File access service

ABSTRACT

Systems and methods for facilitating access to files that are stored by network-accessible file storage services. An example system comprises a plurality of file access nodes including a control node, wherein the control node is configured to: receive a file access request initiated by a client, wherein the file access request comprises an identifier of a file, an identifier of a file storage service, and an access token associated with the file stored by the file storage service; request, using the access token, metadata associated with the file from the file storage service; define, using the metadata, a plurality of portions forming the file; and forward, to the plurality of file access nodes, identifiers of the plurality of portions.

RELATED APPLICATIONS

This patent application claims the benefit of priority as a continuation of U.S. patent application Ser. No. 17/321,981 filed May 17, 2021; which itself claims the benefit of priority as a continuation of U.S. patent application Ser. No. 16/799,347 filed Feb. 24, 2020, which has issued as U.S. Pat. No. 11,044,315; which itself claims the benefit of priority as a continuation of U.S. patent application Ser. No. 15/271,070 filed on Sep. 20, 2016, which has issued as U.S. Pat. No. 10,616,336, the entire contents of each being incorporated by reference herein.

TECHNICAL FIELD

The present disclosure relates to file access methods, and more particularly, to file access services facilitating access to files that are stored by network-accessible file storage services.

BACKGROUND

“File storage service” herein shall refer to a public or private network-accessible service that is capable of servicing users' requests with respect to storing or retrieving files identified by their respective file names.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of examples, and not by way of limitation, and may be more fully understood with references to the following detailed description when considered in connection with the figures, in which:

FIG. 1 depicts a high-level network diagram of an example distributed computer system, in which the systems and methods described herein may be implemented;

FIG. 2 schematically illustrates an example sequence diagram of a workflow facilitating access to files that are stored by network-accessible file storage services, in accordance with one or more aspects of the present disclosure;

FIG. 3 depicts a flow diagram of one illustrative example of method performed by a control node for facilitating access to files that are stored by network-accessible file storage services, in accordance with one or more aspects of the present disclosure;

FIG. 4 depicts a flow diagram of one illustrative example of method performed by a file access node for facilitating access to files that are stored by network-accessible file storage services, in accordance with one or more aspects of the present disclosure;

FIG. 5 depicts a flow diagram of one illustrative example of method performed by a client computing device for accessing files that are stored by network-accessible file storage services, in accordance with one or more aspects of the present disclosure;

FIG. 6 depicts a block diagram of an example computer system that may implement the methods of the present disclosure.

DETAILED DESCRIPTION

Described herein are systems and methods for facilitating access to files that are stored by network-accessible file storage services.

A user may employ one or more public or private file storage services for storing and retrieving various files, e.g., electronic documents, media content files, executable files, etc. However, most file storage services would only provide the basic file access functionality, e.g., streaming a file to a client computing device over a single connection, with or without the ability to re-start and continue an interrupted download session at a specified position within the file. Even if the file storage service supports streaming a file to a client computing device over multiple simultaneous connections, the overall download performance is limited by the bandwidth of the client's network connection to the service.

Systems and methods of the present disclosure improve the reliability and efficiency of the file access operations by providing a file access service that includes a plurality of file access nodes, each of which may, independently of its peer file access nodes, serve to the client at least a portion of the requested file, by retrieving the portion of the file from the local cache or by acting as a proxy in streaming the portion of the file from the file storage service to the client, while optionally storing in the local cache the file portion being streamed.

Responsive to receiving a file access request initiated by a client computing device, each of the file access nodes may determine the number of file portions that it may stream to the requesting client without deteriorating own performance metrics beyond certain pre-determined thresholds, as described in more details herein below. Conversely, the client-side logic distributes the file access requests among multiple file access nodes, as described in more details herein below. Thus, the systems and methods described herein represent improvements to the functionality of general purpose or specialized computing devices, by providing a file access service that optimizes the bandwidth usage by each of the file access nodes and the client computing device, while providing the reliable file access operations irrespective of one or more file access node failures.

The systems and methods described herein may be implemented by hardware (e.g., general purpose and/or specialized processing devices, and/or other devices and associated circuitry), software (e.g., instructions executable by a processing device), or a combination thereof. While the illustrative examples described herein below reference file download operations, same or similar methods may, without limitation, be applied to performing file upload operations. Various aspects of the above referenced methods and systems are described in details herein below by way of examples, rather than by way of limitation.

FIG. 1 depicts a high-level network diagram of an example distributed computer system 100, in which the systems and methods described herein may be implemented. As schematically illustrated by FIG. 1 , a user of a public or private file storage service 110 may need to access, by the client computing device 120, one or more files residing on the file storage service 110. In various illustrative examples, the client computing device 120 may be provided by a mobile computing device (such as a smartphone), a personal computer, or by any other suitable computing device equipped with a network interface and a user interface (such as a graphical user interface).

In certain implementations, the file storage service 110 may provide the basic file access functionality, e.g., streaming a file to the client computing device 120 over a single connection, and the ability to re-start and continue an interrupted download session at a specified position within the file. In accordance with one or more aspects of the present invention, the file download operations with respect to a user-requested file may be performed by two or more file access nodes 130A-130N coordinated by the control node 130C, thus improving the overall efficiency and reliability of the file access operations.

Each of file access nodes 130A-130N may, independently of other file access nodes, serve to the client computing device 120 at least a portion of the requested file, by retrieving the portion of the file from the local cache or by acting as a proxy in streaming the portion of the file from the file storage service 110 to the client computing device 120, while optionally storing in the local cache the file portion being streamed. Each file access node 130 may be communicatively coupled to the Internet 140 via one or more routers, firewalls, load balancers, and/or other auxiliary components that are omitted from FIG. 1 for clarity. At least one of the file access nodes 130, denoted herein as node 130C, may be designated as a control node, and may coordinate the activities performed by other file access nodes, as described in more details herein below. In certain implementations, the control node may further act as a file access node with respect to at least certain client computing devices and/or at least certain files.

The distributed computer system 100 may further comprise one or more cloud infrastructure brokers 150 employed to communicate with client computing devices 120 and coordinate the operation of various components of the example distributed computer system 100. While the cloud infrastructure broker 150 can be installed on a dedicated hardware server, one or more cloud infrastructure brokers 150 may alternatively be collocated with a file access node 130 (e.g., the control node 130C) on a single hardware server. In certain implementations, the distributed computer system 100 may further comprise various additional components which have been omitted from FIG. 1 for conciseness and clarity.

FIG. 2 schematically illustrates an example sequence diagram 200 of a workflow facilitating access to files that are stored by network-accessible file storage services, in accordance with one or more aspects of the present disclosure. As schematically illustrated by FIG. 2 , the client computing device 120 may, upon successfully establishing a session (205) with the file storage service 110, receive (210) one or more session keys, file access tickets, and/or other digital artifacts (referred to herein as “access tokens”) that may be presented to the file storage service 110 for receiving access to one or more user-specified files. The client computing device 120 may then securely transmit (215) the access tokens to the control node 130C (e.g., via the cloud infrastructure broker 150, which is omitted from FIG. 2 for conciseness and clarity), in association with a file access request identifying one or more files and the file storage service 110 that stores the requested files.

Responsive to receiving the file access request, the control node 130C may utilize the received access token to request (220) the file storage service 110 to provide, for each file specified by the file access request, the metadata associated with the file. The file metadata (225) may include the file size and other parameters of the file.

The control node 130C may then identify one or more file access nodes 130 that may be employed to serve portions of the file to the client computing device 120. In an illustrative example, the control node may identify a certain number of file access nodes that currently have the minimal, among all nodes, workload. Alternatively, the control node may identify a subset of the file access nodes 130 that are geographically closest to the client computing device 120. The number of control nodes may be determined based on the file size, e.g., by dividing the file size by a pre-determined value. Alternatively, the control node may identify all available file access nodes 130. As noted herein above, the control node may further act as a file access node with respect to at least certain client computing devices and/or at least certain files.

Responsive to identifying the file access nodes to serve the client request, the control node 130C may forward (230) the file metadata and the file access token to the identified file access nodes 130. The file metadata may include the file size, the size of a portion of the file to be transmitted to the client computing device, and/or a list of identifiers of the file portions. A file portion may be identified by its ordinal number in the sequence of file portions of a given file and/or by the offset of the respective portion relative to the top of the file. The control node 130C may further forward (235) a list of identified file access nodes and the file metadata to the client computing device 120 (e.g., via the cloud infrastructure broker 150).

Responsive to receiving the list of file access nodes designated for servicing the current file access request, the client computing device 120 may select one or more file access nodes for further requesting portions of the file. In an illustrative example, the client computing device 120 may ping the file access nodes and select one or more nodes demonstrating the best response time. In another illustrative example, the client computing device 120 may select one or more nodes associated with the network connections having the maximum available bandwidth among the network connections to the plurality of file access nodes. The client computing device 120 may then poll (240) the selected file access nodes 130 to request a list of available file portions.

A file access node 130 being polled may optionally ascertain whether any of the file portions are stored in the local cache, and if so, return (245) to the client computing device a list of identifiers of such file portions. Additionally or alternatively, the file access node 130 may determine the number of file portions that it may stream to the client computing device 120 without deteriorating own performance metrics beyond certain pre-determined thresholds. In an illustrative example, the file access node 130 may estimate the available network bandwidth to the file storage service 110 and to the client computing device 120 and/or the round-trip time to the file storage service 110 and to the client computing device 120. Should the available network bandwidth exceed a first pre-defined threshold and the round trip times fall below a second pre-defined threshold, the file access node 130 may determine the number of the file portions to be served to the client computing device 120. In an illustrative example, the file access node 130 may determine the number of file portions to be served as being proportional to the ratio of the difference of the available network bandwidth and the first pre-defined threshold to the file portion size. Responsive to estimating the number of the file portions to be served, the file access node 130 may return (245) to the client computing device a list of identifiers of the file portions that the file access node 130 is prepared to serve. In an illustrative example, the file access node 130 may randomly generate the requisite number of identifiers of the file portions, thus minimizing the probability of the client computing device receiving the same or substantially similar lists of file portion identifiers from two or more file access nodes 130.

Responsive to receiving the list of the file portion identifiers, the client computing device 120 may identify the file portions that it still is missing, and transmit to the corresponding file access node 130 a file portion download request (250) specifying the identified file portions. The file access node 130 may respond (255) by transmitting the requested file portion to the client computing device 120. In an illustrative example, the file access node 130 may retrieve the requested file portion from the local cache. Alternatively, responsive to failing to retrieve the requested file portion from the local cache, the file access node 130 may stream the requested file portion from the file storage service to the client computing device 120, while optionally storing in the local cache the file portion being streamed. The workflow terminates when the client computing device 120 determines that it has all the portions of the requested file.

In certain implementations, the control node 130C may perform real-time monitoring of the workload of the plurality of file access nodes 130. In an illustrative example, responsive to determining that the workload of one or more file access nodes 130 exceeds a certain threshold value, the control node 130 may initiate provisioning of one or more additional file access nodes (e.g., switch one or more standby file access nodes to an active state and/or configure new hosts for acting as file access nodes). The workload may be estimated using peak or aggregated values of one or more performance metrics, including, for example, the utilized network bandwidth, the CPU load, the utilized disk space, etc.

In certain implementations, the control node 130 may prevent the overall system performance deterioration by initiating provisioning of one or more additional file access nodes in anticipation of a spike in the client activity. In an illustrative example, the control node may predict the file access nodes workload level based on analyzing historic data reflecting the workload of one or more file access nodes.

FIG. 3 depicts a flow diagram of one illustrative example of method 300 of facilitating access to files that are stored by network-accessible file storage services, in accordance with one or more aspects of the present disclosure. Method 300 and/or each of its individual functions, routines, subroutines, or operations may be performed by one or more processing devices of the computer system (e.g., the control node 130C of FIG. 1 ) implementing the method. In certain implementations, method 300 may be performed by a single processing thread. Alternatively, method 300 may be performed by two or more processing threads, each thread executing one or more individual functions, routines, subroutines, or operations of the method. In an illustrative example, the processing threads implementing method 300 may be synchronized (e.g., using semaphores, critical sections, and/or other thread synchronization mechanisms). Alternatively, the processing threads implementing method 300 may be executed asynchronously with respect to each other. In various illustrative examples, at least some of the operations described herein as being performed by the control node 130, may be performed by other components of the example distributed computer system 100.

At block 310, a processing device of a control node implementing the method may receive a file access request initiated by a client computing device. The file access request may comprises a file identifier, a file storage service identifier, and an access token associated with the file stored by the file storage service, as described in more details herein above.

At block 320, the processing device of the control node may request, using the access token, the metadata associated with the file from the file storage service. The file metadata may include the file size and other parameters of the file, as described in more details herein above.

At block 330, the processing device of the control node may define, using the received file metadata, a plurality of portions forming the file. In an illustrative example, all file portions except for the last one may have the same size, which may be provided by a pre-determine value of by a configurable parameter. Each file portion may be identified by its ordinal number in the sequence of file portions of a given file and/or by the offset of the respective portion relative to the top of the file, as described in more details herein above.

At block 340, the processing device of the control node may identify a plurality of file access nodes that may be employed to serve portions of the file to the requesting client computing device. In an illustrative example, the processing device may identify a certain number of file access nodes that currently have the minimal, among all nodes, workload. In yet another illustrative example, the processing device may identify a subset of the file access nodes that are geographically closest to the requesting client computing device. The number of control nodes may be determined based on the file size, e.g., by dividing the file size by a pre-determined value. In yet another illustrative example, the processing device may look up a hash table mapping file identifiers to file access node identifiers. In yet another illustrative example, the control node may identify all available file access nodes, as described in more details herein above.

At block 350, the processing device of the control node may forward the file metadata and the file access token to the plurality of file access nodes. The file metadata may include the file size, the size of a portion of the file to be transmitted to the client computing device, and/or a list of identifiers of the file portions, as described in more details herein above.

At block 360, the processing device of the control node may cause the list of identifiers of the plurality of file access nodes to be transmitted to the client computing device. In an illustrative example, the control node may transmit the list to the cloud infrastructure brokers for forwarding to the requesting client computing device, as described in more details herein above. Responsive to completing operations described with reference to block 360, the method may terminate.

FIG. 4 depicts a flow diagram of one illustrative example of method 400 of facilitating access to files that are stored by network-accessible file storage services, in accordance with one or more aspects of the present disclosure. Method 400 and/or each of its individual functions, routines, subroutines, or operations may be performed by one or more processing devices of the computer system (e.g., a file access node 130 of FIG. 1 ) implementing the method. In certain implementations, method 400 may be performed by a single processing thread. Alternatively, method 400 may be performed by two or more processing threads, each thread executing one or more individual functions, routines, subroutines, or operations of the method. In an illustrative example, the processing threads implementing method 400 may be synchronized (e.g., using semaphores, critical sections, and/or other thread synchronization mechanisms). Alternatively, the processing threads implementing method 400 may be executed asynchronously with respect to each other. In various illustrative examples, at least some of the operations described herein as being performed by the control node 140, may be performed by other components of the example distributed computer system 100.

At block 410, a processing device of a file access node implementing the method may receive a file access request originated by a client computing device. The file access request may comprises a file identifier, a file storage service identifier, and an access token associated with the file stored by the file storage service, as described in more details herein above.

At block 420, the processing device of the file access node may identify, using the file metadata supplied by the file access request, one or more portions of the file to be served to the client computing device. In an illustrative example, the processing device may optionally ascertain whether any of the file portions are stored in the local cache. Additionally or alternatively, the processing device may determine the number of file portions that it may stream to the client computing device without deteriorating own performance metrics beyond certain pre-determined thresholds. In an illustrative example, the processing device may determine the number of file portions to be served as being proportional to the ratio of the difference of the available network bandwidth and the first pre-defined threshold to the file portion size, as described in more details herein above.

At block 430, the processing device of the file access node may transmitting, to the requesting client computing device, a response comprising identifiers of the file portions that the file access node is prepared to serve. In an illustrative example, the processing device may randomly generate the requisite number of identifiers of the file portions, thus minimizing the probability of the client computing device receiving the same or substantially similar lists of file portion identifiers from two or more file access nodes, as described in more details herein above.

At block 440, the processing device of the file access node may receive a file portion download request initiated by the client computing device. The request may specify one or more file portion identifiers, as described in more details herein above.

At block 450, the processing device of the file access node may transmit the requested file portions to the client computing device. In an illustrative example, the file access node may retrieve the requested file portion from the local cache. Alternatively, responsive to failing to retrieve the requested file portion from the local cache, the file access node may stream the requested file portion from the file storage service to the client computing device, while optionally storing in the local cache the file portion being streamed, as described in more details herein above. Responsive to completing operations described with reference to block 450, the method may terminate.

FIG. 5 depicts a flow diagram of one illustrative example of method performed by a client computing device for accessing files that are stored by network-accessible file storage services, in accordance with one or more aspects of the present disclosure. Method 500 and/or each of its individual functions, routines, subroutines, or operations may be performed by one or more processing devices of the computer system (e.g., the client computing device 120 of FIG. 1 ) implementing the method. In certain implementations, method 500 may be performed by a single processing thread. Alternatively, method 500 may be performed by two or more processing threads, each thread executing one or more individual functions, routines, subroutines, or operations of the method. In an illustrative example, the processing threads implementing method 500 may be synchronized (e.g., using semaphores, critical sections, and/or other thread synchronization mechanisms). Alternatively, the processing threads implementing method 500 may be executed asynchronously with respect to each other. In various illustrative examples, at least some of the operations described herein as being performed by the control node 150, may be performed by other components of the example distributed computer system 100.

At block 510, a processing device of a client computing device implementing the method may transmit a file access request to a cloud infrastructure broker. The file access request may comprises a file identifier, a file storage service identifier, and an access token associated with the file stored by the file storage service, as described in more details herein above.

At block 520, the processing device of the client computing device may receive, from the cloud infrastructure broker, a list a plurality of file access nodes that are prepared to serve portions of the requested file, as described in more details herein above.

At block 530, the processing device of the client computing device may select, from the received list, one or more file access nodes for further requesting portions of the file, as described in more details herein above. In certain implementations, the processing device may ping the file access nodes and select one or more nodes demonstrating the best response time. In another illustrative example, the processing device may select one or more nodes associated with the network connections having the maximum available bandwidth among the network connections to the plurality of file access nodes, as described in more details herein above.

The operations described with references to blocks 540-560 may be performed, sequentially or in parallel, independently and asynchronously, with respect to one or more of the selected file access nodes.

At block 540, the processing device of the client computing device may request, from the selected file access node, a list of available portions of the file, as described in more details herein above.

At block 550, the processing device of the client computing device may request, from the selected file access node, a portion of the file referenced by the list of available portions, as described in more details herein above.

At block 560, the processing device of the client computing device may receive, from the selected file access node, the requested portion of the file, as described in more details herein above.

Responsive to determining, at block 570, that all portions of the file have been successfully received, the method may terminate; otherwise, the method may loop back to block 550.

FIG. 6 schematically illustrates a component diagram of an example computer system 1000 which may perform any one or more of the methods described herein. In various illustrative examples, computer system 1000 may represent a client computing device 120, a file access node 130, or a cloud infrastructure broker 150 of FIG. 1 .

Example computer system 1000 may be connected to other computer systems in a LAN, an intranet, an extranet, and/or the Internet. Computer system 1000 may operate in the capacity of a server in a client-server network environment. Computer system 1000 may be a personal computer (PC), a set-top box (STB), a server, a network router, switch or bridge, or any device capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that device. Further, while only a single example computer system is illustrated, the term “computer” shall also be taken to include any collection of computers that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methods discussed herein.

Example computer system 1000 may comprise a processing device 1002 (also referred to as a processor or CPU), a main memory 1004 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM), etc.), a static memory 1006 (e.g., flash memory, static random access memory (SRAM), etc.), and a secondary memory (e.g., a data storage device 1018), which may communicate with each other via a bus 1030.

Processing device 1002 represents one or more general-purpose processing devices such as a microprocessor, central processing unit, or the like. More particularly, processing device 1002 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, processor implementing other instruction sets, or processors implementing a combination of instruction sets. Processing device 1002 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. In accordance with one or more aspects of the present disclosure, processing device 1002 may be configured to execute instructions implementing methods 300, 400 and/or 500 for facilitating access to files that are stored by network-accessible file storage services.

Example computer system 1000 may further comprise a network interface device 1008, which may be communicatively coupled to a network 1020. Example computer system 1000 may further comprise a video display 1010 (e.g., a liquid crystal display (LCD), a touch screen, or a cathode ray tube (CRT)), an alphanumeric input device 1012 (e.g., a keyboard), a cursor control device 1014 (e.g., a mouse), and an acoustic signal generation device 1016 (e.g., a speaker).

Data storage device 1018 may include a computer-readable storage medium (or more specifically a non-transitory computer-readable storage medium) 1028 on which is stored one or more sets of executable instructions 1026. In accordance with one or more aspects of the present disclosure, executable instructions 1026 may comprise executable instructions encoding various functions of methods 300, 400 and/or 500 for facilitating access to files that are stored by network-accessible file storage services.

Executable instructions 1026 may also reside, completely or at least partially, within main memory 1004 and/or within processing device 1002 during execution thereof by example computer system 1000, main memory 1004 and processing device 1002 also constituting computer-readable storage media. Executable instructions 1026 may further be transmitted or received over a network via network interface device 1008.

While computer-readable storage medium 1028 is shown in FIG. 6 as a single medium, the term “computer-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of VM operating instructions. The term “computer-readable storage medium” shall also be taken to include any medium that is capable of storing or encoding a set of instructions for execution by the machine that cause the machine to perform any one or more of the methods described herein. The term “computer-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media.

Some portions of the detailed descriptions above are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.

It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “identifying,” “determining,” “storing,” “adjusting,” “causing,” “returning,” “comparing,” “creating,” “stopping,” “loading,” “copying,” “throwing,” “replacing,” “performing,” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.

Examples of the present disclosure also relate to an apparatus for performing the methods described herein. This apparatus may be specially constructed for the required purposes, or it may be a general purpose computer system selectively programmed by a computer program stored in the computer system. Such a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic disk storage media, optical storage media, flash memory devices, other type of machine-accessible storage media, or any type of media suitable for storing electronic instructions, each coupled to a computer system bus.

The methods and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear as set forth in the description below. In addition, the scope of the present disclosure is not limited to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the present disclosure.

It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other implementation examples will be apparent to those of skill in the art upon reading and understanding the above description. Although the present disclosure describes specific examples, it will be recognized that the systems and methods of the present disclosure are not limited to the examples described herein, but may be practiced with modifications within the scope of the appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense. The scope of the present disclosure should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. 

What is claimed is:
 1. A method, comprising: identifying a plurality of file access nodes by a computer system connected to a network to service a file access request initiated by a client computing device also connected to the network where the file access request comprises an identifier of a file and the computer system implements a control node; and identifying a subset of the plurality of file access nodes from which to download a plurality of portions forming the file to the client computing device; and downloading the plurality of portions forming the file from the subset of the plurality of file access nodes to the client computing device; wherein each file access node of the plurality of file access nodes is an electronic device connected to the network supporting download operations to the client computing device.
 2. The method according to claim 1, wherein the subset of the plurality of file access nodes are established by at least one of the client computing device and the control node as those file access nodes within the plurality of file access nodes that at least one of have a lowest workload and are geographically closest to the client computing device.
 3. The method according to claim 1, wherein the subset of the plurality of file access nodes are established by at least one of the client computing device and the control node in dependence upon a process comprising: pinging the plurality of file access nodes; determining a response time of a set of response times for each of the file access nodes within the plurality of file access nodes; and selecting the subset of the plurality of file access nodes as those file access nodes within the plurality of file access nodes having a best response time of the set of response times.
 4. The method according to claim 1, wherein the subset of the plurality of file access nodes are established by at least one of the client computing device and the control node in dependence a process comprising: pinging the plurality of file access nodes; determining an available bandwidth of a network connection from the client computing device for each of the subset of the plurality of file access nodes within the pinged plurality of file access nodes; and selecting the subset of the plurality of file access nodes as those file access nodes within the plurality of file access nodes having a highest available bandwidth of a set of determined available bandwidths.
 5. The method according to claim 1, wherein at least one of the step of identifying the subset of the plurality of file access nodes and the step of downloading the plurality of portions forming the file from the subset of the plurality of file access nodes employs a process comprising the additional steps of: polling each file access node within the one of the plurality of file access nodes when the step is that of identifying and the subset of the plurality of the file access nodes when the step is that of downloading; receiving from each of the polled file access nodes a list of identifiers of file portions that the polled file access node can serve to the client computing device; wherein each of the polled file access nodes establishes a number of file portions that it can serve in dependence upon the process comprising: estimating at least one of: an available bandwidth from the polled file access node to both the client computing device and to a file storage device associated with the polled file access node storing the number of file portions of the file; and a round trip time to the file storage device and to the client computing device; and establishing the number of file portions in dependence upon determining at least one of whether the available bandwidth exceeds a first pre-defined threshold when the available bandwidth is estimated and whether the round trip time falls below a second pre-defined threshold when the round trip time is estimated.
 6. The method according to claim 1, wherein at least one of the step of identifying the subset of the plurality of file access nodes and the step of downloading the plurality of portions forming the file from the subset of the plurality of file access nodes employs a process comprising the additional steps of: polling each file access node within the one of the plurality of file access nodes when the step is that of identifying and the subset of the plurality of the file access nodes when the step is that of downloading; receiving from each of the polled file access nodes a list of identifiers of file portions that the file access node can serve to the client computing device; wherein each of the polled file access nodes establishes a number of file portions that it can serve in dependence upon the process comprising: estimating at least one of: an available bandwidth from the polled file access node to both the client computing device and to a file storage device associated with the polled file access node storing one or more portions of the file; and a round trip time to the file storage device and to the client computing device; establishing the number of file portions in dependence upon determining at least one of whether the available bandwidth exceeds a first pre-defined threshold when the available bandwidth is estimated and whether the round trip time falls below a second pre-defined threshold when the round trip time is estimated; and the number of file portions to be served is established in dependence upon a ratio of a difference between the available bandwidth and the first pre-defined threshold and a file portion size.
 7. The method according to claim 1, wherein at least one of the step of identifying the subset of the plurality of file access nodes and the step of downloading the plurality of portions forming the file from the subset of the plurality of file access nodes employs a process comprising the additional steps of: polling each file access node within the one of the plurality of file access nodes when the step is that of identifying and the subset of the plurality of the file access nodes when the step is that of downloading; receiving from each of the polled file access nodes a list of identifiers of the plurality of portions forming the file that the polled file access node can serve to the client computing device; wherein a number of identifiers in the list of identifiers of the plurality of portions that the polled file access node can serve to the client computing device is established by that polled file access node; and the identifiers within the list of identifiers of file portions are randomly selected from the identifiers of file portions the polled file access node can serve to the client computing device.
 8. The method according to claim 1, further comprising at least one of the step of identifying the subset of the plurality of file access nodes and the step of downloading the plurality of portions forming the file from the subset of the plurality of file access nodes employs a process comprising the additional steps of: polling each file access node within the one of the plurality of file access nodes when the step is that of identifying and the subset of the plurality of the file access nodes when the step is that of downloading; receiving from each of the polled file access nodes a list of identifiers of the downloaded plurality of portions forming the file that the polled file access node can serve to the client computing device; wherein each of the polled file access nodes establishes a number of identifiers in the list of identifiers of the downloaded plurality of portions forming the file that it can serve to the client computing device.
 9. The method according to claim 1, at least one of the step of identifying the subset of the plurality of file access nodes and the step of downloading the plurality of portions forming the file from the subset of the plurality of file access nodes employs a process comprising the additional steps of: polling each file access node within the one of the plurality of file access nodes when the step is that of identifying and the subset of the plurality of the file access nodes when the step is that of downloading; receiving from each of the polled file access nodes of the plurality of file access nodes a list of identifiers of the downloaded plurality of portions forming the file that the polled file access node of the plurality of file access nodes it can serve to the client computing device; determining, upon the client computing device, file portions missing of the downloaded plurality of portions forming the file; and transmitting to one or more polled file access nodes of the subset of the plurality of file access nodes the identifiers of the missing file portions of the downloaded plurality of portions forming the file.
 10. The method according to claim 1, wherein the step of downloading the plurality of portions forming the file from the subset of the plurality of file access nodes to the client computing device further comprises: monitoring a workload of the subset of the plurality of file access nodes; determining whether the workload of a file access node of the subset of the plurality of file access nodes exceeds a threshold value; upon determining the workload of the file access node of the subset of the plurality of file access nodes exceeds the threshold value initiating the control node to provision of one or more additional file access nodes.
 11. The method according to claim 1, wherein the step of downloading the plurality of portions forming the file from the subset of the plurality of file access nodes to the client computing device further comprises: analysing historic data reflecting workloads of the file access nodes of the subset of the plurality of file access nodes; and initiating provisioning of one or more additional file access nodes in dependence upon a projected spike in the workloads of the one or mom file access nodes of the subset of the plurality of access nodes analysed.
 12. The method according to claim 1, wherein the step of identifying the subset of the plurality of file access nodes from which to download the plurality of the portions forming the file to the client computing device further comprises: analysing historic data reflecting workloads of the file access nodes of the plurality of file access nodes; and establishing the subset of the plurality of file access nodes in dependence upon a projected spike in the workloads of one or mom the file access nodes of the plurality of access nodes.
 13. The method according to claim 1, wherein the step of downloading the plurality of portions forming the file from the subset of the plurality of file access nodes to the client computing device further comprises: determining whether a workload of a file access node of the subset of the plurality of file access nodes will exceed a threshold value; upon determining the workload of the file access node of the subset of the plurality of file access nodes will exceed the threshold value initiating provisioning of one or more additional file access nodes; wherein the determination of whether the workload of the file access node of the subset of the plurality of file access nodes is established in dependence upon analysing historic data reflecting the workload of the file access node of the subset of the plurality of file access nodes.
 14. The method according to claim 1, wherein the step of identifying the subset of the plurality of file access nodes comprises establishing a number of the file access nodes to form the subset of the plurality of file access nodes; and the number of the file access nodes to form the subset of the plurality of file access nodes is established in dependence upon a size of the file.
 15. The method according to claim 1, wherein the step of identifying the subset of the plurality of file access nodes comprises establishing a number of the file access nodes to form the subset of the plurality of file access nodes; and the number of the file access nodes to form the subset of the plurality of file access nodes is established in dependence upon dividing a size of the file by a predetermined value.
 16. The method according to claim 1, further comprising establishing file metadata associated with the file; wherein one or more of the at least one of the step of identifying and the step of downloading comprises a process comprising the additional steps of: when the step is identifying providing the file metadata to the plurality of file access nodes and polling each file access node of the plurality of file access nodes; when the step is downloading providing the file metadata to the subset of the plurality of file access nodes and polling each file access node of the subset of the plurality of file access nodes; receiving from each of the polled file access nodes a list of identifiers of the downloaded plurality of portions forming the file that the polled file access node can serve to the client computing device; wherein each of the polled file access nodes establishes a number of downloaded plurality of portions forming the file that it can serve in dependence upon a ratio of a difference of an available network bandwidth from the polled file access node to both the client computing device and to a file storage device associated with the polled file access storing the number of downloaded plurality of portions forming the file and a file portion size; and the file metadata comprises the file portion size.
 17. The method according to claim 1, wherein when the step is identifying the identification of the subset of the plurality of file access nodes from which to download the plurality of portions forming the file to the client computing device the method further comprises: establishing file metadata associated with the file and transmitting the file metadata to the plurality of file access nodes; establishing, with the control node, the subset of the plurality of file access nodes from the plurality of file access nodes in dependence upon responses received from the plurality of file access nodes; and transmitting identifiers of the plurality of file access nodes to the client computing device; the client computing device determines the subset of the plurality of file access nodes; the received responses from each of the file access nodes of another plurality of file access nodes comprises a number of file portions that the file access node of the plurality of file access nodes can serve; the number of file portions that the file access node of the plurality of file access nodes can serve is established when the file access node of the plurality of file access nodes determines at least one of whether an available bandwidth exceeds a first pre-defined threshold and whether a round trip time falls below a second pre-defined threshold; the available bandwidth is a bandwidth from the file access node of the plurality of file access nodes to both the client computing device and to a file storage device associated with the file access node of the plurality of file access nodes; and the round trip time is to and from the file access node of the plurality of file access nodes to the file storage device and to the client computing device.
 18. The method according to claim 1, wherein when the step is identifying the identification of the subset of the plurality of file access nodes from which to download the plurality of portions forming the file to the client computing device the method further comprises: establishing file metadata associated with the file and transmitting the file metadata to another plurality of file access nodes; establishing, with the control node, the plurality of file access nodes from the plurality of file access nodes in dependence upon responses received from the another plurality of file access nodes; transmitting identifiers of the plurality of file access nodes to the client computing device; and transmitting with each identifier of a file access node of the plurality of file access nodes a number of file portions the file access node of the plurality of file access nodes can serve; the client computing device determines the subset of the plurality of file access the received responses from each of the file access nodes of the plurality of file access nodes comprises the number of file portions that the file access node of the plurality of file access nodes can serve; the number of file portions that the file access node of the plurality of file access nodes can be served is established when the file access node of the plurality of file access nodes determines at least one of whether an available bandwidth exceeds a first pre-defined threshold and whether a round trip time falls below a second pre-defined threshold; the available bandwidth is a bandwidth from the file access node of the plurality of file access nodes to both the client computing device and to a file storage device associated with the file access node of the plurality of file access nodes; the round trip time is to and from the file access node of the plurality of file access nodes to the file storage device and to the client computing device; the number of file portions that the file access node of the plurality of file access nodes can served is established in dependence upon a ratio of a difference of the available network bandwidth and the first pre-defined threshold and a file portion size; and the file portion size forms part of the file metadata. 