Cloud-based user visit request scheduling method

A technology for access requests and user requests, applied to electrical components, transmission systems, etc., can solve problems such as rigid rules, difficulty in responding to user request loads, difficulty in adapting to server hardware performance and dynamically changing load environments, etc.

Inactive Publication Date: 2012-03-28
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 3. Hash method, that is, the system sends access requests to each node according to certain rules through an irreversible HASH function. The advantage of this method is that it can adapt to different actual application environments of hardware through pre-set rules. The disadvantage is that rules Rigid, it is di...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-based user visit request scheduling method
  • Cloud-based user visit request scheduling method
  • Cloud-based user visit request scheduling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention is described in more detail below in conjunction with accompanying drawing example:

[0038] Algorithm of the present invention is characterized in that:

[0039] Let the pending user request queue contain m requests, denoted as R 1 , R 2 ,...,R m ; The set of service nodes in the cloud computing system contains n service nodes, denoted as S 1 , S 2 ,...,S n , the average request execution time of each service node is expressed as The lengths in the pending request queue are denoted as u 1 , u 2 ,...,u n , the weights are denoted as τ 1 , τ 2 ,...,τ n , and the load intervals are denoted as F 1 , F 2 ,...,F n , and for j≠k, The overload threshold is expressed as μ; the adjustment step size is expressed as is a positive number; the request scheduling module is mainly responsible for scheduling user access requests, while monitoring the load of each service node, and timely adjusting their weights and load intervals;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud-based user visit request scheduling method, and has the following key points: in the process of carrying out scheduling on the user requests, judging the load situation of service nodes by a request scheduling module through detecting average request execution time and request queue length to be executed of each service node so as to carry out corresponding adjustment on the weight and further calculate the load interval of each service node, simultaneously generating a random number within 0-1 range to the request to be processed, searching the load interval corresponding to the random number, searching the service node corresponding to the load interval, then sending the user request to the service node for execution, monitoring the execution result and renewing the average request execution time and the request queue length to be executed of the service node, if new increased user visit request exists during the time, adding the user visit request to the user request queue to be processed, and repeating the process until all the requests are executed. Therefore, the load balancing capacity and responding speed of a cloud computing system are obviously improved.

Description

(1) Technical field [0001] The invention relates to a cloud-based user access request scheduling method. (2) Background technology [0002] Cloud computing is another sea change following the great shift from mainframe computers to client-server in the 1980s. Users no longer need to know the details of the infrastructure in the "cloud", have corresponding professional knowledge, and do not need to directly control it. Cloud computing describes a new Internet-based IT service growth, consumption and delivery model, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. Typical cloud computing providers often provide general-purpose network business applications, which can be accessed through software such as browsers or other Web services, while software and data are stored on servers. [0003] In recent years, cloud computing has increasingly become the preferred technology for building large-scale Internet applications d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08
Inventor 姚文斌叶鹏迪韩司张兰英
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products