CN107920101A - A kind of file access method, device, system and electronic equipment - Google Patents
A kind of file access method, device, system and electronic equipment Download PDFInfo
- Publication number
- CN107920101A CN107920101A CN201610884604.6A CN201610884604A CN107920101A CN 107920101 A CN107920101 A CN 107920101A CN 201610884604 A CN201610884604 A CN 201610884604A CN 107920101 A CN107920101 A CN 107920101A
- Authority
- CN
- China
- Prior art keywords
- file
- visited
- proxy server
- client
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
- G06F16/1824—Distributed file systems implemented using Network-attached Storage [NAS] architecture
- G06F16/183—Provision of network file services by network file servers, e.g. by using NFS, CIFS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Computer And Data Communications (AREA)
Abstract
A kind of file access method, device, system and electronic equipment;The file access method to contain at least one central server, at least one client, the system of multiple proxy servers, including:Client obtains the information of multiple proxy servers from central server;The client determines the corresponding proxy server of the file to be visited according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server;The client sends the access request for the file to be visited to the corresponding proxy server of file to be visited.The application can reduce the pressure of central server, improve the access efficiency of distributed memory system.
Description
Technical field
The present invention relates to network field, more particularly to a kind of file access method, device, system and electronic equipment.
Background technology
As the infrastructure of an Internet firm or software company, large-scale distributed storage system is various
Application layer service provide storage service.
A kind of system that file access is carried out to distributed memory system based on agency is as shown in Figure 1, it will usually has more
A reciprocity agency provides service, and the client in Fig. 1 is the client-side program of end user;Proxy server is divided by calling
The sdk software development kits (Software Development Kit, sdk) that cloth storage system provides access distributed storage
System, by characterizing state transfer (REpresentational State Transfer, REST) application programming interface
(Application Programming Interface, API) provides agency service to client;Central server is distribution
Formula storage system provides metadata management, Route Selection, selects the functions such as proxy server for client.
When client needs to read or write data, one proxy server of distribution first is asked to central server, is then passed through
Proxy server carries out read or write;Will be first genuinely convinced with during this processing method requirement client progress read or write
Business device interaction, this can cause central server very big access pressure, and the access delay of client can be caused significantly to increase
Greatly, this method can not provide efficient distributed storage service.
The content of the invention
The one side of the application, there is provided a kind of file access method, device, system and electronic equipment, in can reducing
The pressure of central server, improves the access efficiency of distributed memory system.
The application adopts the following technical scheme that.
A kind of file access method, takes to contain at least one central server, at least one client, multiple agencies
It is engaged in the system of device, including:
Client obtains the information of multiple proxy servers from central server;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server,
Determine the corresponding proxy server of the file to be visited;
The access that the client is sent for the file to be visited to the corresponding proxy server of file to be visited please
Ask.
Alternatively, the client obtains the information of multiple proxy servers from central server and includes:
Client initiates operation of reaching the standard grade to central server, and the information of multiple proxy servers is received from central server.
Alternatively, the information of the multiple proxy server is stored in proxy server list;The client according to
The information of the title of file to be visited, pre-defined rule and the multiple proxy server, determines that the file to be visited corresponds to
Proxy server include:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash
It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
Alternatively, the file access method further includes:The client obtains predetermined Hash from central server
Function.
Alternatively, the client is according to the title of file to be visited, pre-defined rule and the multiple proxy server
Information, further included after determining the corresponding proxy server of the file to be visited:
If detecting the corresponding proxy server failure of file to be visited, the client takes from the multiple agency
The information of the proxy server of failure is removed in the information of business device, according to the title of file to be visited, pre-defined rule and is removed
The information of remaining proxy server afterwards, redefines the corresponding proxy server of file to be visited.
A kind of file access method, takes to contain at least one central server, at least one client, multiple agencies
It is engaged in the system of device, including:
Central server determines multiple proxy servers for client;
The information of multiple proxy servers determined by the central server to client transmission.
Alternatively, the central server determines to further include before multiple proxy servers for client:
The central server receives the operation of reaching the standard grade that the client is initiated.
Alternatively, the file access method further includes:
The central server sends predetermined hash function to client;The default hash function is used for described in confession
Client determines that an access is described to be visited according to the information of the multiple proxy server, and the title of file to be visited
Proxy server used in file.
A kind of file access method, takes to contain at least one central server, at least one client, multiple agencies
It is engaged in the system of device, including:
Central server determines multiple proxy servers for client, to multiple agencies determined by client transmission
The information of server;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server,
Determine the corresponding proxy server of the file to be visited, send to the corresponding proxy server of file to be visited and treated for described
Access the access request of file.
Alternatively, the central server determines to further include before multiple proxy servers for client:
The central server receives the operation of reaching the standard grade that the client is initiated.
Alternatively, the information of the multiple proxy server is stored in proxy server list;
The method further includes:The central server sends predetermined hash function to client;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server,
Determine that the corresponding proxy server of the file to be visited includes:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash
It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
Alternatively, the client is according to the title of file to be visited, pre-defined rule and the multiple proxy server
Information, further included after determining the corresponding proxy server of the file to be visited:
If detecting the corresponding proxy server failure of file to be visited, the client takes from the multiple agency
The information of the proxy server of failure is removed in the information of business device, according to the title of file to be visited, pre-defined rule and is removed
The information of remaining proxy server afterwards, redefines the corresponding proxy server of file to be visited.
Alternatively, the file access method further includes:
Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server
Access the operation for writing lock of file;
After the proxy server seizes the writing and lock successfully of the file to be visited, the file to be visited is grasped into row write
Make.
A kind of file access device, takes to contain at least one central server, at least one client, multiple agencies
It is engaged in the system of device, including:
Interactive module, for obtaining the information of multiple proxy servers from central server;
Determining module, the letter for the title according to file to be visited, pre-defined rule and the multiple proxy server
Breath, determines the corresponding proxy server of the file to be visited;
Access modules, for sending the access for the file to be visited to the corresponding proxy server of file to be visited
Request.
Alternatively, the information of the multiple proxy server is stored in proxy server list;
The determining module is according to the letter of the title of file to be visited, pre-defined rule and the multiple proxy server
Breath, determines that the corresponding proxy server of the file to be visited includes:
The determining module carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash
Computing as a result, determining the corresponding proxy server of the file to be visited from proxy server list;
The interactive module is additionally operable to obtain predetermined hash function from central server.
Alternatively, the determining module is additionally operable in the title according to file to be visited, pre-defined rule and the multiple
The information of proxy server, after determining the corresponding proxy server of the file to be visited, if detecting file pair to be visited
The proxy server failure answered, then remove the information of the proxy server of failure from the information of the multiple proxy server,
According to the information of remaining proxy server after the title of file to be visited, pre-defined rule and removal, redefine to be visited
The corresponding proxy server of file.
A kind of file access device, takes to contain at least one central server, at least one client, multiple agencies
It is engaged in the system of device, it is characterised in that including:
Selecting module, for determining multiple proxy servers for client;
Transport module, for the client send determined by multiple proxy servers information.
Alternatively, the transport module is additionally operable to send predetermined hash function to client;The default Hash letter
Number is used for the information according to the multiple proxy server for the client, and the title of file to be visited determines a visit
Ask proxy server used in the file to be visited.
A kind of file access system, including:At least one central server, at least one client, multiple agency services
Device;
The central server is used to determine multiple proxy servers for client, to determined by client transmission
The information of multiple proxy servers;
The client is used for according to the title of file to be visited, pre-defined rule and the multiple proxy server
Information, determines the corresponding proxy server of the file to be visited, to the corresponding proxy server of file to be visited send for
The access request of the file to be visited.
Alternatively, the information of the multiple proxy server is stored in proxy server list;
The central server is additionally operable to send predetermined hash function to client;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server,
Determine that the corresponding proxy server of the file to be visited includes:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash
It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
Alternatively, the client is additionally operable to when according to the title of file to be visited, pre-defined rule and the multiple generation
The information of server is managed, after determining the corresponding proxy server of the file to be visited, if detecting that file to be visited corresponds to
Proxy server failure, then the information of the proxy server of failure, root are removed from the information of the multiple proxy server
According to the information of remaining proxy server after the title of file to be visited, pre-defined rule and removal, text to be visited is redefined
The corresponding proxy server of part.
Alternatively, proxy server be used for attempt to obtain file to be visited write lock failure after, sent out to central server
Act the operation for writing lock for seizing the file to be visited;After seizing the writing and lock successfully of the file to be visited, to described to be visited
File carries out write operation.
A kind of electronic equipment for being used to carry out file access, to contain at least one central server, at least one visitor
Family end, multiple proxy servers system in, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists
When reading execution by the processor, operations described below is performed:
The information of multiple proxy servers is obtained from central server;
According to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, described treat is determined
Access the corresponding proxy server of file;
The access request for the file to be visited is sent to the corresponding proxy server of file to be visited.
A kind of electronic equipment for being used to carry out file access, to contain at least one central server, at least one visitor
Family end, multiple proxy servers system in, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists
When reading execution by the processor, operations described below is performed:
Multiple proxy servers are determined for client;
To the information of multiple proxy servers determined by client transmission.
Further aspect of the application, there is provided a kind of file access method, device and electronic equipment, when to some text
After part carries out the proxy server failure of write operation, this document can be occupied by other proxy servers writes lock, so as to complete
The write operation of this document.
The application adopts the following technical scheme that.
A kind of file access method, to contain at least one central server, multiple proxy servers system in, bag
Include:
Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server
Access the operation for writing lock of file;
After the proxy server seizes the writing and lock successfully of the file to be visited, the file to be visited is grasped into row write
Make.
A kind of file access device, to contain at least one central server, multiple proxy servers system in, bag
Include:
Initiation module, for attempt to obtain file to be visited write lock failure after, initiate to seize institute to central server
State the operation for writing lock of file to be visited;
Operation module, for after the writing and lock successfully of the file to be visited is seized, to the file to be visited into row write
Operation.
A kind of electronic equipment for being used to carry out file access, takes to contain at least one central server, multiple agencies
It is engaged in the system of device, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists
When reading execution by the processor, operations described below is performed:
Attempt to obtain file to be visited write lock failure after, initiate to seize the file to be visited to central server
Write the operation of lock;After seizing the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
The application includes advantages below:
In at least one embodiment of the application, client disposably obtains the information of multiple proxy servers, is accessing text
Proxy server used in can voluntarily being determined during part, without accessing central server, therefore can reduce center service
The pressure of device, reduces access delay, improves access efficiency;Same client be directed to different files to be visited there is a possibility that with
Different proxy servers, therefore can concentrate to avoid access of the client to file and be completed by a proxy server.
In a kind of implementation of the embodiment of the present application, once client, which is reached the standard grade, will obtain the letter of multiple proxy servers
Breath, without when accessing file whereabouts central server ask, therefore further increase access efficiency.
In a kind of implementation of the embodiment of the present application, when the proxy server originally used fails, Ke Yiji
It is continuous to access, without being asked again to central server, therefore it can realize to the fault-tolerant of proxy server so that in base
It can also be provided after proxy server failure in the distributed memory system of agency and continue efficient distributed storage service.
In at least one embodiment of the application, after the proxy server that write operation is carried out to some file fails,
This document can be occupied by other proxy servers writes lock, so as to complete the write operation of this document.
Certainly, implementing any product of the application must be not necessarily required to reach all the above advantage at the same time.
Brief description of the drawings
Fig. 1 is the configuration diagram for the system that file access is carried out to distributed memory system;
Fig. 2 is a kind of flow chart of file access method of embodiment one;
Fig. 3 is the schematic diagram of the example of embodiment one;
Fig. 4 is a kind of flow chart of file access method of embodiment two;
Fig. 5 is a kind of flow chart of file access method of embodiment three;
Fig. 6 is a kind of flow chart of file access method of example IV;
Fig. 7 is a kind of schematic diagram of file access device of embodiment five;
Fig. 8 is a kind of schematic diagram of file access device of embodiment six;
Fig. 9 is a kind of schematic diagram of file access device of embodiment seven.
Embodiment
The technical solution of the application is described in detail below in conjunction with accompanying drawings and embodiments.
If it should be noted that not conflicting, each feature in the embodiment of the present application and embodiment can be tied mutually
Close, within the protection domain of the application.In addition, though logical order is shown in flow charts, but in some situations
Under, can be with the steps shown or described are performed in an order that is different from the one herein.
In one configuration, the computing device of client or server may include one or more processors (CPU), defeated
Enter/output interface, network interface and memory (memory).
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.Memory may include module 1, module 2 ... ..., module N (N is the integer more than 2).
Computer-readable medium includes permanent and non-permanent, removable and non-movable storage medium, can be by appointing
What method or technique realizes that information stores.Information can be computer-readable instruction, data structure, the module of program or other
Data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only storage
(ROM), electrically erasable programmable read-only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, disk storage or other magnetic
Property storage device or any other non-transmission medium, the information that can be accessed by a computing device available for storage.According to herein
Define, computer-readable medium does not include non-temporary computer readable media (transitory media), such as modulation data
Signal and carrier wave.
Embodiment one, a kind of file access method, to contain at least one central server, at least one client,
In the system of multiple proxy servers, as shown in Fig. 2, including S110~S130:
S110, client obtain the information of multiple proxy servers from central server;
S120, the client are according to the title of file to be visited, pre-defined rule and the multiple proxy server
Information, determines the corresponding proxy server of the file to be visited;
S130, the client send the visit for the file to be visited to the corresponding proxy server of file to be visited
Ask request.
In the present embodiment, client disposably obtains the information of multiple proxy servers, can be voluntarily when accessing file
Proxy server used in determining, without accessing central server, therefore can reduce access delay, improve and access effect
Rate;In addition, same client is directed to different files to be visited there is a possibility that with different proxy servers, therefore can keep away
Exempt from access of the client to file to concentrate by a proxy server completion.
It is described to include at least one central server, at least one client, multiple proxy servers in the present embodiment
System can be, but not limited to be used to carry out file access to distributed memory system.The proxy server can be, but not limited to lead to
The file in sdk access distributed memory systems is crossed, agency service is provided to client by REST API.
In the present embodiment, the access to file can include reading or writing, and correspondingly, access request includes reading or writing request.
In the present embodiment, client determines corresponding proxy server when accessing some file for the first time, as long as the agency takes afterwards
Business device occurs without the situations of the failures such as the machine of delaying, Network Abnormal, and when client subsequent access this document can all pass through this document pair
The proxy server answered carries out, without being interacted again with central server.
In the present embodiment, client can be before file be accessed all according to the title of file, pre-defined rule, Yi Jiduo every time
The information of a proxy server determines proxy server;Can also only have when accessing some file for the first time according to the name of file
The information of title, pre-defined rule and multiple proxy servers determines proxy server, preserves the title and correspondence for accessing file
Proxy server, can be directly according to the record queries of preservation to corresponding server in subsequent access this document.
In a kind of implementation, step S110 can include:
Client initiates operation of reaching the standard grade to central server, and the information of multiple proxy servers is received from central server.
In this implementation, once client, which is reached the standard grade, will obtain the information of multiple proxy servers, without accessing
Whereabouts central server is asked during file, therefore further increases access efficiency.
In other implementations, information from client to central server request agency server that can be from, receives center
The information for multiple proxy servers that server returns.
In a kind of implementation, the information of multiple proxy servers can be, but not limited to the shape using proxy server list
Formula;The information of proxy server can include the address of proxy server, can also include the mark of proxy server;The mark
Knowledge can be, but not limited to be sequence number of the proxy server in proxy server list.
In other implementations, the information of multiple proxy servers can also include other contents, in addition can also use
Other forms show.
In this implementation, in step S130, client can send to visit to the address of identified proxy server
Ask request.
In this implementation, the proxy server list that different clients obtain is possible to different, but is also not excluded for two
The situation that the proxy server list of client is exactly like occurs.In addition, it is also possible to agency's clothes that two clients obtain
The address of the proxy server included in business device list is identical, but in two proxy server lists, same proxy server
The corresponding sequence number in address it is different.
In a kind of implementation, the information of the multiple proxy server is stored in proxy server list;Step
S120 can include:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash
It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
In this implementation, proxy server list can be, but not limited to the local cache of equipment where being stored in client
In.Can be that the information of multiple proxy servers is sent to client by central server in the form of proxy server list,
Can also be that the information of the multiple proxy servers received from central server is stored in proxy server list by client.
In this implementation, the ground of one-to-one sequence number and proxy server can be included in proxy server list
Location, wherein each sequence number represents a proxy server;Wherein, it is described according to Hash operation as a result, from proxy server arrange
Determine that the corresponding proxy server of the file to be visited can include in table:
The result of client Hash operation to the number of proxy server (i.e. received proxy server information
In, the number of address or sequence number) modulo operation is carried out, sequence number is determined according to the result of modulo operation, by proxy server list
In the sequence number represent proxy server as the corresponding proxy server of file to be visited;Correspondingly, in step s 130, it is
Access request is sent to the address of the corresponding proxy server of identified sequence number.For example assume that the received information of client is:
Sequence number 1, corresponding address A;Sequence number 2, corresponding address B.If modulo operation the result is that be in 1, step S130 to address A send out
Send access request.
In other implementations, the title of file can also be directed to and other parameters carry out Hash calculation together, it is described its
Its parameter be such as but not limited to be client mark.
In other implementations, the corresponding agency service of file to be visited can also be determined according to other pre-defined rules
Device a, as long as proxy server can be uniquely determined in multiple proxy servers.
In a kind of implementation, the method can also include:The client obtains predetermined Kazakhstan from central server
Uncommon function.
In this implementation, client can be when obtaining the information of multiple proxy servers, obtain in the lump described predetermined
Hash function, the information of multiple proxy servers and predetermined hash function can also be obtained respectively.
In this implementation, the predetermined hash function that different clients are obtained may be the same or different.
In other implementations, the predetermined hash function can also pre-save in the client.
In a kind of implementation, it can also include after step S120:
If detecting the corresponding proxy server failure of file to be visited, the client takes from the multiple agency
The information of the proxy server of failure is removed in the information of business device, according to the title of file to be visited, pre-defined rule and is removed
The information of remaining proxy server afterwards, redefines the corresponding proxy server of file to be visited.
In this implementation, if having redefined the corresponding proxy server of file to be visited, it is in step S130
The access request for the file to be visited is sent to the proxy server redefined.
In correlation technique, when a proxy server because situations such as machine, Network Abnormal, software anomaly exit of delaying is failed
When, usually there are two kinds of processing methods:
First, after running into proxy server exception, client returns to failure information.This processing method be generally used for point
The occasion of the less business of data volume is read and write in cloth storage system, after client interacts once with agency, there will be no follow-up
Operation.For the very big business of read-write data volume (client interacts repeatedly with agency), this method can not provide lasting point
Cloth storage service.
Second, after running into proxy server exception, client asks a new agency service to central server again
Device, then proceedes to initiate read-write service to new proxy server.This processing method requires each read-write requests of client all
To be interacted with central server, this can cause central server very big access pressure;In addition, each read-write requests are all
To pass through central server and proxy server, this can cause the access delay of client to significantly increase, and this method can not carry
For efficient distributed storage service.
In this implementation, when the proxy server originally used fails, it can continue to access, without
Ask, therefore can realize to the fault-tolerant of proxy server to central server again so that deposited in the distribution based on agency
It can also be provided after proxy server failure in storage system and continue efficient distributed storage service.
In this implementation, removing the information of the proxy server of failure can refer to delete from proxy server list
The information such as the sequence number of the proxy server of failure and address, renumbers the address of remaining proxy server after removal.When
To the title of file to be visited carry out Hash operation, to operation result modulus by way of redefine proxy server when,
Since the number that proxy server in server list is acted on behalf of after removal is also accordingly reduced, and the sequence number of each proxy server
Changed, thus the result of modulo operation by be still remove failure proxy server information after proxy server list
In some sequence number.
In this implementation, the information for removing the proxy server of failure can be temporarily by the information of the proxy server
Blacklist is put into, knowing how the proxy server recovers normal, can also be by the Information recovering of the proxy server to agency
In server list.
In this implementation, after redefining corresponding proxy server for a file, afterwards for this file
All access all initiated to the proxy server that redefines.
In this implementation, if since multiple proxy servers fail in succession, the agency that client is obtained is caused to take
The information of business device all deleted the number of light or proxy server less than predetermined threshold (such as in the case where predetermined threshold is 3,
Only it is left the information of 2 proxy servers in the proxy server list of client), then client can be again to center service
The information of device request agency server, central server can retransmit the information of one or more proxy servers to client
As supplement.
Illustrate the present embodiment with an example below, which applies in system as shown in Figure 1, as shown in figure 3, objective
The operating process at family end includes the following steps 201~204:
201st, client initiates operation of reaching the standard grade to central server;
202nd, central server returns to response message to client.Response message include a proxy server list and
One hash function;
203rd, client is when needing to read or write file a, according to hash function and the result of calculation of the title of file a, from
The corresponding proxy servers of file a are determined in proxy server list, it is assumed that be proxy server 21, i.e.,:Reading for file a
Operation should go on proxy server 21 to ask, and then client reads or writes request to the initiation file of proxy server 21 a;
204th, proxy server 21 performs read or write request of the client to file a, and the result for reading or writing request is made
Client is returned to for response.
In the case of proxy server 21 is normal, client is all to agency for the read request and write request of file a
Server 21 is initiated.If proxy server 21 fails, then client removes proxy server 21 from proxy server list,
When needing to read or write file a, step 205~206 are performed:
205th, again according to hash function and the result of calculation of the title of file a, from the generation for having removed proxy server 21
Manage in server list, determine the corresponding proxy servers of file a, it is assumed that be proxy server 22, client is to agency service
The initiation file of device 22 a's reads or writes request;
206th, proxy server 22 performs read or write request of the client to file a, and the result for reading or writing request is made
Client is returned to for response.
If proxy server 22 also fails, then processing mode when client fails according to proxy server 21 carries out phase
It should handle.
This example can guarantee that when some proxy server the machine of delaying, Network Abnormal or process exception occurs and exits, still
It can be provided for client and continue and efficiently service.
Embodiment two, a kind of file access method, to contain at least one central server, at least one client,
In the system of multiple proxy servers, as shown in figure 4, including S210~S220:
S210, central server determine multiple proxy servers for client;
The information of multiple proxy servers determined by S220, the central server to client transmission.
In the present embodiment, the information that the central server is sent to multiple proxy servers of client can be used for supplying
Client therefrom selects to access the proxy server that file uses.
In the present embodiment, client need not be interacted with central server again when accessing file, therefore can be reduced
Access delay, improves access efficiency.
In the present embodiment, it is described comprising at least one central server, at least one client, multiple proxy servers
System can be, but not limited to be used for distributed memory system carry out file access.The proxy server can be, but not limited to
File in distributed memory system is accessed by sdk, agency service is provided to client by REST API.
In a kind of implementation, proxy server that central server is determined for client can be central server according to
The network topology of client and proxy server, the information such as loading condition of proxy server determines, such as to Mr. Yu
A client, can hop count is less and the relatively low proxy server of load between prioritizing selection and the client, as being sent to
The proxy server of client.Central server can determine proxy server according to predetermined strategy for client.
In a kind of implementation, it can also include before the step S210:
The central server receives the operation of reaching the standard grade that the client is initiated.
I.e.:Client is reached the standard grade to central server initiation after operation, and central server carries out step S210~S220.
In this implementation, once client, which is reached the standard grade, will obtain the information of multiple proxy servers, without accessing
Whereabouts central server is asked during file, therefore further increases access efficiency.
In other implementations, can be from client to the information of central server request agency server after, center
Server performs step S210~S220;Can also be central server periodically or when thinking to need, perform step S210~
S220;Such as the network topology of client and proxy server change after, for another example proxy server loading condition hair
When having given birth to great changes, after the proxy server that fails for another example is resumed, central server, which can consider, to be needed again for visitor
Family end determines proxy server, in this case can perform step S210~S220.
In a kind of implementation, the information of multiple proxy servers can be, but not limited to the shape using proxy server list
Formula;Except the address of each proxy server can be included in proxy server list, each proxy server can also be included
Mark;The mark can be, but not limited to be sequence number of the proxy server in proxy server list.
In this implementation, the proxy server list that different clients obtain is possible to different, but is also not excluded for two
The situation that the proxy server list of client is exactly like occurs.In addition, it is also possible to agency's clothes that two clients obtain
The address of the proxy server included in business device list is identical, but in two proxy server lists, same proxy server
The corresponding sequence number in address it is different.
In other implementations, the information of multiple proxy servers can also include other contents, in addition can also use
Other forms show.
In a kind of implementation, the method can also include:The central server sends predetermined Kazakhstan to client
Uncommon function;The default hash function is used for the information according to the multiple proxy server for the client, and treats
The title for accessing file determines that accesses a proxy server used in the file to be visited.
Wherein, central server can be when sending the information of multiple proxy servers, send predetermined Hash in the lump
Function, can also send the information of multiple proxy servers and predetermined hash function respectively.
Wherein, central server is sent to the predetermined hash functions of different clients and may be the same or different.
In this implementation, client can carry out Hash operation, the knot obtained according to Hash operation according to hash function
Fruit, can uniquely determine a proxy server in proxy server list.
When central server uses the method for the present embodiment, the operation of client may refer to embodiment one.
Embodiment three, a kind of file access method, to contain at least one central server, multiple proxy servers
In system, as shown in figure 5, including S310~S320:
S310, proxy server attempt to obtain file to be visited write lock failure after, initiate to seize to central server
The operation for writing lock of the file to be visited;
After S320, the proxy server seize the writing and lock successfully of the file to be visited, to the file to be visited into
Row write operates.
, can be by other generations after the proxy server that write operation is carried out to some file fails in the present embodiment
What reason server occupied this document writes lock, so as to complete the write operation of this document.
In the present embodiment, it is described comprising at least one central server, multiple proxy servers system can with but it is unlimited
In for carrying out file access to distributed memory system.The proxy server, which can be, but not limited to access by sdk, to be distributed
File in formula storage system, agency service is provided by REST API to client.
In the scene of the distributed memory system written document based on agency, for writing for specific file, at usual one
Between only allow a proxy server to carry out in section, implementation method is the lock of writing that proxy server occupies this document, and is being write
During constantly update and occupy to writing lock, until write operation is completed.
After some proxy server is failing during writing some file, the lock of writing of file that it occupies may not necessarily be by
Normal release, so when originally to the proxy server send the client of write request again to the proxy server redefined again
It is secondary when initiating to the write request of this document or when other clients initiate write request by proxy server to this document, to this
File carry out write operation proxy server can due to do not account for it is documentary write lock and the situation for writing failure occurs.
In correlation technique, proxy server can return to client and write failure.
In the present embodiment, when proxy server is attempted to obtain after writing lock failure of file, it can be initiated to central server
The operation for writing lock of this file is seized, originally occupied the proxy server for writing lock of this document due to failure, so will not join
Lock is write with seizing;So get after writing lock, proxy server can continue to provide write operation.This process can be to client
It is transparent.
Such as in the example of embodiment one, if proxy server 22 receives write request of the client to file a, then it
That attempts whereabouts central server acquisition file a writes lock, obtains and successfully then continues write operation;If due to proxy server 21 still
That occupies file a writes lock, and cause proxy server 22 obtain write lock it is unsuccessful, then proxy server 22 to central server send out
Rise and seize the operation for writing lock of file a, rob account for file a write lock after, continue write operation.
In the present embodiment, when proxy server fails, the way of client can be found in embodiment one.
Example IV, a kind of file access method, to contain at least one central server, at least one client,
In the storage system of multiple proxy servers, as shown in fig. 6, the described method includes S410~S420:
S410, central server determine multiple proxy servers for client, to the client send determined by it is more
The information of a proxy server;
S420, the client are according to the title of file to be visited, pre-defined rule and the multiple proxy server
Information, determines the corresponding proxy server of the file to be visited, to the corresponding proxy server of file to be visited send for
The access request of the file to be visited.
In a kind of implementation, it can also include before the step S410:
The central server receives the operation of reaching the standard grade that the client is initiated.
In a kind of implementation, the information of the multiple proxy server is stored in proxy server list;
The method can also include:The central server sends predetermined hash function to client;
In this implementation, the client is according to the title of file to be visited, pre-defined rule and the multiple agency
The information of server, determines that the corresponding proxy server of the file to be visited can include:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash
It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
In a kind of implementation, the client is according to the title of file to be visited, pre-defined rule and the multiple generation
The information of server is managed, can also be included after determining the corresponding proxy server of the file to be visited:
If detecting the corresponding proxy server failure of file to be visited, the client takes from the multiple agency
The information of the proxy server of failure is removed in the information of business device, according to the title of file to be visited, pre-defined rule and is removed
The information of remaining proxy server afterwards, redefines the corresponding proxy server of file to be visited.
In this implementation, if having redefined the corresponding proxy server of file to be visited, to file to be visited
When corresponding proxy server sends the access request for the file to be visited, sent out to the proxy server redefined
Send the access request for the file to be visited.
In this implementation, the method can also include:
Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server
Access the operation for writing lock of file;
After the proxy server seizes the writing and lock successfully of the file to be visited, the file to be visited is grasped into row write
Make.
In the present embodiment, the operation performed by client corresponds to embodiment one, the operation pair performed by central server
Embodiment three should be corresponded in embodiment two, the operation performed by proxy server, the other of the present embodiment realize that details can phase
Should be referring to embodiment one, two, three.
One example of the present embodiment is as follows, including following process:
Client process can initiate operation of reaching the standard grade, central server is according to visitor when initialization to central server
The information such as loading condition of the network topology of family end and proxy server, proxy server, returns to Client Agent clothes
Business device list and a hash function.The effect of hash function is according to the title of file to be visited, in proxy server list
In obtain unique proxy server address.
Before client does read or write to some file, Hash fortune is carried out to the title of this document using hash function
Calculate, according to the proxy server corresponding to the result of Hash operation definite this document in proxy server list, be directed to afterwards
All reading and writing request of this file can all be sent to this proxy server.During read-write, client will not be genuinely convinced with again
Business device does any interaction.
When certain proxy server because power down delays that machine, network are obstructed or process exception exits and after failure, client
The proxy server of this failure is rejected from proxy server list, then the title of this document is carried out using hash function
Hash operation, this document in proxy server list is redefined according to the result of Hash operation corresponding to new agency's clothes
Business device address, afterwards all reading and writing operation for this file are all initiated to new proxy server.
New proxy server attempt to obtain file to be visited write lock failure after, initiate to seize institute to central server
That states file to be visited writes the operation of lock, if after seizing the writing and lock successfully of the file to be visited, to the text to be visited
Part carries out write operation, and result is fed back to client.
In the present embodiment, the detail that client, central server, proxy server are operated can be respectively referring to reality
Apply example one, two, three.
Embodiment five, a kind of file access device, to contain at least one central server, at least one client,
In the system of multiple proxy servers, as shown in fig. 7, comprises:
Interactive module 51, for obtaining the information of multiple proxy servers from central server;
Determining module 52, for the title according to file to be visited, pre-defined rule and the multiple proxy server
Information, determines the corresponding proxy server of the file to be visited;
Access modules 53, for sending the visit for the file to be visited to the corresponding proxy server of file to be visited
Ask request.
In the present embodiment, interactive module 51 is to be responsible for obtaining the part of the information of multiple proxy servers in above device,
It can be the combination of software, hardware or both.
In the present embodiment, determining module 52 is to be responsible for determining the corresponding agency service of the file to be visited in above device
The part of device, can be the combination of software, hardware or both.
In the present embodiment, access modules 53 are to be responsible for sending the access request for the file to be visited in above device
Part, can be software, hardware or both combination.
The file access device of the present embodiment can be arranged in client.
In a kind of implementation, the information of the multiple proxy server is stored in proxy server list;
The determining module is according to the letter of the title of file to be visited, pre-defined rule and the multiple proxy server
Breath, determines that the corresponding proxy server of the file to be visited can include:
The determining module carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash
Computing as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
In this implementation, the interactive module can be also used for obtaining predetermined hash function from central server.
In a kind of implementation, the determining module can be also used for the title according to file to be visited, pre-defined rule,
And the information of the multiple proxy server, after determining the corresponding proxy server of the file to be visited, if detected
The corresponding proxy server failure of file to be visited, then the client removes mistake from the information of the multiple proxy server
The information of the proxy server of effect, according to remaining proxy server after the title of file to be visited, pre-defined rule and removal
Information, redefine the corresponding proxy server of file to be visited.
The operation of each module of file access device of the present embodiment correspond respectively to step S110 in embodiment one~
S130, each the other of module operation realize that details can be found in embodiment one.
Embodiment six, a kind of file access device, to contain at least one central server, at least one client,
In the system of multiple proxy servers, as shown in figure 8, including:
Selecting module 61, for determining multiple proxy servers for client;
Transport module 62, for the client send determined by multiple proxy servers information.
In the present embodiment, selecting module 61 is that the portion that client determines multiple proxy servers is responsible in above device
Divide, can be the combination of software, hardware or both.
In the present embodiment, transport module 62 is responsible in above device to multiple agencies determined by client transmission
The part of the information of server, can be the combination of software, hardware or both.
The file access device of the present embodiment can be arranged in central server.
In a kind of implementation, the transport module can be also used for sending predetermined hash function to client;It is described
Default hash function is used for the information according to the multiple proxy server for the client, and the name of file to be visited
Claim to determine that accesses a proxy server used in the file to be visited.
The operation of each module of file access device of the present embodiment correspond respectively to step S210 in embodiment two~
S220, each the other of module operation realize that details can be found in embodiment two.
Embodiment seven, a kind of file access device, to contain at least one central server, multiple proxy servers
In system, as shown in figure 9, including:
Initiation module 71, for attempt to obtain file to be visited write lock failure after, initiate to seize to central server
The operation for writing lock of the file to be visited;
Operation module 72, for after the writing and lock successfully of the file to be visited is seized, being carried out to the file to be visited
Write operation.
In the present embodiment, initiation module 71 is to be responsible for initiating to seize the text to be visited to central server in above device
The part of the operation for writing lock of part, can be the combination of software, hardware or both.
In the present embodiment, operation module 72 is to be responsible for locking successfully seizing the writing for file to be visited in above device
Afterwards, the part of write operation is carried out to the file to be visited, can be the combination of software, hardware or both.
The file access device of the present embodiment can be arranged in proxy server.
The operation of each module of file access device of the present embodiment correspond respectively to step S310 in embodiment three~
S320, each the other of module operation realize that details can be found in embodiment three.
Embodiment eight, a kind of file access system, including:It is at least one central server, at least one client, multiple
Proxy server, wherein:
The central server is used to determine multiple proxy servers for client, to determined by client transmission
The information of multiple proxy servers;
The client is used for according to the title of file to be visited, pre-defined rule and the multiple proxy server
Information, determines the corresponding proxy server of the file to be visited, to the corresponding proxy server of file to be visited send for
The access request of the file to be visited.
In a kind of implementation, the information of the multiple proxy server is stored in proxy server list;
The central server can be also used for sending predetermined hash function to client;
The client according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server,
Determine that the corresponding proxy server of the file to be visited can include:
The client carries out Hash operation according to predetermined hash function to the title of file to be visited, is transported according to Hash
It is calculating as a result, determining the corresponding proxy server of the file to be visited from proxy server list.
In a kind of implementation, the client can be also used for when according to the title of file to be visited, pre-defined rule, with
And the information of the multiple proxy server, after determining the corresponding proxy server of the file to be visited, treated if detected
The corresponding proxy server failure of file is accessed, then the client removes failure from the information of the multiple proxy server
Proxy server information, remaining proxy server according to the title of file to be visited, pre-defined rule and after removing
Information, redefines the corresponding proxy server of file to be visited.
In a kind of implementation, proxy server can be used for attempt to obtain file to be visited write lock failure after, to
Central server initiates to seize the operation for writing lock of the file to be visited;After seizing the writing and lock successfully of the file to be visited,
Write operation is carried out to the file to be visited.
In the present embodiment, the detail that client, central server, proxy server are operated can be respectively referring to reality
Apply example one, two, three.
Embodiment nine, a kind of electronic equipment for being used to carry out file access, to contain at least one central server, extremely
In a few client, the system of multiple proxy servers, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists
When reading execution by the processor, operations described below is performed:
The information of multiple proxy servers is obtained from central server;
According to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, described treat is determined
Access the corresponding proxy server of file;
The access request for the file to be visited is sent to the corresponding proxy server of file to be visited.
The electronic equipment of the present embodiment can be the equipment where client in embodiment one.
In the present embodiment, for carrying out the program of file access when being read out by the processor execution, performed operation pair
Should be in step S110~S130 in embodiment one;Other details of operation performed by the program can be found in embodiment one.
Embodiment ten, a kind of electronic equipment for being used to carry out file access, to contain at least one central server, extremely
In a few client, the system of multiple proxy servers, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists
When reading execution by the processor, operations described below is performed:
Multiple proxy servers are determined for client;
To the information of multiple proxy servers determined by client transmission.
The electronic equipment of the present embodiment can be the central server of embodiment two.
In the present embodiment, for carrying out the program of file access when being read out by the processor execution, performed operation pair
Should be in step S210 and S220 in embodiment two;Other details of operation performed by the program can be found in embodiment two.
Embodiment 11, it is a kind of be used to carry out the electronic equipment of file access, to contain at least one central server,
In the system of multiple proxy servers, including:Memory and processor;
The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access exists
When reading execution by the processor, operations described below is performed:
Attempt to obtain file to be visited write lock failure after, initiate to seize the file to be visited to central server
Write the operation of lock;After seizing the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
The electronic equipment of the present embodiment can be the proxy server of embodiment three.
In the present embodiment, for carrying out the program of file access when being read out by the processor execution, performed operation pair
Should be in step S310 and S320 in embodiment three;Other details of operation performed by the program can be found in embodiment three.
One of ordinary skill in the art will appreciate that all or part of step in the above method can be instructed by program
Related hardware is completed, and described program can be stored in computer-readable recording medium, such as read-only storage, disk or CD
Deng.Alternatively, all or part of step of above-described embodiment can also be realized using one or more integrated circuits.Accordingly
Ground, each module/unit in above-described embodiment can be realized in the form of hardware, can also use the shape of software function module
Formula is realized.The application is not restricted to the combination of the hardware and software of any particular form.
Certainly, the application can also have other various embodiments, ripe in the case of without departing substantially from the application spirit and its essence
Know those skilled in the art when can be made according to the application it is various it is corresponding change and deformation, but these corresponding change and become
Shape should all belong to the protection domain of claims hereof.
Claims (27)
- A kind of 1. file access method, to contain at least one central server, at least one client, multiple agency services In the system of device, including:Client obtains the information of multiple proxy servers from central server;The client is determined according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server The corresponding proxy server of the file to be visited;The client sends the access request for the file to be visited to the corresponding proxy server of file to be visited.
- 2. file access method as claimed in claim 1, it is characterised in that the client obtains multiple from central server The information of proxy server includes:Client initiates operation of reaching the standard grade to central server, and the information of multiple proxy servers is received from central server.
- 3. file access method as claimed in claim 1, it is characterised in that the information of the multiple proxy server is stored in In proxy server list;The client is according to the title of file to be visited, pre-defined rule and the multiple agency service The information of device, determines that the corresponding proxy server of the file to be visited includes:The client carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash operation As a result, the corresponding proxy server of the file to be visited is determined from proxy server list.
- 4. file access method as claimed in claim 3, it is characterised in that further include:The client is from central server Obtain predetermined hash function.
- 5. such as file access method according to any one of claims 1 to 4, it is characterised in that the client is according to waiting to visit Ask the information of the title of file, pre-defined rule and the multiple proxy server, determine the file to be visited corresponding generation Further included after reason server:If detecting the failure of file to be visited corresponding proxy server, the client is from the multiple proxy server Information in remove failure proxy server information, according to the title of file to be visited, pre-defined rule and remove after remain The information of remaining proxy server, redefines the corresponding proxy server of file to be visited.
- A kind of 6. file access method, to contain at least one central server, at least one client, multiple agency services In the system of device, including:Central server determines multiple proxy servers for client;The information of multiple proxy servers determined by the central server to client transmission.
- 7. file access method as claimed in claim 6, it is characterised in that the central server determines multiple for client Further included before proxy server:The central server receives the operation of reaching the standard grade that the client is initiated.
- 8. file access method as claimed in claim 6, it is characterised in that further include:The central server sends predetermined hash function to client;The default hash function is used to supply the client The information according to the multiple proxy server, and the title of file to be visited is held to determine that accesses the file to be visited Used proxy server.
- 9. a kind of file access method, to contain at least one central server, multiple proxy servers system in, bag Include:Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize to central server described to be visited The operation for writing lock of file;After the proxy server seizes the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
- 10. a kind of file access method, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, including:Central server determines multiple proxy servers for client, to multiple agency services determined by client transmission The information of device;The client is determined according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server The corresponding proxy server of the file to be visited, sends for described to be visited to the corresponding proxy server of file to be visited The access request of file.
- 11. file access method as claimed in claim 10, it is characterised in that the central server determines more for client Further included before a proxy server:The central server receives the operation of reaching the standard grade that the client is initiated.
- 12. file access method as claimed in claim 10, it is characterised in that the information of the multiple proxy server preserves In proxy server list;The method further includes:The central server sends predetermined hash function to client;The client is determined according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server The corresponding proxy server of the file to be visited includes:The client carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash operation As a result, the corresponding proxy server of the file to be visited is determined from proxy server list.
- 13. the file access method as any one of claim 10~12, it is characterised in that the client is according to treating The information of the title of file, pre-defined rule and the multiple proxy server is accessed, determines that the file to be visited is corresponding Further included after proxy server:If detecting the failure of file to be visited corresponding proxy server, the client is from the multiple proxy server Information in remove failure proxy server information, according to the title of file to be visited, pre-defined rule and remove after remain The information of remaining proxy server, redefines the corresponding proxy server of file to be visited.
- 14. file access method as claimed in claim 13, it is characterised in that further include:Proxy server attempt to obtain file to be visited write lock failure after, initiate to seize to central server described to be visited The operation for writing lock of file;After the proxy server seizes the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
- 15. a kind of file access device, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, it is characterised in that including:Interactive module, for obtaining the information of multiple proxy servers from central server;Determining module, for the information of the title according to file to be visited, pre-defined rule and the multiple proxy server, Determine the corresponding proxy server of the file to be visited;Access modules, the access for being sent to the corresponding proxy server of file to be visited for the file to be visited please Ask.
- 16. file access device as claimed in claim 15, it is characterised in that the information of the multiple proxy server preserves In proxy server list;The determining module is according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, really Determining the corresponding proxy server of the file to be visited includes:The determining module carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash operation As a result, determining the corresponding proxy server of the file to be visited from proxy server list;The interactive module is additionally operable to obtain predetermined hash function from central server.
- 17. the file access device as described in claim 15 or 16, it is characterised in that:The determining module is additionally operable in the title according to file to be visited, pre-defined rule and the multiple proxy server Information, after determining the corresponding proxy server of the file to be visited, if detect file to be visited it is corresponding agency clothes Business device failure, then remove the information of the proxy server of failure, according to be visited from the information of the multiple proxy server The title of file, pre-defined rule and after removing remaining proxy server information, it is corresponding to redefine file to be visited Proxy server.
- 18. a kind of file access device, takes to contain at least one central server, at least one client, multiple agencies It is engaged in the system of device, it is characterised in that including:Selecting module, for determining multiple proxy servers for client;Transport module, for the client send determined by multiple proxy servers information.
- 19. file access device as claimed in claim 18, it is characterised in that:The transport module is additionally operable to send predetermined hash function to client;The default hash function is used for described in confession Client determines that an access is described to be visited according to the information of the multiple proxy server, and the title of file to be visited Proxy server used in file.
- 20. a kind of file access device, to contain at least one central server, multiple proxy servers system in, its It is characterized in that, including:Initiation module, for attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server Access the operation for writing lock of file;Operation module, for after the writing and lock successfully of the file to be visited is seized, write operation to be carried out to the file to be visited.
- 21. a kind of file access system, including:At least one central server, at least one client, multiple agency services Device, it is characterised in that:The central server is used to determine multiple proxy servers for client, to the client send determined by it is multiple The information of proxy server;The client is used for the information according to the title of file to be visited, pre-defined rule and the multiple proxy server, Determine the corresponding proxy server of the file to be visited, send to the corresponding proxy server of file to be visited and treated for described Access the access request of file.
- 22. file access system as claimed in claim 21, it is characterised in that:The information of the multiple proxy server preserves In proxy server list;The central server is additionally operable to send predetermined hash function to client;The client is determined according to the information of the title of file to be visited, pre-defined rule and the multiple proxy server The corresponding proxy server of the file to be visited includes:The client carries out Hash operation according to predetermined hash function to the title of file to be visited, according to Hash operation As a result, the corresponding proxy server of the file to be visited is determined from proxy server list.
- 23. the file access system as described in claim 21 or 22, it is characterised in that:The client is additionally operable to when according to the title of file to be visited, pre-defined rule and the multiple proxy server Information, after determining the corresponding proxy server of the file to be visited, if detecting the corresponding agency service of file to be visited Device fails, then the information of the proxy server of failure is removed from the information of the multiple proxy server, according to text to be visited The title of part, pre-defined rule and after removing remaining proxy server information, redefine file to be visited corresponding generation Manage server.
- 24. file access system as claimed in claim 23, it is characterised in that:Proxy server be used for attempt to obtain file to be visited write lock failure after, initiate to seize described treat to central server Access the operation for writing lock of file;After seizing the writing and lock successfully of the file to be visited, the file to be visited is grasped into row write Make.
- A kind of 25. electronic equipment for being used to carry out file access, to contain at least one central server, at least one client Hold, in the system of multiple proxy servers, including:Memory and processor;It is characterized in that:The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access is by institute When stating processor reading execution, operations described below is performed:The information of multiple proxy servers is obtained from central server;According to the information of the title of file to be visited, pre-defined rule and the multiple proxy server, determine described to be visited The corresponding proxy server of file;The access request for the file to be visited is sent to the corresponding proxy server of file to be visited.
- A kind of 26. electronic equipment for being used to carry out file access, to contain at least one central server, at least one client Hold, in the system of multiple proxy servers, including:Memory and processor;It is characterized in that:The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access is by institute When stating processor reading execution, operations described below is performed:Multiple proxy servers are determined for client;To the information of multiple proxy servers determined by client transmission.
- A kind of 27. electronic equipment for being used to carry out file access, to contain at least one central server, multiple agency services In the system of device, including:Memory and processor;It is characterized in that:The memory is used to preserve the program for being used for carrying out file access;The program for being used to carry out file access is by institute When stating processor reading execution, operations described below is performed:Attempt to obtain file to be visited write lock failure after, write lock to what central server initiated to seize the file to be visited Operation;After seizing the writing and lock successfully of the file to be visited, write operation is carried out to the file to be visited.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610884604.6A CN107920101B (en) | 2016-10-10 | 2016-10-10 | File access method, device and system and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610884604.6A CN107920101B (en) | 2016-10-10 | 2016-10-10 | File access method, device and system and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107920101A true CN107920101A (en) | 2018-04-17 |
CN107920101B CN107920101B (en) | 2020-11-17 |
Family
ID=61891821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610884604.6A Active CN107920101B (en) | 2016-10-10 | 2016-10-10 | File access method, device and system and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107920101B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109885550A (en) * | 2018-12-28 | 2019-06-14 | 安徽维德工业自动化有限公司 | A kind of document storage system based on full connection routing layer |
CN111030984A (en) * | 2019-10-22 | 2020-04-17 | 上海泰宇信息技术股份有限公司 | Data safety transmission system and method |
CN111405039A (en) * | 2020-03-16 | 2020-07-10 | 深圳市网心科技有限公司 | Data transparent transmission method, device and system, client and server |
CN112416871A (en) * | 2019-08-23 | 2021-02-26 | 华为技术有限公司 | Data access method, device and system |
CN112637333A (en) * | 2020-12-22 | 2021-04-09 | 畅捷通信息技术股份有限公司 | Intelligent client agent method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217508A (en) * | 2007-12-29 | 2008-07-09 | 腾讯科技(深圳)有限公司 | A network agent system and the corresponding realizing methods based on instant communication platform |
CN102055777A (en) * | 2009-10-29 | 2011-05-11 | 中兴通讯股份有限公司 | Method and system for realizing common content sharing service |
CN103106207A (en) * | 2011-11-10 | 2013-05-15 | 中国移动通信集团公司 | Method and equipment for metadata distribution in object storing system |
CN104253860A (en) * | 2014-09-11 | 2014-12-31 | 武汉噢易云计算有限公司 | Shared storage message queue-based implementation method for high availability of virtual machines |
US20150095333A1 (en) * | 2013-09-27 | 2015-04-02 | International Business Machines Corporation | Activity Based Analytics |
-
2016
- 2016-10-10 CN CN201610884604.6A patent/CN107920101B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217508A (en) * | 2007-12-29 | 2008-07-09 | 腾讯科技(深圳)有限公司 | A network agent system and the corresponding realizing methods based on instant communication platform |
CN102055777A (en) * | 2009-10-29 | 2011-05-11 | 中兴通讯股份有限公司 | Method and system for realizing common content sharing service |
CN103106207A (en) * | 2011-11-10 | 2013-05-15 | 中国移动通信集团公司 | Method and equipment for metadata distribution in object storing system |
US20150095333A1 (en) * | 2013-09-27 | 2015-04-02 | International Business Machines Corporation | Activity Based Analytics |
CN104253860A (en) * | 2014-09-11 | 2014-12-31 | 武汉噢易云计算有限公司 | Shared storage message queue-based implementation method for high availability of virtual machines |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109885550A (en) * | 2018-12-28 | 2019-06-14 | 安徽维德工业自动化有限公司 | A kind of document storage system based on full connection routing layer |
CN109885550B (en) * | 2018-12-28 | 2022-09-13 | 安徽维德工业自动化有限公司 | File storage system based on all-connected routing layer |
CN112416871A (en) * | 2019-08-23 | 2021-02-26 | 华为技术有限公司 | Data access method, device and system |
WO2021036989A1 (en) * | 2019-08-23 | 2021-03-04 | 华为技术有限公司 | Method, apparatus and system for data access |
CN112416871B (en) * | 2019-08-23 | 2023-10-13 | 华为技术有限公司 | Data access method, device and system |
CN111030984A (en) * | 2019-10-22 | 2020-04-17 | 上海泰宇信息技术股份有限公司 | Data safety transmission system and method |
CN111030984B (en) * | 2019-10-22 | 2022-08-19 | 上海泰宇信息技术股份有限公司 | Data safety transmission system and method |
CN111405039A (en) * | 2020-03-16 | 2020-07-10 | 深圳市网心科技有限公司 | Data transparent transmission method, device and system, client and server |
CN112637333A (en) * | 2020-12-22 | 2021-04-09 | 畅捷通信息技术股份有限公司 | Intelligent client agent method |
Also Published As
Publication number | Publication date |
---|---|
CN107920101B (en) | 2020-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3048737C (en) | Service processing and consensus method and device | |
CN107920101A (en) | A kind of file access method, device, system and electronic equipment | |
US9858013B1 (en) | Scalable distributed storage system infrastructure | |
CN102158540A (en) | System and method for realizing distributed database | |
CN107133234A (en) | The method of data cached renewal, apparatus and system | |
CN105357322B (en) | A kind of virtual machine distribution method based on Topology partition | |
CN106446159B (en) | A kind of method of storage file, the first virtual machine and name node | |
WO2017143957A1 (en) | Data redistribution method and device | |
WO2018233630A1 (en) | Fault discovery | |
US20230098190A1 (en) | Data processing method, apparatus, device and medium based on distributed storage | |
US20190199794A1 (en) | Efficient replication of changes to a byte-addressable persistent memory over a network | |
RU2643642C2 (en) | Use of cache memory and another type of memory in distributed memory system | |
CN110784498A (en) | Personalized data disaster tolerance method and device | |
CN107872517A (en) | A kind of data processing method and device | |
CN115270033A (en) | Data access system, method, equipment and network card | |
CN107181773A (en) | Data storage and data managing method, the equipment of distributed memory system | |
CN107018170A (en) | A kind of method of data synchronization and equipment | |
CN104715044B (en) | A kind of distributed system and its data manipulation method | |
US11288237B2 (en) | Distributed file system with thin arbiter node | |
CN110018879A (en) | Delay loading method and device applied to distributed system | |
CN106873902A (en) | A kind of document storage system, data dispatching method and back end | |
CN107943615B (en) | Data processing method and system based on distributed cluster | |
CN107493309A (en) | File wiring method and device in a kind of distributed system | |
CN109840051A (en) | A kind of date storage method and device of storage system | |
CN112596669A (en) | Data processing method and device based on distributed storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |