[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Characterization of database access pattern for analytic prediction of buffer hit probability

Published: 01 January 1995 Publication History

Abstract

The analytic prediction of buffer hit probability, based on the characterization of database accesses from real reference traces, is extremely useful for workload management and system capacity planning. The knowledge can be helpful for proper allocation of buffer space to various database relations, as well as for the management of buffer space for a mixed transaction and query environment. Access characterization can also be used to predict the buffer invalidation effect in a multi-node environment which, in turn, can influence transaction routing strategies. However, it is a challenge to characterize the database access pattern of a real workload reference trace in a simple manner that can easily be used to compute buffer hit probability. In this article, we use a characterization method that distinguishes three types of access patterns from a trace: (1) locality within a transaction, (2) random accesses by transactions, and (3) sequential accesses by long queries. We then propose a concise way to characterize the access skew across randomly accessed pages by logically grouping the large number of data pages into a small number of partitions such that the frequency of accessing each page within a partition can be treated as equal. Based on this approach, we present a recursive binary partitioning algorithm that can infer the access skew characterization from the buffer hit probabilities for a subset of the buffer sizes. We validate the buffer hit predictions for single and multiple node systems using production database traces. We further show that the proposed approach can predict the buffer hit probability of a composite workload from those of its component files.

References

[1]
Chou, H.T. and Dewitt, D.J. An evaluation of buffer management strategies for relational database systems. Eleventh International Conference on Very Large Databases, Stockholm, Sweden, 1985.]]
[2]
Cornell, D.W. and Yu, P.S. Integration of buffer management and query optimization in relational database environment. Fifteenth International Conference on Very Large Databases, Amsterdam, Netherlands, 1989.]]
[3]
Dan, A. and Towsley, D. An approximate analysis of the LRU and FIFO buffer replacement schemes. ACM SIGMETRICS, Denver, CO, 1990.]]
[4]
Dan, A., Dias, D.M., and Yu, P.S. Buffer analysis for a data sharing environment with skewed data access. IEEE Transactions on Knowledge and Data Engineering, 6(2):331-337, 1994a.]]
[5]
Dan, A., Yu, P.S., and Dias, D.M. Performance modelling and comparisons of global shared buffer management policies in a cluster environment. IEEE Transactions on Computers, 43(11):1281-1297, 1994b.]]
[6]
Dan, A., Yu, P.S., and Chung, J.Y. Characterization of database access skew in a transaction processing environment. IBM Research Report RC 17436, 1991.]]
[7]
Date, C.J. and White, C.J. A Guide to DB2, Third edition, Reading, MA: Addision-Wesley, 1989.]]
[8]
Effelsberg, W. and Loomis, M.E.S. Logical, internal, and physical reference behavior in CODASYL database systems. ACM Transactions on Database Systems, 9(2):187-213, 1984.]]
[9]
Effelsberg, W. and Haerder, T. Principles of database buffer management. ACM Transactions on Database Systems, 9(4):560-595, 1984.]]
[10]
Faloutsos, C., Ng, R., and Sellis, T. Predictive load control for flexible buffer allocation. Seventeenth International Conference on Very Large Databases, Barcelona, Spain, 1991.]]
[11]
Gray, J., ed. The Benchmark Handbook for Database and Transaction Processing Systems. San Mateo, CA: Morgan Kaufmann, 1991.]]
[12]
Hawthorn, P. and Stonebraker, M. Performance analysis of a relational data base management system. ACM SIGMOD, Boston, MA, 1979.]]
[13]
IBM Database 2 Administration Guide, Vol. III, Section 7, Performance Monitoring and Tuning, SC26-4888-00, 1993.]]
[14]
Kearns, J.P. and Defazio, S. Diversity in database reference behavior. Performance Evaluation Review, 17(1):11-19, 1989.]]
[15]
Kronenberg, N., Levy, H., and Strecker, W.D. VAXcluster: A closely-coupled distributed system. ACM Transactions on Computer Systems, 4:130-146, 1986.]]
[16]
Mattson, R.L., Gecsei, J., Slutz, D.R., and Traiger, I.L. Evaluation techniques for storage hierarchies. IBM Systems Journal, 9(2):78-117, 1970.]]
[17]
Ng, R., Faloutsos, C., and Sellis, T. Flexible buffer allocation based on marginal gains. ACM SIGMOD, Atlantic City, NJ, 1990.]]
[18]
Nicola, V.F., Dan, A., and Dias, D.M. Analysis of the generalized clock buffer replacement scheme for database transaction processing. ACM SIGMETRICS, Newport, RI, 1992.]]
[19]
Press, W.H., Flannery, B.P., Teukolsky, S.A., and Vetterling, W.T. Numerical Recipes. New York, NY: Cambridge University Press, 1986.]]
[20]
Rodriguez-Rosell, J. Empirical data reference behavior in data base systems. Computer, 9(11):3-13, 1976.]]
[21]
Sacco, G.M. and Schkolnick, M. Buffer management in relational database systems. ACM Transactions on Database Systems, 11(4):473-498, 1986.]]
[22]
Smith, A.J. Sequentiality and prefetching in database systems. ACM Transactions on Database Systems, 3(3):223-247, 1978.]]
[23]
Strickland, J.P., Uhrowczik, P.P., and Watts, V.L. IMS/VS: An evolving system. IBM Systems Journal, 21:490-510, 1982.]]
[24]
Tay, Y.C., Suri, R., and Goodman, N. A mean value performance model for locking in databases: The no-waiting case. Journal of the ACM, 32(3):618-651, 1985.]]
[25]
Teng, J.Z., and Gumaer, R.A. Managing IBM Database 2 Buffers to Maximize Performance. IBM Systems Journal, 23(2):211-218, 1984.]]
[26]
Van den Berg, J. and Towsley, D. Properties of the miss ratio for a 2-level storage model with LRU or FIFO replacement strategy and Independent References. IEEE Transactions on Computers, 42(4):508-512, 1993.]]
[27]
Verkamo, A.I. Empirical results on locality in database referencing. ACM SIGMETRICS, Austin, TX, 1985.]]
[28]
Yu, P.S., Dias, D.M., and Lavenberg, S.S. On the analytical modeling of database concurrency control. Journal of the ACM, 40(4):831-872, 1993.]]
[29]
Yu, P.S. and Cornell, D.W. Optimal buffer allocation in a multi-query environment. Seventh International Conference on Data Engineering, Kobe, Japan, 1991.]]

Cited By

View all
  • (2017)An empirical study of transaction throughput thrashing across multiple relational DBMSesInformation Systems10.1016/j.is.2016.12.00466:C(119-136)Online publication date: 1-Jun-2017
  • (2015)Oracle Workload IntelligenceProceedings of the 2015 ACM SIGMOD International Conference on Management of Data10.1145/2723372.2742791(1669-1681)Online publication date: 27-May-2015
  • (2013)Dynamic bitmap index recompression through workload-based optimizationsProceedings of the 17th International Database Engineering & Applications Symposium10.1145/2513591.2513641(96-105)Online publication date: 9-Oct-2013
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image The VLDB Journal — The International Journal on Very Large Data Bases
The VLDB Journal — The International Journal on Very Large Data Bases  Volume 4, Issue 1
January 1995
153 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 January 1995

Author Tags

  1. access skew
  2. analytic prediction
  3. database access characterization
  4. reference trace
  5. sequential access
  6. workload management

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)5
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)An empirical study of transaction throughput thrashing across multiple relational DBMSesInformation Systems10.1016/j.is.2016.12.00466:C(119-136)Online publication date: 1-Jun-2017
  • (2015)Oracle Workload IntelligenceProceedings of the 2015 ACM SIGMOD International Conference on Management of Data10.1145/2723372.2742791(1669-1681)Online publication date: 27-May-2015
  • (2013)Dynamic bitmap index recompression through workload-based optimizationsProceedings of the 17th International Database Engineering & Applications Symposium10.1145/2513591.2513641(96-105)Online publication date: 9-Oct-2013
  • (2012)Surveying the landscapeProceedings of the 20th International Conference on Advances in Geographic Information Systems10.1145/2424321.2424369(376-385)Online publication date: 6-Nov-2012
  • (2008)A new approach to dynamic self-tuning of database buffersACM Transactions on Storage10.1145/1353452.13534554:1(1-25)Online publication date: 28-May-2008
  • (2008)Is it DSS or OLTPJournal of Intelligent Information Systems10.1007/s10844-006-0036-630:3(249-271)Online publication date: 1-Jun-2008
  • (2006)A page fault equation for modeling the effect of memory sizePerformance Evaluation10.1016/j.peva.2005.01.00763:2(99-130)Online publication date: 1-Feb-2006
  • (2006)Mining and modeling database user access patternsProceedings of the 16th international conference on Foundations of Intelligent Systems10.1007/11875604_56(493-503)Online publication date: 27-Sep-2006
  • (2006)Least likely to useProceedings of the First international computer science conference on Theory and Applications10.1007/11753728_52(514-523)Online publication date: 8-Jun-2006
  • (2002)Configuring buffer pools in DB2 UDBProceedings of the 2002 conference of the Centre for Advanced Studies on Collaborative research10.5555/782115.782128Online publication date: 30-Sep-2002
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media