Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for accessing shared resources

A technology for sharing resources and identification, applied in the field of data communication, can solve the problem of long time

Active Publication Date: 2014-04-09
HUAWEI TECH CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The embodiment of the present invention provides a method and device for accessing shared resources, which can solve the problem of long time consumption in the current method for accessing shared resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for accessing shared resources
  • Method and device for accessing shared resources
  • Method and device for accessing shared resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] Embodiment one (such as image 3 shown):

[0083] Step 300: Client 1 sends a lock permission request to access shared resource 1 to the first node where it is located;

[0084] Step 310: The first node judges whether the lock identifier corresponding to the shared resource 1 is stored in the first node and the lock identifier is not allocated, if so, execute step 350, otherwise, execute step 320;

[0085] Step 320: the first node sends a lock permission request to access the shared resource 1 to the lock manager;

[0086] Wherein, the lock manager is located in the second storage device.

[0087] Step 330: The lock manager judges whether the lock identifier corresponding to the shared resource 1 is stored in the first node, and the lock identifier is not allocated; if so, execute step 340; otherwise, execute step 360;

[0088] Step 340: The lock manager sends the lock identifier corresponding to the shared resource 1 to the first node;

[0089] Step 350: the first n...

Embodiment 2

[0091] Embodiment two (such as Figure 4 shown):

[0092] Step 400: Client 1 sends a lock permission request to access shared resource 1 to the first node where it is located;

[0093] Step 410: The first node judges whether the lock ID corresponding to the shared resource 1 is stored in the first node and the lock ID has not been allocated. If so, execute step 480; otherwise, execute step 420;

[0094] Step 420: the first node sends a lock permission request to access the shared resource 1 to the second node;

[0095] In this step, the client 1 and the second node are located in the first storage device.

[0096] Step 430: The second node judges whether the lock identifier corresponding to the shared resource 1 is stored in the first node and the lock identifier is not allocated, if so, execute step 470, otherwise, execute step 440;

[0097] Step 440: the second node sends a lock permission request for accessing the shared resource 1 to the lock manager;

[0098] Wherein,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of data communication and discloses a method and a device for accessing shared resources. According to a scheme described in the embodiment of the invention, after receiving a permission lock request sent by a client of a first node, the first node forwards the permission lock request only when a lock identifier including an identifier of shared resource is not found in the first node, that is to say, whether the lock identifier including the identifier of the shared resource exists in the first node is queried first, the permission lock request is forwarded only when the lock identifier including the identifier of the shared resource does not exist in the first node, and the permission lock request is directly allocated when the lock identifier including the identifier of the shared resource exists in the first node. The time for the client to acquire the lock identifier from the first node is less than the time for the client to acquire the lock identifier from other nodes. Therefore, the problem that the existing method for accessing shared resources is highly time-consuming is solved.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a method and device for accessing shared resources. Background technique [0002] With the development of storage technology, various data information is growing explosively, and people are looking for a powerful data center architecture. The active-active data center is one of the important solutions. Through the active-active technology, business disaster recovery and load sharing can be realized among multiple cross-regional data centers (storage devices), and then the storage resources of the storage devices can be integrated, such as Figure 1A shown. [0003] The storage array is the storage carrier of the storage device. In the active-active data center solution, the storage array provides virtualized shared resources for host applications. When the system is running, data will be written to the storage arrays of the two storage devices at the same time. When o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCG06F9/526
Inventor 邹蛟同
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products