Font Size: a A A

Design And Implementation Of Flow Control Service Based On Token Bucket Algorithm

Posted on:2017-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:S H ZhongFull Text:PDF
GTID:2348330488959939Subject:Software engineering
Abstract/Summary:PDF Full Text Request
It is very important to control the flow of network services with high concurrency in the modern industrial environment. If the abnormal growth of flow occurs during peak periods, resulting in service downtime, it is disastrous. However, when facing the abnormal traffic, cutting down flow with specific threshold, it will inevitably lead to the user awful experience of consumption, and may also cause that core transaction processes could not be completed. Therefore, it is necessary to provide a real-time configuration of flow control solution.To meet these needs, traffic control services provides real-time configuration, intercept-ion and one-stop service of flow control for the business side. Based on the classic algorithm for traffic shaping-token bucket algorithm, I designed three different traffic control strategies. Businesses can set a reasonable allocation of limiting parameters according to their own business scenarios. After setting the intercepted policies in emergency management system, the service will push the intercepted information to the Zookeeper and sync to the app's local profile. The service will check the interface names, user ID of each request and match them with policy information. The system will return the corresponding response base on different interception logic of different type of policy. Interception particle size can be refined to each user request for each interface in order to achieve the depth of customization based on the business scene traffic control and shaping.Making stress tests connecting with online service proved that flow control services are not only able to meet the functional needs of the business, the abnormal traffic restrictions; at the same time, also can be used as basic components to provide high performance for business support. As before this article was finalized, two core businesses have accessed traffic control service, and they kept stable and healthy. And part of the core business being docked.
Keywords/Search Tags:Traffic Shaping, Token Bucket, Interception Policy
PDF Full Text Request
Related items