Moveable distributed synchronization objects
First Claim
Patent Images
1. A computer-implemented resource sharing method in a distributed computing environment, the method comprising:
- in response to a first condition, determining a first node in the distributed computing environment on which an access rate of a synchronization object is greatest;
storing the synchronization object on the first node, for use in synchronizing access to a resource;
in response to a second condition, determining a second node in the distributed computing environment on which an access rate of the synchronization object is greatest; and
relocating, as a lock move, the synchronization object from a storage on the first node to a storage on the second node,wherein a profile based lock placement and the lock move is used on the first node and the second node,wherein the profile includes the lock placement and the lock move and usage of the lock in a pool that extends across all nodes in the distributed computing environment,wherein the lock move is not moved when the synchronization object is being used to protect the resource,wherein the node on which the access rate of the synchronization object is greatest is determined by an analysis of profiling results, andwherein the node on which the access rate of the synchronization object is greatest is determined by a speculative code analysis or execution.
1 Assignment
0 Petitions
Accused Products
Abstract
A resource sharing method, system, and computer program product in a distributed computing environment, includes in response to a first condition, determining a first node on which an access rate of a synchronization object is greatest, storing the synchronization object on the first node for use in synchronizing access to a resource, and in response to a second condition, determining a second node on which an access rate of the synchronization object is greatest, and relocating the synchronization object from a storage on the first node to a storage on the second node.
15 Citations
15 Claims
-
1. A computer-implemented resource sharing method in a distributed computing environment, the method comprising:
-
in response to a first condition, determining a first node in the distributed computing environment on which an access rate of a synchronization object is greatest; storing the synchronization object on the first node, for use in synchronizing access to a resource; in response to a second condition, determining a second node in the distributed computing environment on which an access rate of the synchronization object is greatest; and relocating, as a lock move, the synchronization object from a storage on the first node to a storage on the second node, wherein a profile based lock placement and the lock move is used on the first node and the second node, wherein the profile includes the lock placement and the lock move and usage of the lock in a pool that extends across all nodes in the distributed computing environment, wherein the lock move is not moved when the synchronization object is being used to protect the resource, wherein the node on which the access rate of the synchronization object is greatest is determined by an analysis of profiling results, and wherein the node on which the access rate of the synchronization object is greatest is determined by a speculative code analysis or execution. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for resource sharing, the computer program product comprising a computer-readable storage medium having program instructions embodied therewith, the program instructions executable by a computer to cause the computer to perform:
-
in response to a first condition, determining a first node in the distributed computing environment on which an access rate of a synchronization object is greatest; storing the synchronization object on the first node, for use in synchronizing access to a resource; in response to a second condition, determining a second node in the distributed computing environment on which an access rate of the synchronization object is greatest; and relocating, as a lock move, the synchronization object from a storage on the first node to a storage on the second node, wherein a profile based lock placement and the lock move is used on the first node and the second node, wherein the profile includes the lock placement and the lock move and usage of the lock in a pool that extends across all nodes in the distributed computing environment, wherein the lock move is not moved when the synchronization object is being used to protect the resource, wherein the node on which the access rate of synchronization object is greatest is determined by an analysis of profiling results, and wherein the node on which the access rate of the synchronization object is greatest is determined by a speculative code analysis or execution. - View Dependent Claims (8, 9, 10)
-
-
11. A resource sharing system, said system comprising:
-
a processor; and a memory, the memory storing instructions to cause the processor to perform; in response to a first condition, determining a first node in the distributed computing environment on which an access rate of a synchronization object is greatest; storing the synchronization object on the first node, for use in synchronizing access to a resource; in response to a second condition, determining a second node in the distributed computing environment on which an access rate of the synchronization object is greatest; and relocating, as a lock move, the synchronization object from a storage on the first node to a storage on the second node, wherein a profile based lock placement and the lock move is used on the first node and the second node, wherein the profile includes the lock placement and the lock move and usage of the lock in a pool that extends across all nodes in the distributed computing environment, wherein the lock move is not moved when the synchronization object is being used to protect the resource, wherein the node on which the access rate of the synchronization object is greatest is determined by an analysis of profiling results, and wherein the node on which the access rate of the synchronization object is greatest is determined by a speculative code analysis or execution. - View Dependent Claims (12, 13, 14, 15)
-
Specification