CN113535415B - Resource acquisition method and terminal - Google Patents

Resource acquisition method and terminal Download PDF

Info

Publication number
CN113535415B
CN113535415B CN202110685145.XA CN202110685145A CN113535415B CN 113535415 B CN113535415 B CN 113535415B CN 202110685145 A CN202110685145 A CN 202110685145A CN 113535415 B CN113535415 B CN 113535415B
Authority
CN
China
Prior art keywords
acquired
upstream node
resource
resources
resource acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110685145.XA
Other languages
Chinese (zh)
Other versions
CN113535415A (en
Inventor
刘德建
林伟
陈宏�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianquan Educational Technology Ltd
Original Assignee
Fujian Tianquan Educational Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianquan Educational Technology Ltd filed Critical Fujian Tianquan Educational Technology Ltd
Priority to CN202110685145.XA priority Critical patent/CN113535415B/en
Publication of CN113535415A publication Critical patent/CN113535415A/en
Application granted granted Critical
Publication of CN113535415B publication Critical patent/CN113535415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Program synchronisation; Mutual exclusion, e.g. by means of semaphores

Abstract

The invention discloses a resource acquisition method and a terminal, which are used for receiving resource acquisition requests sent by an upstream node, judging whether the number of all resource acquisition requests reaches a threshold value if the resources to be acquired are locked, returning a special abnormal identifier to the upstream node if the number of all resource acquisition requests reaches the threshold value, carrying out request locking by the upstream node according to the special abnormal identifier, synchronizing the lock information of the resources to be acquired to a public cluster, and acquiring the lock information of the resources to be acquired by the upstream node requesting locking through inquiring the public cluster; therefore, when the resources to be acquired are locked and the number of the requests reaches a threshold value, the requests of the upstream nodes are locked, invalid requests of the upstream nodes can be reduced, and the safety and the robustness of the system are improved, so that the efficiency of resource acquisition is improved.

Description

Resource acquisition method and terminal
Technical Field
The present invention relates to the field of resource management technologies, and in particular, to a resource obtaining method and a terminal.
Background
In the present distributed system, there are many situations where resources are shared, such as a shared memory resource, and only one thread is allowed to access at a time. In order to implement this access mechanism, a mechanism is generally used at present to lock the resource, for example, an interface provided by a server side, where the interface accesses a shared memory resource, because the interface of the server side provides concurrent access to the outside, in order to ensure that only one thread accesses the memory resource at the same time, the interface method internally locks a module accessing the shared resource, that is, the module needs to acquire a lock preferentially every time, and access to the shared resource is allowed after the lock is successfully acquired.
However, the interfaces of the server end all need to provide concurrent access, and in a concurrent scene, after a certain interface calls and locks the resource, when other interfaces call again later, the resource cannot be obtained again because the resource is locked, and then abnormal information is returned. However, because the downstream resource is locked, the upstream system cannot know, and thus under this scenario, the upstream service will continue to call the downstream interface, which results in increased invalid requests and reduced service processing efficiency.
Disclosure of Invention
The technical problems to be solved by the invention are as follows: the resource acquisition method and the terminal are provided, and the resource acquisition efficiency can be improved.
In order to solve the technical problems, the invention adopts the following technical scheme:
a resource acquisition method comprising the steps of:
receiving a resource acquisition request sent by an upstream node;
if the resources to be acquired corresponding to the resource acquisition requests are locked, judging whether the number of all the resource acquisition requests reaches a threshold value, if so, returning a special abnormal identifier to the upstream node, carrying out request locking on the upstream node according to the special abnormal identifier, synchronizing the lock information of the resources to be acquired to a public cluster, and acquiring the lock information of the resources to be acquired by the upstream node requesting locking through inquiring the public cluster.
In order to solve the technical problems, the invention adopts another technical scheme that:
a resource acquisition terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving a resource acquisition request sent by an upstream node;
if the resources to be acquired corresponding to the resource acquisition requests are locked, judging whether the number of all the resource acquisition requests reaches a threshold value, if so, returning a special abnormal identifier to the upstream node, carrying out request locking on the upstream node according to the special abnormal identifier, synchronizing the lock information of the resources to be acquired to a public cluster, and acquiring the lock information of the resources to be acquired by the upstream node requesting locking through inquiring the public cluster.
The invention has the beneficial effects that: receiving resource acquisition requests sent by an upstream node, judging whether the number of all resource acquisition requests reaches a threshold value if the resources to be acquired are locked, returning a special abnormal identifier to the upstream node if the number of all resource acquisition requests reaches the threshold value, carrying out request locking by the upstream node according to the special abnormal identifier, synchronizing the lock information of the resources to be acquired to a public cluster, and acquiring the lock information of the resources to be acquired by the upstream node requesting locking through inquiring the public cluster; therefore, when the resources to be acquired are locked and the number of the requests reaches a threshold value, the requests of the upstream nodes are locked, invalid requests of the upstream nodes can be reduced, and the safety and the robustness of the system are improved, so that the efficiency of resource acquisition is improved.
Drawings
FIG. 1 is a flow chart of a resource acquisition method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a resource acquisition terminal according to an embodiment of the present invention.
Detailed Description
In order to describe the technical contents, the achieved objects and effects of the present invention in detail, the following description will be made with reference to the embodiments in conjunction with the accompanying drawings.
Referring to fig. 1, an embodiment of the present invention provides a method for obtaining resources, including the steps of:
receiving a resource acquisition request sent by an upstream node;
if the resources to be acquired corresponding to the resource acquisition requests are locked, judging whether the number of all the resource acquisition requests reaches a threshold value, if so, returning a special abnormal identifier to the upstream node, carrying out request locking on the upstream node according to the special abnormal identifier, synchronizing the lock information of the resources to be acquired to a public cluster, and acquiring the lock information of the resources to be acquired by the upstream node requesting locking through inquiring the public cluster.
From the above description, the beneficial effects of the invention are as follows: receiving resource acquisition requests sent by an upstream node, judging whether the number of all resource acquisition requests reaches a threshold value if the resources to be acquired are locked, returning a special abnormal identifier to the upstream node if the number of all resource acquisition requests reaches the threshold value, carrying out request locking by the upstream node according to the special abnormal identifier, synchronizing the lock information of the resources to be acquired to a public cluster, and acquiring the lock information of the resources to be acquired by the upstream node requesting locking through inquiring the public cluster; therefore, when the resources to be acquired are locked and the number of the requests reaches a threshold value, the requests of the upstream nodes are locked, invalid requests of the upstream nodes can be reduced, and the safety and the robustness of the system are improved, so that the efficiency of resource acquisition is improved.
Further, the request locking of the upstream node according to the special exception identifier includes:
and setting and starting request locking in an upstream node according to the special exception identifier, and setting a time threshold for the request locking by the upstream node.
From the above description, setting and opening the request lock at the upstream node according to the special exception identifier can reduce invalid requests of the upstream node to the resource to be acquired after the resource to be acquired is locked.
Further, the method further comprises the following steps:
judging whether the set time length of the request locking is greater than the time threshold, if so, deleting the locking information corresponding to the resource to be acquired in the public cluster;
and if the lock information of the resource to be acquired does not exist in the public cluster, receiving a resource acquisition request sent by the upstream node.
As can be seen from the above description, when the setting time of the request lock is longer than the time threshold, the lock information in the public cluster is deleted, and when the lock information of the resource to be acquired in the public cluster does not exist, the request sent by the upstream node can be received again, so that the robustness of the program is improved.
Further, the returning the special exception identification to the upstream node includes:
establishing a monitoring channel between the upstream node and the node where the resource to be acquired is located;
and sending the special abnormal identifier of the node where the resource to be acquired is located to the upstream node according to the monitoring channel.
As can be seen from the above description, by establishing a listening channel in the upstream node and the resource to be acquired, the upstream node can acquire information of the resource to be acquired according to the listening channel.
Further, the method further comprises the following steps:
if the locked resources to be acquired are unlocked or the number of all the resource acquisition requests does not reach a threshold value, notifying the upstream node to unlock the requests of the resources to be acquired, and deleting the lock information corresponding to the resources to be acquired in the public cluster.
As can be seen from the above description, deleting the lock information in the common cluster can reduce the storage pressure of the common cluster after the locked resource to be acquired is unlocked or when the number of all the resource acquisition requests does not reach the threshold.
Referring to fig. 2, another embodiment of the present invention provides a resource obtaining terminal, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program:
receiving a resource acquisition request sent by an upstream node;
if the resources to be acquired corresponding to the resource acquisition requests are locked, judging whether the number of all the resource acquisition requests reaches a threshold value, if so, returning a special abnormal identifier to the upstream node, carrying out request locking on the upstream node according to the special abnormal identifier, synchronizing the lock information of the resources to be acquired to a public cluster, and acquiring the lock information of the resources to be acquired by the upstream node requesting locking through inquiring the public cluster.
As can be seen from the above description, receiving a resource acquisition request sent by an upstream node, if a resource to be acquired is already locked, judging whether the number of all the resource acquisition requests reaches a threshold, if so, returning a special abnormal identifier to the upstream node, and performing request locking by the upstream node according to the special abnormal identifier, synchronizing lock information of the resource to be acquired to a public cluster, and acquiring the lock information of the resource to be acquired by the upstream node requesting locking by querying the public cluster; therefore, when the resources to be acquired are locked and the number of the requests reaches a threshold value, the requests of the upstream nodes are locked, invalid requests of the upstream nodes can be reduced, and the safety and the robustness of the system are improved, so that the efficiency of resource acquisition is improved.
Further, the request locking of the upstream node according to the special exception identifier includes:
and setting and starting request locking in an upstream node according to the special exception identifier, and setting a time threshold for the request locking by the upstream node.
From the above description, setting and opening the request lock at the upstream node according to the special exception identifier can reduce invalid requests of the upstream node to the resource to be acquired after the resource to be acquired is locked.
Further, the method further comprises the following steps:
judging whether the set time length of the request locking is greater than the time threshold, if so, deleting the locking information corresponding to the resource to be acquired in the public cluster;
and if the lock information of the resource to be acquired does not exist in the public cluster, receiving a resource acquisition request sent by the upstream node.
As can be seen from the above description, when the setting time of the request lock is longer than the time threshold, the lock information in the public cluster is deleted, and when the lock information of the resource to be acquired in the public cluster does not exist, the request sent by the upstream node can be received again, so that the robustness of the program is improved.
Further, the returning the special exception identification to the upstream node includes:
establishing a monitoring channel between the upstream node and the node where the resource to be acquired is located;
and sending the special abnormal identifier of the node where the resource to be acquired is located to the upstream node according to the monitoring channel.
As can be seen from the above description, by establishing a listening channel in the upstream node and the resource to be acquired, the upstream node can acquire information of the resource to be acquired according to the listening channel.
Further, the method further comprises the following steps:
if the locked resources to be acquired are unlocked or the number of all the resource acquisition requests does not reach a threshold value, notifying the upstream node to unlock the requests of the resources to be acquired, and deleting the lock information corresponding to the resources to be acquired in the public cluster.
As can be seen from the above description, deleting the lock information in the common cluster can reduce the storage pressure of the common cluster after the locked resource to be acquired is unlocked or when the number of all the resource acquisition requests does not reach the threshold.
The resource acquisition method and the terminal are suitable for various shared resource scenes, can improve the resource acquisition efficiency, and are described by the following specific embodiments:
example 1
Referring to fig. 1, a method for obtaining resources includes the steps of:
s1, receiving a resource acquisition request sent by an upstream node.
Specifically, in this embodiment, the upstream node includes a client, when all requests for acquiring resources sent by the client are performed in normal order, the resource acquisition request sent by the client normally arrives at the public platform gateway, and the public platform gateway requests the resource issuing system to acquire a resource interface, and locks resources in advance in the interface after the request arrives at the resource acquisition interface.
S2, if the resources to be acquired corresponding to the resource acquisition requests are locked, judging whether the number of all the resource acquisition requests reaches a threshold value, if so, returning a special abnormal identifier to the upstream node, carrying out request locking on the upstream node according to the special abnormal identifier, synchronizing the lock information of the resources to be acquired to a public cluster, and acquiring the lock information of the resources to be acquired by the upstream node requesting locking through inquiring the public cluster.
Specifically, when all requests for acquiring resources arrive concurrently, at this time, if the resource acquisition request locks the resource to be acquired and the resource acquisition and processing are being performed, counting all subsequent resource acquisition requests, recording the subsequent resource acquisition requests in the local memory, and when the number of the resource acquisition requests reaches 10, returning the SPECIAL exception CODE 'special_code' uniformly and quickly by all subsequent requests, and synchronizing the lock information of the resource to be acquired into the public redis cluster.
The SPECIAL exception identifier is the SPECIAL exception CODE "special_code" described above.
Wherein the returning of the special exception identification to the upstream node comprises:
establishing a monitoring channel between the upstream node and the node where the resource to be acquired is located;
and sending the special abnormal identifier of the node where the resource to be acquired is located to the upstream node according to the monitoring channel.
Specifically, a monitoring channel is established between all clients and the downstream node where the resource to be acquired is located, the monitoring channel is similar to a long-link monitoring channel of a zookeeper cluster, and when the downstream node locks the resource and waits for a request of the locked resource to reach a preset threshold value, the upstream node is informed of that the resource is locked in real time.
Wherein the request locking of the upstream node according to the special exception identifier comprises:
and setting and starting request locking in an upstream node according to the special exception identifier, and setting a time threshold for the request locking by the upstream node.
Specifically, when the public platform gateway does not acquire the return information of the resource distribution system, the interface is indicated to be in normal business processing. When the upstream node acquires the special abnormal code returned by the downstream node, a request locking switch is set and started in a local memory of the upstream node, and a time threshold is set for the request locking switch; when the subsequent public platform gateway continues to receive the client request, as the switch is opened at this time, whether the lock information in the public redis cluster still exists or not is directly inquired, and when the lock information still exists, abnormal information is quickly returned to the client to prompt information such as 'resources are busy, please process later', and the like, and the resource issuing system is not required to be called again.
Judging whether the set time length of the request locking is greater than the time threshold, if so, deleting the locking information corresponding to the resource to be acquired in the public cluster;
and if the lock information of the resource to be acquired does not exist in the public cluster, receiving a resource acquisition request sent by the upstream node.
Specifically, when lock information in the public redis cluster is queried for a certain time, or when the time set by a switch in a local memory of the last time exceeds a preset threshold value, the information of the public redis cluster is not checked any more when the subsequent public platform gateway calls an interface of the voucher system, a resource acquisition request sent by an upstream node is received, and a downstream interface is directly accessed.
Therefore, by the lock synchronization mechanism in this embodiment, after the downstream shared resource is locked, the lock information can be synchronized to the public information, and the lock information in the public information will be queried in advance before the downstream method is called again by the upstream service for a subsequent period of time, and when the lock information still exists, a part of reentrant flow which does not need to call the downstream service can be intercepted, so that the problem of reentry request can be solved, the invalid request to the downstream can be reduced, and the processing efficiency of the system is further improved.
Example two
The difference between the present embodiment and the first embodiment is that it is further defined how to acquire a resource when the locked resource to be acquired is unlocked or the number of all resource acquisition requests does not reach a threshold, specifically:
if the locked resources to be acquired are unlocked or the number of all the resource acquisition requests does not reach a threshold value, notifying the upstream node to unlock the requests of the resources to be acquired, and deleting the lock information corresponding to the resources to be acquired in the public cluster.
In this embodiment, when the downstream node is unlocked or the downstream node is still locked, but the request for the locked resource is waiting for a certain value, the upstream node may be notified of the unlocked resource, and the subsequent upstream node may delete the switch setting in the local memory and continue to issue the request to the downstream node.
Example III
Referring to fig. 2, a resource obtaining terminal includes a memory, a processor and a computer program stored in the memory and capable of running on the processor, where the processor implements the steps of the resource obtaining method according to the first or second embodiments when executing the computer program.
In summary, according to the resource acquisition method and the terminal provided by the invention, a resource acquisition request sent by an upstream node is received, if resources to be acquired are already locked, whether the number of all the resource acquisition requests reaches a threshold value is judged, if the number of the resource acquisition requests reaches the threshold value, a special abnormal identifier is returned to the upstream node, the upstream node performs request locking according to the special abnormal identifier, lock information of the resources to be acquired is synchronized to a public cluster, and the upstream node requesting locking acquires the lock information of the resources to be acquired by querying the public cluster; the upstream node performs request locking to set and start the request locking switch, and further processes the resource locking information by judging whether the setting time of the request locking switch reaches a time threshold value, so that the robustness of the system is ensured; therefore, when the resources to be acquired are locked and the number of requests reaches a threshold value, the requests of the upstream nodes are locked, and invalid requests of the upstream nodes can be controllably reduced by the method for synchronizing the lock information to different upstream nodes, so that the safety and the robustness of the system are improved to a certain extent.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent changes made by the specification and drawings of the present invention, or direct or indirect application in the relevant art, are included in the scope of the present invention.

Claims (6)

1. A method for obtaining resources, comprising the steps of:
receiving a resource acquisition request sent by an upstream node;
if the resources to be acquired corresponding to the resource acquisition requests are locked, judging whether the number of all the resource acquisition requests reaches a threshold value, if so, returning a special abnormal identifier to the upstream node, performing request locking on the upstream node according to the special abnormal identifier, and synchronizing the lock information of the resources to be acquired to a public cluster, wherein the upstream node requesting locking acquires the lock information of the resources to be acquired by querying the public cluster;
the request locking of the upstream node according to the special exception identifier comprises the following steps:
setting and starting request locking in an upstream node according to the special abnormal identifier, and setting a time threshold for the request locking by the upstream node;
the returning of the special exception identification to the upstream node includes:
establishing a monitoring channel between the upstream node and the node where the resource to be acquired is located;
and sending the special abnormal identifier of the node where the resource to be acquired is located to the upstream node according to the monitoring channel.
2. The resource acquisition method according to claim 1, further comprising:
judging whether the set time length of the request locking is greater than the time threshold, if so, deleting the locking information corresponding to the resource to be acquired in the public cluster;
and if the lock information of the resource to be acquired does not exist in the public cluster, receiving a resource acquisition request sent by the upstream node.
3. The resource acquisition method according to claim 1, further comprising:
if the locked resources to be acquired are unlocked or the number of all the resource acquisition requests does not reach a threshold value, notifying the upstream node to unlock the requests of the resources to be acquired, and deleting the lock information corresponding to the resources to be acquired in the public cluster.
4. A resource acquisition terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the following steps when executing the computer program:
receiving a resource acquisition request sent by an upstream node;
if the resources to be acquired corresponding to the resource acquisition requests are locked, judging whether the number of all the resource acquisition requests reaches a threshold value, if so, returning a special abnormal identifier to the upstream node, performing request locking on the upstream node according to the special abnormal identifier, and synchronizing the lock information of the resources to be acquired to a public cluster, wherein the upstream node requesting locking acquires the lock information of the resources to be acquired by querying the public cluster;
the request locking of the upstream node according to the special exception identifier comprises the following steps:
setting and starting request locking in an upstream node according to the special abnormal identifier, and setting a time threshold for the request locking by the upstream node;
the returning of the special exception identification to the upstream node includes:
establishing a monitoring channel between the upstream node and the node where the resource to be acquired is located;
and sending the special abnormal identifier of the node where the resource to be acquired is located to the upstream node according to the monitoring channel.
5. The resource acquisition terminal of claim 4, further comprising:
judging whether the set time length of the request locking is greater than the time threshold, if so, deleting the locking information corresponding to the resource to be acquired in the public cluster;
and if the lock information of the resource to be acquired does not exist in the public cluster, receiving a resource acquisition request sent by the upstream node.
6. The resource acquisition terminal of claim 4, further comprising:
if the locked resources to be acquired are unlocked or the number of all the resource acquisition requests does not reach a threshold value, notifying the upstream node to unlock the requests of the resources to be acquired, and deleting the lock information corresponding to the resources to be acquired in the public cluster.
CN202110685145.XA 2021-06-21 2021-06-21 Resource acquisition method and terminal Active CN113535415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110685145.XA CN113535415B (en) 2021-06-21 2021-06-21 Resource acquisition method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110685145.XA CN113535415B (en) 2021-06-21 2021-06-21 Resource acquisition method and terminal

Publications (2)

Publication Number Publication Date
CN113535415A CN113535415A (en) 2021-10-22
CN113535415B true CN113535415B (en) 2023-08-04

Family

ID=78125364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110685145.XA Active CN113535415B (en) 2021-06-21 2021-06-21 Resource acquisition method and terminal

Country Status (1)

Country Link
CN (1) CN113535415B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010191575A (en) * 2009-02-17 2010-09-02 Panasonic Corp Resource exclusive control method and resource exclusive control device
CN105338094A (en) * 2015-11-17 2016-02-17 中国建设银行股份有限公司 Data processing method and system
CN109697127A (en) * 2017-10-24 2019-04-30 华为技术有限公司 The method and apparatus that the access operation of a kind of pair of shared resource locks
CN111158878A (en) * 2019-12-30 2020-05-15 北京三快在线科技有限公司 Resource transfer request thread control method, device and storage medium
CN111399991A (en) * 2020-06-05 2020-07-10 腾讯科技(深圳)有限公司 Virtual resource locking method and device, storage medium and electronic device
CN111737020A (en) * 2020-06-24 2020-10-02 广联达科技股份有限公司 Concurrent processing method and device for distributed cluster
CN112256424A (en) * 2020-09-22 2021-01-22 北京达佳互联信息技术有限公司 Virtual resource processing method, device and system, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7337290B2 (en) * 2003-04-03 2008-02-26 Oracle International Corporation Deadlock resolution through lock requeing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010191575A (en) * 2009-02-17 2010-09-02 Panasonic Corp Resource exclusive control method and resource exclusive control device
CN105338094A (en) * 2015-11-17 2016-02-17 中国建设银行股份有限公司 Data processing method and system
CN109697127A (en) * 2017-10-24 2019-04-30 华为技术有限公司 The method and apparatus that the access operation of a kind of pair of shared resource locks
CN111158878A (en) * 2019-12-30 2020-05-15 北京三快在线科技有限公司 Resource transfer request thread control method, device and storage medium
CN111399991A (en) * 2020-06-05 2020-07-10 腾讯科技(深圳)有限公司 Virtual resource locking method and device, storage medium and electronic device
CN111737020A (en) * 2020-06-24 2020-10-02 广联达科技股份有限公司 Concurrent processing method and device for distributed cluster
CN112256424A (en) * 2020-09-22 2021-01-22 北京达佳互联信息技术有限公司 Virtual resource processing method, device and system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113535415A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
KR101150146B1 (en) System and method for managing cached objects using notification bonds
CN109684285B (en) User mode network file system file locking method, device and equipment
CN111274214B (en) File lock processing method and device, electronic equipment and storage medium
US20070214143A1 (en) NFS server, NFS server control program and NFS server control method
CN111163159A (en) Message subscription method, device, server and computer readable storage medium
CN111258723B (en) Transaction processing method, device, system, medium and equipment of distributed system
CN113645152B (en) Service degradation method and terminal
CN111147560B (en) Data synchronization method based on HTTP (hyper text transport protocol) and breakpoint continuous transmission
CN114629883B (en) Service request processing method and device, electronic equipment and storage medium
CN110727507B (en) Message processing method and device, computer equipment and storage medium
CN113535415B (en) Resource acquisition method and terminal
CN114598749B (en) Service access method and device
CN110430282B (en) Data transmission method and device between nodes of distributed system
CN101751292B (en) Method for realizing consistency function of multimachine core data in ATC (automatic timing corrector) system
CN107423454B (en) Method, device and equipment for processing file lock in distributed file system
CN114374657A (en) Data processing method and device
EP3758308A1 (en) Correspondence processing method and device based on interworking rcs system
US20140280347A1 (en) Managing Digital Files with Shared Locks
CN111339173A (en) Data sharing method, server and readable storage medium
CN112019452B (en) Method, system and related device for processing service requirement
CN116225726A (en) Deadlock information collection method, storage medium and device for database cluster
CN114095487B (en) Remote task execution method, device and storage medium
US20230044681A1 (en) Udsf record retrieval and deletion
CN113448710B (en) Distributed application system based on business resources
CN109213766B (en) Data zero-delay processing method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant