Excerpt from: Multiplayer Online game server architecture
Http://wenku.baidu.com/view/aac987eae009581b6bd9eb8a.html
MMORPG load Balancing mechanism
1. Static distribution of players to the server
The average player is assigned to each server so that each server has the same number of players. The advantage of this approach is that the algorithm is simple, but the player moves on the map, so over tim
LVS-NAT LVS-DR model of Load Balancing
LVS is short for Linux Virtual Server. It is a Virtual Server cluster system that can define one or more backend servers. Worker s in the INPUT kernel.
LVS Scheduling Methods: 10Static Method: only scheduling based on the algorithm itselfRr: Round RobinWrr: Weighted RR Weight Round RobinSh: source hashing supports session bi
ServletContext translated as "Servletcontext ". is aservletwith theservletinterface for direct communication between containers. J2sdkeeof theJavadocsaid it was "a set of methods that a servlets uses to communicate with its servlet container."ServletThe container starts aWebwhen applied, it creates aServletContextobject. EachWebthe application has a uniqueServletContextobject. With oneWeball of the appsservletobject to share aServeltcontext. Servletob
: net.spy.memcached.MemcachedClient.set(Ljava/lang/String;ILjava/lang/Object;)Lnet/spy/memcached/internal/OperationFuture;。解决方法spymemcached-2.7.jar升级到spymemcached-2.8.4.jar.There's information in the retry boot.Successfully completed. Browser test too heavy results inconsistent ah, I just xxx.From the above test results, give me a hint of decisive replacement Tomcat unified with 6.0.18 version, although the beginning of the 6.0.37 is also TOMCAT6, but the test is not successful, there seems to b
Alibaba Cloud Iot framework ServerSuperIO tutorial-20. Network Communication Controller grouping to improve interactive load balancing capabilities. V3.6.6 released, Iot Controller20.1 Overview
ServerSuperIO originally had only one network controller in network communication mode. in self-control mode, concurrency mode, and Singleton mode, the returned data is processed asynchronously without any performanc
describes how to deal with nginx:3) ip_hashIp_hash technology in nginx can direct requests from an ip address to the same backend, so that a client and a backend under this ip address can establish a stable session, ip_hash is defined in upstream configuration:Upstream backend {Server 127.0.0.1: 8001;Server 127.0.0.1: 8002;Ip_hash;}Ip_hash is easy to understand. However, ip_hash is flawed because it can only be used to allocate backend ip addresses. in some cases, ip_hash cannot be used:1/nginx
solid session,ip_hash is defined in the upstream configuration:Upstream Backend {server 127.0.0.1:8001;server 127.0.0.1:8002;Ip_hash;}Ip_hash is easy to understand, but because the backend can only be assigned with the IP factor, the Ip_hash is flawed and cannot be used in some cases:1/nginx is not the most front-end server. Ip_hash requirements Nginx must be the most front-end server, or nginx can not get the correct IP, it can not be based on IP as a hash. For example, the use of squid as the
session,ip_hash is defined in the upstream configuration:Upstream Backend {Server 127.0.0.1:8001;Server 127.0.0.1:8002;Ip_hash;}Ip_hash is easy to understand, but because the backend can only be assigned with the IP factor, the Ip_hash is flawed and cannot be used in some cases:1/nginx is not the most front-end server. Ip_hash requirements Nginx must be the most front-end server, or nginx can not get the correct IP, it can not be based on IP as a hash. For example, the use of squid as the most
establish a solid session,ip_hash is defined in the upstream configuration:
Upstream Backend {
Server 127.0.0.1:8001;
Server 127.0.0.1:8002;
Ip_hash;
}
Ip_hash is easy to understand, but because the backend can only be assigned with the IP factor, the Ip_hash is flawed and cannot be used in some cases:
1/nginx is not the most front-end server. Ip_hash requirements Nginx must be the most front-end server, or nginx can not get the correct IP, it can not be based on IP as a hash. For example, t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.