CN106817424B - For controlling the method and system of flowing of access - Google Patents

For controlling the method and system of flowing of access Download PDF

Info

Publication number
CN106817424B
CN106817424B CN201710058860.4A CN201710058860A CN106817424B CN 106817424 B CN106817424 B CN 106817424B CN 201710058860 A CN201710058860 A CN 201710058860A CN 106817424 B CN106817424 B CN 106817424B
Authority
CN
China
Prior art keywords
access
threshold
service request
amount
multistage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710058860.4A
Other languages
Chinese (zh)
Other versions
CN106817424A (en
Inventor
方考
王仁云
黄旭溪
吴博超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ji Ji Network Technology Co., Ltd.
Hundsun Technologies Inc
Original Assignee
Hangzhou Ji Ji Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ji Ji Network Technology Co Ltd filed Critical Hangzhou Ji Ji Network Technology Co Ltd
Priority to CN201710058860.4A priority Critical patent/CN106817424B/en
Publication of CN106817424A publication Critical patent/CN106817424A/en
Application granted granted Critical
Publication of CN106817424B publication Critical patent/CN106817424B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/62Establishing a time schedule for servicing the requests

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a kind of for controlling the method and system of flowing of access.The described method includes: receiving the service request of peripheral system;Whether the amount of access that the peripheral system is judged according to the service request time of the peripheral system is more than multistage requesting threshold, and the multistage requesting threshold sets different requesting thresholds according to the different service request time;And if the amount of access of the peripheral system is less than the multistage requesting threshold, handle the service request.Method disclosed in the present application for controlling flowing of access can be prevented as the access of peripheral system abnormal flow and to pressure caused by core system.

Description

For controlling the method and system of flowing of access
Technical field
The present invention relates to data processing fields, in particular to a kind of for controlling the method and system of flowing of access.
Background technique
With the development of science and technology, Networking platform operation mode becomes the mainstream of society.By taking capital market as an example, with Capital market and the development in financial derivatives market, sequencing trade and have been affirmed its value by history, more and more people, Investment institution's independent development peripheral routine participates in the world of sequencing transaction, quantization investment.Due to sequencing transaction Behavior is uncontrollable, it is possible to create big concurrent exception request causes to impact to core transaction system, influences core transaction system pair The integrity service ability of investor.On carrying out the control method to peripheral routine access core business system frequency, current Way is limited peripheral routine from the angle of unit time (usually second) amount of access.
Traditional way is to control from unit time amount of access peripheral routine.In order to meet peripheral routineization transaction The business demand of terminal, the amount of access of unit time must be allowed for being arranged in a higher threshold value, if peripheral routine at this time It is run for a long time close to requesting threshold, core system still remains the risk excessively accessed.And in traditional way, Requesting threshold is largely static.When enlivening, client's number is more, and the total request amount of peripheral routine is more than that core system handles energy When power, there is load too high in core system, and when the situation duration is longer, the load of core system the more will become the more high, from And core system is caused to become worse and worse the service quality of peripheral routine.What a kind of existing access thresholds were dynamically adapted does Method, but in this way, the adjustment of threshold value is according to being static, the i.e. load capacity of predetermined system.Existing way lacks It is trapped in preset core system load capacity is a theoretical value, and actual loading ability can have certain deviation, is easy There is the theoretical duty ability of core system and the situation that actual loading ability deviation is larger, because of the actual loading of core system Ability can change with the variation of business datum amount.
Therefore, it is necessary to a kind of new method and system for being used to control flowing of access.
Above- mentioned information are only used for reinforcing the understanding to background of the invention, therefore it disclosed in the background technology part It may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
In view of this, the present invention provides a kind of for controlling the method and system of flowing of access, can prevent due to periphery The access of system exception flow and to pressure caused by core system.
Other characteristics and advantages of the invention will be apparent from by the following detailed description, or partially by the present invention Practice and acquistion.
According to an aspect of the invention, it is proposed that a kind of method for controlling flowing of access, this method comprises: receiving periphery The service request of system;Whether the amount of access that peripheral system is judged according to the service request time of peripheral system is more than multistage access Threshold value is measured, multistage requesting threshold sets different requesting thresholds according to the different service request time;And if periphery The amount of access of system is less than multistage requesting threshold, then processing business is requested.
In a kind of exemplary embodiment of the disclosure, multistage requesting threshold according to the business in current time unit at Manage situation dynamic regulation.
In a kind of exemplary embodiment of the disclosure, worked as according to the service request time of peripheral system and built-in system Preceding chronomere handles interior business processing situation, generates multistage requesting threshold, comprising: when according to the service request of peripheral system Between, obtain classification thresholds;According to business processing situation in built-in system current time unit, threshold value regulatory factor is generated;And By classification thresholds and threshold value regulatory factor, multistage requesting threshold is generated in real time.
In a kind of exemplary embodiment of the disclosure, according to the service request time of peripheral system, classification thresholds are obtained, It include: to obtain to receive the turn-on time that peripheral system carries out service request for the first time;According to turn-on time and service request time, Peripheral system is classified;And classification and multilevel threshold model according to peripheral system, obtain classification thresholds.
In a kind of exemplary embodiment of the disclosure: being L1 at interval of the first classification thresholds in the T1 time;At interval of T2 The second classification thresholds are L2 in time;... and at interval of the n-th classification thresholds Ln in the Tn time;Wherein T1, T2 ... Tn is Time interval, L1, L2 ... Ln is classification thresholds.
In a kind of exemplary embodiment of the disclosure, feelings are handled according to processing business in built-in system current time unit Condition generates threshold value regulatory factor, comprising: obtains the portfolio that built-in system is handled in current time unit, it is negative to generate first Loading capability;The portfolio that built-in system is handled in order history chronomere is obtained, the second load capacity is generated;It obtains internal System received service request amount in current time unit;And pass through the first load capacity, the second load capacity and industry Business request amount, generates the threshold value regulatory factor.
In a kind of exemplary embodiment of the disclosure, further includes: determine corresponding first weight of the first load capacity;With And determine corresponding second weight of the second load capacity, according to first load capacity, first weight, described second negative Loading capability, second weight and the service request amount, generate the threshold value regulatory factor.
In a kind of exemplary embodiment of the disclosure, the threshold value regulatory factor, comprising: f (Q)=(a*b+c*d)/p; Wherein, f (Q) is threshold value regulatory factor, and p is built-in system received service request amount in current time unit, and a is first negative Loading capability, b are the first weight, and c is the second load capacity, and d is the second weight.
In a kind of exemplary embodiment of the disclosure, multistage requesting threshold are as follows: F1=f (Q) L1;F2=f (Q) L2;... and Fn=f (Q) Ln;Wherein, F1, F2 ... Fn are multistage requesting threshold, and f (Q) is threshold value regulatory factor, L1, L2 ... Ln is classification thresholds.
In a kind of exemplary embodiment of the disclosure, judge whether the amount of access of peripheral system is more than multistage amount of access threshold Value, which is characterized in that judge peripheral system amount of access whether be more than each grade in multistage requesting threshold threshold value.
In a kind of exemplary embodiment of the disclosure, further includes: if the amount of access of peripheral system is more than multistage access Threshold value is measured, then refuses service request.
According to an aspect of the invention, it is proposed that a kind of system for controlling flowing of access, which includes: reception mould Block, for receiving the service request of peripheral system;Judgment module, for judging periphery according to the service request time of peripheral system Whether the amount of access of system is more than multistage requesting threshold, and multistage requesting threshold is according to different service request time, setting Different requesting thresholds;And processing module, for locating when the amount of access of peripheral system is less than multistage requesting threshold Manage service request.
In a kind of exemplary embodiment of the disclosure, threshold module includes: first threshold module, for being according to periphery The turn-on time of system obtains classification thresholds;Threshold adjustment, for according to business processing in built-in system current time unit Situation generates threshold value regulatory factor;And threshold generation module, for passing through classification thresholds and threshold value regulatory factor, in real time life At multistage requesting threshold.
The method and system according to the present invention for being used to control flowing of access, can prevent due to peripheral system abnormal flow Access and to pressure caused by core system.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited Invention.
Detailed description of the invention
Its example embodiment is described in detail by referring to accompanying drawing, above and other target of the invention, feature and advantage will It becomes more fully apparent.Drawings discussed below is only some embodiments of the present invention, for the ordinary skill of this field For personnel, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is shown according to an exemplary embodiment a kind of for controlling the flow chart of the method for flowing of access.
Fig. 2 be show according to another exemplary embodiment it is a kind of for controlling the flow chart of the method for flowing of access.
Fig. 3 be show according to another exemplary embodiment it is a kind of for controlling the flow chart of the method for flowing of access.
Fig. 4 is shown according to an exemplary embodiment a kind of for controlling the block diagram of the system of flowing of access.
Fig. 5 be show according to another exemplary embodiment it is a kind of for controlling the block diagram of flowing of access system.
Fig. 6 be show according to another exemplary embodiment it is a kind of for controlling the block diagram of flowing of access system.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will be comprehensively and complete It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure Same or similar part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to provide and fully understand to the embodiment of the present invention.However, It will be appreciated by persons skilled in the art that technical solution of the present invention can be practiced without one or more in specific detail, Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation are to avoid fuzzy each aspect of the present invention.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
It should be understood that although herein various assemblies may be described using term first, second, third, etc., these groups Part should not be limited by these terms.These terms are to distinguish a component and another component.Therefore, first group be discussed herein below Part can be described as the second component without departing from the teaching of disclosure concept.As used herein, term " and/or " include associated All combinations for listing any of project and one or more.
It will be understood by those skilled in the art that attached drawing is the schematic diagram of example embodiment, module or process in attached drawing Necessary to not necessarily implementing the present invention, therefore it cannot be used for limiting the scope of the invention.
Fig. 1 is shown according to an exemplary embodiment a kind of for controlling the flow chart of the method for flowing of access.
As shown in Figure 1, receiving the service request of peripheral system in S102.As described above, peripheral system may be, for example, External program, can e.g., including property management company's joining procedure, invention is not limited thereto.
In S104, judge whether the amount of access of the peripheral system surpasses according to the service request time of the peripheral system Multistage requesting threshold is crossed, the multistage requesting threshold sets different amount of access thresholds according to the different service request time Value.It in the present embodiment, can be for example, distinguishing each periphery by the way that unique identity AppId is arranged to each peripheral routine Program.Can also for example, distinguish each peripheral routine according to the specific identification code of peripheral routine itself, the present invention not as Limit.To each peripheral routine, his service request time is recorded.Peripheral routine can carry out multiple service request, can also for example, Record the time of peripheral requested service each time.It can also be for example, in statistics current time unit, the case where business processing.It can example Such as, comprehensive to divide according to number of services situation to be processed in history current time business processing situation and current time unit Business processing situation in analysis statistics current time unit.The case where according to the time of service request and business processing, generates Multistage requesting threshold.It in embodiments of the present invention, can be for example, counting the business processing situation of core system.Of the invention real It applies in example, multistage requesting threshold may be, for example, hierarchical form, have different requesting thresholds judging the different time When whether the amount of access of peripheral system is more than multistage requesting threshold, it is no more than in the amount of access of each grade of peripheral system When corresponding multistage requesting threshold, just determine to meet the requirements.
In S106, processing business request.When the amount of access of peripheral system is less than multistage requesting threshold, industry is handled Business.
In S108, refuse service request.When the amount of access of peripheral system is more than multistage requesting threshold, refuse business.
Method according to the present invention for controlling flowing of access is meeting periphery by setting multistage requesting threshold While system programization transaction instantaneous traffic request amount is larger, and the excess that can prevent sequencing from trading accesses and leads to core The excessively high situation of system permanent load is felt concerned about, which can prevent from giving core system since peripheral system abnormal flow accesses Pressure caused by system.
It will be clearly understood that the present disclosure describe how being formed and using particular example, but the principle of the present invention is not limited to These exemplary any details.On the contrary, the introduction based on present disclosure, these principles can be applied to many other Embodiment.
In a kind of exemplary embodiment of the disclosure, multistage requesting threshold according to the business in current time unit at Manage situation dynamic regulation.
Fig. 2 be show according to another exemplary embodiment it is a kind of for controlling the flow chart of the method for flowing of access.
As shown in Fig. 2, according to the service request time of peripheral system, obtaining classification thresholds in S201.Such as institute above It states, each peripheral routine corresponds to individual session information, i.e. the session of peripheral system and core system and peripheral system AppId is corresponded.Using session establishment as initial time, session is established in the first time service request for receiving peripheral routine. According to initial time, when peripheral system submits service request each time, the time interval of itself and initial time is calculated, according to Time interval obtains classification thresholds.
In S204, according to business processing situation in built-in system current time unit, threshold value regulatory factor is generated.Statistics In current time unit, the case where business processing.Can for example, according to history current time business processing situation and it is current when Between number of services situation to be processed in unit, the business processing situation in comprehensive analysis statistics but preceding chronomere.Can for example, The portfolio that built-in system is handled in current time unit is obtained, the first load capacity is generated;Built-in system is obtained predetermined The portfolio handled in historical time unit generates the second load capacity;Determine corresponding first weight of the first load capacity;With And determine corresponding second weight of the second load capacity.And it obtains built-in system received business in current time unit and asks The amount of asking.According to above-mentioned data, threshold value regulatory factor is generated.
In S206, by classification thresholds and threshold value regulatory factor, multistage requesting threshold is generated.
Method according to the present invention for controlling flowing of access, is calculated negative by the practical operation situation of core system It is negative can to alleviate core system so that requesting threshold can be loaded according to core system carries out dynamic adjustment for loading capability Excessively high situation is carried, ensures the service quality of core system.
Fig. 3 be show according to another exemplary embodiment it is a kind of for controlling the flow chart of the method for flowing of access.Fig. 3 It is the exemplary illustration for peripheral system access built-in system.
As shown in figure 3, in the present embodiment, built-in system includes core system and flow control center.As described above, it accesses Amount be it is dialogue-based calculated and controlled, each peripheral routine corresponds to individual session information, i.e. session and AppId mono- One is corresponding.Multistage amount of access calculation method is using session establishment as initial time, and flow control system is receiving the first of peripheral routine Session is established when secondary service request, it can be for example, as shown in S302-S312.In terms of flowing of access Multistage Control, in the present embodiment Method is the multistage flow threshold being able to access that by the way that peripheral routine (each peripheral routine has unique identity AppId) is arranged Value, for peripheral routine only in flow threshold of the amount of access without departing from each rank corresponding to itself, request could be by flow control System is let pass, and core system is sent to;When the amount of access of peripheral routine is beyond the flow threshold of any one rank corresponding to itself When value, this access denied can be for example, as shown in S314-S326.
In a kind of exemplary embodiment of the disclosure, according to the service request time of peripheral system, classification thresholds are obtained, It include: to obtain to receive the turn-on time that peripheral system carries out service request for the first time;According to turn-on time and service request time, Peripheral system is classified;And classification and multilevel threshold model according to peripheral system, obtain classification thresholds.In this implementation In example: being L1 at interval of the first classification thresholds in the T1 time;It is L2 at interval of the second classification thresholds in the T2 time;... and it is every It is spaced the n-th classification thresholds Ln in the Tn time;Wherein T1, T2 ... Tn is time interval, L1, L2 ... Ln is classification thresholds.
T1, T2 ... Tn and L1, L2 ... Ln meets the following conditions simultaneously:
1) T1 < T2 < ... < Tn (time span is incremental step by step)
2) L1 < L2 < ... < Ln (upper threshold is incremental step by step)
3) 0 < β of L2=β 2T2L1/T1=T2 β 2L1 2 < 1
30 < β of β 2L1 3 < 1 of L3=β 3T3L2/T2=T3 β
4 β of L4=β 4*T4*L3/T3=T4 β, 30 < β of β 2L1 4 < 1
……
3 n < 1 β 0 < β of 2L1 Ln=Tn β n ... β
In the present embodiment, β n is n grades of threshold value decay factors;Rearrangement condition 3 is as follows:
0 < β of L2/T2=β 2L1 2 < 1
30 < β of β 2L1 2 < 1 of L3/T3=β
4 β of L4/T4=β, 30 < β of β 2L1 3 < 1
……
3 n < 1 β 0 < β of 2L1 Ln/Tn=β n ... β
Ln/Tn indicates that average amount of access per second, condition 3 are to indicate that the average value per second of requesting threshold is to successively decrease step by step 's.
N-th grade of access amount control method be, from (0, Tn] amount of access in time interval is no more than Ln, when belonging to this Between each service request in range all make actual access number Mn increase by 1, until Mn >=Ln, service request is flowed by n-th grade Access rule is measured to intercept;Tn+1 at the moment, that is, jump to lower a statistical time, Mn is reset as 0, and flow recalculates.Appoint The amount of access for rank of anticipating all is using identical calculation method.In the present embodiment, only when n grades of amount of access rules all school It tests and passes through, i.e., amount of access is less than preset threshold value, and every grade of amount of access number just carries out increase operation.
By taking 3 grades of flow control methods as an example, the flow threshold of a certain peripheral routine is provided that
T1=1, L1=20 (β 2=0.3)
T2=30, L2=T2 β 2L1=180 (β 3=0.2)
T3=300,3 β 2L1=360 of L3=T3 β
Since session establishment, i.e., session establishment is as start time, corresponding 0 second hereafter.
The amount of access upper limit that first classification thresholds are limited in peripheral routine per second is 20 times.(0,1] time range of second Interior, first 20 times each access can all make the actual access number M1 of 1 grade of flow increase by 1.Until M1=20, (0,1] second Subsequent access in time range will be intercepted by the first classification thresholds;(1,2] in second section, the first classification thresholds are corresponding Actual access number counts again, that is, sets M1=0, amount of access verification rule with (0,1] second;Subsequent (3,4], (4,5] ... The time of second, is all identical process.
The amount of access upper limit that second classification thresholds limit every 30 seconds peripheral sequences is 180 times.(0,30] in second time range, First 180 times each access can all make the actual access number M2 of 2 grades of flows increase by 1.Until M2=180, (0,30] second Time range in subsequent access will be intercepted by the second classification thresholds;(30,60] in second section, the second classification thresholds pair The actual access number answered counts again, that is, sets M2=0, amount of access verification rule with (0,30] second;Subsequent (60,90], (90,120] ... the time of second is all identical process.
The amount of access upper limit that third classification thresholds limit every 300 seconds peripheral sequences is 600 times.(0,300] second time range Interior, first 600 times each access can all make the actual access number M3 of 3 grades of flows increase by 1.Until M3=600, (0, 300] subsequent access in the time range of second will be intercepted by third classification thresholds;The (300,600] in second section, third point The corresponding actual access number of grade threshold value counts again, that is, sets M3=0, amount of access verification rule with (0,300] second;It is subsequent (600,900], (and 900,1200] ... the time of second is all identical process.
1 grade, 2 grades, 3 grades flow actual access number without departing from corresponding flow threshold upper limit when, by 1 Grade, 2 grades, 3 grades of actual access number increase by 1, and notification payload computing module core system receives 1 service request;Extremely When occurring in which that the actual access number of level-one flow is more than the corresponding flow threshold upper limit less, refuse the secondary visit of peripheral routine Ask request.
In a kind of exemplary embodiment of the disclosure, further includes: f (Q)=(a*b+c*d)/p;Wherein, f (Q) is threshold value Regulatory factor, p are built-in system received service request amount in current time unit, and a is the first load capacity, b first Weight, c are the second load capacity, and d is the second weight.In the present embodiment, multistage requesting threshold are as follows: F1=f (Q) L1;F2 =f (Q) L2;... and Fn=f (Q) Ln;Wherein, F1, F2 ... Fn are multistage requesting threshold, f (Q) be threshold value adjust because Son, L1, L2 ... Ln are classification thresholds.
The calculating of system load situation is completed by load computing module.It include: statistics core system in current time list Service request amount received by position counts core system in the business of current time unit as current core system pressure Number is handled as the first load capacity of core system;Business processing number of the core system within the phase of history time is counted as core Feel concerned about the second load capacity of system.According to the first load capacity, corresponding first weight of the first load capacity, the second load capacity, Corresponding second weight of second load capacity determines the load capacity of core system.According to current core system pressure and core The load capacity of system determines the loading condition of core system.According to the first load capacity, the first weight, the second load capacity, Second weight and service request amount generate threshold value regulatory factor.
Chronomere in the present embodiment can be with self-defining length;The phase of history time refers to integral multiple chronomere Length.
It can be for example, according to following formula computing system loading condition:
Q=p/ (a*b+c*d)
Wherein: Q indicates that the loading condition of core system, p are that built-in system received business in current time unit is asked The amount of asking, a are the first load capacity, and b is the first weight, and c is the second load capacity, and d is the second weight.
Multistage requesting threshold is generated according to threshold value regulatory factor are as follows: F1=f (Q) L1;F2=f (Q) L2;... and Fn =f (Q) Ln;Wherein, F1, F2 ... Fn are multistage requesting threshold, and f (Q) is threshold value regulatory factor, and L1, L2 ... Ln are point Grade threshold value.
It is easily understood that when the business processing quantity of core system processing is equal to received service request number, It is considered that core system is not extra-heavy at this time.
In p=a, requesting threshold Ln is without adjustment, i.e. f (Q)=1.When inquiry core system is in the phase of history time When interior business processing number is as the second load capacity of core system, such as time range is preceding 100 chronomeres, that In some chronomere if when business number handled by core system is equal to the service request number received, the time As the range for calculating the second load capacity of core system, i.e., only worked as service request number is not greater than business processing number to unit When, which is just considered as calculating the valid data of the second load capacity.
With three-level access amount control method for example, the flow threshold of some peripheral routine is as follows:
T1=1, L1=20 (β 2=0.3)
T2=30, L2=T2 β 2L1=180 (β 3=0.2)
T3=300,3 β 2L1=360 of L3=T3 β
Core system information is as follows:
P=1000
B=0.6, a=800
In the historical data of preceding 100 chronomeres, the value of c is calculated in the method for arithmetic mean
D=0.4, c=700
Q=1000/ (0.6*800+0.4*700)=25/19
In the present embodiment, f (Q)=1/Q=19/25
Then flow threshold adjusted is
T1=1, f (Q) * L1=20*19/25=15
T2=30, f (Q) * L2=180*19/25=136
T3=300, f (Q) * L3=360*19/25=272
It will be appreciated by those skilled in the art that realizing that all or part of the steps of above-described embodiment is implemented as being executed by CPU Computer program.When the computer program is executed by CPU, above-mentioned function defined by the above method provided by the invention is executed Energy.The program can store in a kind of computer readable storage medium, which can be read-only memory, magnetic Disk or CD etc..
Further, it should be noted that above-mentioned attached drawing is only place included by method according to an exemplary embodiment of the present invention Reason schematically illustrates, rather than limits purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not indicated or is limited at these The time sequencing of reason.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Following is apparatus of the present invention embodiment, can be used for executing embodiment of the present invention method.For apparatus of the present invention reality Undisclosed details in example is applied, embodiment of the present invention method is please referred to.
Fig. 4 is shown according to an exemplary embodiment a kind of for controlling the block diagram of the system of flowing of access.
Wherein receiving module 402 is used to receive the service request of peripheral system.
Judgment module 404 is used to judge according to the service request time of the peripheral system amount of access of the peripheral system It whether is more than multistage requesting threshold, the multistage requesting threshold sets different visits according to the different service request time The amount of asking threshold value.
Processing module 406 is used for when the amount of access of peripheral system is less than multistage requesting threshold, processing business request.
Provided by the present invention for controlling the device of flowing of access, by setting multistage requesting threshold, meeting program Change the transaction biggish demand of instantaneous traffic request amount simultaneously, and the excess that can prevent sequencing from trading accesses and leads to core system System load too high, the processing mode can be prevented as the access of peripheral system abnormal flow and to pressure caused by core system.
Fig. 5 be show according to another exemplary embodiment it is a kind of for controlling the block diagram of flowing of access system.
Wherein first threshold module 502 is used for the turn-on time according to peripheral system, obtains classification thresholds.
Threshold adjustment 504 is used to generate threshold value tune according to business processing situation in built-in system current time unit Save the factor.
Threshold generation module 506 is used to generate multistage requesting threshold in real time by classification thresholds and threshold value regulatory factor.
Fig. 6 be show according to another exemplary embodiment it is a kind of for controlling the block diagram of flowing of access system.
As shown in fig. 6, the service request of peripheral routine is first when peripheral access system 602 needs to access core system 606 It is first received by flow control system 604, request is transferred to 6042 checking treatment of flow-control module first by flow control system 604.Work as flow When the amount of access for verifying peripheral routine is less than threshold value, 6046 core system of notification payload computing module connects control module 6042 1 business access is received, service request is then transmitted to core system 606 again;When flow-control module 6042 is outer in verification When enclosing the amount of access of program more than threshold value, directly this access of refusal peripheral routine.
When core system 606 responds the access request of peripheral routine, i.e. service response.Service response returns to flow control first System 606,6046 core system of flow control system notification payload computing module have handled 1 business access.
Load computing module 6046 periodically count business access amount that core system receives and core system handles Business access amount obtains the loading condition of system, while the loading condition notification threshold of system is adjusted module 6044.Threshold value tune The system load situation based on the received of mould preparation block 6044 adjusts the multistage requesting threshold of flow control control module 6042.
It will be appreciated by those skilled in the art that above-mentioned each module can be distributed in device according to the description of embodiment, it can also Uniquely it is different from one or more devices of the present embodiment with carrying out corresponding change.The module of above-described embodiment can be merged into One module, can also be further split into multiple submodule.
By the description of above embodiment, those skilled in the art is it can be readily appreciated that example embodiment described herein It can also be realized in such a way that software is in conjunction with necessary hardware by software realization.Therefore, implement according to the present invention The technical solution of example can be embodied in the form of software products, which can store in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that a calculating equipment (can To be personal computer, server, mobile terminal or network equipment etc.) it executes according to the method for the embodiment of the present invention.
By above detailed description, those skilled in the art is it can be readily appreciated that according to an embodiment of the present invention for controlling The method and system of flowing of access processed have one or more of the following advantages.
According to some embodiments, the method for controlling flowing of access of the invention, by setting multistage requesting threshold, Meeting the sequencing transaction biggish demand of instantaneous traffic request amount simultaneously, but the excessive access that can prevent sequencing from trading and Lead to core system load too high, which can prevent from making since peripheral system abnormal flow is accessed to core system At pressure.
According to other embodiments, the method for controlling flowing of access of the invention passes through the reality by core system Border operating condition calculates load capacity, so that requesting threshold can be loaded according to core system carries out dynamic adjustment, The case where core system load too high can be alleviated, ensures the service quality of core system.
It is particularly shown and described exemplary embodiment of the present invention above.It should be appreciated that the present invention is not limited to Detailed construction, set-up mode or implementation method described herein;On the contrary, it is intended to cover included in appended claims Various modifications and equivalence setting in spirit and scope.
In addition, structure shown by this specification Figure of description, ratio, size etc., only to cooperate specification institute Disclosure, for skilled in the art realises that be not limited to the enforceable qualifications of the disclosure with reading, therefore Do not have technical essential meaning, the modification of any structure, the change of proportionate relationship or the adjustment of size are not influencing the disclosure Under the technical effect and achieved purpose that can be generated, it should all still fall in technology contents disclosed in the disclosure and obtain and can cover In the range of.Meanwhile cited such as "upper" in this specification, " first ", " second " and " one " term, be also only and be convenient for Narration is illustrated, rather than to limit the enforceable range of the disclosure, relativeness is altered or modified, without substantive change Under technology contents, when being also considered as the enforceable scope of the present invention.

Claims (13)

1. a kind of method for controlling flowing of access characterized by comprising
Receive the service request of peripheral system;
The service request time based on the peripheral system carries out grade classification to the amount of access of the peripheral system, determines not The amount of access of the peripheral system of ad eundem with judge the different grades of peripheral system the amount of access whether More than multistage requesting threshold,
The multistage requesting threshold sets different requesting thresholds according to the different service request time;And
If the amount of access of the different grades of peripheral system is all less than the multistage requesting threshold, institute is handled State service request.
2. the method as described in claim 1, which is characterized in that the multistage requesting threshold is according in current time unit Business processing situation dynamic regulation.
3. the method as described in claim 1, which is characterized in that further include:
According to the service request time of the peripheral system, classification thresholds are obtained;
According to business processing situation in built-in system current time unit, threshold value regulatory factor is generated;And
By the classification thresholds and the threshold value regulatory factor, the multistage requesting threshold is generated.
4. method as claimed in claim 3, which is characterized in that when the service request according to the peripheral system Between, obtain classification thresholds, comprising:
Acquisition receives the turn-on time that the peripheral system carries out service request for the first time;
According to the turn-on time and the service request time, the peripheral system is classified;And
According to the classification of the peripheral system and multilevel threshold model, the classification thresholds are obtained.
5. method as claimed in claim 4, the multilevel threshold model it is characterized by:
It is L1 at interval of the first classification thresholds in the T1 time;
It is L2 at interval of the second classification thresholds in the T2 time;
……;And
At interval of the n-th classification thresholds Ln in the Tn time;
Wherein T1, T2 ... Tn is time interval, L1, L2 ... Ln is the classification thresholds.
6. method as claimed in claim 3, which is characterized in that described according to processing business in built-in system current time unit Disposition generates threshold value regulatory factor, comprising:
The portfolio that built-in system is handled in current time unit is obtained, the first load capacity is generated;
The portfolio that built-in system is handled in order history chronomere is obtained, the second load capacity is generated;
Obtain built-in system received service request amount in current time unit;And
By first load capacity, second load capacity and the service request amount, generates the threshold value and adjust The factor.
7. method as claimed in claim 6, which is characterized in that according to first load capacity, second load capacity And the service request amount, generate the threshold value regulatory factor, comprising:
Determine corresponding first weight of first load capacity;
Determine corresponding second weight of second load capacity;And
According to first load capacity, first weight, second load capacity, second weight and the industry Business request amount, generates the threshold value regulatory factor.
8. the method for claim 7, which is characterized in that the threshold value regulatory factor, comprising:
F (Q)=(a*b+c*d)/p;
Wherein, f (Q) is the threshold value regulatory factor, and p is the built-in system received service request in current time unit Amount, a are first load capacity, and b is first weight, and c is second load capacity, and d is second weight.
9. the method as described in claim 3 or 8, which is characterized in that the multistage requesting threshold are as follows:
F1=f (Q) L1;
F2=f (Q) L2;
……;And
Fn=f (Q) Ln;
Wherein, F1, F2 ... Fn are the multistage requesting threshold, and f (Q) is the threshold value regulatory factor, and L1, L2 ... Ln are Classification thresholds.
10. the method as described in claim 1, which is characterized in that described to judge the described of the different grades of peripheral system Whether amount of access is more than multistage requesting threshold, which is characterized in that whether the amount of access for judging the peripheral system is more than described The threshold value of each grade in multistage requesting threshold.
11. the method as described in claim 1, which is characterized in that further include:
If the amount of access of the peripheral system is more than the multistage requesting threshold, refuse the service request.
12. a kind of system for controlling flowing of access characterized by comprising
Receiving module, for receiving the service request of peripheral system;
Judgment module, for the service request time based on the peripheral system, the amount of access of the peripheral system is carried out etc. Grade divides, and determines the amount of access of the different grades of peripheral system to judge the institute of the different grades of peripheral system State whether amount of access is more than multistage requesting threshold;And
Processing module, for being less than the multistage requesting threshold in the amount of access of the different grades of peripheral system When, handle the service request.
13. system as claimed in claim 12, which is characterized in that further include:
First threshold module obtains classification thresholds for the turn-on time according to the peripheral system;
Threshold adjustment, for generating threshold value regulatory factor according to business processing situation in built-in system current time unit; And
Threshold generation module, for generating the multistage access in real time by the classification thresholds and the threshold value regulatory factor Measure threshold value.
CN201710058860.4A 2017-01-23 2017-01-23 For controlling the method and system of flowing of access Active CN106817424B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710058860.4A CN106817424B (en) 2017-01-23 2017-01-23 For controlling the method and system of flowing of access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710058860.4A CN106817424B (en) 2017-01-23 2017-01-23 For controlling the method and system of flowing of access

Publications (2)

Publication Number Publication Date
CN106817424A CN106817424A (en) 2017-06-09
CN106817424B true CN106817424B (en) 2019-08-27

Family

ID=59111701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710058860.4A Active CN106817424B (en) 2017-01-23 2017-01-23 For controlling the method and system of flowing of access

Country Status (1)

Country Link
CN (1) CN106817424B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483351B (en) * 2017-07-13 2021-09-28 中国银联股份有限公司 Current limiting method and device
CN107659454B (en) * 2017-10-13 2020-10-02 上海大象金泰科技有限公司 Server access early warning method and device
CN110933122B (en) * 2018-09-20 2023-06-23 北京默契破冰科技有限公司 Method, apparatus and computer storage medium for managing server
CN110120973A (en) * 2019-04-28 2019-08-13 华为技术有限公司 A kind of request control method, relevant device and computer storage medium
CN110768912B (en) * 2019-10-21 2022-11-18 中国民航信息网络股份有限公司 API gateway current limiting method and device
CN111262791A (en) * 2020-01-08 2020-06-09 江苏满运软件科技有限公司 Flow control method and device, electronic equipment and storage medium
CN111831448A (en) * 2020-07-16 2020-10-27 北京字节跳动网络技术有限公司 Request processing method and device and electronic equipment
CN112804244B (en) * 2021-01-26 2023-03-14 广州欢网科技有限责任公司 Method, device and equipment for intelligently controlling bottom micro-service flow by API gateway

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827033A (en) * 2010-04-30 2010-09-08 北京搜狗科技发展有限公司 Method and device for controlling network traffic and local area network system
CN102780603A (en) * 2011-05-11 2012-11-14 阿里巴巴集团控股有限公司 Web traffic control method and device
CN104518981A (en) * 2013-09-27 2015-04-15 深圳市腾讯计算机系统有限公司 Flow control method and device
CN105354258A (en) * 2015-10-22 2016-02-24 努比亚技术有限公司 Website data cache update apparatus and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219218B (en) * 2013-06-04 2018-05-08 新华三技术有限公司 A kind of method and device of active safety defence

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827033A (en) * 2010-04-30 2010-09-08 北京搜狗科技发展有限公司 Method and device for controlling network traffic and local area network system
CN102780603A (en) * 2011-05-11 2012-11-14 阿里巴巴集团控股有限公司 Web traffic control method and device
CN104518981A (en) * 2013-09-27 2015-04-15 深圳市腾讯计算机系统有限公司 Flow control method and device
CN105354258A (en) * 2015-10-22 2016-02-24 努比亚技术有限公司 Website data cache update apparatus and method

Also Published As

Publication number Publication date
CN106817424A (en) 2017-06-09

Similar Documents

Publication Publication Date Title
CN106817424B (en) For controlling the method and system of flowing of access
JP6703013B2 (en) Payment threshold acquisition method and device
CN107045455A (en) A kind of Docker Swarm cluster resource method for optimizing scheduling based on load estimation
KR101903623B1 (en) Burst mode control
CN108665366A (en) Determine method, terminal device and the computer readable storage medium of consumer&#39;s risk grade
CN106095554B (en) The method and device of batch data processing is carried out in the online stage in the daytime
US11416320B2 (en) Adaptive quota management system
CN105427170A (en) Asset allocation strategy matching method and device
Willems et al. Optimal regulation of network expansion
US20090178050A1 (en) Control of Access to Services and/or Resources of a Data Processing System
CN107203883A (en) A kind of risk control method and equipment
CN102932460A (en) Campus network peer-to-peer (P2P) incentive method based on contribution values
CN110348981A (en) Loan air control method and device, electronic equipment and computer readable storage medium
CN110415106A (en) A kind of performance analysis forecast assessment system of management body
CN106803815B (en) Flow control method and device
CN106506229B (en) A kind of SBS cloud application adaptive resource optimizes and revises system and method
CN107589980A (en) A kind of dispatching method of cloud computing resources
CN104283934A (en) WEB service pushing method and device based on reliability prediction and server
CN109783108A (en) A kind of optimization method for software and device
US20180018735A1 (en) Systems and methods for allocating trades among trading accounts
CN109040283A (en) A kind of modified load-balancing algorithm based on difference reaction type
CN107862605A (en) Assets transfer the possession of processing method, system and computer-readable recording medium
US8768827B1 (en) System and method for optimizing loan modifications
KR20190140374A (en) Method for Evaluating Prospects for Cryptocurrency Treading
CN109359988A (en) Resource allocation methods, system, server and storage medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191030

Address after: 310053 Two Eight Floors, 3588 Jiangnan Avenue, Binjiang District, Hangzhou City, Zhejiang Province

Co-patentee after: Hundsun Technologies Inc.

Patentee after: Hangzhou Ji Ji Network Technology Co., Ltd.

Address before: 310053 Hang Seng mansion, No. 3588, main road, the south of the River, Binjiang District, Hangzhou, Zhejiang province city

Patentee before: Hangzhou Ji Ji Network Technology Co., Ltd.

TR01 Transfer of patent right