CN112165517A - Return source detection method and device, storage medium and electronic equipment - Google Patents

Return source detection method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN112165517A
CN112165517A CN202011003477.7A CN202011003477A CN112165517A CN 112165517 A CN112165517 A CN 112165517A CN 202011003477 A CN202011003477 A CN 202011003477A CN 112165517 A CN112165517 A CN 112165517A
Authority
CN
China
Prior art keywords
source station
target source
detection
request
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011003477.7A
Other languages
Chinese (zh)
Other versions
CN112165517B (en
Inventor
李张娟
王小虎
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Knownsec Information Technology Co ltd
Original Assignee
Chengdu Knownsec Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Knownsec Information Technology Co ltd filed Critical Chengdu Knownsec Information Technology Co ltd
Priority to CN202011003477.7A priority Critical patent/CN112165517B/en
Publication of CN112165517A publication Critical patent/CN112165517A/en
Application granted granted Critical
Publication of CN112165517B publication Critical patent/CN112165517B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes

Abstract

The application provides a back source detection method, a back source detection device, a storage medium and electronic equipment. The method comprises the steps of firstly sending an access request transmitted by a client to a corresponding target source station, when the number of times of continuous access failure is larger than a first threshold value, then obtaining a detection request according to the access request, and then carrying out asynchronous detection on the target source station according to the detection request. Because the data carried by the detection request is less than the data carried by the access request, and the asynchronous detection is carried out according to the detection request, compared with the detection directly carried by the access request, the data volume is smaller, the flow consumption is reduced, and the occupation of the bandwidth is reduced.

Description

Return source detection method and device, storage medium and electronic equipment
Technical Field
The application relates to the field of internet, in particular to a back source detection method and device, a storage medium and electronic equipment.
Background
A cdn (content Delivery network) is an intelligent virtual network constructed on the basis of an existing network, and a user can obtain required content nearby by using functional modules such as load balancing, content distribution, scheduling and the like of a central platform by means of edge servers deployed in various places, so that network congestion is reduced, and the access response speed and hit rate of the user are increased. When the user accesses a certain URL, the resolved CDN node does not cache the corresponding content, or the cache is expired, the back-source station requests the resource, that is, the CDN back-source. In this case, the detection of the state of the source station is involved.
In the prior art, when a probe state is adopted, a real user request is used, and when a source station is unavailable for service or resources, a large number of probe requests are repeatedly sent to the source station within a specified time, so that the traffic consumption is large, a large number of invalid requests are generated, and the problem that the available source station is set to be unavailable by mistake due to a single source station state judgment standard and the fact that the user is not combined can occur.
Disclosure of Invention
An object of the present application is to provide a method, an apparatus, a storage medium, and an electronic device for detecting a back source, so as to solve the above problems.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
in a first aspect, an embodiment of the present application provides a back source detection method, which is applied to a CDN node, and the method includes:
sending an access request transmitted by a client to a corresponding target source station, wherein the access request comprises address information of the target source station;
when the number of times of continuous access failure is larger than a first threshold value, acquiring a detection request according to the access request, wherein the data carried by the detection request is less than the data carried by the access request, and the detection request contains the address information of the target source station;
and carrying out asynchronous detection on the target source station according to the detection request.
In a second aspect, an embodiment of the present application provides a back source detection device, which is applied to a CDN node, where the device includes:
the source returning module is used for sending an access request transmitted by a client to a corresponding target source station, wherein the access request comprises address information of the target source station;
an asynchronous detection module, configured to, when the number of times of consecutive access failures is greater than a first threshold, obtain a detection request according to the access request, where data carried by the detection request is less than data carried by the access request, and the detection request includes address information of the target source station; and the system is also used for asynchronously detecting the target source station according to the detection request.
In a third aspect, the present application provides a storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method described above.
In a fourth aspect, an embodiment of the present application provides an electronic device, including: a processor and memory for storing one or more programs; the one or more programs, when executed by the processor, implement the methods described above.
Compared with the prior art, the method, the device, the storage medium and the electronic device for detecting the return source provided by the embodiment of the application have the beneficial effects that: and sending the access request transmitted by the client to the corresponding target source station, acquiring a detection request according to the access request when the number of times of continuous access failure is greater than a first threshold value, and performing asynchronous detection on the target source station according to the detection request. Because the data carried by the detection request is less than the data carried by the access request, and the asynchronous detection is carried out according to the detection request, compared with the detection directly carried by the access request, the data volume is smaller, the flow consumption is reduced, and the occupation of the bandwidth is reduced.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and it will be apparent to those skilled in the art that other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a back source detection method according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating the substeps of S106 according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram illustrating another substep of S106 according to an embodiment of the present disclosure;
fig. 5 is another schematic flow chart of a back source detection method according to an embodiment of the present disclosure;
fig. 6 is a schematic block diagram of a back source detection device according to an embodiment of the present disclosure.
In the figure: 10-a processor; 11-a memory; 12-a bus; 13-a communication interface; 201-back source module; 202-asynchronous detection module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In the description of the present application, it should be noted that the terms "upper", "lower", "inner", "outer", and the like indicate orientations or positional relationships based on orientations or positional relationships shown in the drawings or orientations or positional relationships conventionally found in use of products of the application, and are used only for convenience in describing the present application and for simplification of description, but do not indicate or imply that the referred devices or elements must have a specific orientation, be constructed in a specific orientation, and be operated, and thus should not be construed as limiting the present application.
In the description of the present application, it is also to be noted that, unless otherwise explicitly specified or limited, the terms "disposed" and "connected" are to be interpreted broadly, e.g., as being either fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
A cdn (content Delivery network) is an intelligent virtual network constructed on the basis of an existing network, and a user can obtain required content nearby by using functional modules such as load balancing, content distribution, scheduling and the like of a central platform by means of edge servers deployed in various places, so that network congestion is reduced, and the access response speed and hit rate of the user are increased. When the user accesses a certain URL, the resolved CDN node does not cache the responded content, or the cache has expired, the back-source station requests the resource, that is, the CDN back-source. In this case, the detection of the state of the source station is involved. Source station state probing refers to executing specific code on a device to determine state information of a target source station. For example, by sending a real user request to the source station, it is determined whether the source station is connected to the network, whether the service is available, etc. according to the information returned by the source station.
Through a great deal of practice and summary of the inventor, when the real user request is used for detection, when the service or resource of the source station is unavailable, a great deal of detection requests are repeatedly sent to the source station within a specified time, so that the traffic consumption is large, the number of invalid requests is large, and the state judgment standard of the source station is single and does not combine with the real situation of the user. The real user scene has various problems, such as network problems, source station service overload, slow response and the like, and the state of different source stations is judged by using a fixed judgment standard, so that the problem that the available source stations are set to be unavailable by mistake may occur.
The embodiment of the application provides an electronic device which can be a CDN node server. Please refer to fig. 1, a schematic structural diagram of an electronic device. The electronic device comprises a processor 10, a memory 11, a bus 12. The processor 10 and the memory 11 are connected by a bus 12, and the processor 10 is configured to execute an executable module, such as a computer program, stored in the memory 11.
The processor 10 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the back source detection method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 10. The Processor 10 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
The Memory 11 may comprise a high-speed Random Access Memory (RAM) and may further comprise a non-volatile Memory (non-volatile Memory), such as at least one disk Memory.
The bus 12 may be an ISA (Industry Standard architecture) bus, a PCI (peripheral Component interconnect) bus, an EISA (extended Industry Standard architecture) bus, or the like. Only one bi-directional arrow is shown in fig. 1, but this does not indicate only one bus 12 or one type of bus 12.
The memory 11 is used for storing programs, such as programs corresponding to the source detection device. The back source detection means includes at least one software functional module which may be stored in the memory 11 in the form of software or firmware (firmware) or fixed in an Operating System (OS) of the electronic device. The processor 10, upon receiving the execution instruction, executes the program to implement the back source detection method.
Possibly, the electronic device provided by the embodiment of the present application further includes a communication interface 13. The communication interface 13 is connected to the processor 10 via a bus. The electronic device may communicate with other terminals, such as a source station and a client, via the communication interface 13.
It should be understood that the structure shown in fig. 1 is merely a structural schematic diagram of a portion of an electronic device, which may also include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
The method for detecting a source return provided in the embodiment of the present invention can be applied to, but is not limited to, the electronic device shown in fig. 1, and please refer to fig. 2:
s103, sending the access request transmitted by the client to the corresponding target source station.
Wherein, the access request includes the address information of the target source station. The address information is an IP address or a domain name address.
Specifically, when an access request corresponding to a URL (unique identifier of an available resource) transmitted by a client is received, if the CDN node does not cache the responded content or the cache is expired, the CDN node returns to the source to request the corresponding resource. At this time, the access request transmitted by the client is sent to the corresponding target source station.
And S104, when the number of times of continuous access failure is greater than a first threshold value, acquiring the detection request according to the access request.
And the data carried by the detection request is less than the data carried by the access request, and the detection request contains the address information of the target source station.
The number of times of continuous access failure is larger than the first threshold value, which indicates that the target source station is in an inaccessible state in the current time period. Since the access request transmitted by the client contains various information such as a user name, password, and required data, etc. If the state detection of the target source station is continued according to the access request, the traffic is greatly consumed, and the bandwidth is occupied. In order to solve the problem, in the embodiment of the application, the data carried by the generated access request is less than the data detection request carried by the access request.
Possibly, the probe request may be preset configuration information, that is, a plurality of different probe requests are stored in the CDN node, and when the number of consecutive failures of access according to a certain access request is greater than a first threshold, the corresponding probe request is matched according to the access request. Probe requests may also be generated from access requests.
Possibly, the probe request does not contain a username, password, and required data, etc., which is only used to probe whether the target source station is accessible.
And S106, carrying out asynchronous detection on the target source station according to the detection request.
Specifically, the asynchronous detection is performed according to the detection request, and compared with the detection directly performed by using the access request, the asynchronous detection has smaller data volume, reduces the flow consumption and reduces the occupation of bandwidth.
To sum up, in the source return detection method provided in the embodiment of the present application, the access request transmitted by the client is sent to the corresponding target source station, and when the number of times of continuous access failures is greater than the first threshold, the detection request is obtained according to the access request, and the target source station is asynchronously detected according to the detection request. Because the data carried by the detection request is less than the data carried by the access request, and the asynchronous detection is carried out according to the detection request, compared with the detection directly carried by the access request, the data volume is smaller, the flow consumption is reduced, and the occupation of the bandwidth is reduced.
On the basis of fig. 2, for the content in S106, the embodiment of the present application further provides a possible implementation manner, please refer to fig. 3, where S106 includes:
s106-1, waiting for reaching the health detection period, and continuously sending the detection request to the target source station.
Specifically, as described above, if the target source station is currently in the inaccessible state, the probe request sent to the target source station is continuously invalid, and only the traffic consumption and the occupied bandwidth are increased. By setting the health detection period, there is a certain interval between the probes, and possibly, after a certain interval, the state of the target source station has changed, and then sending the probe request may obtain different results.
In the health detection period, the CDN node continuously sends probe requests to the target source station. And if the detection is failed, the access state of the target source station is unstable, the transmission is stopped, and the next health detection period is waited. Wherein, when each health detection cycle begins, i defaults to 1.
S106-2, judging whether the state of the target source station in the health detection period is healthy. If yes, executing S106-3, and if not, repeatedly executing S106-1.
Wherein the number of times of the continuous detection success of the health characterization in the health detection period is larger than a second threshold value.
Specifically, when i is greater than the second threshold (configuration information trytimes), i.e. it is characterized that the target source station is in a healthy state in the current health detection period, S106-3 is executed. Otherwise, if the ith probe request fails, it indicates that the target source station is in an unhealthy state in the previous health detection period, and then S106-1 is executed.
And S106-3, judging whether the times that the state of the target source station is healthy in the detection period is greater than a third threshold value. If yes, executing S106-4, otherwise, repeatedly executing S106-1.
In particular, the probe duration characterizes the validity period of the probe request. For example, if the probe request is generated at 18.30, and the length of the probe period is 10 minutes, after 18.40, the probe request is invalid, and the target source station is no longer asynchronously probed according to the probe request. When the number of times the state of the target source station is healthy during the probing period is greater than the third threshold value, it may be determined that the target source station has recovered to an accessible state, at which point S106-4 is performed. Otherwise, S106-1 is repeated.
S106-4, determining that the target source station is restored to an accessible state.
At this time, the access request transmitted by the client is sent to the target source station to acquire the corresponding resource.
On the basis of fig. 3, regarding how to manage a plurality of target source stations to be detected, a possible implementation manner is further provided in the embodiments of the present application, please refer to fig. 4, where the back source detecting method further includes:
and S105, adding the address information of the target source station into the unavailable list, and recording the adding time.
The adding time is the time for adding the target source station to the unavailable list (unavailable _ ip _ list). The add time corresponds to the time to get the probe request.
Possibly, the execution time of S105 may be equal to or earlier or later than the execution time of the acquisition probe request, but slightly different.
With continued reference to fig. 4, S106 further includes:
s106-1, waiting for reaching the health detection period, and continuously sending the detection request to the target source station.
S106-2, judging whether the state of the target source station in the health detection period is healthy. If yes, executing S106-3, and if no, executing S106-5.
And S106-3, judging whether the times that the state of the target source station is healthy in the detection period is greater than a third threshold value. If yes, executing S106-4, and if not, executing S106-5.
S106-5, judging whether the interval between the current time and the adding time exceeds the detection period. If yes, executing S106-6, otherwise, repeatedly executing S106-1.
Specifically, the current time-distance adding time (i.e., the time when the target source station is determined to be in the unavailable state for the first time) exceeds the probing period (avail _ interval), and when the current time-distance adding time is still in the unavailable state, the target source station is forced to be removed from the unavailable list and set in the available state in order to make the target source station have a chance to be accessed again, and when the next source return request arrives, if the target source station is still in the unavailable state, the target source station is added into the unavailable list again, and the asynchronous probing process is started. When the interval between the current time and the adding time exceeds the detection period, S106-6 is executed; otherwise, S106-1 is repeated.
S106-6, the address information of the target source station is deleted from the unavailable list.
With continuing reference to fig. 4, for the content in S106, the embodiment of the present application further provides a possibility, and S106 further includes:
after "determining that the target source station has restored to an accessible state" at S104, "delete address information of the target source station from the unavailable list" at S106 is performed.
So that the access request of the client can be sent to the corresponding target source station. Correspondingly, the established probing task and timing setting for the target source station are deleted.
On the basis of fig. 4, regarding the back-source detecting method, a possible implementation manner is further provided in the embodiment of the present application, please refer to fig. 5, before sending the access request transmitted by the client to the corresponding target source station, the back-source detecting method further includes:
s101, inquiring whether the unavailable list contains address information in the access request. If yes, go to step S102, otherwise go to step S103.
When the query result shows that the unavailable list contains the address information in the access request, which indicates that the current state of the target source station is not stable or accessible, and during the probing period, in order to avoid generating excessive invalid requests and consuming traffic, S102 is executed, and the end of probing is waited. Otherwise, S103 is executed.
S102, skipping.
When the target source station is removed from the unavailable list, an access request is sent to the target source station.
Possibly, when the unavailable list contains a plurality of target source stations, asynchronous probing needs to be performed on each target source station in the unavailable list in turn during the health detection period.
Possibly, after the destination source station is removed from the unavailable list, it may be added to the available list (upstream _ ip _ list).
The embodiment of the present application further provides a possible implementation manner, please refer to the following, after sending the access request transmitted by the client to the corresponding target source station, when receiving the access result fed back by the target source station, stop sending the access request to the target source station, and transmit the access result to the client; and the access result is target information corresponding to the access request.
If the data required in the access request is a picture, the returned access result is a picture; if the data required in the access request is a static page, the returned access result is the static page.
Referring to fig. 6, fig. 6 is a return source detecting device according to an embodiment of the present disclosure, and optionally, the return source detecting device is applied to the electronic device described above.
The back source detection device comprises: a back source module 201(upstream module) and an asynchronous probe module 202(health _ check module).
The source returning module 201 is configured to send an access request transmitted by a client to a corresponding target source station, where the access request includes address information of the target source station. Possibly, the back source module 201 may perform S103 described above.
The asynchronous detection module 202 is configured to, when the number of times of consecutive access failures is greater than a first threshold, obtain a detection request according to an access request, where data carried by the detection request is less than data carried by the access request, and the detection request includes address information of a target source station; and the system is also used for asynchronously detecting the target source station according to the detection request. Possibly, the asynchronous detection module 202 may perform S104 and S106 described above.
Optionally, the asynchronous probe module 202 is configured to wait for a health detection period to arrive, and continuously send probe requests to the target source station; judging whether the state of the target source station in a health detection period is healthy or not, wherein the number of times of successful continuous detection of the health representation in the health detection period is greater than a second threshold value; if the target source station is unhealthy, repeatedly and continuously sending a detection request to the target source station when the next health detection period is reached; if the target source station is healthy, judging whether the frequency that the state of the target source station is healthy in the detection period is greater than a third threshold value; if not, repeatedly and continuously sending a detection request to the target source station when waiting for reaching the next health detection period; if so, determining that the target source station is restored to an accessible state. Possibly, asynchronous detection module 202 may perform S106-1 to S106-4 described above.
Optionally, the asynchronous detection module 202 is further configured to, when the number of times of consecutive access failures is greater than a first threshold, add address information of the target source station to the unavailable list, and record an addition time, where the addition time is a time for adding the target source station to the unavailable list; the device is also used for judging whether the interval between the current time and the adding time exceeds the detection period or not; if yes, deleting the address information of the target source station from the unavailable list; and if not, performing asynchronous detection on the target source station according to the detection request. Possibly, the asynchronous detection module 202 may perform S105 and S106-5 to S106-6 described above.
It should be noted that the back source detecting device provided in this embodiment may execute the method flows shown in the above method flow embodiments to achieve the corresponding technical effects. For the sake of brevity, the corresponding contents in the above embodiments may be referred to where not mentioned in this embodiment.
The embodiment of the invention also provides a storage medium, wherein the storage medium stores computer instructions and programs, and the computer instructions and the programs execute the back source detection method of the embodiment when being read and run. The storage medium may include memory, flash memory, registers, or a combination thereof, etc.
An electronic device, which may be a CDN node server, is provided below, and as shown in fig. 1, the electronic device may implement the back source detection method; specifically, the electronic device includes: processor 10, memory 11, bus 12. The processor 10 may be a CPU. The memory 11 is used for storing one or more programs, and when the one or more programs are executed by the processor 10, the back source detection method of the above-described embodiment is performed.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A back source detection method is applied to CDN nodes and comprises the following steps:
