Supercharge Your Innovation With Domain-Expert AI Agents!

Method for managing lock in cluster, lock server and client

A management method and client technology, which is applied in the field of lock management in the cluster, can solve the problems that the lock server does not know the client, is in the write lock waiting state, and client B cannot apply for the write lock, etc.

Active Publication Date: 2017-08-29
HUAWEI TECH CO LTD
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the implementation scheme of the existing technology, client A fails, because the lock server does not know that client B is in the write lock waiting state, so client B cannot apply for the write lock, and is always in the write lock waiting state
As can be seen from the above description, the lock server in the prior art can only obtain the lock status of the current client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for managing lock in cluster, lock server and client
  • Method for managing lock in cluster, lock server and client
  • Method for managing lock in cluster, lock server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] Such as figure 2 As shown, the cluster in the embodiment of the present invention includes a lock server, client A and client B, and client A and client B communicate with the lock server using the RDMA protocol respectively, wherein the lock server memory stores the lock request queue, read lock Allocation count and write lock allocation identifier, see the description below for details.

[0081] Such as image 3 As shown, the lock server includes a memory 301 and an interface card 302, wherein the interface card 302 can be a network interface card (Network Interface Card, NIC) supporting the Ethernet protocol (Ethenet), or an interface card based on the InfiniBand protocol or other RDMA-capable An interface card that implements a protocol for remote direct access to memory. The memory 301 in the embodiment of the present invention may be a dynamic random access memory (Dynamic Random Access Memory, DRAM), a dual-inline-memory-modules (DIMM), a semiconductor memory (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a solution for managing a lock in a cluster. The cluster comprises a client and a lock server. The lock server contains an interface card and a memory. The memory stores a read lock request queue and records an identifier of a client in a read lock waiting state or obtains a read lock, and the memory further stores a write lock request queue and records an identifier of a client in a write lock waiting state or obtains a write lock. The memory further contains a read lock allocation count and a write lock allocation identifier, wherein the former is used to record an allocated read lock, and the latter is used to represent whether a write lock has already been allocated. The client communicates with the interface card of the lock server via an RDMA protocol, so as to perform a lock operation.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method for lock management in a cluster, a server and a client. Background technique [0002] There are multiple clients in the cluster. In order to obtain the processing permission of shared resources in the cluster, such as write permission or read permission, a client needs to apply for processing permission from the lock server in the cluster, which is usually called applying for a lock. Usually write permission is also called write lock, or exclusive lock, and read permission is called read lock or shared lock. [0003] As shown in FIG. 1 , the prior art client applies for a write lock, and the cluster includes a lock server, client A, and client B. Client A writes the identity of client A to the memory address of the lock server using the Remote Direct Memory Access (RDMA) protocol, such as using the atomic operation Compare-and-Swap in the RDMA protocol to apply fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F15/177H04L29/08
CPCG06F15/177H04L67/10G06F9/52G06F3/0622G06F3/0637G06F3/067G06F9/526G06F15/17331H04L67/14
Inventor 蓝文海张巍王学友张粤
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More