Collocation method and device of Hash database

A configuration method and a configuration device technology, applied in the computer field, can solve problems such as low access efficiency of a hash database, and achieve the effects of avoiding disk IO operations, improving operation efficiency, and stabilizing the number of times.

Inactive Publication Date: 2014-02-19
HUAWEI TECH CO LTD
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can solve the problem of low access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collocation method and device of Hash database
  • Collocation method and device of Hash database
  • Collocation method and device of Hash database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0056] see figure 2 , is a schematic flowchart of a method for configuring a hash database according to the first embodiment of the present invention. In this embodiment, the method includes:

[0057] S101. Create an index area and a data area on a disk, where the index area consists of p disk pages of equal size.

[0058] Specifically, an index area and a data area are opened in the free space on the disk. The index area is used to store the Key in the Key-Value...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a collocation method of a Hash database. The collocation method of the Hash database comprises the steps that an index area and a data area are developed on a disk, wherein the index area is composed of p disk pages with the same size; a collocation request of a Key-Value pair is received; m Keys in the Key-Value pair are distributed into the disk pages of the index area and n Values in the Key-Value pair are distributed into the data area, wherein m, n and p are all integers greater than one. The embodiment of the invention further discloses a collocation device of the Hash database. By the adoption of the collocation method and device of the Hash database, the access efficiency of the Hash database is improved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a configuration method and device for a hash database. Background technique [0002] With the development of the network, information has shown explosive growth, and human data has reached an unprecedented scale. The storage and management of these ultra-large-scale data has become a major challenge. The P2P (Pear to Pear) storage system based on DHT (Distributed Hash Table) technology has high scalability, supports large-scale data storage, and can better deal with this challenge. The underlying storage engine of this storage system is generally Key-Value database, hereinafter referred to as K-V database, is a non-relational database that stores and accesses data in the form of key-value pairs. The usual data access operations include insertion, search, and deletion. The data access forms are generally as follows: put (key, & value), get (key, & value), delete (key), where key is the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F16/2255G06F3/0604G06F3/0638G06F3/0674G06F3/0619G06F16/2228G06F16/9024G06F3/065
Inventor 张雷鲍栋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products