WO2020001287A1 - 数据校验方法及装置,存储介质 - Google Patents
数据校验方法及装置,存储介质 Download PDFInfo
- Publication number
- WO2020001287A1 WO2020001287A1 PCT/CN2019/091227 CN2019091227W WO2020001287A1 WO 2020001287 A1 WO2020001287 A1 WO 2020001287A1 CN 2019091227 W CN2019091227 W CN 2019091227W WO 2020001287 A1 WO2020001287 A1 WO 2020001287A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data block
- verification
- storage node
- data
- verified
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1004—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/061—Improving I/O performance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/065—Replication mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0655—Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
- G06F3/0659—Command handling arrangements, e.g. command buffers, queues, command scheduling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
Definitions
- the present invention relates to the field of computers, and in particular, to a data verification method and device, and a storage medium.
- Solution 1 The verification program sends a verification request for the specified data block to the storage node where all the replicas are located; the storage node reads the data of the entire replica and uses CRC32 / MD5
- the waiting verification algorithm calculates the entire verification code of the replica data and returns it to the verification program.
- the verification program compares whether the verification code returned by each storage node is the same. If they are different, it determines that the data of multiple copies is inconsistent.
- Solution 2 The verification program slices the data block twice; the verification program selects an unchecked slice and sends a verification request for the specified slice of the specified data block to the storage node where all replicas are located; the storage node reads the specified slice of the replica Data, use a check algorithm such as CRC32 / MD5 to calculate the check code of the slice data, and return it to the check program; the check program compares the check code returned by each storage node with the same, and if different, the slice Join the retry queue and make multiple retries. If the check code returned by each storage node is still different after exceeding the maximum number of retries, it is determined that the data of multiple copies is inconsistent.
- CRC32 / MD5 a check algorithm
- the first solution is mainly used for verifying read-only data. If the user is continuously updating the data, due to the transmission delay of the data on the network, the storage node where multiple copies of a data block are located may have partially received the write request and some have not yet received, so there is an inconsistency in a short time. Normal situation. At this time, the data verification will lead to inconsistent conclusions, which may lead to inaccurate conclusions, which will cause false positives. In addition, this solution reads the data of the entire copy for each verification request, which consumes a large amount of disk bandwidth resources of the storage node, and will cause a large performance glitch to the user's normal read request.
- Embodiments of the present invention provide a data verification method and device, and a storage medium to solve at least the technical problems in the related art that affect the read-write performance of the user's front-end during the data verification process.
- a data verification method includes: determining a data block to be verified among a plurality of data blocks corresponding to a predetermined file in a distributed storage system, wherein the data to be verified
- the storage nodes where the blocks are located include: storage nodes that meet the load balancing policy in a distributed storage system; and verify the data blocks to be verified.
- a data verification apparatus including: a determining module, configured to determine a data block to be verified among a plurality of data blocks corresponding to a predetermined file in a distributed storage system.
- the storage node where the data block to be verified is located includes: a storage node that meets a load balancing policy in a distributed storage system; and an inspection module for verifying the data block to be verified.
- a storage medium is also provided, where the storage medium stores program instructions, wherein when the program instructions run, the device where the storage medium is located is controlled to execute the data verification method of any one of the above.
- a processor is further provided.
- the processor is configured to run a program, and when the program runs, the data verification method of any one of the foregoing is performed.
- a storage node adopting a data block to be verified includes a storage node that meets a load balancing policy in a distributed storage system.
- the determined storage node where the data block to be verified is located includes: distributed Storage nodes that meet the load balancing policy in the storage system, in the process of verifying the data blocks to be verified, avoid a large number of verification requests focusing on several storage nodes, causing the problem that some storage nodes are overloaded.
- FIG. 1 shows a block diagram of a hardware structure of a computer terminal (or mobile device) for implementing a data verification method
- FIG. 3 is a schematic flowchart of processing a single file according to an optional embodiment of the present application.
- FIG. 4 is a structural block diagram of a data verification device according to an embodiment of the present invention.
- FIG. 5 is a structural block diagram of a computer terminal according to an embodiment of the present invention.
- Distributed storage system A system consisting of several nodes that provides external storage services as a whole.
- distributed algorithms are used to provide high availability and high performance, and can tolerate the failure of some nodes; for example, it can include master nodes and storage nodes.
- Master node A node that manages metadata in a distributed storage system, also called a master node.
- Storage node A node that stores application data in a distributed storage system. It usually consists of several storage media.
- Data block In the distributed storage system, due to the consideration of data distribution balance, the file is divided into several blocks according to a fixed size. Each block is called a data block, which corresponds to a piece of continuous data of the original file.
- Copies In the distributed storage system, for the sake of data security, multiple copies of a data block are stored on different storage nodes. Each copy is called a copy.
- the verification process provided in this application is: obtaining files in the distributed storage system After the list, a verification task is created for each file and added to the thread pool, and all verification tasks are processed concurrently with a large degree of concurrency.
- the data verification scheme affects the read-write performance of the user's front-end during the data verification process.
- the embodiments of the present application provide corresponding solutions, which are described in detail below.
- an embodiment of a data verification method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and Although the logical order is shown in the flowchart, in some cases the steps shown or described may be performed in a different order than here.
- the storage node reads the data block and calculates the verification code according to the verification request, and there will be multiple storage nodes in the distributed storage system, and the data verification will occupy a certain amount of the storage node being verified.
- Disk and network bandwidth, and this application performs load balancing on storage nodes to prevent multiple verification tasks running concurrently from being focused on a certain number of storage nodes, resulting in excessive load on some storage nodes, effectively reducing
- the contention between different verification tasks greatly improves the overall verification speed of the cluster in the distributed storage system.
- global flow control is used to ensure unit time.
- the number of verification requests on each storage node can be controlled within a certain range, thereby ensuring that the additional resource overhead brought by data verification on each storage node in a unit time can be controlled within an acceptable range, that is, for For a single storage node, the global flow control method can be used to limit the total number of verification requests sent by all verification tasks to an acceptable Within this range, the problem of excessive load on a single storage node is effectively avoided; it should be noted that if there is no load balancing processing method, it may happen that most verification tasks access the same storage node at the same time. When nodes use global flow control, all verification tasks will be slowed down, and the overall verification speed of the cluster will be slowed down. With the load balancing processing method, since there is no case where multiple verification tasks are aggregated on one storage node, the contention between different verification tasks is reduced, and the overall verification speed of the cluster is reduced. Effectively improved.
- this application uses a back-off method for retrying to avoid too many verification requests affecting the normal reading and writing of the interval; by using one or more of the above-mentioned multiple methods, it is possible to reduce the high concurrent data verification process on the storage node.
- the disk and network resources are occupied, which can effectively reduce the impact of the data verification process on the user's front-end reading and writing while maintaining the completion of the verification task quickly, so that the data verification can run normally without the user's perception.
- FIG. 1 shows a hardware block diagram of a computer terminal (or mobile device) for implementing a data verification method.
- the computer terminal 10 may include one or more (shown with 102a, 102b, ..., 102n in the figure) a processor 102 (the processor 102 may include but is not limited to a microcomputer).
- a processing device such as a processor MCU or a programmable logic device FPGA), a memory 104 for storing data, and a transmission module 106 for a communication function.
- the computer terminal 10 can also include: display, input / output interface (I / O interface), universal serial bus (USB) port (can be included as one of the I / O interface ports), network interface, power supply And / or camera.
- I / O interface input / output interface
- USB universal serial bus
- FIG. 1 is only schematic, and it does not limit the structure of the electronic device.
- the computer terminal 10 may further include more or fewer components than those shown in FIG. 1, or have a configuration different from that shown in FIG. 1.
- the one or more processors 102 and / or other data processing circuits described above may generally be referred to herein as "data processing circuits.”
- the data processing circuit may be fully or partially embodied as software, hardware, firmware, or any other combination.
- the data processing circuit may be a single independent processing module, or may be wholly or partially incorporated into any of the other elements in the computer terminal 10 (or mobile device).
- the data processing circuit is controlled as a processor (for example, selection of a variable resistance terminal path connected to an interface).
- the memory 104 may be used to store software programs and modules of application software, such as a program instruction / data storage device corresponding to the data verification method in the embodiment of the present invention.
- the processor 102 runs the software programs and modules stored in the memory 104, thereby Perform various functional applications and data processing, that is, implement the data verification method of the above-mentioned application program.
- the memory 104 may include a high-speed random access memory, and may further include a non-volatile memory, such as one or more magnetic storage devices, a flash memory, or other non-volatile solid-state memory.
- the memory 104 may further include memory remotely disposed with respect to the processor 102, and these remote memories may be connected to the computer terminal 10 through a network. Examples of the above network include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
- the transmission device 106 is used for receiving or transmitting data via a network.
- a specific example of the network described above may include a wireless network provided by a communication provider of the computer terminal 10.
- the transmission device 106 includes a network adapter (NIC), which can be connected to other network equipment through a base station so as to communicate with the Internet.
- the transmission device 106 may be a radio frequency (RF) module, which is used to communicate with the Internet in a wireless manner.
- RF radio frequency
- the display may be, for example, a touch screen liquid crystal display (LCD), which may enable a user to interact with a user interface of the computer terminal 10 (or mobile device).
- LCD liquid crystal display
- FIG. 2 is a flowchart of a data verification method according to Embodiment 1 of the present application; as shown in FIG. 2, the method includes:
- Step S202 determining a data block to be verified among a plurality of data blocks corresponding to a predetermined file in the distributed storage system, wherein the storage node where the data block to be verified is located includes: satisfying a load balancing policy in the distributed storage system Storage node
- the above load balancing strategy can be used to balance the verification tasks of the storage nodes that store data blocks in the distributed storage system. For example, there is a large number of verification tasks on a certain storage node (the number of verification tasks reaches a certain (A threshold) or the verification task is more complex (the complexity of the verification task is greater than a certain threshold), then the load on the storage node may be considered too large; when a data block needs to be verified, it is found that it should correspond to the storage node At this time, the data block is not verified; and when the verification task on the storage node corresponding to the data block is less or the verification task is relatively simple, the data block can be subjected to verification processing; thus, distributed data can be implemented.
- the check tasks of the storage nodes in the storage system are balanced to avoid overloading some storage nodes.
- the storage nodes that meet the load balancing policy in the above-mentioned distributed storage system can be considered to have fewer verification tasks (the number of verifications considered to be less than a certain threshold) or calibration among multiple storage nodes in the distributed storage system.
- a storage node whose verification task is relatively simple (complexity of the verification task is less than a certain threshold) is not limited to this.
- the above step S202 It may be expressed as: selecting a first data block as a data block to be verified from a plurality of data blocks, where the first data block is a data block in which the number of first storage nodes reaches a predetermined number of storage nodes where the copy is located, the first A storage node is a storage node whose verification task has not reached the upper limit of the verification task. That is, among the storage nodes where the determined copies of the data blocks to be verified are located, the number of storage nodes with fewer verification tasks reaches a predetermined number.
- the above-mentioned predetermined quantity may be preset according to requirements.
- the above-mentioned predetermined quantity may be the quantity of all copies of the data block; that is, the above-mentioned data to be verified may be considered There are fewer verification tasks on the storage node where all copies of the block are located.
- a first data block may be selected as a data block to be verified from a plurality of data blocks according to a first mapping table, where the first mapping table stores the address and Correspondence between the number of concurrent verification tasks accessed to the storage node.
- data blocks can be stored in a first-in-first-out queue in advance.
- the upper limit of the verification task (the maximum number of verification tasks) of a storage node is M
- the first mapping table is Table A, where Table A
- the key value represents the address of the storage node
- the value corresponding to the key value represents the number of concurrent verifications that access the storage node.
- the above step S202 can be expressed as: fetching a data block from the FIFO queue After that, the address information of the copy of the retrieved data block is used; for the address information of each copy, the key value column or row in Table A is used to find whether the address information of the corresponding copy exists. If it exists, determine the address of the copy.
- the verification task on the storage node corresponding to the information reaches the above M; when the verification task on the storage node where all the copies of the above data block are located does not reach M, the value corresponding to the corresponding storage node in Table A is increased by 1, and The data block at that time is the data block to be verified; when at least one storage node exists on the storage node where all copies of the above data block are located, the number is The data block is inserted into the tail of the first-in-first-out queue, a new data block is obtained, and the above query determination process is continued until the obtained data block conforms to the equilibrium policy (the storage node colonel where all copies of the data block are located The inspection tasks did not reach the data block of M).
- Step S204 verify the data block to be verified.
- Embodiment 1 of the present application after determining a data block to be verified among a plurality of data blocks included in a predetermined file in a distributed storage system, verifying the data block to be verified; wherein, the determined to be verified
- the storage node in the distributed storage system where the verification data block is located meets the load balancing policy; this solution can determine the data block to be verified based on the load balancing policy.
- the storage node of the data block to be verified is a storage node that meets the load balancing strategy in the distributed storage system, that is, the storage node where the determined data block is located is to satisfy the load balancing strategy in the distributed storage system.
- Storage node, that is, the above-mentioned determined data block to be verified is actually determined based on a load balancing policy.
- step S204 may be performed as follows: performing a second slice on the data block to be verified to obtain a data block slice; The sections are checked.
- this application provides an optional embodiment, that is, the verification of the data block slice can be performed.
- the performance is as follows: judging whether the number of verification requests of the storage node where the data block slice is located does not reach the upper limit of the verification request; when the judgment result is yes, verifying the data block slice.
- the upper limit of the number of verification requests may be the maximum number of verification requests allowed to be sent to the storage node in a unit time, but is not limited thereto.
- the above upper limit of the verification request may be set in advance based on characteristics of the storage node, or may be set in accordance with experience, but is not limited thereto.
- the number of verification requests on the storage node per unit time can be controlled within a certain range, thereby ensuring that the data verification on the storage node is cited within the unit time.
- the additional resource overhead brought by it can be controlled within an acceptable range.
- the number of verification requests of the storage node where the data block slice is located is reset and cleared within a predetermined period of time.
- the unit of the above unit time may be any time, such as 1s, 3s, 5s, 50ms, etc., but is not limited thereto.
- the above predetermined time period may be considered as a unit time, but is not limited to this.
- whether the number of verification requests for the storage node where the data block slice is located does not reach the upper limit of the verification request based on the second mapping table, wherein the second mapping table stores the storage node's Correspondence between the address and the number of verification requests to the storage node.
- the address of the storage node can be used as the key value in the second mapping table, and the number of verification requests to access the storage node can be used as the value corresponding to the key value in the second mapping table, but it is not Limited to this.
- the following uses the second mapping table as Table B, where the key value in Table B represents the address of the storage node, and the value corresponding to the key value represents the number of verification requests for accessing the storage node, and the maximum number of verification requests (maximum Number of verification requests) is N as an example.
- the method may further include: checking and retrying the data block slice in a backoff and retry manner, wherein the backoff and retry The method is to delay retry on the data block slice.
- performing a retry check on a data block slice in a backoff retry manner may be expressed as follows: In the process of performing a check retry, the time interval of the retry is determined by the retry The time interval of the last retry is determined, wherein the time interval of the current retry is greater than the time interval of the last retry.
- the time interval of the current retry is determined by the time interval of the last retry of the current retry. It can be expressed as: a predetermined value is obtained by processing the recursive function from the last time interval, and the predetermined value is equal to The smaller value of the upper limit of the retry interval is the time interval of this retry.
- FIG. 3 is a schematic diagram of a single file processing flow provided according to an optional embodiment of the present application. As shown in FIG. 3, the single file processing flow includes:
- Step 301 Obtain a data block list of a file from a main control checkpoint.
- step 302 it is determined whether there are unprocessed data blocks in the data block list. Among them, if the determination result is yes, step 303 is performed; if the determination result is no, the process ends;
- Step 303 Take a data block that complies with the load balancing policy.
- Step 304 Perform a second slice on the data block according to a fixed size
- step 305 it is determined whether there are unprocessed slices; in the case where the determination result is yes, step 306 is performed; in the case where the determination result is no, step 302 is performed;
- Step 306 Take a slice and request the check code of the slice from the storage node where the copies are located (all requests need to go through a global flow control);
- step 307 it is determined whether the check codes are inconsistent. In the case of yes, step 308 is performed, and in the case of no, step 305 is performed;
- Step 308 retreat and confirm.
- each verification task first obtain all the data blocks of the file and the address information of all copies of these data blocks through the master control node, and put these data blocks into a FIFO queue. For this queue, according to the principle of storage node load balancing, a suitable data block is selected from the queue each time, the data block is sliced twice, and then all the slices are checked for consistency in the process. Verify the request for global flow control. When all slice verification of a data block is completed, the next data block is selected and processing continues; until all data block verification is complete, a single verification task ends.
- a verification request is first sent to the storage node where the copy is located.
- the request includes the data block name, the offset of the slice within the data block, and the length of the slice.
- the storage node reads the data of the specified slice of the copy according to the verification request, calculates the verification code, and then returns the verification code of the slice. Compare the check codes of the slices of different copies. If the check codes of the slices of different copies are different, confirm by backoff and retry. For the slices that are finally confirmed to be inconsistent, an alarm message is given.
- the impact on front-end read and write is comprehensively reduced through strategies such as storage node load balancing, global flow control of check requests, and backoff retry.
- strategies such as storage node load balancing, global flow control of check requests, and backoff retry.
- load balancing is performed on the storage nodes in this optional solution: set to allow simultaneous access
- the maximum number of tasks M to the same storage node (equivalent to the upper limit of the verification task)
- establish a global mapping table A (equivalent to the first mapping table above), where the key in the table is the address of the storage node, and the corresponding value is the number of concurrent tasks that will access the storage node.
- each time a data block is fetched from the FIFO queue the address information of several copies of the data block needs to be queried in Table A to see if there may be concurrency on the storage node where a certain copy is located.
- the number of verification tasks that access the storage node has reached M. If the number of verification tasks on the storage node where all copies of the data block are located does not reach M, the value corresponding to the corresponding storage node in Table A is increased by one and the data block is processed; otherwise, the data block is inserted into At the end of the queue, a new data block is fetched, and the above load balancing check is continued until a data block conforming to the balancing policy is fetched.
- multiple verification tasks of the verification program will pass a global flow control when sending verification requests.
- the global flow control method can be used to make the verification requests sent by all verification tasks. The total number is limited to an acceptable range, which effectively avoids the problem of overloading a single storage node.
- Global flow control is used to ensure that the number of verification requests issued by the verification program to each storage node can be controlled within a certain range within a unit time.
- the additional resource overhead brought by verification can be controlled within an acceptable range: set the maximum number of verification requests N (equivalent to the above verification request upper limit) allowed to be sent to a single storage node per unit time, and establish a Global mapping table B (equivalent to the second mapping table), where the key is the address of the storage node, and the corresponding value is the number of verification requests that all verification tasks have sent to the storage node within a certain time range. Every other short time period (for example, 1s / 1min) (equivalent to the above-mentioned predetermined time period), the statistical results corresponding to all storage nodes in Table B will be set to zero and then re-stated. This time period is called a time slice.
- the verification program Before sending a verification request to a storage node, the verification program needs to query the table B using the address information of the storage node. The verification sent to the storage node within the current time slice Whether the number of requests reaches the upper limit N. If N has not been reached, the verification request is issued, and the number of sent requests corresponding to the storage node in Table B is increased by one; otherwise, the verification task needs to wait for a period of time and re-query Table B until the flow is met. The control conditions actually issue the request.
- M, N, and Z are all integers greater than zero, but are not limited thereto.
- the execution body of the above method may be a terminal as shown in FIG. 1 described above, or a program such as a verification program.
- the verification program may be located on the terminal, or may be located on a terminal different from the terminal. Third-party devices, but not limited to this.
- the method according to the above embodiments can be implemented by means of software plus a necessary universal hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is Better implementation.
- the technical solution of the present invention in essence, or a part that contributes to the existing technology, can be embodied in the form of a software product, which is stored in a storage medium (such as ROM / RAM, magnetic disk, The optical disc) includes several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods of the embodiments of the present invention.
- FIG. 4 is a structural block diagram of a data verification apparatus according to an embodiment of the present invention.
- the device includes:
- a determining module 42 is configured to determine a data block to be verified among a plurality of data blocks corresponding to a predetermined file in the distributed storage system, wherein the storage node where the data block to be verified is located includes: Storage nodes with load balancing policies;
- the above load balancing strategy can be used to balance the verification tasks of the storage nodes that store data blocks in the distributed storage system. For example, there is a large number of verification tasks on a certain storage node (the number of verification tasks reaches a certain (A threshold) or the verification task is more complex (the complexity of the verification task is greater than a certain threshold), then the load on the storage node may be considered too large; when a data block needs to be verified, it is found that it should correspond to the storage node At this time, the data block is not verified; and when the verification task on the storage node corresponding to the data block is less or the verification task is relatively simple, the data block can be subjected to verification processing; thus, distributed data can be implemented.
- the check tasks of the storage nodes in the storage system are balanced to avoid overloading some storage nodes.
- the storage nodes that meet the load balancing policy in the above-mentioned distributed storage system can be considered to have fewer verification tasks (the number of verifications considered to be less than a certain threshold) or calibration among multiple storage nodes in the distributed storage system.
- a storage node whose verification task is relatively simple (complexity of the verification task is less than a certain threshold) is not limited to this.
- the above determination module 42 is also used to select a first data block from a plurality of data blocks as a data block to be verified, where the first data block is a data block in which the number of first storage nodes in the storage node where the copy is located reaches a predetermined number,
- the first storage node is a storage node whose verification task has not reached the upper limit of the verification task. That is, among the storage nodes where the determined copies of the data blocks to be verified are located, the number of storage nodes with fewer verification tasks reaches a predetermined number.
- the above-mentioned predetermined quantity may be preset according to requirements.
- the above-mentioned predetermined quantity may be the quantity of all copies of the data block; that is, the above-mentioned data to be verified may be considered There are fewer verification tasks on the storage node where all copies of the block are located.
- the foregoing determining module 42 may select the first data block from a plurality of data blocks as the data block to be verified according to the first mapping table, where the first mapping table stores a storage Correspondence between the address of a node and the number of concurrent verification tasks that access the storage node.
- the checking module 44 is connected to the above-mentioned determining module 42 and is used for checking the data block to be checked.
- the verification module 44 performs verification on the data blocks to be verified Among them, the storage node in the storage node distributed storage system where the determined data block to be verified meets the load balancing policy; this solution can implement the determination of the data block to be verified based on the load balancing policy.
- the storage node of the data block to be verified is a storage node that meets the load balancing strategy in the distributed storage system, that is, the storage node where the determined data block is located is to satisfy the load balancing strategy in the distributed storage system.
- Storage node, that is, the above-mentioned determined data block to be verified is actually determined based on a load balancing policy.
- the verification module 44 includes: a processing unit, configured to perform a second slice of the data block to be verified to obtain a data block slice; the verification unit, and the above processing Unit connection for verifying data block slices.
- this application provides an optional embodiment, that is, the above verification unit is also used to determine Whether the number of verification requests of the storage node where the data block slice is located does not reach the upper limit of the verification request; if the judgment result is yes, the data block slice is verified.
- the upper limit of the number of verification requests may be the maximum number of verification requests allowed to be sent to the storage node in a unit time, but is not limited thereto.
- the above upper limit of the verification request may be set in advance based on characteristics of the storage node, or may be set in accordance with experience, but is not limited thereto.
- the number of verification requests on the storage node per unit time can be controlled within a certain range, thereby ensuring that the data verification on the storage node is cited within the unit time.
- the additional resource overhead brought by it can be controlled within an acceptable range.
- the number of verification requests of the storage node where the data block slice is located is reset and cleared within a predetermined period of time.
- the unit of the above unit time may be any time, such as 1s, 3s, 5s, 50ms, etc., but is not limited thereto.
- the above predetermined time period may be considered as a unit time, but is not limited to this.
- the verification unit may determine, based on the second mapping table, whether the number of verification requests of the storage node where the data block slice is located does not reach the upper limit of the verification request, wherein the second mapping table stores There is a correspondence between the address of a storage node and the number of verification requests that access the storage node.
- the address of the storage node can be used as the key value in the second mapping table, and the number of verification requests to access the storage node can be used as the value corresponding to the key value in the second mapping table, but it is not Limited to this.
- the device may further include: a retry module, connected to the verification unit, and configured to back up and retry the data.
- the block slice is checked and retried. The way to evade retry is to perform delayed retry on the data slice.
- the time interval of the current retry is determined by the time interval of the last retry of the current retry.
- the time interval is greater than the time interval of the last retry.
- the time interval of the current retry is determined by the time interval of the last retry of the current retry. It can be expressed as: a predetermined value is obtained by processing the recursive function from the last time interval, and the predetermined value is equal to The smaller value of the upper limit of the retry interval is the time interval of this retry.
- the above-mentioned determining module 42 and sending module 44 correspond to steps S202 to S204 in Embodiment 1.
- the two modules and the corresponding steps implement the same examples and application scenarios, but are not limited to the above embodiments. 1 published content. It should be noted that, as part of the device, the above modules can be run in the computer terminal 10 provided in the first embodiment.
- An embodiment of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a computer terminal group.
- the computer terminal described above may also be replaced with a terminal device such as a mobile terminal.
- the computer terminal may be located in at least one network device among multiple network devices in a computer network.
- the computer terminal may execute the program code of the following steps in the data verification method of an application program: determining a data block to be verified among a plurality of data blocks included in a predetermined file in a distributed storage system, where The storage node where the check data block is located is a storage node that meets the load balancing policy in the distributed storage system; the data block to be checked is checked.
- FIG. 5 is a structural block diagram of a computer terminal according to an embodiment of the present invention.
- the computer terminal 5 may include one or more processors (only one is shown in the figure), a processor 52, a memory 54, and a transmission device 56.
- the memory 54 may be used to store software programs and modules, such as program instructions / modules corresponding to the security vulnerability detection method and device in the embodiments of the present invention.
- the processor 52 executes the software programs and modules stored in the memory 54 to execute Various functional applications and data processing, that is, the method for detecting the above-mentioned system vulnerability attacks.
- the memory 54 may include a high-speed random access memory, and may further include a non-volatile memory, such as one or more magnetic storage devices, a flash memory, or other non-volatile solid-state memory.
- the memory 54 may further include a memory remotely provided with respect to the processor, and these remote memories may be connected to the terminal 5 through a network. Examples of the above network include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
- the processor 52 may call the information stored in the memory and the application program through the transmission device to perform the following steps: determining a data block to be verified among a plurality of data blocks corresponding to a predetermined file in the distributed storage system, where
- the storage node where the verification data block is located includes: a storage node that meets the load balancing policy in a distributed storage system; and verification of the data block to be verified.
- the processor may further execute the program code of the following steps: selecting a first data block from a plurality of data blocks as a data block to be verified, where the first data block is the first of the storage nodes where the copy is located The number of storage nodes reaches a predetermined number of data blocks, and the first storage node is a storage node whose verification task has not reached the upper limit of the verification task.
- the processor may further execute the program code of the following steps: selecting the first data block from a plurality of data blocks as the data block to be verified according to the first mapping table, where the first mapping table stores a storage Correspondence between the address of a node and the number of concurrent verification tasks that access the storage node.
- the processor may further execute the program code of the following steps: performing secondary slicing of the data block to be verified to obtain a data block slice; and verifying the data block slice.
- the above processor may also execute the program code of the following steps: judging whether the number of verification requests of the storage node where the data block slice is located does not reach the upper limit of the verification request; if the judgment result is yes, the data block is The sections are checked.
- the processor may further execute the program code of the following steps: judging whether the number of verification requests of the storage node where the data block slice is located does not reach the upper limit of the verification request according to the second mapping table, wherein the second mapping table The correspondence relationship between the address of the storage node and the number of verification requests to access the storage node is stored.
- the processor may further execute the program code of the following steps: after verifying the data block slice, verify and retry the data block slice in a backoff retry manner, where the backoff retry mode is Block slicing is delayed retry.
- Embodiment 1 of the present application after determining a data block to be verified among a plurality of data blocks included in a predetermined file in a distributed storage system, verifying the data block to be verified; wherein, the determined to be verified
- the storage node in the distributed storage system where the verification data block is located meets the load balancing policy; this solution can determine the data block to be verified based on the load balancing policy.
- the storage node of the data block to be verified is a storage node that meets the load balancing strategy in the distributed storage system, that is, the storage node where the determined data block is located is to satisfy the load balancing strategy in the distributed storage system.
- Storage node, that is, the above-mentioned determined data block to be verified is actually determined based on a load balancing policy.
- FIG. 5 is only a schematic, and the computer terminal may also be a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, an applause computer, and a mobile Internet device (Mobile Internet Devices, MID). ), PAD and other terminal equipment.
- FIG. 5 does not limit the structure of the electronic device.
- the computer terminal 5 may further include more or less components (such as a network interface, a display device, etc.) than those shown in FIG. 5, or have a different configuration from that shown in FIG. 5.
- the storage medium may Including: flash disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk, etc.
- An embodiment of the present invention also provides a storage medium.
- the foregoing storage medium may be used to store program code executed by the data verification method provided in the foregoing Embodiment 1.
- the foregoing storage medium may be located in any computer terminal in a computer terminal group in a computer network, or in any mobile terminal in a mobile terminal group.
- the storage medium is configured to store program code for performing the following steps: determining a data block to be verified among a plurality of data blocks corresponding to a predetermined file in the distributed storage system, where: The storage nodes where the data blocks to be verified are located include: storage nodes that meet the load balancing policy in the distributed storage system; and the data blocks to be verified are verified.
- the foregoing storage medium is further configured to store program code for performing the following steps: selecting a first data block from a plurality of data blocks as a data block to be verified, where the first data block is a copy where the copy is located The number of first storage nodes in the storage node reaches a predetermined number of data blocks, and the first storage node is a storage node whose verification task has not reached the upper limit of the verification task.
- the foregoing storage medium is further configured to store program code for performing the following steps: selecting a first data block as a data block to be verified from a plurality of data blocks according to a first mapping table, where the first The mapping table stores the correspondence between the address of the storage node and the number of concurrent verification tasks that access the storage node.
- the storage medium is further configured to store program code for performing the following steps: performing a second slice on the data block to be verified to obtain a data block slice; and verifying the data block slice.
- the storage medium is further configured to store program code for performing the following steps: judging whether the number of verification requests of the storage node where the data block slice is located does not reach the upper limit of the verification request; when the judgment result is yes Next, verify the data block slice.
- the storage medium is further configured to store program code for performing the following steps: judging whether the number of verification requests of the storage node where the data block slice is located does not reach the upper limit of the verification request according to the second mapping table, where The second mapping table stores a correspondence between the address of the storage node and the number of verification requests for accessing the storage node.
- the storage medium is further configured to store program code for performing the following steps: after verifying the data block slice, verify and retry the data block slice in a backoff retry manner, where the backoff retry The way to try is to delay retry on the data block slice.
- This embodiment provides a processor, where the processor is used to run a program, and the program code executed by the data verification method provided in the foregoing Embodiment 1 is executed when the program is run.
- the foregoing processor may be located in any computer terminal in a computer terminal group in a computer network, or in any mobile terminal in a mobile terminal group.
- the processor is configured as program code for performing the following steps: determining a data block to be verified among a plurality of data blocks corresponding to a predetermined file in the distributed storage system, where The storage nodes where the verification data blocks are located include: storage nodes that meet the load balancing policy in the distributed storage system; and verification of the verification data blocks.
- the processor is configured as program code for performing the following steps: selecting a first data block from a plurality of data blocks as a data block to be verified, where the first data block is The number of first storage nodes in the storage node where the copy is located reaches a predetermined number of data blocks, and the first storage node is a storage node whose verification task has not reached the upper limit of the verification task.
- the processor is configured as program code for performing the following steps: selecting a first data block as a data block to be verified from a plurality of data blocks according to a first mapping table, where The first mapping table stores a correspondence between an address of a storage node and the number of concurrent verification tasks that access the storage node.
- the processor is configured as program code for performing the following steps: performing a second slicing of the data block to be verified to obtain a data block slice; and verifying the data block slice.
- the processor is configured as program code for performing the following steps: judging whether the number of verification requests of the storage node where the data block slice is located does not reach the upper limit of the verification request; when the judgment result is If yes, check the data block slice.
- the processor is configured as program code for performing the following steps: judging whether the number of verification requests of the storage node where the data block slice is located does not reach the verification request upper limit according to the second mapping table. Number, wherein the second mapping table stores the correspondence between the address of the storage node and the number of verification requests to access the storage node.
- the processor is configured as program code for performing the following steps: after verifying the data block slice, verifying and retrying the data block slice in a backoff retry manner, where The way to back off retry is to delay retry on the data block slice.
- sequence numbers of the foregoing embodiments of the present invention are merely for description, and do not represent the superiority or inferiority of the embodiments.
- the disclosed technical content can be implemented in other ways.
- the device embodiments described above are only schematic.
- the division of the unit is only a logical function division.
- multiple units or components may be combined or may be combined. Integration into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, units or modules, and may be electrical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit.
- the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
- the technical solution of the present invention essentially or part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium , Including a number of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in various embodiments of the present invention.
- the foregoing storage media include: U disks, Read-Only Memory (ROM), Random Access Memory (RAM), mobile hard disks, magnetic disks, or optical disks, and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (13)
- 一种数据校验方法,包括:确定与分布式存储系统中预定文件所对应的多个数据块中的待校验数据块,其中,所述待校验数据块所处的存储节点包括:所述分布式存储系统中满足负载均衡策略的存储节点;对所述待校验数据块进行校验。
- 根据权利要求1所述的方法,其中,确定与分布式存储系统中预定文件所对应的多个数据块中的待校验数据块包括:从所述多个数据块中选择出第一数据块作为所述待校验数据块,其中,所述第一数据块为副本所在的存储节点中第一存储节点的数量达到预定数量的数据块,所述第一存储节点为校验任务未达到校验任务上限的存储节点。
- 根据权利要求2所述的方法,其中,所述预定数量为所述数据块的所有副本的数量。
- 根据权利要求2或3所述的方法,其中,根据第一映射表,从所述多个数据块中选择出第一数据块作为所述待校验数据块,其中,所述第一映射表存储有存储节点的地址与访问到该存储节点的并发校验任务的个数之间的对应关系。
- 根据权利要求1所述的方法,其中,对所述待校验数据块进行校验包括:对所述待校验数据块进行二次切片得到数据块切片;对所述数据块切片进行校验。
- 根据权利要求5所述的方法,其中,对所述数据块切片进行校验包括:判断所述数据块切片所在的存储节点的校验请求数是否未达到校验请求上限数;在判断结果为是的情况下,对所述数据块切片进行校验。
- 根据权利要求6所述的方法,其中,所述数据块切片所在的存储节点的校验请求数在预定时间段内被重置清零。
- 根据权利要求6或7所述的方法,其中,根据第二映射表,判断所述数据块切片所在的存储节点的校验请求数是否未达到校验请求上限数,其中,所述第二映射表存储有存储节点的地址与访问到该存储节点的校验请求数之间的对应关系。
- 根据权利要求5所述的方法,其中,在对所述数据块切片进行校验之后,还包括:采用退避重试的方式对所述数据块切片进行检验重试,其中,所述退避重试的方式 为对所述数据块切片进行延时重试。
- 根据权利要求9所述的方法,其中,采用退避重试的方式对所述数据块切片进行检验重试包括:在进行校验重试的过程中,本次重试的时间间隔由所述本次重试的上一次重试的时间间隔确定,其中,所述本次重试的时间间隔大于上一次重试的时间间隔。
- 一种数据校验装置,包括:确定模块,用于确定与分布式存储系统中预定文件所对应的多个数据块中的待校验数据块,其中,所述待校验数据块所处的存储节点包括:所述分布式存储系统中满足负载均衡策略的存储节点;检验模块,用于对所述待校验数据块进行校验。
- 根据权利要求11所述的装置,其中,所述确定模块,用于从所述多个数据块中选择出第一数据块作为所述待校验数据块,其中,所述第一数据块为副本所在的存储节点中第一存储节点的数量达到预定数量的数据块,所述第一存储节点为校验任务未达到校验任务上限的存储节点。
- 一种存储介质,所述存储介质存储有程序指令,其中,在所述程序指令运行时控制所述存储介质所在设备执行权利要求1至10中任意一项所述的数据校验方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2020572791A JP7442466B2 (ja) | 2018-06-28 | 2019-06-14 | データ検証の方法および装置、ならびに記憶媒体 |
EP19825019.3A EP3817255A4 (en) | 2018-06-28 | 2019-06-14 | DATA CHECK METHOD AND DEVICE AND STORAGE MEDIUM |
US17/133,426 US11537304B2 (en) | 2018-06-28 | 2020-12-23 | Data verification method and apparatus, and storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810687959.5A CN110659151B (zh) | 2018-06-28 | 2018-06-28 | 数据校验方法及装置,存储介质 |
CN201810687959.5 | 2018-06-28 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/133,426 Continuation US11537304B2 (en) | 2018-06-28 | 2020-12-23 | Data verification method and apparatus, and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020001287A1 true WO2020001287A1 (zh) | 2020-01-02 |
Family
ID=68986038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/091227 WO2020001287A1 (zh) | 2018-06-28 | 2019-06-14 | 数据校验方法及装置,存储介质 |
Country Status (5)
Country | Link |
---|---|
US (1) | US11537304B2 (zh) |
EP (1) | EP3817255A4 (zh) |
JP (1) | JP7442466B2 (zh) |
CN (1) | CN110659151B (zh) |
WO (1) | WO2020001287A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116668521A (zh) * | 2023-07-25 | 2023-08-29 | 广东广宇科技发展有限公司 | 一种基于数据结构的分布式多元数据快速传输方法 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11429435B1 (en) * | 2020-02-04 | 2022-08-30 | Amazon Technologies, Inc. | Distributed execution budget management system |
CN112486421B (zh) * | 2020-12-16 | 2024-05-28 | 上海达梦数据库有限公司 | 一种数据存储方法、装置、电子设备及存储介质 |
CN112713964B (zh) * | 2020-12-22 | 2022-08-05 | 潍柴动力股份有限公司 | 数据校验加速方法、装置、计算机设备及存储介质 |
CN113204371B (zh) * | 2021-05-28 | 2023-09-19 | 金蝶软件(中国)有限公司 | 一种访问控制方法、相关装置及存储介质 |
CN113435170B (zh) * | 2021-06-24 | 2024-09-20 | 平安国际智慧城市科技股份有限公司 | 数据校验方法、装置、电子设备及存储介质 |
CN113391767B (zh) * | 2021-06-30 | 2022-10-28 | 北京百度网讯科技有限公司 | 数据一致性的校验方法、装置、电子设备及可读存储介质 |
CN114153647B (zh) * | 2021-09-24 | 2022-08-02 | 深圳市木浪云科技有限公司 | 云存储系统的快速数据校验方法、装置及系统 |
CN114780021B (zh) * | 2022-03-25 | 2022-11-29 | 北京百度网讯科技有限公司 | 副本修复方法、装置、电子设备及存储介质 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103731505A (zh) * | 2014-01-17 | 2014-04-16 | 中国联合网络通信集团有限公司 | 一种数据分布式存储方法及系统 |
CN105530294A (zh) * | 2015-12-04 | 2016-04-27 | 中科院成都信息技术股份有限公司 | 一种海量数据分布式存储的方法 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7200626B1 (en) * | 2004-01-22 | 2007-04-03 | Unisys Corporation | System and method for verification of a quiesced database copy |
JP4916809B2 (ja) | 2006-08-04 | 2012-04-18 | 日本電信電話株式会社 | 負荷分散制御装置および方法 |
US8301791B2 (en) * | 2007-07-26 | 2012-10-30 | Netapp, Inc. | System and method for non-disruptive check of a mirror |
US9098519B2 (en) * | 2008-09-16 | 2015-08-04 | File System Labs Llc | Methods and apparatus for distributed data storage |
US8694467B2 (en) | 2010-03-31 | 2014-04-08 | Xerox Corporation | Random number based data integrity verification method and system for distributed cloud storage |
US8386835B2 (en) | 2010-05-17 | 2013-02-26 | Oracle International Corporation | System and method for end-to-end data integrity in a network file system |
US8861727B2 (en) | 2010-05-19 | 2014-10-14 | Cleversafe, Inc. | Storage of sensitive data in a dispersed storage network |
US8555142B2 (en) | 2010-06-22 | 2013-10-08 | Cleversafe, Inc. | Verifying integrity of data stored in a dispersed storage memory |
US9015499B2 (en) | 2010-11-01 | 2015-04-21 | Cleversafe, Inc. | Verifying data integrity utilizing dispersed storage |
US8627065B2 (en) * | 2010-11-09 | 2014-01-07 | Cleversafe, Inc. | Validating a certificate chain in a dispersed storage network |
US8910031B1 (en) | 2011-03-29 | 2014-12-09 | Emc Corporation | DIF-CRC based fast hashing |
US8589761B2 (en) | 2011-05-31 | 2013-11-19 | Micron Technology, Inc. | Apparatus and methods for providing data integrity |
US8468423B2 (en) | 2011-09-01 | 2013-06-18 | International Business Machines Corporation | Data verification using checksum sidefile |
US8990664B2 (en) * | 2012-01-31 | 2015-03-24 | Cleversafe, Inc. | Identifying a potentially compromised encoded data slice |
CN103984607A (zh) * | 2013-02-08 | 2014-08-13 | 华为技术有限公司 | 分布式存储的方法、装置和系统 |
US9448877B2 (en) | 2013-03-15 | 2016-09-20 | Cisco Technology, Inc. | Methods and apparatus for error detection and correction in data storage systems using hash value comparisons |
CN104239148B (zh) * | 2013-06-06 | 2018-05-18 | 腾讯科技(深圳)有限公司 | 一种分布式任务调度方法及装置 |
WO2014205286A1 (en) | 2013-06-19 | 2014-12-24 | Exablox Corporation | Data scrubbing in cluster-based storage systems |
US9753955B2 (en) | 2014-09-16 | 2017-09-05 | Commvault Systems, Inc. | Fast deduplication data verification |
US9880904B2 (en) * | 2014-12-12 | 2018-01-30 | Ca, Inc. | Supporting multiple backup applications using a single change tracker |
JP2017010425A (ja) | 2015-06-25 | 2017-01-12 | 富士通株式会社 | 制御プログラム、情報処理装置および制御方法 |
US10437671B2 (en) * | 2015-06-30 | 2019-10-08 | Pure Storage, Inc. | Synchronizing replicated stored data |
US10496484B2 (en) | 2016-08-05 | 2019-12-03 | Sandisk Technologies Llc | Methods and apparatus for error detection for data storage devices |
-
2018
- 2018-06-28 CN CN201810687959.5A patent/CN110659151B/zh active Active
-
2019
- 2019-06-14 JP JP2020572791A patent/JP7442466B2/ja active Active
- 2019-06-14 WO PCT/CN2019/091227 patent/WO2020001287A1/zh active Application Filing
- 2019-06-14 EP EP19825019.3A patent/EP3817255A4/en active Pending
-
2020
- 2020-12-23 US US17/133,426 patent/US11537304B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103731505A (zh) * | 2014-01-17 | 2014-04-16 | 中国联合网络通信集团有限公司 | 一种数据分布式存储方法及系统 |
CN105530294A (zh) * | 2015-12-04 | 2016-04-27 | 中科院成都信息技术股份有限公司 | 一种海量数据分布式存储的方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3817255A4 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116668521A (zh) * | 2023-07-25 | 2023-08-29 | 广东广宇科技发展有限公司 | 一种基于数据结构的分布式多元数据快速传输方法 |
CN116668521B (zh) * | 2023-07-25 | 2023-10-31 | 广东广宇科技发展有限公司 | 一种基于数据结构的分布式多元数据快速传输方法 |
Also Published As
Publication number | Publication date |
---|---|
US11537304B2 (en) | 2022-12-27 |
US20210117093A1 (en) | 2021-04-22 |
CN110659151A (zh) | 2020-01-07 |
JP7442466B2 (ja) | 2024-03-04 |
CN110659151B (zh) | 2023-05-02 |
EP3817255A4 (en) | 2022-03-30 |
EP3817255A1 (en) | 2021-05-05 |
JP2021529392A (ja) | 2021-10-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020001287A1 (zh) | 数据校验方法及装置,存储介质 | |
US10642704B2 (en) | Storage controller failover system | |
KR102444425B1 (ko) | 블록체인 트랜잭션에 대하여 배치 프로세싱을 수행하는 장치 및 그 방법 | |
US11544001B2 (en) | Method and apparatus for transmitting data processing request | |
US9015519B2 (en) | Method and system for cluster wide adaptive I/O scheduling by a multipathing driver | |
US20190163371A1 (en) | Next generation storage controller in hybrid environments | |
WO2018121456A1 (zh) | 一种数据存储方法、服务器以及存储系统 | |
WO2021139224A1 (zh) | 云场景下的文件备份方法、装置、介质、电子设备 | |
CN110362402B (zh) | 一种负载均衡方法、装置、设备及可读存储介质 | |
US9864706B2 (en) | Management of allocation for alias devices | |
EP3131015B1 (en) | Memory migration method and device | |
CN111159195A (zh) | 区块链系统中的数据存储控制方法及设备 | |
US20220253356A1 (en) | Redundant data calculation method and apparatus | |
CN111475108A (zh) | 一种分布式存储方法、计算机设备及计算机可读存储介质 | |
US9300530B2 (en) | Management device, management method, and medium | |
US20180088955A1 (en) | Method and system for managing data access in storage system | |
US8438277B1 (en) | Systems and methods for preventing data inconsistency within computer clusters | |
CN111562884A (zh) | 一种数据存储方法、装置及电子设备 | |
CN116301568A (zh) | 一种数据访问方法、装置以及设备 | |
US20130238871A1 (en) | Data processing method and apparatus, pci-e bus system, and server | |
US20230273801A1 (en) | Method for configuring compute mode, apparatus, and computing device | |
CN116248699B (zh) | 多副本场景下的数据读取方法、装置、设备及存储介质 | |
CN111046004A (zh) | 一种数据文件存储方法、装置、设备及存储介质 | |
EP4383076A1 (en) | Data processing method and apparatus, computer device, and computer-readable storage medium | |
CN107203559B (zh) | 一种划分数据条带的方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19825019 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2020572791 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2019825019 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2019825019 Country of ref document: EP Effective date: 20210128 |