sending an access request transmitted by a client to a corresponding target source station, wherein the access request comprises address information of the target source station;
when the number of times of continuous access failure is larger than a first threshold value, acquiring a detection request according to the access request, wherein the data carried by the detection request is less than the data carried by the access request, and the detection request contains the address information of the target source station;
and carrying out asynchronous detection on the target source station according to the detection request.
2. The back-source probing method of claim 1 wherein said step of asynchronously probing said target source station with said probe request comprises:
continuously sending the detection request to the target source station after a health detection period is reached;
judging whether the state of the target source station in the health detection period is healthy or not, wherein the number of times of continuous detection success of the health representation in the health detection period is larger than a second threshold value;
if the target source station is unhealthy, repeatedly and continuously sending the detection request to the target source station when the next health detection period is waited to be reached;
if the target source station is healthy, judging whether the frequency that the state of the target source station is healthy in the detection period is greater than a third threshold value;
if not, repeatedly and continuously sending the detection request to the target source station when waiting for reaching the next health detection period;
if yes, determining that the target source station is restored to an accessible state.
3. The back source detection method of claim 2, wherein when the number of consecutive access failures is greater than a first threshold, the method further comprises:
adding the address information of the target source station into an unavailable list, and recording the adding time, wherein the adding time is the time for adding the target source station into the unavailable list;
the step of performing asynchronous probing on the target source station according to the probe request further includes:
judging whether the interval between the current time and the adding time exceeds the detection period or not;
if yes, deleting the address information of the target source station from the unavailable list;
and if not, performing asynchronous detection on the target source station according to the detection request.
4. The back-source probing method according to claim 3 wherein said step of asynchronously probing said target source station with said probe request further comprises:
deleting address information of the target source station from the unavailable list after the determination that the target source station has recovered to an accessible state.
5. The back-source probing method of claim 4 wherein before sending the client-transmitted access request to the corresponding target source station, the method further comprises:
inquiring whether the unavailable list contains address information in the access request;
if not, sending the access request transmitted by the client to the corresponding target source station;
if so, skip.
6. A back source detection device applied to CDN nodes is characterized by comprising:
the source returning module is used for sending an access request transmitted by a client to a corresponding target source station, wherein the access request comprises address information of the target source station;
an asynchronous detection module, configured to, when the number of times of consecutive access failures is greater than a first threshold, obtain a detection request according to the access request, where data carried by the detection request is less than data carried by the access request, and the detection request includes address information of the target source station; and the system is also used for asynchronously detecting the target source station according to the detection request.
7. The back-source probe apparatus of claim 6, wherein the asynchronous probe module is configured to continuously send the probe request to the target source station waiting for a health detection period to be reached; judging whether the state of the target source station in the health detection period is healthy or not, wherein the number of times of continuous detection success of the health representation in the health detection period is larger than a second threshold value; if the target source station is unhealthy, repeatedly and continuously sending the detection request to the target source station when the next health detection period is waited to be reached; if the target source station is healthy, judging whether the frequency that the state of the target source station is healthy in the detection period is greater than a third threshold value; if not, repeatedly and continuously sending the detection request to the target source station when waiting for reaching the next health detection period; if yes, determining that the target source station is restored to an accessible state.
8. The back source detection apparatus of claim 7, wherein the asynchronous detection module is further configured to add address information of the target source station to an unavailable list when the number of consecutive access failures is greater than a first threshold, and record an addition time, wherein the addition time is a time when the target source station is added to the unavailable list; the time interval between the current time and the adding time is judged whether to exceed the detection period or not; if yes, deleting the address information of the target source station from the unavailable list; and if not, performing asynchronous detection on the target source station according to the detection request.
9. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-5.
10. An electronic device, comprising: a processor and memory for storing one or more programs; the one or more programs, when executed by the processor, implement the method of any of claims 1-5.
CN202011003477.7A 2020-09-22 2020-09-22 Return source detection method and device, storage medium and electronic equipment Active CN112165517B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011003477.7A CN112165517B (en) 2020-09-22 2020-09-22 Return source detection method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011003477.7A CN112165517B (en) 2020-09-22 2020-09-22 Return source detection method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN112165517A true CN112165517A (en) 2021-01-01
CN112165517B CN112165517B (en) 2022-09-20

