A Distributed and High Concurrency Message Matching Method
A matching method and distributed technology, applied in the direction of database distribution/replication, generation of response errors, retrieval of digital data information, etc., can solve the problems of increased data storage pressure, decreased response speed, and inability to handle redundant requests. Guaranteed response speed, not easy to lose, and the effect of improving data reading speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0028] A distributed high-concurrency message matching method includes the following steps:
[0029] S1. Realize the hash calculation through the MurmurHash calculation method, establish the access data cache based on the lower layer of the processor, and realize the linear queue arrangement of the cached messages through the TreeMap of java.
[0030] S2. Establish an intermediate layer based on the data cache between the processor and mysql, and establish a search engine based on the intermediate layer located in mysql.
[0031] S3. A leaky bucket algorithm is introduced into the linear queue data cache of the lower layer of the processor to implement a smooth current limiting strategy for burst traffic.
[0032] S4. Establish multiple mysql lower-level data backup servers, and multiple data backup servers are loaded with independent mysql.
[0033] S5. The mysqls corresponding to the plurality of data backup servers all establish intermediate layers and connect to the same ...
Embodiment 2
[0054] A distributed high-concurrency message matching method includes the following steps:
[0055] S1. Realize the hash calculation through the MurmurHash calculation method, establish the access data cache based on the lower layer of the processor, and realize the linear queue arrangement of the cached messages through the TreeMap of java.
[0056] S2. Establish an intermediate layer based on the data cache between the processor and mysql, and establish a search engine based on the intermediate layer located in mysql.
[0057] S3. A leaky bucket algorithm is introduced into the linear queue data cache of the lower layer of the processor to implement a smooth current limiting strategy for burst traffic.
[0058] S4. Establish multiple mysql lower-level data backup servers, and multiple data backup servers are loaded with independent mysql.
[0059] S5. The mysqls corresponding to the plurality of data backup servers all establish intermediate layers and connect to the same ...
Embodiment 3
[0072] A distributed high-concurrency message matching method includes the following steps:
[0073] S1. Realize the hash calculation through the MurmurHash calculation method, establish the access data cache based on the lower layer of the processor, and realize the linear queue arrangement of the cached messages through the TreeMap of java.
[0074] S2. Establish an intermediate layer based on the data cache between the processor and mysql, and establish a search engine based on the intermediate layer located in mysql.
[0075] S3. A leaky bucket algorithm is introduced into the linear queue data cache of the lower layer of the processor to implement a smooth current limiting strategy for burst traffic.
[0076] S4. All the information rejected by the smooth current limiting policy is introduced into the backup processor, so as to realize the double-bucket shunting processing of data current limiting.
[0077] The backup processor is connected to the middle layer correspond...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com