CN1781096A - Systems and methods for synchronizing computer systems through an intermediary file system share or device - Google Patents

Systems and methods for synchronizing computer systems through an intermediary file system share or device Download PDF

Info

Publication number
CN1781096A
CN1781096A CNA2004800032859A CN200480003285A CN1781096A CN 1781096 A CN1781096 A CN 1781096A CN A2004800032859 A CNA2004800032859 A CN A2004800032859A CN 200480003285 A CN200480003285 A CN 200480003285A CN 1781096 A CN1781096 A CN 1781096A
Authority
CN
China
Prior art keywords
project
synchronization
type
change
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2004800032859A
Other languages
Chinese (zh)
Other versions
CN100565505C (en
Inventor
D·沙
L·诺威科
M·W·托玛斯
N·H·珀尔曼
O·埃齐鲁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/646,646 external-priority patent/US7349913B2/en
Priority claimed from PCT/US2003/027419 external-priority patent/WO2005029314A1/en
Priority claimed from US10/692,508 external-priority patent/US7483923B2/en
Priority claimed from US10/883,621 external-priority patent/US7512638B2/en
Priority claimed from US10/889,423 external-priority patent/US7401104B2/en
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN1781096A publication Critical patent/CN1781096A/en
Application granted granted Critical
Publication of CN100565505C publication Critical patent/CN100565505C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles

Abstract

The invention relates to a system which is synchronized through medium which uses the same public storing platform (for example, synchronous traditional storing platform which replaces the use and does not support a new storing platform) aiming at two client computers which synchronous use the public storing platform (for example, a new storing platform of relative inventions) and a process. Data is synchronized through using the current ability of the medium, but the data structure of the client computer. The inhabited data structure elements of the client computer storing platform are kept through compensating the inability of the medium by an accommodator, thereby the client computer can interact with the medium. The special example aims to upload and synchronize the data to the medium and or to download and synchronize the data to the client computer. Some additional examples further aim to compress the data on the medium.

Description

System and method by intermediary's file system or device synchronization computer system
Reference
The application requires on July 12nd, 2004 to submit to, the priority of the U. S. application (not yet obtaining) number (application attorney docket MSFT-4484) of by name " SYSTEMS AND METHODS FOR SYNCHRONIZING COMPUTER SYSTEMS THROUGH AN INTERMEDIARY FILE SYSTEM SHARE OR DEVICE (sharing or the system and method for device synchronization computer system by intermediary's file system) ", the latter requires the U.S. Provisional Application the 60/567th of submission on August 30th, 2004, the priority of 141 (application attorney docket MSFT-3939/306727.01), and be to submit on June 30th, 2004, the U.S. of by name " SYSTEMS AND METHODS FOR PROVIDING CONFLICT HANDLING FOR PEER-TO-PEER SYNCHRONIZATION OF UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (for the system and method that can provide synchronously conflict to process by the equity of the information unit of hardware/software interface system the management) " application the 10/883rd of standing, the part continuity of No. 621 (application attorney docket MSFT-2854), this application is to submit on October 24th, 2003, the U.S. Patent application the 10/692nd of " SYSTEMS AND METHODS FOR PROVIDING RELATIONAL AND HIERARCHICAL SYNCHRONIZATION SERVICES FOR UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (being used to the system and method that relation and hierarchical synchronization can be provided by the information unit of hardware/software interface system management) " by name, the part continuity of No. 508 (application attorney docket MSFT-2845), the latter submitted on August 21st, 2003, by name " STORAGE PLATFORM FOR ORGANIZING; SEARCHING; AND SHARING DATA (be used for tissue; search and shared data storage platform " U.S. Patent application 10/646, the part continuity of 646 (application attorney docket MSFT-2734), the present invention also requires the priority of the international application PCT/US03/27419 (application attorney docket MSFT-2778) of submission on August 21st, 2003, and the disclosure of these applications is quoted by integral body and is incorporated into this in this.
The application's theme relates to the application of following common transfer, its content all is incorporated among the application (and having carried out for simplicity partly summarizing): that on August 21st, 2003 submitted to, title is No. 10/647,058, the U.S. Patent application ground (agent docket MSFT-1748) of " SYSTEMS AND METHODS FOR REPRESENTING UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM BUT INDEPENDENI OF PHYSICAL REPRESENTATION (be used for expression can be by the hardware/software interface system management but be independent of the system and method for the information unit of physical representation) "; On August 21st, 2003 submitted to, title is No. the 10/646th, 941, the U.S. Patent application (agent docket MSFT-1749) of " SYSTEMS AND METHODS FOR SEPARATING UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM FROM THEIR PHYSICAL ORGANIZATION (for the system and method that can be separated with its physical organization by the information unit of hardware/software interface system management) "; Submitted on August 21st, 2003, title be No. the 10/646th, 940, the U.S. Patent application (agent docket MSFT-1750) of " SYSTEMS AND METHODS FOR THE IMPLEMENTATION OF A BASE SCHEMA FOR ORGANIZING UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (being used for realizing being used for the system and method for the basic model of the information unit that tissue can be managed by hardware/software interface system) "; Submitted on August 21st, 2003, title be No. the 10/646th, 645, the U.S. Patent application (agent docket MSFT-1752) of " SYSTEMS AND METHOD FOR REPRESENTING RELATIONSHIIPS BETWEEN UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (system and method that is used for the relation between the information unit that expression can be managed by hardware/software interface system) "; On August 21st, 2003 submitted to, title is No. the 10/646th, 575, the U.S. Patent application (agent docket MSFT-2733) of " SYSTEMS AND METHODS FOR INTERFACING APPLICATION PROGRAMS WITH AN ITEM-BASED STORAGE PLATFORM (being used for the system and method with application program and project-based storage platform interface) "; On August 21st, 2003 submitted to, title is No. the 10/646th, 646, the U.S. Patent application (agent docket MSFT-2734) of " STORAGE PLATFORM FOR ORGANIZING; SEARCHING AND SHARING DATA (being used for tissue, search and shared data storage platform) "; On August 21st, 2003 submitted to, title is No. the 10/646th, 580, the U.S. Patent application (agent docket MSFT-2735) of " SYSTEMS AND METHODS FOR DATA MODELING IN AN ITEM-BASED STORAGE PLATFORM (system and method that is used for the data modeling of project-based storage platform) "; Submitted on October 24th, 2003, title be No. the 10/692nd, 779, the U.S. Patent application (agent docket MSFT-2829) of " SYSTEMS AND METHODS FOR THE IMPLEMENTATION OF A DIGITAL IMAGES SCHEMA FOR ORGANIZING UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (being used for realizing being used for the system and method for the digital picture pattern of the information unit that tissue can be managed by hardware/software interface system) "; On October 24th, 2003 submitted to, title is No. the 10/629th, 515, the U.S. Patent application (agent docket MSFT-2844) of " SYSTEMS AND METHODS FOR PROVIDING SYNCHRONIZATION SERVICES FOR UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (being used for to the system and method that synchronous service can be provided by the information unit of hardware/software interface system management) "; On October 24th, 2003 submitted to, title is No. the 10/692nd, 508, the U.S. Patent application (agent docket MSFT-2845) of " SYSTEMS AND METHODS FOR PROVIDING RELATIONAL AND HIERARCHICAL SYNCHRONIZATION SERVICES FOR UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (for the system and method for relation and hierarchical synchronization service can be provided by the information unit of hardware/software interface system management) "; And on October 24th, 2003 submit to, title be No. the 10/693rd, 574, the U.S. Patent application (agency rolls up MSFT-2847) of " SYSTEMS AND METHODS FOR EXTENSIONS AND INHERITANCE FOR UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (be used for can by the expansion of the information unit of hardware/software interface system management and the system and method for succession) ".
Invention field
The present invention relates generally to synchronously, relate in particular to and (for example use the common memory platform, WinFS) but by different intermediary's file system application programming interface (API) accessible file share or other memory devices (for example, Win32 file-sharing or other API accessible storage equipment) between two or many computers synchronously, with supported data share, final roaming (including but not limited to roam final support overview and equivalent thereof) and other synchronous purpose supported.
Background
In last decade, the capacity of single disc is annual to increase about percent 70 (70%). The calculated to a nicety surprising growth of CPU (CPU) ability in several years in the past of mole (Moore) rule. Wired be connected with wireless technology quantitatively huge connection and bandwidth is provided. Suppose that current trend continues, general laptop computer will have the storage of about terabyte (TB) and comprise millions of files within the several years, and the driver of 500,000,000,000 bytes (500GB) becomes common.
The consumer uses their computer to be mainly used in communication and organize personal information, no matter they are data or the media as digital music or photo of traditional personal information manager (PIM) style. The ability of the amount of digital content and storage raw bytes increases in large quantities; Yet the consumer can be used for organizing and the method for unifying these data does not but catch up with paces. The knowledge worker spends that the plenty of time manages and shared information, and some studies estimation, and the knowledge worker spends the time of 15-25% in the activity relevant with invalid information. Research is estimated in addition, and typical knowledge worker spends 2.5 hours search information every day approximately.
The time that the investment of developer and information technology (IT) department is a large amount of and money make up themselves the abstract data of common memory that are used for and store, to present such as item orders such as people, place, Time And Events. This not only causes the work of repetition, also forms the isolated island of public data, does not have the mechanism of common search or shared those data. How many address books only consider has at the computer that moves Microsoft Windows operating system now. Many application programs as email client and Personal Finance program keep address book separately, and only have seldom shared between the address book application that each such program is safeguarded respectively. Thereby, financial procedure (such as Microsoft Money) not with the address that is maintained in address in the e-mail contacts file (such as the contacts folder among the Microsoft Outlook) and shares the payer. Really, many users have a plurality of equipment, should be logically between these equipment and between being included in such as the various additive sources of the cell-phone telephone number of the commerce services such as MSN and AOL synchronous their personal data; Yet the cooperation major part of shared document reaches by document is attached to email message-and this is manual and poor efficiency.
The conventional method that a reason that lacks cooperation is the information in the organize computer systems concentrates on the system's (" file system ") that uses based on file-file-catalogue, comes abstract in the hierarchy of categories of a plurality of file organizations to file based on the physical organization of the storage medium that is used for storage file. But be considered to be in operating system grade is managed storage data units with file, file and catalogue pioneer in nineteen sixty for the Multics operating system of developing. Particularly, Multics uses symbolic address (thereby concept of introducing file path) in the hierarchy of file, and the physical address of its File is opaque to user (application program and end user). This file system gives no thought to the file format of any Single document, and the pass that reaches hereof between the file ties up to (that is, different from the position of hierarchy File) that are considered on the operating system grade have nothing to do. Because the appearance of Multics, storable data are organized into file, file and catalogue on operating system grade. These files generally comprise the file hierarchy itself (" catalogue ") that is placed on by in the specific file of file system maintenance. This directory further is safeguarded the tabulation corresponding to the clauses and subclauses of all other files in this catalogue and the node location of those files in hierarchy (referring to file here). This is state nearly 40 years in this area.
Yet, although the reasonable representation of the information in the physical store system that resides in computer is provided, but file system is the abstract of physical store system, thereby what (having context, feature and and the unit of the relation of other unit) utilization of file need to process and operating system provides indirect (explanation) between what (file, file and catalogue) layer the user. As a result, user (application program and/or end user) have to force information unit is put into file system structure, though do like this be poor efficiency, inconsistent or undesirable. In addition, existing file system is known little about it about the structure of the data of storing in each file, and therefore, most of information keep sealing hereof, can only be write the application access (with understanding) of those data. Therefore, lack the pattern description of information and the mechanism of management information, cause forming the vertical shaft (silo) of data, only have less data between each vertical shaft, to share. For example, many personal computers (PC) user has storage different more than 5, and they comprise about they submit mutual people's information-such as Outlook contact person, online account address, Windows address book, Quicken payee and instant message (IM) partner list-because constituent act proposes important challenge to these pc users at certain one deck. Because most of existing file system utilize nested file metaphor to come constituent act and file, therefore when quantity of documents increases, become very surprising for keeping the necessary effort of flexible and effective enterprise schema. In these cases, the multiple classification that has a Single document is very useful; Yet use the hard and soft link in the existing file system to be trouble and to be difficult to safeguard.
Past has been made the shortcoming that some unsuccessful trials overcome file system. Some have related in attempting before these certain memory with content addressable and provide and can rather than visit the mechanism of data by physical address by content. Yet, these effort are proved to be unsuccessful, although thereby the memory of content addressable is to being proved to be useful by using such as the small-scale of the equipment such as high-speed cache and MMU, but still impossible owing to a variety of causes to the extensive use such as equipment such as physical storage mediums, therefore such solution exists seldom or never. Made other trial of using OODB Object Oriented Data Base (OODB) system, although but these trials are with the feature of strong database, and good non-representation of file, but processing aspect the representation of file ineffectively, can not reappear on the hardware/software interface system level speed, efficient and simplicity based on file and the file of hierarchy. Use other trial of SmallTalk (with other derived method) being proved to be quite effective aspect processing file and the non-representation of file such as attempting, effectively organize and utilize the necessary database feature of the relation that exists but lack between various data files, therefore the whole validity of the sort of system is unacceptable. Use BeOS (with other such operating system research) although another trial can be competent at some necessary database feature is provided again when suitably representing file, be proved to be inadequate in the expression of processing non-file, this is the same core shortcoming of traditional file systems.
Database technology is another professional domain that has similar challenge. For example, although the relevant database model has been obtained very large coml success, in fact stand alone software retail trader (ISV) has generally used available function sub-fraction in the relevant database software product (such as Microsoft SQL Server). On the contrary, the great majority of application program and such product are the form with simple " gets " and " puts " alternately. Although this is had some reasons of understanding easily (as platform or database unknowable), the reason of a commonly overlooked key be database there is no need to provide primary commercial application program retail trader really to need accurately abstract. For example, although really the world has concept such as " client " or " projects " such as " orders " (and " line item " of the embedding of order is as wherein project and project itself), and relevant database only table and capable aspect talking about. As a result, although application program may wish to have uniformity, locking, safety and/or trigger on project level aspect (only listing), database only provides these features in table/row level usually. If also can work finely although each project is mapped to the single row of certain table of database, but in the situation with the order of a plurality of line items, exist a project in fact will be mapped to the reason of a plurality of tables, and in the case, single system R can not provide correct abstract definitely. Therefore, application program must be at the top layer construction logic of database to provide these substantially abstract. In other words, the fundamental relation model does not provide enough platforms of the storage data of developing easily advanced application thereon, because the fundamental relation model need to be between application program and storage system indirect layer, wherein only in the application program of some situation, can see the semantic structure of data. Although some database retail trader just is being building up to Premium Features in their product and (as is providing the object relationship ability, new organize models etc.), so far which still not having, the total solution that needs is provided, and wherein real total solution is the solution of the data model abstract (such as " project ", " expansion ", " relation " etc.) that provides usefulness for useful territory abstract (such as " individual ", " position ", " event " etc.).
Consider the above-mentioned shortcoming in available data storage and the database technology, need a kind of new storage platform, a kind of improved ability is provided for it so that all types of data in tissue, search and the Sharing computer system-a kind of storage platform, it is expanded outside existing file system and Database Systems and has enlarged data platform, and is designed to store all types of data. On August 21st, 2003 submitted to, this demand is satisfied in the 10/66th, No. 646 (application attorney docket MSFT-2734) the middle invention that discloses of U.S. Patent application of " STORAGE PLATFORM FOR ORGANIZING; SEARCHING; AND SHARING DATA (being used for tissue, search and shared data storage platform) " by name. The synchronous service that is used for this storage platform (comprising the collision decomposition method) is also being submitted to by on October 24th, 2003, the U.S. Patent application the 10/646th of " SYSTEMS AND METHODS FOR PROVIDING RELATIONAL AND HIERARCHICAL SYNCHRONIZATION SERVICES FOR UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (being used for to the system and method that relation and hierarchical synchronization service can be provided by the information unit of hardware/software interface system management) " by name, 646 (application attorney docket MSFT-2745), and on June 30th, 2004 submit to, provide in the U.S. Patent application (unallocated) of " SYSTEMS AND METHODS FOR PROVIDING CONFLICT HANDLING FOR PEER-TO-PEER SYNCHRONIZATION OF UNITS OF INFORMATION MANAGEABLE BY A HARDWARE/SOFTWARE INTERFACE SYSTEM (system and method that can provide synchronously conflict to process by the equity of the information unit of hardware/software interface system management is provided) " the by name invention that number (application attorney docket MSFT-2854/306955.01) discloses.
Certainly, the new storage platform of describing in these related application of original adoption, enterprise with the synchronizing network that comprises various individual computer system will have a kind of mixing, wherein some individual computer system will use new storage platform, and other individual computer system will continue to use the conventional store platform. Therefore, use two computer systems (" client computer ") of new storage platform may be necessary by the computer system (" intermediary ") of using traditional platform synchronous. For example, some client computer may be used such as roaming the softwares such as Folder Redirection of supporting overview (RUP) or having client-side high-speed cache (CSC) and register in traditional roaming service. Owing to the roaming data of not supporting for the tradition roaming software of these conventional store platforms for new storage platform, the new roaming service that therefore is used for new storage platform is essential. Various embodiments of the present invention are for the synchronous system and method for client computer that is used for by intermediary.
General introduction
Below general introduction provide take the front by with reference to the summary as the various aspects of the present invention of background note of the related invention (" related invention ") of institute's combination. This general introduction does not aim to provide the exhaustively explanation of all importances of the present invention, neither be to the restriction of scope of the present invention. But this general introduction is intended to as following detailed description and the introduction of accompanying drawing.
Related invention jointly relates to for tissue, search and shared data storage platform, and the concept of data storages is expanded and enlarged to described storage platform outside existing file system and Database Systems. This storage platform is designed to store all types of data, comprises structurized, non-structured or partly-structured data.
This storage platform is included in the data storage that realizes on the database engine. Described database engine comprises the relevant database engine with object related expanding. Described data storage has realized a kind of data model, the tissue of its supported data, search, shared, synchronous and safety. Stated the particular type of data with various modes (schema), and this platform provides a kind of mechanism, the setting of its mode of extension is in order to define new data type (mainly being the subtype of the fundamental type that is provided by described pattern). A kind of synchronizing function helps at user or system's data sharing. The function of filesystem class is provided, and it allows the interoperability of described data storage and existing file system, and does not have the restriction of this traditional file systems. A kind ofly change the ability that follow-up mechanism provides the change of tracking data storage. This storage platform also comprises one group of application programming interfaces, and they be so that application program can be accessed the above-mentioned all functions of described storage platform, and can access the data with the pattern statement.
The data model of being realized by the storage of described data with project, element and contextual definition the unit of data storages. Project is the unit of storable data in the data storage, and can comprise one or more elements and relation. Element is the example of type, comprises one or more fields (being also referred to as attribute herein). Relation is two connections between the project. (as used herein, these and other specific term can be capitalized, in order to they are separated near employed other term, yet, be not to be intended to treat with a certain discrimination the term capitalized for example " Item " and the same term during by capitalization, for example " item ", and should not suppose or hint this difference. )
This computer system also comprises a plurality of projects, and wherein each project comprises that one can be by the discrete storable information unit of hardware/software interface system operation; A plurality of project folders, they have consisted of the institutional framework of described project; And the hardware/software interface system that is used for operating a plurality of projects, and wherein each project belongs at least one project folder, and can belong to the project folder more than.
Opposite with derivation from lasting storage, project or some item attribute value can dynamically be calculated. In other words, described hardware/software interface system not Items in order is stored, and support some operation, function such as enumerate key purpose Set For Current, or the project that provides at the identifier on the storage platform (describing in the part of API or API and more completely illustrated) and the ability of search terms-for example, project can be cellular current location, or the temperature of reading from temperature sensor. Described hardware/software interface system can be processed a plurality of projects, and can comprise the project that can be interconnected by a plurality of relations of described hardware/software interface system management.
The hardware/software interface system that is used for this computer system also comprises core schema, understands in order to define described hardware/software interface system, and one group of core project can a kind of predetermined and predictable mode directly processing. In order to process a plurality of projects, described computer system interconnects project and a plurality of relation, and in the described relation of hardware/software interface system layer management.
The API of this storage platform provides data class for each project, extension and the relation that defines in the storage platform modal sets. In addition, API provides a framing class, and they have defined one group of public action for described data class, and provides basic programming model with data class for storage platform API. Described storage platform API provides the interrogation model of simplifying, its mode so that the application programmer is kept apart from the details of the query language of underlying database engine is so that the application programmer can form the inquiry of the various attributes of the project in the based on data storage. Storage platform API also collects the change of project being made by application program, and then they is organized in the required correct renewal of the database engine (or storage engines of any kind) of realizing described data storage. This and leaves the ins and outs of data storage update for API so that the application programmer can change project in memory.
By its common storage basis with by the data of medelling, storage platform of the present invention can be made more effective application development for consumer, Knowledge Worker and enterprise. It provides abundant and extendible API, this interface not only so that in its data model intrinsic function can use, but also comprise and expanded the access method of existing file system and database.
Prolong and the part of whole structure (in the II joint of describing in detail, describing in detail) as the invention that interrelates this, some related invention is especially for synchronous API (describing in detail in the III joint of describing in detail), it so that the widely synchronizing capacity of this storage platform has been described. Can expect that some embodiment of the present invention will be combined with these synchronizing capacities, to process the conflict that in reciprocity synchronizing process, causes. Ability correct and that effectively process conflict minimized loss of data, kept simultaneously availability preferably and reduced in the synchronizing process demand to user intervention. For this reason, the III of detailed description joint also comprises the detailed description of each embodiment of related invention, and these related invention are for the system and method for the treatment of the conflict in the reciprocity synchro system of the synchro system of the storage platform that includes but not limited to related invention.
In view of above content, various embodiments of the present invention (are for example used the common memory platform synchronously for being used for, the new storage platform of related invention) two client computer, with by (for example not using same common memory platform, as an alternative, the synchronous conventional store platform of new storage platform is not supported in use itself) intermediary come synchronously. Generally, various embodiments of the present invention have adopted with the existing force of intermediary comes synchrodata, but has wherein preserved the method for the data structure of client computer. Each embodiment has used " adapter " so that client computer can be mutual with intermediary, and wherein, described adapter has compensated the unable of intermediary effectively, to preserve the intrinsic data structure element of new storage platform of client computer. Various embodiments of the present invention are for uploading synchronously (upload-sync) to intermediary with data from client computer, and data are downloaded synchronously (download-sync) to client computer from intermediary. In addition, some embodiment is also for the data compression in the intermediary.
By reading following the detailed description and the accompanying drawings of the present invention, can know the present invention self and the specific features that combines with related invention and advantage.
Brief description of drawings
When reading in conjunction with appended accompanying drawing, can understand better top summary and following detailed description of the invention. For the purpose of illustrating the invention, the exemplary embodiment of various aspects of the present invention shown in the drawings; Yet, the invention is not restricted to disclosed concrete grammar and means. In the accompanying drawings:
Fig. 1 is the block diagram that expression aspect of the present invention can combined computer system within it;
Fig. 2 is a block diagram, shows the computer system that is divided into 3 assembly groups: nextport hardware component NextPort, hardware/software system interface module and application component;
Fig. 2 A shows for the traditional hierarchy based on tree that is grouped into based on the file in the file in the catalogue of the operating system of file;
Fig. 3 shows the block diagram of a storage platform;
Fig. 4 shows the structurized relation between project, project folder and the kind;
Fig. 5 A shows the block diagram of the structure of project;
Fig. 5 B shows the block diagram of complex properties type of the project of Fig. 5 A;
Fig. 5 C shows the block diagram of " Location (position) " project, and wherein the complicated type of " position " project is further specified (being listed clearly);
Fig. 6 A shows one as the project of the subtype of the project in the basic schema;
Fig. 6 B shows the block diagram of the subtype project of Fig. 6 A, has wherein listed clearly the type (except its direct attribute) of its succession;
Fig. 7 shows the block diagram of basic model, and this basic model comprises its two top layer class types, project and attribute basis, and from its additional basis mode type that draws;
Fig. 8 A shows the block diagram of the project in the core schema;
Fig. 8 B shows the block diagram of the attribute type in the core schema;
Fig. 9 is a block diagram, shows project folder, its member's project and the interconnected relationship between project folder and its member's project;
Figure 10 is a block diagram, shows kind (itself also is a project), its member's project and the interconnected relationship between kind and its member's project;
Figure 11 shows the figure of reference type level of the data model of storage platform;
It is the figure how to be classified that Figure 12 shows relation;
Figure 13 shows the figure of informing mechanism;
Figure 14 shows the figure of an example, and wherein two affairs are all inserted new record in same B tree;
Figure 15 shows data and changes Check processing;
Figure 16 shows exemplary directory tree;
Figure 17 shows an example, and wherein the file of existing file system based on catalogue is moved in the described storage platform data storage;
Figure 18 shows the concept of holding file;
Figure 19 shows the basic architecture of storage platform API;
Figure 20 has schematically shown each assembly of storage platform API stack;
Figure 21 A is the diagrammatic representation of contact item's pattern of example;
Figure 21 B is the diagrammatic representation of element of contact item's pattern of the example of Figure 21 A;
Framework when Figure 22 shows the operation of storage platform API;
Figure 23 shows the execution of " FindAll " operation;
Figure 24 shows such processing, processes from the storage platform pattern generating storage platform API class by this;
Figure 25 shows such pattern, and file (File) API is based on this pattern;
Figure 26 shows the schematic diagram for the access mask form of data security purpose;
Figure 27 (part a, b, c) has provided a new safety zone of being protected in the same manner of being divided out in existing safety zone;
Figure 28 shows the schematic diagram of the concept of project search view;
Figure 29 shows the schematic diagram of the project layering of example;
Figure 30 A shows the interface " interface 1 " as pipeline, and the first and second coding sections are by this interface communication;
Figure 30 B shows an interface, and this interface comprises interface object I1 and I2, and it is so that the first and second coding sections of system can be by medium M communication;
Figure 31 A the function that is provided by interface " interface 1 " is provided can how be divided, in order to the transition of communications of interface is arrived a plurality of interfaces " interface 1A ", " interface 1B ", " interface 1C ";
How the function that is provided by I1 Figure 31 B can be divided into a plurality of interface I1A, I1B, I1C if being provided;
Figure 32 A shows a kind of situation, and wherein insignificant parameter p recision can be left in the basket or by with parameter replacement arbitrarily;
Figure 32 B shows a kind of situation, and wherein the replaced interface of interface is replaced, and described alternative interfaces is designated be used to ignoring or adding parameter to interface;
Figure 33 A shows a kind of situation, and wherein the first and second coding sections are integrated in both modules that comprises them;
Figure 33 B shows a kind of situation, and wherein part or all of interface can write in another interface with being embedded into, in order to form merged interface;
Figure 34 A show intermediate equipment one or more how can change the communication on the first interface in order to make them meet one or more different interfaces;
Figure 34 B shows coding section and how can introduce in order to receive from the communication of an interface and with described function with interface and be transferred to the second and the 3rd interface;
How Figure 35 A can arrive another coding section with the transition of communications from a coding section if showing instant compiler (JIT);
Figure 35 B shows for the JIT method that dynamically rewrites one or more interfaces, it can be applied to dynamic factor or otherwise change described interface;
Figure 36 shows 3 examples of common data storage and assembly in order to make them synchronous; And
Figure 37 shows the system that comprises related invention, has supposed and has not known how exchanged simple fit device of how state is calculated or it is associated metadata;
Figure 38 A-D shows and how to follow the tracks of, to enumerate and synchronous change with sequentially changing enumeration methodology, to emphasize expectation and the solution to changing;
Figure 39 A shows conflict and processes pipeline;
It is the flow chart of the logic traversal of the pipeline shown in Figure 39 A shown in Figure 39 B; And
Shown in Figure 40 is that the project of wherein conflicting is charged to the block diagram of the example of daily record with the copy of destination item;
Shown in Figure 41 is that wherein two client computer must be by the block diagram of the synchronous situation of intermediary;
Shown in Figure 42 is that client computer is passed through the STI adapter sends flow chart from the step that changes data (" sending synchronously " operation) to intermediary;
Shown in Figure 43 is that client computer is passed through the STI adapter receives the step that changes data (" receiving synchronously " operation) from intermediary flow chart; And
Shown in Figure 44 is the flow chart that data in community's file on STI adapter (that is the STI adapter that, is associated with the client computer that can send synchronously and the receive synchronously both) agency are carried out the step of squeeze operation (" compression " operates).
Describe in detail
I. foreword
Theme of the present invention is described with details, to satisfy legal requirement. Yet itself does not attempt to limit the scope of this patent this description. On the contrary, present inventor imagination, claimed theme also can otherwise be implemented, and comprises the different step that is similar to this declarative description or the combination of step with the technology in and future current in conjunction with other. In addition, although term " step " can be used for meaning the different elements of the method that adopts here, however implicit specific order between each step that this term can not be interpreted as here disclosing, unless described clearly the order of each step.
A. example calculation environment
Many embodiment of the present invention can carry out on computers. Fig. 1 and following discussion aim to provide the concise and to the point description that wherein realizes suitable computing environment of the present invention. Although be not essential, aspects of the present invention can be with such as by describing in the context as the computer executable instructions of the program module carried out on the computer of client workstation or server. Generally speaking, program module comprises routine, program, object, assembly, data structure etc., and they are carried out particular task or realize particular abstract data type. In addition, the present invention can realize with other computer system configurations, comprises handheld device, multicomputer system, based on the system of microprocessor or programmable consumer electronics, network PC, minicomputer, large scale computer etc. The present invention can also realize in DCE that wherein task is by finishing by the teleprocessing equipment of communication network link. In DCE, program module can be arranged in the Local or Remote memory storage device.
As shown in Figure 1, the exemplary universal computing system comprises traditional personal computer 20 etc., and it comprises processing unit 21, system storage 22 and will comprise that the various system components of system storage are coupled to the system bus 23 of processing unit 21. System bus 23 can be several bus-structured any, any the local bus that comprises memory bus or memory controller, peripheral bus and use various bus architectures. System storage comprises read-only storage (ROM) 24 and random access storage device (RAM) 25. Basic input/output 26 (BIOS) comprises as help the basic routine of transmission information between all elements at personal computer 20 when starting, and is stored among the ROM 24. Personal computer 20 can comprise that also the disc driver 28, read-write of hard disk drive 27, the read-write moveable magnetic disc 29 of reading writing harddisk (not shown) are such as the CD drive 30 of the removable CD 29 of CDROM or other light medium. Hard disk drive 27, disc driver 28 and CD drive 30 are respectively by hard disk drive interface 32, disk drive interface 33 and CD drive interface 34 connected system buses 23. Driver and relevant computer-readable medium thereof provide the non-volatile memory of computer-readable instruction, data structure, program module and other data for personal computer 20. Although exemplary environments described herein adopts hard disk, moveable magnetic disc 29 and removable CD 31, those skilled in the art is understood, but in the exemplary operation environment, also can use stored energy by other type computer computer-readable recording medium of the data of computer access, such as cassette tape, flash card, digital video disc, Bernoulli cassette tape, random access memory (RAM), read-only storage (ROM) etc. Similarly, example context also can comprise is permitted eurypalynous surveillance equipment, such as temperature-sensitive and safety or fire alarm system, and other information source.
Some program modules can be stored among hard disk, disk 29, CD 31, ROM 24 or the RAM 25, comprise operating system 35, one or more application program 36, other program module 37 and routine data 38. The user can be by ordering such as input equipments such as keyboard 40 and positioning equipments 42 with input information to personal computer 20. Other input equipment (not shown) can comprise microphone, control stick, game mat, satellite dish, scanner etc. Here be connected to processing unit 21 with other input equipment normal open overcoupling to the serial line interface 46 of system bus, but also can connect by other interface, such as LPT, game port or USB (USB). The display device of monitor 47 or other type also is connected to system bus 23 by the interface such as video adapter 48. Except monitor 47, personal computer generally includes such as other peripheral output equipment (not shown) such as microphone and printers. The example system of Fig. 1 also comprises primary adapter 55, small computer system interface (SCSI) bus 56 and is connected to the External memory equipment 62 of SCSI bus.
Personal computer 20 can use logic such as one or more remote computers of remote computer 49 and be connected in the network environment and operate. Remote computer 49 can be another personal computer, server, router, network PC, peer device or other common network node, and generally include above many or all elements that personal computer 20 is described, although memory storage device 50 only is shown in Fig. 1. The logic that draws among Fig. 1 connects and comprises LAN (LAN) 51 and wide area network (WAN) 52. Such network environment is common in office, enterprise-wide. computer networks, Intranet and internet.
When using in the lan network environment, personal computer 20 is connected to LAN51 by network interface or adapter 53. When using in the WAN network environment, personal computer 20 generally includes modem 54 or is used for by setting up other device of communication such as the wide area networks such as internet 52. Built-in or external modem 54 is by serial port interface 46 connected system buses 23. In network environment, program module or its part that relative personal computer 20 draws can be stored in the remote memory storage device. Be appreciated that the network connection that illustrates is exemplary, can use other device of between computer, setting up communication link.
Shown in the block diagram of Fig. 2, computer system 200 can be divided into three assembly groups roughly: nextport hardware component NextPort 202, hardware/software interface system component 204 and application component 206 (being also referred to as " nest " or " component software " here in some context).
Get back to Fig. 1, in the various embodiment of computer system, nextport hardware component NextPort 202 can comprise CPU (CPU) 21, memory (ROM 24 and RAM 25), basic input/output (BIOS) 26 and various I/O (I/O) equipment, such as keyboard 40, mouse 42, monitor 47 and/or printer (not shown) etc. Nextport hardware component NextPort 202 comprises the basic physical basis structure of computer system 200.
Application component 206 comprises various software programs, includes but not limited to compiler, Database Systems, documentor, commercial programs, video-game etc. Application program provides computer resource to be used to various users (machine, other computer system and/or end user) to deal with problems, provide the means of solution and deal with data.
Hardware/software interface system component 204 comprises (can only comprise in certain embodiments) operating system, itself comprises shell and kernel the most applications latter. " operating system " is to start to take on the separate procedure of the intermediary between application program and computer hardware (OS). Hardware/software interface system component 204 also can comprise virtual machine manager (VMM), common statement Runtime Library (CLR) or its functional equivalent, Java Virtual Machine (JVM) or its functional equivalent or the operating system place in computer system or other component software outside the operating system. The purpose of hardware/software interface system provides the therein environment of executive utility of user. The target of any hardware/software interface system is to make computer system easy to use, and utilizes computer hardware in effective mode.
Hardware/software interface system generally is loaded into computer system when starting, and manages subsequently all application programs in computer system. Application program is by coming with hardware/software interface system mutual via application programming interfaces (API) request service. It is mutual with hardware/software interface system that some application program can be passed through such as command lanuage or graphic user interface (GUI) end user.
Hardware/software interface system is the various services of executive utility traditionally. In the multitask hardware/software interface system that a plurality of programs are moved simultaneously, what time sort run is which application program hardware/software interface system determine with, and how long allows in turn each being used journey before switching to the Another Application program. Hardware/software interface system is also managed sharing of between a plurality of application programs internal storage, and processes the input and output that commute such as the additional hardware device such as hard disk, printer and dialing port. Hardware/software interface system also sends to the message about mode of operation and contingent any mistake each application program (arriving in some cases the end user). Hardware/software interface system also can pass down the management of (as printing) of (offload) batch processing job, so that the application program that starts can be broken away from this work and restart other processing and/or operation. On the computer that parallel processing can be provided, hardware/software interface system is also managed partition program, so that it moves at a plurality of processors simultaneously.
Hardware/software interface system shell (being called for short " shell " here) is the interactive end-user interface to hardware/software interface system. (shell is also referred to as " command interpreter ", or is called " operating system shell " in an operating system). Shell be can be directly by the skin of the hardware/software interface system of application program and/or visit to end user. Opposite with shell, kernel is the innermost layer direct and hardware/software interface system that nextport hardware component NextPort is mutual.
Be particularly useful for computerized system although can conceive many embodiment of the present invention, yet do not mean that in the present note and limit the invention to those embodiment. On the contrary, term used herein " computer system " is intended to comprise can Storage and Processing information and/or can use any and all devices of behavior or the execution of canned data control appliance itself, and no matter whether those equipment are electronics, mechanical, logic or virtual in essence.
B. traditional storage based on file
In current most computers system, " file " is the unit that can store information, and it can comprise hardware/software interface system and application program, data set etc. In all modern hardware/software interface system (Windows, Unix, Linux, MacOS, dummy machine system etc.), file is can be by basic discrete (can store and can retrieve) information unit of hardware/software interface system processing. File group is organized into " file " usually. In Microsoft Windows, Macintosh OS and other hardware/software interface system, file be can be retrieved as single information unit, the set of the mobile and file processed. These files and then be organized into are called arranging based on tree-like hierarchy of " catalogue " (discussing in detail in the back). In such as Dos, z/OS and great majority other hardware/software interface system based on the operating system of Unix, term " catalogue " and/or " file " are interchangeable, and early stage apple computer system (such as Apple IIe) uses term " classification " to replace catalogue; Yet all these terms are regarded as synonym and can being used alternatingly when here using, and are intended to also to comprise quoting all other equivalent terms of hierarchical information storage organization and file and file components.
Traditionally, catalogue (catalogue that has another name called file) is based on tree-like hierarchy, and its File is combined into file, file and then arrange by the relative node location that comprises directory tree. For example, shown in Fig. 2 A, constituent instruments folder (or " root ") 212 based on the file system of DOS can comprise a plurality of files 214, its each can also comprise other file (such as " sub-folder " of particular file folder) 216, and these each comprises other file 218, to infinity. Each of these files can have one or more files 220, although on the hardware/software interface system level, what common ground each file in the file does not have except their positions in tree-like hierarchy. Physical organization not strange, file organization has been reflected indirectly the typical storage medium (such as hard disk, floppy disk, CD-ROM etc.) that is used for these files of storage to the method for file hierarchy.
Except above-mentioned, each file be to its sub-folder and its catalogue container-namely, each file has its sub-folder and file. For example, when file was deleted by hardware/software interface system, the sub-folder of this document folder and file be deleted (sub-folder and the file that also recursively comprise it in the situation of each sub-folder) also. Equally, each file is general only to be had by a file, although and file can be copied and copy is positioned at different files, the copy of file itself is difference and separate unit, it with original document without directly being connected (on the hardware/software interface system level, not being reflected to wave file such as the change to original document). Therefore in this respect, file and file are " physics " in itself process because file is similar to physical container, and file as different in these containers and independently physical element process.
II. the WINFS storage platform that is used for tissue, search and shared data
The present invention in conjunction with invention incorporated herein by reference for being used for tissue, search and shared data storage platform. Storage platform of the present invention is expanded and has been widened data platform, surmounts file system discussed above and Database Systems, and is designed to store all types of data, comprises the data of the format that is called project.
A. vocabulary
Reach the term that in claims, uses here following meaning arranged:
" project " is the unit of energy storage hardware/addressable information of software interface system, do not resemble simple files, and it is to have the object that is represented the basic attribute set of jointly supporting to all objects of end user by hardware/software interface system shell. Project also tool comprises the feature (discussing in detail below) that allows to introduce new attribute and relation to common attribute and the relation of supporting of all items type.
" operating system " is the separate procedure of disguising as the intermediary between application program and the computer hardware (OS). In most of the cases, operating system comprises shell and kernel.
" hardware/software interface system " is the combination of software or hardware and software, and it plays a part at the bottom hardware assembly of computer system and the interface between the application program that computer system is carried out. Hardware/software interface system generally includes (including only in certain embodiments) operating system. Hardware/software interface system can also comprise virtual machine manager (VMM), common statement Runtime Library (CLR) or its functional equivalent, Java Virtual Machine (JVM) or its functional equivalent or at the operating system place of computer system or other component software except operating system. The purpose of hardware/software interface system provides the environment of user's energy executive utility. The target of any hardware/software interface system is to make computer system easy to use, and utilizes computer hardware with effective means.
B. storage platform is summarized
With reference to figure 3, storage platform 300 is included in the data storage 302 that realizes on the database engine 314. In one embodiment, database engine comprises the relevant database engine with the object relationship expansion. In one embodiment, relevant database engine 3 14 comprises Microsoft SQL Server relevant database engine. Data storage 302 realizes the tissue, search of supported datas, shared, synchronous and safe data model 304. In such as mode 3 40 isotypes, describe specific data type, and storage platform 300 is provided for adopting these patterns and for the instrument 346 of expanding these patterns, this describes in detail in the back.
The change follow-up mechanism 306 that realizes in data storage 302 provides the ability of the change of tracking data storage. Data storage 302 also provides security capabilities 308 and upgrading/degradation ability 310, all describes in detail later. Data storage 302 also provides one group of application programming interfaces 312, with the ability to other storage platform assembly that utilizes this storage platform and application program (such as application program 350a, 350b and 350c) demonstrating data storage 302. Storage platform of the present invention also comprises application programming interfaces (API) 322, makes such as application program 350a, and 350b, and the application program such as 350c can be accessed all above-mentioned functions of storage platform and can access the data of describing in pattern. Application program can be in conjunction with using storage platform API 322 such as other API such as OLE OB API 324 and Microsoft Windows Win 32 API 326.
Storage platform 300 of the present invention can provide various services to application program, comprises the synchronous service 330 of being convenient at the data sharing of user or system. For example, synchronous service 330 allows and has the interoperability of storing other data storage 340 of 302 same format with data, and access has the data storage 342 of other form. Storage platform 300 also provides data storage 302 and the file system ability such as the interoperability of Windows new technology file system 318 systems such as existing file such as grade of allowing. In some embodiment at least, storage platform 320 can also provide other ability to application program, data is worked and allows mutual with other system allowing. These abilities may be embodied in the form such as Additional Services 328 such as Info Agent service 334 and notification service 332, and are embodied in the form of other utility program 336.
In some embodiment at least, storage platform is implemented with the hardware/software interface system of computer system, or forms its complete part. For example and unrestricted, storage platform of the present invention can be implemented with operating system, virtual machine manager (VMM), common statement Runtime Library (CLR) or its functional equivalent or Java Virtual Machine (JVM) or its functional equivalent, or forms its complete part. By its public storage basis and the data of medelling, storage platform of the present invention makes consumer, knowledge worker and enterprise do more effectively to carry out the exploitation of application program. It provides abundant and extendible programming surf zone, is contained in the ability in its data model in not only can obtaining, and can also comprise and expand existing file system and data bank access method.
Reach in the foregoing description in various accompanying drawings, storage platform 300 of the present invention can be called " WinFs ". Yet use this name to refer to that storage platform only is for convenience, does not attempt to make restriction like this.
C. data model
The data of storage platform 300 of the present invention are stored 302 and are realized a kind of data model, and its is supported the tissue that resides in the data in the data storage, search, shared, synchronous and safety. In data model of the present invention, " project " is the elementary cell of storage information. This data model provides a kind of mechanism, be used for statement project and project expansion, be used for being based upon the relation between the project and be used for the project organization to project folder and classification, the below is with more abundant description.
This data model depends on two primitive mechanism: type and relation. Type provides the structure of form of form of the example of domination type. Form is expressed as orderly group of attribute. Attribute is the name of the value or set of values of given type. For example, USPostalAddress (United States Post Office address) type has attribute Street (street), City (city), Zip (postcode), State (state), wherein Street, City and State are the String types, and Zip is the Int32 type. Street can be many-valued (i.e. a class value), allows the address that the Street attribute is had value more than. Some primitive type that system definition can be used in other type structure comprises String, Binary, Boolean, Int16, Int32, Int64, Single, Double, Byte, DateTime, Decimal and GUID. Can use any primitive type (with some restriction of following note) or the type of any structure to come the attribute of define styles. For example, Location (position) type definable has attribute Coordinate (coordinate) and Addess (address), and wherein the Address attribute is the above-mentioned type USPostalAddress. Attribute also can be essential or optional.
Relation can be declared and represent the mapping between the example set of two types. For example, the relation of stating can be arranged between Person (individual) type and Location type, be called LivesAt (living in), it determines where who lives in. Relation has name and two end points, i.e. source endpoint and target endpoint. Relation also can have the ordered set of attribute. Source endpoint and target endpoint all have name and type. For example, the LivesAt relation has the source of the Occupant (resident) that is called type Person and is called the target of the Dwelling (house) of type Location, and have in addition attribute StartDate (from date) and EndDate (date of expiry), represent that this resident living is in the time period of this house. Notice that pass in time, the individual can live in a plurality of houses, and house can have a plurality of residents, be originally to be in relation so place the most probable place of StartDate and EndDate information.
Contextual definition by the mapping between the example of the type constraint that provides as endpoint type. For example the LivesAt relation can not be that wherein Automobile (automobile) is Occupant (resident's) relation, because Automobile is not Person.
Subtype between data model permission define styles-superclass type relation. Subtype-the superclass that is also referred to as the fundamental type relation is the as follows definition of type relation, if type A is the fundamental type of type B, each example that then must be B also is the situation of the example of A. The another kind of method of expressing is that each example that meets B must meet A. For example, if A has the attribute Name (name) of String type, and B has the attribute Age (age) of Int16 type, then draws, and any example of B must have Name and Age concurrently. The hierarchy of type can be envisaged as the tree with the single superclass type on root. The branch of root provides first order subtype, and this grade branch provides second level subtype, and so on, until itself no longer have end of blade (leaf-most) subtype of any subtype. Tree is not limited to the unified degree of depth, but can not comprise any loop. Given type can have zero perhaps many subtypes and zero or a superclass type. Given example can meet at most the superclass type an of type and the type. In other words, to the tree in arbitrary grade locate given example, this example can meet at most a subtype on this grade. If the example of a type must also be the example of the subtype of the type, then to be said to be abstract to the type.
1. project
Project is the unit of storable information, does not resemble simple file, and it is the object with the common basic attribute set supported of all objects that is represented to end user or application program by storage platform. Project also has common attribute and the relation of supporting of all items type, comprises that permission as described below introduces new attribute and the feature of relation.
Project is the object of common operation, as copying, delete, move, open, print, back up, recover, copy etc. Project is the unit that can be stored and retrieve, and the form of ownership of the stored information of being processed by storage platform exists as attribute or the relation between the project of project, project, its each more discuss in detail below.
That project is intended to represent to show and hold intelligible data cell, such as contact person (Contacts), people (People), service (Services), position (Locations), (various types of) document (Documents) etc. Fig. 5 A is the block diagram that the structure of project is shown. The underproof name of this project is " Location ". The qualified name of this project is " Core.Location ", and it shows that this project structure is defined by the project (the Core pattern discusses in detail below) of the particular type in Core (core) pattern.
The Location project has a plurality of attributes, comprises EAddress (e-mail address), MetropolitanRegion (urban place), Neighborhood (neighbour) and PostalAddress (postal address). The particular type attribute of each project represents immediately following attribute-name ground, and separates with attribute-name with colon (": "). The right in type name, the quantity of the value that this attribute type is allowed represent that between square brackets (" [] ") wherein the asterisk (" * ") on colon (": ") the right represents unspecified and/or unconfined quantity (" many "). " 1 " on colon the right shows maximum values. Zero (" 0 ") on the colon left side shows that this attribute is optional (fully void value). " 1 " on the colon left side shows to have a value (this attribute is necessary) at least. Neighborhood and MetropolitanRegin all are " nvarchar " types (or connection of equivalent type), and it is predefined data type or " simple types " (representing with lacking capitalization here). Yet EAddress and PostalAddress are respectively the defined type of type EAddress and PostalAddress or the attribute of " complicated type " (here with capitalization mark). Complicated type is from one or more simple data types and/or the type that derives from other complicated type. The complicated type of the attribute of a project also consists of " nested element ", because the details of complicated type is nested in the direct project to define its attribute, and the information appliance that belongs to these complicated types has the project of these attributes to keep (in the border of this project, discussing such as the back). These concepts of type are that the crowd knows, and are understood by those skilled in the art easily.
Fig. 5 B is the block diagram that complex properties type PostalAddress and EAddress are shown. The definition of PostalAddress attribute type, the project of attribute type PostalAddress can expect to have zero or a City (city) value, zero or a Country Code (country code) value, zero or MailStop (country code) value and any quantity (zero to many) PostalAddress type etc. In this way, defined the shape of the data of the particular community in the project. The EAddress attribute type is similarly definition as shown. Although optionally use in this application here, the other method that is illustrated in complicated type in the Location project is to use each attribute of each complicated type of wherein listing to draw this project. Fig. 5 C is the block diagram that the Location project is shown, and further describes therein its complicated type. Yet should be appreciated that the another kind of Location project represents it just is same project to shown in Fig. 5 A in this Fig. 5 C. Storage platform of the present invention also allows subclassification (subtyping), thereby an Attribute class can be another subtype (one of them Attribute class is inherited the attribute of another father's attribute type).
Be similar to but be different from attribute and their attribute type, Item (project) type of project inheritance ground expression its oneself, it also is the theme of subclassification. In other words, the subtype that to allow a project be another project of the storage platform among some embodiment of the present invention (thereby project is inherited the attribute of another father's project). In addition, to various embodiment of the present invention, each project is the subtype of " Item " item types, and the latter is first and the basic item types (basic schema also discusses in detail in the back) that finds in basic schema. Fig. 6 A illustrates a project (in this example for Location project) and be the subtype of the Item item types that finds in basic schema. In this figure, arrow represents that Location project (such as all other projects) is the subtype of Item item types. Item item types as the elementary item of therefrom deriving all other projects has some important attribute such as ItemId and various time mark, thereby has defined the standard attribute of all items in the operating system. In this figure, these attributes of Item item types are inherited by Location, thereby and become the attribute of Location.
The another kind of method of expression attribute from the Location project that the Item item types is inherited is to use each attribute from each attribute type of father's project of wherein listing to draw Location. Fig. 6 B is the block diagram that the Location project is shown, and wherein describes the type of its succession except its direct attribute. Should note and understand, this project is the same project shown in Fig. 5 A, although in this figure, Location illustrates with all its attributes, comprise direct attribute (shown in Ben Tu and Fig. 5 A) and inherited attribute (shown in this figure but not shown in Fig. 5 A) (and in Fig. 5 A, being that the subtype of Item item types is quoted these attributes by the Location project is shown with arrow).
Project is object independently, if thereby delete a project, also delete items all directly and attributes of inheriting. Similarly, when retrieval during one project, retrieval be this project and all directly and the attribute (comprising the information that belongs to its complex properties type) of inheriting. Some embodiment of the present invention can make the people can be in the subset of retrieval request attribute during specific project; Yet to many such embodiment acquiescences be when the retrieval to project provide all its directly and attributes of inheriting. In addition, the attribute of project also can be expanded to the existing attribute of the type of this project by adding new attribute. These " expansions " are thereafter the real properties of this project, and the subtype of this item types can automatically comprise extended attribute.
" border " of project represented by its attribute (comprising complex properties type, expansion etc.). The border of project is also illustrated in the restriction of the operation of carrying out on the project, comprises copy, deletion, movement, establishment etc. For example in some embodiment of the present invention, when copy one project, all the elements within this item boundaries also are copied. To each project, the border comprises following:
The item types of project, if and this project is another purpose subtype (in the situation such as some embodiment of the present invention of deriving from the single project of basic schema and item types at all items), is any applicable sub-type information (information that namely belongs to father's item types). If the original project that copies is another purpose subtype, this copy also can be the subtype of this identical items.
The complicated type attribute of project and expansion (if any). If original project has the attribute of complicated type (originally or expansion), copy also can have identical complicated type.
The record of the project on " ownership ", that is, the project that this project (" having project ") has what other project (" directory items ") has tabulation. This in particular concerns the rule that the project folder that discusses fully below and all items that mentions below must belong to a project folder at least. In addition, about embedding project (following more discuss fully), embedding project is considered to wherein embed the part such as the project of the operations such as copy, deletion.
2. project label
In overall project space, identify uniquely project with ItemID. The Base.Item type definition store the field ItemID of the type GUID of this project identity. One project must accurately only have an identity in the data storage.
It is the data structure that comprises location and identification item purpose information that project is quoted. In this data model, the abstract type of definition ItemReference by name therefrom derives all items reference type. ItemReference (project is quoted) type definition the virtual method of Resolve by name (parsing). The Resolve method is resolved ItemReference and is returned a project. The method is covered by the concrete subtype of ItemReference, and the latter realizes given one purpose function of search terms when quoting. Call the Resolve method as the part of storage platform API 322.
ItemIDReference (item id is quoted) is the subtype of ItemReference. It has defined Locator (locator) and ItemID field. The territory of Locator field name (i.e. sign) project. It is processed by the locator resolution method that the value of Locator can be resolved to item domains. The ItemID field is the ItemID type.
ItemPathReference (item Path is quoted) is the particularization that defines the ItemReference of Locator and Path (path) field. Locator field identification one item domains. It is processed by the locator resolution method that the value of Locator can be resolved to item domains. (relatively) path during the Path field comprises take the item domains that provided by Locator as the storage platform name space of root.
Can not in set operation, use this class reference. Quote generally and must resolve by path resolving. The Resolve method of storage platform API 322 provides this function.
Reform discussed above represents by the reference type hierarchy shown in Figure 11. The other reference type of inheriting from these types can define pattern. They can be used as the type of aiming field in the relation statement.
3. project folder and classification
As below will more discussing fully, project team can be organized into the special item that is called project folder (not obscuring with the file of file). Yet do not resemble most of file system, a project can belong to a plurality of project folders, so that when a project accessed and when revision in a project folder, the project of this revision subsequently can be directly from another project folder access. In fact, although can occur from different project folders the access of a project, in fact real access is same project. Yet a project folder needn't have its all member's projects, or owns project together in conjunction with other file simply, so that the unnecessary deletion that causes project of the deletion of a project folder. Yet in some embodiment of the present invention, a project must belong to a project folder at least, so that if unique file of specific project is deleted, then to some embodiment, this project is automatically deleted, or in other embodiment, this project automatically becomes the member of default item file, and (" Trash Can (dustbin) " file is at the conceptive similar name file that uses in various systems based on file and file that is similar to. )
More discuss fully as following, project also can belong to the classification based on the feature of common description, feature is such as (a) item types (or type), (b) specific directly or the attribute (or attribute) of inheriting, or (c) corresponding to the particular value (or value) of item attribute. For example, comprise that the project of the particular community of individual associated person information can belong to contact person (Contact) classification automatically, it seems that any project with associated person information attribute also automatically belong to this classification. Equally, any project that has the position attribution of " New York City (New York) " value can belong to the New York classification automatically.
Classification is in the conceptive project folder part that is different from, project folder can comprise the mutually irrelevant project feature of common description (namely without), and each project in classification has common type, attribute or the value (" common point ") that this classification is described, just this concomitant basis that forms the relation between other project in it and this classification or those projects. In addition, although the membership qualification of the project in particular file folder is not compulsory based on any particular aspects of this project, yet to some embodiment, all items with common point relevant with a classification in classification can automatically become such other member on the hardware/software interface system level. Conceptive, classification also can be regarded the phantom item file as, its membership qualification is based on the ad hoc inquiry result of (as in the context of database), and the project that satisfies the condition (common point by classification is determined) of this inquiry should consist of such other membership qualification.
Fig. 4 is illustrated in the structural relation between project, project folder and the classification. A plurality of projects 402,404,406,408,410,412,414,418 and 420 are each project folder 422,424,426,428 and 430 member. Some project belongs to an above project folder, belongs to project folder 422 and 424 such as project 402. Some project, also be one or more classifications 432,434 and 436 member such as project 402,404,406,408,410 and 412, and other project, such as project 44,416,418 and 420 can not belong to any classification (although this major part does not resemble in certain embodiments, wherein has any attribute and automatically hints membership qualification in the classification, therefore in such embodiment in order not to be the member of any classification, project should be fully without feature). Opposite with the hierarchy of file, classification and project folder all have more the structure as directed digraph. Under any circumstance, project, project folder and classification all are project (although being different item types).
Opposite with file, file and catalogue, the feature of project of the present invention, project folder and classification is not " physics " in itself, because they do not have notional equivalence of physical container, thereby project can be present in position such more than. The ability that project is present in an above item file position and is organized into classification provides in the hardware/software interface level and has strengthened and the data of enriching degree are processed and the storage organization ability, has surmounted in the art current available ability.
4. pattern
A) basic schema
For the general basic of establishment and the project of use is provided, each embodiment of storage platform of the present invention comprises basis (Base) pattern that is used for creating and organizing the conceptual frame of project and attribute of setting up. Basic schema has defined project and the attribute of some particular type, and the feature that therefrom further derives these specific fundamental types of subtype. Use this basic schema that the programmer can be distinguished project (and type separately) and attribute (and type separately) conceptive. In addition, basic schema is listed the basic attribute set that all items can have, because all items (and corresponding item types) is this elementary item (and the corresponding item types) derivation from basic schema.
As shown in Figure 7, for some embodiment of the present invention, basic schema definition three top layer type: Item (project), Extension (expansion) and PropertyBase (attribute basis). As shown in the figure, the attribute definition by this basic " Item " item types item types. On the contrary, top layer attribute type " PropertyBase " does not have predefined attribute, only be an anchor position (anchor), therefrom derive all other attributes, and interknit (jointly deriving from single attribute type) by the attribute type of its all derivation. The Extension type attribute defines this expansion and has expanded which project, and definition sign that an expansion and another project are distinguished, because a project can have a plurality of expansions.
ItemFolder (project folder) is the subtype of Item item types, except the attribute of inheriting from Item, it characterizes the relation that is used for being established to its member (if any), although Identitykey (identity keyword) and Property (attribute) all are the subtype of PropertyBase. CategoryRef (catalogue is quoted) and then be the subtype of IdentityKey.
B) core schema
The various embodiment of storage platform of the present invention also are included as core (Core) pattern that top layer item types structure provides conceptual framework. Fig. 8 A is the block diagram that the project in the core schema is shown, and Fig. 8 B is the block diagram that attribute type in the core schema is shown. The function that is similar to core schema with the file of different extension name (* .com, * .exe, * .bat, * .sys etc.) and the differentiation of in based on file and file system folder, making between other criterion. In project-based hardware/software interface system, core schema has defined one group of core project type, their directly (by item types) or indirectly (by project subtype) all items feature is changed into that project-based hardware/software interface system is understood and can be with one or more core schema item types predetermined or the direct processing of predictable mode. Predetermined item types has reflected project the most frequently used in project-based hardware/software interface system, and therefore obtains the validity rank by understanding these project-based hardware/software interface system that comprise the predetermined item type of core schema.
In certain embodiments, core schema can not be expanded, and, does not have the directly item types subclassification from basic schema of other type that is, unless as the specific predetermined item types of deriving of the part of core schema. By forbidding the expansion (that is, by forbidding adding new project to core schema) to core schema, the use of storage platform trustship core schema item types is because each follow-up item types must be the subtype of core schema item types. This structure allows to have the flexibility of resonable degree when the other item types of definition when maintenance has the benefit of one group of predetermined core project type.
With reference to figure 8A, to various embodiment of the present invention, can be comprised following one or more by the specific project type of core schema support:
Category (classification): the effective classification of sports representative in project-based hardware/software interface system of this project type (and the subtype that therefrom derives).
Commodity (article): as the project of the identified things of value.
Device (equipment): the project with logical construction of support information disposal ability.
Document (document): have and to be explained and the project of opposite content by explaining corresponding to the application program of Doctype by project-based hardware/software interface system.
Event (event): the project of event occurs in some in the record environment.
Location (position): the project in represents physical position (such as the geographical position).
Message (message): the project of communication between two or more main bodys (below definition).
Principal (main body): but at least one sure project of identity verification (such as, the sign of individual, tissue, group, family, author, service etc.) except ItemId had.
Statement (statement): have the project about the customizing messages of environment, include but not limited to: policy, reservation, voucher etc.
Similarly with reference to figure 8B, can be comprised following one or more by the particular community type of core schema support:
Certificate (certificate) (the basic PropertyBase type from basic schema derives)
PrincipalIdentityKey (subject identity keyword) (the IdentityKey type from basic schema derives)
PostalAddress (postal address) (the Property type derives from basic schema)
RichText (rich text) (the Property type derives from basic schema)
EAddress (Email geology) (the Property type derives from basic schema)
IdentitySecnrityPackage (identity security bag) (the Relationship type derives from basic schema)
RoleOccupancy (resident role) (the Relationship type derives from basic schema)
BasicPresence (basis exists) (the Relationship type derives from basic schema) these projects and attribute further describe by the separately attribute of listing in Fig. 8 A and Fig. 8 B.
5. concern
Relation is binary crelation, and one of them project is designated as the source, and another is designated as target. Source item and destination item interrelate by relation. The life cycle of source item general control relation. That is, deleted when source item, the relation between the project is also deleted.
Relation is classified into: comprise (Containment) and quote (Reference) relation. The life cycle of inclusion relation control destination item, and adduction relationship does not provide any life cycle management semantic. Figure 12 illustrates the mode of relation classification.
Inclusion relation is classified into again to be held (Holding) and embeds (Embedding) relation. When relation that all of a project are held is removed, this project is deleted. Hold and concern by reference counter mechanism control target. Imbeding relation can be to compound project modeling, and can be counted as the exclusive relation of holding. A project can be one or more related targets of holding; But a project can only be the target of an imbeding relation. Can not be that arbitrary other held or the target of imbeding relation as the project of the target of imbeding relation.
Adduction relationship is not controlled the life cycle of destination item. They can be that pendulous-destination item can not exist. Adduction relationship can be used for quoting project in any place (that is, comprising remote data storage) modeling of overall project name space.
The project that obtains does not obtain certain relation automatically, and application program is the relation of request items clearly. In addition, revise relation and do not revise source or destination item; Similarly, add relation and do not affect source/destination item.
A) relation statement
The following element definition of explicit relationship type;
Specified relationship name in Name (name) attribute
One of following relationship type: hold, embed, quote. This appointment in Type (type) attribute.
The source and target end points. Each end points is specified institute's referenced items destination name and type.
The source endpoint field generally is ItemID (item id) type (without proper notice), and must quote the project in storing with the same data of relationship example.
To holding and imbeding relation, the target endpoint field must be ItemIDReference (item id is quoted) type, and it must quote the project in identical storage with relationship example. To adduction relationship, target endpoint can be any ItemReference (project is quoted) type, and can quote the project in other storage platform data storage.
Can optionally state one or more fields of scalar or PropertyBase (attribute basis) type. These fields can comprise the data that are associated with this relation.
Relationship example is stored in the holotopy table.
Each relationship example is uniquely by combination (source ItemID, relations I D) sign. All are derived from the relation of given project, and relations I D is unique in given source ItemID, and no matter their type.
Source item is the owner of relation. And the life cycle that the project control that is designated as the owner concerns, relation itself is separated with the project relevant with them. Storage platform API322 is provided for representing the mechanism of the relation that is associated with project.
Here be the example of a relation statement.
<Relationship Name=″Employment″BaseType=″Reference″>
       <Source Name=″Employee″ItemType=″Contact.Person″/>
       <Target Name=″Employer″ItemType=″Contact.Organization″
           ReferenceType=″ItemIDReference″/>
       <Property Name=″StartDate″Type=″the storage
       platformTypes.DateTime″/>
       <Property Name=″EndDate″Type=″the storage
       platformTypes.DateTime″/>
       <Property Name=″Office″Type=″the storage
       platformTypes.DateTime″/>
</Relationship>
This is the example of adduction relationship. If the individual event of being quoted by the source does not exist, then can not create this relation. If this individual event is deleted, the relationship example between individuals and organizations is also deleted. If yet organize project deleted, concern not deletedly, and it is pendulous.
B) hold relation
The life cycle management that the relation of holding is used for the based target project comes the reference count modeling.
Project can be for the source endpoint to zero or a plurality of relations of project. The project that is not the embedding project can be the destination item of holding in the relation one or more.
The target endpoint reference type must be ItemIDReference, and it must quote the project in the storage identical with relationship example.
Hold the life cycle management that concerns the implementation goal end points. Hold relationship example and be atomic operation as the establishment of the project of target. Can create the hold relationship example of other of same project as target. Hold relationship example when deleted when having last as target endpoint of given project, this destination item is also deleted.
The type of the end points project of appointment is generally forced when the example of this relation of establishment in the relation statement. The type of end points project can not change after relation is set up.
Hold to close in the name space that ties up to the formation project and play key effect. They comprise " Name (name) " attribute, and its objective definition project is with respect to the source item destination name. To all relations of holding that is derived from given project, relative name is unique. Begin to form the full name of this project to the orderly class table of the relative name of given project from root Element.
The relation of holding forms a directed acyclic graph (DAG). Hold when concerning in establishment, system guarantees not produce the loop, thereby the name space of guaranteeing project forms DAG.
Although hold the life cycle of relation control destination item, it does not control the uniformity of the operation of target endpoint project. Destination item is independent of by holding in operation and concerns the project that has it. As hold copy, movement, backup and other operation on the project in related source do not affect as homonymous target project-for example, backup file folder project does not automatically back up all items in this document folder (target in FolderMember (file member) relation).
The below holds related example:
    <Relationship Name=″FolderMembers″BaseType=″Holding”>
           <Source Name=″Folder″ItemType=″Base.Folder″/>
           <Target Name=″Item″ItemType=″Base.Item″
               ReferenceType=″ItemIDReference″/>
    </Relationship>
The FolderMember relation makes the concept of file become the generic set of project.
E) imbeding relation
Imbeding relation is with the conceptual modelling of the exclusive control of the life cycle of destination item. They allow the concept of complex item.
Imbeding relation example and be atomic operation as the establishment of the project of target. A project can be the source of zero or a plurality of imbeding relations. Yet a project can be one and only be the target of an imbeding relation. Project as the target of imbeding relation can not be to hold related target.
The target endpoint reference type must be ItemIDReference, and it must quote the project in storing with the relationship example identical data.
The type of the end points project of appointment is generally forced when the example of this relation of establishment in the relation statement. The type of end points can not change after relation is set up.
Imbeding relation is controlled the operational consistency of this target endpoint. For example, the operation of serialization project can comprise that serializing all is derived from all imbeding relations of this project and all its targets; The project that copies also copies all its embedding projects.
The below is the example statement:
  <Relationship Name=″ArchiveMembers″BaseType=″Embedding”>
               <Source Name=″Archive″ItemType=″Zip.Archive″/>
               <Target Name=″Member″ItemType=″Base.Item″
                   ReferenceType=″ItemIDReference″/>
               <Property Name=″ZipSize″Type=″the storage
               platformTypes.bigint″/>
               <Property Name=″SizeReduction″Type=″the storage
               platformTypes.float″/>
  </Relationship>
D) adduction relationship
Adduction relationship is not controlled the life cycle of the project that it quotes. Especially, adduction relationship does not guarantee the existence of target, does not guarantee that the type of target is as appointment in the relation statement yet. This means that adduction relationship can be pendulous. And adduction relationship can be quoted the project in other data storage. Adduction relationship can be regarded the concept that is similar to the link on the webpage as.
The below is the example of adduction relationship explanation:
    <Relationship Name=″DocumentAuthor″BaseType=″Reference″>
           <Sourc ItemType=″Document″
           ItemType=″Base.Document″/>
           <Target ItemType=″Author″ItemType=″Base.Author″
               ReferenceType=″ItemIDReference″/>
           <Property Type=″Role″Type=″Core.CategoryRef″/>
           <Property Type=″DisplayName″Type=″the storage
           platformTypes.nvarchar(256)″/>
    </Relationship>
End points in target allows any reference type. The project that participates in adduction relationship can be any item types.
Adduction relationship is used for the most of non-life cycle management relationship modeling between the project. Because do not force the existence of target, adduction relationship is convenient to loosely-coupled relationship modeling. Adduction relationship can be used for being included in the destination item in the storage on other computer in other storage.
E) Rule and constraint
Following ancillary rules and constraint are applied to relation:
A project must be the target of (only imbeding relation) or (one or more relation of holding). An exception is root Element. A project can be the target of zero or a plurality of adduction relationships.
Project as the imbeding relation target can not be to hold related source. It can be the source of adduction relationship.
If a project from document upgrading, then can not be to hold related source. It can be the source of imbeding relation and adduction relationship.
Project from document upgrading can not be the target of imbeding relation.
F) ordering of relation
In an individual at least embodiment, the ordering of storage platform support relation of the present invention. Finish ordering by the attribute of " Order (ordering) " by name in the fundamental relation definition. In the Order field without unique constraints. Do not guarantee the order with the relation of same " Order " property value, yet guarantee that they can sort after the relation of band lower " Order " value and before the relation of being with higher " Order " field value.
Application program is by obtaining giving tacit consent to the relation of order upper ordering of combination (SourceItemID, RelationshipID, Order). All relationship example that are derived from given project are ranked into single set, and no matter the type that in set, concerns. Yet this assurance, all relations of given type (such as, FolderMembers (file member)) are ordering subsets of the set of relationship of given project.
Realize the operation of the ordering of one group of support relation for the treatment of the data storage API312 of relation. Introduce following term and help to explain those operations:
RelFirst is with first relation of order value OrdFirst in the ordered set;
RelLast is last relation of ordered set crossed belt order value OrdLast;
RelX is with the given relation of order value OrdX in the set;
RelPrev is close to the band of the RelX relation less than the order value OrdPrev of OrdX in the set; And
RelNext is close to the band of the RelX relation greater than the order value OrdNext of OrdX in the set.
Operation includes but not limited to:
InsertBeforeFirst (SourceItemID, Relationship) inserts relation as first relation in the set. The value of " Order " attribute of new relation can be less than OrdFirst.
InsertAfterLast (SourceItemID, Relationship) inserts relation as last relation in the set. The value of " Order " attribute of new relation can be greater than OrdLast.
InsertAt (SourceItemID, ord, Relationship) inserts with the relation to the value of " Order " attribute appointment.
InsertBefore (SourceItemID, ord, Relationship) inserted this relation before with the relation of given order value. New relation can be assigned with " Order " value, and it but does not comprise this two values between OrdPrev and ord.
InsertAfter (SourceItemID, ord, Relationship) inserts this relation after the relation with given order value. New relation can be assigned with " Order " value, and it but does not comprise this two values between ord and OrdNext.
MoveBefore (SourceItemID, ord, Relationship) will move to the relation of given relations I D band and specify before the relation of " Order " value. Relation can be assigned with new " Order " value, and it but does not comprise this two values between OrdPrev and ord.
MoveAfter (SourceItemID, ord, Relationship) will move to the relation of given relations I D band and specify after the relation of " Order " value. This relation can be assigned with new order value, and it but does not comprise this two values between ord and OrdNext.
Arrive such as prerequisite, each project must be the member of project folder. According to relation, each project must accompany a relation with an item file. In some embodiment of the present invention, some relation is represented by the relation that exists between all projects.
Such as the realization to various embodiments of the present invention, relation provides an oriented binary crelation, and it extends to another project (target) by a project (source). Therefore relation is had by source item (extending its project), if the source is removed then that relation is removed (deleted such as relation when source item is deleted). In addition in some cases, relation can be shared the ownership of (owning together) destination item, and such ownership only can be reflected in IsOwned (by the having) attribute (or its equivalent attribute) of relation (such as Fig. 7 to shown in the attribute of a relation type). In these embodiments, create new IsOwned relation and automatically increase progressively reference count on this target, and delete can successively decrease the reference count on this destination item of such relation. To these specific embodiments, if project has the reference count greater than 0, then exist, if item count reaches 0 automatically deletion. Again, project folder is the project with one group of relation of (maybe can have) and other project, and these other projects comprise the membership qualification of project folder. Other actual realization of relation is possible, and conceives to realize function described herein by the present invention.
No matter actual realization how, relation is the selectable connection from an object to another object. A project belongs to an above project folder and one or more classification, no matter and these projects, file and classification that to be publicly-owned or privately owned ability be is determined by the meaning that gives existing in the project-based structure (or shortage). These logical relations are to distribute to the meaning of one group of relation, no matter and the physics realization that it is used for realizing function described here specially how. Logical relation is set up (or opposite) between project and file or classification, because each of project folder and classification is the project of particular type in essence. Therefore, can be as other project project folder and classification are worked (copy, add in the email message, embed document etc., and unrestricted), and project folder can use identical mechanism serialization and de-serialization (import and derive) with classification as other project. (for example in XML, all items can have serialized form, and these lattice are applied to project folder, classification and project comparably).
The above-mentioned relation of the relation between representative project and the project folder thereof logically can extend to project folder, extend to project or both from project folder from project. The relation that extends to project folder from a project in logic shows that this project folder is publicly-owned for this project, and shares its membership qualification information with this project; On the contrary, the logical relation that lacks from the project to the project folder shows that this project folder is privately owned to this project, and does not share its membership qualification information with this project. Similarly, the relation that extends to project from project folder in logic shows that this project is publicly-owned, and can share with this project folder, shows that this project is privately owned and can not shares and lack the logical relation that extends to project from project folder. Therefore, when deriving project folder to other system, it is the project of " publicly-owned ", it is shared in new environment, and when its project folder of project search is sought other sharable project, it is the project folder of " publicly-owned ", and it provides information about shared with the project that belongs to it to this project.
Fig. 9 is the block diagram that interconnecting relation between project folder (itself also is project), its member's project and project folder and the member's project thereof is shown. Project folder 900 has a plurality of projects 902,904 and 906 as its member. Project folder 900 have from the itself to the project 902 concern 912, it shows that project 902 is publicly-owned, and can with project folder 900, its member 904 and 906 and any other project folder, classification or the project (not shown) of any accessible items file 900 share. Yet it doesn't matter from project 902 to project folder project 900, and this shows that 900 pairs of projects 902 of project folder are privately owned, and do not share its membership qualification information with project 902. On the other hand, project 904 really have from the itself to the project folder 900 concern 924, this shows that project folder 900 is publicly-owned, and shares its membership qualification information with project 904. Yet 904 the relation from project folder 900 to project not, this shows that project 904 is privately owned, and not with project folder 900, its other member 902,906, and any other project folder, classification or the project (not shown) of accessible items file 900 share. Opposite with its relation to project 902 and 904 (or not having these relations), project folder 900 have from itself to project 906 concern 916, and project 906 have get back to project folder 900 concern 926, show that together project 906 is publicly-owned, and can to file 900, its member 902 and 904 and any other project folder, classification or the project (not shown) of accessible items file 900 share, and project folder 900 is publicly-owned, and shares its membership qualification information with project 906.
Such as front discussion, the project in project folder does not need to share concomitant, because project folder is not by " description ". On the other hand, classification is by the common common point of all its member's projects is described. Therefore, the membership qualification of classification is limited to the project with described common point inherently, and in certain embodiments, all items that satisfies the description of classification automatically becomes such other member. Therefore, although project folder allows to represent unessential type structure by its membership qualification that classification allows membership qualification based on the common point of definition.
Certainly, it is logic in essence that classification is described, thereby classification can be described by any logical expressions of type, attribute and/or value. For example, can be its membership qualification to the logical expressions of a classification, have one of two attributes or both projects to comprise. If these attributes that classification is described are " A " and " B ", then such other membership qualification can comprise have attribute A and do not have B project, have attribute B and the project that do not have the project of A and have attribute A and B concurrently. Describe the logical expressions of attribute by logical operator " OR (or) ", wherein describing member's group by classification is the project with attribute A OR B. As understood by those skilled in the art, also can use similar logical operator (including but not limited to independent " AND (with) " " XOR (XOR) " and " NOT (non-) " or its combination) to describe classification.
Although between project folder (not describing) and classification (describing), have any different, but in many embodiment of the present invention, the classification relation that arrives in principle project reaches the above same method in the face of project folder and project of the project relationship that arrives classification and discloses.
Figure 10 is the block diagram that the interconnecting relation between a classification (itself also being project), its member's project, classification and the member's project thereof is shown. Classification 1000 has a plurality of projects 1002,1004 and 1006 as the member, and all these shares certain combination of common attribute, value and the Class1 008 (concomitant description 1008 ') described by classification 1000. Classification 1000 has from itself to project 1002 relation, it shows that project 1002 is publicly-owned, and can with classification 1000, its member 1004 and 1006 and any other classification, project folder or the project (not shown) of addressable classification 1000 share. Yet, 1000 the relation from project 1002 to classification not, this shows that 1000 pairs of projects 1002 of classification are privately owned, and does not share the membership qualification information with project 1002. On the other hand, project 1004 really have from itself to classification 1000 concern 1024, this shows that classification 1000 is publicly-owned, and shares its membership qualification information with project 1004. Yet, there is not the relation that extends to project 1004 from classification 1000, this shows that project 1004 is privately owned, and can not with classification 1000, its other member 1002 and 1006 and any other classification, project folder or the project (not shown) of addressable classification 1000 share. Opposite with the relation (or not having this relation) of it and project 1002 and 1004, classification 1000 have from itself to project 1006 concern 1016, and what project 1006 had classification of getting back to 1000 concerns 1026, this shows that together project 1006 is publicly-owned, and can with classification 1000, its program member 1002 and 1004 and any other classification, project folder or the project (not shown) of addressable classification 1000 share, and classification 1000 is publicly-owned, and shares its membership qualification information with project 1006.
At last, because classification and project folder itself are projects, and project can cross correlation, classification can be related to project folder, vice versa, and in some other embodiment, classification, project folder and project can be related to respectively other classification, project folder and project. Yet in various embodiments, item file clamping structure and/or classification structure forbid comprising the loop in the hardware/software interface system level. When project folder and classification structure are similar to digraph, forbid that the embodiment in loop is similar to directed acyclic graph (DAG), according to the mathematical definition in graph theory field, DAG is the digraph that does not wherein have the path to begin on same summit and stop.
6. extensibility
As mentioned above, this storage platform aims to provide originate mode group 340. Yet at least in certain embodiments, this storage platform allows also to comprise that the clients such as stand alone software retail trader (ISV) create new model 344 (being new project and nested element type). The item types that this section is passed expansion definition in originate mode group 340 through discussion and nested element type (or being called for short " element " type) are conceived to create the mechanism of this pattern.
Preferably, the following constraint of expansion of the initial set of project and nested element type:
Allow ISV to introduce new item types, i.e. subtype Base.Item;
Allow ISV to introduce new nested element type, i.e. subtype Base.NestedElement;
Allow ISV to introduce new expansion, i.e. subtype Base.NestedElement; But
ISV can not subclassification by any type of originate mode group 340 definition of storage platform (project, embed element or expansion type).
The item types or the embedding element type that define owing to the originate mode group by storage platform may inaccurately mate the needs of ISV application program, must allow ISV to customize the type. This has just considered the concept of expansion. Expansion is strongly-typed example, still (a) they can not independently exist, and (b) they must be attached to project or nested element.
Except solving the needs to the pattern extensibility, expansion also is intended to solve " many classification " problem. In certain embodiments because storage platform may not supported many inheritances or overlapping subtype, application program can use the expansion as the overlapping type instance of modelling (as document be legal documents be again security document) method.
A) extension
For the extensibility of project is provided, data model also defines the abstract type of Base.Extension by name. This is the root type of the hierarchy of expansion type. Application program can subclassification Base.Extension, to create specific expansion type.
In basic schema as the Base.Extension type of giving a definition:
    <Type Name=″Base.Extension″IsAbstract=″True″>
       <Propety Name=″ItemID″
               Type=″the storage platformTypes.uniqueidentified″
               Nullable=″false″
               MultiValued=″false″/>
       <Property Name=″ExtensionID″
               Type=″the storage platformTypes.uniqueidentified″
                  Nullable=″false″
                  MultiValued=″false″/>
    </Type>
The ItemID field comprises the ItemID of the project related with this expansion. Project with this ItemID must exist. If the project with given ItemID does not exist, then can not create expansion. When project deleted, deleted with all expansions of same ItemID. Two tuples (ItemID, ExtensionID) have identified the expansion example uniquely.
The structure of expansion type is similar to the structure of item types:
Expansion type has field;
Field can be primitive or nested element type; And
Expansion type can be by subclassification.
Following restriction is applied to expansion type
Expansion can not be the source and target of relation;
The expansion type example can not be independent of project and exist; And
Expansion type can not be as the field type in the storage platform type definition
Not constraint of type to expansion that can be related with given item types. Any expansion type allows any item types of expansion. When a plurality of expansion examples are affixed to a project, they are independent of one another in structure and behavior.
The expansion example is stored and from item access. All expansion type examples can be from overall extended view access. Can form an effectively inquiry, it will return all examples of the expansion of given type, and no matter the project of their related what types. Storage platform API provides the programming model that can store, retrieve and revise extension.
Expansion type comes the type of subclassification with the single succession model of storage platform. Derive the new expansion type of establishment from an expansion type. The structure of an expansion or behavior can not cover or structure or the behavior of alternative project type hierarchical structure. Be similar to item types, the expansion type example can directly be accessed by the view related with this expansion type. The ItemID of expansion shows which project they belong to, and can be used for from item objects corresponding to global keys eye diagram retrieval. Be the purpose of operational consistency, expansion is considered to be the part of project. Other operation commonly used of copy/mobile, backup/restoration and storage platform definition can operate in the expansion as the part of project.
Consider following example. In the Windows type group, define Contact (contact person) type.
    <Type Name=″Contact″BaseType=“Base.Item″>
       <Property Name=″Name″
                  Type=″String″
                  Nullable=″false″
                  MultiValued=″false″/>
       <Property Name=″Address″
                  Type=″Address″
                  Nullable=″true″
                  MultiValued=″false″/>
    </Type>
CRM (customer relation management) application developer is liked the CRM application extensions is appended to the contact person who is stored in the storage platform. The application developer definition comprises the CRM expansion of the treatable additional data structure of application program.
    <Type Name=″CRMExtension″BaseType=″Base.Extension″>
       <Property Name=″CustomerID″
                     Type=″String″
                  Nullable=″false″
                  MultiValued=″false″/>
      …
    </Type>
The HR application developer wishes also additional data to be appended to the contact person. These data are independent of the CRM application data. Application developer also can create-expand
    <Type Name=″HRExtension″EBaseType=″Base.Extension″>
       <Property Name=″EmployeeID″
                  Type=″String″
                  Nullable=″false″
                  MultiValued=″false″/>
      …
    </Type>
CRMExtension and HRExtension can append to two independent expansions of contacts purpose. They can create and access independently of one another.
In above-mentioned example, the field of CRMExtension type and method can not cover field and the method for contact person's hierarchy. The example that it should be noted that the CRMExtension type can be affixed to the item types that is different from the contact person.
When the searching linkman project, automatically do not retrieve its extension. Given contact item can visit its relevant extension with the expansion of the same ItemID of searching belt by inquiring about overall extended view.
Can visit CRMExtension expansions all in the system by CRMExtension type view, no matter and what project they belong to. Same project id is shared in all items expansion of a project. In above-mentioned example, contact item's example and additional CRMExtension and HRExtension example are shared same ItemID.
Following table has been summed up similitude and the difference between Item (project), Extension (expansion) and NestedElement (nested element) type:
Item, ItemExtension and NestedElement
  Item   ItemExtension   NestedElement
Item id storing queries/search Hierarchy with the project id project of oneself is stored in can the queried for items table in its oneself table The project id extension hierarchy of sharing project is stored in energy queried for items expansion table in its own table Do not have its oneself project id. Nested element is that the part of project is stored in the project and usually can only inquires about in comprising the context of project
Inquiry/hunting zone relation semanteme is related with project All examples that can search for an item types can have with the relation of project can by hold embed relevant with other project with soft relation All examples that can search for an extension type with extension is irrelevant usually can only be relevant by expanding. It is semantic that the expansion semantic category is similar to the embedding project Usually can only in the nested element type instance of single (comprising) project, search for and come relevant with project with nested element is irrelevant by field. Nested element is the part of project
B) expansion NestedElement type
The nested element type need not be identical with item types mechanism expansion. The expansion of nested element mechanism storage and the access identical with the nested element type field.
Data model has defined the root of the nested element type of Element by name (element).
        <Type Name=″Element″
              IsAbstract=″True″>
              <Property Name=″ElementID″
                      Type=″the storage platformTypes.uniqueidentifier″
                      Nullable=″false″
                      MultiValued=″false″/>
        </Type>
The NestedElement type is inherited from this type. The NestedElement element type defines-field in addition, and it is the multicomponent element.
        <Type Name=″NestedElement″BaseType=″Base.Element″
           IsAbstract=″True″>
               <Property Name=″Extensions″
                      Type=″Base.Element″
                      Nullable=″false″
                      MultiValued=″true″/>
        </Type>
NestedElement expands below, and the aspect is different from extension:
The nested element expansion is not expansion type. They do not belong to the expansion type hierarchy take the Base.Extension type as root.
Nested element expansion is stored with other field of this project, and be not the overall situation addressable-can not form the inquiry of all examples of retrieving given expansion type.
Other nested element (or project) is stored these expansions as Cun Chu. Resemble other nested groups, the NestedElement expansion is stored among the UDT. They can visit by Extension (expansion) field of nested element type.
Be used for the set interface of access multi-valued attribute also for access and iteration on the Extended-type group.
Following table is summed up and relatively Item expansion and NestedElement expansion.
Item expansion and NestedElement expansion
Extension The NestedElement expansion
Storing queries/search inquiry/hunting zone programmability behavior relation semantic item ID The extension hierarchy deposits its table in can inquire about special expansion API and the special inquiry energy correlation behavior on the expansion table and the project id of the irrelevant shared project of extension of all examples needs of an extension type by the queried for items expansion table Resemble to store the nested element usually can only in comprising the context of project, inquire about and usually can only in the nested element type instance of single (comprising) project, search for the NestedElement extension class like any other many-valued field of nested element; Use normal nested element type API do not allow behavior (?) expand the irrelevant project id that does not have it with NestedElement. The NestedElement expansion is the part of project
D. database engine
As mentioned above, data are stored on the database engine and realize. In the present embodiment, database engine comprise such as Microsoft SQL Server engine etc. realize the SQL query language, with the relational database engine of object relationship expansion. This section is according to present embodiment, and the data model that the data of description storage realizes provides the information of being used by the client computer of storage platform to the mapping of relational storage at logic API. Yet be appreciated that when adopting different database engines and can adopt different mappings. Really, also can realize in other types of database, such as object-oriented and XML database the storage platform conceptual data model except realizing at the relevant database engine.
Object-oriented (OO) Database Systems are that programming language object (such as C++, Java) provides continuation and affairs. The storage platform concept of " project " can be mapped to the object in the Object-Oriented Systems well, although the set that embeds must be added to object. Other storage platform type concepts such as similar inheritance and nested element type also are mapped to the system of object-oriented type. Object-Oriented Systems is support target identity usually; Therefore, the project identity can be mapped to object identity. The behavior of project (operation) is mapped to object method well. Yet the common inorganizable ability of OO system is also very poor aspect search. And OO system does not provide the support to destructuring and semi-structured data. For supporting complete storage platform data model described herein, resemble the concepts such as relation, file and expansion and need to add object data model to. In addition, need to realize as upgrading, synchronously, the mechanism such as notice and security.
Be similar to OO system, support the system of inheriting type based on single based on the XML database of XSD (XML mode-definition). Entry type system of the present invention can be mapped to the XSD Type model. XSD does not provide the support to behavior yet. The behavior of the necessary addition item of the XSD of project. The single XSD document of XML database processing is also inorganizable and widen search capability. As object-oriented database, for supporting data model described herein, need to be incorporated into this XML database such as other concepts such as relation and files; And need to realize as synchronously, the mechanism such as notice and security.
About following trifle, provide a small amount of diagram so that general information illustration: Figure 13 is the diagram that informing mechanism is shown. Figure 14 illustrates the diagram that two affairs are all inserted new record the example of same B tree. Figure 15 illustrates data and changes testing process. Figure 16 illustrates exemplary catalogue tree. The existing file double-layered quilt that Figure 17 illustrates wherein based on the file system of catalogue moves in the storage of storage platform data.
1. use the data storage of UDT to realize
In the present embodiment, the relevant database engine 3 14 that comprises in one embodiment Microsoft SQL Server engine is supported built-in scalar type. Built-in scalar type is " primary (native) " and " simply ". They are that primary meaning is, the user can not define themselves type; They are that simple meaning is, the user can not encapsulate complicated structure. User-defined type (hereinafter referred to as UDT) provides a kind of mechanism for surpassing or surmount the type extensibility of primary scalar type system by making the user come the expansion type system by defining complicated structured type. In case defined by the user, UDT can be for the type system that can use built-in scalar type Anywhere.
Press one aspect of the present invention, the storage platform pattern is mapped to the UDT class in the database engine storage. The data stored items is mapped to the UDT class that derives from the Base.Item type. Be similar to project, expansion also can be mapped to the UDT class and use and inherit. The root expansion type is Base.Extension, derives all expansion types from it.
UDT is the CLR class, and it has state (being data field) and behavior (being routine). Use any managed language (c#, VB.NET etc.) definition UDT. UDT method and operator can be called by the example for the type in T-SQL. UDT can be: in the row in the type, T-SQL of row the type of the parameter of routine or in T-SQL type of variables.
The storage platform pattern to being mapped in of UDT class high-level upper be direct fully. Generally speaking, the storage platform pattern is mapped to the CLR name space. The storage platform type is mapped to the CLR class. The succession mirror image of CLR class the succession of storage platform type, and the storage platform attribute is mapped to the CLR generic attribute.
2. project mapping
Can be searched for globally in order to wish project, and in the relational data of present embodiment, support to inherit and the type substitutability, be in the single table with the row of type B ase.Item, to store all items to a kind of possible realization of the project storage in the database storage. The type of service substitutability can be stored all types of projects, and can come filtered search by the subtype of the item types of the operator of " is of (type) " of using Yukon.
Yet, owing to involve the overhead that is associated with this method in the present embodiment, by top type projects are divided, so that the project of each type " family " stores in the independent table. In this partition mode, each is directly created a table from the item types that Base.Item inherits. As mentioned above, the substitutability of these type type of service is stored in the suitable type family table below the succession. Only have from the first order succession of Base.Item and ad hoc processed.
Use one " shade " but the copy of the overall situation search attribute of table storage all items. This table can be safeguarded by the Update () method of storage platform API, make the change of all data by the method. Do not resemble type family table, this overall repertory only comprises the item level scalar attribute of this project, rather than full UDT item objects. Overall situation repertory allows to navigate to the item objects that is stored in the type family table by representing ItemID and TypeID (type I D). Project in the common uniquely identification data storage of ItemID. Can use the metadata of not giving description here that TypeID is mapped to type name and the view that comprises this project. Because seeking project by its ItemID all is operation commonly used in the context of overall repertory and other situation, the therefore given ItemId of project provides GetItem () function to come the search terms object.
For ease of access and the details of hiding as much as possible realization, all inquiries of project can be carried out the view that makes up on the table that impinges upon above-mentioned project. Particularly, to the family table establishment view of each item types for adequate types. These type views can be selected the type that is associated, comprise all items of subtype. For simplicity, except the UDT object, view can represent row to all TLDs that comprise the type of inheriting field.
3. expansion mapping
Expansion is very similar to project, and has some identical requirement. As support adoptive another root type, many same considerations and relatively compromise during expansion is stored. For this reason, to the mapping of the similar type of expanded application family, rather than single table method. Certainly, in other embodiments, can use single table method. In the present embodiment, expansion by ItemID only with an item association, and be included in ExtensionID unique in the context of project. As project, given ItemID and the right identity of ExtensionID of comprising can provide a function to be used for the retrieval expansion. Be similar to the item types view, can create view to each expansion type.
4. nested element mapping
Nested element is can be embedded into project, expansion, relation or other nested element to form the type of dark nested structure. Be similar to project and expansion, nested element realizes as UDT, but they are stored in project and the expansion. Therefore, nested element does not surmount their project and the Storage Mapping of the mapping of extension container. In other words, in system, do not have directly to store the table of the example of NestedElement type, and be not specifically designed to the view of nested element.
5. object identity
Each entity in data model, namely each project, expansion and relation have unique key value. A project is identified uniquely by its ItemId. Expansion is identified uniquely by composite key (ItemId, ExtensionId). Relation is identified by composite key (ItemId, RelationId). ItemId, ExtensionId and RelationshipId all are GUID values.
6.SQL object naming
All objects that create in the data storage can be stored in from the SQL pattern name that storage platform pattern name derives. For example, storage platform basic schema (normal claim " basis ") can be created in the type in " [System.Storage] " SQL pattern, such as " [System.Storage] .Item ". The name that produces can be with the determiner prefixing to eliminate the conflict of name. Can use at suitable place exclamation mark (! ) as the decollator of each logical gate of name. The below's table has been summarized the name custom that is used for object in the data storage. Name custom with the modification of the example that is used for the visit data storage is listed each schema elements (project, expansion, relation and view).
Object The name character modification Describe Example
Master project search view Master!Item The summary of project is provided in current item domains   [System.Storage].   [Master!Item]
The project search view of classifying type ItemType All properties data from project and any parent type are provided   [AcmeCorp.Doc].   [OffceDoc]
Main expanded search view Master!Extension Be provided at the summary of all expansions in the current item domains   [System.Storage].   [Master!Extension]
The expanded search view of classifying type Extension!extensionType Provide all properties data to expansion   [AcmeCorp.Doc].   [Extension!SlickyNote]
The primary relation view Master!Relationship Be provided at related summary in the current item domains   [System.Storage].   [Master!Relationship]
Relational view Relationship!relationship Name The data that provide all to be associated with given relation   [AcmeCorp.Doc].   [Relationship!Authors   FromDocument]
View View!viewName The Schema-based view definition provides row/type   [AcmeCorp.Doc].   [View!DocumentTitles]
7. row name
When shining upon arbitrary object model to storage, naming conflict might occur in the additional information owing to storing with application object. For avoiding naming conflict, the particular column of all non-types (not mapping directly to the row of the attribute of the name in the type declarations) underscore character (_) prefixing. In the present embodiment, underscore character (_) does not allow the beginning character as any identifier attribute. In addition, for being unified in the name between the storage of CLR and data, all properties of storage platform type or schema elements (relation etc.) should have the first character of capitalization.
8. search view
Provide view by storage platform, be used for the content of search storage. Provide the SQL view to each project and expansion type. In addition, provide view to support relation and view (by the data model definition). All SQL views and the bottom table in storage platform are read-only. The below uses the Update () method of storage platform API can store or change data more abundant description.
<view-name 〉] access. BookSales] visit. Because the output format of view is self-defining (being determined by the arbitary inquiry that side who defines view provides) on the basis of each view, row Schema-based view definition is directly shone upon.
All SQL search views in the storage of storage platform data use the following ordering custom of row:
Logic " keyword " row such as the view result of ItemId, ElementId, RelationshipId etc.
Such as the metadata information about result type such as TypeId.
Change such as CreateVersion (establishment version), UpdateVersion (renewal version) etc. and follow the tracks of row
The row of type special use (attribute of the type of statement)
The view of type special use (family's view) also comprises the object row of returning an object value
The member of each type family can search for a series of eye diagrams, and each item types has a view in the data storage. Figure 28 is the diagram that the concept of project search view is shown.
A) project
Each project search view comprises delegation to each example of the project of particular type or its subtype. For example, the view of document can return the example of Document (document), LegalDocument (legal documents) and ReviewDoeument (checking document). Given this example, as shown in Figure 29 generalities item eye diagram.
(1) master project search view
Each example definition of storage platform data storage is called the special item view of master project view (Master Item View). This view provides the survey information about each project in the data storage. View provides row to each item types attribute, a row description entry purpose type wherein, and some row are used for providing changing to be followed the tracks of and synchronizing information. Item] " identify the master project view.
Row Type Describe
  ItemId   ItemId The storage platform identity of this project
  _TypeId   TypeId The TypeId-of this project identify this project definite type and can be for retrieve information about type with metadata categories
  RootItemId   ItemId Control first non-embedded elder generation's of this purpose life cycle ItemId
<the overall situation changes follows the tracks of 〉   … The overall situation changes trace information
<item attribute 〉   n/a Each item types attribute there are row
(2) the project search view of classifying type
Each item types also has the search view. Be similar to the root Element view, this view also provides by the access of " Item " row to item objects. In data storages, use name [schemaName] .[itemTypeName] identify the project search view of each classifying type. [AcmeCorp.Dod] .[OfficeDoc for example].
Row Type Describe
  ItemId  ItemId The storage platform identity of this project
<type change is followed the tracks of 〉  … The type change trace information
<father attribute 〉 <attribute is special-purpose 〉 Each father's attribute there are row
<item attribute 〉 <attribute is special-purpose 〉 Each exclusive attribute to this type has row
  Item The CLR type of project The type of the project of CLR object one statement
9.
A) extension
All items expansion in the WinFs storage also can use the search view to visit.
(1) main expanded search view
Each example definition one of data storage is called the special extended view of main extended view (Master Extension View). This view provides the survey information about each expansion in the data storage. This view has row to each extended attribute, and wherein row are described the type of expansion, and some row are used for providing change to follow the tracks of and synchronizing information. Extension] " the main extended view of sign in the data storage.
Row Type Describe
  ItemId   ItemId Expand therewith the storage platform identity of related project
  ExtensionId   ExtensionId(GUID) The id of this expansion example
  _TypeId   TypeId The TypeId-of this expansion identifies the definite type of this expansion, and can be for the information of retrieving with metadata categories about this expansion
<the overall situation changes follows the tracks of 〉   … The overall situation changes trace information
<extended attribute 〉 <attribute is special-purpose 〉 Each expansion type attribute there are row
10.
(1) the expanded search view of classifying type
Each expansion type also has the search view. Be similar to main extended view, this view also provides by _ Extension and is listed as the access to item objects. ExtensionTypeName] identify the expanded search view of each classifying type. OfficeDocExt].
Row Type Describe
  ItemId   ItemId Expand therewith the storage platform identity of related project
  ExtensionId   ExtensionId(GUID) The Id of this expansion example
<type change is followed the tracks of 〉   … The type change trace information
<father attribute 〉 <attribute is special-purpose 〉 Each father's attribute there are row
<extended attribute 〉 <attribute is special-purpose 〉 Exclusive attribute to each this type has row
  _Extension The CLR type of expansion example The type of the expansion of CLR object-statement
B) nested element
All nested elements are stored among project, expansion or the relationship example. Therefore, they can visit by inquiring about suitable project, expansion or relation search view.
C) relation
As above discuss, relation is formed on the elementary cell that links between projects in the storage of storage platform data.
(1) primary relation search view
Each data storage provides-the primary relation view. This view provides the information about all relationship example in the data storage. Relationship] " identify the primary relation view.
Row Type Describe
 ItemId   ItemId The identity of source endpoint (ItemId)
 RelationshipId   RelationshipId(GUID) The id of this relationship example
 _RelTypeId   RelationshiPTypeId The RelTypeId-of this relation identifies the type of this relationship example with metadata categories
<the overall situation changes follows the tracks of 〉   … The overall situation changes trace information
 TargetItemReference   ItemReference The identity of target endpoint
 _Relationship   Relationship Example to the Relationship object of this example
(2) relationship example search view
The relation of each statement also has the search view of all examples that return this particular kind of relationship. Be similar to the primary relation view, this view provides the row of name to each attribute of this relation data. RelationshipName] identify each relationship example search view. DocumentAuthor].
Row Type Describe
 ItemId ItemId The identity of source endpoint (ItemId)
 RelationshipId RelationshipId(GUID) The id of this relationship example
<type change is followed the tracks of 〉 The type change trace information
 TargetItemReference ItemReference The identity of target endpoint
<parent name 〉 ItemId The name attribute of source endpoint identity (another name of ItemId)
<destination name 〉 The class of ItemReference or derivation The name attribute of target endpoint identity (another name of TargetItemReference and model (cast))
<attribute of a relation 〉 <attribute is special-purpose 〉 Attribute to each contextual definition has row
 _Relationship The CLR type of relationship example The type of CLR object-statement relation
d)
11. upgrade
All views are read-only in the storage of storage platform data. Be the new example of establishment data model elements (project, expansion or relation), or upgrade existing example, must use ProcessOperation or the ProcessUpdategram method of storage platform API. The ProcessOperation method is the process of single storage, and it is the data definition storage of " operation " of action that intend to be carried out by the consumption refinement. The ProcessUpdategram method is the process of storage, and it takes to be called one group of orderly operation of " more new element (updategram) ", and the set of execution is intended in their common refinements.
Operational format is extendible, and is provided at the various operations on the schema elements. Some common operation comprises:
1. project operation:
A.CreateItem (creating a new project in the related context embedding or hold)
B.UpdateItem (upgrading an existing project)
2. relational operation:
A.CreateRelationship (related example is quoted or held in establishment)
B.UpdateRelationship (upgrading a relationship example)
C.DeleteRelationship (removing a relationship example)
3. extended operation
A.CreateExtension (add one and expand to existing project)
B.UpdateExtension (upgrading an existing expansion)
C.DeleteExtension (deletion one expansion)
Follow the tracks of and gravestone 12. change
More discuss fully as following, provided to change by the data storage and follow the tracks of and the gravestone service. This section is provided at the general introduction of the change trace information that represents in the data storage
A) change tracking
Each the search view that is provided by the data storage comprises the row that change trace information be used to providing; Those row are public to all items, expansion and relational view. It is indirectly to provide by the search view that makes up view itself thereon that the storage platform mode view that is defined clearly by the Model Design person does not automatically provide change trace information-this information.
Each element in the data storage can obtain changing trace information from two places: " master " element view and " classifying type " element view. Item] " and item eye diagram [AcmeCorp.Document] .[Document of classifying type] in obtain change trace information about the AcmeCorp.Document.Document item types.
(1) change in " master " search view is followed the tracks of
Change trace information in the main search view provide about the establishment of element and upgrade version information, about which synchronization partner create this element information, which synchronization partner to upgrade for the last time the information of this element and from each partner's the version number that creates and upgrade of being used for about. Identify partner's (the following describes) in the synchronized relation with partner's keyword. Type [System.Storge.Store] .ChangeTrackingInfo by name _ the single UDT object of ChangeTrackingInfo comprises all these information. Define styles in the System.Storage pattern. In all global search views of project, expansion and relation, can obtain _ ChangeTrackingInfo. The type definition of _ ChangeTrackingInfo is:<Type Name=" ChangeTrackingInfo " BaseType=" Base.NestedElement " 〉
<FieldProperty Name=″CreationLocalTS″Type=″SqlTypes.SqlInt64″
Nullable=″False″/>
<FieldProperty Name=″CreatingPartnerKey″Type=″SqlTypes.SqlInt32″
  Nullable=″False″/>
<FieldProperty Name=″CreatingPartnerTS″Type=″SqlTypes.SqlInt64″
  Nullable=″False″/>
<FieldProperty Name=″LastUpdateLocalTS″Type=″SqlTypes.SqlInt64″
  Nullable=″False″/>
<FieldProperty Name=″LastUpdatingPartnerKey″Type=″SqlTypes.SqlInt32″
  Nullable=″False″/>
<FieldProperty Name=″LastUpdatingPartnerTS″Type=″SqlTypes.SqlInt64″
  Nullable=″False″/>   </Type>
These attributes comprise following information:
Row Describe
 _CreationLocalTS The creation-time mark of local machine
 _CreatingPartnerKey Create the partner's of this entity PartnerKey. If entity is local the establishment, this is the PartnerKey of local machine
 _CreatingPartnerTS Locate to create the time mark of the time of this entity the partner corresponding to _ CreatingPartnerKey
 _LastUpdateLocalTS Local zone time mark corresponding to update time of local machine
 _LastUpdatePartnerKey The last PartnerKey that upgrades the partner of this entity. If finish this locality that is updated in for the last time to this entity, then this is the PartnerKey of local machine.
 _LastUpdatePartnerTS Locate to upgrade the time mark of the time of this entity the partner corresponding to _ LastUpdatingPartnerKey.
(2) change in " classifying type " search view is followed the tracks of
Except provide with global search view identical information, the search view of each classifying type provides the additional information that is recorded in the synchronous regime of each element in the synchronous topology.
Row Type Describe
<the overall situation changes follows the tracks of 〉   … Change the information of following the tracks of from the overall situation
  _ChangeUnitVersions MultiSet<change unit version 〉 The description of the version number of the change unit in the element-specific
  _ElementSyncMetadata   ElementSyncMetadata About an additional version independent elements data to the interested project in synchronous operation storehouse
  _VersionSyncMetadata   VersionSyncMetadata About an additional version dedicated meta data to the interested version in synchronous operation storehouse
B) gravestone
Data are stored as project, expansion and relation gravestone information are provided. The gravestone view provides in the place information about movable and gravestone entity (project, expansion and relation). Project and expansion gravestone view are not proposed the access to corresponding objects, and concern that the gravestone view provides the access to relationship object (relationship object is for empty in the situation of gravestone relation).
(1) project gravestone
Item] from system retrieval project gravestone.
Row Type Describe
  ItemId   ItemId The identity of project
 TypeID   TypeId The type of project
<item attribute 〉   … Attribute to all items definition
 _RootItemId   ItemId The ItemId that comprises this first non-embedded project of purpose
 _ChangeTrackingInfo The CLR example of ChangeTrackingInf o type This purpose changes trace information
 _IsDeleted   BIT This is sign, the 0th, and campaign item, the 1st, gravestone project
 _DeletionWallclock   UTCDATETIME Press the partner's of delete items time on UTC wall clock date, if this project is movable, it is empty
(2) expansion gravestone
Extension] from system retrieval expansion gravestone. Expansion changes the trace information interpolation that provides for project the has been provided information of ExtensionId attribute.
Row Type Describe
  ItemId   ItemId The identity that has the project of this expansion
  ExtensionId   ExtensionId The ExtensionId of this expansion
  _TypeID   TypeId The type of this expansion
  _ChangeTrackingInfo The CLR example of ChangeTrackingInfo type The change trace information of this expansion
  _IsDeleted   BIT This is sign, the 0th, and campaign item, and 1 be gravestone expansion
  _DeletionWallclock   UTCDATETIME During UTC wall clock day by the partner who deletes this expansion. If this expansion is movable, it is empty
(3) concern gravestone
Relationship] concern gravestone from system retrieval. Concern the information that the gravestone info class is similar to be provided expansion. Yet, provide additional information at the target ItemRef of relationship example. In addition, go back the choice relation object.
Row Type Describe
  ItemId   ItemId The identity (identity of the source endpoint of relation) that has the project of this relation
  RelationshipId   RelationshipId The RelationshipId of this relation
  _TypeID   TypeId The type of relation
  _ChangeTrackingInfo The CLR example of ChangeTrackingInfo type The change trace information of this relation
  _IsDeleted   BIT This is sign, the 0th, and campaign item, and l is the gravestone expansion
  _DeletionWallclock   UTCDATETIME Press the partner's of this relation of deletion time on UTC wall clock date. If this relation is movable, it is empty
  _Relationship The CLR example of relation This is the relationship object of activity relationship, and gravestone concerned that it is for empty
  TargetItemReference   ItemReference The identity of target endpoint
(4) gravestone is removed
For preventing gravestone information grow without bound, the data storage provides gravestone to remove task. This task determines when can give up gravestone information. This task computation is local to be created/upgrade the boundary of version, and block gravestone information by giving up all gravestone versions more early subsequently.
13. assistant API and function
Base map also provides some Assistant Function. Provide these functions to help the common operation on this data model.
A) function [system.Storage] .GetItem
The given ItemId of ∥ returns an item objects
Item GetItem(ItemId ItemId)
B) function [System.Storage] .GetExtension
The given ItemId of ∥ and ExtensionId return an EXPANDING DISPLAY AREA
Extension GetExtension(ItemId ItemId,ExtensionId ExtensionId)
C) function [System.Storage] .GetRelationship
The given ItemId of ∥ and RelationshipId return-relationship object
Relationship GetRelationship(ItemId ItemId,RelationshipId RelationshipId)
14. metadata
The metadata that has two classes in storage, to represent: instance metadata (type of project etc.), and genre metadata.
A) pattern metadata
The conduct of pattern metadata is stored in the data storage from the example of the item types of meta schema.
B) instance metadata
Application program use-case metadata is come the type of queried for items, and the expansion that is associated with project of searching. The ItemId of given project, application program can be inquired about the global keys eye diagram, returning the type of this project, and is worth to inquire about the Meta.Type view to return the information about the type of the statement of this project with this. For example,
∥ returns metadata project object to given project example
SELECT m.Item AS metadataInfoObj
FROM[System.Storage].[Item]i INNER JOIN[Meta].[Type]m ON i._TypeId=m.ItemId
WHERE i.ItemId=@ItemId
E. security
Generally speaking, all objects that can protect arrange access rights with the access mask form shown in Figure 26. In this form, low 16 be used for the object special use access rights, follow 7 standard access authorities that are used for being applied to most of object types, high 4 are used to specify the generic access rights, and each object type is mapped to the authority of one group of standard and object special use with it. ACCESS SYSTEM SECURITY position is corresponding to the authority of the SACL of access object.
In the access mask structure of Figure 26, the authority of project special use is placed on the special-purpose authority section of object (low 16). Because in the present embodiment, storage platform represents two groups of API:Win32 and storage platform API to keeper's security, for promoting the design of the special-purpose authority of storage platform object, must consider the authority of file system object special use.
The security model that is used for storage platform of the present invention has fully been described in relevant patent incorporated herein by reference. In this, Figure 27 (part a, b and c) draws the embodiment by security model, as the new equally safety zone of protection that opens from existing safety zone.
F. notify and change tracking
Press another aspect of the present invention, storage platform provides the notification capabilities that allows the application tracks data to change. This feature is mainly for the application program that keeps the service logic on volatile state or the executing data change event. Application program is registered in the notice on project, extension and the project relationship. Submitting to data change notice to be transmitted asynchronously. Application program can be filtered notice by project, expansion and relationship type and action type.
By an embodiment, storage platform API 322 provides two class interfaces for notice. The first, the application program registration changes event by the simple data that the change to project, extension and project relationship triggers. The second, application program creates the group that " supervisory programme " object comes supervision project, extension and project Relations Among. After thrashing or system off-line surpass the scheduled time, can preserve and again create the state of supervisory programme object. Single notice can reflect a plurality of renewals.
About finding in the additional detail of this function relevant patent can be formerly incorporated herein by reference.
G. traditional file interoperability
As mentioned above, at least in certain embodiments, storage platform of the present invention is intended to be implemented as the integral part of the hardware/software interface system of computer system. For example, storage platform of the present invention can be implemented as the integral part such as Microsoft Windows family operating system. In this respect, storage platform API becomes the part of operating system API, and application program is mutual by it and operating system. Therefore, storage platform becomes device, and application program is deposited information on the operating system by it, thereby and the data model of project-based storage platform substituted the traditional file systems of this operating system. For example, when in Microsoft Windows family operating system, implementing, the alternative new technology file system of in this operating system, realizing of storage platform. Current, application program visits the service of new technology file system by the Win32 API that is represented by Windows family operating system.
Yet, will be appreciated that, substitute new technology file system with storage platform of the present invention fully and need the existing application program based on Win32 of recompile, therefore and such recompile may be undesirable, and to provide with certain interoperability such as existing file systems such as NFS be useful to storage platform of the present invention. Thereby in one embodiment of the invention, storage platform makes the application program that depends on the Win32 programming model can access simultaneously the content of the data storage of the data storage of storage platform and traditional new technology file system. For this reason, storage platform uses the name custom of the superset (superset) that name is accustomed to as Win32 so that be easy to interoperability. In addition, the storage platform support is stored in file and catalogue in the storage platform volume by the Win32 API Access.
About finding in the other details of this function relevant patent can be formerly incorporated herein by reference.
H. storage platform API
Storage platform comprises API, and it makes application program can access feature and the ability of storage platform discussed above, and access is stored in the project in the data storage. This section is described the embodiment of the storage platform API of storage platform of the present invention. Details about this function can find in relevant patent incorporated herein by reference, sum up below for simplicity this information certain some.
With reference to Figure 18, the include file folder is a project, and it comprises the relation of holding with other project, and of equal value with the file system folder of common concept. Each project " comprises " at least one include file folder.
Figure 19 illustrates the basic architecture by the storage platform API of present embodiment. Storage platform API uses SQL client computer 1900 and local datastore 302 dialogues, and also uses SQL client computer 1900 and long-range number storage (such as data storage 340) dialogue. Local storage also can be used DQP (Distributed Query Processing device) or talk with by above-mentioned storage platform synchronous service (" Sync ") and remote data storage 340. Storage platform API 322 also takes on the bridger API of data storage notice, the subscript of application program is sent to notification engine, and as mentioned above notice is routed to application program (such as application program 350a, 350b or 350c). In one embodiment, storage platform API 322 also defines restricted " supplier " architecture, so that it can access the data among Microsoft Exchange and the AD.
Figure 20 schematically shows the various assemblies of storage platform API. Storage platform AP comprises following assembly: (1) data class 2002, and it represents storage platform element and item types; (2) the Runtime Library framework 2004, the persistence of its management object and the class 2006 that provides support; And (3) instrument 2008, it is used for generating the CLR class from the storage platform pattern.
The hierarchy of the class that draws from given pattern has directly reacted the hierarchy of type this pattern. As an example, consider the item types in the contact schema as shown in Figure 21 A and Figure 21 B, define.
Figure 22 illustrates the Runtime Library framework in the operation. The following operation of Runtime Library framework:
1. application program 350a, 350b or 350c are tied to the project of storage platform.
2. framework 2004 creates the ItemContext object 2202 corresponding to the binding project, and it is returned to application program.
3. application program is submitted the Find (searching) on this ItemContext (project context) to, to obtain the set of project; Return to be integrated into conceptive be object diagram 2204 (because relation).
4. application program change, deletion and data inserting.
5. application program is preserved change by calling Update () method.
Figure 23 illustrates the execution of " FindAll (seeking all) " operation.
Figure 24 illustrates the process that generates storage platform API class from the storage platform pattern.
Figure 25 illustrate file API based on pattern. Storage platform API comprises the name space of processing file object. This name space is called as System.Storage.Files. The data member of the class among the System.Storage.Files has directly reflected the information that is stored in the storage platform storage; This information is from file system object " upgrading " or use Win32 API the machine ground to create. The System.Storage.Files name space has two class: FileItem (docuterm) and DirectoryItem (directory items). The member of these classes and method thereof can be predicted by the ideograph of checking among Figure 25. FileItem and DirectoryItem are read-only from storage platform API. For revising them, must use Win32 API or class among the System.IO.
For API, DLL (or being simply referred to as interface) can be regarded as communicating or to its arbitrary mechanism, process, agreement that conducts interviews be used to the function that the one or more segments that make code can provide with one or more other segments by code. Perhaps, DLL can be regarded as being coupled to communicatedly the one or more mechanism, method, function call, module, object etc. of assembly of system of one or more mechanism, method, function call, module etc. of other computer. Term in the above-mentioned statement " code snippet " is intended to comprise one or more instructions or the code line of code, and comprise, as, code module, object, subroutine, function etc., the term of no matter using be what or code snippet whether by separately compiling or code snippet whether be provided as source code, intermediate code or object identification code, code snippet whether in runtime system or process with or they whether be positioned on same or the different machines stride that a plurality of machines distribute or the function that represented by code snippet whether fully by software, the combination by hardware or hardware and software realizes fully.
Conceptive, DLL can be generally looked, shown in Figure 30 A or Figure 30 B. It is pipeline that Figure 30 A shows interface " interface 1 ", and the first and second code snippets communicate by this pipeline. Figure 30 B shows interface and comprises interface object I1 and the I2 part of yes or no the first and second code snippets (can), and they make the first and second code snippets of system communicate by medium M. In Figure 30 B, can think that interface object I1 and I2 are the independent interface of same system, and can think that also object I1 and I2 add that medium M has consisted of interface. Although Figure 30 A and 30B show the interface on each side of Bidirectional Flow and this flow process, some realization can only have an information flow (or as described below do not have information flow) on the direction, or only has the interface object of a side. As example but not the limitation, terms such as application programming or routine interface (API), entrance, method, function, subroutine, remote procedure call and The Component Object Model (COM) interface is included within the definition of DLL.
The aspect of this class DLL can comprise that the first code segment sends the method (wherein, " information " is used with its wide significance, and comprises data, order, request etc.) of information to the second code segment; The second code segment receives the method for information; And the structure of this information, sequence, grammer, tissue, pattern, timing and content. In this, as long as information transmits in the defined mode of interface, the operation that bottom transmission medium itself can docking port is inessential, and no matter this medium is wired or wireless, or both combinations. In some cases, on conventional meaning, when a code snippet is only accessed the function of being carried out by the second code segment, information can not transmitted in one or two direction, because communication can be or by another mechanism (as, information be placed on and code snippet between the buffer memory, file etc. of separate from information flow in) or do not exist. Any of these aspects or all can be important in given situation, as, depend on the whether part of the system of loose coupling or close coupling configuration of code snippet, and therefore this tabulation should be considered to illustrative and unrestricted.
This concept of DLL is known to those skilled in the art, and can read the detailed description of the invention described above and know this concept. Yet, there is other method to realize DLL, unless and get rid of significantly, in these methods also are included in by appended claims. It is more accurate or complicated than the view of Figure 30 A and 30B that these other methods seem, but they are still carried out similar function and finish same integral result. Concise and to the point some illustrative of describing DLL is replaced and is realized now.
Decompose: can indirectly realize communication from a code snippet to another by communication being split into a plurality of distributed communication. This schematically describes in Figure 31 A and 31B. As shown in the figure, can be according to function divide into groups to describe some interface. Thus, can exploded view 30A and the interface function of 30B reach identical result, as can providing 24 at mathematics, or 2 take advantage of 2 take advantage of 3 take advantage of 2 the same. Therefore, shown in Figure 31 A, the function that is provided by interface " interface 1 " can be provided become a plurality of interfaces " interface 1A ", " interface 1B ", " interface 1C " etc. with the communication scaling with this interface, and reach identical result. Shown in Figure 31 B, the function that is provided by interface I1 can be subdivided into a plurality of interface I1a, I1b, I1c etc., and reaches identical result. Similarly, the interface I2 that receives the second code segment of information from the first code segment can be broken down into a plurality of interface I2a, I2b, I2c etc. When decomposing, the quantity that is included in the interface in the first code segment does not need to mate the quantity that is included in the interface in the second code segment. In arbitrary situation of Figure 31 A or 31B, the functional spirit of interface " interface 1 " and I1 is identical with the maintenance of Figure 30 A and 30B respectively. The decomposition of interface also can be deferred to associating, communication and other mathematical property, so that decompose difficult identification. For example, command operation can be unessential, and the function of therefore being finished by interface can be finished by another section code or interface before reaching this interface preferably, is perhaps carried out by the independent assembly of system. In addition, the those of ordinary skill in programming field is appreciated that variety of way makes different function calls and reach identical result.
Redefine: in some cases, may ignore, add or redefine some aspect (such as parameter) of DLL, and still reach expected result. This is shown in Figure 32 A and the 32B. For example, the interface " interface 1 " of supposing Figure 30 A comprises function call Square (input, precision, output) (square), it comprises three parameters, input (input), precision (precision) and output (output), and issued to the second code segment by the first code segment. If intermediate parameters precision is unimportant under given situation, shown in Figure 32 A, it also can be left in the basket or even be replaced by meaningless (meaningless) (in this case) parameter. Also can add inessential additional (in addition) parameter. In either case, as long as return output in input by after the second code segment square, just can reach square (square) function. Precision might be extremely significant parameter to a certain downstream or the other parts of computing system also; Yet in case recognize that precision is optional to calculating square this limited purposes, it can be replaced or ignore. For example, not to transmit an effective pricision value, but in situation the about result not being had a negative impact, transmit such as insignificant values such as dates of birth. Similarly, shown in Figure 32 B, interface I1 is by interface I1 ' replacement, and it is redefined to ignore or adds parameter to interface. Interface I2 can be redefined similarly is interface I2 ', and it is redefined to ignore unnecessary parameter, or the parameter that can process elsewhere. Main points herein are in some cases, and DLL can comprise the unwanted aspect of a certain purpose, such as parameter, therefore can ignore or redefine them, or process elsewhere them and be used for other purpose.
Inline code: some or all functions that merge two independent code modules also are feasible, so that " interface " between them changes form. For example, the function of Figure 30 A and 30B can be transformed into respectively the function of Figure 33 A and 33B. In Figure 33 A, the first and second previous code snippets of Figure 30 A are merged into the module that comprises both. In this case, this code snippet still can communicate with one another, but this interface goes for being more suitable for the form of individual module. Thus, for example, formal calling (Call) and to return (Return) statement will be no longer essential, but be still effectively according to similar processing or the response of interface " interface 1 ". Similarly, shown in Figure 33 B, the part of Figure 30 B (or owning) interface I2 can write incoming interface I1 embeddedly and form interface I1 ". As shown in the figure, interface I2 is divided into I2a and I2b, and interface section I2a is embedded in and writes code among the interface I1 and form interface I1 ". For concrete example, consider the interface 1 execution function call square (input, output) of Figure 30 B, it is received by interface I2, processed the value be delivered to input (it is asked square) by the second code segment afterwards, it is used output and transmits back the result who asks square. In this case, the processing of being carried out by the second code segment (input is asked square) can be carried out never calling in the situation of this interface by the first code segment.
Break away from: can indirectly finish communication from a code snippet to another by communication being split into a plurality of discrete communications. This schematically describes in Figure 34 A and 34B. Shown in Figure 34 A, provide one or more segments of middleware (to break away from interface (Divorce Interface), because function and/or interface function that they break away from from original interface), to transform the communication on the first interface " interface 1 ", so that they meet different interfaces, be " interface 2A ", " interface 2B " and " interface 2C " in this situation. This can finish in such a case, for example, the installation basis of using according to " interface 1 " Protocol Design with communicate such as operating system, using different interfaces but then change this operating system, is interface " interface 2A ", " interface 2B " and " interface 2C " in this situation. Main points are to have changed the clean interface that is used by the second code segment so that it no longer with the employed interface compatibility of first code segment, therefore make old interface and new interface compatible with intermediary. Similarly, shown in Figure 34 B, it is disconnected to receive information from interface I1 to use disengaging interface DI1 to introduce third generation chip, and use breaking away from interface DI2, to introduce third generation chip disconnected with to for example interface I2a and I2b transmission interface function, redesign interface I2a and I2b with use DI2, but provide identical functional outcome. Similarly, DI1 and DI2 can work to convert the interface I1 of Figure 30 B and the function of I2 to a new operating system jointly, and identical or similar functional outcome is provided.
Rewrite: another possible variation is dynamically to rewrite code, replaces the function of interface with anything else, and still reaches identical total result. For example, a kind of system can be arranged, wherein, (JIT) compiler or interpreter provide the code snippet that presents in the intermediate language (such as Microsoft IL, Java ByteCode etc.) to timely (Just-in-Time) in the execution environment (such as the environment that provided by the .Net framework, java runtime environment or other similar time of running of type environment). Can write JIT compiler and be transformed into the second code segment dynamically will communicate by letter from the first code segment, that is, make them meet the needed distinct interface of second code segment (original or different second code segments). This has description in Figure 35 A and 35B. As among Figure 35 A see that this mode is similar to above-mentioned disengaging situation. It can be finished under such a case, and for example, the installation fundamental operation system that uses according to " interface 1 " Protocol Design communicates, and then changes this operating system to use different interfaces. JIT compiler can be used for order the new interface that the air communication of base application meets operating system has been installed. Described such as Figure 35 B, can use this method that dynamically rewrites interface to carry out dynamic Decomposition, perhaps change interface.
Should be noted that above-mentioned also in every way serial of situation by alternative embodiment realization and the same or analogous result of interface, walk abreast or intervene code combination with other. Thus, the alternative embodiment that above presents not is mutual limit, and can be mixed, coupling and combination to be to produce the situation identical or equivalent with the general situation that presented among Figure 30 A and the 30B. Also should be noted that, as most of programming constructs, the present invention may not describe other the similar mode that reaches with the same or analogous function of interface, but they are still represented by the spirit and scope of the present invention, namely, should be noted that it is the function that represented by the interface as the basis of the value of interface or by its favourable outcome of enabling at least in part.
III. synchronous API
In project-based hardware/software interface system, it is feasible that several method for synchronous is arranged.
A. summarize synchronously
For some embodiment of the present invention, and with reference to figure 3, storage platform provides synchronous service 330, it (I) allows the Multi-instance (each has the data of oneself to store 302) of storage platform to press one group of flexibly next synchronously each several part of their content of rule, and (ii) provides foundation structure the data of storage platform of the present invention are stored and realize that other data source of proprietary protocol is synchronous for the third party.
Storage platform occurs between one group of duplicate that participates in synchronously to storage platform. For example with reference to figure 3, wish mostly be provided under the control at another example of the storage platform that different computer systems is moved between the data storage 302 of storage platform 300 and another remote data storage 338 synchronously. Total membership qualification of this group needn't be known by any given duplicate at any given time.
Different copy independently (concomitantly namely) are made change. Synchronizing process is defined as makes each duplicate know the change of being made by other duplicate. This synchronizing capacity is many main (multi-master) (that is, reciprocity) in essence.
Synchronizing capacity of the present invention allows each duplicate:
Determine what change another duplicate knows;
Request is about the information of the ignorant change of this duplicate;
Transmission is about the information of the ignorant change of other duplicate;
Determine when mutually conflict of two changes;
The local application changes;
Transmission collision decomposes other duplicate to guarantee convergence; And
Decompose conflict based on the policy to the collision decomposition appointment.
Storage platform to storage platform synchronously
The basic application of the synchronous service 300 of storage platform of the present invention is the Multi-instance of stores synchronized platform (each is with its data storage). Synchronous service is in storage platform pattern level operation (rather than in the bottom table at database engine 314). Therefore, for example " scope (Scope) " is used for defining synchronization group discussed below.
Synchronous service is by the principle operation of " pure change (net change) ". Not record and send each operation (such as transactional replication) that therefore synchronous service but send the final result of these operations often is merged into single final result with the result of a plurality of operations.
Synchronous service is not considered transaction boundaries usually. In other words, if in single affairs, two changes are made in storage platform data storages, do not guarantee that these change to be applied to atomically on all other duplicate-can to illustrate one and change and other change is not shown. The exception of this principle is that if in same affairs same project is made two changes, then these changes guarantee that being sent atomically and be applied to other copies. Therefore, project is the consistency unit of synchronous service.
A) synchronous (Sync) controlling application program
Arbitrary application program can be connected to synchronous service and start sync (synchronously) operation. Such application program provides carries out synchronously all required parameters of (synchronous overview below seeing). Such application program is called as Synchronization Control application program (SCA) here.
When synchronous two storage platform examples, started synchronously by SCA in a side. This SCA notice local synchronization service and remote partner are synchronous. At opposite side, synchronous service is by being waken up by the message of sending from the synchronous service of initiating machine. (mapping that sees below) responds based on the persistent configuration information that exists at target machine for it. Synchronous service can be moved on schedule or in response to event. In these cases, the synchronous service of realization timetable becomes SCA.
For enabling synchronously, need to take two steps. At first, the Model Design person must be with suitable synchronization semantics annotation storage platform model (as mentioned below appointment change unit). Secondly, synchronously must correctly configuration (as described below) on all machines with the example that participates in synchronous storage platform.
B) pattern note
The basic conception of synchronous service is the concept that changes unit (Change Unit). Change the unit and be the schema fragment of the minimum of individually being followed the tracks of by storage platform. Each is changed the unit, and synchronous service can determine that it is changed or is not changed since synchronous for the last time.
Change unit in the designated mode reaches some purposes. At first, it has determined how online synchronous service is said another word. Make when changing in changing the unit, whole change unit is sent to other duplicate, because synchronous service does not know which part that changes the unit is changed. Secondly, it has determined the granularity of collision detection. When same change unit being made two concurrent changes (these terms are specific definition in follow-up chapters and sections), synchronous service causes conflict; On the other hand, make concurrent change if difference is changed the unit, then occur without conflict, and change is automatically merged. The 3rd, it has seriously affected the amount of the metadata that is kept by system. Each is changed the unit keep many synchronizing service metadatas; Therefore, make the less meeting in change unit increase synchronous overhead.
Definition changes the unit need to find out correct trading off. For this reason, synchronous service allows the Model Design person to participate in this process.
In one embodiment, synchronous service is not supported the change unit greater than an element. Yet its supports to allow the Model Design person specify the ability of the change unit less than element-be about to a plurality of combinations of attributes of an element in independent change unit. In this embodiment, this is to use following syntax to realize:
<Type Name=″Appointment″MajorVersion=″1″MinorVersion=″0″ExtendsType=″Base.Item″
    ExtendsVersion=″1″>
  <Field Name=″MeetingStatus″Type=″the storage platformTypes.uniqueidentifier Nullable=″False″/>
  <Fileld Name=″OrganizerName″Type=″the storage platformTypes.nvarchar(512)″ Nullable=″False″/>
  <Filed Name=″OrganizerEmail″Type=″the storage platformTypes.nvarchar(512)″
TypeMajorVersion=″1    MultiValued=″True″/>
  …
  <ChangeUnit Name=″CU_Status″>
<Field Name=″MeetingStatus″/>
  </ChangeUnit>
  <ChangeUnit Name=″CU_Organizer″/>
<Field Name=″OrganizerName″/>
<Field Name=″OrganizerEmail″/>
  </ChangeUnit>
  …
</Type>
C) synchronously configuration
The one group of storage platform partner who wishes some Partial synchronization of their data of maintenance is called as synchronous community. Although the member of community wishes to keep synchronously, they need to not represent data in identical mode; In other words, convertible their the synchronous data of synchronization partner.
In reciprocity situation, allow equity side to all their partner to keep the conversion mapping be unpractical. Replace ground, synchronous service is taked the method for definition " community's file ". Community's file is to represent " Shared Folders " of synchronous hypothesis abstract with it of all members of community.
The most handy example explanation of this concept. If Joe wishes to keep My Documents (my document) Folder synchronizing of his some computers, Joe defines community's file, as is called JoeDocuments. On every computer, Joe is configuration one mapping between the JoeDocuments file of supposing and local My Documents file subsequently. From this point, when the computer of Joe was synchronized with each other, they were talked by the document among the JoeDocuments rather than their local project. With the method, the computer of all Joe is understood mutually, and needn't know whom other people is-and community's file becomes the common language of synchronous community.
The configuration synchronization service comprises three steps: (1) is defined in the mapping between local folders and the community's file; (2) definition determines which obtains synchronous synchronous overview (as synchronous with whom, and which subset should be sent out, which is received); And the different synchronous overview of (3) definition timetable that should move, or manually move them.
(1) community's file-mapping
Community's file mapping is stored on the individual machine as the XML configuration file. Each mapping has following pattern:
/mappings/communityFolder
Community's file of this element name mapping. Name is followed the syntactic rule of file.
/mappings/localFolder
The local folders that this element name mapping is transformed into. This name is followed the syntactic rule of file. In order to shine upon effectively, file must exist. Project in this file be counted as to each this mapping synchronously.
/mappings/transformations
How this element definition is transformed into local folders and reverse conversion how with project from community's file. If lack or for empty, do not carry out conversion. Particularly, this means without ID mapped. This configuration is mainly used in creating the high-speed cache of file.
/mappings/transformations/mapIDs
The newly-generated local ident of this element request is endowed all from the project of community's file mapping, rather than reuses the ID of community. ID mapping is safeguarded in the synchronous operation storehouse, since revolution change project.
/mappings/transformations/localRoot
All root Elements in this element request community file are as the sub-project of designated root.
/mappings/runAs
This control of element is processed the request for this mapping under whose is authorized. If do not exist, then suppose the sender.
/mappings/runAs/sender
Existing this element to show, must be impersonate to the sender of the message of this mapping, and processes request under his voucher.
(2) overview
Overview is to separate synchronously required total parameter group synchronously. Provide it to the synchronous operation storehouse to start synchronously by SCA. Storage platform comprises following information to the synchronous synchronous overview of storage platform:
Local folders is as the source and target that changes;
Synchronous Remote Folder name one this file must be issued by shining upon as defined above from remote partner with it;
Direction-synchronous service support only sends, receives only and send-receives synchronously;
Local filter device-selection sends any local information to remote partner. Be expressed as the storage platform inquiry on the local folders;
Remote filter device-selection receives what remote information-be expressed as storage platform inquiry on community's file from remote partner;
How conversion-definition is changed between project and native format;
Local security-appointment is to use from the change of remote endpoint retrieval under the license of remote endpoint (personification), or the user is synchronous at local boot; And
Collision decomposition policy-appointment conflict whether should be rejected, charge to daily record or automatic classifying-under latter event, which collision decomposition device and its configuration parameter are used in appointment.
CLR class when synchronous service provides the operation that allows the synchronous overview of simple construction. Overview can be serialized into the XML file or serialize from the XML file, so that easily storage (often with timetable). Yet the standard of not storing all overviews in storage platform is local; Welcome SCA to make up overview at the point that needn't forever keep. Note, do not need to have local mapping and start synchronously. Can in overview, specify all synchronizing informations. Yet be the synchronization request that starts in response to by remote parties, need mapping.
(3) timetable
In one embodiment, synchronous service does not provide its scheduled basis structure. On the contrary, it depends on another assembly and finishes this task-available Windows Scheduler in Microsoft Windows operating system. Synchronous service comprises command line utility, and it takes on SCA and based on the synchronous overview triggering synchronous that is kept in the XML file. This utility program is so that become very easy on schedule or in response to disposing Windows Scheduler such as user login or the event such as publish.
D) conflict is processed
Conflict in the synchronous service is processed and is divided into three phases: the collision detection when (1) occurs in the change application-this step judges whether to use safely change; (2) automatically collision decomposition and charge to daily record-at the automatic collision decomposition device of this step (after occurring in and then collision detection) information) (or " conflict processor "), if with check whether conflict can be decomposed-can not, optionally daily record is charged in conflict; And (3) if conflict check with decompose-some conflicts and is logged, and occurs in outside the simultaneous session, then takes this step 1 at this moment, the conflict that is logged can be decomposed and remove from daily record. The various embodiments of the present invention of processing for conflict discuss in more detail in the III joint later.
To the storage of non-storage platform data synchronously
By storage platform of the present invention on the other hand, the architecture that storage platform provides ISV to be used to realize sync adapters, sync adapters make the storage platform can be with synchronous such as legacy systems such as Microsoft Exchange, AD, Hotmail. Many synchronous service of being provided by following synchronous service are provided sync adapters.
No matter its title how, sync adapters does not need to realize as the plug-in unit of certain storage platform architecture. When needed, " sync adapters " can be to utilize synchronous service Runtime Library interface to obtain to enumerate and any application program of the service such as application such as change simply.
In order to make other people can more easily dispose and run to the synchronous of given rear end (backend), encourage the author of sync adapters to represent standard sync adapters interface, it moves when given above-mentioned synchronous overview synchronously. Overview provides configuration information to adapter, some adapter be sent to the synchronous operation storehouse with controlling run storehouse service (as, synchronous file).
A) synchronous service
Synchronous service provides some synchronous service to the adapter author. At this section remaining part, easily storage platform is made synchronous machine thereon and be called " client computer ", and adapter just is called " server " with the non-storage platform rear end of its dialogue.
(1) change is enumerated
Based on the change tracking data of being kept by synchronous service, change is enumerated and is allowed sync adapters easily to enumerate the change that since last and this partner attempt to make synchronously the data storage folder has been occured.
Enumerate based on the concept of " anchor position (anchor) " that change-this is the opaque structure of relevant last the hyposynchronous information of expression. As described in former chapters and sections, the form of storage platform knowledge is taked in the anchor position. Utilize the sync adapters that changes the service of enumerating to fall into two large classifications: the adapter of " anchor position of storage " and the adapter of use " anchor position that provides " are provided.
Difference based on where be stored in about last hyposynchronous information-on the client computer or on server. Adapter usually easily store this information on client computer-this information often can not easily be stored in the rear end. On the other hand, if a plurality of client computer and same backend synchronization, then this information is stored on the client computer be poor efficiency and be in some cases incorrect-this makes a client computer not know that other client computer shifted the change of server onto. If adapter wishes to use the anchor position of server stores, then adapter need to send back to storage platform with it when change is enumerated.
In order to allow storage platform safeguard anchor position (being used for the Local or Remote storage), storage platform need to be known the change that successfully is applied on the server. These and only have these changes to be included in the anchor position. During change was enumerated, sync adapters was used and is confirmed (Acknowledgement) interface, was successfully used to report which changes. With EOS the time, the adapter of the anchor position that use provides must be read new anchor position (it gathers the change of all successful Application) and send it to their rear end.
Each adapter usually needs the storage adapter exclusive data and is inserted into projects in the storage platform data storages. The common examples of this data storage is remote ident and remote version (time mark). Synchronous service is provided for storing the mechanism of these data, and changes the mechanism that the change that receives this excessive data and will return is provided of enumerating. In most of the cases, this has eliminated the again demand of Query Database of adapter.
(2) change application
Change is used the change that allows sync adapters to receive from their rear end and is applied to local storage platform. The expectation adapter is transformed into the storage platform pattern with change. Figure 24 illustrates the process that generates storage platform API class from the storage platform pattern.
Changing the major function of using is automatically to detect conflict. As in the storage platform situation synchronous to storage platform, two overlapping changes that conflict is defined by making when not knowing mutually. When adapter used change to use, they must specify the anchor position of it being carried out collision detection. Change if detect overlapping this locality of the knowledge covering that is not adapted device, then change application and cause conflict. Be similar to change and enumerate, adapter can be provided by anchor position storage or that provide. Change effective storage of using the support adapter dedicated meta data. Such data can be appended to it in the change that will use by adapter, and can be stored by synchronous service. Data can change in next time to be returned when enumerating.
(3) collision decomposition
Below the collision decomposition mechanism (comprise and charge to daily record and automatic classifying option) in IV, described also can use sync adapters. When using change, sync adapters can be specified the policy that is used for collision decomposition. If specified, conflict can be passed to the conflict handling procedure of appointment and be decomposed (if possibility). Conflict also can be logged. When attempting that this locality is changed when being applied to the rear end, adapter might detect conflict. In such situation, adapter still can be delivered to conflict the synchronous operation storehouse, to decompose by policy. In addition, sync adapters can ask any conflict that is detected by synchronous service to send back to them in order to process. Can store or decompose the situation of conflict this is convenient especially in the rear end.
B) adapter is realized
Although some " adapter " is the application program of utilizing the Runtime Library interface simply, yet encourage adapter to realize the adaptor interface of standard. These interfaces allow the Synchronization Control application program: the request adapter is carried out synchronously by given synchronous overview; It is synchronous that cancellation is just being carried out; And receive about just carrying out synchronous progress report (Percent Complete).
3. security
Synchronous service make great efforts will be the least possible be incorporated into synchronously safe mode by the storage platform realization. Not to define synchronous new authority, but use existing authority. Particularly,
Anyone of energy read data stored items can enumerate the change to that project;
Anyone that can write the data stored items can use this project that changes to; And
Anyone of energy growth data stored items can be with synchronizing metadata and this item association.
Synchronous service is the maintenance safe authorization message not. When making change at duplicate A by user U, and when it was forwarded to duplicate B, this change had been lost in the fact that A place (by U) makes at first. If B is forwarded to duplicate C with this change, then this is to finish under the mandate of B rather than the mandate at A. This just causes following restriction: if distrust a duplicate that a project is made its change, it can not transmit the change of being made by other duplicate.
When starting synchronous service, finished by the Synchronization Control application program. The identity of synchronous service personification SCA, and under this identity, finish all operations (local with long-range). As an illustration, observe the change that user U can not make the local synchronization service from the retrieval of remote storage platform user U not had the project of read access.
4. manageability
The distributed community that monitors duplicate is complicated problem. Synchronous service can be used " scanning (sweep) " algorithm to collect and distribute information about the state of this duplicate. The attribute of scanning algorithm guarantee about to some extent the information of duplicate of configuration finally be collected, and detect the duplicate of this failure (without responding).
On each duplicate, can obtain the monitor message of community's scope. Can be on the duplicate of choosing arbitrarily the operation monitoring instrument, to check this monitor message and to make administrative decision. On affected duplicate, must directly make configuration change.
B. API summarizes synchronously
In distributed, the digital more and more world, individuality usually is stored in information and data in the multiple different equipment and position with work station. This has just promoted the development of data synchronization service, in the situation of minimal user intervention, described data synchronization service can be kept at described information that these are independent, usually fully differently all stored by synchronous data on institute is free.
Synchronous platform of the present invention, the part as the abundant storage platform described in herein the joint II (claiming again " WinFS ") has solved 3 main tasks:
Allow the effectively data between the storage of synchronously different " WinFS " of application and service.
Allow the developer to create and be used for the synchronously fruitful method of the data between " WinFS " and non-" WinFS " storage.
For the developer provides suitable interface so that customization simultaneous user experience.
1. general terms
At this, the below is to be definition and keys of some relevant further regulations of joint III.B with the discussion of back herein:
Synchronous duplicate: most of application are only to following the tracks of, enumerate and store for WinFS synchronously the change of the given subset of interior project. The set that participates in the project of simultaneously operating is called synchronous duplicate. Duplicate is to define with being comprised in the project (normally as being positioned at root on the file project) that given WinFS comprises in the layer. All synchronous service all realize in the environment of given duplicate. WinFS provides the mechanism of regulation, management and removing duplicate synchronously. Each duplicate has the GUID identifier that identifies uniquely the duplicate in the given WinFS storage.
Synchronization partner: synchronization partner is defined as the entity that can affect the change of fastening in WinFS project, expansion and pass. Therefore, each WinFS storage can be called as synchronization partner. When storing when synchronous with non-WinFS, external data source (EDS) also is known as synchronization partner. Each partner has the GUID identifier that identifies uniquely it.
Synchronous community: community is defined as the set of duplicate synchronously, adopts the mode of reciprocity simultaneously operating, the set of synchronously preserving described duplicate. These duplicate can all be to be arranged in identical WinFS storage, different WinFS storages, perhaps even with them know the virtual copy product that are expressed as in the non-WinFS storage. If only have especially simultaneously operating in the community by WinFS synchronous service (WinFS adapter), then WinFS does not specify or entrusts any special-purpose topology for described community synchronously. Sync adapters (stipulating below) can be introduced its oneself topological constraints.
Change and follow the tracks of, change unit and version: the change to all local WinFS projects, expansion and relation is followed the tracks of in each WinFS storage. In described pattern, on the grade of change unit's granularity (granularity) of defined, follow the tracks of change. Employing is as the minimum particle size of a top field, and the top field of any project, expansion and relationship type can be divided into the change unit by Model Design person. In order to change the purpose of tracking, each changes the unit and is assigned with a version, and wherein version is a pair of synchronization partner Id and version number's (described version number is the numeral of the monotone increasing of partner's special use). Occur in change in the described storage or that from other duplicate, obtain according to them according to this locality, upgrade version.
Synchronous knowledge: the representation of knowledge provides the state of synchronous duplicate at any time, i.e. its encapsulation and given duplicate this locality relevant metadata that changes that know or that know from other duplicate. Synchronously preservation of WinFS and renewal are for the knowledge of the synchronous duplicate of striding simultaneously operating. The important thing of noting is, the representation of knowledge allows its relatively whole community to make an explanation rather than only with respect to making an explanation with the stored particular copy product of knowledge.
Sync adapters: sync adapters is that managed coding is used, and it is by Synchronization routines API Access WinFS synchronous service, and it is synchronous that WinFS data and non-WinFS data are stored. Depend on the needs of situation, about which subset of WinFS data and what WinFS data type carry out synchronously, the person of depending on the adapter development. Described adapter is responsible for communicating with EDS, to transmitting WinFS pattern and regulation with EDS from support mode and managing its oneself configuration and metadata. Strongly encourage adapter to realize the WinFS sync adapters, in order to common configuration and the advantage of control for the fabric of the adapter that is provided by the WinFS synchronization group are provided. For more details, see also WinFS sync adapters API monograph [SADP] and WinFS isochronous controller API[SCTRL] monograph.
For making WinFS data and outside non-WinFS storage synchronously and can not producing or preserve with the WinFS form adapter of knowledge, WinFS provides the service of preserving long-range knowledge synchronously, and the change that described long-range knowledge can be used to is afterwards enumerated or application operating. Depend on the ability of rear end storage, described adapter can wish to store this long-range knowledge on described rear end or in local WinFS storage.
For the sake of simplicity, " duplicate " is a kind of structure synchronously, be present in one group of data in the single local position in its expression " WinFS " storage, yet the data in the non-WinFS storage are known as " data source ", and General Requirements uses adapter.
Long-range knowledge: when given synchronous duplicate wished to obtain change from another duplicate, it provided its oneself knowledge as a kind of baseline, and according to baseline, other duplicate is enumerated change. Similarly, when given duplicate wished that change sent to another duplicate, it provided its oneself knowledge as baseline, and described baseline can be by remote replicas for detection of conflict. Synchronous change enumerate with use during this knowledge relevant with other duplicate that provides be called as long-range knowledge.
2. synchronous API main body
For some embodiment, described synchronous API is divided into two parts: synchronous provisioning API and isochronous controller API. Provisioning API allows to use configuration synchronization synchronously, and designated parameter is used for the certain synchronization session between two duplicate. For given simultaneous session, configuration parameter comprises by the set of synchronous project, synchronous type (unidirectional or two-way), information and the collision decomposition strategy relevant with remote data source. Isochronous controller API starts simultaneous session, cancellation synchronously, and reception ﹠ disposal with ongoing synchronously relevant error message. Also have, for specific embodiment, wherein need synchronously according to predetermined scheduled for executing, this system can comprise the mechanism of scheduling customization dispatch list.
A plurality of embodiment of the present invention uses sync adapters so that the information between synchronous " WinFS " and non-" WinFS " data source. The example of adapter comprises the adapter of the address book information between synchronously " WinFS " conflict file and the non-WinFS mailbox. In these cases, in order to develop the pattern transform coding between " WinFS " pattern and non-" WinFS " data source schema, the adapter development person can use " WinFS " described herein synchronization core AP services I so that the service that access is provided by " WinFS " synchronous platform. In addition, the adapter development person provides and has been used for changing the agreement support that communicates with non-" WinFS " data source. By using the isochronous controller API Calls and control sync adapters, and use this API report progress and mistake.
Yet, for some embodiment of the present invention, store when synchronous when " WinFS " data storages and another " WinFS " data, if " WinFS " is integrated in the hardware/software interface system " WinFS " synchronous service, then sync adapters can be optional. Under any circumstance, a plurality of such embodiment provide and have been used for " WinFS " to " WinFS " and both one group of synchronous service of sync adapters method, and described sync adapters method comprises:
Tracking to the change of " WinFS " project, expansion and relation.
Be used for the support that the change that effectively increases progressively that the state from the given past begins is enumerated.
The application that the outside of " WinFS " is changed.
Process in the conflict that changes during using.
Referring to Figure 36, show the general data storage and be used for synchronously 3 examples of their assembly. The first system 3602 has WinFS data storage 3612, described WinFS data storage 3612 comprises that WinFS is to WinFS synchronous service 3622 and core synchronous service 3624, it is synchronous to non-WinFS to be used for WinFS, and it discloses 3646 for the synchronous API3652 that uses. Be similar to the first system 3602, second system 3604 has WinFS data storage 3614, described WinFS data storage 3614 comprises that WinFS is to WinFS synchronous service 3632 and core synchronous service 3634, it is synchronous to non-WinFS to be used for WinFS, and it discloses 3646 for the synchronous API3652 that uses. The first system 3602 and second system 3604 carry out synchronous 3642 by its WinFS separately to WinFS synchronous service 3622 and 3632. The 3rd system 3606 is not the WinFS system, and it has for using WinFS synchronous 3666 data source to be kept at the application of the synchronous community with WinFS duplicate. This application can use WinFS to dispose synchronously/control service 3664, so that by WinFS to WinFS synchronous service 3622 (if it can virtually turn to WinFS data storages with self), perhaps by the sync adapters 3662 with the interface 3648 of synchronous API3652 is provided, directly provide the interface 3644 with WinFS data storage 3612.
As shown in this figure, the first system 3602 is known and directly synchronously second system 3604 and the 3rd system 3606. Yet, second system 3604 and the 3rd system 3606 each other and do not know, and therefore, directly their change not synchronized with each other, still, on the contrary, the change that occurs in system must be propagated by the first system 3602.
C. synchronously API service
The directed synchronous service of a plurality of embodiment of the present invention, described synchronous service comprises two infrastructure services: change and to enumerate and change application.
1. change and enumerate
As early discuss before herein, changing to enumerate allows sync adapters to enumerate at an easy rate change, described change is, from based on the change tracking data of being preserved by synchronous service, and the change that has occured on the data storage folders that attempt and this partner's the synchronous last moment begins. With regard to change is enumerated, for a plurality of embodiment of the present invention:
To effectively enumerating of the change of project, expansion and relation relevant with appointed knowledge instance in the given duplicate.
Enumerating of change on the grade of the change unit granularity in being designated for the WinFS pattern
The group of the change of being enumerated according to the compound term purpose. Compound project comprises project, all its expansion, keep relation with all of described project and corresponding to all compound projects of its project that is embedded into. The change of the relation between the REFER object can be enumerated respectively.
Enumerate relevant classification with change. The granularity of described classification is that compound project or relation change (being used for adduction relationship).
During change is enumerated to the appointment of the filtration of the project in the duplicate, for example described duplicate comprises all items in the given file, but enumerate for this special change, described application is ready only to enumerate to all contact entry purpose changes, and wherein the first title is with " A " beginning (this support will be added into the B-milestone).
Be used for the use of the long-range knowledge of the change of being enumerated, have and to change individually unit (perhaps whole project, expansion or relation) and be recorded as the ability of synchronization failure on knowledge, in order to have them during re-enumeration next time.
Perhaps, the use of improved adapter, described improved adapter can by returning together metadata along with changing during enumerating in change, be understood the WinFS synchronizing metadata.
2. change and use
As early discuss herein, change is used the change that allows sync adapters to receive from their rear end and is applied to local storage platform, converts described change to the storage platform pattern because wish described adapter. With regard to changing application, a plurality of embodiment of the present invention are instructed:
Has the application from the change that increases progressively in other duplicate (or non-WinFS storage) that changes the renewal of metadata corresponding to WinFS.
In the collision detection relevant with changing application that changes on the unit granularity.
The report of success, failure and conflict on the indivedual change cell levels that change on using, can use those information to be processed, mistake and status report in order to use (comprising the application of adapter and Synchronization Control), and be used for upgrading their rear end state, if any.
The renewal of long-range knowledge during changing application is in order to prevent from being provided " conflict " of the application of change during the next one changes enumeration operation.
The use of improved adapter, described improved adapter can be understood together and the WinFS synchronizing metadata is provided along with changing.
3. code sample
How the below can carry out mutual coding example (wherein adopting FOO as the prefix of the special purpose function of all adapters) with Synchronization routines for the FOO sync adapters:
ItemContext ctx=new ItemContext(“\.\System\UserData\dshah\My Contacts”,true);
∥ obtains duplicate project id and remote partner id from overview
The most of adapters of ∥ obtain this information from synchronous overview
Guid replicaItemId=FOO_GetReplicaId();
Guid remotePartnerId=FOO_Get_RemotePartnerId();
∥ uses aforesaid storedKnowledgeId to search knowledge stored in the storage.
ReplicaKnowledge remoteKnowledge=...;
∥ initializes ReplicaSynchronizer
ctx.ReplicaSynchronizer=new ReplicaSynchronizer(replicaItemId,
remotePartnerId);
ctx.ReplicaSynchronizer.RemoteKnowledge=remoteKnowledge;
ChangeReader reader=ctx.ReplicaSynchronizer.GetChangeReader();
∥ enumerates change and processes them
bool bChangesToRead=true;
while(bChangesToRead)
{
   ChangeCollection<object>changes=null;
   bChangesToRead=reader.ReadChanges(10,out changes);
   foreach(object change in changes)
   {
∥ processes the object enumerate, and adapter is finished its own pattern conversion and ID shines upon
∥ it in addition can be for this purpose from Ctx retrieval extra objects,
∥ is also revising the adapter metadata after remote storage is used change
        ∥
        ChangeStatus status=
FOOProcessAndApplyToRemoteStore(change);
∥ upgrades the knowledge of knowing with state
        reader.AcknowledgeChange(changeStatus);
    }
}
remoteKnowledge=
ctx.ReplicaSynchronizer.GetUpdatedRemoteKnowledge();
reader.Close();
∥ preserves knowledge and the adapter metadata (if any) of upgrading
ctx.Update();
∥ changes the example of using, and at first uses aforesaid storedKnowledgeId
∥ initializes long-range knowledge
remoteKnowledge=...;
ctx.ReplicaSynchronizer.ConflictPolicy=conflictPolicy;
ctx.ReplicaSynchronizer.RemotePartnerId=remotePartnerId;
ctx.ReplicaSynchronizer.RemoteKnowledge=remoteKnowledge;
ctx.ReplicaSynchronizer.ChangeStatusEvent+=
FOO_OnChangeStatusEvent;
∥ acquires change from remote storage. Adapter is responsible for from memory scan its rear end dedicated meta data.
This can be expansion on duplicate for ∥
object remoteAnchor=FOO_GetRemoteAnchorFromStore();
FOO_RemoteChangeCollection remoteChanges=
FOO_GetRemoteChanges(remoteAnchor);
∥ fills and changes set
foreach(FOO_RemoteChange change in remoteChanges)
{
The ∥ adapter is responsible for finishing the ID mapping
    Guid localId=FOO_MapRemoteId(change);
∥ can think synchronously personal object
    ItemSearcher searcher=Person.GetSearcher(ctx);
    searcher.Filters.Add(“PersonId=@localId”);
    searcher.Parameters[“PersonId”]=localId;
    Person person=searcher.FindOne();
    ∥
The ∥ adapter converts remotely changing to personal object modification
∥ is as its part, adapter even can be to remote object
∥ project level rear end dedicated meta data is made change.
    ∥
    FOO_TransformRemoteToLocal(remoteChange,person);
    }
    ctx.Update();
    ∥
∥ preserves new anchor position (this can be the expansion of duplicate)
    ∥
    FOO_SaveRemoteAnchor();
    ∥
This has been that WinFS API conventional since long-range knowledge is not synchronous preserves for ∥
    ∥
    remoteKnowledge=
    ctx.ReplicaSynchronizer.GetUpdatedRemoteKnowledge();
    ctx.Update();
    ctx.Close();
    ∥
The callback of ∥ adapter is to process the Application Status callback
    ∥
    void FOO_OnEntitySaved(object sender,ChangeStatusEventArgs args)
    {
        remoteAnchor.AcceptChange(args.ChangeStatus);
}
4.API synchronous method
In one embodiment of the invention, by by based on the disclosed synchronous API of the hardware/software interface system of WinFS, can realize between WinFS storage and the non-WinFS storage synchronously.
In one embodiment, require all sync adapters realize sync adapters API, by the CLR (CLR) of API management, so that they can be used, start and control by consistent. Described adapter API provides:
Be used for the standard mechanism of depositing adapter along with the hardware/software interface system synchronization framework.
Be used for the standard mechanism that adapter represents their performance and starts the type of the required configuration information of described adapter.
Be used for log-on message is passed to the standard mechanism of described adapter.
Be used for adapter with the mechanism of process status report readjustment with the application of using.
Be reported in the mechanism of any mistake that occurs between sync period.
Ask the mechanism of the cancellation of ongoing simultaneously operating.
There are two kinds of possible transaction modules that are used for adapter in needs according to circumstances. Described adapter can be in the processing space identical with the application of calling application or is all carried out in the independent processing of itself. In order to carry out in its own independent processing, described adapter has been stipulated its oneself factory (factory) class, and described factory class is used to the described adapter of illustration. Described factory can return the example of described adapter in the processing identical with calling application, perhaps return the long-range example of described adapter in different Microsoft common language routine ranges of application or processing. The factory of acquiescence realizes being provided with the described adapter of which illustration in same treatment. In fact, many adapters will move with calling to use in the identical processing. For in the following reason one or two, usually require to have the output of transaction module:
Security purpose. Described adapter must move in the process space of certain processing or service.
Described adapter must be processed the request from other source---for example, the income network request---except processing from the request of calling application.
Referring to Figure 37, one embodiment of the present of invention have been supposed a simple adapter, and how it does not know computing mode or how to exchange its associated metadata. In this embodiment, with regard to wanting synchronous data source, at first, in step 3702, determine that beginning synchronously at last which change from it and described data source occurs, realize synchronously by described duplicate, and then described duplicate last begins the change that increases progressively that occured based on its current state information transmission synchronously from this, and this current state information and the change that increases progressively are transferred to described data source by described adapter. In step 3704, described adapter, in case in step before, receive the change from described duplicate, just realize as much as possible the change to data source, which is followed the tracks of changed successfully and which failure, and described success and failure communication returned (described duplicate) WinFS. In step 3706, the hardware/software interface system of described duplicate (WinFS) is in case receive success and failure information from described duplicate, just be that described data source is calculated new status information, store this information for its duplicate of cause is used, and this new state transfer is returned described data source, namely, be transferred to for the adapter of storage and later on by described adapter use.
D. synchronous level
As early discussing herein, number (that is, first change is 1 according to each this change that is assigned with the corresponding order that increases progressively, second change is 2, the 3rd change is 3, etc. the rest may be inferred), each duplicate preserve its change increase progressively and the order enumerate. Also have, each duplicate is also preserved the status information for other known replica (synchronization partner) that is used for its synchronous community, has received which change from these other duplicate in order to follow the tracks of it. Use to give from the change of the last change of first duplicate of second duplicate number by knowing, then the first duplicate can only come those changes of the numbering of the change that is employed at last greater than this are asked, received or process with this numbering. Figure 38 A-D shows and how to follow the tracks of, to enumerate and synchronous change with the change enumeration methodology of this order.
In Figure 38 A, duplicate in synchronization partner A and the B common synchronization community, and illustrate with his father's state, because also do not change, so for each duplicate, described father's state equals to change number 0--for example be respectively A0 and B0 for each duplicate. (in this embodiment, use unique change number reflection original state. ) each duplicate knows its oneself state and follow the tracks of the state of its synchronization partner, as shown here it " vector " (as shown, vector has been listed the state of duplicate oneself, the last known state of each that first back is its partner, based on last synchronously or startup in this case,) in, each duplicate reflects this information. The initial vector that is used for duplicate A is " [A0, B0] ", and the initial vector that is used for duplicate B is " [B0, A0] ", and two duplicate are Complete Synchronization at present.
In Figure 38 B, duplicate A changes and change to distribute unique change A1 that increases progressively (this changes number comprises the unique identification " A " for duplicate itself, and for unique number that increases progressively " 1 " of the change on that duplicate) for that. On the other hand, duplicate B carries out 2 changes, and distributes respectively unique the change B1 and the B2 that increase progressively for those change. In this, and next time synchronously before, described duplicate not synchronously now, and the vector that is used for duplicate A is [A1, B0] now, and the vector that is used for duplicate B is that [B2, A0] (moreover this vector has reflected known last change. )
In Figure 38 C, so that request changes, duplicate A and duplicate B be (step 1) synchronously by sending its current vector to duplicate B. One receives the vector of duplicate A, and duplicate B just calculates it and need to send to two of duplicate A and change B1 and B2, and therefore continues so to do (step 2). Duplicate A receives the change (namely, changing the unit) of the duplicate B be identified as B1 and B2, uses them, and its oneself vector is updated to [A1, B2] (step 3).
In the alternative embodiment as shown in Figure 38 D, along with calculating and sending correct change (step 2) to duplicate A, duplicate B also determines duplicate A have been carried out changing and not yet duplicate B being changed based on the vector of duplicate A, and therefore duplicate B also vector that it is own and the request that is used for change send to duplicate A (step 2 '). Then, when duplicate A receives the change of duplicate B, use them, and be [A1, B2] (during step 3) with its oneself vector, it also calculates its which change will send to duplicate B and transmit equally their (steps 3 '). In case receive this information, duplicate B just carries out described change and its vector is updated to [B2, A1] (step 4).
About described example before, may can cause conflict in many cases. For example, perhaps A1 changes identical change unit with B2, and perhaps A1 can delete the identical change unit that B2 is revising. Although the collision decomposition option that use is early discussed can decompose in these conflicts some herein, some conflict provides a remarkable different difficult problem, and according to current example these difficult problems and decomposition method thereof is discussed below this.
1. the change of synchronously previous " scope is outer "
In certain embodiments of the present invention, the scope of duplicate can not be static. Therefore, adopt in the project in the scope of duplicate A and do not create the change of new relation between the project in its scope, duplicate A can increase its scope effectively. Yet, the change unit of supposing to be used for extraneous project not yet is synchronized between duplicate A and the B (because it has been positioned at outside the locking range for these duplicate), with regard to being used for the version path of specific project, may cause inconsistent synchronously. Ways of addressing this issue is along with creating the project in the scope and the specific change of the relation between the extraneous project among the duplicate A, sends the institute that extraneous project has been carried out for duplicate A to duplicate B and changes.
2. synchronous father-sub-disordering
In certain embodiments of the present invention, for synchronously, father's project always is sent out between sub-project (for example, if be embedded among the project J as father as child's project K, then project K can not be transmitted before transmission project J), this is general principle. Yet for duplicate A, this is possible, between synchronously, project J and K are changed, but wherein child entries K have the classification number less than child entries J (based on, for example, the precedence of the order of its identification number), and therefore generally can at first be transmitted. In each embodiment of the present invention, for a kind of method that solves synchronous problem be, described change is divided into two groups, one group only reflects the change that project K is carried out, and second group only reflect the change that project J is carried out, and send their (namely, after the group that has sent the change that is used for father's project J, sending the group of the change that is used for sub-project K) with appropriate order.
3. gravestone is propagated
As early discussing at this, for synchronous purpose, gravestone is used to deleted change unit of mark. Yet, owing to for a plurality of vectors in the synchronous community, be asynchronous synchronously, so these gravestones can be propagated at whole data platform. Problem is, illustrating that not duplicate A can create a project in the situation that gravestone is propagated, and and duplicate B sync period between, that project is sent to duplicate B. Then, duplicate A can delete described project, and and duplicate C sync period between, it does not send any information relevant with described project, because the information that will not send (because described project is deleted). Then, when duplicate B and duplicate C attempt when synchronous, duplicate C can receive described project from duplicate B, and continues at B.
For each embodiment of the present invention, ways of addressing this issue is to adopt the deleted project of gravestone mark for duplicate A. Then, when duplicate A deletes described project, and duplicate C sync period between, it sends to duplicate B with described gravestone. When duplicate B and duplicate C then attempt when synchronous, duplicate B is same to receive described gravestone, and described project has been left out from described synchronous community now fully.
4. the root gravestone is propagated
In P1, if project X has a plurality of project A, B, C, D and E of being embedded into, so when P1 at first delete these sub-projects and secondly during the father's project X between the deletion synchronously (, deletion A, deletion B, deletion C, deletion D, deletion E and deletion X, as 6 changes), cause a kind of significant situation, because identical final result may occur, P1 has deleted father X (1 change) simply, in this case, the project that is embedded into may also can automatically be deleted. In this respect, a plurality of embodiment of the present invention, in case synchronously, just by confirm deletion X may be in fact with 6 independent deletion events be equivalent, obtain effect, and therefore P1 is possible only to the change unit of P2 transmission corresponding to the deletion of X, and allows this deletion, in order to naturally propagate the project that is embedded into to the X among the P2.
5. concern name swap
As previously discussed, relation has title, therefore and can exchange title for two relations (R1 and R2) by use temporary name element (X) for a duplicate (P1)---namely, the title of R1 is replicated to X, the title of R2 then is replicated to R1, then X is replicated to R2, and deletes X at last. Yet because partner's duplicate (P2) is not known temporary name element X, so will make the mistake between sync period, because confirm that R1 has newname, P2 attempts to change this title, is that R1 uses identical title with R2 with leading to errors. For each embodiment of the present invention, a kind of method that addresses this problem is, in case receive or confirm this same names mistake, just suppose a kind of feasible name swap situation, and automatically create its oneself temporary name element (X), if and continuous change solved really with the title among the R2 RNTO X, it has just finished this exchange (otherwise it produces described situation as the conventional conflict event) so.
6. adduction relationship
For between duplicate P1 (moving in the WinFS system) and the data source P2 (moving in non-WinFS system) synchronously, causes a problem, in the relation of waving (being supported by WinFS) situation, not by the support of non-WinFS system. When two project A and B have the R that concerns on P1, and P1 with A (P1-21) then R (as changing unit P1-22) can cause this problem when then the order of B (as changing unit P1-23) creates them. When creating R (P1-22), R is the relation of waving, so when P2 sequentially uses these changes, can cause unallowed waving to concern mistake. For a plurality of embodiment of the present invention, ways of addressing this issue is, change the described change of rearrangement into, so that other changes after P1 is sent to P2 at all, can send all adduction relationships (for example, R), and therefore, by at first creating project A and B and then adopting R that they are relative to each other, jointly avoided this problem.
E. synchronously-the conflict processing
As early mentioned at this, 3 stages that are divided into are processed in the conflict in the synchronous service: (1) collision detection occurs in when changing application---and whether this step is used by definite change the safely; (2) collision decomposition and record---(carry out after detecting conflict) if consider whether automatic conflict processor is decomposed in order to understand described conflict---not having, then can selectively recording described conflict during this step at once automatically; And (3) are if conflict inspection and decomposition---some conflicts have been recorded then have carried out this step, and occur in outside the environment of simultaneous session---, and at this moment, the conflict that is recorded can be decomposed and delete from described record.
The especially directed conflict to the conflict that occurs in reciprocity synchro system (for example, be used in this above-described synchro system) of each embodiment of the present invention is processed. Exactly and effectively process the ability minimum data loss of conflict, and kept good usability, and reduced between sync period needs to user intervention. The directed conflict tupe of a plurality of embodiment of the present invention comprises one or more in the following conflict processing element: (a) medelling of conflict represents; (b) detection of conflict; (c) record of conflict in the permanent storage; (d) according to flexibly and the automatic classifying of the conflict of configurable collision decomposition strategy; (e) can comprise and can expand to filter and decompose the conflict processor of conflict; (f) automatically detect and discarded removing of conflict; And (g) planned collision decomposition. Also have, throw off the conflict tupe, each in these conflict processing elements itself is representational additional embodiment of the present invention.
1. conflict type
Usually, no matter when can not be during simultaneously operating synchrodata (" change and use unsuccessfully "), will cause conflict. These failures can be because many former thereby cause, although general conflict can be divided into two classes: constraint conflict and Knowledge Conflicts.
A) based on the conflict of knowledge
When two duplicate independently change same change unit, can cause the conflict based on knowledge. If two changes are to carry out in situation about being ignorant each other, then to be called be independently in these two changes---in other words, first version is covered by second knowledge, and vice versa. Based on the knowledge of as previously discussed duplicate, described synchronous service automatically detects all this conflicts, and processes these conflicts, and is as described below at this. The Knowledge Conflicts of some particular types comprises (wherein each title refers to it is local action and long-range action successively for renewal-deletion, deletion-renewal and renewal-update inconsistency; For example, upgrade-the deletion conflict is owing to local update and long-range deletion to same data).
Sometimes, the bifurcated of conflict being thought change in the vncsion history of unit is helpful. If conflict does not occur in the life that changes the unit, then its vncsion history is exactly a simple chain---each changes a back generation before. In the situation based on the conflict of knowledge, two change parallel the generation, so that described chain splitting and become the version tree.
Generally, Knowledge Conflicts occurs according to the result of knowledge and version processing. When application has when being stored in the change of the afoul version of information in the database, by the synchronous creation of knowledge of WinFS. Described conflict need to comprise conflict change information, and version information. Most of requirements to Knowledge Conflicts also are the requirements to constraint conflict. Yet on the basis of synchronous version and knowledge, Knowledge Conflicts can be detected individually.
B) conflict of Constraint-based
Have certain situation, in these cases, when being employed together, independently change has hindered integrity constraint. For example, in same directory, create two duplicate meetings of the file with same names so that such conflict generation, the wherein constraint in the system (for example, in the file unique project name apply) has caused the conflict of such Constraint-based.
Usually, the conflict of Constraint-based comprises that two independently change, as the conflict that is used for based on knowledge; Yet the conflict of Constraint-based comprises does not affect identical change unit but the different changes that have constraint between them that change the unit of otherwise impact. The conflict of Constraint-based can cause from single change, for example when synchronously one of them has constraint and another is not when having between two dissimilar types. For example, if it is the long constraints of eight (8) characters that a system has maximum filename length, if and that system receives the change to file that does not have this constraint from another, wherein said change is for filename so that filename is longer than 8 characters, has just caused constraint conflict (occuring in the single change from an individual machine)
The constraint conflict of specific type includes, but are not limited to:
Insert-insert conflict: when each of two synchronization partner creates the file that object with identity logic identifier for example has same names, occur.
Conflict without the father: when the father of the introducing object that will create does not exist, do not occur. An example is when receiving a file before the parent folder at file.
The not conflict of stated type: thus when being illustrated when preventing from creating described object, the pattern of introducing object do not occur.
In a word, constraint conflict is to cause by use the mistake that changes owing to a variety of causes. If adopt the form finally cause the decomposition method that reduces, can be processed targetedly, if perhaps they can be recorded being used for and finally decompose by user interactions, then this mistake is called as constraint conflict. The mistake that can not be processed targetedly but be reported is referred to as changing application error. For some embodiment, the application error that changes all is counted as mistake---namely, there is not admitted constraint conflict. And for some embodiment, represent Knowledge Conflicts when synchronous owing to be desirably in to receive next time, so can be left in the basket sending all conflicts that occur between sync period. (other mistake that causes not reducing also can be left in the basket. )
2. collision detection
Described synchronous service detects constraint in violation of rules and regulations when changing application, and automatically causes the conflict of Constraint-based. The conflict of decomposing Constraint-based requires custom code to adopt and the described change of mode correction of not violating described constraint usually, and synchronous service can or can not be provided for the general mechanism so done.
For each embodiment of the present invention, whether know remote version and vice versa by the check Indigenous knowledge, each changes unit inspection conflict. For the conflict based on knowledge, at this 4 kinds of collision detection situations are arranged:
1. know the Indigenous knowledge of remote version, know the long-range knowledge of local version: the change that this means introducing is obsolete, and therefore is dropped.
2. do not know the Indigenous knowledge of remote version, know the long-range knowledge of local version: this means the change of introducing than local version updating, and therefore accept.
3. know the Indigenous knowledge of remote version, know the long-range knowledge of local version. When if this may only occur in two version equivalences, and therefore do not have to change to be employed.
4. do not know the Indigenous knowledge of remote version, do not know the long-range knowledge of local version. This means that local and remote version conflicts mutually, and therefore cause conflict.
3. conflict is processed
Conflict may occur in and send or receive between sync period; Yet, if two buddy class seemingly (for example in the one-way synchronization operation, both are disposed similarly in the WinFS storage), then situation is symmetrical, and by automatic classifying described on synchronously conflict or record described conflict for asynchronous decomposition (automatic or manual), at receiving terminal, be the easiest to be processed.
Certainly, exist the transmission partner may need to process for example situation of the conflict in WinFS is synchronous to non-WinFS. In this case, in the reception synchronously of order, constraint conflict may not can be propagated back to described transmission partner. Also have, receive the partner and may not have the conflict record, perhaps may need to use sender's conflict to record to be easy to management. In this case, change may be refused together, and this decomposes described conflict (discussing herein) in order to force transmission.
Starter disposes the collision decomposition in its synchronous overview synchronously. Described synchronous service is supported in a plurality of conflict processors of associating in the single overview. Because Mechanism of Conflict Among is extendible, so exist various ways to unite a plurality of conflict processors. A kind of specific method comprises specifies the tabulation of conflict processor to attempt one by one, until one of them success (as described below herein). Another kind method comprises conflict processor is associated with the conflict type, for example, will upgrade-upgrade based on the conflict of knowledge and point to a conflict processor, and with all other sensing record that conflicts.
When detecting conflict, synchronous service can be taked (being selected by the synchronous starter in the synchronous overview) in 3 actions: (1) refusal changes; (2) automatic classifying conflict; Perhaps (3) are recorded to conflict in the conflict record.
A) refusal changes
If refusal changes, do not arrive described duplicate and negative replying is sent back to starter if change so, then synchronous service works. This decomposition strategy is used in does not simply have headed duplicate on (for example file server), and wherein the record conflict is infeasible. On the contrary, this duplicate is processed described conflict to other duplicate by refusal.
B) automatic collision decomposition
Automatically collision decomposition is the process of the conflict on decomposing synchronously according to specified strategy. In WinFS simultaneously operating, named policer independently is so that transmit operation and receive operation. Automatically the collision decomposition strategy can be specified by synchronous overview. The conflict that causes is delivered to the top conflict processor of appointment in the described overview. This conflict processor can decompose described conflict, records it or described conflict is passed to another conflict processor, so that further along with conflict processing streamline is processed.
Figure 39 A shows for the conflict of a plurality of embodiment of the present invention and processes streamline. In this figure, when conflict occured, conflict processor tabulation (perhaps " tabulation ") 3910 received conflict project 3902, and on the first path of described streamline described conflict is passed to first processor 3912, in this case, first processor is filter. Described filter 3912 is watchdog timer (watchdog), it estimates described conflict 3902, and allow it pass to next processor 3914 or refuse back described tabulation 3910, then, tabulation 3910 is transmitted back tabulation 3912 with it, successively, it is transmitted the first processor 3922 in the next path of return on described streamline. If by the first filter 3912 described conflict 3902 is passed to the second processor 3914, in this case, be decomposer, so if possible be decomposed device 3914 of described conflict decomposes, if perhaps impossible, then first processor 3922 is refused back in described conflict. Then, described conflict continues to process by streamline, until (a) decomposed by one in the processor in the streamline, (b) be recorded to clearly on the conflict record by the ripe title of specific conflict processor " logger ", for example logger 3936 is (namely for described logger, if conflict makes it pass to filter 3934) till, perhaps (c) is passed backflow waterline outside fully, and is sent back to acquiescently conflict record (with dashed lines logically is shown logger 3944).
The flow chart that the logic of the streamline shown in Figure 39 A of showing Figure 39 B moves. In Figure 39 B, and with reference to Figure 39 A, in step 3950, conflict 3902 enters the streamlines in the conflict processor tabulation 3910, and in step 3952 by initialization to filter 3912. If in step 3954, conflict 3902 passes to this filter 3912, proceeds to decomposer 3914 in the described conflict 3902 of step 3956 so, and in step 3958, described decomposer 3914 attempts to decompose described conflict 3902. If success, then in step 3998, processing is returned; Otherwise, proceed to decomposer 3922 in step 3960 conflict, in step 3962, decomposer 3922 attempts to decompose conflict 3902. If success, in step 3998, processing is returned; Otherwise in step 3964, conflict proceeds to tabulation 3932, and in step 3966, from here to filter 3934, and if in step 3968, conflict passes to this filter 3934, in step 3972, in step 3970, by logger 3936 conflict is recorded in the conflict record (not shown) so, and, in step 3998, processing is returned; Otherwise in step 3972, conflict 3902 is sent to filter 3938, and if pass to this filter 3938 in step 3974 conflict 3902, so in step 3976, conflict 3902 proceeds to decomposer 3940, and in step 3982, decomposer attempts to decompose conflict 3902. If success, in step 3998, processing is returned; Otherwise in step 3984, will be conflicted by decomposer 3,936 3902 is recorded in the conflict record (not shown), and in step 3998, processing is returned.
Although in Figure 39 A and 39B, do not illustrate, should be noted that the path of continuous collision decomposition device also can be constructed, wherein, if conflict can not by a destroyer breaks down, then pass to conflict next decomposer, then try hard to decompose described conflict, etc., the rest may be inferred. Lucky ending place in the path if conflict continues not to be decomposed will conflict along described path so and transmit back tabulation, in order to continue next paths. Similarly, all use up in case be used for all paths of tabulation, and conflict is still undecomposed, tabulates so and transmit conflict along its path, until it arrives next tabulation, etc., the rest may be inferred.
It is important also to note that streamline needn't be with the tabulation beginning; On the contrary, it can with the conflict processor of any type such as, for example filter begins. Yet, in any case, transmit the first conflict processor in the backflow waterline if will conflict along the path, and that conflict processor does not have other path in order to attempt (the situation that may just be used for the conflict processor tabulation, wherein all paths all do not have to attempt), conflict is delivered to the outside of streamline so, and automatically and acquiescently is recorded to the conflict record.
The ConflictHandler type is the fundamental type for conflict processor, comprises the conflict processor of conflict processor tabulation, conflict record and collision filtering device and other type. In addition, described synchronous service also can provide the conflict processor of many acquiescences, includes, but are not limited to:
Local winning: as by selecting local data of storing as to introducing the winner of data, to decompose conflict
Long-range winning: as by selecting to introduce data as the winner of the data that this locality is stored, to decompose conflict;
It is winning at last not write the person: based on the timestamp that changes the unit, select local winner or long-range winner and (notice that synchronous service does not rely on time value usually; This collision decomposition device is only exception for that rule);
Deterministic: as to guarantee mode identical on all duplicate, to select the winner, but be not other significant---an embodiment of synchronous service may realize this feature with the contrast on the dictionary editor of Partner ID.
For example, conflict processor can be stipulated, for upgrading-the deletion conflict, should use local winner's decomposition method, and for all other conflicts, should use and not write person winner decomposition method at last, as follows:<conflictHandlerList xmlns=" http: ∥ schemas.microsott.com/winfs.2003/10/conficts "
<conflictFilter xmlns=”http:∥schemas.microsoft.com/winfs.2003/10/conflicts”>
  <conflictType>UpdateDeleteConflict</conflictType> <conflictResolver><ResolutionType>LocalWins</ResolutionType></conflictRes olver>
</conflictFilter> <conflictResolver><ResolutionType>LastWriterWins</ResolutionType></confli ctResolver>
</conflictHandlerList>
Certainly, if do not specify conflict processor, if perhaps do not process conflict by any appointed conflict processor, conflict just is placed in the conflict record so. For some embodiment, the conflict record also is conflict processor.
For each embodiment of the present invention, ISV can realize and set up its oneself conflict processor. Client's conflict processor can be accepted configuration parameter, although this parameter must be specified by the SCA in the collision decomposition part of synchronous overview.
When the collision decomposition device is processed conflict, it will need the tabulation (replacing conflict to change) of the operation carried out to return to described routine. Then, long-range knowledge is suitably adjusted in these operations of described sync service application, in order to comprise advised information of conflict processor.
May in using said method, detect another conflict. In this case, before re-starting initial treatment, new conflict must be decomposed or be recorded.
When the branch in the vncsion history of conflict being regarded as project, collision decomposition can be counted as contact---unite two branches in order to form independent point. Therefore, collision decomposition becomes vncsion history oriented without loop figure (DAG).
C) conflict log recording
Although the conflict of being reported can synchronously be decomposed with automatic collision decomposition, other conflict may be recorded daily record for later planned decomposition. The conflict log recording allows the collision decomposition processing synchronously to carry out---and namely, conflict needn't could be decomposed when they are deleted, but can be recorded daily record for decomposing in the future. For example, the application of conflict viewer can allow the user to check and be that the conflict that is recorded daily record is decomposed in true afterwards artificially.
For a plurality of embodiment of the present invention, the conflict processor of very special type is conflict log recording device (perhaps, more simply, " log recording device "). Described synchronous service is recorded in the conflict daily record conflict as the project (perhaps, in alternative embodiment, simply as Type C onfict) of Type C onflictRecord. These daily records return come with conflict in project relevant (unless described project itself is deleted). For some embodiment, each conflict daily record comprises: the introducing that causes conflict changes; The type of conflict (for example, renewal-renewal, renewal-deletion, deletion-renewal, insertion-insertion, perhaps constraint); And the knowledge of introducing the version that changes and the duplicate that sends it. For some alternative embodiment of the present invention, each this conflict project comprises explanation and other environmental information that conflict changes data and metadata, conflict and for example changes applicator information, sets up data and remote partner title. In addition, can not be used to use the mode of described change, store described change data. Also have, for each embodiment of the present invention, derivative each type can be added the new field relevant with the conflict of that type from conflict. For example, InsertInsertConflict adds the item id that causes the project of violating unique constraints.
For a plurality of embodiment of the present invention, the conflict project that is recorded daily record also will comprise copying of destination item, as the expansion to the conflict project, perhaps as just also being stored in the conflict record, having the relation of defined between it and the conflict project itself or replacedly as the part of conflict project itself (for example one group property value to). As conflict in the daily record a conflict item purpose part or be stored this destination item of (being stored on the permanent data store) with the conflict project, the specific change of reflection caused the conflict in the primary importance. Figure 40 shows the block diagram of this method of usage example contact entry purpose. In this example, contact project 4002 (" destination item ") comprises name field 4004, and name field 4004 is set to " John " at first, as last successful synchronous title. This field 4004 is changed into " Bob " then locally by local system. Between sync period subsequently, if the attempt that this name field 4004 is changed into " Jane " has caused conflict, because can not finding out, local system should use which name changing " Bob " or " Jane ", so local change (" Bob ") is retained, and copying together along with conflict project 4002 ', conflict 4006 is recorded in the conflict daily record 4008, and conflict project 4002 ' has reflected the application (" Jane ") of the change that leads to a conflict. By this way, the conflict daily record comprises the complete object project that causes conflict, and this specific destination item is updated, so that the change carried out in the project that leads to a conflict is attempted in reflection.
For conflict being added to the conflict daily record, at first search for daily record, on identical change unit (a plurality of), whether there is other conflict in order to determine. If have any existing conflict in identical change unit, then check them in order to can remove. If the existing conflict that change is known is changed the new conflict of knowing and comprises, then remove existing conflict. On the other hand, if the new change that change is known is changed the existing conflict that is recorded daily record of knowing and comprises, then delete new conflict, vice versa (namely, if the storage that is known that it is known comprises, for example when described storage was accepted and successfully used the change that comprises the conflict of knowing, conflict also was changed to obsolete). In the third situation, during wherein two changes are known any one comprises another, then new conflict is added to described daily record, and is present in the described daily record corresponding to two conflicts of identical change unit, until afterwards by artificially or automatically decomposition.
D) conflict checks and decomposes
The API that described synchronous service is provided for using, in order to check described conflict daily record, and the decomposition method of suggestion described conflict wherein. API allows to use and enumerates all conflicts or the conflict relevant with given project. It also allows these application to decompose the conflict that is recorded daily record in a kind of mode in 3 kinds of modes: (1) is long-range winning---and accept to be recorded the change of daily record and cover described afoul local the change; (2) local winning---ignore the described conflict part that is recorded the change of daily record; And (3) suggestion is new, and change---a kind of merger (merge) is advised in wherein said application, in its view, decomposes described conflict. In case by application decomposition conflict, described synchronous service is just deleted them from daily record.
E) duplicate reduces propagation with collision decomposition
In the synchronization scenario of complexity, on a plurality of duplicate, can delete identical conflict. If this situation has occured, then many things all may occur: (1) can decompose described conflict on a duplicate, and described decomposition method is sent to another; (2) on two duplicate automatic classifying described conflict; Perhaps described conflict (checking API by conflict) has been decomposed in (3) artificially on two duplicate.
In order to ensure reducing, described synchronous service passes to other duplicate with the collision decomposition method. When the change of decomposing conflict arrived duplicate, described synchronous service automatically found any conflict record that this renewal has been decomposed that passes through in the described daily record, and deletes them. In this case, the collision decomposition method on duplicate will be bundled on all other duplicate.
If for identical conflict, select different winners by different duplicate, the principle of described sync service application binding collision decomposition method then, and automatically select and be better than alternative a kind of decomposition method in two kinds of decomposition methods. In the mode of determining, pick out described winner, to guarantee in all, all to generate identical result (embodiment uses the contrast on the duplicate ID Dictionary editing).
If the same conflict, the different copies of proposed different "new changes", the said synchronization service The special of this new conflict as a conflict, and use conflict logger to prevent it spread to other complex Products. This decomposition method often leads to artificial methods of conflict resolution.
D. synchronous mode and additional aspects of conflict management mode
The following are used in the various embodiments of the present invention, the synchronization pattern of the additional (or more specific) aspects.
· Each replica is derived from data stored in the data synchronization sub-set of definitions having a plurality of A data instance.
· In synchronous mode the root, is a definition of a unique ID to the root folder (in fact, a Root element) of the base type of replica, ID is used to synchronize it is a member of the community, and And any filters and other elements are necessary for a particular copy or desired.
· Each replica of the "map" is maintained in the replicas, and thus, for any Particular replica is limited to the mapping information of other replica replica. Although this Species mapping may include only a subset of the entire sync community, but through the sharing of common complex Products, changes in the copy will still be propagated to the entire synchronization Community (although any special Given replica replica does not know and unknown public to share what other reproductions).
· The use of synchronous mode and copies distributed to allow true multi-standard synchronous peer community. Also, there is no sync community type, but simply as synchronous replica of the community The body of the community a value exists in the field.
· Each replica has its own metadata for tracking incremental change enumeration and storing Synchronization with other copies of the known community status information.
· Change unit has its own metadata, including: version, including partner keywords plus partners With change number; each change unit project / extension / relational version; synchronized with the replica has moved from Community seen / received related to changes in knowledge; GUID and the local ID configuration; to And is stored in the referenced relations for clear GUID.
The following are used in the various embodiments of the present invention, the processing mode of the other aspects of the conflict.
· By the various copies (and adapter / data source combination) each decomposition strategy to deal with conflict - That is, each replica can be based on its own criteria and conflict resolution mode decomposition Conflicts. Further, although the data is stored in each instance and the difference may result obtained with Additional future conflicts, but that is updated to the received status information with other replicas , The status information is updated as reflected incremental and continuous conflicts lists are not To see.
· Synchronous mode can be used for all reproductions include a plurality of predetermined conflict processors, as well as for User / developer customers requirements conflict processors. The model also includes three Special "conflict Processor": (a) conflict "filter", in a different way decomposition of Different conflict solution, the resolution is based on, for example: (i) when the change in two locations The same time changing unit, to handle, (ii) when in a position changing unit changes The deletion was carried out in the other, how to handle; and (iii) when two different Two different position changing unit with the same name, how to handle; (b) conflict "Processor List", in which each element of the list in order to take turns trying to specify a series of actions, Successfully decomposed until the conflict so far; and (c) "did not do anything," the record, Tracking the conflict, but in the case without user intervention to take no further action. ...
· Synchronous mode can be used for all reproductions include a plurality of predetermined conflict processors, as well as for User / developer customers requirements conflict processors. The model also includes three Special "conflict Processor": (a) conflict "filter", in a different way decomposition of Different conflict solution, the resolution is based on, for example: (i) when the change in two locations The same time changing unit, to handle, (ii) when in a position changing unit changes The deletion was carried out in the other, how to handle; and (iii) when two different Two different position changing unit with the same name, how to handle; (b) conflict "Processor List", in which each element of the list in order to take turns trying to specify a series of actions, Successfully decomposed until the conflict so far; and (c) "did not do anything," the record, Tracking the conflict, but in the case without user intervention to take no further action. ...
Initially described here uses a new storage platform, with a variety of individual computer systems including synchronous network Enterprises will have a hybrid, where some individual computer systems will use the new storage platform, while the other individual Computer systems will continue to use traditional storage platform. This is where the two clients, including new storage platform, but the server Service includes traditional storage platforms any client - server architecture is especially important. Therefore, in these cases , The use of two new storage platform computer system ("client") may be necessary through the use of conventional flat Taiwan's computer system ("intermediary") synchronization. For example, some clients may use such support roaming profiles (RUP) or with a client side caching (CSC) folder redirection and other software in the traditional roaming services Registered. Because these traditional storage platform for traditional software does not support roaming for new storage platform roaming Data, so a new storage platform for the new roaming service is required. The various embodiments of the present invention is directed to a system System and method for simultaneous use public through an intermediary storage platform (for example, related to the invention of new storage platform) Clients, and the public agency does not use the same storage platform (for example, as an alternative, the use of itself does not support the new Storage platform synchronized traditional storage platform). ...
Initially described here uses a new storage platform, with a variety of individual computer systems including synchronous network Enterprises will have a hybrid, where some individual computer systems will use the new storage platform, while the other individual Computer systems will continue to use traditional storage platform. This is where the two clients, including new storage platform, but the server Service includes traditional storage platforms any client - server architecture is especially important. Therefore, in these cases , The use of two new storage platform computer system ("client") may be necessary through the use of conventional flat Taiwan's computer system ("intermediary") synchronization. For example, some clients may use such support roaming profiles (RUP) or with a client side caching (CSC) folder redirection and other software in the traditional roaming services Registered. Because these traditional storage platform for traditional software does not support roaming for new storage platform roaming Data, so a new storage platform for the new roaming service is required. The various embodiments of the present invention is directed to a system System and method for simultaneous use public through an intermediary storage platform (for example, related to the invention of new storage platform) Clients, and the public agency does not use the same storage platform (for example, as an alternative, the use of itself does not support the new Storage platform synchronized traditional storage platform). ...
Several embodiments of the present invention is targeted at replica replica intermediary clients and non-existence and operation between "Through intermediaries Sync" (STI) adapter. For these embodiments, STI adapter is designed from the Changes in the client's copy of the results of enumeration serialized to a non-replica mediation, and copies from the intermediate non- The result of these changes to the replica unserializing client.
Figure 41 is one of the two clients are required to synchronize the case through the intermediary of a block diagram. Illustration, the transfer System storage platforms (eg, Win32) intermediary computer system connected to use the new storage platform (for example, Described herein related to embodiments of the invention, for convenience, hereinafter referred to as "WinLH", WinLH including Here called WinFS file system, as shown in Figure) A 4112 clients and client B 4114 both. 4102 can be regarded as merely an intermediary from the synchronization client A 4112 and B 4114 to the client from the client Synchronized to the client B 4114 A 4112 change of the "through." Thus, the agency since its 4102 itself does not The purpose of the body with the client or the client A 4112 B 4114 synchronized, and so do not use it directly from the client Or client machine A 4112 B 4114 receives any change data. For this purpose, the previously used herein Terminology, the intermediary is not a replica of 4102, although as a client A 4112 replica and client B both As 4102 is a replica as an intermediary through the "Sync through intermediaries" (STI) to interact with the adapter. ...
Figure 41 is one of the two clients are required to synchronize the case through the intermediary of a block diagram. Illustration, the transfer System storage platforms (eg, Win32) intermediary computer system connected to use the new storage platform (for example, Described herein related to embodiments of the invention, for convenience, hereinafter referred to as "WinLH", WinLH including Here called WinFS file system, as shown in Figure) A 4112 clients and client B 4114 both. 4102 can be regarded as merely an intermediary from the synchronization client A 4112 and B 4114 to the client from the client Synchronized to the client B 4114 A 4112 change of the "through." Thus, the agency since its 4102 itself does not The purpose of the body with the client or the client A 4112 B 4114 synchronized, and so do not use it directly from the client Or client machine A 4112 B 4114 receives any change data. For this purpose, the previously used herein Terminology, the intermediary is not a replica of 4102, although as a client A 4112 replica and client B both As 4102 is a replica as an intermediary through the "Sync through intermediaries" (STI) to interact with the adapter. ...
For the results will change from replica enumeration client to a non-serialized copy intermediaries, each serialized Corresponding to the intermediary is a file to be written in a number of triples changed. For some embodiments, these documents Corresponding to a particular piece is written to a specific folder synchronization Community ("Community Folders"), and different Synchronization community will have different communities folder. These documents triples include changing data files (CDF), prerequisite knowledge documents (PKF), and have been informed of the knowledge document (LKF). CDF contains Involved in changing the cell level for a specific project WinFS changed information. PKF specifies the synchronization peer must What has been known to be associated with changes in the application. On the other hand, LKF specifying that if a peer synchronization should Changes associated with, it must be informed about. For efficiency reasons, and similar peer synchronization, STI fitness Serial adapter to change only the cell information ("Change the portions" and its associated metadata), and for certain Embodiment, the data may contain only (for project specific change) project type, the version number change Unit version, and the changed value of the property. For each Example, the file triples serialized based Order the sequence of messages written to the mediation naming convention (for reasons discussed later); example, the first serial Can contain stored as an intermediary of the 1.PKF (PKF files), 1.CDF (CDF files) and 1.LKF (LKF) File three files may include a second serial 2.PKF, 2.CDF and 2.LKF, and so on. ...
For the results will change from replica enumeration client to a non-serialized copy intermediaries, each serialized Corresponding to the intermediary is a file to be written in a number of triples changed. For some embodiments, these documents Corresponding to a particular piece is written to a specific folder synchronization Community ("Community Folders"), and different Synchronization community will have different communities folder. These documents triples include changing data files (CDF), prerequisite knowledge documents (PKF), and have been informed of the knowledge document (LKF). CDF contains Involved in changing the cell level for a specific project WinFS changed information. PKF specifies the synchronization peer must What has been known to be associated with changes in the application. On the other hand, LKF specifying that if a peer synchronization should Changes associated with, it must be informed about. For efficiency reasons, and similar peer synchronization, STI fitness Serial adapter to change only the cell information ("Change the portions" and its associated metadata), and for certain Embodiment, the data may contain only (for project specific change) project type, the version number change Unit version, and the changed value of the property. For each Example, the file triples serialized based Order the sequence of messages written to the mediation naming convention (for reasons discussed later); example, the first serial Can contain stored as an intermediary of the 1.PKF (PKF files), 1.CDF (CDF files) and 1.LKF (LKF) File three files may include a second serial 2.PKF, 2.CDF and 2.LKF, and so on. ...
For several embodiments of the present invention, STI adapter comprises three core operations: transmitting a synchronization, the received in Steps and data compression.
1 Send synchronous operation
Figure 42 shows that the client sends to the intermediary through STI adapter to change the data ("Send Synchronization" operation) A flowchart of steps. In step 4202, STI adapter first confirm the existence of an intermediary on the corresponding client Community Community sync folder. If it is, then in step 4204, STI adapter then scan and reverse Serialization intermediary community folder LKF all the contents in order to determine for the synchronization of the Community Mediated local knowledge (ILK) of the current state. On the other hand, if no community folder, then at step 4206ILK is considered empty, and in the intermediate folder creates a community.
In step 4208, STI adapter concurrent access to a community of intermediaries on the folder "write mode" into Cheng Lock (through the intermediary of the file system), by preventing other clients (or other peer or processes) in the Send synchronous operation to read or write the Community folder to maintain data integrity. In step 4210, ILK STI adapter and then passed to the client. Based on its own client IKL local knowledge (CLK), In step 4212, the client to determine whether there is any change in ILK not convey, if not, then the process jump Step 4220. On the other hand, if the client determines that there is not communicated ILK change, then in step 4214, Client ready ILK does not convey the changes enumerated, and passes them to the STI adapter. In Step 4216, STI serial adapter every batch change information (changing data and knowledge), and in step 4218, When a file sequentially incremented above triples when, STI adapter then serialized change batch write Into the intermediary community folder. Once all of the bulk of the serial changes are written mediation, in step 4220, STI adapter and then release the "Write Mode" process locks to allow other clients (or other peer Or process) inspection agency on updated content. ...
In step 4208, STI adapter concurrent access to a community of intermediaries on the folder "write mode" into Cheng Lock (through the intermediary of the file system), by preventing other clients (or other peer or processes) in the Send synchronous operation to read or write the Community folder to maintain data integrity. In step 4210, ILK STI adapter and then passed to the client. Based on its own client IKL local knowledge (CLK), In step 4212, the client to determine whether there is any change in ILK not convey, if not, then the process jump Step 4220. On the other hand, if the client determines that there is not communicated ILK change, then in step 4214, Client ready ILK does not convey the changes enumerated, and passes them to the STI adapter. In Step 4216, STI serial adapter every batch change information (changing data and knowledge), and in step 4218, When a file sequentially incremented above triples when, STI adapter then serialized change batch write Into the intermediary community folder. Once all of the bulk of the serial changes are written mediation, in step 4220, STI adapter and then release the "Write Mode" process locks to allow other clients (or other peer Or process) inspection agency on updated content. ...
(2) receive synchronization operation
For the other direction of synchronization, as shown in Figure 43 is a client adapter through the STI received from intermediaries change Data ("Receive Sync" operation) a flowchart of steps. In step 4302, STI adapter first receives passenger Local knowledge client (CLK), for several embodiments of the present invention, by which the client adapter to STI When a synchronization request mediation, the synchronization request includes the inner discussed previously for each of the equivalent Step mode of CLK. In step 4304, STI adapter and then get a community agency on the folder "read Model "process lock (through the intermediary of the file system), in order to prevent other clients through (or other peer or Process) is received during a synchronization operation is written (but for some embodiments, is not read) Community documents Clip to maintain data integrity. For some embodiments, "read mode" can be optimized for each of the three yuan locked Group rather than the entire directory, in order to achieve better concurrency. ...
In step 4306, the STI adapter for intermediate storage for the HCT (for example, from the previous discussion Synchronous operation of the transmission gain), STI adapter scans intermediary folder on the community to identify the next Changes in the higher triplet, the triplet (a) higher order than the HCT, (b) change for the triplet, CLK (client local knowledge) more than the prerequisite knowledge (from PKF), and (c) for the change Triples, CLK is less than has been informed knowledge (from LKF). (This change is referred to herein triples "fit By changing triples "or" ACT "). If in step 4308 the existence of such a change in triples (ACT), Then in step 4310, the change in sync adapter triples (ACT) content can be deserialized into the replica Understanding changing enumerated, and in step 4312, sent to the client will change for processing. Process Then returns to step 4306 to process the next ACT, and the process continues until there is no remaining ACT, At this point in step 4314 STI adapter unlock the read mode, the process ends. ...
In step 4306, the STI adapter for intermediate storage for the HCT (for example, from the previous discussion Synchronous operation of the transmission gain), STI adapter scans intermediary folder on the community to identify the next Changes in the higher triplet, the triplet (a) higher order than the HCT, (b) change for the triplet, CLK (client local knowledge) more than the prerequisite knowledge (from PKF), and (c) for the change Triples, CLK is less than has been informed knowledge (from LKF). (This change is referred to herein triples "fit By changing triples "or" ACT "). If in step 4308 the existence of such a change in triples (ACT), Then in step 4310, the change in sync adapter triples (ACT) content can be deserialized into the replica Understanding changing enumerated, and in step 4312, sent to the client will change for processing. Process Then returns to step 4306 to process the next ACT, and the process continues until there is no remaining ACT, At this point in step 4314 STI adapter unlock the read mode, the process ends. ...
For the various embodiments of the present invention, the conventional compressed by the adapter created STI serial data and knowledge File is required; otherwise changing more and more triples will fill all available space on the intermediary. In this Point, the goal is to ensure that data compression file data and knowledge on the growth in the intermediary is properly defined. The present Several embodiments of specified using a method is permitted within the shared file system, a change of the number of packets It is set on the "upper threshold", once the threshold is exceeded, requires the ability to compress the adapter through the underflow of STI Over compression operation compressed shared file system (Community Files folder). Compression is done by the following steps. Stored in the shared step reduces the amount of data in the file system: (a) compression of some existing object change history, And (b) removal has been deleted (through conflict resolution explicitly deleted, or deleted as a result of clear tombstone) Change broadcast objects. However, compression can only be performed by a just and able to immediately receive synchronization "full" Send synchronous (ie, as an intermediary, as there is no Community folders without changing the zero baseline full enumeration) passenger The STI client adapters to achieve. Thus, the compression can not be completed by the intermediary only send or receive synchronization synchronization Client performs. ...
STI adapter is shown in Figure 44 (i.e., the transmission can be both synchronous and clients receive synchronization STI associated adapter) as an intermediary in the community folder compression operation performed on the data ("Compression" Operation) The flowchart of steps. In the figure, followed by step 4402 STI successful client adapter Receive synchronization operation, but in the release "Read Mode" process before the lock (i.e., the step of Figure 43 immediately After 4312, but before the step 4314), in step 4404, STI community on the intermediate adapter verification Folders, to see if the value exceeds the upper threshold; if not, the process ends (by receiving process by releasing Locks, etc. to complete). However, if it exceeds the upper threshold, then in step 4406, STI intermediary adapter removed Community of all changes in the folder triples file, then in step 4408, STI adapter through to customers Client indicates an intermediary knowledge is not empty (after the deletion, was indeed the case) to initiate and launch the client and intermediary Synchronous operation between all read (including the write mode process locks). A result, only the client corresponding to the state Minimum set of triples file is uploaded to the intermediary and the intermediary exists. ...
For them "read mode" is optimized to lock each triplet rather than the entire directory to achieve better and Hair of those embodiments, and for the standard "read mode" of the present invention other alternatives fact that the process There are slightly different, which, STI STI adapter to obtain an intermediary adapter community folder "Reading Mode Style "process lock (through the intermediary of the file system) (step 4304 in Figure 43) before checking whether pressure Reduced, if necessary compression, the standard (non-optimized) "read mode" in order to prevent other clients through (or Other peers or processes) in the receiving written during synchronous operation (but for some embodiments, is not read) Community folders to maintain data integrity. ...
For them "read mode" is optimized to lock each triplet rather than the entire directory to achieve better and Hair of those embodiments, and for the standard "read mode" of the present invention other alternatives fact that the process There are slightly different, which, STI STI adapter to obtain an intermediary adapter community folder "Reading Mode Style "process lock (through the intermediary of the file system) (step 4304 in Figure 43) before checking whether pressure Reduced, if necessary compression, the standard (non-optimized) "read mode" in order to prevent other clients through (or Other peers or processes) in the receiving written during synchronous operation (but for some embodiments, is not read) Community folders to maintain data integrity. ...
Finally, some embodiments are also completed a full read synchronous operation (read mode process including the release lock) After compression begins. For such embodiments, the process from the beginning to get write lock mode process, and then continue Previously mentioned all the steps.
C.STI and lower levels of client support
In addition to the above, several embodiments of the present invention, as previously described for the synchronization through the intermediary of the variable Body. Certain embodiments include also runs against traditional storage platform clients, wherein said "Traditional Clients "can access all of the data files. Also expected some traditional client and other applications and into Process for other purposes can access the data files. For example, based on creation time, or some other inherent File sync files feature traditional client. Another example is direct access to any or all of the file (for example, *. CDK files) and copy their traditional clients. In many ways, the traditional client can directly Direct communication with the first intermediary (conventional synchronization techniques may be used) in the same second intermediate point to consider, and And thereby, more intermediaries synchronization is possible, and so reveal. ...
In addition to the above, several embodiments of the present invention, as previously described for the synchronization through the intermediary of the variable Body. Certain embodiments include also runs against traditional storage platform clients, wherein said "Traditional Clients "can access all of the data files. Also expected some traditional client and other applications and into Process for other purposes can access the data files. For example, based on creation time, or some other inherent File sync files feature traditional client. Another example is direct access to any or all of the file (for example, *. CDK files) and copy their traditional clients. In many ways, the traditional client can directly Direct communication with the first intermediary (conventional synchronization techniques may be used) in the same second intermediate point to consider, and And thereby, more intermediaries synchronization is possible, and so reveal. ...
As shown previously, the present invention is used to organize, search, and share data storage platform. The present invention Storage platform extension and expansion of the existing file system and database systems outside the data storage concepts and And is designed for storage of all types of data, including structured, unstructured or semi-structured Of data such as relational (tabulated) data, XML, as well as what is known as a new form of project data. Through its common storage functions and modes of data storage platform of the present invention allows for the client, knowledge work Persons and businesses more efficient application development. It provides a rich and extensible application programming interface, the Represents the interface can not only use their inherent performance data model, and includes and extends the existing file system and Database access methods. Will be understood that without departing from the broad inventive concept case, the above Embodiments described changes. Accordingly, the present invention is not limited to the particular embodiments disclosed, but are designed by the Specified in the appended claims cover the spirit and scope of the invention and all changes within. ...
As the above described become apparent, the present invention in various systems, methods, and all aspects Or may be part of the program code (ie, instructions) embodied in the form. The program code can be stored A computer-readable medium, such as magnetic, electrical, or optical storage medium, in the case of non-limiting including soft Disk, CD-ROM, CD-RW, DVD-ROM, DVD-RAM, magnetic tape, flash memory, a hard disk drive Device, or other machine-readable storage medium, wherein, when the program code is loaded into the machine such as a computer or service By the machine to perform the vessel, the machine becomes an apparatus for practicing the present invention the apparatus. The invention may also be in the Some are transmitted on the transmission medium in the form of program code embodied in the transmission medium such as a wire or an electric Cable, through the optical fiber, the network, including the Internet or Intranet, or by any other form of transmission, Wherein, when the program code is received and loaded into the machine such as a computer and executed by a machine, said The machine becomes an apparatus for practicing the present invention apparatus. When a general-purpose processor is implemented, the program code and the Processor combination, to provide a logic circuit similar to the operation of a particular unique device. ...

Claims (44)

  1. As the above described become apparent, the present invention in various systems, methods, and all aspects Or may be part of the program code (ie, instructions) embodied in the form. The program code can be stored A computer-readable medium, such as magnetic, electrical, or optical storage medium, in the case of non-limiting including soft Disk, CD-ROM, CD-RW, DVD-ROM, DVD-RAM, magnetic tape, flash memory, a hard disk drive Device, or other machine-readable storage medium, wherein, when the program code is loaded into the machine such as a computer or service By the machine to perform the vessel, the machine becomes an apparatus for practicing the present invention the apparatus. The invention may also be in the Some are transmitted on the transmission medium in the form of program code embodied in the transmission medium such as a wire or an electric Cable, through the optical fiber, the network, including the Internet or Intranet, or by any other form of transmission, Wherein, when the program code is received and loaded into the machine such as a computer and executed by a machine, said The machine becomes an apparatus for practicing the present invention apparatus. When a general-purpose processor is implemented, the program code and the Processor combination, to provide a logic circuit similar to the operation of a particular unique device. ...
  2. (2) as claimed in claim 1, characterized in that, using said synchronization operation to support data sharing Made.
  3. 3 as claimed in claim 1, characterized in that, using said synchronization to allow end users to diffuse Tour.
  4. 4 as claimed in claim 1, characterized in that said common storage platform is based on the project Storage platform.
  5. 5 as claimed in claim 4, characterized in that the change of the client stored serialized enum Stored in said at least one intermediate file.
  6. As claimed in claim 5, characterized in that, for a single serial, said at least one File includes at least one or more of the following: for changing data (CD) change in the data file (CDF), Prerequisite for knowledge (PK) prerequisite knowledge documents (PKF), as well as for knowledge have been informed (LK) The document has been informed knowledge (LKF).
  7. As claimed in claim 5, characterized in that said synchronization of said first client includes Intermediary transmission between synchronous operation, synchronization of the transmission comprises:
    Determining whether the intermediary has been informed of knowledge;
    If the first client has not reflected in the knowledge of the intermediary has been informed of the change, compared with the Preparing a set of said intermediate necessary changes;
    Serialization of the necessary changes, and writes said change of said intermediate; and
  8. As claimed in claim 7, characterized in that said transmission synchronization operation further comprises:
    Obtain write mode process locks; and
    Write mode lock release process.
  9. (10) as claimed in claim 5, characterized in that said synchronization of said first client includes Receive an intermediary between the synchronous operation, the receiver from said synchronous operation includes a set of intermediaries deserialization necessary Changes, and the change will be applied to the client.
  10. A process as claimed in claim 9, characterized in that said receiving synchronization operation further comprises:
    Obtain read-mode process locks; and
    Release the read mode process lock.
  11. As claimed in claim 5, characterized in that the synchronization comprises the first client and the Intermediary between said compression operation, the compression operations include:
    Perform a synchronization operation successfully received, without releasing the read mode process locks;
    Delete all synchronized files; and
    To perform a full synchronization operation to send.
  12. 12 A by having a different storage platform (such as Win32) intermediary computer system ("the Referral ") synchronized using a common storage platform (for example, WinFS) at least two computer systems (each one The "client") system, said system including the use of each client resides on, and the each client Machine interface with the agency through an intermediary synchronization (STI) adapter at least one subsystem.
  13. As claimed in claim 12, characterized in that it further comprises at least one subsystem, which , The use of said synchronizing operation to support data sharing.
  14. 14 as described in claims 12, characterized in that it further comprises at least one subsystem, wherein Use the synchronization to support end-user roaming.
  15. 15 as claimed in claim 12, characterized in that it further comprises at least one subsystem, which , Each of the utility storage platform is a project-based storage platform.
  16. 16 as claimed in claim 15, characterized in that it further comprises at least one subsystem, which , The client enumerates changes are stored in the intermediate serialized into at least one file (one for each "The same Step Files ").
  17. As claimed in claim 16, characterized in that it further comprises at least one subsystem, which , For the individual serial, said at least one file includes at least one or more of the following: for changing the number of According to the (CD) change in the data file (CDF), for the prerequisite knowledge (PK) text prerequisite knowledge Pieces (PKF), as well as for knowledge have been informed (LK) has been informed of the knowledge of the file (LKF).
  18. 18 as claimed in claim 16, characterized in that it further comprises at least one subsystem, which , The synchronization includes a first intermediary between the client and the transmission of the synchronization, synchronization of the transmission Including:
    Determining whether the intermediary has been informed of knowledge;
    If the first client has not been informed of the knowledge of the intermediary reflected in the change was the Preparing a set of said intermediate necessary changes.
    The set of serial changes necessary, and writes the change of the intermediary; and
  19. 19 as claimed in claim 18, characterized in that it further comprises at least one subsystem, which , The synchronous operation of the transmission further comprises:
    Obtain write mode process locks; and
    Write mode lock release process.
  20. 20 as claimed in claim 16, characterized in that it further comprises at least one subsystem, which , The synchronization includes a first intermediary between the client and the reception of the synchronization, synchronization of the receiving Including unserializing from said intermediate set of necessary changes, and the change is applied to the said client.
  21. 21 as claimed in claim 20, characterized in that it further comprises at least one subsystem, which , The synchronization of the receiving further comprises:
    Obtain read-mode process locks; and
    Release the read mode process lock.
  22. 22 as claimed in claim 16, characterized in that it further comprises at least one subsystem, which , The synchronization comprises said first intermediary between the client and the compression operation, the compression operation comprises:
    Perform a synchronization operation successfully received, without releasing the read mode process locks;
    Delete all synchronized files; and
    To perform a full synchronization operation to send.
  23. 23 A computer-readable instructions including a computer-readable medium, the instructions used to having a Different storage platforms (such as Win32) intermediary computer system ("intermediary") simultaneous use - Utility Storage Platform (such WinFS), at least two computer systems (one for each "client"), said computing Including the use of machine-readable instructions that reside on each client, and each client through the interface with the agency Intermediary synchronization (STI) adapter command.
  24. 24 as claimed in claim 23, wherein the computer readable instructions, wherein, further including instructions, which In order to support data sharing using synchronous operation.
  25. 25 as claimed in claim 23, wherein the computer readable instructions, wherein, further including instructions, which , The use of synchronization to support end-user roaming.
  26. 26 as claimed in claim 23, wherein the computer readable instructions, wherein, further including instructions, which , Said utility storage platform is a project-based storage platform.
  27. 27 as claimed in claim 26, wherein the computer readable instructions, wherein, further including instructions, which , The client enumerates changes are stored in the intermediate serialized into at least one file (one for each "The same Step Files ").
  28. 28 as claimed in claim 27, wherein the computer readable instructions, wherein, further including instructions, which In a single serial, said at least one file includes at least one or more of the following: for changing data (CD) change in the data file (CDF), for the prerequisite knowledge (PK) prerequisite knowledge file (PKF), as well as for knowledge have been informed (LK) has been informed of the knowledge of the file (LKF).
  29. 29 as claimed in claim 27, wherein the computer readable instructions, wherein, further including instructions, which , The synchronization includes a first intermediary between the client and the transmission of the synchronization, synchronization of the transmission Including:
    Determining whether the intermediary has been informed of knowledge;
    If the first client has not been informed of the knowledge of the intermediary reflected in the change was the Preparing a set of said intermediate necessary changes;
    Serialization of the necessary changes, and the writing of the change of the intermediary; and
  30. 30 as claimed in claim 29, wherein the computer readable instructions, wherein, further including instructions, which , The synchronous operation of the transmission further comprises:
    Obtain write mode process locks; and
    Write mode lock release process.
  31. 31 as claimed in claim 27, wherein the computer readable instructions, wherein, further including instructions, which , The synchronization includes a first intermediary between the client and the reception of the synchronization, synchronization of the receiving Including unserializing from said intermediate set of necessary changes, and will apply the change to the client.
  32. 32 as claimed in claim 31, wherein the computer readable instructions, wherein, further including instructions, which , The synchronization of the receiving further comprises:
    Obtain read-mode process locks; and
    Release the read mode process lock.
  33. 33 as claimed in claim 27, wherein the computer readable instructions, wherein, further including instructions, which , The synchronization comprises said first intermediary between the client and the compression operation, the compression operation comprises:
    Perform a synchronization operation successfully received, without releasing the read mode process locks;
    Delete all synchronized files; and
    To perform a full synchronization operation to send.
  34. 34 A method for storage by having a different platform (such as Win32) intermediary computer system ("Intermediary") synchronized using a common storage platform (for example, WinFS) at least two computer systems (each One for the "client") hardware control device, said control device includes hardware that resides on each client using Machine and each client with the agency through an intermediary synchronization interface (STI) device adapter.
  35. 35 as claimed in claim 34, wherein the hardware control device, characterized in that it further comprises means, wherein Using the synchronous operation to support data sharing.
  36. 36 as claimed in claim 34, wherein the hardware control device, characterized in that it further comprises means, wherein Use the synchronization to support end-user roaming.
  37. 37 as claimed in claim 34, wherein the hardware control device, characterized in that it further comprises means, wherein Utility Storage platform is based on the project's storage platform.
  38. 38 as claimed in claim 37 wherein the hardware control apparatus, characterized in that it further comprises means, wherein Enum change the client stored in said intermediate serialized at least one file (one for each "Synchronization Files ").
  39. 39 as claimed in claim 38, wherein the hardware control device, characterized in that it further comprises means, wherein For a single serialization, said at least one file includes at least one or more of the following: for changing data (CD) change in the data file (CDF), for the prerequisite knowledge (PK) prerequisite knowledge file (PKF), as well as for knowledge have been informed (LK) has been informed of the knowledge of the file (LKF).
  40. 40 as claimed in claim 38, wherein the hardware control device, characterized in that it further comprises means, wherein The synchronization includes a first intermediary between the client and the transmission of the synchronization, synchronization of the transmission packet Including:
    Determining whether the intermediary has been informed of knowledge;
    If the first client has not been informed of the knowledge of the intermediary reflected in the change was the Preparing a set of said intermediate necessary changes;
    Serialization of the necessary changes, and the writing of the change of the intermediary; and
  41. 41 as claimed in claim 40 wherein the hardware control device, characterized in that it further comprises means, wherein Synchronous operation of the transmission further comprises:
    Obtain write mode process locks; and
    Write mode lock release process.
  42. 42 as claimed in claim 38, wherein the hardware control device, characterized in that it further comprises means, wherein The synchronization includes a first intermediary between the client and the reception of the synchronization, synchronization of the receiving operation comprises Deserialized from the intermediary group the necessary changes, and the changes will be applied to the client.
  43. 43 as claimed in claim 42, wherein the hardware control device, characterized in that it further comprises means, wherein Synchronous operation of the receiver further comprises:
    Obtain read-mode process locks; and
    Release the read mode process lock.
  44. 44 as claimed in claim 38, wherein the hardware control unit, characterized in that it further comprises means, wherein The synchronization includes a first intermediary between the client and the compression operation, the compression operation comprises:
    Successfully received to perform a synchronous operation, without releasing the lock said read mode process;
    Delete all synchronized files; and
    To perform a full synchronization operation to send.
CNB2004800032859A 2003-08-21 2004-07-29 System and method by intermediary's file system or device synchronization computer system Expired - Fee Related CN100565505C (en)

Applications Claiming Priority (13)

Application Number Priority Date Filing Date Title
USPCT/US03/27419 2003-08-21
US10/646,646 US7349913B2 (en) 2003-08-21 2003-08-21 Storage platform for organizing, searching, and sharing data
PCT/US2003/027419 WO2005029314A1 (en) 2003-08-21 2003-08-21 Storage platform for organizing, searching, and sharing data
US10/646,646 2003-08-21
US10/692,508 2003-10-24
US10/692,508 US7483923B2 (en) 2003-08-21 2003-10-24 Systems and methods for providing relational and hierarchical synchronization services for units of information manageable by a hardware/software interface system
US56714104P 2004-04-30 2004-04-30
US60/567,141 2004-04-30
US10/883,621 2004-06-30
US10/883,621 US7512638B2 (en) 2003-08-21 2004-06-30 Systems and methods for providing conflict handling for peer-to-peer synchronization of units of information manageable by a hardware/software interface system
US10/889,423 2004-07-12
US10/889,423 US7401104B2 (en) 2003-08-21 2004-07-12 Systems and methods for synchronizing computer systems through an intermediary file system share or device
PCT/US2004/024441 WO2005024551A2 (en) 2003-08-21 2004-07-29 Systems and methods for synchronizing computer systems throuth an intermediary file system share or device

Publications (2)

Publication Number Publication Date
CN1781096A true CN1781096A (en) 2006-05-31
CN100565505C CN100565505C (en) 2009-12-02

Family

ID=37616475

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004800032859A Expired - Fee Related CN100565505C (en) 2003-08-21 2004-07-29 System and method by intermediary's file system or device synchronization computer system

Country Status (4)

Country Link
EP (1) EP1573600A4 (en)
JP (1) JP4580389B2 (en)
CN (1) CN100565505C (en)
WO (1) WO2005024551A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103098054A (en) * 2010-08-06 2013-05-08 诺基亚公司 Method and apparatus for aggregating document information
CN106484867A (en) * 2016-10-10 2017-03-08 广东欧珀移动通信有限公司 A kind of delet method for opening application adduction relationship, device and terminal more
CN109086032A (en) * 2018-06-28 2018-12-25 山东鲁能智能技术有限公司 It is a kind of to adapt to integrated power supply monitoring method and device entirely
CN114579190A (en) * 2022-02-17 2022-06-03 中国科学院计算机网络信息中心 Cross-center cooperative computing arrangement method and system based on pipeline mechanism
CN115328997A (en) * 2022-07-15 2022-11-11 深圳市数帝网络科技有限公司 Data synchronization method, system, device and storage medium

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7590643B2 (en) 2003-08-21 2009-09-15 Microsoft Corporation Systems and methods for extensions and inheritance for units of information manageable by a hardware/software interface system
US8238696B2 (en) 2003-08-21 2012-08-07 Microsoft Corporation Systems and methods for the implementation of a digital images schema for organizing units of information manageable by a hardware/software interface system
US8131739B2 (en) 2003-08-21 2012-03-06 Microsoft Corporation Systems and methods for interfacing application programs with an item-based storage platform
US8166101B2 (en) 2003-08-21 2012-04-24 Microsoft Corporation Systems and methods for the implementation of a synchronization schemas for units of information manageable by a hardware/software interface system
US7805422B2 (en) 2005-02-28 2010-09-28 Microsoft Corporation Change notification query multiplexing
US7801912B2 (en) * 2005-12-29 2010-09-21 Amazon Technologies, Inc. Method and apparatus for a searchable data service
US8412676B2 (en) * 2008-10-21 2013-04-02 Microsoft Corporation Forgetting items with knowledge based synchronization
US10303787B2 (en) 2008-10-21 2019-05-28 Microsoft Technology Licensing, Llc Forgetting items with knowledge based synchronization
US10866963B2 (en) 2017-12-28 2020-12-15 Dropbox, Inc. File system authentication

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6671757B1 (en) * 2000-01-26 2003-12-30 Fusionone, Inc. Data transfer and synchronization system
US6694336B1 (en) * 2000-01-25 2004-02-17 Fusionone, Inc. Data transfer and synchronization system
EP1130512A3 (en) * 2000-01-25 2004-04-07 FusionOne, Inc. Data transfer and synchronization system
EP1410202B1 (en) * 2001-03-16 2006-07-26 Novell, Inc. Client-server model for synchronization of files

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103098054A (en) * 2010-08-06 2013-05-08 诺基亚公司 Method and apparatus for aggregating document information
CN106484867A (en) * 2016-10-10 2017-03-08 广东欧珀移动通信有限公司 A kind of delet method for opening application adduction relationship, device and terminal more
CN106484867B (en) * 2016-10-10 2019-06-07 Oppo广东移动通信有限公司 A kind of delet method, device and terminal opened using adduction relationship more
CN109086032A (en) * 2018-06-28 2018-12-25 山东鲁能智能技术有限公司 It is a kind of to adapt to integrated power supply monitoring method and device entirely
CN114579190A (en) * 2022-02-17 2022-06-03 中国科学院计算机网络信息中心 Cross-center cooperative computing arrangement method and system based on pipeline mechanism
CN114579190B (en) * 2022-02-17 2022-10-14 中国科学院计算机网络信息中心 Cross-center cooperative computing arrangement method and system based on pipeline mechanism
CN115328997A (en) * 2022-07-15 2022-11-11 深圳市数帝网络科技有限公司 Data synchronization method, system, device and storage medium
CN115328997B (en) * 2022-07-15 2023-04-07 深圳市数帝网络科技有限公司 Data synchronization method, system, device and storage medium

Also Published As

Publication number Publication date
CN100565505C (en) 2009-12-02
WO2005024551A3 (en) 2005-05-19
JP2007527053A (en) 2007-09-20
WO2005024551A2 (en) 2005-03-17
JP4580389B2 (en) 2010-11-10
EP1573600A2 (en) 2005-09-14
EP1573600A4 (en) 2006-04-19

Similar Documents

Publication Publication Date Title
CN1961294A (en) Systems and methods for providing relational and hierarchical synchronization services for units of information manageable by a hardware/software interface system
CN1739107A (en) Systems and methods for providing synchronization services for units of information manageable by a hardware/software interface system
CN1820266A (en) System and methods for interfacing application programs with item-based storage platform
CN1820245A (en) System and methods for data modeling in item based storage platform
CN101031882A (en) Architecture, apparatus and method for device team recruitment and content renditioning for universal device interoperability platform
CN1182467C (en) Extensible distributed enterprise application integration system
CN1869923A (en) System data interfaces, related system architectures
CN1609795A (en) Programming interface for a computer platform
CN100337233C (en) Transactional file system
CN1781096A (en) Systems and methods for synchronizing computer systems through an intermediary file system share or device
CN101416153B (en) Systems and methods for the implementation of a digital images schema for organizing units of information manageable by a hardware/software interface system
CN1828527A (en) Platform for data services across disparate application frameworks
CN1838165A (en) Work item rules for a work item tracking system
CN1524216A (en) System and method for software component plug-in framework
CN1601510A (en) Architecture for distributed computing system and automated design, deployment, and management of distributed applications
CN1791853A (en) Personalized folders
CN1678990A (en) Web services apparatus and methods
CN1659548A (en) System and method for caching data for a mobile application
CN1619490A (en) Integrating design, deployment, and management phases for systems
CN1551006A (en) Architecture for distributed computing system and automated design, deployment, and management of distributed applications
CN101048732A (en) Object oriented architecture for data integration service
CN1856783A (en) Data management structure associated with general data item
CN1716192A (en) Semantic programming language and linguistic object model
CN1797399A (en) Application programming interface for text mining and search
CN1719410A (en) Implementation of concurrent programs in object-oriented languages

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150428

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150428

Address after: Washington State

Patentee after: Micro soft technique license Co., Ltd

Address before: Washington State

Patentee before: Microsoft Corp.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091202

Termination date: 20200729

CF01 Termination of patent right due to non-payment of annual fee