FIELD: calculating; counting.
SUBSTANCE: invention relates to computer engineering. Disclosed is a computer-implemented method of processing a workload in a communication failure, comprising steps of: assigning, by a primary node, a workload to a first node; correlating the first generation identifier and the workload identifier with the workload; transmitting a first generation identifier, a workload identifier and a work load to a first node; receiving from first node request for access to node in data storage system for access to target data, wherein the first generation identifier and the workload identifier are provided with the request for identifying the first node and the corresponding workload; during communication failure between the main node and the first node, generating a second generation identifier, associating the second generation identifier with the workload and transmitting the second generation identifier, the workload identifier and the workload to the second node, wherein the second generation identifier indicates a priority different from the first generation identifier; receiving from the second node a request for access to said node in the data storage system for accessing the target data, wherein the second generation identifier and the workload identifier are provided with the request to identify the second node and the workload; determining, by a data storage system, whether the second generation identifier indicates a higher or lower priority than the first generation identifier; and determining whether the access request received from the second node with respect to the target data is satisfied based on the priorities indicated by the first and second generation identifiers, respectively.
EFFECT: technical result is more economical use of computational resources when processing workload in case of communication failure.
4 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
SAFE DATA ACCESS FOLLOWING STORAGE FAILURE | 2015 |
|
RU2683167C2 |
RECOVERY AFTER FAILURE OF CLUSTER CLIENT | 2012 |
|
RU2595755C2 |
SMB2-SCALING | 2012 |
|
RU2613040C2 |
ASSESSMENT OF FILE REPUTATION | 2015 |
|
RU2690759C2 |
ENSURING TRANSPARENCY FAILOVER IN FILE SYSTEM | 2011 |
|
RU2595482C2 |
MECHANISM OF PEER BROADCASTING OF INFORMATION CONTENT | 2003 |
|
RU2343536C2 |
MANAGING SELECTION OF SUBSYSTEM OF MOBILITY AND/OR ACCESS BETWEEN CELLS | 2014 |
|
RU2651575C2 |
METHOD AND SYSTEM FOR MOVING DATA IN CLOUD ENVIRONMENT | 2023 |
|
RU2822554C1 |
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS | 2020 |
|
RU2807463C2 |
MODULAR EXTENSION CARDS FOR APPLICATIONS FROM APPLICATION STORE | 2015 |
|
RU2707401C2 |
Authors
Dates
2019-09-24—Published
2015-08-10—Filed