CA2167790A1 - Relational database system and method with high data availability during table data restructuring - Google Patents

Relational database system and method with high data availability during table data restructuring

Info

Publication number
CA2167790A1
CA2167790A1 CA002167790A CA2167790A CA2167790A1 CA 2167790 A1 CA2167790 A1 CA 2167790A1 CA 002167790 A CA002167790 A CA 002167790A CA 2167790 A CA2167790 A CA 2167790A CA 2167790 A1 CA2167790 A1 CA 2167790A1
Authority
CA
Canada
Prior art keywords
records
record
phase
audit
partition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002167790A
Other languages
French (fr)
Inventor
Donald S. Maier
Roberta S. Marton
James H. Troisi
Pedro Celis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tandem Computers Inc
Original Assignee
Tandem Computers Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tandem Computers Inc filed Critical Tandem Computers Inc
Publication of CA2167790A1 publication Critical patent/CA2167790A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99938Concurrency, e.g. lock management in shared database

Abstract

A database computer system includes memory, residing in a plurality of interconnected computer nodes, for storing database tables. Each database table has a plurality of columns, a primary key index based on a specified subset of the columns, and an associated table schema. At least a subset of the database tables are partitioned into a plurality of partitions, each partition storing records having primary key values in a primary key range distinct from the other partitions. A transaction manager generates and stores an audit trail, each audit entry denoting a database table record event, such as an addition, deletion or alteration of a specified database table record in a specified one of said database tables. Four online data definition procedures allow the structure of a database table to be altered while the database table remains available to execution of transactions, with minimal impact of the availability of the database table for transaction execution. The four online data definition procedures are a move partition procedure, a split partition procedure, a move partition boundary procedure, and a create new index procedure. Each of these online procedures has three or four phases of execution. In a first phase, records of a table partition or the entire table are accessed using read only access, so as to generate a new partition, move records between two partitions, or to create a new index. In a second phase, audit trail entries are used to clean up the data structures created during the first phase. In a third phase, access to the database table is briefly locked while audit trail entries created after thesecond phase are used to make final changes to the data structures created during the first phase, and while the database table schema is updated to reflect the changes to the database table produced.

Description

2~7790 Tandem TA302 RE~ATIONAL DATABASE SYSTEM AND METHOD WITH
HIGH DATA AVAILABILITY DURING TABLE DATA RESTRUCTURING

The present invention relates generally to d~t~h~se management systems, and particularly to a database management system in which d~t~h~se table availability is maintained, with minimal or no user availability outages during table restructuring operations such as splitting a table or index partition, 5 moving an existing table or index partition, creating a new index and moving a table or index partition boundary.

BACKGROUND OF THE INVENTION
D~t~h~se configuration and reconfiguration operations can have a significant effect on the availability of user applications that need ~ccess to .J~I~h~ses undergoing structural changes. The TandernTM N~ pTM SQUMP relational d~t~h~-se management system (DBMS), prior to the present invention, 15 allowed read ~ccess, but not write ~ccess, to the portions of the d~t~h~se table undergoing the restructuring operation.

Although most users perform these operations infrequently, their duration can account for thousands of minutes of ~pplic~tion outages per year. A
20 discussien of the cost of application outages appears in the article ~An Overview of NonStop SQUMP,~ Ho et al., Tandem Systems Review, July 1 994.

21~7~

The present invention eli!"inates most of the downtime ~soci~ed with four d~t~h~se lecG"figuration operations: Move Partition, Split Partition, Move Partition Boundary, and Create Index. The Move Partition procedure moves a partition that resides on one disk to another disk. The Split Partition 5 procedure splits one partition into two. The Move Partition Boundary procedure moves rows of a base table bet~Jccn A~ cent partitions, typically shifting rows from a large partition to a less large partition. The Create Index procedure creates an efficient altemate ~ccess path to a d~t~h~ce table by ordering data accGrd;.)g to the value specified in the key columns.
10 The Create Unique Index variant of this procedure ensures that there is exactly one altemate access path to each record in the database table.

The impleme"taliol- of these procedures in the present invention sl~hstal,lially reduces, but does not eliminate, ~-ssoci~ted outages. Even with 15 the present invention, user d~t~h~se activity continues to be restricted for about one minute or less per database restructuring operation. The outage time varies depending on the number of user trans~ tions running against the table being restructured, the size of those transactions, and the number of partitions in the affected table.
It is therefore a primary object of the ~,resent invention to enable subst~,lially improved user transaction ~ccess to a cl~t~h~e table while the table is undergoing a structural change operation.

25 Another object of the present invention is to enable Move Partition, Split Partition, Move Partition Boundary, and Create Index operations to be perfommed on a ~l~t~h~se table while enabling user transactions to continue to be pelfor",ed on the table, except during a short final phase of those operations.
Another object of the present invention is to avoid the use of ~side files~ for the above mentioned database reconfiguration operations, so as to reduce 216779~

the overhead disk space requirements ~csoci~ed with these operations to almost zero.

Another object of the present invention is to implement the above mentioned 5 d~t~h~se reconfiguration op6rdtiGns using procedures that directly read fro the transaction audit log, thereby making these d~t~h~se reconfiguration operations similar to a d~t~h~se recovery process.

Another object of the present invention is to i"",le."ent the d~t~h~se 10 reconfiguration operations using well est~hlished optimized d~t~h~se recovery process procedures thereby making the dAt~h~se reconfiguration operations efficient in terms of computation time and in terms of the computer resources used.

15 Yet another object of the present invention is to utilize subst~ntially similar d~t~h~se reco,lfiguration procedures for four distinct d~t~h~se reconfiguration operations thereby improving the reliability of those procedures and simplifying ",ai"tenance of and updates to those procedures.
SUMMARY OF THE INVENTION

In summary the present invention is a set of procedures for modifying the structure of a d~t~h~se table or index ~online,~ while the d~t~h~se table or 25 index remains available for execution of transactions, with minimal impact on the availability of the d~t~h~se table for transaction execution.

The present invention operates in a ~t~h~se computer system having memory, residing in a plurality of interconnected computer nodes for storing 30 d~t~h~se tables. Each database table or index has a plurality of columns, a primary key index based on a specified subset of the columns, and an associated table schema. In most implementations, at least some of the 216779Ci , tahA5e tables or indexes are partitioned into a plurality of partitions, each partition storing records having primary key values in a primary key range distinct from the other partitions.

5 A transaction manager generates and stores an audit trail, each audit entry denoting a cl~t~hP~se table or index record event, such as an addition, dQletion or alteration of a specified dAtahAse table or index record in a specified one of the database tables or indexes.

10 Four online data definition procedures allow the structure of a d~tAhAse table or index to be altered while the database table or index remains available for execution of transactions, with minimal impact of the availability of the ~AtAhAse table or index for transaction execution. The four online data definition procedures are a Move Partition procedure, a Split Partition 15 procedure, a Move Partition Boundary procedure, and a Create Index procedure. Each of these online procedures has several phases of execution. In a first phase, the definitions of existing objects are read and any new objects that are needed to perform the requested procedure are created. Then, records of a table or index partition or the entire table are 20 Accessed using ~browse~ Access, so as to generate a new partition, to move r~cords between two partitions, or to create a new index. Browse Access is a fomm of read Access that allows dAtAh~se records to be read through any record locks that may be in place. Thus, browse ~ccess will sometimes result in the reading of records that are in the midst of being 25 modified.

In a second phase, audit trail entries are Accessed and the equivalent dAt~l-Ase table or index operdtions denoted in those audit trail entries are redone on the target objects, whenever necessary~ to bring the data records 30 created during the first phase up-to-date. In a third phase, access to the dAt~hAse table is briefly locked (A) while audit trail entries created after thesecond phase are used to make final changes to the previously created data 21~7~0 records, and then (B) while the d~t~h~se table or index schema is updated to reflect the changes to the d~t~h~se table or index produced.

If a fourth phase, used by the Move Partition Boundary and Split Partition 5 procedures, records in a d~t~ se partition that are inconsistent with the modified ~t~h~se table schema are deleted as a background operation while use of the d~t~h~ce table by transactions resumes.

BRIEF DESCRIPTION OF THE DRAWINGS

Additional objects and features of the invention will be more readily apparent from the following det~iled desc,i~,liGn and appended claims when taken in conjunction with the drawings, in which:
Figure 1 is a block diagram of a computer system having a d~t~h~se management system in accordance with the present invention.

Figure 2A is a block diagram of a cl~t~h~se table. Figure 2B is a block20 diagram of an alle",ate index. Figure 2C is a block diagram of the data structure of an Audit Trail.

Figure 3 is a conceptual diagram of the three primary phases of the ~;3t~h~se restructuring procedures in the preset)~ invention.
Figure 4 is a flowchart of the Move Partition procedure used in a preferred embodiment of the present invention.

Figure 5 is a flowchart of the Split Partition procedure used in a preferred 30 embodiment of the present invention.

216779~3 Figure 6 is a flowchart of the Move Partition Boundary procedure used in a prefer,ed embodiment of the present invention.

Figure 7 is a flowchart of the Create Index procedure used in a preferred e"~bod;,ne,)l of the present invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring to Figure 1, there is shown a computer system 100 for storing and providing user ~ccess to data in stored d~t~h~-ces. The system 100 is a distributed computer system having multiple computers 102, 104, 106 interconnected by local area and wide area network communication media 108. The system 100 generally includes at least one d~t~h~se server 102 and many user workstation computers or temminals 104, 106.

When ver,v large d~t~hases are stored in a system, the d~t~hase tables will be partitioned, and difrerent partitions of the d~t~h~-se tables will often be stored in different d~t~h~-se servers. However, from the viewpoint of user wo,kst~lion computers 104, 106, the cl~t~h~-se server 102 appears to be a single entity. The pa~liliGI~ing of d~t~h~ses and the use of multiple d~t~h~-se servers is well known to those skilled in the art.

As shown in Figure 1, the d~t~h~ce server 102 includes a central processing unit (CPU) 110, primary memory 112, a communications interface 114 for communicating with user workstations 104, 106 as well as other system resources not relevant here. Secondary memory 116-1, 116-2, typically magnetic disc storage, in the database server 102 stores d~t~hiqse tables 120, d~t~h~e indices 122, a d~t~h~-se management system (DBMS) 124 for management of the cl~tAh~-se tables and associated data structures and resources, and one or more catalogs 126 for storing schema infommation about the d~t~h~se tables 120 as well directory inforrnation for programs 216779~

used to ~ccess the d~t~h~se tables. The DBMS 124 includes an SQL
executor 128 for e~ecutir g SQL statements (i.e., d~t~h~se queries) and an SQL catalog manager 130 for maintenance of the catalogs 126 and for performing d~l~h~se definition and restructuring operations. The SQL
5 catalog manager includes the ~online DDL procedures~ 132 of the present invention for restructuring d~t~b~se tables while providing improved user transaction ~ccess to the affected tables.

The d~1~h~-se server 102 further includes a transaction manager 134 for10 managing transactions, and application programs 136 that are utilized by users to perForm transactions that utilize the d~t~h~se tables 120. The transaction manager creates audit entries for each transaction, which are durably stored in an audit trail file 138 in secondary memory.

End user workstations 104, 106, typically include a central processi"g unit (CPU) 140, primary memory 142, a communications interface 144 for communicating with the d~t~h~se server 102 and other system resources, secondary memory 146, and a user interface 148. The user interface 148 typically includes a keyboard and display device, and may include ~tldiliG"al 20 resources such as a pointing device and printer. SecGr,dary memory 146is used for storing computer progl~"~s, such as commu-,icaliolls software used to ~ccess the d~t~h~se server 102. Some end user workstalions 106 may be ~dumb~ temminals that do not include any secondary memory 146, and thus exec~te only software downloaded into primary memory 142 from a 25 server computer, such as the ~ h~ce server 102 or a file server (not shown).

Glossary 30 To assist the reader, the following glossary of terms used in this document is provided.

21~779~
.

SQL: SQL stands for ~Structured Query Language.~ Most cGl"",ercial l~t~hA~e servers utilize SQL. Any program for ~Gcessing data in a dAtAhAse that utilizes SQL is herein called an ~SQL Program.~ Each statement in an SQL program used to ~ccess data in a d~t~hAse is called 5 an ~SQL statement.~

Oblect(s): An object is a file, d~tAh~se table or other enc~psul~ted computer resource ~ccessed by a program as a unitary structure. In the context of the preferred enlbodi~ent, objects are database tables or 10 indexes. In other implementations of the present invention, objects may be other encapsulated computer resources that the end user accesses indirectly through validated methods (i.e., programs) designed specifically to access those computer resources.

15 DDL State~ent: a data cJe~i"ilion language statement. DDL state",el)ts are used to create and modify database tables.

End user: a person using a workstation to access database information in a dAt~h~se server. End users typically do not have the authority to modify the structure of database tables.

Operator: a person using a workstation who has the authority and ~ccess rights to modify the structure of d~t~h~se tables and to manually initiate compilation of SQL source code programs.

Audit Trial, Database Table and Index Data Structures Figure 2A shows the data structure of a typical database table 120-1. The table 120-1 includes a file label 160, which is essentially a compactly stored copy of the catalog info~",alion for the database table, which represents the table's schema as well as other information not relevant here. Next, the - 216~790 g table includes a primary key B-tree 162. The use of B-trees in rl~t~h~-se files is well known to those of ordinary skill in the art of ~t~h~5e management systems. Next, the table has a data array 163 organized in rows and columns. The rows of the table are often called ~records~ 164.

In the context of the present invention, every ~t~h~se table has a primary index. The value of the primary index for a particular record is called the primary key, and the primary key is typically equal to either (A) the value in one field (i.e., column), (B) the concatenation of the values in a plurality of 10 columns, or (C) a computed function of the values in one or more columns.
The set of columns used to generate the primary key are represented by a vector herein called the PrimaryKeyColumns vector. There is a ~Create_PrimaryKey~ function for every d~t~h~se table, represented as follows:
PrimaryKey = Create_PrimaryKey(BaseTable(RecPtr), PrimaryKeyColumns) where RecPtr is a pointer to a d~t~h~se table record.
It is often the case that an applicatiol) program needs to ~ccess a d~tAh~se table in accordance with a set of column values, at least some of which are not included in the primary index. When that is the case, a Create Index procedure can be used to create an efficient altemate ~ccess path to the 25 r~t~h~se table by ordering data according to the values in any specified set of columns. That ordering is r~prese"ted by an ~AItemate Index,~ which is typically i"~ple."ented as a separate data structure from the ~ssoci~ted 3h~se table.

30 Figure 2B shows the data structure of an altemate index 170. The altemate index 170 includes a file label 172, which includes a compactly stored copy of the catalog infom~ation for the index. The alternate index also includes an 216~79~

alle",ate key B-tree 174 and then a data array 176 organized in rows and columns. The data array has two sets of columns herein called the AltKey columns and the PrimaryKey columns.

The rows of the data array 176 are called records 178, and each row of the Altemate Index corresponds to one record of the ~ssoci~ted d~t~h~-se table.
Furthermore, each row of the Altemate Index has two fields: one represents the altemate key value for the co-,espGnding d~t~h~se table record, and one represents the Primary Key value for the same database table record.
The set of columns used to generate the alternate key for a particular d~t~h~-se table are represented by a vector herein called the AltemateKeyColumns vector. There is a ~Create_AltKey~ function for every altemate index of any d~t~h~se table, represented as follows:
AltKey = Create_AltKey(BaseTable(RecPtr), PrimaryKeyColumns) where RecPtr is a pointer to a ~l~t~h~se table record.

For the pu.~.oses of the Move Partition, Split Partition and Move Partition Boundary operations, a database index may be viewed in the same way as a d~Ph~-se table.

Figure 2C shows the data structure of an Audit Trail 138-1. The Audit Trail includes a file label 182 and a set of sequentially generated and stored audit entries 184. Each audit entry 184 denotes a d~t~b~se table or index record event such as the addition, deletion or alteration of a specified d~t~h~-se table or index record in a specified database table or index.

216779~

r~t lh~Se Table Alteration Procedures Figure 3 is a concqJ~ual r~presentatiG" of the procedure for modifying a d~t~h~se table or index. The cG"""ands for making d~t~h~se table or index allerdlions are called data definition language (DDL) statements. In the preferred embodiment, the DDL statel"el)~s used are not changed, except for the use of an ~ONLINE~ option in the DDL statements to indicate that the DDL operation is to be performed while mini"lki"g the impact of the DDL
operation on user transactions. When the ONLINE option is specified, the preferred embodiment of the present invention changes how the SQL
catalog manager 130 executes the Move Partition, Split Partition, Move Partition Boundary and Create Index commands.

-The procedure for modifying a database table's structure begins with a user or operator entering a DDL statement, specifying an alteration in the schema of a specified object 200, which is typically either a d~t~h~se table, an index,or a partition of a d~t~h~se table or index. The specified object is ~ccesserl to read its file label, and if the cGn,l"and requires generating a new object 202, the new object is created. If the command involves movement of data between the first object 200 and a second object 202 that already exists, the file label of the second object is also ~ccessed.

In the first phase of execution of the ~online DDL command,~ a ~dirty copy~
of data from the first object 200 into the second object 202 is made while user transactions against the first object (and against the second object if it existed prior to the command) are allowed to continue unimpeded by the -execution of the DDL command. In particular, a ~dirty copy~ is made by ~ccessi"g all the data records of the first object that are the subject of the DDL cG,n")and, using ~browse~ ~ccess and generating corresponding records in the second object 202 until the last of the relevant data records in the first object 200 have been ~ccessed.

2~6779~

Browse ~ocess is a form of read ~ccess that allows database recGrds to be read through any record locks that may be in place. Thus, browse Access will sometimes result in the reading of records which are in the midst of being modified. Also, user transactions against the first object may delete or 5 modify records in the first object while or after they are ~ccessed by the first phase of the DDL cG",-r~and execution. As a result, the records created in the second object 202 may require a certain amount of correction.

In the second phase of execution of the online DDL command, a partial 10 clean-up of the records in the second object is performed by accessing records in the audit trail 204 ~ssoci~ted with the first object 200 and perforrning corresponding ~redo~ operations against the second object.
During this second phase user transactions against the first object (and against the second object if it existed prior to the command) are allowed to 15 continue unimpeded by the execution of the DDL command.

More specific-~"y, before the dirty copy in the first phase of the online DDL
command is executed, a pointer called AuditPtr is set to the end of the audit trail 204. During the second phase, each audit record beginning with the one r~fert:,1ced by the AuditPtr is inspected. If the audit record is relevant to operations pelt~l",ed on the first object 200, or relevant to the subset of records of the first object that are the subject of the DDL cGlr,l"and, then a redo operation is performed against the second object 202 based on the info.",dliol, in the audit record. In the case of a Create Index comrnand, the redo operation uses new audit records that are generated based on the audit entries found in the audit trail bec~use the second object has a very dittere"t structure than the first object; in the case of the other three online DDL
cGI""~ands, the redo operdliol, uses the audit record as found in the audit trail except that the audit record is modified prior to the redo operation so as30 to reference the second object instead of the first object, and the redo operation is performed against the second object.

The second phase continues until the end of the audit trail is reached.

In the third phase, a lock is re~uested against the first object and second object (if it existed prior to the DDL command), and when that lock (or those 5 locks) is (are) granted all user transactions other than browse ~ccess transactions are blocked until the third phase is completed. During the third phase, any new audit records in the audit trail 204 ~ssoci~t~d with the first object 200 are ~ccessed and cGrlesponding ~redo~ operations are perfommed against the second object 202. Next, if the first object is a portion of a larger 10 d~t~h~ce table or index, a lock against the entire associated ~t~h~se table ~-ssoci~ted with the first object is obtained while catalog and file labels are updated. In particular, the catalog entries and the file labels ~ssoci~ted with the first and second objects are updated to reflect the results of the DDL
operation. Fu,lhe,."ore, the catalog entries and file labels of all objects 15 which incorporate schema infommation made invalid by the DDL operation are also updated. Then the lock on the first and second objects (and the lock, if any, on the ~ssoci~ted cl~t~h~se table or index) is released, enabling user transactions against the first and second objects to resume.

20 Finally, if the DLL co"""and requires deletion of the first object or deletion of a range of r~cords in the first object, that deletion operation is perfommed in a way that permits concurrent transaction activity.

It is noted that the implementation of database reconfiguration operations 25 using well established, optimized, ~t~h~se recovery process procedures makes the d~t~h~ss reconfiguration operations efficient in terms of cornrllt~tion time and in terms of the computer resources used.

Appendix 1 lists a pseudocode representation of the Move Partition 30 procedure used by the SQL catalog manager to move a database table partition from one disk to another.

~lG779~

Appendix 2 lists a pseudocode representation of the Split Partition procedure used by the SQL executor to split a dst~h~se table partition into two partitions.

5 Appendix 3 lists a pseudocode representation of the Move Partition Boundary procedure used by the SQL catalog manager to move rows (i.e., records) of a d~t~h~se table between ~ cent partitions (i.e., partitions with cent ranges of the table's primary index).

10 Appendix 4 lists a pseudocode representation of the Create Index procedure used by the SQL catalog manager to create a new ~altemate~ index for a cl~t~h~se table.

Appendix 5 lists a pseudocode representation of an alternate embodiment of 15 the Create Index procedure.

Appendices 6, 7 and 8 lists pseudocode represe"tatio"s of procedures used by the Create Index proce.lure.

20 The pseudocode used in Appendices 1 through 8 is, essenlially, a computer language using universal computer language conventions. While the pseudocode employed here has been invented solely for the purposes of this description, it is designed to be easily understandable by any computer programmer skilled in the art.

Move Partition Procedure The function of the Move Partition procedure is to move a d~t~h~se table or 30 index, or a specified partition of the table or index, from a first disk location to a second disk location. The procedure is executed in response to a Move Partition cG,~""and. The second disk location is typically located on a 21~7~'9~

different disk from the first, and often will be loc~ted on a different computernode from the first. For the purposes of explaining the Move Partition procedure, it will be assumed that a partition of a dat~h~se table is being moved, with the unde,~ta"ding that the same steps would be perfommed for 5 moving an entire unpartitioned d~t~h~se file or for moving an index file or a partition of an index file.

Refer,i"g to Figure 4 and Appendix 1, the steps of the Move Partition procedure are as follows. The database partition to be moved, herein called 10 the Old Partition, is ~ccessed, and a new file for the new database partition, herein called the New Partition, is created on the appropriate disk volume.
Furthermore, an audit trail pointer, AuditPtr, is set to point to where the nextrecord in the audit trail for transactions against the database table ~-ssoci~ted with the Old Partition will be located.
In the first phase (220) of the Move Partition procedure, the records in the Old Partition are ~ccessed using Browse access (i.e., read through locks), and records are copied from the Old Partition to the New Partition. While records are created in the New Partition, an up-to-date primary index B-tree 20 is maintained for the New Partition. To prevent further repetition, it is noted that for all .~cords created and updated by the online DDL procedures, a cGr,esponding B-tree is updated.

Transactions by end users against the Old Partition are allowed to continue 25 during this phase of the Move Partition procedure, and those transactions continue to insert, delete and update records in the Old Partition and create new audit trail entries in the audit trail.

In the seconJ phase (222) of the Move Partition procedure, transactions by 30 end users against the Old Partition are allowed to continue, and those transactions insert, delete and update records in the Old Partition and create new audit trail entries in the audit trail.

- ~1677~G

At the beginning of the second phase, an AuditTrail filter is est~hlished such that only Audit Trail r~cords that pertain to the Old Partition are received forprocessing (by an Audit Fixup Process started by the SQL catalog manager). The pr~cessi"g of each audit record that p~sses the filter is 5 called an ~audit fixup~.

Each received audit record that p~sses the filter is initially processerl by modifying the audit record to refer to the NewPartition. Next, the mo~ ied audit record is inspected to determine whether the change to the table noted 10 in the audit record is already reflected in the copied records. If so, the audit record is ignored. Otherwise, a ~redo" with respect to the modified audit record is perfommed so as to apply the change noted in the modified audit record to the NewPartition. This process is repeated for each received audit record that p~sses the filter until the end of the audit trail is reached.
In the third phase (224) of the Move Partition procedure, a transaction request is made for a file lock on the Old Partition. This is a transaction request that goes in the lock queue. User trans~ctions initiated before the third phase are not affected, but the lock request prevents users from 20 committing transactions initiated after the lock request is made. When the requested lock is granted the remainder of the third phase is performed as a unitary transaction. The first part of the third phase transaction is performingthe audit fixup process desc.ibed above for all audit records referencing the Old Partition (i.e., that pass the filter) that were created after completion of25 the second phase.

When pr~cessi.~g of the last such audit record in the audit trail is completed, the third phase transaction requests a lock on the entire d~t~h~se table a.ssoci~ted with the Old Partition. This prevents all user transactions on the 30 entire d~t~h~se table until the lock is released. When the full table lock isgranted, the catalog entry for the Old Partition is deleted and a new catalog entry for the New Partition is created. The file labels and catalog entries for ~16~ 9~

all partitions of the d~t~h~-se table are also updated so as to reference the New Partition.

When all catalog and file label updates have been completed, the lock on 5 the d~t~h~-se table is rele~sed enabling user transactions against the d~t~h~e table to resume. Finally, the Old Partition is deleted the disk space used by the Old Partition file is released, and then the third phase transaction is concluded.

Split Partition Procedure The function of the Split Partition procedure is to move a portion of a d~t~h~se table, or a portion of specified partition of a dAt~h~-se table, from a15 first disk localion to a second disk location. The procedure is execlJted in response to a Split Partition command. The second disk location is typically lo~ted on a different disk from the first, and often will be loc~ted on a different computer node from the first. For the purposes of explaining the Split Partition procedure, it will be assumed that a partition of a ~I~Ph~se file 20 is being split into two partitions, with the uoder~tanding that the same steps would be performed for s~ li"g a previously unpartitioned d~t~h~se file or for splitting an index file or a partition of an index file.
.

Referring to Figure 5 and Appendix 2, the steps of the Split Partition 25 procedure are as follows. The d~t~h~se partition to be split, herein called the Old Partition, is ~ccessed, and a new file for the new d~t~h~se partition, herein called the New Partition, is created on the appropriate disk volume.
Fu-ll,e",)ore, an audit trail pointer, AuditPtr, is set to point to where the next record in the audit trail for transactions against the database table 30 ~ssoci~ted with the Old Partition will be located.

~167790 The primary key ranges ~ssoci~ted with the Old Partition and New Partition are as follows. The Old Partition's initial primary key range is called OldRange, and its new, reduced primary key range is called NewRange1.
The primary key range for the New Partition is called NewRange2.

In the first phase (230) of the Split Partition proc6dure, the r~co,ds in the Old Partition having a primary key in NewRange2 are ~ccessed using Browse ~ccess (i.e., read through locks), and are copied from the Old Partition to the New Partition.
Transactions by end users against the Old Partition are allowed to continue during this phase of the Split Partition procedure, and those transactions insert, delete and update records in the Old Partition and create new audit trail entries in the audit trail.
In the second phase (232) of the Split Partition procedure, transactions by end users against the Old Partition are allowed to continue, and those transactions insert, delete and update records in the Old Partition and create new audit trail entries in the audit trail.
At the begi""i"g of the second phase, an AuditTrail filter is esPhlished such that only Audit Trail records that pertain to the Old Partition with a primary key value in NewRange2 are received for processing.

25 Each remaining received audit record is initially processed by modifying the audit record to refer to the NewPanition. Next, the modified audit record is inspected to determine whether the change to the table noted in the audit record is already reflected in the copied records. If so, the audit record is ignored. Otherwise, a ~redo~ with respect to the modified audit record is 30 perfommed so as to apply the change noted in the modified audit record to the NewPartition. This process is repeated for each received audit record that p~sses the filter until the end of the audit trail is reached.

21 67~0 ,9 - In the third phase (234) of the Split Partition pr~cedure, a transaction request is made for a lock on the Old Partition. This is a transaction request that goes in the lock queue. User transactions initiated before the third phase are not affected, but the lock request prevents users from cGr"ir,illiny 5 transactions initiated after the lock request is made. When the requested lock is granted the remainder of the third phase is performed as a unitary transaction. The first part of the third phase transaction is pertor",ing the audit fixup pr~cess descriL ed above for all audit records referencing the Old Partition that were created after completion of the second phase and for 10 which either the old record image or new record image has a primary key value in NewRange2 (i.e., that pass the filter).

When processi,)g of the last such audit record in the audit trail is completed, the B-tree for Old Partition is split into two B-trees, one for records having a15 primary key in NewRange1 and the other for records having a primary key in NewRange2.

Then the third phase trans~ction requests a lock on the entire d~t~h~se table ~ssoci~ted with the Old Partition. This permits existing user 20 transactions that work on the table to complete, but suspends all new user transactions on the entire d~t~h~-se table until the lock is released. When the full table lock is granted, the catalog entry for the Old Partition is deleted and a catalog entry for the New Partition is created. The file labels and catalog entries for all partitions of the rl~t~h~se table are also updated so as25 to leference the New Partition.

When all catalog and file label updates have been cG",pleted, the lock on the d~t~h~-se table is released, enabling user transactions against the database table to resume. Finally, an ~ccess check is put in place to make 30 application transactions unable to access records in the NewRange2 B-tree of the OldPartition, and then the third phase transaction is concluded.

21677~

All records in the NewRange2 part of the Old Partition are J~leted without interfering with concurrent al-plic~lion transactions against the table, and then the ~ccess check for the OldPartition is removed.

Move Partition Boundary Procedure The function of the Move Partition Boundary procedure is to move records in a specified range of primary key values from a first specified partition of a 10 ~at~h~se table to a second adjacent partition of that d~t~h~-se table. The second partition is typically located on a different disk from the first, and often will be located on a different computer node from the first. The procedure is executed in response to a Move Partition Boundary command.
For the purposes of explaining the Move Partition Boundary procedure, it will 15 be assumed that records are being moved between adjacent d~t~h~se file -partitions, with the understanding that the same steps would be perfommed for moving records between adjacent index file partitions.

Referring to Figure 6 and Appendix 3, the steps of the Move Partition 20 Boundary proce~3ure are as follows. The ~t~base partition from which records are to be moved is herein called Partition1 and the database partition to which those records are to be moved is called Partition2. An audit trail pointer, AuditPtr, is set to point to where the next record in the audit trail for l.ansactions against the d~t~h~se table will be located The primary key ranges associated with Partition1 and Partition2 are asfollows. Partition1's initial primary key range is called OldRange1, and its new, reduced primary key range is called NewRange1. The initial primary key range for the Partition2 is called OldRange2 and its new expanded key 30 range is called NewRange2. The primary key range of the records to be moved, called MoveRange, is equal to the range of primary key values in NewRange2 that are not in OldRange2.

2~67~90 - In the first phase (240) of the Move Partition Boundary procedure, the - records in the Old Partition having a primary key in the MoveRange are ~Gcessed using Browse ~ccess (i.e., read through locks), and are copied from Partitionl to Partition2.

Transactions by end users against Partition1 and Partition2 are allowed to continue during this phase of the Move Partition Boundary procedure, and those transactions insert, delete and update records in Partitionl and Partition2 and create new audit trail entries in the audit trail.
In the second phase (242) of the Move Partition Boundary procedure, transactions by end users against Partition1 and Partition2 are allowed to continue, and those transactions insert, delete and update records in Partition1 and Partition2 and create additional new audit trail entries in the 15 audit trail.

At the beginning of the second phase, an AuditTrail filter is est~hlished such that only Audit Trail recolds that pertain to the Partition1 are received for pr~cessi.,g by the SQL catalog manager. Furthermore, those audit records 20 for which neither the old record image (if any) nor the new record image (if any) have a primary key value in the MoveRange are also ignored.

Each remaining received audit record is initially processed by modifying the audit record to refer to the Partition2. Next, the modified audit record is 25 inspected to determine whether the change to the table noted in the audit record is already reflected in the copied recGrds. If so, the audit record is ignored. Otherwise, a ~redo~ with respect to the modified audit record is performed so as to apply the change noted in the modified audit record to Partition2. This process is repeated for each received audit record that 30 p~sses the filter until the end of the audit trail is reached.

In the third phase (244) of the Move Partition Boundary procedure, a transaction request is made for a lock on the Old PalliliGi ,. This is a transaction request that goes in the lock queue. User transactions initiated before the third phase are not affected, but the lock request prevents users 5 from colr,r"i~li"S~ transactions initiated after the lock request is made. When the requested lock is granted the remainder of the third phase is perfommed as a unitary transaction. The first part of the third phase transaction is performing the audit fixup process described above for all audit records referencing Partition1 that were created after completion of the second 10 phase and for which either the old record image or new record image has a primary key value in the MoveRange (i.e., that pass the filter).

When processing of the last such audit record in the audit trail is completed, the B-tree for Partition1 is split into two B-trees, one for records having a 15 primary key in NewRange1 and the other for records having a primary key in the MoveRange.

Then the third phase transaction requests a lock on the entire d~h~se table associated with Partition1 and Partition2. This pemmits existing user 20 transactions that work on the table to complete, but suspends all new user transactions on the entire d~t~h~se table until the lock is released. When the full table lock is granted, the catalog entries and file labels for Partitionl and Partition2 are updated to reflect their new primary key ranges.
Furthermore, the catalog entries for all partitions of the cl~t~h~se table are 25 also updated so as to reference the key ranges of Partition1 and Partition2.

When all catalog and file label updates have been completed, the lock on the d~t~h~se table is released, enabling user transactions against the ~:3t~h:~se table to be initiated and executed. Finally, an access check is put 30 in place to make application transactions unable to access records in the MoveRange B-tree of the OldPartition, and then the third phase transaction is concluded.

- 2~6~7~

All records in the MoveRange part of the Old Partition are deleted without interfering with concurrent ap~licP.IiGll transactions against the table, and then the ~ccess check for the OldPartition is removed.

Create Index Procedure The function of the Create Index procedure is to create an altemate index for a d~t~h~ce table, where the alternate index is generally a different 10 function of the d~t~h~se table columns than the primary index for the dat~h~se table.

Referring to Figure 6 and Appendices 4, 5, 6 and 7, the steps of the Create Index procedure are as follows. The d~t~h~se object from which r~cords are 15 to be indexed is herein called the Base Table and the altemate index being created is called the NcY.rlndex. The set of columns used to generate the altemate key for the Newlndex are represented by a vector called the AltemateKeyColumns vector. Furthermore, a flag called UniquelndexFlag is set to True if the Newlndex is to be a unique index, which means that every 20 record in the Base Table must have a unique altemate index value, and is set to False if multiple records in the Base Table are allowed to have the same altemate index value.

An audit trail pointer, AuditPtr, is set to point to where the next record in the 25 audit trail for transactions against the d~t~b~se table will be located.

In the first phase (250) of the Create Index procedure, the records in the Base Table are ~ccessed using Browse ~ccess (i.e., read through locks), and for each such record a "create new index record" procedure 251 is 30 per~ormed. The "create new index record" procedure 251, which is also used in the later phases of the Create Index procedure, begins by computing 21~779~

primary and altemate index values for a particular record using the index generation fu".;tiGns;

PrimaryKey1 = Create_PrimaryKey(Record, PrimaryKeyColumns) AltKey1 = Create_AltKey(Record, PrimaryKeyColumns) If the UniquelndexFlag is False, an index record with AltKey1 and PrimaryKey1 as its two fields is stored in the Newlndex.

10 -If the UniquelndexFlag is set to True, prior to storing an index record withAltKey1 and PrimaryKey1 as its two fields in the Newlndex, the Newlndex is searched to see if Newlndex already has a record with an altemate index value of AltKey1. If such a record is found in the Newlndex, a potential lic~te index problem exists. To resolve whether a ~urlic~te index 15 problem has been encountered, two tests are performed. First, a r~peatable read transaction is performed on the Base Table to see if the Base Table still stores a record with primary and altemate key values of PrimaryKey1 and AltKey1. If such a record is found in the Base Table, the second test is performed.
The existing Newlndex record with an altemate key value of AltKey1 is read (with a repe~t~hlQ read operation) to detemmine the primary key value, PrimaryKey2, stored with it. If this Newlndex record still exists, a second repeatable read transaction is performed on the Base Table to see if the 25 Base Table stores a record with a primary key value of PrimaryKey2 and an altemate key value of AltKey1. If both tests produce positive results, the Create Index procedure is aborted because two d~t~h~se r~cor~ls with i.lenlical alle",ale key values have been encountered. Otherwise, if either test retums a negative result, an index record with AltKey1 and PrimaryKey1 30 as its two fields is stored in the Newlndex, and the index record with AltKey1 and PrimaryKey2 (if any) is deleted from the Newlndex.

21 ~79~
-In the second phase (252) of the Create Index procedure, transactions by end users against the Base Table are allowed to continue, and those transactions insert, delete and update records in the Base Table and create additional new audit trail entries in the audit trail.

At the beginning of the second phase, an AuditTrail filter is est~hlished such that only Audit Trail records that pertain to the Base Table are received for processing by the SQL catalog manager. Each received audit record is processed by an ~audit fixup for create index~ procedure 253 specially 10 designed for use as part of the Create Index procedure.

The ~audit fixup for create index~ procedure 253 processes an audit record as follows. If the audit record denotes a change to a Base Table record that does not alter either the primary key or the altemate key of the record, or 15 the change is already reflected in the Newlndex, the audit record is ignored.
If the audit record denotes deletion of a Base Table record, an audit record representing deletion of the ~ssoci~ecl Newlndex record is constructed and a ~redo~ of the newly created audit record against the Newlndex is 20 perforrned. As a result, the ~ssoci~ted Newlndex record is deleted. if one exists.

If the audit record denotes addition of a Base Table record, an audit record representing insertion of a cGr,esponding Newlndex record is constructed 25 and a ~redo~ of the newly created audit record against the Newlndex is perfommed. If a unique altemate index is being created and a d!lrlic~te Newlndex record with the same primary and altemate key values is found during this procedure, the index creation procedure is aborted. Otherwise, the aforementioned steps result in a new index record being stored in the 30 Newlndex for the inserted Base Table record.

21~77gO
-Finally, if the audit record in~lic~tes that either the primary index or alternate index of a record have been altered, then a first audit record representing deletion of the Newlndex record ~-ssoci?ted with the record's old value is constructed, and a second audit record replesenlins~ insertion of a new 5 Newlndex record cGr,espo"ding to the record's new value is constructed.
Redo's of both constructed audit records are then performed against the Newlndex. If a unique altemate index is being created and a duplic~te Newlndex record with the same primary and altemate key values is found during this procedure, the index creation procedure is aborted. Othelwise, 10 the aforer"enlioned steps result in a new index record being stored in the Newlndex for the altered Base Table record, and deletion of the prior Newlndex record for that Base Table record.

In the third phase (254) of the Create Index procedure, a transaction request 15 is made for a lock on the Base Table. This is a transaction request that goes in the lock queue. User transactions initiated before the third phase are not affected, but the lock request prevents users from committing transactions initiated after the lock request is made. When the requested lock is granted the remainder of the third phase is performed as a unitary 20 transaction. The first part of the third phase transaction is perfomming the ~audit fixup for create index~ process 253 described above for all audit records refe~nc;ng the Base Table that were created after completion of the second phase (i.e., that pass the filter).

25 When processing of the last such audit record in the audit trail is completed, a catalog entry for the Newlndex is created, and file labels for all partitions of the Base Table are updated to reflect the existence of the Newlndex.
Then the lock on the Base Table is rele~sed, the third phase transaction is concluded, and the Create Index procedure is completed.
In an alternate embodiment, represented in Appendix 5, the first phase of the Create Index procedure utilizes an indexing procedure that processes - 216779~

~- the entire Base Table, even if records that potentially have d!~rlic~te altemate key values are encountered. All such potential duplicate records are copied to a scr~tch pad memory area, and then are processed by the ~create new index record~ procedure 251 to detemmine if records with 5 dul.lic~te altemate key values in fact exist, and to add additional records to the Newlndex if no d~ IpliG~te altemate key values are found.

ALTERNATE EMBODIMENTS
While the present invention has been described with reference to a fewspeci~ic embodiments, the description is illustrative of the invention and is not to be construed as limiting the invention. Various modifications may occur to those skilled in the art without departing from the true spirit and scope of the invention as defined by the appended claims. -2l67~sa -Pseudocode Representation of Move Partition Procedure 5 Procedure MovePartition (OldPartition, NewPartition) /~ OldPartition identifies the partition to be moved NewPartition identifies the new partition to be created BaseTable is the dat~h~-se table ~ssoci~ted with the OldPartition ~/

10 /~ Phase 1: Dir~y Copy ~/
Access current d~l~h~-se partition (OldPartition) to be moved Create file for new d~t~h~se partition (NewPartition) Create file label for the NewPartition AuditPtr = End of Audit Trail /~ AuditPtr initially points to where the next record in the Audit Trail will be located, when it is generated ~/

While ~ccessing records in the OldPartition, using Browse access (i.e., read through locks), copy records from the OldPartition to the IJellJrartition 20 Maintain an up-to-date primary index B-tree for each record copied into the NewPartition All transactions by end users continue to insert, delete and update records in the OldPartition and to create new audit trail entries 25 /~ Phase 2: Partial Cleanup ~/
F~hl;sh AuditTrail filter: Access only Audit Trail records that pertain to the OldPartition Do Until End of Audit Trail is reached /~ Process entry in Audit Trail at AuditPtr ~/
Modify the Audit Record to refer to the NewPartition If the change to the table noted in the audit record is already reflected in the copied records { Ignore Audit Record }
Else Perform a "RedoH with respect to the modified Audit Record so as to apply the change noted in the Audit Record to the NewPartition - 21677~0 Update B-tree for the NewPartition for each update to the NewPartition }
Update AuditPtr to Next Audit Record (skip r~cords that do not pertain to the OldPartition) } r End Do Loop ~/

r Phase 3: Final Cleanup ~/
Request and Wait for Lock on the OldPartition 10 r This is a transaction request that goes in the lock queue. This does not affect transactions initiated before Phase 3, but prevents users from committing transactions initiated after the Lock Request is made. ~/
r When Lock is granted ... ~/
Do As A Unitary Transaction {
LastPtr = Last Record in Audit Trail r Previously est~hl shed Audit Trail Filter continued to filter out audit records not applicable to the OldPartition ~/
Do Until End of AuditPtr reaches LastPtr:
{
Modify the Audit Record to refer to the NewPartition Perform a ~Redo~ with respect to the modified Audit Record so as to apply the change noted in the Audit Record to the NeJ/rartition Update B-tree for the NewPartition for each update to the NewPartition Update AuditPtr to Next Audit Record (skip records that do not pertain to the OldPartition) } r End Do Loop ~/
Request Lock on the entire Base Table When Lock is granted:
Delete Catalog entry for the OldPartition Create Catalog entry for the NewPartition Update file labels and catalog entries for all partitions of BaseTable so as to reference the NewPartition Release Lock on BaseTable, enabling user transactions against the Base Table to resume execution - 21~7790 Delete the OldPartition and release disk space used by the OldPartition file } /~ End of transaction ~/

5 Retum 21~790 PseuclocGde RepresentatiG" of Split Partition Procedure 5 Procedure SplitPartition (BaseTable, OldPartition, OldRange, NewRange1, NewRange2, NewPartition) r OldPartition identifies the partition to be split NewPartition identifies the new partition to be created OldRange is the range of Primary Key values currently assigned to the OldPartition NewRange1 is the new range of Primary Key values assigned to the OldPartition NewRange2 is the range of Primary Key values assigned to the NewPartition to be created BaseTable is the d~t~h~se table associated with the OldPartition ~1 Access current d~t~h~se partition (OldPartition) to be split 20 Create file for new d~t~h~se partition (NewPartition) Create file label for the NewPartition AuditPtr = End of Audit Trail r AuditPtr initially points to where the next record in the Audit Trail will be loca~ecl, when it is generated */
/~ Phase 1: Dirty Copy ~/
While ~ccessing records in the OldPartition, using Browse ~ccess (i.e., read through locks), copy records having a Primary Key value in NewRange2 from the OldPartition to the NewPartition 30 Maintain an up-to-date primary index B-tree for each record copied into the NewPartition All transactions by end users continue to insert, delete and update records in the OldPartition and to create new audit trai~ entries 35 /~ Phase 2: Partial Cleanup ~/
Establish AuditTrail filter: Access only Audit Trail records that pertain to the OldPartition with a Primary Key value in NewRange2 Do Until End of Audit Trail is reached {

- 21~7~() /~ rfocess entry in Audit Trail at AuditPtr */
Modify the Audit Record to refer to Partition2 If the change to the table noted in the audit record is not already reflected in the copied records {
Perform a ~Redo~ with respect to the modified Audit Record so as to apply the change noted in the Audit Record to Partition2 Update B-tree for Partition2 for each update to Partition2 }

Update AuditPtr to Next Audit Record (skip records that do not pertain to Partition1 or with a Primary Key value not in NewRange2) } /* End Do Loop ~/

15 /~ Phase 3: Final Cleanup ~/
Request Lock on the OldPartition r This is a transaction request that goes in the lock queue. This does not affect transactions initiated before Phase 3, but prevents users from cG-n"-itli"g transactions initiated after the Lock Request is made. ~/
20 /~ When Lock is granted ...-~/
Do as a Unitary Transaction:
{

LastPtr = Last Record in Audit Trail /~ Previously est~hlished Audit Trail Filter continued to filter out audit records not applicable to NewRange2 in the OldPartition ~/
Do Until End of AuditPtr reaches LastPtr {

Modify the Audit Record to refer to the NewPartition Pe,rollll a Redo~ with respect to the modified Audit Record so as to apply the change noted in the Audit Record to the NewPartition Update B-tree for the NewPartition for each update to the NewPartition Update AuditPtr to Next Audit Record (skip records that do not pertain to NewRange2 in the OldPartition) }
} 1~ End Do Loop ~/

2~67790 Split the B-tree for Partitionl into two B-trees, one for records in NewRange1 (those remaining in Partition1) and one for the records in Ne~ al)ge2 to be removed from Partitionl (the Prune B-tree).

Request Lock on the entire Base Table When Lock is granted:
Update Catalog entry for the OldPartition to reflect new index boundaries for the OldPartition Update label for the OldPartition, including putting in place an ~ccess check that prevents user transaction from ~ccessiog NewRange2 Create Catalog entry for the NewPartition Update file labels and catalog entries for all partitions of BaseTable to reference the NewPartition Rele~se Lock on BaseTable, enabling user transactions against the Base Table to resume execution } / * end of unitary transaction for third phase ~/
/* Phase 4: Background garbage collection */
In background mode:
Delete all records from the OldPartition that are referenced by the Pnune B-tree (this releases unused space from the OldPartition file) Remove ~ccess check in the OldPartition Retum - 216779~

Pseudocode Representation of Move Partition Boundary Procedure 5 Procedure MovePartitionBoundary (Partition1, OldRange1, NewRange1, Partition2, OldRange2, NewRange2) r BaseTable is d~t~h~se table ~ssoci~ted with Partition1 and Partition2 Partition1 and Partition2 identify two partitions having ~ cent assigned Primary Key Ranges OldRange1 is the range of Primary Key values currently assigned to Partition1 OldRange2 is the range of Primary Key values currently assigned to 1 5 Partition2 NewRange1 is the new range of Primary Key values assigned to Partition1 NewRange2 is the new range of Primary Key values assigned to Partition2 ~/

Access d~t~h~se Partition1 and Partition2 AuditPtr = End of Audit Trail r AuditPtr initially points to where the next record in the Audit Trail will be loc~e~l when it is generated ~/
Generate MoveRange = range of Primary Key values for records in Ncwnange2 that are not in OldRange2 r Phase 1: Dirty Copy ~/
While ~ccessil,g f~cGrds in Partition1 using Browse ~ccess, copy records having a Primary Key value in MoveRange from Partition1 to Partition2 Update primary index B-tree for Partition2 for each record copied into Partition2. Leave B-tree for Partition1 unchanged.
All transactions by end users continue (A) to insert, delete and update records in Partition1 and Partition2 using old partition range boundaries and (B) to create new audit trail entries 21677~
-t~ Phase 2: Partial Cleanup ~/
Fst~hlish AuditTrail filter: Access only Audit Trail records that pertain to Partitionl with Primary Key values in MoveRange Do Until End of Audit Trail is reached 5 {
r P.ocess entry in Audit Trail at AuditPtr ~/
Modify the Audit Record to refer to Partition2 If the change to the table noted in the audit record is not already reflected in the copied records {
Perfomm a ~Redo~ with respect to the modified Audit Record so as to apply the change noted in the Audit Record to Partition2 Update B-tree for Partition2 for each update to Partition2 }

Update AuditPtr to Next Audit Record (skip records that do not pertain to Partition1 or with a Primary Key value not in MoveRange) } r End Do Loop ~/

20 /~ Phase 3: Final Cleanup ~/
Request Lock on Partition1 and Partition2 /~ This is a transaction request that goes in the lock queue. This does not affect transactions initiated before Phase 3, but prevents users from cGIlllllitling transactions initiated after the Lock Request is made. ~/
25 /~ When Lock is granted ... ~/
Do as a Unitary Transaction:
{

LastPtr = Last Record in Audit Trail /~ Previously established Audit Trail Filter continued to filter out audit records not applicable to MoveRange in Partition1 ~/
Do Until End of AuditPtr reaches LastPtr {

Modify the Audit Record to refer to Partition2 Perform a ~Redo~ with respect to the modified Audit Record so as to apply the change noted in the Audit Record to Partition2 Update B-tree for Partition2 for each update to Partition2 Update AuditPtr to Next Audit Record (skip records that do not pertain to MoveRange in Partition1) } /~ End Do Loop ~/

~16~9~

Split the B-tree for Partition1 into two B-trees, one for records in NewRange1 (those remaining in Partition1) and one for the records in the MoveRange to be removed from Partition1 (the Prune B-tree).

Request Lock on entire Base Table When Lock is granted:
Update Catalog entry for Partition1 to reflect new partition key boundaries for Partition1 Update label for Partition1, including putting in place an Access check that prevents user transactions from accessing MoveRange Update Catalog entry for Partition2 to reflect new partition key boundaries for Partition2 Update label for Partition2 Update file labels and catalog entries for all partitions of BaseTable to reflect the new partition key boundaries for Partition1 and Partition2 Rele~se Locks on BaseTable (including Partition1 and Partition2), enabling user transactions against the Base Table to resume ~xecution } / ~ end of unitary transaction for third phase ~/

r Phase 4: Background garbage collection ~/
In background mode:
Delete all records from Partition1 that are referenced by the Prune B-tree (this releases unused space from Partition1 file).
Remove ~ccess check in Partition1 Retum 2167~0 Pseudocode Represe,llalion of Create Index Procedure Createlndex PlocecJure (BaseTable, AltlndexColumns, UniquelndexFlag, Newlndex) r BaseTable is table for which index is to be created.
AltlndexColumns is a vector listing the table columns that define the key for the New Index.
UniquelndexFlag is equal to True if the new index must be a unique index (i.e., an index for which every base table record has a unique altemate key value).
Newlndex is the new index to be created PrimarylndexColumns is a vector listing the table columns that define the key for the Primary Index of the Base Table ~1 r Structure of Newlndex (and every other index, other than the primary index) is:
File Label - embedded copy of catalog information for index B-tree - the B-tree for the index Index Records, where each index record has two fields:
AltKey, PrimaryKey where the AltKey field stores the value of the AltlndexColurnns for one record of the BaseTable, and the PrimaryKey field stores the value of the primary key (i.e., the PrimarylndexColumns) for that same record ~1 Create File for Newlndex, including root node for the new index's B-tree Create file label for Newlndex AuditPtr = End of Audit Trail 1~ AuditPtr initially points to where the next record in the Audit Trail will be located, when it is generated ~/
RecPtr = First Record of BaseTable 2 i ~

/~ Phase 1: Dirty Copy ~/
Do Until End of BaseTable is Reached {

Access, using Browse ~ccess BaseTable(RecPtr) AltKeyl = Create_AltKey( BaseTable(RecPtr), AltlndexColumns) PrimaryKey1 = Create_PrimaryKey( BaseTable(RecPtr), PrimarylndexColumns ) 1~ Check for Duplicate Index Values only if UniquelndexFlag is True~/
If UniquelndexFlag Search Newlndex for an index record with Newlndex.AltKey equal to AltKey1 If a match is found {
Call CheckDupRecord (BaseTable, Newlndex, BaseTable(RecPtr)) If RetumCode = ~fail~
Abort Createlndex Procedure }
Else Call CreatelndexRecord (Newlndex, AltKey1, PrimaryKeyl) }

Else / ~ UniquelndexFlag is False ~/
Call CreatelndexRecord (Newlndex, AltKeyl, PrimaryKeyl) Increment RecPtr to point to next BaseTable record, if any } /~ end of Do loop ~/

30 /~ Phase 2: Partial Cleanup ~/
Establish AuditTrail filter: Access only Audit Trail records that pertain to the Base Table Do Until End of Audit Trail is reached {

Call AuditRecord_to_Newlndex (AuditPtr, BaseTable, Newlndex, IndexPtr) for the current Audit Record Update AuditPtr to Next Audit Record (skip records that do not pertain to the Base Table) }

216~79~

/~ Phase 3: Final Cleanup ~/
Re~uest Lock on the Base Table /* This is a transaction request that goes in the lock queue. This does not affect traosac~iolls initiated before Phase 3, but prevents users from coilll"itling transactions initiated after the Lock Request is made. ~/
/~ When Lock is granted ... ~/
Do as a Unitary Transaction:

LastPtr = Last Record in Audit Trail /~ Previously est~hlished Audit Trail Filter continued to filter out audit records not ~pplic~hle to the Base Table ~/
Do Until End of AuditPtr = LastPtr {

Call AuditRecord_to_Newlndex (AuditPtr, BaseTable, Newlndex) for the current Audit Record Update AuditPtr to Next Audit Record (skip records that do not pertain to the Base Table) } /~ End Do Loop ~/

Create Catalog entry for Newlndex Update file labels and catalog entries for all partitions of BaseTable to reference the Newlndex Rele~se Lock on BaseTable, enabling user transactions against the Base Table to resume execution } / ~ end of unitary transaction for third phase ~/

Retum - 2~67~9~

Pseudocode for Second Preferred Embodiment of Phase 1 of Create Index Procedure t~ Phase 1: Dirty Copy ~/
Initialize ScratchPad pointer SP_Ptr Do Until End of BaseTable is Reached {

Access, using Browse ~ccess, BaseTable(RecPtr) AltKey1 = Create_AltKey( BaseTable(RecPtr), AltlndexColumns) PrimaryKeyl - Create_PrimaryKey( BaseTable(RecPtr), PrimarylndexColumns ) /~ Check for Duplicate Index Values only if Uniquelndex is True~/
If UniquelndexFlag {
Search Newlndex for an index record with Newlndex.AltKey equal to AltKey1 If a match is found {
Store RecPtr in ScratchPad(SP_Ptr) Increment SP_Ptr }

Else Call CreatelndexRecord (Newlndex, AltKey1, PrimaryKey1) }

Else / ~ UniquelndexFlag is False ~/
Call CreatelndexRecord (Newlndex, AltKey1, PrimaryKey1) Increment RecPtr to point to next BaseTable record, if any /~ end of Do loop ~/

/~ Process Records in ScratchPad ~/
35 Initialize ScratchPad pointer SP_Ptr Do Until End of ScratchPad is reached {

RecPtr = ScratchPad(SP_Ptr) Call CheckDupRecord (BaseTable, Newlndex, BaseTable(RecPtr)) 2167~9~

If RetumCode = ~fail~
Abort Createlndex Procedure Increment SP_Ptr to point to next ScratchPad entry, if any 5 /* end of Phase 1 */

- 216779~

Pseudocode Representation of Create Index Record Procedure 5 Procedure CreatelndexRecord (Newlndex, NewAltKey, NewPrimaryKey) /~ Newlndex is the new index in which a new record is to be created.
NewAltKey is the altemate key of a record in the BaseTable for which an index record is to be created.
NewPrimaryKey is the primary key of a record in the BaseTable for which an index record is to be created.
~1 Create NewlndexRecord(AltKey,PrimaryKey):
NewlndexRecord.AltKey = NewAltKey NewlndexRecord.PrimaryKey = NewPrimaryKey If NewlndexRecord is already present in Newlndex Retum Else Store NewlndexRecord in Newlndex Add B-tree entry for the NewlndexRecord }

Retum . 21~7~9~

Pseudocode Representation of Check Duplic~te Record Procedure S rlocedure CheckDupRecord (BaseTable, Newlndex, DupRecord) r BaseTable is a d~t~h~se table Newlndex is an index file being created for the BaseTable DupRecord is an index record whose AltKey value is the same as 10the AltKey value of an already existing index record ~1 /~ Generate altemate key value and primary key value from DupRecord ~/
AltKeyValue2 = Create_AltKey( DupRecord, AltlndexColumns) 15 PrimaryKeyValue2 = Create_PrimaryKey(DupRecord, PrimarylndexColumns) As a unitary transaction:
{

Access the base table record, if any, having a primary key value of PrimaryKeyValue2, requesting a lock on the requested record If Recor~ seTable(PrimaryKeyValue2) is found in base table {

r Extract the altemate key value for that base record ~/
AltKeyValueY = Record(PrimaryKeyValue2).AltKey If AltKeyValueY ~ AltKeyValue2 TransactionRetum (UDupRecord not found") }

Else TransactionRetum (~DupRecord not foundU) 30 }
If TransactionRetum = ~DupRecord not found~
/~ A Base Table record for DupRecord was not found, indicating that an index record for DupRecord is not needed. ~/
{

Retum (Success) }

/~ A base table record matching DupRecord's Primary and Altemate keys was found in base table.

21677g~
-First step: Read the already exisli,)g Newlndex record whose alle",ate key value is DupRecord.AltKey.
Next step: Check to see if a record with the primary key value found in this Newlndex record is $till in Base Table 5 ~l PrimaryKeyValue1 = Newlndex(AltKeyValue2).PrimaryKey As a unitary trans~ction:
{

Access the base table record, if any, having a primary key value of PrimaryKeyValue1, requesting a lock on the re~uested record If record is found in base table {

/~ Extract the altemate key value for that base record ~/
AltKeyValueX = BaseTable(PrimaryKeyValue1).AltKey If AltKeyValueX 7 AltKeyValue2 TransactionRetum (~conflicting record not found") }

Else TransactionRetum (~conflicting record not foundU) 20 }

If TransactionRetum = ~cor,~licti,)g record not found"
{

r No Duplicate Record Problem bec~use original record has been deleted or altered ~/
Delete Newlndex(AltKeyValue2) Call CreatelndexRecord (Newlndex, AltKey2, PrimaryKey2) Retum (Success) }

30 Else {
1~ a conflicting base record was found ~/
Retum (Fail, ~Duplicate key value found") }

r End of CheckDupRecord Procedure ~/

- 2167~d Pseudocode Representation of ~Audit Record to Newlndex~ Procedure 5 Procedure AuditRecord_to_Newlndex (AuditPtr, BaseTable, Newlndex) r BaseTable is d~t~hase table Newlndex is index file AuditPtr is a pointer to an Audit Trail record ~1 .
r Ignore irrelevant Audit Record ~/
If Audit Record denotes a change to a base table record that does not alter either the PrimaryKey or AltKey of the record { Ignore Audit Record ) r ne c o rJ deleted from Base Table ~/
Elself Audit Record denotes deletion of a base table record {

Create an audit record representing deletion of the associated Newlndex record If this record exists in Nev!lndex (i.e., .,latcl-L~g both the PrimaryKey and AltKey of the cleleted base table record) Redo the newly created audit record against Newlndex }
r New Record Added to Base Table ~/
Elself Audit Record denotes addition of a record to the base table {
Create an audit record representing insertion of the ~ssoci~ted Newlndex record If UniquelndexFlag {
AltKey1 = Create_AltKey( Inserted Record, AltlndexColumns) Search Newlndex for an index record with Newlndex.AltKey equal to AltKey1 If a match is found Call CheckDupRecord (BaseTable, Newlndex, Inserted Record) - 2 1677~0 If RetumCode = ~fail~
Abort Createlndex Procedure }

Else Redo the newly created audit record against Newlndex }
Else / ~ UniquelndexFlag is False ~/
Redo the newly created audit record against Newlndex }

/~ Pl i".a. ~Key and/or AltKey in Base Table r~cor~l was altered ~/
Elself audit record denotes alteration of a base table record {

Create a first audit record represellli"g deletion of the Newlndex record ~ssoci~ted with the base table record's old value If this record exists in Newlndex (i.e., matching both the PrimaryKey and AltKey of the base table record's old value) Redo the first newly created audit record against Newlndex Create a second audit record representing insertion of the Newlndex record ~ssoci~ted with the base table record's new (altered) value If UniquelndexFlag {

AltKey1 = Create_AltKey( Altered Record, AltlndexColumns) Search Newlndex for an index record with Newlndex.AltKey equal to AltKey1 If a match is found {

Call CheckDupRecord (BaseTable, Newlndex, Altered Record) If RetumCode = ~failU
Abort Createlndex Procedure }

Else Redo the second newly created audit record against Newlndex Else /~ UniquelndexFlag is False ~/

Redo the second newly created audit record against Newlndex } /~ end of ~rocessi"g for ~table alteration~ audit record Retum

Claims (3)

1. A computer system for storing and providing user access to data in stored database objects, comprising:
memory for storing said database objects, wherein said memory resides in a plurality of interconnected computer nodes;
a transaction manager, coupled to said memory, for managing computational transactions that add, delete and alter data stored in said database objects; said transaction manager including audit trail generation instructions for generating an audit trail and storing said audit trail in said memory, said audit trail including audit records, at least a subset of said audit records each denoting an event selected from the set consisting essentially of addition, deletion and alteration of specified data in a specified one of said database objects;
a restructuring procedure, coupled to said memory, for restructuring a specified one of said database objects, said restructuring procedure, including:
first phase instructions for accessing data in said first object and storing corresponding data in a second object while allowing continued performance of computational transactions against said first object;
second phase instructions, for execution after said first phase instructions, for accessing said audit records in said audit trail created by said transaction manager during execution of said first phase instructions and thereafter until execution of said second phase instructions is completed; said second phase instructions updating said data stored in said second object by redoing with respect to said second object each event denoted by said accessed audit trail records; and third phase instructions, for execution after said second phase instructions, for obtaining a lock on said first object so as to prevent continued performance of computational transactions against said first object, and for then accessing audit records in said audit trail created by said transaction manager after execution of said second phase instructions;

said third phase instructions updating said data in said second object by redoing with respect to said second object each event denoted by said accessed audit trail records.
2. The computer system of claim 1, said database objects including database tables and database indexes, each database table having a plurality of columns, a plurality of records having primary key values based on a first specified subset of said columns, and a primary key index based on said primary key values;
said restructuring procedure comprising a create index procedure for creating an alternate key index having a unique alternate key value for each record;
said first object comprising one of said database tables and said second object comprising an alternate key index generated by said create index procedure;
said first phase instructions including instructions for accessing said records in said one database table and instructions for generating and storing a corresponding index record in said alternate key index, each record in said alternate key index including said primary key value for said corresponding database table record and an alternate key value based on a second specified subset of said columns;
said second phase and third phase instructions including instructions for deleting an index record in said alternate key index when one of said accessed audit records indicates an event making said alternate key index record invalid, and instructions for adding index records to said alternate key index when said accessed audit records indicate events that add new database records and events that alter any field of an existing database record corresponding to any column in said first and second specified subsets of columns; and said generating and storing instructions in said first phase instructions, and said adding index records instructions in said second phase and third phase instructions including instructions for determining whether two records in said one database table have identical alternate key index values and for aborting said create index procedure when two such records are found.
3. A computer system for storing and providing user access to data in stored database, comprising:
memory for storing said databases, said databases including database tables, each database table having a plurality of columns, a primary key index based on a specified subset of said columns, and an associated schema denoting information about said table's columns; wherein said memory resides in a plurality of interconnected computer nodes;
at least a subset of said database tables each including a plurality of partitions, each partition storing records having primary key values in a primary key range distinct from all others of said plurality of partitions; eachpartition stored as a separate data structure in said memory;
a transaction manager, coupled to said memory, for managing computational transactions that add, delete and alter records in said database tables; said transaction manager including audit trail generation instructions for generating an audit trail and storing said audit trail in said memory, said audit trail including audit entries, each audit entry denoting a database table record event selected from the set consisting essentially of addition, deletion and alteration of a specified database table record in a specified one of said database tables;
a move partition procedure, coupled to said memory, for moving any specified one of said partitions for one of said database tables having a plurality of partitions from a first memory location to a second memory location; said move partition procedure, including:
first phase instructions for creating a new partition at said memory location and for copying all records of said specified partition into said new partition, using read only access to said records of said specified partition while performing said copying;
second phase instructions, for execution after said first phase instructions, for accessing audit records in said audit trail created by said transaction manager during execution of said first phase instructions and thereafter until execution of said second phase instructions is completed;
said second phase instructions updating said records in said new partition in so as to redo each database table record event denoted by said accessed audit trail records; and third phase instructions, for execution after said second phase instructions, for obtaining a lock on said one database table, then accessing audit records in said audit trail created by said transaction manager after execution of said second phase instructions; said third phase instructions updating said records in said new partition in so as to redo each database table record event denoted by said accessed audit trail records; said third phase instructions further including instructions for updating said schema information for said one database table and then releasing said lock on said one database table.
CA002167790A 1995-01-23 1996-01-22 Relational database system and method with high data availability during table data restructuring Abandoned CA2167790A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US37775895A 1995-01-23 1995-01-23
US08/377,758 1995-01-23

Publications (1)

Publication Number Publication Date
CA2167790A1 true CA2167790A1 (en) 1996-07-24

Family

ID=23490407

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002167790A Abandoned CA2167790A1 (en) 1995-01-23 1996-01-22 Relational database system and method with high data availability during table data restructuring

Country Status (4)

Country Link
US (1) US5625815A (en)
EP (1) EP0723238B1 (en)
CA (1) CA2167790A1 (en)
DE (1) DE69615230T2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287183A (en) * 2019-05-23 2019-09-27 中国平安人寿保险股份有限公司 Processing method, device, computer equipment and the storage medium of database table water level
CN111897490A (en) * 2020-07-08 2020-11-06 阿里巴巴集团控股有限公司 Method and device for deleting data
US20230315708A1 (en) * 2022-03-31 2023-10-05 Unisys Corporation Updating a secondary index from an audit trail

Families Citing this family (208)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6101495A (en) * 1994-11-16 2000-08-08 Hitachi, Ltd. Method of executing partition operations in a parallel database system
US7599910B1 (en) 1993-11-16 2009-10-06 Hitachi, Ltd. Method and system of database divisional management for parallel database system
US5499610A (en) * 1994-12-16 1996-03-19 Bruner; Dennis R. Plural receptacle filtering litter box system
US5918224A (en) * 1995-07-26 1999-06-29 Borland International, Inc. Client/server database system with methods for providing clients with server-based bi-directional scrolling at the server
US5761652A (en) * 1996-03-20 1998-06-02 International Business Machines Corporation Constructing balanced multidimensional range-based bitmap indices
US5794241A (en) * 1996-04-08 1998-08-11 Oracle Corporation Method and apparatus for dynamically disabling and enabling table locking for a database
US5761500A (en) * 1996-04-18 1998-06-02 Mci Communications Corp. Multi-site data communications network database partitioned by network elements
JP3524270B2 (en) 1996-06-24 2004-05-10 株式会社日立製作所 Parallel processing system
US5870747A (en) * 1996-07-09 1999-02-09 Informix Software, Inc. Generalized key indexes
US6167393A (en) * 1996-09-20 2000-12-26 Novell, Inc. Heterogeneous record search apparatus and method
US7480653B2 (en) * 1996-10-22 2009-01-20 International Business Machines Corporation System and method for selective partition locking
US6754656B1 (en) * 1996-10-22 2004-06-22 International Business Machines Corporation System and method for selective partition locking
US5978790A (en) * 1997-05-28 1999-11-02 At&T Corp. Method and apparatus for restructuring data in semi-structured databases
US5960425A (en) * 1997-05-28 1999-09-28 At&T Corp. Database access system with optimizable expressions
US6092061A (en) * 1997-08-15 2000-07-18 International Business Machines Corporation Data partitioning by co-locating referenced and referencing records
US6269375B1 (en) * 1998-04-01 2001-07-31 International Business Machines Corporation Rebalancing partitioned data
US6018780A (en) * 1998-05-19 2000-01-25 Lucent Technologies Inc. Method and apparatus for downloading a file to a remote unit
US6263345B1 (en) * 1998-09-28 2001-07-17 Compaq Computers, Corporation Histogram synthesis modeler for a database query optimizer
US6886012B1 (en) 1998-11-18 2005-04-26 International Business Machines Corporation Providing traditional update semantics when updates change the location of data records
US7366708B2 (en) * 1999-02-18 2008-04-29 Oracle Corporation Mechanism to efficiently index structured data that provides hierarchical access in a relational database system
US6336117B1 (en) * 1999-04-30 2002-01-01 International Business Machines Corporation Content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine
US6360228B1 (en) * 1999-06-02 2002-03-19 Oracle Corporation Transactional framework for executing statements involving non-native code
US6453313B1 (en) 1999-07-06 2002-09-17 Compaq Information Technologies Group, L.P. Database management system and method for dequeuing rows published to a database table
US6349310B1 (en) * 1999-07-06 2002-02-19 Compaq Computer Corporation Database management system and method for accessing rows in a partitioned table
US6339772B1 (en) 1999-07-06 2002-01-15 Compaq Computer Corporation System and method for performing database operations on a continuous stream of tuples
CA2279028C (en) * 1999-07-29 2002-09-10 Ibm Canada Limited-Ibm Canada Limitee Dropped database table recovery
EP1912124B8 (en) * 1999-10-14 2013-01-09 Bluearc UK Limited Apparatus and system for implementation of service functions
US6681218B1 (en) * 1999-11-04 2004-01-20 International Business Machines Corporation System for managing RDBM fragmentations
US6944614B1 (en) * 1999-11-24 2005-09-13 Ncr Corporation Query monitor playback mechanism for post-mortem performance analysis
US6539402B1 (en) * 2000-02-22 2003-03-25 Unisys Corporation Using periodic spaces of block ID to improve additional recovery
US7117197B1 (en) * 2000-04-26 2006-10-03 Oracle International Corp. Selectively auditing accesses to rows within a relational database at a database server
US7127448B1 (en) 2000-04-26 2006-10-24 Oracle International Corporation Reforming queries to selectively audit accesses to rows within a relational database
US6725240B1 (en) * 2000-08-08 2004-04-20 International Business Machines Corporation Apparatus and method for protecting against data tampering in an audit subsystem
US7058648B1 (en) 2000-12-01 2006-06-06 Oracle International Corporation Hierarchy-based secured document repository
US7016897B2 (en) * 2000-12-29 2006-03-21 International Business Machines Corporation Authentication referral search for LDAP
US6879981B2 (en) * 2001-01-16 2005-04-12 Corigin Ltd. Sharing live data with a non cooperative DBMS
DE50103762D1 (en) * 2001-06-12 2004-10-28 Sap Ag Method, system and computer program product for changing the data structure with which an application program in a computer system accesses database systems
EP1417595A1 (en) * 2001-06-28 2004-05-12 MySQL AB A method for concurrency control for a secundary index
EP1271349A1 (en) * 2001-06-28 2003-01-02 Siemens Aktiengesellschaft Method for merging distributed databases
US8640136B2 (en) * 2001-09-26 2014-01-28 Emc Corporation Sharing objects between computer systems
US7047250B1 (en) * 2001-09-28 2006-05-16 Oracle International Corporation Indexing to efficiently manage versioned data in a database system
AU2002334721B2 (en) 2001-09-28 2008-10-23 Oracle International Corporation An index structure to access hierarchical data in a relational database system
US6801903B2 (en) * 2001-10-12 2004-10-05 Ncr Corporation Collecting statistics in a database system
US7139775B2 (en) * 2001-11-01 2006-11-21 Solid Information Technology Oy Method and arrangement for providing an audit of a replica database
JP4162184B2 (en) 2001-11-14 2008-10-08 株式会社日立製作所 Storage device having means for acquiring execution information of database management system
US7523142B2 (en) * 2001-12-17 2009-04-21 Sap Ag Systems, methods and articles of manufacture for upgrading a database with a shadow system
AU2003209194A1 (en) 2002-01-08 2003-07-24 Seven Networks, Inc. Secure transport for mobile communication network
US20030154197A1 (en) * 2002-02-13 2003-08-14 Permutta Technologies Flexible relational data storage method and apparatus
US7113938B2 (en) * 2002-02-14 2006-09-26 Gravic, Inc. Method of increasing system availability by splitting a system
JP3991760B2 (en) 2002-04-26 2007-10-17 株式会社日立製作所 Database management method and apparatus and processing program therefor
US6807546B2 (en) * 2002-08-12 2004-10-19 Sybase, Inc. Database system with methodology for distributing query optimization effort over large search spaces
US7461067B2 (en) * 2002-09-13 2008-12-02 Motricity, Inc. System for supporting production, management and delivery of media content for wireless devices
US7778996B2 (en) * 2002-09-25 2010-08-17 Teradata Us, Inc. Sampling statistics in a database system
US7457822B1 (en) 2002-11-01 2008-11-25 Bluearc Uk Limited Apparatus and method for hardware-based file system
US8041735B1 (en) 2002-11-01 2011-10-18 Bluearc Uk Limited Distributed file system and method
US7308456B2 (en) 2002-12-19 2007-12-11 International Business Machines Corporation Method and apparatus for building one or more indexes on data concurrent with manipulation of data
US8468126B2 (en) 2005-08-01 2013-06-18 Seven Networks, Inc. Publishing data in an information community
US7853563B2 (en) 2005-08-01 2010-12-14 Seven Networks, Inc. Universal data aggregation
US7917468B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
US7469253B2 (en) * 2003-04-01 2008-12-23 Microsoft Corporation Associative hash partitioning using pseudo-random number generator
CA2425045C (en) * 2003-04-08 2013-01-15 Ibm Canada Limited - Ibm Canada Limitee Method and system for executing a database query
JP2004318552A (en) * 2003-04-17 2004-11-11 Kddi Corp Device, method and program for supporting ids log analysis
US8239343B2 (en) * 2003-05-23 2012-08-07 Bmc Software, Inc. Database reorganization technique
US20050039001A1 (en) * 2003-07-30 2005-02-17 Microsoft Corporation Zoned based security administration for data items
US6885930B2 (en) * 2003-07-31 2005-04-26 Siemens Energy & Automation, Inc. System and method for slip slide control
US8229932B2 (en) 2003-09-04 2012-07-24 Oracle International Corporation Storing XML documents efficiently in an RDBMS
US8694510B2 (en) * 2003-09-04 2014-04-08 Oracle International Corporation Indexing XML documents efficiently
US7149736B2 (en) * 2003-09-26 2006-12-12 Microsoft Corporation Maintaining time-sorted aggregation records representing aggregations of values from multiple database records using multiple partitions
US7174353B2 (en) * 2003-10-24 2007-02-06 International Business Machines Corporation Method and system for preserving an original table schema
US20050097177A1 (en) * 2003-10-31 2005-05-05 Mcumber William E. Business process for improving electronic mail
GB0325626D0 (en) * 2003-11-03 2003-12-10 Infoshare Ltd Data aggregation
US7624120B2 (en) * 2004-02-11 2009-11-24 Microsoft Corporation System and method for switching a data partition
WO2005086003A1 (en) * 2004-03-08 2005-09-15 Annex Systems Incorporated Database system
US7440954B2 (en) * 2004-04-09 2008-10-21 Oracle International Corporation Index maintenance for operations involving indexed XML data
US7398265B2 (en) 2004-04-09 2008-07-08 Oracle International Corporation Efficient query processing of XML data using XML index
US7930277B2 (en) * 2004-04-21 2011-04-19 Oracle International Corporation Cost-based optimizer for an XML data repository within a database
US8583657B2 (en) * 2004-05-06 2013-11-12 Oracle International Corporation Method and apparatus for using a hash-partitioned index to access a table that is not partitioned or partitioned independently of the hash partitioned index
US7707194B2 (en) * 2004-06-08 2010-04-27 Sap Ag Interface to lock a database row through a logical locking interface
CN1997995B (en) 2004-06-23 2010-05-05 甲骨文国际公司 Efficient evaluation of queries using translation
US20070208946A1 (en) * 2004-07-06 2007-09-06 Oracle International Corporation High performance secure caching in the mid-tier
US20060088027A1 (en) * 2004-07-07 2006-04-27 Wolfgang Becker Dynamic log for computer systems of server and services
US7373554B2 (en) 2004-09-24 2008-05-13 Oracle International Corporation Techniques for automatic software error diagnostics and correction
US7447717B2 (en) * 2004-10-07 2008-11-04 International Business Machines Corporation Method of changing the page size of a DB2 table space while keeping the object available
US8010082B2 (en) 2004-10-20 2011-08-30 Seven Networks, Inc. Flexible billing architecture
WO2006045102A2 (en) 2004-10-20 2006-04-27 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system
US7706781B2 (en) 2004-11-22 2010-04-27 Seven Networks International Oy Data security in a mobile e-mail service
FI117152B (en) 2004-12-03 2006-06-30 Seven Networks Internat Oy E-mail service provisioning method for mobile terminal, involves using domain part and further parameters to generate new parameter set in list of setting parameter sets, if provisioning of e-mail service is successful
US7523131B2 (en) * 2005-02-10 2009-04-21 Oracle International Corporation Techniques for efficiently storing and querying in a relational database, XML documents conforming to schemas that contain cyclic constructs
US7752633B1 (en) 2005-03-14 2010-07-06 Seven Networks, Inc. Cross-platform event engine
US7796742B1 (en) 2005-04-21 2010-09-14 Seven Networks, Inc. Systems and methods for simplified provisioning
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
WO2006136660A1 (en) 2005-06-21 2006-12-28 Seven Networks International Oy Maintaining an ip connection in a mobile network
US8069166B2 (en) 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US7258599B2 (en) * 2005-09-15 2007-08-21 Fujitsu Limited Polishing machine, workpiece supporting table pad, polishing method and manufacturing method of semiconductor device
US8073841B2 (en) * 2005-10-07 2011-12-06 Oracle International Corporation Optimizing correlated XML extracts
US8949455B2 (en) 2005-11-21 2015-02-03 Oracle International Corporation Path-caching mechanism to improve performance of path-related operations in a repository
US8392400B1 (en) * 2005-12-29 2013-03-05 Amazon Technologies, Inc. Method and apparatus for stress management in a searchable data service
US7698284B2 (en) 2005-12-30 2010-04-13 Sap Ag Systems and methods for deploying a tenant in a provider-tenant environment
US7917607B2 (en) * 2005-12-30 2011-03-29 Sap Ag Software management systems and methods, including use of such systems and methods in a provider-tenant environment
US7680825B2 (en) * 2005-12-30 2010-03-16 Sap Ag Systems and methods for generating tenant-specific properties for use in a provider-tenant environment
US20070156714A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Systems and methods for analyzing tenant-specific properties for use in a provider-tenant environment
US20070162969A1 (en) * 2005-12-30 2007-07-12 Becker Wolfgang A Provider-tenant systems, and methods for using the same
US7693851B2 (en) 2005-12-30 2010-04-06 Sap Ag Systems and methods for implementing a shared space in a provider-tenant environment
US20070162451A1 (en) * 2005-12-30 2007-07-12 Becker Wolfgang A Systems and methods for linking a tenant to a provider
US20070156849A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Systems and methods for delivering software upgrades in a provider-tenant environment
US20070156902A1 (en) * 2005-12-30 2007-07-05 Becker Wolfgang A Systems and methods for implementing a tenant space in a provider-tenant environment
US20070156901A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Generation and use of table links in a provider-tenant environment
US7689593B2 (en) 2005-12-30 2010-03-30 Sap Ag Systems and methods for accessing a shared space in a provider-tenant environment
US7769395B2 (en) 2006-06-20 2010-08-03 Seven Networks, Inc. Location-based operations and messaging
US8126874B2 (en) * 2006-05-09 2012-02-28 Google Inc. Systems and methods for generating statistics from search engine query logs
US7865503B2 (en) * 2006-05-15 2011-01-04 Algebraix Data Corporation Systems and methods for data storage and retrieval using virtual data sets
US7613734B2 (en) * 2006-05-15 2009-11-03 Xsprada Corporation Systems and methods for providing data sets using a store of albegraic relations
US7720806B2 (en) * 2006-05-15 2010-05-18 Algebraix Data Corporation Systems and methods for data manipulation using multiple storage formats
US7877370B2 (en) * 2006-05-15 2011-01-25 Algebraix Data Corporation Systems and methods for data storage and retrieval using algebraic relations composed from query language statements
US7769754B2 (en) * 2006-05-15 2010-08-03 Algebraix Data Corporation Systems and methods for data storage and retrieval using algebraic optimization
US7797319B2 (en) * 2006-05-15 2010-09-14 Algebraix Data Corporation Systems and methods for data model mapping
US7797310B2 (en) * 2006-10-16 2010-09-14 Oracle International Corporation Technique to estimate the cost of streaming evaluation of XPaths
US7929455B2 (en) * 2006-12-20 2011-04-19 Alcatel Lucent Bridge and method for optimization of memory for Ethernet OAM multicast frames
US20080162490A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Methods and systems for automatic registration during deployment of a tenant
US8069184B2 (en) * 2006-12-29 2011-11-29 Sap Ag Systems and methods to implement extensibility of tenant content in a provider-tenant environment
US7933869B2 (en) * 2006-12-29 2011-04-26 Sap Ag Method and system for cloning a tenant database in a multi-tenant system
US20080162536A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Systems and methods for extending shared data structures with tenant content in a provider-tenant environment
US7739348B2 (en) * 2006-12-29 2010-06-15 Sap Ag Systems and methods for accessing a shared space in a provider-tenant environment by using middleware
US20080162587A1 (en) * 2006-12-29 2008-07-03 Ulrich Auer Server synchronization for maintenance activities
US7792822B2 (en) * 2007-03-02 2010-09-07 Microsoft Corporation Systems and methods for modeling partitioned tables as logical indexes
US8027955B2 (en) * 2007-03-19 2011-09-27 Microsoft Corporation Database management using a file to accumulate changes
US8693494B2 (en) 2007-06-01 2014-04-08 Seven Networks, Inc. Polling
US8805425B2 (en) 2007-06-01 2014-08-12 Seven Networks, Inc. Integrated messaging
US9626421B2 (en) 2007-09-21 2017-04-18 Hasso-Plattner-Institut Fur Softwaresystemtechnik Gmbh ETL-less zero-redundancy system and method for reporting OLTP data
HUE042697T2 (en) * 2007-09-24 2019-07-29 Hasso Plattner Inst Fuer Digital Engineering Ggmbh ETL-less zero-redundancy system and method for reporting OLTP data
US8364181B2 (en) 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US8793305B2 (en) * 2007-12-13 2014-07-29 Seven Networks, Inc. Content delivery to a mobile device from a content service
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US20090193338A1 (en) 2008-01-28 2009-07-30 Trevor Fiatal Reducing network and battery consumption during content delivery and playback
US7908299B2 (en) * 2008-01-31 2011-03-15 Computer Associates Think, Inc. Method and apparatus for pseudo-conversion of table objects
JP2009193271A (en) * 2008-02-13 2009-08-27 Hitachi Ltd Storage system
US8787947B2 (en) 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US8364677B2 (en) * 2008-08-01 2013-01-29 International Business Machines Corporation Method and apparatus for generating partitioning keys for a range-partitioned database
US7958112B2 (en) * 2008-08-08 2011-06-07 Oracle International Corporation Interleaving query transformations for XML indexes
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US9244793B1 (en) 2008-11-04 2016-01-26 Teradata Us, Inc. Using target database system statistics in emulation
US20100153463A1 (en) * 2008-12-15 2010-06-17 Honeywell International Inc. run-time database redirection system
US20110029480A1 (en) * 2009-08-03 2011-02-03 IntelliCubes, Inc. Method of Compiling Multiple Data Sources into One Dataset
US8224828B2 (en) * 2009-12-22 2012-07-17 Sap Ag Multi-client generic persistence for extension fields
WO2011126889A2 (en) 2010-03-30 2011-10-13 Seven Networks, Inc. 3d mobile user interface with configurable workspace management
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
PL3407673T3 (en) 2010-07-26 2020-05-18 Seven Networks, Llc Mobile network traffic coordination across multiple applications
WO2012018477A2 (en) 2010-07-26 2012-02-09 Seven Networks, Inc. Distributed implementation of dynamic wireless traffic policy
WO2012018556A2 (en) 2010-07-26 2012-02-09 Ari Backholm Mobile application traffic optimization
US8805784B2 (en) * 2010-10-28 2014-08-12 Microsoft Corporation Partitioning online databases
US8818963B2 (en) 2010-10-29 2014-08-26 Microsoft Corporation Halloween protection in a multi-version database system
WO2012060997A2 (en) 2010-11-01 2012-05-10 Michael Luna Application and network-based long poll request detection and cacheability assessment therefor
EP2635973A4 (en) 2010-11-01 2014-01-15 Seven Networks Inc Caching adapted for mobile application behavior and network conditions
US8326985B2 (en) 2010-11-01 2012-12-04 Seven Networks, Inc. Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
US9060032B2 (en) 2010-11-01 2015-06-16 Seven Networks, Inc. Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic
US8190701B2 (en) 2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
WO2012060995A2 (en) 2010-11-01 2012-05-10 Michael Luna Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US9330196B2 (en) 2010-11-01 2016-05-03 Seven Networks, Llc Wireless traffic management system cache optimization using http headers
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
EP2596658B1 (en) 2010-11-22 2018-05-09 Seven Networks, LLC Aligning data transfer to optimize connections established for transmission over a wireless network
WO2012071384A2 (en) 2010-11-22 2012-05-31 Michael Luna Optimization of resource polling intervals to satisfy mobile device requests
GB2501416B (en) 2011-01-07 2018-03-21 Seven Networks Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries
GB2517815A (en) 2011-04-19 2015-03-04 Seven Networks Inc Shared resource and virtual resource management in a networked environment
US8621075B2 (en) 2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
GB2504037B (en) 2011-04-27 2014-12-24 Seven Networks Inc Mobile device which offloads requests made by a mobile application to a remote entity for conservation of mobile device and network resources
WO2013015995A1 (en) 2011-07-27 2013-01-31 Seven Networks, Inc. Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network
WO2013086225A1 (en) 2011-12-06 2013-06-13 Seven Networks, Inc. A mobile device and method to utilize the failover mechanisms for fault tolerance provided for mobile traffic management and network/device resource conservation
US8934414B2 (en) 2011-12-06 2015-01-13 Seven Networks, Inc. Cellular or WiFi mobile traffic optimization based on public or private network destination
WO2013086447A1 (en) 2011-12-07 2013-06-13 Seven Networks, Inc. Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
EP2788889A4 (en) 2011-12-07 2015-08-12 Seven Networks Inc Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
WO2013090834A1 (en) 2011-12-14 2013-06-20 Seven Networks, Inc. Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
US20130159511A1 (en) 2011-12-14 2013-06-20 Seven Networks, Inc. System and method for generating a report to a network operator by distributing aggregation of data
US8861354B2 (en) 2011-12-14 2014-10-14 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
WO2013103988A1 (en) 2012-01-05 2013-07-11 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
WO2013116856A1 (en) 2012-02-02 2013-08-08 Seven Networks, Inc. Dynamic categorization of applications for network access in a mobile network
WO2013116852A1 (en) 2012-02-03 2013-08-08 Seven Networks, Inc. User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US20130268656A1 (en) 2012-04-10 2013-10-10 Seven Networks, Inc. Intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network
US8583687B1 (en) 2012-05-15 2013-11-12 Algebraix Data Corporation Systems and methods for indirect algebraic partitioning
RU2531876C2 (en) * 2012-05-15 2014-10-27 Общество с ограниченной ответственностью "Синезис" Indexing method of video data by means of card
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US9836353B2 (en) 2012-09-12 2017-12-05 International Business Machines Corporation Reconstruction of system definitional and state information
GB2505881A (en) 2012-09-12 2014-03-19 Ibm Determining common table definitions in distributed databases
US9547672B2 (en) 2012-09-24 2017-01-17 Bmc Software, Inc. Zero-outage database reorganization
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US20140177497A1 (en) 2012-12-20 2014-06-26 Seven Networks, Inc. Management of mobile device radio state promotion and demotion
US9164793B2 (en) 2012-12-21 2015-10-20 Microsoft Technology Licensing, Llc Prioritized lock requests to reduce blocking
JP6020867B2 (en) * 2012-12-27 2016-11-02 ▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. Partition expansion method and apparatus
US9271238B2 (en) 2013-01-23 2016-02-23 Seven Networks, Llc Application or context aware fast dormancy
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US9195712B2 (en) 2013-03-12 2015-11-24 Microsoft Technology Licensing, Llc Method of converting query plans to native code
US11176111B2 (en) * 2013-03-15 2021-11-16 Nuodb, Inc. Distributed database management system with dynamically split B-tree indexes
US10740323B1 (en) 2013-03-15 2020-08-11 Nuodb, Inc. Global uniqueness checking in distributed databases
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
US10474645B2 (en) * 2014-02-24 2019-11-12 Microsoft Technology Licensing, Llc Automatically retrying transactions with split procedure execution
US9934287B1 (en) 2017-07-25 2018-04-03 Capital One Services, Llc Systems and methods for expedited large file processing
US11573940B2 (en) 2017-08-15 2023-02-07 Nuodb, Inc. Index splitting in distributed databases
US10936570B2 (en) * 2017-12-22 2021-03-02 Teradata Us, Inc. Online and dynamic table reconfiguration
CN108763296B (en) * 2018-04-18 2021-06-18 贝壳找房(北京)科技有限公司 Database structure generation method and device for online checking and editing
US11086840B2 (en) 2018-12-07 2021-08-10 Snowflake Inc. Transactional streaming of change tracking data
US11048692B2 (en) * 2019-04-02 2021-06-29 Sap Se Partition move in case of table update
CN111881210B (en) * 2020-06-29 2022-08-26 平安国际智慧城市科技股份有限公司 Data synchronization method, device, intranet server and medium
US11494356B2 (en) * 2020-09-23 2022-11-08 Salesforce.Com, Inc. Key permission distribution

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4930072A (en) * 1987-08-31 1990-05-29 At&T Bell Laboratories Method for computing transitive closure
US4853843A (en) * 1987-12-18 1989-08-01 Tektronix, Inc. System for merging virtual partitions of a distributed database
US5333303A (en) * 1991-03-28 1994-07-26 International Business Machines Corporation Method for providing data availability in a transaction-oriented system during restart after a failure
US5430869A (en) * 1991-05-29 1995-07-04 Hewlett-Packard Company System and method for restructuring a B-Tree
JP2711204B2 (en) * 1992-03-09 1998-02-10 インターナショナル・ビジネス・マシーンズ・コーポレイション How to generate a relational database user interface
US5404508A (en) * 1992-12-03 1995-04-04 Unisys Corporation Data base backup and recovery system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287183A (en) * 2019-05-23 2019-09-27 中国平安人寿保险股份有限公司 Processing method, device, computer equipment and the storage medium of database table water level
CN110287183B (en) * 2019-05-23 2024-02-02 中国平安人寿保险股份有限公司 Processing method and device for database table water level, computer equipment and storage medium
CN111897490A (en) * 2020-07-08 2020-11-06 阿里巴巴集团控股有限公司 Method and device for deleting data
US20230315708A1 (en) * 2022-03-31 2023-10-05 Unisys Corporation Updating a secondary index from an audit trail

Also Published As

Publication number Publication date
US5625815A (en) 1997-04-29
EP0723238B1 (en) 2001-09-19
EP0723238A1 (en) 1996-07-24
DE69615230T2 (en) 2002-04-18
DE69615230D1 (en) 2001-10-25

Similar Documents

Publication Publication Date Title
CA2167790A1 (en) Relational database system and method with high data availability during table data restructuring
US7272591B1 (en) Method and system for updating value correlation optimizations
JP2505040B2 (en) Data access method and data processing system for parallel access to index tree
US6370530B1 (en) Computer program product for functional compensation in a heterogeneous, distributed database environment
US6772155B1 (en) Looking data in a database system
US6581205B1 (en) Intelligent compilation of materialized view maintenance for query processing systems
US5768577A (en) Performance optimization in a heterogeneous, distributed database environment
US5396623A (en) Method for editing the contents of a DB2 table using an editproc manager
US6128610A (en) Index with entries that store the key of a row and all non-key values of the row
US7730032B2 (en) Efficient queriability of version histories in a repository
US5603024A (en) Lossless distribution of time series data in a relational data base network
US6161109A (en) Accumulating changes in a database management system by copying the data object to the image copy if the data object identifier of the data object is greater than the image identifier of the image copy
US5504879A (en) Resolution of relationship source and target in a versioned database management system
US8768977B2 (en) Data management using writeable snapshots in multi-versioned distributed B-trees
US5600832A (en) Variant domains and variant maps in a versioned database management system
US9747356B2 (en) Eager replication of uncommitted transactions
US7174331B1 (en) Locking mechanism for views associated with B-tree indexes
US8380702B2 (en) Loading an index with minimal effect on availability of applications using the corresponding table
US7480653B2 (en) System and method for selective partition locking
US7836028B1 (en) Versioned database system with multi-parent versions
US7305422B1 (en) Performing computationally intensive calculations within a database server that provides a recovery mechanism
US8301934B1 (en) Commit-time timestamping of temporal rows
EP0422877A2 (en) A method for invalidating access plans in a database system
US10459810B2 (en) Technique for higher availability in a multi-node system using replicated lock information to determine a set of data blocks for recovery
KR100243113B1 (en) Database management system

Legal Events

Date Code Title Description
FZDE Discontinued