CN116436912A - Source return method, apparatus, device and computer readable storage medium - Google Patents

Source return method, apparatus, device and computer readable storage medium Download PDF

Info

Publication number
CN116436912A
CN116436912A CN202210001507.3A CN202210001507A CN116436912A CN 116436912 A CN116436912 A CN 116436912A CN 202210001507 A CN202210001507 A CN 202210001507A CN 116436912 A CN116436912 A CN 116436912A
Authority
CN
China
Prior art keywords
access request
determining
identification information
request
domain name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210001507.3A
Other languages
Chinese (zh)
Inventor
蒲文宾
年彦东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Cloud Network Technology Co Ltd
Original Assignee
Beijing Kingsoft Cloud Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Cloud Network Technology Co Ltd filed Critical Beijing Kingsoft Cloud Network Technology Co Ltd
Priority to CN202210001507.3A priority Critical patent/CN116436912A/en
Publication of CN116436912A publication Critical patent/CN116436912A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure relates to a back source method, apparatus, device, and computer readable storage medium. The source returning method comprises the following steps: receiving an access request sent by a client; determining whether the access request is a preset request; if the access request is a preset request, determining identification information corresponding to the access request; determining a routing strategy associated with the identification information according to the identification information; and acquiring target resources corresponding to the access requests according to the routing strategies, so that the purpose of acquiring resources according to different access requests back to different source stations is realized.

