CN108768985A - A kind of accessed node access distribution method and device - Google Patents

A kind of accessed node access distribution method and device Download PDF

Info

Publication number
CN108768985A
CN108768985A CN201810475119.2A CN201810475119A CN108768985A CN 108768985 A CN108768985 A CN 108768985A CN 201810475119 A CN201810475119 A CN 201810475119A CN 108768985 A CN108768985 A CN 108768985A
Authority
CN
China
Prior art keywords
server
node
accessed node
accessed
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810475119.2A
Other languages
Chinese (zh)
Inventor
姜光植
任孟洋
杨侑忆
徐瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhiyun Technology Co.,Ltd.
Original Assignee
CHENGDU ZHIYUN SCIENCE & TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU ZHIYUN SCIENCE & TECHNOLOGY Co Ltd filed Critical CHENGDU ZHIYUN SCIENCE & TECHNOLOGY Co Ltd
Priority to CN201810475119.2A priority Critical patent/CN108768985A/en
Publication of CN108768985A publication Critical patent/CN108768985A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/18Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1021Server selection for load balancing based on client or server locations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of accessed node access distribution method of offer of the embodiment of the present invention and device, the management server being applied in distributed server cluster, the method includes monitoring whether that there are new accessed nodes to need to access;If in the presence of calling matched Port Profile to realize the access of the accessed node according to the type of the accessed node;It is chosen from the server cluster and is located at the server of areal with the accessed node and accesses as first object server the distribution of node.The present invention can be accessed and be distributed with the node suitable for multi-protocols accessed node, and fast response time.

Description

A kind of accessed node access distribution method and device
Technical field
The present invention relates to fields of communication technology, and distribution method and device are accessed in particular to a kind of accessed node.
Background technology
In existing server cluster when realizing the access to the accessed node of different agreement, distribution, need by more Different access accesses is realized in the port of a different types of interface protocol of installation, causes response speed slow.
Invention content
In view of this, a kind of accessed node access distribution method of offer of the embodiment of the present invention and device, can effectively solve State problem.
On the one hand, present pre-ferred embodiments provide a kind of accessed node access distribution method, are applied to Distributed Services Management server in device cluster, the method includes:
Monitor whether that there are new accessed nodes to need to access;
If in the presence of calling matched Port Profile to realize the accessed node according to the type of the accessed node Access;
It is chosen from the server cluster and is located at the server of areal as first object with the accessed node Server accesses the distribution of node.
In the selection of present pre-ferred embodiments, the method further includes:
Judge whether reach upper loading limit with the load value in the first object server;
It is adjacent from the first object server if the load value in the first object server reaches upper loading limit It is chosen in region and meets the server of preset condition and access as the second destination server the distribution of node;
If the load value in the first object server is not up to upper loading limit, executes and taken based on the first object Business device access node distribution the step of.
In the selection of present pre-ferred embodiments, the method further includes:
Judge whether reach upper loading limit with the load value in second destination server;
If the load value in second destination server reaches upper loading limit, utilize CRC32 or time32 algorithms will In each server in the accessed node mean allocation to the server cluster;
If the load value in second destination server is not up to upper loading limit, executes and taken based on second target Business device access node distribution the step of.
In the selection of present pre-ferred embodiments, the method further includes:
Judge whether the accessed node has whether server access permission and the accessed node are legal section Point, if the accessed node has server access permission and is legitimate node, execution is chosen from the server cluster The step of being located at the server of areal as first object server with the accessed node and access the distribution of node.
In the selection of present pre-ferred embodiments, chooses from the server cluster and be located at together with the accessed node One area server include as the step of first object server:
The KEY values of the accessed node are calculated, and the KEY values of the calculating accessed node have been deposited on default Hash ring Each server node KEY values between distance;
Based on result of calculation, and according to the KEY chosen from the default Hash ring clockwise with the accessed node elephant The server of distance minimum is as first object server between value.
In the selection of present pre-ferred embodiments, the KEY values of the accessed node or the KEY values of the server are bases It is calculated in the IP values or distinguished name of the accessed node.
In the selection of present pre-ferred embodiments, the method further includes:
It records and monitors the log information carried out to the accessed node in access and assigning process;
Judge that the accessed node is carried out with the presence or absence of exception in access and assigning process, if depositing based on the log information In exception, then log alarming is carried out.
On the other hand, present pre-ferred embodiments also provide a kind of accessed node access distributor, are applied to distribution Management server in server cluster, described device include:
Node monitoring modular, for monitoring whether that there are new accessed nodes to need to access;
Protocol adaptation module, for when there are new accessed node, called according to the type of the accessed node and its The access of accessed node described in appropriate ports protocol realization;
Node distribution module, for choosing the clothes for being located at areal with the accessed node from the server cluster Business device accesses the distribution of node as first object server.
In the selection of present pre-ferred embodiments, described device further includes:
First judgment module, for judging whether reach upper loading limit with the load value in the first object server;
When the load value that the node distribution module is additionally operable in the first object server reaches upper loading limit, from It is chosen in the first object server adjacent area and meets the server of preset condition and visited as the second destination server Ask the distribution of node.
In the selection of present pre-ferred embodiments, described device further includes:
Second judgment module, for judging whether reach upper loading limit with the load value in second destination server;
When the load value that the node distribution module is additionally operable in second destination server reaches upper loading limit, profit It will be in each server in the accessed node mean allocation to the server cluster with CRC32 or time32 algorithms.
Compared with prior art, accessed node access distribution method provided in an embodiment of the present invention and device, wherein having Accessed node needs corresponding port access protocol can be called to realize to the accessed node according to the type of accessed node when access Access, i.e., the present invention be capable of providing multi-protocols port to adapt to the access of different accessed nodes.
In addition, the present invention to accessed node access node legitimacy and access rights verification, can effectively carry Safety when high accessed node access.Meanwhile the present invention also provides a variety of different node allocation strategies, can effectively it ensure Controllability and harmony when node distributes.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the frame structure schematic diagram using distributed server cluster provided in an embodiment of the present invention.
Fig. 2 is the frame structure schematic diagram of management server shown in Fig. 1.
Fig. 3 is the flow diagram that accessed node provided in an embodiment of the present invention accesses distribution method.
Fig. 4 is another flow diagram that accessed node provided in an embodiment of the present invention accesses distribution method.
Fig. 5 is the another flow diagram that accessed node provided in an embodiment of the present invention accesses distribution method.
Fig. 6 is the another flow diagram that accessed node provided in an embodiment of the present invention accesses distribution method.
Fig. 7 is the frame structure schematic diagram that accessed node provided in an embodiment of the present invention accesses distributor.
Icon:10- management servers;100- accessed nodes access distributor;110- node monitoring modulars;120- agreements Adaptation module;130- node distribution modules;The first judgment modules of 140-;The second judgment modules of 150-;200- memories;300- is deposited Store up controller;400- processors;20- accessed nodes;30- distributed server clusters.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.The present invention being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.
Therefore, below the detailed description of the embodiment of the present invention to providing in the accompanying drawings be not intended to limit it is claimed The scope of the present invention, but be merely representative of the present invention selected embodiment.Based on the embodiments of the present invention, this field is common The every other embodiment that technical staff is obtained without creative efforts belongs to the model that the present invention protects It encloses.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.
As shown in Figure 1, the application scenarios for accessing distribution method and device for accessed node provided in an embodiment of the present invention show It is intended to, which includes distributed server cluster 30 and positioned at different regions, the multi-party accessed node of different location 20, wherein the accessed node 20 can be the electronic equipments such as server, mobile phone, computer, the distributed server cluster 30 Multiple servers including management server 10 and with the management server 10 communication connection, the management server 10 can also be with Each accessed node 20 connects, for when the accessed node 20 meets access conditions, the accessed node 20 to be distributed It is handled on to each server in the distributed server cluster 30.
Wherein, the management server 10 and other servers being connect with the management server 10 can be but not limited to Smart mobile phone, PC (personal computer, PC), tablet computer, personal digital assistant (personal Digital assistant, PDA), it is mobile internet surfing equipment (mobile Internet device, MID), Cloud Server, small-sized Machine etc..Optionally, in the present embodiment, as shown in Fig. 2, management server 10 includes accessed node access distributor 100, deposits Reservoir 200, storage control 300 and processor 400.Wherein, the memory 200, storage control 300, processor 400 Each element is directly or indirectly electrically connected between each other, to realize the transmission or interaction of data.For example, leading between these elements It crosses one or more communication bus or signal wire is realized and is electrically connected.The accessed node access distributor 100 includes at least One can be stored in the memory 200 in the form of software or firmware or be solidificated in the operation in the management server 10 Software function module in system.The processor 400 accesses the memory under the control of the storage control 300 200, for executing the executable module stored in the memory 200, such as the accessed node accesses distributor 100 Included software function module and computer program etc..
It is appreciated that structure shown in Fig. 2 be only illustrate, the management server 10 may also include than shown in Fig. 2 more More either less components or with the configuration different from shown in Fig. 2.
Further, as shown in figure 3, the flow for accessing distribution method for accessed node 20 provided in an embodiment of the present invention is shown It is intended to, which accesses distribution method and be applied to above-mentioned management server 10, below in conjunction with Fig. 3 to the access Node 20 accesses the specific steps of distribution method and flow is described in detail.It should be understood that the visit provided in the present embodiment It is limitation with the sequence of steps described below and flow to ask that node 20 accesses distribution method not.
Step S10 monitors whether that there are new accessed nodes 20 to need to access;
Step S11, and if it exists, then call matched Port Profile to realize institute according to the type of the accessed node 20 State the access of accessed node 20;
Step S12 chooses from the distributed server cluster 30 and is located at areal with the accessed node 20 Server accesses the distribution of node 20 as first object server.
In the present embodiment, the design of S10- steps S12 through the above steps, the management server 10 can be according to difference The type (such as protocol type) of accessed node 20 is called with the 20 appropriate ports protocol realization of accessed node to accessed node 20 access, to realize multi-protocols function.In addition, can also be realized to the accessed node 20 after the access of the accessed node 20 Quickly distribution.
In detail, in step slo, the position of the accessed node 20, type, quantity etc. are not limited herein, described Management server 10 can realize the monitoring for the node 20 that accesses, such as 0.5S, 1S according to prefixed time interval.
In step s 11, in order to meet different regions, different types of accessed node 20 to distributed server cluster 30 In each server data access etc., the present embodiment can according to the type of accessed node 20 carry out protocol adaptation, with control connect Inbound port is installed and 20 matched agreement of accessed node, and in the present embodiment, the agreement can be but not limited to udp protocol, TCP Agreement, websocket protocol etc..In addition, when actual implementation, if the management server 10 monitors simultaneously, there are multiple access Node 20 needs to access, and can wait the access operation for the node 20 that accesses successively sequentially in time.Since the management takes Acquiescence runs Single port agreement in node access interface in business device 10, therefore, in actual implementation, can be directly based upon current The access access of node 20 of Port Profile under state executes only in 20 access failure of accessed node in step S12 Step.
Further, in one embodiment, it in order to ensure the legitimacy and access rights of the accessed node 20, is holding Before row step S12, it also can determine whether the accessed node 20 has server access permission and the accessed node 20 Whether it is legitimate node, if the accessed node 20 has server access permission and is legitimate node, executes from the clothes It is chosen in business device cluster and is located at the server of areal with the accessed node 20 and accesses as first object server The step of distribution of node 20.Wherein, it refers to the data on server that whether the accessed node 20, which has access rights, Access rights, such as the push of data distribution, information, advertisement are launched.
In step S12, a variety of different allocation strategies may be used when accessed node 20 is allocated and realize, such as at this In embodiment, above-mentioned steps S12 can be realized by step S120 and step S121, with reference to Fig. 4 to step S120 and step S121 is introduced.
Step S120, calculates the KEY values of the accessed node 20, and calculate the KEY values of the accessed node 20 with it is pre- If the distance between the KEY values of already present each server node on Hash ring;
Step S121 is based on result of calculation, and is saved with the access according to being chosen from the default Hash ring clockwise The server of distance minimum is as first object server between the KEY values of point 20.
In above-mentioned steps S120 and step S121, the default Hash ring is will be corresponding according to common hash algorithm KEY is hashing onto in a space with 2^32 power buckets, i.e., then can be by this in the digital space of 0~(2^32) -1 A little numbers are connected to form the Hash ring of a closure end to end, finally calculate each server in the distributed server cluster 30 KEY values, and each KEY values being calculated hash is obtained into the default Hash ring on Hash ring above-mentioned.In addition, institute The KEY values of the KEY values or the server of stating accessed node 20 are IP values or distinguished name based on the accessed node 20 It is calculated.In the present embodiment, the controllability to accessed node 20, equilibrium not only may be implemented in step S120 and step S121 Property distribution, the lookup that corresponding server realizes accessed node 20 can be also quickly navigated to by cryptographic Hash.
It is understood that the specific implementation process of the step S12 in the present embodiment can be but not limited to above-mentioned steps S120 and step S121.
Further, according to actual demand, lead to server in order to avoid the load value on first object server is excessive The problems such as delay machine, occurs, and in one embodiment, as shown in figure 3, before executing step S12, the accessed node 20 accesses Distribution method may also include step S13 and step S14.
Step S13 judges whether reach upper loading limit with the load value in the first object server, if so, holding Row step S14;Conversely, the step of then executing the distribution for the node 20 that accesses based on the first object server.
Step S14 chooses from the first object server adjacent area and meets the server of preset condition as the Two destination servers access the distribution of node 20.
Wherein, the upper loading limit in step S13 and step S14 can carry out flexible design, the present embodiment according to actual demand It is not limited herein.In addition, the adjacent area of the adjacent area of the first object server, that is, accessed node 20, practical When implementation, the adjacent area can be one or more, and the present embodiment is not limited herein.
In addition, when actual implementation, as shown in fig. 6, before executing step S14, the accessed node 20 accesses distribution side Method can also realize the further harmonious distribution to accessed node 20 by step S15 and step S16.
Step S15 judges whether reach upper loading limit with the load value in second destination server, if so, holding Row step S16, conversely, the step of then executing the distribution for the node 20 that accesses based on second destination server.
Step S16, using CRC32 or time32 algorithms by 20 mean allocation of the accessed node to the server cluster In each server in.
It should be noted that in above-mentioned steps S12- steps S16, the management server 10 is allocated to accessed node 20 When, the server that preferential selection is located at areal with the accessed node 20 is allocated;Secondly, if being located at accessed node 20 When the server of areal is unsatisfactory for distributive condition, then consider choose adjacent area server access node 20 point Match;Finally, it if the server of adjacent area is also unsatisfactory for distributive condition, can be realized according to CRC32 or time32 algorithms flat It distributes, specifically this embodiment is not repeated.
Further, in order to realize the effective monitoring to accessed node 20 from access procedure to assigning process, with illegal When the abnormal conditions such as access occur, quickly processing etc. is carried out, in the present embodiment, the accessed node 20 accesses distribution method and also wraps It includes:It records and monitors the log information carried out to the accessed node 20 in access and assigning process;Based on the log information Judge that the accessed node 20 is carried out with the presence or absence of exception in access and assigning process, if in the presence of abnormal, carries out log alarming. Wherein, abnormal conditions can be but not limited to the unauthorized access of accessed node 20, visit capacity is excessive, access frequency is abnormal, service Excessive, server delay machine of device load value etc., and when the management server 10 monitors exception information above-mentioned, it can be by short The carry out exception notice such as letter, mail, and log information is reported etc..
Further, as shown in fig. 7, the accessed node to be provided in the embodiment of the present invention accesses the side of distributor 100 Mount structure schematic diagram, accessed node access distributor 100 include node monitoring modular 110, protocol adaptation module 120, Node distribution module 130, the first judgment module 140 and the second judgment module 150.
The node monitoring modular 110, for monitoring whether that there are new accessed nodes 20 to need to access;The present embodiment In, the description as described in the node monitoring modular 110 specifically refers to the detailed description of above-mentioned steps S10, that is, the step S10 can be executed by the node monitoring modular 110, thus not illustrated more herein.
The protocol adaptation module 120, for when there are new accessed node 20, according to the class of the accessed node 20 Type calls matched Port Profile to realize the access of the accessed node 20;In the present embodiment, about the protocol adaptation The description of module 120 specifically refers to the detailed description of above-mentioned steps S11, that is, the step S11 can be fitted by the agreement It executes with module 120, thus does not illustrate more herein.
The node distribution module 130 is located at together for being chosen from the server cluster with the accessed node 20 The server in one area accesses the distribution of node 20 as first object server, in the first object server When load value reaches upper loading limit, the server work for meeting preset condition is chosen from the first object server adjacent area Access the distribution of node 20 for the second destination server, and the load value in second destination server reaches negative It, will be each in the accessed node 20 mean allocation to the server cluster using CRC32 or time32 algorithms when carrying the upper limit In server.In the present embodiment, the description as described in the node distribution module 130 specifically refer to above-mentioned steps S12, S14 and The detailed description of step S16, that is, described step S12, S14 and step S16 can be executed by the node distribution module 130, Do not illustrate more herein thus.
First judgment module 140, for judging whether reach negative with the load value in the first object server Carry the upper limit.In the present embodiment, the description as described in first judgment module 140 specifically refers to retouching in detail for above-mentioned steps S13 It states, that is, the step S13 can be executed by first judgment module 140, thus does not illustrate more herein.
Second judgment module 150, for judging whether reach negative with the load value in second destination server Carry the upper limit.In the present embodiment, the description as described in second judgment module 150 specifically refers to retouching in detail for above-mentioned steps S15 It states, that is, the step S15 can be executed by second judgment module 150, thus does not illustrate more herein.
In conclusion accessed node 20 provided in an embodiment of the present invention accesses distribution method and device, wherein there is access Node 20 needs corresponding port access protocol can be called to realize to the accessed node according to the type of accessed node 20 when access 20 access, the i.e. present invention are capable of providing multi-protocols port to adapt to the access of different accessed nodes 20.
In addition, the present invention to accessed node 20 access node 20 legitimacy and access rights verification, can have Effect improves safety when accessed node 20 accesses.Meanwhile the present invention also provides a variety of different node allocation strategies, Neng Gouyou Effect ensures the controllability and harmony when node distribution.
In the description of the present invention, term " setting ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixed Connection, may be a detachable connection, or be integrally connected;It can be mechanical connection, can also be electrical connection;Can be direct It is connected, can also can is indirectly connected through an intermediary the connection inside two elements.For the ordinary skill of this field For personnel, the concrete meaning of above-mentioned term in the present invention can be understood with concrete condition.
In several embodiments that the embodiment of the present invention is provided, it should be understood that disclosed device and method also may be used To realize by other means.Device and method embodiment described above is only schematical, for example, the stream in attached drawing Journey figure and block diagram show that the device of preset quantity embodiment according to the present invention, method and computer program product may be real Existing architecture, function and operation.In this regard, each box in flowchart or block diagram can represent module, a journey A part for sequence section or code.A part for the module, section or code include one or preset quantity for realizing Defined logic function.
It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be with difference The sequence marked in attached drawing occurs.For example, two continuous boxes can essentially be basically executed in parallel, they are sometimes It can also execute in the opposite order, this is depended on the functions involved.It is also noted that in block diagram and or flow chart The combination of each box and the box in block diagram and or flow chart can use the dedicated of function or action as defined in executing Hardware based system is realized, or can be realized using a combination of dedicated hardware and computer instructions.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of accessed node accesses distribution method, which is characterized in that the management service being applied in distributed server cluster Device, the method includes:
Monitor whether that there are new accessed nodes to need to access;
If in the presence of calling matched Port Profile to realize connecing for the accessed node according to the type of the accessed node Enter;
It is chosen from the server cluster and is located at the server of areal as first object service with the accessed node Device accesses the distribution of node.
2. accessed node according to claim 1 accesses distribution method, which is characterized in that the method further includes:
Judge whether reach upper loading limit with the load value in the first object server;
If the load value in the first object server reaches upper loading limit, from the first object server adjacent area Middle choose meets the server of preset condition and accesses as the second destination server the distribution of node;
If the load value in the first object server is not up to upper loading limit, executes and be based on the first object server Access node distribution the step of.
3. accessed node according to claim 2 accesses distribution method, which is characterized in that the method further includes:
Judge whether reach upper loading limit with the load value in second destination server;
It, will be described using CRC32 or t ime32 algorithms if the load value in second destination server reaches upper loading limit In each server in accessed node mean allocation to the server cluster;
If the load value in second destination server is not up to upper loading limit, executes and be based on second destination server Access node distribution the step of.
4. accessed node according to claim 2 accesses distribution method, which is characterized in that the method further includes:
Judge whether the accessed node has whether server access permission and the accessed node are legitimate node, if The accessed node have server access permission and be legitimate node, then execute from the server cluster choose with it is described Accessed node be located at areal server access as first object server node distribution the step of.
5. accessed node according to claim 1 accesses distribution method, which is characterized in that selected from the server cluster The server for being located at areal with the accessed node is taken to include as the step of first object server:
Calculate the KEY values of the accessed node, and calculate the KEY values of the accessed node with it is already present on default Hash ring The distance between KEY values of each server node;
Based on result of calculation, and according to clockwise from the default Hash ring between selection and the KEY values of the accessed node The minimum server of distance is as first object server.
6. accessed node according to claim 5 accesses distribution method, which is characterized in that the KEY values of the accessed node Or the KEY values of the server are that I P values or distinguished name based on the accessed node are calculated.
7. the accessed node according to any one of claim 1-6 accesses distribution method, which is characterized in that the method is also Including:
It records and monitors the log information carried out to the accessed node in access and assigning process;
Judge that the accessed node is carried out with the presence or absence of exception in access and assigning process, if there are different based on the log information Often, then log alarming is carried out.
8. a kind of accessed node accesses distributor, which is characterized in that the management service being applied in distributed server cluster Device, described device include:
Node monitoring modular, for monitoring whether that there are new accessed nodes to need to access;
Protocol adaptation module, for when there are new accessed node, being called according to the type of the accessed node matched Port Profile realize the access of the accessed node;
Node distribution module, for choosing the server for being located at areal with the accessed node from the server cluster Access the distribution of node as first object server.
9. accessed node according to claim 8 accesses distributor, which is characterized in that described device further includes:
First judgment module, for judging whether the load value in the first object server reaches upper loading limit;
When the load value that the node distribution module is additionally operable in the first object server reaches upper loading limit, from described It is chosen in first object server adjacent area and meets the server of preset condition and access section as the second destination server The distribution of point.
10. accessed node according to claim 9 accesses distributor, which is characterized in that described device further includes:
Second judgment module, for judging whether the load value in second destination server reaches upper loading limit;
When the load value that the node distribution module is additionally operable in second destination server reaches upper loading limit, utilize CRC32 or t ime32 algorithms will be in each server in the accessed node mean allocation to the server cluster.
CN201810475119.2A 2018-05-17 2018-05-17 A kind of accessed node access distribution method and device Pending CN108768985A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810475119.2A CN108768985A (en) 2018-05-17 2018-05-17 A kind of accessed node access distribution method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810475119.2A CN108768985A (en) 2018-05-17 2018-05-17 A kind of accessed node access distribution method and device

Publications (1)

Publication Number Publication Date
CN108768985A true CN108768985A (en) 2018-11-06

Family

ID=64007091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810475119.2A Pending CN108768985A (en) 2018-05-17 2018-05-17 A kind of accessed node access distribution method and device

Country Status (1)

Country Link
CN (1) CN108768985A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109245974A (en) * 2018-11-30 2019-01-18 广东美的制冷设备有限公司 Household electrical appliance distribution method, apparatus and computer readable storage medium
CN109302497A (en) * 2018-11-29 2019-02-01 北京京东尚科信息技术有限公司 Data processing method, access agent device and system based on HADOOP
CN110071978A (en) * 2019-04-28 2019-07-30 新华三信息安全技术有限公司 A kind of method and device of cluster management
CN110334091A (en) * 2019-05-09 2019-10-15 重庆天蓬网络有限公司 A kind of data fragmentation distributed approach, system, medium and electronic equipment
CN110532101A (en) * 2019-09-03 2019-12-03 中国联合网络通信集团有限公司 The deployment system and method for micro services cluster
CN111010453A (en) * 2019-12-29 2020-04-14 中建材信息技术股份有限公司 Service request processing method, system, electronic device and computer readable medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282306A (en) * 2008-05-22 2008-10-08 杭州华三通信技术有限公司 Method for balancing load between access points, system, access point and mobile terminal
US9397946B1 (en) * 2013-11-05 2016-07-19 Cisco Technology, Inc. Forwarding to clusters of service nodes
CN105915650A (en) * 2016-06-21 2016-08-31 腾讯科技(深圳)有限公司 Load balancing method and device
CN107197035A (en) * 2017-06-21 2017-09-22 中国民航大学 A kind of compatibility dynamic load balancing method based on uniformity hash algorithm
CN107483519A (en) * 2016-06-08 2017-12-15 Tcl集团股份有限公司 A kind of Memcache load-balancing methods and its system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282306A (en) * 2008-05-22 2008-10-08 杭州华三通信技术有限公司 Method for balancing load between access points, system, access point and mobile terminal
US9397946B1 (en) * 2013-11-05 2016-07-19 Cisco Technology, Inc. Forwarding to clusters of service nodes
CN107483519A (en) * 2016-06-08 2017-12-15 Tcl集团股份有限公司 A kind of Memcache load-balancing methods and its system
CN105915650A (en) * 2016-06-21 2016-08-31 腾讯科技(深圳)有限公司 Load balancing method and device
CN107197035A (en) * 2017-06-21 2017-09-22 中国民航大学 A kind of compatibility dynamic load balancing method based on uniformity hash algorithm

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302497A (en) * 2018-11-29 2019-02-01 北京京东尚科信息技术有限公司 Data processing method, access agent device and system based on HADOOP
CN109245974A (en) * 2018-11-30 2019-01-18 广东美的制冷设备有限公司 Household electrical appliance distribution method, apparatus and computer readable storage medium
CN109245974B (en) * 2018-11-30 2021-10-26 广东美的制冷设备有限公司 Household appliance network distribution method and device and computer readable storage medium
CN110071978A (en) * 2019-04-28 2019-07-30 新华三信息安全技术有限公司 A kind of method and device of cluster management
CN110071978B (en) * 2019-04-28 2022-04-22 新华三信息安全技术有限公司 Cluster management method and device
CN110334091A (en) * 2019-05-09 2019-10-15 重庆天蓬网络有限公司 A kind of data fragmentation distributed approach, system, medium and electronic equipment
CN110532101A (en) * 2019-09-03 2019-12-03 中国联合网络通信集团有限公司 The deployment system and method for micro services cluster
CN110532101B (en) * 2019-09-03 2022-05-03 中国联合网络通信集团有限公司 Deployment system and method of micro-service cluster
CN111010453A (en) * 2019-12-29 2020-04-14 中建材信息技术股份有限公司 Service request processing method, system, electronic device and computer readable medium
CN111010453B (en) * 2019-12-29 2022-05-24 中建材信息技术股份有限公司 Service request processing method, system, electronic device and computer readable medium

Similar Documents

Publication Publication Date Title
CN108768985A (en) A kind of accessed node access distribution method and device
US20220261273A1 (en) Collecting and processing context attributes on a host
US10958519B2 (en) Dynamic, load-based, auto-scaling network security microservices architecture
US10129117B2 (en) Conditional policies
US9667653B2 (en) Context-aware network service policy management
CN107852604B (en) System for providing Global Virtual Network (GVN)
CN104917779B (en) A kind of means of defence, the apparatus and system of CC attacks based on cloud
CN105183504B (en) Process white list updating method based on software server
US11507439B1 (en) Application programming interface as a service
US9628505B2 (en) Deploying a security appliance system in a high availability environment without extra network burden
EP3542266B1 (en) Collecting and processing context attributes on a host
CN110554927A (en) Micro-service calling method based on block chain
CN109284170A (en) USB shared system and sharing method in a kind of local area network
WO2021135382A1 (en) Network security protection method and protection device
WO2022005746A1 (en) Policy-based connection provisioning using domain name system (dns) requests
CN110855784A (en) Proxy server node selection method, electronic device, system and medium
US10728171B2 (en) Governing bare metal guests
WO2023211552A1 (en) Securing metrics for a pod
Chen et al. Corner: Cost-efficient and reliability-aware virtual network redesign and embedding
CN116192702A (en) Monitoring job scheduling method, device and operation monitoring system
KR20210072816A (en) Provider network service extension

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210322

Address after: 4 / F, block B, building 5, No. 200, Tianfu 5th Street, high tech Zone, Chengdu, Sichuan 610000

Applicant after: Zhiyun Technology Co.,Ltd.

Address before: No. 1501, 15th floor, building 12, 219 Tianhua 2nd Road, hi tech Zone, Chengdu, Sichuan 610000

Applicant before: CHENGDU ZHIYUN SCIENCE & TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20181106

RJ01 Rejection of invention patent application after publication