CN110138732B - Access request response method, device, equipment and storage medium - Google Patents

Access request response method, device, equipment and storage medium Download PDF

Info

Publication number
CN110138732B
CN110138732B CN201910268069.5A CN201910268069A CN110138732B CN 110138732 B CN110138732 B CN 110138732B CN 201910268069 A CN201910268069 A CN 201910268069A CN 110138732 B CN110138732 B CN 110138732B
Authority
CN
China
Prior art keywords
target sub
total
request
service
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910268069.5A
Other languages
Chinese (zh)
Other versions
CN110138732A (en
Inventor
朱坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910268069.5A priority Critical patent/CN110138732B/en
Publication of CN110138732A publication Critical patent/CN110138732A/en
Priority to PCT/CN2019/103844 priority patent/WO2020199487A1/en
Application granted granted Critical
Publication of CN110138732B publication Critical patent/CN110138732B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1025Dynamic adaptation of the criteria on which the server selection is based
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 

Abstract

The application relates to the field of cloud computing, specifically uses the number of received access requests and the current use state of a target sub-service cluster to realize load allocation, and discloses a response method, a device, equipment and a storage medium of the access requests, wherein the method comprises the following steps: receiving an access request of a user, wherein the access request comprises a user identifier and user position information; determining a target sub-server cluster responding to the access request according to the user identification and the user position information; acquiring the current use state of the target sub-server cluster; determining a number of access requests received by the target sub-service cluster; and adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state so as to respond to the access requests of the user. And further, the working state of the service nodes of the server cluster is dynamically adjusted, the response speed of the server cluster is improved, and therefore the access experience of a user is improved.

Description

Access request response method, device, equipment and storage medium
Technical Field
The present application relates to the field of internet insurance, and in particular, to a method, an apparatus, a device, and a storage medium for responding to an access request.
Background
With the continuous development of the internet, more and more enterprises need to use the cluster service to better meet the requirements of users. In practical applications, the differences of network behaviors of users in different time periods result in a large difference of access requests, and the access of the users has a large number of requests in some time periods and has no requests or only a small number of requests in part of the time periods. In order to ensure that the system can still maintain high availability when the access amount is the highest and avoid the problem that the system fails when the access amount is the highest to cause damage to services, the background service node needs to be kept running all the time.
At present, for a large-scale application service, when the application service is started, the number of background service nodes is usually fixed, and in a service running state, a background server cluster is slow in response, and the access experience of a user is not ideal enough.
Disclosure of Invention
The application provides a response method, a response device, equipment and a storage medium of an access request, and the method can dynamically adjust the working state of a service node of a server cluster, improve the response speed of the server cluster and improve the access experience of a user.
In a first aspect, the present application provides a response method for an access request, where the method includes:
receiving an access request of a user, wherein the access request comprises a user identifier and user position information;
determining a target sub-server cluster responding to the access request according to the user identification and the user position information;
acquiring the current use state of the target sub-server cluster;
determining a number of access requests received by the target sub-service cluster;
and adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state so as to respond to the access requests of the user.
In a second aspect, the present application further provides an apparatus for responding to an access request, the apparatus including:
the device comprises a request receiving unit, a processing unit and a processing unit, wherein the request receiving unit is used for receiving an access request of a user, and the access request comprises a user identifier and user position information;
a cluster determining unit, configured to determine, according to the user identifier and the user location information, a target sub-server cluster that responds to the access request;
a state obtaining unit, configured to obtain a current usage state of the target sub-server cluster;
a request number determination unit, configured to determine the number of received access requests in the target sub-service cluster;
and the working parameter adjusting unit is used for adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster so as to respond to the access requests of the user.
In a third aspect, the present application further provides a computer device comprising a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement the response method of the access request as described above when executing the computer program.
In a fourth aspect, the present application also provides a computer-readable storage medium, which stores a computer program, which, when executed by a processor, causes the processor to implement the method for responding to an access request as described above.
The application discloses a response method, a response device, response equipment and a response storage medium of an access request, wherein the access request of a user is received; determining a target sub-server cluster responding to the access request according to the user identification and the user position information; acquiring the current use state of the target sub-server cluster; determining a number of access requests received by the target sub-service cluster; and adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state to respond to the access requests of the user, thereby dynamically adjusting the working state of the service nodes of the server cluster, improving the response speed of the server cluster, improving the access experience of the user and avoiding resource waste.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic application scenario diagram of a response method of an access request provided by an embodiment of the present application;
FIG. 2 is a schematic diagram of the structure of a sub-service cluster of FIG. 1;
FIG. 3 is a flowchart illustrating steps of a method for responding to an access request according to an embodiment of the present application;
FIG. 4 is a schematic flow diagram of sub-steps of a method of responding to the access request of FIG. 3;
FIG. 5 is a flowchart illustrating steps of a method for responding to an access request according to another embodiment of the present application;
FIG. 6 is a flowchart illustrating steps of a method for responding to an access request according to another embodiment of the present application;
FIG. 7 is a partial schematic flow chart diagram illustrating steps of a method for responding to an access request according to yet another embodiment of the present application;
fig. 8 is a schematic block diagram of a response apparatus for an access request according to an embodiment of the present application;
FIG. 9 is a schematic block diagram of a sub-unit of the response means of the access request of FIG. 8;
FIG. 10 is a schematic block diagram of a sub-unit of the response means to the access request of FIG. 8;
fig. 11 is a schematic block diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The embodiment of the application provides a response method and device of an access request, computer equipment and a storage medium. The response method of the access request can be used for aiming at the cheat-insurance behavior of the patient and/or the doctor, and an important reference is provided for quickly finding out the cheat-insurance of the patient or the doctor.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic view of an application scenario of a response method of an access request according to an embodiment of the present application. The access request response method of the present application can be applied to a distributed system formed by the user terminal 110 and the server cluster 120. The server cluster 120 includes a plurality of sub-service clusters 121. As shown in FIG. 2, each child service cluster 121 includes at least one service node. There may be multiple user terminals 110, such as user terminal 110a and user terminal 110 b. Each user terminal 110 may communicate with any one of the service nodes in the service cluster 120 to dynamically adjust the operating parameters of the service node in response to a user's access request.
User terminal 110 may be a variety of electronic devices including, but not limited to, a smart phone, a tablet computer, a laptop portable computer, and a desktop computer, among others.
Specifically, the user terminal 110 may be installed with various communication client applications, such as a web browser application, a search application, an instant messenger, a mailbox client, and the like. The dynamic adjustment of the operating parameters of the service node is accomplished through the interaction of the user terminal 110 with the service node.
Referring to fig. 3, fig. 3 is a flowchart illustrating steps of a method for responding to an access request according to an embodiment of the present application. The response method of the access request is used for dynamically adjusting the working parameters of the service node. For some sub-server clusters, the access requests of the users may be staged, for example, the number of access requests is particularly large in a certain time period, and no access requests are available in a certain time period.
Wherein, the server cluster is composed of a plurality of servers with the same function. The target sub-server cluster is at least one sub-server cluster in the server cluster.
As shown in fig. 3, the response method of the access request specifically includes: step S201 to step S205.
S201, receiving an access request of a user.
Specifically, the access request includes information such as a user identifier and user location information. In practical applications, each user has a unique user identification. The user identification may include information such as employee number or user name.
The user location information may include geographical location information and/or logical network topology location information of the user. The geographic location information of the user includes an address tag, and/or a latitude and longitude. The address labels are information of province, city, county, street and the like, such as Beijing city, Haizu district and the like, "Guangdong province", "Shenzhen city" and the like.
The user terminal can be used by the user to interact with the currently started service node in the target sub-server cluster in a wired connection mode or a wireless connection mode so as to send the access request. The wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other currently known or future developed wireless connection means.
S202, determining a target sub-server cluster responding to the access request according to the user identification and the user position information.
In this embodiment, the step S202 specifically includes sub-steps S202a and S202 b.
Step S202a, obtaining the registered address of the user according to the user identification.
Step S202b, determining the target sub-server cluster responding to the access request according to the registered address of the user and the user position information.
In this embodiment, the target sub-server cluster responding to the access request is determined according to the registration address of the user and the location information of the user, so that the access request can be ensured to be responded, dirty data generated by competition can be avoided, and each access is ensured to be the sub-server cluster closest to the user, thereby improving the access speed and the user experience.
S203, obtaining the current use state of the target sub-server cluster.
Specifically, the current usage state of the target sub-server cluster includes the number of currently started service nodes in the target sub-server cluster and request processing information of the currently started service nodes.
S204, determining the number of the access requests received by the target sub-service cluster.
Each service node in the target sub-service cluster can receive access requests of different users, and can also receive different access requests of the same user.
In this embodiment, the sum of the number of access requests received by each service node in the target sub-service cluster in a preset time is the number of access requests received by the target sub-service cluster.
Illustratively, there are two service nodes in the target sub-service cluster, which are service node a and service node B, respectively, where the number of access requests received by service node a in ten minutes is 2, the number of access requests received by service node B in ten minutes is 3, and the number of access requests received by the target sub-service cluster in ten minutes is 5.
S205, adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state so as to respond to the access requests of the user.
Specifically, the operating parameters include the number of access requests that the service node can respond to at a time and the operating state of the service node. The operating state includes an on state and an off state.
In this embodiment, step S205 further includes determining whether there is a currently activated service node in the target sub-service cluster.
And if the target sub-service cluster does not have the started service node currently, starting the target sub-service cluster. If there is a currently activated service node in the target sub-service cluster, step S205 is executed. And if the current use state of the target sub-service cluster indicates that the number of the currently started service nodes in the target sub-service cluster is zero, indicating that the target sub-service cluster does not have the currently started service nodes.
Wherein, the adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state specifically comprises:
and adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests, the request processing capacity of the started service nodes in the target sub-server cluster and the number of the started service nodes in the target sub-server cluster.
Illustratively, the target sub-service cluster has 8 service nodes, wherein the working states of 3 service nodes are in an on state, and the working states of the remaining 5 service nodes are in an off state. And if the number of the access requests of the current user is large and the service capacity of 3 service nodes cannot meet the access request of the current user, adjusting the working states of the remaining 5 service nodes. The number of service nodes whose working states need to be adjusted is determined according to the number of access requests of the current user and the resource usage of the currently started service node, for example, if 5 service nodes need to be restarted to meet the access requests of the user, the working states of the remaining 5 service nodes are adjusted from the off state to the on state.
The response method of the access request comprises the steps of receiving the access request of a user; determining a target sub-server cluster responding to the access request according to the user identification and the user position information; acquiring the current use state of the target sub-server cluster; determining a number of access requests received by the target sub-service cluster; and adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state to respond to the access requests of the user, thereby dynamically adjusting the working state of the service nodes of the server cluster, improving the response speed of the server cluster, improving the access experience of the user and avoiding resource waste.
Referring to fig. 5, fig. 5 is a flowchart illustrating steps of a method for responding to an access request according to another embodiment of the present application. The response method of the access request is used for dynamically adjusting the working parameters of the service node. For some sub-server clusters, the access requests of the users may be staged, for example, the number of access requests is particularly large in a certain time period, and no access requests are available in a certain time period.
Wherein, the server cluster is composed of a plurality of servers with the same function. The target sub-server cluster is at least one sub-server cluster in the server cluster.
As shown in fig. 5, the response method of the access request specifically includes: step S301 to step S306.
S301, receiving an access request of a user.
Specifically, the access request includes information such as a user identifier and user location information. In practical applications, each user has a unique user identification. The user identification may include information such as employee number or user name.
The user location information may include geographical location information and/or logical network topology location information of the user. The geographic location information of the user includes an address tag, and/or a latitude and longitude. The address labels are information of province, city, county, street and the like, such as Beijing city, Haizu district and the like, "Guangdong province", "Shenzhen city" and the like.
S302, determining a target sub-server cluster responding to the access request according to the user identification and the user position information.
In this embodiment, step S302 specifically includes: acquiring a registration address of a user according to the user identifier; the target sub-server cluster responding to the access request is determined according to the registration address of the user and the position information of the user, so that dirty data generated by competition can be avoided, and the sub-server cluster closest to the user is ensured to be accessed every time, thereby improving the access speed and the experience degree of the user.
S303, acquiring the current use state of the target sub-server cluster.
The current use state of the target sub-server cluster comprises the number of currently started service nodes in the target sub-server cluster and request processing information of the currently started service nodes.
The request processing information comprises request processing capacity, maximum processing capacity, request processing intensity, maximum processing intensity and parallel processing capacity of the access request of the currently started service node.
S304, determining the number of the access requests received by the target sub-service cluster.
Specifically, each service node in the target sub-service cluster may receive access requests of different users, and may also receive different access requests of the same user.
In this embodiment, the sum of the number of access requests received by each service node in the target sub-service cluster in a preset time is the number of access requests received by the target sub-service cluster.
S305, based on a utilization calculation formula, calculating the resource utilization rate of the currently started service node in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster.
In this embodiment, the usage rate calculation formula is:
Figure BDA0002017481310000071
wherein, TiRepresenting the resource utilization rate r of the ith service node currently started in the target sub-service clusteri、RiRespectively representing the user request quantity and the maximum request quantity, q, of the service nodei、QiRespectively representing the request processing capacity and the maximum processing capacity, s, of the service nodei、SiRespectively representing the request processing strength and the maximum processing strength of the service node,
Figure BDA0002017481310000081
Ciparallel processing capability, w, for access request of ith service node currently started in target sub-service cluster1、w2、w3Weights representing user request amount, request processing capability, and request processing strength, respectively, and w1+w2+w3=1。
Specifically, assume that there are N currently active service nodes in the target child server cluster Y, i.e., Y ═ Y1,Y2,...,Yn}. Amount of user request riRefers to the ith service node YiThe number of average access requests received per unit time for the current user. Request processing capability qiRefers to the ith service node YiThe average number of access requests of the current user completed in a unit time dynamically displays the processing capacity of the access requests of the current user. Request handling Strength siEmbodies the service node YiRelative to the actual request processing capacity. Request handling Strength siCloser to 1 indicates serving node YiThe greater the load condition.
Based on the utilization calculation formula, according to the number of the received access requests and the current use state of the target sub-server cluster, the resource utilization of the currently started service node in the target sub-server cluster can be calculated.
S306, if the resource utilization rate is larger than a first threshold value, starting a new service node in the target sub-server cluster; and if the resource utilization rate is smaller than a second threshold value, closing a currently started service node in the target sub-server cluster.
Wherein, the service node YiThe load state of the engine has three states of overload, idle and normal, and the second threshold value alpha2Is less than the first threshold value alpha1. When resource utilization rate TiIs larger than a first threshold value alpha1Time, service node YiIs an overload state, and the target sub-server is in the overload stateThe number of the service nodes started in the cluster is less than the number of the service nodes required by the service requested by the current user. When resource utilization rate TiIs less than the second threshold value alpha22<α1) Time, service node YiThe load state of the target sub-server cluster is an idle state, and at this time, the number of the started service nodes in the target sub-server cluster is larger than the number of the service nodes required by the service requested by the current user. When alpha is2≤Ti≤α1Time, service node YiIs a normal state. And when the target sub-server cluster does not have the started service nodes, adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the access requests so as to respond to the access requests.
Wherein the first threshold value alpha1And a second threshold value alpha2Can be designed according to actual requirements. For example, the first threshold value α1The value is 85%, and the second threshold value alpha2Value is 5%, if resource utilization rate TiAnd 90%, starting a new service node in the target sub-service cluster so that the service capability of the currently started service node meets the access request of the user. If the resource utilization rate Ti2%, it means there is a partially idle service node, and at this time, the currently started service node Y is turned off in the target sub-server clusteriOf course, any other currently started service node in the target sub-service cluster may also be closed, so as to improve the utilization rate of the target sub-server cluster and greatly reduce the power consumption of the server cluster. If the resource utilization rate TiAnd if the current working state is 60%, maintaining the current working state of each service node in the target sub-service cluster, namely, neither starting a new service node nor closing the currently started service node.
When resource utilization rate TiWhen the value is 0, it indicates that the target sub-server cluster does not have a currently started service node, and at this time, the target sub-server cluster is started. Specifically, the number of service nodes needing to be started in the target sub-server cluster is determined according to the number of the access requests and the target sub-server cluster is started.
The response method of the access request provided by the above embodiment receives the access request of the user; determining a target sub-server cluster responding to the access request according to the user identification and the user position information; acquiring the current use state of the target sub-server cluster; determining a number of access requests received by the target sub-service cluster; based on a utilization calculation formula, calculating the resource utilization rate of a currently started service node in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster; if the resource utilization rate is larger than a first threshold value, starting a new service node in the target sub-server cluster; if the resource utilization rate is smaller than the second threshold value, closing a currently started service node in the target sub-server cluster, so as to dynamically adjust the working state of the service node of the server cluster, improve the response speed of the server cluster, improve the access experience of a user and avoid resource waste.
Referring to fig. 6, fig. 6 is a flowchart illustrating steps of a method for responding to an access request according to another embodiment of the present application. The response method of the access request is used for dynamically adjusting the working parameters of the service node. The target sub-server cluster is at least one sub-server cluster in the server cluster.
As shown in fig. 6, the response method of the access request specifically includes: step S401 to step S407.
S401, receiving an access request of a user.
Specifically, the access request includes information such as a user identifier and user location information. In practical applications, each user has a unique user identification. The user identification may include information such as employee number or user name.
The user location information may include geographical location information and/or logical network topology location information of the user. The geographic location information of the user includes an address tag, and/or a latitude and longitude. The address labels are information of province, city, county, street and the like, such as Beijing city, Haizu district and the like, "Guangdong province", "Shenzhen city" and the like.
S402, determining a target sub-server cluster responding to the access request according to the user identification and the user position information.
In this embodiment, step S402 specifically includes: acquiring a registration address of a user according to the user identifier; the target sub-server cluster responding to the access request is determined according to the registration address of the user and the user position information, dirty data generated by competition can be avoided, and the sub-server cluster closest to the user is guaranteed to be accessed every time, so that the access speed is improved, and the user experience is improved.
And S403, acquiring the current use state of the target sub-server cluster.
The current use state of the target sub-server cluster comprises the number of currently started service nodes in the target sub-server cluster and request processing information of the currently started service nodes.
The request processing information comprises request processing capacity, maximum processing capacity, request processing intensity, maximum processing intensity and parallel processing capacity of the access request of the currently started service node.
S404, determining the number of the access requests received by the target sub-service cluster.
Specifically, each service node in the target sub-service cluster may receive access requests of different users, and may also receive different access requests of the same user.
In this embodiment, the sum of the number of access requests received by each service node in the target sub-service cluster in a preset time is the number of access requests received by the target sub-service cluster.
S405, based on a utilization calculation formula, calculating the resource utilization rate of the currently started service node in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster.
In this embodiment, the usage rate calculation formula is:
Figure BDA0002017481310000101
wherein, TiRepresenting the resource utilization rate r of the ith service node currently started in the target sub-service clusteri、RiRespectively representing the user request quantity and the maximum request quantity, q, of the service nodei、QiRespectively representing the request processing capacity and the maximum processing capacity, s, of the service nodei、SiRespectively representing the request processing strength and the maximum processing strength of the service node,
Figure BDA0002017481310000102
Ciparallel processing capability, w, for access request of ith service node currently started in target sub-service cluster1、w2、w3Weights representing user request amount, request processing capability, and request processing strength, respectively, and w1+w2+w3=1。
S406, based on a total utilization calculation formula, calculating the total resource utilization of the target sub-service cluster according to the total user request quantity, the total request processing capacity and the total request processing strength of the target sub-service cluster.
Wherein, the total utilization calculation formula is as follows:
Figure BDA0002017481310000111
wherein, TNRepresenting the total resource usage, r, of the target sub-service clusterN、RNRespectively representing the total user request quantity and the maximum total request quantity, q, of the target sub-service clusterN、QNRespectively representing the total request processing capacity and the maximum total processing capacity, s, of the target sub-service clusterN、SNRespectively representing the total request handling strength and the maximum total request handling strength, w, of the target sub-service cluster4,w5,w6Respectively representing total user request amount, total request processing capacity and total request processing strengthWeight, and w4+w5+w6=1。
S407, if the resource utilization rate is greater than the first threshold and the total resource utilization rate is greater than a third threshold, starting a new service node in the target sub-server cluster; if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is less than a fourth threshold value, refusing to receive a new access request; and if the resource utilization rate is smaller than the second threshold value, closing a currently started service node in the target sub-server cluster.
Wherein the fourth threshold value alpha4Is less than the third threshold value alpha3. Illustratively, the first threshold α1The value is 85%, and the second threshold value alpha2The value is 5%, and the third threshold value alpha3A value of 75%, a fourth threshold value alpha4The value is 10%. If the resource utilization rate TiIs 90%, total resource utilization rate TNAnd 80%, starting a new service node in the target sub-service cluster so that the service capability of the currently started service node meets the access request of the user.
If the resource utilization rate T is 90%, the total resource utilization rate TN6%, it means that there is a service node with a resource utilization rate less than 90% in the started service nodes, that is, there is a partially idle service node, and at this time, the resource utilization rate T isiResource usage T for 90% of service nodes to refuse to receive new access requestiLess than 90% of the service nodes may receive new access requests.
If the resource utilization rate Ti2%, it means that the service node is in an idle state, and at this time, the currently started service node Y is turned offiOf course, any other currently started service node in the target sub-service cluster may also be closed, so as to improve the utilization rate of the target sub-server cluster and greatly reduce the power consumption of the server cluster.
For some sub-server clusters, the access requests of the users may be staged, for example, the number of access requests is particularly large in a certain time period, and no access requests are available in a certain time period. In this embodiment, in order to further improve the utilization rate of the entire service cluster and reduce power consumption, step 307 further includes: and judging whether the target sub-service cluster receives a new access request within preset time. And if the target sub-server cluster does not receive the new access request within the preset time, closing the target sub-server cluster.
In this embodiment, before step S406, the method further includes:
s501, based on a total request quantity calculation formula, calculating the total user request quantity of the target sub-service cluster according to the user request quantity of each service node which is started currently of the target sub-service cluster.
In this embodiment, the total request amount calculation formula is:
Figure BDA0002017481310000121
wherein r isNRepresents the total user request amount, r, of the target sub-service clusteriAnd the user request quantity of the ith service node which is currently started in the target sub-service cluster is represented, and n is the quantity of the service nodes which are currently started in the target sub-service cluster.
S502, based on a total processing capacity calculation formula, calculating the total request processing capacity of the target sub-service cluster according to the request processing capacity of each service node which is started currently of the target sub-service cluster.
In this embodiment, the total processing capacity calculation formula is:
Figure BDA0002017481310000122
wherein q isNRepresenting the total request processing capacity, q, of the target sub-service clusteriIndicating the request handling capability of the currently started ith service node of the target sub-service cluster.
S503, based on a total processing intensity calculation formula, calculating the total request processing intensity of the target sub-service cluster according to the total user request amount and the total request processing capacity.
In this embodiment, the total processing intensity calculation formula is:
Figure BDA0002017481310000123
wherein s isNRepresenting the overall request handling strength of the target sub-service cluster.
The response method of the access request provided by the above embodiment receives the access request of the user; determining a target sub-server cluster responding to the access request according to the user identification and the user position information; acquiring the current use state of the target sub-server cluster; determining a number of access requests received by the target sub-service cluster; based on a utilization calculation formula, calculating the resource utilization rate of a currently started service node in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster; calculating the total resource utilization rate of the target sub-service cluster according to the total user request quantity, the total request processing capacity and the total request processing strength of the target sub-service cluster based on a total utilization rate calculation formula; if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is greater than a third threshold value, starting a new service node in the target sub-server cluster; if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is less than a fourth threshold value, refusing to receive a new access request; if the resource utilization rate is smaller than the second threshold value, closing a currently started service node in the target sub-server cluster, so that the working state of the service node of the server cluster is dynamically adjusted, the response speed of the server cluster is improved, the access experience of a user is improved, and meanwhile, resource waste is avoided.
Referring to fig. 8, fig. 8 is a schematic block diagram of an access request responding apparatus according to an embodiment of the present application, where the access request responding apparatus is configured to perform any one of the foregoing access request responding methods. Wherein, the response device of the access request can be configured in the server or the terminal.
The server may be an independent server or a server cluster. The terminal can be an electronic device such as a mobile phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant and a wearable device.
As shown in fig. 8, the response device 600 for an access request includes:
a request receiving unit 601, configured to receive an access request of a user, where the access request includes a user identifier and user location information;
a cluster determining unit 602, configured to determine, according to the user identifier and the user location information, a target sub-server cluster responding to the access request;
a state obtaining unit 603, configured to obtain a current usage state of the target sub-server cluster;
a request number determining unit 604, configured to determine the number of access requests received by the target sub-service cluster;
and a working parameter adjusting unit 605, configured to adjust working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current usage state, so as to respond to the access request of the user.
In one embodiment, as shown in fig. 9, the cluster determination unit 602 includes an address acquisition sub-unit 602a and a cluster determination sub-unit 602 b.
The address obtaining subunit 602a is configured to obtain a registration address of the user according to the user identifier.
A cluster determining subunit 602b, configured to determine, according to the registration address and the user location information, a target sub-service cluster to respond to the access request.
In one embodiment, as shown in FIG. 10, the operating parameter adjustment unit 605 includes a usage calculation subunit 605a and an on-off unit 605 b.
A usage rate calculating subunit 605a, configured to calculate, based on a usage rate calculation formula, a resource usage rate of a currently started service node in the target sub-server cluster according to the number of the received access requests and the current usage state of the target sub-server cluster;
a start-up and shut-down unit 605b, configured to start a new service node in the target sub-server cluster if the resource utilization rate is greater than a first threshold; if the resource utilization rate is smaller than a second threshold value, closing a currently started service node in the target sub-server cluster; wherein the second threshold is less than the first threshold.
In one embodiment, the usage calculation formula is:
Figure BDA0002017481310000141
wherein, TiRepresenting the resource utilization rate r of the ith service node currently started in the target sub-service clusteri、RiRespectively representing the user request quantity and the maximum request quantity, q, of the service nodei、QiRespectively representing the request processing capacity and the maximum processing capacity, s, of the service nodei、SiRespectively representing the request processing strength and the maximum processing strength of the service node,
Figure BDA0002017481310000142
Ciparallel processing capability for the request of the ith service node currently started in the target sub-service cluster, w1、w2、w3Weights representing user request amount, request processing capability, and request processing strength, respectively, and w1+w2+w3=1。
In one embodiment, the operating parameter adjustment unit 605 further includes a total usage calculation subunit 605 c.
And a total utilization calculation subunit 605c, configured to calculate, based on a total utilization calculation formula, a total resource utilization of the target sub-service cluster according to the total user request amount, the total request processing capacity, and the total request processing strength of the target sub-service cluster.
In this embodiment, the start-up shutdown unit 605b is configured to start up a new service node in the target sub-server cluster if the resource usage rate is greater than the first threshold and the total resource usage rate is greater than a third threshold; if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is less than a fourth threshold value, refusing to receive a new access request; if the resource utilization rate is smaller than the second threshold value, closing a currently started service node in the target sub-server cluster; wherein the fourth threshold is smaller than the third threshold.
Specifically, the total usage rate calculation formula is as follows:
Figure BDA0002017481310000151
wherein, TNRepresenting the total resource usage, r, of the target sub-service clusterN、RNRespectively representing the total user request quantity and the maximum total request quantity, q, of the target sub-service clusterN、QNRespectively representing the total request processing capacity and the maximum total processing capacity, s, of the target sub-service clusterN、SNRespectively representing the total request handling strength and the maximum total request handling strength, w, of the target sub-service cluster4,w5,w6Weights representing total user request amount, total request processing capacity, and total request processing strength, respectively, and w4+w5+w6=1。
In one embodiment, the response device of the access request further comprises a total user request amount calculation unit, a total request processing capacity calculation unit and a total request processing strength calculation unit.
And the total user request quantity calculation unit is used for calculating the total user request quantity of the target sub-service cluster according to the user request quantity of each service node which is started currently of the target sub-service cluster based on a total request quantity calculation formula.
A total request processing capacity calculation unit, configured to calculate, based on a total processing capacity calculation formula, a total request processing capacity of the target sub-service cluster according to a request processing capacity of each currently started service node of the target sub-service cluster;
and the total request processing strength calculation unit is used for calculating the total request processing strength of the target sub-service cluster according to the total user request amount and the total request processing capacity based on a total processing strength calculation formula.
Specifically, the total request amount calculation formula is as follows:
Figure BDA0002017481310000152
wherein r isNRepresents the total user request amount, r, of the target sub-service clusteriAnd the user request quantity of the ith service node which is currently started in the target sub-service cluster is represented, and n is the quantity of the service nodes which are currently started in the target sub-service cluster.
The total processing capacity calculation formula is as follows:
Figure BDA0002017481310000153
wherein q isNRepresenting the total request processing capacity, q, of the target sub-service clusteriRepresenting the request processing capacity of the ith service node of the current start of the target sub-service cluster;
the total processing intensity calculation formula is as follows:
Figure BDA0002017481310000161
wherein s isNRepresenting the overall request handling strength, C, of the target sub-service clusteriThe parallel processing capability of the request of the ith service node which is currently started in the target sub-service cluster.
It should be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the response apparatus for an access request and each unit described above may refer to the corresponding processes in the foregoing response method embodiment for an access request, and are not described herein again.
The above-mentioned means for responding to an access request may be implemented in the form of a computer program that can be run on a computer device as shown in fig. 11.
Referring to fig. 11, fig. 11 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device may be a server or a terminal.
Referring to fig. 11, the computer device includes a processor, a memory, and a network interface connected through a system bus, wherein the memory may include a nonvolatile storage medium and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program includes program instructions that, when executed, cause a processor to perform a method of responding to an access request.
The processor is used for providing calculation and control capability and supporting the operation of the whole computer equipment.
The internal memory provides an environment for the execution of a computer program on a non-volatile storage medium, which, when executed by the processor, causes the processor to perform a method of responding to an access request.
The network interface is used for network communication, such as sending assigned tasks and the like. Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein the processor is configured to run a computer program stored in the memory to implement the steps of:
receiving an access request of a user, wherein the access request comprises a user identifier and user position information;
determining a target sub-server cluster responding to the access request according to the user identification and the user position information;
acquiring the current use state of the target sub-server cluster;
determining a number of access requests received by the target sub-service cluster;
and adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state so as to respond to the access requests of the user.
In one embodiment, the processor, when implementing the determining a target sub-server cluster to respond to the access request based on the user identification and the user location information, is configured to implement:
acquiring a registration address of a user according to the user identification;
and determining a target sub-service cluster responding to the access request according to the registration address and the user position information.
In one embodiment, the processor, when implementing the adjusting of the operating parameters of the service node in the target sub-server cluster according to the number of the received access requests and the current usage state to respond to the access request of the user, is configured to implement:
based on a utilization calculation formula, calculating the resource utilization rate of a currently started service node in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster;
if the resource utilization rate is larger than a first threshold value, starting a new service node in the target sub-server cluster; if the resource utilization rate is smaller than a second threshold value, closing a currently started service node in the target sub-server cluster; wherein the second threshold is less than the first threshold.
In one embodiment, the usage calculation formula is:
Figure BDA0002017481310000171
wherein, TiRepresenting the resource utilization rate r of the ith service node currently started in the target sub-service clusteri、RiRespectively representing the user request quantity and the maximum request quantity, q, of the service nodei、QiRespectively representing the request processing capacity and the maximum processing capacity, s, of the service nodei、SiRespectively representing the request processing strength and the maximum processing strength of the service node,
Figure BDA0002017481310000172
Ciparallel processing capability, w, for access request of ith service node currently started in target sub-service cluster1、w2、w3Weights representing user request amount, request processing capability, and request processing strength, respectively, and w1+w2+w3=1。
In one embodiment, the processor, when implementing the usage-based calculation formula, is configured to calculate resource usage of a currently started service node in the target sub-server cluster according to the number of received access requests and the current usage state of the target sub-server cluster, implement:
calculating the total resource utilization rate of the target sub-service cluster according to the total user request quantity, the total request processing capacity and the total request processing strength of the target sub-service cluster based on a total utilization rate calculation formula;
if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is greater than a third threshold value, starting a new service node in the target sub-server cluster; if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is less than a fourth threshold value, refusing to receive a new access request; if the resource utilization rate is smaller than the second threshold value, closing a currently started service node in the target sub-server cluster; wherein the fourth threshold is less than the third threshold;
the total utilization calculation formula is as follows:
Figure BDA0002017481310000181
wherein, TNRepresenting the total resource usage, r, of the target sub-service clusterN、RNRespectively representing the total user request quantity and the maximum total request quantity, q, of the target sub-service clusterN、QNRespectively representing the total request processing capacity and the maximum total processing capacity, s, of the target sub-service clusterN、SNRespectively representing the total request handling strength and the maximum total request handling strength, w, of the target sub-service cluster4,w5,w6Weights representing total user request amount, total request processing capacity, and total request processing strength, respectively, and w4+w5+w6=1。
In an embodiment, before implementing the total usage-based calculation formula, the processor is further configured to implement:
calculating the total user request quantity of the target sub-service cluster according to the user request quantity of each service node which is started currently of the target sub-service cluster based on a total request quantity calculation formula;
calculating the total request processing capacity of the target sub-service cluster according to the request processing capacity of each service node which is started currently of the target sub-service cluster based on a total processing capacity calculation formula;
calculating the total request processing strength of the target sub-service cluster according to the total user request quantity and the total request processing capacity based on a total processing strength calculation formula;
the total request quantity calculation formula is as follows:
Figure BDA0002017481310000191
wherein r isNRepresents the total user request amount, r, of the target sub-service clusteriRepresenting the user request quantity of the ith service node currently started in the target sub-service cluster, wherein n is the quantity of the service nodes currently started in the target sub-service cluster;
the total processing capacity calculation formula is as follows:
Figure BDA0002017481310000192
wherein q isNRepresenting the total request processing capacity, q, of the target sub-service clusteriRepresenting the request processing capacity of the ith service node of the current start of the target sub-service cluster;
the total processing intensity calculation formula is as follows:
Figure BDA0002017481310000193
wherein s isNRepresenting the overall request handling strength, C, of the target sub-service clusteriAnd the parallel processing capacity of the access request of the ith service node which is currently started in the target sub-service cluster.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, where the computer program includes program instructions, and the processor executes the program instructions to implement the method for responding to any access request provided in the embodiment of the present application.
The computer-readable storage medium may be an internal storage unit of the computer device described in the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A response method for an access request, comprising:
receiving an access request of a user, wherein the access request comprises a user identifier and user position information;
determining a target sub-server cluster responding to the access request according to the user identification and the user position information;
acquiring the current use state of the target sub-server cluster;
determining a number of access requests received by the target sub-service cluster;
adjusting the working parameters of the service nodes in the target sub-server cluster according to the number of the received access requests and the current use state so as to respond to the access requests of the user;
wherein adjusting the working parameters of the service nodes in the target sub-server cluster to respond to the access request of the user according to the number of the received access requests and the current use state comprises:
calculating the resource utilization rate of the currently started service node in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster;
calculating the total resource utilization rate of the target sub-service cluster according to the total user request quantity, the total request processing capacity and the total request processing strength of the target sub-service cluster;
if the resource utilization rate is greater than a first threshold value and the total resource utilization rate is greater than a third threshold value, starting a new service node in the target sub-server cluster; if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is less than a fourth threshold value, refusing to receive a new access request; if the resource utilization rate is smaller than a second threshold value, closing a currently started service node in the target sub-server cluster, wherein the second threshold value is smaller than the first threshold value, and the fourth threshold value is smaller than the third threshold value.
2. The method according to claim 1, wherein the determining a target sub-server cluster to respond to the access request according to the user identifier and the user location information comprises:
acquiring a registration address of a user according to the user identification;
and determining a target sub-service cluster responding to the access request according to the registration address and the user position information.
3. The method according to claim 1, wherein said adjusting the operating parameters of the service nodes in the target sub-server cluster to respond to the access request of the user according to the number of the received access requests and the current usage state comprises:
based on a utilization calculation formula, calculating the resource utilization rate of a currently started service node in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster;
if the resource utilization rate is larger than a first threshold value, starting a new service node in the target sub-server cluster; if the resource utilization rate is smaller than a second threshold value, closing a currently started service node in the target sub-server cluster; wherein the second threshold is less than the first threshold.
4. The method according to claim 3, wherein the usage calculation formula is:
Figure FDA0003404319880000021
wherein, TiRepresenting the resource utilization rate r of the ith service node currently started in the target sub-service clusteri、RiRespectively representing the user request quantity and the maximum request quantity, q, of the service nodei、QiRespectively representing the request processing capacity and the maximum processing capacity, s, of the service nodei、SiRespectively representing the request processing strength and the maximum processing strength of the service node,
Figure FDA0003404319880000022
Ciparallel processing capability, w, for access request of ith service node currently started in target sub-service cluster1、w2、w3Weights representing user request amount, request processing capability, and request processing strength, respectively, and w1+w2+w3=1。
5. The method according to claim 3 or 4, wherein the calculating resource usage of the currently started service node in the target sub-server cluster according to the number of the received access requests and the current usage state of the target sub-server cluster based on the usage calculation formula comprises:
calculating the total resource utilization rate of the target sub-service cluster according to the total user request quantity, the total request processing capacity and the total request processing strength of the target sub-service cluster based on a total utilization rate calculation formula;
if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is greater than a third threshold value, starting a new service node in the target sub-server cluster; if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is less than a fourth threshold value, refusing to receive a new access request; if the resource utilization rate is smaller than the second threshold value, closing a currently started service node in the target sub-server cluster; wherein the fourth threshold is less than the third threshold;
the total utilization calculation formula is as follows:
Figure FDA0003404319880000031
wherein, TNRepresenting the total resource usage, r, of the target sub-service clusterN、RNRespectively representing the total user request quantity and the maximum total request quantity, q, of the target sub-service clusterN、QNRespectively representing the total request processing capacity and the maximum total processing capacity, s, of the target sub-service clusterN、SNRespectively representing the total request handling strength and the maximum total request handling strength, w, of the target sub-service cluster4,w5,w6Weights representing total user request amount, total request processing capacity, and total request processing strength, respectively, and w4+w5+w6=1。
6. The method according to claim 5, wherein before calculating the total resource utilization of the target sub-service cluster according to the total user request amount, the total request processing capacity and the total request processing strength of the target sub-service cluster based on the total utilization calculation formula, the method further comprises:
calculating the total user request quantity of the target sub-service cluster according to the user request quantity of each service node which is started currently of the target sub-service cluster based on a total request quantity calculation formula;
calculating the total request processing capacity of the target sub-service cluster according to the request processing capacity of each service node which is started currently of the target sub-service cluster based on a total processing capacity calculation formula;
calculating the total request processing strength of the target sub-service cluster according to the total user request quantity and the total request processing capacity based on a total processing strength calculation formula;
the total request quantity calculation formula is as follows:
Figure FDA0003404319880000032
wherein r isNRepresents the total user request amount, r, of the target sub-service clusteriRepresenting the user request quantity of the ith service node currently started in the target sub-service cluster, wherein n is the quantity of the service nodes currently started in the target sub-service cluster;
the total processing capacity calculation formula is as follows:
Figure FDA0003404319880000033
wherein q isNRepresenting the total request processing capacity, q, of the target sub-service clusteriRepresenting the request processing capacity of the ith service node of the current start of the target sub-service cluster;
the total processing intensity calculation formula is as follows:
Figure FDA0003404319880000034
wherein s isNRepresenting the overall request handling strength, C, of the target sub-service clusteriFor current startup in target sub-service clusterThe access request of the ith service node.
7. The method according to claim 1, wherein after adjusting the operating parameters of the service nodes in the target sub-server cluster according to the number of received access requests and the current usage status of the target sub-server cluster to respond to the access request of the user, the method further comprises:
judging whether the target sub-service cluster receives a new access request within preset time;
and if the target sub-server cluster does not receive the new access request within the preset time, closing the target sub-server cluster.
8. An apparatus for responding to an access request, comprising:
the device comprises a request receiving unit, a processing unit and a processing unit, wherein the request receiving unit is used for receiving an access request of a user, and the access request comprises a user identifier and user position information;
a cluster determining unit, configured to determine, according to the user identifier and the user location information, a target sub-server cluster that responds to the access request;
a state obtaining unit, configured to obtain a current usage state of the target sub-server cluster;
a request number determination unit, configured to determine the number of received access requests in the target sub-service cluster;
a working parameter adjusting unit, configured to adjust working parameters of service nodes in the target sub-server cluster according to the number of the received access requests and the current usage state of the target sub-server cluster, so as to respond to the access request of the user;
when the adjusting unit of the working parameters adjusts the working parameters of the service nodes in the target sub-server cluster to respond to the access request of the user according to the number of the received access requests and the current use state of the target sub-server cluster, the adjusting unit of the working parameters includes:
calculating the resource utilization rate of the currently started service node in the target sub-server cluster according to the number of the received access requests and the current use state of the target sub-server cluster;
calculating the total resource utilization rate of the target sub-service cluster according to the total user request quantity, the total request processing capacity and the total request processing strength of the target sub-service cluster;
if the resource utilization rate is greater than a first threshold value and the total resource utilization rate is greater than a third threshold value, starting a new service node in the target sub-server cluster; if the resource utilization rate is greater than the first threshold value and the total resource utilization rate is less than a fourth threshold value, refusing to receive a new access request; if the resource utilization rate is smaller than a second threshold value, closing a currently started service node in the target sub-server cluster, wherein the second threshold value is smaller than the first threshold value, and the fourth threshold value is smaller than the third threshold value.
9. A computer device, wherein the computer device comprises a memory and a processor;
the memory is used for storing a computer program;
the processor for executing the computer program and implementing a response method to an access request according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement the response method to an access request according to any one of claims 1 to 7.
CN201910268069.5A 2019-04-03 2019-04-03 Access request response method, device, equipment and storage medium Active CN110138732B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910268069.5A CN110138732B (en) 2019-04-03 2019-04-03 Access request response method, device, equipment and storage medium
PCT/CN2019/103844 WO2020199487A1 (en) 2019-04-03 2019-08-30 Method, apparatus and device for responding to access request, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910268069.5A CN110138732B (en) 2019-04-03 2019-04-03 Access request response method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110138732A CN110138732A (en) 2019-08-16
CN110138732B true CN110138732B (en) 2022-03-29

Family

ID=67569285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910268069.5A Active CN110138732B (en) 2019-04-03 2019-04-03 Access request response method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN110138732B (en)
WO (1) WO2020199487A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138732B (en) * 2019-04-03 2022-03-29 平安科技(深圳)有限公司 Access request response method, device, equipment and storage medium
CN110531999A (en) * 2019-09-04 2019-12-03 上海闻泰电子科技有限公司 Application management method, device, equipment and storage medium
CN111198756A (en) * 2019-12-28 2020-05-26 北京浪潮数据技术有限公司 Application scheduling method and device of kubernets cluster
CN111338575B (en) * 2020-02-20 2021-06-29 苏州浪潮智能科技有限公司 Storage service quality control method, device, equipment and storage medium
CN111444018B (en) * 2020-03-30 2023-08-08 北京字节跳动网络技术有限公司 Request processing method and device
CN111767137B (en) * 2020-06-03 2023-09-01 北京奇艺世纪科技有限公司 System deployment method and device, electronic equipment and storage medium
CN112165436B (en) * 2020-10-15 2024-02-20 腾讯科技(深圳)有限公司 Flow control method, device and system
CN112333172B (en) * 2020-10-28 2023-06-30 中国农业银行股份有限公司 Signature verification method and system
CN112817729A (en) * 2021-02-24 2021-05-18 阳光人寿保险股份有限公司 Data source dynamic scheduling method and device, electronic equipment and storage medium
CN113590298B (en) * 2021-08-09 2024-03-26 平安银行股份有限公司 Resource scheduling method, device, server and storage medium
CN113535332A (en) * 2021-08-11 2021-10-22 北京字节跳动网络技术有限公司 Cluster resource scheduling method and device, computer equipment and storage medium
CN113645310A (en) * 2021-08-20 2021-11-12 北京高途云集教育科技有限公司 Data current limiting method and device, electronic equipment and readable storage medium
CN115001854B (en) * 2022-07-18 2022-11-22 江苏艾盾网络科技有限公司 Big data-based tracing-prevention server cluster management and control system and method
CN115277713A (en) * 2022-07-27 2022-11-01 京东科技信息技术有限公司 Load balancing method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102394931A (en) * 2011-11-04 2012-03-28 北京邮电大学 Cloud-based user visit request scheduling method
CN103581039A (en) * 2013-11-08 2014-02-12 西安电子科技大学宁波信息技术研究院 Dynamic load balancing structure of server cluster and application method thereof
CN103825785A (en) * 2014-03-24 2014-05-28 北京中电普华信息技术有限公司 Monitoring method and device of service node
CN105100237A (en) * 2015-07-15 2015-11-25 浪潮(北京)电子信息产业有限公司 Scheduling control method and scheduling control system
CN105808347A (en) * 2014-12-31 2016-07-27 北京神州泰岳软件股份有限公司 Cluster server deployment calculation method and device
CN106959894A (en) * 2016-01-11 2017-07-18 北京京东尚科信息技术有限公司 Resource allocation methods and device
CN107613030A (en) * 2017-11-06 2018-01-19 网宿科技股份有限公司 A kind of method and system of processing business request
CN108667878A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Server load balancing method and device, storage medium, electronic equipment
CN109218100A (en) * 2018-09-21 2019-01-15 郑州云海信息技术有限公司 Distributed objects storage cluster and its request responding method, system and storage medium
CN109347982A (en) * 2018-11-30 2019-02-15 网宿科技股份有限公司 A kind of dispatching method and device of data center

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9026655B2 (en) * 2007-01-31 2015-05-05 Oracle America, Inc. Method and system for load balancing
CN102480469B (en) * 2010-11-29 2015-11-25 北京中和威软件有限公司 Based on the method for the load dispatch of balancing energy and device in a kind of SIP service cluster
CN103188277B (en) * 2011-12-27 2016-05-18 中国电信股份有限公司 load energy consumption management system, method and server
CN104731516B (en) * 2013-12-18 2019-03-01 腾讯科技(深圳)有限公司 A kind of method, apparatus and distributed memory system of accessing file
CN105915583B (en) * 2016-03-28 2020-05-26 联想(北京)有限公司 Method for starting service cluster and service cluster
CN110138732B (en) * 2019-04-03 2022-03-29 平安科技(深圳)有限公司 Access request response method, device, equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102394931A (en) * 2011-11-04 2012-03-28 北京邮电大学 Cloud-based user visit request scheduling method
CN103581039A (en) * 2013-11-08 2014-02-12 西安电子科技大学宁波信息技术研究院 Dynamic load balancing structure of server cluster and application method thereof
CN103825785A (en) * 2014-03-24 2014-05-28 北京中电普华信息技术有限公司 Monitoring method and device of service node
CN105808347A (en) * 2014-12-31 2016-07-27 北京神州泰岳软件股份有限公司 Cluster server deployment calculation method and device
CN105100237A (en) * 2015-07-15 2015-11-25 浪潮(北京)电子信息产业有限公司 Scheduling control method and scheduling control system
CN106959894A (en) * 2016-01-11 2017-07-18 北京京东尚科信息技术有限公司 Resource allocation methods and device
CN108667878A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Server load balancing method and device, storage medium, electronic equipment
CN107613030A (en) * 2017-11-06 2018-01-19 网宿科技股份有限公司 A kind of method and system of processing business request
CN109218100A (en) * 2018-09-21 2019-01-15 郑州云海信息技术有限公司 Distributed objects storage cluster and its request responding method, system and storage medium
CN109347982A (en) * 2018-11-30 2019-02-15 网宿科技股份有限公司 A kind of dispatching method and device of data center

Also Published As

Publication number Publication date
WO2020199487A1 (en) 2020-10-08
CN110138732A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
CN110138732B (en) Access request response method, device, equipment and storage medium
US10182018B2 (en) Resource management based on device-specific or user-specific resource usage profiles
US9678797B2 (en) Dynamic resource management for multi-process applications
US10101910B1 (en) Adaptive maximum limit for out-of-memory-protected web browser processes on systems using a low memory manager
US10289446B1 (en) Preserving web browser child processes by substituting a parent process with a stub process
CN111880936A (en) Resource scheduling method and device, container cluster, computer equipment and storage medium
US10616069B2 (en) Cache based on dynamic device clustering
CN112600761B (en) Resource allocation method, device and storage medium
Ramasubbareddy et al. RTTSMCE: a response time aware task scheduling in multi-cloudlet environment
US10248321B1 (en) Simulating multiple lower importance levels by actively feeding processes to a low-memory manager
WO2020259208A1 (en) Memory scheduling method and apparatus, device and storage medium
CN112631680A (en) Micro-service container scheduling system, method, device and computer equipment
CN114003238B (en) Container deployment method, device, equipment and storage medium based on transcoding card
CN114924888A (en) Resource allocation method, data processing method, device, equipment and storage medium
CN114466365A (en) Spectrum resource acquisition method, spectrum resource acquisition device and computer readable storage medium
CN110990219B (en) Computer monitoring method based on prediction model
CN114090256A (en) Application delivery load management method and system based on cloud computing
CN113535378A (en) Resource allocation method, storage medium and terminal equipment
CN115361285B (en) Method, device, equipment and medium for realizing off-line service mixed deployment
US20230342200A1 (en) System and method for resource management in dynamic systems
WO2023160278A1 (en) Request processing method and apparatus, and storage medium
CN117009080A (en) Resource adjustment method, apparatus, device, medium and computer program product
CN117435129A (en) Storage cluster expansion method and device, computer equipment and storage medium
CN117785486A (en) Environment resource allocation method, device, equipment and medium
WO2023055295A2 (en) Method and apparatus for task writing in edge terminal, terminal, and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant