当前位置:网站首页>[redis design and implementation] part I: summary of redis data structure and objects
[redis design and implementation] part I: summary of redis data structure and objects
2022-07-06 21:09:00 【Twilight_ years】
Simple dynamic string :SDS
【Redis note 】 Simple dynamic string (SDS)_ Twilight _ Blog years -CSDN Blog _sds Dynamic string
Linked list :linkedlist
Dictionaries :hashtable、map
【Redis note 】 Data structure and objects : Dictionaries _ Twilight _ Blog years -CSDN Blog
Skip list :skiplist
Set of integers :intset
Compressed list :ziplist
【Redis note 】 Compressed list (ziplist)_ Twilight _ Blog years -CSDN Blog
object :
The benefits of using objects :
(1) Judge whether an object can execute a given instruction according to the type of object
(2) You can set a variety of different data structures for objects according to different usage scenarios
The type and encoding of the object :
Redis Each object consists of a redisObject Structural representation
type: Record the type of object

Redis The key of is always a string object .
encoding: Determine the data structure of the object

benefits : adopt encoding Property to set the data structure used by the object , Promoted Redis Flexibility and efficiency , because Redis You can set different data structures for an object according to different usage scenarios , So as to optimize the efficiency of the object in a certain scene .
ptr The pointer : Data structures that point to the underlying implementation of the object
String object :
Three coding methods :int,raw,embstr
(1) If a string object holds an integer value , And this integer can be used long Type said , Then the string object will store the integer value in the string object structure ptr Properties of the , And will encoding Set to REDIS_ECODING_INT.
(2) If the string object holds a string value , And the length of this string value is greater than 32 byte , Then the string object will use SDS To save the string value , And set the object's encoding to REDIS_ENCODING_RAW
(3) If the string object holds a string value , And the length of this string value is less than or equal to 32 byte , Then the string object uses embstr Code to save the string value .

explain :long double Floating point numbers of type are Redis Is also saved as a string value . Floating point numbers <-> character string
Encoding conversion :
int->raw: Objects no longer hold integer values
embstr->raw: because embstr read-only , If the embstr Execute any modification commands , The program first encodes the object from embstr Convert to raw, Then execute the modify command .
List objects :
Two data structure implementation methods :ziplist,linkedlist
1、 Use ziplist The implementation , Each compressed list node holds a list element .
2、 Use linkedlist The implementation , Each double ended linked list node stores a string object , Each string object holds a list element .
String object Redis5 Objects of each type are the only objects that will be nested by objects of the other four types
Encoding conversion :

Hash object :
Two ways of implementation :ziplist,hashtable
1、 Use ziplist The implementation , Whenever a new key value pair is added to the hash object , The program will first save the key node and add it to the end of the table , Then add the value node to the end of the table
(1) Two nodes of the same key value pair are always close together
(2) The key value pairs added first are in the header , The key value pair added after is at the end of the table .
2、 Use hashtable The implementation , Key value pairs are saved using dictionary key value pairs . Every key and value in the dictionary is a string object .
Code conversion :

A collection of objects :
Two ways of coding :intset,hashtable
1、 Use intset when , All elements of the collection object are saved in intset in .
2、 Use hashtable when , Each key in the dictionary is a string object , Each string object contains a collection element , All values are set to null
Encoding conversion :

An orderly collection of objects :
Two ways of coding :ziplist,skiplist
1、 Use ziplist when , Each set uses two compressed list nodes next to each other to save , The first node holds the members of the element , The second element holds the score of the element .
The set elements in the compressed list are sorted from small to large , Elements with smaller scores are placed close to the heading , Elements with larger branches are placed in the direction of the footer .
2、 Use skiplist when , Use zset Structure implementation , Including dictionary and jump table .
(1) The jump table saves all element sets from small to large according to the score , Each hop table node holds a set element :object Attribute save member ,score Save score . If you only use dictionaries , Keep an orderly time O(logn), Space O(n)
(2) The dictionary creates a mapping from members to scores for an ordered set , In the dictionary Each key value pair of the holds a collection element . Can pass O(1) Find the score of a given member . If you only use the jump table ,O(logn)
(3)zset Structure uses both jump tables and dictionaries to store set elements , But they share members and scores of the same element through pointers . So using them at the same time won't waste extra memory .
Encoding conversion :

Redis Properties of objects :
Type checking :
Redis There are two kinds of commands for operating keys :
You can perform... On any type of key ; Can only be performed on a specific type of key .
Before executing a type specific command ,Redis Will check the type of key , Then decide whether to execute the command .
Command polymorphism :
Redis According to the encoding method of the value object , Choose the appropriate code to implement the command .
Type based polymorphism : No matter what type of key you enter , Commands can be executed correctly
Coding based polymorphism : One command can be used to handle many different codes at the same time
Memory recovery :
Redis A reference counting mechanism is built in the object system to realize memory recycling , The program can track the reference count information of the object , Automatically release objects and reclaim memory when appropriate .

Object sharing :
Object reference counting can realize object sharing .
stay Redis in , An object that allows multiple keys to share the same value :
(1) Let the value pointer of the key point to an existing object .
(2) Add the reference count of the shared object 1
The shared object mechanism is helpful to save memory , The more objects with the same value are saved , Object sharing mechanism can save more memory .
(1)Redis When the server is initialized , establish 0~9999 String objects of all integer values are shared .
(2)Redis Only string objects containing integer values are shared

The idle time of the object :

边栏推荐
- PG basics -- Logical Structure Management (transaction)
- JS操作dom元素(一)——获取DOM节点的六种方式
- js 根据汉字首字母排序(省份排序) 或 根据英文首字母排序——za排序 & az排序
- 3D face reconstruction: from basic knowledge to recognition / reconstruction methods!
- 【深度学习】PyTorch 1.12发布,正式支持苹果M1芯片GPU加速,修复众多Bug
- [wechat applet] operation mechanism and update mechanism
- Is this the feeling of being spoiled by bytes?
- ICML 2022 | flowformer: task generic linear complexity transformer
- 愛可可AI前沿推介(7.6)
- 拼多多败诉,砍价始终差0.9%一案宣判;微信内测同一手机号可注册两个账号功能;2022年度菲尔兹奖公布|极客头条
猜你喜欢

【深度学习】PyTorch 1.12发布,正式支持苹果M1芯片GPU加速,修复众多Bug

2022 fields Award Announced! The first Korean Xu Long'er was on the list, and four post-80s women won the prize. Ukrainian female mathematicians became the only two women to win the prize in history

use. Net analysis Net talent challenge participation

ICML 2022 | Flowformer: 任务通用的线性复杂度Transformer

Manifest of SAP ui5 framework json
![Mécanisme de fonctionnement et de mise à jour de [Widget Wechat]](/img/cf/58a62a7134ff5e9f8d2f91aa24c7ac.png)
Mécanisme de fonctionnement et de mise à jour de [Widget Wechat]
![[MySQL] trigger](/img/b5/6df17eb254bbdb0aba422d08f13046.png)
[MySQL] trigger

OAI 5g nr+usrp b210 installation and construction

ICML 2022 | flowformer: task generic linear complexity transformer

No Yum source to install SPuG monitoring
随机推荐
Redis insert data garbled solution
Laravel notes - add the function of locking accounts after 5 login failures in user-defined login (improve system security)
Dynamically switch data sources
Introduction to the use of SAP Fiori application index tool and SAP Fiori tools
Pat 1085 perfect sequence (25 points) perfect sequence
Study notes of grain Mall - phase I: Project Introduction
SAP Fiori应用索引大全工具和 SAP Fiori Tools 的使用介绍
1_ Introduction to go language
How to implement common frameworks
This year, Jianzhi Tencent
Is it safe to open an account in flush? Which securities company is good at opening an account? Low handling charges
Swagger UI tutorial API document artifact
20220211 failure - maximum amount of data supported by mongodb
7. Data permission annotation
【微信小程序】運行機制和更新機制
R语言可视化两个以上的分类(类别)变量之间的关系、使用vcd包中的Mosaic函数创建马赛克图( Mosaic plots)、分别可视化两个、三个、四个分类变量的关系的马赛克图
OAI 5g nr+usrp b210 installation and construction
Manifest of SAP ui5 framework json
PHP saves session data to MySQL database
Data Lake (VIII): Iceberg data storage format