US20090228496A1 - Method for accessing distributed file system - Google Patents
Method for accessing distributed file system Download PDFInfo
- Publication number
- US20090228496A1 US20090228496A1 US12/437,787 US43778709A US2009228496A1 US 20090228496 A1 US20090228496 A1 US 20090228496A1 US 43778709 A US43778709 A US 43778709A US 2009228496 A1 US2009228496 A1 US 2009228496A1
- Authority
- US
- United States
- Prior art keywords
- file
- dfs
- file system
- request
- directory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/18—Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
Definitions
- the present invention relates to a distributed file system (DFS), a distributed file system server, and a method for accessing the distributed file system. More specifically, the invention relates to the distributed file system that distributes a file to a plurality of servers on a network, for storage, thereby constituting a single file system, a server in the distributed file system, and the method for accessing the distributed file system.
- DFS distributed file system
- server a distributed file system server
- the file systems such as a file system referred to as a common Internet file system (CIFS) and a network file system (NFS) constructed on a UNIX® operating system (OS) are known.
- CIFS common Internet file system
- NFS network file system
- OS UNIX® operating system
- file systems are centralized file systems, in which a single file system is constituted by a single server.
- file entities reside on a specific server.
- the client When accessing a file in each of these file systems, the client first accesses a server on which the targeted file resides, employing a protocol for the file system. At this point, in order to specify the file on the server, the client uses a directory structure.
- the client when accessing a file, the client employs an identifier for the file uniquely assigned by a global unique identifier (GUID) system, instead of specifying the server and a pathname for the file.
- GUID global unique identifier
- the entity of the file resides on a plurality of DFS servers on the network. The entity of the file does not need to be held by a single DFS server, and may reside on other server as a copy. Alternatively, the file may be divided into some portions; one of the divided portions of the file, referred to as a fragment, may reside on a single DFS server, and remaining fragments may reside on other DFS server or servers.
- the client When accessing a file in the DFS to refer to or perform writing to the file, the client specifies the GUID for the file for identification of the file, thereby accessing one of the servers on the network.
- the DFS has characteristics different from those of the network file systems such as the NFS and the CIF.
- a protocol dedicated to the DFS must be employed.
- a conventional client that uses only the protocol for the NFS or the CIFS cannot access the DFS file.
- the present invention has been made. It is therefore an object of the present invention to provide a distributed file system that allows access to a DFS file using a conventional protocol without making a modification on a side of a client that uses the conventional protocol, a server in the distributed file system, and a method for accessing the distributed file system.
- a distributed file system that can be accessed using a protocol for accessing a centralized file system, including:
- a gateway unit in at least one of the DFS servers for converting a protocol for accessing a centralized file system into a protocol capable of accessing the distributed file to access the distributed file.
- the above-mentioned object is achieved by that at least one of the DFS servers in the distributed file system has a function of a server in the centralized file system.
- the above-mentioned object is also achieved by providing the gateway unit for the distributed file system.
- the above-mentioned object is achieved by that at least one DFS client in the distributed file system has a function of a server in the centralized file system.
- a method for accessing a distributed file system using a protocol for accessing a centralized file system comprising the step of:
- access to a file on the DFS can be made using a conventional protocol such as the one for the NFS or CIFS, without making a modification on the client's side.
- FIG. 1 is a block diagram showing a configuration of a distributed file system according to an embodiment of the present invention
- FIG. 2 is a diagram explaining an example of a method for determining a GUID from a file group identifier and a generation number
- FIG. 3 is a diagram explaining a directory structure used by a conventional protocol client
- FIG. 4 is a block diagram showing a configuration of a DFS server
- FIG. 5 is a block diagram showing a configuration of a gateway unit
- FIG. 6 is a diagram explaining a structure of directory management information 50 ;
- FIG. 7 is a flowchart that explains processing operations when a DFS file is accessed for reference using a conventional protocol
- FIG. 8 is a flowchart that explains processing operations when a DFS file is accessed for updating using the conventional protocol
- FIG. 9 is a diagram explaining a structure of a file monitoring table
- FIG. 10 is a flowchart that explains processing operations of a gateway unit 25 at the time of completion of creation of a new generation file.
- FIG. 11 is a block diagram showing a configuration of a distributed file system according to another embodiment of the present invention.
- FIG. 1 is a block diagram showing a configuration of a distributed file system according to an embodiment of the present invention.
- reference numeral 1 denotes a network
- numeral 2 denotes DFS servers
- numeral 3 denotes DFS clients
- numeral 4 denotes NFS clients
- numeral 5 denotes a CIFS client.
- the distributed file system (DFS) according to the embodiment of the present invention, shown in FIG. 1 is constituted from the network 1 , DFS servers 2 connected to the network 1 , DFS clients 3 for accessing the file system on the network 1 using a DFS protocol, NFS clients 4 and CIFS client 5 for making access though a conventional protocol for accessing a centralized file system such as an NFS or a CIFS basically implemented with a single file server on the network 1 .
- the NFS clients 4 and the CIFS client 5 may be referred to as conventional protocol clients.
- a DFS client 3 on the network 1 accesses a DFS server 2 using the dedicated DFS protocol to refer to or perform writing to a file.
- Identifiers referred to as GUIDs which are numbers that can uniquely identify respective files on the system, are attached to the files on the DFS.
- the GUID is used to identify a file when the DFS client 3 refers to the file.
- the GUID for a file is uniquely assigned by a DFS server 2 when writing to the file is performed, and is informed to a DFS client 3 as a response to the writing.
- the DFS client 3 when referring to a file, specifies to one of the DFS servers 2 on the network the GUID for the file to identify the file, thereby making access to the DFS server 2 .
- the DFS server 2 inquires of other DFS server or servers 2 on which the entity of the file resides, and collects data to construct the entity of the file on itself, thereby allowing access from the DFS client 3 .
- the DFS client 3 When writing to a file, the DFS client 3 transmits write data to a DFS server 2 , and receives the GUID for the file from the DFS server 2 as a response to the writing. Access to the file to which writing has been performed is made, using the GUID received from the DFS server 2 .
- the entity of an identical file sometimes resides on a plurality of DFS servers.
- the DFS client has performed update writing to modify contents of once-written data in this situation, it is difficult to ensure consistency of file data among the respective DFS servers.
- the file system with this characteristic is referred to a write-once, read-many file system.
- the DFS shown in FIG. 1 is the write-once read-many file system described above.
- a once-written file to which its GUID has been assigned cannot be updated.
- update writing to a file corresponds to creation of a new generation file.
- Different GUIDs are assigned to respective generations.
- a collection of files of different generations is managed as a file group.
- a file group identifier is uniquely assigned to each file group. By specifying a file group identifier and a generation number indicating the generation of a file, a GUID identifying the file can be obtained.
- FIG. 2 is a diagram that explains an example of a method of determining the GUID from the file group identifier and the generation number. As shown in FIG. 2 , high-order bits in the GUID are used as a file group identifier 61 , while remaining low-order bits are used as a generation number 62 . The method shown in FIG. 2 is just one example. The GUID may also be determined by using other method.
- An NFS client 4 and a CIFS client 5 which are the conventional protocol clients, make access to a file using the conventional protocol for the centralized network file system other than the DFS protocol.
- these conventional protocol clients usually use the directory structure to specify the file, as described before.
- FIG. 3 is a diagram that explains the directory structure used by the conventional protocol clients. Referring to FIG. 3 , the directory structure will be described. In FIG. 3 , a directory is indicated by a solid block, while a file is indicated by a dotted-line block.
- All directories are defined in terms of tree structures that belong to a route directory 41 beginning with “/”. All the files belong to any one or more of the directories in these tree structures. In the respective directories of the tree structures, a unique file name can be assigned to a file in the directory. For this reason, when specifying a file, a pathname indicating the directory to which the file belongs and its file name should be specified.
- a file 45 shown in FIG. 3 can be specified in the form of/dira/dira2/dira22/file0001. Accordingly, when making access to a file for referencing and updating, the client specifies to the server on which the file resides the pathname and the file name of the file, thereby identifying the file. Then, the client makes a request to reference or update the file.
- the distributed file system in this embodiment allows the conventional protocol clients such as the NFS and CIFS clients to access a DFS file while eliminating the need for incorporating new software into a client side.
- the DFS server for achieving this effect will be described.
- FIG. 4 is a block diagram showing the configuration of a DFS server
- FIG. 5 is a block diagram showing a configuration of a gateway unit shown in FIG. 4
- reference numeral 21 denotes a DFS control unit
- numeral 22 denote disk drives
- numeral 23 denotes a main memory
- numeral 24 denotes an OS
- numeral 25 denotes the gateway unit
- numeral 26 denotes a DFS processing unit
- numeral 27 denotes a disk drive processing unit
- numeral 28 denotes a CPU
- numeral 29 denotes an HDD
- reference numeral 31 denotes a conventional protocol processing unit
- numeral 32 denotes a DFS accessing unit
- numeral 33 denotes a directory managing unit.
- the DFS server 2 is constituted from the CPU 28 for executing overall processing of the server, main memory 23 , disk drives 22 equipped with disks storing files, and HDD 29 storing the OS loaded into the main memory 23 for use and applications.
- the main memory 23 includes the OS 24 and the DFS control unit 21 .
- the DFS control unit 21 is constituted from the gateway unit 25 , DFS processing unit 26 , and disk drive processing unit 27 .
- the DFS control unit 21 functions as the DFS server by running of a program providing a DFS function on the CPU 28 .
- the DFS control unit 21 performs processing in response to requests from clients including the conventional protocol clients such as the NFS client 4 , CIFS client 5 and the DFS client 3 and other DFS servers 2 over the network 1 through processing of the gateway unit 25 , DFS processing unit 26 , and disk drive processing unit 27 .
- the DFS processing unit 26 receives a request through the DFS protocol and according to this request, makes a request for processing to the disk drive processing unit 27 or other DFS server 2 . Then, the DFS processing unit 26 prepares a response using a result of the processing and returns the response to the client which made the request.
- the gateway unit 25 receives a request identical to the one for the network file system such as the NFS or CIFS using the conventional protocol, from the NFS or CIFS client. Then, the gateway unit 25 performs processing according to the request by making a request for the processing to other processing unit as necessary, and then returns the result of the processing to the NFS or CIFS client as a response.
- the DFS servers 2 can receive access in response to the request from the conventional protocol client and can make a response. More specifically, due to the presence of the gateway unit 25 , the DFS server 2 shown in FIG. 4 functions as a single NFS or CIFS server for the NFS or CIFS client.
- the gateway units 25 do not need to be present on all of the DFS servers 2 : they should be present on the DFS servers 2 that can become access points from the conventional protocol clients. In other words, the gateway units 25 are required only for the DFS servers 2 to be accessed by the conventional protocol clients. For this reason, when the usual DFS client 3 makes access, the gateway unit 25 is unnecessary.
- the gateway unit 25 is constituted from the conventional protocol processing unit 31 , DFS accessing unit 32 , and directory managing unit 33 .
- the conventional protocol processing unit 31 is the processing unit for receiving the conventional protocol from the NFS or CIFS client and returning a response in conformity with the conventional protocol.
- the conventional protocol processing unit 31 is present for each of the protocols received, judges the contents of the associated protocol, and makes a request for processing to other processing unit as necessary.
- the DFS accessing unit 32 receives the request from the conventional protocol processing unit 31 to act as a bridge between the gateway unit 25 and the DFS processing unit 26 in the DFS control unit 21 . More specifically, the DFS accessing unit 32 is the processing unit for creating a request for the DFS according to the request from the conventional protocol processing unit 31 and accessing a DFS file via the DFS processing unit 26 . Incidentally, the conventional protocol processing unit 31 may create the request for the DFS in conformity with the conventional protocol. In this case, the DFS accessing unit 32 is unnecessary.
- the directory managing unit 33 is the processing unit for managing correspondence between the files in the directory structures of the file systems that uses the conventional protocols and the GUIDs, which are the identifiers for DFS files. Specification of a file through the conventional protocol is performed by the pathname indicating the directory in which the file resides and the file name uniquely assigned in the directory. In contrast therewith, specification of a DFS file is performed by the GUID uniquely assigned within the system. If the DFS has structures corresponding to directories in the conventional protocol file system, the GUIDs can be associated with the files in the conventional file systems through the use of the structures. Among the distributed file systems, however, there is also the system that does not have the structures corresponding to the directories. In other words, the DFS that does not have the structures corresponding to the directories can uniquely identify the files in the entire system by the GUIDs alone. Thus, it does not need a structure corresponding to the pathnames for the files.
- the directory managing unit 33 which manages correspondence between the GUIDs and the files in the directory structure, provides the scheme for associating the GUIDs with the files specified by their pathnames in the directory structure.
- the directory managing unit 33 performs processing on requests for directory manipulation and directory information reading through the conventional protocol. For this reason, the directory managing unit 33 has directory management information comparable to the directory management information in the conventional protocol file system.
- FIG. 6 is a diagram that explains the structure of directory management information 50 .
- the directory management information 50 is constituted from a plurality of entries 51 .
- the entries 51 are respectively present for each directory described with reference to FIG. 3 or for each file.
- Each entry 51 includes a p_parent 52 , a p_subdir 53 , a p_child 54 , and an f_name 55 .
- the p_parent 52 is a pointer to the entry of a parent directory to which a directory or a file belongs.
- the route directory has no parent directory.
- the p_subdir 53 is a pointer to a subordinate directory or a file which belongs to the directory.
- the p_child 54 is a pointer to an entry at the same level in the directory, and the f_name 55 stores the name of a file or the directory.
- the file group identifier for identifying the file on the DFS is stored in an f_id 56 .
- Each entry 51 of the directory management information 50 is structured to accommodate the directory structure by three kinds of the pointers of the p_parent 52 , p_subdir 53 , and p_child 54 . For this reason, by sequentially tracking the pointers to the entry of a directory specified by its pathname, it is possible to reach the entry 51 of a targeted file. Since the entry 51 stores its file group identifier, the file group identifier for the DFS can be determined from a file and the pathname of the directory to which the file belongs, specified by the conventional protocol file system.
- the entries in a middle portion of FIG. 6 correspond to directories dira, dirb, and filel in FIG. 3 .
- the p_subdir 53 of the entry 50 in the top portion of FIG. 6 points to the entry on a left side of the middle portion of FIG. 6 , corresponding to the directory dira in FIG. 3
- the p_child 54 of the entry 50 on the left side of the middle portion of FIG. 6 points to the entry 50 on a right side of the middle portion of FIG. 6 , corresponding to the directory dirb in FIG. 3
- the p_subdir 53 of the entry 50 on the left side of the middle portion of FIG. 6 corresponding to the directory dira in FIG. 3 points to the entry 50 in a bottom portion of FIG. 6 , corresponding to the directory dira 1 in FIG. 3 .
- the pathnames and the file name of a file from the conventional client have been specified as /dira/dira2/dira22/file0001/, for example, as described in FIG. 3 .
- the entry that has the specified file name in the f_name 55 that stores the directory or file name therein can be searched.
- the file group identifier f_id 56 for the file can be thereby obtained.
- Registration of a file in the directory management information 50 as described above is performed in following cases:
- One is the case where the file is created in the directory management information 50 , in response to a request for file registration from the centralized file system that uses the conventional protocol.
- the file is created by specification of the pathname and file name of the file.
- the conventional protocol processing unit 31 should create the entry for the file and adds the entry at a location in the directory management information 50 , corresponding to the pathname.
- the other is the case where the DFS creates the file using the DFS protocol. Since the directory management information 50 is not created by using DFS files alone in this case, the DFS file created through the DFS protocol cannot be accessed, using the conventional protocol.
- the DFS processing unit 26 makes a request to register the DFS file in the directory management information 50 in the directory managing unit 33 to the gateway unit 25 so that the DFS file can be accessed through the conventional protocol.
- the DFS processing unit 26 specifies the pathname, file name, and the file group identifier of the file to be registered and makes a request for the registration to the gateway unit 25 .
- the gateway unit 25 then performs the registration. After the file has been registered in the directory management information 50 in this manner, the file can be accessed by the centralized file system using the conventional protocol, for referencing.
- the directory management information 50 may be shared between the DFS servers 2 through communication between the gateway units 25 in the DFS servers 2 within the system, and can be thereby regarded as an identical file system. With this arrangement, from respective access points, access can be made to the identical file system.
- the respective gateway units 25 of the DFS servers 2 may include different directory management information 50 . With this arrangement, the centralized file system can access different file systems that differ depending on the respective access points.
- FIG. 7 is a flowchart that explains processing operations when a DFS file is referred to using the conventional protocol. Next, the processing operations of the flowchart will be described.
- the conventional protocol client 4 or 5 specifies the pathname indicating the location of the directory to which the file belongs and the file name to identify the file. Then, the client accesses the DFS server 2 that holds the directory management information 50 so as to refer to the file.
- the conventional protocol processing unit 31 makes an inquiry to the directory managing unit 33 at step 81 to obtain the file group identifier for the file.
- the directory managing unit 33 sequentially tracks the pointers of the entries in the directory management information 50 in the directory managing unit 33 , thereby reaching the entry of the specified file, as in hierarchical directory tracking in the conventional file system.
- the directory managing unit 33 obtains the file group identifier for the file with its name specified by the entry, and returns the file group identifier to the conventional protocol processing unit 31 .
- the conventional protocol processing unit 31 inquires of the DFS accessing unit 32 a latest generation number of the file group identifier so as to obtain the GUID for the file, at step 82 .
- the DFS accessing unit 32 uses a method such as the one for inquiring of other DFS server 2 that manages file group identifiers through the DFS protocol, thereby determining the latest generation number, and returns the latest generation number to the conventional protocol processing unit 31 .
- the conventional protocol processing unit 31 determines the GUID from the file group identifier and the generation number obtained at steps 81 and 82 , at step 83 .
- the conventional protocol processing unit 31 uses the GUID determined at step 83 to issue a request to read data associated with the GUID to the DFS accessing unit 32 , at step 84 .
- the DFS accessing unit 32 upon reception of this request, issues a request to the DFS to obtain the data for the read request.
- the conventional protocol processing unit 31 returns the data read through the DFS accessing unit 32 after step 84 to the client that has made the reference request, as a response, at step 85 .
- FIG. 8 is a flowchart that explains processing operations when a file is updated by accessing the DFS server 2 that holds the directory management information 50 from the centralized file system using the conventional protocol. Next, the processing operations of this flowchart will be described.
- the conventional protocol client 4 or 5 specifies the pathname indicating the location of the directory to which the file belongs and the file name to identify the file, as in the case of file referencing. Then, the client accesses the DFS server 2 so as to update the file.
- the conventional protocol processing unit 31 determines whether the received update request is a second or subsequent request for updating of data resulting from division of data in the identified file or not. Division of update data and division of the update request will be described later. More specifically, it is determined whether the request has been made to update the data in a file being already updated or not, at step 91 .
- the conventional protocol processing unit 31 inquires of the directory managing unit 33 to obtain the file group identifier for the file at step 92 . For this reason, the conventional protocol processing unit 31 , as in the case of processing for file referencing, inquires of the directory managing unit 33 the file group identifier. When it has been determined that the request to update data in the already updated file is made, it is the writing to the file that is already existent, so that the entry for the file is present in the directory management information 50 . By determining the entry as in the case of file referencing, the file group identifier for the file can be obtained, at step 92 .
- the entry for the new file is not present in the directory management information 50 .
- data writing should be performed on the newly created file by performing processing described below after step 95 , as in the case of updating of the file.
- the conventional protocol processing unit 31 asks the DFS accessing unit 32 to issue a request to create the new generation file, at step 93 .
- the DFS accessing unit 32 registers the new generation file for the DFS processing unit 26 , and returns an obtained generation number to the conventional protocol processing unit 31 as a response.
- the conventional protocol processing unit 31 can obtain the GUID from the file group identifier and the generation number returned as the response, at step 94 .
- a series of updating processes on a file does not always be performed through a single processing request.
- a size of a file to be updated can be changed by setting.
- an update request is usually fulfilled as an update process on the file of the defined size of 8 KB, for example. If updating of data exceeding 8 KB is performed, a request for the updating is divided into a plurality of update requests and fulfilled. If updating of 24 KB data is performed, a request for the updating is divided into three update requests each for updating 8 KB data, and they are fulfilled. In order to generate a new generation number for each of the divided update requests, once updating of a file has been started, it is necessary to memorize until completion of the updating that the file is being updated.
- the conventional protocol processing unit 31 registers a file of which updating has been started in a file monitoring table 70 , which will be described later, at step 95 .
- the file monitoring table 70 is held in the directory managing unit 33 , for example.
- the conventional protocol processing unit 31 obtains the GUID for the file from the file monitoring table 70 , which will be described later, at step 96 .
- the conventional protocol processing unit 31 After registration of the file in the file monitoring table 70 at step 95 or obtaining the GUID for the file from the file monitoring table 70 at step 96 , the conventional protocol processing unit 31 specifies the GUID for the file to issue to the DFS accessing unit 32 a request to write data in the file to which the GUID is assigned, at step 97 .
- the DFS accessing unit 32 upon reception of this request, issues a request for data writing to the DFS processing unit 26 .
- the conventional protocol processing unit 31 receives a response from the DFS processing unit 26 via the DFS accessing unit 32 , and returns a response indicating completion of the update request to the conventional protocol client at step 98 .
- FIG. 9 is a diagram showing a structure of the file monitoring table 70 .
- Each entry in the file monitoring table 70 corresponds to a file being updated.
- the contents of each entry consist of information 72 for identifying the file being updated and a generation number 73 indicating the generation of the file being updated.
- p_dentry which is a pointer to the entry for directory information is employed as the information 72 for identifying the file.
- the conventional protocol processing unit 31 By checking information registered in the file monitoring table 70 , it can be found whether a received request is the second or subsequent request of divided requests. If the received request is the second or subsequent request, the conventional protocol processing unit 31 will not generate a new generation file. For this purpose, in the processing described with reference to FIG. 8 , upon reception of the update request, the conventional protocol processing unit 31 examines the file monitoring table 70 in processing at step 91 to check whether the request is the update request for the file being already updated. Then, when it has been determined that the request is not the update request for the file being already updated, the operation proceeds to step 92 , as described above, a new generation file is generated, and then data writing is performed.
- the conventional protocol processing unit 31 obtains the GUID for the file from the file monitoring table 70 at step 96 , and makes a request to write data in the file to which the GUID is assigned, at step 97 .
- the gateway unit 25 can process the request to update a file, as described above. However, in order to finish registration of the new generation file created, the gateway unit 25 needs to inform the DFS processing unit 26 of completion of data writing (update) to the new generation file. For this purpose, the gateway unit 25 needs to monitor completion of a series of request for updating transmitted from the conventional protocol client through the conventional protocol.
- a trigger indicating completion of the series of request for updating differs according to the protocol of each network file system.
- the CIFS for example, possesses the protocol that has file operation states in which a file is opened when an operation is performed on the file and is closed when the operation is finished. In this case, a close request at the time of completion of the operation corresponds to the trigger indicating completion of the update request.
- operations such as opening and closing of a file do not exist, so that the NFS protocol does not have the state indicating whether the file is being operated or not. In such a protocol, it is necessary to determine whether the operation has been completed or not, by using other trigger.
- a plurality of triggers can be employed for this purpose.
- One is a time interval between update requests.
- the conventional protocol client divides a series of requests for updating into a plurality of requests and transmits them to the gateway unit 25 .
- the conventional protocol client issues the subsequent update request.
- the gateway unit 25 monitors intervals of time when update requests have arrived and a certain time or longer has passed since the last update request arrived at the gateway unit 25 , it can be considered that the series of requests for updating has been completed.
- a request to issue a commit command can be used. In network file systems of NFS version 3 or later, a commit command is prepared as a method of reflecting on a disk the contents of an updated file.
- the gateway unit 25 can consider that a series of requests for updating had been completed when the request to issue the commit command arrived.
- the commit command is not always issued when updating has been completed.
- the commit command alone is employed for the trigger, it sometimes occurs that completion of updating cannot be recognized.
- creation of the new generation file might be inadvertently finished before a series of requests for updating has been actually executed.
- a certain time interval for example, if arrival of a subsequent update request has been delayed due to a condition of the network 1 or the like, it is sometimes determined that updating, which actually should be still kept on, had been finished. In this case, though an additional new generation file is created, there is no serious problem if the updated contents of the file are not lost. If an update request has been received after creation of a new generation file because of inadvertent determination as to completion of a series of requests for updating, another new generation file should be created and data writing should be performed to the created file.
- FIG. 10 is a flowchart that explains processing operations of the gateway unit 25 at the time of completion of creation of a new generation file. Next, the processing operations of this flowchart will be described.
- the gateway unit 25 waits for occurrence of the trigger indicating completion of updating as described above, and starts processing upon occurrence of the trigger.
- the conventional protocol processing unit 31 refers to the file monitoring table 70 to obtain the GUID for the new generation file being created.
- the DFS accessing unit 32 uses the GUID to issue to the DFS processing unit 26 a request for completion of the updating.
- the conventional protocol processing unit 31 deletes from the file monitoring table 70 the entry for the file to which the update processing has been performed, and releases the state where the file is being updated.
- the gateway unit 25 enables access to a DFS file from the conventional protocol clients 4 and 5 .
- Each of the processing in this embodiment, described above can be constituted as a processing program.
- This program can be stored in a recording medium such as a hard disk (HD), a digital audio tape (DAT), a floppy disk (FD), a magneto-optical disk (MO), a digital versatile disc read-only memory (DVD-ROM), or a compact disc read-only memory (CD-ROM), and can be provided.
- a recording medium such as a hard disk (HD), a digital audio tape (DAT), a floppy disk (FD), a magneto-optical disk (MO), a digital versatile disc read-only memory (DVD-ROM), or a compact disc read-only memory (CD-ROM), and can be provided.
- the DFS is the write-once read-many file system.
- the present invention can also be applied to the DFS other than the writeonce read-many file system.
- the DFS other than the write-once read-many file system there is no concept of the generation of a file; even if a file has been updated, the value of the GUID for the file is not changed.
- the f_id 56 in the directory management information 50 may directly include the GUID for a file instead of the file group identifier for the file.
- the GUID for the file can be obtained at step 81 , so that steps 82 and 83 become unnecessary.
- the GUID for the file can be obtained at step 92 , and step 93 for creation of a new generation file and step 94 for obtaining the GUID is unnecessary.
- the gateway unit 25 may be implemented as a gateway server on the network 1 , for performing processing of the gateway unit 25 , or incorporated into the conventional protocol client 4 or 5 , instead of being mounted in the DFS server 2 .
- FIG. 11 is a block diagram showing a configuration of a DFS according to another embodiment of the present invention.
- reference numeral 110 denotes a gateway server. Same reference numerals are assigned to other components that are the same as those in FIG. 1 .
- FIG. 11 is an example where the gateway unit 25 described above is provided as the gateway server 110 on the network 1 .
- the conventional protocol client 4 or 5 makes access to the gateway server 110 .
- the gateway server 110 accesses a DFS server 2 using the DFS protocol.
- the gateway server 110 performs the same processing as the gateway unit 25 .
- the DFS accessing unit 32 of the gateway unit 25 described above in the foregoing embodiment performs processing in conjunction with the DFS processing unit 26 .
- a function of the gateway unit is implemented on the server different from the DFS server 2 .
- the DFS accessing unit 32 provided in the gateway server 110 becomes a DFS client, which uses the DFS protocol to make a request to the DFS server 2 , thereby enabling the same processing to be performed.
- this DFS client 3 can be said to have the function of a server in the centralized file system.
- the gateway unit 25 As the method of incorporating the gateway unit 25 into the conventional protocol client, insertion of the function of the gateway unit 25 between the NFS client 4 and the network 1 , for example, can be conceived.
- programs that use the protocol for a host NFS are processed through the NFS protocol.
- the gateway unit 25 Through the function of the gateway unit 25 , the NFS protocol is converted into the DFS protocol and a DFS server is accessed through the converted DFS protocol, on the network.
- each NFS client needs the gateway unit.
- the directory structure which resides in the network file system that uses the conventional protocol, such as the NFS and CIFS is emulated. Further, the method of accessing a file using the pathname and the file name indicating the location of the file in the directory structure is converted to the method of accessing a file using the GUID, which is the identifier for the file in the DFS. Access to a DFS file through the conventional protocol can be thereby made.
- the DFS is the write-once read-many file system
- update processing using the conventional protocol is converted into processing for creation of a new generation file.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
In order to access a distributed file system (DFS) of the present invention using a conventional protocol such as the one for an NFS or a CIFS without making a modification on a client side, a gateway unit for receiving a conventional protocol and performing processing in conformity the protocol is provided for a DFS server. The gateway unit emulates a directory structure in a file system such as the NFS or CIFS. When the DFS is a write-once read-many file system, update processing is converted into processing for creating a new generation file, and reference processing is converted into access to a latest generation file in a generation-managed file group. The gateway unit then accesses a DFS file via a DFS processing unit.
Description
- This is a continuation application of U.S. Ser. No. 12/073,286, filed Mar. 4, 2008, which is a continuation application of U.S. Ser. No. 11/488,685, filed Jul. 19, 2006 (now U.S. Pat. No. 7,363,352), which is a continuation application of U.S. Ser. No. 10/645,813, filed Aug. 20, 2003 (now U.S. Pat. No. 7,143,146). The entire disclosures of all of the above-identified applications are hereby incorporated by reference.
- The present invention relates to a distributed file system (DFS), a distributed file system server, and a method for accessing the distributed file system. More specifically, the invention relates to the distributed file system that distributes a file to a plurality of servers on a network, for storage, thereby constituting a single file system, a server in the distributed file system, and the method for accessing the distributed file system.
- As file systems using the network, the file systems such as a file system referred to as a common Internet file system (CIFS) and a network file system (NFS) constructed on a UNIX® operating system (OS) are known. These file systems are centralized file systems, in which a single file system is constituted by a single server. In these systems, file entities reside on a specific server. When accessing a file in each of these file systems, the client first accesses a server on which the targeted file resides, employing a protocol for the file system. At this point, in order to specify the file on the server, the client uses a directory structure.
- In contrast therewith, in the DFS in an “OceanStore”, which is a utility infrastructure designed to span the globe and provide continuous access to persistent information, when accessing a file, the client employs an identifier for the file uniquely assigned by a global unique identifier (GUID) system, instead of specifying the server and a pathname for the file. In the DFS, the entity of the file resides on a plurality of DFS servers on the network. The entity of the file does not need to be held by a single DFS server, and may reside on other server as a copy. Alternatively, the file may be divided into some portions; one of the divided portions of the file, referred to as a fragment, may reside on a single DFS server, and remaining fragments may reside on other DFS server or servers.
- When accessing a file in the DFS to refer to or perform writing to the file, the client specifies the GUID for the file for identification of the file, thereby accessing one of the servers on the network.
- As a prior art associated with the present invention, a system equipped with a communication interface for connection to all kinds of user data from a storage server is disclosed in U.S. Pat. No. 6,446,141, for example.
- The DFS has characteristics different from those of the network file systems such as the NFS and the CIF. Thus, in order to access a file in the DFS, or a DFS file, a protocol dedicated to the DFS must be employed. For this reason, a conventional client that uses only the protocol for the NFS or the CIFS cannot access the DFS file. Thus, it was necessary to make a modification on a client side, such as an improvement in a program used so far, to accommodate the DFS. In other words, in order to function as a DFS client in the DFS system, there was a need for the client in the centralized file system, which uses the conventional protocol, to modify the program.
- In view of the problem described above, the present invention has been made. It is therefore an object of the present invention to provide a distributed file system that allows access to a DFS file using a conventional protocol without making a modification on a side of a client that uses the conventional protocol, a server in the distributed file system, and a method for accessing the distributed file system.
- According to the present invention, the above mentioned object is achieved by a distributed file system that can be accessed using a protocol for accessing a centralized file system, including:
- a plurality of DFS servers on a network for distributing a file, for storage; and
- a gateway unit in at least one of the DFS servers, for converting a protocol for accessing a centralized file system into a protocol capable of accessing the distributed file to access the distributed file. In other words, the above-mentioned object is achieved by that at least one of the DFS servers in the distributed file system has a function of a server in the centralized file system.
- The above-mentioned object is also achieved by providing the gateway unit for the distributed file system. In other words, the above-mentioned object is achieved by that at least one DFS client in the distributed file system has a function of a server in the centralized file system.
- Further, the above-mentioned object is achieved by a method for accessing a distributed file system using a protocol for accessing a centralized file system comprising the step of:
- converting the protocol for accessing the centralized file system into a protocol capable of accessing the distributed file system to access a distributed file.
- Thus, according to the present invention, access to a file on the DFS can be made using a conventional protocol such as the one for the NFS or CIFS, without making a modification on the client's side.
- Other objects, features and advantages of the invention will become apparent from the following description of the embodiments of the invention taken in conjunction with the accompanying drawings.
-
FIG. 1 is a block diagram showing a configuration of a distributed file system according to an embodiment of the present invention; -
FIG. 2 is a diagram explaining an example of a method for determining a GUID from a file group identifier and a generation number; -
FIG. 3 is a diagram explaining a directory structure used by a conventional protocol client; -
FIG. 4 is a block diagram showing a configuration of a DFS server; -
FIG. 5 is a block diagram showing a configuration of a gateway unit; -
FIG. 6 is a diagram explaining a structure ofdirectory management information 50; -
FIG. 7 is a flowchart that explains processing operations when a DFS file is accessed for reference using a conventional protocol; -
FIG. 8 is a flowchart that explains processing operations when a DFS file is accessed for updating using the conventional protocol; -
FIG. 9 is a diagram explaining a structure of a file monitoring table; -
FIG. 10 is a flowchart that explains processing operations of agateway unit 25 at the time of completion of creation of a new generation file; and -
FIG. 11 is a block diagram showing a configuration of a distributed file system according to another embodiment of the present invention. - Embodiments of a distributed file system (DFS) and a DFS server according to the present invention will be described in detail below with reference to the appended drawings.
-
FIG. 1 is a block diagram showing a configuration of a distributed file system according to an embodiment of the present invention. Referring toFIG. 1 ,reference numeral 1 denotes a network,numeral 2 denotes DFS servers,numeral 3 denotes DFS clients,numeral 4 denotes NFS clients, andnumeral 5 denotes a CIFS client. - The distributed file system (DFS) according to the embodiment of the present invention, shown in
FIG. 1 is constituted from thenetwork 1,DFS servers 2 connected to thenetwork 1, DFSclients 3 for accessing the file system on thenetwork 1 using a DFS protocol,NFS clients 4 andCIFS client 5 for making access though a conventional protocol for accessing a centralized file system such as an NFS or a CIFS basically implemented with a single file server on thenetwork 1. Hereinafter, the NFSclients 4 and theCIFS client 5 may be referred to as conventional protocol clients. - In the DFS shown in
FIG. 1 , aDFS client 3 on thenetwork 1 accesses aDFS server 2 using the dedicated DFS protocol to refer to or perform writing to a file. Identifiers referred to as GUIDs, which are numbers that can uniquely identify respective files on the system, are attached to the files on the DFS. The GUID is used to identify a file when theDFS client 3 refers to the file. The GUID for a file is uniquely assigned by aDFS server 2 when writing to the file is performed, and is informed to aDFS client 3 as a response to the writing. - More specifically, when referring to a file, the
DFS client 3 specifies to one of theDFS servers 2 on the network the GUID for the file to identify the file, thereby making access to theDFS server 2. When an entity of the file does not reside on the accessedDFS server 2, theDFS server 2 inquires of other DFS server orservers 2 on which the entity of the file resides, and collects data to construct the entity of the file on itself, thereby allowing access from theDFS client 3. - When writing to a file, the
DFS client 3 transmits write data to aDFS server 2, and receives the GUID for the file from theDFS server 2 as a response to the writing. Access to the file to which writing has been performed is made, using the GUID received from theDFS server 2. - In the DFS, the entity of an identical file sometimes resides on a plurality of DFS servers. When the DFS client has performed update writing to modify contents of once-written data in this situation, it is difficult to ensure consistency of file data among the respective DFS servers. Thus, among the DFSs, there is a file system in which writing to a file specified by a GUID can be performed once and after the writing, only referencing is allowed. In this system, update writing is not allowed. The file system with this characteristic is referred to a write-once, read-many file system.
- In the write-once read-many file system, modification to the contents of a file, corresponding to update writing, is equivalent to writing to a new generation file. The writing to the new generation file is performed after a new GUID has been assigned to the file. A series of generations of files are managed as file groups.
- The DFS shown in
FIG. 1 is the write-once read-many file system described above. A once-written file to which its GUID has been assigned cannot be updated. Instead of update writing, there are generations of files in the DFS inFIG. 1 ; update writing to a file corresponds to creation of a new generation file. Different GUIDs are assigned to respective generations. A collection of files of different generations is managed as a file group. A file group identifier is uniquely assigned to each file group. By specifying a file group identifier and a generation number indicating the generation of a file, a GUID identifying the file can be obtained. -
FIG. 2 is a diagram that explains an example of a method of determining the GUID from the file group identifier and the generation number. As shown inFIG. 2 , high-order bits in the GUID are used as afile group identifier 61, while remaining low-order bits are used as ageneration number 62. The method shown inFIG. 2 is just one example. The GUID may also be determined by using other method. - An
NFS client 4 and aCIFS client 5, which are the conventional protocol clients, make access to a file using the conventional protocol for the centralized network file system other than the DFS protocol. When making access to the file, these conventional protocol clients usually use the directory structure to specify the file, as described before. -
FIG. 3 is a diagram that explains the directory structure used by the conventional protocol clients. Referring toFIG. 3 , the directory structure will be described. InFIG. 3 , a directory is indicated by a solid block, while a file is indicated by a dotted-line block. - All directories are defined in terms of tree structures that belong to a
route directory 41 beginning with “/”. All the files belong to any one or more of the directories in these tree structures. In the respective directories of the tree structures, a unique file name can be assigned to a file in the directory. For this reason, when specifying a file, a pathname indicating the directory to which the file belongs and its file name should be specified. Afile 45 shown inFIG. 3 , for example, can be specified in the form of/dira/dira2/dira22/file0001. Accordingly, when making access to a file for referencing and updating, the client specifies to the server on which the file resides the pathname and the file name of the file, thereby identifying the file. Then, the client makes a request to reference or update the file. - The distributed file system in this embodiment allows the conventional protocol clients such as the NFS and CIFS clients to access a DFS file while eliminating the need for incorporating new software into a client side. Next, a configuration of the DFS server for achieving this effect will be described.
-
FIG. 4 is a block diagram showing the configuration of a DFS server, andFIG. 5 is a block diagram showing a configuration of a gateway unit shown inFIG. 4 . Referring toFIGS. 4 and 5 ,reference numeral 21 denotes a DFS control unit, numeral 22 denote disk drives, numeral 23 denotes a main memory, numeral 24 denotes an OS, numeral 25 denotes the gateway unit, numeral 26 denotes a DFS processing unit, numeral 27 denotes a disk drive processing unit, numeral 28 denotes a CPU, numeral 29 denotes an HDD,reference numeral 31 denotes a conventional protocol processing unit, numeral 32 denotes a DFS accessing unit, and numeral 33 denotes a directory managing unit. - As shown in
FIG. 4 , theDFS server 2 is constituted from theCPU 28 for executing overall processing of the server,main memory 23, disk drives 22 equipped with disks storing files, andHDD 29 storing the OS loaded into themain memory 23 for use and applications. Themain memory 23 includes theOS 24 and theDFS control unit 21. TheDFS control unit 21 is constituted from thegateway unit 25,DFS processing unit 26, and diskdrive processing unit 27. - The
DFS control unit 21 functions as the DFS server by running of a program providing a DFS function on theCPU 28. TheDFS control unit 21 performs processing in response to requests from clients including the conventional protocol clients such as theNFS client 4,CIFS client 5 and theDFS client 3 andother DFS servers 2 over thenetwork 1 through processing of thegateway unit 25,DFS processing unit 26, and diskdrive processing unit 27. - The
DFS processing unit 26 receives a request through the DFS protocol and according to this request, makes a request for processing to the diskdrive processing unit 27 orother DFS server 2. Then, theDFS processing unit 26 prepares a response using a result of the processing and returns the response to the client which made the request. - The
gateway unit 25 receives a request identical to the one for the network file system such as the NFS or CIFS using the conventional protocol, from the NFS or CIFS client. Then, thegateway unit 25 performs processing according to the request by making a request for the processing to other processing unit as necessary, and then returns the result of the processing to the NFS or CIFS client as a response. - As described above, like the file server that uses the conventional protocol, the
DFS servers 2 can receive access in response to the request from the conventional protocol client and can make a response. More specifically, due to the presence of thegateway unit 25, theDFS server 2 shown inFIG. 4 functions as a single NFS or CIFS server for the NFS or CIFS client. - The
gateway units 25 do not need to be present on all of the DFS servers 2: they should be present on theDFS servers 2 that can become access points from the conventional protocol clients. In other words, thegateway units 25 are required only for theDFS servers 2 to be accessed by the conventional protocol clients. For this reason, when theusual DFS client 3 makes access, thegateway unit 25 is unnecessary. - As shown in
FIG. 5 , thegateway unit 25 is constituted from the conventionalprotocol processing unit 31,DFS accessing unit 32, anddirectory managing unit 33. - The conventional
protocol processing unit 31 is the processing unit for receiving the conventional protocol from the NFS or CIFS client and returning a response in conformity with the conventional protocol. The conventionalprotocol processing unit 31 is present for each of the protocols received, judges the contents of the associated protocol, and makes a request for processing to other processing unit as necessary. - The
DFS accessing unit 32 receives the request from the conventionalprotocol processing unit 31 to act as a bridge between thegateway unit 25 and theDFS processing unit 26 in theDFS control unit 21. More specifically, theDFS accessing unit 32 is the processing unit for creating a request for the DFS according to the request from the conventionalprotocol processing unit 31 and accessing a DFS file via theDFS processing unit 26. Incidentally, the conventionalprotocol processing unit 31 may create the request for the DFS in conformity with the conventional protocol. In this case, theDFS accessing unit 32 is unnecessary. - The
directory managing unit 33 is the processing unit for managing correspondence between the files in the directory structures of the file systems that uses the conventional protocols and the GUIDs, which are the identifiers for DFS files. Specification of a file through the conventional protocol is performed by the pathname indicating the directory in which the file resides and the file name uniquely assigned in the directory. In contrast therewith, specification of a DFS file is performed by the GUID uniquely assigned within the system. If the DFS has structures corresponding to directories in the conventional protocol file system, the GUIDs can be associated with the files in the conventional file systems through the use of the structures. Among the distributed file systems, however, there is also the system that does not have the structures corresponding to the directories. In other words, the DFS that does not have the structures corresponding to the directories can uniquely identify the files in the entire system by the GUIDs alone. Thus, it does not need a structure corresponding to the pathnames for the files. - In order to allow access using the conventional protocol, it is necessary to provide for the DFS that does not have the directory structure a scheme for associating the GUIDs with the files specified by their pathnames in the directory structure. The
directory managing unit 33, which manages correspondence between the GUIDs and the files in the directory structure, provides the scheme for associating the GUIDs with the files specified by their pathnames in the directory structure. - The
directory managing unit 33 performs processing on requests for directory manipulation and directory information reading through the conventional protocol. For this reason, thedirectory managing unit 33 has directory management information comparable to the directory management information in the conventional protocol file system. -
FIG. 6 is a diagram that explains the structure ofdirectory management information 50. Thedirectory management information 50 is constituted from a plurality ofentries 51. Theentries 51 are respectively present for each directory described with reference toFIG. 3 or for each file. - Each
entry 51 includes ap_parent 52, ap_subdir 53, ap_child 54, and anf_name 55. Thep_parent 52 is a pointer to the entry of a parent directory to which a directory or a file belongs. The route directory has no parent directory. When theentry 51 indicates a directory, thep_subdir 53 is a pointer to a subordinate directory or a file which belongs to the directory. Thep_child 54 is a pointer to an entry at the same level in the directory, and thef_name 55 stores the name of a file or the directory. When theentry 51 indicates a file, the file group identifier for identifying the file on the DFS is stored in anf_id 56. Eachentry 51 of thedirectory management information 50 is structured to accommodate the directory structure by three kinds of the pointers of thep_parent 52,p_subdir 53, andp_child 54. For this reason, by sequentially tracking the pointers to the entry of a directory specified by its pathname, it is possible to reach theentry 51 of a targeted file. Since theentry 51 stores its file group identifier, the file group identifier for the DFS can be determined from a file and the pathname of the directory to which the file belongs, specified by the conventional protocol file system. - If the
entry 50 in a top portion ofFIG. 6 is a route entry for theroute directory 41 inFIG. 3 , the entries in a middle portion ofFIG. 6 correspond to directories dira, dirb, and filel inFIG. 3 . Thep_subdir 53 of theentry 50 in the top portion ofFIG. 6 points to the entry on a left side of the middle portion ofFIG. 6 , corresponding to the directory dira inFIG. 3 , while thep_child 54 of theentry 50 on the left side of the middle portion ofFIG. 6 points to theentry 50 on a right side of the middle portion ofFIG. 6 , corresponding to the directory dirb inFIG. 3 . Likewise, thep_subdir 53 of theentry 50 on the left side of the middle portion ofFIG. 6 corresponding to the directory dira inFIG. 3 points to theentry 50 in a bottom portion ofFIG. 6 , corresponding to thedirectory dira 1 inFIG. 3 . - Assume that the pathnames and the file name of a file from the conventional client have been specified as /dira/dira2/dira22/file0001/, for example, as described in
FIG. 3 . Then, by sequentially tracking theentries 51 according to the directories specified by the pathnames and the file name, the entry that has the specified file name in thef_name 55 that stores the directory or file name therein can be searched. The file group identifier f_id 56 for the file can be thereby obtained. - Registration of a file in the
directory management information 50 as described above is performed in following cases: One is the case where the file is created in thedirectory management information 50, in response to a request for file registration from the centralized file system that uses the conventional protocol. In this case, the file is created by specification of the pathname and file name of the file. Thus, the conventionalprotocol processing unit 31 should create the entry for the file and adds the entry at a location in thedirectory management information 50, corresponding to the pathname. The other is the case where the DFS creates the file using the DFS protocol. Since thedirectory management information 50 is not created by using DFS files alone in this case, the DFS file created through the DFS protocol cannot be accessed, using the conventional protocol. For this reason, theDFS processing unit 26 makes a request to register the DFS file in thedirectory management information 50 in thedirectory managing unit 33 to thegateway unit 25 so that the DFS file can be accessed through the conventional protocol. TheDFS processing unit 26 specifies the pathname, file name, and the file group identifier of the file to be registered and makes a request for the registration to thegateway unit 25. Thegateway unit 25 then performs the registration. After the file has been registered in thedirectory management information 50 in this manner, the file can be accessed by the centralized file system using the conventional protocol, for referencing. - The
directory management information 50 may be shared between theDFS servers 2 through communication between thegateway units 25 in theDFS servers 2 within the system, and can be thereby regarded as an identical file system. With this arrangement, from respective access points, access can be made to the identical file system. Alternatively, therespective gateway units 25 of theDFS servers 2 may include differentdirectory management information 50. With this arrangement, the centralized file system can access different file systems that differ depending on the respective access points. -
FIG. 7 is a flowchart that explains processing operations when a DFS file is referred to using the conventional protocol. Next, the processing operations of the flowchart will be described. - (1) When the file in a certain directory is referenced through the conventional protocol, the
conventional protocol client DFS server 2 that holds thedirectory management information 50 so as to refer to the file.
(2) When the conventionalprotocol processing unit 31 has received a reference request specifying the file by the pathname as described before, makes an inquiry to thedirectory managing unit 33 atstep 81 to obtain the file group identifier for the file. Thedirectory managing unit 33 sequentially tracks the pointers of the entries in thedirectory management information 50 in thedirectory managing unit 33, thereby reaching the entry of the specified file, as in hierarchical directory tracking in the conventional file system. Then, thedirectory managing unit 33 obtains the file group identifier for the file with its name specified by the entry, and returns the file group identifier to the conventionalprotocol processing unit 31.
(3) The conventionalprotocol processing unit 31 inquires of the DFS accessing unit 32 a latest generation number of the file group identifier so as to obtain the GUID for the file, atstep 82. TheDFS accessing unit 32 uses a method such as the one for inquiring ofother DFS server 2 that manages file group identifiers through the DFS protocol, thereby determining the latest generation number, and returns the latest generation number to the conventionalprotocol processing unit 31.
(4) The conventionalprotocol processing unit 31 determines the GUID from the file group identifier and the generation number obtained atsteps step 83.
(5) The conventionalprotocol processing unit 31 uses the GUID determined atstep 83 to issue a request to read data associated with the GUID to theDFS accessing unit 32, atstep 84. TheDFS accessing unit 32, upon reception of this request, issues a request to the DFS to obtain the data for the read request.
(6) The conventionalprotocol processing unit 31 returns the data read through theDFS accessing unit 32 afterstep 84 to the client that has made the reference request, as a response, atstep 85. -
FIG. 8 is a flowchart that explains processing operations when a file is updated by accessing theDFS server 2 that holds thedirectory management information 50 from the centralized file system using the conventional protocol. Next, the processing operations of this flowchart will be described. - (1) When the file in a certain directory is updated using the conventional protocol, the
conventional protocol client DFS server 2 so as to update the file.
(2) When the conventionalprotocol processing unit 31 has received an update request made by identifying the file as described before, the conventionalprotocol processing unit 31 determines whether the received update request is a second or subsequent request for updating of data resulting from division of data in the identified file or not. Division of update data and division of the update request will be described later. More specifically, it is determined whether the request has been made to update the data in a file being already updated or not, atstep 91.
(3) If it has been determined atstep 91 that the request to update data in the file being already updated is made, the conventionalprotocol processing unit 31 inquires of thedirectory managing unit 33 to obtain the file group identifier for the file atstep 92. For this reason, the conventionalprotocol processing unit 31, as in the case of processing for file referencing, inquires of thedirectory managing unit 33 the file group identifier. When it has been determined that the request to update data in the already updated file is made, it is the writing to the file that is already existent, so that the entry for the file is present in thedirectory management information 50. By determining the entry as in the case of file referencing, the file group identifier for the file can be obtained, atstep 92. If it has been determined that the request is made to create a new file rather than to perform updating, the entry for the new file is not present in thedirectory management information 50. In this case, when the request to create the new file has been made, it is necessary to create and register the entry for the new file in thedirectory management information 50 and also issue a request for creation of the new file to theDFS processing unit 26 to obtain the file group identifier of the new file from theDFS processing unit 26. Then, data writing should be performed on the newly created file by performing processing described below afterstep 95, as in the case of updating of the file.
(4) After the file group identifier has been obtained, it is necessary to create a new generation file in the file group indicated by the file group identifier so as to perform update writing of the contents of the file. For this purpose, the conventionalprotocol processing unit 31 asks theDFS accessing unit 32 to issue a request to create the new generation file, atstep 93.
(5) TheDFS accessing unit 32 registers the new generation file for theDFS processing unit 26, and returns an obtained generation number to the conventionalprotocol processing unit 31 as a response. The conventionalprotocol processing unit 31 can obtain the GUID from the file group identifier and the generation number returned as the response, atstep 94.
(6) According to the conventional protocol, a series of updating processes on a file does not always be performed through a single processing request. In the NFS, for example, a size of a file to be updated can be changed by setting. However, an update request is usually fulfilled as an update process on the file of the defined size of 8 KB, for example. If updating of data exceeding 8 KB is performed, a request for the updating is divided into a plurality of update requests and fulfilled. If updating of 24 KB data is performed, a request for the updating is divided into three update requests each for updating 8 KB data, and they are fulfilled. In order to generate a new generation number for each of the divided update requests, once updating of a file has been started, it is necessary to memorize until completion of the updating that the file is being updated. In order to achieve this purpose, the conventionalprotocol processing unit 31 registers a file of which updating has been started in a file monitoring table 70, which will be described later, atstep 95. The file monitoring table 70 is held in thedirectory managing unit 33, for example.
(7) If it has been determined atstep 91 that updating is to be performed on the data in the file already being updated, the conventionalprotocol processing unit 31 obtains the GUID for the file from the file monitoring table 70, which will be described later, atstep 96.
(8) After registration of the file in the file monitoring table 70 atstep 95 or obtaining the GUID for the file from the file monitoring table 70 atstep 96, the conventionalprotocol processing unit 31 specifies the GUID for the file to issue to the DFS accessing unit 32 a request to write data in the file to which the GUID is assigned, atstep 97. TheDFS accessing unit 32, upon reception of this request, issues a request for data writing to theDFS processing unit 26.
(9) After the data writing, the conventionalprotocol processing unit 31 receives a response from theDFS processing unit 26 via theDFS accessing unit 32, and returns a response indicating completion of the update request to the conventional protocol client atstep 98. -
FIG. 9 is a diagram showing a structure of the file monitoring table 70. Each entry in the file monitoring table 70 corresponds to a file being updated. The contents of each entry consist ofinformation 72 for identifying the file being updated and ageneration number 73 indicating the generation of the file being updated. InFIG. 9 , p_dentry, which is a pointer to the entry for directory information is employed as theinformation 72 for identifying the file. - By checking information registered in the file monitoring table 70, it can be found whether a received request is the second or subsequent request of divided requests. If the received request is the second or subsequent request, the conventional
protocol processing unit 31 will not generate a new generation file. For this purpose, in the processing described with reference toFIG. 8 , upon reception of the update request, the conventionalprotocol processing unit 31 examines the file monitoring table 70 in processing atstep 91 to check whether the request is the update request for the file being already updated. Then, when it has been determined that the request is not the update request for the file being already updated, the operation proceeds to step 92, as described above, a new generation file is generated, and then data writing is performed. If it has been found that the request is the update request for the file being already updated, the conventionalprotocol processing unit 31 obtains the GUID for the file from the file monitoring table 70 atstep 96, and makes a request to write data in the file to which the GUID is assigned, atstep 97. - The
gateway unit 25 can process the request to update a file, as described above. However, in order to finish registration of the new generation file created, thegateway unit 25 needs to inform theDFS processing unit 26 of completion of data writing (update) to the new generation file. For this purpose, thegateway unit 25 needs to monitor completion of a series of request for updating transmitted from the conventional protocol client through the conventional protocol. - A trigger indicating completion of the series of request for updating differs according to the protocol of each network file system. The CIFS, for example, possesses the protocol that has file operation states in which a file is opened when an operation is performed on the file and is closed when the operation is finished. In this case, a close request at the time of completion of the operation corresponds to the trigger indicating completion of the update request. In contrast therewith, under the NFS protocol, operations such as opening and closing of a file do not exist, so that the NFS protocol does not have the state indicating whether the file is being operated or not. In such a protocol, it is necessary to determine whether the operation has been completed or not, by using other trigger.
- In this case, a plurality of triggers can be employed for this purpose. One is a time interval between update requests. The conventional protocol client divides a series of requests for updating into a plurality of requests and transmits them to the
gateway unit 25. Usually, upon completion of one divided update request, the conventional protocol client issues the subsequent update request. Thus, if thegateway unit 25 monitors intervals of time when update requests have arrived and a certain time or longer has passed since the last update request arrived at thegateway unit 25, it can be considered that the series of requests for updating has been completed. As another trigger, a request to issue a commit command can be used. In network file systems ofNFS version 3 or later, a commit command is prepared as a method of reflecting on a disk the contents of an updated file. Though the time of issuance of the commit command is not specifically defined, the commit command is usually issued when a certain series of significant updating has been finished. For this reason, thegateway unit 25 can consider that a series of requests for updating had been completed when the request to issue the commit command arrived. The commit command, however, is not always issued when updating has been completed. Thus, if the commit command alone is employed for the trigger, it sometimes occurs that completion of updating cannot be recognized. Thus, it is necessary to combine with time interval monitoring described before, for use as the trigger. - If the trigger as described above is monitored to determine completion of creation of a new generation file, creation of the new generation file might be inadvertently finished before a series of requests for updating has been actually executed. In a method of employing a certain time interval as the trigger, for example, if arrival of a subsequent update request has been delayed due to a condition of the
network 1 or the like, it is sometimes determined that updating, which actually should be still kept on, had been finished. In this case, though an additional new generation file is created, there is no serious problem if the updated contents of the file are not lost. If an update request has been received after creation of a new generation file because of inadvertent determination as to completion of a series of requests for updating, another new generation file should be created and data writing should be performed to the created file. -
FIG. 10 is a flowchart that explains processing operations of thegateway unit 25 at the time of completion of creation of a new generation file. Next, the processing operations of this flowchart will be described. - At
step 101, thegateway unit 25 waits for occurrence of the trigger indicating completion of updating as described above, and starts processing upon occurrence of the trigger. Upon occurrence of the trigger, the conventionalprotocol processing unit 31 refers to the file monitoring table 70 to obtain the GUID for the new generation file being created. Atstep 103, theDFS accessing unit 32 uses the GUID to issue to the DFS processing unit 26 a request for completion of the updating. After completion of update processing at theDFS processing unit 26, the conventionalprotocol processing unit 31 deletes from the file monitoring table 70 the entry for the file to which the update processing has been performed, and releases the state where the file is being updated. - As described above, the
gateway unit 25 enables access to a DFS file from theconventional protocol clients - Each of the processing in this embodiment, described above can be constituted as a processing program. This program can be stored in a recording medium such as a hard disk (HD), a digital audio tape (DAT), a floppy disk (FD), a magneto-optical disk (MO), a digital versatile disc read-only memory (DVD-ROM), or a compact disc read-only memory (CD-ROM), and can be provided.
- A foregoing description about the embodiment was given, assuming that the DFS is the write-once read-many file system. The present invention, however, can also be applied to the DFS other than the writeonce read-many file system. In the DFS other than the write-once read-many file system, there is no concept of the generation of a file; even if a file has been updated, the value of the GUID for the file is not changed. For this reason, the
f_id 56 in thedirectory management information 50 may directly include the GUID for a file instead of the file group identifier for the file. In the flowchart inFIG. 7 when a file is referred to, the GUID for the file can be obtained atstep 81, so thatsteps FIG. 8 when a file is updated, the GUID for the file can be obtained atstep 92, and step 93 for creation of a new generation file and step 94 for obtaining the GUID is unnecessary. - Though the foregoing description was given, assuming that the
gateway unit 25 is included in theDFS server 2, the present invention is not limited to this configuration. Thegateway unit 25 may be implemented as a gateway server on thenetwork 1, for performing processing of thegateway unit 25, or incorporated into theconventional protocol client DFS server 2. -
FIG. 11 is a block diagram showing a configuration of a DFS according to another embodiment of the present invention. Referring toFIG. 11 ,reference numeral 110 denotes a gateway server. Same reference numerals are assigned to other components that are the same as those inFIG. 1 . -
FIG. 11 is an example where thegateway unit 25 described above is provided as thegateway server 110 on thenetwork 1. In this case, theconventional protocol client gateway server 110. Then, thegateway server 110 accesses aDFS server 2 using the DFS protocol. Thegateway server 110 performs the same processing as thegateway unit 25. - The
DFS accessing unit 32 of thegateway unit 25 described above in the foregoing embodiment performs processing in conjunction with theDFS processing unit 26. In the example shown inFIG. 11 , a function of the gateway unit is implemented on the server different from theDFS server 2. Thus, it becomes impossible to perform the processing in conjunction with theDFS processing unit 26. Instead of this, in the system shown inFIG. 11 , theDFS accessing unit 32 provided in thegateway server 110 becomes a DFS client, which uses the DFS protocol to make a request to theDFS server 2, thereby enabling the same processing to be performed. In this case, thisDFS client 3 can be said to have the function of a server in the centralized file system. - As the method of incorporating the
gateway unit 25 into the conventional protocol client, insertion of the function of thegateway unit 25 between theNFS client 4 and thenetwork 1, for example, can be conceived. In this case, programs that use the protocol for a host NFS are processed through the NFS protocol. Through the function of thegateway unit 25, the NFS protocol is converted into the DFS protocol and a DFS server is accessed through the converted DFS protocol, on the network. In this case, each NFS client needs the gateway unit. - According to the embodiments of the present invention, the directory structure which resides in the network file system that uses the conventional protocol, such as the NFS and CIFS is emulated. Further, the method of accessing a file using the pathname and the file name indicating the location of the file in the directory structure is converted to the method of accessing a file using the GUID, which is the identifier for the file in the DFS. Access to a DFS file through the conventional protocol can be thereby made.
- According to the embodiments of the present invention, if the DFS is the write-once read-many file system, update processing using the conventional protocol is converted into processing for creation of a new generation file. With this arrangement, when file referencing is performed, a latest generation file can be determined from generation-managed file groups, so that access to data in the latest generation file becomes possible.
- It should be further understood by those skilled in the art that although the foregoing description has been made on embodiments of the invention, the invention is not limited thereto and various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.
Claims (3)
1. A distributed file system (DFS) comprising:
a plurality of DFS servers coupled to a network, for distributing a file for storage; and
a gateway unit for converting a protocol for accessing a centralized file system into a protocol capable of accessing the distributed file to access the distributed file;
wherein at least one of the DFS servers is provided with the gateway unit.
2. The distributed file system according to claim 1 , wherein the gateway unit creates a request for the distributed file system from a request for the centralized file system, thereby accessing the distributed file system, and creates a result of the request for the centralized file system from a result of the request for the distributed file system, using the protocol for the centralized file system.
3. The distributed file system according to claim 1 , wherein the gateway unit receives the request for making access in the centralized file system having a directory structure and accesses the distributed file system not having the directory structure, a file in the centralized file system being identified by a location of a directory in which the file resides and a unique file name in the directory, while the file in the distributed file system being identified by an identifier uniquely assigned in the distributed file system irrespective of a location of the file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/437,787 US20090228496A1 (en) | 2003-03-13 | 2009-05-08 | Method for accessing distributed file system |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003068553A JP2004280283A (en) | 2003-03-13 | 2003-03-13 | Distributed file system, distributed file system server, and access method to distributed file system |
JP2003-068553 | 2003-03-13 | ||
US10/645,813 US7143146B2 (en) | 2003-03-13 | 2003-08-20 | Method for accessing distributed file system |
US11/488,685 US7363352B2 (en) | 2003-03-13 | 2006-07-19 | Method for accessing distributed file system |
US12/073,286 US7548959B2 (en) | 2003-03-13 | 2008-03-04 | Method for accessing distributed file system |
US12/437,787 US20090228496A1 (en) | 2003-03-13 | 2009-05-08 | Method for accessing distributed file system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/073,286 Continuation US7548959B2 (en) | 2003-03-13 | 2008-03-04 | Method for accessing distributed file system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090228496A1 true US20090228496A1 (en) | 2009-09-10 |
Family
ID=32959332
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/645,813 Expired - Fee Related US7143146B2 (en) | 2003-03-13 | 2003-08-20 | Method for accessing distributed file system |
US11/201,252 Expired - Fee Related US7284041B2 (en) | 2003-03-13 | 2005-08-09 | Method for accessing distributed file system |
US11/488,685 Expired - Fee Related US7363352B2 (en) | 2003-03-13 | 2006-07-19 | Method for accessing distributed file system |
US12/073,286 Expired - Fee Related US7548959B2 (en) | 2003-03-13 | 2008-03-04 | Method for accessing distributed file system |
US12/437,787 Abandoned US20090228496A1 (en) | 2003-03-13 | 2009-05-08 | Method for accessing distributed file system |
Family Applications Before (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/645,813 Expired - Fee Related US7143146B2 (en) | 2003-03-13 | 2003-08-20 | Method for accessing distributed file system |
US11/201,252 Expired - Fee Related US7284041B2 (en) | 2003-03-13 | 2005-08-09 | Method for accessing distributed file system |
US11/488,685 Expired - Fee Related US7363352B2 (en) | 2003-03-13 | 2006-07-19 | Method for accessing distributed file system |
US12/073,286 Expired - Fee Related US7548959B2 (en) | 2003-03-13 | 2008-03-04 | Method for accessing distributed file system |
Country Status (2)
Country | Link |
---|---|
US (5) | US7143146B2 (en) |
JP (1) | JP2004280283A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070260609A1 (en) * | 2005-11-28 | 2007-11-08 | Akhil Tulyani | System and method for high throughput with remote storage servers |
US20100146082A1 (en) * | 2008-12-10 | 2010-06-10 | Hitachi, Ltd. | Data distribution communication apparatus and data distribution system |
US20220417469A1 (en) * | 2021-06-28 | 2022-12-29 | Lenbrook Industries Limited | Audio video receiver with simultaneous multizone 8k video routing |
Families Citing this family (115)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7512673B2 (en) | 2001-01-11 | 2009-03-31 | Attune Systems, Inc. | Rule based aggregation of files and transactions in a switched file system |
US8239354B2 (en) | 2005-03-03 | 2012-08-07 | F5 Networks, Inc. | System and method for managing small-size files in an aggregated file system |
US7509322B2 (en) | 2001-01-11 | 2009-03-24 | F5 Networks, Inc. | Aggregated lock management for locking aggregated files in a switched file system |
US20040133606A1 (en) | 2003-01-02 | 2004-07-08 | Z-Force Communications, Inc. | Directory aggregation for files distributed over a plurality of servers in a switched file system |
US7562110B2 (en) | 2001-01-11 | 2009-07-14 | F5 Networks, Inc. | File switch and switched file system |
US7788335B2 (en) | 2001-01-11 | 2010-08-31 | F5 Networks, Inc. | Aggregated opportunistic lock and aggregated implicit lock management for locking aggregated files in a switched file system |
US8195760B2 (en) | 2001-01-11 | 2012-06-05 | F5 Networks, Inc. | File aggregation in a switched file system |
JP2004280283A (en) * | 2003-03-13 | 2004-10-07 | Hitachi Ltd | Distributed file system, distributed file system server, and access method to distributed file system |
JP4320195B2 (en) | 2003-03-19 | 2009-08-26 | 株式会社日立製作所 | File storage service system, file management apparatus, file management method, ID designation type NAS server, and file reading method |
JP2004318743A (en) * | 2003-04-21 | 2004-11-11 | Hitachi Ltd | File transfer device |
US7539702B2 (en) * | 2004-03-12 | 2009-05-26 | Netapp, Inc. | Pre-summarization and analysis of results generated by an agent |
US7844646B1 (en) * | 2004-03-12 | 2010-11-30 | Netapp, Inc. | Method and apparatus for representing file system metadata within a database for efficient queries |
US7630994B1 (en) | 2004-03-12 | 2009-12-08 | Netapp, Inc. | On the fly summarization of file walk data |
US7293039B1 (en) | 2004-03-12 | 2007-11-06 | Network Appliance, Inc. | Storage resource management across multiple paths |
JP4491269B2 (en) * | 2004-04-22 | 2010-06-30 | 株式会社日立製作所 | Storage system and file management apparatus |
US7738424B2 (en) * | 2004-11-12 | 2010-06-15 | Nortel Networks | Clientless mobile subscribers with seamless roaming over scalable wide area wireless networks |
US7885970B2 (en) * | 2005-01-20 | 2011-02-08 | F5 Networks, Inc. | Scalable system for partitioning and accessing metadata over multiple servers |
US7958347B1 (en) | 2005-02-04 | 2011-06-07 | F5 Networks, Inc. | Methods and apparatus for implementing authentication |
US8332355B2 (en) * | 2005-03-28 | 2012-12-11 | Symantec Corporation | Method and apparatus for generating readable, unique identifiers |
US7725593B2 (en) * | 2005-07-15 | 2010-05-25 | Sony Corporation | Scalable video coding (SVC) file format |
GB0516471D0 (en) * | 2005-08-10 | 2005-09-14 | Symbian Software Ltd | Protected software identifiers for improving security in a computing device |
US20070214285A1 (en) * | 2006-03-08 | 2007-09-13 | Omneon Video Networks | Gateway server |
JP4492569B2 (en) * | 2006-03-20 | 2010-06-30 | 日本電気株式会社 | File operation control device, file operation control system, file operation control method, and file operation control program |
US8417746B1 (en) | 2006-04-03 | 2013-04-09 | F5 Networks, Inc. | File system management with enhanced searchability |
US20070255677A1 (en) * | 2006-04-28 | 2007-11-01 | Sun Microsystems, Inc. | Method and apparatus for browsing search results via a virtual file system |
WO2008027035A1 (en) * | 2006-08-28 | 2008-03-06 | Thomson Licensing | Method and apparatus for multi-format data exchange |
WO2008147973A2 (en) | 2007-05-25 | 2008-12-04 | Attune Systems, Inc. | Remote file virtualization in a switched file system |
EP2206049A4 (en) | 2007-09-28 | 2013-11-13 | Xcerion Ab | Network operating system |
US8548953B2 (en) | 2007-11-12 | 2013-10-01 | F5 Networks, Inc. | File deduplication using storage tiers |
US8117244B2 (en) | 2007-11-12 | 2012-02-14 | F5 Networks, Inc. | Non-disruptive file migration |
US8180747B2 (en) | 2007-11-12 | 2012-05-15 | F5 Networks, Inc. | Load sharing cluster file systems |
US8352785B1 (en) | 2007-12-13 | 2013-01-08 | F5 Networks, Inc. | Methods for generating a unified virtual snapshot and systems thereof |
US8495030B2 (en) * | 2011-01-06 | 2013-07-23 | International Business Machines Corporation | Records declaration filesystem monitoring |
US8549582B1 (en) | 2008-07-11 | 2013-10-01 | F5 Networks, Inc. | Methods for handling a multi-protocol content name and systems thereof |
JP2010039966A (en) | 2008-08-08 | 2010-02-18 | Hitachi Ltd | Data management method |
US8957865B2 (en) * | 2009-01-05 | 2015-02-17 | Apple Inc. | Device, method, and graphical user interface for manipulating a user interface object |
US9235595B2 (en) * | 2009-10-02 | 2016-01-12 | Symantec Corporation | Storage replication systems and methods |
US10721269B1 (en) | 2009-11-06 | 2020-07-21 | F5 Networks, Inc. | Methods and system for returning requests with javascript for clients before passing a request to a server |
US20110113134A1 (en) | 2009-11-09 | 2011-05-12 | International Business Machines Corporation | Server Access Processing System |
US8204860B1 (en) | 2010-02-09 | 2012-06-19 | F5 Networks, Inc. | Methods and systems for snapshot reconstitution |
US9195500B1 (en) | 2010-02-09 | 2015-11-24 | F5 Networks, Inc. | Methods for seamless storage importing and devices thereof |
US8347100B1 (en) | 2010-07-14 | 2013-01-01 | F5 Networks, Inc. | Methods for DNSSEC proxying and deployment amelioration and systems thereof |
US9286298B1 (en) | 2010-10-14 | 2016-03-15 | F5 Networks, Inc. | Methods for enhancing management of backup data sets and devices thereof |
JP5822452B2 (en) * | 2010-10-22 | 2015-11-24 | 株式会社インテック | Storage service providing apparatus, system, service providing method, and service providing program |
JP5650982B2 (en) * | 2010-10-25 | 2015-01-07 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Apparatus and method for eliminating file duplication |
US9189280B2 (en) | 2010-11-18 | 2015-11-17 | Oracle International Corporation | Tracking large numbers of moving objects in an event processing system |
CN102012933B (en) * | 2010-12-02 | 2013-01-30 | 清华大学 | Distributed file system and method for storing data and providing services by utilizing same |
US8706859B2 (en) | 2011-03-29 | 2014-04-22 | Hitachi, Ltd. | Method and apparatus of data center file system |
US8990416B2 (en) | 2011-05-06 | 2015-03-24 | Oracle International Corporation | Support for a new insert stream (ISTREAM) operation in complex event processing (CEP) |
US8396836B1 (en) | 2011-06-30 | 2013-03-12 | F5 Networks, Inc. | System for mitigating file virtualization storage import latency |
US8589543B2 (en) * | 2011-07-01 | 2013-11-19 | Cisco Technology, Inc. | Virtual data center monitoring |
CN103067419B (en) * | 2011-10-19 | 2016-08-24 | 新奥特(北京)视频技术有限公司 | A kind of distributed file system and the method controlling file storage within the system |
US8463850B1 (en) | 2011-10-26 | 2013-06-11 | F5 Networks, Inc. | System and method of algorithmically generating a server side transaction identifier |
US9020912B1 (en) | 2012-02-20 | 2015-04-28 | F5 Networks, Inc. | Methods for accessing data in a compressed file system and devices thereof |
US9317511B2 (en) * | 2012-06-19 | 2016-04-19 | Infinidat Ltd. | System and method for managing filesystem objects |
CN103514212B (en) * | 2012-06-27 | 2016-04-27 | 腾讯科技(深圳)有限公司 | Method for writing data and system |
US11288277B2 (en) | 2012-09-28 | 2022-03-29 | Oracle International Corporation | Operator sharing for continuous queries over archived relations |
US9563663B2 (en) | 2012-09-28 | 2017-02-07 | Oracle International Corporation | Fast path evaluation of Boolean predicates |
US9519501B1 (en) | 2012-09-30 | 2016-12-13 | F5 Networks, Inc. | Hardware assisted flow acceleration and L2 SMAC management in a heterogeneous distributed multi-tenant virtualized clustered system |
US10956422B2 (en) | 2012-12-05 | 2021-03-23 | Oracle International Corporation | Integrating event processing with map-reduce |
US9020977B1 (en) * | 2012-12-31 | 2015-04-28 | Emc Corporation | Managing multiprotocol directories |
US10298444B2 (en) | 2013-01-15 | 2019-05-21 | Oracle International Corporation | Variable duration windows on continuous data streams |
JP5236129B2 (en) * | 2013-02-04 | 2013-07-17 | 株式会社インテック | Storage service providing apparatus, system, service providing method, and service providing program |
US10375155B1 (en) | 2013-02-19 | 2019-08-06 | F5 Networks, Inc. | System and method for achieving hardware acceleration for asymmetric flow connections |
US9390135B2 (en) | 2013-02-19 | 2016-07-12 | Oracle International Corporation | Executing continuous event processing (CEP) queries in parallel |
US9554418B1 (en) | 2013-02-28 | 2017-01-24 | F5 Networks, Inc. | Device for topology hiding of a visited network |
US9507800B2 (en) | 2013-10-23 | 2016-11-29 | Netapp, Inc. | Data management in distributed file systems |
US9575974B2 (en) * | 2013-10-23 | 2017-02-21 | Netapp, Inc. | Distributed file system gateway |
US9934279B2 (en) | 2013-12-05 | 2018-04-03 | Oracle International Corporation | Pattern matching across multiple input data streams |
US9779015B1 (en) | 2014-03-31 | 2017-10-03 | Amazon Technologies, Inc. | Oversubscribed storage extents with on-demand page allocation |
US10264071B2 (en) | 2014-03-31 | 2019-04-16 | Amazon Technologies, Inc. | Session management in distributed storage systems |
US9294558B1 (en) | 2014-03-31 | 2016-03-22 | Amazon Technologies, Inc. | Connection re-balancing in distributed storage systems |
US9495478B2 (en) | 2014-03-31 | 2016-11-15 | Amazon Technologies, Inc. | Namespace management in distributed storage systems |
US9602424B1 (en) | 2014-03-31 | 2017-03-21 | Amazon Technologies, Inc. | Connection balancing using attempt counts at distributed storage systems |
US9772787B2 (en) | 2014-03-31 | 2017-09-26 | Amazon Technologies, Inc. | File storage using variable stripe sizes |
US9569459B1 (en) | 2014-03-31 | 2017-02-14 | Amazon Technologies, Inc. | Conditional writes at distributed storage services |
US9274710B1 (en) | 2014-03-31 | 2016-03-01 | Amazon Technologies, Inc. | Offset-based congestion control in storage systems |
US9449008B1 (en) | 2014-03-31 | 2016-09-20 | Amazon Technologies, Inc. | Consistent object renaming in distributed systems |
US10372685B2 (en) | 2014-03-31 | 2019-08-06 | Amazon Technologies, Inc. | Scalable file storage service |
US9519510B2 (en) | 2014-03-31 | 2016-12-13 | Amazon Technologies, Inc. | Atomic writes for multiple-extent operations |
US9712645B2 (en) * | 2014-06-26 | 2017-07-18 | Oracle International Corporation | Embedded event processing |
US11838851B1 (en) | 2014-07-15 | 2023-12-05 | F5, Inc. | Methods for managing L7 traffic classification and devices thereof |
CN104965835B (en) * | 2014-07-30 | 2018-12-07 | 浙江大华技术股份有限公司 | A kind of file read/write method and device of distributed file system |
CN105468643B (en) * | 2014-09-09 | 2019-05-03 | 博雅网络游戏开发(深圳)有限公司 | The access method and system of distributed file system |
US9886486B2 (en) | 2014-09-24 | 2018-02-06 | Oracle International Corporation | Enriching events with dynamically typed big data for event processing |
US10120907B2 (en) | 2014-09-24 | 2018-11-06 | Oracle International Corporation | Scaling event processing using distributed flows and map-reduce operations |
US10182013B1 (en) | 2014-12-01 | 2019-01-15 | F5 Networks, Inc. | Methods for managing progressive image delivery and devices thereof |
US11895138B1 (en) | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
US10108624B1 (en) | 2015-02-04 | 2018-10-23 | Amazon Technologies, Inc. | Concurrent directory move operations using ranking rules |
US10834065B1 (en) | 2015-03-31 | 2020-11-10 | F5 Networks, Inc. | Methods for SSL protected NTLM re-authentication and devices thereof |
US10346367B1 (en) | 2015-04-30 | 2019-07-09 | Amazon Technologies, Inc. | Load shedding techniques for distributed services with persistent client connections to ensure quality of service |
US9860317B1 (en) | 2015-04-30 | 2018-01-02 | Amazon Technologies, Inc. | Throughput throttling for distributed file storage services with varying connection characteristics |
WO2017018901A1 (en) | 2015-07-24 | 2017-02-02 | Oracle International Corporation | Visually exploring and analyzing event streams |
US10404698B1 (en) | 2016-01-15 | 2019-09-03 | F5 Networks, Inc. | Methods for adaptive organization of web application access points in webtops and devices thereof |
US10797888B1 (en) | 2016-01-20 | 2020-10-06 | F5 Networks, Inc. | Methods for secured SCEP enrollment for client devices and devices thereof |
US10474636B2 (en) | 2016-03-25 | 2019-11-12 | Amazon Technologies, Inc. | Block allocation for low latency file systems |
US10545927B2 (en) | 2016-03-25 | 2020-01-28 | Amazon Technologies, Inc. | File system mode switching in a distributed storage service |
US10140312B2 (en) | 2016-03-25 | 2018-11-27 | Amazon Technologies, Inc. | Low latency distributed storage service |
US11657056B2 (en) | 2016-09-15 | 2023-05-23 | Oracle International Corporation | Data serialization in a distributed event processing system |
JP7005600B2 (en) | 2016-09-15 | 2022-01-21 | オラクル・インターナショナル・コーポレイション | Complex event processing for microbatch streaming |
US10387381B1 (en) * | 2016-10-03 | 2019-08-20 | EMC IP Holding Company LLC | Data management using an open standard file system interface to a storage gateway |
US10412198B1 (en) | 2016-10-27 | 2019-09-10 | F5 Networks, Inc. | Methods for improved transmission control protocol (TCP) performance visibility and devices thereof |
WO2018169430A1 (en) | 2017-03-17 | 2018-09-20 | Oracle International Corporation | Integrating logic in micro batch based event processing systems |
WO2018169429A1 (en) | 2017-03-17 | 2018-09-20 | Oracle International Corporation | Framework for the deployment of event-based applications |
US10567492B1 (en) | 2017-05-11 | 2020-02-18 | F5 Networks, Inc. | Methods for load balancing in a federated identity environment and devices thereof |
US9882999B1 (en) | 2017-06-28 | 2018-01-30 | Facebook, Inc. | Analyzing tracking requests generated by client devices interacting with a website |
US11223689B1 (en) | 2018-01-05 | 2022-01-11 | F5 Networks, Inc. | Methods for multipath transmission control protocol (MPTCP) based session migration and devices thereof |
US10581991B1 (en) | 2018-01-29 | 2020-03-03 | Facebook, Inc. | Analyzing tracking requests generated by client devices based on metadata describing web page of a third party website |
US10833943B1 (en) | 2018-03-01 | 2020-11-10 | F5 Networks, Inc. | Methods for service chaining and devices thereof |
US12003422B1 (en) | 2018-09-28 | 2024-06-04 | F5, Inc. | Methods for switching network packets based on packet data and devices |
EP4035316A1 (en) * | 2019-09-23 | 2022-08-03 | Direqt, Inc. | Enhancing messages with dynamic content |
EP3923170A1 (en) * | 2020-06-10 | 2021-12-15 | Bull SAS | Distributed file system and method for access to a file in such a system |
US11824777B1 (en) * | 2021-05-27 | 2023-11-21 | Aviatrix Systems, Inc. | System and method for automatic appliance configuration and operability |
CN115208874B (en) * | 2022-07-15 | 2024-03-29 | 北银金融科技有限责任公司 | Multi-communication protocol distributed file processing platform based on bank core |
CN117640626B (en) * | 2024-01-25 | 2024-04-26 | 合肥中科类脑智能技术有限公司 | File transmission method, device and system |
Citations (92)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5012405A (en) * | 1986-10-17 | 1991-04-30 | Hitachi, Ltd. | File management system for permitting user access to files in a distributed file system based on linkage relation information |
US5133066A (en) * | 1985-10-24 | 1992-07-21 | International Business Machines Corporation | Method for selecting multiple versions of data in a reduced record units text editing system |
US5260990A (en) * | 1991-04-30 | 1993-11-09 | Boston Technology, Inc. | Multiple integrations unit for coupling different switching systems to a message storage system |
US5276867A (en) * | 1989-12-19 | 1994-01-04 | Epoch Systems, Inc. | Digital data storage system with improved data migration |
US5469567A (en) * | 1991-03-14 | 1995-11-21 | Nec Corporation | System for secondary database data block buffering with block save generations and read/write access and with separate management |
US5495607A (en) * | 1993-11-15 | 1996-02-27 | Conner Peripherals, Inc. | Network management system having virtual catalog overview of files distributively stored across network domain |
US5535375A (en) * | 1992-04-20 | 1996-07-09 | International Business Machines Corporation | File manager for files shared by heterogeneous clients |
US5574898A (en) * | 1993-01-08 | 1996-11-12 | Atria Software, Inc. | Dynamic software version auditor which monitors a process to provide a list of objects that are accessed |
US5617568A (en) * | 1994-12-14 | 1997-04-01 | International Business Machines Corporation | System and method for supporting file attributes on a distributed file system without native support therefor |
US5627996A (en) * | 1992-08-19 | 1997-05-06 | At&T | Method and apparatus for accessing the same computer file using different file name formats |
US5668958A (en) * | 1995-09-12 | 1997-09-16 | International Business Machines Corporation | Heterogeneous filing system with common API and reconciled file management rules |
US5689706A (en) * | 1993-06-18 | 1997-11-18 | Lucent Technologies Inc. | Distributed systems with replicated files |
US5689701A (en) * | 1994-12-14 | 1997-11-18 | International Business Machines Corporation | System and method for providing compatibility between distributed file system namespaces and operating system pathname syntax |
US5745902A (en) * | 1992-07-06 | 1998-04-28 | Microsoft Corporation | Method and system for accessing a file using file names having different file name formats |
US5752060A (en) * | 1990-05-30 | 1998-05-12 | Fujitsu Limited | File access scheme in distributed data processing system |
US5761677A (en) * | 1996-01-03 | 1998-06-02 | Sun Microsystems, Inc. | Computer system method and apparatus providing for various versions of a file without requiring data copy or log operations |
US5761498A (en) * | 1994-02-07 | 1998-06-02 | Fujitsu Limited | Distribution file system for accessing required portion of file |
US5761678A (en) * | 1996-06-26 | 1998-06-02 | International Business Machines Corporation | Creation of clone storage area with identification of base storage area and deferred cloning of metadata |
US5864853A (en) * | 1994-09-14 | 1999-01-26 | Kabushiki Kaisha Toshiba | Portable file system operable under various computer environments |
US5910987A (en) * | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5978791A (en) * | 1995-04-11 | 1999-11-02 | Kinetech, Inc. | Data processing system using substantially unique identifiers to identify data items, whereby identical data items have the same identifiers |
US6026414A (en) * | 1998-03-05 | 2000-02-15 | International Business Machines Corporation | System including a proxy client to backup files in a distributed computing environment |
US6081747A (en) * | 1998-11-23 | 2000-06-27 | Pacesetter, Inc. | Dual-chamber implantable pacemaker having negative AV/PV hysteresis and ectopic discrimination |
US6182121B1 (en) * | 1995-02-03 | 2001-01-30 | Enfish, Inc. | Method and apparatus for a physical storage architecture having an improved information storage and retrieval system for a shared file environment |
US6192408B1 (en) * | 1997-09-26 | 2001-02-20 | Emc Corporation | Network file server sharing local caches of file access information in data processors assigned to respective file systems |
US6195650B1 (en) * | 2000-02-02 | 2001-02-27 | Hewlett-Packard Company | Method and apparatus for virtualizing file access operations and other I/O operations |
US6260069B1 (en) * | 1998-02-10 | 2001-07-10 | International Business Machines Corporation | Direct data retrieval in a distributed computing system |
US6260690B1 (en) * | 1996-02-23 | 2001-07-17 | Bowe Systec Ag | Transport and gathering system |
US6279011B1 (en) * | 1998-06-19 | 2001-08-21 | Network Appliance, Inc. | Backup and restore for heterogeneous file server environment |
US6324581B1 (en) * | 1999-03-03 | 2001-11-27 | Emc Corporation | File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems |
US20020019874A1 (en) * | 1997-12-05 | 2002-02-14 | Andrea Borr | Multi-protocol unified file-locking |
US6356863B1 (en) * | 1998-09-08 | 2002-03-12 | Metaphorics Llc | Virtual network file server |
US6374402B1 (en) * | 1998-11-16 | 2002-04-16 | Into Networks, Inc. | Method and apparatus for installation abstraction in a secure content delivery system |
US6389420B1 (en) * | 1999-09-30 | 2002-05-14 | Emc Corporation | File manager providing distributed locking and metadata management for shared data access by clients relinquishing locks after time period expiration |
US20020083183A1 (en) * | 2000-11-06 | 2002-06-27 | Sanjay Pujare | Conventionally coded application conversion system for streamed delivery and execution |
US20020083120A1 (en) * | 2000-12-22 | 2002-06-27 | Soltis Steven R. | Storage area network file system |
US6434628B1 (en) * | 1999-08-31 | 2002-08-13 | Accenture Llp | Common interface for handling exception interface name with additional prefix and suffix for handling exceptions in environment services patterns |
US20020112023A1 (en) * | 2001-02-14 | 2002-08-15 | Christos Karamanolis | Separate read and write servers in a distributed file system |
US20020111956A1 (en) * | 2000-09-18 | 2002-08-15 | Boon-Lock Yeo | Method and apparatus for self-management of content across multiple storage systems |
US20020112022A1 (en) * | 2000-12-18 | 2002-08-15 | Spinnaker Networks, Inc. | Mechanism for handling file level and block level remote file accesses using the same server |
US20020116593A1 (en) * | 2000-12-07 | 2002-08-22 | Spinnaker Networks, Inc. | Method and system for responding to file system requests |
US20020120785A1 (en) * | 2001-02-28 | 2002-08-29 | Mobiliti, Inc. | Application independent write monitoring method for fast backup and synchronization of files |
US6446141B1 (en) * | 1999-03-25 | 2002-09-03 | Dell Products, L.P. | Storage server system including ranking of data source |
US6453354B1 (en) * | 1999-03-03 | 2002-09-17 | Emc Corporation | File server system using connection-oriented protocol and sharing data sets among data movers |
US6457130B2 (en) * | 1998-03-03 | 2002-09-24 | Network Appliance, Inc. | File access control in a multi-protocol file server |
US20020152339A1 (en) * | 2001-04-09 | 2002-10-17 | Akira Yamamoto | Direct access storage system with combined block interface and file interface access |
US6468150B1 (en) * | 1998-11-30 | 2002-10-22 | Network Appliance, Inc. | Laminar flow duct cooling system |
US6470450B1 (en) * | 1998-12-23 | 2002-10-22 | Entrust Technologies Limited | Method and apparatus for controlling application access to limited access based data |
US20020156984A1 (en) * | 2001-02-20 | 2002-10-24 | Storageapps Inc. | System and method for accessing a storage area network as network attached storage |
US20020161860A1 (en) * | 2001-02-28 | 2002-10-31 | Benjamin Godlin | Method and system for differential distributed data file storage, management and access |
US6505212B2 (en) * | 1998-02-04 | 2003-01-07 | Interwoven Inc | System and method for website development |
US6535867B1 (en) * | 1999-09-29 | 2003-03-18 | Christopher J. F. Waters | System and method for accessing external memory using hash functions in a resource limited device |
US6571231B2 (en) * | 1999-02-18 | 2003-05-27 | Oracle Corporation | Maintenance of hierarchical index in relational system |
US20030101189A1 (en) * | 2001-11-29 | 2003-05-29 | Lanzatella Thomas W. | Methods, functional data, and systems to represent a storage environment |
US20030101200A1 (en) * | 2001-11-28 | 2003-05-29 | Noritaka Koyama | Distributed file sharing system and a file access control method of efficiently searching for access rights |
US6594665B1 (en) * | 2000-02-18 | 2003-07-15 | Intel Corporation | Storing hashed values of data in media to allow faster searches and comparison of data |
US20030135514A1 (en) * | 2001-08-03 | 2003-07-17 | Patel Sujal M. | Systems and methods for providing a distributed file system incorporating a virtual hot spare |
US6604118B2 (en) * | 1998-07-31 | 2003-08-05 | Network Appliance, Inc. | File system image transfer |
US20030182288A1 (en) * | 2002-03-25 | 2003-09-25 | Emc Corporation | Method and system for migrating data while maintaining access to data with use of the same pathname |
US20030182330A1 (en) * | 2002-03-19 | 2003-09-25 | Manley Stephen L. | Format for transmission file system information between a source and a destination |
US6654794B1 (en) * | 2000-03-30 | 2003-11-25 | International Business Machines Corporation | Method, data processing system and program product that provide an internet-compatible network file system driver |
US20040019655A1 (en) * | 2002-07-23 | 2004-01-29 | Hitachi, Ltd. | Method for forming virtual network storage |
US6708207B1 (en) * | 1999-06-03 | 2004-03-16 | Fujitsu Network Communications, Inc. | Method and system for managing multiple management protocols in a network element |
US6708232B2 (en) * | 2000-06-29 | 2004-03-16 | Hitachi, Ltd. | Data migration method, protocol converter and switching apparatus using it |
US6718372B1 (en) * | 2000-01-07 | 2004-04-06 | Emc Corporation | Methods and apparatus for providing access by a first computing system to data stored in a shared storage device managed by a second computing system |
US6738821B1 (en) * | 1999-01-26 | 2004-05-18 | Adaptec, Inc. | Ethernet storage protocol networks |
US20040111441A1 (en) * | 2002-12-09 | 2004-06-10 | Yasushi Saito | Symbiotic wide-area file system and method |
US20040139167A1 (en) * | 2002-12-06 | 2004-07-15 | Andiamo Systems Inc., A Delaware Corporation | Apparatus and method for a scalable network attach storage system |
US20040143713A1 (en) * | 2003-01-22 | 2004-07-22 | Niles Ronald S. | System and method for backing up data |
US20040181605A1 (en) * | 2003-03-13 | 2004-09-16 | Hitachi, Ltd. | Method for accessing distributed file system |
US20050015459A1 (en) * | 2003-07-18 | 2005-01-20 | Abhijeet Gole | System and method for establishing a peer connection using reliable RDMA primitives |
US20050015460A1 (en) * | 2003-07-18 | 2005-01-20 | Abhijeet Gole | System and method for reliable peer communication in a clustered storage system |
US6871245B2 (en) * | 2000-11-29 | 2005-03-22 | Radiant Data Corporation | File system translators and methods for implementing the same |
US6889249B2 (en) * | 2001-01-11 | 2005-05-03 | Z-Force, Inc. | Transaction aggregation in a switched file system |
US20050108486A1 (en) * | 2003-08-05 | 2005-05-19 | Miklos Sandorfi | Emulated storage system supporting instant volume restore |
US20050114593A1 (en) * | 2003-03-21 | 2005-05-26 | Cassell Loellyn J. | Query-based spares management technique |
US6901414B2 (en) * | 2000-11-30 | 2005-05-31 | Storage Technology Corporation | Method and system of storing a main data file and deltas in a storage device for determining new data files from the main data file and the deltas |
US20050131955A1 (en) * | 2003-12-10 | 2005-06-16 | Veritas Operating Corporation | System and method for providing programming-language-independent access to file system content |
US20050138287A1 (en) * | 2003-11-26 | 2005-06-23 | Hitachi, Ltd. | Disk array system |
US6952737B1 (en) * | 2000-03-03 | 2005-10-04 | Intel Corporation | Method and apparatus for accessing remote storage in a distributed storage cluster architecture |
US6959320B2 (en) * | 2000-11-06 | 2005-10-25 | Endeavors Technology, Inc. | Client-side performance optimization system for streamed applications |
US6985914B2 (en) * | 2002-02-20 | 2006-01-10 | Emc Corporation | Cluster meta file system of file system cells managed by respective data movers of a network file server |
US20060053157A1 (en) * | 2004-09-09 | 2006-03-09 | Pitts William M | Full text search capabilities integrated into distributed file systems |
US7039828B1 (en) * | 2002-02-28 | 2006-05-02 | Network Appliance, Inc. | System and method for clustered failover without network support |
US7069307B1 (en) * | 2002-12-20 | 2006-06-27 | Network Appliance, Inc. | System and method for inband management of a virtual disk |
US7089293B2 (en) * | 2000-11-02 | 2006-08-08 | Sun Microsystems, Inc. | Switching system method for discovering and accessing SCSI devices in response to query |
US7117303B1 (en) * | 2003-03-14 | 2006-10-03 | Network Appliance, Inc. | Efficient, robust file handle invalidation |
US7194479B1 (en) * | 2004-01-09 | 2007-03-20 | Sprint Communications Company L.P. | Data generator system and method |
US7197510B2 (en) * | 2003-01-30 | 2007-03-27 | International Business Machines Corporation | Method, system and program for generating structure pattern candidates |
US7212873B1 (en) * | 1999-07-01 | 2007-05-01 | Ftr Pty, Ltd. | Audio/video transcription system |
US7246139B2 (en) * | 2001-11-08 | 2007-07-17 | Fujitsu Limited | File system for enabling the restoration of a deffective file |
US7519813B1 (en) * | 2004-08-02 | 2009-04-14 | Network Appliance, Inc. | System and method for a sidecar authentication mechanism |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US111956A (en) * | 1871-02-21 | Improvement in millstones | ||
US182288A (en) * | 1876-09-19 | Improvement in automatic | ||
US120785A (en) * | 1871-11-07 | Improvement in clothes-driers | ||
US116593A (en) * | 1871-07-04 | Improvement in revolving fire-arms | ||
US53183A (en) * | 1866-03-13 | Improvement in steam-gages | ||
US4558413A (en) * | 1983-11-21 | 1985-12-10 | Xerox Corporation | Software version management system |
JPS6324648A (en) | 1986-07-16 | 1988-02-02 | Nec Corp | Semiconductor device |
US5850522A (en) * | 1995-02-03 | 1998-12-15 | Dex Information Systems, Inc. | System for physical storage architecture providing simultaneous access to common file by storing update data in update partitions and merging desired updates into common partition |
US6006018A (en) | 1995-10-03 | 1999-12-21 | International Business Machines Corporation | Distributed file system translator with extended attribute support |
US5805889A (en) * | 1995-10-20 | 1998-09-08 | Sun Microsystems, Inc. | System and method for integrating editing and versioning in data repositories |
US5737523A (en) | 1996-03-04 | 1998-04-07 | Sun Microsystems, Inc. | Methods and apparatus for providing dynamic network file system client authentication |
US5933345A (en) * | 1996-05-06 | 1999-08-03 | Pavilion Technologies, Inc. | Method and apparatus for dynamic and steady state modeling over a desired path between two end points |
US6101508A (en) * | 1997-08-01 | 2000-08-08 | Hewlett-Packard Company | Clustered file management for network resources |
US6018747A (en) * | 1997-11-26 | 2000-01-25 | International Business Machines Corporation | Method for generating and reconstructing in-place delta files |
US6697846B1 (en) * | 1998-03-20 | 2004-02-24 | Dataplow, Inc. | Shared file system |
US6144999A (en) * | 1998-05-29 | 2000-11-07 | Sun Microsystems, Incorporated | Method and apparatus for file system disaster recovery |
US6266682B1 (en) * | 1998-08-31 | 2001-07-24 | Xerox Corporation | Tagging related files in a document management system |
US6332163B1 (en) * | 1999-09-01 | 2001-12-18 | Accenture, Llp | Method for providing communication services over a computer network system |
US6842904B1 (en) * | 2000-11-21 | 2005-01-11 | Microsoft Corporation | Extensible architecture for versioning APIs |
JP4168626B2 (en) * | 2001-12-06 | 2008-10-22 | 株式会社日立製作所 | File migration method between storage devices |
US7389298B2 (en) * | 2004-11-18 | 2008-06-17 | International Business Machines Corporation | Seamless remote traversal of multiple NFSv4 exported file systems |
-
2003
- 2003-03-13 JP JP2003068553A patent/JP2004280283A/en not_active Withdrawn
- 2003-08-20 US US10/645,813 patent/US7143146B2/en not_active Expired - Fee Related
-
2005
- 2005-08-09 US US11/201,252 patent/US7284041B2/en not_active Expired - Fee Related
-
2006
- 2006-07-19 US US11/488,685 patent/US7363352B2/en not_active Expired - Fee Related
-
2008
- 2008-03-04 US US12/073,286 patent/US7548959B2/en not_active Expired - Fee Related
-
2009
- 2009-05-08 US US12/437,787 patent/US20090228496A1/en not_active Abandoned
Patent Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5133066A (en) * | 1985-10-24 | 1992-07-21 | International Business Machines Corporation | Method for selecting multiple versions of data in a reduced record units text editing system |
US5012405A (en) * | 1986-10-17 | 1991-04-30 | Hitachi, Ltd. | File management system for permitting user access to files in a distributed file system based on linkage relation information |
US5276867A (en) * | 1989-12-19 | 1994-01-04 | Epoch Systems, Inc. | Digital data storage system with improved data migration |
US5752060A (en) * | 1990-05-30 | 1998-05-12 | Fujitsu Limited | File access scheme in distributed data processing system |
US5469567A (en) * | 1991-03-14 | 1995-11-21 | Nec Corporation | System for secondary database data block buffering with block save generations and read/write access and with separate management |
US5260990A (en) * | 1991-04-30 | 1993-11-09 | Boston Technology, Inc. | Multiple integrations unit for coupling different switching systems to a message storage system |
US5535375A (en) * | 1992-04-20 | 1996-07-09 | International Business Machines Corporation | File manager for files shared by heterogeneous clients |
US5745902A (en) * | 1992-07-06 | 1998-04-28 | Microsoft Corporation | Method and system for accessing a file using file names having different file name formats |
US5627996A (en) * | 1992-08-19 | 1997-05-06 | At&T | Method and apparatus for accessing the same computer file using different file name formats |
US5574898A (en) * | 1993-01-08 | 1996-11-12 | Atria Software, Inc. | Dynamic software version auditor which monitors a process to provide a list of objects that are accessed |
US5689706A (en) * | 1993-06-18 | 1997-11-18 | Lucent Technologies Inc. | Distributed systems with replicated files |
US5495607A (en) * | 1993-11-15 | 1996-02-27 | Conner Peripherals, Inc. | Network management system having virtual catalog overview of files distributively stored across network domain |
US5761498A (en) * | 1994-02-07 | 1998-06-02 | Fujitsu Limited | Distribution file system for accessing required portion of file |
US5864853A (en) * | 1994-09-14 | 1999-01-26 | Kabushiki Kaisha Toshiba | Portable file system operable under various computer environments |
US5617568A (en) * | 1994-12-14 | 1997-04-01 | International Business Machines Corporation | System and method for supporting file attributes on a distributed file system without native support therefor |
US5689701A (en) * | 1994-12-14 | 1997-11-18 | International Business Machines Corporation | System and method for providing compatibility between distributed file system namespaces and operating system pathname syntax |
US6182121B1 (en) * | 1995-02-03 | 2001-01-30 | Enfish, Inc. | Method and apparatus for a physical storage architecture having an improved information storage and retrieval system for a shared file environment |
US5910987A (en) * | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5978791A (en) * | 1995-04-11 | 1999-11-02 | Kinetech, Inc. | Data processing system using substantially unique identifiers to identify data items, whereby identical data items have the same identifiers |
US5668958A (en) * | 1995-09-12 | 1997-09-16 | International Business Machines Corporation | Heterogeneous filing system with common API and reconciled file management rules |
US5761677A (en) * | 1996-01-03 | 1998-06-02 | Sun Microsystems, Inc. | Computer system method and apparatus providing for various versions of a file without requiring data copy or log operations |
US6260690B1 (en) * | 1996-02-23 | 2001-07-17 | Bowe Systec Ag | Transport and gathering system |
US5761678A (en) * | 1996-06-26 | 1998-06-02 | International Business Machines Corporation | Creation of clone storage area with identification of base storage area and deferred cloning of metadata |
US6192408B1 (en) * | 1997-09-26 | 2001-02-20 | Emc Corporation | Network file server sharing local caches of file access information in data processors assigned to respective file systems |
US6516351B2 (en) * | 1997-12-05 | 2003-02-04 | Network Appliance, Inc. | Enforcing uniform file-locking for diverse file-locking protocols |
US20020019874A1 (en) * | 1997-12-05 | 2002-02-14 | Andrea Borr | Multi-protocol unified file-locking |
US20030065796A1 (en) * | 1997-12-05 | 2003-04-03 | Network Appliance, Inc. | Enforcing uniform file-locking for diverse file-locking protocols |
US6505212B2 (en) * | 1998-02-04 | 2003-01-07 | Interwoven Inc | System and method for website development |
US6260069B1 (en) * | 1998-02-10 | 2001-07-10 | International Business Machines Corporation | Direct data retrieval in a distributed computing system |
US6457130B2 (en) * | 1998-03-03 | 2002-09-24 | Network Appliance, Inc. | File access control in a multi-protocol file server |
US6026414A (en) * | 1998-03-05 | 2000-02-15 | International Business Machines Corporation | System including a proxy client to backup files in a distributed computing environment |
US6279011B1 (en) * | 1998-06-19 | 2001-08-21 | Network Appliance, Inc. | Backup and restore for heterogeneous file server environment |
US6604118B2 (en) * | 1998-07-31 | 2003-08-05 | Network Appliance, Inc. | File system image transfer |
US6356863B1 (en) * | 1998-09-08 | 2002-03-12 | Metaphorics Llc | Virtual network file server |
US6374402B1 (en) * | 1998-11-16 | 2002-04-16 | Into Networks, Inc. | Method and apparatus for installation abstraction in a secure content delivery system |
US6081747A (en) * | 1998-11-23 | 2000-06-27 | Pacesetter, Inc. | Dual-chamber implantable pacemaker having negative AV/PV hysteresis and ectopic discrimination |
US6468150B1 (en) * | 1998-11-30 | 2002-10-22 | Network Appliance, Inc. | Laminar flow duct cooling system |
US6470450B1 (en) * | 1998-12-23 | 2002-10-22 | Entrust Technologies Limited | Method and apparatus for controlling application access to limited access based data |
US6738821B1 (en) * | 1999-01-26 | 2004-05-18 | Adaptec, Inc. | Ethernet storage protocol networks |
US6571231B2 (en) * | 1999-02-18 | 2003-05-27 | Oracle Corporation | Maintenance of hierarchical index in relational system |
US6324581B1 (en) * | 1999-03-03 | 2001-11-27 | Emc Corporation | File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems |
US6453354B1 (en) * | 1999-03-03 | 2002-09-17 | Emc Corporation | File server system using connection-oriented protocol and sharing data sets among data movers |
US6446141B1 (en) * | 1999-03-25 | 2002-09-03 | Dell Products, L.P. | Storage server system including ranking of data source |
US6708207B1 (en) * | 1999-06-03 | 2004-03-16 | Fujitsu Network Communications, Inc. | Method and system for managing multiple management protocols in a network element |
US7212873B1 (en) * | 1999-07-01 | 2007-05-01 | Ftr Pty, Ltd. | Audio/video transcription system |
US6434628B1 (en) * | 1999-08-31 | 2002-08-13 | Accenture Llp | Common interface for handling exception interface name with additional prefix and suffix for handling exceptions in environment services patterns |
US6535867B1 (en) * | 1999-09-29 | 2003-03-18 | Christopher J. F. Waters | System and method for accessing external memory using hash functions in a resource limited device |
US6389420B1 (en) * | 1999-09-30 | 2002-05-14 | Emc Corporation | File manager providing distributed locking and metadata management for shared data access by clients relinquishing locks after time period expiration |
US6718372B1 (en) * | 2000-01-07 | 2004-04-06 | Emc Corporation | Methods and apparatus for providing access by a first computing system to data stored in a shared storage device managed by a second computing system |
US6195650B1 (en) * | 2000-02-02 | 2001-02-27 | Hewlett-Packard Company | Method and apparatus for virtualizing file access operations and other I/O operations |
US6594665B1 (en) * | 2000-02-18 | 2003-07-15 | Intel Corporation | Storing hashed values of data in media to allow faster searches and comparison of data |
US6952737B1 (en) * | 2000-03-03 | 2005-10-04 | Intel Corporation | Method and apparatus for accessing remote storage in a distributed storage cluster architecture |
US6654794B1 (en) * | 2000-03-30 | 2003-11-25 | International Business Machines Corporation | Method, data processing system and program product that provide an internet-compatible network file system driver |
US6708232B2 (en) * | 2000-06-29 | 2004-03-16 | Hitachi, Ltd. | Data migration method, protocol converter and switching apparatus using it |
US20020111956A1 (en) * | 2000-09-18 | 2002-08-15 | Boon-Lock Yeo | Method and apparatus for self-management of content across multiple storage systems |
US7089293B2 (en) * | 2000-11-02 | 2006-08-08 | Sun Microsystems, Inc. | Switching system method for discovering and accessing SCSI devices in response to query |
US6959320B2 (en) * | 2000-11-06 | 2005-10-25 | Endeavors Technology, Inc. | Client-side performance optimization system for streamed applications |
US20020083183A1 (en) * | 2000-11-06 | 2002-06-27 | Sanjay Pujare | Conventionally coded application conversion system for streamed delivery and execution |
US6871245B2 (en) * | 2000-11-29 | 2005-03-22 | Radiant Data Corporation | File system translators and methods for implementing the same |
US6901414B2 (en) * | 2000-11-30 | 2005-05-31 | Storage Technology Corporation | Method and system of storing a main data file and deltas in a storage device for determining new data files from the main data file and the deltas |
US20020116593A1 (en) * | 2000-12-07 | 2002-08-22 | Spinnaker Networks, Inc. | Method and system for responding to file system requests |
US20020112022A1 (en) * | 2000-12-18 | 2002-08-15 | Spinnaker Networks, Inc. | Mechanism for handling file level and block level remote file accesses using the same server |
US20020083120A1 (en) * | 2000-12-22 | 2002-06-27 | Soltis Steven R. | Storage area network file system |
US6889249B2 (en) * | 2001-01-11 | 2005-05-03 | Z-Force, Inc. | Transaction aggregation in a switched file system |
US20020112023A1 (en) * | 2001-02-14 | 2002-08-15 | Christos Karamanolis | Separate read and write servers in a distributed file system |
US20020156984A1 (en) * | 2001-02-20 | 2002-10-24 | Storageapps Inc. | System and method for accessing a storage area network as network attached storage |
US6606690B2 (en) * | 2001-02-20 | 2003-08-12 | Hewlett-Packard Development Company, L.P. | System and method for accessing a storage area network as network attached storage |
US20020161860A1 (en) * | 2001-02-28 | 2002-10-31 | Benjamin Godlin | Method and system for differential distributed data file storage, management and access |
US20020120785A1 (en) * | 2001-02-28 | 2002-08-29 | Mobiliti, Inc. | Application independent write monitoring method for fast backup and synchronization of files |
US20020152339A1 (en) * | 2001-04-09 | 2002-10-17 | Akira Yamamoto | Direct access storage system with combined block interface and file interface access |
US20040133718A1 (en) * | 2001-04-09 | 2004-07-08 | Hitachi America, Ltd. | Direct access storage system with combined block interface and file interface access |
US20040177181A1 (en) * | 2001-04-09 | 2004-09-09 | Akira Yamamoto | Direct access storage system having plural interfaces which permit receipt of block and file I/O requests |
US20030135514A1 (en) * | 2001-08-03 | 2003-07-17 | Patel Sujal M. | Systems and methods for providing a distributed file system incorporating a virtual hot spare |
US7246139B2 (en) * | 2001-11-08 | 2007-07-17 | Fujitsu Limited | File system for enabling the restoration of a deffective file |
US20030101200A1 (en) * | 2001-11-28 | 2003-05-29 | Noritaka Koyama | Distributed file sharing system and a file access control method of efficiently searching for access rights |
US20030101189A1 (en) * | 2001-11-29 | 2003-05-29 | Lanzatella Thomas W. | Methods, functional data, and systems to represent a storage environment |
US6985914B2 (en) * | 2002-02-20 | 2006-01-10 | Emc Corporation | Cluster meta file system of file system cells managed by respective data movers of a network file server |
US7039828B1 (en) * | 2002-02-28 | 2006-05-02 | Network Appliance, Inc. | System and method for clustered failover without network support |
US20030182330A1 (en) * | 2002-03-19 | 2003-09-25 | Manley Stephen L. | Format for transmission file system information between a source and a destination |
US20030182288A1 (en) * | 2002-03-25 | 2003-09-25 | Emc Corporation | Method and system for migrating data while maintaining access to data with use of the same pathname |
US20040019655A1 (en) * | 2002-07-23 | 2004-01-29 | Hitachi, Ltd. | Method for forming virtual network storage |
US20040139167A1 (en) * | 2002-12-06 | 2004-07-15 | Andiamo Systems Inc., A Delaware Corporation | Apparatus and method for a scalable network attach storage system |
US20040111441A1 (en) * | 2002-12-09 | 2004-06-10 | Yasushi Saito | Symbiotic wide-area file system and method |
US7069307B1 (en) * | 2002-12-20 | 2006-06-27 | Network Appliance, Inc. | System and method for inband management of a virtual disk |
US20040143713A1 (en) * | 2003-01-22 | 2004-07-22 | Niles Ronald S. | System and method for backing up data |
US7197510B2 (en) * | 2003-01-30 | 2007-03-27 | International Business Machines Corporation | Method, system and program for generating structure pattern candidates |
US20040181605A1 (en) * | 2003-03-13 | 2004-09-16 | Hitachi, Ltd. | Method for accessing distributed file system |
US7284041B2 (en) * | 2003-03-13 | 2007-10-16 | Hitachi, Ltd. | Method for accessing distributed file system |
US7117303B1 (en) * | 2003-03-14 | 2006-10-03 | Network Appliance, Inc. | Efficient, robust file handle invalidation |
US20070078819A1 (en) * | 2003-03-14 | 2007-04-05 | Zayas Edward R | Efficient, robust file handle invalidation |
US20050114593A1 (en) * | 2003-03-21 | 2005-05-26 | Cassell Loellyn J. | Query-based spares management technique |
US20050015460A1 (en) * | 2003-07-18 | 2005-01-20 | Abhijeet Gole | System and method for reliable peer communication in a clustered storage system |
US20050015459A1 (en) * | 2003-07-18 | 2005-01-20 | Abhijeet Gole | System and method for establishing a peer connection using reliable RDMA primitives |
US20050108486A1 (en) * | 2003-08-05 | 2005-05-19 | Miklos Sandorfi | Emulated storage system supporting instant volume restore |
US20050138287A1 (en) * | 2003-11-26 | 2005-06-23 | Hitachi, Ltd. | Disk array system |
US20050131955A1 (en) * | 2003-12-10 | 2005-06-16 | Veritas Operating Corporation | System and method for providing programming-language-independent access to file system content |
US7194479B1 (en) * | 2004-01-09 | 2007-03-20 | Sprint Communications Company L.P. | Data generator system and method |
US7519813B1 (en) * | 2004-08-02 | 2009-04-14 | Network Appliance, Inc. | System and method for a sidecar authentication mechanism |
US20060053157A1 (en) * | 2004-09-09 | 2006-03-09 | Pitts William M | Full text search capabilities integrated into distributed file systems |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070260609A1 (en) * | 2005-11-28 | 2007-11-08 | Akhil Tulyani | System and method for high throughput with remote storage servers |
US20100146082A1 (en) * | 2008-12-10 | 2010-06-10 | Hitachi, Ltd. | Data distribution communication apparatus and data distribution system |
US8341244B2 (en) * | 2008-12-10 | 2012-12-25 | Hitachi, Ltd. | Data distribution communication apparatus and data distribution system |
US20220417469A1 (en) * | 2021-06-28 | 2022-12-29 | Lenbrook Industries Limited | Audio video receiver with simultaneous multizone 8k video routing |
US11930225B2 (en) * | 2021-06-28 | 2024-03-12 | Lenbrook Industries Limited | Audio video receiver with simultaneous multizone 8K video routing |
Also Published As
Publication number | Publication date |
---|---|
US20050267982A1 (en) | 2005-12-01 |
US20080168170A1 (en) | 2008-07-10 |
US7363352B2 (en) | 2008-04-22 |
US7548959B2 (en) | 2009-06-16 |
US20040181605A1 (en) | 2004-09-16 |
US7143146B2 (en) | 2006-11-28 |
JP2004280283A (en) | 2004-10-07 |
US20060259611A1 (en) | 2006-11-16 |
US7284041B2 (en) | 2007-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7548959B2 (en) | Method for accessing distributed file system | |
US7860907B2 (en) | Data processing | |
US7937453B1 (en) | Scalable global namespace through referral redirection at the mapping layer | |
US6868417B2 (en) | Mechanism for handling file level and block level remote file accesses using the same server | |
US7243089B2 (en) | System, method, and service for federating and optionally migrating a local file system into a distributed file system while preserving local access to existing data | |
US7743038B1 (en) | Inode based policy identifiers in a filing system | |
US8095678B2 (en) | Data processing | |
US9069792B1 (en) | Method and system for persistently cached, copy-on-write view of revision control trees | |
US20070038697A1 (en) | Multi-protocol namespace server | |
US20040236772A1 (en) | Data reallocation among storage systems | |
US20040193879A1 (en) | Computer system | |
JP4279452B2 (en) | System and method for performing a predefined action when porting the namespace of one storage medium to the namespace of another storage medium | |
US20020188626A1 (en) | Disk storage with modifiable data management function | |
US8090925B2 (en) | Storing data streams in memory based on upper and lower stream size thresholds | |
JP4273934B2 (en) | File system | |
US8176087B2 (en) | Data processing | |
JP4327869B2 (en) | Distributed file system, distributed file system server, and access method to distributed file system | |
US7814131B1 (en) | Aliasing of exported paths in a storage system | |
JP4005102B2 (en) | Gateway device | |
CN115328859A (en) | Metadata access method, device, equipment and medium | |
US8886656B2 (en) | Data processing | |
JP2830826B2 (en) | Distributed file synchronization system and method | |
US20080243962A1 (en) | Method and apparatus for providing and managing a virtual storage namespace | |
JP2003058408A (en) | Information processing system | |
US20080007757A1 (en) | Data processing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |