Method of controlling network access amount and server

A technology for accessing and controlling the network, applied in the Internet field, it can solve the problems of insufficient intelligence, high system load, adverse effects on merchants, etc., and achieve the effect of improving intelligence

Active Publication Date: 2015-07-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most websites are accessed through the unified gateway, and then use the Nginx (proxy server) load balancing strategy to distribute user requests to the back-end application server. The server deployment does not consider the carrying capacity of the entire website architecture; When the server load is too high, there may be a downtime; when the user visits less, it will cause a waste of resources
Although some websites have the function of restricting traffic for user access, they are not smart enough. They can only estimate the traffic limiting threshold based on the experience of configuration personnel. This will also cause the above problems. If the estimated traffic limiting threshold is too high, There will be a waste of resources; if the estimated current limit threshold is too low, when the user's access traffic suddenly increases, the system load of the background server will be too high. , and even cause heavy losses; for example, when a user conducts flash sales activities on a popular product, if the server’s current limit threshold is exceeded, the server’s back-end load will be too high and the user’s request cannot be processed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of controlling network access amount and server
  • Method of controlling network access amount and server
  • Method of controlling network access amount and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] based on figure 1 For a description of the examples, please refer to figure 2 , figure 2 It is a schematic flow chart of the first embodiment of the method for controlling the amount of network access in the present invention; figure 2 As shown, the method for controlling the amount of network access in the present invention comprises the following steps:

[0026] Step S01, the monitoring server collects performance parameters of the application server;

[0027] The monitoring server collects the status of each functional module of the back-end server, that is, the application server in real time, such as collecting the CPU (Central Processing Unit, central processing unit) load and IO (Input / Output, input and output) interface corresponding to the website server, database, cache, etc. The usage status of the application server and the usage status of the memory are used to obtain the performance parameters corresponding to the above functional modules of the appl...

Embodiment 2

[0038] image 3 It is a schematic flow chart of the second embodiment of the method for controlling the amount of network access in the present invention; the embodiment of the present invention is the same as figure 2 The difference between the above embodiments is that before the monitoring server configures the proxy server, it must first identify whether the network access volume being used by the application server exceeds the threshold value of the network access volume allowed by the application server.

[0039] based on figure 2 The specific description of said embodiment, such as image 3 As shown, the method for controlling the amount of network access in the present invention is in step S02, the monitoring server analyzes the collected performance parameters, obtains the threshold value of the network access amount allowed by the application server, and then further includes:

[0040] Step S21, the monitoring server identifies whether the network access volume b...

Embodiment 3

[0046] Figure 4 It is a schematic flow chart of the third embodiment of the method for controlling the amount of network access in the present invention; the embodiment of the present invention is the same as figure 2 or image 3 The difference between the above embodiments is that before the monitoring server collects the performance parameters of the application server, the monitoring server obtains the resource configuration table; the method for the monitoring server to obtain the resource configuration table includes: when the monitoring server is initialized, obtain the resource configuration table; or, The monitoring server obtains the resource configuration table configured by the user side such as background maintenance personnel.

[0047] based on image 3 The specific description of said embodiment, such as Figure 4 As shown, the method for controlling the amount of network access in the present invention also includes before step S01, the monitoring server co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a network access traffic control method and server, in embodiments of the present invention, a monitoring server collects performance parameters of an application server; the monitoring server analyzes the collected performance parameters, to obtain a threshold of network access traffic allowed by the application server; and the monitoring server configures an agent server according to the obtained threshold, and controls network access traffic based on the configured agent server. Compared with the prior art in which a traffic limiting threshold is not set or is set only according to experience regardless of actual conditions in most websites, the embodiments of the present invention have beneficial effects of dynamically adjusting network access traffic according to an actual running condition of a network: and further, in the embodiments of the present invention, stable performance of a back-end server is ensured, and a network resource of the server is used appropriately.

Description

technical field [0001] The invention relates to the Internet field, in particular to a method and server for controlling network access volume. Background technique [0002] At present, most websites are accessed through the unified gateway, and then use the Nginx (proxy server) load balancing strategy to distribute user requests to the back-end application server. The server deployment does not consider the carrying capacity of the entire website architecture; When the server load is too high, there may be a downtime; when there are few user visits, it will cause a waste of resources. Although some websites have the function of restricting traffic for user access, they are not smart enough. They can only estimate the traffic limiting threshold based on the experience of configuration personnel. This will also cause the above problems. If the estimated traffic limiting threshold is too high, There will be a waste of resources; if the estimated current limit threshold is too...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/801H04L12/911H04L12/26
CPCH04L12/6418
Inventor 嵇海波王炎炎万欣
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products