CN109194759B - Network access method and system for degrading at front end - Google Patents
Network access method and system for degrading at front end Download PDFInfo
- Publication number
- CN109194759B CN109194759B CN201811074136.1A CN201811074136A CN109194759B CN 109194759 B CN109194759 B CN 109194759B CN 201811074136 A CN201811074136 A CN 201811074136A CN 109194759 B CN109194759 B CN 109194759B
- Authority
- CN
- China
- Prior art keywords
- configuration data
- server
- user side
- access request
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/63—Routing a service request depending on the request content or context
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/147—Network analysis or design for predicting network behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/61—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
Abstract
The invention discloses a network access method and a system for degrading at a front end, which comprises the following steps: the server updates the configuration data of the user side in advance; when the user side needs to send out an access request, the user side judges the access request according to the configuration data and then sends the access request to the server or the distribution terminal according to a judgment result; the server updates the configuration data of the user side according to the real-time access request quantity and the forecast access request quantity in the subsequent time period, and regulates and controls the access request quantity sent to the server and the distribution terminal by the user side through the configuration data. The method has the advantages that the access requests are distributed at the user end, the purpose of reducing the number of the access requests received by the server can be realized without additionally arranging middleware, and the development, operation and maintenance costs of software are greatly reduced. The network access method and the system are mainly applied to the scene that the system encounters high flow and high concurrency, degradation is directly realized at a user side, partial access requests with non-key functions are shunted, and the usability of the key functions is guaranteed.
Description
Technical Field
The invention relates to the internet technology, in particular to a network access method and a system for degrading at a front end.
Background
With the development of internet technology, the internet is more and more inseparable with people's lives. In the internet technology, a mobile phone terminal or a PC terminal is a user terminal, and an internet company provides a server for responding to an access request of the user terminal. In the existing application, the access request sent by the user terminal is generally directly responded by the server. In the response mode, a middleware is generally arranged on the server, when the access request amount of a user is large, the middleware intercepts and screens the access request sent to the server, sends part of the access request meeting the setting of the middleware to the server, and intercepts or distributes the rest of the access requests so as to protect key system modules such as the server. The response mode has the following problems in practical application: firstly, the development and application technology of the middleware is difficult, and the daily operation and maintenance cost is high, so that the development and maintenance cost of the software is high; secondly, the essence of the response mode is that the middleware processes or responds to a large number of access requests at the same time, namely the middleware replaces a server to bear the impact of a large number of access requests, and the middleware still has the risk of crashing due to impact receiving while having extremely high technical difficulty requirements.
Disclosure of Invention
In order to solve the problems existing in the prior art, the invention aims to provide a network access method and a system for front-end degradation, and the method and the system reduce the number of access requests received by a server and avoid the occurrence of server breakdown under the condition of not using middleware; and meanwhile, the development and maintenance cost of the software is greatly reduced.
The invention discloses a network access method and a system for degrading at a front end, which comprises the following steps:
s0, the server updates the configuration data of the user terminal in advance;
and S1, when the user end needs to send out the access request, the user end judges the access request according to the configuration data, and then sends the access request to the server or the distribution end according to the judgment result.
And S2, the server updates the configuration data of the user side according to the real-time access request quantity and the predicted access request quantity in the subsequent time period, and regulates and controls the access request quantity sent by the user side to the server and the distribution terminal through the configuration data.
Preferably, in step S1, the user compares the timestamp and the access object of the access request with the configuration data, the access request that matches the configuration data is sent to the distribution end, and the access request that does not match the configuration data is sent to the server.
Preferably, the configuration data is divided into a plurality of levels for implementing different levels of forking of access requests.
Preferably, the carrier of the configuration data is a configuration file.
Preferably, the loading process of the configuration data includes: when the user side is started, the user side sends a request to the server to acquire the configuration data, the server sends the configuration data to the user side after receiving the request, and the user side updates and stores the configuration data in the configuration file.
Preferably, the distribution end is a content distribution network.
Preferably, the accessing the object includes: home page, shopping cart page, order generation page, order payment page, commodity classification page, commodity list page and commodity comment page.
A network access system applying the network access method degraded at the front end comprises a server, a user end and a distribution network; the user side is provided with configuration data; the configuration data is used to regulate the number of access requests to a server or distribution network.
Preferably, the configuration data is used for comparing the timestamp of the access request and the access object at the user side.
The network access method and the system with the degradation at the front end have the advantages that the access requests are compared and distributed at the user end, and the purpose of reducing the number of the access requests received by the server can be realized without additionally arranging a middleware at the server, so that the development, operation and maintenance costs of software are greatly reduced; meanwhile, as the access requests are shunted at the user side and the quantity of the access requests received by the server is regulated and controlled through the configuration data, when the updating frequency of the configuration data is in the second level, the regulation and control effect is close to real-time regulation and control, the quantity of the access requests received by the server can be regulated and controlled in real time according to the state of the server, and the phenomenon of collapse caused by receiving a large quantity of access requests at the server side can not occur. The network access method and the system are mainly applied to the scene that the system encounters high flow and high concurrency, degradation is directly realized at a user side, partial access requests with non-key functions are shunted, and the usability of the key functions is guaranteed.
Drawings
Fig. 1 is a schematic structural diagram of a network access method and system with downgraded front end according to the present invention.
Description of reference numerals: 1-user terminal, 2-distributing terminal and 3-server.
Detailed Description
The present invention will be described in detail below, taking the use of shopping APP during shopping sessions as an example.
As shown in fig. 1, a network access method degraded at the front end according to the present invention includes the following steps:
firstly, the server 3 updates the configuration data of the user terminal 1 in advance;
and secondly, when the user side 1 needs to send an access request, the user side 1 judges the access request according to the configuration data, and then sends the access request to the server 3 or the distribution side 2 according to a judgment result.
And thirdly, the server 3 updates the configuration data of the user side 1 according to the real-time access request quantity and the predicted access request quantity in the subsequent time period, and regulates and controls the access request quantity sent by the user side 1 to the server 3 and the distribution terminal 2 through the configuration data.
A network access system applying the network access method degraded at the front end comprises a user end 1, a distributing end 2 and a server 3; the user side 1 is provided with configuration data; the configuration data is used to regulate the number of access requests to the server 2 or the distribution terminal 2.
In this embodiment, the shopping APP is the user side 1, and the server 3 is a shopping website server.
Before the shopping festival, the server 3 updates the configuration data in advance and stores the configuration data in the database, and the user terminal 1 pulls and updates the configuration data through the API interface. The point in time at which the configuration data is updated in advance can be freely selected, varying from a few days to a few seconds. The configuration data is stored in the client 1 in json format or xml format. The file size of the configuration file is extremely small, about only a few K to a few tens of K, the updating speed is high, and the updating can be completed within millisecond range generally. The loading process of the configuration data comprises the following steps: when the user side 1 is started, the user side 1 sends a request to the server 3 to acquire configuration data, the server 3 sends the configuration data to the user side 1 after receiving the request, and the user side 1 updates and stores the configuration data in a configuration file. In this embodiment, when a shopping session starts, for example, when the shopping session is performed by a little after the morning, the access request amount sent by the user side 1 increases suddenly, and the access objects are various. In the shopping process, a shopping cart page, an order generation page and an order payment page belong to core services, and the home page, the commodity classification page, the commodity list page, the commodity comment page and the like belong to non-core services. For convenience in expression and understanding, seven access objects, namely an order generation page, an order payment page, a shopping cart page, a home page, a commodity classification page, a commodity list page and a commodity comment page, are sequentially divided into seven levels from high to low, wherein the order generation page is a seven-level access request, and the commodity comment page is a one-level access request. Correspondingly, the configuration data is also divided into seven levels, and when the configuration data of a certain level is updated, the access request regulation of the certain level is correspondingly implemented. The level of the access request corresponds to the level of the configuration data one by one, and if the updated configuration data is in three levels, the primary access request, the secondary access request and the tertiary access request are all matched with the regulation and control rule of the configuration data. The profile, which is updated 6 hours in advance before the shopping node, specifies the level of access requests to be sent to the distributing end 2. When entering the zero point of the day of the shopping festival, the user terminal 1 compares the sent access request with the configuration file, the access request meeting the requirements of the configuration file is sent to the distribution terminal 2, and the rest is sent to the server 3 without limitation. In this embodiment, the distribution end 2 selects a content distribution network, i.e., CDN. In this embodiment, the configuration file pre-updated by the server 3 before the shopping session is a four-level configuration file, which is called four-level regulation. During the implementation of the four-level regulation, the user side 1 reads the configuration file each time an access request is issued, and first judges that the four-level regulation is implemented in the timestamp, then lists the access request objects conforming to the one-level, two-level, three-level, and four-level regulation rules, compares the access request objects with the access request objects issued by the user side 1, and distributes the access request if the access request objects issued by the user side 1 are included in the listed access request objects. That is, only the access requests of the core services of the five to seven levels of the order generation page, the order payment page and the shopping cart page are sent to the server 3 and are directly responded by the server 3. The remaining one to four levels of non-core traffic are then restricted by the configuration file, delivered to the CDN, and responded by the CDN. In this embodiment, four-stage regulation is performed in a time period from zero to two points. And according to the real-time access amount budget, the access amount when the time enters a two-point to five-point time period is estimated, the number of the estimated access requests is gradually reduced, at the moment, the server 3 updates a new configuration file, the user side 1 pulls the new configuration file, and the access requests with timestamps between two points and five points take effect. The new configuration file is a third-level configuration file, and three-level regulation is implemented, namely, an access request greater than the third level is responded by the server 3, and an access request less than or equal to the third level is responded by the CDN. When the total amount of the access requests of the user side 1 is reduced, the level of the access request regulation is properly reduced, and the response speed of part of the access requests is improved. When the total amount of the access requests is large, the access requests of the core services are preferentially ensured to be responded by the server 3, and the smooth response of the core services and the confidentiality of the user related information are ensured. Setting up multiple levels of configuration files allows better control of condition coverage and limits the number of access requests to the server 3. The server 3 can update the configuration file of the user terminal 1 at any time according to the total amount of the access requests and the predicted access request amount in the subsequent time period. When the update frequency of the configuration file is once thirty seconds or even higher, the regulation and control effect is close to real-time regulation and control, so that the server 3 can regulate and control the access request quantity sent from the client 1 to the server 3 in real time according to the access request quantity received by the server 3, and the phenomenon that the server 3 is broken down is avoided. The access requests are compared and distributed at the user side 1, and the purpose of reducing the number of the access requests received by the server can be realized without additionally arranging a middleware at the server 3, so that the development, operation and maintenance costs of software are greatly reduced.
It will be apparent to those skilled in the art that various other changes and modifications may be made in the above-described embodiments and concepts and all such changes and modifications are intended to be within the scope of the appended claims.
Claims (8)
1. A method of degrading network access at a head end, comprising the steps of:
s0, the server (3) updates the configuration data of the user side (1) in advance;
s1, when the user side (1) needs to send out the access request, the user side (1) judges the access request according to the configuration data, and then sends the access request to the server (3) or the distribution terminal (2) according to the judgment result;
s2, the server (3) updates the configuration data of the user side (1) according to the real-time access request quantity and the predicted access request quantity in the subsequent time period, and regulates and controls the access request quantity sent by the user side (1) to the server (3) and the distribution terminal (2) through the configuration data;
the configuration data is divided into a plurality of levels and used for shunting the access requests at different levels.
2. The method of claim 1, wherein in step S1, the client (1) compares the timestamp and the access object of the access request with the configuration data, the access request that matches the configuration data is sent to the distributor (2), and the access request that does not match the configuration data is sent to the server (3).
3. The method of claim 2, wherein accessing the object comprises: home page, shopping cart page, order generation page, order payment page, commodity classification page, commodity list page and commodity comment page.
4. A method of network access downgraded at the front end as claimed in claim 1, wherein the carrier of the configuration data is a configuration file.
5. The method of claim 4, wherein the loading of the configuration data comprises: when the user side (1) is started, the user side (1) sends a request to the server (3) to acquire the configuration data, the server (3) sends the configuration data to the user side (1) after receiving the request, and the user side (1) updates and stores the configuration data into the configuration file.
6. A method of network access downgraded at the front end, according to claim 1, characterised in that the distribution end (2) is a content distribution network.
7. A network access system applying the network access method degraded at the front end of any one of claims 1-6, comprising a user end (1), a distribution end (2) and a server (3); the method is characterized in that the user side (1) is provided with configuration data; the configuration data is used for regulating the number of access requests to the server (2) or the distribution terminal (2).
