Techniques for handling lock-related inconsistencies
    1.
    发明授权
    Techniques for handling lock-related inconsistencies 有权
    处理锁相关不一致的技巧

    公开(公告)号:US07315910B2

    公开(公告)日:2008-01-01

    申请号:US11156318

    申请日:2005-06-16

    摘要: Techniques are described herein for handling lock-related inconsistencies. As mentioned above, such inconsistencies occur when two or more sets of lock information, relating to the same resource, convey inconsistent information about locks requested and/or granted on that resource. In general, the techniques involve causing the locally-stored lock information about a resource to be sent to the master node of the resource. The master node of the resource compares the lock information thus received against the lock information maintained by the master node. Based on the comparison, the master node determines how to resolve the lock-related inconsistency, and sends messages to those nodes that need to change their local lock information for the resource. Once all of the lock information has been made consistent, the resource made available for access.

    摘要翻译: 本文描述了处理与锁相关的不一致性的技术。 如上所述,当与相同资源相关的两组或多组锁定信息传达关于在该资源上请求和/或授予的锁定的不一致的信息时,会发生这种不一致。 一般来说,这些技术涉及将关于资源的本地存储的锁定信息发送到资源的主节点。 资源的主节点将由此接收的锁定信息与由主节点维护的锁定信息进行比较。 基于比较,主节点确定如何解决与锁相关的不一致,并向需要更改其资源的本地锁信息的那些节点发送消息。 一旦所有的锁信息一致,该资源就可用于访问。

    TECHNIQUES FOR HANDLING LOCK-RELATED INCONSISTENCIES
    4.
    发明申请
    TECHNIQUES FOR HANDLING LOCK-RELATED INCONSISTENCIES 有权
    处理与锁定相关的不良情况的技术

    公开(公告)号:US20060288144A1

    公开(公告)日:2006-12-21

    申请号:US11156318

    申请日:2005-06-16

    IPC分类号: G06F12/14

    摘要: Techniques are described herein for handling lock-related inconsistencies. As mentioned above, such inconsistencies occur when two or more sets of lock information, relating to the same resource, convey inconsistent information about locks requested and/or granted on that resource. In general, the techniques involve causing the locally-stored lock information about a resource to be sent to the master node of the resource. The master node of the resource compares the lock information thus received against the lock information maintained by the master node. Based on the comparison, the master node determines how to resolve the lock-related inconsistency, and sends messages to those nodes that need to change their local lock information for the resource. Once all of the lock information has been made consistent, the resource made available for access. Because the lock-related inconsistency is resolved without restarting nodes, the availability required to correct the inconsistency.

    摘要翻译: 本文描述了处理与锁相关的不一致性的技术。 如上所述,当与相同资源相关的两组或多组锁定信息传达关于在该资源上请求和/或授予的锁定的不一致的信息时,会发生这种不一致。 一般来说,这些技术涉及将关于资源的本地存储的锁定信息发送到资源的主节点。 资源的主节点将由此接收的锁定信息与由主节点维护的锁定信息进行比较。 基于比较,主节点确定如何解决与锁相关的不一致,并向需要更改其资源的本地锁信息的那些节点发送消息。 一旦所有的锁信息一致,该资源就可用于访问。 由于锁定相关的不一致性在不重新启动节点的情况下得到解决,所以需要更改不一致的可用性。

    Remastering for asymmetric clusters in high-load scenarios
    5.
    发明授权
    Remastering for asymmetric clusters in high-load scenarios 有权
    在高负载情况下修复非对称集群

    公开(公告)号:US07389293B2

    公开(公告)日:2008-06-17

    申请号:US11061796

    申请日:2005-02-17

    IPC分类号: G06F17/30

    摘要: Techniques are provided for remastering resources based on node utilization. According to one such technique, resources are remastered in response to the over-utilization of the node that currently masters those resources. The utilization of each node is tracked, and when a particular node's utilization exceeds a specified threshold, selected resources that are currently mastered by that node are remastered so that nodes other than the particular node become the new masters for the selected resources. Each node's utilization is based on that node's capacity, and each node's capacity may differ. According to an aspect of one technique, each node's capacity is based on that node's processing resources and memory resources. Remastering resources in this manner tends to reduce the average amount of time taken for nodes to handle requests for the resources that they master.

    摘要翻译: 提供了基于节点利用重新编制资源的技术。 根据一种这样的技术,响应于当前主控这些资源的节点的过度利用而重新资源化资源。 跟踪每个节点的利用率,并且当特定节点的利用率超过指定的阈值时,重新分配由该节点当前掌握的所选择的资源,使得除特定节点之外的节点成为所选资源的新的主节点。 每个节点的利用率都是基于该节点的容量,并且每个节点的容量可能不同。 根据一种技术的一个方面,每个节点的容量基于该节点的处理资源和存储器资源。 以这种方式修复资源往往会减少节​​点处理其掌握的资源请求所需的平均时间。

    Dynamic remastering for a subset of nodes in a cluster environment
    6.
    发明授权
    Dynamic remastering for a subset of nodes in a cluster environment 有权
    集群环境中节点的一个子集的动态重组

    公开(公告)号:US07080075B1

    公开(公告)日:2006-07-18

    申请号:US11024347

    申请日:2004-12-27

    摘要: Techniques are provided for mastering resources by assigning resources to mastery-eligible-sets. The resources that are assigned to a mastery-eligible-set may be mastered only at nodes that belong to the mastery-eligible-set. The membership of a mastery-eligible-set for a given set of related resources may be established based on which nodes have the highest affinity for the given set of related resources. Resource usage may be monitored, and the system may be periodically reconfigured, by changing membership of the mastery-eligible-sets, based on the usage information.

    摘要翻译: 提供了通过将资源分配给符合资格的资源来掌握资源的技术。 分配给精通符合资格的资源的资源只能在属于掌握资格的资源集合的节点上掌握。 可以基于哪些节点对给定的一组相关资源具有最高的亲和力来建立针对给定的一组相关资源的精通符合资格的成员资格。 可以监视资源使用情况,并且可以通过基于使用信息来改变掌握资格的集合的成员资格来周期性地重新配置系统。

    REAL-TIME SYSTEM EXCEPTION MONITORING TOOL
    9.
    发明申请
    REAL-TIME SYSTEM EXCEPTION MONITORING TOOL 有权
    实时系统异常监控工具

    公开(公告)号:US20080263556A1

    公开(公告)日:2008-10-23

    申请号:US11736132

    申请日:2007-04-17

    IPC分类号: G06F9/46

    摘要: Techniques for monitoring resources of a computer system are provided. A monitoring process collects and reports utilization data for one or more resources of a computer system, such as CPU, memory, disk I/O, and network I/O. Instead of reporting just an average of the collected data over a period of time (e.g., 10 seconds), the monitoring process at least reports individually collected resource utilization values. If one or more of the utilization values exceed specified thresholds for the respective resources, then an alert may be generated. In one approach, the monitoring process is made a real-time priority process in the computer system to ensure that the memory used by the monitoring process is not swapped out of memory. Also, being a real-time priority process ensures that the monitoring process obtains a CPU in order collect resource utilization data even when the computer system is in a starvation mode.

    摘要翻译: 提供了一种监控计算机系统资源的技术。 监视过程收集并报告计算机系统的一个或多个资源(例如CPU,存储器,磁盘I / O和网络I / O)的利用率数据。 监视过程至少报告单独收集的资源利用价值,而不是仅在一段时间(例如10秒)内报告所收集的数据的平均值。 如果一个或多个利用率值超过相应资源的指定阈值,则可以生成警报。 在一种方法中,监控过程在计算机系统中被实现为一个实时优先级过程,以确保监视进程使用的内存不会被交换出内存。 而且,作为实时优先级过程,即使计算机系统处于饥饿模式,也可以确保监视进程获得CPU以便收集资源利用率数据。

    Real-time database exception monitoring tool using instance eviction data
    10.
    发明授权
    Real-time database exception monitoring tool using instance eviction data 有权
    使用实例驱逐数据的实时数据库异常监视工具

    公开(公告)号:US09027025B2

    公开(公告)日:2015-05-05

    申请号:US11736132

    申请日:2007-04-17

    IPC分类号: G06F9/46 G06F11/34

    摘要: Techniques for monitoring resources of a computer system are provided. A monitoring process collects and reports utilization data for one or more resources of a computer system, such as CPU, memory, disk I/O, and network I/O. Instead of reporting just an average of the collected data over a period of time (e.g., 10 seconds), the monitoring process at least reports individually collected resource utilization values. If one or more of the utilization values exceed specified thresholds for the respective resources, then an alert may be generated. In one approach, the monitoring process is made a real-time priority process in the computer system to ensure that the memory used by the monitoring process is not swapped out of memory. Also, being a real-time priority process ensures that the monitoring process obtains a CPU in order collect resource utilization data even when the computer system is in a starvation mode.

    摘要翻译: 提供了一种监控计算机系统资源的技术。 监视过程收集并报告计算机系统的一个或多个资源(例如CPU,存储器,磁盘I / O和网络I / O)的利用率数据。 监视过程至少报告单独收集的资源利用价值,而不是仅在一段时间(例如10秒)内报告所收集的数据的平均值。 如果一个或多个利用率值超过相应资源的指定阈值,则可以生成警报。 在一种方法中,监控过程在计算机系统中被实现为一个实时优先级过程,以确保监视进程使用的内存不会被交换出内存。 而且,作为实时优先级过程,即使计算机系统处于饥饿模式,也可以确保监视进程获得CPU以便收集资源利用率数据。