Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety distributed file system architecture based on FT-1500A processor

A FT-1500A, distributed file technology, applied in the input/output process of data processing, transmission system, electrical digital data processing, etc., can solve problems such as hidden safety hazards, and achieve the effect of high security and low energy consumption

Active Publication Date: 2017-05-31
TOYOU FEIJI ELECTRONICS
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the distributed system architecture mainly uses foreign CPUs for system architecture design, which has potential safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety distributed file system architecture based on FT-1500A processor
  • Safety distributed file system architecture based on FT-1500A processor
  • Safety distributed file system architecture based on FT-1500A processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] The technical solution of the present invention is implemented in the following manner. The entire distributed file system logically consists of four parts: storage service, storage management service, system management service, and client. These four parts can run on the same node, or According to the needs of the environment, it runs on different nodes. When it is composed of multiple different nodes, its structure is as follows: figure 2 As shown, the front-end network is mainly responsible for receiving the data of the client, which is processed by the node where the storage service is located; the metadata processing request of the client is processed by the storage management service; the monitoring data pushed by the node where the storage service is located, and the node where the storage management service is located For offline information, the back-end network is mainly responsible for data replication between storage service nodes. When using the replica fau...

Embodiment 2

[0037] As described above, in the above embodiment, a secure distributed file system architecture based on the FT-1500A processor, all clients that need this distributed file system must install the client program of the corresponding platform. When the client data is written, use Such as image 3 shown in the manner.

[0038] When the client starts to write data, it first caches all the data to be written in the local hard disk, obtains a set of available storage service nodes from the storage management server, then slices and encrypts the data, and publishes it to the storage server through the front-end network One of the nodes where it is located judges whether to use the copy method to provide fault tolerance. If it is used, the master copy will be saved to the storage server node, and then the copy will be transmitted to another storage server node through the back-end network. If it is not used, it will be based on the established erasure correction algorithm. Calculate...

Embodiment 3

[0040] As described above, in the embodiment of a secure distributed file system architecture based on the FT-1500A processor, the data is sliced ​​into a specified size, and if the written data is smaller than the specified size, special content is used to fill the slice size. At the same time, fill the sliced ​​content with random content at the specified position, such as Figure 4 After shown, the slice is encrypted, using part of the metadata information of the file as the key; at the same time, a set of available node information of the storage server is obtained from the storage management server, and whether the slice uses a fault-tolerant method of copy or erasure; according to Copy or erasure requires slices to be saved to different nodes; valid content and invalid content are alternately set; when reading data, the file metadata information saved in the storage management server, the node information of the slice, and the fault-tolerant mode information adopted by the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety distributed file system architecture based on an FT-1500A processor. The architecture comprises a client side for providing an interface compatible with POSIX for accessing a distributed file system for an application server; the client side is connected with a front-end switched network, the front-end switched network is connected with a storage server, a storage management server and a system management server, and the storage server is connected with a rear-end switched network. The safety distributed file system architecture has the advantages that the architecture is more efficient, safer and more environmentally friendly, user data safety and reliability can be met, functions and properties can reach the industry level, meanwhile, and the higher safety and lower energy consumption are achieved at the same time; particularly, as for safety and controllability, from a hardware platform to the software architecture, totally-domestic equipment and software are adopted as cores, and the purposes of safety and controllability are truly achieved.

Description

technical field [0001] The invention relates to the field of step-by-step file system technology, in particular to a secure distributed file system architecture based on the FT-1500A processor. Background technique [0002] In recent years, with the wide application of technology in all walks of life, information security issues have become increasingly prominent. With the continuous occurrence of a series of incidents related to information security at home and abroad, the topic of information security has not only become the focus of attention of all walks of life and major industries, but has also risen to the national level. Storage, computing, and network are the three cornerstones of the development of the information industry. Storage is the core of the information system. Data has become an important strategic resource of the country, which is related to the national economy and people's livelihood, and social harmony, stability and development. As the basic carrier...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06G06F17/30G06F11/14G06F11/10H04L29/08
CPCG06F3/0607G06F3/0614G06F3/0643G06F3/065G06F3/067G06F11/10G06F11/1464G06F16/168G06F16/172G06F16/182H04L67/1031H04L67/1097Y02D10/00
Inventor 李发明张勤
Owner TOYOU FEIJI ELECTRONICS