Distributed Lock Manager For File System Objects In A Shared File System
First Claim
Patent Images
1. A method for managing a shared file system comprising:
- establishing a primary token in a computer system as an element to control access to an object in a shared file system, wherein said computer system includes a processor operating in a shared-nothing environment co-existing with a shared file system;
requesting ownership of said primary token by said processor from a prior owner of said primary token;
receiving a response from said prior owner of said primary token, wherein said response is selected from the group consisting of;
silent, unexpected, and expected negative; and
creating a secondary token in response to receipt of said response, wherein said secondary token is used to take ownership of said object in said file system protected by said primary token.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus are provided for mediating access to a shared object in a naive computer system having a shared-nothing operating system layered on a shared file system. At least one primary token is utilized as a tool to mediate ownership of one or more shared objects in the naive system. A secondary token is created and utilized to mediate ownership of one or more shared objects. The secondary token created and utilized in limited circumstances, such as when the owner of the primary token ceases communicating with one or more requesters of the primary token.
38 Citations
20 Claims
-
1. A method for managing a shared file system comprising:
-
establishing a primary token in a computer system as an element to control access to an object in a shared file system, wherein said computer system includes a processor operating in a shared-nothing environment co-existing with a shared file system; requesting ownership of said primary token by said processor from a prior owner of said primary token; receiving a response from said prior owner of said primary token, wherein said response is selected from the group consisting of;
silent, unexpected, and expected negative; andcreating a secondary token in response to receipt of said response, wherein said secondary token is used to take ownership of said object in said file system protected by said primary token. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system, comprising:
-
a shared file system; a processor operating a shared-nothing operating system in communication with said shared file system; a manager to request ownership of a primary token from a prior owner of said primary token, said primary token provides the control access to an object in said file system as shared resource; said manager receives a negative response from said prior owner of said primary token, wherein said response is selected from the group consisting of;
silent, unexpected, and expected negative;said manager issues a secondary token in response to receipt of said negative response from said prior owner, wherein said secondary token is used to take ownership of said object in said file system protected by said primary token. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An article comprising:
a computer readable carrier including computer program instructions configured to manage a shared file system comprising; instructions to establish a primary token in a computer system as an element to control access to an object in said shared file system, wherein said computer system is a shared-nothing environment layered with said shared file system; instructions to issue a request for said primary token from a requesting server to a server owning said primary token; and instructions to issue a secondary token in response to receipt of a response from said owning server, wherein said response is selected from the group consisting of;
silent, unexpected, and expected negative, and wherein said secondary token is used to take ownership of said object in said file system protected by said primary token.- View Dependent Claims (14, 15, 16, 17, 18)
-
19. A method for managing a shared file system comprising:
-
establishing a primary token in a computer system as an element to control access to an object in a shared file system, wherein said computer system includes a processor operating in a shared-nothing environment co-existing with a shared file system; requesting ownership of said primary token from a prior owner of said primary token; and creating a secondary token in said system in response to receipt of a negative response from said prior owner, wherein said secondary token is used to take ownership of said object in said file system protected by said primary token. - View Dependent Claims (20)
-
Specification