CN115065723B - Data processing system for network disaster tolerance - Google Patents

Data processing system for network disaster tolerance Download PDF

Info

Publication number
CN115065723B
CN115065723B CN202210988941.5A CN202210988941A CN115065723B CN 115065723 B CN115065723 B CN 115065723B CN 202210988941 A CN202210988941 A CN 202210988941A CN 115065723 B CN115065723 B CN 115065723B
Authority
CN
China
Prior art keywords
data
client
server
state
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210988941.5A
Other languages
Chinese (zh)
Other versions
CN115065723A (en
Inventor
李睿
闫晶
薄满辉
韩海燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Travelsky Mobile Technology Co Ltd
Original Assignee
China Travelsky Mobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Travelsky Mobile Technology Co Ltd filed Critical China Travelsky Mobile Technology Co Ltd
Priority to CN202210988941.5A priority Critical patent/CN115065723B/en
Publication of CN115065723A publication Critical patent/CN115065723A/en
Application granted granted Critical
Publication of CN115065723B publication Critical patent/CN115065723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A10/00TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
    • Y02A10/40Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of data processing, in particular to a data processing system for network disaster tolerance, which comprises: the system comprises a client, a data server and a proxy server; the client in the first state is used for: generating a first data acquisition request A1= (a, b, data 1) in response to a clicking operation of a user; sending A1 to a data server; if the first response data is not received within Δ T1, sending a first TEST request TEST1= (a, b) to the data server; if the first test response data is not received in the delta T2, the client is set to be in a second state; delta T2 is less than delta T1; the client in the second state is used for: according to the A1, generating a second data acquisition request A2= (a, c, data 1); sending A2 to the proxy server; and receiving first response data returned by the proxy server. Therefore, the method and the device can improve the efficiency of the client side for acquiring the data from the data server.

