Scheduling method under client-side/server-side architecture and server

A scheduling method and server-side technology, applied in the field of communication, can solve problems such as data confusion, and achieve the effect of improving ease of use and solving data confusion.

Inactive Publication Date: 2011-04-20
ZTE CORP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The main purpose of the present invention is to provide a scheduling method and server under the C / S architecture, which solves the problem of data confusion in the prior art due to mutual exclusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scheduling method under client-side/server-side architecture and server
  • Scheduling method under client-side/server-side architecture and server
  • Scheduling method under client-side/server-side architecture and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] see figure 2 , the scheduling method under the client / server architecture according to this preferred embodiment includes the following steps:

[0036] S202. The server receives a request message from the client for requesting a single instance;

[0037] S204, the server determines whether the interface of the single instance requested by the client is being accessed or whether the single instance requested by the client is being run;

[0038] S206. If it is determined that the interface of the single instance requested by the client is being accessed or the single instance requested by the client is running, the server sends a response message to the client for denying access by the client.

[0039] In this preferred embodiment, the server judges whether the interface of the single instance requested by the client is being accessed or whether the single instance requested by the client is being run, so that the single instance can only be executed by one client at th...

Embodiment 2

[0047] see image 3 , the present invention provides a server that adopts a scheduling method under the client / server architecture, including: a receiving unit 301 for receiving a request message from a client for requesting a single instance; a judging unit 302 for judging the client Whether the interface of the requested single instance is being accessed or whether the single instance requested by the client is being run; the sending unit 303 is used for determining whether the interface of the single instance requested by the client is being accessed or the client When the requested single instance is running, send a response message for denying client access.

[0048] In this preferred embodiment, the server judges whether the interface of the single instance requested by the client is being accessed or whether the single instance requested by the client is being run, so that the single instance can only be executed by one client at the same time , thereby solving the pro...

Embodiment 3

[0054] see Figure 4 , in the DL2SM scheduling method, first, a client status detector 402 (Client Status Detector) is used on the server 401 to monitor the exit of the client 403, and the specific implementation can be through a timing handshake mechanism. When the server 401 detects that the client 403 has exited abnormally without actively releasing the function lock, the server 401 will initiate the release of all locks occupied by the exiting client 403 .

[0055] Using this model with a client state detector 402 can prevent the disorder of the server 401 function mutex lock state caused by unpredictable abnormalities such as power failure and network disconnection in the client 403, and guarantee the function to a certain extent Correctness and robustness of locks.

[0056] see Figure 5 , and then, at the server end 501, a function lock attribute of Running Level (runtime level) is added for each single-instance function, which is used to indicate whether the single-i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a scheduling method under a client-side / server-side architecture and a server. The method comprises: a server side receives a request message for requesting a single case from a client side; the server side judges whether the interface of the single case requested by the client side is being visited, or whether the single case requested by the client side is being operated; and if so, the server side transmits a response message for rejecting the access of the client side to the client side. According to the invention, the problem of data chaos caused by failure of mutual exclusion in the prior art is solved.

Description

technical field [0001] The present invention relates to the field of communications, in particular, to a scheduling method (Double Level Lock Schedule Method, DL) under a C / S (Client / Server, client / server) framework. 2 SM) and server. Background technique [0002] Under the C / S architecture, the same server needs to support multiple clients at the same time, and multiple clients can access the server concurrently. For some functions provided by the server, multiple users can use multiple clients at the same time. However, there are some functions that are "mutually exclusive" between clients, that is, multiple clients are not allowed to use them at the same time. In user-oriented applications, the functions provided by some applications have their particularity to a certain extent, and they also have their special requirements under abnormal conditions. Mutually exclusive requirements for concurrent access to the server by multiple clients under the / S architecture. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56
CPCH04L29/06047H04L67/42H04L67/14
Inventor 丁辉
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products