Log recovery method in memory data management and log recovery simulation system in memory data management

A technology of memory data and recovery method, which is applied in the field of data management, can solve the problems of high memory price and inability to be widely used, and achieve the effects of reducing complexity, improving speed and security

Active Publication Date: 2015-12-16
NORTHEASTERN UNIV
View PDF4 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the price of memory like SSD is still high and cannot be widely used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log recovery method in memory data management and log recovery simulation system in memory data management
  • Log recovery method in memory data management and log recovery simulation system in memory data management
  • Log recovery method in memory data management and log recovery simulation system in memory data management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The present invention uses "cluster environment" or "multi-machine environment" to represent a distributed concept. In the cluster environment, the main consideration is to divide data into multiple machines for storage. In a cluster environment, each machine node is called a node. Due to the common use of multi-core CPUs in modern computers, some multi-threaded tasks can run on multiple cores in a node, and a core of a CPU is called a site. . Existing in-memory database systems such as VoltDB and SiloR use the advantages of multiprocessors in clusters and cluster nodes to distribute tasks to multiple threads, since each processor core can handle at least one thread (in hyperthreaded CPUs can handle two threads). The system classifies transactions into transactions within a node and transactions across nodes, and tries to put related transaction processes in a node site, so that if a transaction in a site rolls back, it will only affect this node. Also for logs, all s...

Embodiment 2

[0101] Such as Figure 4 As shown, a log recovery simulation system in memory data management, including a master node and a Redis instance, wherein;

[0102] The master node includes a mapping list, a transaction simulator, and a recovery simulator; the master node maintains control and obtains the state of the Redis instance through a network connection. The program of the master node runs on a computer with high performance configuration. It is mainly responsible for all functions except data and log storage, including sending read and write commands, simulating the progress of transactions, and controlling the timing of reading and writing logs, etc. . The master node program is written in the Java programming language client Jedis recommended by Redis, and Jedis can call the API to control the operation of the cluster. The main components of the master node see figure 2 .

[0103] The mapping list stores the data items and the corresponding specific node numbers in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a log recovery method in memory data management and a log recovery simulation system in memory data management, and relates to the technical field of data management. The method comprises the following steps that: (1) a main node obtains a node ID (identification) of a cluster node; a data write-in command is sent to the cluster node; the cluster node performs data storage; and the main node forms a mapping table; (2) the main node sends a cluster node log command to a log node matched with the cluster mode according to the node ID; and the log node stores the log, performs persistence on the log, and then successfully records information into the main node log; and (3) when the cluster node fails, the transaction execution is stopped; and the main node obtains a fault node ID and obtains log records in the log node for recovery. Partial fault nodes in the cluster node can achieve the self recovery state; the mutual transmission of relevant data item information is not needed; the log recovery complexity is reduced; the log recovery speed is accelerated; and the security guarantee is achieved.

Description

technical field [0001] The invention relates to the technical field of data management, in particular to a log recovery method in memory data management and a simulation system thereof. Background technique [0002] In-memory data management technology, especially in-memory database technology, relies on memory for data calculation and storage, and has the characteristics of high concurrency, high throughput, and low latency, so it is widely used in occasions that require extremely high performance. However, since memory is a volatile storage medium, and in-memory databases often undertake the tasks of high throughput and high-speed access, the risk of data loss is huge. This kind of loss often brings huge property losses to the users of the database. [0003] In recent years, with the substantial improvement of hardware performance and the substantial reduction of cost, research in the field of memory data management has received more widespread attention. Among them, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/34G06F11/14G06F17/30
Inventor 吴刚王国仁江泽源李梁王显宇郎文博邱煜晶刘洪伟
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products