当前位置:网站首页>MySQL eight shares
MySQL eight shares
2022-07-25 03:48:00 【Mfy's No.1 little fan】
1. towards MySQL When sending a request ,MySQL What has been done

From the perspective of database architecture :
- adjoining course
1) Authorized certification : Before the real operation , You also need to call the user module to check the authorization , To verify whether the user has permission . After the adoption of , Connection thread on
Start receiving and processing requests from clients .
The functions realized by the user module , It mainly includes user login connection permission control and user authorization management . It's like MySQL Like the gate guard , "
Decide whether to give it to visitors “ Open door ”.
stay MySQL in , Divide client requests into two types : One is query(SQL sentence ), Need to call Parser( Query parser ) To be able to
Request to execute ; One is command( command ), No call required Parser Requests that can be executed directly .
2) Connection processing : The client and the database service layer are established through the connection management module TCP Connect , And request a connection thread .
If there are idle connection threads in the connection pool , Is assigned to this connection , without , Without exceeding the maximum number of connections , Create a new connection thread to take charge of the client .
The connection management module is responsible for listening to MySQL Server All kinds of requests , Receive connection request , Forward all connection requests to thread management module .
Every connection on MySQL Server All client requests will be assigned ( Or create ) A connection thread serves it alone .
And the main job of the connection thread is to be responsible for MySQL Server Communication with clients , To receive commands from the client, please
边栏推荐
- The relationship between private domain traffic and fission marketing. What is super app? Can our enterprise own it?
- [Flink] transform operator map
- Moveit2 - 6. Planning scene monitor
- Swagger key configuration items
- Uniapp picker select the effect demo of provinces and cities (finishing)
- 弹性布局(display:flex下 align-content、justify-content、align-items三个属性的作用和效果
- Secondary vocational network security skills competition P100 vulnerability detection
- Introduction to Apache Doris grafana monitoring indicators
- Display: the function and effect of align content, justify content and align items under flex
- Codewars notes
猜你喜欢

Bubble sort / heap sort

B. Almost Ternary Matrix

Implementing DDD based on ABP -- domain logic and application logic

Secondary vocational network security skills competition P100 dcore (light CMS system) SQL injection

DNS resolution experiment

原创|记一次高校漏洞挖掘

File permission management

Network security - comprehensive penetration test -cve-2018-10933-libssh maintain access

300. Longest increasing subsequence

Merge sort / quick sort
随机推荐
Solve mysql5.6 database specified key was too long; Max key length is 767 bytes
Time complexity and space complexity
The sixth day of brushing questions with force deduction
Original | record a loophole excavation in Colleges and Universities
应急响应全栈
Function method encapsulation -- mutual conversion of image types qpixmap, qimage and mat
Image processing based on hog feature
Analysis of browser working principle
C language introduction practice (9): completion judgment
基于ABP实现DDD--领域逻辑和应用逻辑
01_ Education 2
Moveit2 - 10.urdf and SRDF
[kaggle] how to effectively avoid oom and the long process of alchemy
An article takes you quickly to learn flex layout
Merge sort / quick sort
Unity: text input box for numerical judgment
Force the resumption of game 302 of the week
[Flink] transform operator map
Day 9 (capture traffic and routing strategy)
Implementing DDD based on ABP -- domain logic and application logic