摘要:
A method for data access in a multinode, shared storage data processing environment is provided by enhancing the file locking mechanism structure so as to permit nodes not normally designated as metadata controller nodes to fulfill that function for limited times thus at least temporarily eliminating the need for continual node-to-node coordination. This is particularly advantageous in the access and transfer of large files such as video files or files containing complex visualization data.
摘要:
The present invention is directed to a method for controlling file access in a multinode, shared storage, data processing system in which a one set of nodes is capable of acting as metadata controllers and a second set of nodes are tuned for running user applications. By providing two kinds of locks operative at the file level of granularity, a mechanism is produced which permits application programs to also run on their set of metadata controller nodes. One of the locks permits read and write access to existing data blocks but precludes operations such as file deletion or file truncation. The other lock is of lower authority and permits metadata controller nodes, which can provide time limited permissions to the application nodes, to withhold locks which authorize access when requests for access are made from application nodes.
摘要:
A method is provided for limiting access to disks and files in the event of a system partitioning occurring as the result of a node failure in a data distributed processing system in which files are shared amongst a plurality of independently running nodes. The nodes in the system are provided with limited duration leases which permit data access and which have to be periodically renewed. Each partition is also associated with a quorum which is also a necessary element in providing access at proper times. The lease and quorum concepts work together to insure that recovery operations do not occur until recovery is possible. The lease concept thus is also seen as further operating in close cooperation with the quorum concept to prevent long delays in the recovery process that could otherwise occur.
摘要:
A method is provided for continuing node operations in quorum-based protocols. This is particularly valuable in the situation in which a group of nodes includes only two nodes and in which communications to a node is lost. Provision is made for adding additional status indications to each node indicating whether or not it is enabled for single-node quorum operation. Provision is also made for identifying one node as a primary node and another node as a secondary node for time-out response purposes.
摘要:
This invention provides a defragmentation utility that works on-line in parallel with other file system activities. Thus, it avoids making the file system unavailable for periods of time which would, if not for this invention, slow down data communication exchange and the execution of other tasks dependent upon the data. In particular, this invention, steps through all of the valid inodes finding each of the fragments. The defragmentation engine decides which fragments must remain in their current location and which fragments should migrate to another disk block sub-block location. Since the data blocks span across multiple disks, for each valid disk of the file system a set of disk blocks are constructed that are chosen to be filled, herein called plates. When the plates become full or reach a certain fullness, they are removed from the set and replaced by other disk blocks. When a disk block is removed from the plate set, it is moved to a “done” list as it is considered “full”. While a disk block is in the done list the fragments that belong to that block are not allowed to migrate. Thus, a defragmentation utility that works on-line, avoids locking data structures for long periods of time, is memory efficient, uses sub-blocks for fragment analysis and migration as well as minimizes data movements has been summarized. This utility thereby provides a transparent defragmentation function that operates in the background seamlessly with other system file operations.
摘要:
A storage gateway is employed as part of a security enhancing protocol in a data processing system which includes at least one metadata controller node and at least one application node which is granted a time limited access to files in a shared storage system. The gateway is provided with information as to data blocks to which access is to be allowed and also with information concerning the duration of special access granted to a requesting application node. This insures that metadata cannot be improperly used, changed or corrupted by users operating on an application node.
摘要:
A storage gateway is employed as part of a security enhancing protocol in a data processing system which includes at least one metadata controller node and at least one application node which is granted a time limited access to files in a shared storage system. The gateway is provided with information as to data blocks to which access is to be allowed and also with information concerning the duration of special access granted to a requesting application node. This insures that metadata cannot be improperly used, changed or corrupted by users operating on an application node.
摘要:
A storage gateway is employed as part of a security enhancing protocol in a data processing system which includes at least one metadata controller node and at least one application node which is granted a time limited access to files in a shared storage system. The gateway is provided with information as to data blocks to which access is to be allowed and also with information concerning the duration of special access granted to a requesting application node. This insures that metadata cannot be improperly used, changed or corrupted by users operating on an application node.
摘要:
File system restoration is made more flexible through the use of indicators of individual file restoration status throughout the restoration process. Such indicators are particularly useful in the restoration of large file systems where, for example, the number of files may range upwards of several hundred million. Since file system restoration for large systems takes such a relatively long time, the present invention provides various degrees of individual file access even as the restoration process is being carried out. During file system restoration times, file access may be full or limited to a file's attributes. Most advantageously, the present invention is capable of providing full, dynamically driven (on-demand) file access even during file system restoration operations.
摘要:
A computer system having a shared disk file system running on multiple computers each having their own instance of an operating system and being coupled for parallel data sharing access to files residing on network attached shared disks. Methods are provided for use as a parallel file system in a shared disk environment by use of a scaleable directory service for the system with a stable cursor, and a segmented allocation map. Dynamic prefetch and cached balance pools for multiple accesses improve the system. Extended file attributes are used for implementation of Access Control Lists in a parallel file system. A metadata node manages file metadata for parallel read and write actions. For our system, tokens are used for metadata node selection and identification. We have provided recoverable local shares for quota Management. A quota server and a quota client are provided for each file system, and a quotacheck utility allows parallel environments with minimal interference to other applications which require the use of quotas.