8. The network access system according to claim 7, wherein the configuration data is used to compare the timestamp of the access request and the access object at the user end (1).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811074136.1A CN109194759B (en) | 2018-09-14 | 2018-09-14 | Network access method and system for degrading at front end |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811074136.1A CN109194759B (en) | 2018-09-14 | 2018-09-14 | Network access method and system for degrading at front end |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109194759A CN109194759A (en) | 2019-01-11 |
CN109194759B true CN109194759B (en) | 2020-12-15 |
Family
ID=64911138
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811074136.1A Active CN109194759B (en) | 2018-09-14 | 2018-09-14 | Network access method and system for degrading at front end |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109194759B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110187987B (en) * | 2019-06-05 | 2022-02-25 | 北京百度网讯科技有限公司 | Method and apparatus for processing requests |
CN113055721B (en) * | 2019-12-27 | 2022-12-09 | 中国移动通信集团山东有限公司 | Video content distribution method and device, storage medium and computer equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764741A (en) * | 2009-11-27 | 2010-06-30 | 上海恒为信息科技有限公司 | Filtering and shunting device and method supporting multi-service function |
CN103931162A (en) * | 2014-01-20 | 2014-07-16 | 华为技术有限公司 | Method for processing service and network equipment |
CN104852934A (en) * | 2014-02-13 | 2015-08-19 | 阿里巴巴集团控股有限公司 | Method for realizing flow distribution based on front-end scheduling, device and system thereof |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130103785A1 (en) * | 2009-06-25 | 2013-04-25 | 3Crowd Technologies, Inc. | Redirecting content requests |
-
2018
- 2018-09-14 CN CN201811074136.1A patent/CN109194759B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764741A (en) * | 2009-11-27 | 2010-06-30 | 上海恒为信息科技有限公司 | Filtering and shunting device and method supporting multi-service function |
CN103931162A (en) * | 2014-01-20 | 2014-07-16 | 华为技术有限公司 | Method for processing service and network equipment |
CN104852934A (en) * | 2014-02-13 | 2015-08-19 | 阿里巴巴集团控股有限公司 | Method for realizing flow distribution based on front-end scheduling, device and system thereof |
Also Published As
Publication number | Publication date |
---|---|
CN109194759A (en) | 2019-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8140679B2 (en) | Method and system for automated session resource clean-up in a distributed client-server environment | |
US7451149B2 (en) | Extranet access management apparatus and method | |
CN103297529A (en) | Timestamp-based tree structure data synchronization method | |
CN104967861A (en) | CDN video buffer system and method | |
CN103095743A (en) | Handling method and system of grey release | |
CN103533023B (en) | Cloud service application cluster based on cloud service feature synchronizes system and synchronous method | |
CN105472002A (en) | Session synchronization method based on instant copying among cluster nodes | |
CN104243405A (en) | Request processing method, device and system | |
CN112714029B (en) | Method, device and equipment for scheduling content distribution network bandwidth | |
CN107197036A (en) | A kind of consistent processing method of information based on block chain and terminal | |
CN109194759B (en) | Network access method and system for degrading at front end | |
CN103607418B (en) | Large-scale data segmenting system based on cloud service data characteristics and dividing method | |
CN107451853A (en) | Method, apparatus, system and the storage medium that a kind of red packet distributes in real time | |
CN108696364B (en) | Request message processing method, chat room message server and chat room system | |
CN104518873A (en) | Anonymous login method and device | |
CN110310198A (en) | Management method, device, equipment and the readable storage medium storing program for executing of enterprise's amount information | |
CN102006282A (en) | Centralized control method for database access in client/server mode | |
CN109388655A (en) | A kind of method and apparatus of dynamic control of data access | |
WO2022062981A1 (en) | Resource scheduling method and system, electronic device, and computer-readable storage medium | |
CN117118742B (en) | Government affair data operation method and system based on access frequency monitoring | |
CN102811154B (en) | Resource acquisition method and network server system | |
CN105636031A (en) | Packet communication management method, apparatus and system | |
CN110417850B (en) | Software configuration acquisition method, system, server and medium | |
CN104166820A (en) | Data management method and system | |
CN110868304B (en) | PCC strategy issuing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |