CN107920101A - A kind of file access method, device, system and electronic equipment - Google Patents

A kind of file access method, device, system and electronic equipment Download PDF

Info

Publication number
CN107920101A
CN107920101A CN201610884604.6A CN201610884604A CN107920101A CN 107920101 A CN107920101 A CN 107920101A CN 201610884604 A CN201610884604 A CN 201610884604A CN 107920101 A CN107920101 A CN 107920101A
Authority
CN
China
Prior art keywords
file
visited
proxy server
client
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610884604.6A
Other languages
Chinese (zh)
Other versions
CN107920101B (en
Inventor
刘金鑫
董乘宇
朱家稷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610884604.6A priority Critical patent/CN107920101B/en
Publication of CN107920101A publication Critical patent/CN107920101A/en
Application granted granted Critical
Publication of CN107920101B publication Critical patent/CN107920101B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1824Distributed file systems implemented using Network-attached Storage [NAS] architecture
    • G06F16/183Provision of network file services by network file servers, e.g. by using NFS, CIFS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)

Abstract

A kind of file access method, device, system and electronic equipment;The file access method to contain at least one central server, at least one client, the system of multiple proxy servers, including:Client obtains the information of multiple proxy servers from central server;The client determines the corresponding proxy server of the file to be visited according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server;The client sends the access request for the file to be visited to the corresponding proxy server of file to be visited.The application can reduce the pressure of central server, improve the access efficiency of distributed memory system.

Description

A kind of file access method, device, system and electronic equipment
Technical field
The present invention relates to network field, more particularly to a kind of file access method, device, system and electronic equipment.
Background technology
As the infrastructure of an Internet firm or software company, large-scale distributed storage system is various Application layer service provide storage service.
A kind of system that file access is carried out to distributed memory system based on agency is as shown in Figure 1, it will usually has more A reciprocity agency provides service, and the client in Fig. 1 is the client-side program of end user;Proxy server is divided by calling The sdk software development kits (Software Development Kit, sdk) that cloth storage system provides access distributed storage System, by characterizing state transfer (REpresentational State Transfer, REST) application programming interface (Application Programming Interface, API) provides agency service to client;Central server is distribution Formula storage system provides metadata management, Route Selection, selects the functions such as proxy server for client.
When client needs to read or write data, one proxy server of distribution first is asked to central server, is then passed through Proxy server carries out read or write;Will be first genuinely convinced with during this processing method requirement client progress read or write Business device interaction, this can cause central server very big access pressure, and the access delay of client can be caused significantly to increase Greatly, this method can not provide efficient distributed storage service.
The content of the invention
The one side of the application, there is provided a kind of file access method, device, system and electronic equipment, in can reducing The pressure of central server, improves the access efficiency of distributed memory system.
The application adopts the following technical scheme that.
A kind of file access method, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, including:
Client obtains the information of multiple proxy servers from central server;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, Determine the corresponding proxy server of the file to be visited;
The access that the client is sent for the file to be visited to the corresponding proxy server of file to be visited please Ask.
Alternatively, the client obtains the information of multiple proxy servers from central server and includes:
Client initiates operation of reaching the standard grade to central server, and the information of multiple proxy servers is received from central server.
Alternatively, the information of the multiple proxy server is stored in proxy server list;The client according to The information of the title of file to be visited, pre-defined rule and the multiple proxy server, determines that the file to be visited corresponds to Proxy server include:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
Alternatively, the file access method further includes:The client obtains predetermined Hash from central server Function.
Alternatively, the client is according to the title of file to be visited, pre-defined rule and the multiple proxy server Information, further included after determining the corresponding proxy server of the file to be visited:
If detecting the corresponding proxy server failure of file to be visited, the client takes from the multiple agency The information of the proxy server of failure is removed in the information of business device, according to the title of file to be visited, pre-defined rule and is removed The information of remaining proxy server afterwards, redefines the corresponding proxy server of file to be visited.
A kind of file access method, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, including:
Central server determines multiple proxy servers for client;
The information of multiple proxy servers determined by the central server to client transmission.
Alternatively, the central server determines to further include before multiple proxy servers for client:
The central server receives the operation of reaching the standard grade that the client is initiated.
Alternatively, the file access method further includes:
The central server sends predetermined hash function to client;The default hash function is used for described in confession Client determines that an access is described to be visited according to the information of the multiple proxy server, and the title of file to be visited Proxy server used in file.
A kind of file access method, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, including:
Central server determines multiple proxy servers for client, to multiple agencies determined by client transmission The information of server;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, Determine the corresponding proxy server of the file to be visited, send to the corresponding proxy server of file to be visited and treated for described Access the access request of file.
Alternatively, the central server determines to further include before multiple proxy servers for client:
The central server receives the operation of reaching the standard grade that the client is initiated.
Alternatively, the information of the multiple proxy server is stored in proxy server list;
The method further includes:The central server sends predetermined hash function to client;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, Determine that the corresponding proxy server of the file to be visited includes:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
Alternatively, the client is according to the title of file to be visited, pre-defined rule and the multiple proxy server Information, further included after determining the corresponding proxy server of the file to be visited:
If detecting the corresponding proxy server failure of file to be visited, the client takes from the multiple agency The information of the proxy server of failure is removed in the information of business device, according to the title of file to be visited, pre-defined rule and is removed The information of remaining proxy server afterwards, redefines the corresponding proxy server of file to be visited.
Alternatively, the file access method further includes:
Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server Access the operation for writing lock of file;
After the proxy server seizes the writing and lock successfully of the file to be visited, the file to be visited is grasped into row write Make.
A kind of file access device, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, including:
Interactive module, for obtaining the information of multiple proxy servers from central server;
Determining module, the letter for the title according to file to be visited, pre-defined rule and the multiple proxy server Breath, determines the corresponding proxy server of the file to be visited;
Access modules, for sending the access for the file to be visited to the corresponding proxy server of file to be visited Request.
Alternatively, the information of the multiple proxy server is stored in proxy server list;
The determining module is according to the letter of the title of file to be visited, pre-defined rule and the multiple proxy server Breath, determines that the corresponding proxy server of the file to be visited includes:
The determining module carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash Computing as a result, determining the corresponding proxy server of the file to be visited from proxy server list;
The interactive module is additionally operable to obtain predetermined hash function from central server.
Alternatively, the determining module is additionally operable in the title according to file to be visited, pre-defined rule and the multiple The information of proxy server, after determining the corresponding proxy server of the file to be visited, if detecting file pair to be visited The proxy server failure answered, then remove the information of the proxy server of failure from the information of the multiple proxy server, According to the information of remaining proxy server after the title of file to be visited, pre-defined rule and removal, redefine to be visited The corresponding proxy server of file.
A kind of file access device, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, it is characterised in that including:
Selecting module, for determining multiple proxy servers for client;
Transport module, for the client send determined by multiple proxy servers information.
Alternatively, the transport module is additionally operable to send predetermined hash function to client;The default Hash letter Number is used for the information according to the multiple proxy server for the client, and the title of file to be visited determines a visit Ask proxy server used in the file to be visited.
A kind of file access system, including:At least one central server, at least one client, multiple agency services Device;
The central server is used to determine multiple proxy servers for client, to determined by client transmission The information of multiple proxy servers;
The client is used for according to the title of file to be visited, pre-defined rule and the multiple proxy server Information, determines the corresponding proxy server of the file to be visited, to the corresponding proxy server of file to be visited send for The access request of the file to be visited.
Alternatively, the information of the multiple proxy server is stored in proxy server list;
The central server is additionally operable to send predetermined hash function to client;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, Determine that the corresponding proxy server of the file to be visited includes:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
Alternatively, the client is additionally operable to when according to the title of file to be visited, pre-defined rule and the multiple generation The information of server is managed, after determining the corresponding proxy server of the file to be visited, if detecting that file to be visited corresponds to Proxy server failure, then the information of the proxy server of failure, root are removed from the information of the multiple proxy server According to the information of remaining proxy server after the title of file to be visited, pre-defined rule and removal, text to be visited is redefined The corresponding proxy server of part.
Alternatively, proxy server be used for attempt to obtain file to be visited write lock failure after, sent out to central server Act the operation for writing lock for seizing the file to be visited;After seizing the writing and lock successfully of the file to be visited, to described to be visited File carries out write operation.
A kind of electronic equipment for being used to carry out file access, to contain at least one central server, at least one visitor Family end, multiple proxy servers system in, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists When reading execution by the processor, operations described below is performed:
The information of multiple proxy servers is obtained from central server;
According to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, described treat is determined Access the corresponding proxy server of file;
The access request for the file to be visited is sent to the corresponding proxy server of file to be visited.
A kind of electronic equipment for being used to carry out file access, to contain at least one central server, at least one visitor Family end, multiple proxy servers system in, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists When reading execution by the processor, operations described below is performed:
Multiple proxy servers are determined for client;
To the information of multiple proxy servers determined by client transmission.
Further aspect of the application, there is provided a kind of file access method, device and electronic equipment, when to some text After part carries out the proxy server failure of write operation, this document can be occupied by other proxy servers writes lock, so as to complete The write operation of this document.
The application adopts the following technical scheme that.
A kind of file access method, to contain at least one central server, multiple proxy servers system in, bag Include:
Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server Access the operation for writing lock of file;
After the proxy server seizes the writing and lock successfully of the file to be visited, the file to be visited is grasped into row write Make.
A kind of file access device, to contain at least one central server, multiple proxy servers system in, bag Include:
Initiation module, for attempt to obtain file to be visited write lock failure after, initiate to seize institute to central server State the operation for writing lock of file to be visited;
Operation module, for after the writing and lock successfully of the file to be visited is seized, to the file to be visited into row write Operation.
A kind of electronic equipment for being used to carry out file access, takes to contain at least one central server, multiple agencies It is engaged in the system of device, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists When reading execution by the processor, operations described below is performed:
Attempt to obtain file to be visited write lock failure after, initiate to seize the file to be visited to central server Write the operation of lock;After seizing the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
The application includes advantages below:
In at least one embodiment of the application, client disposably obtains the information of multiple proxy servers, is accessing text Proxy server used in can voluntarily being determined during part, without accessing central server, therefore can reduce center service The pressure of device, reduces access delay, improves access efficiency;Same client be directed to different files to be visited there is a possibility that with Different proxy servers, therefore can concentrate to avoid access of the client to file and be completed by a proxy server.
In a kind of implementation of the embodiment of the present application, once client, which is reached the standard grade, will obtain the letter of multiple proxy servers Breath, without when accessing file whereabouts central server ask, therefore further increase access efficiency.
In a kind of implementation of the embodiment of the present application, when the proxy server originally used fails, Ke Yiji It is continuous to access, without being asked again to central server, therefore it can realize to the fault-tolerant of proxy server so that in base It can also be provided after proxy server failure in the distributed memory system of agency and continue efficient distributed storage service.
In at least one embodiment of the application, after the proxy server that write operation is carried out to some file fails, This document can be occupied by other proxy servers writes lock, so as to complete the write operation of this document.
Certainly, implementing any product of the application must be not necessarily required to reach all the above advantage at the same time.
Brief description of the drawings
Fig. 1 is the configuration diagram for the system that file access is carried out to distributed memory system;
Fig. 2 is a kind of flow chart of file access method of embodiment one;
Fig. 3 is the schematic diagram of the example of embodiment one;
Fig. 4 is a kind of flow chart of file access method of embodiment two;
Fig. 5 is a kind of flow chart of file access method of embodiment three;
Fig. 6 is a kind of flow chart of file access method of example IV;
Fig. 7 is a kind of schematic diagram of file access device of embodiment five;
Fig. 8 is a kind of schematic diagram of file access device of embodiment six;
Fig. 9 is a kind of schematic diagram of file access device of embodiment seven.
Embodiment
The technical solution of the application is described in detail below in conjunction with accompanying drawings and embodiments.
If it should be noted that not conflicting, each feature in the embodiment of the present application and embodiment can be tied mutually Close, within the protection domain of the application.In addition, though logical order is shown in flow charts, but in some situations Under, can be with the steps shown or described are performed in an order that is different from the one herein.
In one configuration, the computing device of client or server may include one or more processors (CPU), defeated Enter/output interface, network interface and memory (memory).
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.Memory may include module 1, module 2 ... ..., module N (N is the integer more than 2).
Computer-readable medium includes permanent and non-permanent, removable and non-movable storage medium, can be by appointing What method or technique realizes that information stores.Information can be computer-readable instruction, data structure, the module of program or other Data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electrically erasable programmable read-only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, disk storage or other magnetic Property storage device or any other non-transmission medium, the information that can be accessed by a computing device available for storage.According to herein Define, computer-readable medium does not include non-temporary computer readable media (transitory media), such as modulation data Signal and carrier wave.
Embodiment one, a kind of file access method, to contain at least one central server, at least one client, In the system of multiple proxy servers, as shown in Fig. 2, including S110~S130:
S110, client obtain the information of multiple proxy servers from central server;
S120, the client are according to the title of file to be visited, pre-defined rule and the multiple proxy server Information, determines the corresponding proxy server of the file to be visited;
S130, the client send the visit for the file to be visited to the corresponding proxy server of file to be visited Ask request.
In the present embodiment, client disposably obtains the information of multiple proxy servers, can be voluntarily when accessing file Proxy server used in determining, without accessing central server, therefore can reduce access delay, improve and access effect Rate;In addition, same client is directed to different files to be visited there is a possibility that with different proxy servers, therefore can keep away Exempt from access of the client to file to concentrate by a proxy server completion.
It is described to include at least one central server, at least one client, multiple proxy servers in the present embodiment System can be, but not limited to be used to carry out file access to distributed memory system.The proxy server can be, but not limited to lead to The file in sdk access distributed memory systems is crossed, agency service is provided to client by REST API.
In the present embodiment, the access to file can include reading or writing, and correspondingly, access request includes reading or writing request. In the present embodiment, client determines corresponding proxy server when accessing some file for the first time, as long as the agency takes afterwards Business device occurs without the situations of the failures such as the machine of delaying, Network Abnormal, and when client subsequent access this document can all pass through this document pair The proxy server answered carries out, without being interacted again with central server.
In the present embodiment, client can be before file be accessed all according to the title of file, pre-defined rule, Yi Jiduo every time The information of a proxy server determines proxy server;Can also only have when accessing some file for the first time according to the name of file The information of title, pre-defined rule and multiple proxy servers determines proxy server, preserves the title and correspondence for accessing file Proxy server, can be directly according to the record queries of preservation to corresponding server in subsequent access this document.
In a kind of implementation, step S110 can include:
Client initiates operation of reaching the standard grade to central server, and the information of multiple proxy servers is received from central server.
In this implementation, once client, which is reached the standard grade, will obtain the information of multiple proxy servers, without accessing Whereabouts central server is asked during file, therefore further increases access efficiency.
In other implementations, information from client to central server request agency server that can be from, receives center The information for multiple proxy servers that server returns.
In a kind of implementation, the information of multiple proxy servers can be, but not limited to the shape using proxy server list Formula;The information of proxy server can include the address of proxy server, can also include the mark of proxy server;The mark Knowledge can be, but not limited to be sequence number of the proxy server in proxy server list.
In other implementations, the information of multiple proxy servers can also include other contents, in addition can also use Other forms show.
In this implementation, in step S130, client can send to visit to the address of identified proxy server Ask request.
In this implementation, the proxy server list that different clients obtain is possible to different, but is also not excluded for two The situation that the proxy server list of client is exactly like occurs.In addition, it is also possible to agency's clothes that two clients obtain The address of the proxy server included in business device list is identical, but in two proxy server lists, same proxy server The corresponding sequence number in address it is different.
In a kind of implementation, the information of the multiple proxy server is stored in proxy server list;Step S120 can include:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
In this implementation, proxy server list can be, but not limited to the local cache of equipment where being stored in client In.Can be that the information of multiple proxy servers is sent to client by central server in the form of proxy server list, Can also be that the information of the multiple proxy servers received from central server is stored in proxy server list by client.
In this implementation, the ground of one-to-one sequence number and proxy server can be included in proxy server list Location, wherein each sequence number represents a proxy server;Wherein, it is described according to Hash operation as a result, from proxy server arrange Determine that the corresponding proxy server of the file to be visited can include in table:
The result of client Hash operation to the number of proxy server (i.e. received proxy server information In, the number of address or sequence number) modulo operation is carried out, sequence number is determined according to the result of modulo operation, by proxy server list In the sequence number represent proxy server as the corresponding proxy server of file to be visited;Correspondingly, in step s 130, it is Access request is sent to the address of the corresponding proxy server of identified sequence number.For example assume that the received information of client is: Sequence number 1, corresponding address A;Sequence number 2, corresponding address B.If modulo operation the result is that be in 1, step S130 to address A send out Send access request.
In other implementations, the title of file can also be directed to and other parameters carry out Hash calculation together, it is described its Its parameter be such as but not limited to be client mark.
In other implementations, the corresponding agency service of file to be visited can also be determined according to other pre-defined rules Device a, as long as proxy server can be uniquely determined in multiple proxy servers.
In a kind of implementation, the method can also include:The client obtains predetermined Kazakhstan from central server Uncommon function.
In this implementation, client can be when obtaining the information of multiple proxy servers, obtain in the lump described predetermined Hash function, the information of multiple proxy servers and predetermined hash function can also be obtained respectively.
In this implementation, the predetermined hash function that different clients are obtained may be the same or different.
In other implementations, the predetermined hash function can also pre-save in the client.
In a kind of implementation, it can also include after step S120:
If detecting the corresponding proxy server failure of file to be visited, the client takes from the multiple agency The information of the proxy server of failure is removed in the information of business device, according to the title of file to be visited, pre-defined rule and is removed The information of remaining proxy server afterwards, redefines the corresponding proxy server of file to be visited.
In this implementation, if having redefined the corresponding proxy server of file to be visited, it is in step S130 The access request for the file to be visited is sent to the proxy server redefined.
In correlation technique, when a proxy server because situations such as machine, Network Abnormal, software anomaly exit of delaying is failed When, usually there are two kinds of processing methods:
First, after running into proxy server exception, client returns to failure information.This processing method be generally used for point The occasion of the less business of data volume is read and write in cloth storage system, after client interacts once with agency, there will be no follow-up Operation.For the very big business of read-write data volume (client interacts repeatedly with agency), this method can not provide lasting point Cloth storage service.
Second, after running into proxy server exception, client asks a new agency service to central server again Device, then proceedes to initiate read-write service to new proxy server.This processing method requires each read-write requests of client all To be interacted with central server, this can cause central server very big access pressure;In addition, each read-write requests are all To pass through central server and proxy server, this can cause the access delay of client to significantly increase, and this method can not carry For efficient distributed storage service.
In this implementation, when the proxy server originally used fails, it can continue to access, without Ask, therefore can realize to the fault-tolerant of proxy server to central server again so that deposited in the distribution based on agency It can also be provided after proxy server failure in storage system and continue efficient distributed storage service.
In this implementation, removing the information of the proxy server of failure can refer to delete from proxy server list The information such as the sequence number of the proxy server of failure and address, renumbers the address of remaining proxy server after removal.When To the title of file to be visited carry out Hash operation, to operation result modulus by way of redefine proxy server when, Since the number that proxy server in server list is acted on behalf of after removal is also accordingly reduced, and the sequence number of each proxy server Changed, thus the result of modulo operation by be still remove failure proxy server information after proxy server list In some sequence number.
In this implementation, the information for removing the proxy server of failure can be temporarily by the information of the proxy server Blacklist is put into, knowing how the proxy server recovers normal, can also be by the Information recovering of the proxy server to agency In server list.
In this implementation, after redefining corresponding proxy server for a file, afterwards for this file All access all initiated to the proxy server that redefines.
In this implementation, if since multiple proxy servers fail in succession, the agency that client is obtained is caused to take The information of business device all deleted the number of light or proxy server less than predetermined threshold (such as in the case where predetermined threshold is 3, Only it is left the information of 2 proxy servers in the proxy server list of client), then client can be again to center service The information of device request agency server, central server can retransmit the information of one or more proxy servers to client As supplement.
Illustrate the present embodiment with an example below, which applies in system as shown in Figure 1, as shown in figure 3, objective The operating process at family end includes the following steps 201~204:
201st, client initiates operation of reaching the standard grade to central server;
202nd, central server returns to response message to client.Response message include a proxy server list and One hash function;
203rd, client is when needing to read or write file a, according to hash function and the result of calculation of the title of file a, from The corresponding proxy servers of file a are determined in proxy server list, it is assumed that be proxy server 21, i.e.,:Reading for file a Operation should go on proxy server 21 to ask, and then client reads or writes request to the initiation file of proxy server 21 a;
204th, proxy server 21 performs read or write request of the client to file a, and the result for reading or writing request is made Client is returned to for response.
In the case of proxy server 21 is normal, client is all to agency for the read request and write request of file a Server 21 is initiated.If proxy server 21 fails, then client removes proxy server 21 from proxy server list, When needing to read or write file a, step 205~206 are performed:
205th, again according to hash function and the result of calculation of the title of file a, from the generation for having removed proxy server 21 Manage in server list, determine the corresponding proxy servers of file a, it is assumed that be proxy server 22, client is to agency service The initiation file of device 22 a's reads or writes request;
206th, proxy server 22 performs read or write request of the client to file a, and the result for reading or writing request is made Client is returned to for response.
If proxy server 22 also fails, then processing mode when client fails according to proxy server 21 carries out phase It should handle.
This example can guarantee that when some proxy server the machine of delaying, Network Abnormal or process exception occurs and exits, still It can be provided for client and continue and efficiently service.
Embodiment two, a kind of file access method, to contain at least one central server, at least one client, In the system of multiple proxy servers, as shown in figure 4, including S210~S220:
S210, central server determine multiple proxy servers for client;
The information of multiple proxy servers determined by S220, the central server to client transmission.
In the present embodiment, the information that the central server is sent to multiple proxy servers of client can be used for supplying Client therefrom selects to access the proxy server that file uses.
In the present embodiment, client need not be interacted with central server again when accessing file, therefore can be reduced Access delay, improves access efficiency.
In the present embodiment, it is described comprising at least one central server, at least one client, multiple proxy servers System can be, but not limited to be used for distributed memory system carry out file access.The proxy server can be, but not limited to File in distributed memory system is accessed by sdk, agency service is provided to client by REST API.
In a kind of implementation, proxy server that central server is determined for client can be central server according to The network topology of client and proxy server, the information such as loading condition of proxy server determines, such as to Mr. Yu A client, can hop count is less and the relatively low proxy server of load between prioritizing selection and the client, as being sent to The proxy server of client.Central server can determine proxy server according to predetermined strategy for client.
In a kind of implementation, it can also include before the step S210:
The central server receives the operation of reaching the standard grade that the client is initiated.
I.e.:Client is reached the standard grade to central server initiation after operation, and central server carries out step S210~S220.
In this implementation, once client, which is reached the standard grade, will obtain the information of multiple proxy servers, without accessing Whereabouts central server is asked during file, therefore further increases access efficiency.
In other implementations, can be from client to the information of central server request agency server after, center Server performs step S210~S220;Can also be central server periodically or when thinking to need, perform step S210~ S220;Such as the network topology of client and proxy server change after, for another example proxy server loading condition hair When having given birth to great changes, after the proxy server that fails for another example is resumed, central server, which can consider, to be needed again for visitor Family end determines proxy server, in this case can perform step S210~S220.
In a kind of implementation, the information of multiple proxy servers can be, but not limited to the shape using proxy server list Formula;Except the address of each proxy server can be included in proxy server list, each proxy server can also be included Mark;The mark can be, but not limited to be sequence number of the proxy server in proxy server list.
In this implementation, the proxy server list that different clients obtain is possible to different, but is also not excluded for two The situation that the proxy server list of client is exactly like occurs.In addition, it is also possible to agency's clothes that two clients obtain The address of the proxy server included in business device list is identical, but in two proxy server lists, same proxy server The corresponding sequence number in address it is different.
In other implementations, the information of multiple proxy servers can also include other contents, in addition can also use Other forms show.
In a kind of implementation, the method can also include:The central server sends predetermined Kazakhstan to client Uncommon function;The default hash function is used for the information according to the multiple proxy server for the client, and treats The title for accessing file determines that accesses a proxy server used in the file to be visited.
Wherein, central server can be when sending the information of multiple proxy servers, send predetermined Hash in the lump Function, can also send the information of multiple proxy servers and predetermined hash function respectively.
Wherein, central server is sent to the predetermined hash functions of different clients and may be the same or different.
In this implementation, client can carry out Hash operation, the knot obtained according to Hash operation according to hash function Fruit, can uniquely determine a proxy server in proxy server list.
When central server uses the method for the present embodiment, the operation of client may refer to embodiment one.
Embodiment three, a kind of file access method, to contain at least one central server, multiple proxy servers In system, as shown in figure 5, including S310~S320:
S310, proxy server attempt to obtain file to be visited write lock failure after, initiate to seize to central server The operation for writing lock of the file to be visited;
After S320, the proxy server seize the writing and lock successfully of the file to be visited, to the file to be visited into Row write operates.
, can be by other generations after the proxy server that write operation is carried out to some file fails in the present embodiment What reason server occupied this document writes lock, so as to complete the write operation of this document.
In the present embodiment, it is described comprising at least one central server, multiple proxy servers system can with but it is unlimited In for carrying out file access to distributed memory system.The proxy server, which can be, but not limited to access by sdk, to be distributed File in formula storage system, agency service is provided by REST API to client.
In the scene of the distributed memory system written document based on agency, for writing for specific file, at usual one Between only allow a proxy server to carry out in section, implementation method is the lock of writing that proxy server occupies this document, and is being write During constantly update and occupy to writing lock, until write operation is completed.
After some proxy server is failing during writing some file, the lock of writing of file that it occupies may not necessarily be by Normal release, so when originally to the proxy server send the client of write request again to the proxy server redefined again It is secondary when initiating to the write request of this document or when other clients initiate write request by proxy server to this document, to this File carry out write operation proxy server can due to do not account for it is documentary write lock and the situation for writing failure occurs.
In correlation technique, proxy server can return to client and write failure.
In the present embodiment, when proxy server is attempted to obtain after writing lock failure of file, it can be initiated to central server The operation for writing lock of this file is seized, originally occupied the proxy server for writing lock of this document due to failure, so will not join Lock is write with seizing;So get after writing lock, proxy server can continue to provide write operation.This process can be to client It is transparent.
Such as in the example of embodiment one, if proxy server 22 receives write request of the client to file a, then it That attempts whereabouts central server acquisition file a writes lock, obtains and successfully then continues write operation;If due to proxy server 21 still That occupies file a writes lock, and cause proxy server 22 obtain write lock it is unsuccessful, then proxy server 22 to central server send out Rise and seize the operation for writing lock of file a, rob account for file a write lock after, continue write operation.
In the present embodiment, when proxy server fails, the way of client can be found in embodiment one.
Example IV, a kind of file access method, to contain at least one central server, at least one client, In the storage system of multiple proxy servers, as shown in fig. 6, the described method includes S410~S420:
S410, central server determine multiple proxy servers for client, to the client send determined by it is more The information of a proxy server;
S420, the client are according to the title of file to be visited, pre-defined rule and the multiple proxy server Information, determines the corresponding proxy server of the file to be visited, to the corresponding proxy server of file to be visited send for The access request of the file to be visited.
In a kind of implementation, it can also include before the step S410:
The central server receives the operation of reaching the standard grade that the client is initiated.
In a kind of implementation, the information of the multiple proxy server is stored in proxy server list;
The method can also include:The central server sends predetermined hash function to client;
In this implementation, the client is according to the title of file to be visited, pre-defined rule and the multiple agency The information of server, determines that the corresponding proxy server of the file to be visited can include:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
In a kind of implementation, the client is according to the title of file to be visited, pre-defined rule and the multiple generation The information of server is managed, can also be included after determining the corresponding proxy server of the file to be visited:
If detecting the corresponding proxy server failure of file to be visited, the client takes from the multiple agency The information of the proxy server of failure is removed in the information of business device, according to the title of file to be visited, pre-defined rule and is removed The information of remaining proxy server afterwards, redefines the corresponding proxy server of file to be visited.
In this implementation, if having redefined the corresponding proxy server of file to be visited, to file to be visited When corresponding proxy server sends the access request for the file to be visited, sent out to the proxy server redefined Send the access request for the file to be visited.
In this implementation, the method can also include:
Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server Access the operation for writing lock of file;
After the proxy server seizes the writing and lock successfully of the file to be visited, the file to be visited is grasped into row write Make.
In the present embodiment, the operation performed by client corresponds to embodiment one, the operation pair performed by central server Embodiment three should be corresponded in embodiment two, the operation performed by proxy server, the other of the present embodiment realize that details can phase Should be referring to embodiment one, two, three.
One example of the present embodiment is as follows, including following process:
Client process can initiate operation of reaching the standard grade, central server is according to visitor when initialization to central server The information such as loading condition of the network topology of family end and proxy server, proxy server, returns to Client Agent clothes Business device list and a hash function.The effect of hash function is according to the title of file to be visited, in proxy server list In obtain unique proxy server address.
Before client does read or write to some file, Hash fortune is carried out to the title of this document using hash function Calculate, according to the proxy server corresponding to the result of Hash operation definite this document in proxy server list, be directed to afterwards All reading and writing request of this file can all be sent to this proxy server.During read-write, client will not be genuinely convinced with again Business device does any interaction.
When certain proxy server because power down delays that machine, network are obstructed or process exception exits and after failure, client The proxy server of this failure is rejected from proxy server list, then the title of this document is carried out using hash function Hash operation, this document in proxy server list is redefined according to the result of Hash operation corresponding to new agency's clothes Business device address, afterwards all reading and writing operation for this file are all initiated to new proxy server.
New proxy server attempt to obtain file to be visited write lock failure after, initiate to seize institute to central server That states file to be visited writes the operation of lock, if after seizing the writing and lock successfully of the file to be visited, to the text to be visited Part carries out write operation, and result is fed back to client.
In the present embodiment, the detail that client, central server, proxy server are operated can be respectively referring to reality Apply example one, two, three.
Embodiment five, a kind of file access device, to contain at least one central server, at least one client, In the system of multiple proxy servers, as shown in fig. 7, comprises:
Interactive module 51, for obtaining the information of multiple proxy servers from central server;
Determining module 52, for the title according to file to be visited, pre-defined rule and the multiple proxy server Information, determines the corresponding proxy server of the file to be visited;
Access modules 53, for sending the visit for the file to be visited to the corresponding proxy server of file to be visited Ask request.
In the present embodiment, interactive module 51 is to be responsible for obtaining the part of the information of multiple proxy servers in above device, It can be the combination of software, hardware or both.
In the present embodiment, determining module 52 is to be responsible for determining the corresponding agency service of the file to be visited in above device The part of device, can be the combination of software, hardware or both.
In the present embodiment, access modules 53 are to be responsible for sending the access request for the file to be visited in above device Part, can be software, hardware or both combination.
The file access device of the present embodiment can be arranged in client.
In a kind of implementation, the information of the multiple proxy server is stored in proxy server list;
The determining module is according to the letter of the title of file to be visited, pre-defined rule and the multiple proxy server Breath, determines that the corresponding proxy server of the file to be visited can include:
The determining module carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash Computing as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
In this implementation, the interactive module can be also used for obtaining predetermined hash function from central server.
In a kind of implementation, the determining module can be also used for the title according to file to be visited, pre-defined rule, And the information of the multiple proxy server, after determining the corresponding proxy server of the file to be visited, if detected The corresponding proxy server failure of file to be visited, then the client removes mistake from the information of the multiple proxy server The information of the proxy server of effect, according to remaining proxy server after the title of file to be visited, pre-defined rule and removal Information, redefine the corresponding proxy server of file to be visited.
The operation of each module of file access device of the present embodiment correspond respectively to step S110 in embodiment one~ S130, each the other of module operation realize that details can be found in embodiment one.
Embodiment six, a kind of file access device, to contain at least one central server, at least one client, In the system of multiple proxy servers, as shown in figure 8, including:
Selecting module 61, for determining multiple proxy servers for client;
Transport module 62, for the client send determined by multiple proxy servers information.
In the present embodiment, selecting module 61 is that the portion that client determines multiple proxy servers is responsible in above device Divide, can be the combination of software, hardware or both.
In the present embodiment, transport module 62 is responsible in above device to multiple agencies determined by client transmission The part of the information of server, can be the combination of software, hardware or both.
The file access device of the present embodiment can be arranged in central server.
In a kind of implementation, the transport module can be also used for sending predetermined hash function to client;It is described Default hash function is used for the information according to the multiple proxy server for the client, and the name of file to be visited Claim to determine that accesses a proxy server used in the file to be visited.
The operation of each module of file access device of the present embodiment correspond respectively to step S210 in embodiment two~ S220, each the other of module operation realize that details can be found in embodiment two.
Embodiment seven, a kind of file access device, to contain at least one central server, multiple proxy servers In system, as shown in figure 9, including:
Initiation module 71, for attempt to obtain file to be visited write lock failure after, initiate to seize to central server The operation for writing lock of the file to be visited;
Operation module 72, for after the writing and lock successfully of the file to be visited is seized, being carried out to the file to be visited Write operation.
In the present embodiment, initiation module 71 is to be responsible for initiating to seize the text to be visited to central server in above device The part of the operation for writing lock of part, can be the combination of software, hardware or both.
In the present embodiment, operation module 72 is to be responsible for locking successfully seizing the writing for file to be visited in above device Afterwards, the part of write operation is carried out to the file to be visited, can be the combination of software, hardware or both.
The file access device of the present embodiment can be arranged in proxy server.
The operation of each module of file access device of the present embodiment correspond respectively to step S310 in embodiment three~ S320, each the other of module operation realize that details can be found in embodiment three.
Embodiment eight, a kind of file access system, including:It is at least one central server, at least one client, multiple Proxy server, wherein:
The central server is used to determine multiple proxy servers for client, to determined by client transmission The information of multiple proxy servers;
The client is used for according to the title of file to be visited, pre-defined rule and the multiple proxy server Information, determines the corresponding proxy server of the file to be visited, to the corresponding proxy server of file to be visited send for The access request of the file to be visited.
In a kind of implementation, the information of the multiple proxy server is stored in proxy server list;
The central server can be also used for sending predetermined hash function to client;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, Determine that the corresponding proxy server of the file to be visited can include:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
In a kind of implementation, the client can be also used for when according to the title of file to be visited, pre-defined rule, with And the information of the multiple proxy server, after determining the corresponding proxy server of the file to be visited, treated if detected The corresponding proxy server failure of file is accessed, then the client removes failure from the information of the multiple proxy server Proxy server information, remaining proxy server according to the title of file to be visited, pre-defined rule and after removing Information, redefines the corresponding proxy server of file to be visited.
In a kind of implementation, proxy server can be used for attempt to obtain file to be visited write lock failure after, to Central server initiates to seize the operation for writing lock of the file to be visited;After seizing the writing and lock successfully of the file to be visited, Write operation is carried out to the file to be visited.
In the present embodiment, the detail that client, central server, proxy server are operated can be respectively referring to reality Apply example one, two, three.
Embodiment nine, a kind of electronic equipment for being used to carry out file access, to contain at least one central server, extremely In a few client, the system of multiple proxy servers, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists When reading execution by the processor, operations described below is performed:
The information of multiple proxy servers is obtained from central server;
According to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, described treat is determined Access the corresponding proxy server of file;
The access request for the file to be visited is sent to the corresponding proxy server of file to be visited.
The electronic equipment of the present embodiment can be the equipment where client in embodiment one.
In the present embodiment, for carrying out the program of file access when being read out by the processor execution, performed operation pair Should be in step S110~S130 in embodiment one;Other details of operation performed by the program can be found in embodiment one.
Embodiment ten, a kind of electronic equipment for being used to carry out file access, to contain at least one central server, extremely In a few client, the system of multiple proxy servers, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists When reading execution by the processor, operations described below is performed:
Multiple proxy servers are determined for client;
To the information of multiple proxy servers determined by client transmission.
The electronic equipment of the present embodiment can be the central server of embodiment two.
In the present embodiment, for carrying out the program of file access when being read out by the processor execution, performed operation pair Should be in step S210 and S220 in embodiment two;Other details of operation performed by the program can be found in embodiment two.
Embodiment 11, it is a kind of be used to carry out the electronic equipment of file access, to contain at least one central server, In the system of multiple proxy servers, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists When reading execution by the processor, operations described below is performed:
Attempt to obtain file to be visited write lock failure after, initiate to seize the file to be visited to central server Write the operation of lock;After seizing the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
The electronic equipment of the present embodiment can be the proxy server of embodiment three.
In the present embodiment, for carrying out the program of file access when being read out by the processor execution, performed operation pair Should be in step S310 and S320 in embodiment three;Other details of operation performed by the program can be found in embodiment three.
One of ordinary skill in the art will appreciate that all or part of step in the above method can be instructed by program Related hardware is completed, and described program can be stored in computer-readable recording medium, such as read-only storage, disk or CD Deng.Alternatively, all or part of step of above-described embodiment can also be realized using one or more integrated circuits.Accordingly Ground, each module/unit in above-described embodiment can be realized in the form of hardware, can also use the shape of software function module Formula is realized.The application is not restricted to the combination of the hardware and software of any particular form.
Certainly, the application can also have other various embodiments, ripe in the case of without departing substantially from the application spirit and its essence Know those skilled in the art when can be made according to the application it is various it is corresponding change and deformation, but these corresponding change and become Shape should all belong to the protection domain of claims hereof.

Claims (27)

  1. A kind of 1. file access method, to contain at least one central server, at least one client, multiple agency services In the system of device, including:
    Client obtains the information of multiple proxy servers from central server;
    The client is determined according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server The corresponding proxy server of the file to be visited;
    The client sends the access request for the file to be visited to the corresponding proxy server of file to be visited.
  2. 2. file access method as claimed in claim 1, it is characterised in that the client obtains multiple from central server The information of proxy server includes:
    Client initiates operation of reaching the standard grade to central server, and the information of multiple proxy servers is received from central server.
  3. 3. file access method as claimed in claim 1, it is characterised in that the information of the multiple proxy server is stored in In proxy server list;The client is according to the title of file to be visited, pre-defined rule and the multiple agency service The information of device, determines that the corresponding proxy server of the file to be visited includes:
    The client carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash operation As a result, the corresponding proxy server of the file to be visited is determined from proxy server list.
  4. 4. file access method as claimed in claim 3, it is characterised in that further include:The client is from central server Obtain predetermined hash function.
  5. 5. such as file access method according to any one of claims 1 to 4, it is characterised in that the client is according to waiting to visit Ask the information of the title of file, pre-defined rule and the multiple proxy server, determine the file to be visited corresponding generation Further included after reason server:
    If detecting the failure of file to be visited corresponding proxy server, the client is from the multiple proxy server Information in remove failure proxy server information, according to the title of file to be visited, pre-defined rule and remove after remain The information of remaining proxy server, redefines the corresponding proxy server of file to be visited.
  6. A kind of 6. file access method, to contain at least one central server, at least one client, multiple agency services In the system of device, including:
    Central server determines multiple proxy servers for client;
    The information of multiple proxy servers determined by the central server to client transmission.
  7. 7. file access method as claimed in claim 6, it is characterised in that the central server determines multiple for client Further included before proxy server:
    The central server receives the operation of reaching the standard grade that the client is initiated.
  8. 8. file access method as claimed in claim 6, it is characterised in that further include:
    The central server sends predetermined hash function to client;The default hash function is used to supply the client The information according to the multiple proxy server, and the title of file to be visited is held to determine that accesses the file to be visited Used proxy server.
  9. 9. a kind of file access method, to contain at least one central server, multiple proxy servers system in, bag Include:
    Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize to central server described to be visited The operation for writing lock of file;
    After the proxy server seizes the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
  10. 10. a kind of file access method, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, including:
    Central server determines multiple proxy servers for client, to multiple agency services determined by client transmission The information of device;
    The client is determined according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server The corresponding proxy server of the file to be visited, sends for described to be visited to the corresponding proxy server of file to be visited The access request of file.
  11. 11. file access method as claimed in claim 10, it is characterised in that the central server determines more for client Further included before a proxy server:
    The central server receives the operation of reaching the standard grade that the client is initiated.
  12. 12. file access method as claimed in claim 10, it is characterised in that the information of the multiple proxy server preserves In proxy server list;
    The method further includes:The central server sends predetermined hash function to client;
    The client is determined according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server The corresponding proxy server of the file to be visited includes:
    The client carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash operation As a result, the corresponding proxy server of the file to be visited is determined from proxy server list.
  13. 13. the file access method as any one of claim 10~12, it is characterised in that the client is according to treating The information of the title of file, pre-defined rule and the multiple proxy server is accessed, determines that the file to be visited is corresponding Further included after proxy server:
    If detecting the failure of file to be visited corresponding proxy server, the client is from the multiple proxy server Information in remove failure proxy server information, according to the title of file to be visited, pre-defined rule and remove after remain The information of remaining proxy server, redefines the corresponding proxy server of file to be visited.
  14. 14. file access method as claimed in claim 13, it is characterised in that further include:
    Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize to central server described to be visited The operation for writing lock of file;
    After the proxy server seizes the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
  15. 15. a kind of file access device, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, it is characterised in that including:
    Interactive module, for obtaining the information of multiple proxy servers from central server;
    Determining module, for the information of the title according to file to be visited, pre-defined rule and the multiple proxy server, Determine the corresponding proxy server of the file to be visited;
    Access modules, the access for being sent to the corresponding proxy server of file to be visited for the file to be visited please Ask.
  16. 16. file access device as claimed in claim 15, it is characterised in that the information of the multiple proxy server preserves In proxy server list;
    The determining module is according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, really Determining the corresponding proxy server of the file to be visited includes:
    The determining module carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash operation As a result, determining the corresponding proxy server of the file to be visited from proxy server list;
    The interactive module is additionally operable to obtain predetermined hash function from central server.
  17. 17. the file access device as described in claim 15 or 16, it is characterised in that:
    The determining module is additionally operable in the title according to file to be visited, pre-defined rule and the multiple proxy server Information, after determining the corresponding proxy server of the file to be visited, if detect file to be visited it is corresponding agency clothes Business device failure, then remove the information of the proxy server of failure, according to be visited from the information of the multiple proxy server The title of file, pre-defined rule and after removing remaining proxy server information, it is corresponding to redefine file to be visited Proxy server.
  18. 18. a kind of file access device, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, it is characterised in that including:
    Selecting module, for determining multiple proxy servers for client;
    Transport module, for the client send determined by multiple proxy servers information.
  19. 19. file access device as claimed in claim 18, it is characterised in that:
    The transport module is additionally operable to send predetermined hash function to client;The default hash function is used for described in confession Client determines that an access is described to be visited according to the information of the multiple proxy server, and the title of file to be visited Proxy server used in file.
  20. 20. a kind of file access device, to contain at least one central server, multiple proxy servers system in, its It is characterized in that, including:
    Initiation module, for attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server Access the operation for writing lock of file;
    Operation module, for after the writing and lock successfully of the file to be visited is seized, write operation to be carried out to the file to be visited.
  21. 21. a kind of file access system, including:At least one central server, at least one client, multiple agency services Device, it is characterised in that:
    The central server is used to determine multiple proxy servers for client, to the client send determined by it is multiple The information of proxy server;
    The client is used for the information according to the title of file to be visited, pre-defined rule and the multiple proxy server, Determine the corresponding proxy server of the file to be visited, send to the corresponding proxy server of file to be visited and treated for described Access the access request of file.
  22. 22. file access system as claimed in claim 21, it is characterised in that:The information of the multiple proxy server preserves In proxy server list;
    The central server is additionally operable to send predetermined hash function to client;
    The client is determined according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server The corresponding proxy server of the file to be visited includes:
    The client carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash operation As a result, the corresponding proxy server of the file to be visited is determined from proxy server list.
  23. 23. the file access system as described in claim 21 or 22, it is characterised in that:
    The client is additionally operable to when according to the title of file to be visited, pre-defined rule and the multiple proxy server Information, after determining the corresponding proxy server of the file to be visited, if detecting the corresponding agency service of file to be visited Device fails, then the information of the proxy server of failure is removed from the information of the multiple proxy server, according to text to be visited The title of part, pre-defined rule and after removing remaining proxy server information, redefine file to be visited corresponding generation Manage server.
  24. 24. file access system as claimed in claim 23, it is characterised in that:
    Proxy server be used for attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server Access the operation for writing lock of file;After seizing the writing and lock successfully of the file to be visited, the file to be visited is grasped into row write Make.
  25. A kind of 25. electronic equipment for being used to carry out file access, to contain at least one central server, at least one client Hold, in the system of multiple proxy servers, including:Memory and processor;
    It is characterized in that:
    The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access is by institute When stating processor reading execution, operations described below is performed:
    The information of multiple proxy servers is obtained from central server;
    According to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, determine described to be visited The corresponding proxy server of file;
    The access request for the file to be visited is sent to the corresponding proxy server of file to be visited.
  26. A kind of 26. electronic equipment for being used to carry out file access, to contain at least one central server, at least one client Hold, in the system of multiple proxy servers, including:Memory and processor;
    It is characterized in that:
    The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access is by institute When stating processor reading execution, operations described below is performed:
    Multiple proxy servers are determined for client;
    To the information of multiple proxy servers determined by client transmission.
  27. A kind of 27. electronic equipment for being used to carry out file access, to contain at least one central server, multiple agency services In the system of device, including:Memory and processor;
    It is characterized in that:
    The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access is by institute When stating processor reading execution, operations described below is performed:
    Attempt to obtain file to be visited write lock failure after, write lock to what central server initiated to seize the file to be visited Operation;After seizing the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
CN201610884604.6A 2016-10-10 2016-10-10 File access method, device and system and electronic equipment Active CN107920101B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610884604.6A CN107920101B (en) 2016-10-10 2016-10-10 File access method, device and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610884604.6A CN107920101B (en) 2016-10-10 2016-10-10 File access method, device and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN107920101A true CN107920101A (en) 2018-04-17
CN107920101B CN107920101B (en) 2020-11-17

Family

ID=61891821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610884604.6A Active CN107920101B (en) 2016-10-10 2016-10-10 File access method, device and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN107920101B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109885550A (en) * 2018-12-28 2019-06-14 安徽维德工业自动化有限公司 A kind of document storage system based on full connection routing layer
CN111030984A (en) * 2019-10-22 2020-04-17 上海泰宇信息技术股份有限公司 Data safety transmission system and method
CN111405039A (en) * 2020-03-16 2020-07-10 深圳市网心科技有限公司 Data transparent transmission method, device and system, client and server
CN112416871A (en) * 2019-08-23 2021-02-26 华为技术有限公司 Data access method, device and system
CN112637333A (en) * 2020-12-22 2021-04-09 畅捷通信息技术股份有限公司 Intelligent client agent method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217508A (en) * 2007-12-29 2008-07-09 腾讯科技(深圳)有限公司 A network agent system and the corresponding realizing methods based on instant communication platform
CN102055777A (en) * 2009-10-29 2011-05-11 中兴通讯股份有限公司 Method and system for realizing common content sharing service
CN103106207A (en) * 2011-11-10 2013-05-15 中国移动通信集团公司 Method and equipment for metadata distribution in object storing system
CN104253860A (en) * 2014-09-11 2014-12-31 武汉噢易云计算有限公司 Shared storage message queue-based implementation method for high availability of virtual machines
US20150095333A1 (en) * 2013-09-27 2015-04-02 International Business Machines Corporation Activity Based Analytics

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217508A (en) * 2007-12-29 2008-07-09 腾讯科技(深圳)有限公司 A network agent system and the corresponding realizing methods based on instant communication platform
CN102055777A (en) * 2009-10-29 2011-05-11 中兴通讯股份有限公司 Method and system for realizing common content sharing service
CN103106207A (en) * 2011-11-10 2013-05-15 中国移动通信集团公司 Method and equipment for metadata distribution in object storing system
US20150095333A1 (en) * 2013-09-27 2015-04-02 International Business Machines Corporation Activity Based Analytics
CN104253860A (en) * 2014-09-11 2014-12-31 武汉噢易云计算有限公司 Shared storage message queue-based implementation method for high availability of virtual machines

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109885550A (en) * 2018-12-28 2019-06-14 安徽维德工业自动化有限公司 A kind of document storage system based on full connection routing layer
CN109885550B (en) * 2018-12-28 2022-09-13 安徽维德工业自动化有限公司 File storage system based on all-connected routing layer
CN112416871A (en) * 2019-08-23 2021-02-26 华为技术有限公司 Data access method, device and system
WO2021036989A1 (en) * 2019-08-23 2021-03-04 华为技术有限公司 Method, apparatus and system for data access
CN112416871B (en) * 2019-08-23 2023-10-13 华为技术有限公司 Data access method, device and system
CN111030984A (en) * 2019-10-22 2020-04-17 上海泰宇信息技术股份有限公司 Data safety transmission system and method
CN111030984B (en) * 2019-10-22 2022-08-19 上海泰宇信息技术股份有限公司 Data safety transmission system and method
CN111405039A (en) * 2020-03-16 2020-07-10 深圳市网心科技有限公司 Data transparent transmission method, device and system, client and server
CN112637333A (en) * 2020-12-22 2021-04-09 畅捷通信息技术股份有限公司 Intelligent client agent method

Also Published As

Publication number Publication date
CN107920101B (en) 2020-11-17

Similar Documents

Publication Publication Date Title
CA3048737C (en) Service processing and consensus method and device
CN107920101A (en) A kind of file access method, device, system and electronic equipment
US9858013B1 (en) Scalable distributed storage system infrastructure
CN102158540A (en) System and method for realizing distributed database
CN107133234A (en) The method of data cached renewal, apparatus and system
CN105357322B (en) A kind of virtual machine distribution method based on Topology partition
CN106446159B (en) A kind of method of storage file, the first virtual machine and name node
WO2017143957A1 (en) Data redistribution method and device
WO2018233630A1 (en) Fault discovery
US20230098190A1 (en) Data processing method, apparatus, device and medium based on distributed storage
US20190199794A1 (en) Efficient replication of changes to a byte-addressable persistent memory over a network
RU2643642C2 (en) Use of cache memory and another type of memory in distributed memory system
CN110784498A (en) Personalized data disaster tolerance method and device
CN107872517A (en) A kind of data processing method and device
CN115270033A (en) Data access system, method, equipment and network card
CN107181773A (en) Data storage and data managing method, the equipment of distributed memory system
CN107018170A (en) A kind of method of data synchronization and equipment
CN104715044B (en) A kind of distributed system and its data manipulation method
US11288237B2 (en) Distributed file system with thin arbiter node
CN110018879A (en) Delay loading method and device applied to distributed system
CN106873902A (en) A kind of document storage system, data dispatching method and back end
CN107943615B (en) Data processing method and system based on distributed cluster
CN107493309A (en) File wiring method and device in a kind of distributed system
CN109840051A (en) A kind of date storage method and device of storage system
CN112596669A (en) Data processing method and device based on distributed storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant