Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A distributed lock implementation method and device

A technology of distributed locks and implementation methods, applied in the field of cloud computing, can solve problems such as waste of resources

Active Publication Date: 2021-05-04
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the above technical problems, the present invention provides a method and device for implementing distributed locks. By reading the corresponding part of the surviving nodes in the shared storage, the amount of data read is reduced, and the efficiency of implementing distributed locks is improved. The need to read all shared storage space causes waste of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A distributed lock implementation method and device
  • A distributed lock implementation method and device
  • A distributed lock implementation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0034] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0035] The Disk paxos algorithm reads all the data to judge whether the other party is acquiring resources, and at the same time judges whether the resources are acquired. During the Disk paxos algorithm process, at least six I / Os are required to complete ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed lock realization method and device. It involves cloud computing technology, which solves the problem of resource waste caused by reading all shared storage space every time. The method includes: obtaining the surviving nodes in the current lock space; and reading the I / O blocks corresponding to the surviving nodes in the shared storage. The technical scheme provided by the invention is suitable for a large-scale cluster computing platform, and realizes a distributed lock with high efficiency and high resource utilization.

Description

technical field [0001] The invention relates to cloud computing technology, in particular to a distributed lock implementation method and device. Background technique [0002] With the rapid development of computer technology and network technology, large-scale clusters are increasingly used in actual production environments. Through virtualization, a cloud computing platform is formed. In a virtualization system, when different systems or different hosts in the same system share the same resource or a group of resources, coordinated actions are often required, and mutual exclusion is often required to prevent mutual interference and ensure consistency, so distributed locks are required To ensure the normal operation of the system under the above circumstances. [0003] There are roughly two types of distributed lock implementation schemes: one implementation scheme is dependent on the network, and the consistency of obtaining resources is guaranteed through network commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/52
CPCG06F9/526
Inventor 马怀旭
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products