Description

Data processing system for network disaster tolerance
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data processing system for network disaster recovery.
Background
With the increasing number of people who choose civil aviation trips, optimization of data processing systems related to civil aviation trip services is necessary.
The current data processing system generally comprises a client and a high-security server, wherein the client has a dynamic IP address, when a user operates on the client, the client requests the server to acquire data, and the server identifies the client through the current IP address of the client and sends related data to the client to complete data acquisition.
However, since the security level of the server is high, when the server identifies the IP address of the client, the server may make a misjudgment, that is, the server identifies the current IP address of the client as a risk address, and further sets the client to prohibit access to the server, at this time, the client cannot obtain data from the server, and needs to manually restart the client to refresh the IP address of the client, which may take a lot of time, and thus, the efficiency of the client obtaining data is low.
Disclosure of Invention
Aiming at the technical problems, the technical scheme adopted by the invention is as follows:
a data processing system for network disaster tolerance comprises a client, a data server and a proxy server, wherein the data server and the proxy server are both connected with the client; the client has a first state and a second state, and the initial state of the client is the first state;
the client in the first state is used for executing the following method:
generating a first data acquisition request A1= (a, b, data 1) in response to a clicking operation of a user; the method comprises the following steps that a is identification information of a client, b is identification information of a data server, data1 is first request data, A1 is used for indicating the data server to return first response data to the client, and the first response data correspond to the data 1;
sending A1 to a data server;
if the first response data is not received within the first time length delta T1, sending a first TEST request TEST1= (a, b) to the data server; the TEST1 is used for indicating the data server to return first TEST response data to the client;
if the first test response data is not received within the second duration delta T2, the client is set to be in a second state; delta T2 is less than Delta T1;
the client in the second state is used for executing the following method:
generating a second data acquisition request A2= (a, c, data 1) according to the first data acquisition request A1; wherein, c is the identification information of the proxy server;
sending A2 to the proxy server;
receiving first response data returned by the proxy server;
the proxy server is used for executing the following method:
generating a third data acquisition request A3= (c, b, data 1) according to the second data acquisition request A2;
sending A3 to a data server;
receiving first response data returned by the data server;
and returning the first response data to the client.
Compared with the prior art, the data processing system for network disaster recovery provided by the invention has obvious beneficial effects, can achieve considerable technical progress and practicability by virtue of the technical scheme, has wide industrial utilization value, and at least has the following beneficial effects:
when the client side sends A1 to the data server to obtain the first response data, if the first response data is not received in delta T1, TEST1 is sent to the data server, if the first TEST response data is not received in delta T2, the client side is set to be in the second state, at the moment, the client side can obtain the first response data from the data server through the proxy server, the client side does not need to be adjusted to change the identification information of the client side, time is saved, and the efficiency of the client side for obtaining data from the data server can be improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a client in a first state according to an embodiment of the present invention.
Fig. 2 is a flowchart of a client in a second state according to an embodiment of the present invention.
Fig. 3 is a flowchart of a proxy server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a data processing system for network disaster tolerance, which comprises a client, a data server and a proxy server, wherein the data server and the proxy server are both connected with the client; the client has a first state and a second state, and the initial state of the client is the first state.
The client in the first state is used to execute step S100, such as the flowchart of the client in the first state shown in fig. 1, where step S100 includes the following steps:
in step S110, in response to a click operation by the user, a first data acquisition request A1= (a, b, data 1) is generated.
The data server comprises a data server and a data server, wherein a is identification information of the client, b is identification information of the data server, data1 is first request data, A1 is used for indicating the data server to return first response data to the client, and the first response data correspond to the data 1.
In a possible implementation manner, the client may be set as an electronic device such as a mobile phone or a computer, an application program is installed in the client, and a user performs a click operation on the application program of the client in the first state, so that the click operation may obtain a response, that is, A1 may be generated in the client, where A1 carries identification information of a sender corresponding to A1, identification information of a receiver corresponding to A1, and first request data, that is, A1= (a, b, data 1), and the data1 is used to instruct the data server to determine the first response data corresponding to A1.
Step S120, A1 is sent to the data server.
In a possible implementation manner, after the client in the first state generates A1, A1 may be sent to the data server according to the identification information b of the receiving party in A1.
Step S130, if the first response data is not received within the first duration Δ T1, sending a first TEST request TEST1= (a, b) to the data server; the TEST1 is used for instructing the data server to return first TEST response data to the client.
In a possible implementation manner, a time point when the client in the first state sends A1 to the data server may be used as a first judgment time point; after the client in the first state sends A1 to the data server, it may be determined whether the first response data is received within Δ T1 that takes the first determination time point as a time starting point; if the client in the first state receives the first response data in the delta T1, the client is identified as equipment allowing to access the data server by the data server, namely the client normally receives the first response data sent by the data server according to A1; and if the client in the first state does not receive the first response data in the delta T1, the client generates a TEST1 and sends the TEST1 to the data server.
Step S140, if the first test response data is not received within the second time length Delta T2, the client is set to be in a second state; Δ T2 < Δ T1.
In one possible implementation, a time point when the client in the first state sends TEST1 to the data server may be used as the second judgment time point; after the client in the first state sends TEST1 to the data server, it may be determined whether the first response TEST data is received within Δ T2 with the second determination time point as a time starting point.
If the first test response data is received in the Δ T2, it indicates that the client is identified by the data server as a device which allows access to the data server, and the first response data is not received in the Δ T1, which is caused by network delay of the client or other reasons, and at this time, the working state of the client does not need to be switched, and the user can obtain the first response data by performing a page refresh operation on an application program of the client.
If the first test response data is not received within Δ T2, it indicates that the client is identified by the data server as a device that is prohibited from accessing the data server, and at this time, the client may be switched to the second state.
The client in the second state is configured to execute step S200, as shown in the flowchart of the client in the second state in fig. 2, where step S200 includes the following steps:
in step S210, a second data acquisition request A2= (a, c, data 1) is generated according to the first data acquisition request A1.
Wherein c is identification information of the proxy server.
In a possible implementation manner, after the client switches to the second state, data1 may be obtained from A1, and A2 is generated according to the identification information of the sender corresponding to A2, the identification information of the receiver corresponding to A2, and data1, that is, A2= (a, c, data 1) is obtained.
Step S220, sending A2 to the proxy server.
In a possible implementation manner, after the client in the second state generates A2, A2 may be sent to the proxy server according to the identification information c of the receiving party in A2.
Step S230, receiving the first response data returned by the proxy server.
In a possible implementation manner, the proxy server is a device that is identified by the data server as allowing access, and after the client in the second state sends A2 to the proxy server, the proxy server may determine first response data corresponding to data1 in A2 and return the first response data to the client in the second state, at which time the client in the second state may receive the first response data.
The proxy server is configured to execute step S300, which is a flowchart of the proxy server shown in fig. 3, and step S300 includes the following steps:
in step S310, a third data acquisition request A3= (c, b, data 1) is generated according to the second data acquisition request A2.
In a possible implementation manner, after the proxy server receives A2 sent by the client in the second state, data1 in the A2 may be acquired, and A3 is generated according to the identification information of the sender corresponding to the A3, the identification information of the receiver corresponding to the A3, and the data1, that is, A3= (c, b, data 1) is obtained.
Step S320, sending A3 to the data server.
In a possible implementation manner, after the proxy server generates A3, A3 may be sent to the data server according to the identification information b of the receiving party in A3.
Step S330, receiving the first response data returned by the data server.
In a possible implementation manner, after the proxy server sends A3 to the data server, the data server may determine first response data corresponding to data1 in A3 and return the first response data to the proxy server, and at this time, the proxy server may obtain the first response data.
Step S340, returning the first response data to the client.
In a possible implementation manner, after the proxy server obtains the first response data, the first response data may be returned to the client according to the sender identifier a in A2.
Therefore, when the client sends A1 to the data server to obtain the first response data, if the first response data is not received within Δ T1, the TEST1 is sent to the data server, and if the first TEST response data is not received within Δ T2, the client is set to the second state.
