1. Process2. Core Architecture
2.1 Introduction to basic components of the server layer 1. Connectors Connectors are primarily concerned with authentication and permission-related functions, like a high-level doorman.
The query cache is mainly used to cache the SELECT statement we executed and the result set of the statement.
3. Analyzer
4. Optimizer
5. Actuator
3. Statement Analysis3.1 Query Statement
select * from tb_student A where A.age='18' and A.name=' 张三'; Combined with the above description, we analyze the execution flow of this statement: First check whether the statement has permission. If not, an error message is returned directly. If permission is granted, before MySQL 8.0, the cache will be queried first, using this SQL statement as the key to check whether there is a result in memory. If so, the cache is directly cached. If not, proceed to the next step. Through the analyzer, lexical analysis is performed to extract the key elements of the SQL statement. For example, the statement above is a query select, the table name to be queried is tb_student, all columns need to be queried, and the query condition is the id of this table = '1'. Then determine whether the SQL statement has any syntax errors, such as whether the keywords are correct, etc. If the check is OK, proceed to the next step. The next step is for the optimizer to determine the execution plan. The above SQL statement can have two execution plans: a. First query the student table for the student whose name is "Zhang San", and then determine whether his age is 18. The optimizer then selects the solution with the best execution efficiency based on its own optimization algorithm (the optimizer believes that this may not always be the best solution). Then after confirming the execution plan, you are ready to start execution. Perform permission check. If there is no permission, an error message will be returned. If there is permission, the database engine interface will be called and the engine's execution result will be returned. 3.2 Update StatementThe above is the execution process of a query SQL, so let's take a look at how an update statement is executed? The sql statement is as follows: Let's modify Zhang San's age. In the actual database, this age field will definitely not be set, otherwise you will be beaten by the technical director. In fact, this statement will basically follow the process of the previous query, but it is necessary to record logs when executing updates, which will introduce the log module. MySQL's built-in log module is binlog (archive log), which can be used by all storage engines. Our commonly used InnoDB engine also comes with a log module redo log (redo log). We will discuss the execution process of this statement in InnoDB mode. The process is as follows: First query the data of Zhang San. If there is a cache, it will also be used. Then get the query statement, change age to 19, and call the engine API interface to write this row of data. The InnoDB engine saves the data in memory and records the redo log. At this time, the redo log enters the prepare state and tells the executor that the execution is complete and can be submitted at any time. After receiving the notification, the executor records the binlog, then calls the engine interface to submit the redo log to the committed state. Update completed. Some students here will definitely ask, why do we need two log modules? Can't we use one log module? This is because MySQL was not initially compatible with the InnoDB engine (the InnoDB engine was inserted into MySQL by other companies as a plug-in). The native engine of MySQL is MyISAM, but we know that redo log is unique to the InnoDB engine and other storage engines do not have it. This results in the lack of crash-safe capability (the crash-safe capability means that even if the database restarts abnormally, previously submitted records will not be lost), and binlog logs can only be used for archiving. It does not mean that it is not possible to use only one log module, but the InnoDB engine supports transactions through redo log. Then, some students may ask, can I use two log modules but not make it so complicated? Why does redo log need to introduce the prepare pre-commit status? Here we use proof by contradiction to explain why we do this? First write the redo log and commit it directly, then write the binlog. Suppose after writing the redo log, the machine crashes and the binlog is not written. After the machine restarts, the machine will restore the data through the redo log. However, the binlog does not record the data at this time. When the machine is backed up later, this piece of data will be lost. At the same time, the master-slave synchronization will also lose this piece of data. Write binlog first, then write redo log. Suppose after writing binlog, the machine restarts abnormally. Since there is no redo log, the machine cannot recover this record. However, binlog has another record. Then, the same reason as above will cause data inconsistency. If the redo log two-phase commit method is adopted, the situation will be different. After writing the binglog, submitting the redo log will prevent the above problems from occurring, thus ensuring data consistency. So the question is, is there an extreme situation? Assume that the redo log is in the pre-commit state and the binglog has been written. What will happen if an abnormal restart occurs at this time? This depends on the processing mechanism of MySQL. The processing process of MySQL is as follows: Determine whether the redo log is complete. If it is complete, commit it immediately. If the redo log is in the pre-committed but not committed state, the transaction will be rolled back if the binlog is complete. This solves the problem of data consistency. 4. Conclusion
This article ends here. I hope you can pay more attention to other content on 123WORDPRESS.COM! You may also be interested in:
|
<<: Regular expression usage in CSS selectors
>>: 12 Javascript table controls (DataGrid) are sorted out
Table of contents 1. Virtual Host 1.1 Virtual Hos...
Table of contents Preface Create a Vite project R...
This article example shares the specific code of ...
1. Nginx service foundation Nginx (engine x) is d...
Vue parent component calls the function of the ch...
Table of contents Written in front Environment de...
1. Set the list symbol list-style-type: attribute...
The operating environment of this tutorial: Windo...
Build the project Execute the command line in the...
One of our web projects has seen an increase in t...
1. MYSQL index Index: A data structure that helps...
Suddenly, I needed to build a private service for...
As you build and scale your Django applications, ...
Table of contents Preface Hello World image Set b...
Docker Compose Docker Compose is a tool for defin...