A system facilitates the distribution and redistribution of chunks of data among multiple servers. The system may identify servers to store a replica of the data based on at least one of utilization of the servers, prior data distribution involving the servers, and failure correlation properties ass
A system facilitates the distribution and redistribution of chunks of data among multiple servers. The system may identify servers to store a replica of the data based on at least one of utilization of the servers, prior data distribution involving the servers, and failure correlation properties associated with the servers, and place the replicas of the data at the identified servers. The system may also monitor total numbers of replicas of the chunks available in the system, identify chunks that have a total number of replicas below one or more chunk thresholds, assign priorities to the identified chunks, and re-replicate the identified chunks based substantially on the assigned priorities. The system may further monitor utilization of the servers, determine whether to redistribute any of the replicas, select one or more of the replicas to redistribute based on the utilization of the servers, select one or more of the servers to which to move the one or more replicas, and move the one or more replicas to the selected one or more servers.
대표청구항▼
1. A method, comprising: acquiring, by a device, a set of locks for performing a first operation associated with a file stored in a memory, the set of locks including a read lock associated with the file that prevents data from being read from the file, and a write lock associated with the file that
1. A method, comprising: acquiring, by a device, a set of locks for performing a first operation associated with a file stored in a memory, the set of locks including a read lock associated with the file that prevents data from being read from the file, and a write lock associated with the file that prevents data from being written to the file;generating a namespace tree that includes a plurality of nodes, each node of the plurality of nodes corresponding to a respective file, and each node having an associated read lock and an associated write lock;determining, by the device, whether a lock, included in the set of locks, conflicts with another lock included in another set of locks acquired to perform a second operation, including mapping a particular node of the plurality of nodes to the file, and determining whether the lock conflicts with the other lock based on the read lock and the write lock associated with the particular node; andperforming, by the device, the first operation and the second operation, the first operation being performed in parallel with the second operation when the lock does not conflict with the other lock, and the first operation and the second operation being performed in series when the lock conflicts with the other lock. 2. The method of claim 1, wherein determining whether the lock conflicts with the other lock comprises: determining that the other lock includes another write lock associated with the file, and determining that the write lock associated with the file conflicts with the other write lock associated with the file. 3. The method of claim 1, wherein the other lock includes a write lock associated with the file; and wherein determining whether the lock conflicts with the other lock comprises determining that the write lock associated with the file conflicts with the read lock included in the set of locks. 4. The method of claim 1, wherein determining whether the lock conflicts with the other lock comprises: accessing a data structure that maps the file to acquired locks, andusing the data structure to determine whether the lock conflicts with the other lock. 5. The method of claim 4, wherein the data structure includes a hash table that maps the file to the acquired locks. 6. A device comprising: one or more processors configured to:acquire a set of locks for performing a first operation associated with a file stored in a memory, the set of locks including a read lock associated with the file that prevents data from being read from the file, and a write lock associated with the file that prevents data from being written to the file;generate a namespace tree that includes a plurality of nodes, each node of the plurality of nodes corresponding to a respective file, and each node having an associated read lock and an associated write lock;determine whether a lock, included in the set of locks, conflicts with another lock included in another set of locks acquired to perform a second operation, including mapping a particular node of the plurality of nodes to the file, and determining whether the lock conflicts with the other lock based on the read lock and the write lock associated with the particular node; and perform the first operation and the second operation, the first operation being performed in parallel with the second operation when the lock does not conflict with the other lock, and the first operation and the second operation being performed in series when the lock conflicts with the other lock. 7. The device of claim 6, wherein to determine whether the lock conflicts with the other lock, the one or more processors are configured to: determine that the other lock includes another write lock associated with the file, anddetermine that the write lock associated with the file conflicts with the other write lock associated with the file. 8. The device of claim 6, wherein the other lock includes a write lock associated with the file; and wherein to determine whether the lock conflicts with the other lock, the one or more processors are configured to determine that the write lock associated with the file conflicts with the read lock included in the set of locks. 9. The device of claim 6, wherein to determine whether the lock conflicts with the other lock, the one or more processors are configured to: access a data structure that maps the file to acquired locks, anduse the data structure to determine whether the lock conflicts with the other lock. 10. The device of claim 9, wherein the data structure includes a hash table that maps the file to the acquired locks. 11. A non-transitory computer readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising: acquiring, by a device, a set of locks for performing a first operation associated with a file stored in a memory, the set of locks including a read lock associated with the file that prevents data from being read from the file, and a write lock associated with the file that prevents data from being written to the file;generating a namespace tree that includes a plurality of nodes, each node of the plurality of nodes corresponding to a respective file, and each node having an associated read lock and an associated write lock;determining, by the device, whether a lock, included in the set of locks, conflicts with another lock included in another set of locks acquired to perform a second operation, including mapping a particular node of the plurality of nodes to the file, and determining whether the lock conflicts with the other lock based on the read lock and the write lock associated with the particular node; andperforming, by the device, the first operation and the second operation, the first operation being performed in parallel with the second operation when the lock does not conflict with the other lock, and the first operation and the second operation being performed in series when the lock conflicts with the other lock. 12. The computer readable medium of claim 11, wherein determining whether the lock conflicts with the other lock comprises: determining that the other lock includes another write lock associated with the file, anddetermining that the write lock associated with the file conflicts with the other write lock associated with the file. 13. The computer readable medium of claim 11, wherein the other lock includes a write lock associated with the file; and wherein determining whether the lock conflicts with the other lock comprises determining that the write lock associated with the file conflicts with the read lock included in the set of locks. 14. The computer readable medium of claim 11, wherein determining whether the lock conflicts with the other lock comprises: accessing a data structure that maps the file to acquired locks, andusing the data structure to determine whether the lock conflicts with the other lock. 15. The computer readable medium of claim 14, wherein the data structure includes a hash table that maps the file to the acquired locks.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (47)
Souder Benny ; Doo Lip Boon ; Downing Alan, Configurable conflict resolution in a computer implemented distributed database.
Ulrich, Thomas R.; Schweitzer, James R.; Bolstad, Gregory D.; Randall, Jay G.; Staub, John R.; Priester, George W.; Barry, David H.; Olsen, Leonard D.; Lam, Danny; Godshalk, Jr., Ronald K., Data engine with metadata processor.
Nishizawa,Itaru; Fujiwara,Shinji; Ushijima,Kazutomo; Inohara,Shigekazu, Data warehouse system and query processing method used in the system, and data collecting method and apparatus for the method, and charging method and apparatus in the system.
Akizawa Mitsuru (Hachioji JPX) Yamashita Hirofumi (Yokohama JPX) Kawaguchi Hisamitsu (Sagamihara JPX) Tada Katsumi (Yokohama JPX) Kato Kanji (Yokohama JPX) Kito Akira (Ebina JPX) Yamada Hidenori (Had, File server system and file access control method of the same.
Xiaoye Jiang ; Uresh K. Vahalia ; Uday Gupta ; Percy Tzelnic, File server system using connection-oriented protocol and sharing data sets among data movers.
Xu Yikang ; Vahalia Uresh K. ; Jiang Xiaoye ; Gupta Uday ; Tzelnic Percy, File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems.
Steven R. Soltis ; Matthew T. O'Keefe ; Thomas M. Ruwart ; Gerald A. Houlder ; James A. Coomes ; Michael H. Miller ; Edward A. Soltis ; Raymond W. Gilson ; Kenneth W. Preslan, Global file system and data storage device locks.
Wallach Walter A. ; Findlay Bruce ; Pellicer Thomas J. ; Chrabaszcz Michael, Method for providing a fault tolerant network using distributed server processes to remap clustered network resources to other servers during server failure.
Lacapra, Francesco; Steele, Peter Wallace; Sartirana, Bruno; Hua, Ernest Ying Sue; Lin, I Chung Joseph; Li, Samuel Sui-Lun; Diller, Nathanael John; Ramsdell, Thomas Reynold; Nguyen, Don; Tran, Kyle Dinh, Peer-to-peer redundant file server system and methods.
Grosner, George; Hall, Howard; Crowell, Erick; Virball, Glenn; Parenti, Mark; Wood, Douglas, Switching system for managing storage in digital networks.
Ferrari, Stephen; Stronge, William; Cochrane, Christopher; Hall, Howard; Merhar, Milan, Switching systems and methods for storage management in digital networks.
Shaheen Amal A. (Austin TX) Yellepeddy Krishna K. (Austin TX), System and method for maintaining replicated data coherency in a data processing system.
Henson Larry W. (Austin) Shaheen-Gouda Amal A. (Austin) Smith Todd A. (Austin TX), System for file and record locking between nodes in a distributed data processing environment maintaining one copy of ea.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.