Family

ID=73862727

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011003477.7A Active CN112165517B (en) 2020-09-22 2020-09-22 Return source detection method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN112165517B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113453047A (en) * 2021-07-02 2021-09-28 北京金山云网络技术有限公司 Resource request processing method and device, electronic equipment and storage medium
CN114124897A (en) * 2021-11-30 2022-03-01 北京知道创宇信息技术股份有限公司 CDN node control method and device, electronic equipment and readable storage medium
CN114448871A (en) * 2021-12-23 2022-05-06 天翼云科技有限公司 Data feedback routing method and system for CDN

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080157753A1 (en) * 2006-12-27 2008-07-03 Philippe Boucard System and method for determining the performance of an on-chip interconnection network
CN102196060A (en) * 2011-06-15 2011-09-21 北京蓝汛通信技术有限责任公司 Method and system for selecting source station by Cache server
CN102427412A (en) * 2011-12-31 2012-04-25 网宿科技股份有限公司 Zero-delay disaster recovery switching method and system of active standby source based on content distribution network
US20160330615A1 (en) * 2014-01-14 2016-11-10 Tomtom Traffic B.V. Apparatus and method for probe data management
WO2017020715A1 (en) * 2015-08-03 2017-02-09 阿里巴巴集团控股有限公司 Method and device for monitoring status of cdn node
US9712381B1 (en) * 2014-07-31 2017-07-18 Google Inc. Systems and methods for targeted probing to pinpoint failures in large scale networks
CN107423155A (en) * 2017-07-27 2017-12-01 杭州绿湾网络科技有限公司 Back end fault detection method and device
CN107819642A (en) * 2017-09-15 2018-03-20 中国科学院计算技术研究所 Based on distributed adaptive heartbeat method and system
CN108173979A (en) * 2017-12-25 2018-06-15 新华三信息安全技术有限公司 A kind of message processing method, device, equipment and storage medium
CN109413163A (en) * 2018-10-09 2019-03-01 网宿科技股份有限公司 A kind of method and device of service access
CN110650069A (en) * 2019-10-17 2020-01-03 北京知道创宇信息技术股份有限公司 CDN node control method, device and system
US20200084128A1 (en) * 2016-12-13 2020-03-12 NEC Laboratories Europe GmbH Method and software defined network controller for performing round-trip time determination between a source element and a target element
CN111106976A (en) * 2018-10-26 2020-05-05 北京金山云网络技术有限公司 Detection method and device for CDN network, electronic equipment and readable storage medium
CN111181849A (en) * 2018-11-09 2020-05-19 北京嘀嘀无限科技发展有限公司 Return source path determining method, determining device, computer equipment and storage medium
CN111262938A (en) * 2020-01-17 2020-06-09 厦门网宿有限公司 DNS server selection method and proxy server
CN111355612A (en) * 2020-02-28 2020-06-30 中国工商银行股份有限公司 CDN node emergency processing method and system for source station fault
CN111506388A (en) * 2020-03-23 2020-08-07 聚好看科技股份有限公司 Container performance detection method, container management platform and computer storage medium

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080157753A1 (en) * 2006-12-27 2008-07-03 Philippe Boucard System and method for determining the performance of an on-chip interconnection network
CN102196060A (en) * 2011-06-15 2011-09-21 北京蓝汛通信技术有限责任公司 Method and system for selecting source station by Cache server
CN102427412A (en) * 2011-12-31 2012-04-25 网宿科技股份有限公司 Zero-delay disaster recovery switching method and system of active standby source based on content distribution network
US20160330615A1 (en) * 2014-01-14 2016-11-10 Tomtom Traffic B.V. Apparatus and method for probe data management
US9712381B1 (en) * 2014-07-31 2017-07-18 Google Inc. Systems and methods for targeted probing to pinpoint failures in large scale networks
WO2017020715A1 (en) * 2015-08-03 2017-02-09 阿里巴巴集团控股有限公司 Method and device for monitoring status of cdn node
US20200084128A1 (en) * 2016-12-13 2020-03-12 NEC Laboratories Europe GmbH Method and software defined network controller for performing round-trip time determination between a source element and a target element
CN107423155A (en) * 2017-07-27 2017-12-01 杭州绿湾网络科技有限公司 Back end fault detection method and device
CN107819642A (en) * 2017-09-15 2018-03-20 中国科学院计算技术研究所 Based on distributed adaptive heartbeat method and system
CN108173979A (en) * 2017-12-25 2018-06-15 新华三信息安全技术有限公司 A kind of message processing method, device, equipment and storage medium
CN109413163A (en) * 2018-10-09 2019-03-01 网宿科技股份有限公司 A kind of method and device of service access
CN111106976A (en) * 2018-10-26 2020-05-05 北京金山云网络技术有限公司 Detection method and device for CDN network, electronic equipment and readable storage medium
CN111181849A (en) * 2018-11-09 2020-05-19 北京嘀嘀无限科技发展有限公司 Return source path determining method, determining device, computer equipment and storage medium
CN110650069A (en) * 2019-10-17 2020-01-03 北京知道创宇信息技术股份有限公司 CDN node control method, device and system
CN111262938A (en) * 2020-01-17 2020-06-09 厦门网宿有限公司 DNS server selection method and proxy server
CN111355612A (en) * 2020-02-28 2020-06-30 中国工商银行股份有限公司 CDN node emergency processing method and system for source station fault
CN111506388A (en) * 2020-03-23 2020-08-07 聚好看科技股份有限公司 Container performance detection method, container management platform and computer storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
于波涛等: ""CDN 技术在国家电网公司外网邮件系统中的应用"", 《电力信息与通信技术》 *
李俊强等: ""软件定义网络探测技术综述"", 《重 庆 理 工 大 学 学 报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113453047A (en) * 2021-07-02 2021-09-28 北京金山云网络技术有限公司 Resource request processing method and device, electronic equipment and storage medium
CN114124897A (en) * 2021-11-30 2022-03-01 北京知道创宇信息技术股份有限公司 CDN node control method and device, electronic equipment and readable storage medium
CN114124897B (en) * 2021-11-30 2023-08-22 北京知道创宇信息技术股份有限公司 CDN node control method and device, electronic equipment and readable storage medium
CN114448871A (en) * 2021-12-23 2022-05-06 天翼云科技有限公司 Data feedback routing method and system for CDN
CN114448871B (en) * 2021-12-23 2023-11-03 天翼云科技有限公司 Data feedback routing method and system for CDN

Also Published As

Publication number Publication date
CN112165517B (en) 2022-09-20

Similar Documents

Publication Publication Date Title
CN112165517B (en) Return source detection method and device, storage medium and electronic equipment
CN109561141B (en) CDN node selection method and equipment
CN109547286B (en) CDN node selection method, device and storage medium
CN112311628B (en) Network speed measuring method, system, network equipment and storage medium
CN110932933B (en) Network condition monitoring method, computing device and computer storage medium
CN113067875B (en) Access method, device and equipment based on dynamic flow control of micro-service gateway
US8918497B2 (en) Email system latencies and bandwidths
CN108647240B (en) Method and device for counting access amount, electronic equipment and storage medium
CN110022259B (en) Message arrival rate determining method and device, data statistics server and storage medium
CN109560976B (en) Message delay monitoring method and device
CN111711544B (en) Link dial testing method and device, electronic equipment and storage medium
CN112118151A (en) Network speed measuring method, device, system, electronic equipment and storage medium
CN114500381A (en) Network bandwidth limiting method, system, electronic device and readable storage medium
CN111107118A (en) Picture access acceleration method, device, equipment, system and storage medium
CN113746920B (en) Data forwarding method and device, electronic equipment and computer readable storage medium
JP2014523671A (en) Assessing the overall performance of interactive application services
CN108574610B (en) Pressure testing method and device, electronic equipment and medium
CN109995863A (en) Dynamic resource downloading method and device, electronic equipment and storage medium
CN111884932B (en) Link determining method, device, equipment and computer readable storage medium
CN110659247A (en) Method, device, equipment and medium for detecting continuity of call ticket file
CN111082977B (en) Method and device for acquiring IP address and terminal equipment
CN114338794A (en) Service message pushing method and device, electronic equipment and storage medium
CN112882646A (en) Resource caching method and device, electronic equipment and storage medium
CN112131198A (en) Log analysis method and device and electronic equipment
CN114500454B (en) Method and device for detecting geographic position change of electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 9/F, Block C, No. 28 Tianfu Avenue North Section, Chengdu High tech Zone, China (Sichuan) Pilot Free Trade Zone, Chengdu City, Sichuan Province, 610000

Patentee after: CHENGDU KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 610000, 11th floor, building 2, no.219, Tianfu Third Street, Chengdu pilot Free Trade Zone, hi tech Zone, Chengdu, Sichuan Province 610000

Patentee before: CHENGDU KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.