I believe some students have never heard of integer collection, because redis only provides five encapsulated objects to the outside world! Previously, we analyzed the three data structures of redis: List, Hash, and Zset from the internal structure of redis. Today we will analyze how the set data structure is stored internally.
Basic structure
In src/t_set.c we found such a piece of code
From this we can know that in set it is composed of Composed of two data structures: hashtable intset. Regarding other internal structures of redis, I specifically introduce them in [redis column]. Hashtable is not our protagonist today. Today we first analyze intset, commonly known as integer set.
As we can see from the above picture, I constructed two set collections, namely [commonset] and [cs]. The former stores strings and the latter stores numbers.
We looked at the underlying data structures of the next two collections through the object encoding key and found that one is a hashtable and the other is an intset. This also verifies our description of the basic structure of set above.
The five major types provided externally in redis are actually an abstract object of redis called redisobject. The internal data structure of our redis is mapped internally
\[-2^{7} \sim 2^{7}-1 \\that is
\\
-128 \sim 127
\]
sadd juejin -123
sadd juejin -6
sadd juejin 12
sadd juejin 56
sadd juejin 321
juejin The key inside is intset.
The answer is definitely not possible. First of all, direct appending cannot guarantee the order of the array elements! Secondly, if the first five are 16 bits each and the sixth one is 32 bits, then there are no extra fields in the intset structure to mark. In other words, it is impossible to judge whether 16-bit or 32-bit should be parsed during parsing.
In order to facilitate parsing, redis will upgrade the entire contents when high length is added. It means to expand the entire contents first, and then refill the data
and add 65535
. First, the expansion can be determined based on the length. The number of elements is 6, and each occupancy is 32, so the contents length is 32*6=192. At this time, the first 80 bits of content remain unchanged
Old data shift
After enough space has been opened up, we can The old data is shifted. Here we start moving from the end of the original array. Before moving, we need to clarify the sorting position in the new array.
At this time, we first compare 321 to determine that his ranking is fifth in the new array, then he will occupy the range 128~159 in the new contents.
Finally the first 5 elements will be moved.
Finally fill in the newly added elements. When an upgrade occurs, it must be because the length of the new element is greater than the original length. Then his value must be at both ends of the new array. Negative numbers are on the far left, positive numbers are on the far right
Downgrade
Then the second problem comes when the newly added 65535 is deleted. What should redis do? At this time, the actual element length is 16 bits, but the encoding is 32 bits. In my opinion, it should be downgraded!
But unfortunately redis does not, so please think about why not? If you were asked to implement it, how would you implement it? How to judge whether downgrading is needed is very difficult. We need to re-traverse whether the remaining elements are less than the current length, and the implementation complexity is O(N). This is one of the reasons why downgrading is not performed
You may say that traversing it again will be in the memory quickly anyway, so have you ever thought about upgrading and downgrading back and forth if you encounter an upgrade situation after downgrading? This reduces the performance of our program. We know that upgrading is necessary, so the strategy of downgrading redis here is to ignore it
Summary
##Related tutorial recommendations:
Redis tutorial
The above is the detailed content of Redis integer set cannot be downgraded? Why?. For more information, please follow other related articles on the PHP Chinese website!

UseRedisinsteadofatraditionaldatabasewhenyourapplicationrequiresspeedandreal-timedataprocessing,suchasforcaching,sessionmanagement,orreal-timeanalytics.Redisexcelsin:1)Caching,reducingloadonprimarydatabases;2)Sessionmanagement,simplifyingdatahandling

Redis goes beyond SQL databases because of its high performance and flexibility. 1) Redis achieves extremely fast read and write speed through memory storage. 2) It supports a variety of data structures, such as lists and collections, suitable for complex data processing. 3) Single-threaded model simplifies development, but high concurrency may become a bottleneck.

Redis is superior to traditional databases in high concurrency and low latency scenarios, but is not suitable for complex queries and transaction processing. 1.Redis uses memory storage, fast read and write speed, suitable for high concurrency and low latency requirements. 2. Traditional databases are based on disk, support complex queries and transaction processing, and have strong data consistency and persistence. 3. Redis is suitable as a supplement or substitute for traditional databases, but it needs to be selected according to specific business needs.

Redisisahigh-performancein-memorydatastructurestorethatexcelsinspeedandversatility.1)Itsupportsvariousdatastructureslikestrings,lists,andsets.2)Redisisanin-memorydatabasewithpersistenceoptions,ensuringfastperformanceanddatasafety.3)Itoffersatomicoper

Redis is primarily a database, but it is more than just a database. 1. As a database, Redis supports persistence and is suitable for high-performance needs. 2. As a cache, Redis improves application response speed. 3. As a message broker, Redis supports publish-subscribe mode, suitable for real-time communication.

Redisisamultifacetedtoolthatservesasadatabase,server,andmore.Itfunctionsasanin-memorydatastructurestore,supportsvariousdatastructures,andcanbeusedasacache,messagebroker,sessionstorage,andfordistributedlocking.

Redisisanopen-source,in-memorydatastructurestoreusedasadatabase,cache,andmessagebroker,excellinginspeedandversatility.Itiswidelyusedforcaching,real-timeanalytics,sessionmanagement,andleaderboardsduetoitssupportforvariousdatastructuresandfastdataacces

Redis is an open source memory data structure storage used as a database, cache and message broker, suitable for scenarios where fast response and high concurrency are required. 1.Redis uses memory to store data and provides microsecond read and write speed. 2. It supports a variety of data structures, such as strings, lists, collections, etc. 3. Redis realizes data persistence through RDB and AOF mechanisms. 4. Use single-threaded model and multiplexing technology to handle requests efficiently. 5. Performance optimization strategies include LRU algorithm and cluster mode.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 Chinese version
Chinese version, very easy to use

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver Mac version
Visual web development tools
