WO2021012974A1 - 基于云平台的容器化应用网络流控方法、装置、设备及存储介质 - Google Patents
基于云平台的容器化应用网络流控方法、装置、设备及存储介质 Download PDFInfo
- Publication number
- WO2021012974A1 WO2021012974A1 PCT/CN2020/101557 CN2020101557W WO2021012974A1 WO 2021012974 A1 WO2021012974 A1 WO 2021012974A1 CN 2020101557 W CN2020101557 W CN 2020101557W WO 2021012974 A1 WO2021012974 A1 WO 2021012974A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- flow control
- network flow
- application
- access
- configuration corresponding
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012546 transfer Methods 0.000 claims description 2
- 238000007726 management method Methods 0.000 description 17
- 230000004044 response Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
Definitions
- This application relates to a containerized application network flow control method, device, equipment and storage medium based on a cloud platform.
- This application provides a containerized application network flow control method, device, equipment, and storage medium based on a cloud platform to improve network resource utilization.
- At least one embodiment of the present invention provides a containerized application network flow control method based on a cloud platform, including:
- Network flow control parameters include multiple time periods and a network flow control configuration corresponding to each time period
- An embodiment of the present invention provides a containerized application network flow control device based on a cloud platform, including:
- the parameter obtaining unit is configured to obtain network flow control parameters, where the network flow control parameters include multiple time periods and the network flow control configuration corresponding to each time period;
- the access control unit is configured to receive an access request to an application, determine the network flow control configuration corresponding to the application in the current period according to the network flow control parameter; perform access control according to the network flow control configuration corresponding to the application in the current period .
- An embodiment of the present invention provides a containerized application network flow control device based on a cloud platform, including a memory and a processor, the memory stores a program, and when the program is read and executed by the processor, any The cloud platform-based containerized application network flow control method described in the embodiment.
- An embodiment of the present invention provides a computer-readable storage medium, the computer-readable storage medium stores one or more programs, and the one or more programs can be executed by one or more processors to realize any The cloud platform-based containerized application network flow control method described in the embodiment.
- FIG. 1 is a schematic diagram of the position of a network traffic control center (The Center Of Network Traffic Control, TCONTC) in a container cloud platform structure provided by an embodiment of the present invention
- TCONTC The Center Of Network Traffic Control
- FIG. 2 is a flowchart of a method for network flow control based on a cloud platform according to an embodiment of the present invention
- FIG. 3 is a flowchart of another method for network flow control based on a cloud platform according to an embodiment of the present invention
- FIG. 4 is a flowchart of a TCONTC flow control method according to an embodiment of the present invention.
- FIG. 5 is a schematic diagram of the overall flow of a network flow control method according to an embodiment of the present invention.
- FIG. 6 is a schematic diagram of an implementation of a network flow control method provided by an embodiment of the present invention.
- FIG. 7 is a schematic diagram of an implementation of another network flow control method provided by an embodiment of the present invention.
- FIG. 8 is a schematic diagram of the implementation of another network flow control method according to an embodiment of the present invention.
- FIG. 9 is a block diagram of a network flow control device provided by an embodiment of the present invention.
- FIG. 10 is a block diagram of a computer-readable storage medium according to an embodiment of the present invention.
- FIG. 11 is a block diagram of a network flow control device provided by an embodiment of the present invention.
- FIG. 1 is a schematic diagram of the position of a TCONTC in a container cloud platform structure provided by an embodiment of the present invention.
- the container cloud platform architecture includes three parts: infrastructure 11, container cloud platform 12, and container application 13.
- the basic equipment 11 includes a physical machine/virtual machine/Infrastructure as a Service (IAAS) 111
- the container cloud platform 12 includes a container engine (such as docker) 121, an application orchestration (Kubernetes) 122, and a data volume management module 123.
- the network management module 1210 is configured to perform unified management of the network resources of the cloud platform; including functions such as current limiting and current access flow acquisition.
- the service registration center module 126 is configured to perform unified management of service information provided by container applications on the cloud platform.
- the application management module 1211 is configured to manage the life cycle of container applications.
- the container cloud platform 12 also includes a network traffic control center (The Center Of Network Traffic Control, TCONTC) 1212, which is set in the application management module 1211.
- the TCONTC 1212 is configured to implement network flow control of container applications.
- TCONTC1212 supports regular detection of traffic. Through interface operations, it can periodically detect the traffic currently accessed by each container application. The traffic currently accessed by each container application can be obtained from the network management module 1210.
- TCONTC 1212 may also be set in the network management module 1210.
- an embodiment of the present invention provides a containerized application network flow control method based on a cloud platform, including:
- Step 201 Obtain network flow control parameters, where the network flow control parameters include a time period and its corresponding network flow control configuration.
- Step 202 Receive an access request for an application, and perform access control according to the network flow control configuration corresponding to the application in the current period.
- the application is a container application.
- the solution provided by this embodiment enriches the current limiting function of the container network, achieves time-based access control in the cloud platform, saves labor costs, and improves network resource utilization.
- the time period and its corresponding network flow control configuration include: a first time period and its corresponding network flow control configuration, and a second time period and its corresponding network flow control configuration.
- the first period is, for example, a period when the business is relatively busy, which may also be called a busy period
- the second period is, for example, a period when the business is not busy, and may also be called a normal period.
- the time period is only divided into two, the first time period and the second time period. In other embodiments, it can also be divided into more time periods.
- the values of the first time period and the second time period can be determined according to the number of access requests applied during system operation.
- the network flow control configuration includes at least one of a flow threshold and access priority information. For example, set a flow threshold for the first period and another threshold for the second period. When the first period is a busy period, set a larger threshold, and when the second period is a normal period, set a smaller threshold. Traffic threshold.
- the access priority information can be two priorities, high priority and low priority, or more priority.
- the performing access control according to the network flow control configuration corresponding to the application in the current period includes:
- access control is performed according to the access priority information in the network flow control configuration corresponding to the current time period; when the application traffic is not When the traffic threshold in the network flow control configuration corresponding to the application in the current period is exceeded, the access request is sent to the container application.
- the performing access control according to the access priority information in the network flow control configuration corresponding to the current period includes:
- the first preset condition is, for example, that the priority of the current access request is high priority
- the second preset condition is, for example, that the priority of the current access request is low priority. This is only an example, and the first preset condition and the second preset condition can be set as needed.
- the acquiring network flow control parameters includes: acquiring the network flow control parameters through a predefined system deployment definition descriptor (System Deploy Define Description, SDDD) entity.
- SDDD System Deploy Define Description
- the SDDD entity is implemented using at least one of the following: a database, a file, and a Representational State Transfer (REST) interface.
- a database e.g., a database
- a file e.g., a file
- REST Representational State Transfer
- the file is, for example, a yaml file.
- the yaml file is as follows:
- the busy period of service 1 (service1) is 9:00-10:00, other periods are normal periods, the threshold of busy periods is 50M, and the priority is 1, the threshold of normal periods is 10M, and the priority is 1.
- (Business 2service2) busy period is 9:30-10:00, other periods are normal periods, the threshold for busy periods is 50M, priority is 1, the threshold for normal periods is 10M, priority is 2
- business 3 ( The busy period of service3) is 9:00-10:00, other periods are normal periods, the threshold of the busy period is 50M, the priority is 1, the threshold of the normal period is 10M, and the priority is 3.
- an embodiment of the present invention provides a method for network flow control of containerized applications based on a cloud platform, which includes the following steps:
- Step 301 Define SDDD entities.
- SDDD entities such as databases, files, and REST interface methods.
- SDDD entities include network flow control parameters, including time periods and corresponding network flow control configurations (access priority, access threshold, etc.).
- the SDDD entity can be defined by the user or pre-configured in the system.
- Step 302 Receive the user's request for access to the application, and read the application information, including: reading the network flow control parameters of the SDDD entity, and loading them into TCONTC for subsequent use.
- Step 303 Start the network flow control process.
- Step 304 Receive an access response from the application to the access request, and send it to the user.
- the application is a container application.
- the time period is divided into busy time period and normal time period, and the priority is divided into high priority and non-high priority.
- the network flow control process includes:
- Step 401 Read SDDD information.
- step 402 it is detected whether the current time is a busy time period of the application, if the current time is a busy time period, step 404 is executed, and if the current time is not a busy time period, step 403 is executed.
- Step 403 Load the network flow control configuration in the normal period, and execute step 405.
- Step 404 load the network flow control configuration during the busy time period, and execute step 405.
- Step 405 Detect whether the current flow of the application exceeds the preset threshold; if the current flow does not exceed the preset threshold, go to step 408; if the current flow exceeds the preset threshold, go to step 406.
- step 406 it is judged whether the current visit is of high priority, if the current visit is of high priority, step 408 is executed, and if the current visit is not of high priority, step 407 is executed.
- the judging whether the current access is of high priority refers to judging whether the application accessed by the current access request is of high priority.
- Step 407 Put the access request into the access queue, and go to step 409; the access requests in the access queue are sent to the application in turn.
- Step 408 Access the application directly, that is, send an access request to the application.
- Step 409 Receive the access response returned by the application.
- Figure 5 is a schematic diagram of the overall flow of a network flow control method provided by an embodiment of the present invention.
- the application has been deployed normally and can be accessed normally. As shown in Figure 5, it includes:
- Step 501 The container cloud platform receives the SDDD entity configured by the user and the application access request sent by the user.
- Step 502 TCONTC loads the SDDD entity to obtain network flow control parameters.
- Step 503 TCONTC obtains the network information and registration information of the application from the service registration center.
- Step 504 TCONTC obtains the current access traffic of the application, and performs access control according to the network flow control parameters and the current access traffic.
- the control process please refer to FIG. 4, which will not be repeated here.
- Step 505 Send the access request to the container application.
- Step 506 Receive the access response returned by the container application.
- Step 507 Send the access response to the user.
- the yaml file is taken as the SDDD entity. As shown in Figure 6, including:
- Step 601 Receive the SDDD entity yaml file uploaded by the user, where the SDDD entity yaml file is generated according to the actual network traffic requirements of the application, and receives the user's access request to the application through the browser or interface.
- the yaml file is just an example and can be other types of files.
- Step 602 TCONTC is started, and the network flow control parameters are obtained by loading the SDDD entity yaml file.
- Step 603 According to the service name of the application to be accessed, TCONTC obtains the network information and registration information of the application from the service registration center.
- Step 604 TCONTC activates the function of obtaining application access traffic regularly, obtains the access traffic of the application, and saves it in the database to provide data support for network traffic control.
- TCONTC calls the interface of the network management module to achieve current traffic acquisition and access control, and performs the following operations:
- a Determine whether the current time is the busy time period of the application. If the current time is a busy time period, load the network flow control configuration of the busy time period; if the current time is not a busy time period, load the network flow control configuration of the normal time period.
- step b Start threshold judgment. Compare the current flow of the application with the preset threshold. If the current flow of the application does not exceed the preset threshold, the application is directly accessed. If the current flow of the application exceeds the preset threshold, the network flow priority control process is started, and step c is executed.
- TCONTC judges whether the current access is of high priority according to the network flow control configuration. If the current access is of high priority, it will directly access the application. If the current access is not of high priority, it will put the access request into the access queue and access the application in turn .
- Step 605 The access request reaches the container application.
- Step 606 The container application generates an access response according to the access request, and sends the access response to the container cloud platform.
- step 607 the container cloud platform feeds back the access response to the browser or interface of the user, completing the access process.
- the database table is the SDDD entity. As shown in Figure 7, it includes:
- Step 701 Receive the SDDD entity database entity table configured by the user according to the actual network traffic requirements of the application, and receive the user's access request to the application through the browser or interface.
- Step 702 TCONTC is started, and network flow control parameters are obtained by reading the database entity table.
- Step 703 According to the service name of the application, TCONTC obtains the network information and registration information of the application from the service registration center.
- Step 704 Start the function of regularly obtaining application access traffic and save it in the database to provide data support for network traffic control.
- TCONTC calls the interface of the network management module to achieve current traffic acquisition and access control, and performs the following operations:
- a Determine whether the current time is the busy time period of the application. If the current time is a busy time period, load the network flow control configuration of the busy time period; if the current time is not a busy time period, load the network flow control configuration of the normal time period.
- step b Start threshold judgment. Compare the current flow of the application with the preset threshold. If the current flow of the application does not exceed the preset threshold, the application is directly accessed. If the current flow of the application exceeds the preset threshold, the network flow priority control process is started, and step c is executed.
- TCONTC judges whether the current access is of high priority according to the network flow control configuration. If the current access is of high priority, it will directly access the application. If the current access is not of high priority, it will put the access request into the access queue and access the application in turn .
- Step 705 The access request arrives at the container application.
- Step 706 The container application generates an access response according to the access request, and sends the access response to the container cloud platform.
- Step 707 The container cloud platform feeds back the access response to the browser or interface of the user, completing the access process.
- the REST interface is taken as the SDDD entity, as shown in Figure 8, including:
- step 801 the user generates a REST interface according to the actual network traffic requirements of the application, receives the SDDD entity-REST interface uniform resource locator (URL) configured by the user, and receives the user's access request to the application through a browser or interface .
- URL uniform resource locator
- Step 802 TCONTC is started, and network flow control parameters are obtained through the REST interface.
- Step 803 According to the service name of the application, TCONTC obtains the network information and registration information of the application from the service registration center.
- Step 804 Start the function of regularly acquiring application access traffic, and save it in the database to provide data support for network flow priority control.
- TCONTC calls the interface of the network management module to achieve current traffic acquisition and access control, and performs the following operations:
- a Determine whether the current time is the busy time period of the application. If the current time is a busy time period, load the network flow control configuration of the busy time period; if the current time is not a busy time period, load the network flow control configuration of the normal time period.
- step b Start threshold judgment. Compare the current flow of the application with the preset threshold. If the current flow of the application does not exceed the preset threshold, the application is directly accessed. If the current flow of the application exceeds the preset threshold, the network flow priority control process is started, and step c is executed.
- TCONTC judges whether the current access is of high priority according to the network flow control configuration. If the current access is of high priority, it will directly access the application. If the current access is not of high priority, it will put the access request into the access queue and access the application in turn .
- Step 805 The access request reaches the container application.
- Step 806 The container application generates an access response according to the access request, and sends the access response to the container cloud platform.
- step 807 the container cloud platform feeds back the access response to the browser or interface of the user, completing the access process.
- an embodiment of the present invention provides a containerized application network flow control device 90 based on a cloud platform, which includes a memory 910 and a processor 920.
- the memory 910 stores a program, and the program is When reading and executing, the processor 920 implements the containerized application network flow control method based on the cloud platform described in any embodiment.
- an embodiment of the present invention provides a computer-readable storage medium 100.
- the computer-readable storage medium stores one or more programs 1010, and the one or more programs 1010 can be stored by one or more programs. Executed by each processor to implement the containerized application network flow control method based on the cloud platform described in any embodiment.
- an embodiment of the present invention provides a containerized application network flow control device based on a cloud platform, including:
- the parameter obtaining unit 1110 is configured to obtain network flow control parameters, where the network flow control parameters include a time period and its corresponding network flow control configuration.
- the access control unit 1120 is configured to receive an access request for an application, and perform access control according to the network flow control configuration corresponding to the application in the current period.
- the functional modules/units in the system, and the device can be implemented as software, firmware, hardware, and appropriate combinations thereof.
- the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, a physical component may have multiple functions, or a function or step may consist of multiple The physical components cooperate to execute.
- Some or all components may be implemented as software executed by a processor, such as a digital signal processor or a microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit.
- Such software may be distributed on a computer-readable medium, and the computer-readable medium may include a computer storage medium (or non-transitory medium) and a communication medium (or transitory medium).
- Computer storage medium includes volatile and non-volatile, removable and non-removable implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data) medium.
- Computer storage media include but are not limited to Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory, EEPROM) , Flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (Digital Video Disc, DVD) or other optical disc storage, magnetic cassettes, tapes, magnetic disk storage or other magnetic
- RAM Random Access Memory
- ROM Read-Only Memory
- EEPROM Electrically Erasable Programmable Read-Only Memory
- Flash memory or other memory technology
- compact disc read-only memory CD-ROM
- digital versatile disc Digital Video Disc, DVD
- magnetic cassettes tapes
- magnetic disk storage magnetic disk storage or other magnetic
- communication media usually
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (10)
- 一种基于云平台的容器化应用网络流控方法,包括:获取网络流控参数,所述网络流控参数中包括多个时段及每个时段对应的网络流控配置;接收对应用的访问请求,根据所述网络流控参数确定所述应用在当前时段对应的网络流控配置;根据所述应用在当前时段对应的网络流控配置进行访问控制。
- 根据权利要求1所述的方法,其中,所述多个时段及每个时段对应的网络流控配置包括:第一时段及所述第一时段对应的网络流控配置,第二时段及所述第二时段对应的网络流控配置。
- 根据权利要求1所述的方法,其中,所述网络流控配置包括流量阈值和访问优先级信息中的至少之一。
- 根据权利要求3所述的方法,其中,所述根据所述应用在当前时段对应的网络流控配置进行访问控制包括:在所述应用的流量超过所述应用在当前时段对应的网络流控配置中的流量阈值的情况下,根据所述当前时段对应的网络流控配置中的访问优先级信息进行访问控制;在所述应用的流量未超过所述应用在当前时段对应的网络流控配置中的流量阈值的情况下,将所述访问请求发送给所述应用。
- 根据权利要求4所述的方法,其中,所述根据所述当前时段对应的网络流控配置中的访问优先级信息进行访问控制包括:根据所述当前时段对应的网络流控配置中的访问优先级信息确定所述访问请求的优先级;在所述访问请求的优先级满足第一预设条件的情况下,将所述访问请求发送给所述容器应用;在所述访问请求的优先级满足第二预设条件的情况下,将所述访问请求加入访问队列。
- 根据权利要求1至5中任一项所述的方法,其中,所述获取网络流控参数包括:通过预定义的系统部署定义描述符实体获取所述网络流控参数。
- 根据权利要求6所述的方法,其中,所述系统部署定义描述符实体使用以下至少之一实现:数据库、文件、表征状态转移REST接口。
- 一种基于云平台的容器化应用网络流控装置,包括:参数获取单元,设置为获取网络流控参数,所述网络流控参数中包括多个时段及每个时段对应的网络流控配置;访问控制单元,设置为接收对应用的访问请求,根据所述网络流控参数确定所述应用在当前时段对应的网络流控配置;根据所述应用在当前时段对应的网络流控配置进行访问控制。
- 一种基于云平台的容器化应用网络流控设备,包括存储器和处理器,所述存储器存储有程序,所述程序在被所述处理器读取执行时,实现如权利要求1至7中任一项所述的基于云平台的容器化应用网络流控方法。
- 一种计算机可读存储介质,存储有至少一个程序,所述至少一个程序可被至少一个处理器执行,以实现如权利要求1至7中任一项所述的基于云平台的容器化应用网络流控方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910667771.9 | 2019-07-23 | ||
CN201910667771.9A CN112291287A (zh) | 2019-07-23 | 2019-07-23 | 基于云平台的容器化应用网络流控方法及设备、存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021012974A1 true WO2021012974A1 (zh) | 2021-01-28 |
Family
ID=74193196
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/101557 WO2021012974A1 (zh) | 2019-07-23 | 2020-07-13 | 基于云平台的容器化应用网络流控方法、装置、设备及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112291287A (zh) |
WO (1) | WO2021012974A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115277503A (zh) * | 2022-06-24 | 2022-11-01 | 北京天融信网络安全技术有限公司 | 一种监控网络流量的方法、装置、存储介质及电子设备 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7113990B2 (en) * | 2002-05-29 | 2006-09-26 | Distributed Management Information Systems, Inc. | System and process for allocating flow capacity in a network |
CN101056274A (zh) * | 2007-06-15 | 2007-10-17 | 中兴通讯股份有限公司 | 一种分时流量管理方法及装置 |
CN101436987A (zh) * | 2008-10-06 | 2009-05-20 | 中兴通讯股份有限公司 | QoS服务的调度配置方法和装置 |
CN101588555A (zh) * | 2008-05-21 | 2009-11-25 | 中兴通讯股份有限公司 | 短消息的流量控制方法及短消息网关 |
CN101888337A (zh) * | 2010-06-29 | 2010-11-17 | 武汉绿色网络信息服务有限责任公司 | 一种基于控制矩阵的网络实时流量控制方法 |
US20110231769A1 (en) * | 2010-03-18 | 2011-09-22 | Tovar Tom C | Systems and Methods for Scheduling Online Access |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404811B (zh) * | 2008-11-17 | 2010-12-08 | 中兴通讯股份有限公司 | 一种小区短信的流量控制方法及系统 |
US9800483B2 (en) * | 2012-04-13 | 2017-10-24 | CirrusWorks, Inc. | Method and apparatus for dynamic bandwidth allocation for optimizing network utilization |
CN108112038B (zh) * | 2016-11-24 | 2021-06-01 | 深圳市云网万店科技有限公司 | 一种控制访问流量的方法及装置 |
CN108696445A (zh) * | 2018-05-28 | 2018-10-23 | 深圳市零度智控科技有限公司 | 流量控制方法、移动终端及计算机可读存储介质 |
CN109274547A (zh) * | 2018-08-17 | 2019-01-25 | 中国平安人寿保险股份有限公司 | 基于网络安全的服务熔断方法、装置、设备及存储介质 |
CN109842565B (zh) * | 2018-12-15 | 2023-03-28 | 平安科技(深圳)有限公司 | 接口限流方法、装置、电子设备及存储介质 |
-
2019
- 2019-07-23 CN CN201910667771.9A patent/CN112291287A/zh active Pending
-
2020
- 2020-07-13 WO PCT/CN2020/101557 patent/WO2021012974A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7113990B2 (en) * | 2002-05-29 | 2006-09-26 | Distributed Management Information Systems, Inc. | System and process for allocating flow capacity in a network |
CN101056274A (zh) * | 2007-06-15 | 2007-10-17 | 中兴通讯股份有限公司 | 一种分时流量管理方法及装置 |
CN101588555A (zh) * | 2008-05-21 | 2009-11-25 | 中兴通讯股份有限公司 | 短消息的流量控制方法及短消息网关 |
CN101436987A (zh) * | 2008-10-06 | 2009-05-20 | 中兴通讯股份有限公司 | QoS服务的调度配置方法和装置 |
US20110231769A1 (en) * | 2010-03-18 | 2011-09-22 | Tovar Tom C | Systems and Methods for Scheduling Online Access |
CN101888337A (zh) * | 2010-06-29 | 2010-11-17 | 武汉绿色网络信息服务有限责任公司 | 一种基于控制矩阵的网络实时流量控制方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115277503A (zh) * | 2022-06-24 | 2022-11-01 | 北京天融信网络安全技术有限公司 | 一种监控网络流量的方法、装置、存储介质及电子设备 |
CN115277503B (zh) * | 2022-06-24 | 2024-03-15 | 北京天融信网络安全技术有限公司 | 一种监控网络流量的方法、装置、存储介质及电子设备 |
Also Published As
Publication number | Publication date |
---|---|
CN112291287A (zh) | 2021-01-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3739845B1 (en) | Borrowing data storage resources in a distributed file system | |
US10637916B2 (en) | Method and device for storage resource allocation for video cloud storage | |
CN110795244B (zh) | 一种任务分配方法、装置、设备及介质 | |
US9836516B2 (en) | Parallel scanners for log based replication | |
CN109151512A (zh) | Cdn网络中获取内容的方法及装置 | |
US20170153909A1 (en) | Methods and Devices for Acquiring Data Using Virtual Machine and Host Machine | |
WO2021012974A1 (zh) | 基于云平台的容器化应用网络流控方法、装置、设备及存储介质 | |
CN114064780A (zh) | 会话信息的处理方法、系统、装置、存储介质及电子设备 | |
CN108124021B (zh) | 网际协议ip地址获取、网站访问的方法、装置及系统 | |
CN108255853B (zh) | 一种插件式的请求异步处理方法以及系统 | |
CN117407159A (zh) | 内存空间的管理方法及装置、设备、存储介质 | |
CN110365743B (zh) | 一种基于Zookeeper实现的支持多种可自定义负载算法的负载均衡器实现方法 | |
CN110011850B (zh) | 云计算系统中服务的管理方法和装置 | |
CN114661246B (zh) | 一种存储控制的方法和装置 | |
CN113157415B (zh) | 农场渲染方法、装置、电子设备和存储介质 | |
CN106899652B (zh) | 一种推送业务处理结果的方法及装置 | |
CN112468558B (zh) | 基于混合云的请求转发方法、装置、终端及存储介质 | |
WO2021077747A1 (zh) | 一种实现应用加载的方法、装置、计算机存储介质及终端 | |
CN116155829A (zh) | 网络流量处理方法、装置、介质及电子设备 | |
CN112583862A (zh) | 数据并发的处理方法、装置、存储介质及设备 | |
CN115328978B (zh) | 一种连接池的连接方法和服务器 | |
CN106507224B (zh) | 一种获取目标文件的方法及相关装置 | |
CN114153399B (zh) | 存储系统的数据存储方法、装置、控制装置和介质 | |
CN115190177B (zh) | 请求处理方法、装置、计算机设备、存储介质和程序产品 | |
CN114221946B (zh) | 基于对象网关管理文件的方法、装置、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20844009 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20844009 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20844009 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 27/09/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20844009 Country of ref document: EP Kind code of ref document: A1 |