CN111586177A - Cluster session loss prevention method and system - Google Patents

Cluster session loss prevention method and system Download PDF

Info

Publication number
CN111586177A
CN111586177A CN202010385920.5A CN202010385920A CN111586177A CN 111586177 A CN111586177 A CN 111586177A CN 202010385920 A CN202010385920 A CN 202010385920A CN 111586177 A CN111586177 A CN 111586177A
Authority
CN
China
Prior art keywords
server
information
request information
identification information
event processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010385920.5A
Other languages
Chinese (zh)
Other versions
CN111586177B (en
Inventor
苏玉平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunyi Network Technology Co ltd
Original Assignee
Hangzhou Yun In Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yun In Network Technology Co ltd filed Critical Hangzhou Yun In Network Technology Co ltd
Priority to CN202010385920.5A priority Critical patent/CN111586177B/en
Publication of CN111586177A publication Critical patent/CN111586177A/en
Application granted granted Critical
Publication of CN111586177B publication Critical patent/CN111586177B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The disclosure relates to a cluster session loss prevention method and system, wherein the method comprises the following steps: the client sends event processing request information containing identification information of a first server executing the client login request to a second server in the server cluster, and the second server searches the first server according to the identification information of the first server so that the first server processes the event processing request information. The cluster session loss can be avoided by the present disclosure.

Description

Cluster session loss prevention method and system
The application is a divisional application of an invention patent application with the application date of 2017, 6 and 28 months and the application number of 201710508165.3 and named as a cluster session loss prevention method and system.
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a cluster session loss prevention method and a cluster session loss prevention system.
Background
With the development of computer technology and the popularization of personal computers, smart phones and the like, the number of requests to be processed by a server becomes more and more huge, and recently, the capacity requirement for the server to process the requests can be only thousands of to tens of thousands of pens per second, while in some fields (such as sales systems of electric companies), the capacity requirement for the server to process the requests can be changed to millions of pens per second, tens of millions of pens per second and even higher. In this case, a supercomputer may be employed to meet the processing power requirements, however, in view of cost considerations, most users tend not to select a supercomputer, and instead employ a relatively low cost cluster of servers.
At present, when a server cluster processes a task request, a problem that a user needs to frequently log in and verify the task request may be caused due to an unstable communication network of a client. Furthermore, due to security considerations, the external network generally does not allow direct access to the servers within the cluster, and each server has only one common IP with respect to the external network, which may cause client traffic to be handled in different servers due to multiple login authentications, and in this case, the session loss problem may also occur.
In view of this, a cluster session loss prevention method and a cluster session loss prevention system are needed.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
An object of the present disclosure is to provide a cluster session loss prevention method and a cluster session loss prevention system, thereby overcoming, at least to some extent, one or more problems caused by the limitations and disadvantages of the related art.
According to an aspect of the present disclosure, there is provided a cluster session loss prevention method, including:
responding to user login operation to generate login request information, and sending the login request information to a first server in a server cluster through a load balancer;
receiving login response information generated by the first server aiming at the login request information, wherein the login response information comprises identification information of the first server;
storing the identification information;
generating event processing request information containing the identification information in response to an event processing operation; and
sending the event processing request information to a second server in the server cluster through the load balancer, so that the second server processes the event processing request information according to a preset rule;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
In an exemplary embodiment of the present disclosure, the cluster session loss prevention method further includes:
and when the second server does not find the first server, receiving error reporting information sent by the second server to remind a user to log in again, and deleting the identification information.
In an exemplary embodiment of the present disclosure, the first server is further configured to store the login request information, the session connection information, and the user right information in a cache thereof.
In an exemplary embodiment of the present disclosure, storing the login request information, the session connection information, and the user right information in a cache of the first server includes:
and storing the login request information, the Session connection information and the user permission information into a cache of the first server in a Session or memory sharing mode.
In an exemplary embodiment of the present disclosure, storing the identification information includes:
and writing the identification information into a memory and a configuration file.
In an exemplary embodiment of the present disclosure, finding the first server includes:
and searching the first server in a Map mapping mode. In addition, the method for searching the server can also comprise a binary method, a quick sorting method and other searching methods.
In an exemplary embodiment of the present disclosure, the load balancer is implemented in hardware or software.
In an exemplary embodiment of the present disclosure, the identification information includes information for uniquely identifying the server, and the identification information may be, for example, an intranet IP of each server in the server cluster. However, the present disclosure is not limited thereto, and it is easily understood that a scheme in which information that can uniquely identify a server, such as a server name and a network card hardware address, is used as identification information also belongs to the concept of the present invention.
According to an aspect of the present disclosure, there is provided a cluster session loss prevention method, including:
receiving login request information which is generated by a client in response to a user login operation and is sent by a load balancer;
generating login response information according to the login request information and sending the login response information to the client, wherein the login response information comprises identification information of a first server in a server cluster;
receiving event processing request information which is generated by a client end responding to an event processing operation, is sent by the load balancer and is forwarded by a second server in the server cluster according to a preset rule, wherein the event processing request information comprises the identification information; and
processing the event processing request information;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
In an exemplary embodiment of the present disclosure, the cluster session loss prevention method further includes:
storing, by the client, the identification information included in the login response information after the login response information is transmitted to the client.
In an exemplary embodiment of the present disclosure, the cluster session loss prevention method further includes:
and when the client is not searched by the second server, controlling the second server to send error report information to the client to remind the user to log in again, and enabling the client to delete the identification information.
In an exemplary embodiment of the present disclosure, the second server finding the first server according to the identification information includes:
and the second server searches the first server according to the identification information in a Map mapping mode. In addition, the method for searching for the server may further include a binary method, a fast sorting method, and other searching methods, which are not particularly limited in this exemplary embodiment.
In an exemplary embodiment of the present disclosure, the cluster session loss prevention method further includes: and storing login request information, Session connection information and user permission information in a Session or shared memory mode.
In an exemplary embodiment of the present disclosure, the load balancer is implemented in hardware or software.
In an exemplary embodiment of the present disclosure, the identification information includes information for uniquely identifying the server, and the identification information may be, for example, an intranet IP of each server in the server cluster. However, the present disclosure is not limited thereto, and it is easily understood that a scheme in which information that can uniquely identify a server, such as a server name and a network card hardware address, is used as identification information also belongs to the concept of the present invention.
According to an aspect of the present disclosure, there is provided a cluster session loss prevention system, including:
the client response module is used for responding to user login operation to generate login request information and sending the login request information to a first server in the server cluster through the load balancer;
a client receiving module, configured to receive login response information generated by the first server for the login request information, where the login response information includes identification information of the first server;
the client storage module is used for storing the identification information;
the transaction request generating module is used for responding to event processing operation to generate event processing request information containing the identification information; and
the client sending module is used for sending the event processing request information to a second server in the server cluster through the load balancer so that the second server can process the event processing request information according to a preset rule;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
In an exemplary embodiment of the present disclosure, the preset rule further includes: and when the second server does not find the first server, the client receives error reporting information sent by the second server to remind the user to log in again, and the identification information is deleted.
In an exemplary embodiment of the present disclosure, finding the first server includes:
and searching the first server in a Map mapping mode. In addition, the method for searching for the server may further include a binary method, a fast sorting method, and other searching methods, which are not particularly limited in this exemplary embodiment.
In an exemplary embodiment of the present disclosure, the identification information includes information for uniquely identifying the server, and the identification information may be, for example, an intranet IP of each server in the server cluster. However, the present disclosure is not limited thereto, and it is easily understood that a scheme in which information that can uniquely identify a server, such as a server name and a network card hardware address, is used as identification information also belongs to the concept of the present invention.
According to an aspect of the present disclosure, there is provided a cluster session loss prevention system, including:
the server sending module is used for receiving login request information which is generated by the client in response to the user login operation and is sent by the load balancer;
the server response generation module is used for generating login response information according to the login request information and sending the login response information to the client, wherein the login response information comprises identification information of a first server in a server cluster;
a server receiving module, configured to receive, according to a preset rule, event processing request information that is generated by a client in response to an event processing operation, sent by the load balancer, and forwarded by a second server in the server cluster, where the event processing request information includes the identification information; and
the server processing module is used for processing the event processing request information;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
In an exemplary embodiment of the present disclosure, after transmitting the login response information to the client, the client stores the identification information included in the login response information.
In an exemplary embodiment of the disclosure, when the first server is not searched by the second server, the second server sends an error message to the client to remind the user to log in again, and the client deletes the identification information.
In an exemplary embodiment of the present disclosure, the second server finding the first server according to the identification information includes:
and the second server searches the first server according to the identification information in a Map mapping mode. In addition, the method for searching for the server may further include a binary method, a fast sorting method, and other searching methods, which are not particularly limited in this exemplary embodiment.
In an exemplary embodiment of the present disclosure, the identification information includes information for uniquely identifying the server, and the identification information may be, for example, an intranet IP of each server in the server cluster. However, the present disclosure is not limited thereto, and it is easily understood that a scheme in which information that can uniquely identify a server, such as a server name and a network card hardware address, is used as identification information also belongs to the concept of the present invention.
According to an aspect of the present disclosure, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements a cluster session loss prevention method as described in any one of the above.
According to an aspect of the present disclosure, there is provided an electronic device including:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform any one of the above cluster session loss prevention methods via execution of the executable instructions.
In the technical solutions provided by some embodiments of the present disclosure, a client sends event processing request information including identification information of a first server executing a login request of the client to a second server in a server cluster, and the second server searches the first server to enable the first server to process the event processing request information, on one hand, since the server executing the login request and the server executing the event processing request are the same server, a problem of cluster session loss can be avoided; on the other hand, the whole process is only to add identification information in the request information and the response information in the process of processing the request and realize the functions of searching and forwarding by using the second server, so that the whole process has no large number of operation processes, the whole performance of the system is not reduced, and an additional hardware unit is not needed to realize the scheme; on the other hand, development and maintenance personnel do not need to consider complex cluster scheduling problems and various possible accidents, and maintenance is convenient.
In summary, the present disclosure realizes loss prevention of cluster sessions, and simultaneously, has small modification to the existing system, low implementation cost, and can save a large amount of hardware resources dedicated to session management. In addition, compared with the prior art, the system provided by the scheme has stronger concurrent processing capacity.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty. In the drawings:
fig. 1 schematically shows a flow chart of a cluster session loss prevention method according to an exemplary embodiment of the present disclosure;
fig. 2 schematically illustrates another flow chart of a cluster session loss prevention method according to an exemplary embodiment of the present disclosure;
FIG. 3 shows a schematic diagram of the overall interaction process of a cluster session loss prevention method according to an example embodiment of the present disclosure;
FIG. 4 schematically illustrates a block diagram of a cluster session loss prevention system according to an exemplary embodiment of the present disclosure;
FIG. 5 schematically illustrates another block diagram of a cluster session loss prevention system according to an exemplary embodiment of the present disclosure;
FIG. 6 shows a schematic diagram of a storage medium according to an example embodiment of the present disclosure;
fig. 7 schematically shows a block diagram of an electronic device according to an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the steps. For example, some steps may be decomposed, and some steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
To increase the processing power of the system, a cluster of servers may typically be employed. A server cluster may be understood as a super server that virtualizes a plurality of servers, thereby achieving the purpose of obtaining higher service processing capability at a low cost. When processing traffic using a server cluster, a load balancing method is generally used to distribute traffic to different servers as evenly as possible.
However, there may be a problem of cluster session loss when a cluster of servers processes traffic. Specifically, taking a mobile phone operating a client as an example, when the client is allocated to a server a in a server cluster through a load balancer to log in, session information and login request information of the client are stored in a cache of the server a, however, due to instability of WiFi or a mobile phone operator network of an environment where the mobile phone is located, or due to switching between the WiFi environment and the operator network environment, a change occurs in a client network, in this case, a subsequent service request from the client may be allocated to a server B in the server cluster by the load balancer, and the login request information and session information of the client are not stored in the cache of the server B, at this time, the server B cannot determine whether the client is logged in, and cannot determine whether a user is accessing the server B legally, and eventually causes that the client will not send a login request again, otherwise, the problem of the service request cannot be processed.
In view of this, the present disclosure provides a cluster session loss prevention method and a cluster session loss prevention system.
Fig. 1 schematically shows a flowchart of a cluster session loss prevention method according to an exemplary embodiment of the present disclosure. Referring to fig. 1, the cluster session loss prevention method may include the following steps:
s10, responding to user login operation to generate login request information, and sending the login request information to a first server in a server cluster through a load balancer;
s12, receiving login response information generated by the first server aiming at the login request information, wherein the login response information comprises identification information of the first server;
s14, storing the identification information;
s16, responding to event processing operation to generate event processing request information containing the identification information; and
s18, sending the event processing request information to a second server in the server cluster through the load balancer, so that the second server processes the event processing request information according to a preset rule;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
In the cluster session loss prevention method according to the exemplary embodiment of the present disclosure, on one hand, since the server executing the login request and the server executing the event processing request are the same server, the problem of cluster session loss can be avoided; on the other hand, the whole process is only to add identification information in the request information and the response information in the process of processing the request and realize the functions of searching and forwarding by using the second server, so that the whole process has no large number of operation processes, the whole performance of the system is not reduced, and an additional hardware unit is not needed to realize the scheme; on the other hand, development and maintenance personnel do not need to consider complex cluster scheduling problems and various possible accidents, and maintenance is convenient.
In summary, the present disclosure realizes loss prevention of cluster sessions, and simultaneously, has small modification to the existing system, low implementation cost, and can save a large amount of hardware resources dedicated to session management. In addition, compared with the prior art, the system provided by the scheme has stronger concurrent processing capacity.
The above-described steps S10 to S18 will be explained separately below.
In step S10, login request information is generated in response to a user login operation and sent to a first server in the server cluster via the load balancer.
In an exemplary embodiment of the present disclosure, first, a user may perform a login operation on a client, where the login operation may be, but is not limited to, an operation of inputting an account and a password by the user, and the login operation may also be a user touching a fingerprint collection area of a terminal (e.g., a mobile phone) to send fingerprint identification information to the client, which is not particularly limited in this exemplary embodiment.
Next, the client may generate login request information according to the login operation. The login request information may include a request message customized by a client program developer, and in addition, in the case that the client is a browser (e.g., IE), the login request information may include an http request generated by the browser.
The client can then send login request information to the load balancer. The load balancer can send the login request information to idle servers in the server cluster, so that the problem that the processing capacity of a system is low due to more sessions of a certain server is solved. In addition, the load balancer can be implemented in software, however, the load balancer formed in software is expensive and has poor performance, and therefore, the load balancer disclosed in the present disclosure can be implemented in hardware generally.
The load balancer may then forward the login request information to a first server in the cluster of servers. It should be understood that the first server is known to have the least processing pressure of the session than the other servers in the server cluster by means of the load balancer, and the term "first" is used only to distinguish the server from the other servers in the server cluster and does not represent a specific limitation for a certain server in the server cluster. In addition, the hardware configuration and the total service processing capability of each server in the server cluster may be the same or different, and this is not particularly limited in this exemplary embodiment.
In step S12, login response information generated by the first server for the login request information is received, where the login response information includes identification information of the first server.
After the first server receives the login request information, the first server may generate login response information according to the login request information. The login response information may include personal profile information, historical session information, and the like of the user, and for example, the login response information may include an account name, a balance, purchased commodity information, commodity information intended to be purchased, a transaction record, and the like of the user, in the case of a sales system of an e-commerce.
In addition, the first server may store commonly used information such as login request information, session connection information, and permission information of the user in a cache of the first server. Specifically, the first server may store login request information, Session connection information, permission information, and the like of the user in a Session or shared memory manner in a cache of the first server.
Further, it should be noted that, in an exemplary embodiment of the present disclosure, the login response information may contain identification information of the first server.
According to some embodiments of the present disclosure, each server in the server cluster may be identified in advance, for example, the server cluster may be identified in a number manner, and in addition, a developer may also customize an identification manner, which is not particularly limited in this exemplary embodiment. It should be understood that the identification information of the server and the IP address of the server form a Map mapping relationship, that is, the identification information of the server can be regarded as a key, and the actual IP address of the server can be regarded as a value corresponding to the key, which facilitates to directly find the server corresponding to the identification information through the identification information.
In addition, although the present disclosure searches for a server in a Map manner, the method for searching for a server may also include a binary method, a quick sorting method, and other searching methods, which are not particularly limited in this exemplary embodiment.
According to some other embodiments, the identification information may also be an intranet IP of each server in the server cluster. However, the present disclosure is not limited thereto, and it is easily understood that a scheme in which information that can uniquely identify a server, such as a server name and a network card hardware address, is used as identification information also belongs to the concept of the present invention.
Furthermore, it is understood that each server in the server cluster corresponds to different identification information one-to-one, that is, each server in the server cluster corresponds to only one identification information.
Next, the first server may send the login response information to the client.
In step S14, the identification information is stored.
After receiving the login response information sent by the first server, the client may analyze the login response information and may display personal data, historical session information, and the like of the user according to an analysis result. Furthermore, the client may extract, from the login response information, identification information of a server in the server cluster that processes the login request, that is, identification information of the first server, and may write the identification information into the client locally, for example, the identification information may be written into a memory or a configuration file (e.g., Cookie) of the client, but is not limited thereto, and all schemes of writing the identification information into the client locally should be understood as belonging to the idea of the present invention. Thus, the client completes the storage operation of the identification information.
In step S16, event processing request information including the identification information is generated in response to the event processing operation.
After the client receives the login response information, the user can execute an event processing operation on the client, and when the client responds to the event processing operation, on one hand, the client can generate event processing request information corresponding to the request. For example, still taking the e-commerce sales system as an example, after the client receives the login response information, the display of the terminal may display the personal data, the historical session information, the goods sales page, etc. of the user, and when the user needs to purchase a certain goods to perform a corresponding operation (for example, click a purchase button), the client may generate a goods purchase request message according to the operation.
On the other hand, the client may read the identification information stored in step S14. Next, the client may write the identification information into the event processing request information. At this time, the event processing request information includes identification information of the first server.
In step S18, the event processing request information is sent to a second server in the server cluster via the load balancer, so that the second server processes the event processing request information according to a preset rule.
In an exemplary embodiment of the present disclosure, the preset rule may include: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
First, the client may send the event processing request information to the load balancer, and the load balancer may send the event processing request information to a second server with the smallest session processing pressure according to the session processing pressure of each server in the server cluster, where, similar to the term "first", the term "second" is used only to distinguish the server from other servers in the server cluster, and does not represent a special limitation on a certain server in the server cluster.
Subsequently, the second server may analyze the received event processing request information to obtain identification information of the first server.
Next, the second server may determine whether its own identification information is the same as the acquired identification information of the first server, and when it is determined that the two are the same, the second server is the first server and directly processes the event processing request information.
According to some embodiments of the present disclosure, when the second server determines that the identification information of the second server is different from the acquired identification information of the first server, the second server may search the first server according to the received identification information, and specifically, the second server may search the first server in a Map mapping manner. And when the first server is found, the received event processing request information is forwarded to the first server, and the first server processes the event processing request information.
In addition, when the second server does not find the server corresponding to the received identification information in the server cluster, that is, when the second server does not find the first server, the second server may send an error report message to the client to remind the user to perform a re-login operation. In addition, it is easily understood that after receiving the error information, the client deletes the stored identification information. In practice, the reason why the second server does not find the first server may be that the first server is down. Thereafter, the step may jump to step S10 again.
Fig. 2 schematically shows another flowchart of a cluster session loss prevention method according to an exemplary embodiment of the present disclosure, and referring to fig. 2, the cluster session loss prevention method may include:
s20, receiving login request information which is generated by a client in response to a user login operation and is sent by a load balancer;
s22, generating login response information according to the login request information and sending the login response information to the client, wherein the login response information comprises identification information of a first server in a server cluster;
s24, receiving event processing request information which is generated by a client end responding to an event processing operation, is sent by the load balancer and is forwarded by a second server in the server cluster according to a preset rule, wherein the event processing request information comprises the identification information; and
s26, processing the event processing request information;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
Specifically, in step S20, a first server in the server cluster may receive login request information generated by the client in response to the user login operation and sent via the load balancer.
In step S22, the first server may generate login response information from the received login request information, and transmit the login response information to the client, where the login response information includes identification information of the first server. In addition, the first server has the cache in which the login request information, the Session connection information, the user permission information, and the like are stored, and specifically, the login request information, the Session connection information, and the user permission information may be stored in the cache of the first server in a Session or shared memory manner.
In step S24, first, the client may generate event processing request information in response to an event processing operation of the user, where the event processing request information includes identification information of the first server. The client may then send the event processing request information to a second server in the server cluster through the load balancer.
Subsequently, the second server may determine whether its own identification information is the same as the acquired identification information of the first server, and when it is determined that the identification information of the second server is the same as the acquired identification information of the first server, the second server is the first server and directly processes the event processing request information.
According to some embodiments of the present disclosure, when the second server determines that the identification information of the second server is different from the acquired identification information of the first server, the second server may search the first server according to the received identification information, and specifically, the second server may search the first server in a Map mapping manner. And when the first server is found, forwarding the received event processing request information to the first server.
In step S26, the first server may process the event processing request information.
According to other embodiments, when the second server does not find the first server, the second server may send an error message to the client to remind the user to perform a re-login operation.
According to an exemplary embodiment of the present disclosure, after the first server sends the login response information to the client, the client may store the identification information included in the login response information, and specifically, the identification information may be written in a memory or a configuration file of a terminal to which the client is attached.
According to an exemplary embodiment of the present disclosure, the second server may find the first server by means of Map mapping. In addition, the method for searching for the server may further include a binary method, a fast sorting method, and other searching methods, which are not particularly limited in this exemplary embodiment.
According to an exemplary embodiment of the present disclosure, the load balancer may be implemented in hardware or software.
According to an exemplary embodiment of the present disclosure, the identification information may include information that uniquely identifies the server, and the identification information may be, for example, an intranet IP of each server in the server cluster. However, the present disclosure is not limited thereto, and it is easily understood that a scheme in which information that can uniquely identify a server, such as a server name and a network card hardware address, is used as identification information also belongs to the concept of the present invention.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
The whole interactive process of the cluster session loss prevention method of the exemplary embodiment of the present disclosure will be explained with reference to fig. 3.
Firstly, a client can respond to the login operation of a user to generate login request information and send the login request information to a load balancer in a server cluster; subsequently, after analyzing the session processing pressure of each server in the current server cluster, the load balancer may send the login request information to the first server with the minimum session processing pressure; then, the first server may generate login response information in response to the received login request information and send the login response information to the client, and at the same time, the first server may store the login request information, the session connection information, and the permission information of the user in a cache of the first server, and the login response information includes identification information of the first server.
Next, after receiving the login response message, the client may store the identification information of the first server in a memory or a configuration file of the terminal corresponding to the client. When the client responds to the event processing operation of the user, the client can extract the stored identification information and generate event processing request information containing the identification information; subsequently, the client can send the event processing request information to a second server through a load balancer; then, the second server searches the first server according to the identification information in the event processing request information, and when the first server is found, the event processing request information is sent to the first server; subsequently, the first server processes the event processing request message.
According to some embodiments of the present disclosure, when the second server does not find the first server, the second server may send an error message to the client to remind the user to perform the login operation again.
In addition, the cluster session loss prevention method of the exemplary embodiment of the present disclosure may further include: and after the first server processes the event processing request information, the first server returns a processing result to the client. This is not described further in this disclosure.
Further, the present example embodiment also provides a cluster session loss prevention system.
Fig. 4 schematically illustrates a block diagram of a cluster session loss prevention system according to an exemplary embodiment of the present disclosure. Referring to fig. 4, the cluster session loss prevention system 1 according to an exemplary embodiment of the present disclosure may include a client response module 10, a client receiving module 12, a client storage module 14, a transaction request generating module 16, and a client transmitting module 18, wherein:
the client response module 10 may be configured to generate login request information in response to a user login operation, and send the login request information to a first server in a server cluster via a load balancer;
a client receiving module 12, configured to receive login response information generated by the first server for the login request information, where the login response information includes identification information of the first server;
a client storage module 14, which may be used to store the identification information;
a transaction request generating module 16 operable to generate event processing request information including the identification information in response to an event processing operation; and
the client sending module 18 may be configured to send the event processing request information to a second server in the server cluster through the load balancer, so that the second server processes the event processing request information according to a preset rule;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
According to an exemplary embodiment of the present disclosure, the preset rule further includes: and when the second server does not find the first server, the client receives error reporting information sent by the second server to remind the user to log in again, and the identification information is deleted.
According to an exemplary embodiment of the present disclosure, finding the first server comprises:
and searching the first server in a Map mapping mode. In addition, the method for searching for the server may further include a binary method, a fast sorting method, and other searching methods, which are not particularly limited in this exemplary embodiment.
According to an exemplary embodiment of the present disclosure, the identification information includes information for uniquely identifying the server, and the identification information may be, for example, an intranet IP of each server in the server cluster. However, the present disclosure is not limited thereto, and it is easily understood that a scheme in which information that can uniquely identify a server, such as a server name and a network card hardware address, is used as identification information also belongs to the concept of the present invention.
Fig. 5 schematically illustrates another block diagram of a cluster session loss prevention system of an exemplary embodiment of the present disclosure. Referring to fig. 5, the cluster session loss prevention system 2 according to an exemplary embodiment of the present disclosure may include a server transmission module 20, a server reply generation module 22, a server reception module 24, and a server reception module 26, wherein:
a server sending module 20, which may be used to receive login request information generated by the client in response to the user login operation and sent via the load balancer;
the server response generating module 22 may be configured to generate login response information according to the login request information and send the login response information to the client, where the login response information includes identification information of a first server in a server cluster;
the server receiving module 24 may be configured to receive, according to a preset rule, event processing request information that is generated by a client in response to an event processing operation, sent by the load balancer, and forwarded by a second server in the server cluster, where the event processing request information includes the identification information; and
a server processing module 26 operable to process the event processing request information;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
According to an exemplary embodiment of the present disclosure, after transmitting the login response information to the client, the client stores the identification information included in the login response information.
According to the exemplary embodiment of the disclosure, when the first server is not searched by the second server, the second server sends error information to the client to remind the user to log in again, and the client deletes the identification information.
According to an exemplary embodiment of the present disclosure, the second server finding the first server according to the identification information includes:
and the second server searches the first server according to the identification information in a Map mapping mode. In addition, the method for searching for the server may further include a binary method, a fast sorting method, and other searching methods, which are not particularly limited in this exemplary embodiment.
According to an exemplary embodiment of the present disclosure, the identification information includes information for uniquely identifying the server, and the identification information may be, for example, an intranet IP of each server in the server cluster. However, the present disclosure is not limited thereto, and it is easily understood that a scheme in which information that can uniquely identify a server, such as a server name and a network card hardware address, is used as identification information also belongs to the concept of the present invention.
Since each functional module of the program operation performance analysis apparatus according to the embodiment of the present invention is the same as that in the embodiment of the present invention, it is not described herein again.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above section "exemplary methods" of the present description, when said program product is run on the terminal device.
Referring to fig. 6, a program product 700 for implementing the above method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 800 according to this embodiment of the invention is described below with reference to fig. 7. The electronic device 800 shown in fig. 7 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present invention.
As shown in fig. 7, the electronic device 800 is in the form of a general purpose computing device. The components of the electronic device 800 may include, but are not limited to: the at least one processing unit 810, the at least one memory unit 820, a bus 830 connecting different system components (including the memory unit 820 and the processing unit 810), and a display unit 840.
Wherein the storage unit stores program code that is executable by the processing unit 810 to cause the processing unit 810 to perform steps according to various exemplary embodiments of the present invention as described in the above section "exemplary methods" of the present specification. For example, the processing unit 810 may perform steps S10 to S18 as shown in fig. 1, or the processing unit 810 may perform steps S20 to S26 as shown in fig. 2.
The storage unit 820 may include readable media in the form of volatile memory units such as a random access memory unit (RAM)8201 and/or a cache memory unit 8202, and may further include a read only memory unit (ROM) 8203.
The storage unit 820 may also include a program/utility 8204 having a set (at least one) of program modules 8205, such program modules 8205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 830 may be any of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 800 may also communicate with one or more external devices 900 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 800, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 800 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 850. Also, the electronic device 800 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 860. As shown, the network adapter 860 communicates with the other modules of the electronic device 800 via the bus 830. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the electronic device 800, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Furthermore, the above-described figures are merely schematic illustrations of processes involved in methods according to exemplary embodiments of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is to be limited only by the terms of the appended claims.

Claims (13)

1. A cluster session loss prevention method is characterized by comprising the following steps:
responding to user login operation to generate login request information, and sending the login request information to a first server in a server cluster through a load balancer, wherein the first server is used for storing the login request information, session connection information and user permission information into a cache of the first server in a memory sharing mode;
receiving login response information generated by the first server aiming at the login request information, wherein the login response information comprises identification information of the first server;
storing the identification information;
generating event processing request information containing the identification information in response to an event processing operation; and
sending the event processing request information to a second server in the server cluster through the load balancer, so that the second server processes the event processing request information according to a preset rule;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
2. The method of claim 1, wherein the method further comprises:
and when the second server does not find the first server, receiving error reporting information sent by the second server to remind a user to log in again, and deleting the identification information.
3. The method of claim 1, wherein searching for the first server comprises:
and searching the first server in a Map mapping mode.
4. The method of claim 1, wherein the identification information comprises information identifying uniqueness of the server.
5. A cluster session loss prevention method is characterized by comprising the following steps:
a first server in a server cluster receives login request information which is generated by a client in response to user login operation and is sent by a load balancer, and the first server is used for storing the login request information, session connection information and user permission information into a cache of the first server in a memory sharing mode;
the first server generates login response information according to the login request information and sends the login response information to the client, wherein the login response information comprises identification information of the first server;
the first server receives event processing request information which is generated by a client end responding to an event processing operation, is sent by the load balancer and is forwarded by a second server in the server cluster according to a preset rule, wherein the event processing request information comprises the identification information; and
the first server processes the event processing request information;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
6. The method of claim 5, wherein the method further comprises:
storing, by the client, the identification information included in the login response information after the login response information is transmitted to the client.
7. The method of claim 6, wherein the method further comprises:
and when the client is not searched by the second server, controlling the second server to send error report information to the client to remind the user to log in again, and enabling the client to delete the identification information.
8. The method of claim 5, wherein the second server searching the first server according to the identification information comprises:
and the second server searches the first server according to the identification information in a Map mapping mode.
9. The method according to any of claims 5 to 8, wherein the identification information comprises information identifying uniqueness of the server.
10. A cluster session loss prevention system, comprising:
the client response module is used for responding to user login operation to generate login request information and sending the login request information to a first server in the server cluster through a load balancer, and the first server is used for storing the login request information, session connection information and user permission information into a cache of the first server in a memory sharing mode;
a client receiving module, configured to receive login response information generated by the first server for the login request information, where the login response information includes identification information of the first server;
the client storage module is used for storing the identification information;
the transaction request generating module is used for responding to event processing operation to generate event processing request information containing the identification information; and
the client sending module is used for sending the event processing request information to a second server in the server cluster through the load balancer so that the second server can process the event processing request information according to a preset rule;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
11. A cluster session loss prevention system, comprising:
the server sending module is used for receiving login request information which is generated by a client in response to user login operation and is sent by a load balancer, and storing the login request information, session connection information and user permission information into a cache in a memory sharing mode;
the server response generation module is used for generating login response information according to the login request information and sending the login response information to the client, wherein the login response information comprises identification information of a first server in a server cluster;
a server receiving module, configured to receive, according to a preset rule, event processing request information that is generated by a client in response to an event processing operation, sent by the load balancer, and forwarded by a second server in the server cluster, where the event processing request information includes the identification information; and
the server processing module is used for processing the event processing request information;
wherein the preset rule comprises: the second server judges whether the identification information is the same as the identification information of the second server or not, processes the event processing request information by the second server when the judgment result is the same, searches the first server according to the identification information when the judgment result is different, sends the event processing request information to the first server when the first server is found, and processes the event processing request information by the first server.
12. A storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the cluster session loss prevention method of any of claims 1 to 9.
13. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the cluster session loss prevention method of any of claims 1 to 9 via execution of the executable instructions.
CN202010385920.5A 2017-06-28 2017-06-28 Cluster session loss prevention method and system Active CN111586177B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010385920.5A CN111586177B (en) 2017-06-28 2017-06-28 Cluster session loss prevention method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010385920.5A CN111586177B (en) 2017-06-28 2017-06-28 Cluster session loss prevention method and system
CN201710508165.3A CN107295086B (en) 2017-06-28 2017-06-28 Cluster session loss prevention method and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201710508165.3A Division CN107295086B (en) 2017-06-28 2017-06-28 Cluster session loss prevention method and system

Publications (2)

Publication Number Publication Date
CN111586177A true CN111586177A (en) 2020-08-25
CN111586177B CN111586177B (en) 2022-11-08

Family

ID=60098623

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010385920.5A Active CN111586177B (en) 2017-06-28 2017-06-28 Cluster session loss prevention method and system
CN201710508165.3A Active CN107295086B (en) 2017-06-28 2017-06-28 Cluster session loss prevention method and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201710508165.3A Active CN107295086B (en) 2017-06-28 2017-06-28 Cluster session loss prevention method and system

Country Status (1)

Country Link
CN (2) CN111586177B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205301A (en) * 2020-08-28 2022-03-18 华为技术有限公司 MPTCP load balancing method, medium and equipment

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729139A (en) * 2018-06-15 2019-05-07 平安普惠企业管理有限公司 Access request retransmission method, device, equipment and readable storage medium storing program for executing
CN109660615A (en) * 2018-12-13 2019-04-19 网易(杭州)网络有限公司 Data processing method, device, medium and electronic equipment
CN113765924A (en) * 2021-09-08 2021-12-07 未鲲(上海)科技服务有限公司 Safety monitoring method, terminal and equipment based on cross-server access of user

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296238A (en) * 2008-06-17 2008-10-29 杭州华三通信技术有限公司 Method and equipment for remaining persistency of security socket layer conversation
CN103457869A (en) * 2013-08-28 2013-12-18 北京星网锐捷网络技术有限公司 Conversation maintaining method and device
CN103607356A (en) * 2013-11-14 2014-02-26 北京奇虎科技有限公司 Load balancing method, load balancer and system thereof
US20150100639A1 (en) * 2013-10-07 2015-04-09 Orange Method of implementing a communications session between a plurality of terminals
CN104735098A (en) * 2013-12-18 2015-06-24 青岛海尔空调器有限总公司 Session information control method and system
US20160212051A1 (en) * 2011-02-16 2016-07-21 Fortinet, Inc. Load balancing among a cluster of firewall security devices
US20160234175A1 (en) * 2015-02-05 2016-08-11 Alibaba Group Holding Limited Protecting sensitive data security
CN106101290A (en) * 2016-08-25 2016-11-09 Tcl集团股份有限公司 A kind of method and system of server cluster management
CN106357778A (en) * 2016-09-27 2017-01-25 山东浪潮商用系统有限公司 Session information sharing method, device and system
CN106713499A (en) * 2017-01-23 2017-05-24 天地融科技股份有限公司 Load balancing method, equipment and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581273B (en) * 2012-08-08 2017-06-06 阿里巴巴集团控股有限公司 A kind of distributed system performs method, the apparatus and system of business
CN103685390B (en) * 2012-09-13 2016-10-05 深圳市云帆世纪科技有限公司 Load-balancing method based on ID, Apparatus and system
CN105704152B (en) * 2016-03-30 2018-10-23 网易(杭州)网络有限公司 The login method and device of game server
CN106657132A (en) * 2017-01-09 2017-05-10 北京小米移动软件有限公司 Method and device for accessing website

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296238A (en) * 2008-06-17 2008-10-29 杭州华三通信技术有限公司 Method and equipment for remaining persistency of security socket layer conversation
US20160212051A1 (en) * 2011-02-16 2016-07-21 Fortinet, Inc. Load balancing among a cluster of firewall security devices
CN103457869A (en) * 2013-08-28 2013-12-18 北京星网锐捷网络技术有限公司 Conversation maintaining method and device
US20150100639A1 (en) * 2013-10-07 2015-04-09 Orange Method of implementing a communications session between a plurality of terminals
CN103607356A (en) * 2013-11-14 2014-02-26 北京奇虎科技有限公司 Load balancing method, load balancer and system thereof
CN104735098A (en) * 2013-12-18 2015-06-24 青岛海尔空调器有限总公司 Session information control method and system
US20160234175A1 (en) * 2015-02-05 2016-08-11 Alibaba Group Holding Limited Protecting sensitive data security
CN106101290A (en) * 2016-08-25 2016-11-09 Tcl集团股份有限公司 A kind of method and system of server cluster management
CN106357778A (en) * 2016-09-27 2017-01-25 山东浪潮商用系统有限公司 Session information sharing method, device and system
CN106713499A (en) * 2017-01-23 2017-05-24 天地融科技股份有限公司 Load balancing method, equipment and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
AFSANEH FATHI ET.AL.: "Enhance topology control protocol(ECEC) to conserve energy based clustering in wireless ad hoc networks", 《2010 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY》 *
赵艳芳 等: "Web服务器负载均衡会话保持的研究", 《云南民族大学学报(自然科学版)》 *
陈飞: "基于Cookie会话保持的LVS集群系统研究", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205301A (en) * 2020-08-28 2022-03-18 华为技术有限公司 MPTCP load balancing method, medium and equipment

Also Published As

Publication number Publication date
CN111586177B (en) 2022-11-08
CN107295086B (en) 2020-06-09
CN107295086A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
US10560465B2 (en) Real time anomaly detection for data streams
CN107295086B (en) Cluster session loss prevention method and system
US11113126B2 (en) Verifying transfer of detected sensitive data
US20180315024A1 (en) Systems and Methods Enabling Secure Transactions from Terminal Window
CN109118160B (en) Information sharing method, device, terminal equipment and medium
US10257316B2 (en) Monitoring of node.js applications
CN109522751B (en) Access right control method and device, electronic equipment and computer readable medium
KR20130093806A (en) System for notifying access of individual information and method thereof
CN109767200B (en) Electronic payment method, device, system and storage medium
CN110688096B (en) Method and device for constructing application program containing plug-in, medium and electronic equipment
CN111881329A (en) Account balance management method and system
US9473572B2 (en) Selecting a target server for a workload with a lowest adjusted cost based on component values
US10693939B2 (en) Providing modified protocol responses
US10885565B1 (en) Network-based data discovery and consumption coordination service
CN109803017B (en) File intercommunication method and device, computing equipment and computer readable storage medium
US10747748B2 (en) Generating mobile data schema to support disconnected operations
US20180246860A1 (en) Dynamic cognitive optimization of web applications
CN111681093B (en) Method and device for displaying resource page and electronic equipment
CN113992759A (en) Joint analysis device and method applied to local area network and electronic equipment
CN113722007A (en) Configuration method, device and system of VPN branch equipment
CN111562958A (en) Page data display management method and device
US20150222505A1 (en) Business transaction resource usage tracking
CN111400623A (en) Method and apparatus for searching information
US9626389B1 (en) Data compression model for mobile device disconnected operations
CN113612756B (en) Shared login method and device, computer readable storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20200820

Address after: 6 / F, building 2, No. 3588, Jiangnan Avenue, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Hangzhou Yunyi Network Technology Co.,Ltd.

Address before: 310053 Hang Seng mansion, No. 3588, main road, the south of the River, Binjiang District, Hangzhou, Zhejiang province city

Applicant before: HANGZHOU YUN-IN NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant