


技术领域technical field
本发明涉及流量限流技术领域,特别是涉及一种网络流量的限流方法、系统、装置及计算机存储介质。The present invention relates to the technical field of traffic current limiting, and in particular, to a current limiting method, system, device and computer storage medium for network traffic.
背景技术Background technique
服务器中的网络服务系统对外提供服务时,为了防止网络拥塞,通常会使用令牌桶算法来保证网络数据以比较均匀的速度向外发送,使得网络流量稳定,进而保证整体服务的稳定,也即在服务器中设置一个令牌桶,客户端中不同的应用发送的不同类型的网络请求只有在拿到了令牌桶中的令牌时,才会被响应以得到其需要的数据。但是该算法的应用也存在一定的缺陷,即存在某一个应用短时间内大量的访问该网络服务系统的情况,导致令牌均被该应用消耗,其他应用的网络需求则均无法被响应以得到及时的反馈,造成网络服务的异常。When the network service system in the server provides services to the outside world, in order to prevent network congestion, the token bucket algorithm is usually used to ensure that network data is sent out at a relatively uniform speed, so that the network traffic is stable, thereby ensuring the stability of the overall service, that is, A token bucket is set up in the server, and different types of network requests sent by different applications in the client will be responded to to get the data they need only when the tokens in the token bucket are obtained. However, the application of this algorithm also has certain defects, that is, there is a situation that a certain application accesses the network service system in a large amount in a short period of time, resulting in all tokens being consumed by the application, and the network requirements of other applications cannot be responded to to obtain Timely feedback, resulting in abnormal network services.
发明内容SUMMARY OF THE INVENTION
本发明的目的是提供一种网络流量的限流方法、系统、装置及计算机存储介质,避免了同个类型的网络请求数量巨大时直接占据所有的令牌的情况,保证了全局服务性能;避免了在可响应令牌桶内具有相同身份标识的网络请求占据该令牌桶内所有的令牌的情况,保证了局部服务性能,通过建立上述全局-局部发牌策略,更好的避免了网络服务异常情况的发生。The purpose of the present invention is to provide a current limiting method, system, device and computer storage medium for network traffic, which avoids the situation of directly occupying all tokens when the number of network requests of the same type is huge, and ensures global service performance; In order to ensure the local service performance, the network request with the same identity in the responsive token bucket occupies all the tokens in the token bucket, and the local service performance is guaranteed. By establishing the above global-local licensing strategy, the network is better avoided. The occurrence of service exceptions.
为解决上述技术问题,本发明提供了一种网络流量的限流方法,包括:In order to solve the above technical problems, the present invention provides a method for limiting the flow of network traffic, including:
基于接收到的客户端中应用发送的网络请求确定可响应令牌桶,其中,所述可响应令牌桶为预设令牌桶组中与所述网络请求的请求类型对应的一个令牌桶;Determine the respondable token bucket based on the received network request sent by the application in the client, wherein the respondable token bucket is a token bucket corresponding to the request type of the network request in the preset token bucket group ;
获取所述可响应令牌桶中的当前剩余令牌数;Obtain the current number of remaining tokens in the respondable token bucket;
基于所述网络请求确定其对应的身份标识;Determine its corresponding identity based on the network request;
根据所述身份标识及预设标识-访问次数对应关系确定与所述身份标识对应的历史访问次数;Determine the number of historical visits corresponding to the identity identifier according to the identity identifier and the preset identifier-visit times correspondence;
根据所述历史访问次数及所述当前剩余令牌数判定是否为所述网络请求发放表征响应所述网络请求的令牌。It is determined whether a token representing a response to the network request is issued for the network request according to the number of historical visits and the current number of remaining tokens.
优选的,还包括:Preferably, it also includes:
每间隔第一预设时长分别向所述预设令牌桶组中的各令牌桶中增加预设数目的令牌;A preset number of tokens are added to each token bucket in the preset token bucket group at intervals of a first preset duration;
针对任一个所述令牌桶,执行如下步骤:For any of the token buckets, perform the following steps:
判断所述令牌桶的当前剩余令牌数是否超过其自身的预设存储容量;Determine whether the current remaining number of tokens in the token bucket exceeds its own preset storage capacity;
若是,将所述令牌桶的当前剩余令牌数设置为所述预设存储容量。If so, set the current remaining number of tokens in the token bucket as the preset storage capacity.
优选的,每间隔第一预设时长分别向所述预设令牌桶组中的各令牌桶中增加预设数目的令牌之后,还包括:Preferably, after adding a preset number of tokens to each token bucket in the preset token bucket group at every first preset duration, the method further includes:
将所述预设标识-访问次数对应关系中与各标识对应的访问次数清零。Clearing the access times corresponding to each identifier in the preset identifier-access times correspondence relationship to zero.
优选的,还包括:Preferably, it also includes:
在根据所述历史访问次数及所述当前剩余令牌数判定不为所述网络请求发放表征响应所述网络请求的令牌时,向所述应用返回网络请求失败的第一标志信号和/或表征令所述应用间隔第二预设时长后重新发送所述网络请求的第二标志信号。When it is determined not to issue a token representing a response to the network request for the network request according to the number of historical visits and the current number of remaining tokens, returning to the application a first flag signal indicating that the network request failed and/or Indicates that the application resends the second flag signal of the network request after a second preset time interval.
优选的,所述网络请求包括URL信息,还包括认证标识信息,所述认证标识信息包括域名或IP地址中的至少一种;Preferably, the network request includes URL information, and also includes authentication identification information, and the authentication identification information includes at least one of a domain name or an IP address;
基于所述网络请求确定其对应的身份标识,包括:Determine its corresponding identity based on the network request, including:
在根据所述认证标识信息确定所述网络需求指向自身提供服务时,根据所述URL信息按照身份标识确定规则确定所述网络请求对应的身份标识。When it is determined according to the authentication identification information that the network requirement is directed to provide services to itself, the identification corresponding to the network request is determined according to the URL information according to the identification identification rule.
优选的,根据所述历史访问次数及所述当前剩余令牌数判定是否为所述网络请求发放表征响应所述网络请求的令牌,包括:Preferably, determining whether to issue a token representing a response to the network request for the network request according to the number of historical visits and the current number of remaining tokens, including:
判断所述当前剩余令牌数是否大于预设安全发牌阈值;Judging whether the current number of remaining tokens is greater than a preset safe licensing threshold;
若是,确定为所述网络请求发放表征响应所述网络请求的令牌;If so, determine to issue a token representing the response to the network request for the network request;
若否,判断所述历史访问次数是否不小于所述当前剩余令牌数;If not, determine whether the number of historical visits is not less than the current number of remaining tokens;
若不小于所述当前剩余令牌数,确定不为所述网络请求发放所述令牌。If it is not less than the current remaining number of tokens, it is determined that the token is not issued for the network request.
优选的,还包括:Preferably, it also includes:
在判定所述历史访问次数小于所述当前剩余令牌数时,确定为所述网络请求发放表征响应所述网络请求的令牌;When it is determined that the number of historical visits is less than the current number of remaining tokens, determining that a token representing a response to the network request is issued for the network request;
确定为所述网络请求发放表征响应所述网络请求的令牌之后,还包括:After determining that the token representing the response to the network request is issued for the network request, the method further includes:
将所述当前剩余令牌数减1且所述历史访问次数加1。The current remaining token count is decremented by 1 and the historical visit count is incremented by 1.
为解决上述技术问题,本发明还提供了一种网络流量的限流系统,包括:In order to solve the above-mentioned technical problems, the present invention also provides a current limiting system for network traffic, including:
可响应令牌桶确定单元,用于基于接收到的客户端中应用发送的网络请求确定可响应令牌桶,其中,所述可响应令牌桶为预设令牌桶组中与所述网络请求的请求类型对应的一个令牌桶;A responsive token bucket determination unit, configured to determine a responsive token bucket based on a received network request sent by an application in the client, wherein the responsive token bucket is a preset token bucket group with the network A token bucket corresponding to the requested request type;
获取单元,用于获取所述可响应令牌桶中的当前剩余令牌数;an obtaining unit, used to obtain the current remaining number of tokens in the responsive token bucket;
身份标识确定单元,用于基于所述网络请求确定其对应的身份标识;an identity determination unit, configured to determine its corresponding identity based on the network request;
历史访问次数确定单元,用于根据所述身份标识及预设标识-访问次数对应关系确定与所述身份标识对应的历史访问次数;a unit for determining the number of historical visits, configured to determine the number of historical visits corresponding to the identity identifier according to the identity identifier and the preset identifier-visit number correspondence;
令牌发放单元,用于根据所述历史访问次数及所述当前剩余令牌数判定是否为所述网络请求发放表征响应所述网络请求的令牌。A token issuing unit, configured to determine whether to issue a token representing a response to the network request for the network request according to the historical access times and the current remaining number of tokens.
为解决上述技术问题,本发明还提供了一种网络流量的限流装置,包括:In order to solve the above technical problems, the present invention also provides a current limiting device for network traffic, including:
存储器,用于存储计算机程序;memory for storing computer programs;
处理器,用于执行如上述所述的网络流量的限流方法的步骤。The processor is configured to execute the steps of the above-mentioned method for limiting the current of network traffic.
为解决上述技术问题,本发明还提供了一种计算机可读存储介质,包括:In order to solve the above technical problems, the present invention also provides a computer-readable storage medium, comprising:
所述计算机可读介质上存储有计算机程序,所述计算机程序被处理器执行时实现如上述所述的网络流量的限流方法的步骤。A computer program is stored on the computer-readable medium, and when the computer program is executed by the processor, the steps of the above-mentioned method for limiting the flow of network traffic are implemented.
本发明提供了一种网络流量的限流方法、系统、装置及计算机存储介质,首先设置适用于不同类型的网络请求的预设令牌桶组,针对接收到的网络请求,确定预设令牌桶组中的一个作为其的可响应令牌桶,避免了同个类型的网络请求数量巨大时直接占据所有的令牌的情况,保证了全局服务性能;基于可响应令牌桶中的当前剩余令牌数以及所述网络请求的身份标识对应的历史访问次数,判定是否为该网络请求发放令牌,进而避免了在可响应令牌桶内具有相同身份标识的网络请求占据该令牌桶内所有的令牌的情况,保证了局部服务性能,相较于现有技术,通过建立上述全局-局部发牌策略,更好的避免了网络服务异常情况的发生。The present invention provides a current limiting method, system, device and computer storage medium for network traffic. First, preset token bucket groups suitable for different types of network requests are set, and a preset token is determined for the received network request. One of the bucket group is used as its responsive token bucket, which avoids the situation that all the tokens are directly occupied by the same type of network requests when the number of network requests is huge, and ensures the global service performance; based on the current remaining in the responsive token bucket The number of tokens and the number of historical visits corresponding to the identity of the network request are used to determine whether a token is issued for the network request, thereby preventing network requests with the same identity in the responsive token bucket from occupying the token bucket. All token conditions ensure local service performance. Compared with the prior art, by establishing the above global-local licensing strategy, the occurrence of abnormal network services is better avoided.
附图说明Description of drawings
为了更清楚地说明本发明实施例中的技术方案,下面将对现有技术和实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions in the embodiments of the present invention more clearly, the following briefly introduces the prior art and the accompanying drawings required in the embodiments. Obviously, the drawings in the following description are only some of the present invention. In the embodiments, for those of ordinary skill in the art, other drawings can also be obtained according to these drawings without any creative effort.
图1为本发明提供的一种网络流量的限流方法的流程图;1 is a flow chart of a method for limiting the flow of network traffic provided by the present invention;
图2为本发明提供的一种网络流量的限流系统的结构示意图;2 is a schematic structural diagram of a current limiting system for network traffic provided by the present invention;
图3为本发明提供的一种网络流量的限流装置的结构示意图。FIG. 3 is a schematic structural diagram of a device for limiting network traffic according to the present invention.
具体实施方式Detailed ways
本发明的核心是提供一种网络流量的限流方法、系统、装置及计算机存储介质,避免了同个类型的网络请求数量巨大时直接占据所有的令牌的情况,保证了全局服务性能;避免了在可响应令牌桶内具有相同身份标识的网络请求占据该令牌桶内所有的令牌的情况,保证了局部服务性能,通过建立上述全局-局部发牌策略,更好的避免了网络服务异常情况的发生。The core of the present invention is to provide a current limiting method, system, device and computer storage medium for network traffic, which avoids the situation of directly occupying all tokens when the number of network requests of the same type is huge, and ensures global service performance; In order to ensure the local service performance, the network request with the same identity in the responsive token bucket occupies all the tokens in the token bucket, and the local service performance is guaranteed. By establishing the above global-local licensing strategy, the network is better avoided. The occurrence of service exceptions.
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
请参照图1,图1为本发明提供的一种网络流量的限流方法的流程图。Please refer to FIG. 1 , which is a flowchart of a method for limiting network traffic according to the present invention.
本实施例中,考虑到在现有技术中,服务器中的网络服务系统在对外提供服务时,会使用令牌桶算法来保证网络数据以比较均匀的速度向外发送,该算法通过控制发送到网络上的数据量,保证了网络流量稳定,进而保证整体服务的稳定。但该方法也存在一定的弊端,该弊端在于存在下述异常服务情况:即客户端中的某一个应用在短时间内大量访问该网络服务系统时,很可能会出现令牌桶中所有的令牌均被该应用对应的访问请求拿走的情况,导致该客户端中的其他应用的访问请求、其他客户端上的各个应用的访问请求均得不到响应及对应的反馈,造成网路服务的异常、瘫痪。为解决上述技术问题,本申请提供了一种网络流量的限流方法,通过建立全局-局部发牌策略,相较于现有技术,更好地避免了网路服务异常情况的发生。In this embodiment, considering that in the prior art, when the network service system in the server provides services to the outside world, the token bucket algorithm is used to ensure that network data is sent out at a relatively uniform speed. The amount of data on the network ensures the stability of network traffic, thereby ensuring the stability of the overall service. However, this method also has certain disadvantages. The disadvantage lies in the following abnormal service conditions: that is, when a certain application in the client accesses the network service system in a short period of time, it is very likely that all the commands in the token bucket will appear. The situation where the cards are all taken away by the access request corresponding to the application, resulting in the access requests of other applications in the client and the access requests of various applications on other clients are not responded and corresponding feedback, resulting in network service. abnormal, paralyzed. In order to solve the above technical problems, the present application provides a method for limiting network traffic. By establishing a global-local licensing strategy, compared with the prior art, the occurrence of abnormal network services is better avoided.
该网络流量的限流方法,包括:The current limiting method of the network traffic includes:
S11:基于接收到的客户端中应用发送的网络请求确定可响应令牌桶,其中,可响应令牌桶为预设令牌桶组中与网络请求的请求类型对应的一个令牌桶;S11: Determine a responsive token bucket based on the received network request sent by the application in the client, where the responsive token bucket is a token bucket corresponding to the request type of the network request in the preset token bucket group;
需要说明的是,该网络流量的限流方法具体可应用于任一个可提供网络服务的服务端(服务器),服务端上部署有网络服务系统,且具体的与该服务端存在通讯连接的包括一个或多个客户端,各个客户端上部署有一个或多个应用。于是,在接收到任一个客户端中的任一个应用发送的网络请求时,可以针对性地确定与所述网络请求对应的可响应令牌桶。It should be noted that the current limiting method for network traffic can be specifically applied to any server (server) that can provide network services. A network service system is deployed on the server, and the specific communication connection with the server includes: One or more clients, and one or more applications are deployed on each client. Therefore, when a network request sent by any application in any client is received, a respondable token bucket corresponding to the network request can be specifically determined.
还需要说明的是,所述预设令牌桶组中包括多个令牌桶(具体包括的令牌桶的总数量在本申请中不作特别的限定,根据实际需求设置即可),且各个令牌桶分别对应于一种类型的网络请求,比如设置用于响应告警请求的令牌桶、用于响应日志请求的令牌桶、用于响应校验验证的令牌桶及用于响应资产收集情况的令牌桶(需要说明的是,此处的资产指的是比如客户端中的风扇可以定义为该客户端的一个资产,CPU也可以定义为该客户端的一个资产)。It should also be noted that the preset token bucket group includes a plurality of token buckets (the specific total number of token buckets included is not particularly limited in this application, and can be set according to actual needs), and each Token buckets correspond to one type of network request, such as setting a token bucket for responding to alarm requests, a token bucket for responding to log requests, a token bucket for responding to verification and verification, and a token bucket for responding to assets The token bucket of the collection situation (it should be noted that the asset here refers to, for example, the fan in the client can be defined as an asset of the client, and the CPU can also be defined as an asset of the client).
更具体的,此处对于各个令牌桶中可包括的具体令牌的数目(也即令牌桶的预设存储容量)在此不作特别的限定,根据实际需求设置即可,而作为一种解释实例,对于各个令牌桶中的预设存储容量的数目的设置可以按照各个令牌桶可响应的请求类型的重要程度或者是实际应用中通常会接受到该类型的网络请求的数据量而定,比如,通常情况下接收到告警类型的网络请求的数量会大于接收到校验验证类型的网络请求的数量,因此可以将用于响应告警请求的令牌桶的预设存储容量设置的更大一些。More specifically, the number of specific tokens that can be included in each token bucket (that is, the preset storage capacity of the token bucket) is not particularly limited here, and can be set according to actual needs, but as a kind of For example, the number of preset storage capacities in each token bucket can be set according to the importance of the type of request that each token bucket can respond to or the amount of data that is usually received in practical applications for this type of network request. For example, in general, the number of network requests of the alarm type is greater than the number of network requests of the verification type, so the preset storage capacity of the token bucket used to respond to the alarm request can be set to a larger value. bigger.
S12:获取可响应令牌桶中的当前剩余令牌数;S12: Obtain the current remaining number of tokens in the responsive token bucket;
S13:基于网络请求确定其对应的身份标识;S13: Determine its corresponding identity based on the network request;
具体的,该网络请求可包括一些基本信息,如URL(Uniform Resource Locator,统一资源定位)信息,根据该信息可以确定与该网络请求对应的唯一的身份标识。Specifically, the network request may include some basic information, such as URL (Uniform Resource Locator, Uniform Resource Locator) information, and a unique identity corresponding to the network request may be determined according to the information.
S14:根据身份标识及预设标识-访问次数对应关系确定与身份标识对应的历史访问次数;S14: Determine the number of historical visits corresponding to the identity identifier according to the identity identifier and the preset identifier-visit times correspondence;
需要说明的是,本申请中预先建立并存储了预设标识-访问次数对应关系,且该预设标识-访问次数对应关系可以实时滚动更新,具体见后续实施例中所述,于是以该身份标识作为搜索基准,在预设标识-访问次数对应关系中进行搜索,匹配到的标识对应的访问次数即为与所述身份标识对应的历史访问次数。It should be noted that the preset identifier-visit times correspondence relationship is pre-established and stored in this application, and the preset identifier-visit times correspondence relationship can be updated in real time. The identifier is used as a search criterion, and the preset identifier-visit times corresponding relationship is searched, and the access times corresponding to the matched identifiers are the historical access times corresponding to the identifiers.
S15:根据历史访问次数及当前剩余令牌数判定是否为网络请求发放表征响应网络请求的令牌。S15: Determine whether a token representing a response to the network request is issued for the network request according to the number of historical visits and the current number of remaining tokens.
还需要说明的是,在根据历史访问次数及当前剩余令牌数判定为所述网络请求发放表征响应网络请求的令牌之后,一方面为保证预设标识-访问次数对应关系的统计准确性,需要对其中存储的内容进行更新,也即将该对应关系中与所述身份标识对应的历史访问次数加1;另一方面,需要将可响应令牌桶中的当前剩余令牌数减1,以保证对于剩余令牌数的更新,以便于下次再接收到任一应用的网络请求时仍依照本申请中的策略进行令牌发放判定,可以理解的是,拿到令牌的网络请求可以得到网络服务系统的响应,以得到其此次请求的数据。It should also be noted that, after it is determined that the network request is issued according to the number of historical visits and the current number of remaining tokens, the token representing the response to the network request is issued, on the one hand, in order to ensure the statistical accuracy of the corresponding relationship between the preset identification and the number of visits, The content stored in it needs to be updated, that is, the number of historical visits corresponding to the identity identifier in the corresponding relationship is increased by 1; Guarantee the update of the remaining number of tokens, so that the next time a network request from any application is received, the token issuance decision is still performed according to the policy in this application. It is understandable that the network request to get the token can be obtained The response of the network service system to get the data requested this time.
综上,本申请提供了一种网络流量的限流方法,首先设置适用于不同类型的网络请求的预设令牌桶组,针对接收到的网络请求,确定预设令牌桶组中的一个作为其的可响应令牌桶,避免了同个类型的网络请求数量巨大时直接占据所有的令牌的情况,保证了全局服务性能;基于可响应令牌桶中的当前剩余令牌数以及所述网络请求的身份标识对应的历史访问次数,判定是否为该网络请求发放令牌,进而避免了在可响应令牌桶内具有相同身份标识的网络请求占据该令牌桶内所有的令牌的情况,保证了局部服务性能,相较于现有技术,通过建立上述全局-局部发牌策略,更好的避免了网络服务异常情况的发生。To sum up, the present application provides a method for limiting the flow of network traffic. First, a preset token bucket group suitable for different types of network requests is set, and for the received network request, one of the preset token bucket groups is determined. As its responsive token bucket, it avoids the situation of directly occupying all tokens when the number of network requests of the same type is huge, and ensures global service performance; based on the current number of remaining tokens in the responsive token bucket and all The number of historical visits corresponding to the identity identifier of the network request is used to determine whether a token is issued for the network request, thereby preventing network requests with the same identifier in the responsive token bucket from occupying all tokens in the token bucket. In this case, the local service performance is guaranteed. Compared with the prior art, by establishing the above-mentioned global-local licensing strategy, the occurrence of abnormal network services is better avoided.
在上述实施例的基础上:On the basis of the above-mentioned embodiment:
作为一种优选的实施例,还包括:As a preferred embodiment, it also includes:
每间隔第一预设时长分别向预设令牌桶组中的各令牌桶中增加预设数目的令牌;A preset number of tokens are added to each token bucket in the preset token bucket group at intervals of the first preset duration;
针对任一个令牌桶,执行如下步骤:For any token bucket, perform the following steps:
判断令牌桶的当前剩余令牌数是否超过其自身的预设存储容量;Determine whether the current number of remaining tokens in the token bucket exceeds its own preset storage capacity;
若是,将令牌桶的当前剩余令牌数设置为预设存储容量。If so, set the current remaining number of tokens in the token bucket to the preset storage capacity.
本实施例中,为了保证网络服务系统的稳定工作,针对预设令牌桶组中的各令牌桶,可以每隔第一预设时长向其中增加预设数目的令牌。需要说明的是,这里对于第一预设时长的具体数值不作特别的限定,根据实际发牌需求及网络服务系统的响应速度要求等进行设置即可;且更具体的,从硬件角度来看,可结合服务器中设置的定时器实现每间隔第一预设时长的增加令牌数目的执行逻辑;此外,对于增加的令牌的数目的具体数值本申请在此亦不作特别的限定,根据需求设置以满足应用实际即可。In this embodiment, in order to ensure the stable operation of the network service system, for each token bucket in the preset token bucket group, a preset number of tokens may be added to it every first preset duration. It should be noted that the specific value of the first preset duration is not particularly limited here, and can be set according to the actual licensing requirements and the response speed requirements of the network service system; and more specifically, from a hardware perspective, The execution logic of increasing the number of tokens at each interval of the first preset duration can be implemented in combination with the timer set in the server; in addition, the specific value of the number of tokens to be increased is not specifically limited in this application, and can be set according to requirements. to meet the actual application.
预设令牌桶组中的各个令牌桶,均一一对应的存在预设存储容量,于是针对任一个令牌桶,判断该令牌桶的当前剩余令牌数是否超过其自身的预设存储容量,若否,则不用更改所述当前剩余令牌数(也即等于增加预设数目的令牌数之前的原有剩余令牌数目加上此次增加的预设的令牌数目);若是,则将令牌桶的当前剩余令牌数设置为预设存储容量,该步骤可通俗理解为将此次增加的多余的令牌丢弃或者驱逐以维持所述预设存储容量。Each token bucket in the preset token bucket group has a one-to-one correspondence with a preset storage capacity, so for any token bucket, it is determined whether the current number of remaining tokens in the token bucket exceeds its own preset storage capacity Storage capacity, if not, do not need to change the current remaining number of tokens (that is, equal to the original remaining number of tokens before increasing the preset number of tokens plus the preset number of tokens added this time); If so, the current remaining number of tokens in the token bucket is set as the preset storage capacity, and this step can be generally understood as discarding or expelling the extra tokens added this time to maintain the preset storage capacity.
可见,通过上述设置可以保证预设令牌桶组中的各令牌桶的数量的更新,进而保证网络服务系统的稳定工作。It can be seen that the above setting can ensure the update of the number of each token bucket in the preset token bucket group, thereby ensuring the stable operation of the network service system.
作为一种优选的实施例,每间隔第一预设时长分别向预设令牌桶组中的各令牌桶中增加预设数目的令牌之后,还包括:As a preferred embodiment, after adding a preset number of tokens to each token bucket in the preset token bucket group at every first preset duration, the method further includes:
将预设标识-访问次数对应关系中与各标识对应的访问次数清零。Clears the access times corresponding to each identifier in the preset identifier-access times correspondence relationship to zero.
本实施例中,发明人进一步考虑到针对预设令牌桶组中的任意一个令牌桶,在其增加令牌之后,对于其负责处理的请求类型的各个网络请求的响应,应该回到同一竞争线,因此可将预设标识-访问次数对应关系中与各标识对应的访问次数清零,以保证上述逻辑。In this embodiment, the inventor further considers that for any token bucket in the preset token bucket group, after adding a token, the response to each network request of the request type it is responsible for processing should return to the same Therefore, the number of visits corresponding to each identity in the corresponding relationship between the preset identity and the number of visits can be reset to zero, so as to ensure the above logic.
作为一种优选的实施例,还包括:As a preferred embodiment, it also includes:
在根据历史访问次数及当前剩余令牌数判定不为网络请求发放表征响应网络请求的令牌时,向应用返回网络请求失败的第一标志信号和/或表征令应用间隔第二预设时长后重新发送网络请求的第二标志信号。When it is determined that the token representing the response to the network request is not issued for the network request according to the number of historical visits and the current number of remaining tokens, the first flag signal indicating the failure of the network request is returned to the application and/or the second preset time interval is used to indicate the application interval. The second flag signal of the network request is resent.
本实施例中,发明人进一步考虑到针对未成功得到令牌的网络请求,可以回复反馈信息。具体的,可以向该客户端或者说是该应用返回网络请求失败的第一标志信号以便其知晓该请求失败情况,当然也可以返回表征令该应用间隔第二预设时长后重新发送网络请求的第二标志信号,需要说明的是,这里的第二预设时长具体可以为当前时刻距离下一次该令牌桶增加预设数目的令牌对应的时刻之间的时间差值,以使得该应用在达到第二预设时长后再次发送网络请求信息,以期得到响应。此外,当然也可以继续返回其他信息,比如网络服务系统被自定义的其他结果,在此处不作特别的限定,根据实际需求设置即可。In this embodiment, the inventor further considers that for a network request that fails to obtain a token, feedback information can be replied. Specifically, the client or the application can return the first flag signal of the failure of the network request so that it knows the failure of the request. Of course, it can also return a signal indicating that the application resends the network request after a second preset time interval. The second flag signal, it should be noted that the second preset duration here may specifically be the time difference between the current time and the time corresponding to the next time the token bucket adds a preset number of tokens, so that the application After reaching the second preset time period, the network request information is sent again in order to obtain a response. In addition, of course, other information can also be continued to be returned, such as other customized results of the network service system, which are not particularly limited here, and can be set according to actual needs.
可见,通过上述反馈执行逻辑的设置很好地保证了信息交互及反馈的有效性和及时性。It can be seen that the effectiveness and timeliness of information interaction and feedback are well ensured through the setting of the above feedback execution logic.
作为一种优选的实施例,网络请求包括URL信息,还包括认证标识信息,认证标识信息包括域名或IP地址中的至少一种;As a preferred embodiment, the network request includes URL information, and also includes authentication identification information, and the authentication identification information includes at least one of a domain name or an IP address;
基于网络请求确定其对应的身份标识,包括:Determine its corresponding identity based on the network request, including:
在根据认证标识信息确定网络需求指向自身提供服务时,根据URL信息按照身份标识确定规则确定网络请求对应的身份标识。When it is determined according to the authentication identification information that the network demand is directed to provide services to itself, the identification corresponding to the network request is determined according to the URL information according to the identification identification rules.
本实施例中,网络请求中可以包括URL信息及认证信息,需要说明的是,这里的域名指的是接收网络请求的该服务端(服务器)自身的域名,这里的IP地址指的是接收网络请求的该服务端(服务器)自身的IP地址,上述域名及IP地址为所述服务端预先向各客户端公布以便于实现后续的数据交互。In this embodiment, the network request may include URL information and authentication information. It should be noted that the domain name here refers to the domain name of the server (server) that receives the network request, and the IP address here refers to the receiving network The requested IP address of the server (server) itself, the above-mentioned domain name and IP address are pre-announced by the server to each client to facilitate subsequent data interaction.
于是,根据所述认证标识信息,服务端可以确定所述网络需求是否真正指向其自身提供服务,以避免请求传输出错;且具体的,该URL信息可以具体包括所述客户端的特征信息,根据该特征信息,服务端可以判定所述网络请求属于哪一种类型的网络请求,例如为告警类型的网络请求还是日志类型的网络请求;且进一步的,根据该特征信息按照身份标识确定规则可以确定当前网络请求对应的身份标识。具体的,可以将同一个客户端上的同一个应用的同一类网络请求均对应于一个身份标识,也可以将同一个客户端上的同一个应用的同一类网络请求再具体细分,细分后的每一部分对应于一个身份标识,在此不作特别的限定。而作为一种实例对上述身份标识的确定规则作出如下说明:Therefore, according to the authentication identification information, the server can determine whether the network demand really points to itself to provide services, so as to avoid request transmission errors; and specifically, the URL information can specifically include the feature information of the client, according to the feature information, the server can determine which type of network request the network request belongs to, such as an alarm-type network request or a log-type network request; The identity identifier corresponding to the network request. Specifically, the same type of network requests of the same application on the same client can all correspond to an identity identifier, or the same type of network requests of the same application on the same client can be further subdivided. Each subsequent part corresponds to an identity identifier, which is not particularly limited here. As an example, the following description is made for the determination rules of the above-mentioned identity identifiers:
假定当前确定的可响应令牌桶为资产收集令牌桶,此时接收到两条网络请求,网络请求1中的特征信息中具体包括:表征自身的此次网络请求为资产收集类型的类型标识信息、该应用(或者是客户端)的名称标识信息以及表征所述客户端中增设了一个CPU的产品类型标识信息,网络请求2中的特征信息中具体包括:表征自身的此次网络请求为资产收集类型的类型标识信息、该应用(或者是客户端)的名称标识信息以及表征所述客户端中增设风扇的产品类型标识信息,可以看出,两者的名称标识信息及类型标识信息均是一致的,因此根据预设的身份标识确定规则可以使两者均对应于同一个身份标识,以表征对于同一个客户端的同一个应用的同一类网络请求的身份标识均相同;当然也可以使两者对应于不同的身份标识,从而实现上述因继续细分使得对应于增设风扇的网络请求可确定一个唯一的身份标识,因继续细分使得对应于增设CPU的网络请求可确定一个唯一的身份标识。Assuming that the currently determined responsive token bucket is an asset collection token bucket, two network requests are received at this time, and the feature information in network request 1 specifically includes: the type identifier that characterizes this network request as an asset collection type information, the name identification information of the application (or the client), and the product type identification information indicating that a CPU has been added to the client. The characteristic information in the network request 2 specifically includes: the network request representing itself is: The type identification information of the asset collection type, the name identification information of the application (or the client), and the product type identification information representing the fan added in the client, it can be seen that the name identification information and type identification information of both are both. are consistent, so according to the preset identification rules, both can be made to correspond to the same identification to indicate that the identifications of the same type of network request for the same application of the same client are the same; of course, it is also possible to use The two correspond to different identities, so as to realize the above-mentioned continuous subdivision so that the network request corresponding to the additional fan can determine a unique identity, and because of the continuous subdivision, the network request corresponding to the additional CPU can determine a unique identity. logo.
作为一种优选的实施例,根据历史访问次数及当前剩余令牌数判定是否为网络请求发放表征响应网络请求的令牌,包括:As a preferred embodiment, according to the number of historical visits and the current number of remaining tokens, it is determined whether to issue tokens representing responses to network requests for network requests, including:
判断当前剩余令牌数是否大于预设安全发牌阈值;Determine whether the current number of remaining tokens is greater than the preset safe licensing threshold;
若是,确定为网络请求发放表征响应网络请求的令牌;If so, determine to issue a token representing the response to the network request for the network request;
若否,判断历史访问次数是否不小于当前剩余令牌数;If not, determine whether the number of historical visits is not less than the current number of remaining tokens;
若不小于当前剩余令牌数,确定不为网络请求发放令牌。If it is not less than the current number of remaining tokens, it is determined not to issue tokens for network requests.
本实施例中,给出了如何根据历史访问次数及当前剩余令牌数判定是否为网络请求发放表征响应网络请求的令牌。需要说明的是,预设令牌桶中的每一个令牌桶一一对应于一个预设安全发牌阈值,且这里的预设安全发牌阈值的具体数值根据实际需求设置即可,但其必然小于所述可响应令牌桶的预设存储容量,而作为一种优选的设置方式,考虑到用于响应某种类型的网络请求的令牌桶通常会负责多个客户端中多个应用的令牌发放,因此预设安全发牌阈值的设置可以参照以历史接收到的各网络请求是否相对均匀(也即考虑是否出现某一个应用在一段时间内过多次数的访问的情况)。In this embodiment, how to determine whether to issue a token representing a response to a network request for a network request is given according to the number of historical visits and the current remaining number of tokens. It should be noted that each token bucket in the preset token buckets corresponds to a preset safe licensing threshold, and the specific value of the preset safe licensing threshold here can be set according to actual needs, but the It must be smaller than the preset storage capacity of the respondable token bucket, and as a preferred setting method, considering that the token bucket used to respond to a certain type of network request is usually responsible for multiple applications in multiple clients Therefore, the setting of the preset security licensing threshold can refer to whether the network requests received in history are relatively uniform (that is, consider whether there is an excessive number of accesses of a certain application within a period of time).
因此,依照上述两层判断逻辑,首先执行第一层判断逻辑:判断当前剩余令牌数是否大于预设安全发牌阈值;若是,说明当前有充足的令牌响应网络请求,因此可以直接确定为网络请求发放表征响应网络请求的令牌,以令其获得需求的数据;若否,说明当前剩余的令牌数量已经不再充足,于是执行第二层判断逻辑:判断历史访问次数是否不小于当前剩余令牌数;若不小于当前剩余令牌数,说明需要对其进行限流,于是确定不为网络请求发放令牌。Therefore, according to the above two-layer judgment logic, the first layer of judgment logic is firstly executed: it is judged whether the current number of remaining tokens is greater than the preset safe licensing threshold; if so, it means that there are enough tokens to respond to the network request, so it can be directly determined as The network requests to issue a token representing the response to the network request, so that it can obtain the required data; if not, it means that the number of tokens remaining is no longer sufficient, so the second layer of judgment logic is executed: judging whether the number of historical visits is not less than the current number of visits The number of remaining tokens; if it is not less than the current number of remaining tokens, it indicates that the current limit needs to be performed, so it is determined not to issue tokens for network requests.
可见,通过上述两层判断逻辑的执行,将是否为网络请求发放令牌与当前剩余令牌数及历史访问次数均相关联,进而保证了单个令牌桶的限流响应,避免某一个应用占据全部的令牌,保证了网络服务的稳定性。It can be seen that through the execution of the above two layers of judgment logic, whether to issue a token for a network request is associated with the current number of remaining tokens and the number of historical accesses, thereby ensuring the current limiting response of a single token bucket and avoiding the occupation of a certain application. All tokens ensure the stability of network services.
作为一种优选的实施例,还包括:As a preferred embodiment, it also includes:
在判定历史访问次数小于当前剩余令牌数时,确定为网络请求发放表征响应网络请求的令牌;When it is determined that the number of historical visits is less than the current number of remaining tokens, it is determined to issue a token representing the response to the network request for the network request;
确定为网络请求发放表征响应网络请求的令牌之后,还包括:After determining that the token representing the response to the network request is issued for the network request, it also includes:
将当前剩余令牌数减1且历史访问次数加1。Decrease the current remaining token count by 1 and increase the number of historical visits by 1.
本实施例中,在判定历史访问次数小于当前剩余令牌数时,说明不需要对其进行限流,因此直接确定为该网络请求发放表征响应网络请求的令牌。而为了一方面为保证预设标识-访问次数对应关系的统计准确性,需要对其中存储的内容进行更新,也即将所述预设对应关系中与所述身份标识对应的历史访问次数加1;另一方面,需要将可响应令牌桶中的当前剩余令牌数减1以保证对于剩余令牌数的更新,以便于下次再接收到任一应用的网络请求时仍依照本申请中的策略进行令牌发放判定。可见,通过上述执行逻辑的设置可靠保证了网络服务的稳定性。In this embodiment, when it is determined that the number of historical accesses is less than the current number of remaining tokens, it means that the current limit is not required, so it is directly determined to issue a token representing the response to the network request for the network request. On the one hand, in order to ensure the statistical accuracy of the corresponding relationship between the preset identifier and the number of visits, the content stored therein needs to be updated, that is, the number of historical visits corresponding to the identity identifier in the preset corresponding relationship is increased by 1; On the other hand, it is necessary to decrement the current number of remaining tokens in the respondable token bucket by 1 to ensure the update of the number of remaining tokens, so that the next time a network request from any application is received, it is still in accordance with the requirements in this application. The policy makes the token issuance decision. It can be seen that the stability of the network service is reliably guaranteed through the setting of the above execution logic.
请进一步参照图2,图2为本发明提供的一种网络流量的限流系统的结构示意图。Please further refer to FIG. 2 , which is a schematic structural diagram of a current limiting system for network traffic provided by the present invention.
该网络流量的限流系统,包括:The current limiting system for the network traffic, including:
可响应令牌桶确定单元21,用于基于接收到的客户端中应用发送的网络请求确定可响应令牌桶,其中,可响应令牌桶为预设令牌桶组中与网络请求的请求类型对应的一个令牌桶;The responsive token
获取单元22,用于获取可响应令牌桶中的当前剩余令牌数;an obtaining
身份标识确定单元23,用于基于网络请求确定其对应的身份标识;An identity
历史访问次数确定单元24,用于根据身份标识及预设标识-访问次数对应关系确定与身份标识对应的历史访问次数;The historical visit
令牌发放单元25,用于根据历史访问次数及当前剩余令牌数判定是否为网络请求发放表征响应网络请求的令牌。The
对于本发明中提供的网络流量的限流系统的介绍请参照上述网络流量的限流方法的实施例,此处不再赘述。For the introduction of the current limiting system for network traffic provided in the present invention, please refer to the above-mentioned embodiments of the current limiting method for network traffic, which will not be repeated here.
作为一种优选的实施例,所述网络流量的限流系统,还包括:As a preferred embodiment, the current limiting system for network traffic further includes:
发牌单元,用于每间隔第一预设时长分别向所述预设令牌桶组中的各令牌桶中增加预设数目的令牌;a card issuing unit, configured to add a preset number of tokens to each token bucket in the preset token bucket group at intervals of a first preset duration;
第一判断单元,用于针对任一个所述令牌桶,判断所述令牌桶的当前剩余令牌数是否超过其自身的预设存储容量;若是,触发置位单元;a first judging unit for judging whether the current number of remaining tokens in the token bucket exceeds its own preset storage capacity for any one of the token buckets; if so, triggering a setting unit;
所述置位单元,用于将所述令牌桶的当前剩余令牌数设置为所述预设存储容量。The setting unit is configured to set the current remaining number of tokens in the token bucket as the preset storage capacity.
作为一种优选的实施例,所述网络流量的限流系统,还包括:As a preferred embodiment, the current limiting system for network traffic further includes:
清零单元,用于在每间隔第一预设时长分别向所述预设令牌桶组中的各令牌桶中增加预设数目的令牌之后,将所述预设标识-访问次数对应关系中与各标识对应的访问次数清零。a zero-clearing unit, configured to add a preset number of tokens to each token bucket in the preset token bucket group at every first preset time interval, and map the preset identifier to the number of visits The number of visits corresponding to each identifier in the relationship is cleared.
作为一种优选的实施例,所述网络流量的限流系统,还包括:As a preferred embodiment, the current limiting system for network traffic further includes:
反馈单元,用于在根据所述历史访问次数及所述当前剩余令牌数判定不为所述网络请求发放表征响应所述网络请求的令牌时,向所述应用返回网络请求失败的第一标志信号和/或表征令所述应用间隔第二预设时长后重新发送所述网络请求的第二标志信号。The feedback unit is configured to return to the application the first failure of the network request when it is determined that the token representing the response to the network request is not issued for the network request according to the number of historical visits and the current remaining number of tokens The flag signal and/or characterize the second flag signal that causes the application to resend the network request after a second preset time interval.
作为一种优选的实施例,所述网络请求包括URL信息,还包括认证标识信息,所述认证标识信息包括域名或IP地址中的至少一种;As a preferred embodiment, the network request includes URL information, and also includes authentication identification information, and the authentication identification information includes at least one of a domain name or an IP address;
所述身份标识确定单元23具体用于在根据所述认证标识信息确定所述网络需求指向自身提供服务时,根据所述URL信息按照身份标识确定规则确定所述网络请求对应的身份标识。The identity
作为一种优选的实施例,所述令牌发放单元25,包括:As a preferred embodiment, the
阈值判断单元,用于判断所述当前剩余令牌数是否大于预设安全发牌阈值;若是,触发第一响应发牌单元;若否,触发剩余量判断单元;Threshold judgment unit for judging whether the current number of remaining tokens is greater than the preset safe licensing threshold; if so, trigger the first response licensing unit; if not, trigger the remaining amount judgment unit;
所述第一响应发牌单元,用于确定为所述网络请求发放表征响应所述网络请求的令牌;the first response card issuing unit, configured to determine to issue a token representing a response to the network request for the network request;
所述剩余量判断单元,用于判断所述历史访问次数是否不小于所述当前剩余令牌数;若否,触发禁止发牌单元;The remaining amount judging unit is used to judge whether the number of historical visits is not less than the current remaining token number;
所述禁止发牌单元,用于确定不为所述网络请求发放所述令牌。The card-forbidding unit is configured to determine not to issue the token for the network request.
作为一种优选的实施例,所述网络流量的限流系统,还包括:As a preferred embodiment, the current limiting system for network traffic further includes:
第二响应发牌单元,用于在判定所述历史访问次数小于所述当前剩余令牌数时,确定为所述网络请求发放表征响应所述网络请求的令牌;a second responding card issuing unit, configured to determine to issue a token representing a response to the network request for the network request when it is determined that the number of historical visits is less than the current number of remaining tokens;
所述网络流量的限流系统,还包括:The current limiting system for network traffic also includes:
存储量变动单元,用于在确定为所述网络请求发放表征响应所述网络请求的令牌之后,将所述当前剩余令牌数减1且所述历史访问次数加1。The storage amount changing unit is configured to decrease the current remaining token number by 1 and increase the historical access times by 1 after it is determined that a token representing a response to the network request is issued for the network request.
请进一步参照图3,图3为本发明提供的一种网络流量的限流装置的结构示意图。Please refer further to FIG. 3 , which is a schematic structural diagram of a device for limiting network traffic according to the present invention.
该网络流量的限流装置,包括:The current limiting device for the network traffic includes:
存储器31,用于存储计算机程序;
处理器32,用于执行如上述所述的网络流量的限流方法的步骤。The
对于本发明中提供的网络流量的限流装置的介绍请参照上述网络流量的限流方法的实施例,此处不再赘述。For the introduction of the device for limiting the current of network traffic provided in the present invention, please refer to the above-mentioned embodiments of the method for limiting the current of network traffic, which will not be repeated here.
本发明还提供了一种计算机可读存储介质,包括:The present invention also provides a computer-readable storage medium, comprising:
所述计算机可读介质上存储有计算机程序,所述计算机程序被处理器执行时实现如上述所述的网络流量的限流方法的步骤。A computer program is stored on the computer-readable medium, and when the computer program is executed by the processor, the steps of the above-mentioned method for limiting the flow of network traffic are implemented.
对于本发明中提供的计算机可读介质的介绍请参照上述网络流量的限流方法的实施例,此处不再赘述。For the introduction of the computer-readable medium provided in the present invention, please refer to the above-mentioned embodiments of the method for limiting the flow of network traffic, which will not be repeated here.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。The various embodiments in this specification are described in a progressive manner, and each embodiment focuses on the differences from other embodiments, and the same and similar parts between the various embodiments can be referred to each other. Relational terms such as first and second, etc. are only used to distinguish one entity or operation from another and do not necessarily require or imply any such actual relationship between these entities or operations or order. The terms "comprising", "comprising" or any other variation thereof are intended to encompass non-exclusive inclusion such that a process, method, article or device comprising a list of elements includes not only those elements, but also other not expressly listed elements, or also include elements inherent to such a process, method, article or apparatus. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in a process, method, article or apparatus that includes the element.
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其他实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。Professionals may further realize that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, computer software, or a combination of the two, in order to clearly illustrate the possibilities of hardware and software. Interchangeability, the above description has generally described the components and steps of each example in terms of function. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein, but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210609514.1ACN114979012B (en) | 2022-05-31 | 2022-05-31 | Network traffic flow limiting method, system, device and computer storage medium |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210609514.1ACN114979012B (en) | 2022-05-31 | 2022-05-31 | Network traffic flow limiting method, system, device and computer storage medium |
| Publication Number | Publication Date |
|---|---|
| CN114979012Atrue CN114979012A (en) | 2022-08-30 |
| CN114979012B CN114979012B (en) | 2024-06-21 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210609514.1AActiveCN114979012B (en) | 2022-05-31 | 2022-05-31 | Network traffic flow limiting method, system, device and computer storage medium |
| Country | Link |
|---|---|
| CN (1) | CN114979012B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115665045A (en)* | 2022-09-06 | 2023-01-31 | 浙江大华技术股份有限公司 | A high concurrency current limiting method, device and computer storage medium |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101646259A (en)* | 2009-09-04 | 2010-02-10 | 杭州华三通信技术有限公司 | Wireless local area network empty opening rate-limiting method and wireless network device |
| US20100085874A1 (en)* | 2008-10-05 | 2010-04-08 | Contextream Ltd. | Bandwidth allocation method and apparatus |
| CN102035732A (en)* | 2010-11-25 | 2011-04-27 | 华为技术有限公司 | Service scheduling method and device |
| CN102420773A (en)* | 2012-01-05 | 2012-04-18 | 北京网御星云信息技术有限公司 | Data transmission method and flow control device based on token bucket algorithm |
| US20120254943A1 (en)* | 2011-03-31 | 2012-10-04 | Wei Li | Methods for controlling a traffic of an authentication server |
| CN103229465A (en)* | 2012-11-12 | 2013-07-31 | 华为技术有限公司 | Message sending method and device |
| US20130242742A1 (en)* | 2012-03-19 | 2013-09-19 | Fujitsu Limited | Apparatus for policing traffic in a communication network |
| CN104125006A (en)* | 2014-07-28 | 2014-10-29 | 大连大学 | Satellite communication network bandwidth distributing method |
| CN105763478A (en)* | 2015-12-21 | 2016-07-13 | 中国电子科技集团公司第十五研究所 | Token bucket algorithm-based satellite data ground transmission network flow control system |
| CN105897610A (en)* | 2016-03-31 | 2016-08-24 | 乐视控股(北京)有限公司 | Flow control method and device |
| CN106656849A (en)* | 2016-11-01 | 2017-05-10 | 杭州迪普科技股份有限公司 | Message speed-limiting method and apparatus |
| CN107222358A (en)* | 2016-03-21 | 2017-09-29 | 深圳市中兴微电子技术有限公司 | Wrap flux monitoring method per second and device |
| CN107493241A (en)* | 2016-06-13 | 2017-12-19 | 中兴通讯股份有限公司 | A kind of token distribution method and device |
| CN109194584A (en)* | 2018-08-13 | 2019-01-11 | 中国平安人寿保险股份有限公司 | A kind of flux monitoring method, device, computer equipment and storage medium |
| CN109936511A (en)* | 2017-12-19 | 2019-06-25 | 北京金山云网络技术有限公司 | A token acquisition method, apparatus, server, terminal device and medium |
| CN110380986A (en)* | 2019-07-23 | 2019-10-25 | 中南民族大学 | Flow limitation method, device, equipment and storage medium based on Zuul |
| CN110611623A (en)* | 2019-08-30 | 2019-12-24 | 江苏苏宁物流有限公司 | Current limiting method and device |
| CN111045810A (en)* | 2019-12-17 | 2020-04-21 | 浙江大华技术股份有限公司 | Task scheduling processing method and device |
| CN111083062A (en)* | 2019-12-17 | 2020-04-28 | 深圳前海环融联易信息科技服务有限公司 | Weight mechanism-based current limiting method and device, computer equipment and storage medium |
| CN111447150A (en)* | 2020-02-29 | 2020-07-24 | 中国平安财产保险股份有限公司 | Access request current limiting method, server and storage medium |
| CN112615793A (en)* | 2020-11-26 | 2021-04-06 | 新华三大数据技术有限公司 | Data current limiting method and device |
| CN112612618A (en)* | 2020-12-30 | 2021-04-06 | 深圳我家云网络科技有限公司 | Interface current limiting method and device, computer equipment and storage medium |
| CN112929291A (en)* | 2021-02-18 | 2021-06-08 | 欧冶云商股份有限公司 | Distributed current limiting method based on redis, computer equipment and storage medium |
| CN112953840A (en)* | 2021-01-27 | 2021-06-11 | 上海金仕达成括信息科技有限公司 | Current limiting control method, gateway equipment and current limiting control system |
| CN113973342A (en)* | 2021-10-29 | 2022-01-25 | 北京天融信网络安全技术有限公司 | Flow control method and device, electronic equipment and storage medium |
| CN114020209A (en)* | 2021-09-30 | 2022-02-08 | 济南浪潮数据技术有限公司 | Client service speed limiting method, device, equipment and storage medium |
| CN114257551A (en)* | 2021-12-07 | 2022-03-29 | 中信银行股份有限公司 | A distributed current limiting method and system, and storage medium |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100085874A1 (en)* | 2008-10-05 | 2010-04-08 | Contextream Ltd. | Bandwidth allocation method and apparatus |
| CN101646259A (en)* | 2009-09-04 | 2010-02-10 | 杭州华三通信技术有限公司 | Wireless local area network empty opening rate-limiting method and wireless network device |
| CN102035732A (en)* | 2010-11-25 | 2011-04-27 | 华为技术有限公司 | Service scheduling method and device |
| US20120254943A1 (en)* | 2011-03-31 | 2012-10-04 | Wei Li | Methods for controlling a traffic of an authentication server |
| CN102420773A (en)* | 2012-01-05 | 2012-04-18 | 北京网御星云信息技术有限公司 | Data transmission method and flow control device based on token bucket algorithm |
| US20130242742A1 (en)* | 2012-03-19 | 2013-09-19 | Fujitsu Limited | Apparatus for policing traffic in a communication network |
| CN103229465A (en)* | 2012-11-12 | 2013-07-31 | 华为技术有限公司 | Message sending method and device |
| CN104125006A (en)* | 2014-07-28 | 2014-10-29 | 大连大学 | Satellite communication network bandwidth distributing method |
| CN105763478A (en)* | 2015-12-21 | 2016-07-13 | 中国电子科技集团公司第十五研究所 | Token bucket algorithm-based satellite data ground transmission network flow control system |
| CN107222358A (en)* | 2016-03-21 | 2017-09-29 | 深圳市中兴微电子技术有限公司 | Wrap flux monitoring method per second and device |
| CN105897610A (en)* | 2016-03-31 | 2016-08-24 | 乐视控股(北京)有限公司 | Flow control method and device |
| CN107493241A (en)* | 2016-06-13 | 2017-12-19 | 中兴通讯股份有限公司 | A kind of token distribution method and device |
| CN106656849A (en)* | 2016-11-01 | 2017-05-10 | 杭州迪普科技股份有限公司 | Message speed-limiting method and apparatus |
| CN109936511A (en)* | 2017-12-19 | 2019-06-25 | 北京金山云网络技术有限公司 | A token acquisition method, apparatus, server, terminal device and medium |
| CN109194584A (en)* | 2018-08-13 | 2019-01-11 | 中国平安人寿保险股份有限公司 | A kind of flux monitoring method, device, computer equipment and storage medium |
| CN110380986A (en)* | 2019-07-23 | 2019-10-25 | 中南民族大学 | Flow limitation method, device, equipment and storage medium based on Zuul |
| CN110611623A (en)* | 2019-08-30 | 2019-12-24 | 江苏苏宁物流有限公司 | Current limiting method and device |
| CN111083062A (en)* | 2019-12-17 | 2020-04-28 | 深圳前海环融联易信息科技服务有限公司 | Weight mechanism-based current limiting method and device, computer equipment and storage medium |
| CN111045810A (en)* | 2019-12-17 | 2020-04-21 | 浙江大华技术股份有限公司 | Task scheduling processing method and device |
| CN111447150A (en)* | 2020-02-29 | 2020-07-24 | 中国平安财产保险股份有限公司 | Access request current limiting method, server and storage medium |
| CN112615793A (en)* | 2020-11-26 | 2021-04-06 | 新华三大数据技术有限公司 | Data current limiting method and device |
| CN112612618A (en)* | 2020-12-30 | 2021-04-06 | 深圳我家云网络科技有限公司 | Interface current limiting method and device, computer equipment and storage medium |
| CN112953840A (en)* | 2021-01-27 | 2021-06-11 | 上海金仕达成括信息科技有限公司 | Current limiting control method, gateway equipment and current limiting control system |
| CN112929291A (en)* | 2021-02-18 | 2021-06-08 | 欧冶云商股份有限公司 | Distributed current limiting method based on redis, computer equipment and storage medium |
| CN114020209A (en)* | 2021-09-30 | 2022-02-08 | 济南浪潮数据技术有限公司 | Client service speed limiting method, device, equipment and storage medium |
| CN113973342A (en)* | 2021-10-29 | 2022-01-25 | 北京天融信网络安全技术有限公司 | Flow control method and device, electronic equipment and storage medium |
| CN114257551A (en)* | 2021-12-07 | 2022-03-29 | 中信银行股份有限公司 | A distributed current limiting method and system, and storage medium |
| Title |
|---|
| ZHIQIANG SHI: "A Token Based Method for Congestion and Packet Loss Control", 《IEEE LATIN AMERICA TRANSACTIONS》, 31 March 2013 (2013-03-31)* |
| 骆建歆;梁伟;刘超;: "一个基于令牌桶的带宽动态分配研究", 广东通信技术, no. 03, 15 March 2009 (2009-03-15)* |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115665045A (en)* | 2022-09-06 | 2023-01-31 | 浙江大华技术股份有限公司 | A high concurrency current limiting method, device and computer storage medium |
| Publication number | Publication date |
|---|---|
| CN114979012B (en) | 2024-06-21 |
| Publication | Publication Date | Title |
|---|---|---|
| CN108667861B (en) | Method, system and server for real-time monitoring of equipment through browser | |
| US9491182B2 (en) | Methods and systems for secure internet access and services | |
| CN110795395B (en) | File deployment system and file deployment method | |
| CN114442912B (en) | Method and apparatus for distributed data storage | |
| JP2002245017A (en) | Apparatus and method for specifying requested service level for transaction | |
| JP2022549055A (en) | NODE RATE LIMITING METHOD, APPARATUS, ELECTRONIC DEVICE AND STORAGE MEDIUM | |
| CN110224943B (en) | Flow service current limiting method based on URL, electronic equipment and computer storage medium | |
| CN110601995B (en) | Method, apparatus, storage medium, and device for controlling traffic in a blockchain network | |
| CN107395783B (en) | IP address processing method, system, device and electronic equipment | |
| CN113067875B (en) | Access method, device and equipment based on dynamic flow control of micro-service gateway | |
| CN113260985A (en) | Point-to-point application layer distributed mesh routing | |
| CN114979012A (en) | Network flow current limiting method, system, device and computer storage medium | |
| CN109255254A (en) | A kind of data base authority management method, device, equipment and storage medium | |
| CN114285903B (en) | Request processing method, device, system and electronic device | |
| CN109981533A (en) | A kind of ddos attack detection method, device, electronic equipment and storage medium | |
| CN111064802A (en) | Network request processing method and device, electronic equipment and storage medium | |
| CN114827168A (en) | Alarm aggregation reporting method and device, computer equipment and storage medium | |
| CN114157482A (en) | Service access control method, device, control equipment and storage medium | |
| CN118395410A (en) | Authentication credential processing method, device, system, computer equipment and storage medium | |
| CN110460486B (en) | Monitoring method and system for service node | |
| CN115037693B (en) | Distributed current limiting method and distributed current limiting device based on token bucket | |
| CN113992420B (en) | Authority management method, system, electronic equipment and storage medium | |
| CN112637327B (en) | Data processing method, device and system | |
| CN108718285A (en) | Flow control methods, device and the server of cloud computing cluster | |
| CN113037792B (en) | A verification method, device and gateway for service identification parameters |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| TA01 | Transfer of patent application right | ||
| TA01 | Transfer of patent application right | Effective date of registration:20240524 Address after:Room 1801, 18th Floor, Jiyun Investment Building, No. 278 Xinyi Road, Zhengdong New District, Zhengzhou City, Henan Province, 450047 Applicant after:Zhengzhou Inspur Data Technology Co.,Ltd. Country or region after:China Address before:250101 room s311, building S05, Inspur Science Park, No. 1036, Inspur Road, Jinan pilot Free Trade Zone, Jinan, Shandong Province Applicant before:Inspur(Jinan)Data Technology Co.,Ltd Country or region before:China | |
| GR01 | Patent grant | ||
| GR01 | Patent grant |