Method for realizing network flow load balancing by utilizing consistency Hash strategy

A network traffic and load balancing technology, applied in the Internet field, can solve problems such as increased costs, restrictions, and cluster-wide jitter

Inactive Publication Date: 2017-09-15
北京云端智度科技有限公司
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Disadvantages of this solution: additional load balancing equipment needs to be added, which increases the cost
However, the disadvantage of this solution is: when the fault is restored, it is limited by the convergence o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network flow load balancing by utilizing consistency Hash strategy
  • Method for realizing network flow load balancing by utilizing consistency Hash strategy
  • Method for realizing network flow load balancing by utilizing consistency Hash strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] Its specific implementation process of the embodiment of the present invention is as follows:

[0046] Such as figure 1 As shown, the consistent hashing strategy organizes the entire hash value space into a virtual ring, such as assuming that the value space of a certain hash function H is 0 to (2 32 -1) (that is, the hash value is a 32-bit unsigned integer):

[0047] The entire space is organized clockwise.

[0048] 0 and 2 32 -1 for direction coincidence in zero point.

[0049] The next step is to use the Hash algorithm to perform a hash on each server. Specifically, you can choose the server's ip or hostname as a keyword for hashing, so that each machine can determine its position on the hash ring. It is assumed here that there are three service devices, and the positions in the ring space after hashing the ip addresses are as follows: figure 2 shown.

[0050] Next, use the following algorithm to locate the traffic access to the corresponding service device: u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing network flow load balancing by utilizing a consistency Hash strategy. A DNS analyzes an ip address corresponding to a set of service devices; the set of devices externally provides services at the same time; the flow is distributed to the service devices corresponding to the set of service devices by utilization of the consistency Hash strategy of a switch according to a consistency Hash algorithm; a new load balancing device is not increased; the load balancing function is realized completely with the help of the routing function of the switch; when a fault occurs, because a device cluster bears the flow at the same time, services can be provided continuously; when the fault of a certain device is recovered, the device is re-added into the consistency Hash list of the switch; therefore, the flow is smoothly switched; and jitter is avoided.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for realizing network traffic load balancing by using a consistent hash strategy. Background technique [0002] With the development of society, the rapid growth of Internet users has led to the vigorous development of the Internet economy. Mobile Internet, e-commerce, online video, brand online advertising, online recruitment, online games, etc. have developed rapidly in a very short period of time and accumulated a large number of users. , has become an integral part of people's lives. [0003] In the existing CDN technology, when users use Internet services, they usually access the domain name first, obtain the IP address of the service through the dns protocol, and then access the real service through the IP address. At any time, the service scale is gradually expanding, and there are more and more access requests. At this time, a group of servers will be used ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/803H04L29/08H04L29/12
CPCH04L47/125H04L61/4511H04L67/1001
Inventor 赵子毅刘晓光汪志武
Owner 北京云端智度科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products