Object transaction system for a resource-constrained system

    公开(公告)号:US12086130B1

    公开(公告)日:2024-09-10

    申请号:US17037272

    申请日:2020-09-29

    Abstract: Aspects related to a resource-constrained system are described herein that can provide object storage services after a service interruption is resolved, even if all of the transactions that were pending and incomplete prior to the service interruption have not yet been recovered and/or executed. For example, file systems implemented by computing systems of the resource-constrained system may treat each file or directory as a separate object. Thus, a transaction directed to one file may not affect the file's directory or other files in the directory. As a result, the resource-constrained system can achieve read-after-write consistency without first recovering and executing the pending, incomplete transactions. Instead, read-after-write consistency for an object can be achieved simply by completing any pending, incomplete transaction directed to that object. Accordingly, the resource-constrained system can provide object storage services to user devices immediately after the service interruption is resolved, thereby resulting in fast crash recovery times.

    Lockless, leaderless protocol for scalable applications

    公开(公告)号:US12021926B1

    公开(公告)日:2024-06-25

    申请号:US18452727

    申请日:2023-08-21

    CPC classification number: H04L67/1095 G06F16/134 H04L67/1097

    Abstract: Systems and methods for implementing lockless, leaderless transaction protocols for scalable applications such as distributed data stores are disclosed. Applications may be implemented using multiple nodes individually implementing all or a subset of lockless, leaderless protocols. A transaction, such as a write to a data object, may be received at a node, the operation including a user-provided key. A composite key may be generated using a monotonic sequence number, the composite key globally unique across the application. A new data object is created based on data provided and once the object is created, the object is immutable. Other operations are implemented such that no data object may be written, modified, or deleted by more than one operation, thus eliminating contention and allowing for lock-free operation. Leaderless operation, as well as replication using erasure coding and redundant data paths, further minimize latency of the protocol.

Patent Agency Ranking