A method and apparatus for implementing distributed lock

A technology of distributed locks and implementation methods, applied in the field of cloud computing, can solve problems such as resource waste, and achieve the effects of solving resource waste, improving implementation efficiency, and reducing the amount of data read

Active Publication Date: 2019-01-04
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the above technical problems, the present invention provides a method and device for implementing distributed locks. By reading the corresponding part of the surviving nodes in the shared storage, the amount of data read is reduced, and the efficiency of implementing distributed locks is improved. The need to read all shared storage space causes waste of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and apparatus for implementing distributed lock
  • A method and apparatus for implementing distributed lock
  • A method and apparatus for implementing distributed lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0034] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0035] The Disk paxos algorithm reads all the data to judge whether the other party is acquiring resources, and at the same time judges whether the resources are acquired. During the Disk paxos algorithm process, at least six I / Os are required to complete ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for realizing a distributed lock. The invention relates to a cloud computing technology, which solves the problem of waste of resources caused by the needto read all shared storage space every time. The method comprises the following steps of: acquiring a surviving node in a current lock space; reading an I / O block corresponding to the surviving nodein the shared storage. The technical proposal provided by the invention is applicable to a large-scale cluster operation platform, and realizes the distributed lock with high efficiency and high resource utilization rate.

Description

technical field [0001] The invention relates to cloud computing technology, in particular to a distributed lock implementation method and device. Background technique [0002] With the rapid development of computer technology and network technology, large-scale clusters are increasingly used in actual production environments. Through virtualization, a cloud computing platform is formed. In a virtualization system, when different systems or different hosts in the same system share the same resource or a group of resources, coordinated actions are often required, and mutual exclusion is often required to prevent mutual interference and ensure consistency, so distributed locks are required To ensure the normal operation of the system under the above circumstances. [0003] There are roughly two types of distributed lock implementation schemes: one implementation scheme is dependent on the network, and the consistency of obtaining resources is guaranteed through network commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/52
CPCG06F9/526
Inventor 马怀旭
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products