Clustered client failover
First Claim
1. A method of providing continuous access to a resource, the method comprising:
- receiving a first request to access a resource by a process, wherein the request is received from a first client in a client cluster;
associating a first application instance identifier with the resource;
granting the first request to access the resource;
receiving a second request to access the resource by the process after loss of connection with the first client, wherein the second request is received from a second client in the client cluster and the second client is different from the first client;
receiving a second application instance identifier associated with the second request;
determining that the first and second application instance identifiers are the same; and
invalidating the first request, wherein invalidating the first request comprises;
determining that the resource is not located on the first node that receives the second request;
sending a request to a second node to invalidate the resource; and
granting the second request to access the resource on the first node.
2 Assignments
0 Petitions
Accused Products
Abstract
An application instance identifier is employed with various systems and methods in order to provide a requestor with continuous access to a resource when operating in a client clustered environment. A requestor residing on a first client may attempt to access a resource. The first client sends a request to access the resource. The request may be associated with an application instance identifier that identifies the requestor. At some point, the first client fails and the requestor is associated with a second client via a failover mechanism. The second client sends a second request to access the resource on behalf of the requestor. The second request is associated with the requestor'"'"'s application instance identifier. The application instance identifier is used to identify the second request as belonging to the same requestor as the first request, thereby granting the second request to access the resource while avoiding a conflict situation.
-
Citations
20 Claims
-
1. A method of providing continuous access to a resource, the method comprising:
-
receiving a first request to access a resource by a process, wherein the request is received from a first client in a client cluster; associating a first application instance identifier with the resource; granting the first request to access the resource; receiving a second request to access the resource by the process after loss of connection with the first client, wherein the second request is received from a second client in the client cluster and the second client is different from the first client; receiving a second application instance identifier associated with the second request; determining that the first and second application instance identifiers are the same; and invalidating the first request, wherein invalidating the first request comprises; determining that the resource is not located on the first node that receives the second request; sending a request to a second node to invalidate the resource; and granting the second request to access the resource on the first node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for facilitating client failover in a clustered environment, the system comprising:
-
at least one server comprising; at least one processor configured to execute a first set of computer executable instructions; at least one computer readable storage media storing the first set of computer executable instructions, wherein the first set of computer executable instructions, when executed by the at least one processor comprise instructions for; receiving a first request to access a resource from a first client in a client cluster, wherein the first client sends the first request on behalf of a process; associating a first application instance identifier with the first resource; allowing the process access to the resource; receiving a second request for the resource from a second client in the client cluster on behalf of the process after loss of connection with the first client, wherein the second client is different from the first client; receiving a second application instance identifier associated with the second request; determining that the first and second application instance identifiers are the same; and invalidating the first request, wherein invalidating the first request comprises; determining that the resource is not located on the first node that receives the second request; sending a request to a second node to invalidate the resource; and granting the second request to access the resource on the first node. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer readable storage media, wherein computer storage media is not a signal, storing computer executable instructions that, when executed by a processor, comprise instructions for:
-
receiving a first request to access a resource from a first client in a client cluster, wherein the first client sends the first request on behalf of a process; associating a first application instance identifier with the first resource; allowing the process access to the resource; receiving a second request for the resource from a second client in the client cluster on behalf of the process after loss of connection with the first client, wherein the second client is different from the first client; receiving a second application instance identifier associated with the second request; determining that the first and second application instance identifiers are the same; and invalidating the first request, wherein invalidating the first request comprises; determining that the resource is not located on the first node that receives the second request; sending a request to a second node to invalidate the resource; and granting the second request to access the resource on the first node. - View Dependent Claims (17, 18, 19, 20)
-
Specification