Data storage method and terminal based on consistent hash algorithm
A hash algorithm and data storage technology, applied in the direction of electrical digital data processing, digital data information retrieval, special data processing applications, etc., can solve the problems of uneven distribution of nodes, it is difficult to ensure continuous uniformity, etc., and achieve enhanced redundancy security performance, improving usage efficiency, and improving search efficiency
Active Publication Date: 2021-01-15
JINQIANMAO TECH CO LTD
8 Cites 1 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention provides a data storage method and terminal based on a consistent hash algorithm, and the method comprises the steps: mapping a physical disk into more than one virtual node, and calculating a first hash value of each virtual node; arranging all virtual nodes according to the size sequence of first hash values to form a hash ring; receiving a file storage request, wherein the file storage request comprises a to-be-stored file and a file name; calculating a second hash value corresponding to the filename, finding a first hash value closest to the second hash value on the hash ringaccording to a preset direction, and storing the to-be-stored file corresponding to the filename to a physical disk where a virtual node corresponding to the first hash value closest to the second hash value is located. The single physical disk is mapped into the plurality of virtual nodes, and the file name is used as the key value to identify the to-be-stored file, so that the file searching efficiency is improved.
Application Domain
Input/output to record carriersFile access structures +2
Technology Topic
Magnetic disksAlgorithm +4
Image
Examples
- Experimental program(4)
Example Embodiment
Example Embodiment
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Method for realizing multi-screen playing video
Owner:GUANGDONG VTRON TECH CO LTD
Image coding method, image decoding method, image coding apparatus, image decoding apparatus, and image coding and decoding apparatus
Owner:SUN PATENT TRUST
Systems and methods for notifying multiple hosts from an industrial controller
Owner:ROCKWELL AUTOMATION TECH
Systems and methods for providing treatment planning
Owner:ALIGN TECH
Classification and recommendation of technical efficacy words
- Improve efficiency
Video coding methods and apparatuses
Owner:MICROSOFT TECH LICENSING LLC
Dynamic player groups for interest management in multi-character virtual environments
Owner:MICROSOFT TECH LICENSING LLC
Method and apparatus for controlling a selectable voltage audio power output stage
Owner:CIRRUS LOGIC INC
Wireless power transmitter and power transmission method thereof
Owner:LG INNOTEK CO LTD