CN111245732B - Flow control method, device and equipment - Google Patents

Flow control method, device and equipment Download PDF

Info

Publication number
CN111245732B
CN111245732B CN201811440891.7A CN201811440891A CN111245732B CN 111245732 B CN111245732 B CN 111245732B CN 201811440891 A CN201811440891 A CN 201811440891A CN 111245732 B CN111245732 B CN 111245732B
Authority
CN
China
Prior art keywords
application
node
flow control
data
threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811440891.7A
Other languages
Chinese (zh)
Other versions
CN111245732A (en
Inventor
钱龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811440891.7A priority Critical patent/CN111245732B/en
Publication of CN111245732A publication Critical patent/CN111245732A/en
Application granted granted Critical
Publication of CN111245732B publication Critical patent/CN111245732B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/29Flow control; Congestion control using a combination of thresholds

Abstract

The application provides a flow control method, a flow control device and flow control equipment, wherein the flow control method comprises the following steps: acquiring application state information of a storage node; determining a flow control threshold of an application node according to the application state information; and controlling the flow of the data request received by the application node according to the flow control threshold. By the technical scheme, the access flow of each application node can be limited from the dimension of the distributed system, the overall processing capacity of the distributed system is ensured, and the processing resources of the distributed system are reasonably utilized.

Description

Flow control method, device and equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a flow control method, apparatus, and device.
Background
In a large-scale distributed system, a storage node and a plurality of application nodes may be included. The application node can process the data request after receiving the data request, and in the process of processing the data request, the operations such as data reading and data writing can be involved. In order to realize data reading, the application node may send a data reading request to the storage node, and the storage node may return data corresponding to the data reading request to the application node. In order to implement data writing, the application node may send a data writing request to the storage node, and the storage node may store data corresponding to the data writing request to the storage node.
In order to ensure that each application node can normally access the storage node, each application node needs to be subjected to current limiting, for example, the current limiting threshold is configured to be 100 per second, so that each application node can process at most 100 data requests per second, namely, at most 100 access requests (such as data reading requests and data writing requests) are sent to the storage node per second, the processing performance of the storage node is ensured, and the storage node is prevented from being abnormal.
Obviously, if the distributed system includes application node 1 and application node 2, the distributed system processes at most 200 data requests per second. However, if the application node 1 receives 80 data requests per second and the application node 2 receives 120 data requests per second, the application node 1 processes 80 data requests per second, the application node 2 processes 100 data requests per second, and discards 20 data requests, that is, the distributed system processes 180 data requests per second, resulting in a decrease in the overall processing capacity of the distributed system.
Disclosure of Invention
The application provides a flow control method, which comprises the following steps:
acquiring application state information of a storage node;
Determining a flow control threshold of an application node according to the application state information;
and controlling the flow of the data request received by the application node according to the flow control threshold.
The application provides a flow control method, which comprises the following steps:
acquiring an application threshold value of a specific application and the data access quantity of the specific application;
Determining application state information of the specific application according to the application threshold and the data access quantity;
and sending the application state information to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the application state information.
The application provides a flow control method, which comprises the following steps:
acquiring an application threshold value of a specific application and the data access quantity of the specific application;
Determining application state information of the specific application according to the application threshold and the data access quantity;
determining a flow control threshold value of an application node corresponding to a specific application according to the application state information;
And sending the flow control threshold value to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the flow control threshold value.
The application provides a flow control method, which comprises the following steps:
Acquiring application state information;
Determining a flow control threshold of an application node according to the application state information;
and controlling the flow of the data request received by the application node according to the flow control threshold.
The present application provides a flow control device, the device comprising:
the acquisition module is used for acquiring the application state information of the storage node;
The determining module is used for determining a flow control threshold value of the application node according to the application state information;
And the control module is used for controlling the flow of the data request according to the flow control threshold value.
The present application provides a flow control device, the device comprising:
The acquisition module is used for acquiring an application threshold value of a specific application and the data access quantity of the specific application;
The determining module is used for determining application state information of a specific application according to the application threshold value and the data access quantity;
And the sending module is used for sending the application state information to the application node corresponding to the specific application so that the application node can control the flow of the data request according to the application state information.
The application provides an application node, which comprises:
A processor and a machine-readable storage medium having stored thereon computer instructions that when executed by the processor perform the following:
acquiring application state information of a storage node;
Determining a flow control threshold of an application node according to the application state information;
and controlling the flow of the data request received by the application node according to the flow control threshold.
The present application provides a storage node comprising:
A processor and a machine-readable storage medium having stored thereon computer instructions that when executed by the processor perform the following:
acquiring an application threshold value of a specific application and the data access quantity of the specific application;
Determining application state information of the specific application according to the application threshold and the data access quantity;
and sending the application state information to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the application state information.
Based on the technical scheme, in the embodiment of the application, the flow control can be performed on the application nodes of the distributed system, the access flow of each application node can be limited from the dimension of the distributed system, and the access flow is not limited from the dimension of a single application node, so that the access flow is uniformly distributed to each application node as much as possible, the overall processing capacity of the distributed system is ensured, the processing resources of the distributed system are reasonably utilized, the flow is accurately limited, and the capacity of a storage cluster is fully exerted. And the application node can dynamically adjust the flow control threshold according to the application state information of the storage node, and perform flow limiting processing on the data request according to the flow control threshold, so as to ensure that the total flow of all the application nodes is constant in a limiting interval.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following description will briefly describe the drawings required to be used in the embodiments of the present application or the description in the prior art, and it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings may be obtained according to these drawings of the embodiments of the present application for a person having ordinary skill in the art.
FIG. 1 is a flow chart of a flow control method in one embodiment of the application;
FIG. 2 is a flow chart of a flow control method in another embodiment of the application;
FIG. 3 is a flow chart of a flow control method in another embodiment of the present application;
FIG. 4 is a schematic view of an application scenario in an embodiment of the present application;
FIG. 5 is a flow chart of a flow control method in one embodiment of the application;
FIG. 6 is a schematic diagram of a state machine of an application node in one embodiment of the application;
FIG. 7A is a block diagram of a flow control device in one embodiment of the present application;
FIG. 7B is a schematic diagram of an application node in an embodiment of the application;
FIG. 8A is a block diagram of a flow control device in another embodiment of the present application;
FIG. 8B is a schematic diagram of a storage node in one embodiment of the application.
Detailed Description
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to any or all possible combinations including one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in embodiments of the present application to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the application. Depending on the context, furthermore, the word "if" used may be interpreted as "at … …" or "at … …" or "in response to a determination".
The embodiment of the application provides a flow control method, which can be applied to an application node, and is shown in fig. 1, and is a flow diagram of the flow control method, and the method can include:
Step 101, acquiring application state information of a storage node.
Specifically, the application node may receive application state information sent by the storage node. Wherein the application state information may be determined by the storage node according to an application threshold and a data access amount of a specific application.
In one example, the present application node may be used to provide the particular application to the user.
And 102, determining a flow control threshold of the application node according to the application state information.
Specifically, the application node may first determine a current flow control threshold of the application node, and adjust the flow control threshold according to the application state information to obtain an adjusted threshold; the application node may then update the adjusted threshold to the flow control threshold of the present application node.
In one example, the application node determines the current flow control threshold for the application node, which may include, but is not limited to: if the current period does not adopt the flow control threshold to control the flow of the data request, the application node can determine the current flow control threshold of the application node according to the data access quantity; or if the current period has adopted the flow control threshold value to perform flow control on the data request, the application node can determine the flow control threshold value in use as the current flow control threshold value of the application node.
In one example, the flow control threshold is adjusted according to the application state information to obtain an adjusted threshold, which may include, but is not limited to: if the application state information is a first type used for indicating that the current flow of the storage node is higher, the application node can reduce the flow control threshold value to obtain an adjusted threshold value; or if the application state information is of the second type for indicating that the current flow of the storage node is low, the application node may perform an increase process on the flow control threshold to obtain an adjusted threshold.
In one example, if the application state information is of a third type that indicates that the current flow of the storage node is appropriate, the application node may also keep the current flow control threshold of the application node unchanged.
And step 103, performing flow control on the data request received by the application node according to the flow control threshold.
Specifically, based on the token bucket algorithm, the application node may perform flow control on the data request received by the application node according to the flow control threshold. Specifically, the application node may first place tokens into the token bucket according to the flow control threshold. Based on this, the application node, after receiving the data request, can determine the consumption token number of the data request; then, judging whether the number of the residual tokens in the token bucket is larger than or equal to the number of the consumed tokens; if yes, the application node can process the data request and delete the consumption tokens from the token bucket; if not, processing the data request may be denied.
In one example, the above execution sequence is only given for convenience of description, and in practical application, the execution sequence between steps may be changed, which is not limited. In other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein, and may include more or less steps than described herein. Furthermore, individual steps described in this specification, in other embodiments, may be described as being split into multiple steps; various steps described in this specification, in other embodiments, may be combined into a single step.
Based on the technical scheme, in the embodiment of the application, the flow control can be performed on the application nodes of the distributed system, the access flow of each application node can be limited from the dimension of the distributed system, and the access flow is not limited from the dimension of a single application node, so that the access flow is uniformly distributed to each application node as much as possible, the overall processing capacity of the distributed system is ensured, the processing resources of the distributed system are reasonably utilized, the flow is accurately limited, and the capacity of a storage cluster is fully exerted. And the application node can dynamically adjust the flow control threshold according to the application state information of the storage node, and perform flow limiting processing on the data request according to the flow control threshold, so as to ensure that the total flow of all the application nodes is constant in a limiting interval.
An embodiment of the present application provides a flow control method, which may be applied to a storage node, and is shown in fig. 2, which is a flow chart of the flow control method, where the method may include:
in step 201, an application threshold value of a specific application and a data access amount of the specific application are obtained.
In one example, a storage node can provide storage services for multiple types of applications, different applications may correspond to the same or different application thresholds; the particular application is any of a number of types of applications.
Step 202, determining application state information of a specific application according to the application threshold and the data access amount.
Specifically, if the data access amount is greater than or equal to the application threshold, or the data access amount is less than the application threshold, and a difference between the application threshold and the data access amount is less than a first threshold, it may be determined that the application state information is a first type for indicating that the current traffic of the storage node is higher.
In addition, if the data access amount is smaller than the application threshold, and the difference between the application threshold and the data access amount is larger than a second threshold, the application state information can be determined to be a second type for indicating that the current flow of the storage node is lower; wherein the first threshold may be less than the second threshold.
In addition, if the data access amount is smaller than the application threshold, and a difference between the application threshold and the data access amount is greater than or equal to the first threshold, and the difference is smaller than or equal to the second threshold, it may be determined that the application state information is a third type for indicating that the current flow of the storage node is more suitable.
And 203, sending the application state information to an application node corresponding to the specific application, so that the application node performs flow control on the data request received by the application node according to the application state information.
In one example, the above execution sequence is only given for convenience of description, and in practical application, the execution sequence between steps may be changed, which is not limited. In other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein, and may include more or less steps than described herein. Furthermore, individual steps described in this specification, in other embodiments, may be described as being split into multiple steps; various steps described in this specification, in other embodiments, may be combined into a single step.
Based on the technical scheme, in the embodiment of the application, the flow control can be performed on the application nodes of the distributed system, the access flow of each application node can be limited from the dimension of the distributed system, and the access flow is not limited from the dimension of a single application node, so that the access flow is uniformly distributed to each application node as much as possible, the overall processing capacity of the distributed system is ensured, the processing resources of the distributed system are reasonably utilized, the flow is accurately limited, and the capacity of a storage cluster is fully exerted. And the application node can dynamically adjust the flow control threshold according to the application state information of the storage node, and perform flow limiting processing on the data request according to the flow control threshold, so as to ensure that the total flow of all the application nodes is constant in a limiting interval.
An embodiment of the present application provides a flow control method, which may be applied to a storage node, and is shown in fig. 3, which is a flow chart of the flow control method, where the method may include:
Step 301, acquiring an application threshold value of a specific application and a data access amount of the specific application.
Step 302, determining application state information of a specific application according to the application threshold and the data access amount.
Specifically, if the data access amount is greater than or equal to the application threshold, or the data access amount is less than the application threshold, and a difference between the application threshold and the data access amount is less than a first threshold, it may be determined that the application state information is a first type for indicating that the current traffic of the storage node is higher.
In addition, if the data access amount is smaller than the application threshold, and the difference between the application threshold and the data access amount is larger than a second threshold, the application state information can be determined to be a second type for indicating that the current flow of the storage node is lower; wherein the first threshold may be less than the second threshold.
And step 303, determining a flow control threshold of the application node corresponding to the specific application according to the application state information. Unlike the above-described embodiments, in the present embodiment, the flow control threshold is determined by the storage node according to the application state information, instead of the application node determining the flow control threshold according to the application state information.
In one example, if the application state information is of the first type, the storage node may perform a reduction process on the current flow control threshold of the application node, thereby obtaining an adjusted flow control threshold. Or if the application state information is of the second type, the storage node may perform an addition process on the current flow control threshold of the application node, so as to obtain an adjusted flow control threshold.
And step 304, the flow control threshold is sent to the application node corresponding to the specific application, so that the application node performs flow control on the data request received by the application node according to the flow control threshold.
The embodiment of the application provides a flow control method, which can be applied to an application node and comprises the following steps: acquiring application state information; determining a flow control threshold of the application node according to the application state information; and controlling the flow of the data request received by the application node according to the flow control threshold.
In one example, the distributed system may include an application node and a storage node, where the application node may access the storage node, and if the access traffic of the storage node is large, an abnormality occurs in the storage node, so that the application node may obtain application state information of the storage node, and determine a traffic control threshold of the application node according to the application state information of the storage node.
In another example, the distributed system may include an application node and a processing node (the type of the processing node is not limited, as long as the application node needs to access the processing node in the process of processing the data request), where the application node may access the processing node, if the access traffic of the processing node is large, which results in an exception of the processing node, so the application node may obtain application state information of the processing node, and determine a traffic control threshold of the application node according to the application state information of the processing node.
The flow control method is described in detail below in connection with a specific application scenario. Referring to fig. 4, a schematic view of an application scenario of the present embodiment is shown, where a distributed system may include a plurality of application nodes (may also be referred to as application servers or application instances) and a plurality of storage nodes (may also be referred to as storage servers).
The plurality of storage nodes can be combined to provide storage service together to form a storage cluster, namely the storage cluster can comprise the plurality of storage nodes. In one example, to provide a storage service to an application node, the application node may send a data read request to the storage node, which may return data corresponding to the data read request to the application node. The application node may send a data writing request to the storage node, and the storage node may store data corresponding to the data writing request to the storage node.
Wherein each application node is for providing a specific application to a user, for example, as shown with reference to fig. 4, application node 411 and application node 412 are for providing application a to a user, and application node 421 and application node 422 are for providing application B to a user. Taking the example of a user accessing application a as an example, the user may send a data request, which is sent to application node 411 or application node 412. The application node 411 or the application node 412 may process the data request after receiving the data request, and in the process of processing the data request, operations such as data reading and data writing may be involved. During data reading, a data reading request may be sent to storage node 431 or storage node 432; during data writing, a data write request may be sent to storage node 431 or storage node 432.
In order to ensure that each application node can normally access the storage node, the processing performance of the storage node needs to be ensured, and the storage node is prevented from being abnormal, so that each application node can be subjected to current limiting, and the storage node is prevented from processing a large number of access requests (such as data reading requests and data writing requests). Since each storage node is handled in the same manner, a storage node 431 will be described as an example.
In this embodiment, since the storage node 431 is capable of providing storage services for multiple types of applications (such as application a and application B), the total traffic threshold of the storage node 431, the application threshold of each application, and different applications may correspond to the same or different application thresholds. For example, the total traffic threshold of storage node 431 may be 500 per second, then application a may be 200 per second, application B may be 300 per second, or application a may be 250 per second, and application B may be 250 per second, although the above application thresholds are merely examples and are not limiting.
Assuming that the application threshold of application a is 200 per second, application node 411 and application node 412 may be throttled, in a conventional manner, application node 411 may be configured to throttle 100 per second and application node 412 may be configured to throttle 100 per second, thus ensuring that application node 411 sends 100 access requests to storage node 431 at most per second and application node 412 sends 100 access requests to storage node 431 at most per second, and storage node 431 receives 200 access requests at most per second, but this may result in a reduction in the overall processing capacity of the distributed system.
For example, if application node 411 receives 80 data requests per second and application node 412 receives 120 data requests per second, application node 411 processes 80 data requests per second, application node 412 processes 100 data requests per second, and discards 20 data requests, that is, storage node 431 receives only 180 access requests per second, resulting in a reduction in the overall processing capacity of the distributed system.
Unlike the conventional manner, in the embodiment of the present application, as long as it is guaranteed that the storage node 431 receives at most 200 access requests per second, a current limit threshold is not configured for each application node separately, thereby improving the overall processing capability of the distributed system. For example, if the application node 411 receives 80 data requests per second and the application node 412 receives 120 data requests per second, the application node 411 processes 80 data requests per second, and the application node 412 processes 120 data requests per second, that is, the storage node 431 may receive 200 access requests per second, thereby improving the overall processing capacity of the distributed system.
It should be noted that the application threshold (200 per second) is a limit of the storage node 431 to the application a, that is, the data request is a data request for the storage node 431, and the access request is also an access request sent to the storage node 431. In practice, storage node 432 may also configure application threshold for application a (e.g., 300 per second), which is independent of the application threshold of storage node 431, such that application node 411 and application node 412 send 300 access requests to storage node 432 at most per second, which is also independent of the access requests sent to storage node 431.
In the above embodiment, the data request is sent by the user to the application node 411 or the application node 412. The application node 411 or the application node 412 may send an access request, such as a data read request or a data write request, to the storage node 431 or the storage node 432 in processing the data request.
For convenience of description, taking the storage node 431 as an example to configure the application threshold value (e.g. 200 per second) for the application a, in the above application scenario, referring to fig. 5, a flow chart of the flow control method is shown.
In step 501, storage node 431 obtains the application threshold and the data access amount of application a.
The storage node 431 may store the application threshold of the application a in advance, for example, 200 applications per second, and thus, the storage node 431 may obtain the application threshold of the application a locally, which is not limited.
In each statistical period (e.g., 1 second, 2 seconds, etc.), the storage node 431 may obtain the number of access requests a sent by the application node 411 to the storage node 431, obtain the number of access requests B sent by the application node 412 to the storage node 431, and determine the data access amount of the application a in the current statistical period according to the number of access requests a, the number of access requests B, and the duration of the statistical period. For example, in the current statistical period, the number of access requests a is 80, the number of access requests B is 110, and the duration of the statistical period is 1 second, then the data access amount of the application a in the current statistical period is (80+110)/1, i.e. 190 per second.
In step 502, storage node 431 determines application state information of application a based on the application threshold and the data access amount. The application state information may include, but is not limited to: a first type (e.g., up type) for indicating that the current traffic of the storage node is high, a second type (e.g., down type for indicating that the current traffic of the storage node is low, a current limiting process can be released) for indicating that the current traffic of the storage node is low, and a third type (e.g., keep type for indicating that the current traffic of the storage node is appropriate, a current limiting measure can be maintained) for indicating that the current traffic of the storage node is appropriate.
Of course, the first type, the second type, and the third type described above are just a few examples of application state information, and there is no limitation on this application state information. For example, the application state information may include a first type and a second type; or may further include a fourth type on the basis of the first type, the second type, and the third type.
In one example, storage node 431 determines application state information for application a based on the application threshold and the data access amount, which may include, but is not limited to: if the data access amount is greater than or equal to the application threshold, or the data access amount is less than the application threshold, and the difference between the application threshold and the data access amount is less than a first threshold, storage node 431 determines that the application state information is of a first type. If the data access amount is less than the application threshold and the difference between the application threshold and the data access amount is greater than a second threshold, storage node 431 determines that the application state information is of a second type. If the data access amount is less than the application threshold, and the difference between the application threshold and the data access amount is greater than or equal to the first threshold, and the difference is less than or equal to the second threshold, then storage node 431 determines that the application state information is of a third type.
The first threshold and the second threshold may be empirically configured, and the first threshold may be smaller than the second threshold, which is not limited. For example, the first threshold may be 10 and the second threshold may be 50.
In one example, the data access amount of the application a may exceed the application threshold of the application a, and in a subsequent process, the application node 411 and the application node 412 may perform the current limiting process, so that the data access amount of the application a does not exceed the application threshold of the application a, thereby ensuring the processing performance of the storage node 431.
In summary, if the data access amount of the application a is greater than or equal to the application threshold of the application a, it is indicated that the data access amount of the application a is greater, and the application node 411 and the application node 412 need to perform the current limiting process, so it may be determined that the application state information is of the first type, which indicates that the current limiting process is required.
If the data access amount of the application a is smaller than the application threshold of the application a, the difference between the application threshold of the application a and the data access amount of the application a is smaller than the first threshold (e.g. 10), which indicates that the data access amount of the application a is larger and is relatively close to the application threshold of the application a, the application node 411 and the application node 412 need to perform the current limiting processing, so that it is determined that the application state information is of the first type, which indicates that the current limiting processing needs to be performed.
If the data access amount of the application a is smaller than the application threshold of the application a, the difference between the application threshold of the application a and the data access amount of the application a is greater than the second threshold (e.g. 50), which indicates that the data access amount of the application a is smaller, and the current limit of the application node 411 and the application node 412 can be released compared with the application threshold of the application a, so that it is determined that the application state information is of the second type, which indicates that the current limit processing can be released.
If the data access amount of the application a is smaller than the application threshold of the application a, the difference between the application threshold of the application a and the data access amount of the application a is greater than or equal to the first threshold (e.g. 10), and the difference is smaller than or equal to the second threshold (e.g. 50), it is indicated that the data access amount of the application a is appropriate, and the current limiting measure of the application node 411 and the application node 412 can be maintained, so that it is determined that the application state information is of the third type.
In step 503, the storage node 431 sends the application state information to the application node corresponding to the application a, that is, sends the application state information to the application node 411 and the application node 412.
In step 504, the application node 411 and the application node 412 each receive the application state information.
In the following embodiments, the application node 411 receives the application state information and performs processing according to the application state information as an example.
For example, at each statistical period, storage node 431 may obtain application state information of application a and send the application state information of the current statistical period to application node 411. The application node 411 may receive the application state information during each statistics period, and perform subsequent processing according to the application state information.
In step 505, the application node 411 determines a flow control threshold according to the application state information.
Specifically, the application node 411 may adjust the current flow control threshold according to the application state information, obtain an adjusted threshold, and update the adjusted threshold to the flow control threshold.
In the initial state, the application node 411 may not perform speed limiting processing, that is, the current period does not use the flow control threshold to perform flow control on the data request, and based on this, the current flow control threshold a may be determined according to the data access amount. For example, the application node 411 may count the number of data requests in the current period, and determine the current flow control threshold a according to the number of data requests and the duration of the current period. The number of data requests is 80 and the duration is 1 second, then the current flow control threshold a is 80/1, i.e. 80 per second.
Further, the application node 411 may adjust the flow control threshold a according to the application state information to obtain an adjusted threshold (e.g. a flow control threshold B), so that the flow control threshold B may be updated to the current flow control threshold of the application node 411, and the flow control threshold B is used for subsequent processing.
In the next cycle, since the current cycle has already employed the flow control threshold B to flow-control the data request, the application node 411 may determine the flow control threshold B being used as the current flow control threshold. The application node 411 adjusts the flow control threshold B according to the application state information to obtain an adjusted threshold (e.g., a flow control threshold C), so that the flow control threshold C can be updated to the current flow control threshold of the application node 411, and the flow control threshold C is used for subsequent processing.
In the next cycle, since the current cycle has already adopted the flow control threshold C to perform flow control on the data request, the application node 411 may determine the flow control threshold C being used as the current flow control threshold, and adjust the flow control threshold C according to the application state information to obtain an adjusted threshold (e.g. the flow control threshold D), so that the flow control threshold D may be updated as the current flow control threshold of the application node 411, and perform subsequent processing by using the flow control threshold D, and so on.
In the above embodiment, the application node 411 adjusts the current flow control threshold according to the application state information, so as to obtain an adjusted threshold, which may include, but is not limited to: if the application state information is of the first type, reducing the flow control threshold value to obtain an adjusted threshold value; for example, the adjusted threshold may be 0.7 for the flow control threshold, which is, of course, only an example of adjustment and is not limited thereto. If the application state information is of the second type, increasing the flow control threshold value to obtain an adjusted threshold value; for example, the adjusted threshold may be 1.5 of the flow control threshold, which is, of course, only an example of adjustment and is not limited thereto. If the application state information is of the third type, the flow control threshold is maintained unchanged.
The above process is described below in connection with the state machine shown in fig. 6. The initial state of the state machine may be a normal state, in which the application node 411 may not perform speed limiting processing, i.e., the application node 411 may process all data requests received by the application node.
In the normal state, if the application state information received by the application node 411 is of the second type or the third type, the application node 411 may maintain the normal state, and the application node 411 still does not perform the speed limit processing. Or in normal state, if the application state information received by the application node 411 is of the first type, the application node 411 may convert the normal state into statis (statistical) state.
In statis states, the application node 411 may count the number of data requests in the current period, and determine the current flow control threshold a according to the number of data requests in the current period and the duration of the current period.
In the next cycle, if the application state information received by the application node 411 is of the second type or the third type, the statis state may be converted into the normal state, and the application node 411 still does not perform the speed limit processing, and re-performs the operation in the normal state. In the next period, if the application state information received by the application node 411 is of the first type, the flow control threshold a may be reduced to obtain an adjusted threshold, for example, the adjusted threshold may be 0.7 x the flow control threshold a, the adjusted threshold is updated to the flow control threshold B of the application node 411, and the statis state is converted to the limit state.
In the limit state, the application node 411 may limit the speed of the application node 411 using the flow control threshold B, that is, the flow control threshold B limits the speed of the data request received by the application node 411.
In the limit state, if the application state information received by the application node 411 is of the first type, the second type or the third type, the limit state may be maintained, the flow control threshold B is adjusted, an adjusted threshold is obtained, the adjusted threshold is updated to be the flow control threshold C of the application node 411, the flow control threshold C is used to limit the speed of the application node 411, and so on, and subsequent processing is not repeated.
If the application state information received by the application node 411 is of the first type, the application node 411 may perform a reduction process on the flow control threshold B to obtain a flow control threshold C, for example, the flow control threshold C may be 0.7 of the flow control threshold B. If the application state information received by the application node 411 is of the second type, the application node 411 may perform an increasing process on the flow control threshold B to obtain a flow control threshold C, for example, the flow control threshold C may be equal to the flow control threshold B by 1.5. If the application state information received by the application node 411 is of the third type, the application node 411 may keep the flow control threshold B unchanged, resulting in a flow control threshold C, which may be, for example, the flow control threshold B.
In one example, in the limit state, if the resulting flow control threshold is greater than the flow control threshold a, the application node 411 may transition the limit state to the normal state, in which the application node 411 may not perform speed limit processing, and re-perform operations in the normal state.
In step 506, the application node 411 performs flow control on the data request received by the application node 411 according to the flow control threshold. For example, based on a token bucket algorithm, the application node 411 may perform flow control on the data request received by the application node 411 according to the flow control threshold.
Specifically, the application node 411 may place tokens into the token bucket according to the flow control threshold (e.g., place tokens into the token bucket at a uniform rate according to the flow control threshold). Further, the application node 411 may determine the number of consumption tokens of the data request after receiving the data request (when the number of consumption tokens is larger as the number of resources consumed by the data request is larger, and when the number of consumption tokens is smaller as the number of resources consumed by the data request is smaller, the application node is not limited to this. The application node 411 may then determine whether the number of tokens remaining in the token bucket is greater than or equal to the number of consumed tokens; if so, the application node 411 may process the data request (during the processing of the data request, an access request may be sent to the storage node 431) and delete the consumption tokens from the token bucket; if not, processing the data request may be denied.
Based on the technical scheme, in the embodiment of the application, the flow control can be performed on the application nodes of the distributed system, the access flow of each application node can be limited from the dimension of the distributed system, and the access flow is not limited from the dimension of a single application node, so that the access flow is uniformly distributed to each application node as much as possible, the overall processing capacity of the distributed system is ensured, the processing resources of the distributed system are reasonably utilized, the flow is accurately limited, and the capacity of a storage cluster is fully exerted. And the application node can dynamically adjust the flow control threshold according to the application state information of the storage node, and perform flow limiting processing on the data request according to the flow control threshold, so as to ensure that the total flow of all the application nodes is constant in a limiting interval.
Based on the same application concept as the method, an embodiment of the present application further provides a flow control device, as shown in fig. 7A, which is a structural diagram of the device, where the device may include:
an acquisition module 71, configured to acquire application state information of a storage node;
a determining module 72, configured to determine a flow control threshold of an application node according to the application state information;
A control module 73, configured to perform flow control on the data request according to the flow control threshold.
The determining module 72 is specifically configured to, when determining the flow control threshold of the application node according to the application state information: determining a current flow control threshold of the application node;
adjusting the flow control threshold according to the application state information to obtain an adjusted threshold;
And updating the adjusted threshold value to be a flow control threshold value of the application node.
The determining module 72 adjusts the flow control threshold according to the application state information, and is specifically configured to: if the application state information is a first type used for representing that the current flow of the storage node is higher, reducing the flow control threshold value to obtain an adjusted threshold value; or if the application state information is of a second type used for indicating that the current flow of the storage node is lower, increasing the flow control threshold value to obtain an adjusted threshold value.
Based on the same concept as the above method, the present embodiment further provides an application node, where the application node may include: a processor and a machine-readable storage medium; the machine-readable storage medium has stored thereon computer instructions which, when executed by the processor, perform the following:
acquiring application state information of a storage node;
Determining a flow control threshold of an application node according to the application state information;
and controlling the flow of the data request received by the application node according to the flow control threshold.
The present embodiment also provides a machine-readable storage medium having stored thereon computer instructions that, when executed, perform the following:
acquiring application state information of a storage node;
Determining a flow control threshold of an application node according to the application state information;
and controlling the flow of the data request received by the application node according to the flow control threshold.
Referring to fig. 7B, which is a block diagram of an application node according to an embodiment of the present application, the computing node 70 may include: a processor 701, a network interface 702, a bus 703, and a memory 704. Memory 704 may be any electronic, magnetic, optical, or other physical storage device that may contain or store information, such as executable instructions, data, or the like. For example, the memory 704 may be: RAM (Radom Access Memory, random access memory), volatile memory, non-volatile memory, flash memory, a storage drive (e.g., hard drive), a solid state disk, any type of storage disk (e.g., optical disk, dvd, etc.).
Based on the same application concept as the method, an embodiment of the present application further provides a flow control device, as shown in fig. 8A, which is a structural diagram of the device, where the device may include:
an obtaining module 81, configured to obtain an application threshold of a specific application and a data access amount of the specific application;
A determining module 82, configured to determine application state information of a specific application according to the application threshold and the data access amount; and the sending module 83 is configured to send the application state information to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the application state information.
The determining module 72 is specifically configured to, when determining application state information of a specific application according to an application threshold and a data access amount: if the data access amount is greater than or equal to the application threshold, or the data access amount is smaller than the application threshold, and the difference value between the application threshold and the data access amount is smaller than a first threshold, determining that the application state information is a first type used for representing that the current flow of the storage node is higher; if the data access amount is smaller than the application threshold value and the difference value between the application threshold value and the data access amount is larger than a second threshold value, determining that the application state information is a second type used for representing that the current flow of the storage node is lower; wherein the first threshold is less than the second threshold.
Based on the same concept as the above method, the present embodiment further provides a storage node, which may include: a processor and a machine-readable storage medium; the machine-readable storage medium has stored thereon computer instructions which, when executed by the processor, perform the following:
acquiring an application threshold value of a specific application and the data access quantity of the specific application;
Determining application state information of the specific application according to the application threshold and the data access quantity;
and sending the application state information to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the application state information.
The present embodiment also provides a machine-readable storage medium having stored thereon computer instructions that, when executed, perform the following:
acquiring an application threshold value of a specific application and the data access quantity of the specific application;
Determining application state information of the specific application according to the application threshold and the data access quantity;
and sending the application state information to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the application state information.
Referring to fig. 8B, which is a block diagram of a storage node according to an embodiment of the present application, the storage node 80 may include: a processor 801, a network interface 802, a bus 803, and a memory 804. The memory 804 may be any electronic, magnetic, optical, or other physical storage device that may contain or store information, such as executable instructions, data, or the like. For example, the memory 804 may be: RAM (Radom Access Memory, random access memory), volatile memory, non-volatile memory, flash memory, a storage drive (e.g., hard drive), a solid state disk, any type of storage disk (e.g., optical disk, dvd, etc.).
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. A typical implementation device is a computer, which may be in the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email device, game console, tablet computer, wearable device, or a combination of any of these devices.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the application may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Moreover, these computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (21)

1. A method of flow control, wherein a distributed system comprises a storage node and a plurality of application nodes, the method being applied to any application node, the method comprising:
acquiring application state information of a storage node; wherein the application state information includes: a first type for representing higher current traffic of the storage node, a second type for representing lower current traffic of the storage node, and a third type for representing more suitable current traffic of the storage node;
Determining a flow control threshold of an application node according to the application state information;
Performing flow control on the data request received by the application node according to the flow control threshold; the data request is a data reading request or a data writing request, the data reading request is used for reading data from the storage node, and the data writing request is used for writing data to the storage node.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The obtaining application state information of the storage node includes:
receiving application state information sent by the storage node;
wherein the application state information is determined by the storage node according to an application threshold value and a data access amount of a specific application; the application node is configured to provide the specific application to a user.
3. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The determining the flow control threshold of the application node according to the application state information comprises the following steps:
determining a current flow control threshold of the application node;
adjusting the flow control threshold according to the application state information to obtain an adjusted threshold;
And updating the adjusted threshold value to be a flow control threshold value of the application node.
4. The method of claim 3, wherein the step of,
The determining the current flow control threshold of the application node comprises the following steps:
if the current period does not adopt the flow control threshold to control the flow of the data request, determining the current flow control threshold of the application node according to the data access quantity; or alternatively
And if the current period adopts the flow control threshold value to carry out flow control on the data request, determining the flow control threshold value in use as the current flow control threshold value of the application node.
5. A method according to claim 3, wherein said adjusting the flow control threshold according to the application status information results in an adjusted threshold, specifically comprising:
If the application state information is a first type used for representing that the current flow of the storage node is higher, reducing the flow control threshold value to obtain an adjusted threshold value; or alternatively
And if the application state information is of a second type used for indicating that the current flow of the storage node is low, increasing the flow control threshold value to obtain an adjusted threshold value.
6. A method according to claim 3, characterized in that the method further comprises:
And if the application state information is of a third type which is used for indicating that the current flow of the storage node is proper, keeping the current flow control threshold of the application node unchanged.
7. The method according to claim 1, wherein the performing flow control on the data request received by the application node according to the flow control threshold value specifically comprises:
putting tokens into a token bucket according to the flow control threshold;
after receiving a data request, determining the consumption token number of the data request;
judging whether the number of the residual tokens in the token bucket is larger than or equal to the number of the consumed tokens;
If yes, processing the data request, and deleting a plurality of tokens of the consumption tokens from the token bucket; and if not, refusing to process the data request.
8. A method of flow control, wherein a distributed system includes a storage node and a plurality of application nodes, the method being applied to the storage node, the method comprising:
acquiring an application threshold value of a specific application and the data access quantity of the specific application;
Determining application state information of the specific application according to the application threshold and the data access quantity; wherein the application state information includes: a first type for representing higher current traffic of the storage node, a second type for representing lower current traffic of the storage node, and a third type for representing more suitable current traffic of the storage node;
The application state information is sent to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the application state information; the data request is a data reading request or a data writing request, the data reading request is used for reading data from the storage node, and the data writing request is used for writing data to the storage node.
9. The method of claim 8, wherein the step of determining the position of the first electrode is performed,
The storage node can provide storage services for a plurality of types of applications, and different applications correspond to the same or different application thresholds; the specific application is any one of the plurality of types of applications.
10. The method according to claim 8, wherein said determining application state information of said specific application according to said application threshold and said data access amount, in particular comprises:
If the data access amount is greater than or equal to the application threshold, or the data access amount is smaller than the application threshold, and the difference value between the application threshold and the data access amount is smaller than a first threshold, determining that the application state information is a first type used for representing that the current flow of the storage node is higher;
If the data access amount is smaller than the application threshold value and the difference value between the application threshold value and the data access amount is larger than a second threshold value, determining that the application state information is a second type used for representing that the current flow of the storage node is lower; wherein the first threshold is less than the second threshold.
11. The method according to claim 8, wherein said determining application state information of said specific application according to said application threshold and said data access amount, in particular comprises:
And if the data access amount is smaller than the application threshold, and the difference value between the application threshold and the data access amount is larger than or equal to a first threshold and the difference value is smaller than or equal to a second threshold, determining that the application state information is a third type for indicating that the current flow of the storage node is more proper.
12. A method of flow control, wherein a distributed system includes a storage node and a plurality of application nodes, the method being applied to the storage node, the method comprising:
acquiring an application threshold value of a specific application and the data access quantity of the specific application;
Determining application state information of the specific application according to the application threshold and the data access quantity; wherein the application state information includes: a first type for representing higher current traffic of the storage node, a second type for representing lower current traffic of the storage node, and a third type for representing more suitable current traffic of the storage node;
determining a flow control threshold value of an application node corresponding to a specific application according to the application state information;
Sending the flow control threshold to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the flow control threshold; the data request is a data reading request or a data writing request, the data reading request is used for reading data from the storage node, and the data writing request is used for writing data to the storage node.
13. The method according to claim 12, wherein said determining application state information of said specific application according to said application threshold and said data access amount, in particular comprises:
If the data access amount is greater than or equal to the application threshold, or the data access amount is smaller than the application threshold, and the difference value between the application threshold and the data access amount is smaller than a first threshold, determining that the application state information is a first type used for representing that the current flow of the storage node is higher;
If the data access amount is smaller than the application threshold value and the difference value between the application threshold value and the data access amount is larger than a second threshold value, determining that the application state information is a second type used for representing that the current flow of the storage node is lower; wherein the first threshold is less than the second threshold.
14. The method according to claim 13, wherein determining the flow control threshold of the application node corresponding to the specific application according to the application state information specifically includes:
If the application state information is of the first type, reducing the current flow control threshold of the application node to obtain an adjusted flow control threshold; or alternatively
And if the application state information is of the second type, performing increasing processing on the current flow control threshold of the application node to obtain an adjusted flow control threshold.
15. A flow control apparatus, wherein a distributed system comprises a storage node and a plurality of application nodes, the apparatus being applied to any application node, the apparatus comprising:
The acquisition module is used for acquiring the application state information of the storage node; wherein the application state information includes: a first type for representing higher current traffic of the storage node, a second type for representing lower current traffic of the storage node, and a third type for representing more suitable current traffic of the storage node;
The determining module is used for determining a flow control threshold value of the application node according to the application state information;
the control module is used for controlling the flow of the data request according to the flow control threshold value; the data request is a data reading request or a data writing request, the data reading request is used for reading data from the storage node, and the data writing request is used for writing data to the storage node.
16. The apparatus of claim 15, wherein the determining module is configured to, when determining the flow control threshold of the application node according to the application state information:
determining a current flow control threshold of the application node;
adjusting the flow control threshold according to the application state information to obtain an adjusted threshold;
And updating the adjusted threshold value to be a flow control threshold value of the application node.
17. The apparatus of claim 16, wherein the determining module adjusts the flow control threshold according to the application status information, and the determining module is specifically configured to:
If the application state information is a first type used for representing that the current flow of the storage node is higher, reducing the flow control threshold value to obtain an adjusted threshold value; or alternatively
And if the application state information is of a second type used for indicating that the current flow of the storage node is low, increasing the flow control threshold value to obtain an adjusted threshold value.
18. A flow control apparatus, wherein a distributed system comprises a storage node and a plurality of application nodes, the apparatus being applied to the storage node, the apparatus comprising:
The acquisition module is used for acquiring an application threshold value of a specific application and the data access quantity of the specific application;
The determining module is used for determining application state information of a specific application according to the application threshold value and the data access quantity; wherein the application state information includes: a first type for representing higher current traffic of the storage node, a second type for representing lower current traffic of the storage node, and a third type for representing more suitable current traffic of the storage node;
The sending module is used for sending the application state information to the application node corresponding to the specific application so that the application node can control the flow of the data request according to the application state information; the data request is a data reading request or a data writing request, the data reading request is used for reading data from the storage node, and the data writing request is used for writing data to the storage node.
19. The apparatus of claim 18, wherein the determining module is specifically configured to, when determining the application state information of the specific application according to the application threshold and the data access amount:
If the data access amount is greater than or equal to the application threshold, or the data access amount is smaller than the application threshold, and the difference value between the application threshold and the data access amount is smaller than a first threshold, determining that the application state information is a first type used for representing that the current flow of the storage node is higher;
If the data access amount is smaller than the application threshold value and the difference value between the application threshold value and the data access amount is larger than a second threshold value, determining that the application state information is a second type used for representing that the current flow of the storage node is lower; wherein the first threshold is less than the second threshold.
20. An application node, wherein a distributed system comprises a storage node and a plurality of application nodes, the application node comprising, for any application node:
A processor and a machine-readable storage medium having stored thereon computer instructions that when executed by the processor perform the following:
acquiring application state information of a storage node; wherein the application state information includes: a first type for representing higher current traffic of the storage node, a second type for representing lower current traffic of the storage node, and a third type for representing more suitable current traffic of the storage node;
Determining a flow control threshold of an application node according to the application state information;
Performing flow control on the data request received by the application node according to the flow control threshold; the data request is a data reading request or a data writing request, the data reading request is used for reading data from the storage node, and the data writing request is used for writing data to the storage node.
21. A storage node, wherein a distributed system comprises a storage node and a plurality of application nodes, the storage node comprising, for the storage node:
A processor and a machine-readable storage medium having stored thereon computer instructions that when executed by the processor perform the following:
acquiring an application threshold value of a specific application and the data access quantity of the specific application;
Determining application state information of the specific application according to the application threshold and the data access quantity; wherein the application state information includes: a first type for representing higher current traffic of the storage node, a second type for representing lower current traffic of the storage node, and a third type for representing more suitable current traffic of the storage node;
The application state information is sent to an application node corresponding to the specific application, so that the application node performs flow control on a data request according to the application state information; the data request is a data reading request or a data writing request, the data reading request is used for reading data from the storage node, and the data writing request is used for writing data to the storage node.
CN201811440891.7A 2018-11-29 2018-11-29 Flow control method, device and equipment Active CN111245732B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811440891.7A CN111245732B (en) 2018-11-29 2018-11-29 Flow control method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811440891.7A CN111245732B (en) 2018-11-29 2018-11-29 Flow control method, device and equipment

Publications (2)

Publication Number Publication Date
CN111245732A CN111245732A (en) 2020-06-05
CN111245732B true CN111245732B (en) 2024-04-19

Family

ID=70864021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811440891.7A Active CN111245732B (en) 2018-11-29 2018-11-29 Flow control method, device and equipment

Country Status (1)

Country Link
CN (1) CN111245732B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113300966A (en) * 2020-07-27 2021-08-24 阿里巴巴集团控股有限公司 Flow control method, device and system and electronic equipment
CN113037597B (en) * 2021-05-21 2021-08-31 北京每日优鲜电子商务有限公司 Flow monitoring method and device, electronic equipment and computer readable medium
CN113965519B (en) * 2021-09-06 2024-01-26 阿里巴巴(中国)有限公司 Flow control and cluster resource guarantee method, equipment and storage medium
CN114745328B (en) * 2022-02-16 2023-12-26 多点生活(成都)科技有限公司 Gateway dynamic current limiting method and real-time current limiting method formed by same
CN114860334B (en) * 2022-04-24 2024-01-26 曙光信息产业(北京)有限公司 Processing method, device, equipment and medium for virtual machine starting storm

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208121A (en) * 2015-09-23 2015-12-30 深圳市深信服电子科技有限公司 File access flow control method and system based on distributed file system
US9473413B1 (en) * 2013-12-04 2016-10-18 Amazon Technologies, Inc. Dynamic throttle of network traffic
CN106385386A (en) * 2016-08-31 2017-02-08 成都飞鱼星科技股份有限公司 Application servo-actuated intelligent floe control method
CN106603256A (en) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 Flow control method and apparatus
JP2017112517A (en) * 2015-12-17 2017-06-22 アンリツ株式会社 Mobile terminal test apparatus and flow control threshold setting method therefor
CN106921587A (en) * 2015-12-28 2017-07-04 阿里巴巴集团控股有限公司 Message traffic control method, device and related system
TW201828059A (en) * 2017-01-24 2018-08-01 阿里巴巴集團服務有限公司 Message flow rate control method, apparatus and related system capable of reducing the amount of message discarding and increasing stability and processing efficiency of the overall data processing system
CN108874324A (en) * 2018-07-17 2018-11-23 郑州云海信息技术有限公司 A kind of access request processing method, device, equipment and readable storage medium storing program for executing

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710514B (en) * 2012-05-25 2015-01-21 华为技术有限公司 Message flow control method and system
TW201414241A (en) * 2012-09-28 2014-04-01 Ibm Method, apparatus and computer program product for synchronizing SLM status of a plurality of appliances in a cluster
CN107222426B (en) * 2016-03-21 2021-07-20 阿里巴巴集团控股有限公司 Flow control method, device and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9473413B1 (en) * 2013-12-04 2016-10-18 Amazon Technologies, Inc. Dynamic throttle of network traffic
CN105208121A (en) * 2015-09-23 2015-12-30 深圳市深信服电子科技有限公司 File access flow control method and system based on distributed file system
CN106603256A (en) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 Flow control method and apparatus
JP2017112517A (en) * 2015-12-17 2017-06-22 アンリツ株式会社 Mobile terminal test apparatus and flow control threshold setting method therefor
CN106921587A (en) * 2015-12-28 2017-07-04 阿里巴巴集团控股有限公司 Message traffic control method, device and related system
WO2017114165A1 (en) * 2015-12-28 2017-07-06 阿里巴巴集团控股有限公司 Message traffic control method, apparatus, and related system
CN106385386A (en) * 2016-08-31 2017-02-08 成都飞鱼星科技股份有限公司 Application servo-actuated intelligent floe control method
TW201828059A (en) * 2017-01-24 2018-08-01 阿里巴巴集團服務有限公司 Message flow rate control method, apparatus and related system capable of reducing the amount of message discarding and increasing stability and processing efficiency of the overall data processing system
CN108874324A (en) * 2018-07-17 2018-11-23 郑州云海信息技术有限公司 A kind of access request processing method, device, equipment and readable storage medium storing program for executing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Threshold Configuration for Flow-Admission Control Based on the Equality (Two-Type Flow Model);Sumiko Miyata;等;《2010 7th IEEE Consumer Communications and Networking Conference》;20100225;全文 *
云计算环境下的流量控制和负载均衡策略;宋昕;宋欢欢;;电子设计工程(第12期);全文 *

Also Published As

Publication number Publication date
CN111245732A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN111245732B (en) Flow control method, device and equipment
CN109194584B (en) Flow monitoring method and device, computer equipment and storage medium
CN107483351B (en) Current limiting method and device
CN109525500B (en) Information processing method and information processing device capable of automatically adjusting threshold
US10862992B2 (en) Resource cache management method and system and apparatus
CN107357405B (en) Power consumption control method and related equipment
CN103888377A (en) Message cache method and device
CN115102908B (en) Method for generating network message based on bandwidth control and related device
CN107948084B (en) Current limiting method and device
CN111124304B (en) Data migration method and device, electronic equipment and storage medium
CN109905331B (en) Queue scheduling method and device, communication equipment and storage medium
US9459929B2 (en) Configurable dynamic load shedding method in distributed stream computing system
CN111385214B (en) Flow control method, device and equipment
CN115499513A (en) Data request processing method and device, computer equipment and storage medium
CN115174487A (en) High-concurrency current limiting method and device and computer storage medium
CN111461868B (en) Dot queuing method, device, computer equipment and readable storage medium
CN116820324A (en) Storage capacity expansion method and device, storage medium and electronic equipment
WO2018090573A1 (en) Buffer space management method and device, electronic apparatus, and storage medium
CN111258501B (en) Control method, device and equipment for deleting logical volume
CN108351873B (en) Cache management method and device
US20210303056A1 (en) Background process management for a device
CN111488222B (en) Stream aggregation method and device and electronic equipment
CN110768915A (en) Shunting method and device
CN108304252B (en) Task scheduling method and device
CN112073327A (en) Anti-congestion software distribution method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant