摘要:
A computer system having a shared disk file system running on multiple computers each having their own instance of an operating system and being coupled for parallel data sharing access to files residing on network attached shared disks. Locking techniques reduce the overhead of a token manager which is also used in the file system recovery if a computer participating in the management of shared disks becomes unavailable or failed. Synchronous and asynchronous takeover of a metadata node occurs for correction of metadata which was under modification and a new computer node to be a metadata node for that file. Locks are not constantly required to allocate new blocks on behalf of a user.
摘要:
Communication between different entities of a computing environment is facilitated by an address mapping capability. Messages are sent between the entities to have desired tasks performed. Instead of providing within the messages the actual non-logical addresses (e.g., virtual, real addresses) used to perform the tasks, logical addresses are provided. The logical addresses are then mapped to the non-logical addresses. Each logical address can map to a plurality of non-logical addresses.
摘要:
A method is provided for continuing node operations in quorum-based protocols. This is particularly valuable in the situation in which a group of nodes includes only two nodes and in which communications to a node is lost. Provision is made for adding additional status indications to each node indicating whether or not it is enabled for single-node quorum operation. Provision is also made for identifying one node as a primary node and another node as a secondary node for time-out response purposes.
摘要:
In a multinode data processing system capable of partitioning operations a method is provided for adding nodes to a configuration of nodes in a manner which node quorums are employed but in which two quorum values (ideal and enforced) are employed and in which old nodes using a given file system are distinguished from new nodes. The method prevents even the transient use of inappropriate quorum values.