Overload protection method for distributed system and servers

A distributed system and overload protection technology, applied in the field of Internet communication, can solve the problem of not being able to effectively control the spread of invalid requests, and achieve the effect of suppressing the spread and improving processing efficiency

Active Publication Date: 2015-11-04
SHENZHEN IDREAMSKY TECH
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the overload occurs, the user keeps refreshing the request, which means that most of the requests in the system's request queue are invalid at this time (the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Overload protection method for distributed system and servers
  • Overload protection method for distributed system and servers
  • Overload protection method for distributed system and servers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] see figure 1 , figure 1 It is a schematic flowchart of a method for processing request overload in a distributed system provided by an embodiment of the present invention. Such as figure 1 The method shown may include:

[0049] S110. When the load balancing server receives the user request from the requester, it adds a time stamp to the user request, and forwards the user request with the time stamp to the backend service server.

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an overload protection method for a distributed system. The method comprises that when receiving a user request from a request end, a load balancing server receives adds a time stamp to the user request and forwards the user request provided with the time stamp to a rear-end business server; when receiving the user request provided with the time stamp, the business server acquires the time stamp and determines whether an interval between the local system time and the time stamp reaches a preset time length; and if yes, the business server discards the user request as an invalid request. Correspondingly, the embodiment of the invention also discloses a load balancing server and a business server. The method may control the spread of invalid user requests so as to improve system processing efficiency.

Description

technical field [0001] The invention relates to the field of Internet communication, in particular to an overload protection method and server of a distributed system. Background technique [0002] For delay-sensitive services, when external requests exceed the system's processing capacity, request overload will occur. If the system does not take overload protection at this time, it may lead to a vicious cycle of accumulated historical timeout requests like a snowball. [0003] The currently commonly used overload handling method is: the front-end allocates user requests according to the load of the back-end, that is, the front-end does not continue to initiate requests to the back-end that exceeds the load capacity; or, if the back-end finds that the current load capacity is exceeded, it rejects the front-end. new user requests for . When the overload occurs, the user keeps refreshing the request, which means that most of the requests in the system's request queue are inva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L12/815H04L1/16H04L47/22
CPCH04L1/1657H04L47/23H04L67/1097H04L67/1001
Inventor 李雪冰袁清
Owner SHENZHEN IDREAMSKY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products