Description

Source return method, apparatus, device and computer readable storage medium
Technical Field
The present disclosure relates to the field of information technologies, and in particular, to a source returning method, apparatus, device, and computer readable storage medium.
Background
The content delivery network (Content Delivery Network, CDN) is an intelligent virtual network built on top of an existing network that includes edge servers deployed throughout the site. In addition, the network enables the user to obtain required resources nearby through load balancing, content distribution, scheduling and other functional modules, reduces network congestion, and improves response speed and hit rate of resource requests.
More and more CDN users (CDN users refer to providers or maintenance personnel of network resources, not internet users, who may be understood as personnel providing network resources to internet users) want CDNs to support acquiring resources back to different source stations according to different access request conditions. However, the present CDN cannot meet the needs of CDN users.
Disclosure of Invention
In order to solve the above technical problems or at least partially solve the above technical problems, the present disclosure provides a source returning method, apparatus, device and computer readable storage medium, which achieve the purpose of obtaining resources from different source stations according to different access requests.
In a first aspect, an embodiment of the present disclosure provides a source-back method, applied to a first server, where the source-back method includes:
receiving an access request sent by a client;
determining whether the access request is a preset request;
if the access request is a preset request, determining identification information corresponding to the access request;
determining a routing strategy associated with the identification information according to the identification information;
and acquiring a target resource corresponding to the access request based on the routing strategy.
Optionally, the determining whether the access request is a preset request includes:
reading a domain name configuration file;
determining whether the acceleration domain name for which the access request is directed is a domain name in the domain name configuration file;
and if the accelerated domain name is a domain name in the domain name configuration file, determining that the access request is a preset request.
Optionally, the determining, according to the access request, identification information corresponding to the access request includes:
determining an acceleration domain name for which the access request is directed;
determining condition information of the access request;
and generating the identification information according to the accelerated domain name and the condition information.
Optionally, the condition information includes at least one of: uniform resource locator, request parameters, and request frame header information.
Optionally, the determining, according to the identification information, a routing policy associated with the identification information includes:
determining a target file according to the acceleration domain name;
determining a routing strategy taking the identification information as key information in the target file;
and determining the routing strategy taking the identification information as key information as the routing strategy associated with the identification information.
Optionally, after the receiving the access request sent by the client, before determining whether the access request is a preset request, the method further includes:
determining whether a cache resource corresponding to the access request exists;
and if the cache resource corresponding to the access request exists, feeding back the cache resource to the client.
Optionally, the first server is a content distribution network node.
In a second aspect, an embodiment of the present disclosure provides a source return apparatus, including:
the receiving module is used for receiving the access request sent by the client;
the first determining module is used for determining whether the access request is a preset request or not;
the second determining module is used for determining identification information corresponding to the access request if the access request is a preset request;
a third determining module, configured to determine a routing policy associated with the identification information according to the identification information;
and the acquisition module is used for acquiring the target resource corresponding to the access request based on the routing strategy.
Optionally, the first determining module includes: the reading unit is used for reading the domain name configuration file; a first determining unit, configured to determine whether an acceleration domain name for which the access request is directed is a domain name in the domain name configuration file; and the second determining unit is used for determining that the access request is a preset request if the accelerated domain name is a domain name in the domain name configuration file.
Optionally, the second determining module includes: a third determining unit, configured to determine an acceleration domain name for which the access request is directed; a fourth determining unit configured to determine condition information of the access request; and the generating unit is used for generating the identification information according to the accelerated domain name and the condition information.
Optionally, the condition information includes at least one of: uniform resource locator, request parameters, and request frame header information.
Optionally, the third determining module includes: a fifth determining unit, configured to determine a target file according to the acceleration domain name; a sixth determining unit, configured to determine a routing policy that uses the identification information as key information in the target file; a seventh determining unit, configured to determine a routing policy that uses the identification information as key information as a routing policy associated with the identification information.
Optionally, the method further comprises: a fourth determining module, configured to determine, after receiving an access request sent by a client, whether a cache resource corresponding to the access request exists before determining whether the access request is a preset request; and the feedback module is used for feeding back the cache resources to the client if the cache resources corresponding to the access request exist.
Optionally, the first server is a content distribution network node.
In a third aspect, an embodiment of the present disclosure provides a source-return device, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method according to the first aspect.
In a fourth aspect, embodiments of the present disclosure provide a computer-readable storage medium having stored thereon a computer program for execution by a processor to implement the method of the first aspect.
The source returning method, the device, the equipment and the computer readable storage medium provided by the embodiment of the disclosure determine whether the access request is a preset request or not when the access request is received, namely determine whether the access request is a request for source returning according to conditions, if the access request is the preset request, determine corresponding identification information according to the access request, then determine an associated routing strategy according to the identification information, and finally determine a source returning path based on the routing strategy so as to find a designated source station according to the source returning path, acquire target resources corresponding to the access request from the designated source station, and achieve the purpose that different access requests return different source stations to acquire the target resources.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, the drawings that are required for the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a flowchart of a source return method provided in an embodiment of the present disclosure;
fig. 2 is a schematic diagram of an application scenario provided in an embodiment of the present disclosure;
fig. 3 is a schematic view of another application scenario provided in an embodiment of the present disclosure;
FIG. 4 is a schematic flow chart of another source returning method according to an embodiment of the disclosure;
FIG. 5 is a flowchart of another source-back method provided by an embodiment of the present disclosure;
FIG. 6 is a flowchart of another source-back method provided by an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a source return device according to an embodiment of the disclosure;
fig. 8 is a schematic structural diagram of another source return device according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the disclosure.
In general, in a CDN, network operators can obtain required resources nearby through policies such as load balancing and scheduling, so as to reduce network congestion and improve response speed and hit rate of resource requests. However, more and more CDN users (CDN users refer to providers or maintenance personnel of network resources, not internet users, and CDN users may understand that personnel providing network resources for internet users) want the CDN to support obtaining resources from different sources (a source may refer to a device storing a target resource, such as a server or a database) according to different access request conditions, so as to facilitate the CDN users to store the resources in isolation for different netizens. However, the present CDN cannot meet the needs of CDN users.
In view of the foregoing, embodiments of the present disclosure provide a source-back method, which is described below with reference to specific embodiments.
Fig. 1 is a flowchart of a source return method provided in an embodiment of the present disclosure. The method is applied to a first server, which may be an edge node in a CDN. As shown in fig. 1, the source returning method specifically comprises the following steps:
s101, receiving an access request sent by a client.
As shown in fig. 2, the client may be an application or a module in the terminal device 21, or the client may be the terminal device 21 itself. Specifically, the client may send an access request to the first server 22, where the access request is used to request access to a network resource, and in this embodiment, the network resource requested by the access request is referred to as a target resource.
S102, determining whether the access request is a preset request.
The preset request is, for example, a request returned by a condition. I.e. determining whether the currently received access request is a conditional back-to-source request.
In some embodiments, determining whether the access request is a preset request may be determined by the network operator sending the access request, e.g. the access request sent through the network of network operator a belongs to the preset request and the access request sent through the network of network operator B does not belong to the preset request.
In other embodiments, determining whether the access request is a preset request may be determined by the acceleration domain name for which the access request is directed, e.g., the access request for access acceleration domain name 1 belongs to the preset request, and the access request for access acceleration domain name 2 does not belong to the preset request.
If the access request is a preset request, determining a source return path for the access request according to a conditional source return strategy; if the access request is not the preset request, the access request is scheduled according to the existing scheduling strategies such as load balancing and the like, so that the netizens can acquire the target resource nearby, and the response speed and hit rate of the access request are improved.
S103, if the access request is a preset request, determining identification information corresponding to the access request.
The determining identification information corresponding to the access request according to the access request comprises the following steps: determining an acceleration domain name for which the access request is directed; determining condition information of the access request; and generating the identification information according to the accelerated domain name and the condition information.
If the acceleration domain names respectively aimed at by the two access requests are the same and the corresponding condition information is the same, the identification information corresponding to the two access requests is the same. If the acceleration domain names respectively aimed at by the two access requests are the same, but the respective condition information is different, the identification information corresponding to the two access requests is different. If the acceleration domain names for the two access requests are different, but the respective condition information is the same, the identification information corresponding to the two access requests is different. The unique identification information is generated aiming at the same acceleration domain name and the same condition information so as to support various conditions of coarse granularity and fine granularity of CDN users, and different conditions return to different source stations to acquire resources, so that the isolated storage of the resources is realized.
Optionally, the condition information includes at least one of: uniform resource locator, request parameters, and request frame header information.
S104, determining a routing strategy associated with the identification information according to the identification information.
Alternatively, the routing policy associated with the identification information may be pre-stored in a cache or local storage space of the first server. The routing policies associated with the identification information may be responsible for organization and distribution by the central server to the first server for ease of administration and maintenance.
In some embodiments, the back-source method further comprises: and receiving a strategy file sent by the central server, wherein the strategy file comprises a mapping relation between the identification information and the associated routing strategy. After the identification information corresponding to the access request is determined, the associated routing policy is matched from the policy file based on the identification information.
As shown in fig. 3, before the first server 22 receives the access request sent by the client, it receives the policy file issued by the central server 23 and caches the policy file. When the first server 22 receives an access request sent by a client, it determines whether the access request is a preset request, if the access request is a preset request, it determines identification information corresponding to the access request, and matches an associated routing policy from the cached policy file according to the identification information. The client may be an application or a module in the terminal device 21 or the client may be the terminal device 21 itself. Specifically, the client may send an access request to the first server 22, where the access request is used to request access to a network resource, and in this embodiment, the network resource requested by the access request is referred to as a target resource.
The routing policy may be the IP (Internet Protocol ) or URL (Uniform Resource Locator, uniform resource locator) of the source station.
S105, acquiring a target resource corresponding to the access request based on the routing strategy.
Specifically, the target resource corresponding to the access request is acquired from the source station specified by the routing strategy, so that the purpose that different request conditions return to different source stations to acquire the target resource is realized.
According to the technical scheme, when an access request is received, whether the access request is a preset request or not is determined, namely whether the access request is a request for returning to a source according to conditions is determined, if the access request is the preset request, corresponding identification information is determined according to the access request, then an associated routing strategy is determined according to the identification information, finally a returning source path is determined based on the routing strategy, a designated source station is found according to the returning source path, target resources corresponding to the access request are obtained from the designated source station, and the purpose that different access requests return to different source stations to obtain the target resources is achieved.
Fig. 4 is a flowchart of another source-returning method according to an embodiment of the present disclosure. The embodiment provides a specific implementation manner for the step S102 "determining whether the access request is a preset request". As shown in fig. 4, the method specifically comprises the following steps:
s401, receiving an access request sent by a client.
S402, reading a domain name configuration file, and determining whether an acceleration domain name aimed by the access request is a domain name in the domain name configuration file.
S403, if the acceleration domain name is a domain name in the domain name configuration file, determining that the access request is a preset request.
Wherein, the domain name configuration file can be a file for establishing an acceleration domain name participating in the conditional back source, and the domain name configuration file comprises a list of the acceleration domain names participating in the conditional back source. When an access request sent by a client is received, determining whether an acceleration domain name aimed by the access request is one of domain name configuration files, if so, determining that the acceleration domain name aimed by the access request is a preset domain name, namely that the access request belongs to a request of a conditional back source.
The domain name profile may be issued in advance to the first server by the central server, which is responsible for sorting the domain name profile to facilitate association of acceleration domain names participating in the conditional back source, e.g., adding new acceleration domain names, deleting old acceleration domain names, etc.
S404, determining a routing strategy associated with the identification information according to the identification information.
S405, acquiring a target resource corresponding to the access request according to the routing strategy.
The source returning method provided in this embodiment provides a specific implementation manner for determining whether the access request is a preset request in the step S102, specifically, when the access request sent by the client is received, a domain name configuration file is read, where the domain name configuration file includes a list of acceleration domain names participating in source returning according to conditions, and it is determined whether the acceleration domain name targeted by the access request is a domain name in the list, if yes, it is determined that the acceleration domain name targeted by the access request is a preset domain name, then it is further determined that identification information of the access request is further determined, so as to determine an associated routing policy according to the identification information, and finally, source stations specified according to the routing policy perform source returning. The purpose of returning to the source according to the condition is realized.
Fig. 5 is a flowchart of another source-returning method according to an embodiment of the present disclosure. The present embodiment provides a specific implementation manner for the step S104 "determining the routing policy associated with the identification information according to the identification information". As shown in fig. 5, the method specifically comprises the following steps:
s501, receiving an access request sent by a client, determining whether the access request is a preset request, and if the access request is the preset request, determining an acceleration domain name and condition information for the access request.
S502, generating identification information according to the accelerated domain name and the condition information.
S503, determining a target file according to the acceleration domain name aimed at by the access request, and determining a routing strategy taking the identification information as key information in the target file.
S504, determining a routing strategy taking the identification information as key information as a routing strategy associated with the identification information.
Specifically, the accelerating domain name participating in the source returning according to the condition may be used as the file name of the target file, and the target file records the routing policies under various conditions corresponding to the accelerating domain name indicated by the file name. For example, the file name of the target file is 111.Com.cn, and the target file stores therein: request condition 1-routing policy 1, request condition 2-routing policy 2. The meaning is that, for an access request to access acceleration domain name 111.Com.cn, the routing policy is 1 when the request condition is 1, and is 2 when the request condition is 2.
S505, obtaining a target resource corresponding to the access request according to the routing strategy.
According to the technical scheme of the embodiment, a specific implementation mode is provided for the step S104 'determining the routing strategy associated with the identification information according to the identification information', specifically, determining a target file according to the acceleration domain name aimed by the access request, determining the routing strategy taking the identification information as key information in the target file, and determining the routing strategy taking the identification information as key information as the routing strategy associated with the identification information, so that the determination of the routing strategy under different request conditions is realized, and a foundation is provided for realizing different condition returns to different source stations.
Fig. 6 is a flowchart of another source-returning method according to an embodiment of the present disclosure. The method for returning to the source is further perfected in this embodiment, specifically, after the access request sent by the client is received, before determining whether the access request is a preset request, the method further includes: determining whether a cache resource corresponding to the access request exists; and if the cache resource corresponding to the access request exists, feeding back the cache resource to the client. The advantage of such optimization is that the response speed of the access request can be guaranteed to a certain extent, and the source return rate is reduced.
As shown in fig. 6, the source-back method includes the following steps:
s601, when an access request sent by a client is received, determining whether a cache resource corresponding to the access request exists.
And S602a, if the cache resource corresponding to the access request exists, feeding back the cache resource to the client.
S602b, if the cache resource corresponding to the access request does not exist, determining whether the access request is a preset request.
S603, if the access request is a preset request, determining identification information corresponding to the access request.
S604, determining a routing strategy associated with the identification information according to the identification information, and acquiring a target resource corresponding to the access request according to the routing strategy.
According to the source returning scheme provided by the embodiment, when the access request sent by the client is received, whether the cache resource corresponding to the access request exists or not is determined, if the cache resource corresponding to the access request exists, the cache resource is fed back to the client, and at the moment, a source returning station is not required to acquire the target resource, so that the response speed of the access request can be ensured to a certain extent, and the source returning rate can be reduced. And if the cache resource corresponding to the access request does not exist, determining whether the access request is a preset request. And if the access request is a preset request, determining identification information corresponding to the access request. And determining a routing strategy associated with the identification information according to the identification information, and acquiring a target resource corresponding to the access request according to the routing strategy.
Fig. 7 is a schematic structural diagram of a source return device according to an embodiment of the disclosure. The source-back device provided in the embodiment of the present disclosure may execute the processing flow provided in the source-back method embodiment, as shown in fig. 7, where the source-back device 700 includes: a receiving module 710, a first determining module 720, a second determining module 730, a third determining module 740, and an obtaining module 750.
The receiving module 710 is configured to receive an access request sent by a client; a first determining module 720, configured to determine whether the access request is a preset request; a second determining module 730, configured to determine, if the access request is a preset request, identification information corresponding to the access request; a third determining module 740, configured to determine, according to the identification information, a routing policy associated with the identification information; and an obtaining module 750, configured to obtain a target resource corresponding to the access request based on the routing policy.
Optionally, the first determining module 720 includes: the reading unit is used for reading the domain name configuration file; a first determining unit, configured to determine whether an acceleration domain name for which the access request is directed is a domain name in the domain name configuration file; and the second determining unit is used for determining that the access request is a preset request if the accelerated domain name is a domain name in the domain name configuration file.
Optionally, the second determining module 730 includes: a third determining unit, configured to determine an acceleration domain name for which the access request is directed; a fourth determining unit configured to determine condition information of the access request; and the generating unit is used for generating the identification information according to the accelerated domain name and the condition information.
Optionally, the condition information includes at least one of: uniform resource locator, request parameters, and request frame header information.
Optionally, the third determining module 740 includes: a fifth determining unit, configured to determine a target file according to the acceleration domain name; a sixth determining unit, configured to determine a routing policy that uses the identification information as key information in the target file; a seventh determining unit, configured to determine a routing policy that uses the identification information as key information as a routing policy associated with the identification information.
Optionally, the method further comprises: a fourth determining module, configured to determine, after receiving an access request sent by a client, whether a cache resource corresponding to the access request exists before determining whether the access request is a preset request; and the feedback module is used for feeding back the cache resources to the client if the cache resources corresponding to the access request exist.
Optionally, the first server is a content distribution network node.
The source-returning device in the embodiment shown in fig. 7 may be used to implement the technical solution of the above-mentioned method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
Fig. 8 is a schematic structural diagram of a source return device according to an embodiment of the present disclosure. The source device may be the first server described above. As shown in fig. 8, the back source device 150 includes: memory 151, processor 152, computer programs, and communications interface 153; wherein the computer program is stored in the memory 151 and configured to be executed by the processor 152 as described above for the back source method.
The memory 151 may include Read Only Memory (ROM), random Access Memory (RAM), and the like. The processor 152 may be a central processor, a graphics processor, or the like. The processor may perform various suitable actions and processes in accordance with programs stored in Read Only Memory (ROM) or programs loaded into Random Access Memory (RAM) 503 to implement the back-source methods of embodiments as described in the present disclosure. In the RAM, various programs and data required for the operation of the source device 150 are also stored. The memory 151 and the processor 152 are connected to each other via a bus.
Although fig. 8 shows the back source device 150 with various components, it should be understood that not all of the illustrated components are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a non-transitory computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts, thereby implementing the back-source method as described above. In such an embodiment, the computer program may be downloaded and installed from a network via a communication device, or installed from a storage device, or installed from ROM. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processor 152.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the back source device; or may exist alone without being assembled into the back source device.
The computer readable medium carries one or more programs which, when executed by the back source device, cause the back source device to: receiving an access request sent by a client; determining whether the access request is a preset request; if the access request is a preset request, determining identification information corresponding to the access request; determining a routing strategy associated with the identification information according to the identification information; and acquiring target resources corresponding to the access request according to the routing strategy.
Optionally, when the one or more programs are executed by the source device, the source device may also perform other steps described in the foregoing embodiments.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including, but not limited to, an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.

Claims (10)

1. A back-source method, applied to a first server, the method comprising:
receiving an access request sent by a client;
determining whether the access request is a preset request;
if the access request is a preset request, determining identification information corresponding to the access request;
determining a routing strategy associated with the identification information according to the identification information;
and acquiring target resources corresponding to the access request according to the routing strategy.
2. The method of claim 1, wherein the determining whether the access request is a preset request comprises:
reading a domain name configuration file;
determining whether the acceleration domain name for which the access request is directed is a domain name in the domain name configuration file;
and if the accelerated domain name is a domain name in the domain name configuration file, determining that the access request is a preset request.
3. The method of claim 1, wherein the determining identification information corresponding to the access request according to the access request comprises:
determining an acceleration domain name for which the access request is directed;
determining condition information of the access request;
and generating the identification information according to the accelerated domain name and the condition information.
4. A method according to claim 3, wherein the condition information comprises at least one of: uniform resource locator, request parameters, and request frame header information.
5. A method according to claim 3, wherein said determining a routing policy associated with said identification information based on said identification information comprises:
determining a target file according to the acceleration domain name;
determining a routing strategy taking the identification information as key information in the target file;
and determining the routing strategy taking the identification information as key information as the routing strategy associated with the identification information.
6. The method according to any one of claims 1-5, wherein after the receiving the access request sent by the client, before determining whether the access request is a preset request, the method further comprises:
determining whether a cache resource corresponding to the access request exists;
and if the cache resource corresponding to the access request exists, feeding back the cache resource to the client.
7. The method according to any of claims 1-5, wherein the first server is a content distribution network node.
8. A back source device, comprising:
the receiving module is used for receiving the access request sent by the client;
the first determining module is used for determining whether the access request is a preset request or not;
the second determining module is used for determining identification information corresponding to the access request if the access request is a preset request;
a third determining module, configured to determine a routing policy associated with the identification information according to the identification information;
and the acquisition module is used for acquiring the target resource corresponding to the access request based on the routing strategy.
9. A back source device, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any one of claims 1-7.
10. A computer readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the method according to any of claims 1-7.
CN202210001507.3A 2022-01-04 2022-01-04 Source return method, apparatus, device and computer readable storage medium Pending CN116436912A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210001507.3A CN116436912A (en) 2022-01-04 2022-01-04 Source return method, apparatus, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210001507.3A CN116436912A (en) 2022-01-04 2022-01-04 Source return method, apparatus, device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN116436912A true CN116436912A (en) 2023-07-14

