CN117390072B - Method for improving network request speed in embedded system - Google Patents

Method for improving network request speed in embedded system Download PDF

Info

Publication number
CN117390072B
CN117390072B CN202311671691.3A CN202311671691A CN117390072B CN 117390072 B CN117390072 B CN 117390072B CN 202311671691 A CN202311671691 A CN 202311671691A CN 117390072 B CN117390072 B CN 117390072B
Authority
CN
China
Prior art keywords
request
network
node
speed
cache
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311671691.3A
Other languages
Chinese (zh)
Other versions
CN117390072A (en
Inventor
罗辉
马志宇
韦刚
李云军
伍炬彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yunxigu Technology Co ltd
Original Assignee
Shenzhen Yunxigu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yunxigu Technology Co ltd filed Critical Shenzhen Yunxigu Technology Co ltd
Priority to CN202311671691.3A priority Critical patent/CN117390072B/en
Publication of CN117390072A publication Critical patent/CN117390072A/en
Application granted granted Critical
Publication of CN117390072B publication Critical patent/CN117390072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90348Query processing by searching ordered data, e.g. alpha-numerically ordered data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The application provides a method for improving network request speed in an embedded system, which belongs to the technical field of network requests and comprises the following steps: checking whether a local cache table has a cache of the http request or not; if yes, judging the type of the http cache, and if not, executing the step 4; when the cache type is strong cache, judging whether the cache data of the http request is out of date, if not, executing the step 5, and if so, executing the step 4; when the cache type is negotiation cache, necessary negotiation cache data are extracted from the local area, an http request is continuously initiated, and whether the cache data of the current http request are out of date is judged according to a state code returned by the cloud; if the data is out of date, the latest data is cached again, and if the data is not out of date, the step 5 is executed; step 4: continuously re-acquiring the http request; step 5: the cached data of the http request is obtained and used as http return data to be returned to the business logic for use, and the network request speed is effectively improved.

Description

Method for improving network request speed in embedded system
Technical Field
The invention relates to a method for improving network request speed in an embedded system, belonging to the technical field of network requests.
Background
The embedded system is based on application and computer technology, software and hardware can be cut, and is suitable for special computer system with strict requirements on functions, reliability, cost, volume and power consumption, the definition of the embedded system is a device for controlling, monitoring or assisting in operating machines and equipment, and in the process of network request, the embedded equipment has more limited network request due to limited network resources, namely frequent network request initiation is required in certain business logics, because the network speed of the equipment is influenced, the time of the network request is uncontrollable, a large amount of memory and cpu resources are occupied, network request failure is easy to cause, and further the business development is unfavorable.
Therefore, the present invention provides a method for improving the network request speed in an embedded system.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a method for improving the network request speed in an embedded system, which is used for realizing effective control of the network request by checking whether request cache exists in the local area and judging the cache type, and further obtaining the returned data by judging whether the data is out of date, thereby reducing the occupation of the cache space and effectively improving the speed of the network request.
The invention provides a method for improving network request speed in an embedded system, which comprises the following steps:
step 1: when the equipment end sends an http request to the cloud end, checking whether a local cache table has a cache of the http request or not;
if yes, judging the type of the http cache, and if not, executing the step 4;
step 2: when the cache type is strong cache, judging whether the cache data of the http request is out of date, if not, executing the step 5, and if so, executing the step 4;
step 3: when the cache type is negotiation cache, necessary negotiation cache data are extracted from the local area, an http request is continuously initiated, and whether the cache data of the current http request are out of date is judged according to a state code returned by the cloud;
if the data is out of date, the latest data is cached again, and if the data is not out of date, the step 5 is executed;
step 4: continuously re-acquiring the http request;
step 5: and obtaining the cache data of the current http request as http return data to return to the service logic for use.
Further, checking whether the local cache table has the cache of the http request includes:
checking whether the http request meets a caching standard or not;
if the http request does not meet the caching standard, sending the http request to the local request processor to judge whether the http request is trusted by a network;
if not, sending a refusal check request to the local cache processor;
if the http request is trusted, updating a cache traversing rule of the local cache processor based on the cache standard, and traversing the http request for the local cache table.
Further, when the cache type is a strong cache, determining whether the cache data of the current http request is out of date includes:
retrieving a first decision rule matching the strong cache from an expiration rule database;
and judging whether the cached data of the current http request is out of date according to the first judging rule.
Further, when the cache type is a negotiated cache, extracting necessary negotiated cache data from the local includes:
retrieving the extraction rule matched with the negotiation buffer from an extraction rule database;
determining the local extraction parameter description according to the extraction rule;
and extracting parameters from the local according to the extracted parameter description to obtain necessary negotiation cache data.
Further, judging whether the cache data of the http request is out of date according to the status code returned by the cloud, including:
retrieving a second decision rule matched with the negotiation buffer from an expiration rule database;
and judging whether the cached data of the current http request is out of date according to the second judging rule and the state code.
Further, before checking whether the local cache table has the cache of the http request, the method includes:
capturing network request nodes involved in a connection path of the equipment terminal for sending an http request to a cloud, respectively acquiring the node request length of each network request node, and calculating the request integer multiple of the corresponding network request node and the node idle length of the corresponding network request node;
acquiring an allowable network speed range of a corresponding network request node according to the request integer multiple and the node idle length;
acquiring character strings in the http request, and matching the character strings with a logic table to obtain logic conditions of each character string;
matching the set of transmission networks to each logical condition based on the network database;
acquiring a minimum transmission speed, a maximum transmission speed and a network transmission set according to the allowable network speed range, and determining modification configuration information of the connection path;
optimizing the connection path according to the configuration changing information, and sending an http request to the cloud end by the equipment end according to the optimized path.
Further, according to the allowable network speed range, acquiring a minimum transmission speed, a maximum transmission speed and a network transmission set, determining modification configuration information of the connection path includes:
acquiring a first node combination based on the minimum transmission speed, and simultaneously acquiring a second node combination based on the maximum transmission speed;
placing the first node combination and the nodes in the second node combination in a one-to-one correspondence manner, and acquiring the node combination by combining the node attribute;
respectively acquiring a competition relationship of each network request node in the node combination based on a node pair, and determining a network request function under the condition that the connection path is in request saturation;
performing function coding on the network request function, and inputting the function code into a coding analysis model to obtain a first change configuration aiming at the network request function;
acquiring the network request speed of each transmission network in the transmission network set matched with each logic condition from a network-speed mapping table, and constructing a speed vector by combining network attributes;
determining the total character number of the character strings under each logic condition, combining the preset request character number of each transmission network, acquiring possible request states of the corresponding transmission network, and constructing and obtaining a state vector;
the speed vector and the state vector of each logic condition are respectively input into a vector analysis model to obtain network change information;
extracting information meeting the overlapping constraint condition from all network change information as second change configuration;
and carrying out configuration optimization processing on the first change configuration and the second change configuration, and taking a processing result as change configuration information.
Further, performing configuration optimization processing on the first modification configuration and the second modification configuration, and taking a processing result as modification configuration information, including:
based on the configuration parameter information of each configuration change, determining a network speed increase value and network speed increase reliability of the corresponding configuration change;
setting a first numerical value to the corresponding change configuration according to the network speed increasing value and the network speed increasing reliability;
monitoring node monitoring events of the nodes related to each change configuration respectively, and setting a second numerical value to the corresponding change configuration according to the event address of the node monitoring event and the candidate address of each event address;
first sorting all the first values and second sorting all the second values, screening the first N1 first configurations in the first sorting and the first N2 second configurations in the second sorting;
and performing intersection processing on the first configuration and the second configuration to obtain changed configuration information.
Further, according to the integer multiple of the request and the node idle length, obtaining an allowable network speed range of the corresponding network request node includes:
calculating a minimum allowable speed of a corresponding network request node
Wherein,representing a standard network speed of a corresponding network request node; />Representing the integer multiple of the corresponding request;representing a set integer multiple of corresponding network request nodes; />Representing a node transmission accommodation total length corresponding to the network request node; />Representing the node idle length of the corresponding network request node; />Representing a speed decay factor per unit of congestion length; />Representing a normalization coefficient based on integer multiples; />Representing a normalization coefficient based on the node length;
calculating the maximum allowable speed of the corresponding network request node
Wherein,representing a speed influence coefficient under a request error of a corresponding network request node;
and forming an allowable network speed range of the corresponding network request node according to the minimum allowable speed and the maximum allowable speed.
Further, the method further comprises the following steps: the speed influence coefficient is calculated as follows:
wherein (1)>Representing a preset request threshold; />Indicating that the corresponding network request node is at +.>Request error coefficients under the secondary request; />Representing a request error coefficient of a corresponding network request node under the (j < 2+ > 1 th) request; />Representing a request error coefficient of a corresponding network request node under the j2-1 th request; rand represents a random function; />Representing from->Personal (S)Random extraction->The result is>Less than->;/>Representing the extracted false reference result under the corresponding network request node.
Compared with the prior art, the beneficial effects of the application are as follows:
1. by checking whether the request cache exists in the local area and judging the cache type, the network request is effectively controlled, and returned data is further acquired by judging whether the data is out of date, so that the occupation of the cache space is reduced, and the speed of the network request is effectively improved.
2. The method comprises the steps of calculating the integral multiple of the request length and the idle length of the node through obtaining the request length of the node, further obtaining the network speed range, providing a basis for adding the node through matching the character string with the logic table for the http request, guaranteeing the probability of successful transmission of the request once, further reducing the occupation of the request for multiple transmission to the network space, indirectly improving the transmission speed of the network request, combining the maximum transmission speed, the minimum transmission speed and the network transmission set, guaranteeing the adjustment of the node protocol or the node quantity, and guaranteeing the network request speed as much as possible, and further guaranteeing the effective transmission of the http request.
Drawings
Fig. 1 is a flowchart of a method for improving network request speed in an embedded system according to the present invention.
Detailed Description
In order to better understand the technical solutions in the present application, the following description will clearly and completely describe the technical solutions in the embodiments of the present application in conjunction with the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
It is noted that when an element is referred to as being "fixed" or "disposed on" another element, it can be directly on the other element or be indirectly disposed on the other element; when an element is referred to as being "connected to" another element, it can be directly connected to the other element or be indirectly connected to the other element.
It is to be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate or are based on the orientation or positional relationship shown in the drawings, merely to facilitate description of the present application and simplify description, and do not indicate or imply that the devices or components referred to must have a particular orientation, be configured and operated in a particular orientation, and thus should not be construed as limiting the present application.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present application, the meaning of "a plurality" or "a number" is two or more, unless explicitly defined otherwise.
It should be understood that the structures, proportions, sizes, etc. shown in the drawings are for illustration purposes only and should not be construed as limiting the scope of the present disclosure, since any structural modifications, proportional changes, or dimensional adjustments made by those skilled in the art should not be made in the present disclosure without affecting the efficacy or achievement of the present disclosure.
Example 1:
the invention provides a method for improving network request speed in an embedded system, as shown in figure 1, comprising the following steps:
step 1: when the equipment end sends an http request to the cloud end, checking whether a local cache table has a cache of the http request or not;
if yes, judging the type of the http cache, and if not, executing the step 4;
step 2: when the cache type is strong cache, judging whether the cache data of the http request is out of date, if not, executing the step 5, and if so, executing the step 4;
step 3: when the cache type is negotiation cache, necessary negotiation cache data are extracted from the local area, an http request is continuously initiated, and whether the cache data of the current http request are out of date is judged according to a state code returned by the cloud;
if the data is out of date, the latest data is cached again, and if the data is not out of date, the step 5 is executed;
step 4: continuously re-acquiring the http request;
step 5: and obtaining the cache data of the current http request as http return data to return to the service logic for use.
In one embodiment, the http request may be based on any one of the requests on the web page, such as an access request, or a search request, etc.
In one embodiment, the cache types include both strong caches and negotiated caches.
In one embodiment, the status code refers to some code returned by the cloud, etc.
The beneficial effects of the technical scheme are as follows: by checking whether the request cache exists in the local area and judging the cache type, the network request is effectively controlled, and returned data is further acquired by judging whether the data is out of date, so that the occupation of the cache space is reduced, and the speed of the network request is effectively improved.
Example 2:
based on embodiment 1, checking whether the local cache table has the cache of the http request includes:
checking whether the http request meets a caching standard or not;
if the http request does not meet the caching standard, sending the http request to the local request processor to judge whether the http request is trusted by a network;
if not, sending a refusal check request to the local cache processor;
if the http request is trusted, updating a cache traversing rule of the local cache processor based on the cache standard, and traversing the http request for the local cache table.
In one embodiment, the cache standard is preset, and includes a cache format and a cache occupation space of each package part in the http request.
In one embodiment, the request processor and the cache processor are included locally, and the cache table is placed in the cache processor.
In one embodiment, the network trust refers to whether the transport network on which the request relies is trusted.
In one embodiment, the cache traversing rule is preset, for example, the rule is to sequentially traverse the cache data related to the cache table, and after updating, the cache traversing rule is added with a new label, for example, a format symbol of a cache format and the like, so that the format symbol is directly locked to traverse the data of the same format symbol, thereby effectively improving the efficiency of traversing the cache data and indirectly improving the network request speed.
The beneficial effects of the technical scheme are as follows: by detecting whether the request meets the standard or not, the network which does not meet the standard is subjected to trusted inspection, so that the cache traversal rule is updated, the cache efficiency is guaranteed to reduce the feedback failure probability of the request, the traversal efficiency is guaranteed, and the network request speed is indirectly improved.
Example 3:
based on embodiment 1, when the cache type is a strong cache, determining whether the cache data of the current http request is outdated includes:
retrieving a first decision rule matching the strong cache from an expiration rule database;
and judging whether the cached data of the current http request is out of date according to the first judging rule.
In one embodiment, the expiration rule database has a judging rule matched with the strong cache and the negotiation cache, that is, the rule matching is directly obtained from the database according to the cache type, and after the corresponding rule is obtained, the judgment of whether the cache data is expired is performed.
The beneficial effects of the technical scheme are as follows: by matching the first judging rule from the rule base, whether the cache data of the strong cache type is out of date or not is conveniently and effectively judged, and a basis is provided for subsequently improving the network request speed.
Example 4:
based on embodiment 1, when the cache type is a negotiated cache, extracting necessary negotiated cache data from the local includes:
retrieving the extraction rule matched with the negotiation buffer from an extraction rule database;
determining the local extraction parameter description according to the extraction rule;
and extracting parameters from the local according to the extracted parameter description to obtain necessary negotiation cache data.
In this embodiment, the extraction rule database includes extraction rules related to the negotiated cache type, which are preset.
The beneficial effects of the technical scheme are as follows: extracting the parameter description is determined by calling the extracting rule from the database, so that parameter extraction is conveniently carried out locally, necessary negotiation cache data is obtained, and the subsequent network request speed is indirectly improved.
Example 5:
based on embodiment 1, determining whether the cached data of the current http request is out of date according to the status code returned by the cloud end includes:
retrieving a second decision rule matched with the negotiation buffer from an expiration rule database;
and judging whether the cached data of the current http request is out of date according to the second judging rule and the state code.
The beneficial effects of the technical scheme are as follows: by matching the second judgment rule from the rule base and combining the status code, whether the cache data of the negotiated cache type is out of date can be effectively judged conveniently, and a basis is provided for subsequently improving the network request speed.
Example 6:
based on embodiment 1, before checking whether there is a cache of the current http request in the local cache table, the method includes:
capturing network request nodes involved in a connection path of the equipment terminal for sending an http request to a cloud, respectively acquiring the node request length of each network request node, and calculating the request integer multiple of the corresponding network request node and the node idle length of the corresponding network request node;
acquiring an allowable network speed range of a corresponding network request node according to the request integer multiple and the node idle length;
acquiring character strings in the http request, and matching the character strings with a logic table to obtain logic conditions of each character string;
matching the set of transmission networks to each logical condition based on the network database;
acquiring a minimum transmission speed, a maximum transmission speed and a network transmission set according to the allowable network speed range, and determining modification configuration information of the connection path;
optimizing the connection path according to the configuration changing information, and sending an http request to the cloud end by the equipment end according to the optimized path.
In this embodiment, the process of transmitting the request to the cloud end by the device end is implemented through a certain transmission path, for example, the information of the keyword 1 is retrieved on a computer webpage, then, the path of information retrieval is formed by a computer-cloud end, the retrieval of the keyword 1 on the computer is the transmitted http request, and the servers of various resource scheduling related in the path are the request nodes.
In this embodiment, the node request length refers to the length requested to be occupied in the current node, and the total length of each node is fixed, where the unoccupied length is the node idle length.
In this embodiment, the request integer multiple refers to a re-request condition that the node idle length can correspond to, and is obtained by rounding down according to the result of the node idle length/unit request occupation condition.
In this embodiment, the allowed network speed range is obtained by floating up and down based on a standard network speed of the corresponding network requesting node.
In this embodiment, the right boundary speed in the allowed network speed range of each network request node is the obtained maximum transmission speed of each node, and the left boundary speed in the corresponding range is the obtained minimum transmission speed of each node.
In this embodiment, each http request has its own representation, so the string of the proprietary description can be directly extracted.
In this embodiment, the logic table includes different strings and logic conditions matched with the strings, for example, the string is 5 … … … …, and the corresponding logic conditions are to obtain resources with matching degree higher than 90%.
In this embodiment, the network database includes various transmission networks under different logic conditions, because in the configuration process, there may be a change to the current configuration information of the network, or a new network is added, or a network protocol is changed, and various information existing in the configuration process is the change configuration information.
In this embodiment, the optimization of the connection path is implemented by adding a node, deleting a node, changing a protocol, and the like, that is, the high efficiency and the speed of the http request are ensured by path optimization, so that the failure of transmission of the request caused by congestion or other conditions existing in the original path can be avoided, and further, the subsequent repeated requests are caused.
The beneficial effects of the technical scheme are as follows: the method comprises the steps of calculating the integral multiple of the request length and the idle length of the node through obtaining the request length of the node, further obtaining the network speed range, providing a basis for adding the node through matching the character string with the logic table for the http request, guaranteeing the probability of successful transmission of the request once, further reducing the occupation of the request for multiple transmission to the network space, indirectly improving the transmission speed of the network request, combining the maximum transmission speed, the minimum transmission speed and the network transmission set, guaranteeing the adjustment of the node protocol or the node quantity, and guaranteeing the network request speed as much as possible, and further guaranteeing the effective transmission of the http request.
Example 7:
based on embodiment 6, determining the modification configuration information of the connection path according to the minimum transmission speed, the maximum transmission speed and the network transmission set acquired in the allowed network speed range includes:
acquiring a first node combination based on the minimum transmission speed, and simultaneously acquiring a second node combination based on the maximum transmission speed;
placing the first node combination and the nodes in the second node combination in a one-to-one correspondence manner, and acquiring the node combination by combining the node attribute;
respectively acquiring a competition relationship of each network request node in the node combination based on a node pair, and determining a network request function under the condition that the connection path is in request saturation;
performing function coding on the network request function, and inputting the function code into a coding analysis model to obtain a first change configuration aiming at the network request function;
acquiring the network request speed of each transmission network in the transmission network set matched with each logic condition from a network-speed mapping table, and constructing a speed vector by combining network attributes;
determining the total character number of the character strings under each logic condition, combining the preset request character number of each transmission network, acquiring possible request states of the corresponding transmission network, and constructing and obtaining a state vector;
the speed vector and the state vector of each logic condition are respectively input into a vector analysis model to obtain network change information;
extracting information meeting the overlapping constraint condition from all network change information as second change configuration;
and carrying out configuration optimization processing on the first change configuration and the second change configuration, and taking a processing result as change configuration information.
In this embodiment, the first node combination and the second node combination are all network request nodes involved in the connection path, and the difference between the two is that the transmission speeds are different.
In this embodiment of the present invention, the process is performed,one-to-one placement refers to placing pass-through nodes in the same column.
In this embodiment, after the node combination is determined, the first behavior is constructed with the minimum transmission speed, and the second behavior is constructed with the maximum transmission speed, at this time, the content in the first line is input into the speed analysis model to obtain a first new speed vector, the content in the second line is input into the speed analysis model to obtain a second new speed vector, the speed change analysis is performed on the node pairs in the first new speed vector and the second new speed vector, and the competition relationship of each network node is determined, where the speed analysis model is obtained by training the neural network model based on different speed and attribute combinations and the speed reassignment performed on the nodes under the combination by an expert as samples, so that the new speed vectors of the first line and the second line can be directly obtained, all the nodes consistent with the node combination exist in each vector, and the placement sequence is consistent with the placement sequence of the node combination.
In the competition relation analysis process, the absolute values of the speed change of the corresponding nodes in the new speed vector are respectively obtained to average the two absolute values, and the larger the obtained average value is, the larger the corresponding competition relation is, namely the greater the possibility of changing the configuration later is.
In this embodiment, the saturated condition refers to a condition in which the request space is occupied, and it is effectively associated with a network request function Y1 (J1, B1) of a competing relationship, where J1 represents the competing relationship; b1 represents request saturation, and is obtained by matching from a relation-connection path-function data mapping table, which contains competition relations of different node combinations, connection paths and network request functions set by experts, and thus can be directly obtained.
In this embodiment, the purpose of function coding is to obtain vectors to be effectively input into a coding analysis model for analysis, where the model is obtained by training samples based on different function codes and network modification conditions performed by an expert based on the codes, so that the first modification configuration can be directly obtained.
In this embodiment, the network-speed mapping table includes different combined transmission networks and configuration situations of network request speeds of the combined transmission networks by experts, and is combined with network attributes on the basis of the obtained speeds, so as to obtain a speed vector.
In this embodiment, the number of preset request characters is preset.
In this embodiment, the possible request states are based on: the total number of characters/the preset number of request characters.
In this embodiment, the state vector= { state 1 of the transmission network 1, state 2 of the transmission network 2.
In this embodiment, the vector analysis model is based on different combinations of speed vectors and state vectors, and the network modification result of the combination vector by the expert is obtained by training the neural network model by the sample, so that the network modification information can be directly obtained.
The beneficial effects of the technical scheme are as follows: the method comprises the steps of obtaining the competition relationship between node pairs from the transmission speed, obtaining the network request function, realizing configuration adjustment of the number of nodes in the path from the aspect of obtaining the speed vector and the state vector from the aspect of logic adjustment and network transmission set, further carrying out configuration adjustment on the aspect of network protocol, comprehensively realizing reasonable change of the connection path, effectively ensuring the success rate of http requests, and indirectly improving the request speed.
Example 8:
based on embodiment 7, performing configuration optimization processing on the first modification configuration and the second modification configuration, and taking a processing result as modification configuration information, including:
based on the configuration parameter information of each configuration change, determining a network speed increase value and network speed increase reliability of the corresponding configuration change;
setting a first numerical value to the corresponding change configuration according to the network speed increasing value and the network speed increasing reliability;
monitoring node monitoring events of the nodes related to each change configuration respectively, and setting a second numerical value to the corresponding change configuration according to the event address of the node monitoring event and the candidate address of each event address;
first sorting all the first values and second sorting all the second values, screening the first N1 first configurations in the first sorting and the first N2 second configurations in the second sorting;
and performing intersection processing on the first configuration and the second configuration to obtain changed configuration information.
In this embodiment, the configuration parameter information is obtained by extracting parameters involved in changing the configuration.
In this embodiment, the network speed increase value refers to an increase between the speed after the configuration change and the original normal speed.
In this embodiment, the reliability of the network speed depends on the reliability of the corresponding node itself, and the higher the transmission availability of the node, the higher the corresponding reliability.
In this embodiment, the first value is the product of the network speed increase value and the reliability of the network speed increase.
In this embodiment, the node monitoring event refers to an event having an abnormality in the node history operation process of the corresponding network request node, for example, transmission failure, etc., by analyzing these events, the rationality of changing the configuration can be effectively determined, and further, the event is represented by a second value, where the second value=the product of the address abnormality probability of the event address and the weight of the event address+the product of the address abnormality probability of the candidate address and the weight of the candidate address.
In this embodiment, the value of N1 is the first 2/3 of the number in the first order, the value of N2 is the first 1/3 of the number in the second order, and this is set to reduce the amount of calculation for eliminating invalid information.
In this embodiment, the interleaving refers to the existing overlapping configuration information, i.e. the modification configuration information.
The beneficial effects of the technical scheme are as follows: the first value is obtained through calculation through the network speed increasing value and the network speed increasing reliability, the second value is obtained through monitoring the event and the address, the cylinder cover configuration information is effectively obtained through the size sorting of the values obtained in different aspects, a basis is provided for effective transmission of the request, and the network request speed is indirectly improved.
Example 9:
based on embodiment 6, according to the integer multiple of the request and the node idle length, obtaining the allowable network speed range of the corresponding network request node includes:
calculating a minimum allowable speed of a corresponding network request node
Wherein,representing a standard network speed of a corresponding network request node; />Representing the integer multiple of the corresponding request;representing a set integer multiple of corresponding network request nodes; />Representing a node transmission accommodation total length corresponding to the network request node; />Representing the node idle length of the corresponding network request node; />Representing a speed decay factor per unit of congestion length; />Representing a normalization coefficient based on integer multiples; />Representing a normalization coefficient based on the node length;
calculating the maximum allowable speed of the corresponding network request node
Wherein,representing a speed influence coefficient under a request error of a corresponding network request node;
and forming an allowable network speed range of the corresponding network request node according to the minimum allowable speed and the maximum allowable speed.
Further, the method further comprises the following steps: the speed influence coefficient is calculated as follows:
wherein (1)>Representing a preset request threshold; />Indicating that the corresponding network request node is at +.>Request error coefficients under the secondary request; />Representing a request error coefficient of a corresponding network request node under the (j < 2+ > 1 th) request; />Representing a request error coefficient of a corresponding network request node under the j2-1 th request; rand represents a random function; />Representing from->Personal (S)Random extraction->The result is>Less than->;/>Representing the extracted false reference result under the corresponding network request node.
The beneficial effects of the technical scheme are as follows: the speed influence coefficient is calculated based on the request errors of the corresponding nodes, so that an adjustment basis is provided for calculating the maximum allowable speed, the maximum speed and the rationality of minimum speed calculation are guaranteed, a reference basis is provided for determining the configuration, and the efficiency of network requests is indirectly guaranteed.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. A method for increasing network request speed in an embedded system, comprising:
step 1: when the equipment end sends an http request to the cloud end, checking whether a local cache table has a cache of the http request or not; before checking whether the buffer of the http request exists in the local buffer table, the method comprises the following steps:
capturing network request nodes involved in a connection path of the equipment terminal for sending an http request to a cloud, respectively acquiring the node request length of each network request node, and calculating the request integer multiple of the corresponding network request node and the node idle length of the corresponding network request node;
obtaining an allowable network speed range of a corresponding network request node according to the request integer multiple and the node idle length, wherein the obtaining comprises the following steps:
calculating a minimum allowable speed of a corresponding network request node
Wherein,representing a standard network speed of a corresponding network request node; />Representing the integer multiple of the corresponding request; />Representing a set integer multiple of corresponding network request nodes; />Representing a node transmission accommodation total length corresponding to the network request node; />Representing the node idle length of the corresponding network request node; />Representing a speed decay factor per unit of congestion length; />Representing a normalization coefficient based on integer multiples; />Representing a normalization coefficient based on the node length;
calculating the maximum allowable speed of the corresponding network request node
Wherein,representing a speed influence coefficient under a request error of a corresponding network request node;
the speed influence coefficient is calculated as follows:
wherein (1)>Representing a preset request threshold; />Indicating that the corresponding network request node is at +.>Request error coefficients under the secondary request; />Representing a request error coefficient of a corresponding network request node under the (j < 2+ > 1 th) request; />Representing a request error coefficient of a corresponding network request node under the j2-1 th request; rand represents a random function; />Representing from->Personal (S)Random extraction->The result is>Less than->;/>Representing the extracted error reference result under the corresponding network request node;
forming an allowable network speed range of a corresponding network request node according to the minimum allowable speed and the maximum allowable speed;
acquiring an allowable network speed range of a corresponding network request node according to the request integer multiple and the node idle length;
acquiring character strings in the http request, and matching the character strings with a logic table to obtain logic conditions of each character string;
matching the set of transmission networks to each logical condition based on the network database;
acquiring a minimum transmission speed, a maximum transmission speed and a network transmission set according to the allowable network speed range, and determining modification configuration information of the connection path;
optimizing the connection path according to the configuration changing information, and sending an http request to the cloud end by the equipment end according to the optimized path;
if yes, judging the type of the http cache, and if not, executing the step 4;
the request integer multiple refers to a re-request condition that the node idle length can correspond to, and is obtained by rounding down according to the result of the node idle length/unit request occupation condition;
step 2: when the cache type is strong cache, judging whether the cache data of the http request is out of date, if not, executing the step 5, and if so, executing the step 4;
step 3: when the cache type is negotiation cache, necessary negotiation cache data are extracted from the local area, an http request is continuously initiated, and whether the cache data of the current http request are out of date is judged according to a state code returned by the cloud;
if the data is out of date, the latest data is cached again, and if the data is not out of date, the step 5 is executed;
step 4: continuously re-acquiring the http request;
step 5: and obtaining the cache data of the current http request as http return data to return to the service logic for use.
2. The method for increasing network request speed in an embedded system according to claim 1, wherein checking whether a local cache table has a cache of the http request comprises:
checking whether the http request meets a caching standard or not;
if the http request does not meet the caching standard, sending the http request to the local request processor to judge whether the http request is trusted by a network;
if not, sending a refusal check request to the local cache processor;
if the http request is trusted, updating a cache traversing rule of the local cache processor based on the cache standard, and traversing the http request for the local cache table.
3. The method for increasing network request speed in an embedded system according to claim 1, wherein when the cache type is a strong cache, determining whether the cache data of the current http request is expired comprises:
retrieving a first decision rule matching the strong cache from an expiration rule database;
and judging whether the cached data of the current http request is out of date according to the first judging rule.
4. The method for increasing network request speed in an embedded system according to claim 1, wherein when the cache type is a negotiated cache, extracting necessary negotiated cache data from the local comprises:
retrieving the extraction rule matched with the negotiation buffer from an extraction rule database;
determining the local extraction parameter description according to the extraction rule;
and extracting parameters from the local according to the extracted parameter description to obtain necessary negotiation cache data.
5. The method for improving network request speed in an embedded system according to claim 1, wherein determining whether the cached data of the current http request is out of date according to the status code returned by the cloud comprises:
retrieving a second decision rule matched with the negotiation buffer from an expiration rule database;
and judging whether the cached data of the current http request is out of date according to the second judging rule and the state code.
6. The method for increasing network request speed in an embedded system according to claim 1, wherein determining the change configuration information of the connection path according to the minimum transmission speed, the maximum transmission speed, and the network transmission set acquired in the allowed network speed range comprises:
acquiring a first node combination based on the minimum transmission speed, and simultaneously acquiring a second node combination based on the maximum transmission speed;
placing the first node combination and the nodes in the second node combination in a one-to-one correspondence manner, and acquiring the node combination by combining the node attribute;
respectively acquiring a competition relationship of each network request node in the node combination based on a node pair, and determining a network request function under the condition that the connection path is in request saturation;
performing function coding on the network request function, and inputting the function code into a coding analysis model to obtain a first change configuration aiming at the network request function;
acquiring the network request speed of each transmission network in the transmission network set matched with each logic condition from a network-speed mapping table, and constructing a speed vector by combining network attributes;
determining the total character number of the character strings under each logic condition, combining the preset request character number of each transmission network, acquiring possible request states of the corresponding transmission network, and constructing and obtaining a state vector;
the speed vector and the state vector of each logic condition are respectively input into a vector analysis model to obtain network change information;
extracting information meeting the overlapping constraint condition from all network change information as second change configuration;
and carrying out configuration optimization processing on the first change configuration and the second change configuration, and taking a processing result as change configuration information.
7. The method for increasing network request speed in an embedded system according to claim 6, wherein performing configuration optimization processing on the first modification configuration and the second modification configuration, and using a processing result as modification configuration information, comprises:
based on the configuration parameter information of each configuration change, determining a network speed increase value and network speed increase reliability of the corresponding configuration change;
setting a first numerical value to the corresponding change configuration according to the network speed increasing value and the network speed increasing reliability;
monitoring node monitoring events of the nodes related to each change configuration respectively, and setting a second numerical value to the corresponding change configuration according to the event address of the node monitoring event and the candidate address of each event address;
first sorting all the first values and second sorting all the second values, screening the first N1 first configurations in the first sorting and the first N2 second configurations in the second sorting;
and performing intersection processing on the first configuration and the second configuration to obtain changed configuration information.
CN202311671691.3A 2023-12-07 2023-12-07 Method for improving network request speed in embedded system Active CN117390072B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311671691.3A CN117390072B (en) 2023-12-07 2023-12-07 Method for improving network request speed in embedded system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311671691.3A CN117390072B (en) 2023-12-07 2023-12-07 Method for improving network request speed in embedded system

Publications (2)

Publication Number Publication Date
CN117390072A CN117390072A (en) 2024-01-12
CN117390072B true CN117390072B (en) 2024-03-26

Family

ID=89470521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311671691.3A Active CN117390072B (en) 2023-12-07 2023-12-07 Method for improving network request speed in embedded system

Country Status (1)

Country Link
CN (1) CN117390072B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104035729A (en) * 2014-05-22 2014-09-10 中国科学院计算技术研究所 Block device thin-provisioning method for log mapping
WO2014189344A1 (en) * 2013-05-24 2014-11-27 고려대학교 산학협력단 Cache device and cache operation method
CN106161521A (en) * 2015-04-01 2016-11-23 阿里巴巴集团控股有限公司 The processing method and processing device of hypertext transfer protocol requests
CN112468570A (en) * 2020-11-24 2021-03-09 福建天泉教育科技有限公司 Data request processing method and CDN server side
WO2022126984A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Cache data detection method and apparatus, computer device and storage medium
CN116723242A (en) * 2023-06-27 2023-09-08 北京商银微芯科技有限公司 Network request cache retransmission method, device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10659556B2 (en) * 2017-05-16 2020-05-19 Sap Se Progressive hybrid web application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014189344A1 (en) * 2013-05-24 2014-11-27 고려대학교 산학협력단 Cache device and cache operation method
CN104035729A (en) * 2014-05-22 2014-09-10 中国科学院计算技术研究所 Block device thin-provisioning method for log mapping
CN106161521A (en) * 2015-04-01 2016-11-23 阿里巴巴集团控股有限公司 The processing method and processing device of hypertext transfer protocol requests
CN112468570A (en) * 2020-11-24 2021-03-09 福建天泉教育科技有限公司 Data request processing method and CDN server side
WO2022126984A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Cache data detection method and apparatus, computer device and storage medium
CN116723242A (en) * 2023-06-27 2023-09-08 北京商银微芯科技有限公司 Network request cache retransmission method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN117390072A (en) 2024-01-12

Similar Documents

Publication Publication Date Title
US9497256B1 (en) Static tracker
US8706884B2 (en) Method and system for generating and using an augmented bloom filter
EP2727011B1 (en) Predicting user navigation events
US7739253B1 (en) Link-based content ratings of pages
US8019811B1 (en) Application state server-side cache for a state-based client-server application
CN1439132A (en) A network apparatus for validating documents
US8909737B2 (en) Caching provenance information
CN109617996A (en) File uploads and method for down loading, server and computer readable storage medium
EP3832452A1 (en) Log printing method and system, server
CN109450844B (en) Method and device for triggering vulnerability detection
US11388216B2 (en) System and method for generating API schemas for networked services
US11281462B1 (en) Rule-based scoring for APIs
US20140012939A1 (en) Method for providing resources by a terminal, and method for acquiring resources by a server
CN113452780A (en) Access request processing method, device, equipment and medium for client
CN117390072B (en) Method for improving network request speed in embedded system
CN107181747A (en) A kind of Handle resolution systems comprising top mode
CN113839940B (en) URL pattern tree-based defense method, device, electronic equipment and readable storage medium
US11599583B2 (en) Deep pagination system
JP2007140709A (en) Web page patrol device and web page patrol program
CN111049919B (en) User request processing method, device, equipment and storage medium
EP4235377A1 (en) Churn prediction using clickstream data
WO2021135114A1 (en) Cluster environment-based telephone session management method, apparatus, and computer device
CN116361403A (en) Data link processing method, device, computer equipment and storage medium
CN117436118A (en) Blocking method, blocking device, blocking equipment, blocking medium and blocking system for sensitive data
CN114579481A (en) Data processing method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant