The present invention relates generally to information processing systems and more particularly to a methodology and implementation for enabling an improved processing system for accessing servers.
The Network File System (NFS) is one of the most prevalent forms of remote file systems in a distributed environment today. Typically an NFS server provides file system services to thousands of clients, typically running different operating systems. Since NFS configurations are star-based i.e., one server having multiple clients, one client overloading the server can cause serious degradation in file system access times for the other clients.
NFS is typically transmission control protocol (TCP) based, and uses sockets for server-client connection. NFS servers also have a limit on the number of concurrent threads that can service client requests. If one client is running an application that is unable to read from its end of the socket in a timely manner, the TCP stack on the client system might reach a point where it needs to send back TCP zero-window responses to the server. If this client has several requests to the server in this state, then the NFS server might not be able to service new client requests. The result of this is denial of file system access to the rest of the clients.
Thus, there is a need to provide a network server access processing system which is enabled to avoid the problems set forth above.
A method, programmed medium and system are provided for preventing the denial of file system access to a plurality of clients accessing a NFS server. In one example, an NFS server is configured to listen on a designated server port. The server runs a separate daemon which “watches” client requests as they are received at the NFS server. In the example, the server processing system tracks the number of times a client sends consecutive TCP zero-window packets in response to a data packet from the server. This information is maintained, for example, in a table. The NFS server is enabled to do any one of several actions using the information, including, resetting the connection to the client with an appropriate response code. If the number of zero-window packets crosses a user-defined threshold, then a routine is called in the NFS server to stop responding to that client using a backoff algorithm. The algorithm causes the NFS server to NOT respond to the next request (blackout time) for the next N seconds. If more zero-window requests are received, the blackout time increases by predetermined amounts, for example, to 2*N, 4*N, 8*N and so on until a user-defined limit is reached. When the server reaches a point where the number of available threads or any other relevant resource dips below a user-defined threshold, the server access process is enabled to start terminating connections to the clients starting from the ones with the oldest entry in the table.
A better understanding of the present invention can be obtained when the following detailed description of a preferred embodiment is considered in conjunction with the following drawings, in which:
The various methods discussed herein may be implemented within a computer system which includes processing means, memory, storage means, input means and display means. Since the individual components of a computer system which may be used to implement the functions used in practicing the present invention are generally known in the art and composed of electronic components and circuits which are also generally known to those skilled in the art, circuit details beyond those shown are not specified to any greater extent than that considered necessary as illustrated, for the understanding and appreciation of the underlying concepts of the present invention and in order not to obfuscate or distract from the teachings of the present invention. Although the invention is illustrated in the context of a networked computer system using a laptop computer or other portable device, it is understood that disclosed methodology may also be applied in many other available and future devices and systems such as cell phones and personal wireless and other hand-held devices, including any input device, including touch-sensitive screens or touch-sensitive input pads, to achieve the beneficial functional features described herein.
The present disclosure defines a method that will prevent the NFS server from denying access to a large number of clients due to a large number of concurrent requests from one or more clients that are not reading their data in a timely manner. The disclosed methodology is also applicable to a case where the client is running an application that is intentionally attempting to freeze NFS services by not reading from its end of the socket connections. The NFS server listens on a designated server port 2049. The server will run a separate daemon which will “watch” client requests as they are received at the NFS server. Specifically, the process will keep track of the number of times a client sends consecutive TCP zero window packets (ZWPs) in response to a data packet from the server. A ZWP is a flow control mechanism that a TCP client uses to inform the server that it is not quite ready to receive more packets as it is still processing the earlier packets. Thus, a ZWP is an indication, for example, that a client is having timing problems and as a result the client may tie-up server connection resources and make them unavailable to other clients who need to access the resources. The number of consecutive ZWPs will be counted, incremented and maintained, for example, in a table. The table is maintained by the process to keep a list of clients which have sent more than a predetermined number of consecutive TCP zero-window packets in the past. With this information, the NFS server can do any one of several possible actions. For example, the NFS server is enabled to selectively reset the connection to the client with an appropriate response code. If the number of zero-window packets crosses a user-defined threshold, then the daemon process is enabled to call a routine in the NFS server to stop responding to that client using a backoff algorithm. The algorithm will basically cause the NFS server to NOT respond to the next request (blackout time) for the next N seconds. If more zero-window requests are received, the blackout time increases by predetermined amounts, for example to 2*N, 4*N, 8*N and so on until a user-defined limit.
When the server reaches a point where the number of available threads or any other relevant resource dips below a user-defined threshold, the server process starts terminating connections to the clients starting from the ones with the oldest entry in the table. Using the disclosed methodology, NFS servers can continue to provide uninterrupted services even in the presence of a resource-starved client. Further, the table can be made accessible to the administrator, so he/she can have a statistical view of the load from each client and reallocate resources appropriately. The list of problem client machines could be exchanged between NFS servers to allow NFS servers to proactively take action against a hacker that has been identified in another portion of the network. When the exponential back off algorithm is used as a response to the alert from daemon, the advantage gained is that a client that temporarily slowed down is not penalized by cutting off communications abruptly
In
As shown in
As shown in
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It is understood that the specific example presented herein is not intended to be limiting since the functional combinations disclosed herein may be implemented in many different environments and applications including, for example, applications involving the visualization of business processes and movement of emails, task lists, task list items and other system data components within an overall system data containment environment or application.
The method, system and apparatus of the present invention has been described in connection with a preferred embodiment as disclosed herein. The disclosed methodology may be implemented in a wide range of sequences, menus and screen designs to accomplish the desired results as herein illustrated. Although an embodiment of the present invention has been shown and described in detail herein, along with certain variants thereof, many other varied embodiments that incorporate the teachings of the invention may be easily constructed by those skilled in the art, and even included or integrated into a processor or CPU or other larger system integrated circuit or chip. The disclosed methodology may also be implemented solely or partially in program code stored in any media, including any portable or fixed, volatile or non-volatile memory media device, including CDs, RAM and “Flash” memory, or other semiconductor, optical, magnetic or other memory media capable of storing code, from which it may be loaded and/or transmitted into other media and executed to achieve the beneficial results as described herein. The disclosed methodology may also be implemented using any available input and/or display systems including touch-sensitive screens and optically-sensitive input pads. Accordingly, the present invention is not intended to be limited to the specific form set forth herein, but on the contrary, it is intended to cover such alternatives, modifications, and equivalents, as can be reasonably included within the spirit and scope of the invention.
This application is a Continuation of and claims priority to co-pending application Ser. No. 12/614,511which was filed on 11/09/2009, and application Ser. No. 13/459,160which was filed on Apr. 28, 2012. Both of the above-identified Applications are assigned to the assignee of the present application and included herein by reference. Subject matter disclosed but not claimed herein is disclosed and claimed in the referenced co-pending Applications.
Number | Name | Date | Kind |
---|---|---|---|
6779033 | Watson | Aug 2004 | B1 |
7797565 | Tran | Sep 2010 | B1 |
8593954 | Zhuang | Nov 2013 | B2 |
20020055980 | Goddard | May 2002 | A1 |
20020090003 | Melpignano | Jul 2002 | A1 |
20030022628 | Mamiya | Jan 2003 | A1 |
20030086395 | Shanbhag | May 2003 | A1 |
20030086407 | Bhatt | May 2003 | A1 |
20030128672 | Komandur | Jul 2003 | A1 |
20040033806 | Daniel | Feb 2004 | A1 |
20040103314 | Liston | May 2004 | A1 |
20040236802 | Baratakke | Nov 2004 | A1 |
20060077976 | Park | Apr 2006 | A1 |
20060200575 | Sherer | Sep 2006 | A1 |
20060271680 | Shalev | Nov 2006 | A1 |
20070050479 | Yoneda | Mar 2007 | A1 |
20070086461 | Ward | Apr 2007 | A1 |
20070245003 | Kashyap | Oct 2007 | A1 |
20080037420 | Tang | Feb 2008 | A1 |
20080114889 | Deshpande | May 2008 | A1 |
20080114894 | Deshpande | May 2008 | A1 |
20080228690 | Horovitz | Sep 2008 | A1 |
20080281979 | Keeler | Nov 2008 | A1 |
20090196178 | Stewart | Aug 2009 | A1 |
20090240766 | Kikkawa | Sep 2009 | A1 |
20090252047 | Coffey | Oct 2009 | A1 |
20100211640 | Beverly, IV | Aug 2010 | A1 |
20100211673 | Kosbab | Aug 2010 | A1 |
20100214919 | Kosbab | Aug 2010 | A1 |
20110113134 | Bello | May 2011 | A1 |
Entry |
---|
U.S. Appl. No. 13/459,160, Apr. 28, 2012. |
U.S. Appl. No. 13/459,160, Sep. 4, 2012. |
U.S. Appl. No. 13/459,160, Apr. 21, 2016. |
U.S. Appl. No. 13/459,160, Aug. 3, 2016. |
Number | Date | Country | |
---|---|---|---|
20170054804 A1 | Feb 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13459160 | Apr 2012 | US |
Child | 15331330 | US | |
Parent | 12614511 | Nov 2009 | US |
Child | 13459160 | US |