Log structure combination tree-based two-stage combination method

A stage and log technology, applied in the field of information storage, can solve the problems of high read-write amplification rate access delay jitter, unsuitable for non-durable devices, storage service performance degradation, etc., to reduce the read-write amplification rate and solve write amplification and storage service performance degradation, device random read performance improvement effect

Active Publication Date: 2017-12-29
RENMIN UNIVERSITY OF CHINA
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the merge operation is to push down the data, it is inevitable to read and write a file in the upper layer, and the only way to reduce the read and write amplification ratio is to start from the lower layer.
However, the high reading and writing amplification ratio of the log-structured merge tree will also lead to obvious access delay and jitter, which is not suitable for applications in non-durable devices, and often cannot provide high-quality storage services in practical applications.
[0004] To sum up, the existing data merging method of log-structured merging tree is a single-stage merging method, that is, selecting a small number of upper-level data and a lot of lower-level data for merging. This merging method is relatively simple, but it will cause serious writing problems. Amplification and storage service performance degradation issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log structure combination tree-based two-stage combination method
  • Log structure combination tree-based two-stage combination method
  • Log structure combination tree-based two-stage combination method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be described in detail below in conjunction with the accompanying drawings. However, it should be understood that the accompanying drawings are provided only for better understanding of the present invention, and they should not be construed as limiting the present invention.

[0017] Such as figure 1 As shown, the two-stage merging method can be divided into two steps: the linking stage and the merging stage. When an upper-level file A is selected as the target file by the merging process, it starts to enter the linking stage. The merging operation at this stage does not need to be executed immediately, but Split the upper-level file A according to the key value range. Assuming that the upper-level file A needs to be merged with the lower-level files B, C, and D, the upper-level file A needs to be divided into three slices (Slice), and the key value range of each slice corresponds to the lower-level files B, C, and D respectively. When ther...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a log structure combination tree-based two-stage combination method. The method comprises the following steps of 1) selecting out a layer with most unreasonable spatial distribution in an open source system according to an imbalance score; 2) selecting out a target file in the layer with the most unreasonable spatial distribution according to a polling rule; 3) segmenting the target file into fragments according to lower layer files covering a same key value range, linking each fragment with the lower layer file of the corresponding key value range, and adding SliceLinks for each lower layer file; 4) checking a SliceLink quantity of each lower layer file, entering the step 2) if the SliceLink quantities of all the lower layer files do not exceed a preset threshold, and entering the step 5) until the SliceLink quantities of the lower layer files exceed the preset threshold; and 5) reading the lower layer files with the SliceLink quantities exceeding the preset threshold, and the target file having the corresponding key value range and linked with the fragments of the lower layer files into a memory of the open source system to perform combination to generate a new file, and writing the new file into a layer where the lower layer files are located. The method can be widely applied to the technical field of information storage.

Description

technical field [0001] The invention relates to a two-stage merging method based on a log structure merging tree, and belongs to the technical field of information storage. Background technique [0002] With the advent of the Web 2.0 era, the data scale is growing explosively. The traditional relational database has been difficult to meet the needs of the era of massive data storage, and the non-relational database with the characteristics of fast read and write speed, easy expansion, and low cost Databases are widely used. According to storage methods and storage content, non-relational databases can be divided into column storage, document storage, key-value storage, graph storage, and object storage. Among them, key-value storage is simple and very suitable for databases that do not involve too many data relationships and The business data of business relationships has been called the mainstream storage method in the business of major Internet companies. Key-value stora...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06
CPCG06F3/0623G06F3/064G06F3/0643G06F3/0652G06F3/0688
Inventor 柴云鹏韦皓诚梁雨诗
Owner RENMIN UNIVERSITY OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products