Enforcing uniform file-locking for diverse file-locking protocols
First Claim
1. A method of enforcing uniform locking semantics among a set of client devices that use a plurality of diverse locking protocols, comprising the steps of:
- granting an opportunistic lock on a selected data set to a first client device in response to a first message using a first protocol; and
breaking said opportunistic lock in response to a second message using a second protocol;
wherein the first protocol and the second protocol are different ones of said plurality of diverse locking protocols.
0 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a method and system for connect interoperation of multiple diverse file server or file locking protocols, using a uniform multi-protocol lock management system. A file server determines, before allowing any client device to access data or to obtain a lock, whether that would be inconsistent with existing locks, regardless of originating client device or originating protocol for those existing locks. A first protocol enforces mandatory file-open and file-locking together with an opportunistic file-locking technique, while a second protocol lacks file-open semantics and provides only for advisory byte-range and file locking.
112 Citations
79 Claims
-
1. A method of enforcing uniform locking semantics among a set of client devices that use a plurality of diverse locking protocols, comprising the steps of:
-
granting an opportunistic lock on a selected data set to a first client device in response to a first message using a first protocol; and breaking said opportunistic lock in response to a second message using a second protocol; wherein the first protocol and the second protocol are different ones of said plurality of diverse locking protocols. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of enforcing uniform file-locking semantics among a set of client devices that use a plurality of diverse file locking protocols, comprising the steps of:
-
receiving a first message using a first protocol, said first message being operative to lock at least a portion of a selected file; granting an opportunistic lock on said at least a portion of a selected file, in response to said first message; receiving a second message using a second protocol different from the first protocol, said second message being operative to request access to said at least a portion of the selected file; and comparing said access requested by said second message with said lock, and denying said access if prohibited by said lock, and otherwise, breaking said opportunistic lock in response to said second message. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A storage server comprising:
-
mass storage; an interface to a network; and a processor, the storage server operating under control of the processor to enforce uniform locking semantics for accessing the mass storage across the network, said semantics enforced among a set of client devices that use a plurality of diverse locking protocols, said processor performing steps including the steps of;
(a) granting an opportunistic lock on a selected data set to a first client device in response to a first message using a first protocol, and (b) breaking said opportunistic lock in response to a second message using a second protocol, wherein the first protocol and the second protocol are different ones of said plurality of diverse locking protocols. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A file server comprising:
-
mass storage; an interface to a network; and a processor, the file server operating under control of the processor to enforce uniform file-locking semantics for accessing the mass storage across the network, said semantics enforced among a set of client devices that use a plurality of diverse file locking protocols, said processor performing steps including the steps of;
receiving a first message using a first protocol, said first message being operative to lock at least a portion of a selected file, granting an opportunistic lock on said at least a portion of a selected file, in response to said first message, receiving a second message using a second protocol different from the first protocol, said second message being operative to request access to said at least a portion of the selected file, comparing said access requested by said second message with said lock, and denying said access if prohibited by said lock, and otherwise, breaking said opportunistic lock in response to said second message. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A memory storing information including instructions, the instructions executable by a processor to enforce uniform locking semantics, said semantics enforced among a set of client devices that use a plurality of diverse locking protocols, said instructions comprising the steps of:
-
granting an opportunistic lock on a selected data set to a first client device in response to a first message using a first protocol; and breaking said opportunistic lock in response to a second message using a second protocol, wherein the first protocol and the second protocol are different ones of said plurality of diverse locking protocols. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65)
-
-
66. A memory storing information including instructions, the instructions executable by a processor to enforce uniform file-locking semantics, said semantics enforced among a set of client devices that use a plurality of diverse file locking protocols, said instructions comprising the steps of:
-
receiving a first message using a first protocol, said first message being operative to lock at least a portion of a selected file; granting an opportunistic lock on said at least a portion of a selected file, in response to said first message; receiving a second message using a second protocol different from the first protocol, said second message being operative to request access to said at least a portion of the selected file; and comparing said access requested by said second message with said lock, and denying said access if prohibited by said lock, and otherwise, breaking said opportunistic lock in response to said second message. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78)
-
-
79. A file server comprising:
-
mass storage means for storing files; interface means for interfacing to a network; and processing means for controlling the file server to enforce uniform file-locking semantics for accessing the mass storage across the network, said semantics enforced among a set of client devices that use a plurality of diverse file locking protocols, including means for granting an opportunistic lock on a selected file to a first client device in response to a first message using a first protocol; and means for breaking said opportunistic lock in response to a second message using a second protocol from a second client device, wherein the first protocol and the second protocol are different ones of said plurality of diverse file locking protocols.
-
Specification