Method for accessing sharing resources in distributed system and distributed system
A distributed system and shared resource technology, applied in transmission systems, electrical components, etc., can solve problems such as high system risks and achieve the effect of reducing system security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] Embodiment 1 of the present application provides a method for accessing shared resources in a distributed system, and the method can be applied in a distributed system with multiple nodes. The distributed system will select a master node from each node during operation, and other nodes will become slave nodes, and the master node and the slave nodes can be maintained by means of Transmission Control Protocol (Transmission Control Protocol, TCP) long connection or TCP short connection. communication.
[0025] Specifically, the distributed system can implement the election of the master node and the consistency of data in the distributed system through algorithms such as FastPaxos.
[0026] Preferably, each node in the distributed system has the same structure, including four structural components: a local lock, a global lock state array, a Log (log) record, and a waiting queue.
[0027] The local lock is the lock of the node itself, and each process in the node competes...
Embodiment 2
[0067] Such as image 3 As shown, it is a schematic structural diagram of a distributed system in Embodiment 2 of the present application. The distributed system includes a master node 31 and at least one slave node 32. Each node includes a local lock, a global lock state array, a Log record, and Waiting queues have four structural components.
[0068] Specifically, the distributed system can realize the election of the master node 31 and the consistency of data in the distributed system through algorithms such as FastPaxos, and the master node 31 and the slave node 32 maintain communication.
[0069] The slave node 32 is configured to judge whether the shared resource is being accessed according to the global lock state of the shared resource stored in the local global lock state array when the local process initiates access to the shared resource, and determine whether the shared resource is being accessed. When the shared resource is not being accessed, an access request fo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com