Traffic surge management for points of presence
First Claim
Patent Images
1. A computer-implemented method for concluding mitigation of flash crowd traffic on networks, the computer-implemented method comprising:
- under control of a computing device configured with specific computer executable instructions,for each destination point of presence (POP) of a plurality of POPs utilized for mitigating a traffic surge for a target group of network resources in which a number of requests for the network resources received by a source POP of the plurality of POPs during a first period of time exceeds a threshold, obtaining a request volume for requests for network resources corresponding to the target group received at the respective destination POP during a second period of time;
determining an aggregate request volume based at least in part on request volumes associated with each of the plurality of POPs, wherein the plurality of POPS includes at least one destination POP and at least one source POP;
determining that the aggregate request volume does not meet a traffic volume threshold associated with the source POP, wherein the source POP corresponds to a POP where the traffic surge for the target group was detected; and
causing termination of traffic surge mitigation for the target group by reducing the amount of request volume routed to the destination POPs in response to determining that the aggregate request volume does not meet the traffic volume threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group'"'"'s rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.
1274 Citations
20 Claims
-
1. A computer-implemented method for concluding mitigation of flash crowd traffic on networks, the computer-implemented method comprising:
under control of a computing device configured with specific computer executable instructions, for each destination point of presence (POP) of a plurality of POPs utilized for mitigating a traffic surge for a target group of network resources in which a number of requests for the network resources received by a source POP of the plurality of POPs during a first period of time exceeds a threshold, obtaining a request volume for requests for network resources corresponding to the target group received at the respective destination POP during a second period of time; determining an aggregate request volume based at least in part on request volumes associated with each of the plurality of POPs, wherein the plurality of POPS includes at least one destination POP and at least one source POP; determining that the aggregate request volume does not meet a traffic volume threshold associated with the source POP, wherein the source POP corresponds to a POP where the traffic surge for the target group was detected; and causing termination of traffic surge mitigation for the target group by reducing the amount of request volume routed to the destination POPs in response to determining that the aggregate request volume does not meet the traffic volume threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A non-transitory computer readable storage medium storing computer executable instructions that when executed by a processor perform operations comprising:
-
determining an aggregate request volume for requests for network resources corresponding to a target group received at a plurality of points of presence (POPs), wherein the plurality of POPs mitigate a traffic surge for the target group in which a number of requests for the network resources received by a source POP in the plurality of POPs during a first period of time exceeds a threshold; determining that the aggregate request volume does not meet a traffic volume threshold associated with the source POP, wherein the source POP corresponds to a POP where the traffic surge for the target group was detected; and causing termination of traffic surge mitigation for the target group in response to determining that the aggregate request volume does not meet the traffic volume threshold. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
at least one data store that stores computer-executable instructions; and at least one processor in communication with the data store, the processor configured with the computer-executable instructions such that the computer-executable instructions, when executed, cause the system to at least; determine an aggregate request volume for requests for network resources corresponding to a target group received at a plurality of points of presence (POPs), wherein the plurality of POPs mitigate a traffic surge for the target group in which a number of requests for the network resources received by a source POP in the plurality of POPs during a first period of time exceeds a threshold; determine that the aggregate request volume meets a traffic volume threshold associated with the source POP, wherein the source POP corresponds to a POP where the traffic surge for the target group was detected; and adjust the traffic surge mitigation for the target group in response to determining that the aggregate request volume does not meet the traffic volume threshold. - View Dependent Claims (19, 20)
-
Specification