Home php教程 php手册 Summary of unique ID generation solutions for distributed systems

Summary of unique ID generation solutions for distributed systems

Sep 14, 2018 pm 01:39 PM
distributed

The unique system ID is a problem we often encounter when designing a system, and we often struggle with this problem. There are many ways to generate IDs, adapting to different scenarios, needs and performance requirements. Therefore, some more complex systems will have multiple ID generation strategies. Here are some common ID generation strategies.

1. Database self-increasing sequence or field

The most common way. Using the database, the entire database is unique.

Advantages:

  1. Simple, convenient code, and acceptable performance.

  2. Numeric IDs are naturally sorted, which is helpful for paging or results that need to be sorted.

Disadvantages:

  1. # Different database syntax and implementation are different, when database migration or when multiple database versions are supported Needs to be processed.

  2. In the case of a single database or read-write separation or one master and multiple slaves, there is only one master database can be generated. There is a risk of a single point of failure.

  3. It is difficult to expand when the performance cannot meet the requirements.

  4. If you encounter multiple systems that need to be merged or data migration is involved, it will be quite painful.

  5. There will be trouble when dividing tables and databases.

Optimization plan:

  1. For the main database single point, if there are multiple Master databases, each Master The starting number set by the library is different, but the step size is the same, which can be the number of Masters. For example: Master1 generates 1, 4, 7, 10, Master2 generates 2,5,8,11, Master3 generates 3,6,9,12. This can effectively generate unique IDs in the cluster, and can also greatly reduce the load of ID generation database operations.

2. UUID common method.

It can be generated using a database or a program, and is generally unique in the world.

Advantages:

  1. Simple and convenient code.

  2. The ID generation performance is very good and there will be basically no performance problems.

  3. The only one in the world. In the case of data migration, system data merging, or database changes, you can Take it in stride.

Disadvantages:

  1. There is no sorting, and the trend cannot be guaranteed to increase.

  2. UUID is often stored using strings, and the query efficiency is relatively low.

  3. The storage space is relatively large. If it is a massive database, you need to consider the storage amount.

  4. Transfer large amount of data

  5. is not readable.

3. Redis generates ID

When the performance of using the database to generate ID is not enough, we can try to use Redis to generate ID. This mainly relies on Redis being single-threaded, so it can also be used to generate globally unique IDs. This can be achieved using Redis's atomic operations INCR and INCRBY.

You can use Redis cluster to obtain higher throughput. Suppose there are 5 Redis in a cluster. The values ​​of each Redis can be initialized to 1, 2, 3, 4, 5 respectively, and then the step size is all 5. The IDs generated by each Redis are:

A: 1,6,11,16,21 B: 2,7,12,17,22 C: 3,8,13,18,23 D: 4, 9,14,19,24 E: 5,10,15,20,25

This can be determined by whichever machine it is loaded to. It will be difficult to modify in the future. However, 3-5 servers can basically satisfy the needs of the server, and they can all obtain different IDs. But the step size and initial value must be required in advance. Using Redis cluster can also solve the problem of single point of failure.

In addition, it is more suitable to use Redis to generate serial numbers starting from 0 every day. For example, order number = date, and the number will increase automatically on that day. You can generate a Key in Redis every day and use INCR for accumulation.

Advantages:

  1. ## does not depend on the database, is flexible and convenient, and has better performance than the database.

  2. Numeric IDs are naturally sorted, which is helpful for paging or results that need to be sorted.

Disadvantages:

  1. If there is no Redis in the system, new components need to be introduced, increasing the system complexity.

  2. The workload required for coding and configuration is relatively large.

4. Twitter’s snowflake algorithm

Snowflake is Twitter’s open source distributed ID generation algorithm, and the result is a long ID. The core idea is to use 41 bits as the number of milliseconds, 10 bits as the machine ID (5 bits are the data center, 5 bits the machine ID), and 12 bits as the serial number within milliseconds (meaning that each node can generate 4096 IDs), and there is a sign bit at the end, which is always 0. The specific implementation code can be found at: https://github.com/twitter/snowflake

public class IdWorker {
// ==============================Fields===========================================
/** 开始时间截 (2015-01-01) */
private final long twepoch = 1420041600000L;

/** 机器id所占的位数 */
private final long workerIdBits = 5L;

/** 数据标识id所占的位数 */
private final long datacenterIdBits = 5L;

/** 支持的最大机器id,结果是31 (这个移位算法可以很快的计算出几位二进制数所能表示的最大十进制数) */
private final long maxWorkerId = -1L ^ (-1L << workerIdBits);

/** 支持的最大数据标识id,结果是31 */
private final long maxDatacenterId = -1L ^ (-1L << datacenterIdBits);

/** 序列在id中占的位数 */
private final long sequenceBits = 12L;

/** 机器ID向左移12位 */
private final long workerIdShift = sequenceBits;

/** 数据标识id向左移17位(12+5) */
private final long datacenterIdShift = sequenceBits + workerIdBits;

/** 时间截向左移22位(5+5+12) */
private final long timestampLeftShift = sequenceBits + workerIdBits + datacenterIdBits;

/** 生成序列的掩码,这里为4095 (0b111111111111=0xfff=4095) */
private final long sequenceMask = -1L ^ (-1L << sequenceBits);

/** 工作机器ID(0~31) */
private long workerId;

/** 数据中心ID(0~31) */
private long datacenterId;

/** 毫秒内序列(0~4095) */
private long sequence = 0L;

/** 上次生成ID的时间截 */
private long lastTimestamp = -1L;

//==============================Constructors=====================================
/**
 * 构造函数
 * @param workerId 工作ID (0~31)
 * @param datacenterId 数据中心ID (0~31)
 */
public IdWorker(long workerId, long datacenterId) {
    if (workerId > maxWorkerId || workerId < 0) {
        throw new IllegalArgumentException(String.format("worker Id can&#39;t be greater than %d or less than 0", maxWorkerId));
    }
    if (datacenterId > maxDatacenterId || datacenterId < 0) {
        throw new IllegalArgumentException(String.format("datacenter Id can&#39;t be greater than %d or less than 0", maxDatacenterId));
    }
    this.workerId = workerId;
    this.datacenterId = datacenterId;
}

// ==============================Methods==========================================
/**
 * 获得下一个ID (该方法是线程安全的)
 * @return SnowflakeId
 */
public synchronized long nextId() {
    long timestamp = timeGen();

    //如果当前时间小于上一次ID生成的时间戳,说明系统时钟回退过这个时候应当抛出异常
    if (timestamp < lastTimestamp) {
        throw new RuntimeException(
                String.format("Clock moved backwards.  Refusing to generate id for %d milliseconds", lastTimestamp - timestamp));
    }

    //如果是同一时间生成的,则进行毫秒内序列
    if (lastTimestamp == timestamp) {
        sequence = (sequence + 1) & sequenceMask;
        //毫秒内序列溢出
        if (sequence == 0) {
            //阻塞到下一个毫秒,获得新的时间戳
            timestamp = tilNextMillis(lastTimestamp);
        }
    }
    //时间戳改变,毫秒内序列重置
    else {
        sequence = 0L;
    }

    //上次生成ID的时间截
    lastTimestamp = timestamp;

    //移位并通过或运算拼到一起组成64位的ID
    return ((timestamp - twepoch) << timestampLeftShift) //
            | (datacenterId << datacenterIdShift) //
            | (workerId << workerIdShift) //
            | sequence;
}

/**
 * 阻塞到下一个毫秒,直到获得新的时间戳
 * @param lastTimestamp 上次生成ID的时间截
 * @return 当前时间戳
 */
protected long tilNextMillis(long lastTimestamp) {
    long timestamp = timeGen();
    while (timestamp <= lastTimestamp) {
        timestamp = timeGen();
    }
    return timestamp;
}

/**
 * 返回以毫秒为单位的当前时间
 * @return 当前时间(毫秒)
 */
protected long timeGen() {
    return System.currentTimeMillis();
}

//==============================Test=============================================
/** 测试 */
public static void main(String[] args) {
    IdWorker idWorker = new IdWorker(0, 0);
    for (int i = 0; i < 1000; i++) {
        long id = idWorker.nextId();
        System.out.println(Long.toBinaryString(id));
        System.out.println(id);
    }
}}
Copy after login

snowflake algorithm can be modified according to the needs of your own project. For example, estimate the number of future data centers, the number of machines in each data center, and the number of possible concurrencies in a unified millisecond to adjust the number of bits required in the algorithm.

Advantages:

  1. ## does not depend on the database, is flexible and convenient, and has better performance than the database.

  2. ID is incremented on a single machine according to time.

Disadvantages:

  1. is incremental on a single machine, but since it involves a distributed environment, each machine The clocks on the clock cannot be completely synchronized, and sometimes there may be situations where the global increment is not achieved.

5. Use zookeeper to generate unique ID

zookeeper mainly generates serial numbers through its znode data version. It can generate 32-bit and 64-bit data version numbers. Customers The client can use this version number as a unique serial number.

Zookeeper is rarely used to generate unique IDs. Mainly because it relies on zookeeper and calls the API in multiple steps. If competition is large, you need to consider using distributed locks. Therefore, the performance is not ideal in a highly concurrent distributed environment.

6. MongoDB’s ObjectId

MongoDB’s ObjectId is similar to the snowflake algorithm. It is designed to be lightweight, and different machines can easily generate it using the same globally unique method. MongoDB was designed from the beginning as a distributed database, and handling multiple nodes is a core requirement. Making it much easier to generate in a sharded environment. The format is as follows: [src/main/resources/objectId.png] Write the picture description here:

Summary of unique ID generation solutions for distributed systems

The first 4 bytes are the timestamp starting from the standard epoch, unit is seconds. The timestamp, combined with the following 5 bytes, provides second-level uniqueness. Since the timestamp comes first, this means that the ObjectIds will be sorted roughly in the order they were inserted. This is useful for things like using it as an index to improve efficiency. These 4 bytes also imply the time when the document was created. Most client libraries will expose a method to obtain this information from the ObjectId. The next 3 bytes are the unique identifier of the host. Typically a hash of the machine's hostname. This ensures that different hosts generate different ObjectIds without conflict. To ensure that the ObjectId generated by multiple concurrent processes on the same machine is unique, the next two bytes come from the process identifier (PID) that generated the ObjectId. The first 9 bytes ensure that the ObjectId generated by different processes on different machines in the same second is unique. The last 3 bytes are an automatically increasing counter to ensure that the ObjectId generated by the same process in the same second is also different. Each process is allowed to have up to 2563 (16 777 216) different ObjectIds in the same second.

Related recommendations:

php news release management system development example

PHP development simple news release system tutorial

The above is the detailed content of Summary of unique ID generation solutions for distributed systems. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to use Redis to achieve distributed data synchronization How to use Redis to achieve distributed data synchronization Nov 07, 2023 pm 03:55 PM

How to use Redis to achieve distributed data synchronization With the development of Internet technology and the increasingly complex application scenarios, the concept of distributed systems is increasingly widely adopted. In distributed systems, data synchronization is an important issue. As a high-performance in-memory database, Redis can not only be used to store data, but can also be used to achieve distributed data synchronization. For distributed data synchronization, there are generally two common modes: publish/subscribe (Publish/Subscribe) mode and master-slave replication (Master-slave).

How Redis implements distributed session management How Redis implements distributed session management Nov 07, 2023 am 11:10 AM

How Redis implements distributed session management requires specific code examples. Distributed session management is one of the hot topics on the Internet today. In the face of high concurrency and large data volumes, traditional session management methods are gradually becoming inadequate. As a high-performance key-value database, Redis provides a distributed session management solution. This article will introduce how to use Redis to implement distributed session management and give specific code examples. 1. Introduction to Redis as a distributed session storage. The traditional session management method is to store session information.

Sharing experience in using MongoDB to implement distributed task scheduling and execution Sharing experience in using MongoDB to implement distributed task scheduling and execution Nov 02, 2023 am 09:39 AM

MongoDB is an open source NoSQL database with high performance, scalability and flexibility. In distributed systems, task scheduling and execution are a key issue. By utilizing the characteristics of MongoDB, distributed task scheduling and execution solutions can be realized. 1. Requirements Analysis for Distributed Task Scheduling In a distributed system, task scheduling is the process of allocating tasks to different nodes for execution. Common task scheduling requirements include: 1. Task request distribution: Send task requests to available execution nodes.

How to use Swoole to implement distributed scheduled task scheduling How to use Swoole to implement distributed scheduled task scheduling Nov 07, 2023 am 11:04 AM

How to use Swoole to implement distributed scheduled task scheduling Introduction: In traditional PHP development, we often use cron to implement scheduled task scheduling, but cron can only execute tasks on a single server and cannot cope with high concurrency scenarios. Swoole is a high-performance asynchronous concurrency framework based on PHP. It provides complete network communication capabilities and multi-process support, allowing us to easily implement distributed scheduled task scheduling. This article will introduce how to use Swoole to implement distributed scheduled task scheduling

Java development practical experience sharing: building distributed log collection function Java development practical experience sharing: building distributed log collection function Nov 20, 2023 pm 01:17 PM

Sharing practical experience in Java development: Building a distributed log collection function Introduction: With the rapid development of the Internet and the emergence of large-scale data, the application of distributed systems is becoming more and more widespread. In distributed systems, log collection and analysis are very important. This article will share the experience of building distributed log collection function in Java development, hoping to be helpful to readers. 1. Background introduction In a distributed system, each node generates a large amount of log information. These log information are useful for system performance monitoring, troubleshooting and data analysis.

Using Redis to achieve distributed cache consistency Using Redis to achieve distributed cache consistency Nov 07, 2023 pm 12:05 PM

Using Redis to achieve distributed cache consistency In modern distributed systems, cache plays a very important role. It can greatly reduce the frequency of system access to the database and improve system performance and throughput. In a distributed system, in order to ensure cache consistency, we need to solve the problem of data synchronization between multiple nodes. In this article, we will introduce how to use Redis to achieve distributed cache consistency and give specific code examples. Redis is a high-performance key-value database that supports persistence, replication, and collection

Using Redis to implement distributed task scheduling Using Redis to implement distributed task scheduling Nov 07, 2023 am 08:15 AM

Using Redis to implement distributed task scheduling With the expansion of business and the development of the system, many businesses need to implement distributed task scheduling to ensure that tasks can be executed on multiple nodes at the same time, thereby improving the stability and availability of the system. As a high-performance memory data storage product, Redis has the characteristics of distribution, high availability, and high performance, and is very suitable for implementing distributed task scheduling. This article will introduce how to use Redis to implement distributed task scheduling and provide corresponding code examples. 1. Redis base

How to use Redis to implement distributed message publishing and subscription How to use Redis to implement distributed message publishing and subscription Nov 07, 2023 am 09:39 AM

How to use Redis to implement distributed message publishing and subscription Introduction: In distributed systems, message publishing and subscription is a common communication mode that can achieve decoupling between different modules. As a high-performance key-value storage system, Redis can be used to implement distributed message publishing and subscription functions. This article will introduce how to use Redis to implement this function and provide specific code examples. 1. The publish and subscribe function of Redis The publish and subscribe function of Redis is an implementation method based on message queue.

See all articles