Unlock instant, AI-driven research and patent intelligence for your innovation.
A file access method, device, equipment and readable storage medium
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A file access and access method technology, applied in electrical components, transmission systems, etc., can solve problems such as affecting user experience, affecting system performance, and deadlocking
Active Publication Date: 2021-08-10
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, when using cluster locks to solve the problem of resource competition, if a thread (client) holds a lock (that is, it has obtained a lock authorization), when it applies for another lock without authorization and is suspended, a If the dependent path loops back to the initiating node, a closed loop is formed, that is, a deadlock is formed
In a distributed cluster, deadlock is a very fatal problem that will affect system performance
For example, when a process is locked to read and write a file, after a deadlock is formed, other processes cannot access the file, which greatly affects the user experience
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0050] Please refer to figure 1 , figure 1 It is a flowchart of a file access method in an embodiment of the present invention, which can be used in a distributed storage system, and the method includes the following steps:
[0051] S101. Receive an access request from a target client to access a target file.
[0052] Wherein, the access request includes an access method for requesting access to the target file.
[0053]Under the operation of the user or driven by the internal program, the target client sends an access request to the server to access the target file. Wherein, the target client is any client. The access request may include a method of accessing the target file, and the access method includes at least one of common access methods such as read, cache read, write, cache write, delete, copy, and move. In addition, the target file refers to any file stored in the distributed system such as pictures, documents, tables, audio, and video that can be accessed by the...
Embodiment 2
[0069] Please refer to figure 2 , figure 2 It is a flowchart of another file access method in the embodiment of the present invention, which can be used in a distributed storage system. The method includes the following steps:
[0070] S201. Receive an access request from a target client to access a target file.
[0071] S202. Determine the current status of the metadata lock of the target file by using the access mode and access amount in the access information.
[0072] Wherein, the state of the metadata lock includes an idle state, an exclusive state and a shared state.
[0073] Corresponding relationship between the corresponding access mode and corresponding access amount and the state of the metadata lock can be pre-specified, and the current state of the metadata lock can be directly determined when the access information is obtained.
[0074] Specifically, the current state of the metadata lock of the target file is determined by using the access mode and the amou...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a file access method, which comprises the following steps: receiving an access request from a target client to access a target file; wherein, the access request includes an access mode for requesting access to the target file; obtaining access information corresponding to the target file, and Use the access information to determine the current state of the metadata lock of the target file; use the current state and according to the corresponding relationship between each state of the metadata lock and the access method, determine whether to grant the corresponding access permission to the target client; if yes, allow the target client Client access object files. Through authority management, the problem of resource competition is avoided in advance, data consistency is guaranteed, and system stability is improved. The invention also discloses a file access device, equipment and a readable storage medium, which have corresponding technical effects.
Description
technical field [0001] The present invention relates to the field of computer application technology, in particular to a file access method, device, equipment and readable storage medium. Background technique [0002] A distributed cluster is a computing resource with high performance, high availability, and scalability. However, when multiple users access the same file at the same time, resource contention problems arise. That is, when multiple processes compete for the same shared resource, this situation often causes the system to crash or read wrong data, write wrong data, destroy data consistency, and affect system performance. [0003] Existing methods usually use cluster locks to solve resource competition problems. However, when using cluster locks to solve the problem of resource competition, if a thread (client) holds a lock (that is, it has obtained a lock authorization), when it applies for another lock without authorization and is suspended, a If the dependen...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.