Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing persistence of memory database

A database and persistent technology, applied in the input/output process of data processing, electrical digital data processing, instruments, etc., can solve problems such as limitation and achieve the effect of improving data security

Inactive Publication Date: 2020-08-14
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limited technical level of current storage devices, in order to achieve data security, the memory database has to rely on external storage disks to improve stability. Therefore, some disk IO operations will be introduced accordingly, which will have a certain impact on transaction processing speed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing persistence of memory database
  • Method for realizing persistence of memory database
  • Method for realizing persistence of memory database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Embodiment 1 is the data security test of this system:

[0073] Data security means that when the system encounters accidents, such as sudden system crashes, power failures, etc., data will not be lost, errors will not occur, and data integrity will be maintained. Therefore, in the test process, the situation of unexpected power failure of the system is simulated to test the data security. First write the data key to the system as key_safe, the value is value_safe, and return the result successfully, then query the key key_safe, and successfully return the value value_safe. The test process is as Figure 4 shown;

[0074] At this time, the power supply of the hardware device is suddenly cut off, resulting in a power failure of the database system. Then restart the hardware device, restart the database, query the key key_safe, and successfully return the result value_safe. After restarting, the test process is as follows Figure 5 shown;

[0075] As shown above, th...

Embodiment 2

[0077] Embodiment 2 is the read and write performance test of this system:

[0078] In this example, the workload test scenario is used to compare the original Redis with the Redis after persistence using the cold data elimination mechanism. The size of each test data is 1KB, and the size of each field is 100B. In the 100% read operation scenario, the comparison performance is as follows: Figure 7 ;

[0079] pass Figure 7 As a result, it can be concluded that in the case of low data volume, the read performance is basically the same. But in the case of a large number, part of the data is cleared from the memory by the cold data elimination mechanism, and then it can only be read from the persistence layer, which will cause a certain delay, but by adopting the method of the present invention, in the Redis native system The delay caused by AOF and RDB data backup is canceled, improving some performance. Overall performance is not much different. However, the method of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing persistence of a memory database, which comprises the following steps of: writing a writing operation into a persistence layer, and then writing into a Redis memory database; performing data elimination on the Redis memory database; eliminating the cold data eliminated by the Redis memory database; and reading the Redis memory database by a reading operation, and when the corresponding data is not read, reading the data in the persistent layer and reversely writing the data into the Redis memory database. By adopting the design of separating the cache layer from the persistent layer, the server is transformed, and a persistence scheme for optimizing the native Redis is transformed into a persistence scheme in which the persistence part is independently processed by the LevelDB, so that the instability risk of the native persistence scheme is reduced; the data security and the system recovery efficiency are improved; and the problem that the Redis memory database is crazy and occupies the memory is solved.

Description

technical field [0001] The invention relates to the field of data storage, in particular to a method for realizing persistence of an in-memory database. Background technique [0002] In our daily life, work and study, all kinds of information are generated all the time, and after the information is generated, it needs a certain carrier to make it be preserved, and the database plays an important role in this. The database is a warehouse for storing data, and this warehouse organizes, stores and manages data according to the data structure we set, so that the data can be retained and used more conveniently. In the current era of computing and big data, more and more non-relational databases have emerged. According to different data storage locations, databases can be generally divided into disk databases and memory databases. In the context of an era where request processing speed is getting higher and higher, the problem of insufficient hardware for disk databases has grad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F3/06
CPCG06F3/0619G06F3/062G06F3/0638G06F3/0652G06F3/0656G06F3/0673
Inventor 侯孟书李林飞赖杰
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products