Font Size: a A A

Application Research Of Load Scheduling Algorithm And Data Verification Method In CDN System

Posted on:2015-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:D H SunFull Text:PDF
GTID:2298330452453232Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, broadband services in people’s lives arepaid more and more attention, and a lot of concurrent and repeat business causeunnecessary shocks for network. The amount of the requests which are processed by asingle node are limited severely so the multi-node Storage of documents distributioncan promote the stability of the system and enhance the load capacity of the system; atthe same time, as the North-South interconnection problems exist in China,User requests are distributed to the near nodes in the same network to process and cangreatly improve the processing speed and reduce the possibility of network congestion.CDN(Content Delivery Network) push the content to the edge of the network, andprovide users with the nearest service, thus this ensures the service quality and theaccess to the entire order on the network, and it also solves the two problems of"centralization and decentralization" dilemma of content providers.In this context, CDN will be more and more important role, this paper firstlyanalyzes the existing CDN system, its core modules and the design way. First of all, ascheduling algorithm of cluster technology was analyzed, especially putting forwardthe inferiority of the weighted least Connection Scheduling Algorithm. This paperimproves the algorithm for the inferiority, and introduces the average load factor ofthe server over a minute, and proposes the addition formula and the multiplicationformula. It achieves a good effect of the scheduling.Secondly, it’s often different between the resources that we want to access andthe server replies resources. That is to say that the resources have been hijacked by thethird party in transmission process, and placed ads or virus and even tampered thewhole contents. In order to ensure the safety of transmission resources, this paperintroduces the MD5data check method, and the MD5operation will be performedafter receiving resources in order to verify whether resources are security.Again, in the design of "edge nodes", this paper uses the disk array to createRAID6form to save local resources. Because RAID6has two redundant disks andcheck code and data information are distributed on each member disk, this greatlyenhances the safety of resource preservation.Finally, using the experiment verifies the effect of the improved schedulingalgorithm, the application effect of MD5data check method and disk array in thissystem. Then compared with other classical algorithms, we found the advantages anddisadvantages of the improved scheduling algorithm.
Keywords/Search Tags:CDN, load balancing, data validation, scheduling node, disk array
PDF Full Text Request
Related items