CN101043519B - Network storage system - Google Patents

Network storage system Download PDF

Info

Publication number
CN101043519B
CN101043519B CN2006100654947A CN200610065494A CN101043519B CN 101043519 B CN101043519 B CN 101043519B CN 2006100654947 A CN2006100654947 A CN 2006100654947A CN 200610065494 A CN200610065494 A CN 200610065494A CN 101043519 B CN101043519 B CN 101043519B
Authority
CN
China
Prior art keywords
client
server
data
user
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006100654947A
Other languages
Chinese (zh)
Other versions
CN101043519A (en
Inventor
汤淼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2006100654947A priority Critical patent/CN101043519B/en
Publication of CN101043519A publication Critical patent/CN101043519A/en
Application granted granted Critical
Publication of CN101043519B publication Critical patent/CN101043519B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The related network storage system comprises: some clients, and a server including memory for storing resource data for every client. Wherein, when transmitting data to another, the client sends a piece of command to the server, the latter copies the objective data according to the command to add in the data memory for another client, and the latter accesses the memory to obtain data through the server. This invention is independent to network speed.

Description

Network store system
Technical field
The present invention relates to a kind of network store system, relate in particular to a kind of network store system that network speed just can be realized data mass memory and management that do not rely on.
Background technology
At present, along with the development and the communication between the people of the network informationization are more and more convenient, developed the means of many data information exchange, the especially birth of MSN, QQ and Email etc. makes the interchange between the people reach unprecedented facility and quick.But the means of this many information transmission still have many not convenient property, can't compatibility between strong as: transmission speed, as can't to solve mass file (as video file, flood tide software etc.) strange land quick exchange, each platform etc. to the dependence of network practical problem.The puzzlement of these difficult points just, people can't fully enjoy freeing of bringing cybertimes, also must be limited by the confinement of conventional art.
Summary of the invention
Based on to above-mentioned all multifactor thinkings, the present invention is from the flow process of information stores exchange, and a kind of mode of brand-new storage data is provided, and changed the distributed information storage of legacy network exchanges data, the mode of point-to-point exchange.
The invention provides a kind of network store system, comprise client, work dispenser and cluster server, this work dispenser is used to handle the sharing out the work of request of client, for described client is selected a server in the described cluster server; Each server in this cluster server includes: the memory block of corresponding each client, and this memory block is used to store the resource data of each client; When one of them client need be to another client transmissions data, this client was sent an instruction by the server of described work dispenser in described cluster server; Described server duplicates the data of this client needs transmission according to described instruction and adds in the data storage area of corresponding another client; Another client is obtained data by the server access memory block; When client is revised data, if the employed operation of the described modification of record, the size of the journal file of the information of the position that modification takes place and the content of modification surpasses a threshold values, then adopt the mode of all duplicating that amended whole file transfer is covered original file to described server, otherwise, this journal file is transferred to described server, and described server adopts the mode of incremental replication to revise data according to described journal file.
Use technical scheme of the present invention; people have been broken away to carry mass data; the speed of dependency network can not finished the exchange transmission of high amount of traffic; and finish compatibility between multi-platform; all kinds of mobile clients all can conduct interviews and operate database, and can realize effects such as data disaster tolerance protection.
Description of drawings
Figure 1 shows that integral frame figure according to network store system of the present invention;
Figure 2 shows that existing internet short message gateway networking structure used in the present invention;
Figure 3 shows that the key modules structure chart that network store system according to the present invention is related;
Figure 4 shows that the tabulation of rights management according to an embodiment of the invention.
Embodiment
The framework of network store system integral body of the present invention as shown in Figure 1, it mainly is made up of several major parts of client, authentication module, work dispenser, server group and disk matrix.Below will describe the improvements of system of the present invention respectively in detail with respect to existing network system.
Client
In order to be applicable to various environment, network store system of the present invention has customized various client-side program, therefore can comprise desktop computer client and mobile client.
At desktop computer client category, need fully take into account the privacy problem, therefore will develop the common customer end that is applicable to private computer respectively and based on the client (there is not privacy concern in the former) of portable example, in hardware.
The common customer end of private computer can fictionalize a hard disk of representing remote directory on computers, carry out between user and the native system data interaction (visit teledata, upload or data download etc.) only need carry out simple Windows operation just can, all communications, details such as synchronous all keep transparent to the user;
Client based on portable example, in hardware then is in order to solve the problem of secure access teledata on common computer; client-side program can embed in the hardware that is encapsulated in a portable example, in hardware fully; when hardware device is connected with computer; the driving formula of this hardware can at first be called identification authenticate user's identity; after by checking; automatically start native system; all operation complete closed operations; all document storage also all are limited in the memory space that hardware itself carried; the user can take away this hardware device when leaving; can not cause leaking of secret or individual privacy information; and by identification mechanism such as password or fingerprint recognition, personal information more can adequately protect.
For example, client-side program can be stored in user's oneself the USB flash disk fully, only USB flash disk need be inserted the USB interface of common computer during use, client-side program is Connection Service device automatically just, synchronous remote directory and local USB flash disk directory information, simultaneously, when not existing network to connect, the user also can directly carry out off-line operation to the information in the USB flash disk, and carries out remote synchronization automatically after network connects upward.
In addition, native system also provides a kind of client based on browser, makes the user use storage system of the present invention on the computer of any connection internet.
At the mobile client category, native system will be developed corresponding client for the handheld device of present main flow, comprise the WinCE client of Microsoft, the Brew client of high pass, the Symbian client of Nokia, the linuxn client of Motorola, also have other exploitation, will determine according to actual conditions such as Palm and Sony-Erricson client.
For the desktop computer client, storage system of the present invention is at first installed a common application program in above-mentioned various clients, fictionalizes a local folders, and this document presss from both sides as local data base of the present invention;
Setting of acquiescence in this document folder then: promptly realize automatic storage and renewal to file in the local file of client and this database by virtual folder.That is to say: the client only needs by normal computed mode when being stored in file in this document folder and editing, use and storing, need not operate separately, can automatically the respective document of local and database be finished storage update automatically, automatically the speed of monitoring network simultaneously, Automatic Optimal selects iptimum speed to finish the upload service of document.
The user is provided with the character of file in the database as required voluntarily: as read-only setting, share being provided with etc. fully, be convenient to the exchanges data between the different user in database.For the registered user, exchanges data between the different user just is equivalent to the exchanges data in local hard drive, extremely convenient quick, can not be limited by the restriction of the network bandwidth, even because the most original dialling up on the telephone, the file address and the title that only send several bytes also are to operate very rapidly.
The user also can directly be sent to document the service provider place, finish the preservation update service of local data base by service provider, and, realize the exchange (the various places channel service provider by service provider transmits mass data files for the client) of teledata by the channel network of service provider.
The user can use all kinds of secret means and by realizing the safe transmission of data with service provider signatory mode.Simultaneously, system of the present invention also can subscribe to the agreement with insurance company, guarantees the compensation issue of customer data loss.The user can give service provider with all kinds of portable mass-memory units (storage mediums such as portable hard drive, CD, tape), finishes the storage update of local data.Service provider's self-building has the various places services channels, by the jumbo bandwidth for transmission data of telecom operators, pays local client then.
For mobile client, storage system of the present invention is used the SMS platform mode, and is perhaps embedded, download type, and customization modes etc. can be operated the user to database.
The user is provided with unique identification id number (available cell phone number is ID number) at database, sends note to database service merchant's SMS platform by G net or C Netcom letter platform, carries out above-mentioned corresponding document function function.The internet short message gateway networking structure as shown in Figure 2, wherein we need prepare sms center according to the design of unified network management interface, connect and the SMPP agreement sends short message by the special line of renting from operator.
Wherein, ISMG: internet short message gateway, DSMP: Service Provisioning Administration Core Environment, SMPP: Short Message Peer to Peer,
Can also use the WAP mode to operate, because it be the 3G application model, and the application of the 3G mobile in future, the network bandwidth no longer is a bottleneck, thus with the operation basically identical of fixed platform.
Mobile phone users also can use the software of customization to realize above-mentioned functions, and its mode can be embedded, pre-installation, online download etc.Then need to cooperate for embedded mode with portable terminal manufacturer or OEM vendor, programme at different embedded devices, then need programme at different operating system with online downloading mode for pre-installation, operating system can be WIN CE, Symbian, Linux or other.Mobile communication technology is for providing the wireless telecommunications channel of bottom between mobile client and the server end, in order to adapt to the continuous development of this art, different mechanicss of communication will be packaged into the form of plug-in unit, keep independent each other, and provide unified interface to the software code on upper strata, the user can both can by the communication modes that menu is selected to be fit to current device and situation, for emerging communication modes, only need the exploitation corresponding insert, and be integrated in the software of next edition and get final product.
In summary it can be seen, the present invention has realized the integration of desktop computer client and mobile client, promptly corresponding intelligent family moving platform is carried out cross-platform integration, use WEB SERVER technology and JAVA to realize that the exploitation of the integration of different mobile platforms and all kinds of business is (based on BREW, Symbian, PocketPC etc.), with fixed platform and the complete fusion of mobile platform, be convenient to the client carry out many means the most easily mode finish the corresponding business activity.
Server end
For improving the throughput and the reliability of native system, we are designed to the cluster server pattern with server end.And reliable disk matrix provides the network storage space of high-quality cheapness for the user.
Communications protocol
Communications protocol guarantees the reliable and stable of client and server end information interaction.Bring in for the common customer end in the desktop computer client and USB flash disk client and to say, traditional ICP/IP protocol can fully guarantee the quality of communication, and for browser client, http protocol also can be accomplished high-quality message communication, just needs Web server of configuration the HTTP request to be converted to the TCP/IP request of our systematic unity;
But, bring in for mobile client and to say, because wireless network exists unsteadiness and blind area, we need design the proprietary protocol that a cover fully ensures the wireless telecommunications reliability, at the client and server end corresponding module is arranged all respectively, and the server end module can with we proprietary protocol and ICP/IP protocol between change.
In wireless proprietary protocol part, we need take into full account reliability and combine with high efficiency, and decision retransmits self adaptation with two technology of big data cutting and incorporates agreement.
Self adaptation retransmits: each data block can be endowed the label of a uniqueness before transmission, this numbering can adopt simple counter to obtain, give the timer that also has of this data block simultaneously, then data block is sent out toward the destination, if message goes out active, promptly in the timer official hour, do not receive the affirmation message of beaming back the destination, then resend data block, be last time 2 times of setting-up time simultaneously with the time set of timer, here different with traditional Transmission Control Protocol, each time interval of adopting of the timer that Transmission Control Protocol uses is invariable, and our timer can constantly increase along with the increase of number of retries, under wireless environment, network problem except being because be similar to arbitrarily losing on the cable network (Random Drop), also may be because many factors nonvoluntary, as network coverage stain, enter underground or elevator etc., under these situations nonvoluntary, T immediately recovers the network connection in the time period possibility is not balanced just, therefore we need not to adopt balanced retry interval, and adopt adaptive incremental retry mode can save calculation resources on the mobile device more;
On the other hand, for big data block, considering once that transmission has highlyer transmission problem may occur, we can be divided into fritter and transmit, specifically, when data block during greater than a certain threshold values S, we can be divided into it some little data blocks, every volume is for being s (s≤S), certainly the volume of last fritter might be less than s, each fritter can add a data head, indicates its position on original big data block, and we just can be at receiving terminal according to numbering again with its recovery like this.
In addition, unlike cable network, it is very big that the network speed of wireless network rises and falls, so we can not conclude real network speed by detecting current network speed, might current network speed be peak value, also may be valley.In our system, we often need come operation is judged that for example intelligent synchronization, intelligence are looked ahead etc. by understanding current real network speed.Our design is to use the current network speed of the periodic collection of an independent thread, and current real network speed is that all gathered the weighted average of network speeds in the past, is shown below.
B avg ( t i ) = W × B ( t i ) + ( 1 - W ) × B avg ( t i - 1 ) i > 0 B ( t i ) i = 0
Bavg (ti): be illustrated in ti true network speed constantly
B (ti): be illustrated in the network speed that ti detects constantly
W: weights (0<W<1), concrete numerical value can determine according to actual conditions
Whether all right Auto-Sensing network connection state of system and mode can connect according to network voluntarily, when transmission interrupts recovering the network connection, recover Network Transmission automatically.Whether system can connect by the Auto-Sensing network, in the network disconnection, and the data that automatic buffer memory bust this Buddhist monk is not transmitted, and when network recovery connects, automatically data in buffer is sent.(be not very clear the definite ins and outs that need interpolation, explain how to accomplish just that automatic monitoring network connects if desired, method is different, can't describe one by one, different language provides different modes, different operating system also provides different modes, if Embedded words, software can also obtain network state information by direct monitoring network hardware)
The work dispenser
Consider the users that system of the present invention is potential, server end is designed to the form of cluster, and user's request will be assigned in the cluster server uniformly, to reach load balance.
Therefore need a work dispenser to be responsible for sharing out the work of process user request, simultaneously in order to prevent the attack of some malice, for example common ddos attack, before real granting task was to the concrete server, we also can at first utilize authentication module to verify user's legitimacy.
The basic framework of more than having showed native system, the user can send request to local data base in various clients, after user's request is by the work dispenser, subscription client has just been obtained with concrete server and has been connected, and will describe the related key modules of interoperability between client and the server end in detail below with reference to accompanying drawing 3.
We can see from Fig. 3, keep being connected by reliable communication module with server end in bottom client, on this, security module is the passage that a safety has been opened up in communication, and this two is laminated together to the upper strata a safe and reliable communication platform is provided.
Toward last layer, native system comprises for the client and server end correspondingly provides three kinds of intelligence services: intelligent buffer, intelligence are looked ahead and intelligent synchronization successively.These three kinds of services are because what file they can oneself determine need buffer memory, what informational needs to look ahead, when need synchronously by the name titled with " intelligence ", and the use that can not go to bother the user.
Intelligent buffer is from improving service efficiency, and file or information data that the user is often used are buffered in client, and the user just can obtain them apace when using next time like this, and does not need to wait for network download; According to user's use habit, the file cache that user's frequency of utilization is the highest is in client.Technologically speaking, the frequency of utilization of dosage file can have a lot of methods, complicated having simply arranged, but in order to make client-side program keep light weight, adopt LRU (the Least Recently Used) algorithm that generally uses to get final product, and on performance, this algorithm does not have too big performance to cut down than other complicated algorithm yet.
Intelligence is looked ahead and is conceived to off-line operation, file or information that the user may need is in the near future downloaded in advance, even if also can not influence user's use like this in network disconnection at following a moment; File according to judging that the user will use downloads to local folders with it in advance.Judge which file user will be the very difficult thing of part using in the recent period, can judge by complicated fuzzy mathematics theory and neural network algorithm, and we determine to adopt comparatively simple Cluster algorithm in the realization.The core concept of this algorithm is to judge the use habit of user to file; for instance; the user is for report; usually also need to open some reference documents relevant with this report; if we can be divided into one group with these documents automatically; so each we open any one document in this group, and we judge very possible user other document in also can needing to organize, and so it can be taken off in advance.The Cluster algorithm need make up the data structure of a figure, each file of each vertex representation of figure, sequencing when each bar limit log file uses, if one the limit is to point to file B from file A, illustrate that then once the user has used file B at once after having used file A, simultaneously, we also can note the frequency of utilization on this limit on every limit, used file B such as 4 users again after having used file A, we note 4 these frequency informations at this A to the limit of B so at once.When the user has opened a file C, the Cluster algorithm on backstage begins to analyze constructed figure automatically so, is the center of circle with C, R is a radius, all frequencies of utilization all are the files that the user probably will use greater than the limit of F file pointed, and we can completely take off them in advance.Two parameters R here and F can determine its size when the time comes.
Intelligent synchronization then is to be consistent for the data that make client and server end, in order to avoid make the mistake.
The user is after client has been revised file, and our system will be synchronized to remote server on the backstage with modification automatically.As a rule there is the dual mode can be synchronous, the one, whole file all is sent to server covers original file, the 2nd, only the information of revising is sent to the mode that server adopts incremental replication.As for which kind of mode of employing, need to consider two factors, the one, volume of transmitted data, the 2nd, the expense of server end, these two factors are all relevant with the amount of information size of revising.In the user's modification file, we can note the employed operation of each modification (be increase be to delete), revise the position that takes place, and the content of revising, and these information can be deposited a LOG file.When system's decision wants synchronous, at first judge the size of LOG file, if file size surpasses a certain threshold values, then only amended file transfer is covered original file to server, otherwise, this LOG file is passed to server end, this LOG file modification original of server playback.
Be the base directory operational module toward last layer more successively, comprise opening in the conventional art, delete, shear, duplicate, the operation of stickup, rename, attribute etc.
The attribute setting of file: the attribute setting of file comprises two aspects, one, the user can be provided with the access limit of file, its two, the user be provided with different access limits can for different users or user's group.For example, the user can organize the B read-only authority for file A sets the user, and the complete Share Permissions of user C.Concrete implementation can be passed through at three tables of database maintenance, and one is user's list of friends, and one is the Groups List that the user creates, and also having one is the permissions list of file, as shown in Figure 4.By these tables, we can judge easily which file content can be presented to which user/group and be used.
Then one deck is the management to authority, a certain group or certain group member's Share Permissions can be set for any catalogue by this module user, do not comprise and to share, read-onlyly share, write shared etc. that and the management by this authority reaches the mapping relations with the lower directory operation.
For instance, user A is provided with all members of group B content under can read-only catalogue C, the member b of group B just can see the share directory C of user A like this, but owing to be read-only sharing, the directory operation of mapping only be open, read-only operation such as attribute, other deletion, shear, duplicate, operation such as stickup, rename then can't carry out, all the implementation method with prior art is consistent for these, gives unnecessary details no longer one by one.
Up be a series of application that native system provided again, comprise data bank, data sharing, Email, information trading, Data Processing, these are used by unified and are encapsulated in the client-side program, and other is used also and can add successively on this framework certainly.
At server end, except have with the corresponding server end module of client, also comprised four administration modules in addition, i.e. session management module, log management module, user management module and application management module.
Session management is responsible for monitoring the active situation of all login users, and distributes necessary resource with auxiliary every request, and when the user published system, this module can discharge related resource, to improve the utilance of system;
Log management is responsible for writing down all Client-initiated requests and other relevant information;
Registration of user management process user and leading subscriber authority etc., for example, different users can apply for space and different application kinds according to demand.Corresponding service and administration authority are also different.
The various application that the application management charge management server is provided, some is used may be owing to there be market to need to unload, and new application also can be deployed on the server by it.At last, comprehensive management platform provides an approach that can make things convenient for management server for the system manager.
Describe the miscellaneous service that native system provides for the user below in detail.
(1) data bank business
Data bank refers to the most basic network storage service, and the user can manage the network storage of oneself, uploads, file in download.
With other most network storage supplier's difference be the service that system of the present invention provides permanent preservation, promptly when the user does not propose the request of file deletion, system can forever automatically preserve, and only system just can be with those file deletions after the request of receiving.
The operating process of this application is as follows, now lifts file and uploads and be example, and the operating process of other data is similar, will not give unnecessary details.
At first, the user copies to the network storage in the catalogue of this locality mapping with local file A, client-side program detects this action (operational order), at first check rights management, because this is the Client-initiated action, be similar to administrator right the highest in the operating system, so rights management is passed through;
Then this operational order is translated into execution command by the base directory operational module of client, and client call security module and reliable communicating module wherein sends to server end with this operational order simultaneously;
At server end, user management module at first is called checks whether the user also has enough storage areas, if the space is enough, will call base directory operational module execution command, adds file A to corresponding disk space.
(2) data sharing
Certain file that data sharing refers to user oneself is set to share, and opens Share Permissions to a certain group or certain group member, and the group or the group member that are allowed to like this share just can be pressed from both sides with interior operation this document in extent of competence.
The operating process of this application is as follows.
At first user A opens read-only sharing by the file B that interface setting is stored in its disk space that distributes to all users of group C, this instructs server end, the authority management module of server end is read-only with all members among the update group C to the authority that reads of file B, can see the file B of user A after the user of any group of C login afterwards, and read any file wherein.
Email
The file copy function that Email refers to by native system realizes substituting that the conditional electronic mail transmits, certainly prerequisite is that the other side also must be the registered user of native system, as for the other side is non-native system user's situation, and we still can send mail by the conditional electronic mail server of extra setting.
Communication two party is described below is the operating process situation of supporting the native system user.
Authority management module and the basic operation module of e-mail module by calling bottom, for each user who has registered E-mail service distributes necessary email storage space, and be divided into different files, comprise inbox, outbox, spam etc.
In fact each envelope Email is exactly a document that is encoded into the XML form; The transmission of mail then is the outbox from the originator, and the inbox that relevant XML mail document is copied to receiver gets final product.
User A is when user B send Email, and user A can send an envelope mail by the e-mail module on its client to user B, and this transmission interface and conditional electronic mail are similar;
At this moment, the e-mail module in the server at first can be encoded into this Email an XML document, and leaves under " outbox folder " catalogue of user A, and this and traditional e-mail function are similar;
Then, e-mail module in the server can be called the operation that authority management module carries out document sharing, promptly user B is realized sharing, the document will be copied under " Inbox " catalogue of user B then, here user B can reach the function of filtrating mail by the Share Permissions of the setting of the authority management module on its client Inbox, mask the authority of certain user to this catalogue copy operation, if user A has the authority to user B inbox write operation, be that authority management module has been passed through in copy operation, then copy operation is finished in the instruction that can call the document copying in the base directory operational module, otherwise, e-mail module generates the mail that failure is sent in a seal automatically, be encoded into XML document, copy to the inbox of oneself;
User B checks the mail of oneself receiving, only need by the e-mail module on it by clicking Email in the inbox with the similar interface of traditional Email, e-mail module in the server this XML document of will decoding, and show this new mail to user B by traditional e-mail interface of user B.
(3) information trading business
Information trading refers between user and the user a kind of information interaction function of (B2C) between (C2C), user and the trade company, and for example, we can set up the web advertisement service of e-commerce and the B2C of C2C on this basis.
Make description with regard to the information trading of these two kinds of forms respectively below.
The C2C e-commerce:
The Item Information that the editing machine editor that the user provides by application will sell, can comprise various medium such as literal, figure, video recording, in the time of user's click on submission button, all these information are saved into a html document, and be kept in the vending articles catalogue of oneself, the portion of the document copy is copied under the public trade catalogue simultaneously;
Another user need inquire about a certain commodity, search engine is the needed commodity of search subscriber under public directory, and result's (a series of qualified html document) copied in user's the temporary folder, user interface just can show the user one by one with the result like this.
The B2C web advertisement:
At first user (Subscriber) need to register the information type that I am paid close attention to, and such as clothes class information etc., this user's operation is translated into writing of open my web advertisement catalogue of clothes class group shared;
After this, any trade company (Publisher) that is under the jurisdiction of clothes class group can copy to advertising message (html document) under registered user's the web advertisement catalogue.On the other hand, if when the user no longer needs to subscribe to certain class information, just system only need cancel relevant group can to the shared ability of web advertisement catalogue.
(4) Data Processing business
Data Processing refers to the remote switch by the civilian India and China heart, realizes services such as remote printing processing, imprinting, developing and printing, format conversion, killing virus, backup, and realizes home-confined EMS function.This application can be regarded as the distortion of e-mail applications in fact, promptly be transformed into information transmission between the user and the civilian India and China heart by original user and the information transmission between the user, data to be processed then is the form appearance with e-mail attachment, therefore, except the difference of interface, operating process and Email are similar.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (13)

1. a network store system comprises client, work dispenser and cluster server,
This work dispenser is used to handle the sharing out the work of request of client, for described client is selected a server in the described cluster server;
Each server in this cluster server includes: the memory block of corresponding each client, and this memory block is used to store the resource data of each client;
When one of them client need be to another client transmissions data, this client was sent an instruction by the server of described work dispenser in described cluster server;
Described server duplicates the data of this client needs transmission according to described instruction and adds in the data storage area of corresponding another client;
Another client is obtained data by the server access memory block;
When client is revised data, if the employed operation of the described modification of record, the size of the journal file of the information of the position that modification takes place and the content of modification surpasses a threshold values, then adopt the mode of all duplicating that amended whole file transfer is covered original file to described server, otherwise, this journal file is transferred to described server, and described server adopts the mode of incremental replication to revise data according to described journal file.
2. system according to claim 1 is characterized in that:
Described memory block can permanent storage data also can temporary storaging data.
3. system according to claim 1 is characterized in that:
Described client is a mobile client.
4. system according to claim 3 is characterized in that:
Described mobile client sends instruction by SMS platform to server.
5. system according to claim 3 is characterized in that:
Retransmit and/or big stripping transmission data by self adaptation between described mobile client and the server.
6. system according to claim 1 is characterized in that:
Described client is the desktop computer client.
7. system according to claim 3 is characterized in that:
Described mobile client is operated the memory block of described server by SMS platform.
8. system according to claim 1 is characterized in that:
Described client can realize remote printing by described server.
9. system according to claim 1 is characterized in that:
Described client can be passed through described server search resource data.
10. system according to claim 1 is characterized in that:
Described client can be carried out data sharing by described server.
11. system according to claim 1 is characterized in that:
Described server can be according to described client-access data frequency metadata cache that frequency is high in client.
12. system according to claim 1 is characterized in that:
Described server can be with client-access data and the data that are associated are divided into a group with this visit data, and during any data, described server can send this group data in advance to client in described client-access should be organized.
13. system according to claim 1 is characterized in that, also comprises:
Authentication module is used for verifying the legitimacy of described client before the instruction of described client sends to server by described work dispenser.
CN2006100654947A 2006-03-21 2006-03-21 Network storage system Expired - Fee Related CN101043519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006100654947A CN101043519B (en) 2006-03-21 2006-03-21 Network storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006100654947A CN101043519B (en) 2006-03-21 2006-03-21 Network storage system

Publications (2)

Publication Number Publication Date
CN101043519A CN101043519A (en) 2007-09-26
CN101043519B true CN101043519B (en) 2011-07-20

Family

ID=38808705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006100654947A Expired - Fee Related CN101043519B (en) 2006-03-21 2006-03-21 Network storage system

Country Status (1)

Country Link
CN (1) CN101043519B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217561B (en) * 2008-01-15 2012-11-28 杭州华三通信技术有限公司 A method to enhance the storage reliability of the network and a network device
US20100211544A1 (en) * 2009-02-19 2010-08-19 Jyshyang Chen System with session synchronization
CN101674331B (en) * 2009-10-21 2012-11-07 成都市华为赛门铁克科技有限公司 Cluster storage system and split brain treatment method thereof
CN101873481A (en) * 2010-03-01 2010-10-27 杭州海康威视数字技术股份有限公司 Method and system for playing back videos in video monitoring system and network monitoring client side
CN102411501A (en) * 2011-08-12 2012-04-11 马涛 Browser/server (B/S)-structure-software-system-based flexible communication customization system and method
CN102306165A (en) * 2011-08-22 2012-01-04 哈尔滨工程大学 Ship electronic chart data multi-platform shared service device and construction method thereof
KR101943988B1 (en) 2012-07-27 2019-01-31 삼성전자주식회사 Method and system for transmitting content, apparatus and computer readable recording medium thereof
CN103580989B (en) * 2012-07-31 2018-07-24 腾讯科技(深圳)有限公司 Junk mail processing method and system
CN103002445A (en) * 2012-11-08 2013-03-27 张维加 Safe mobile electronic equipment for providing application services
CN103281192B (en) * 2013-05-31 2015-07-15 腾讯科技(深圳)有限公司 Method, device and system for retrieving data
US20150100531A1 (en) * 2013-10-09 2015-04-09 Qualcomm Incorporated Method and apparatus to control and monitor neural model execution remotely
CN103916693B (en) * 2014-04-02 2018-06-08 深圳市瑞驰信息技术有限公司 The method and its device of a kind of reserved storage space
CN104009847A (en) * 2014-05-14 2014-08-27 国家电网公司 Big data storage integrity verification method based on lattices
CN104811446A (en) * 2015-04-18 2015-07-29 湖南涉外经济学院 Novel network safety protection system
CN106547746B (en) * 2015-09-16 2021-03-30 北京国双科技有限公司 Data sending method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1371230A (en) * 2001-02-15 2002-09-25 日本电气株式会社 Mobile station and communication system
US6499058B1 (en) * 1999-09-09 2002-12-24 Motokazu Hozumi File shared apparatus and its method file processing apparatus and its method recording medium in which file shared program is recorded and recording medium in which file processing program is recorded
JP2004110290A (en) * 2002-09-17 2004-04-08 Sony Corp Data storage system
CN1581188A (en) * 2004-05-18 2005-02-16 中兴通讯股份有限公司 Storage managment method and system for large capacity electronic mail
CN1735077A (en) * 2004-08-12 2006-02-15 上海华为技术有限公司 Group mail-sending processing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6499058B1 (en) * 1999-09-09 2002-12-24 Motokazu Hozumi File shared apparatus and its method file processing apparatus and its method recording medium in which file shared program is recorded and recording medium in which file processing program is recorded
CN1371230A (en) * 2001-02-15 2002-09-25 日本电气株式会社 Mobile station and communication system
JP2004110290A (en) * 2002-09-17 2004-04-08 Sony Corp Data storage system
CN1581188A (en) * 2004-05-18 2005-02-16 中兴通讯股份有限公司 Storage managment method and system for large capacity electronic mail
CN1735077A (en) * 2004-08-12 2006-02-15 上海华为技术有限公司 Group mail-sending processing method

Also Published As

Publication number Publication date
CN101043519A (en) 2007-09-26

Similar Documents

Publication Publication Date Title
CN101043519B (en) Network storage system
CN102193899B (en) System and method for the data of the multiple environment of management spanning
US8260353B2 (en) SIM messaging client
US7233992B1 (en) Computerized method and system for managing the exchange and distribution of confidential documents
CN101622837B (en) Sharing of media using contact data
CN101400060B (en) A method and devices for providing secure data backup from a mobile communication device to an external computing device
TW400487B (en) Electronic document delivery system
CN100566311C (en) The system and method for provisioning component applications
CN101132459A (en) Method for computer remote control by mobile phone
CN103916296B (en) A kind of communication system for merging LAN
EP1804418A1 (en) A dynamic password authentication system and the method thereof
CN1280689A (en) Business card agent and applications
CN101472236A (en) Method and device for publishing application system
CN103647784B (en) A kind of method and apparatus of public and private isolation
AU2005299577A1 (en) A method and apparatus for management of data on handheld
CN102664871A (en) Method for processing intelligent terminal address list
CN103873540B (en) The remote storage system and its design method of a kind of low energy consumption
CN101083537A (en) Method, apparatus and system for realizing device management
CN101204039A (en) System and method of device-to-server registration
CA2510116A1 (en) Distributed content management system
CN105791399B (en) More trunk interconnection net big data method for pushing and system
WO2006066257A2 (en) Management of network devices via email
CN100505711C (en) System and method for managing communication for component applications
CN104424340B (en) Social networking application information processing method, apparatus and system
Gadol et al. Nomadic Tenets: A User's Perspective

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110720

Termination date: 20180321