In addition, when the first response data corresponding to the A1 is not received in the delta T1, the TEST1 with smaller data volume is sent to the data server, whether the data server identifies the client as the equipment which is prohibited from accessing or not is quickly verified, the possibility that the client does not receive the first response data corresponding to the A1 but the data server identifies the client as the equipment which is permitted to access the data server can be reduced, unnecessary use of the proxy server can be reduced, and the operating pressure of the proxy server is reduced.
Optionally, step S200 includes the following specific processes:
setting a time point at which the setting of the client to the second state is performed as a first switching time point T1;
acquiring a second switching time point T2= T1+ Δ T3; wherein Δ T3 is a preset third duration;
starting from T2, periodically sending TEST1 to a data server; periodically sending a time period corresponding to TEST1 to a data server, wherein the time period is delta T3;
after sending the TEST1 each time, if the first TEST response data is received within the Δ T2, the client is set to the first state.
In a possible implementation manner, after the client is switched from the first state to the second state, T2 may be reached after Δ T3, at this time, the client in the second state may periodically send TEST1 to the data server, and after sending TEST1 to the data server each time, it may be determined whether the first TEST response data is received within Δ T2; if the first TEST response data is received, the client is identified as equipment allowing access to the data server by the data server, so that the client can be set to be in a first state, and the periodic sending of TEST1 to the data server is finished; if the first TEST response data is not received, the client is identified as the equipment which is forbidden to access the data server by the data server, and the TEST1 can be sent to the data server when the node arrives in the next period.
Therefore, after the client is switched from the first state to the second state, the client in the second state can periodically verify whether the data server can be accessed, the possibility that the client is switched to the second state due to misjudgment and continuously works in the second state is reduced, the utilization rate of the proxy server is reduced, and the operating pressure of the proxy server is further reduced.
Optionally, the number of the clients is multiple, and based on this, Δ T3 may be determined by:
acquiring the bandwidth Wid of the proxy server and the number Num of the clients;
acquiring a test duration set TIME = (t) 1 ,t 2 ,t 3 ,...,t n ) (ii) a Wherein,t i For the ith test duration, i =1,2,3 1 K (= K (× Wid)/(β × Num), K is a preset coefficient, alpha is a first correction coefficient, beta is a second correction coefficient, t i+1 =γ*t i Gamma is a proportionality coefficient, k1 is more than 0 and less than or equal to k2 and less than 1, k1 is a first constant, and k2 is a second constant;
sequentially carrying out n times of test processing to obtain an error number set M = (M) 1 ,m 2 ,m 3 ,...,m n ) (ii) a Wherein m is i The ith test processing is the error times of the proxy server in the process of carrying out the ith test processing, and the ith test processing is the control client side with t i Operating the second state for Δ T3 and maintaining for a fourth duration;
obtaining the minimum number m min = min (M), min () is a preset minimum function;
if m is min Corresponding to a test duration, m is added min The corresponding test duration is taken as delta T3;
if m min Corresponding to a plurality of test time lengths, m is added min The smallest test duration of the corresponding plurality of test durations is taken as Δ T3.
Each error frequency is the frequency of abnormal operation of the proxy server due to simultaneous processing of more data in the process of performing the corresponding test processing, for example, in the process of one test processing, the frequency of downtime and the frequency of downtime of the proxy server are 10, and the error frequency of the test processing is 10.
In one possible implementation, t may be based on 1 K = (α × (Wid)/(β × Num) and t i+1 =γ*t i Determining a test TIME set TIME, performing test processing once according to each test TIME, obtaining an error TIME set M through n test processing, and determining the minimum error TIME M in M min If m is min Corresponding to one test duration in M, determining the delta T3 of the data processing system as M min Corresponding test duration, if m min Corresponding to a plurality of test durations in M, determining Δ T3 of the data processing system as M min A minimum test duration of the corresponding plurality of test durations.
Preferably, wid =10 mega and Num =300 ten thousand, based on which t can be determined 1 The time is 180 seconds, after multiple test processes, it can be finally determined that Δ T3 of the data processing system is 15 seconds, and during the operation of the data processing system with Δ T3 of 15 seconds, the proxy server rarely runs abnormally due to the fact that more data are processed simultaneously.
Therefore, a more reasonable specific value can be determined for the delta T3 of the data processing system through multiple times of test processing, and the occurrence of abnormal operation of the proxy server due to simultaneous processing of more data is reduced.
Optionally, k1 is more than or equal to 0.4 and less than or equal to 0.6, and k2 is more than or equal to 0.6 and less than or equal to 0.8.
Further, 0.4. Ltoreq. Gamma. Ltoreq.0.8, preferably, gamma =0.6.
Therefore, when any one test processing is performed, because the Δ T3 corresponding to the current test processing is the product of the Δ T3 corresponding to the last test processing and γ, and further setting γ to 0.6 can make the difference between the Δ T3 corresponding to the current test processing and the Δ T3 corresponding to the last test processing more reasonable, the possibility of performing different test processing based on very similar Δ T3 can be reduced, the possibility of performing invalid test processing can be reduced, and the efficiency of determining Δ T3 is improved; meanwhile, as the number of times of test processing increases, the difference between the Δ T3 corresponding to the current test processing and the Δ T3 corresponding to the previous test processing gradually decreases, that is, the test processing for a large number of times can be performed under the condition of more fully utilizing the proxy server, so that when the data processing system operates by using the finally determined Δ T3, the proxy server can be more fully utilized under the condition of less abnormality of the proxy server.
Optionally, A1 and TEST1 are both generated and sent according to the first communication protocol, and based on this, step S100 executed by the client in the first state further includes the following specific processing:
if the first response data is not received within the first time length delta T1, generating a second TEST request TEST2= (a, b) according to TEST1 and a second communication protocol; the second communication protocol is different from the first communication protocol; the TEST2 is used for indicating the data server to return second TEST response data to the client;
sending TEST2 to a data server;
based on this, the above step S140 includes the following specific processing:
after the TEST1 and the TEST2 are sent, if the first TEST response data and the second TEST response data are not received within the second duration delta T2, the client is set to be in a second state;
based on this, step S200 executed by the client in the second state further includes the following specific processes:
starting from T2, periodically sending TEST2 to the data server; periodically sending a time period corresponding to TEST2 to a data server, wherein the time period is delta T3;
after sending the TEST1 each time, if the first TEST response data is received in the Δ T2, setting the client to the first state, including:
after sending TEST1 and TEST2 each time, if the first TEST response data or the second TEST response data is received in Δ T2, the client is set to the first state.
In one possible embodiment, A1, A2, and TEST1 are all generated and transmitted according to a first communication protocol, and TEST2 is all generated and transmitted according to a second communication protocol, where the first communication protocol and the second communication protocol are different. Preferably, the first communication Protocol may adopt a hypertext Transfer Protocol (HTTP), and the second communication Protocol may adopt an Internet Control Message Protocol (ICMP), based on which:
if the client in the first state does not receive the first response data within the Δ T1, the client sends the TEST1 to the data server and also sends the TEST2 to the data server, the time point when the client in the first state sends the TEST1 and the TEST2 to the data server may be taken as a second determination time point, and then it may be determined whether the first TEST response data and the second TEST response data are received within the Δ T2 taking the second determination time point as a time starting point; if the first test response data or the second test response data is received in the delta T2, the client is identified as equipment allowing to access the data server by the data server, at the moment, the working state of the client does not need to be switched, and the user can obtain the first response data by performing page refreshing operation on an application program of the client; if the first test response data is not received within Δ T2 and the second test response data is not received within Δ T2, it indicates that the client is identified by the data server as a device that is prohibited from accessing the data server, and the client may be switched to the second state.
Similarly, the client in the second state periodically sends TEST1 to the data server and also periodically sends TEST2 to the data server from T2, and the time period corresponding to the periodic sending of TEST2 to the data server is the same as the time period corresponding to the periodic sending of TEST1 to the data server; after each transmission of the TEST1 and the TEST2 to the data server, it may be judged whether the first TEST response data and the second TEST response data are received within Δ T2 that takes a time point of the transmission of the TEST1 and the TEST2 as a time starting point; if the first TEST response data or the second TEST response data is received in the delta T2, the client is identified as equipment allowing to access the data server by the data server, the client can be set to be in the first state, and the periodic sending of the TEST1 to the data server and the periodic sending of the TEST2 to the data server are finished; if the first TEST response data is not received and the second TEST response data is not received in the delta T2, the client is identified as the equipment which is forbidden to access the data server by the data server, and the TEST1 and the TEST2 can be sent to the data server after the node arrives in the next period.
Therefore, the TEST1 is generated and sent according to the first communication protocol, the TEST2 is generated and sent according to the second communication protocol, when the client is verified whether to be identified by the data server as the equipment which is forbidden to access the data server, the TEST1 and the TEST2 corresponding to different communication protocols are sent at the same time, the verification result can be obtained as long as the TEST response data corresponding to any request of the TEST1 and the TEST2 is received, and the efficiency of the client for switching the working state can be further improved.
Optionally, the maximum response period corresponding to TEST1 is Δ T4, and Δ T4 is less than Δ T2; the maximum response period corresponding to TEST2 is delta T5, and delta T2 is more than delta T2 and less than or equal to delta T5 and is more than or equal to delta T2+ delta T3; wherein, Δ T4 is a maximum time interval from a time point of sending the TEST1 to a time point of receiving the corresponding first TEST response data; Δ T5 is a maximum time interval from a time point of sending the TEST2 to a time point of receiving the corresponding second TEST response data; based on this, the step S200 further includes the following specific processing:
after the client is set to the second state, starting with the setting of the client to the second state, if second test response data is received within Δ T3, the client is set to the first state.
In a possible embodiment, in the case that the client is identified by the data server as a device that allows access to the data server, the time interval from the time the client sends TEST1 to the time the client receives the corresponding first TEST response data may vary according to the current operating conditions of the client and the data server, and similarly, the time interval from the time the client sends TEST2 to the time the client receives the corresponding second TEST response data may also vary according to the current operating conditions of the client and the data server, based on which:
if the client in the first state does not receive the first TEST response data due to the loss of the TEST1 transmission within the second duration Δ T2, and does not receive the second TEST response data due to the response timeout of the TEST2, the working state of the client may be switched to the second state, at this time, it may be determined whether the second TEST response data corresponding to the TEST2 is received within Δ T3, and if the second TEST response data is received, it is indicated that the client is identified as a device that allows access to the data server, at this time, the working state of the client may be switched to the first state, so the client may be switched to the first state more quickly, the usage rate of the proxy server may be reduced, and the operating pressure of the proxy server may be further reduced.
Optionally, the identification information is set as an IP address, and based on this, the data server is configured to perform the following specific processing:
receiving A1;
judging whether a in A1 belongs to a preset IP set or not;
and if not, returning the first response data to the client.
In one possible implementation, the identification information may be set as an IP address, and a corresponds to the IP address of the client, b corresponds to the IP address of the data server, and c corresponds to the IP address of the proxy server. The data server may receive A1= (a, b, data 1), determine whether a in A1 belongs to a preset IP set, and if not, determine first response data according to the data1 in A1 and return the first response data to the client. Wherein a does not belong to the preset IP set, that is, a is the IP address identified by the data server as meeting the preset rule.
Optionally, a blacklist is set in the data server, and the blacklist is used to store identification information for prohibiting access to the data server, and based on this, the data server is further configured to perform the following specific processing:
if the IP set belongs to the IP set, a is added to a blacklist.
In one possible embodiment, if the IP address belongs to the IP set, i.e. a is identified by the data server as an IP address meeting the preset rule, a is added to the blacklist. For example, if a is recognized by the data server as a foreign IP address or an IP address with a high degree of disclosure, etc., a is added to the blacklist.
Optionally, the step S200 is further configured to execute the following specific processing:
in response to a click operation of a user, generating a fourth data acquisition request A4= (a, c, data 2); wherein, data2 is the second request data;
sending A4 to the proxy server;
receiving second response data returned by the proxy server; the second response data corresponds to data 2.
In a possible implementation manner, a user performs a click operation on an application program of a client in a second state, and the click operation may obtain a response, that is, A4 may be generated in the client, where A4 carries identification information of a sender corresponding to A4, identification information of a receiver corresponding to A4, and second request data, that is, A4= (a, c, data 2), data2 is used to instruct the data server to determine second response data corresponding to A4, then A4 is sent to the proxy server according to identification information c of the receiver in A4, and finally, second response data determined from the data server and returned by the proxy server may be received.
Optionally, the proxy server is further configured to perform the following specific processing:
according to the fourth data acquisition request A4, generating a fifth data acquisition request A5= (c, b, data 2);
sending A5 to a data server;
receiving second response data returned by the data server;
and returning the second response data to the client.
In a possible implementation manner, after the proxy server receives A4 sent by the client in the second state, data2 in the A4 may be acquired, and A5 is generated according to the identification information of the sender corresponding to the A5, the identification information of the receiver corresponding to the A5, and data2, that is, A5= (c, b, data 2) is obtained, then, the A5 may be sent to the data server according to the identification information b of the receiver in the A5, the data server may determine second response data corresponding to the data2 in the A5, and return the second response data to the proxy server, and the proxy server may return the second response data to the client according to the sender identification a in the A4.
Although some specific embodiments of the present invention have been described in detail by way of example, it should be understood by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the invention. It will also be appreciated by those skilled in the art that various modifications may be made to the embodiments without departing from the scope and spirit of the invention. The scope of the invention is defined by the appended claims.

Claims (9)

1. A data processing system for network disaster tolerance is characterized by comprising a client, a data server and a proxy server, wherein the data server and the proxy server are both connected with the client, and the data server is connected with the proxy server; the client has a first state and a second state, and the initial state of the client is the first state;
the client in the first state is used for executing the following method:
generating a first data acquisition request A1= (a, b, data 1) in response to a clicking operation of a user; the method comprises the following steps that a is identification information of a client, b is identification information of a data server, data1 is first request data, A1 is used for indicating the data server to return first response data to the client, and the first response data correspond to the data 1;
sending A1 to the data server;
if the first response data is not received within a first time length delta T1, sending a first TEST request TEST1= (a, b) to the data server; the TEST1 is used for instructing the data server to return first TEST response data to the client;
if the first test response data is not received within a second time length delta T2, setting the client to be in the second state; delta T2 is less than Delta T1;
the client in the second state is used for executing the following method:
generating a second data acquisition request A2= (a, c, data 1) according to the first data acquisition request A1; wherein, c is the identification information of the proxy server;
sending A2 to the proxy server;
receiving the first response data returned by the proxy server;
the proxy server is used for executing the following method:
according to the second data acquisition request A2, generating a third data acquisition request A3= (c, b, data 1);
sending A3 to the data server;
receiving the first response data returned by the data server;
and returning the first response data to the client.
2. The system of claim 1, wherein the client in the second state is further configured to perform the following method:
setting the client to the second state as a first switching time point T1;
acquiring a second switching time point T2= T1+ Δ T3; wherein, Δ T3 is a preset third duration;
starting from T2, periodically sending TEST1 to the data server; the time period corresponding to the periodical sending of the TEST1 to the data server is delta T3;
and after sending the TEST1 each time, if the first TEST response data is received in the delta T2, setting the client to be in the first state.
3. The system of claim 2, wherein the client is plural;
Δ T3 is determined by the following method:
acquiring the bandwidth Wid of the proxy server and the number Num of the clients;
obtaining a test duration set TIME = (t) 1 ,t 2 ,t 3 ,...,t n ) (ii) a Wherein, t i For the ith test duration, i =1,2,3 1 K (= K (× Wid)/(β × Num), K is a preset coefficient, alpha is a first correction coefficient, beta is a second correction coefficient, t i+1 =γ*t i Gamma is a proportionality coefficient, gamma is more than 0 and less than or equal to k1 and less than or equal to k2 and less than 1, k1 is a first constant, k2 is a second constant, k1 is more than or equal to 0.4 and less than or equal to 0.6, k2 is more than or equal to 0.6 and less than or equal to 0.8, and gamma is more than or equal to 0.4 and less than or equal to 0.8;
sequentially carrying out n times of test processing to obtain an error number set M = (M) 1 ,m 2 ,m 3 ,...,m n ) (ii) a Wherein m is i The ith test processing is to control the client to use t as the error frequency of the proxy server in the process of the ith test processing i Operating the second state for Δ T3 and maintaining for a fourth duration;
obtaining the minimum number m min = min (M), min () is a preset minimum function;
if m min Corresponding to a test duration, then m is set min The corresponding test duration is taken as delta T3;
if m is min Corresponding to a plurality of test duration, then m is min The smallest test duration of the corresponding plurality of test durations is taken as Δ T3.
4. The system of claim 2, wherein A1 and TEST1 are both generated and transmitted according to a first communication protocol;
the client in the first state, if the first response data is not received within the first duration Δ T1, is further configured to perform the following method:
generating a second TEST request TEST2= (a, b) according to TEST1 and a second communication protocol; the second communication protocol is different from the first communication protocol; the TEST2 is used for indicating the data server to return second TEST response data to the client;
sending TEST2 to the data server;
if the first test response data is not received within the second time length delta T2, setting the client to be in the second state, including:
after sending the TEST1 and the TEST2, if the first TEST response data and the second TEST response data are not received within a second time length delta T2, setting the client to be in the second state;
the client in the second state, starting from T2, is further configured to perform the following method:
sending TEST2 to the data server periodically; the time period corresponding to the periodical sending of the TEST2 to the data server is delta T3;
after sending the TEST1 each time, if the first TEST response data is received within Δ T2, setting the client to the first state, including:
and after sending the TEST1 and the TEST2 each time, if the first TEST response data or the second TEST response data is received in the delta T2, setting the client to be in the first state.
5. The system of claim 4, wherein TEST1 corresponds to a maximum response period of Δ T4, Δ T4 < Δ T2; the maximum response period corresponding to TEST2 is delta T5, and delta T2 is more than delta T2 and less than or equal to delta T5 and is more than or equal to delta T2+ delta T3; wherein, Δ T4 is a maximum time interval from a time point of sending the TEST1 to a time point of receiving the corresponding first TEST response data; Δ T5 is the maximum time interval from the time point of sending the TEST2 to the time point of receiving the corresponding second TEST response data;
the client in the second state is further used for executing the following method after the client is set to the second state:
and starting from the setting of the client to the second state, if the second test response data is received within delta T3, setting the client to the first state.
6. The system of claim 1, wherein the identification information is an IP address;
the data server is used for executing the following method:
receiving A1;
judging whether a in A1 belongs to a preset IP set or not;
and if the first response data does not belong to the IP set, returning the first response data to the client.
7. The system according to claim 6, wherein a blacklist is provided in the data server, the blacklist being used for storing identification information for prohibiting access to the data server;
the data server is further configured to perform the following method:
and if the IP set belongs to the IP set, adding a to the blacklist.
8. The system of claim 1, wherein the client in the second state is further configured to perform the following method:
in response to a click operation of a user, generating a fourth data acquisition request A4= (a, c, data 2); wherein data2 is second request data;
sending the A4 to the proxy server;
receiving second response data returned by the proxy server; the second response data corresponds to data 2.
9. The system of claim 8, wherein the proxy server is further configured to perform the following method:
according to the fourth data acquisition request A4, generating a fifth data acquisition request A5= (c, b, data 2);
sending A5 to the data server;
receiving the second response data returned by the data server;
and returning the second response data to the client.
CN202210988941.5A 2022-08-17 2022-08-17 Data processing system for network disaster tolerance Active CN115065723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210988941.5A CN115065723B (en) 2022-08-17 2022-08-17 Data processing system for network disaster tolerance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210988941.5A CN115065723B (en) 2022-08-17 2022-08-17 Data processing system for network disaster tolerance

Publications (2)

Publication Number Publication Date
CN115065723A CN115065723A (en) 2022-09-16
CN115065723B true CN115065723B (en) 2022-11-04

Family

ID=83207359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210988941.5A Active CN115065723B (en) 2022-08-17 2022-08-17 Data processing system for network disaster tolerance

Country Status (1)

Country Link
CN (1) CN115065723B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012155629A1 (en) * 2011-07-21 2012-11-22 中兴通讯股份有限公司 Network disaster recovery method and system
CN110209505A (en) * 2019-03-06 2019-09-06 腾讯科技(深圳)有限公司 A kind of data request method and relevant device
CN110493318A (en) * 2019-07-23 2019-11-22 北京字节跳动网络技术有限公司 Processing method, device, medium and the equipment of HTTP request information
CN114008994A (en) * 2019-06-18 2022-02-01 微软技术许可有限责任公司 Network server request identification
CN114039883A (en) * 2021-11-12 2022-02-11 北京天融信网络安全技术有限公司 Agent testing method and device, electronic equipment and storage medium
CN114676030A (en) * 2020-12-24 2022-06-28 网联清算有限公司 System test method, device, proxy server equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8560604B2 (en) * 2009-10-08 2013-10-15 Hola Networks Ltd. System and method for providing faster and more efficient data communication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012155629A1 (en) * 2011-07-21 2012-11-22 中兴通讯股份有限公司 Network disaster recovery method and system
CN102891833A (en) * 2011-07-21 2013-01-23 中兴通讯股份有限公司 Network disaster tolerance method and network disaster tolerance system
CN110209505A (en) * 2019-03-06 2019-09-06 腾讯科技(深圳)有限公司 A kind of data request method and relevant device
CN114008994A (en) * 2019-06-18 2022-02-01 微软技术许可有限责任公司 Network server request identification
CN110493318A (en) * 2019-07-23 2019-11-22 北京字节跳动网络技术有限公司 Processing method, device, medium and the equipment of HTTP request information
CN114676030A (en) * 2020-12-24 2022-06-28 网联清算有限公司 System test method, device, proxy server equipment and storage medium
CN114039883A (en) * 2021-11-12 2022-02-11 北京天融信网络安全技术有限公司 Agent testing method and device, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于代理的并行文件系统元数据优化与实现;易建亮等;《计算机研究与发展》;20180215(第02期);第214-222页 *

Also Published As

Publication number Publication date
CN115065723A (en) 2022-09-16

Similar Documents

Publication Publication Date Title
CN100365977C (en) Load balancing method and system of servers in a cluster
CN111343045B (en) Method and device for adjusting heartbeat frequency
CN108616429B (en) reconnection method and device for push service
CN114629822B (en) Link detection method, device, electronic equipment and storage medium
CN109327544B (en) Leader node determination method and device
CN111510325B (en) Alarm information pushing method, server, client and system
CN108183950A (en) A kind of network equipment establishes the method and device of connection
CN110896382B (en) Flow control method, apparatus, device and computer readable storage medium
CN108260150B (en) Network communication problem judgment processing method and device
CN106341270B (en) A kind of fault handling method and device
CN106797330B (en) Method, Traffic Monitor (TM), Request Router (RR) and system for monitoring a Content Delivery Network (CDN)
CN112866062B (en) Distributed pressure test system, method, device, equipment and storage medium
CN107465453A (en) A kind of ONT Optical Network Terminal and its method of work and communication system
CN115065723B (en) Data processing system for network disaster tolerance
CN110048906A (en) A kind of method, system, device and server judging node-node transmission quality
CN112004161B (en) Address resource processing method and device, terminal equipment and storage medium
CN111083016B (en) Polling table processing method and device, storage medium and equipment
CN115002195B (en) Service registration discovery method, system and medium of self-adaptive peer-to-peer mode
CN108737460B (en) Connection processing method and client
CN116545840A (en) Communication mode determining method and device
CN110460486A (en) The monitoring method and system of service node
CN109327398B (en) Method and device for preventing packet loss
CN110881213A (en) Method and system for transmitting network test process information
CN111580961A (en) Access request processing method, device, server and storage medium
CN111641698B (en) Data statistical method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant