Method for implementing distributed architecture through soft routing

A distributed architecture and routing technology, applied in the computer field, achieves the effects of reduced complexity, improved efficiency, fast distribution and distributed business processing

Inactive Publication Date: 2017-02-15
青海帝特斯软件开发有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the deficiencies of the prior art above, the present invention provides a method for implementing a distributed architecture with soft routing; the problem to be solved by the present invention is: use this technology to reduce deployment costs, reduce deployment complexity and reuse, etc., to achieve Reliable distributed architecture manages and allocates resources through soft routing methods to achieve the effect of distributed architecture of hybrid servers; establishes a safe access method to protect the security of internal services, only allowing the gateway to be directly accessed, and internal node services after intelligent authorization Secure access; it is completed by the following steps: the client sends the communication command to the entry gateway, and the entry gateway calls the gateway service for identity authentication. If the identity authentication is successful, it will enter the routing table configuration service. If the identity authentication fails, it will return to the client. The routing table configuration service is based on The communication command judges the service category, enters the business node service, business access data, and ends; or judges the service category according to the communication command, enters the next gateway service, and the gateway calls the gateway service for identity authentication. If the identity authentication fails, it returns to the client, and the identity authentication is successful. Then enter the routing table configuration service, the routing table configuration service judges the service category according to the communication command, enters the service node service, business access data, and ends; or judges the service category according to the communication command, and enters the next gateway service; the client is a PC One type of client or a combination of multiple clients of mobile phones, mobile phones, or other service terminals, and the service gateway has more than one

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing distributed architecture through soft routing
  • Method for implementing distributed architecture through soft routing
  • Method for implementing distributed architecture through soft routing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] A method for implementing a distributed architecture with soft routing; the problem to be solved by the present invention is: use this technology to reduce deployment costs, reduce deployment complexity and reusability, etc., realize a reliable distributed architecture, and manage and distribute through the soft routing method Resources, to achieve the effect of the distributed architecture of the hybrid server; establish a safe access method to protect the security of internal services, only allowing the gateway to be accessed directly, and the internal node service is intelligently authorized to access safely; it is completed by the following steps: the client will communicate The command is sent to the ingress gateway, and the ingress gateway calls the gateway service for identity authentication. If the identity authentication succeeds, it will enter the routing table configuration service. If the identity authentication fails, it will return to the client. Fetch data...

Embodiment 2

[0045] In the field of public security security, Internet cloud computing is used to protect internal services through gateways, so that core services are not detected by external systems, thereby protecting the security of services. For example, in the public security inspection system, we use this service to It provides reliable and correct services for legitimate users at the same time.

Embodiment 3

[0047]In the field of operator's SMS interface service, the internal service mechanism is established by connecting the operator's SMS interface service, and the service routing is performed by the gateway to provide SMS sending and management services for authorized users.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for implementing distributed architecture through soft routing, and relates to the technical field of computers. The method comprises the following steps: sending a communication command to an entry gateway by a client; calling a gateway service to perform identity authentication by the entry gateway; entering a routing table configuration service if the identity authentication succeeds; returning to the client if the identity authentication fails; judging a service type according to the communication command by the routing table configuration service; and entering a business node service, accessing data and ending; or judging the service type according to the communication command, and entering a next gateway service. Through adoption of the method, the system deployment complexity is lowered; the efficiency is increased; multi-level distribution and distributed business processing can be performed rapidly according to a business demand; collaboration and sharing of a plurality of servers are realized at the same time; a basis is laid for heterogeneity of the plurality of servers; the utilization rate of the distributed architecture is increased on an existing server; a unified entry gateway specification is provided; a unified security authentication system is established; and internal service security and data security are protected.

Description

[0001] 1. Technical field [0002] The invention relates to the technical field of computers, in particular to a method for implementing a distributed architecture with a soft router. [0003] 2. Background technology [0004] With the popularization of the Internet and the wide application of Web Services, the Browser / Server architecture model gradually shows its advantages. At present, there are Tomcat, weblogic, websphere, IIS, etc. in the web servers of the Internet, and they all have independent The distributed architecture solution can get rid of geographical restrictions, has high information sharing capabilities, and the customer experience is more convenient and fast, but there are problems: it is impossible to achieve mixed deployment of various servers, unified scheduling, and effective resource sharing. Moreover, when a single system deploys a distributed architecture, the cost is high and the complexity rises exponentially. The R&D and deployment costs of enterpris...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/701H04L12/751H04L45/02
CPCH04L45/00H04L45/02H04L63/08H04L67/10
Inventor 陈宇翔马俊
Owner 青海帝特斯软件开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products