CN111698270B - Method and device for distributed lateral expansion negotiation service scale - Google Patents

Method and device for distributed lateral expansion negotiation service scale Download PDF

Info

Publication number
CN111698270B
CN111698270B CN201910184607.2A CN201910184607A CN111698270B CN 111698270 B CN111698270 B CN 111698270B CN 201910184607 A CN201910184607 A CN 201910184607A CN 111698270 B CN111698270 B CN 111698270B
Authority
CN
China
Prior art keywords
negotiation
server
hash
monitoring equipment
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910184607.2A
Other languages
Chinese (zh)
Other versions
CN111698270A (en
Inventor
刘宇飞
裴康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Uniview Technologies Co Ltd
Original Assignee
Zhejiang Uniview Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Uniview Technologies Co Ltd filed Critical Zhejiang Uniview Technologies Co Ltd
Priority to CN201910184607.2A priority Critical patent/CN111698270B/en
Publication of CN111698270A publication Critical patent/CN111698270A/en
Application granted granted Critical
Publication of CN111698270B publication Critical patent/CN111698270B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1029Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method and a device for distributing type lateral extension negotiation service scale, which are used for configuring a negotiation server to a preset network diagram according to a first hash value obtained by carrying out hash operation on a unique identifier of the negotiation server; then carrying out hash operation according to the unique identifier of the monitoring equipment which needs to be negotiated to obtain a second hash value; and finally, searching the nearest negotiation server in a preset network diagram according to a preset direction according to the second hash value, and carrying out service negotiation on the negotiation server. The invention uses the hash technology to avoid the problem that the negotiation information is difficult to find because of the state in the negotiation process, and can be positioned to the same negotiation server. The system has good performance, does not need to maintain additional data, can not impact the whole system when the server fails, and can uniformly share the service pressure at the same time, thereby improving the system performance and stability.

Description

Method and device for distributed lateral expansion negotiation service scale
Technical Field
The invention belongs to the technical field of video monitoring service negotiation, and particularly relates to a method and a device for distributed transverse extension negotiation service scale.
Background
Video monitoring is an important component of a security system, and is widely applied to a plurality of occasions with intuitiveness, accuracy, timeliness and abundant information content. In recent years, with the rapid development of computer, network, image processing and transmission technologies, the popularization trend of video monitoring is more and more obvious.
In video monitoring, the realization of the service needs to be realized through negotiation of a negotiation server. However, the negotiation process of the existing service is completed at a single node, for example, implemented on a single video negotiation server or Network Video Recorder (NVR). As shown in fig. 1, a client device (such as an XP client, a DC decoder, etc.) of the video monitoring system performs service negotiation with a front-end device (such as a network camera IPC, a decoder, etc.) through a negotiation SERVER (SERVER), and after the negotiation, the front-end device sends a stream to the client device to implement a live service.
In the negotiation process, the negotiation server stores a large amount of state information, each step in the negotiation process must be carried over with the previous step, and the state information obtained in the previous negotiation step must be obtained. In a less traffic monitoring environment, the computing power of a single node may be under negotiation pressure. However, with the continuous increase of the scale of the monitoring system, the service scale is continuously increased, a single node cannot bear heavy negotiation tasks, and negotiation blocking often occurs in an actual monitoring environment.
However, if the negotiation server is simply expanded to the cluster mode, the negotiation server in the previous step is not easily found during the negotiation, which may result in a negotiation failure. Because the negotiation process saves a large amount of state information, the corresponding server is difficult to find in multiple negotiation steps, and similar streams of the same front-end equipment have multiplexing and other conditions, and mutual negotiations have association relations, the distributed negotiation service cannot be realized. If the state information of the negotiation process is stripped from the negotiation server and stored in the globally visible device, the storage resources occupied by the recorded state information are huge under the condition of huge traffic, and meanwhile, the state information is frequently queried, judged and modified in each step of negotiation process, so that the performance and the storage space are very consumed.
Disclosure of Invention
The invention aims to provide a distributed transverse extension negotiation service scale method and device, which avoid the situation that a single node cannot bear heavy negotiation tasks and negotiation jam is easy to occur in an actual monitoring environment.
In order to achieve the above purpose, the technical scheme of the invention is as follows:
a method of distributed lateral extension negotiation service scale, comprising:
according to a first hash value obtained by carrying out hash operation on the unique identifier of the negotiation server, configuring the negotiation server to a preset network diagram;
performing hash operation according to the unique identifier of the monitoring equipment needing negotiation to obtain a second hash value;
searching the nearest negotiation server in a preset network diagram according to a preset direction according to the second hash value, and carrying out service negotiation on the negotiation server.
Further, the method for negotiating the service scale by using the distributed lateral expansion further comprises the following steps:
before the monitoring equipment needing negotiation starts to negotiate, acquiring capability information of each negotiation server, and shielding the negotiation servers with insufficient capability from a preset network diagram.
Further, the method for negotiating the service scale by using the distributed lateral expansion further comprises the following steps:
before the monitoring equipment needing to carry out negotiation starts to carry out negotiation, if the negotiation server already carries out negotiation before processing the monitoring equipment needing to carry out negotiation, the negotiation is refused or the negotiation is carried out after the negotiation before waiting is completed.
Optionally, the second hash value obtained by performing hash operation on the unique identifier of the monitoring device that performs negotiation according to the need includes:
splicing unique identifiers of monitoring equipment needing negotiation;
and carrying out hash operation on the spliced unique identification to obtain a second hash value.
Further, after the second hash value obtained by performing the hash operation on the unique identifier of the monitoring device that performs negotiation according to the need, the method further includes:
and configuring the monitoring equipment needing to be negotiated on a preset network diagram according to the second hash value obtained by the hash operation.
The invention also provides a device for the distributed lateral expansion negotiation service scale, which comprises:
the negotiation server hash module is used for configuring the negotiation server to a preset network diagram according to a first hash value obtained by carrying out hash operation on the unique identifier of the negotiation server;
the monitoring equipment hash module is used for carrying out hash operation on the unique identifier of the monitoring equipment which needs to be negotiated to obtain a second hash value;
and the searching module is used for searching the nearest negotiation server in a preset network diagram according to a preset direction according to the second hash value, and carrying out service negotiation on the negotiation server.
Further, the apparatus for negotiating a service scale by using the distributed lateral extension further includes:
the capability processing module is used for acquiring capability information of each negotiation server before the monitoring equipment needing to carry out negotiation starts negotiation, and shielding the negotiation servers with insufficient capability from a preset network diagram.
Further, the apparatus for negotiating a service scale by using the distributed lateral extension further includes:
and the mutual exclusion processing module is used for refusing the negotiation or waiting for the completion of the previous negotiation before the monitoring equipment needing to carry out the negotiation starts the negotiation if the negotiation server has carried out the negotiation before the monitoring equipment needing to carry out the negotiation.
Optionally, when the monitoring device hash module performs the hash operation according to the unique identifier of the monitoring device to be negotiated to obtain the second hash value, the following operations are performed:
splicing unique identifiers of monitoring equipment needing negotiation;
and carrying out hash operation on the spliced unique identification to obtain a second hash value.
Further, the monitoring device hash module performs the following operations after performing a hash operation on the second hash value obtained by performing the hash operation on the unique identifier of the monitoring device that is negotiated according to the need:
and configuring the monitoring equipment needing to be negotiated on a preset network diagram according to the second hash value obtained by the hash operation.
The invention provides a method and a device for distributing type transverse expansion negotiation service scale, which expands service negotiation into a distributed architecture, transversely expands service processing capacity of media negotiation service and supports simultaneous access to ultra-large scale negotiation service. The hash technology is used for avoiding the problem that negotiation information is difficult to find due to the state in the negotiation process, and the same negotiation server can be located. The system has good performance, does not need to maintain additional data, can not impact the whole system when the server fails, and can uniformly share the service pressure at the same time, thereby improving the system performance and stability.
Drawings
FIG. 1 is a schematic diagram of a video surveillance service negotiation process;
FIG. 2 is a flow chart of a method for distributed lateral extension negotiation service scale according to the present invention;
FIG. 3 is a schematic diagram of a configuration negotiation server on a preset network map according to an embodiment of the present invention;
fig. 4 is a schematic diagram of configuring a monitoring device on a preset network diagram according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In one embodiment, as shown in fig. 2, a method for distributed lateral extension negotiation service scale is provided, including:
according to a first hash value obtained by carrying out hash operation on the unique identifier of the negotiation server, configuring the negotiation server to a preset network diagram;
performing hash operation according to the unique identifier of the monitoring equipment needing negotiation to obtain a second hash value;
searching the nearest negotiation server in a preset network diagram according to a preset direction according to the second hash value, and carrying out service negotiation on the negotiation server.
When each negotiation server is deployed in the video monitoring system, a hash algorithm (such as a murmurhash 3) with uniform distribution is utilized to perform hash operation on a unique identifier of the negotiation server, so as to obtain a first hash value HashServer with a fixed length. The unique identifier of the negotiation server may be an IP address, a MAC address, a name, or the like of the negotiation server, which will be hereinafter collectively referred to as device encoding.
For example, there are now three negotiation servers, device codes 234.234.234.2, 234.234.234.3, 234.234.234.4, respectively, that generate corresponding hash values 1405286121, 4405286120, 7405286127, respectively, after hashing.
According to the embodiment, the negotiation servers are configured to a preset network diagram according to the first hash values corresponding to the negotiation servers. In this embodiment, the preset network map is a circle, and the size of the circle is determined according to the calculated hash value range. For example, for the first hash value calculated as described above, a hash value is used which can cover 0 to 2 32 As represented by the circles of fig. 3, according to the formula: hashServer%2 32 Each negotiation server is configured to be 0-2 32 Is a circle of (c).
It should be noted that the present invention is not limited to the specific shape of the preset network diagram, but may be any polygon, and the preset network diagram is mainly used for conveniently searching the negotiation server for negotiation, which is not described in detail below.
When live negotiation is started between monitoring devices, for example, the monitoring devices are a receiving end device and a transmitting end device, and because the receiving end (XP/DC) and the transmitting end (IPC/EC) are determined, XP/DC codes and IPC/EC codes can be directly spliced, and the spliced media source codes are hashed through a hash algorithm to obtain a second hash value Hashnode with a fixed length. In this embodiment, the unique identification of the negotiating monitoring device is concatenated and then a second hash value is calculated.
For example, the device code of XP is 67239000002000000001, the device code of ipc is 61428152381327099686, the two are spliced to obtain 67239000002000000001| 61428152381327099686, and the second hash value 932922453 is obtained through hash operation.
It is easy to understand that after the second hash value hashende is calculated, it can be positioned between 0 and 2 32 The position of the circle of (2) can be directly configured on the circle, or the position of the circle can be directly configured on the circle without configuration, and the nearest negotiation server can be directly searched on the circle according to a preset direction according to the second hash value HashNode.
In one embodiment, the hash is performedThe obtained second hash value HashNode is also configured between 0 and 2 32 As shown in fig. 4. In fig. 4, the unique identifier of the monitoring device that performs negotiation is spliced, and the spliced code is referred to as a spliced negotiation code. It is easy to understand that a preset constant can be added after the unique identification of the monitoring equipment which performs negotiation is spliced, the unique identification is used as the negotiation code after the splicing, and the second hash value is obtained by performing hash operation, so that the technical effect of the invention can be realized. Preferably, the invention splices the unique identification of the monitoring equipment which carries out negotiation, and uses the unique identification to carry out negotiation on the two monitoring equipment.
After the hash operation obtains the second hash value, the negotiation server can be allocated according to a preset network diagram. The latest negotiation server is searched according to a preset direction, which can be searched clockwise or counterclockwise, and the invention is not limited to a specific searching direction.
For example, as shown in fig. 4, the search is performed in a clockwise direction, for hashende: 932922453, it encounters the first HashServer of 1405286121, then the negotiation task is assigned to a negotiation server with device code (IP) of 234.234.234.2.
The negotiation step is completed on the negotiation server, the negotiation state information is reserved on the server, and after that, each step of negotiation is executed again by using the spliced codes before the execution, so that the steps in the negotiation process are ensured to be executed by the same negotiation server. By the method, the whole negotiation process can be ensured to be completed by the same negotiation server under the conditions of not storing additional data and not carrying out additional calculation, and the condition that the negotiation data cannot be found can not occur. The negotiation process can be completed on the same server, and the normal operation of the negotiation service and the multiplexing of the media stream is effectively ensured.
The service negotiation is expanded into a distributed architecture, the service processing capacity of the media negotiation service is transversely expanded, and the simultaneous access of the ultra-large-scale negotiation service is supported. And the service is uniformly shared to the negotiation server through hash operation, the service pressure is uniformly shared, and the system performance and stability are improved.
In this embodiment, the first hash value obtained by performing the hash operation according to the unique identifier of the negotiation server may generally be calculated when the negotiation server is deployed, and the specific operation may be calculated by the negotiation server or by a device capable of performing calculation that is accessible to all the negotiation servers. Such as a common server or a database common to each negotiation server, which may be a distributed database maintained in common by all negotiation servers. Distributed database caches, such as Redis clusters. Redis clusters are distributed, fault-tolerant (Redis) implementations, where the cluster can use a subset of the functions that a common stand-alone Redis can use. There is no central or proxy node in the Redis cluster, one of the main design goals of the cluster is to achieve linear scalability (linear scalability). Redis clusters provide a way to run Redis, where data is automatically partitioned among multiple Redis nodes. Redis clusters also provide a degree of availability during partitioning, i.e., in actual situations, capable of continuing to operate when certain nodes fail or fail to communicate.
Similarly, the second hash value obtained by performing hash operation according to the unique identifier of the monitoring device that needs to perform negotiation may be generally spliced and calculated by the monitoring device at the sending end, or may be calculated by a device that can be accessed by the sending end and used for calculation, for example, a public server, or the aforementioned database.
In one embodiment, a method for negotiating a service scale by distributed lateral expansion further comprises:
before the monitoring equipment needing negotiation starts to negotiate, acquiring capability information of each negotiation server, and shielding the negotiation servers with insufficient capability from a preset network diagram.
In the prior art, the negotiation server has two services of negotiation processing and capability management, and the capability management is stripped from the negotiation server in this embodiment so as to perform unified management and exclusive access. That is, the negotiation server has been masked (or removed from the configured network map) when the number of negotiation services processed reaches its negotiation processing capability threshold, so that subsequent negotiations are not configured to the negotiation server, thereby enabling capability management. Or the negotiation server cannot process the current negotiation service (such as not supporting the coding format of the current negotiation), the negotiation server is shielded (or removed from the configured network diagram), so that the subsequent negotiation will not be configured to the negotiation server, thereby realizing the capability management, and the capability management also includes: when stream multiplexing occurs, the stream can be directly sent out through the server without negotiation again.
For example, before the negotiation procedure of HashNode 932922453 starts, by checking the capabilities of a plurality of negotiation servers, if it is found that the negotiation server of IP 234.234.234.2 has no capability to process, the server is skipped (corresponding to the negotiation server being masked), and the next negotiation server is searched for to perform the negotiation process.
In one embodiment, a method for negotiating a service scale by distributed lateral expansion further comprises:
before the monitoring equipment needing to carry out negotiation starts to carry out negotiation, if the negotiation server already carries out negotiation before processing the monitoring equipment needing to carry out negotiation, the negotiation is refused or the negotiation is carried out after the negotiation before waiting is completed.
The embodiment realizes the mutual exclusion access, namely when the receiving end prepares to negotiate with the sending end, if the receiving end and the sending end have already performed negotiations on a certain negotiation server, in order to avoid the negotiation processing of the same receiving end and the sending end on the same negotiation server, before the monitoring equipment needing to perform negotiations starts negotiations, if the negotiation server has already performed negotiations before the monitoring equipment needing to perform negotiations is processed, the negotiation is refused or the negotiation is finished after the negotiation before waiting.
In addition, the hash technology is used for ensuring that downtime of the negotiation server in the system does not impact the whole system, other negotiation services are not affected, nodes are dynamically added and deleted conveniently, deployment and service development of other nodes are not affected before, and certain load sharing of the negotiation services is realized. For example, if a certain negotiation server suddenly goes down when the negotiation process is not completed, the next negotiation step will skip the server and be automatically taken over by the next negotiation server, and the take-over server has no information reserved in the previous negotiation step, so that the negotiation fails and needs to be re-established. The re-established live condition can skip the down server at the beginning, and is executed on the next server, and the negotiation process can be completed normally. And meanwhile, the business which is distributed to other negotiation servers and is being negotiated is not influenced by the down server, and the business is normally carried out. After the down negotiation server resumes operation, the negotiation service can be continuously executed without other influence.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
In one embodiment, the present application further provides an apparatus for distributed lateral extension negotiation service scale, including:
the negotiation server hash module is used for configuring the negotiation server to a preset network diagram according to a first hash value obtained by carrying out hash operation on the unique identifier of the negotiation server;
the monitoring equipment hash module is used for carrying out hash operation on the unique identifier of the monitoring equipment which needs to be negotiated to obtain a second hash value;
and the searching module is used for searching the nearest negotiation server in a preset network diagram according to a preset direction according to the second hash value, and carrying out service negotiation on the negotiation server.
Further, the apparatus for negotiating a service scale by using the distributed lateral extension further includes:
the capability processing module is used for acquiring capability information of each negotiation server before the monitoring equipment needing to carry out negotiation starts negotiation, and shielding the negotiation servers with insufficient capability from a preset network diagram.
Further, the apparatus for negotiating a service scale by using the distributed lateral extension further includes:
and the mutual exclusion processing module is used for refusing the negotiation or waiting for the completion of the previous negotiation before the monitoring equipment needing to carry out the negotiation starts the negotiation if the negotiation server has carried out the negotiation before the monitoring equipment needing to carry out the negotiation.
Optionally, when the monitoring device hash module performs the hash operation according to the unique identifier of the monitoring device to be negotiated to obtain the second hash value, the following operations are performed:
splicing unique identifiers of monitoring equipment needing negotiation;
and carrying out hash operation on the spliced unique identification to obtain a second hash value.
Further, the monitoring device hash module performs the following operations after performing a hash operation on the second hash value obtained by performing the hash operation on the unique identifier of the monitoring device that is negotiated according to the need:
and configuring the monitoring equipment needing to be negotiated on a preset network diagram according to the second hash value obtained by the hash operation.
For specific limitations on the apparatus for distributed lateral extension negotiation service size, reference may be made to the above limitation on the method for distributed lateral extension negotiation service size, which is not described herein. The modules in the distributed lateral extension negotiation service scale apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
The memory and the processor are electrically connected directly or indirectly to each other for data transmission or interaction. For example, the components may be electrically connected to each other by one or more communication buses or signal lines. The memory stores a computer program that can be executed on a processor that implements the network topology layout method in the embodiment of the present invention by executing the computer program stored in the memory.
The Memory may be, but is not limited to, random access Memory (Random Access Memory, RAM), read Only Memory (ROM), programmable Read Only Memory (Programmable Read-Only Memory, PROM), erasable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), electrically erasable Read Only Memory (Electric Erasable Programmable Read-Only Memory, EEPROM), etc. The memory is used for storing a program, and the processor executes the program after receiving an execution instruction.
The processor may be an integrated circuit chip having data processing capabilities. The processor may be a general-purpose processor including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), and the like. The methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (8)

