search
HomeDatabaseMysql TutorialMySQL architecture design for ordering function in e-commerce system

The basic model of a simple order business is designed to include users, goods (inventory), orders, and payments. Only goods and orders are considered here. The process is to place an order -> reduce inventory. These two steps must be completed at the same time. You cannot place an order without reducing it. Inventory (oversold), or reduced inventory without generating an order (undersold). Overselling merchants have insufficient inventory, and consumers cannot buy items when placing orders, resulting in a bad experience; underselling merchants have overstocked inventory or need to repeatedly modify product information, which is troublesome and the experience is not good.

In the early days of the system, the traffic received was small, and many entrepreneurial teams adopted a single-repository model (yes, everyone was together...). This model brings great convenience. It does not need to cross databases, let alone cross nodes. It can easily use the transactions provided by the database to implement atomic operations of placing orders and reducing inventory, and can also perform various joint tables and subqueries (operations No matter how abnormal MM’s needs are, what can I do if I don’t know SQL?) But it is precisely these advantages that will become a stumbling block to expanding the system after the traffic increases. Joint tables, subqueries, and transactions all bind multiple tables together, making it troublesome to dismantle databases and tables.

In the later period, the system traffic will gradually increase, and the read and write performance of a single database is not enough. At this time, the database will be considered to be dismantled and divided into tables. For example, products and orders are divided into two clusters, and the clusters are divided into databases and tables according to their respective business dimensions. Products can be divided according to the seller dimension, and orders are generally divided according to the buyer dimension, and redundancy is made according to the seller dimension. The problem that arises at this time is still a classic problem - data consistency. After the data is split, the products and orders are not in the same database, how to ensure consistency; how to ensure consistency between the order data in the buyer dimension and the order data in the seller dimension. There are two solutions:

(1) Distributed transactions, the classic implementation is based on 2PC. The advantage is that after being packaged well enough, although there are differences between using it and a single library (mainly complex query statements), overall the changes to the business will not be great. The disadvantage is that the performance is too poor. Originally, the introduction of distributed databases was mainly to improve performance exponentially, but because of the introduction of distributed transactions, this performance improvement was greatly reduced. In many cases, this performance is unacceptable.

(2) Message middleware, the protagonist of this article, one of the functions of message middleware is to be responsible for communication between various systems, which is very suitable for the synchronization problem of goods and order systems here. The ordering process after introducing the message middleware is: after user A places an order, he sends a message to the message middleware. The product system subscribes to the order message and deducts the corresponding inventory.

There are a few points to note here:

a. The transmission of messages takes time. Check the inventory before placing an order. However, under concurrent conditions, the inventory may not be enough when the inventory is actually reduced, so it must be done after the inventory reduction is successful. To show that the order is successful, that is, after placing the order, it is marked as placed, but the status is not visible to the user. After the product system successfully reduces the inventory, the order system is notified to update the status (it is still the use of message middleware);

b , The reliability of the message is very high. When sending a message, if you return successfully, you must ensure that the message will be delivered. If the message fails, you need to roll back the order by yourself;

c. High reliability of the message means that there will be duplicate messages. , here the product system needs to be idempotent by itself, and can use the message ID to remove duplication, otherwise it will be sold less;

d. Front-end users want to be notified as soon as possible if the order is successful or unsuccessful, so a timer needs to be set after the order is successfully placed. message, if the order inventory has not been deducted successfully after a period of time, the user should be notified of the order failure at this time, and the excess deducted inventory should be replenished regularly.

The introduction of message middleware can effectively solve the problem of distributed database data synchronization and avoid distributed transactions. And the additional benefit is that it reduces concurrent lock contention when reducing inventory, which improves performance.


Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Explain the role of InnoDB redo logs and undo logs.Explain the role of InnoDB redo logs and undo logs.Apr 15, 2025 am 12:16 AM

InnoDB uses redologs and undologs to ensure data consistency and reliability. 1.redologs record data page modification to ensure crash recovery and transaction persistence. 2.undologs records the original data value and supports transaction rollback and MVCC.

What are the key metrics to look for in an EXPLAIN output (type, key, rows, Extra)?What are the key metrics to look for in an EXPLAIN output (type, key, rows, Extra)?Apr 15, 2025 am 12:15 AM

Key metrics for EXPLAIN commands include type, key, rows, and Extra. 1) The type reflects the access type of the query. The higher the value, the higher the efficiency, such as const is better than ALL. 2) The key displays the index used, and NULL indicates no index. 3) rows estimates the number of scanned rows, affecting query performance. 4) Extra provides additional information, such as Usingfilesort prompts that it needs to be optimized.

What is the Using temporary status in EXPLAIN and how to avoid it?What is the Using temporary status in EXPLAIN and how to avoid it?Apr 15, 2025 am 12:14 AM

Usingtemporary indicates that the need to create temporary tables in MySQL queries, which are commonly found in ORDERBY using DISTINCT, GROUPBY, or non-indexed columns. You can avoid the occurrence of indexes and rewrite queries and improve query performance. Specifically, when Usingtemporary appears in EXPLAIN output, it means that MySQL needs to create temporary tables to handle queries. This usually occurs when: 1) deduplication or grouping when using DISTINCT or GROUPBY; 2) sort when ORDERBY contains non-index columns; 3) use complex subquery or join operations. Optimization methods include: 1) ORDERBY and GROUPB

Describe the different SQL transaction isolation levels (Read Uncommitted, Read Committed, Repeatable Read, Serializable) and their implications in MySQL/InnoDB.Describe the different SQL transaction isolation levels (Read Uncommitted, Read Committed, Repeatable Read, Serializable) and their implications in MySQL/InnoDB.Apr 15, 2025 am 12:11 AM

MySQL/InnoDB supports four transaction isolation levels: ReadUncommitted, ReadCommitted, RepeatableRead and Serializable. 1.ReadUncommitted allows reading of uncommitted data, which may cause dirty reading. 2. ReadCommitted avoids dirty reading, but non-repeatable reading may occur. 3.RepeatableRead is the default level, avoiding dirty reading and non-repeatable reading, but phantom reading may occur. 4. Serializable avoids all concurrency problems but reduces concurrency. Choosing the appropriate isolation level requires balancing data consistency and performance requirements.

MySQL vs. Other Databases: Comparing the OptionsMySQL vs. Other Databases: Comparing the OptionsApr 15, 2025 am 12:08 AM

MySQL is suitable for web applications and content management systems and is popular for its open source, high performance and ease of use. 1) Compared with PostgreSQL, MySQL performs better in simple queries and high concurrent read operations. 2) Compared with Oracle, MySQL is more popular among small and medium-sized enterprises because of its open source and low cost. 3) Compared with Microsoft SQL Server, MySQL is more suitable for cross-platform applications. 4) Unlike MongoDB, MySQL is more suitable for structured data and transaction processing.

How does MySQL index cardinality affect query performance?How does MySQL index cardinality affect query performance?Apr 14, 2025 am 12:18 AM

MySQL index cardinality has a significant impact on query performance: 1. High cardinality index can more effectively narrow the data range and improve query efficiency; 2. Low cardinality index may lead to full table scanning and reduce query performance; 3. In joint index, high cardinality sequences should be placed in front to optimize query.

MySQL: Resources and Tutorials for New UsersMySQL: Resources and Tutorials for New UsersApr 14, 2025 am 12:16 AM

The MySQL learning path includes basic knowledge, core concepts, usage examples, and optimization techniques. 1) Understand basic concepts such as tables, rows, columns, and SQL queries. 2) Learn the definition, working principles and advantages of MySQL. 3) Master basic CRUD operations and advanced usage, such as indexes and stored procedures. 4) Familiar with common error debugging and performance optimization suggestions, such as rational use of indexes and optimization queries. Through these steps, you will have a full grasp of the use and optimization of MySQL.

Real-World MySQL: Examples and Use CasesReal-World MySQL: Examples and Use CasesApr 14, 2025 am 12:15 AM

MySQL's real-world applications include basic database design and complex query optimization. 1) Basic usage: used to store and manage user data, such as inserting, querying, updating and deleting user information. 2) Advanced usage: Handle complex business logic, such as order and inventory management of e-commerce platforms. 3) Performance optimization: Improve performance by rationally using indexes, partition tables and query caches.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software