CN112311689A - Burst flow shunting method, computer equipment and readable storage medium - Google Patents

Burst flow shunting method, computer equipment and readable storage medium Download PDF

Info

Publication number
CN112311689A
CN112311689A CN201910703665.1A CN201910703665A CN112311689A CN 112311689 A CN112311689 A CN 112311689A CN 201910703665 A CN201910703665 A CN 201910703665A CN 112311689 A CN112311689 A CN 112311689A
Authority
CN
China
Prior art keywords
service
request
group
frequency
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910703665.1A
Other languages
Chinese (zh)
Other versions
CN112311689B (en
Inventor
赵海林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hode Information Technology Co Ltd
Original Assignee
Shanghai Hode Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Hode Information Technology Co Ltd filed Critical Shanghai Hode Information Technology Co Ltd
Priority to CN201910703665.1A priority Critical patent/CN112311689B/en
Publication of CN112311689A publication Critical patent/CN112311689A/en
Application granted granted Critical
Publication of CN112311689B publication Critical patent/CN112311689B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/125Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/22Traffic shaping
    • H04L47/225Determination of shaping rate, e.g. using a moving window
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling

Abstract

The invention discloses a burst flow shunting method, computer equipment and a readable storage medium, and belongs to the technical field of live broadcast application. The invention is based on the service type, and monitors the request frequency of the obtained service request to identify whether the service request of each service type is in a normal range (for example, the request frequency is greater than a frequency threshold); when the request frequency of the service request is greater than the frequency threshold, the service server (main service group) of the service type corresponding to the service request reaches the upper limit of the capacity, and the service request needs to be sent to the auxiliary service group to acquire corresponding service data, so that the access pressure of the main service group is relieved, the efficiency of dealing with burst flow is improved, and the experience effect of watching live broadcast by a user is ensured.

Description

Burst flow shunting method, computer equipment and readable storage medium
Technical Field
The present invention relates to the field of live broadcast application technologies, and in particular, to a burst traffic offloading method, a computer device, and a readable storage medium.
Background
With the rapid development of the live broadcast industry, various types of emergencies of live broadcast rooms are increasing day by day. Due to the unpredictability of the internet, the situation of instantaneous burst traffic is usually handled by applying a current limiting and degrading mode. However, current limiting and degradation easily cause that part of users cannot access the live broadcast room, and the experience effect of watching the live broadcast is influenced.
Disclosure of Invention
Aiming at the problem of the existing instantaneous burst traffic, a burst traffic distribution method, a computer device and a readable storage medium are provided, which aim to distribute the burst traffic from the perspective of service types so as to ensure the user experience effect.
The method for shunting burst flow comprises the following steps:
monitoring the request frequency of the acquired service request;
when the request frequency of the service request is greater than a frequency threshold value, resource allocation is carried out on an auxiliary service group according to the service type of the service request, and the auxiliary service group shares and stores service resources in a shared storage mode;
and sending the service request to the auxiliary service group to acquire corresponding service data and output the service data.
Preferably, when the request frequency of the service request is greater than the frequency threshold, the step of allocating resources to the auxiliary service group according to the service type of the service request includes:
extracting a service identifier in the service request;
judging whether the request frequency of the service identifier is greater than the frequency threshold value;
when the request frequency of the service identifier is greater than the frequency threshold, taking the service identifier as a shunting identifier;
acquiring a registration address list of all service nodes in the auxiliary service group;
and performing resource allocation on the service node corresponding to the registration address in the registration address list according to the service type corresponding to the shunting identification.
Preferably, the method further comprises the following steps:
when the request frequency of the service identifier is less than or equal to the frequency threshold, sending the service request to a main service group to acquire corresponding service data sent by the main service group and outputting the service data;
and the main service group stores service resources in an exclusive mode.
Preferably, the request frequency is a query rate per second.
Preferably, the step of allocating resources to the service node corresponding to the registered address in the registered address list according to the service type corresponding to the offload identifier further includes:
acquiring the number of the service types corresponding to the shunting identification;
and carrying out average resource allocation on the service nodes of the registered addresses in the registered address list according to the number of the service types and the corresponding service types.
Preferably, the step of sending the service request to the auxiliary service group to obtain corresponding service data and outputting the service data includes:
and acquiring a service node corresponding to the shunting identifier of the service request from the registration address list, sending the service request to a service node in the auxiliary service group to acquire corresponding service data, and outputting the service data.
Preferably, the service type is selected from at least one of the following: user traffic type, room traffic type, prop traffic type, wallet traffic type, and campaign traffic type.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method when executing the computer program.
The invention also provides a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method.
The beneficial effects of the above technical scheme are that:
in the technical scheme, from the perspective of the service types, whether the service request of each service type is in a normal range or not is identified by monitoring the request frequency of the acquired service request (for example, the request frequency is greater than a frequency threshold); when the request frequency of the service request is greater than the frequency threshold, the service server (main service group) of the service type corresponding to the service request reaches the upper limit of the capacity, and the service request needs to be sent to the auxiliary service group to acquire corresponding service data, so that the access pressure of the main service group is relieved, the efficiency of dealing with burst flow is improved, and the experience effect of watching live broadcast by a user is ensured.
Drawings
Fig. 1 is an architecture diagram of an embodiment of a flow distribution system for burst traffic according to the present invention;
fig. 2 is a flowchart of an embodiment of a method for offloading burst traffic according to the present invention;
FIG. 3 is an internal schematic diagram of a main service server;
fig. 4 is a diagram illustrating an embodiment of an access server obtaining a list of registered addresses;
FIG. 5 is an internal schematic view of an auxiliary service server;
fig. 6 is a flowchart of another embodiment of a method for offloading burst traffic according to the present invention;
fig. 7 is a schematic flow chart of a flow splitting method of burst traffic according to the present invention;
fig. 8 is a block diagram of an embodiment of a flow distribution system for burst traffic according to the present invention;
FIG. 9 is a block diagram of the interior of the dispensing unit of the present invention;
FIG. 10 is a diagram of the hardware architecture of one embodiment of the computer apparatus of the present invention;
fig. 11 is a schematic application diagram of a flow splitting system for burst traffic according to an embodiment of the present invention.
Detailed Description
The advantages of the invention are further illustrated in the following description of specific embodiments in conjunction with the accompanying drawings.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In the description of the present invention, it should be understood that the numerical references before the steps do not identify the order of performing the steps, but merely serve to facilitate the description of the present invention and to distinguish each step, and thus should not be construed as limiting the present invention.
The video of the embodiment of the application may be presented on clients such as large-scale video playing devices, game machines, desktop computers, smart phones, tablet computers, MP3(movingpicture expeerpercgroupandioudiolayer iii) players, MP4(movingpicture expeerpercgroupandioudiolayer rlv) players, laptop portable computers, e-book readers, and other display terminals.
The distribution method for burst traffic and the distribution method for burst traffic of the embodiment of the application can be applied to live scenes, for example, to high-level online services such as interactive videos of audiences and broadcasters/video players, and playing of interactive games (for example, black glasses or invisible guardians in the industry). The embodiment of the present application takes the application of video to live video as an example, but is not limited to this.
In the embodiment of the application, the access server judges whether the request frequency of the service request is greater than a frequency threshold value according to the service request sent by the client, if so, the access server performs resource allocation on an auxiliary service group according to the service type of the service request; and sending the service request to the auxiliary service group to acquire corresponding service data, and feeding back the service data to the client, so that the access pressure of the main service group is relieved, and the efficiency of dealing with burst flow is improved. Referring to fig. 1, fig. 1 is a diagram of a flow distribution system architecture for burst traffic according to an embodiment of the present disclosure. As shown in fig. 1, a user a accesses a live broadcast room and sends a prop service request to an access server W through a wireless network, the access server W determines whether a request frequency of the prop service request is greater than a frequency threshold, if not, the prop service request is sent to a corresponding service server M in a main service group to obtain corresponding prop service data, and the prop service data is fed back to the user a; if yes, the auxiliary service group is subjected to resource allocation according to the service type (such as the prop service type) of the prop service request; and sending the prop service request to a corresponding service server Q in the auxiliary service group to acquire corresponding prop service data and feeding the prop service data back to the user A, so that the access pressure of the main service group is relieved, the efficiency of dealing with burst flow is improved, and the live broadcast watching experience effect of the user is ensured. Only one access server W and one a-subscriber are shown here, and the application scenario here may also include a plurality of mutually independent access servers W, as well as a plurality of a-subscribers. The access server W may be a cloud server or a local server. The device of the user a is not limited to the illustrated mobile device, and all intelligent terminals capable of uploading videos are applicable.
The invention provides a flow dividing method of burst flow, aiming at solving the defect of flow limitation or degradation caused by instant burst flow. Referring to fig. 2, which is a schematic flow chart of a burst traffic offloading method according to a preferred embodiment of the present invention, it can be seen that the burst traffic offloading method provided in this embodiment mainly includes the following steps:
s1, monitoring the request frequency of the acquired service request;
by way of example and not limitation, the service request may be one of a user service request, a room service request, a prop service request, a wallet service request, and an activity service request.
It should be noted that the method for offloading burst traffic is mainly applied to the access server.
In this embodiment, the access server monitors the request frequency of the service request sent by the client.
S2, when the request frequency of the service request is greater than a frequency threshold, resource allocation is carried out on an auxiliary service group according to the service type of the service request;
it should be noted that the auxiliary service group is different from the main service group, and the main service group stores the service resources in an exclusive manner, so that the service and the service are not affected by resource competition. The master service group may include a plurality of master service servers, each of which may deploy a plurality of physical machines (refer to fig. 3), each of which may virtualize a plurality of master service nodes through a virtualization unit (Docker), each of which may group-register its IP (internet protocol address) address into a registry (register) to thereby generate a list of registered addresses, and the access server may acquire the list of registered addresses by requesting the IP address of the master service node from the registry (refer to fig. 4).
The auxiliary business service group shares and stores business resources in a shared storage mode, resources in the auxiliary business service group are not limited and can be adjusted in a service resource pool, and competition may exist between business services. The supplementary service group may include a plurality of supplementary service servers, each of which may deploy a plurality of physical machines (refer to fig. 5), each of which may virtualize a plurality of supplementary service nodes through a virtualization unit (Docker), each of which may group-register its IP (internet protocol address) address into a registry, thereby generating a list of registered addresses, and the access server may acquire the list of registered addresses by requesting the supplementary service node IP addresses from the registry (refer to fig. 4).
By way of example and not limitation, the traffic type is selected from at least one of: user traffic type, room traffic type, prop traffic type, wallet traffic type, and campaign traffic type.
In this embodiment, the access server determines whether the request frequency of the service request is greater than a frequency threshold (e.g., whether the request frequency is within a normal range), and if not, the service request is sent to the auxiliary service group to obtain corresponding service data, which may be that the service server (main service group) of the service type corresponding to the service request reaches the upper limit of the capacity.
Further, when the request frequency of the service request is greater than the frequency threshold, the step S2 is a step of performing resource allocation on the auxiliary service group according to the service type of the service request (refer to fig. 6), including:
s21, extracting a service identifier in the service request;
s22, judging whether the request frequency of the service identifier is greater than the frequency threshold value; if yes, go to step S23; if not, go to step S26;
it should be noted that the request frequency is a Query Per Second (QPS, full name: Query Per Second).
In practical application, the current QPS of the service identifier may be obtained based on the memory count of the access server.
S23, taking the service identifier as a distribution identifier;
s24, acquiring a registration address list of all service nodes in the auxiliary service group;
in practical application, the access server may obtain a list of registered addresses of service nodes in the main service group and the auxiliary service group through the registration center.
And S25, performing resource allocation on the service node corresponding to the registered address in the registered address list according to the service type corresponding to the shunting identification.
In the above steps, the access server parses the service request sent by the client, obtains the service identifier in the service request, determines whether the frequency threshold is exceeded according to the QPS of the service identifier, and when the service identifier is greater than the frequency threshold, it indicates that the service type corresponding to the service request is currently at the upper capacity limit in the main service group, and needs to send the service request to the auxiliary service group, so as to relieve the access pressure of the main service group.
Further, step S25 is a step of performing resource allocation on the service node corresponding to the registered address in the registered address list according to the service type corresponding to the offload identifier, and the method further includes:
acquiring the number of the service types corresponding to the shunting identification;
and carrying out average resource allocation on the service nodes of the registered addresses in the registered address list according to the number of the service types and the corresponding service types.
In this step, if there is only one service type of the current shunting identifier exceeding the frequency threshold, resource allocation of the service type can be performed on all service nodes registered with the address in the address list in the auxiliary service group according to the service type; if there are more than one service types of the current shunting identifications exceeding the frequency threshold, average resource allocation can be carried out on the service nodes of the registered addresses in the registered address list according to the service types.
S26, sending the service request to a main service group to acquire corresponding service data sent by the main service group and outputting the service data;
and the main service group stores service resources in an exclusive mode.
In the above step, when the service identifier is less than or equal to the frequency threshold, it indicates that the service type corresponding to the service request is currently in a normal state in the main service group, and the access server may send the service request to a corresponding service server in the main service group to obtain service data corresponding to the service request, and feed back the service data to the client.
And S3, sending the service request to an auxiliary service group to acquire corresponding service data and outputting the service data.
In this embodiment, from the perspective of the service type, the request frequency of the obtained service request is monitored to identify whether the service request of each service type is within a normal range (for example, the request frequency is greater than a frequency threshold); when the request frequency of the service request is greater than the frequency threshold, the service server (main service group) of the service type corresponding to the service request reaches the upper limit of the capacity, and the service request needs to be sent to the auxiliary service group to acquire corresponding service data, so that the access pressure of the main service group is relieved, the efficiency of dealing with burst flow is improved, and the experience effect of watching live broadcast by a user is ensured.
Step S3, sending the service request to an auxiliary service group to obtain corresponding service data, and outputting the service data, where the step includes:
and acquiring a service node corresponding to the shunting identifier of the service request from the registration address list, sending the service request to a service node in the auxiliary service group to acquire corresponding service data, and outputting the service data.
In this step, the access server sends the service request to the auxiliary service group to obtain corresponding service data, so as to relieve the access pressure of the main service group, and further improve the efficiency of dealing with the burst traffic, so as to ensure the experience effect of watching live broadcast by the user.
As shown in fig. 7, the principle flow of the burst traffic splitting method is as follows:
A1. acquiring a service request sent by a client;
A2. identifying a service identifier corresponding to the service request;
A3. acquiring the current QPS of the service identifier based on the memory count of the access server;
A4. judging whether the QPS is larger than a frequency threshold or not, if not, executing the step A5; if yes, go to step A6;
A5. acquiring service node information from the main service group, sending a service request to a corresponding service node, acquiring corresponding service data, and executing step A7;
A6. acquiring service node information from the auxiliary service group, and sending a service request to a corresponding service node to acquire corresponding service data;
A7. and feeding back the acquired service data to the client.
The adoption of the flow distribution method of the burst flow can ensure that the access server switches the auxiliary service group based on the instantaneous pressure, realize the aim of fully-automatic unattended burst flow response, and automatically optimize the service under the condition that a user does not sense the burst flow.
As shown in fig. 8, the present invention further provides a burst traffic shunting system 1, including: a monitoring unit 11, a distribution unit 12 and a control unit 13; wherein:
a monitoring unit 11, configured to monitor a request frequency of the obtained service request;
by way of example and not limitation, the service request may be one of a user service request, a room service request, a prop service request, a wallet service request, and an activity service request.
It should be noted that the offloading system 1 for bursty traffic is mainly applied to an access server.
In this embodiment, the access server monitors the request frequency of the service request sent by the client.
The allocating unit 12 is configured to, when the request frequency of the service request is greater than a frequency threshold, perform resource allocation on an auxiliary service group according to the service type of the service request;
it should be noted that the auxiliary service group is different from the main service group, and the main service group stores the service resources in an exclusive manner, so that the service and the service are not affected by resource competition. The auxiliary business service group shares and stores business resources in a shared storage mode, and competition may exist between business services. The auxiliary business service group may deploy a plurality of physical machines, each of which may configure a plurality of service nodes, each of which may register its IP (internet protocol address) address packets in a registry, thereby generating a list of registered addresses.
By way of example and not limitation, the traffic type is selected from at least one of: user traffic type, room traffic type, prop traffic type, wallet traffic type, and campaign traffic type.
In this embodiment, the access server determines whether the request frequency of the service request is greater than a frequency threshold (e.g., whether the request frequency is within a normal range), and if not, the service request is sent to the auxiliary service group to obtain corresponding service data, which may be that the service server (main service group) of the service type corresponding to the service request reaches the upper limit of the capacity.
As shown in fig. 9, the distribution unit 12 may include: a right-giving module 121, a judging module 122 and a processing module 123, wherein:
the right-extracting module 121 is configured to extract a service identifier in the service request;
a determining module 122, configured to determine whether a request frequency of the service identifier is greater than the frequency threshold; if yes, go to step S23; if not, go to step S26;
it should be noted that the request frequency is a Query Per Second (QPS, full name: Query Per Second).
The processing module 123, configured to use the service identifier as a split identifier when the request frequency of the service identifier is greater than the frequency threshold; acquiring a registration address list of all service nodes in the auxiliary service group; and performing resource allocation on the service node corresponding to the registration address in the registration address list according to the service type corresponding to the shunting identification.
In practical application, the access server may obtain a list of registered addresses of service nodes in the main service group and the auxiliary service group through the registration center.
In this embodiment, the access server parses the service request sent by the client, obtains the service identifier in the service request, determines whether the service identifier exceeds a frequency threshold according to the QPS of the service identifier, and when the service identifier exceeds the frequency threshold, it indicates that the service type corresponding to the service request is currently at the upper capacity limit in the main service group, and needs to send the service request to the auxiliary service group, so as to relieve the access pressure of the main service group.
Further, the processing module 123 performs resource allocation on the service node corresponding to the registered address in the registered address list according to the service type corresponding to the split flow identifier, and further includes:
acquiring the number of the service types corresponding to the shunting identification; and carrying out average resource allocation on the service nodes of the registered addresses in the registered address list according to the number of the service types and the corresponding service types.
In this embodiment, if there is only one service type of the current offload identifier exceeding the frequency threshold, resource allocation of the service type may be performed on all service nodes registered with addresses in the address list in the auxiliary service group according to the service type; if there are more than one service types of the current shunting identifications exceeding the frequency threshold, average resource allocation can be carried out on the service nodes of the registered addresses in the registered address list according to the service types.
When the request frequency of the service identifier is less than or equal to the frequency threshold, the processing module 123 is further configured to send the service request to the main service group to obtain corresponding service data, and output the service data;
and the main service group stores service resources in an exclusive mode.
In this embodiment, when the service identifier is less than or equal to the frequency threshold, it indicates that the service type corresponding to the service request is currently in a normal state in the main service group, and the access server may send the service request to a corresponding service server in the main service group to obtain service data corresponding to the service request, and feed back the service data to the client.
And the control unit 13 is configured to send the service request to an auxiliary service group to obtain corresponding service data, and output the service data.
Further, the control unit 13 is configured to obtain a service node corresponding to the splitting identifier of the service request in the registration address list, send the service request to a service node in the auxiliary service group, so as to obtain corresponding service data, and output the service data.
In this embodiment, from the perspective of the service type, the request frequency of the obtained service request is monitored to identify whether the service request of each service type is within a normal range (for example, the request frequency is greater than a frequency threshold); when the request frequency of the service request is greater than the frequency threshold, the service server (main service group) of the service type corresponding to the service request reaches the upper limit of the capacity, and the service request needs to be sent to the auxiliary service group to acquire corresponding service data, so that the access pressure of the main service group is relieved, the efficiency of dealing with burst flow is improved, and the experience effect of watching live broadcast by a user is ensured.
As shown in fig. 10, a computer apparatus 2, the computer apparatus 2 comprising:
a memory 21 for storing executable program code; and
the processor 22 is configured to call the executable program code in the memory 21, and the execution step includes the above-mentioned method for shunting burst traffic.
Fig. 10 illustrates an example of one processor 22.
The memory 21 is a non-volatile computer-readable storage medium, and can be used to store a non-volatile software program, a non-volatile computer-executable program, and modules, such as program instructions/modules corresponding to the burst traffic offloading method in the embodiment of the present application (for example, the monitoring unit 11, the allocating unit 12, and the control unit 13 shown in fig. 8, and the right-granting module 121, the determining module 122, and the processing module 123 shown in fig. 9). The processor 22 executes various functional applications and data processing of the computer device 2 by running the nonvolatile software program, instructions and modules stored in the memory 21, that is, the method for shunting burst traffic of the above-described method embodiment is implemented.
The memory 21 may include a program storage area and a data storage area, wherein the program storage area may store an application program required for at least one function of the operating system; the storage data area may store playback information of the user on the computer device 2. Further, the memory 21 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 21 may optionally include memory 21 remotely located from the processor 22, and these remote memories 21 may be connected to the offloading system 1 for bursty traffic over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more modules are stored in the memory 21, and when executed by the one or more processors 22, perform the method for shunting burst traffic in any of the above-described method embodiments, for example, perform the above-described method steps S1 to S3 in fig. 2 and method steps S21 to S26 in fig. 6, and implement the functions of the monitoring unit 11, the distribution unit 12, and the control unit 13 shown in fig. 8, and the authorization module 121, the judgment module 122, and the processing module 123 shown in fig. 9.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the methods provided in the embodiments of the present application.
The computer device 2 of the embodiment of the present application exists in various forms, including but not limited to:
(1) a mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such terminals include: smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) Ultra mobile personal computer device: the equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include: PDA, MID, and UMPC devices, etc., such as ipads.
(3) A portable entertainment device: such devices can display and play multimedia content. This type of device comprises: audio, video players (e.g., ipods), handheld game consoles, electronic books, and smart toys and portable car navigation devices.
(4) A server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic devices with data interaction functions.
The present embodiment provides a non-transitory computer-readable storage medium, which stores computer-executable instructions, which are executed by one or more processors, for example, one processor 22 in fig. 10, and enable the one or more processors 22 to perform the method for shunting burst traffic in any method embodiment described above, for example, perform the above-described method steps S1 to S3 in fig. 2, and method steps S21 to S26 in fig. 6, and implement the functions of the monitoring unit 11, the distribution unit 12, and the control unit 13 shown in fig. 8, and the right-granting module 121, the determining module 122, and the processing module 123 shown in fig. 9.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on at least two network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution of the embodiments of the present application. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), or the like.
The first embodiment,
Referring to fig. 1, a user a sends a prop service request to an access server W through a wireless network, and the access server W monitors a request frequency of the obtained prop service request and identifies whether the prop service request is greater than a frequency threshold; if the prop service request is greater than the frequency threshold, a service server Q (main service group) which can be regarded as the service type corresponding to the service request reaches the upper limit of the capacity, the service request needs to be sent to a service server M in an auxiliary service group, the service server M acquires service data corresponding to the service request and sends the service data to an access server W, and the access server W feeds back the received service data to a user a. Therefore, the access pressure of the main business service group is relieved, the efficiency of dealing with burst flow is improved, and the live broadcast watching experience effect of a user is guaranteed.
Example II,
Referring to fig. 11, a user B sends a wallet service request to an access server W through a wireless network, and the access server W monitors the request frequency of the acquired wallet service request and identifies whether the item service request is greater than a frequency threshold; if the prop service request is smaller than the frequency threshold, the service server Q (main service group) which can be regarded as the service type corresponding to the service request is in a normal state, and does not reach the upper limit of the capacity, the service request can be sent to the service server Q in the main service group, the service server Q obtains the service data corresponding to the service request and sends the service data to the access server W, and the access server W feeds back the received service data to the user a.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.

Claims (9)

1. A method for shunting burst traffic, the method comprising the steps of:
monitoring the request frequency of the acquired service request;
when the request frequency of the service request is greater than a frequency threshold value, resource allocation is carried out on an auxiliary service group according to the service type of the service request, and the auxiliary service group shares and stores service resources in a shared storage mode;
and sending the service request to the auxiliary service group to acquire corresponding service data and output the service data.
2. The method for offloading burst traffic as claimed in claim 1, wherein when the request frequency of the service request is greater than a frequency threshold, the step of allocating resources to an auxiliary service group according to the service type of the service request includes:
extracting a service identifier in the service request;
judging whether the request frequency of the service identifier is greater than the frequency threshold value;
when the request frequency of the service identifier is greater than the frequency threshold, taking the service identifier as a shunting identifier;
acquiring a registration address list of all service nodes in the auxiliary service group;
and performing resource allocation on the service node corresponding to the registration address in the registration address list according to the service type corresponding to the shunting identification.
3. The method for splitting bursty traffic according to claim 2, further comprising:
when the request frequency of the service identifier is less than or equal to the frequency threshold, sending the service request to a main service group to acquire corresponding service data sent by the main service group and outputting the service data;
and the main service group stores service resources in an exclusive mode.
4. The method of claim 2, wherein the request frequency is a query rate per second.
5. The method for splitting bursty traffic according to claim 2, wherein the step of allocating resources to the service node corresponding to the registered address in the registered address list according to the service type corresponding to the split identifier further includes:
acquiring the number of the service types corresponding to the shunting identification;
and carrying out average resource allocation on the service nodes of the registered addresses in the registered address list according to the number of the service types and the corresponding service types.
6. The method for offloading burst traffic as claimed in claim 2, wherein the step of sending the service request to the auxiliary service group to obtain corresponding service data and outputting the service data comprises:
and acquiring a service node corresponding to the shunting identifier of the service request from the registration address list, sending the service request to a service node in the auxiliary service group to acquire corresponding service data, and outputting the service data.
7. The method for splitting bursty traffic of claim 1, 2 or 5, wherein the traffic type is selected from at least one of the following: user traffic type, room traffic type, prop traffic type, wallet traffic type, and campaign traffic type.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of any one of claims 1 to 7 when executing the computer program.
9. A computer-readable storage medium having stored thereon a computer program, characterized in that: the computer program when executed by a processor implements the steps of the method of any one of claims 1 to 7.
CN201910703665.1A 2019-07-31 2019-07-31 Burst traffic distribution method, computer device and readable storage medium Active CN112311689B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910703665.1A CN112311689B (en) 2019-07-31 2019-07-31 Burst traffic distribution method, computer device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910703665.1A CN112311689B (en) 2019-07-31 2019-07-31 Burst traffic distribution method, computer device and readable storage medium

Publications (2)

Publication Number Publication Date
CN112311689A true CN112311689A (en) 2021-02-02
CN112311689B CN112311689B (en) 2024-03-05

Family

ID=74486254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910703665.1A Active CN112311689B (en) 2019-07-31 2019-07-31 Burst traffic distribution method, computer device and readable storage medium

Country Status (1)

Country Link
CN (1) CN112311689B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115633197A (en) * 2022-09-15 2023-01-20 海南乾唐视联信息技术有限公司 Service data distribution system, method, device, electronic equipment and medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080123526A1 (en) * 2006-11-29 2008-05-29 Applied Micro Circuits Corporation Credit based flow control in an asymmetric channel environment
US20080225711A1 (en) * 2007-03-14 2008-09-18 Robert Raszuk Dynamic response to traffic bursts in a computer network
CN101645928A (en) * 2009-08-26 2010-02-10 成都市华为赛门铁克科技有限公司 Content resource caching method, device and system
WO2012003890A1 (en) * 2010-07-09 2012-01-12 Telefonaktiebolaget L M Ericsson (Publ) Switching node with load balancing of bursts of packets
CN102841931A (en) * 2012-08-03 2012-12-26 中兴通讯股份有限公司 Storage method and storage device of distributive-type file system
US20140334338A1 (en) * 2013-05-13 2014-11-13 Electronics And Telecommunications Research Institute Method of generating peer service group and accessing link resources in peer service group
CN105516347A (en) * 2015-12-31 2016-04-20 浙江大华系统工程有限公司 Method and device for load balance allocation of streaming media server
WO2016188339A1 (en) * 2015-10-29 2016-12-01 中兴通讯股份有限公司 Load balancing method in wireless local area network, and wireless access point
CN106411984A (en) * 2015-08-03 2017-02-15 天脉聚源(北京)科技有限公司 Network load balancing method based on WeChat platform and system thereof
CN106411971A (en) * 2015-07-29 2017-02-15 腾讯科技(深圳)有限公司 Load regulation method and device
CN106656959A (en) * 2016-09-28 2017-05-10 腾讯科技(深圳)有限公司 Access request regulation and control method and device
CN106713388A (en) * 2015-11-13 2017-05-24 阿里巴巴集团控股有限公司 Emergent business processing method and device
CN109348264A (en) * 2018-11-14 2019-02-15 泰康保险集团股份有限公司 Video resource sharing method, device, storage medium and electronic equipment
CN109815716A (en) * 2019-01-08 2019-05-28 平安科技(深圳)有限公司 Access request processing method, device, storage medium and server
CN110019072A (en) * 2017-11-21 2019-07-16 北京京东尚科信息技术有限公司 AB experimental method and system based on real time data

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080123526A1 (en) * 2006-11-29 2008-05-29 Applied Micro Circuits Corporation Credit based flow control in an asymmetric channel environment
US20080225711A1 (en) * 2007-03-14 2008-09-18 Robert Raszuk Dynamic response to traffic bursts in a computer network
CN101645928A (en) * 2009-08-26 2010-02-10 成都市华为赛门铁克科技有限公司 Content resource caching method, device and system
WO2012003890A1 (en) * 2010-07-09 2012-01-12 Telefonaktiebolaget L M Ericsson (Publ) Switching node with load balancing of bursts of packets
CN102841931A (en) * 2012-08-03 2012-12-26 中兴通讯股份有限公司 Storage method and storage device of distributive-type file system
US20140334338A1 (en) * 2013-05-13 2014-11-13 Electronics And Telecommunications Research Institute Method of generating peer service group and accessing link resources in peer service group
CN106411971A (en) * 2015-07-29 2017-02-15 腾讯科技(深圳)有限公司 Load regulation method and device
CN106411984A (en) * 2015-08-03 2017-02-15 天脉聚源(北京)科技有限公司 Network load balancing method based on WeChat platform and system thereof
WO2016188339A1 (en) * 2015-10-29 2016-12-01 中兴通讯股份有限公司 Load balancing method in wireless local area network, and wireless access point
CN106713388A (en) * 2015-11-13 2017-05-24 阿里巴巴集团控股有限公司 Emergent business processing method and device
CN105516347A (en) * 2015-12-31 2016-04-20 浙江大华系统工程有限公司 Method and device for load balance allocation of streaming media server
CN106656959A (en) * 2016-09-28 2017-05-10 腾讯科技(深圳)有限公司 Access request regulation and control method and device
CN110019072A (en) * 2017-11-21 2019-07-16 北京京东尚科信息技术有限公司 AB experimental method and system based on real time data
CN109348264A (en) * 2018-11-14 2019-02-15 泰康保险集团股份有限公司 Video resource sharing method, device, storage medium and electronic equipment
CN109815716A (en) * 2019-01-08 2019-05-28 平安科技(深圳)有限公司 Access request processing method, device, storage medium and server

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115633197A (en) * 2022-09-15 2023-01-20 海南乾唐视联信息技术有限公司 Service data distribution system, method, device, electronic equipment and medium

Also Published As

Publication number Publication date
CN112311689B (en) 2024-03-05

Similar Documents

Publication Publication Date Title
CN111084983B (en) Cloud game service method, device, equipment and storage medium
CN112311684B (en) Burst traffic processing method, computer device and readable storage medium
US20170163580A1 (en) Interactive method and device for playback of multimedia
US20170192819A1 (en) Method and electronic device for resource allocation
CN111432158B (en) Load balancing method and device for media nodes, storage medium and electronic device
US20170171329A1 (en) Video recommendaton method and system, and server
US20170171585A1 (en) Method and Electronic Device for Recording Live Streaming Media
CN112312145B (en) Access server, burst traffic caching method, system, computer device and readable storage medium
CN111541555A (en) Group chat optimization method and related product
US20170171339A1 (en) Advertisement data transmission method, electrnoic device and system
CN110248211B (en) Live broadcast room message current limiting method and device, electronic equipment and storage medium
CN112311689B (en) Burst traffic distribution method, computer device and readable storage medium
CN106921634B (en) Multimedia stream multicast method and device
CN107786557B (en) Team game acceleration method and related product
CN111249747B (en) Information processing method and device in game
CN111954041A (en) Video loading method, computer equipment and readable storage medium
US10110951B2 (en) Coordinated background TV recognition
CN112291568B (en) Data processing method, device, medium, network access equipment and electronic equipment
CN111835770B (en) Data processing method, device, server and storage medium
US20150172371A1 (en) Method and device for providing communication connection for a plurality of candidate applications in a mobile device
CN111479137B (en) Method and device for providing line address, server and storage medium
CN111294661B (en) Bullet screen display method and device, bullet screen server equipment and storage medium
US20170169239A1 (en) Method for file synchronization, the receiver equipment and systems
CN112494931A (en) Cloud game control method, system, server and computer-readable storage medium
US20160149826A1 (en) Memory usage optimization method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant