unique identifier of the intelligent equipment which sends the handshake message according to the handshake message by the target actual copy which receives the handshake message in the actual copies;
the target actual copy determines a first actual copy corresponding to the shadow of the intelligent device to be created according to the unique identifier;
and the first actual copy creates a shadow of the intelligent device according to the unique identifier.
In a second aspect, the disclosed embodiments provide a shadow management system for an intelligent device, where the system includes an intelligent device, a message middleware, and multiple actual copies with shadow service functions;
the intelligent equipment sends a handshake message to the message middleware;
the message middleware sends the received handshake messages to the plurality of actual copies;
and the target actual copy of the plurality of actual copies, which receives the handshake message, processes the handshake message to generate a handshake response message, and returns the handshake response message to the intelligent device through the message middleware.
In a third aspect, an embodiment of the present disclosure provides an intelligent device shadow management apparatus, which is applied to a service group having a shadow service function, where the service group is composed of multiple actual copies, and the apparatus includes:
the first determining unit is used for determining the unique identifier of the intelligent device sending the handshake message according to the handshake message by a target actual copy of the multiple actual copies, wherein the target actual copy receives the handshake message;
the target actual copy is used for determining a first actual copy corresponding to the shadow of the intelligent device to be created according to the unique identifier;
and the creating unit is used for creating the shadow of the intelligent device according to the unique identifier.
In a fourth aspect, an embodiment of the present disclosure provides an electronic device, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the intelligent device shadow management method as described above.
In a fifth aspect, the disclosed embodiments provide a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the intelligent device shadow management method as described above.
The embodiment of the disclosure provides a method, a system, a device, equipment and a medium for managing shadows of intelligent equipment. The method is applied to a service group with a shadow service function, the service group consists of a plurality of actual copies, and the method specifically comprises the following steps: determining the unique identifier of the intelligent equipment sending the handshake message according to the handshake message by the target actual copy receiving the handshake message in the plurality of actual copies; the target actual copy determines a first actual copy corresponding to the shadow of the intelligent device to be created according to the unique identifier; the first actual copy creates a shadow of the smart device according to the unique identifier. The method provided by the invention can improve the management of the shadow of the intelligent equipment, thereby ensuring the complete mapping of the intelligent equipment on the actual copy, and facilitating the follow-up real-time understanding of the operating condition of the intelligent equipment through the shadow after the shadow is successfully created.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present disclosure, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a shadow management method for an intelligent device according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a shadow management method for an intelligent device according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a hash ring according to an embodiment of the disclosure;
fig. 4 is a schematic flowchart of a shadow management method for an intelligent device according to an embodiment of the present disclosure;
fig. 5 is a schematic flowchart of a shadow management method for an intelligent device according to an embodiment of the present disclosure;
FIG. 6 is a schematic flowchart of a method for shadow management of an intelligent device according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of an intelligent device shadow management system according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of an intelligent device shadow management apparatus according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, aspects of the present disclosure will be further described below. It should be noted that the embodiments and features of the embodiments of the present disclosure may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein; it is to be understood that the embodiments disclosed in the specification are only a few embodiments of the present disclosure, and not all embodiments.
In view of the foregoing technical problems, an embodiment of the present disclosure provides a shadow management method for an intelligent device. The details are set forth in the one or more examples below.
Fig. 1 is a schematic flow diagram of a shadow management method for an intelligent device according to an embodiment of the present disclosure, which is applied to multiple actual copies having a shadow service function, where the shadow service corresponds to the multiple actual copies, and specifically includes the following steps S110 to S130 shown in fig. 1:
it can be understood that the cloud includes a plurality of service groups, each service group corresponds to a different service, specifically, the plurality of service groups correspond to a plurality of shadow services, the plurality of shadow services may be denoted as shadow service 1 and shadow service 2, each shadow service corresponds to a plurality of actual copies, the plurality of actual copies constitute a service group having a shadow service function, that is, each shadow service has a plurality of actual copies in a running state to implement the function of the shadow service, the copies in the running state may be referred to as actual copies or shadow service nodes, and running a plurality of actual copies/nodes at the same time may improve the security and usability of the shadow service, for example, shadow service 1 has 5 corresponding actual copies, 5 actual copies implement the function of the same shadow service (shadow service 1), 5 actual copies constitute service group 1 having the function of shadow service 1, the 5 actual copies may be referred to as actual copy 1 through actual copy 5, or shadow service node 1 through shadow service node 5.
It can be understood that the method provided by the present disclosure is applied to a service group with shadow service function, and the service group is composed of a plurality of actual copies, for example, the method provided by the present disclosure is applied to the service group 1 composed of 5 actual copies in running state for realizing the shadow service 1 function. The target actual copy can be understood as an actual copy which can realize the shadow service function and receives the handshake message in a plurality of actual copies in a running state; it is understood that the message middleware selects one actual copy among a plurality of actual copies with a preset policy and sends a handshake message to the actual copy, which may be referred to as a target actual copy.
It can be understood that the actual copy implementing the shadow service function specifically includes the following modules: the system comprises a message module, a handshake processing module, a fragmentation module, a service module, a resource monitoring module and a copy module, wherein the message module is used for receiving handshake messages sent by a message middleware, the message middleware is used for receiving the handshake messages generated and sent by intelligent equipment, the intelligent equipment can be Internet of things equipment, the handshake processing module is used for analyzing a unique identifier of the Internet of things equipment from the handshake messages, the fragmentation module is used for calculating a specific creation position of a shadow of the Internet of things equipment according to the identifier, namely the actual copy on which the shadow should be created, the service module is used for creating the shadow having the same identifier as the Internet of things equipment, the resource monitoring module is used for monitoring the state of the shadow on the copy, and the copy module is used for distributing the shadow running on the actual copy.
S110, determining the unique identification of the intelligent device sending the handshake message according to the handshake message by the target actual copy of the plurality of actual copies, which receives the handshake message.
Understandably, a message module in the target actual copy receives a handshake message sent by a message middleware, the handshake message can be understood as a message with information such as a unique identifier of an intelligent device, the intelligent device can be an internet of things device, for example, a vehicle, the handshake message can be generated by the vehicle, then the vehicle sends the handshake message to the message middleware, the message middleware selects one actual copy from a plurality of actual copies according to a preset strategy, sends the received handshake message sent by the vehicle to the selected actual copy, and the obtained actual copy of the handshake message is recorded as the target actual copy; the target actual copy parses the handshake message, determines a unique identifier of the smart device sending the handshake message, which may be a vehicle identification number (vin number) for a vehicle, which is a set of unique numbers consisting of 17 letters or numbers, from which a specific vehicle may be located.
S120, the target actual copy determines a first actual copy corresponding to the shadow of the intelligent device to be created according to the unique identifier.
It can be understood that, on the basis of S110, after the target actual copy determines the unique identifier of the intelligent device, the fragmentation module in the target actual copy determines, according to the unique identifier, a first actual copy corresponding to a shadow of the intelligent device to be created by using a fragmentation method, that is, determines to create an actual copy of the shadow among the multiple actual copies, and then the first actual copy creates the shadow, and the created shadow is also run on the first actual copy.
S130, the first actual copy creates a shadow of the intelligent device according to the unique identifier.
Understandably, on the basis of the above S120, after determining the first actual copy corresponding to the shadow of the smart device to be created, the first actual copy creates the shadow based on the unique identifier of the smart device, and the identifier of the shadow is the same as or has a one-to-one correspondence relationship with the unique identifier of the smart device. It can be understood that the shadow of the intelligent device created by the first actual copy only has the same or corresponding identifier as the intelligent device in general, and can be understood as only establishing the association relationship between the shadow and the intelligent device, and as the shadow and the intelligent device gradually perform data interaction and information transmission, the shadow can reflect the operating state of the intelligent device more truly and comprehensively, and the specific expression is that the appearance structure of the shadow is the same as that of the intelligent device.
Optionally, the step S130 specifically includes the following steps S131 to S132:
s131, if the first actual copy and the target actual copy are the same copy, the first actual copy creates a shadow of the intelligent device according to the unique identifier.
S132, if the first actual copy and the target actual copy are not the same copy, the target actual copy sends the unique identifier to the first actual copy, and the first actual copy creates a shadow of the intelligent device according to the unique identifier.
It can be understood that after the target actual copy determines the first actual copy corresponding to the shadow, the name of the copy represented by the first actual copy is compared with the name of the target actual copy to determine whether the first actual copy is the target actual copy, that is, whether the shadow needs to be created on the target actual copy is determined. For example, if the copy name of the first actual copy is the same as the name of the target actual copy, it may be determined that the first actual copy and the target actual copy are the same copy, and the first actual copy (the target actual copy) creates a shadow based on the unique identifier of the smart device, where the shadow and the smart device have the same or corresponding identifier, so that the smart device and the shadow are quickly connected according to the unique identifier, in which the following embodiment takes the smart device as an example and describes it as a vehicle; the shadow creation is successful, the successful handshake between the shadow and the vehicle can be determined, namely, the vehicle and the shadow establish a connection relation, the specific service logic is started to transmit data, the shadow data is gradually updated, the shadow data synchronous with the vehicle condition is obtained, and the synchronization with the vehicle condition is also shown on the appearance structure of the shadow. If the first actual copy and the target actual copy are determined not to be the same copy, in this case, the target actual copy needs to send the unique identifier to the first actual copy, and the first actual copy creates a shadow based on the unique identifier of the intelligent device.
It can be understood that, for a plurality of intelligent devices to create a shadow, the target actual copies may be different, and the first actual copies corresponding to the shadow determined each time by the fragmentation module in the target actual copies may be the same or different, and specifically, whether the target actual copies and the first actual copies are the same copies may be determined according to names of the actual copies.
Optionally, the method in the present application may further monitor the shadow states on the multiple actual copies, and specifically includes the following steps: for each actual copy in the multiple actual copies, each actual copy acquires shadow data of a running shadow, determines the state of the shadow according to the shadow data, and deletes the shadow data of the shadow if the state of the shadow is an unconnection state; the offline state refers to the state that the shadow data is not updated within a preset time period.
It can be understood that, for each of the multiple actual copies, each actual copy monitors states of all running shadows based on the resource monitoring module included therein, specifically, the resource monitoring module periodically (within a preset time) acquires shadow data of all running shadows on the actual copy, for example, the resource monitoring module acquires shadow data of all running shadows every 5 minutes, and then analyzes each acquired shadow data to determine a state of each shadow; if the state of the shadow is determined to be the unconnection state, deleting the shadow data of the shadow, namely clearing out-of-date shadow data in the actual copy so as to reduce the load of the copy; the loss-of-connection state refers to that the shadow data is in an unrefreshed state within a preset time period, the preset time period can be 10 days, the preset time period can be determined according to requirements, and is not limited herein, that is, the connection between the vehicle and the shadow is not established within 10, so that the shadow data is not updated within 10, the shadow data can be understood as expired shadow data, and the non-update can be that the unique identifier of the vehicle is changed or the vehicle is not used for a long time.
The embodiment of the disclosure provides a method for managing a shadow of an intelligent device, which specifically comprises the following steps: the method comprises the steps that a certain actual copy in a plurality of actual copies of the same shadow service receives handshake messages transmitted by message middleware, then the only identification of the intelligent device sending the handshake messages is determined by the certain actual copy (target actual copy), the first actual copy of the shadow of the intelligent device is determined to be created according to the only identification, and the first actual copy and the intelligent device have the same identification shadow. The method provided by the invention can quickly and accurately determine the actual copy corresponding to the shadow to be created, can ensure the complete mapping of the shadow on the actual copy while accelerating the speed of creating the shadow, is convenient for a subsequent user to comprehensively know the running state of the intelligent equipment in real time through the shadow, and simultaneously improves the performance and the usability of the shadow management service of the intelligent equipment.
On the basis of the foregoing embodiment, fig. 2 is a schematic flowchart of a method for managing a shadow of an intelligent device according to an embodiment of the present disclosure, and optionally, the determining, by the target actual copy, a first actual copy corresponding to a shadow of the intelligent device to be created according to the unique identifier specifically includes the following steps S210 to S220 shown in fig. 2:
optionally, the hash ring is composed of the multiple actual copies and multiple virtual copies, and the target virtual copy is one of the multiple virtual copies.
The hash ring can be understood as a character ring consisting of a series of characters, is a circular ring, has a corresponding hash value in the hash ring for each actual copy, has a corresponding hash value in the hash ring for each virtual copy, and has different hash values for each copy; the multiple actual copies uniformly divide the hash ring, and the virtual copies uniformly divide a segment of the hash ring corresponding to two adjacent actual copies. The following embodiments are described with the hash ring being exemplified by a series of consecutive sets of integers, for example, the hash ring is an endless digital ring consisting of integers from 0 to 1000 and 0.
Exemplarily, referring to fig. 3, fig. 3 is a schematic diagram of a hash ring provided by an embodiment of the present disclosure, where the hash ring 300 includes 3 actual copies that uniformly divide the hash ring, which are denoted as an actual copy 310, an actual copy 320, and an actual copy 330, 2 virtual copies that uniformly divide a segment of the hash ring corresponding to between the actual copy 310 and the actual copy 320 are further included between the actual copy 310 and the actual copy 320, which are a virtual copy 340 and a virtual copy 350, respectively, and the hash ring 300 further includes a shadow 311 and a shadow 321.
S210, determining a hash value according to the unique identifier by the target actual copy, and determining a target virtual copy in a pre-constructed hash ring according to the hash value and a preset direction.
It can be understood that after receiving a copy query request, a fragmentation module in a target actual copy calculates a hash value according to a unique identifier corresponding to an intelligent device by using a consistent hash algorithm, and searches for the actual copy with a shadow according to the calculated hash value, wherein the copy query request is generated by a handshake processing module of the target actual copy, the handshake processing module calls a shadow query interface in the fragmentation module after receiving a handshake message, the copy query request refers to which actual copy the query shadow falls, and the hash value is also a value composed of a plurality of characters.
Understandably, after the target actual copy determines the hash value, the first 4 bits of the hash value are intercepted, the first 4 bit characters are converted into corresponding numerical values, and the converted numerical values are in the numerical value range included by the hash ring, so that the determined hash value falls on the hash ring, and the actual copy to which the shadow belongs is further determined. As shown in fig. 3, the shadow 321 in the hash ring 300 is the shadow of the smart device, the shadow 321 falls between the actual copy 310 and the virtual copy 340, for example, the hash value determined after the shadow 321 is converted is 55, the hash value of the actual copy 310 is 0, the hash value of the virtual copy 340 is 111, according to the preset direction, the preset direction is clockwise, that is, according to the virtual copy determined clockwise and closest to the shadow 321, the hash ring 300 can know that the shadow 321 falls on the virtual copy 340, and at this time, the target virtual copy is the virtual copy 340. Specifically, the preset direction can be determined by the user according to the requirement, and is not limited at this time.
S220, the target actual copy determines a first actual copy corresponding to the shadow of the intelligent device in the hash ring according to the target virtual copy and the preset direction.
Understandably, on the basis of the above S210, after the target virtual copy is determined by the target actual copy, an actual copy closest to the target virtual copy is determined according to the target virtual copy and a clockwise direction (a preset direction), and the actual copy is recorded as a first actual copy, where the first actual copy may be the target actual copy or may not be the target actual copy, referring to fig. 3, an actual copy closest to the virtual copy 340 in the hash ring 300 in a clockwise direction is an actual copy 320, at this time, the first actual copy is the actual copy 320, and the actual copy 320 needs to create and run a shadow 321. Specifically, if the target actual copy is the actual copy 320, the first actual copy and the target actual copy are the same copy, and if the target actual copy is the actual copy 310, the first actual copy and the target actual copy are not the same copy.
The embodiment of the disclosure provides a shadow management method for an intelligent device, which can accurately determine a first actual copy corresponding to a shadow to be created through a unique identifier and a hash ring of the intelligent device, specifically, determine a hash value according to the unique identifier, determine a target virtual copy corresponding to the shadow in the hash ring according to the hash value in a clockwise direction, determine the first actual copy in the hash ring according to the clockwise direction, quickly determine an actual copy corresponding to each shadow, accurately position the shadow, and the calculation method is simple and convenient, can uniformly distribute the shadows falling in each actual copy to the maximum extent, avoids the condition that the actual copies are overloaded due to a large number of operating shadows, and further improves the performance of a single actual copy.
On the basis of the foregoing embodiment, fig. 4 is a schematic flowchart of a method for managing a shadow of an intelligent device according to an embodiment of the present disclosure, and optionally, after the first actual copy creates a shadow of the intelligent device according to the unique identifier, the method specifically includes the following steps S410 to S430 shown in fig. 4:
s410, the first actual copy obtains a first number of the currently running shadows.
Understandably, after the shadow of the intelligent device is successfully created on the first actual copy, the first actual copy triggers a resource monitoring event once to monitor the load condition of the intelligent device, and after the resource monitoring module in the first actual copy receives the resource monitoring event, a first number of all currently running shadows is obtained, where the first number is the number of all the shadows running on the first actual copy.
S420, determining a current load value by the first actual copy according to the first quantity and a second quantity of shadows which can be processed by the first actual copy.
It is understood that, on the basis of the above S410, the first actual copy obtains the configuration file stored thereon, and after the first actual copy obtains the configuration file, the maximum number of processable shadows is obtained in the configuration file, where the maximum number refers to the number of shadows that the first actual copy supports to run, and the maximum number is recorded as the second number. After the first actual copy determines the second number of processable shadows, the current load value of the first actual copy is determined according to the first number and the second number, so as to monitor the load condition, for example, the number of currently running shadows on the first actual copy is 40, the number of processable shadows of the first actual copy is 100, and the calculated current load value of the first actual copy is 40%.
And S430, generating a request message by the first actual copy according to the current load value and a preset load threshold value, wherein the request message comprises a request copy capacity reduction message or a request copy capacity expansion message.
Understandably, the preset load values include a first preset load value and a second preset load value, and the first preset load value and the second preset load value can be determined according to user requirements.
Optionally, the generating, by the first actual copy in S430, a request message according to the current load value and the preset load threshold specifically includes the following steps S431 to S432:
and S431, if the current load value is smaller than the first preset load value, generating a request copy capacity reduction message.
S432, if the current load value is larger than the second preset load value, a request copy capacity expansion message is generated.
Understandably, after determining the current load value of the first actual copy based on the above S420, the first actual copy determines the relationship between the current load value and the preset load threshold, generates a request message, and sends the request message to a service orchestration tool, where the service orchestration tool may be an orchestration management tool (kubernets, k8S) of a portable container, and after receiving the request message, the service orchestration tool generates a copy change event corresponding to the request message, and sends the copy change event to the multiple actual copies, and after receiving the copy change event, each of the multiple actual copies redistributes a shadow running on the multiple actual copies; specifically, if the current load value is smaller than a first preset load value, a request copy capacity reduction message is generated, where the first preset load value may be 5%, after the request copy capacity reduction message is generated by the first actual copy, the shadow running on the first actual copy is distributed to other actual copies, the service orchestration tool deletes the first actual copy, and the shadow and shadow data running on the first actual copy are also deleted therewith, for example, the number of the plurality of actual copies corresponding to the shadow service is 3, and after the first actual copy is deleted, the number of the actual copies corresponding to the shadow service is 2; if the current load value is greater than a second preset load value, a request copy capacity expansion message is generated, where the second preset load value may be 90%, the copy capacity expansion refers to increasing a new actual copy on the basis of the original multiple actual copies, that is, a new actual copy needs to be added to reduce the load condition of the actual copy whose current load value exceeds 90%, after the load value of the first actual copy exceeds 90%, the request copy capacity expansion message is sent to a service orchestration tool, then the service orchestration tool generates a copy capacity expansion event, and sends the copy capacity expansion time to the multiple actual copies, the multiple actual copies can be mutually sensed through a cluster awareness (SWIM) protocol, each actual copy of the multiple actual copies redistributes a shadow running on the actual copy to reduce the load condition of the overloaded first actual copy, for example, the number of the multiple actual copies corresponding to a service shadow is 3, according to the load condition of the first actual copy, 1 new actual copy needs to be added, and after the new actual copy is added, the number of the actual copies corresponding to the shadow service is 4.
Optionally, after the first actual copy generates the request message according to the current load value and the preset load threshold in S430, the method further includes the following steps S440 to S460:
s440, the first actual copy obtains the identifier of each shadow in the first number of shadows, and calculates a second actual copy corresponding to each shadow according to the identifier of each shadow, wherein the second actual copy is the actual copy of the shadow to be created.
Understandably, on the basis of the above S430, after each of the multiple actual copies receives a copy change event sent by the service orchestration tool, each actual copy may allocate a shadow running thereon; taking the first actual copy as an example, after receiving a copy change event, the first actual copy obtains an identifier of each shadow in a first number of shadows running on the first actual copy, and then calculates a second actual copy corresponding to each shadow according to the identifier of each shadow, that is, the copy to which each shadow belongs is determined again after the copy change event occurs, the second actual copy is an actual copy of the shadow to be created, and the second actual copy is any one of the multiple actual copies.
S450, if the generated request message is the request copy capacity reduction message, the first actual copy transmits the shadow data of each shadow to the second actual copy, and the second actual copy creates a shadow according to the received shadow data; wherein the second actual copy is the other of the plurality of actual copies than the first actual copy.
S460, if the generated request message is the request copy capacity expansion message, the first actual copy judges whether a second actual copy corresponding to each shadow and the first actual copy are the same copy for each running shadow; if so, transmitting the shadow data of the shadow to the second actual copy, and deleting the transmitted shadow data.
It can be understood that, on the basis of the above S440, if the request message generated by the first actual copy is a request copy capacity reduction message, that is, the first actual copy needs to be deleted, before the service organization tool deletes the first actual copy, the shadow running on the first actual copy needs to be allocated to other actual copies, for each shadow running on the first actual copy, a second actual copy corresponding to each shadow is determined, the first actual copy transmits the shadow data of the shadow to the second actual copy corresponding to the shadow, the first actual copy is a copy that needs to be deleted, so the second actual copy and the first actual copy are not the same copy, and therefore, the shadow data of each shadow can be directly transmitted to the second actual copy corresponding to the shadow, and it is not necessary to judge that the second actual copy and the first actual copy are not the same copy, the second actual copy may open a Remote call service framework (gRPC) to monitor connections of other actual copies, and after receiving the shadow data sent by the first actual copy, the second actual copy may create a shadow according to the shadow data, where the shadow may run on the second actual copy, and maintain a life cycle of the shadow.
For example, referring to fig. 3, if the first actual copy is the actual copy 310 in the hash ring 300, and it is determined that the first actual copy is to be deleted but the first actual copy is not yet deleted, the first actual copy is deleted in the hash ring 300, that is, the actual copy 310 in the hash ring 300 is deleted, so as to obtain an updated hash ring, the updated hash ring is denoted as the hash ring 360, the hash ring 360 includes the actual copy 320 and the actual copy 330, the actual copy 320 and the actual copy 330 divide the hash ring 360 uniformly, the virtual copy between the actual copy 320 and the actual copy 330 is also subdivided, at this time, the actual copy corresponding to the shadow on the hash ring 360 changes, so the first actual copy (actual copy 310) needs to determine a second actual copy corresponding to each shadow running thereon again according to the hash ring 360, in this case, the second actual copy may be the actual copy 320 or the actual copy 330 in the hash ring 360, taking the shadow 311 as an example, the first actual copy may determine, according to the hash ring 360, that the second actual copy corresponding to the shadow 311 is the actual copy 320, in the hash ring 300, the actual copy corresponding to the shadow 311 is the actual copy 310, and the actual copy corresponding to the shadow 311 changes; the shadow running on the first actual copy may be redistributed according to hash ring 360, where hash ring 360 only shows the actual copy and a partial shadow, and the virtual copy and the partial shadow are not shown; after the shadow data of each shadow run on the first actual copy is transmitted to the second actual copy, the service arrangement tool deletes the first actual copy, that is, the first actual copy is deleted after the shadow on the first actual copy is distributed.
It can be understood that, on the basis of the above S440, if the request message generated by the first actual copy is a request copy capacity expansion message, that is, a new actual copy is added, at this time, the shadow data of the partial shadow on the first actual copy needs to be transmitted to other actual copies, and correspondingly, the hash ring 300 also changes, so that the partial shadows running on other actual copies except the first actual copy also need to be redistributed, and therefore, the other actual copies except the new actual copy need to be determined again corresponding to the second actual shadow running thereon, and specifically, after the new actual copy is added, the method for calculating the actual copy corresponding to the shadow by the hash ring is the same as the method adopted when the actual copy is deleted, which is not repeated here. The description is given by taking an example that the first actual copy is overloaded and a part of shadows running on the first actual copy need to be distributed to other actual copies for operation, the first actual copy judges whether a second actual copy corresponding to each shadow and the first actual copy are the same copy or not aiming at each running shadow, namely whether the shadow needs to be transferred to other actual copies or not, and the first actual copy can be transferred to the shadows which do not belong to the copy; if the shadow does not belong to the local copy (the first actual copy), the shadow data of the shadow is transmitted to the second actual copy by the first actual copy, the shadow is created by the second actual copy according to the shadow data and the life cycle of the shadow is maintained, and meanwhile, the transmitted shadow data is deleted by the first actual copy.
The embodiment of the disclosure provides an intelligent device shadow management method, which performs dynamic capacity expansion or capacity reduction on a copy by determining the current load condition of an actual copy, is applicable to various use scenarios, and further improves the performance and the availability of an intelligent device shadow management service.
On the basis of the foregoing embodiment, with respect to a process of creating a shadow of an intelligent device, fig. 5 is a flowchart illustrating a method for managing a shadow of an intelligent device according to an embodiment of the present disclosure, which specifically includes the following steps S510 to S580 shown in fig. 5:
and S510, the intelligent device sends the generated handshake message to message middleware.
S520, the message middleware sends the received handshake message to the target actual copy.
And S530, the message module in the target actual copy sends the handshake message to the handshake processing module in the target actual copy.
And S540, the handshake processing module determines the unique identifier of the intelligent device according to the handshake message and sends the unique identifier to the fragmentation module in the target actual copy.
And S550, the fragmentation module determines a first actual copy corresponding to the shadow to be created by the intelligent device according to the unique identifier.
And S560, the target actual copy judges whether the shadow to be created is created on the target actual copy according to the first actual copy.
Understandably, on the basis of the above S550, the target actual copy determines whether the target actual copy and the first actual copy are the same copy, so as to determine whether the shadow to be created needs to be created on the target actual copy or on the first actual copy; if the shadow needs to be created on the target actual copy, executing S570; if the shadow needs to be created on the first actual copy, S580 is executed, in which case the first actual copy is the other copy of the plurality of actual copies except the target actual copy.
S570, if the shadow to be created is created on the target actual copy, the service module in the target actual copy creates a shadow with the same identifier as the intelligent device.
Understandably, on the basis of the above S560, after the target actual copy determines that the shadow to be created needs to be created on the copy, the service module in the target actual copy obtains the pre-stored shadow data created by the initialization shadow and the shadow with the same identifier as the shadow of the intelligent device.
S580, if the shadow to be created is not created on the target actual copy, the target actual copy sends the unique identifier to the first actual copy; the first actual copy creation and the smart device have the same identified shadow.
Understandably, on the basis of the S560, after the target actual copy determines that the shadow to be created needs to be created on other copies, the target actual copy sends the unique identifier of the shadow to the first actual copy, and the unique identifier of the shadow is the same as the unique identifier of the intelligent device; and then, the service module in the first actual copy acquires the pre-stored initial shadow data to create a shadow with the same identifier as the intelligent device.
It is understood that the steps of implementing S510 to S550 are the same as the above steps, and are not described herein again.
On the basis of the foregoing embodiment, for a shadow update process of an intelligent device, fig. 6 is a schematic flowchart of a method for shadow management of an intelligent device according to an embodiment of the present disclosure, and specifically includes the following steps S610 to S670 shown in fig. 6:
and S610, after the target actual copy successfully creates the shadow, triggering a shadow creating event.
S620, after the resource monitoring module in the target actual copy receives the shadow creating event, the first number of the running shadows is obtained.
S630, the target actual copy determines the current load value according to the first quantity and the second quantity of the processable shadows in the acquired configuration information.
And S640, generating request information by the target actual copy according to the current load value and a preset load threshold value, and sending the request information to a service arrangement tool.
S650, if the copy module in the target actual copy receives the copy change event sent by the service arrangement tool, the unique identifier of the currently running shadow is obtained.
And S660, determining a second actual copy corresponding to the shadow according to the unique identifier by the fragmentation module in the target actual copy.
S670, the target actual copy sends the shadow data which does not belong to the shadow of the target actual copy to the second actual copy based on the second actual copy; the second actual copy is used to create a shadow from the shadow data.
Understandably, on the basis of the above S660, the target actual copy determines whether the shadow belongs to the local copy (target actual copy) according to the second actual copy corresponding to the shadow running on the target actual copy, and sends the shadow data of the shadow that does not belong to the target actual copy to the second actual copy, where the second actual copy is another copy of the multiple actual copies except the target actual copy.
It is understood that the steps S610 to S660 are the same as those described above, and are not described herein again.
Fig. 7 is a schematic structural diagram of an intelligent device shadow management system according to an embodiment of the present disclosure, where the shadow management system 700 includes an intelligent device 710, a message middleware 720, and multiple actual copies 730 with shadow service functions.
The smart device 710 sends a handshake message to the message middleware 720;
the message middleware 720 sends the received handshake message to the plurality of real copies 730;
the target actual copy of the multiple actual copies 730 that receives the handshake message processes the handshake message, generates a handshake response message, and returns the handshake response message to the smart device 710 through the message middleware 720.
Optionally, the processing of the handshake message by the target actual copy, which receives the handshake message, in the multiple actual copies to generate a handshake response message, and returning the handshake response message to the intelligent device through the message middleware specifically includes the following steps:
it is to be appreciated that each of the plurality of real copies 730 includes a variety of modules through which the real copy manages the life cycle of the shadow. The target actual copy among the plurality of actual copies 730 is taken as an example for explanation.
Determining a unique identifier of the intelligent equipment by the target actual copy, which receives the handshake message, of the multiple actual copies according to the handshake message, and if it is determined that the first actual copy corresponding to the shadow of the intelligent equipment to be created is not the target actual copy according to the unique identifier, sending the unique identifier to the first actual copy; after the first actual copy creates a shadow with the same identification as the intelligent device, the first actual copy sends a generated handshake response message to the target actual copy, and the target actual copy returns the handshake response message to the intelligent device through the message middleware; wherein the first actual copy is the other of the plurality of actual copies except the target actual copy.
It can be understood that the method for managing the running shadow by the actual target copy based on the modules deployed thereon is the same as the above embodiment, and is not described herein again.
Fig. 8 is a schematic structural diagram of an intelligent device shadow management apparatus according to an embodiment of the present disclosure. The shadow management apparatus for an intelligent device provided in the embodiment of the present disclosure may execute the processing procedure provided in the foregoing shadow management method for an intelligent device, and apply the processing procedure to a plurality of actual copies having a shadow service function, where the shadow service corresponds to the plurality of actual copies, and as shown in fig. 8, the shadow management apparatus 800 for an intelligent device includes:
a first determining unit 810, where a target actual copy of the multiple actual copies that receives the handshake message is used to determine, according to the handshake message, a unique identifier of the smart device that sends the handshake message;
a second determining unit 820, where the target actual copy is used to determine, according to the unique identifier, a first actual copy corresponding to a shadow of the intelligent device to be created;
a creating unit 830, configured to create a shadow of the smart device according to the unique identifier.
Optionally, the first actual copy in the creating unit 830 creates a shadow of the intelligent device according to the unique identifier, and is specifically configured to:
if the first actual copy and the target actual copy are the same copy, the first actual copy creates a shadow of the intelligent device according to the unique identifier; alternatively, the first and second liquid crystal display panels may be,
if the first actual copy and the target actual copy are not the same copy, the target actual copy sends the unique identifier to the first actual copy, and the first actual copy creates a shadow of the intelligent device according to the unique identifier.
Optionally, the target actual copy in the second determining unit 820 determines, according to the unique identifier, a first actual copy corresponding to the shadow of the intelligent device to be created, and is specifically configured to:
the target actual copy determines a hash value according to the unique identifier, and determines a target virtual copy in a pre-constructed hash ring according to the hash value and a preset direction;
the target actual copy determines a first actual copy corresponding to the shadow of the intelligent device in the hash ring according to the target virtual copy and the preset direction;
the hash ring is composed of a plurality of actual copies and a plurality of virtual copies, and the target virtual copy is one of the virtual copies.
Optionally, the apparatus 800 further includes a generating unit, where the generating unit is configured to, after the first actual copy creates the shadow of the intelligent device according to the unique identifier, specifically:
the first actual copy obtains a first number of currently running shadows;
the first actual copy determines a current load value according to the first quantity and a second quantity of shadows which can be processed by the first actual copy;
and the first actual copy generates a request message according to the current load value and a preset load threshold value, wherein the request message comprises a request copy capacity reduction message or a request copy capacity expansion message.
Optionally, the apparatus 800 further includes an updating unit, where the updating unit is configured to, after the first actual copy generates the request message according to the current load value and the preset load threshold, specifically:
the first actual copy obtains the identifier of each shadow in the first number of shadows, and calculates a second actual copy corresponding to each shadow according to the identifier of each shadow, wherein the second actual copy is the actual copy of the shadow to be created;
if the generated request message is the request copy capacity reduction message, the first actual copy transmits the shadow data of each shadow to the second actual copy, and the second actual copy creates a shadow according to the received shadow data; wherein the second actual copy is the other of the plurality of actual copies than the first actual copy.
Optionally, the updating unit is further configured to:
if the generated request message is the request copy capacity expansion message, the first actual copy judges whether a second actual copy corresponding to each shadow and the first actual copy are the same copy for each running shadow; if so, transmitting the shadow data of the shadow to the second actual copy, and deleting the transmitted shadow data.
Optionally, the apparatus 800 further includes a monitoring unit, and the monitoring unit is specifically configured to:
for each actual copy in the multiple actual copies, each actual copy acquires shadow data of a running shadow, determines the state of the shadow according to the shadow data, and deletes the shadow data of the shadow if the state of the shadow is an unconnection state; the offline state refers to the state that the shadow data is not updated within a preset time period.
The shadow management apparatus of the intelligent device in the embodiment shown in fig. 8 may be used to implement the technical solution of the above method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. The electronic device provided in the embodiment of the present disclosure may execute the processing procedure provided in the above embodiment, as shown in fig. 9, the electronic device 900 includes: a processor 910, a communication interface 920, and a memory 930; wherein the computer program is stored in the memory 930 and configured to be executed by the processor 910 in the intelligent device shadow management method as described above.
In addition, the embodiment of the disclosure also provides a computer readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the intelligent device shadow management method described in the foregoing embodiment.
Furthermore, the embodiment of the present disclosure also provides a computer program product, which includes a computer program or instructions, and when the computer program or instructions are executed by a processor, the method for managing the shadow of the intelligent device is implemented.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present disclosure, which enable those skilled in the art to understand or practice the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The intelligent device shadow management method is applied to a service group with a shadow service function, wherein the service group consists of a plurality of actual copies, and the method comprises the following steps:
determining the unique identifier of the intelligent equipment which sends the handshake message according to the handshake message by the target actual copy which receives the handshake message in the actual copies;
the target actual copy determines a first actual copy corresponding to the shadow of the intelligent device to be created according to the unique identifier;
and the first actual copy creates a shadow of the intelligent device according to the unique identifier.
2. The method of claim 1, wherein the first real copy creating a shadow of the smart device from the unique identifier comprises:
if the first actual copy and the target actual copy are the same copy, the first actual copy creates a shadow of the intelligent device according to the unique identifier; alternatively, the first and second electrodes may be,
if the first actual copy and the target actual copy are not the same copy, the target actual copy sends the unique identifier to the first actual copy, and the first actual copy creates a shadow of the intelligent device according to the unique identifier.
3. The method of claim 1, wherein the determining, by the target actual copy and according to the unique identifier, a first actual copy corresponding to a shadow of the smart device to be created comprises:
the target actual copy determines a hash value according to the unique identifier, and determines a target virtual copy in a pre-constructed hash ring according to the hash value and a preset direction;
the target actual copy determines a first actual copy corresponding to the shadow of the intelligent device in the hash ring according to the target virtual copy and the preset direction;
the hash ring is composed of a plurality of actual copies and a plurality of virtual copies, and the target virtual copy is one of the virtual copies.
4. The method of claim 1, wherein after the first actual copy creates a shadow of the smart device based on the unique identifier, the method further comprises:
the first actual copy obtains a first number of currently running shadows;
the first actual copy determines a current load value according to the first quantity and a second quantity of shadows which can be processed by the first actual copy;
and the first actual copy generates a request message according to the current load value and a preset load threshold value, wherein the request message comprises a request copy capacity reduction message or a request copy capacity expansion message.
5. The method of claim 4, wherein after the first actual replica generates the request message according to the current load value and a preset load threshold, the method further comprises:
the first actual copy obtains the identifier of each shadow in the first number of shadows, and calculates a second actual copy corresponding to each shadow according to the identifier of each shadow, wherein the second actual copy is the actual copy of the shadow to be created;
if the generated request message is the request copy capacity reduction message, the first actual copy transmits the shadow data of each shadow to the second actual copy, and the second actual copy creates a shadow according to the received shadow data; wherein the second actual copy is the other of the plurality of actual copies than the first actual copy.
6. The intelligent device shadow management system is characterized by comprising an intelligent device, a message middleware and a plurality of actual copies with shadow service functions;
the intelligent equipment sends a handshake message to the message middleware;
the message middleware sends the received handshake messages to the plurality of actual copies;
and the target actual copy of the plurality of actual copies, which receives the handshake message, processes the handshake message to generate a handshake response message, and returns the handshake response message to the intelligent device through the message middleware.
7. The system of claim 6, wherein the target of the plurality of actual copies that receives the handshake message processes the handshake message to generate a handshake response message, and returns the handshake response message to the smart device through the message middleware, comprising:
determining a unique identifier of the intelligent equipment by the target actual copy, which receives the handshake message, of the multiple actual copies according to the handshake message, and if it is determined that the first actual copy corresponding to the shadow of the intelligent equipment to be created is not the target actual copy according to the unique identifier, sending the unique identifier to the first actual copy; after the first actual copy creates a shadow with the same identification as the intelligent device, the first actual copy sends a generated handshake response message to the target actual copy, and the target actual copy returns the handshake response message to the intelligent device through the message middleware; wherein the first actual copy is the other of the plurality of actual copies except the target actual copy.
8. An intelligent device shadow management device, which is applied to a service group with shadow service function, wherein the service group is composed of a plurality of actual copies, and the device comprises:
the first determining unit is used for determining the unique identifier of the intelligent device sending the handshake message according to the handshake message by a target actual copy of the multiple actual copies, wherein the target actual copy receives the handshake message;
the target actual copy is used for determining a first actual copy corresponding to the shadow of the intelligent device to be created according to the unique identifier;
and the creating unit is used for creating the shadow of the intelligent device according to the unique identifier.
9. An electronic device, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the intelligent device shadow management method of any of claims 1 to 5.
10. A computer-readable storage medium, having stored thereon a computer program, wherein the computer program, when executed by a processor, performs the steps of the intelligent device shadow management method according to any of claims 1 to 5.
CN202210319886.0A 2022-03-29 2022-03-29 Intelligent device shadow management method, system, device, equipment and medium Pending CN114726806A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210319886.0A CN114726806A (en) 2022-03-29 2022-03-29 Intelligent device shadow management method, system, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210319886.0A CN114726806A (en) 2022-03-29 2022-03-29 Intelligent device shadow management method, system, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN114726806A true CN114726806A (en) 2022-07-08

Family

ID=82238819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210319886.0A Pending CN114726806A (en) 2022-03-29 2022-03-29 Intelligent device shadow management method, system, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN114726806A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113414A (en) * 2019-05-05 2019-08-09 深圳市腾讯网域计算机网络有限公司 A kind of method, apparatus, server and storage medium managing copy
WO2020177020A1 (en) * 2019-03-01 2020-09-10 Oppo广东移动通信有限公司 Internet of things device discovery method, apparatus, and terminal device
WO2021012234A1 (en) * 2019-07-24 2021-01-28 Oppo广东移动通信有限公司 Method for generating shadow device, device, and storage medium
WO2021012235A1 (en) * 2019-07-24 2021-01-28 Oppo广东移动通信有限公司 Method for generating shadow device, device, and storage medium
WO2021072847A1 (en) * 2019-10-18 2021-04-22 平安科技(深圳)有限公司 Method and apparatus for monitoring condition of computer network, computer device, and storage medium
CN113239013A (en) * 2021-05-17 2021-08-10 北京青云科技股份有限公司 Distributed system and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020177020A1 (en) * 2019-03-01 2020-09-10 Oppo广东移动通信有限公司 Internet of things device discovery method, apparatus, and terminal device
CN110113414A (en) * 2019-05-05 2019-08-09 深圳市腾讯网域计算机网络有限公司 A kind of method, apparatus, server and storage medium managing copy
WO2021012234A1 (en) * 2019-07-24 2021-01-28 Oppo广东移动通信有限公司 Method for generating shadow device, device, and storage medium
WO2021012235A1 (en) * 2019-07-24 2021-01-28 Oppo广东移动通信有限公司 Method for generating shadow device, device, and storage medium
WO2021072847A1 (en) * 2019-10-18 2021-04-22 平安科技(深圳)有限公司 Method and apparatus for monitoring condition of computer network, computer device, and storage medium
CN113239013A (en) * 2021-05-17 2021-08-10 北京青云科技股份有限公司 Distributed system and storage medium

Similar Documents

Publication Publication Date Title
US9686330B2 (en) Topic-based messaging using consumer address and pool
CN110868465A (en) Load balancing system and method for container cloud
CN101753597B (en) Keeping alive method between peer node and client under peer node-client architecture
CN103780679A (en) Long time delay remote invocation method based on HTTP protocol
CN114710515B (en) Communication method and related assembly
CN109951551B (en) Container mirror image management system and method
CN103780621B (en) A kind of remote table sharing method and system
EP2472416B1 (en) Data query system and constructing method thereof and corresponding data query method
CN113992600A (en) Multi-rate mode data transmission control method and device based on cache queue
CN114726806A (en) Intelligent device shadow management method, system, device, equipment and medium
CN110971647A (en) Node migration method of big data system
CN112559472B (en) File transmission method, device, computer equipment and storage medium
CN112559134B (en) Distributed WebSocket cluster construction method, device, system and storage medium
CN112770358B (en) Multi-rate mode data transmission control method and device based on service data
CN113687962A (en) Request processing method, device, equipment and storage medium
CN114024968A (en) Message sending method and device based on intermediate equipment and electronic equipment
CN112799849A (en) Data processing method, device, equipment and storage medium
CN112395070A (en) Data processing system and method
CN100444548C (en) Loading method and client end
CN111464579A (en) Message processing method and server
CN115086425B (en) Message transmission method, device, program product, medium and electronic equipment
CN113992516B (en) Firmware updating method and device of Internet of things equipment and Internet of things
CN111371865B (en) Client connection relation adjusting method, system and node
EP4283954A1 (en) Computing power information processing method, first network device, and system
CN111917808B (en) Load control method, service provider NF and service user NF

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination