CN111400739A - System data transmission distribution method - Google Patents
System data transmission distribution method Download PDFInfo
- Publication number
- CN111400739A CN111400739A CN202010201192.8A CN202010201192A CN111400739A CN 111400739 A CN111400739 A CN 111400739A CN 202010201192 A CN202010201192 A CN 202010201192A CN 111400739 A CN111400739 A CN 111400739A
- Authority
- CN
- China
- Prior art keywords
- server
- data
- client
- cache
- cache data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 25
- 238000000034 method Methods 0.000 title claims abstract description 14
- 238000004364 calculation method Methods 0.000 claims abstract description 9
- 230000005012 migration Effects 0.000 claims description 23
- 238000013508 migration Methods 0.000 claims description 23
- 230000003247 decreasing effect Effects 0.000 claims 2
- 238000004422 calculation algorithm Methods 0.000 abstract description 8
- 230000008859 change Effects 0.000 description 9
- 241000700605 Viruses Species 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000005265 energy consumption Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000007306 turnover Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1466—Management of the backup or restore process to make the backup process non-disruptive
Abstract
The invention discloses a system data transmission distribution method, which is characterized in that the calculation method comprises the following steps: s1: the server uploads the stored data to the client, and the uploaded data is encrypted through a key value while being uploaded; s2: the client calculates the server corresponding to the key value in a distributed calculation mode, selects the server and stores the cache data of the selected server; s3: the cache data is dispersedly transmitted to other servers, and when any server transmits data to the client, the client retrieves the cache data from the non-transmission server; s4: and after the cache data at the first non-transmission client terminal is called, the server stops receiving the cache data transmitted by other non-transmission client terminals. In general, a hash table algorithm calculates a hash value and maps a key value to different servers through a remainder operation.
Description
Technical Field
The invention relates to a calculation method, in particular to a system data transmission distribution method.
Background
The traditional internet back-end system is supported by the server to store data calling data, but the traditional server is not connected, and the data stored by each server cannot be the same, so that the energy consumption is difficult to estimate for enterprises. Meanwhile, if viruses or malicious attacks exist, certain server data can be damaged or even lost, which has great threat to business and security of enterprises. Because the number of servers may change as the amount of data changes, the stored data may also be subject to migration difficulties.
There is a need for an innovative scientific system computing approach to reduce risk, protect the system from security, and reduce the trouble of data migration due to changes in the number of servers.
Disclosure of Invention
The technical problem to be solved by the present invention is that a common hash table algorithm generally maps key values to different servers through an operation of remainder taking after calculating hash values, but when the number of servers changes, the divisor of the remainder taking operation changes, and all the servers mapped by the keys almost change, which is unacceptable for a distributed cache system.
The invention is realized by the following technical scheme:
a system data transmission distribution method is characterized in that the calculation method comprises the following steps: s1: the server uploads the stored data to the client, and the uploaded data is encrypted through a key value while being uploaded; s2: the client calculates the server corresponding to the key value in a distributed calculation mode, selects the server and stores the cache data of the selected server; s3: the cache data is dispersedly transmitted to other servers, and when any server transmits data to the client, the client retrieves the cache data from the non-transmission server; s4: and after the cache data at the first non-transmission client terminal is called, the server stops receiving the cache data transmitted by other non-transmission client terminals.
In general, after a hash value is calculated, a key value is mapped to different servers through an operation of remainder, but when the number of servers changes, the divisor of the operation of remainder changes, and the servers mapped by all the keys almost change, which is unacceptable for a distributed cache system.
Furthermore, when the server goes online and offline after accessing the client, the data migration of the server will be migrated, and the variable of the data migration is changed according to the server data accessed by the client. In the process of data migration, the algorithm of the client needs to ensure that the cached data is distributed on each server as uniformly as possible, and then when an individual server goes offline or online, data migration occurs, and the amount of data to be migrated should be reduced as much as possible. Further, the number of servers accessed by the client is increased, the number of data migration variables is reduced, and the number of servers accessed by the client is smaller, and the number of data migration variables is increased accordingly. In this application file, its server is when going on repeatedly going on the business turn over, and the data migration of appearance can carry out data link in single server and client, and this kind is after the server goes off the line appearing, causes data security easily and can't guarantee to the key value that this kind of mode produced all can incessantly change at every turn, is unfavorable for quick acquisition data. The data transmission mode adopted in the application file can be changed according to the accessed server side, and when the number of the server access clients is more, the data migration change generated by the server access clients is smaller, so that the safety of cache data can be ensured, and the data acquisition speed can be improved.
Further, after the server receives the cache data in step S4, the server acquires the corresponding server information through the cache data. After the server receives the cache information, the server stops receiving the cache data in other servers, obtains the information uploaded to the server through the key value in the cache data, and positions the server.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. according to the system data transmission distribution method, the divisor of the surplus operation is changed when the number of the servers is changed through the cache data of the servers and the clients, the servers mapped by all keys cannot be influenced, the servers can be quickly positioned, and the data can be acquired;
2. the invention relates to a system data transmission distribution method, which greatly improves the security of data storage by a distributed cache data storage mode, and can acquire the same data from other cache data servers even if a certain server data is damaged or even lost when the server data is attacked by virus or a person;
drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
Examples
As shown in fig. 1, the method for distributing system data transmission of the present invention is characterized in that the calculation method includes the following steps: s1: the server uploads the stored data to the client, and the uploaded data is encrypted through a key value while being uploaded; s2: the client calculates the server corresponding to the key value in a distributed calculation mode, selects the server and stores the cache data of the selected server; s3: the cache data is dispersedly transmitted to other servers, and when any server transmits data to the client, the client retrieves the cache data from the non-transmission server; s4: and after the cache data at the first non-transmission client terminal is called, the server stops receiving the cache data transmitted by other non-transmission client terminals.
In general, after a hash value is calculated, a key value is mapped to different servers through an operation of remainder, but when the number of servers changes, the divisor of the operation of remainder changes, and the servers mapped by all the keys almost change, which is unacceptable for a distributed cache system.
In the application document, by adopting the scry city distributed computation, a distributed cache system relying on the scry high performance is provided, and because the server side has no distributed function, all servers cannot be communicated with one another. His distributed implementation relied on the library of the client, and based on the consistent hash algorithm, it implemented the function of distributed caching. The distributed cache can store data in an optimal and synchronous comprehensive mode under the condition of reducing the energy consumption of each node, and the cache migration caused by the change of the number of the servers can be reduced as much as possible by the consistent hash algorithm. The client algorithm is the key to the performance of the distributed cache of the client. The script is an abstraction of a consistent hash algorithm in a distributed cache scene, and has a gethash function, receives a key value of cache data, and outputs a server instance for storing the cache data.
When the server is connected to the client and is connected to the client, the data migration of the server is migrated, and the variable of the data migration is changed according to the server data accessed by the client. In the process of data migration, the algorithm of the client needs to ensure that the cached data is distributed on each server as uniformly as possible, and then when an individual server goes offline or online, data migration occurs, and the amount of data to be migrated should be reduced as much as possible. Further, the number of servers accessed by the client is increased, the number of data migration variables is reduced, and the number of servers accessed by the client is smaller, and the number of data migration variables is increased accordingly. In this application file, its server is when going on repeatedly going on the business turn over, and the data migration of appearance can carry out data link in single server and client, and this kind is after the server goes off the line appearing, causes data security easily and can't guarantee to the key value that this kind of mode produced all can incessantly change at every turn, is unfavorable for quick acquisition data. The data transmission mode adopted in the application file can be changed according to the accessed server side, and when the number of the server access clients is more, the data migration change generated by the server access clients is smaller, so that the safety of cache data can be ensured, and the data acquisition speed can be improved.
In step S4, after receiving the cache data, the server obtains the corresponding server information through the cache data. After the server receives the cache information, the server stops receiving the cache data in other servers, obtains the information uploaded to the server through the key value in the cache data, and positions the server.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (4)
1. A system data transmission distribution method is characterized in that the calculation method comprises the following steps:
s1: the server uploads the stored data to the client, and the uploaded data is encrypted through a key value while being uploaded;
s2: the client calculates the server corresponding to the key value in a distributed calculation mode, selects the server and stores the cache data of the selected server;
s3: the cache data is dispersedly transmitted to other servers, and when any server transmits data to the client, the client retrieves the cache data from the non-transmission server;
s4: and after the cache data at the first non-transmission client terminal is called, the server stops receiving the cache data transmitted by other non-transmission client terminals.
2. The system data transmission distribution method according to claim 1, wherein when the server goes online and offline after accessing the client, the data migration of the server will be migrated, and the variable of the data migration is changed according to the server data accessed by the client.
3. The system data transmission distribution method according to claim 2, wherein the number of servers accessed by the clients is increased, the number of data migration variables is decreased, and the number of servers accessed by the clients is decreased, and the number of data migration variables is increased accordingly.
4. The method as claimed in claim 1, wherein in step S4, after the server receives the cache data, the server obtains the corresponding server information through the cache data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010201192.8A CN111400739A (en) | 2020-03-20 | 2020-03-20 | System data transmission distribution method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010201192.8A CN111400739A (en) | 2020-03-20 | 2020-03-20 | System data transmission distribution method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111400739A true CN111400739A (en) | 2020-07-10 |
Family
ID=71428989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010201192.8A Pending CN111400739A (en) | 2020-03-20 | 2020-03-20 | System data transmission distribution method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111400739A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040142683A1 (en) * | 2002-11-08 | 2004-07-22 | Matt Clark | Programming interface layer of a service provider for data service delivery |
CN103905503A (en) * | 2012-12-27 | 2014-07-02 | 中国移动通信集团公司 | Data storage method, data scheduling method, device and system |
CN109903059A (en) * | 2019-02-27 | 2019-06-18 | 成都埃克森尔科技有限公司 | A kind of data notarization method based on block chain |
CN109951453A (en) * | 2019-02-26 | 2019-06-28 | 符安文 | A kind of safe encryption method based on block chain |
CN110336891A (en) * | 2019-07-24 | 2019-10-15 | 中南民族大学 | Data cached location mode, equipment, storage medium and device |
-
2020
- 2020-03-20 CN CN202010201192.8A patent/CN111400739A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040142683A1 (en) * | 2002-11-08 | 2004-07-22 | Matt Clark | Programming interface layer of a service provider for data service delivery |
CN103905503A (en) * | 2012-12-27 | 2014-07-02 | 中国移动通信集团公司 | Data storage method, data scheduling method, device and system |
CN109951453A (en) * | 2019-02-26 | 2019-06-28 | 符安文 | A kind of safe encryption method based on block chain |
CN109903059A (en) * | 2019-02-27 | 2019-06-18 | 成都埃克森尔科技有限公司 | A kind of data notarization method based on block chain |
CN110336891A (en) * | 2019-07-24 | 2019-10-15 | 中南民族大学 | Data cached location mode, equipment, storage medium and device |
Non-Patent Citations (4)
Title |
---|
INFINITE SCRIPT: "Consistent Hash Ring", 《HTTPS://INFINITESCRIPT.COM/2014/10/CONSISTENT-HASH-RING/》 * |
ZHANGKE3016: "基于一致性哈希的分布式内存键值存储——CHKV", 《HTTPS://WWW.UCLOUD.CN/YUN/69355.HTML》 * |
李雪薇: "区块链+农业:激发现代农业怎样的变革", 《决策》 * |
石杉的架构笔记: "《分布式缓存中的一致性哈希算法》", 《HTTPS://BLOG.CSDN.NET/QQ_42046105/ARTICLE/DETAILS/92802476》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3673620B1 (en) | Shared blockchain data storage | |
EP3669280B1 (en) | Shared blockchain data storage | |
US7617322B2 (en) | Secure peer-to-peer cache sharing | |
Nayak et al. | SEPDP: Secure and efficient privacy preserving provable data possession in cloud storage | |
CN110689349B (en) | Transaction hash value storage and searching method and device in blockchain | |
EP3543853A1 (en) | Providing microservice information | |
CN110011981B (en) | Trusted cloud storage method and system based on block chain | |
Ali et al. | Blockstack: A new decentralized internet | |
US11218296B2 (en) | Data de-duplication among untrusted entities | |
US11750363B2 (en) | Privacy-preserving domain name service (DNS) | |
US20140047236A1 (en) | Authenticated file handles for network file systems | |
Fu et al. | Searchable encryption scheme for multiple cloud storage using double‐layer blockchain | |
CN109783456B (en) | Duplication removing structure building method, duplication removing method, file retrieving method and duplication removing system | |
CN115134087A (en) | Client security data deduplication method for decentralized cloud storage | |
Yang et al. | Protecting personal sensitive data security in the cloud with blockchain | |
CN111400739A (en) | System data transmission distribution method | |
CN113300875A (en) | Return source data verification method, server, system and storage medium | |
CN112491544A (en) | Method and system for dynamically encrypting platform data | |
Ali et al. | Blockstack technical whitepaper | |
US20200274830A1 (en) | Integer conversion for locally stored data in priority queues | |
Song et al. | Optimal resource utilization in content distribution networks | |
Puttaswamy et al. | Securing structured overlays against identity attacks | |
Kashif et al. | BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices | |
Zhang et al. | Research on enterprise DNS security scheme based on blockchain technology | |
Zhang et al. | Decentralized authorization and authentication based on consortium blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200710 |
|
RJ01 | Rejection of invention patent application after publication |