CN111245741A - Network traffic distribution method based on software deadlock and high-load jump technology - Google Patents

Network traffic distribution method based on software deadlock and high-load jump technology Download PDF

Info

Publication number
CN111245741A
CN111245741A CN201911419643.9A CN201911419643A CN111245741A CN 111245741 A CN111245741 A CN 111245741A CN 201911419643 A CN201911419643 A CN 201911419643A CN 111245741 A CN111245741 A CN 111245741A
Authority
CN
China
Prior art keywords
application
applications
same
domain name
domain names
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911419643.9A
Other languages
Chinese (zh)
Inventor
张晶
石小川
刘琦
黄龙飞
陈瑜靓
赵昆杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Useear Information Technology Co ltd
Original Assignee
Xiamen Useear Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Useear Information Technology Co ltd filed Critical Xiamen Useear Information Technology Co ltd
Priority to CN201911419643.9A priority Critical patent/CN111245741A/en
Publication of CN111245741A publication Critical patent/CN111245741A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2475Traffic characterised by specific attributes, e.g. priority or QoS for supporting traffic characterised by the type of applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Program synchronisation; Mutual exclusion, e.g. by means of semaphores
    • G06F9/524Deadlock detection or avoidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2441Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A network flow shunting method based on software deadlock and high load jump technology comprises the following steps; acquiring a plurality of applications and domain names of the applications in a system, and numbering the application domain names; dividing the resources in the system into regions, acquiring domain names of the divided regions, and numbering the domain names; if the number of the domain names of the region is less than the number of the domain names applied in the system; judging whether an application domain name same as the domain name of the region exists or not, and forwarding the corresponding application to the corresponding regional system resource when the application domain name same as the domain name of the region exists; obtaining the isolation level of the application in the same system resource, and performing classification execution according to the isolation level; applications within the same per-isolation level are executed in numbered order. According to the method, the number of the application in the system and the resource of the system are divided, and the domain name and the isolation level are extracted, so that the network flow shunting method with high efficiency and good drainage effect is obtained.

Description

Network traffic distribution method based on software deadlock and high-load jump technology
Technical Field
The invention relates to the technical field of network management, in particular to a network traffic shunting method based on software deadlock and high-load jump technology.
Background
With the development of internet technology, more and more servers are connected to the network, so that the amount of data to be transmitted in the internet, that is, network traffic, is larger and larger. In this case, in order to prevent the network from being congested, in the prior art, different network traffic is generally shunted to different network links by a network traffic shunting method. Generally, a network traffic offloading method is to identify an application corresponding to a network traffic through a classification technique, and then offload the network traffic corresponding to different applications to a network link of the application corresponding to the network traffic based on an identification result of the application. Software deadlock, referred to herein as process deadlock, is a computer technology term. It is a state of operating system or software running: in a multitasking system, a deadlock is created when one or more processes wait for system resources, which are in turn occupied by the process itself or by other processes. Because the resource occupation is mutually exclusive, when a process applies for resources, the related process can never allocate necessary resources and can not continue to operate without the assistance of external force, and a special phenomenon is generated. The network traffic shunting method aiming at the software deadlock and high-load jump technology in the prior art does not exist.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides a network traffic shunting method based on software deadlock and high-load jump technology, which is high in efficiency and good in drainage effect by dividing and numbering the application in a system and the resources of the system, and extracting domain names and isolation levels.
(II) technical scheme
In order to solve the above problems, the present invention provides a network traffic splitting method based on software deadlock and high load jump technology, comprising;
acquiring a plurality of applications and domain names of the applications in a system, and numbering the application domain names;
dividing the resources in the system into regions, acquiring domain names of the divided regions, and numbering the domain names;
if the number of the domain names of the region is less than the number of the domain names applied in the system; judging whether an application domain name same as the domain name of the region exists or not, and forwarding the corresponding application to the corresponding regional system resource when the application domain name same as the domain name of the region exists;
obtaining the isolation level of the application in the same system resource, and performing classification execution according to the isolation level; applications within the same per-isolation level are executed in numbered order.
Preferably, a corresponding list is established according to the domain name of the application and the domain name of the system area, and each domain name in the corresponding list corresponds to the number of the domain name.
Preferably, SQL92 defines 4 levels of isolation: uncommitted reads, committed reads, repeatable reads, and serializable; the level of isolation of applications within the same system resource is taken to be as low as possible.
Preferably, a data access time domain discrete method is adopted to control the application use time period in the system area; the data access time domain discretization method comprises the following specific steps:
s1, uniformly managing the applications in the resources in the system by adopting the workflow;
s2, when managing tasks, on one hand, the application of the same isolation level is limited, and the excessive occupation of resources is prevented; on the other hand, different applications and time are reasonably arranged, and the simultaneous execution of a plurality of applications is avoided as much as possible;
and S3, avoiding running the background application task in the peak time of the foreground transaction.
Preferably, the number of execution at the same time is limited to 1 when the application with the same isolation level is executed.
Preferably, the system comprises a monitoring unit and a traffic acquisition unit, wherein the monitoring unit is used for installing a monitoring device on the gateway; the flow acquisition unit is used for acquiring the network flow which is shunted in advance in the gateway through the monitoring device.
Preferably, in the software deadlock state, it is determined which application in the isolation level is deadlocked, and the application is re-executed in sequence.
Preferably, the flow ratios of the applications within each isolation level are summarized; and adjusting the division ratio of the resource area in the system according to the ratio.
Preferably, the monitoring unit comprises a monitoring device; the monitoring device is used for acquiring the network flow which is shunted by the application in the gateway.
Preferably, the isolation levels employed in the method are uncommitted reads and committed reads.
The method comprises the steps of firstly obtaining a plurality of applications and domain names of the applications in a system, numbering the application domain names, then carrying out region division on resources in the system, obtaining domain names of the divided regions, numbering the domain names, searching from the domain names of the regions when the number of the domain names of the regions is less than the number of the application domain names in the system, judging whether the application domain names same with the domain names of the regions exist or not, and forwarding the corresponding applications to the corresponding regional system resources when the application domain names same with the domain names of the regions exist; in order to prevent the applications in the same area from being deadlocked, the isolation levels of the applications in the same system resource are acquired, the applications are classified and executed according to the isolation levels, and the applications in the isolation levels are executed according to the number sequence.
In the invention, a corresponding list is established according to the applied domain name and the domain name of a system area, and each domain name in the corresponding list corresponds to the serial number of the domain name, so that data can be conveniently recorded; the isolation level of the application in the same system resource adopts the isolation level as low as possible, and the integrity and consistency of database data are ensured, so that the multi-user transaction isolation degree is realized; facilitating determination of an application execution order; when the application with the same isolation level is executed, the execution number at the same time is often limited to 1, so that the condition of deadlock is avoided; the monitoring unit and the traffic acquiring unit can help to record traffic shunt records; in the deadlock state of the software, judging which application in the isolation level is subjected to deadlock, and re-executing the applications in the isolation level according to the sequence, so that the application is convenient to use; summarizing the flow ratio of the application in each isolation level, adjusting the division ratio of resource areas in the system according to the ratio, improving the shunting efficiency and being more scientific and effective; the monitoring unit comprises a monitoring device, and the monitoring device is used for acquiring the network flow which is shunted by the application in the gateway; the isolation level adopted in the method is uncommitted reading and submitted reading, so that better isolation is realized and the integrity and consistency of data are ensured to a greater extent.
Drawings
Fig. 1 is a schematic structural diagram of a network traffic offloading method based on software deadlock and high-load hopping technology according to the present invention.
Detailed description of the preferred embodiments
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1, a network traffic offloading method based on software deadlock and high-load jump technology provided by the present invention includes;
acquiring a plurality of applications and domain names of the applications in a system, and numbering the application domain names;
dividing the resources in the system into regions, acquiring domain names of the divided regions, and numbering the domain names;
if the number of the domain names of the region is less than the number of the domain names applied in the system; judging whether an application domain name same as the domain name of the region exists or not, and forwarding the corresponding application to the corresponding regional system resource when the application domain name same as the domain name of the region exists;
obtaining the isolation level of the application in the same system resource, and performing classification execution according to the isolation level; applications within the same per-isolation level are executed in numbered order.
The method comprises the steps of firstly obtaining a plurality of applications and domain names of the applications in a system, numbering the application domain names, then carrying out region division on resources in the system, obtaining domain names of the divided regions, numbering the domain names, searching from the domain names of the regions when the number of the domain names of the regions is less than the number of the application domain names in the system, judging whether the application domain names same with the domain names of the regions exist or not, and forwarding the corresponding applications to the corresponding regional system resources when the application domain names same with the domain names of the regions exist; in order to prevent the applications in the same area from being deadlocked, the isolation levels of the applications in the same system resource are acquired, the applications are classified and executed according to the isolation levels, and the applications in the isolation levels are executed according to the number sequence.
In an optional embodiment, a correspondence list is established according to the domain name of the application and the domain name of the system area, and each domain name in the correspondence list corresponds to the number thereof.
It should be noted that, a corresponding list is established according to the domain name of the application and the domain name of the system area, and each domain name in the corresponding list corresponds to its number, which is convenient for recording data.
In an alternative embodiment, SQL92 defines 4 levels of isolation: uncommitted reads, committed reads, repeatable reads, and serializable; the level of isolation of applications within the same system resource is taken to be as low as possible.
It should be noted that the isolation level of the application in the same system resource is as low as possible, so as to ensure the integrity and consistency of the database data and the isolation of the multi-user transaction.
In an optional embodiment, a data access time domain discretization method is adopted to control the application use time period in the system area; the data access time domain discretization method comprises the following specific steps:
s1, uniformly managing the applications in the resources in the system by adopting the workflow;
s2, when managing tasks, on one hand, the application of the same isolation level is limited, and the excessive occupation of resources is prevented; on the other hand, different applications and time are reasonably arranged, and the simultaneous execution of a plurality of applications is avoided as much as possible;
and S3, avoiding running the background application task in the peak time of the foreground transaction.
It should be noted that the determination of the execution order of the applications is facilitated.
In an alternative embodiment, the number of executions at the same time is often limited to 1 for applications with the same isolation level when executing.
It should be noted that, when the application with the same isolation level is executed, the number of executions at the same time is often limited to 1, so as to avoid the occurrence of deadlock.
In an optional embodiment, the system comprises a monitoring unit and a traffic acquisition unit, wherein the monitoring unit is used for installing a monitoring device on a gateway; the flow acquisition unit is used for acquiring the network flow which is shunted in advance in the gateway through the monitoring device.
It should be noted that the monitoring unit and the traffic acquiring unit may assist in recording the traffic diversion record.
In an alternative embodiment, in the software deadlock state, it is determined what application in the isolation level is deadlocked, and the application is re-executed in sequence.
It should be noted that, in the software deadlock state, it is determined what kind of application in the isolation level is deadlocked, and the application is re-executed in sequence, which is convenient for use.
In an alternative embodiment, the traffic mix of the applications within each isolation level is aggregated; and adjusting the division ratio of the resource area in the system according to the ratio.
It should be noted that the flow ratios of the applications in each isolation level are collected, and the division ratio of the resource areas in the system is adjusted according to the ratios, so that the flow distribution efficiency is improved, and the method is more scientific and effective.
In an alternative embodiment, the listening unit comprises a listening device; the monitoring device is used for acquiring the network flow which is shunted by the application in the gateway.
It should be noted that the monitoring unit includes a monitoring device, and the monitoring device is configured to obtain the network traffic that is shunted by the application in the gateway.
In an alternative embodiment, the isolation levels employed in the method are uncommitted reads and committed reads.
It should be noted that the isolation levels used in the method are uncommitted reads and committed reads, which achieves better isolation while ensuring the integrity and consistency of the data to a greater extent.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (10)

1. A network flow shunting method based on software deadlock and high load jump technology is characterized by comprising the following steps of;
acquiring a plurality of applications and domain names of the applications in a system, and numbering the application domain names;
dividing the resources in the system into regions, acquiring domain names of the divided regions, and numbering the domain names;
if the number of the domain names of the region is less than the number of the domain names applied in the system; judging whether an application domain name same as the domain name of the region exists or not, and forwarding the corresponding application to the corresponding regional system resource when the application domain name same as the domain name of the region exists;
obtaining the isolation level of the application in the same system resource, and performing classification execution according to the isolation level; applications within the same per-isolation level are executed in numbered order.
2. The method according to claim 1, wherein a correspondence list is created according to an application domain name and a domain name of a system area, and each domain name in the correspondence list corresponds to a number thereof.
3. The method for offloading network traffic based on software deadlock and high load hopping technology as claimed in claim 1, wherein SQL92 defines 4 isolation levels: uncommitted reads, committed reads, repeatable reads, and serializable; the level of isolation of applications within the same system resource is taken to be as low as possible.
4. The method for shunting network traffic based on software deadlock and high-load jump technology according to claim 1, characterized in that a data access time domain discretization method is adopted to control the application use time period in the system area; the data access time domain discretization method comprises the following specific steps:
s1, uniformly managing the applications in the resources in the system by adopting the workflow;
s2, when managing tasks, on one hand, the application of the same isolation level is limited, and the excessive occupation of resources is prevented; on the other hand, different applications and time are reasonably arranged, and the simultaneous execution of a plurality of applications is avoided as much as possible;
and S3, avoiding running the background application task in the peak time of the foreground transaction.
5. The method as claimed in claim 4, wherein the number of execution times at the same time is limited to 1 when the application with the same isolation level executes.
6. The method for shunting network traffic based on the software deadlock and high-load jump technology according to claim 1, comprising a monitoring unit and a traffic acquisition unit, wherein the monitoring unit is used for installing a monitoring device on a gateway; the flow acquisition unit is used for acquiring the network flow which is shunted in advance in the gateway through the monitoring device.
7. The method for offloading network traffic based on software deadlock and high-load hopping technology as claimed in claim 1, wherein in the software deadlock state, it is determined what application in isolation level is deadlocked, and the application is re-executed in order.
8. The method for offloading network traffic based on software deadlock and high-load hopping technology of claim 1, wherein traffic ratios of applications within each isolation level are aggregated; and adjusting the division ratio of the resource area in the system according to the ratio.
9. The method for offloading network traffic based on software deadlock and high load hopping technology as claimed in claim 1, wherein the snooping unit comprises a snooping device; the monitoring device is used for acquiring the network flow which is shunted by the application in the gateway.
10. The method for offloading network traffic based on software deadlock and high load hopping technique as claimed in claim 3, wherein isolation levels used in the method are uncommitted reads and committed reads.
CN201911419643.9A 2019-12-31 2019-12-31 Network traffic distribution method based on software deadlock and high-load jump technology Pending CN111245741A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911419643.9A CN111245741A (en) 2019-12-31 2019-12-31 Network traffic distribution method based on software deadlock and high-load jump technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911419643.9A CN111245741A (en) 2019-12-31 2019-12-31 Network traffic distribution method based on software deadlock and high-load jump technology

Publications (1)

Publication Number Publication Date
CN111245741A true CN111245741A (en) 2020-06-05

Family

ID=70877969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911419643.9A Pending CN111245741A (en) 2019-12-31 2019-12-31 Network traffic distribution method based on software deadlock and high-load jump technology

Country Status (1)

Country Link
CN (1) CN111245741A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1787478A (en) * 2004-12-09 2006-06-14 电子科技大学 Method for non deadlock self adaptive routing in multi-dimensional exchanging structure
CN102137014A (en) * 2011-03-11 2011-07-27 华为技术有限公司 Resource management method, system and resource manager
US20120030657A1 (en) * 2010-07-30 2012-02-02 Qi Gao Method and system for using a virtualization system to identify deadlock conditions in multi-threaded programs by controlling scheduling in replay
CN105224886A (en) * 2014-06-26 2016-01-06 中国移动通信集团甘肃有限公司 A kind of mobile terminal safety partition method, device and mobile terminal
CN109921895A (en) * 2019-02-26 2019-06-21 成都国科微电子有限公司 A kind of calculation method and system of data hash value

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1787478A (en) * 2004-12-09 2006-06-14 电子科技大学 Method for non deadlock self adaptive routing in multi-dimensional exchanging structure
US20120030657A1 (en) * 2010-07-30 2012-02-02 Qi Gao Method and system for using a virtualization system to identify deadlock conditions in multi-threaded programs by controlling scheduling in replay
CN102137014A (en) * 2011-03-11 2011-07-27 华为技术有限公司 Resource management method, system and resource manager
CN105224886A (en) * 2014-06-26 2016-01-06 中国移动通信集团甘肃有限公司 A kind of mobile terminal safety partition method, device and mobile terminal
CN109921895A (en) * 2019-02-26 2019-06-21 成都国科微电子有限公司 A kind of calculation method and system of data hash value

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
任长权 等: "《静态网页制作技术教程》", 30 September 2017 *
郝丽波等: ""基于隔离域的事务工作流并发控制"", 《计算机工程与设计》 *
鲁宁 等: "《计算机工程与设计》", 31 January 2015 *

Similar Documents

Publication Publication Date Title
US7810099B2 (en) Optimizing workflow execution against a heterogeneous grid computing topology
US10404556B2 (en) Methods and computer program products for correlation analysis of network traffic in a network device
CN105302657B (en) Abnormal condition analysis method and device
US10171620B2 (en) Non-transitory computer-readable recording medium having stored therein control program, control apparatus and control method
CN102667724A (en) Goal oriented performance management of workload utilizing accelerators
US20170206462A1 (en) Method and apparatus for detecting abnormal contention on a computer system
US8375228B2 (en) Multiple-node system power utilization management
US20120117030A1 (en) Database migration management apparatus and method thereof
US20120072575A1 (en) Methods and computer program products for aggregating network application performance metrics by process pool
CN103995807B (en) Magnanimity data query and the method for after-treatment under a kind of framework based on Web
CN109976989B (en) Cross-node application performance monitoring method and device and high-performance computing system
CN106293881B (en) Performance monitor based on non-uniform I/O access framework and monitoring method thereof
EP4038499A1 (en) Real time multi-tenant workload tracking and auto throttling
US20220070099A1 (en) Method, electronic device and computer program product of load balancing
CN106897133A (en) A kind of implementation method based on the management cluster load of PBS job schedulings
CN116225696A (en) Operator concurrency optimization method and device for stream processing system
US11409704B2 (en) Method, device and computer program product for managing storage system
US10785102B2 (en) Modifying distributed application based on cloud diagnostic data
Çavdar et al. Quantifying the brown side of priority schedulers: Lessons from big clusters
CN112860651A (en) Task log analysis method, system, computer device and storage medium
CN111245741A (en) Network traffic distribution method based on software deadlock and high-load jump technology
CN115495231B (en) Dynamic resource scheduling method and system under high concurrency task complex scene
US8954974B1 (en) Adaptive lock list searching of waiting threads
CN112579552A (en) Log storage and calling method, device and system
US20160006635A1 (en) Monitoring method and monitoring system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200605