SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011



      Synthesis of Non-Replicated Dynamic Fragment
       Allocation Algorithm in Distributed Database
                         Systems
                                                       Nilarun Mukherjee
                                            Senior Lecturer, Department of CSE/IT
                                  Bengal Institute of Technology, Kolkata, West Bengal, India
                                                 nilarun.mukherjee@gmail.com


Abstract— Distributed databases have become the most                     communication overhead with respect to a centralized
essential technology for recent business organizations. In most          database.
of the cases Distributed Databases are developed in a Bottom-                 In most of the cases Distributed Databases are developed
Up approach, fragmentation exists beforehand. The optimum                in a Bottom-Up approach, where several already existing
allocation of those fragments is the only way, which can be              centralized databases located at several geographically
exploited by the designers to increase the performance,                  dispersed sites are integrated to form the Distributed
efficiency, reliability and availability of the Distributed
                                                                         Database. In this scenario, there is no scope of fresh
Database in the realistic dynamic environment, where the access
probabilities of nodes to fragments change over time. In this            fragmentation, as the fragments exists beforehand and they
paper, a new dynamic fragment allocation algorithm is                    are analyzed and integrated to form the global relations.
proposed in Non-Replicated allocation scenario, which                    Moreover, fragmentation depends highly on the business and
incorporates the time constraints of database accesses, volume           organizational requirements. Therefore, the optimum
threshold and the volume of data transmitted in successive time          allocation of those fragments is the only way, which can be
intervals to dynamically reallocate fragments to sites at runtime        exploited by the designers to increase the performance,
in accordance with the changing access patterns. It will migrate         efficiency, reliability and availability of the Distributed
a fragment to a particular site only when that site has made             Database. The main aim is to maximize the locality of
data transfer higher than all other sites and greater than the
                                                                         processing for each distributed application by storing the
threshold value from or to that fragment consistently in some
recent time intervals. The choice of the volume threshold, the           fragments closer to where they are more frequently used in
number of time intervals and the duration of each time interval          order to achieve best performance. This means placing data
are the most important factors which regulate the frequency              i.e. fragments required by the distributed applications at their
of fragment reallocations. The proposed algorithm will decrease          site of origin or at sites which are closer to their site of origin.
the movement of fragments over the network and data transfer             I.e. to maximize the “local” references and to minimize
cost and will also improve the overall performance of the system         “remote” references to the data by each distributed
by dynamically allocating fragments in a most optimum and                application with respect to its site of origin [9]. This is done
intuitive manner.                                                        by adding the number of local and remote references
                                                                         corresponding to each candidate fragmentation and fragment
Index Terms— Distributed Database, Fragmentation, Dynamic
Fragment Allocation, Distributed Transaction, Local Agent,               allocation, and selecting the best solution among them, i.e.
Root Agent                                                               the solution providing highest processing locality or
                                                                         Complete Locality to maximum number of distributed
                        I.INTRODUCTION                                   applications. The Complete Locality means the distributed
                                                                         application can be completely executed at its site of origin;
    A Distributed Database is a collection of data, which                thus reducing overall remote accesses and simplifying the
logically belong to the same system, but are distributed over            control mechanism for the execution of the distributed
the sites of a computer network. Each site of the network                applications. A poorly designed data allocation can lead to
has autonomous processing capability and can perform local               inefficient computation, high access cost and high network
database applications [9]. Each site also participates in the            loads.
execution of at least one global database application, which                  Various approaches have already been evolved for
requires accessing data residing at several different sites from         dynamic allocation of data in distributed database [1] to
geographically dispersed locations, using a communication                improve the database performance. These address the more
subsystem.                                                               realistic dynamic environment, where the access probabilities
    The primal motivations for distributed databases are to              of nodes to fragments change over time. Fragment allocation
improve performance, to increase the availability of data,               can further be divided in two ways:
shareability, expandability and access facility. In a distributed
database, maximization of the locality of processing of                   A.. Non – Redundant Fragment Allocation:
database applications by allocating data as close as possible               Each fragment of each global relation is allocated to
to the applications which use them, significantly reduces the            exactly one site.

© 2011 ACEEE                                                        36
DOI: 01.IJIT.01.01.98
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011

  B. Redundant Fragment Allocation:                                     the fragments are continuously reallocated according to the
    Fragments of each global relation are allocated to one or           changing data access patterns.
more sites introducing replication of the fragments. In this                In this paper, a new dynamic fragment allocation
paper, a new dynamic fragment allocation algorithm is                   algorithm is proposed in Non-Replicated allocation scenario.
proposed in Non-Replicated allocation scenario, which                   The proposed algorithm incorporates the volume threshold,
incorporates the time constraints of database accesses, the             the time constraints of database accesses and most
volume threshold and most importantly the volume of data                importantly the volume of data transmitted in successive time
transmitted in successive time intervals to dynamically                 intervals to dynamically reallocate fragments to sites at
reallocate fragments to sites at runtime in accordance with             runtime in accordance with the changing access patterns i.e.
the changing access patterns i.e. in accordance with the                in accordance with the changing access probabilities of nodes
changing access probabilities of nodes to fragments over                to fragments over time. It will migrate a fragment to a
time. The proposed algorithm will decrease the movement                 particular site only when that site has made data transfer
of fragments over the network and data transfer cost and                higher than all other sites and also greater than the threshold
will also improve the overall performance of the system by              value from or to that fragment consistently over some recent
dynamically allocating fragments in a most optimum and                  time intervals. The choice of the volume threshold, the
intuitive manner.                                                       number of time intervals and the duration of each time
                                                                        interval are the most important factors which regulate the
                       II.RELATED WORK                                  frequency of fragment reallocations i.e. the performance of
                                                                        the algorithm.
    Till date many works have been published on the problem
of allocation of data or fragments of the global relations to                                      III.DESIGN
geographically dispersed sites of a distributed database. [10]
considered the problem of file allocation for typical                       The main factor that affects the efficiency and turnaround
distributed database applications with a simple model of                time of the applications of a distributed database is the time
transaction execution. [11] incorporated issues like                    delay for transferring the data needed by a certain distributed
concurrency and queuing costs. [12] provides an integrated              database query or application, over the network from the
approach for fragmentation and allocation. [12] identified              fragments located at several different geographically
seven criteria that a system designer can use to determine              dispersed sites to the site of origin of the application or query.
the fragmentation, replication and allocation. [15] presents            The primary aim is to allocated fragments needed by certain
a replication algorithm that adaptively adjusts to changes in           distributed database application either at the same site where
read-write patterns. [16] provides an approach based on                 the distributed database application / query is invoked or at
Lagrangian relaxation and [17] describes heuristic                      sites closer to the site of origin, so that the data transmission
approaches. More recently [18] has given a high-performance             over the network is minimized during the execution of the
computing method for data allocation in distributed database            application / query. It is a considerably complex problem,
system.                                                                 especially, in the scenario where the probability or pattern
    In most of the above approaches, data allocation has been           of accessing fragments by the distributed database
proposed prior to the design of the distributed database,               applications at different sites changes dynamically over time.
depending on some static data access patterns and/or query              Also, it is not a feasible solution to place the entire data of a
patterns. Static allocation of fragments provides the best              distributed database at every site of the system; it will violate
solution when the access probabilities of nodes to fragments            the basic requirements of a distributed database [9].
never change over time, but, degrades performance in a                      The proposed algorithm for dynamic fragment allocation
dynamic environment, where probabilities change over time.              in distributed database exploits the concepts of the existing
    Over past few years, work has been introduced for                   algorithms: the Optimal Algorithm [4], the Threshold
dynamic fragment allocation in distributed database systems.            Algorithm [21] and TTCA Algorithm [1]. In distributed
[15] gives a model for dynamic data allocation for data                 database the efficiency and turnaround time of the distributed
redistribution and incorporates a concurrency mechanism.                database applications ultimately depends on the volume of
In [4] an algorithm is proposed for dynamic data allocation,            data that is required to get transferred over the network from
which reallocates data with respect to the changing data                one site to another due to the execution of those applications.
access patterns. [13] provides approach for allocating                  Reallocating a fragment from a certain site to another site,
fragments by adapting a machine learning approach. [7]                  which makes the highest number of accesses to that fragment
considers incremental allocation and reallocation based on              and not to the site, which even though does not make the
changes in workload. [19] incorporated security                         highest number of accesses to that fragment but results in
considerations into the dynamic file allocation process. In             transmission of maximum volume of data from or to that
[20] an optimal fragment allocation algorithm for non-                  fragment, will not be always beneficial i.e. will not always
replicated distributed database systems is proposed. [21] has           improve the overall performance or efficiency of the
introduced a threshold algorithm for non-replicated fragment            distributed database.
allocation in distributed databases. In the threshold algorithm,            The main agenda of the proposed algorithm is to
                                                                        reallocate a fragment located at a certain site to another site,

© 2011 ACEEE                                                       37
DOI: 01.IJIT.01.01.98
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011

which has made highest data transmission from or to that                         1,2,3,…to infinity and h = 1,2,3,...M) stores the following
fragment consistently over time, not to the site making                          information regarding each access:
highest or frequent accesses but transferring comparably                            • Name or Identifier of the Fragment accessed.
small amount of data from or to that fragment. The value of                         • Address of the accessing site.
the Consistency Threshold (ë) determines the number recent                          • Date and Time of the access.
time intervals for which a particular site has to consistently                      • The volume of data transmitted from or to that
make data transmission higher than all other sites and also                             fragment in Bytes.
greater than the data Volume Threshold (í) from or to a                      3. Three parameters are used to tune the performance of
particular fragment located at another site, to get that                         the algorithm:
fragment reallocated at this new site. The duration                                 • Time Constraint for Fragment Reallocation (ô).
         of each time interval is determined by the Time                            • Volume Threshold for Fragment Reallocation (í ).
           Constraint for Fragment Reallocation (ô).                                •· Consistency Threshold (ë).
    Moreover, most of the time the site which consistently                   4. The proposed algorithm needs each site to maintain a
makes the highest number of accesses to a particular fragment                    separate data structure named Access Counter for each
located at a particular site in some recent time intervals also                  fragment located at that site, which stores the following
results in transmission of maximum volume of data from or                        information after each access to that fragment:
to that fragment in that time duration. Thus, for most of the                       • Candidate Site Address: The address of the site
cases the proposed algorithm for dynamic fragment                                       which has made data transmission from or to that
allocation will reflect the most realistic scenario and will                            fragment higher than all other sites and also greater
result in more intuitive and optimum dynamic fragment                                   than í in the current time interval. Initially it is set
reallocation, in Non-Replicated allocation scenario.                                    to the address of the site where the fragment is
Furthermore, reallocation of fragments from one site to                                 located.
another site over the network just in order to make the                             • Number of Recent Time Intervals: It provides the
distributed database applications to have their required data                           number of recent time intervals for which the
at their site of origin or at the sites very closer to their site of                    Candidate Site has made data transmission from or
origin, incurs huge data transmission over the network and                              to that fragment higher than all other sites and also
results in transmission overload. Because, fragments are                                greater than í . Initially it is set to the value of the
expected to contain huge amount of data as compared to the                              Consistency Threshold (ë) + 1.
data required by and transmitted due to the execution of those                   The following Steps [5 to 7] are performed at each site
distributed database applications. Thus, it is not desirable to             for each individual access to a fragment allocated at that site
have frequent migrations of fragments over the network, as                  by a certain distributed database query or application invoked
this can significantly affect or degrade the overall                        at the same or different site. Suppose at site h an access is
performance or efficiency of the distributed database.                      made and processed for fragment i allocated at that site from
    The proposed dynamic fragment allocation algorithm                      site j at time t, where h = 1,2,3,…M, i = 1,2,3,...N and j =
migrates a fragment located at a certain site to another site,              1,2,3,...M and h = j or h ‘“ j. The local agent at site h performs
which has made highest data transmission from or to that                    the following operations:
fragment than all other sites and also greater than the Volume               5. Write a log record Akh in the Access Log at site h.
Threshold for Fragment Reallocation (í) consistently over                    6. Calculate the total volume of data transmitted (in bytes)
at least ë + 1 recent time intervals, where ë is the Consistency                 in between the fragment i and all the sites (including site
Threshold and the duration of each time interval is                              h) where from the accesses to the fragment i located at
determined by the Time Constraint for Fragment Reallocation                      site h are made, through the accesses occurred within the
(ô). The Algorithm:                                                              time interval ô up to current access time t. Akh Vim denotes
 1. Initially all the fragments of all the global relations of                   the volume of data transmitted (in bytes) in between the
    the distributed database are distributed over different sites                fragment i allocated at site h and the site m in the access
    using any static allocation method in non-replicated                         Akh at certain point of time, where m = 1,2,3,...M. The
    manner. Let there be total N number of fragments of                          total volume of data transmitted (denoted by Vim t) in
    global relations distributed among the total M number of                     between the fragment i allocated at site h and the site m
    sites in the distributed database system. Each site has one                  through the accesses occurred within the time interval ô
    or more fragments allocated to it. A distributed database                    up to current access time t is calculated as:
    query or application may require accessing several                                  Vimt =“ AkhVim
    different fragments allocated at several different sites for                 Where Akh occurred within the time interval ô up to
    execution.                                                                   current access time t. Vimt is calculated for all the sites
 2. Each site maintains a separate data structure named Access                   (including site h) where from the accesses to the fragment
    Log, which stores certain information regarding each                         h are made, through the accesses occurred within the time
    access to the fragments allocated at that site, by the                       interval ô up to current access time t.
    distributed database queries or applications invoked at                  7. If the total volume of data transmitted (in bytes) in between
    the same or different sites. Each Access Log record                          the fragment i allocated at site h and the site j through the
    denoted by A kh (i.e. k th access at site h, where k =
© 2011 ACEEE                                                           38
DOI: 01.IJIT.01.01.98
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011

    accesses occurred within the time interval ô up to current              of the distributed transaction. Thereafter, the local agent sends
    access time t is greater than í and is also greater than the            those data along with the command (insert or update) to the
    total volume of data transmitted (in bytes) in between                  local transaction manager, which actually accesses the
    the fragment i and all other sites (including site h) where             database table corresponding to that fragment stored at the
    from the accesses to the fragment i located at site h are               local database to perform insertion or modification. In case
    made, through the accesses occurred within the time                     of retrieval, the local agent receives the data retrieved from
    interval ô up to current access time t, i.e. if and only if Vijt        the database table stored at the local database corresponding
    > í and Vijt > Vimt and where j, m = 1,2,3,...M and m ‘“ j,             to a particular fragment through the local transaction
    then in the Access Counter for fragment i at site h the                 manager. Thereafter, it sends those retrieved data to the root
    following operations are executed, otherwise do nothing:                agent of the distributed transaction executing at the same or
      • If the address of the accessing site in the log record              different site in the distributed database network. In all the
          Akh is same as the address of site h, i.e. the access is          cases the local agent of the distributed database transaction
          made from the same site (h = j), then:                            temporarily retains the data to be inserted or to be used to
          i. If the Candidate Site Address in the Access                    modify the existing data in the particular fragment or being
             Counter for fragment i is same as the address of               retrieved from the particular fragment during the execution
            site h, then do nothing as fragment i is already                of a of the distributed database application or query.
            allocated to site h.                                            Moreover, the local agent belongs to the distributed database
          ii. Else if the Candidate Site Address in the Access              transaction management system and it is designed and
              Counter for fragment i is not same as the address             programmed by the developer of the distributed database
               of site h, then update the Candidate Site Address            management system. Therefore, it is possible to enhance the
              in the Access Counter for fragment i with the                 distributed database transaction management system and the
              address of site h and set the value of the                    local agents of the distributed database transactions to add
              corresponding Number of Recent Time Intervals                 the functionality of writing Access Log Records and to
              to Consistency Threshold (ë) + 1.                             calculate the volume of data transmitted from or to each
    • Else if the address of the accessing site in the log                  fragment (in Bytes) at each fragment access and to maintain
        record Akh is different from the address of site h, i.e.            the Access Counter, i.e. to implement the proposed dynamic
        the access is made from a different site (h ‘“ j); then:            fragment allocation algorithm.
        iii. If the Candidate Site Address in the Access
             Counter for fragment i is same as the address of                                   IV.PERFORMANCE EVALUATION
             site j, then increment the corresponding Number
                                                                                In Optimal Algorithm [4], initially all the fragments are
            of Recent Time Intervals by 1. The incremented
                                                                            distributed over the different sites using any static data
             value indicates that site j has made data
                                                                            allocation method. After the initial allocation, system
             transmission from or to that fragment higher than
                                                                            maintains an access counter matrix for each locally stored
            all other sites and also greater than í from or to
                                                                            fragment at each site or node. Every time an access request
            that fragment for that number of recent time
                                                                            is made for the locally stored fragment, the access counter
            intervals.
                                                                            of the accessing site for that fragment is increases by one. If
        iv. If the updated value of the Number of Recent
                                                                            the counter of a remote node becomes greater than the counter
            Time Intervals in the Access Counter for fragment
                                                                            of the current owner, then the fragment is moved to the
             i is greater than ë, then the fragment i is migrated
                                                                            accessing node. The problem of Optimal Algorithm [4]
            and reallocated to site j and removed from the
                                                                            technique is that if the changing frequency of access pattern
            current site h, catalogs are updated accordingly.
                                                                            for each fragment is high, then it will spend more time for
        v. If the Candidate Site Address in the Access Counter
                                                                            transferring fragments to different sites and will incur huge
            for fragment i is not same as the address of site j,
                                                                            data transmission overload. Threshold algorithm [21]
            then update the Candidate Site Address in the
                                                                            decreases the migration of fragments and guarantees the stay
            Access Counter for fragment i with the address of
                                                                            of the fragment for at least (ç +1) accesses at the new node
           site j and set the value of the corresponding Number
                                                                            after a migration, where ç is the value of threshold. But
           of Recent Time Intervals to 1. This indicates that
                                                                            threshold algorithm resets the counter of local fragment to
           site j has made data transmission from or to that
                                                                            zero, every time a node is going for a local access and it
           fragment higher than all other sites and also greater
                                                                            does not specify which node will be the fragment’s new
           than í during the current time interval not in the
                                                                            owner when the counter exceeds the threshold value, also it
           immediately preceding time interval.
                                                                            does not give the information about past accesses of the
   In distributed database, at each site the local agent of a
                                                                            fragments and does not consider the time variable of the
remote or local distributed transaction accesses or interacts
                                                                            access pattern.
with the local database where the fragments of the global
                                                                                The TTCA [1] algorithm removes all the above problems
relations are actually stored [9]. In case of insertion or
                                                                            of threshold algorithm [21] by adding a time constraint to
modification operations on a fragment, the local agent
                                                                            consider the time of the accesses made to a particular
receives the data to be inserted or to be used to modify the
                                                                            fragment. TTCA [1] decreases the migration of fragments
existing data in the particular fragment from the root agent

© 2011 ACEEE                                                           39
DOI: 01.IJIT.01.01.98
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011

over different sites, thus reduces the transmission overload              algorithm in the distributed database suggest that the
due to fragment migrations as compare to simple Threshold                 performance of the proposed algorithm i.e. the impact of the
algorithm [21]. TTCA [1] maintains a counter matrix at each               proposed algorithm on the performance and efficiency of
site to store the number of accesses made by the sites to a               the distributed database varies widely with different values
particular fragment located at that site, which is incremented            of the above regulating parameters. Special care and critical
on each access. It reallocates data with respect to the changing          analysis should be performed to choose the most appropriate
data access patterns with time constraint. It migrates a                  values of the Volume Threshold (í), Time Constraint (ô) and
fragment from one site to another site, which has most                    the Consistency Threshold (ë) to highly optimize the
recently accessed that fragment for ç + 1 numbers of times                algorithm to maximize the performance and efficiency of
in a time period ô up to the current access time, where ç is              the distributed database.
the Threshold Value and ô is the Time Constraint. But TTCA                     If í is made very low i.e. below the average data transfer
[1] does not store the time of those accesses in that counter             volume between the sites of the distributed database network,
matrix. Therefore, it does not provide any conceivable                    then the proposed algorithm will practically migrate
method to determine within which time period the certain                  fragments to other sites, depending only on one condition
number of accesses (determined by the value of the counter)               i.e. the site which results in higher transmission of data than
made by a certain site to a particular fragment located at                all other sites from or to that fragment in some recent time
another site have occurred.                                               intervals will get that fragment reallocated or migrated to it.
    The proposed algorithm will remove all the above
problems of Threshold [21] and TTCA [1] algorithm. It will
dynamically reallocate fragments at runtime in accordance
with the changing access probabilities of sites to fragments
over time. This dynamic fragment allocation algorithm
migrates a fragment located at a certain site to another site,
which results in transmission of data higher than all other
sites and also greater than the predefined threshold value                    In Figure 1, the frequency of fragment reallocation (ø )
from or to that fragment consistently over some recent time               is plotted against í, ë and ô. The impact of í , ë and ô on the
intervals. It reduces the transfer of data over the network               rate of fragment migration in the distributed database i.e. on
during the execution of the distributed database application              the performance of the proposed dynamic fragment allocation
/ query, in Non-Replicated allocation scenario.                           algorithm is clearly evident from the above graphical
    The proposed algorithm improves the overall                           representation.
performance or efficiency of the distributed database by                      If í and ë is decreased and ô is increased, then there will
imposing a more strict condition for fragment reallocation                be frequent fragment migrations. On the other hand, if í and
in distributed database and resulting in fewer migrations of              ë is increased and ô is decreased, then after a certain point
fragments from one site to other over the network and further             there will rarely be any fragment migrations. Because, it will
reduces the data transmission overload due to fragment                    be extremely hard for any site to be the highest data transferee
migrations as compared to the Optimal Algorithm [4], the                  (higher than all other sites and also greater than í) from or
Threshold Algorithm [21] and TTCA Algorithm [1]. The                      to a particular fragment consistently over a large number of
choice of the most appropriate values of í, ô and ë serves as             recent short time intervals i.e. to fulfill the condition for
the key factors for determining the optimum performance of                fragment reallocation and to get that fragment reallocated to
the algorithm, to minimize unnecessary fragment migrations                it.
and data transfer over the network required during the                        The proposed algorithm requires more storage space and
execution of the distributed database queries or applications             increases the storage cost due to the maintenance of the
by increasing their locality of processing i.e. to maximize               Access Counter as well as the Access Log at the sites in which
the overall throughput, performance and efficiency of the                 log records are created for each access. It incurs more
distributed database applications. For fixed values of í and              computational overhead per database access at each site due
ô, if ë is increased, then the migration of fragments from one            to the calculation of the total volume of data transmitted (in
site to other will sharply decrease vice versa, as it will be             bytes) in between that fragment and all the sites where from
very hard for any site to be the highest data transferee from             the accesses to that fragment are made, through the accesses
or to a particular fragment consistently over a large number              occurred within the time interval ô up to current access time.
of recent time intervals. I.e.                                                But these drawbacks are well compensated by the
                                                                          advantage gained from the significant reduction in the
                                                                          unnecessary fragment migrations as compared to the Optimal
   For fixed values of ô and ë, if the value of í is increased,           Algorithm [4], the Threshold Algorithm [21] and TTCA
then the migration of fragments from one site to other will               Algorithm [1], which incurs huge data transmission overload
decrease vice versa. For fixed values of í and the ë, if the              and degrades the overall performance and efficiency of the
value of ô is increased, then the migration of fragments from             distributed database. Thus, for most of the cases the proposed
one site to other will increase vice versa. The results of several        algorithm for dynamic fragment allocation will reflect the
experiments simulating the implementation of the proposed                 most realistic scenario and will result in more intuitive and
© 2011 ACEEE                                                         40
DOI: 01.IJIT.01.01.98
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011

optimum dynamic fragment reallocation, in Non-Replicated                [4] A. Brunstroml, S.T. Leutenegger and R. Simhal, “Experimental
allocation scenario.                                                         Evaluation of Dynamic Data Allocation Strategies in a
                                                                             Distributed Database with changing Workload”, ACM Trans.
                        V.CONCLUSION                                         Database Systems, 1995.
                                                                        [5] S. March and S. Rho, “Allocating Data and Operations to
           In this paper a new sophisticated dynamic fragment                Nodes in Distributed Database Design,” IEEE Trans.
allocation algorithm is proposed in Non-Replicated                           Knowledge & Data Eng., Vol. 7, no. 2, pp. 305-317, 1995.
allocation scenario. The proposed algorithm incorporates the            [6] T. Ulus and M. Uysal, “A Threshold Based Dynamic Data
time constraints of database accesses, volume threshold and                  Allocation Algorithm - A Markove Chain Model Approach”,
                                                                             Journal of Applied Science, Vol. 7(2), pp 165-174, 2007.
most importantly the volume of data transmitted in successive
                                                                        [7] A. Chin, “Incremental Data Allocation and Reallocation in
time intervals to dynamically reallocate fragments to sites at               Distributed Database Systems”, Journal of Database
runtime in accordance with the changing access probabilities                 Management, Vol. 12, No. 1, pp. 35-45, 2001.
of nodes to fragments over time. The proposed algorithm                 [8] Hideo Hanamura, Isao Kaji, Kinji Mori, “Autonomous
migrates a fragment located at a certain site to another site,               Consistency Technique in Distributed Database with
which has made higher data transmission from or to that                      Heterogeneous Requirements”, IPDPS Workshops 2000, pp.
fragment than all other sites and also greater than the Volume               706-712, 2000.
Threshold for Fragment Reallocation (í) consistently over               [9] S. Ceri and G. Pelegatti, “Distributed Database Principles &
at least ë + 1 recent time intervals, where ë is the Consistency             Systems”, McGraw-Hill International Editions.
                                                                        [10] S. Ceri, G. Martella, and G. Pelagatti, “Optimal file Allocation
Threshold and the duration of each time interval is
                                                                             for a Distributed Database on a Network of Minicomputers”,
determined by the Time Constraint for Fragment Reallocation                  in Proc. International Conf. on Database, Aberdeen, July
(ô). The proposed algorithm improves the overall                             1980, British Computer Society Hayden.
performance or efficiency of the distributed database by                [11]       S. Ram and S. Narasimhan, “Database Allocation in a
imposing a more strict condition for fragment reallocation                   Distributed Environment: Incorporating a Concurrency
in distributed database and results in significant reduction                 Control Mechanism and Queuing Costs”, Management
in the frequency of unnecessary fragment migrations from                     Science, vol. 40, no. 8, pp. 969-983, 1994.
one site to other over the network and thus substantially               [12] K. Karlaplem and N. Pun, “Query-Driven Data Allocation
reduces the data transmission overload due to fragment                       Algorithms for Distributed Database Systems”, Proc. Eighth
                                                                             International Conf. Database and Expert Systems Applications
migrations as compared to the Optimal Algorithm [4], the
                                                                             (DEXA ’97), pp. 347- 356, Sept. 1997.
Threshold Algorithm [21] and TTCA Algorithm [1]. The                    [13] A. Tamhankar and S. Ram, “Database Fragmentation and
results of several experiments simulating the implementation                 Allocation: An Integrated Methodology and Case Study”,
of the proposed algorithm in the distributed database suggest                IEEE Trans. Systems, Man and Cybernetics—Part A, vol. 28,
that the choice of the most appropriate values of í , ô and ë                no. 3, May 1998.
serves as the key factors for determining the optimum                   [14] A. Chaturvedi, A. Choubey, and J. Roan, “Scheduling the
performance of the algorithm, to minimize the frequency of                   Allocation of Data Fragments in a Distributed Database
unnecessary fragment migrations and to minimize the transfer                 Environment: A Machine Learning Approach”, IEEE Trans.
                                                                             Eng. Management, vol. 41, no. 2, pp. 194-207, 1994.
of data over the network required during the execution of
                                                                        [15] O. Wolfson, S. Jajodia, and Y. Huang, “An Adaptive Data
the distributed database queries or applications by increasing               Replication Algorithm”, ACM Trans. Database Systems, vol.
their locality of processing i.e. to maximize the overall                    22, no. 2, pp. 255-314, 1997.
throughput, performance and efficiency of the distributed               [16] G. Chiu and C. Raghavendra, “A Model for Optimal Database
database applications.                                                       Allocation in Distributed Computing Systems”, Proc. IEEE
                                                                             INFOCOM 1990, vol. 3, pp. 827-833, June 1990.
                          REFERENCES                                    [17] Y. Huang and J. Chen, “Fragment Allocation in Distributed
                                                                             Database Design”, Journal of Information Science and Eng.,
[1] Arjan Singh and K.S. Kahlon, “Non-replicated Dynamic Data                vol. 17, pp. 491- 506, 2001.
    Allocation in Distributed Database Systems”, IJCSNS                 [18] I.O. Hababeh, M. Ramachandran and N. Bowring, “A high-
    International Journal of Computer Science and Network                    performance computing method for data allocation in
    Security, VOL.9 No.9, pp. 176-180, September 2009.                       distributed database systems”, Springer, Journal of
[2] Svetlana Vasileva, Petar Milev, Borislav Stoyanov, “Some                 Supercomputer (2007) 39:3-18.
    Models of a Distributed Database Management System with             [19] A. Mei, L. Mancini, and S. Jajodia, “Secure Dynamic Fragment
    data Replication”, International Conference on Computer                  and Replica Allocation in Large-Scale Distributed File
    Systems and Technologies-CompSysTech’07, Vol.–II, pp.                    Systems”, IEEE Trans. Parallel and Distributed Systems, vol.
    II.12.1–II.12.6, 2007.                                                   14, no. 9, pp. 885-896, Sept. 2003.
[3] S. Agrawal, V. Narasayya, and B. Yang, “Integrating Vertical        [20] L.S. John, “A Generic Algorithm for Fragment Allocation in
    and Horizontal Partitioning into Automated Physical Database             Distributed Database System”, ACM 1994.
    Design”, Proc. 2004, ACM SIGMOD International Conf.                 [21] T. Ulus and M. Uysal, “Heuristic Approach to Dynamic Data
    Management of Data, pp. 359-370, 2004.                                   Allocation in Distributed Database Systems”, Pakistan
                                                                             Journal of Information and Technology, 2(3): pp. 231-239,
                                                                             2003.




© 2011 ACEEE                                                       41
DOI: 01.IJIT.01.01.98

Weitere ähnliche Inhalte

Was ist angesagt?

TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellulareSAT Publishing House
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13Uvaraj Shan
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...IJCNCJournal
 

Was ist angesagt? (10)

TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
Continuous query processing for mobile users
Continuous query processing for mobile usersContinuous query processing for mobile users
Continuous query processing for mobile users
 
PhD_Thesis
PhD_ThesisPhD_Thesis
PhD_Thesis
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 

Ähnlich wie Dynamic Fragment Allocation Algorithm

An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...Alexander Decker
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
DistributeddatabasesforchallengednetVinoth Chandar
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple Sncct
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
 
Scalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesScalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesVenkat Projects
 
Final jaypaper linux
Final jaypaper linuxFinal jaypaper linux
Final jaypaper linuxjaya380
 
QoS_Aware_Replica_Control_Strategies_for_Distributed_Real_time_dbms.pdf
QoS_Aware_Replica_Control_Strategies_for_Distributed_Real_time_dbms.pdfQoS_Aware_Replica_Control_Strategies_for_Distributed_Real_time_dbms.pdf
QoS_Aware_Replica_Control_Strategies_for_Distributed_Real_time_dbms.pdfneju3
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Journal of Software Engineering and Applications, 2014, 7, 891.docx
Journal of Software Engineering and Applications, 2014, 7, 891.docxJournal of Software Engineering and Applications, 2014, 7, 891.docx
Journal of Software Engineering and Applications, 2014, 7, 891.docxLaticiaGrissomzz
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicasIJCNCJournal
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...graphhoc
 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...IOSR Journals
 
Distributed database
Distributed databaseDistributed database
Distributed databasesanjay joshi
 

Ähnlich wie Dynamic Fragment Allocation Algorithm (20)

An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple S
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
 
Scalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesScalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storages
 
Final jaypaper linux
Final jaypaper linuxFinal jaypaper linux
Final jaypaper linux
 
QoS_Aware_Replica_Control_Strategies_for_Distributed_Real_time_dbms.pdf
QoS_Aware_Replica_Control_Strategies_for_Distributed_Real_time_dbms.pdfQoS_Aware_Replica_Control_Strategies_for_Distributed_Real_time_dbms.pdf
QoS_Aware_Replica_Control_Strategies_for_Distributed_Real_time_dbms.pdf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Journal of Software Engineering and Applications, 2014, 7, 891.docx
Journal of Software Engineering and Applications, 2014, 7, 891.docxJournal of Software Engineering and Applications, 2014, 7, 891.docx
Journal of Software Engineering and Applications, 2014, 7, 891.docx
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Hm2413291336
Hm2413291336Hm2413291336
Hm2413291336
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicas
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
H017144148
H017144148H017144148
H017144148
 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
 
ICICCE0298
ICICCE0298ICICCE0298
ICICCE0298
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity FilteringIDES Editor
 
Optimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesOptimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesIDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering
 
Optimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesOptimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral Images
 

Kürzlich hochgeladen

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Kürzlich hochgeladen (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Dynamic Fragment Allocation Algorithm

  • 1. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distributed Database Systems Nilarun Mukherjee Senior Lecturer, Department of CSE/IT Bengal Institute of Technology, Kolkata, West Bengal, India nilarun.mukherjee@gmail.com Abstract— Distributed databases have become the most communication overhead with respect to a centralized essential technology for recent business organizations. In most database. of the cases Distributed Databases are developed in a Bottom- In most of the cases Distributed Databases are developed Up approach, fragmentation exists beforehand. The optimum in a Bottom-Up approach, where several already existing allocation of those fragments is the only way, which can be centralized databases located at several geographically exploited by the designers to increase the performance, dispersed sites are integrated to form the Distributed efficiency, reliability and availability of the Distributed Database. In this scenario, there is no scope of fresh Database in the realistic dynamic environment, where the access probabilities of nodes to fragments change over time. In this fragmentation, as the fragments exists beforehand and they paper, a new dynamic fragment allocation algorithm is are analyzed and integrated to form the global relations. proposed in Non-Replicated allocation scenario, which Moreover, fragmentation depends highly on the business and incorporates the time constraints of database accesses, volume organizational requirements. Therefore, the optimum threshold and the volume of data transmitted in successive time allocation of those fragments is the only way, which can be intervals to dynamically reallocate fragments to sites at runtime exploited by the designers to increase the performance, in accordance with the changing access patterns. It will migrate efficiency, reliability and availability of the Distributed a fragment to a particular site only when that site has made Database. The main aim is to maximize the locality of data transfer higher than all other sites and greater than the processing for each distributed application by storing the threshold value from or to that fragment consistently in some recent time intervals. The choice of the volume threshold, the fragments closer to where they are more frequently used in number of time intervals and the duration of each time interval order to achieve best performance. This means placing data are the most important factors which regulate the frequency i.e. fragments required by the distributed applications at their of fragment reallocations. The proposed algorithm will decrease site of origin or at sites which are closer to their site of origin. the movement of fragments over the network and data transfer I.e. to maximize the “local” references and to minimize cost and will also improve the overall performance of the system “remote” references to the data by each distributed by dynamically allocating fragments in a most optimum and application with respect to its site of origin [9]. This is done intuitive manner. by adding the number of local and remote references corresponding to each candidate fragmentation and fragment Index Terms— Distributed Database, Fragmentation, Dynamic Fragment Allocation, Distributed Transaction, Local Agent, allocation, and selecting the best solution among them, i.e. Root Agent the solution providing highest processing locality or Complete Locality to maximum number of distributed I.INTRODUCTION applications. The Complete Locality means the distributed application can be completely executed at its site of origin; A Distributed Database is a collection of data, which thus reducing overall remote accesses and simplifying the logically belong to the same system, but are distributed over control mechanism for the execution of the distributed the sites of a computer network. Each site of the network applications. A poorly designed data allocation can lead to has autonomous processing capability and can perform local inefficient computation, high access cost and high network database applications [9]. Each site also participates in the loads. execution of at least one global database application, which Various approaches have already been evolved for requires accessing data residing at several different sites from dynamic allocation of data in distributed database [1] to geographically dispersed locations, using a communication improve the database performance. These address the more subsystem. realistic dynamic environment, where the access probabilities The primal motivations for distributed databases are to of nodes to fragments change over time. Fragment allocation improve performance, to increase the availability of data, can further be divided in two ways: shareability, expandability and access facility. In a distributed database, maximization of the locality of processing of A.. Non – Redundant Fragment Allocation: database applications by allocating data as close as possible Each fragment of each global relation is allocated to to the applications which use them, significantly reduces the exactly one site. © 2011 ACEEE 36 DOI: 01.IJIT.01.01.98
  • 2. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 B. Redundant Fragment Allocation: the fragments are continuously reallocated according to the Fragments of each global relation are allocated to one or changing data access patterns. more sites introducing replication of the fragments. In this In this paper, a new dynamic fragment allocation paper, a new dynamic fragment allocation algorithm is algorithm is proposed in Non-Replicated allocation scenario. proposed in Non-Replicated allocation scenario, which The proposed algorithm incorporates the volume threshold, incorporates the time constraints of database accesses, the the time constraints of database accesses and most volume threshold and most importantly the volume of data importantly the volume of data transmitted in successive time transmitted in successive time intervals to dynamically intervals to dynamically reallocate fragments to sites at reallocate fragments to sites at runtime in accordance with runtime in accordance with the changing access patterns i.e. the changing access patterns i.e. in accordance with the in accordance with the changing access probabilities of nodes changing access probabilities of nodes to fragments over to fragments over time. It will migrate a fragment to a time. The proposed algorithm will decrease the movement particular site only when that site has made data transfer of fragments over the network and data transfer cost and higher than all other sites and also greater than the threshold will also improve the overall performance of the system by value from or to that fragment consistently over some recent dynamically allocating fragments in a most optimum and time intervals. The choice of the volume threshold, the intuitive manner. number of time intervals and the duration of each time interval are the most important factors which regulate the II.RELATED WORK frequency of fragment reallocations i.e. the performance of the algorithm. Till date many works have been published on the problem of allocation of data or fragments of the global relations to III.DESIGN geographically dispersed sites of a distributed database. [10] considered the problem of file allocation for typical The main factor that affects the efficiency and turnaround distributed database applications with a simple model of time of the applications of a distributed database is the time transaction execution. [11] incorporated issues like delay for transferring the data needed by a certain distributed concurrency and queuing costs. [12] provides an integrated database query or application, over the network from the approach for fragmentation and allocation. [12] identified fragments located at several different geographically seven criteria that a system designer can use to determine dispersed sites to the site of origin of the application or query. the fragmentation, replication and allocation. [15] presents The primary aim is to allocated fragments needed by certain a replication algorithm that adaptively adjusts to changes in distributed database application either at the same site where read-write patterns. [16] provides an approach based on the distributed database application / query is invoked or at Lagrangian relaxation and [17] describes heuristic sites closer to the site of origin, so that the data transmission approaches. More recently [18] has given a high-performance over the network is minimized during the execution of the computing method for data allocation in distributed database application / query. It is a considerably complex problem, system. especially, in the scenario where the probability or pattern In most of the above approaches, data allocation has been of accessing fragments by the distributed database proposed prior to the design of the distributed database, applications at different sites changes dynamically over time. depending on some static data access patterns and/or query Also, it is not a feasible solution to place the entire data of a patterns. Static allocation of fragments provides the best distributed database at every site of the system; it will violate solution when the access probabilities of nodes to fragments the basic requirements of a distributed database [9]. never change over time, but, degrades performance in a The proposed algorithm for dynamic fragment allocation dynamic environment, where probabilities change over time. in distributed database exploits the concepts of the existing Over past few years, work has been introduced for algorithms: the Optimal Algorithm [4], the Threshold dynamic fragment allocation in distributed database systems. Algorithm [21] and TTCA Algorithm [1]. In distributed [15] gives a model for dynamic data allocation for data database the efficiency and turnaround time of the distributed redistribution and incorporates a concurrency mechanism. database applications ultimately depends on the volume of In [4] an algorithm is proposed for dynamic data allocation, data that is required to get transferred over the network from which reallocates data with respect to the changing data one site to another due to the execution of those applications. access patterns. [13] provides approach for allocating Reallocating a fragment from a certain site to another site, fragments by adapting a machine learning approach. [7] which makes the highest number of accesses to that fragment considers incremental allocation and reallocation based on and not to the site, which even though does not make the changes in workload. [19] incorporated security highest number of accesses to that fragment but results in considerations into the dynamic file allocation process. In transmission of maximum volume of data from or to that [20] an optimal fragment allocation algorithm for non- fragment, will not be always beneficial i.e. will not always replicated distributed database systems is proposed. [21] has improve the overall performance or efficiency of the introduced a threshold algorithm for non-replicated fragment distributed database. allocation in distributed databases. In the threshold algorithm, The main agenda of the proposed algorithm is to reallocate a fragment located at a certain site to another site, © 2011 ACEEE 37 DOI: 01.IJIT.01.01.98
  • 3. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 which has made highest data transmission from or to that 1,2,3,…to infinity and h = 1,2,3,...M) stores the following fragment consistently over time, not to the site making information regarding each access: highest or frequent accesses but transferring comparably • Name or Identifier of the Fragment accessed. small amount of data from or to that fragment. The value of • Address of the accessing site. the Consistency Threshold (ë) determines the number recent • Date and Time of the access. time intervals for which a particular site has to consistently • The volume of data transmitted from or to that make data transmission higher than all other sites and also fragment in Bytes. greater than the data Volume Threshold (í) from or to a 3. Three parameters are used to tune the performance of particular fragment located at another site, to get that the algorithm: fragment reallocated at this new site. The duration • Time Constraint for Fragment Reallocation (ô). of each time interval is determined by the Time • Volume Threshold for Fragment Reallocation (í ). Constraint for Fragment Reallocation (ô). •· Consistency Threshold (ë). Moreover, most of the time the site which consistently 4. The proposed algorithm needs each site to maintain a makes the highest number of accesses to a particular fragment separate data structure named Access Counter for each located at a particular site in some recent time intervals also fragment located at that site, which stores the following results in transmission of maximum volume of data from or information after each access to that fragment: to that fragment in that time duration. Thus, for most of the • Candidate Site Address: The address of the site cases the proposed algorithm for dynamic fragment which has made data transmission from or to that allocation will reflect the most realistic scenario and will fragment higher than all other sites and also greater result in more intuitive and optimum dynamic fragment than í in the current time interval. Initially it is set reallocation, in Non-Replicated allocation scenario. to the address of the site where the fragment is Furthermore, reallocation of fragments from one site to located. another site over the network just in order to make the • Number of Recent Time Intervals: It provides the distributed database applications to have their required data number of recent time intervals for which the at their site of origin or at the sites very closer to their site of Candidate Site has made data transmission from or origin, incurs huge data transmission over the network and to that fragment higher than all other sites and also results in transmission overload. Because, fragments are greater than í . Initially it is set to the value of the expected to contain huge amount of data as compared to the Consistency Threshold (ë) + 1. data required by and transmitted due to the execution of those The following Steps [5 to 7] are performed at each site distributed database applications. Thus, it is not desirable to for each individual access to a fragment allocated at that site have frequent migrations of fragments over the network, as by a certain distributed database query or application invoked this can significantly affect or degrade the overall at the same or different site. Suppose at site h an access is performance or efficiency of the distributed database. made and processed for fragment i allocated at that site from The proposed dynamic fragment allocation algorithm site j at time t, where h = 1,2,3,…M, i = 1,2,3,...N and j = migrates a fragment located at a certain site to another site, 1,2,3,...M and h = j or h ‘“ j. The local agent at site h performs which has made highest data transmission from or to that the following operations: fragment than all other sites and also greater than the Volume 5. Write a log record Akh in the Access Log at site h. Threshold for Fragment Reallocation (í) consistently over 6. Calculate the total volume of data transmitted (in bytes) at least ë + 1 recent time intervals, where ë is the Consistency in between the fragment i and all the sites (including site Threshold and the duration of each time interval is h) where from the accesses to the fragment i located at determined by the Time Constraint for Fragment Reallocation site h are made, through the accesses occurred within the (ô). The Algorithm: time interval ô up to current access time t. Akh Vim denotes 1. Initially all the fragments of all the global relations of the volume of data transmitted (in bytes) in between the the distributed database are distributed over different sites fragment i allocated at site h and the site m in the access using any static allocation method in non-replicated Akh at certain point of time, where m = 1,2,3,...M. The manner. Let there be total N number of fragments of total volume of data transmitted (denoted by Vim t) in global relations distributed among the total M number of between the fragment i allocated at site h and the site m sites in the distributed database system. Each site has one through the accesses occurred within the time interval ô or more fragments allocated to it. A distributed database up to current access time t is calculated as: query or application may require accessing several Vimt =“ AkhVim different fragments allocated at several different sites for Where Akh occurred within the time interval ô up to execution. current access time t. Vimt is calculated for all the sites 2. Each site maintains a separate data structure named Access (including site h) where from the accesses to the fragment Log, which stores certain information regarding each h are made, through the accesses occurred within the time access to the fragments allocated at that site, by the interval ô up to current access time t. distributed database queries or applications invoked at 7. If the total volume of data transmitted (in bytes) in between the same or different sites. Each Access Log record the fragment i allocated at site h and the site j through the denoted by A kh (i.e. k th access at site h, where k = © 2011 ACEEE 38 DOI: 01.IJIT.01.01.98
  • 4. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 accesses occurred within the time interval ô up to current of the distributed transaction. Thereafter, the local agent sends access time t is greater than í and is also greater than the those data along with the command (insert or update) to the total volume of data transmitted (in bytes) in between local transaction manager, which actually accesses the the fragment i and all other sites (including site h) where database table corresponding to that fragment stored at the from the accesses to the fragment i located at site h are local database to perform insertion or modification. In case made, through the accesses occurred within the time of retrieval, the local agent receives the data retrieved from interval ô up to current access time t, i.e. if and only if Vijt the database table stored at the local database corresponding > í and Vijt > Vimt and where j, m = 1,2,3,...M and m ‘“ j, to a particular fragment through the local transaction then in the Access Counter for fragment i at site h the manager. Thereafter, it sends those retrieved data to the root following operations are executed, otherwise do nothing: agent of the distributed transaction executing at the same or • If the address of the accessing site in the log record different site in the distributed database network. In all the Akh is same as the address of site h, i.e. the access is cases the local agent of the distributed database transaction made from the same site (h = j), then: temporarily retains the data to be inserted or to be used to i. If the Candidate Site Address in the Access modify the existing data in the particular fragment or being Counter for fragment i is same as the address of retrieved from the particular fragment during the execution site h, then do nothing as fragment i is already of a of the distributed database application or query. allocated to site h. Moreover, the local agent belongs to the distributed database ii. Else if the Candidate Site Address in the Access transaction management system and it is designed and Counter for fragment i is not same as the address programmed by the developer of the distributed database of site h, then update the Candidate Site Address management system. Therefore, it is possible to enhance the in the Access Counter for fragment i with the distributed database transaction management system and the address of site h and set the value of the local agents of the distributed database transactions to add corresponding Number of Recent Time Intervals the functionality of writing Access Log Records and to to Consistency Threshold (ë) + 1. calculate the volume of data transmitted from or to each • Else if the address of the accessing site in the log fragment (in Bytes) at each fragment access and to maintain record Akh is different from the address of site h, i.e. the Access Counter, i.e. to implement the proposed dynamic the access is made from a different site (h ‘“ j); then: fragment allocation algorithm. iii. If the Candidate Site Address in the Access Counter for fragment i is same as the address of IV.PERFORMANCE EVALUATION site j, then increment the corresponding Number In Optimal Algorithm [4], initially all the fragments are of Recent Time Intervals by 1. The incremented distributed over the different sites using any static data value indicates that site j has made data allocation method. After the initial allocation, system transmission from or to that fragment higher than maintains an access counter matrix for each locally stored all other sites and also greater than í from or to fragment at each site or node. Every time an access request that fragment for that number of recent time is made for the locally stored fragment, the access counter intervals. of the accessing site for that fragment is increases by one. If iv. If the updated value of the Number of Recent the counter of a remote node becomes greater than the counter Time Intervals in the Access Counter for fragment of the current owner, then the fragment is moved to the i is greater than ë, then the fragment i is migrated accessing node. The problem of Optimal Algorithm [4] and reallocated to site j and removed from the technique is that if the changing frequency of access pattern current site h, catalogs are updated accordingly. for each fragment is high, then it will spend more time for v. If the Candidate Site Address in the Access Counter transferring fragments to different sites and will incur huge for fragment i is not same as the address of site j, data transmission overload. Threshold algorithm [21] then update the Candidate Site Address in the decreases the migration of fragments and guarantees the stay Access Counter for fragment i with the address of of the fragment for at least (ç +1) accesses at the new node site j and set the value of the corresponding Number after a migration, where ç is the value of threshold. But of Recent Time Intervals to 1. This indicates that threshold algorithm resets the counter of local fragment to site j has made data transmission from or to that zero, every time a node is going for a local access and it fragment higher than all other sites and also greater does not specify which node will be the fragment’s new than í during the current time interval not in the owner when the counter exceeds the threshold value, also it immediately preceding time interval. does not give the information about past accesses of the In distributed database, at each site the local agent of a fragments and does not consider the time variable of the remote or local distributed transaction accesses or interacts access pattern. with the local database where the fragments of the global The TTCA [1] algorithm removes all the above problems relations are actually stored [9]. In case of insertion or of threshold algorithm [21] by adding a time constraint to modification operations on a fragment, the local agent consider the time of the accesses made to a particular receives the data to be inserted or to be used to modify the fragment. TTCA [1] decreases the migration of fragments existing data in the particular fragment from the root agent © 2011 ACEEE 39 DOI: 01.IJIT.01.01.98
  • 5. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 over different sites, thus reduces the transmission overload algorithm in the distributed database suggest that the due to fragment migrations as compare to simple Threshold performance of the proposed algorithm i.e. the impact of the algorithm [21]. TTCA [1] maintains a counter matrix at each proposed algorithm on the performance and efficiency of site to store the number of accesses made by the sites to a the distributed database varies widely with different values particular fragment located at that site, which is incremented of the above regulating parameters. Special care and critical on each access. It reallocates data with respect to the changing analysis should be performed to choose the most appropriate data access patterns with time constraint. It migrates a values of the Volume Threshold (í), Time Constraint (ô) and fragment from one site to another site, which has most the Consistency Threshold (ë) to highly optimize the recently accessed that fragment for ç + 1 numbers of times algorithm to maximize the performance and efficiency of in a time period ô up to the current access time, where ç is the distributed database. the Threshold Value and ô is the Time Constraint. But TTCA If í is made very low i.e. below the average data transfer [1] does not store the time of those accesses in that counter volume between the sites of the distributed database network, matrix. Therefore, it does not provide any conceivable then the proposed algorithm will practically migrate method to determine within which time period the certain fragments to other sites, depending only on one condition number of accesses (determined by the value of the counter) i.e. the site which results in higher transmission of data than made by a certain site to a particular fragment located at all other sites from or to that fragment in some recent time another site have occurred. intervals will get that fragment reallocated or migrated to it. The proposed algorithm will remove all the above problems of Threshold [21] and TTCA [1] algorithm. It will dynamically reallocate fragments at runtime in accordance with the changing access probabilities of sites to fragments over time. This dynamic fragment allocation algorithm migrates a fragment located at a certain site to another site, which results in transmission of data higher than all other sites and also greater than the predefined threshold value In Figure 1, the frequency of fragment reallocation (ø ) from or to that fragment consistently over some recent time is plotted against í, ë and ô. The impact of í , ë and ô on the intervals. It reduces the transfer of data over the network rate of fragment migration in the distributed database i.e. on during the execution of the distributed database application the performance of the proposed dynamic fragment allocation / query, in Non-Replicated allocation scenario. algorithm is clearly evident from the above graphical The proposed algorithm improves the overall representation. performance or efficiency of the distributed database by If í and ë is decreased and ô is increased, then there will imposing a more strict condition for fragment reallocation be frequent fragment migrations. On the other hand, if í and in distributed database and resulting in fewer migrations of ë is increased and ô is decreased, then after a certain point fragments from one site to other over the network and further there will rarely be any fragment migrations. Because, it will reduces the data transmission overload due to fragment be extremely hard for any site to be the highest data transferee migrations as compared to the Optimal Algorithm [4], the (higher than all other sites and also greater than í) from or Threshold Algorithm [21] and TTCA Algorithm [1]. The to a particular fragment consistently over a large number of choice of the most appropriate values of í, ô and ë serves as recent short time intervals i.e. to fulfill the condition for the key factors for determining the optimum performance of fragment reallocation and to get that fragment reallocated to the algorithm, to minimize unnecessary fragment migrations it. and data transfer over the network required during the The proposed algorithm requires more storage space and execution of the distributed database queries or applications increases the storage cost due to the maintenance of the by increasing their locality of processing i.e. to maximize Access Counter as well as the Access Log at the sites in which the overall throughput, performance and efficiency of the log records are created for each access. It incurs more distributed database applications. For fixed values of í and computational overhead per database access at each site due ô, if ë is increased, then the migration of fragments from one to the calculation of the total volume of data transmitted (in site to other will sharply decrease vice versa, as it will be bytes) in between that fragment and all the sites where from very hard for any site to be the highest data transferee from the accesses to that fragment are made, through the accesses or to a particular fragment consistently over a large number occurred within the time interval ô up to current access time. of recent time intervals. I.e. But these drawbacks are well compensated by the advantage gained from the significant reduction in the unnecessary fragment migrations as compared to the Optimal For fixed values of ô and ë, if the value of í is increased, Algorithm [4], the Threshold Algorithm [21] and TTCA then the migration of fragments from one site to other will Algorithm [1], which incurs huge data transmission overload decrease vice versa. For fixed values of í and the ë, if the and degrades the overall performance and efficiency of the value of ô is increased, then the migration of fragments from distributed database. Thus, for most of the cases the proposed one site to other will increase vice versa. The results of several algorithm for dynamic fragment allocation will reflect the experiments simulating the implementation of the proposed most realistic scenario and will result in more intuitive and © 2011 ACEEE 40 DOI: 01.IJIT.01.01.98
  • 6. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 optimum dynamic fragment reallocation, in Non-Replicated [4] A. Brunstroml, S.T. Leutenegger and R. Simhal, “Experimental allocation scenario. Evaluation of Dynamic Data Allocation Strategies in a Distributed Database with changing Workload”, ACM Trans. V.CONCLUSION Database Systems, 1995. [5] S. March and S. Rho, “Allocating Data and Operations to In this paper a new sophisticated dynamic fragment Nodes in Distributed Database Design,” IEEE Trans. allocation algorithm is proposed in Non-Replicated Knowledge & Data Eng., Vol. 7, no. 2, pp. 305-317, 1995. allocation scenario. The proposed algorithm incorporates the [6] T. Ulus and M. Uysal, “A Threshold Based Dynamic Data time constraints of database accesses, volume threshold and Allocation Algorithm - A Markove Chain Model Approach”, Journal of Applied Science, Vol. 7(2), pp 165-174, 2007. most importantly the volume of data transmitted in successive [7] A. Chin, “Incremental Data Allocation and Reallocation in time intervals to dynamically reallocate fragments to sites at Distributed Database Systems”, Journal of Database runtime in accordance with the changing access probabilities Management, Vol. 12, No. 1, pp. 35-45, 2001. of nodes to fragments over time. The proposed algorithm [8] Hideo Hanamura, Isao Kaji, Kinji Mori, “Autonomous migrates a fragment located at a certain site to another site, Consistency Technique in Distributed Database with which has made higher data transmission from or to that Heterogeneous Requirements”, IPDPS Workshops 2000, pp. fragment than all other sites and also greater than the Volume 706-712, 2000. Threshold for Fragment Reallocation (í) consistently over [9] S. Ceri and G. Pelegatti, “Distributed Database Principles & at least ë + 1 recent time intervals, where ë is the Consistency Systems”, McGraw-Hill International Editions. [10] S. Ceri, G. Martella, and G. Pelagatti, “Optimal file Allocation Threshold and the duration of each time interval is for a Distributed Database on a Network of Minicomputers”, determined by the Time Constraint for Fragment Reallocation in Proc. International Conf. on Database, Aberdeen, July (ô). The proposed algorithm improves the overall 1980, British Computer Society Hayden. performance or efficiency of the distributed database by [11] S. Ram and S. Narasimhan, “Database Allocation in a imposing a more strict condition for fragment reallocation Distributed Environment: Incorporating a Concurrency in distributed database and results in significant reduction Control Mechanism and Queuing Costs”, Management in the frequency of unnecessary fragment migrations from Science, vol. 40, no. 8, pp. 969-983, 1994. one site to other over the network and thus substantially [12] K. Karlaplem and N. Pun, “Query-Driven Data Allocation reduces the data transmission overload due to fragment Algorithms for Distributed Database Systems”, Proc. Eighth International Conf. Database and Expert Systems Applications migrations as compared to the Optimal Algorithm [4], the (DEXA ’97), pp. 347- 356, Sept. 1997. Threshold Algorithm [21] and TTCA Algorithm [1]. The [13] A. Tamhankar and S. Ram, “Database Fragmentation and results of several experiments simulating the implementation Allocation: An Integrated Methodology and Case Study”, of the proposed algorithm in the distributed database suggest IEEE Trans. Systems, Man and Cybernetics—Part A, vol. 28, that the choice of the most appropriate values of í , ô and ë no. 3, May 1998. serves as the key factors for determining the optimum [14] A. Chaturvedi, A. Choubey, and J. Roan, “Scheduling the performance of the algorithm, to minimize the frequency of Allocation of Data Fragments in a Distributed Database unnecessary fragment migrations and to minimize the transfer Environment: A Machine Learning Approach”, IEEE Trans. Eng. Management, vol. 41, no. 2, pp. 194-207, 1994. of data over the network required during the execution of [15] O. Wolfson, S. Jajodia, and Y. Huang, “An Adaptive Data the distributed database queries or applications by increasing Replication Algorithm”, ACM Trans. Database Systems, vol. their locality of processing i.e. to maximize the overall 22, no. 2, pp. 255-314, 1997. throughput, performance and efficiency of the distributed [16] G. Chiu and C. Raghavendra, “A Model for Optimal Database database applications. Allocation in Distributed Computing Systems”, Proc. IEEE INFOCOM 1990, vol. 3, pp. 827-833, June 1990. REFERENCES [17] Y. Huang and J. Chen, “Fragment Allocation in Distributed Database Design”, Journal of Information Science and Eng., [1] Arjan Singh and K.S. Kahlon, “Non-replicated Dynamic Data vol. 17, pp. 491- 506, 2001. Allocation in Distributed Database Systems”, IJCSNS [18] I.O. Hababeh, M. Ramachandran and N. Bowring, “A high- International Journal of Computer Science and Network performance computing method for data allocation in Security, VOL.9 No.9, pp. 176-180, September 2009. distributed database systems”, Springer, Journal of [2] Svetlana Vasileva, Petar Milev, Borislav Stoyanov, “Some Supercomputer (2007) 39:3-18. Models of a Distributed Database Management System with [19] A. Mei, L. Mancini, and S. Jajodia, “Secure Dynamic Fragment data Replication”, International Conference on Computer and Replica Allocation in Large-Scale Distributed File Systems and Technologies-CompSysTech’07, Vol.–II, pp. Systems”, IEEE Trans. Parallel and Distributed Systems, vol. II.12.1–II.12.6, 2007. 14, no. 9, pp. 885-896, Sept. 2003. [3] S. Agrawal, V. Narasayya, and B. Yang, “Integrating Vertical [20] L.S. John, “A Generic Algorithm for Fragment Allocation in and Horizontal Partitioning into Automated Physical Database Distributed Database System”, ACM 1994. Design”, Proc. 2004, ACM SIGMOD International Conf. [21] T. Ulus and M. Uysal, “Heuristic Approach to Dynamic Data Management of Data, pp. 359-370, 2004. Allocation in Distributed Database Systems”, Pakistan Journal of Information and Technology, 2(3): pp. 231-239, 2003. © 2011 ACEEE 41 DOI: 01.IJIT.01.01.98