Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File access method, device and equipment and readable storage medium

A file access and access method technology, applied in electrical components, transmission systems, etc., can solve problems that affect system performance, deadlock, and affect user experience.

Active Publication Date: 2018-11-30
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when using cluster locks to solve the problem of resource competition, if a thread (client) holds a lock (that is, it has obtained a lock authorization), when it applies for another lock without authorization and is suspended, a If the dependent path loops back to the initiating node, a closed loop is formed, that is, a deadlock is formed
In a distributed cluster, deadlock is a very fatal problem that will affect system performance
For example, when a process is locked to read and write a file, after a deadlock is formed, other processes cannot access the file, which greatly affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File access method, device and equipment and readable storage medium
  • File access method, device and equipment and readable storage medium
  • File access method, device and equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Please refer to figure 1 , figure 1 It is a flowchart of a file access method in an embodiment of the present invention, which can be used in a distributed storage system, and the method includes the following steps:

[0051] S101. Receive an access request from a target client to access a target file.

[0052] Wherein, the access request includes an access method for requesting access to the target file.

[0053]Under the operation of the user or driven by the internal program, the target client sends an access request to the server to access the target file. Wherein, the target client is any client. The access request may include a method of accessing the target file, and the access method includes at least one of common access methods such as read, cache read, write, cache write, delete, copy, and move. In addition, the target file refers to any file stored in the distributed system such as pictures, documents, tables, audio, and video that can be accessed by the...

Embodiment 2

[0069] Please refer to figure 2 , figure 2 It is a flowchart of another file access method in the embodiment of the present invention, which can be used in a distributed storage system. The method includes the following steps:

[0070] S201. Receive an access request from a target client to access a target file.

[0071] S202. Determine the current status of the metadata lock of the target file by using the access mode and access amount in the access information.

[0072] Wherein, the state of the metadata lock includes an idle state, an exclusive state and a shared state.

[0073] Corresponding relationship between the corresponding access mode and corresponding access amount and the state of the metadata lock can be pre-specified, and the current state of the metadata lock can be directly determined when the access information is obtained.

[0074] Specifically, the current state of the metadata lock of the target file is determined by using the access mode and the amou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file access method. The method comprises the following steps of: receiving an access request of a target client for accessing a target file, wherein the access request comprises an access mode of requesting to access the target file; acquiring access information corresponding to the target file, and determining a current state of a metadata lock of the target file by utilizing the access information; by utilizing the current state, according to a corresponding relationship of each state of the metadata lock and the access mode, determining whether to give corresponding access permission to the target client; and if yes, allowing the target client to access the target file. In a permission management mode, a resource competition problem is avoided in advance, consistency of data is ensured, and system stability is promoted. The invention further discloses a file access device and equipment and a readable storage medium, which have the corresponding technical effects.

Description

technical field [0001] The present invention relates to the field of computer application technology, in particular to a file access method, device, equipment and readable storage medium. Background technique [0002] A distributed cluster is a computing resource with high performance, high availability, and scalability. However, when multiple users access the same file at the same time, resource contention problems arise. That is, when multiple processes compete for the same shared resource, this situation often causes the system to crash or read wrong data, write wrong data, destroy data consistency, and affect system performance. [0003] Existing methods usually use cluster locks to solve resource competition problems. However, when using cluster locks to solve the problem of resource competition, if a thread (client) holds a lock (that is, it has obtained a lock authorization), when it applies for another lock without authorization and is suspended, a If the dependen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L67/10
Inventor 李庆龙
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products