Family

ID=87085965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210001507.3A Pending CN116436912A (en) 2022-01-04 2022-01-04 Source return method, apparatus, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN116436912A (en)

Similar Documents

Publication Publication Date Title
CN110198307B (en) Method, device and system for selecting mobile edge computing node
CN110198363B (en) Method, device and system for selecting mobile edge computing node
US10951395B2 (en) Data fetching in data exchange networks
CA2769905C (en) Delivery of content
CN109347968B (en) Method, equipment and system for downloading data blocks of resource file
CN110049022B (en) Domain name access control method and device and computer readable storage medium
US10897450B2 (en) Communication method and communication apparatus
CN112261172B (en) Service addressing access method, device, system, equipment and medium
CN113572835B (en) Data processing method, network element equipment and readable storage medium
US9479607B2 (en) Content caching and delivering system with traffic of repetitively requested content reduced
CN110430274A (en) A kind of document down loading method and system based on cloud storage
CN108259521B (en) Hot resource sharing method and device
CN111355986B (en) Message processing method and device in live broadcast room and storage medium
US20180091631A1 (en) Systems and methods for writing prioritized http/2 data to a socket buffer
CN109873855B (en) Resource acquisition method and system based on block chain network
US20140282788A1 (en) System for controlling video distribution in response to a request on reduced video data traffic and a method therefor
CN116668511A (en) Data processing method, network element equipment and readable storage medium
CN113271362B (en) Education resource processing method, device, system and medium based on hybrid cloud
CN114650281B (en) File downloading method, device, equipment and storage medium based on complex network
CN110798495A (en) Method and server for end-to-end message push in cluster architecture mode
CN103166978A (en) Method and device of data obtaining
CN103560937A (en) Data accessing method and entry server
CN110582090A (en) CDN scheduling method, scheduling system and MEC network element
CN116436912A (en) Source return method, apparatus, device and computer readable storage medium
CN107370805B (en) Service processing method and device and service processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination