Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for lock management in cluster, lock server and client

A management method and client technology, applied in the field of lock management in the cluster, can solve problems such as being in a write lock waiting state, the lock server does not know the client, and client B cannot apply for a write lock, etc.

Active Publication Date: 2018-10-30
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the implementation scheme of the existing technology, client A fails, because the lock server does not know that client B is in the write lock waiting state, so client B cannot apply for the write lock, and is always in the write lock waiting state
As can be seen from the above description, the lock server in the prior art can only obtain the lock status of the current client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for lock management in cluster, lock server and client
  • Method for lock management in cluster, lock server and client
  • Method for lock management in cluster, lock server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] Such as figure 2 As shown, the cluster in the embodiment of the present invention includes a lock server, client A and client B, and client A and client B communicate with the lock server using the RDMA protocol respectively, wherein the lock server memory stores the lock request queue, read lock Allocation count and write lock allocation identifier, see the description below for details.

[0081] Such as image 3 As shown, the lock server includes a memory 301 and an interface card 302, wherein the interface card 302 can be a network interface card (Network Interface Card, NIC) supporting the Ethernet protocol (Ethenet), or an interface card based on the InfiniBand protocol or other RDMA-capable An interface card that implements a protocol for remote direct access to memory. The memory 301 in the embodiment of the present invention may be a dynamic random access memory (Dynamic Random Access Memory, DRAM), a dual-inline-memory-modules (DIMM), a semiconductor memory (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a solution for lock management in a cluster. The cluster includes a client and a lock server. The lock server includes an interface card and a memory. The memory stores a queue of read lock requests, and records the records of clients waiting for a read lock or obtaining a read lock. ID, the memory also stores the write lock request queue to record the ID of the client who is waiting for the write lock or obtains the write lock. The memory also contains the read lock allocation count and the write lock allocation ID. The former is used to record the allocated read lock, and the latter is used In order to indicate whether the write lock has been allocated, the interface card of the client and the lock server communicates through the RDMA protocol to perform the lock operation.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method for lock management in a cluster, a server and a client. Background technique [0002] There are multiple clients in the cluster. In order to obtain the processing permission of shared resources in the cluster, such as write permission or read permission, a client needs to apply for processing permission from the lock server in the cluster, which is usually called applying for a lock. Usually write permission is also called write lock, or exclusive lock, and read permission is called read lock or shared lock. [0003] As shown in FIG. 1 , the prior art client applies for a write lock, and the cluster includes a lock server, client A, and client B. Client A writes the identity of client A to the memory address of the lock server using the Remote Direct Memory Access (RDMA) protocol, such as using the atomic operation Compare-and-Swap in the RDMA protocol to apply fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F15/177H04L29/08
CPCG06F15/177H04L67/10G06F9/52G06F3/0622G06F3/0637G06F3/067G06F9/526G06F15/17331H04L67/14
Inventor 蓝文海张巍王学友张粤
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More