Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Write-in method of key/value database memory log

A database and memory technology, applied in the direction of electrical digital data processing, special data processing applications, instruments, etc., can solve problems such as loss, achieve the effect of improving concurrency, rationally utilizing hardware resources, and reducing random IO

Inactive Publication Date: 2015-07-29
HIGH TECH CO IEAS BEIJING CHINA
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there is no Log file, because the written record is stored in the memory at the beginning, if the system crashes at this time, the data in the memory has not had time to be stored on the disk, and it will be lost due to memory restart or power failure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Write-in method of key/value database memory log
  • Write-in method of key/value database memory log

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0023] The main function of the log file (Log file) in the system is to prevent data loss when the system crashes and recovers. Since all write operations in the prior art need to be written to the log first, the writing of the log has become the performance of the entire system. where the bottleneck is.

[0024] In order to improve the writing speed of the log file, the present invention attempts to decompose the operation of writing into the log file into multiple files written at the same time through the Hash algorithm, but in actual use, it is found that the writing efficiency of the database does not improve, but greatly reduce. The analysis shows that after the log file is hashed, it will be written into different...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a write-in method of a key / value database memory log. The method comprises the following steps that according to the number N of disks capable of being practically used by a system, N log files are written in the disks in parallel, and in addition, each file in the N log files is put in different disks. According to the method, the key / value database log file is split into a plurality of sub files by adopting a Hash algorithm, the multi-disc characteristics are sufficiently utilized, and meanwhile, the sub files are written into different disks in parallel, so that the I / O (input / output) seek time is effectively reduced, the write-in concurrency of the key / value database log is improved, and the fast and efficient log write-in is realized.

Description

technical field [0001] The present application relates to the field of computer memory management, and more specifically relates to a method for writing a key-value database memory log. Background technique [0002] Common database systems use the WAL (Write Ahead Logging) writing strategy, that is, when modifying data, it is not directly written into the database file, but first written into the log file (Log file); if the transaction fails, the records in the log will be ignored, and the modification will be undone; if the transaction succeeds, it will be written back to the database file at some later time, and the modification will be committed. [0003] The Log file is used as the log of the database system, and its working principle is: the database first records the operation into the Log file before writing it into the memory, and then writes it into the memory, so that even if the system crashes, the corresponding data can be recovered from the Log file, thereby Av...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
Inventor 刘斌台宪青楚涌泉程子轩
Owner HIGH TECH CO IEAS BEIJING CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products