1. A method for distributed lateral extension negotiating service scale, the method comprising:
according to a first hash value obtained by carrying out hash operation on the unique identifier of the negotiation server, configuring the negotiation server to a preset network diagram;
performing hash operation according to the unique identifier of the monitoring equipment needing negotiation to obtain a second hash value;
searching a nearest negotiation server in a preset network diagram according to a preset direction according to the second hash value, and carrying out service negotiation on the negotiation server;
the second hash value obtained by performing hash operation on the unique identifier of the monitoring device which performs negotiation according to the need comprises the following steps:
splicing unique identifiers of monitoring equipment needing to be negotiated, wherein the monitoring equipment needing to be negotiated comprises a flow receiving end device and a flow sending end device;
and carrying out hash operation on the spliced unique identification to obtain a second hash value.
2. The method of distributed lateral extension negotiation service size according to claim 1, further comprising:
before the monitoring equipment needing negotiation starts to negotiate, acquiring capability information of each negotiation server, and shielding the negotiation servers with insufficient capability from a preset network diagram.
3. The method of distributed lateral extension negotiation service size according to claim 1, further comprising:
before the monitoring equipment needing to carry out negotiation starts to carry out negotiation, if the negotiation server already carries out negotiation before processing the monitoring equipment needing to carry out negotiation, the negotiation is refused or the negotiation is carried out after the negotiation before waiting is completed.
4. The method for negotiating the service scale by distributed lateral expansion according to claim 1, wherein after the second hash value obtained by hashing the unique identifier of the monitoring device that negotiates according to need, further comprises:
and configuring the monitoring equipment needing to be negotiated on a preset network diagram according to the second hash value obtained by the hash operation.
5. An apparatus for distributed lateral extension negotiation of service size, the apparatus comprising:
the negotiation server hash module is used for configuring the negotiation server to a preset network diagram according to a first hash value obtained by carrying out hash operation on the unique identifier of the negotiation server;
the monitoring equipment hash module is used for carrying out hash operation on the unique identifier of the monitoring equipment which needs to be negotiated to obtain a second hash value;
the searching module is used for searching the nearest negotiation server in a preset network diagram according to a preset direction according to the second hash value, and carrying out service negotiation on the negotiation server;
the monitoring equipment hash module executes the following operations when performing hash operation on a second hash value obtained by performing hash operation on the unique identifier of the monitoring equipment which needs to be negotiated:
splicing unique identifiers of monitoring equipment needing to be negotiated, wherein the monitoring equipment needing to be negotiated comprises a flow receiving end device and a flow sending end device;
and carrying out hash operation on the spliced unique identification to obtain a second hash value.
6. The apparatus for distributed laterally extending negotiation service size according to claim 5, further comprising:
the capability processing module is used for acquiring capability information of each negotiation server before the monitoring equipment needing to carry out negotiation starts negotiation, and shielding the negotiation servers with insufficient capability from a preset network diagram.
7. The apparatus for distributed laterally extending negotiation service size according to claim 5, further comprising:
and the mutual exclusion processing module is used for refusing the negotiation or waiting for the completion of the previous negotiation before the monitoring equipment needing to carry out the negotiation starts the negotiation if the negotiation server has carried out the negotiation before the monitoring equipment needing to carry out the negotiation.
8. The apparatus for distributed laterally extending negotiation service size according to claim 5, wherein the monitoring device hash module further performs the following operation after performing a hash operation on the second hash value obtained by performing a hash operation on the unique identifier of the monitoring device that is negotiated according to need:
and configuring the monitoring equipment needing to be negotiated on a preset network diagram according to the second hash value obtained by the hash operation.
CN201910184607.2A 2019-03-12 2019-03-12 Method and device for distributed lateral expansion negotiation service scale Active CN111698270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910184607.2A CN111698270B (en) 2019-03-12 2019-03-12 Method and device for distributed lateral expansion negotiation service scale

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910184607.2A CN111698270B (en) 2019-03-12 2019-03-12 Method and device for distributed lateral expansion negotiation service scale

Publications (2)

Publication Number Publication Date
CN111698270A CN111698270A (en) 2020-09-22
CN111698270B true CN111698270B (en) 2023-06-20

Family

ID=72474843

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910184607.2A Active CN111698270B (en) 2019-03-12 2019-03-12 Method and device for distributed lateral expansion negotiation service scale

Country Status (1)

Country Link
CN (1) CN111698270B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7366755B1 (en) * 2000-07-28 2008-04-29 International Business Machines Corporation Method and apparatus for affinity of users to application servers
CN101453452A (en) * 2007-12-07 2009-06-10 国际商业机器公司 SIP message processing method and apparatus based on multiple cores
CN106326012A (en) * 2016-08-25 2017-01-11 中国农业银行股份有限公司 Web application cluster buffer utilization method and system
CN107197035A (en) * 2017-06-21 2017-09-22 中国民航大学 A kind of compatibility dynamic load balancing method based on uniformity hash algorithm
CN109040232A (en) * 2018-08-01 2018-12-18 广州视源电子科技股份有限公司 Load balancing method, device and equipment for video conference and storage medium thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7366755B1 (en) * 2000-07-28 2008-04-29 International Business Machines Corporation Method and apparatus for affinity of users to application servers
CN101453452A (en) * 2007-12-07 2009-06-10 国际商业机器公司 SIP message processing method and apparatus based on multiple cores
CN106326012A (en) * 2016-08-25 2017-01-11 中国农业银行股份有限公司 Web application cluster buffer utilization method and system
CN107197035A (en) * 2017-06-21 2017-09-22 中国民航大学 A kind of compatibility dynamic load balancing method based on uniformity hash algorithm
CN109040232A (en) * 2018-08-01 2018-12-18 广州视源电子科技股份有限公司 Load balancing method, device and equipment for video conference and storage medium thereof

Also Published As

Publication number Publication date
CN111698270A (en) 2020-09-22

Similar Documents

Publication Publication Date Title
US20230195346A1 (en) Technologies for coordinating disaggregated accelerator device resources
CN107800565B (en) Inspection method, inspection device, inspection system, computer equipment and storage medium
CN114945028B (en) Information processing method based on Internet of things equipment, related equipment and storage medium
CN111460129B (en) Method, device, electronic equipment and storage medium for generating identification
CN113778463B (en) Business service deployment method and device
CN111064626B (en) Configuration updating method, device, server and readable storage medium
CN111459749A (en) Prometous-based private cloud monitoring method and device, computer equipment and storage medium
CN112351110B (en) ID distribution method and device based on zookeeper
CN113872951B (en) Hybrid cloud security policy issuing method and device, electronic equipment and storage medium
CN109445988B (en) Heterogeneous disaster recovery method, device, system, server and disaster recovery platform
CN111698270B (en) Method and device for distributed lateral expansion negotiation service scale
CN110798492B (en) Data storage method and device and data processing system
CN110798358A (en) Distributed service identification method and device, computer readable medium and electronic equipment
CN112631727B (en) Monitoring method and device for pod group pod
CN113612811B (en) Method, system, equipment and medium for client mounting in multiple channels
JP6233846B2 (en) Variable-length nonce generation
CN105338058A (en) Application updating method and device
JP2019135578A (en) Cloud system, cloud server, edge server and user device
CN105939278B (en) Traffic processing method and device
CN114157663A (en) Cloud data access method and cloud server
WO2019214685A1 (en) Message processing method, apparatus, and system
CN111162988B (en) Message distribution method and system
CN112804335B (en) Data processing method, data processing device, computer readable storage medium and processor
CN111580925B (en) Method and device for stretching application
CN118138562A (en) Identification generation method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant