Data access method and device, server and storage medium

A data access and server technology, applied in the computer field, can solve problems such as performance degradation and concurrent performance impact, and achieve the effects of reducing blocking conflicts, improving concurrent performance, and reducing fierce competition.

Active Publication Date: 2019-05-03
SHANGHAI DAMENG DATABASE
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The blocked resource is a global resource of the database, which is scarce and...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method and device, server and storage medium
  • Data access method and device, server and storage medium
  • Data access method and device, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 1 It is a flow chart of the data access method in Embodiment 1 of the present invention. This embodiment is applicable to the situation of implementing data access in a database. The method can be executed by a data access device, which can be implemented in the form of software and / or hardware , for example, the device may be configured in a server. Such as figure 1 As shown, the method may specifically include:

[0038] S110. Obtain a current data access request, where the data access request includes a database object and a transaction number.

[0039] Wherein, the data access request is an access request to resources in the database, and the data access request in this embodiment may include an access request corresponding to a Data Manipulation Language (Data Manipulation Language, DML) and a Data Definition Language (Data Definition Language, DDL) corresponding to the access request. The database object is the main component of the database. In this e...

Embodiment 2

[0054] image 3 It is a flow chart of the data access method in Embodiment 2 of the present invention. On the basis of the foregoing embodiments, this embodiment further specifically describes the foregoing data access method. Correspondingly, such as image 3 As shown, the method of this embodiment specifically includes:

[0055] S210. Obtain a current data access request.

[0056] Wherein, the data access request includes the database object and the transaction number. The data access request in this embodiment may include an access request corresponding to a Data Manipulation Language (Data Manipulation Language, DML) and an access request corresponding to a Data Definition Language (Data Definition Language, DDL). The database object is the main component of the database. In this embodiment, the database object may include tables, table spaces, schemas, indexes, views, rules, and so on. The transaction number is an identifier created for each active transaction in the...

Embodiment 3

[0077] Figure 5 It is a schematic structural diagram of a data access device in Embodiment 3 of the present invention, and this embodiment is applicable to the situation of implementing data access in a database. The data access device provided by the embodiment of the present invention can execute the data access method provided by any embodiment of the present invention, and has corresponding functional modules and beneficial effects for executing the method. The device specifically includes a request acquisition module 310, a blocking module 320 and an execution module 330, wherein:

[0078] A request obtaining module 310, configured to obtain a current data access request, where the data access request includes a database object and a transaction number;

[0079] Blocking module 320, configured to block database objects and transaction numbers;

[0080] The executing module 330 is configured to execute data access corresponding to the blocked data access request.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data access method and device, a server and a storage medium, and the method comprises the steps: obtaining a current data access request which comprises adatabase object and a transaction number; the database object and the transaction number are blocked; and executing data access corresponding to the blocked data access request. According to the embodiment of the invention, the blocking number in the data access corresponding to the data manipulation language is reduced, and the blocking number in the data access corresponding to the data definition language is increased; due to the fact that the number of times of execution of the data manipulation language in the database is very large and far higher than the frequency of execution of the data definition language, control and management of concurrent operation of the database through different locks are achieved, violent competition of system lock resources is greatly reduced, blocking conflicts are reduced, and the concurrent performance of the database is improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a data access method, device, server and storage medium. Background technique [0002] Lock (LOCK) is an important technical means for database management system to control concurrency. It is used to manage concurrent access to database shared resources and ensure that multiple transactions can access correct and consistent database objects (such as tables and indexes) during concurrent execution. Wait). The database management system provides four locking modes, which are shared lock (Share Lock, referred to as S lock), exclusive lock (Exclusive Lock, referred to as X lock), intent shared lock (Exclusive Lock, referred to as IS lock) and intent exclusive lock ( Exclusive Lock, referred to as IX lock). Generally speaking, before accessing any database object, it is necessary to block the database object first to ensure that the definition of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/23
Inventor 蔡池池韩朱忠
Owner SHANGHAI DAMENG DATABASE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products