CN109194759B - Network access method and system for degrading at front end - Google Patents

Network access method and system for degrading at front end Download PDF

Info

Publication number
CN109194759B
CN109194759B CN201811074136.1A CN201811074136A CN109194759B CN 109194759 B CN109194759 B CN 109194759B CN 201811074136 A CN201811074136 A CN 201811074136A CN 109194759 B CN109194759 B CN 109194759B
Authority
CN
China
Prior art keywords
configuration data
server
user side
access request
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811074136.1A
Other languages
Chinese (zh)
Other versions
CN109194759A (en
Inventor
余剑楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Mooyoo Network Technology Co ltd
Original Assignee
Guangzhou Mooyoo Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Mooyoo Network Technology Co ltd filed Critical Guangzhou Mooyoo Network Technology Co ltd
Priority to CN201811074136.1A priority Critical patent/CN109194759B/en
Publication of CN109194759A publication Critical patent/CN109194759A/en
Application granted granted Critical
Publication of CN109194759B publication Critical patent/CN109194759B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/147Network analysis or design for predicting network behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/61Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements

Abstract

The invention discloses a network access method and a system for degrading at a front end, which comprises the following steps: the server updates the configuration data of the user side in advance; when the user side needs to send out an access request, the user side judges the access request according to the configuration data and then sends the access request to the server or the distribution terminal according to a judgment result; the server updates the configuration data of the user side according to the real-time access request quantity and the forecast access request quantity in the subsequent time period, and regulates and controls the access request quantity sent to the server and the distribution terminal by the user side through the configuration data. The method has the advantages that the access requests are distributed at the user end, the purpose of reducing the number of the access requests received by the server can be realized without additionally arranging middleware, and the development, operation and maintenance costs of software are greatly reduced. The network access method and the system are mainly applied to the scene that the system encounters high flow and high concurrency, degradation is directly realized at a user side, partial access requests with non-key functions are shunted, and the usability of the key functions is guaranteed.

Description

Network access method and system for degrading at front end
Technical Field
The invention relates to the internet technology, in particular to a network access method and a system for degrading at a front end.
Background
With the development of internet technology, the internet is more and more inseparable with people's lives. In the internet technology, a mobile phone terminal or a PC terminal is a user terminal, and an internet company provides a server for responding to an access request of the user terminal. In the existing application, the access request sent by the user terminal is generally directly responded by the server. In the response mode, a middleware is generally arranged on the server, when the access request amount of a user is large, the middleware intercepts and screens the access request sent to the server, sends part of the access request meeting the setting of the middleware to the server, and intercepts or distributes the rest of the access requests so as to protect key system modules such as the server. The response mode has the following problems in practical application: firstly, the development and application technology of the middleware is difficult, and the daily operation and maintenance cost is high, so that the development and maintenance cost of the software is high; secondly, the essence of the response mode is that the middleware processes or responds to a large number of access requests at the same time, namely the middleware replaces a server to bear the impact of a large number of access requests, and the middleware still has the risk of crashing due to impact receiving while having extremely high technical difficulty requirements.
Disclosure of Invention
In order to solve the problems existing in the prior art, the invention aims to provide a network access method and a system for front-end degradation, and the method and the system reduce the number of access requests received by a server and avoid the occurrence of server breakdown under the condition of not using middleware; and meanwhile, the development and maintenance cost of the software is greatly reduced.
The invention discloses a network access method and a system for degrading at a front end, which comprises the following steps:
s0, the server updates the configuration data of the user terminal in advance;
and S1, when the user end needs to send out the access request, the user end judges the access request according to the configuration data, and then sends the access request to the server or the distribution end according to the judgment result.
And S2, the server updates the configuration data of the user side according to the real-time access request quantity and the predicted access request quantity in the subsequent time period, and regulates and controls the access request quantity sent by the user side to the server and the distribution terminal through the configuration data.
Preferably, in step S1, the user compares the timestamp and the access object of the access request with the configuration data, the access request that matches the configuration data is sent to the distribution end, and the access request that does not match the configuration data is sent to the server.
Preferably, the configuration data is divided into a plurality of levels for implementing different levels of forking of access requests.
Preferably, the carrier of the configuration data is a configuration file.
Preferably, the loading process of the configuration data includes: when the user side is started, the user side sends a request to the server to acquire the configuration data, the server sends the configuration data to the user side after receiving the request, and the user side updates and stores the configuration data in the configuration file.
Preferably, the distribution end is a content distribution network.
Preferably, the accessing the object includes: home page, shopping cart page, order generation page, order payment page, commodity classification page, commodity list page and commodity comment page.
A network access system applying the network access method degraded at the front end comprises a server, a user end and a distribution network; the user side is provided with configuration data; the configuration data is used to regulate the number of access requests to a server or distribution network.
Preferably, the configuration data is used for comparing the timestamp of the access request and the access object at the user side.
The network access method and the system with the degradation at the front end have the advantages that the access requests are compared and distributed at the user end, and the purpose of reducing the number of the access requests received by the server can be realized without additionally arranging a middleware at the server, so that the development, operation and maintenance costs of software are greatly reduced; meanwhile, as the access requests are shunted at the user side and the quantity of the access requests received by the server is regulated and controlled through the configuration data, when the updating frequency of the configuration data is in the second level, the regulation and control effect is close to real-time regulation and control, the quantity of the access requests received by the server can be regulated and controlled in real time according to the state of the server, and the phenomenon of collapse caused by receiving a large quantity of access requests at the server side can not occur. The network access method and the system are mainly applied to the scene that the system encounters high flow and high concurrency, degradation is directly realized at a user side, partial access requests with non-key functions are shunted, and the usability of the key functions is guaranteed.
Drawings
Fig. 1 is a schematic structural diagram of a network access method and system with downgraded front end according to the present invention.
Description of reference numerals: 1-user terminal, 2-distributing terminal and 3-server.
Detailed Description
The present invention will be described in detail below, taking the use of shopping APP during shopping sessions as an example.
As shown in fig. 1, a network access method degraded at the front end according to the present invention includes the following steps:
firstly, the server 3 updates the configuration data of the user terminal 1 in advance;
and secondly, when the user side 1 needs to send an access request, the user side 1 judges the access request according to the configuration data, and then sends the access request to the server 3 or the distribution side 2 according to a judgment result.
And thirdly, the server 3 updates the configuration data of the user side 1 according to the real-time access request quantity and the predicted access request quantity in the subsequent time period, and regulates and controls the access request quantity sent by the user side 1 to the server 3 and the distribution terminal 2 through the configuration data.
A network access system applying the network access method degraded at the front end comprises a user end 1, a distributing end 2 and a server 3; the user side 1 is provided with configuration data; the configuration data is used to regulate the number of access requests to the server 2 or the distribution terminal 2.
In this embodiment, the shopping APP is the user side 1, and the server 3 is a shopping website server.
Before the shopping festival, the server 3 updates the configuration data in advance and stores the configuration data in the database, and the user terminal 1 pulls and updates the configuration data through the API interface. The point in time at which the configuration data is updated in advance can be freely selected, varying from a few days to a few seconds. The configuration data is stored in the client 1 in json format or xml format. The file size of the configuration file is extremely small, about only a few K to a few tens of K, the updating speed is high, and the updating can be completed within millisecond range generally. The loading process of the configuration data comprises the following steps: when the user side 1 is started, the user side 1 sends a request to the server 3 to acquire configuration data, the server 3 sends the configuration data to the user side 1 after receiving the request, and the user side 1 updates and stores the configuration data in a configuration file. In this embodiment, when a shopping session starts, for example, when the shopping session is performed by a little after the morning, the access request amount sent by the user side 1 increases suddenly, and the access objects are various. In the shopping process, a shopping cart page, an order generation page and an order payment page belong to core services, and the home page, the commodity classification page, the commodity list page, the commodity comment page and the like belong to non-core services. For convenience in expression and understanding, seven access objects, namely an order generation page, an order payment page, a shopping cart page, a home page, a commodity classification page, a commodity list page and a commodity comment page, are sequentially divided into seven levels from high to low, wherein the order generation page is a seven-level access request, and the commodity comment page is a one-level access request. Correspondingly, the configuration data is also divided into seven levels, and when the configuration data of a certain level is updated, the access request regulation of the certain level is correspondingly implemented. The level of the access request corresponds to the level of the configuration data one by one, and if the updated configuration data is in three levels, the primary access request, the secondary access request and the tertiary access request are all matched with the regulation and control rule of the configuration data. The profile, which is updated 6 hours in advance before the shopping node, specifies the level of access requests to be sent to the distributing end 2. When entering the zero point of the day of the shopping festival, the user terminal 1 compares the sent access request with the configuration file, the access request meeting the requirements of the configuration file is sent to the distribution terminal 2, and the rest is sent to the server 3 without limitation. In this embodiment, the distribution end 2 selects a content distribution network, i.e., CDN. In this embodiment, the configuration file pre-updated by the server 3 before the shopping session is a four-level configuration file, which is called four-level regulation. During the implementation of the four-level regulation, the user side 1 reads the configuration file each time an access request is issued, and first judges that the four-level regulation is implemented in the timestamp, then lists the access request objects conforming to the one-level, two-level, three-level, and four-level regulation rules, compares the access request objects with the access request objects issued by the user side 1, and distributes the access request if the access request objects issued by the user side 1 are included in the listed access request objects. That is, only the access requests of the core services of the five to seven levels of the order generation page, the order payment page and the shopping cart page are sent to the server 3 and are directly responded by the server 3. The remaining one to four levels of non-core traffic are then restricted by the configuration file, delivered to the CDN, and responded by the CDN. In this embodiment, four-stage regulation is performed in a time period from zero to two points. And according to the real-time access amount budget, the access amount when the time enters a two-point to five-point time period is estimated, the number of the estimated access requests is gradually reduced, at the moment, the server 3 updates a new configuration file, the user side 1 pulls the new configuration file, and the access requests with timestamps between two points and five points take effect. The new configuration file is a third-level configuration file, and three-level regulation is implemented, namely, an access request greater than the third level is responded by the server 3, and an access request less than or equal to the third level is responded by the CDN. When the total amount of the access requests of the user side 1 is reduced, the level of the access request regulation is properly reduced, and the response speed of part of the access requests is improved. When the total amount of the access requests is large, the access requests of the core services are preferentially ensured to be responded by the server 3, and the smooth response of the core services and the confidentiality of the user related information are ensured. Setting up multiple levels of configuration files allows better control of condition coverage and limits the number of access requests to the server 3. The server 3 can update the configuration file of the user terminal 1 at any time according to the total amount of the access requests and the predicted access request amount in the subsequent time period. When the update frequency of the configuration file is once thirty seconds or even higher, the regulation and control effect is close to real-time regulation and control, so that the server 3 can regulate and control the access request quantity sent from the client 1 to the server 3 in real time according to the access request quantity received by the server 3, and the phenomenon that the server 3 is broken down is avoided. The access requests are compared and distributed at the user side 1, and the purpose of reducing the number of the access requests received by the server can be realized without additionally arranging a middleware at the server 3, so that the development, operation and maintenance costs of software are greatly reduced.
It will be apparent to those skilled in the art that various other changes and modifications may be made in the above-described embodiments and concepts and all such changes and modifications are intended to be within the scope of the appended claims.

Claims (8)

1. A method of degrading network access at a head end, comprising the steps of:
s0, the server (3) updates the configuration data of the user side (1) in advance;
s1, when the user side (1) needs to send out the access request, the user side (1) judges the access request according to the configuration data, and then sends the access request to the server (3) or the distribution terminal (2) according to the judgment result;
s2, the server (3) updates the configuration data of the user side (1) according to the real-time access request quantity and the predicted access request quantity in the subsequent time period, and regulates and controls the access request quantity sent by the user side (1) to the server (3) and the distribution terminal (2) through the configuration data;
the configuration data is divided into a plurality of levels and used for shunting the access requests at different levels.
2. The method of claim 1, wherein in step S1, the client (1) compares the timestamp and the access object of the access request with the configuration data, the access request that matches the configuration data is sent to the distributor (2), and the access request that does not match the configuration data is sent to the server (3).
3. The method of claim 2, wherein accessing the object comprises: home page, shopping cart page, order generation page, order payment page, commodity classification page, commodity list page and commodity comment page.
4. A method of network access downgraded at the front end as claimed in claim 1, wherein the carrier of the configuration data is a configuration file.
5. The method of claim 4, wherein the loading of the configuration data comprises: when the user side (1) is started, the user side (1) sends a request to the server (3) to acquire the configuration data, the server (3) sends the configuration data to the user side (1) after receiving the request, and the user side (1) updates and stores the configuration data into the configuration file.
6. A method of network access downgraded at the front end, according to claim 1, characterised in that the distribution end (2) is a content distribution network.
7. A network access system applying the network access method degraded at the front end of any one of claims 1-6, comprising a user end (1), a distribution end (2) and a server (3); the method is characterized in that the user side (1) is provided with configuration data; the configuration data is used for regulating the number of access requests to the server (2) or the distribution terminal (2).
8. The network access system according to claim 7, wherein the configuration data is used to compare the timestamp of the access request and the access object at the user end (1).
CN201811074136.1A 2018-09-14 2018-09-14 Network access method and system for degrading at front end Active CN109194759B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811074136.1A CN109194759B (en) 2018-09-14 2018-09-14 Network access method and system for degrading at front end

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811074136.1A CN109194759B (en) 2018-09-14 2018-09-14 Network access method and system for degrading at front end

Publications (2)

Publication Number Publication Date
CN109194759A CN109194759A (en) 2019-01-11
CN109194759B true CN109194759B (en) 2020-12-15

Family

ID=64911138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811074136.1A Active CN109194759B (en) 2018-09-14 2018-09-14 Network access method and system for degrading at front end

Country Status (1)

Country Link
CN (1) CN109194759B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110187987B (en) * 2019-06-05 2022-02-25 北京百度网讯科技有限公司 Method and apparatus for processing requests
CN113055721B (en) * 2019-12-27 2022-12-09 中国移动通信集团山东有限公司 Video content distribution method and device, storage medium and computer equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764741A (en) * 2009-11-27 2010-06-30 上海恒为信息科技有限公司 Filtering and shunting device and method supporting multi-service function
CN103931162A (en) * 2014-01-20 2014-07-16 华为技术有限公司 Method for processing service and network equipment
CN104852934A (en) * 2014-02-13 2015-08-19 阿里巴巴集团控股有限公司 Method for realizing flow distribution based on front-end scheduling, device and system thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130103785A1 (en) * 2009-06-25 2013-04-25 3Crowd Technologies, Inc. Redirecting content requests

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764741A (en) * 2009-11-27 2010-06-30 上海恒为信息科技有限公司 Filtering and shunting device and method supporting multi-service function
CN103931162A (en) * 2014-01-20 2014-07-16 华为技术有限公司 Method for processing service and network equipment
CN104852934A (en) * 2014-02-13 2015-08-19 阿里巴巴集团控股有限公司 Method for realizing flow distribution based on front-end scheduling, device and system thereof

Also Published As

Publication number Publication date
CN109194759A (en) 2019-01-11

Similar Documents

Publication Publication Date Title
US8140679B2 (en) Method and system for automated session resource clean-up in a distributed client-server environment
US7451149B2 (en) Extranet access management apparatus and method
CN103297529A (en) Timestamp-based tree structure data synchronization method
CN104967861A (en) CDN video buffer system and method
CN103095743A (en) Handling method and system of grey release
CN103533023B (en) Cloud service application cluster based on cloud service feature synchronizes system and synchronous method
CN105472002A (en) Session synchronization method based on instant copying among cluster nodes
CN104243405A (en) Request processing method, device and system
CN112714029B (en) Method, device and equipment for scheduling content distribution network bandwidth
CN107197036A (en) A kind of consistent processing method of information based on block chain and terminal
CN109194759B (en) Network access method and system for degrading at front end
CN103607418B (en) Large-scale data segmenting system based on cloud service data characteristics and dividing method
CN107451853A (en) Method, apparatus, system and the storage medium that a kind of red packet distributes in real time
CN108696364B (en) Request message processing method, chat room message server and chat room system
CN104518873A (en) Anonymous login method and device
CN110310198A (en) Management method, device, equipment and the readable storage medium storing program for executing of enterprise's amount information
CN102006282A (en) Centralized control method for database access in client/server mode
CN109388655A (en) A kind of method and apparatus of dynamic control of data access
WO2022062981A1 (en) Resource scheduling method and system, electronic device, and computer-readable storage medium
CN117118742B (en) Government affair data operation method and system based on access frequency monitoring
CN102811154B (en) Resource acquisition method and network server system
CN105636031A (en) Packet communication management method, apparatus and system
CN110417850B (en) Software configuration acquisition method, system, server and medium
CN104166820A (en) Data management method and system
CN110868304B (en) PCC strategy issuing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant