US20140025648A1 - Method of Optimizing Data Flow Between a Software Application and a Database Server - Google Patents

Method of Optimizing Data Flow Between a Software Application and a Database Server Download PDF

Info

Publication number
US20140025648A1
US20140025648A1 US14/033,375 US201314033375A US2014025648A1 US 20140025648 A1 US20140025648 A1 US 20140025648A1 US 201314033375 A US201314033375 A US 201314033375A US 2014025648 A1 US2014025648 A1 US 2014025648A1
Authority
US
United States
Prior art keywords
request
data
database
rules
database server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/033,375
Inventor
Sean Corbett
Edward Philip Edwin Elliott
Matthew Clothier
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Data Accelerator Ltd
Original Assignee
Data Accelerator Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Data Accelerator Ltd filed Critical Data Accelerator Ltd
Priority to US14/033,375 priority Critical patent/US20140025648A1/en
Assigned to DATA ACCELERATOR LTD. reassignment DATA ACCELERATOR LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CLOTHIER, MATTHEW P., CORBETT, SEAN P., ELLIOTT, EDWARD PHILIP EDWIN
Publication of US20140025648A1 publication Critical patent/US20140025648A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06F17/30371
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • G06F16/24534Query rewriting; Transformation
    • G06F16/24547Optimisations to support specific applications; Extensibility of optimisers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • G06F16/24534Query rewriting; Transformation
    • G06F16/24539Query rewriting; Transformation using cached or materialised query results

Definitions

  • the field of the invention is methods of optimizing data flow between a software application and a database server.
  • the invention can be used in web-based applications; it allows, for example, database applications to be cloud-based, with client applications connecting to a database server over a relatively slow connection such as the public Internet.
  • a method of optimizing the interaction between an application or database and a database server comprising the steps of:
  • the method may be one in which the optimisation system enables the interaction between the application/database and the database server to be sufficiently optimised to enable a practical connection to be made over a slow or high latency link such as the Internet.
  • the optimisation system may, for example, reduce the amount of processing or operations to be performed by the server.
  • the optimisation system may also reduce the amount of data needed to pass between the client application and the database server.
  • the interaction between the application or database and the database server may include any one or more of the following: the flow of data, the cessation of the flow of data, obviating the need for data to flow, or managing the flow of data.
  • An implementation, called Data Accelerator, from Data Accelerator Limited, includes one or more of the following features:
  • the software applications may include database client applications and may be distributed to end users' PCs; the software applications may also be distributed to system integrators.
  • the database server may be cloud-based.
  • the software applications may be deployed, managed or updated to end-users using application virtualisation software.
  • a computer system including:
  • the optimisation system analyses data requests from the application or database and applies rules to the data to speed up the interaction between the application or database and the database server.
  • a fourth aspect of the invention there is provided computer readable media storing software defining an optimisation system to optimize the flow of data between an application or database and a database server, the optimisation system being operable to analyse the data and apply rules to the data to speed up the interaction between the application or database and the database server.
  • a method of optimizing the interaction between a file requestor and a file server comprising the steps of:
  • a method of optimizing the interaction between a web data requestor and a web server comprising the steps of:
  • the second main benefit is because of the extra work that goes on at the network (and/or client) level like caching, compression or string replacement, it is now possible to locate the DBMS system over a slow link, either a secured link to another site or over the internet to a cloud. Because of the nature of the environment, the DBMS system can be scaled cheaply. With the network optimization that Data Accelerator carries out, moving DBMS systems into the cloud can be made a reality for both new and legacy systems.
  • FIG. 1 shows areas impacted by changes in a software life cycle.
  • FIG. 2 shows areas impacted by changes in a software life cycle, contrasting known approaches with that possible using an implementation of the invention.
  • FIG. 3 shows new delivery models emerging and Data Accelerator's proposition.
  • FIG. 4 shows Data Accelerator's Product Offering to service the markets.
  • FIG. 5 shows how the data optimization services can interact with other services, initiators and DBMS (database management system) servers.
  • RDBMS is Relational DBMS.
  • FIG. 6 shows a response data set
  • FIG. 7 is a schematic of the approach where the rules have not been able to stop the request from being sent to the DBMS so the request is forwarded.
  • FIG. 8 shows the response is able to be served directly from the Data Accelerator optimization server and the DBMS system does not need to do anything.
  • FIG. 9 shows caching of request and response data, to return the response direct from a cache without having to run the request on the DBMS.
  • FIG. 10 shows Query Batching i.e. duplicate queries which have been requested at the same time can be stopped because the first request can be run while the duplicates are held, when the response to the first one is sent, it can be sent to all of the initiators; this Figure shows the requests being held.
  • FIG. 11 shows Query Batching i.e. duplicate queries which have been requested at the same time can be stopped because the first request can be run while the duplicates are held, when the response to the first one is sent, it can be sent to all of the initiators; this Figure shows the response being served to multiple initiators.
  • FIG. 12 shows a single Data Accelerator instance.
  • FIG. 13 shows two Data Accelerator Instances.
  • FIG. 14 shows multiple Data Accelerator instances.
  • FIG. 15 shows that Different initiators at either the same or separate locations can go through any route of Data Accelerator instances.
  • FIG. 16 shows how the Data Accelerator can change the route to the DBMS depending on where the request came from or a specific property of the request.
  • FIG. 17 shows the different points that the rules can be applied and the flow through the application. There are a number of different types of rules that can be applied at different points within the request/response stream.
  • FIG. 18 shows that the first query was run three times, the first time it ran, the next request included the query “SELECT B FROM C”, but all subsequent requests were for “SELECT D FROM E”, so the pre-caching rule on the Feb. 1, 2010 (format: day/month/year) would have added a request for “SELECT B FROM C” which would not have been used, so this would then not be selected for pre-caching again but on the Mar. 1, 2010 the same query was run again so would have been selected for pre-caching and would have had the results ready when it was requested.
  • FIG. 19 shows two DBMS systems that replicate data between themselves and the Data Accelerator sending requests to the DBMS 1 system.
  • FIG. 20 shows that if the load balancing rule determines that system 1 is under too much load and it is affecting query performance, it can switch to send requests to DBMS 2 .
  • FIG. 21 shows how there are two separate workgroups, Accounting and Marketing; they both use the same DBMS but rarely run the same queries.
  • FIG. 22 shows a number of different configurations that instances can have to connect to a DBMS.
  • FIG. 23 shows the Data Accelerator instance chain when the laptop is out of the office.
  • FIG. 24 shows how the instance, when in the office shares information and data with its peers.
  • FIG. 25 shows a Data Accelerator instance which includes a WAN link.
  • FIG. 26 shows an example of a configuration.
  • FIG. 27 shows an example of a configuration.
  • FIG. 28 shows a table of examples for use cases for Data Accelerator.
  • a problem facing current DB based apps is that they are written on the assumption that the client is on the same LAN as the DB. Because the LAN is assumed to be fast, there is no optimization of the data traffic. But many people now want to deliver their DB apps over the internet, with their DB servers somewhere in the cloud. Software as Service apps all require this, for example. But a DB app, designed for a server and client talking to each other over a high bandwidth LAN, will be very slow when working over the internet.
  • the conventional solution is to analyse the traffic between client and server and get rid of bottlenecks using bespoke coding. But that is costly.
  • One of the broad ideas in Data Accelerator is to re-direct traffic between a client and DB (e.g. SQL) server so that the traffic passes between a small app on the client and a server component that is on a LAN with the DB server.
  • the small app and the server component apply traffic optimization and traffic shaping. This should yield a generic solution that can retro-fit to any legacy DB that needs to migrate to the cloud or deliver software as a service.
  • the DB side Server Component maps out which clients are on the network and what data they each cache and can hence restrict itself to delivering just deltas to clients as needed. It can also trigger the peer to peer transfer of data between clients—many of which will be on the same fast LAN.
  • SQL or other DB
  • the Server Component dynamically learns what SQL strings are being used frequently and can then tell the client to stop using specific full strings and instead start using a compact reference. When the client adopts that compact reference, the server component can then interpret it correctly.
  • these technologies are used individually or collectively in the context of re-directing traffic between a client and DB (e.g. SQL) server so that the traffic passes between a small app on the client and a server component that can apply traffic optimization and traffic shaping.
  • DB e.g. SQL
  • the present invention is implemented in a system from Data Accelerator Limited: Data Accelerator is pioneering a new paradigm of software delivery and management that will go further than any that exist today. Data Accelerator's solution will permit businesses to purchase not just the limited selection of web 2.0 applications currently available, but to have an AppStore for any kind of business, conceivably delivering ALL of the applications needed by a business to run a business, including database applications.
  • the benefits which are explained below, are far-reaching and fundamental, going beyond the point of increased efficiencies in initial purchase and delivery. Achieving this goal, particularly if a relatively slow (e.g. under 5 MB per second) network is used, requires new ways of optimising the flow of data across the network—for example across the network that links a database client application obtained from the App Store and the database server for that application.
  • FIG. 2 contrasts the present approach to that possible with Data Accelerator's approach for each step in the lifecycle.
  • Data Accelerator's AppStore will enable any application, including even database applications, to be delivered over the Internet giving users access to their applications and their data on any Internet connection from any computer.
  • this transition provides an enormous cost reduction on their existing technology infrastructure and significantly increases the productivity of their users.
  • an SME will typically use a publically run AppStore and hosting in public cloud, whilst an enterprise will typically use an internal privately run AppStore and private cloud).
  • Data Accelerator's Product Offering to service the markets is identified in the Table.
  • Key to a business oriented AppStore is the provision of database applications.
  • database applications have required a high bandwidth (e.g. over 5 MB per second) LAN linking a powerful server with multiple client computers. That approach is however not relevant to database applications bought from an AppStore since those database applications will typically have to operate efficiently over a relatively slow connection such as the internet or wireless connectivity such as GPRS.
  • Data Accelerator Limited is developing its own proprietary technology, Data Accelerator, for accelerating and optimizing the flow of data between any application and a database server. Specifically the solution will enable practical access to a database application across a wide area network (WAN) or the Internet that is not currently possible or is prohibitively slow at present.
  • Data Accelerator is the only known product of its type. Data Accelerator may also make use of a leading technology in application virtualisation, such as Application Jukebox from Endeavors Technolgies of Irvine, Calif. Together with Data Accelerator this will create the first of its kind in a data flow optimization model that works for the cloud, capitalising on and meeting three principal global market opportunities:
  • This SME based offering will be targeted at telephone company (Telco) operators, hardware vendors, retailers and Independent Software Vendors (ISVs) to re-sell to their end users.
  • Teleco telephone company
  • ISVs Independent Software Vendors
  • streaming applications we have the added advantage of being able to deliver and store end-user data in the public or private cloud because of Data Accelerator (explained below).
  • a private application store for enterprises targeted at system integrators to resell to their customers, managed centrally from a private or public cloud.
  • Data Accelerator's solution will aid the sales process and return on investment (ROI) of a system integrator's own products or services, especially where they are managing desktops, by reducing the cost and complexity of delivering applications to enterprise users and the overheads of administering and paying for expensive server set-ups.
  • ROI return on investment
  • the ISV uses Data Accelerator however, they can run a central hosted database in the Cloud for their customers to use. This is delivered at a much lower cost to the end customer due to economies of scale and it means that the ISV only has to focus on selling the benefits of their software. Then the ISV can use an application virtualisation technology, such as Application Jukebox, to deploy their client software and updates to the customer over a WAN. This gives complete control over licensing to the ISV and it means that there is a very simple implementation process for the customer with a lower Total Cost of Ownership.
  • Bert's Glasses which supplies replacement car windsceens.
  • a significant part of their business involves gathering data on vehicles and then making that available to car traders, insurers and car repair centres.
  • the software they provide for car repair centres is called Glassbert and has a client application and a back end database that stores the car repair costing data for quoting to insurers.
  • This application is not appropriate to become a web-based application due to the need to communicate with local large files, such as photos of the repairs themselves.
  • Bert's Glasses requires each customer to install and maintain their own SQL (Structured Query Language) server at each customer office.
  • SQL Structured Query Language
  • the other area where Data Accelerator can help ISVs is if they have a web-based application. Any web-based application has a back end database and as the ISV scales up the number of users they also have to scale up the database infrastructure; this comes at a cost that can be very high.
  • Data Accelerator can be used to scale the number of users that can use a web based application without needing to increase the number of database servers. This can reduce the cost for the ISV and improve the performance of the web application for the user.
  • Section B Data Accelerator
  • Data Accelerator Optimizes Data Traffic Between an SQL Server and any Client Application.
  • the Data Accelerator data flow optimisation system will analyse the specific SQL traffic and perform various proprietary optimization techniques to reduce the amount of information sent to the SQL server and the amount of processing required of that server.
  • Data Accelerator is a totally transparent solution that can be retrofitted on any database application to improve speed of response times and overall query performance over a WAN. This significantly increases the size of the addressable market.
  • An added benefit in terms of ease of adoption is that Data Accelerator and application virtualisation software, such as Application Jukebox, can be implemented incrementally rather than a wholesale replacement of systems and methods at a huge cost, e.g. Virtual Desktop Infrastructures (VDI).
  • VDI Virtual Desktop Infrastructures
  • the main benefit to an organisation is that when a DBMS request is sent, it can be served faster and more efficiently with minimal impact or load on the actual DBMS.
  • the reason that the load on the DBMS needs to be minimised is that they are traditionally expensive systems to operate, either through licensing or the hardware that is required in order that the responses can be served quickly enough.
  • the optimisation system can include a client component running on client PCs, taking advantage of the computational power of those PCs).
  • the second main benefit is because of the improvements that Data Accelerator gives at the network level (such as caching, compression or string replacement) it is now possible to locate the DBMS system over a slow link, either a secured link to another site, a VPN or over the internet to a cloud. Because of the nature of the environment, the DBMS system can be scaled cheaply. With the network optimization that Data Accelerator achieves, moving DBMS systems into the cloud can be made a reality for both new and legacy systems.
  • the benefit will depend on the application itself but in the real world would allow a financial application that would normally takes a user 10 minutes to log into over the internet using conventional techniques to be reduced to a few seconds or allow a large enterprise to reduce their number of severs by up to 10 times. With each customer, the exact saving will be accurately demonstrable with live data feedback that can measure and quantify the saving and efficiency benefit on each application for every client in real time.
  • Server Virtualisation only reduces the number of physical hardware boxes but not the amount of computing power required, the benefits accruing through Data Accelerator will be a much greater improvement.
  • Server Virtualisation has swept the market over the last 5 years, hence the growth of VMware and Citrix, showing us the potential of the market for fast adoption.
  • the server software will be a standalone application that can be installed on either the SQL server or any other server on the same local area network (LAN) segment of the SQL Server.
  • the client side will be able to be installed as an application or as a client install on each PC, or a combination of both.
  • the client will be installable in user mode, meaning without the requirement for Administrator rights on the end PC.
  • IT departments will of course also be able to use Data Accelerator for all their corporate database applications to improve performance, extending the use of applications to home users and branch offices and reduce the costs of their server infrastructure or in fact to any employee who needs to be mobile.
  • the SQL data will be cached and we are developing techniques to automatically prefetch the subsequent SQL data that is needed for any given application query.
  • the client When responding to a query, the client will get the results from a local client's cache if available and only the differential will be sent over the WAN.
  • the key part of this method is that the SQL server and application will not be aware of the optimization taking place.
  • Data Accelerator is a totally transparent solution that can be retrofitted on any database application to improve speed of response times and overall query performance over a WAN. This of course massively increases our addressable market since it will be applicable to all historic database applications currently running It achieves this by rerouting the SQL traffic that normally flows directly between the client application and the SQL server. With Data Accelerator now the SQL traffic flows via our additional client and server application so that we can dynamically add in optimization techniques to the communication.
  • FIG. 5 shows how the data optimization services can interact with other services, initiators and DBMS servers: the optimization servers are labelled in FIG. 5 as ‘Optimization Points’.
  • the initial release will contain the framework and rules to accelerate database connection but it will have to be manually configured to a specific application.
  • the following releases will allow the acceleration (i.e. the applicable optimisation rules) to automatically adapt, improve and/or tune itself to any application.
  • Subsequent releases will also use the network effect data (the aggregated data from all customers) that is generated from the users of the application to help us further improve the acceleration.
  • Section C Application Juke Box
  • Application Jukebox streams applications or any files to a Windows desktop from a server with central control and management over the application and its license. Once the application is on the users' desktop, it is virtualized, meaning only the parts of it required to work while running the application are temporarily available and therefore there are restrictions to stop the application from conflicting with other applications on the desktop, thus preventing support issues. Also, this protects the software from piracy.
  • the product gives the good control mechanisms for the virtualised delivery of an application as well as a flexible combination of Integrated or Isolated Virtualisation capabilities. It has Digital Rights Management for preventing piracy and controlling billing and the use of the application, which in turn enables us to have innovative new revenue models and safely enter emerging markets.
  • Application Jukebox is used for delivering the binary files for applications or data while Data Accelerator is used for the transfer of structured information between an application and its database.
  • Data Accelerator is used for the transfer of structured information between an application and its database.
  • Data Accelerator is a system that intercepts requests that are being sent to a relational database, decomposing the request in order to understand the request and applying a set of rules in order to improve the performance of the request.
  • This can be applied to any Relational Database Management System (DBMS) database system. It enables, for example, legacy DBMS platforms to be migrated efficiently to cloud-based operation.
  • DBMS Relational Database Management System
  • a set of rules can be applied to optimize the request so that the initiator of the request gets the results as quickly as possible.
  • the present implementation of the invention is predicated on the fact that requests sent to a DBMS are often unnecessary duplicates, the requests often return a large amount of data that may or may not be actually used and the DBMS systems do not take into account external factors such as the performance of the network, the load on the DBMS and whether the client already has some or all the data it needs to fulfil the request.
  • an implementation of the invention can for example analyse the request and decide on a course of action that can either avoid having the DBMS re-run the query, thereby saving the time it takes to execute the query and the time it takes to transfer over the network, or it can alter the request and/or the response in order to serve the response more efficiently.
  • optimization system optimization server or optimization point.
  • These optimization systems can be implemented in hardware, software, or a combination: for example, they may be implemented in a computer running appropriate software; the computer is located between the initiator and the DBMS. Similarly, they may form part of the DBMS, for example being part of the software controlling the DBMS, or be part of the software running on the initiator's computer.
  • the existing client application running on the initiator's computers
  • the server the DBMS
  • the existing client application running on the initiator's computers
  • the server the DBMS
  • each providing optimization services may (optionally) be used at different network points between the initiator of the request and the DBMS.
  • these systems i.e. optimization systems
  • optimization services When there are other versions of the optimization services running which are not in the direct path between the initiator and the DBMS, such as separate clients on a peer-to-peer network, then they may optionally also share both request and response data as well as information to learn about the effective methods of optimizations described above. Rules can be selectively enabled or disabled based on a number of factors such as initiator and DBMS addresses, the locations, time of day, configuration or other methods such as server load.
  • FIG. 5 An example of how the optimization services can interact with other services, initiators and DBMS servers is shown in FIG. 5 : the optimization servers are labelled in FIG. 5 as ‘Optimization Points’.
  • Data Accelerator provides the interception, analysis and database traffic optimization described in the preceding sections.
  • DBMS database systems
  • the traditional approach for database systems is for the initiator of a request to send every request to a DBMS and for that system to run every single request.
  • the present implementation of the invention challenges this orthodoxy by requiring that the requests and responses have rules applied to them to limit what is actually run on the DBMS, running queries more intelligently and making better use of network bandwidth to improve performance for users of DBMS systems.
  • the example of the approach can be summarised as intelligently “intercept and analyse then respond, change or ignore” at the Data Accelerator optimization server.
  • FIG. 7 is a schematic of the approach where the rules have not been able to stop the request from being sent to the DBMS so the request is forwarded.
  • FIG. 8 shows the response is able to be served directly from the Data Accelerator optimization server and the DBMS system does not need to do anything.
  • the responsiveness of a DBMS system is affected by a number of factors such as, query compilation, load, data access (reading and writing to disks) and network response time.
  • the Data Accelerator can apply many different kinds of rules, such as any one or more of the rules in this non-exhaustive list:
  • the first example is of a national healthcare provider who without Data Accelerator would have to either host their DBMS in one location and use an expensive remote virtualization solution or have a DBMS in each branch office and replicate data around between branches which can be inefficient, prone to failure and expensive.
  • they can connect directly from each client via a local Data Accelerator instance, which applies any caching and pre-caching rules it can or compresses and encrypts all traffic connecting over the WAN to the Data Accelerator instance at the DBMS site where it is uncompressed and unencrypted and forwarded onto the DBMS.
  • the response is similarly compressed and encrypted before sending back.
  • the healthcare provider simply needs one site which keeps costs low whilst still getting the performance they need.
  • the receptionist's traffic can be prioritised by the Data Accelerator, as the data that is required is common i.e. there are a number of requests which get the patient records (e.g. names, address, date of birth etc.) the pre-caching can have a massive benefit.
  • the data e.g. names, address, date of birth etc.
  • the pre-caching can have a massive benefit.
  • the information is already available at the local cache so it can be served immediately. This shows a situation where the Data Accelerator can be used where imperfect solutions were previously used.
  • the second example is of a global insurance company which has a number of reports showing the daily claims and policy sales data which are run by various levels of management every day.
  • the hierarchy of managers who view the reports are:
  • a report consists of one DBMS request.
  • each person views their own report, their peers reports (district managers peers are those in their country and not in all countries) and also their direct subordinates.
  • the data is refreshed once overnight and without the present implementation of the invention and request caching the amount of requests the DBMS needs to cope with is:
  • a page consists of, a site header, site footer, a site tree and the page itself where each item is a separate DBMS request.
  • the Data Accelerator optimisation system can work as either the only instance between an initiator and an DBMS or as part of a chain involving two or more instances; using multiple instances allows rules to do things to the request that they could not otherwise (compress, encrypt etc.) and share diagnostics and performance information between the instances.
  • FIG. 12 shows a single Data Accelerator instance
  • FIG. 13 shows two Data Accelerator Instances
  • FIG. 14 shows multiple instances.
  • FIG. 16 shows how the Data Accelerator can change the route to the DBMS depending on where the request came from or a specific property of the request.
  • the Data Accelerators must be aware of other instances both up and down stream because some rules such as the compression rule will modify the request and it must be uncompressed before reaching the destination DBMS server otherwise the request would be invalid.
  • the Data Accelerator When the Data Accelerator sends a packet that has been modified, it wraps the contents of the packet in a specific message that the Data Accelerator will remove before forwarding to the DBMS or the initiator.
  • the Data Accelerator instances In order that the Data Accelerator instances can know what rules they are allowed to apply to a packet, it uses a number of methods to understand where it is in the chain between the initiator and DBMS.
  • One such method is for the first Data Accelerator instance in a chain to send a specially crafted DBMS request up the stream and to monitor for the response. Each instance has its own unique id.
  • the first instance creates a request such as “SELECT uniqueID”, the second adds its own id so it becomes “SELECT uniqueID, uniqueID” each instance in the chain adds its own id then when the response is received, the order of the instances unique id in the result set shows where it is in the stream.
  • Data Accelerator instances are aware of the chain and of other instances they are able to communicate between themselves within the network channel that has already been opened for the initiator. These messages allow the instances to share information about the requests and responses, such as how quickly they are being received at each point. With this information instances can dynamically determine how effective or detrimental a specific rule has been in a particular case so can choose to vary the applied rules (either not apply the rule or change the parameters to the rule or even test a different rule) to find the optimum performance enhancements. It is this dynamic learning that means Data Accelerator instances can consistently add benefit over time.
  • the Data Accelerator will extract the command that is being sent such as “SELECT A, B, C FROM XYZ” or the DBMS specific command in their own language such as Procedural Language/SQL (PL/SQL) for Oracle or Transact-SQL (T-SQL) for Microsoft SQL Server and use the command as the basis for applying the different rules that it has available.
  • the command such as “SELECT A, B, C FROM XYZ”
  • the DBMS specific command in their own language such as Procedural Language/SQL (PL/SQL) for Oracle or Transact-SQL (T-SQL) for Microsoft SQL Server and use the command as the basis for applying the different rules that it has available.
  • P/SQL Procedural Language/SQL
  • T-SQL Transact-SQL
  • FIG. 17 shows the different points that the rules can be applied and the flow through the application.
  • the rules are as follows:
  • the request is received and rules such as the caching rule can decide to allow the request or serve a response directly from cache
  • the request has been sent so rules such as the pre-caching rule can send other requests which may well be needed
  • the response is received from the DBMS; rules such as the compression rule can be applied before it is sent to a downstream Data Accelerator instance.
  • the response has been sent so the diagnostics rule can determine how good a job it did and how it could have been better.
  • the request is sent upstream.
  • the key is that the Data Accelerator provides the rules but also diagnostics and in-built learning to change the rules dynamically to react to events as they happen.
  • Section E The Optimisation Rules
  • the simple caching rule there are three parts, the actual caching of data called the “cache data rule”, the serving of cached data called the “cache serve rule” and the diagnostics component “cache diagnostics and management”.
  • the cache data rule runs after the response has been sent back to the initiator because, at this point the Data Accelerator has seen the request that was sent and the response that was returned, it has everything it needs to cache the data.
  • cache There are a number of different types of cache that can be used, these include an in-process and out-of-process or separate machine cache and on permanent storage such as a hard disk.
  • the cache is effectively a hash table lookup with the key being either the SQL command from the request or a hash of that SQL command. Depending on the type of cache, it will either store a pointer to the first response packet or it will store the actual packets as an array.
  • the rule Before a response can be added to the cache, the rule must determine whether a request is actually cacheable. There are a number of factors which affect whether or not something is cacheable, there are certain types of SQL command which are inherently non-cacheable, for example an UPDATE or INSERT request, if this was cached and not forwarded onto the DBMS it could cause data corruption which is not acceptable. Other commands need to be looked at in the context that they are being used, for example an DBMS will have a command to retrieve the current date and time. If a request is sent to get all records in the future, depending on when the query was next run and if any records were added or deleted, it may or may not have a different set of results. If it is determined that the request can be cached, it is stored in the actual cache. If it cannot be cached, then we still store the request so further requests don't have to be verified.
  • SQL command which are inherently non-cacheable
  • UPDATE or INSERT request if this was cached and not forwarded
  • the cache serve rule can be applied to requests as they arrive but before they are sent onto the DBMS, if the request is in the cache, it is verified to ensure that it is still valid, for example there have not been rows added to, deleted from or modified in the cached response. The users' permissions are then verified to ensure that they have the correct level of security to access the response and if they are allowed access then the response is returned.
  • the cache diagnostics and management rule's role is to verify how well the cache has worked for a specific request, to manage the cache size by expiring unused or not often used requests as well as expiring items which are no longer valid. To work out how effective a cached response was, it compares the total time it took the DBMS to return the response and compare it to how long it took to verify that it was still valid, check security and return the cached response—if the request is such that it is small and responds almost instantly then it may not be worth caching. If the diagnostics determine that caching the request is not adding a benefit, it will still monitor later requests to see if at any time it does become worth caching.
  • the rule can either decide to just evict the item from the cache or it can re-run the query so it has the latest response available in cache.
  • the next rule is the intelligent cache rule; this is similar to the simple cache rule in that it has three components and in fact can share a cache with the simple caching. In some situations the simple caching is not as effective as it could be. For example if the response to a request changes, the entire response is discarded. With the intelligent rule, it can assess how much of the response has changed and if it is under a certain percentage, which is determined by the diagnostics component, the cached response will be modified so that it is up to date.
  • the intelligent caching rule can just request the portions of packets that have been changed from the upstream instance that is close to the DBMS so that the minimal amount of data is sent over the network to the local instance, which then merges the changes and then returns the cached response as required.
  • the cache data rule works in exactly the same way as the basic caching rule, in that it determines the cacheability and stores it in a hash table.
  • the cache serve rule and the diagnostic rules need a much more complex method to determine if the results can be merged or simply discarded.
  • the rules will decide on whether to do a merge based on factors including the size of the response in that a small response may be quicker to get direct from the DBMS. It also takes into consideration how much of the data has changed. It does this by getting an upstream Data Accelerator instance to physically re-run the request. Once the upstream instance gets the response, it can analyse each packet in turn to see if it has changed at all and if it has what percentage of the packet is different. Once the rule knows how much of the data has changed, it can determine what to do and how complicated it is.
  • compression relies on there being a chain of Data Accelerator instances between the initiator and DBMS, at the very least there needs to be two instances, one to compress and one to decompress the packets. Either the request or the response can be compressed but typically requests are small enough that compression is usually ignored.
  • the compression piece is made up of three rules, the “compress rule”, “decompress rule” and the “compression diagnostics”.
  • the diagnostics component analyses network bandwidth within the chain of Data Accelerator instances to discover what speed each of the up and down stream networks are running so a score based on the performance can be used. Over time the performance will be verified to ensure if anything changes, or if there is a particularly busy period on a portion of the network, it is taken into consideration. The diagnostics component also checks to see how long it takes to compress/decompress packets and compares that to the time it takes to send over the network to find the best ratio of packet size/compression size over CPU cost to decide what to compress and what to ignore.
  • the compression rule will use both the network performance and the CPU compression cost ratios to determine whether a specific request or response should be compressed. If it is to be compressed it takes the packet(s), compresses and wraps the compressed data in a Data Accelerator compression envelope which can then be forwarded. The wrapper which contains the data is then sent either up or down stream depending on whether or not it was a request or response which was compressed.
  • the decompression rule examines each request and response to determine if they are compressed or not. If they are compressed, the rule will determine whether the link contains a Data Accelerator instance. If there is no instance that exists then the data is always uncompressed. If an instance does exist then the data is still uncompressed but only so that rules like the caching rule can be applied at each level; in this case the uncompressed data is not forwarded.
  • the next rule is the pre-caching rule. This is made up of one component, which intercepts requests after they have been forwarded upstream or to the DBMS.
  • the rule is based around a map of requests that have previously been run through the instance. Each request that has been run links to the next request that was sent, if that same series of links had been made before then the pre-caching rule can run the next set of queries.
  • pre-caching uses for selecting or removing requests from pre-caching is based on how many times a sequence of queries has been run as well as how expensive to run a request is. If a series of requests complete very quickly then it may well be worth pre-caching those even if they are not always used. Conversely if a request takes a long time to complete then it might not be worth running it just in case it is used.
  • the next rule is the query batching rule which will stop duplicate queries running at the same time.
  • This rule runs after the request has been received and before it has been sent to the upstream instance or DBMS.
  • the rule has a list of currently executing requests and if the current request is already being run then it is held.
  • the rule waits on the response from the request that is already executing and puts the new request on hold, adding it to a list of waiting requests. When the response returns, the rule copies the response to each waiting request.
  • the query batching rule needs to employ the same definition of cacheability that the caching rules use to decide whether or not something is cacheable because some things like INSERT or UPDATE queries need to be run on the server whether or not they are duplicates.
  • the string replacement rule works by replacing common strings with specific id's which allows the rule to minimise the amount of data that is sent over the network. For example if a company name appears in a number of queries then depending on the length of the company name it can save quite a lot of network traffic by replacing “Company Name Corporation” with “:1:” or some similar identifier. This can work with either the request or the response and relies on there being more than one Data Accelerator instance in the chain: one to replace the strings and one to restore them.
  • a packet contains string replacements then it is wrapped in a replacement envelope.
  • an instance receives a packet for forwarding, if there is an appropriate up or downstream Data Accelerator instance, it will replace the strings so it can apply any other rules on the instance but forward the original message. If however the upstream is the DBMS or the downstream is the initiator then the strings are put back into the message and forwarded on.
  • the re-routing rule monitors the load of a DBMS and chooses to run the query on the least used DBMS system.
  • the re-routing rule requires some configuration and some specific requirements of the DBMS.
  • the rule must have the details of the DBMS systems that can handle specific requests and the databases themselves must be able to handle requests no matter where the request ends up. Examples of these are read only databases or where transactions are copied to each database.
  • FIG. 19 shows two DBMS systems that replicate data between themselves and the Data Accelerator sending requests to the DBMS 1 system. If the load balancing rule determines that system 1 is under too much load and it is affecting query performance, it can switch to send requests to DBMS 2 as shown in FIG. 20 .
  • This rule needs to be configured with multiple upstream Data Accelerator instances which can be connected via separate network routes. It has two components, the diagnostics rule and the redirector rule.
  • the diagnostics rule constantly checks the performance of both up and downstream routes to score each one based on performance.
  • the redirector works by intercepting requests before they are sent upstream and sends them via the fastest route at that time. It works with responses by intercepting them before they are sent back downstream in the same way.
  • This rule works by taking the request that was sent and modifying it to send a request that only asks for the minimum amount of data that is actually required.
  • This rule does require that it is configured with a list of SQL commands it can modify. When a request arrives, it is checked against a list of SQL commands which can be modified, if it can be changed it swaps the portion of the SQL command that can be changed with the replacement query and then the response is rebuilt and then forwarded on. This rule does not apply to responses.
  • An example of a query that can be modified is a search screen that only shows a small number of records at a particular time and for each page re-runs the query which selects all records in the system.
  • the query “SELECT * FROM B” could be modified to “SELECT TOP 10* FROM B”, the benefit of this rule depends on the actual queries and how the initiators are using the results.
  • the pre-validation rule takes the request, retrieves the SQL command and runs it through a series of checks to ensure that the request can actually be completed. If it finds that it cannot be completed then it returns the DBMS specific error message/code. The rule runs after the request has been received and before it is forwarded onto the upstream DBMS.
  • the checks it can carry out include a syntax check on the command to validate that the DBMS will actually accept the request. It can check that the request includes an actual command and is not just a comment, i.e. in a typical DBMS system “/* SELECT * FROM A*/” will not return a result as the command is commented out. It can also verify that the user has the permissions to run the query which will always result in a failure.
  • the main benefit of this rule is that commands which are not valid do not need to travel over the network or to the DBMS for it to fail it outright.
  • the encryption rule requires that there be at least two Data Accelerator instances in the chain and typically the rule encrypts the traffic, both the request and the response when sending the data over an unsecured network like the internet.
  • the encrypt rule When the request is received but before it is sent upstream towards the DBMS, the last thing that happens is that the data is encrypted if the link requires it.
  • the encrypted data is wrapped in an encryption envelope and as the encryption is the last rule to run, the data may or may not be compressed or otherwise changed by an earlier rule. As each instance receives the request, if it is encrypted it decrypts it so the other rules can be applied.
  • the link When it forwards the message, depending on whether or not the link is secure it either re-encrypts and sends the encryption envelope or simply forwards the unencrypted data.
  • the type and level of encryption that can be used on a link are configurable and can be different depending on which link is used, for example on one link the rule could use Secure Hash Algorithm SHA-2 over Transport Layer Security TLS 2.0 but on another link use MD-5 (Message-Digest algorithm 5) over Secure Sockets Layer SSL 1.
  • the custom rules item is configured with a list of queries or events such as DBMS load balancing or network path re-routing and then a list of actions such as writing to a log file or sending a separate request to the DBMS.
  • the DAInstance4AA5888240B4448e9E20-62A8F70CF595 is the unique id of the Data Accelerator Instance, when the response comes back, it will include the time the request was started and the time on the server, and this gives an indication of how long it took to get a response from the network.
  • each instance adds its own uniqueID and time so the request actually ends up as “SELECT ‘1 January 2010 09:43:22.02’ As DAInstance4AA5888240B4448e9E20-62A8F70CF595, ‘1 January 2010 09:43:22.04’ As DAInstance936C4368DE18405881707A22FDBCFE59, ‘1 January 2010 09:43:23.09’ As DAInstance8F4AEA5AE4D544cd9B56DF16F7563913, current_date As ServerTime” The response from this will be a data set such as is shown in FIG. 6 .
  • Each instance can then instantly see where it is in the chain and also that the speed of the link between the 2nd and 3rd instances is a slow link so they can make better decisions based on this knowledge.
  • the first instance receives a request such as this, it then knows there is a downstream Data Accelerator instance and instead of re-running the query, after combining the request it received with the results it already has it can simply share the updated results with both the initiator and the upstream servers.
  • the second method of communication is where an instance knows that another instance exists and wants to either find out what it knows or wants to pass on some information, it creates a connection using the DBMS network method but instead of the network packet that the DBMS expects, it sends a Data Accelerator control packet.
  • the control packet instructs the instance, not to forward packets up or down stream but to pass the packet onto the specified rule.
  • the rules are given the information in the control packet and it acts on that as required. If we take a look at this in detail with an example of the caching rule, FIG. 21 shows how there are two separate workgroups, Accounting and Marketing, they both use the same DBMS but rarely run the same queries. Each department has their own Data Accelerator instance which connects directly to the DBMS.
  • the instances cannot communicate by sending requests up the chain. Instead they create a connection using the standard DBMS method and use this to send control packets.
  • the caching rule as well as checking its own cache can ask the Accounting instance if it has the query cached, if it does it can serve it without having to send the request to the DBMS.
  • FIG. 22 shows a number of different configurations that instances can have to connect to a DBMS. If each of the initiators runs the same query, initiator A runs it for the first time so DA1 and DA2 both store it in their caches. Then initiator B sends the request. It has a local instance of Data Accelerator and that doesn't contain the response in cache and because of the network configuration it cannot talk to DA1. The request is forwarded to DA4. DA4 has a network link to DA2 and DA7 so it sends a control packet to both instances to see if they have the request.
  • DA1 returns the response and DA4 then carries out the standard checks (is it allowed and has it expired). If the response is acceptable then it is returned to DA3 which sends it back to the initiator after caching the request itself. The initiator C then sends the request. Again DA6 does not have a copy so it forwards it to DA7, and DA7 does not have a copy but does have a link to DA4 which it knows has previously requested the query so it asks DA4 for the response. DA4 returns the response from its own cache. DA7 verifies and sends back to DA6 which caches the result and returns it to the initiator. At this point if initiator C resends the request it is served immediately from DA6.
  • the initiator D then sends the request.
  • DA8 does not have it in cache and has no peers it can connect to so forwards it on to DA5.
  • This instance also does not have it in cache, but it does have a downstream instance that has the response but the link downstream is a slow WAN link so it needs to make a decision as to whether to send the request back down the link to DA4 or to send it to the DBMS. This decision is based on how long the query took to run on the server, how much data is in the response and how slow the WAN link is between DA4 and DA5.
  • FIG. 23 shows the Data Accelerator instance chain when the laptop is out of the office and FIG. 24 shows how the instance, when in the office shares information and data with its peers.
  • the links that the Data Accelerator can work over can be local connections so the instance runs on the initiators computer as a windows service, a UNIX daemon or whatever type of process is best for the underlying operating system. It can run over LAN links which are typically fast or it can run over slower WAN links (eg. in FIG. 25 ) or links over public networks in cloud based systems. When running over unsecure networks the Data Accelerator can use encryption to secure both the requests and response data.
  • Data Accelerator can use the techniques described to help reduce the amount of queries that a database server has to make in order to produce the required results. This could be by serving the entire request from Cache or by requesting only portions of the information that has changed. Also clients can get the cached results from other clients using peer to peer.
  • An example of this may be a huge multi-terabyte database containing information from a supermarket's store card usage.
  • a team or internal staff are mining data from the database in order to track trends of customers or products, they may need to repeat many of the same queries but each time with some additional or different information required.
  • there is a significant amount of time required for each query and these apply significant load to the database server. This could mean that if a report is made up of 100 queries that each take around seconds to complete, without Data Accelerator the time to run a report or mine the required data is 50 minutes. But if the first 80 queries are cacheable and take sub-second to respond through data accelerator, the queries complete in 11 minutes and 20 seconds.
  • Data Accelerator can reduce the load on a database server.
  • An organisation has a large database with a record of new and historical customer purchases. Each week the managers within the organisation run a report of the purchases made and compare that to historical data. Normally the database server would have to return all of the data required for the reports.
  • Data Accelerator when a user runs the report they can access all the historical data from cached queries that have been run before, and the database server is only accessed to run a small query for the current week's data.
  • Data Accelerator can be used to reduce the need for existing data or portions of data to be requested from the database server. This can result in a significant reduction in the load on a database server as the only queries that are run on the database are for data that has been added or changed since the last replication or backup.
  • the second main use for Data Accelerator is to help reduce the load on the connection from the client application to the database servers. This is achieved by using the various techniques described for each connection that the client makes to the database server, and eliminating the need for the connection where possible. By being able to improve the performance of the connection between the client and the database server it is possible to move the database server from a local network connection onto a slower WAN connection. This could mean that the database server is moved into a public datacentre or public cloud environment or for an enterprise it may mean that the database server is able to be centralised into a private datacentre or private cloud environment. For either a public or private datacentre or cloud Data Accelerator will deliver improved performance and lower costs for all types of connection speeds.
  • FIG. 28 shows a matrix of various scenarios; an example for each scenario is given below.
  • Example 1a (see FIG. 28 )
  • a university may have its application that tracks students' submissions of work and results currently running with a database server on each campus and the use of a Remote Desktop connection for students to log in from remote locations.
  • the application without Data Accelerator is too slow to work without a high speed local network connection between the client application and the database server.
  • the current infrastructure is very expensive to run and the experience for end users who connect remotely is very poor.
  • Data Accelerator the database can be moved into a public cloud that provides low cost infrastructure and the campus locations and remote users or students can access the data using the client application on their local machine.
  • streaming can be used from a web page deployment.
  • a typical use is for a tutor to download a students essay, which is stored in a binary format inside the database, so it can be marked. When the tutor is at home and using a dsl connection, it can take the tutor up to 5 minutes per essay but with the data accelerator using the rules to optimize the traffic, the same request can take as little as 25 seconds.
  • Car repair garages require software to accurately estimate the cost of repairing damage to a vehicle and this price must be in correlation with amount the insurance companies are prepared to pay for such a repair.
  • an industry database with all part costs and labour estimates.
  • each car repair workshop has to install a database server as the application is too slow when running over a WAN connection. For example to open a contact and an estimate takes 44 seconds on a local network and 1 minute 53 seconds on a WAN connection.
  • the problem with having a database server in each car repair workshop is that it is costly to install and maintain and also it is complex to update the database each month with the latest database.
  • Data Accelerator the database can be moved into a public cloud environment but the performance of the application can be nearly the same as with a local server. The example above would only take 49 seconds over a standard ADSL connection with Data Accelerator.
  • An example of this would be a healthcare application for recording doctors practise records about patient visits, appointments and bills.
  • This application would currently require a server to be installed in each physical location. For a large hospital group this could mean a large number of servers on large hospital sites, servers in each practise which may include some rural locations, and many other ancillary buildings.
  • the cost of deploying and managing this large number of database servers would be very significant. Even if each building were connected using a high speed leased line, the problems caused by latency and general lack of bandwidth are enough to make the application unusable without a local database server. With Data Accelerator it is possible to remove all database servers and to maybe even downgrade some connections, then having a single database server or a server farm located in a private cloud environment. This would result is a significant reduction in costs.
  • An example of an application with a connection using a standard DSL line to a private cloud would be a Vetinary Clinic that has multiple branches with the animal database located at the head office. The Clinic is connected to head office over an ADSL line that has a maximum speed of 2.9 Mega Bits per second.
  • the request to get animal history screen consists or 4 requests, 3 cacheable, 1 not. Without compression and caching it takes 2 minutes to open the history screen. With caching and compressions, after the details have been loaded once it only takes 5 seconds; the first time without caching but with compression takes 1 minute.
  • any of these examples would be even more affected by the connection performance when used on a mobile internet connection (3G, GPRS etc.)
  • Using Data Accelerator would also mean the mobile users would be able to access the application. This could be on either a laptop with a data card or even on a version of the application that runs on a smart phone or mobile phone device.
  • An additional benefit of Data Accelerator is that for connections that have any kind or packet loss or unreliability, especially mobile internet connections that are affected by network coverage, the connection is automatically re-established and the application can carry on working once the connection is working again. Normally many applications will crash or end if the connection is dropped even for a short time. By having Data Accelerator intercepting the connection it can prevent the application from being aware of the connection problem.
  • the process of intercepting DBMS requests, decomposing the request and applying a set of rules to improve the performance can also be applied to other systems outside of DBMS specific requests.
  • Two other types of system include opening files over a network and web or HTTP requests.
  • the performance of opening files stored on a remote file server (which is anything that can store files) across a slow network is often poor and the difference between that and of opening files when they are local to the requestor is very noticeable.
  • the data accelerator can decompose the requests for files from a file requestor (anything that can request a file—and hence includes end-users, applications, databases etc.) and pass the request to the rules engine which can apply any rules that are appropriate to improve the responsiveness of the client application. For example when a client requests a list of all the files in a directory on a remote share that is located over a slow or unsecure link the Data Accelerator can apply the following rules:
  • a real world example of this would be a human resources (hr) department in a global blue chip company: the hr officers will store both general forms and also documents that relate to specific employees which vary in size and are confidential such as appraisal documents and details of behavioural and misconduct cases against employees. The hr officers will be based in remote offices and often travel to other offices and require fast access to the documents. Using the Data Accelerator means that the documents can be stored in one secure location and the users can access documents quickly and securely over remote links.
  • Web requests can also apply the same set of rules that file requests can use because many webs requests contain static data which do not change such as images, documents and code files like html or css files.
  • Traditional web caching services work by determining whether or not a resource has changed since it was last requested by using the If-Modified-Since HTTP header, whereas the Data Accelerator can be more forceful in applying more complex rules for example with a standard HTTP Get request that returns a html page, some images and some links:
  • An example of where a company that might employ the data accelerator to optimize web requests could be a publisher who keeps an electronic copy of their books in html format. Users who are remote can read the books but without the Data Accelerator there is often a delay for the next page and for images in the book.
  • the Data Accelerator can use the pre-caching rule to automatically start downloading the next page or chapter so that it is immediately available as well as downloading the images required.
  • the full suite of rules can also be applied so the request and response is compressed and encrypted so it can be carried over public networks.
  • a computer system including:
  • the optimisation system analyses data requests from the application or database and applies rules to the data to speed up the interaction between the application or database and the database server.
  • Computer readable media storing software defining an optimisation system to optimize the flow of data between an application or database and a database server, the optimisation system being operable to analyse the data and apply rules to the data to speed up the interaction between the application or database and die database server.

Abstract

A method may include receiving a request for a resource on a database server, the request being from a request initiator coupled to a network. Redundant data in the request is identified based on the data optimization rules, where the redundant data is unnecessary for the database server to satisfy the request for the resource. The redundant data is removed from the request based on the data optimization rules to create an optimized request. The optimized request is provided, using the network to the database server.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 12/862,962, filed Aug. 25, 2010, which claims priority to Great Britain Application Nos. GB 1002961.9, filed Feb. 22, 2010; GB 1004449.3, filed Mar. 17, 2010; and GB 1011179.7, filed Jul. 2, 2010, all of which are incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The field of the invention is methods of optimizing data flow between a software application and a database server. The invention can be used in web-based applications; it allows, for example, database applications to be cloud-based, with client applications connecting to a database server over a relatively slow connection such as the public Internet.
  • 2. Technical Background
  • In the early 1980's software was mostly delivered as ‘pre-installed’ on hardware or as ‘Boxed’ software to be installed from floppy disks. Slow evolution of the market saw a steady migration of delivery to CD Rom as software increased in size and complexity to a point at the beginning of the millennium whereby most software could now be delivered by download over the Internet at point of purchase. Over the last eight years further developments in adjacent technologies have heralded the arrival of mobile phone application stores (AppStores) which not only successfully gave consumers new ways to purchase applications (e.g. ‘try and buy’) but also educated the wider market in general about different ways of buying, storing and managing applications as diverse as games and applications for business.
  • 3. Discussion of Related Art
  • Over the last 3 years especially, new developments have seen a trend whereby providers of businesses services (Hosters, Telcos etc.) are offering web 2.0 application stores to their existing small and medium enterprises (SME) customers. This is a natural progression as they have moved from core competences, such as hosting, to managing email and desktop services on behalf of their clients.
  • SUMMARY OF THE INVENTION
  • According to a first aspect of the invention, there is provided a method of optimizing the interaction between an application or database and a database server, comprising the steps of:
      • a. routing data between the application or database and the database server through an optimisation system;
      • b. the optimisation system analysing the data and applying rules to the data to speed up the interaction between the application or database and the database server.
  • The method may be one in which the optimisation system enables the interaction between the application/database and the database server to be sufficiently optimised to enable a practical connection to be made over a slow or high latency link such as the Internet. The optimisation system may, for example, reduce the amount of processing or operations to be performed by the server. The optimisation system may also reduce the amount of data needed to pass between the client application and the database server. The interaction between the application or database and the database server may include any one or more of the following: the flow of data, the cessation of the flow of data, obviating the need for data to flow, or managing the flow of data.
  • An implementation, called Data Accelerator, from Data Accelerator Limited, includes one or more of the following features:
      • the database server is cloud-based, or on a local network, or on a WAN or if the DB server is local to the application.
      • the application or database is deployed, managed or updated to end-users using application virtualisation software.
      • allows the number of database servers, or the load on the or each database server required, to be reduced.
      • allows the load on the or each database server to be balanced or redirected in cases of fail-over.
      • the optimisation system is added to an existing database client application or database server, and the structure of the tables and/or files of the database running on the database server, are each substantially unchanged by the optimisation system.
      • the optimisation system is not an integral part of the client application or the database server or bespoke coding to the client application or the database server.
      • the optimisation system changes either the application/database or the database server, but not both.
      • the optimisation system is implemented in software and includes a client application or a server application.
      • the optimisation system is implemented in software and includes a client application and a server application.
      • the optimisation system is implemented in hardware.
      • the optimisation system is located between the application/database and the database server.
      • the optimisation system is located on the application/database and/or the database server.
      • the optimisation system includes multiple instances of individual optimisation systems that each provides optimisation services.
      • the multiple instances include a chain or mesh of peers.
      • the path through the multiple instances of individual optimisation systems is variable.
      • the multiple instances of individual optimisation systems are able to communicate amongst themselves.
      • the multiple instances of individual optimisation systems share diagnostics and performance information.
      • the multiple instances of individual optimisation systems each understand where they are in the chain or mesh of peers between initiator and the server.
      • the optimisation system can dynamically determine how effective or detrimental a specific rule is and can choose to vary the applied rules to find the optimum performance enhancement.
      • the server is a SQL server.
      • the data includes DBMS (Database Management System) requests and responses.
      • the optimisation system reduces the number of DBMS requests and/or responses.
      • the rules are accessed through a rules engine.
      • the rules engine decides when and how to apply rules.
      • the rules define caching of queries.
      • the rules define how to obtain diagnostic, performance, cached data, cachability information.
      • the rules define how to configure other rules.
      • the rules define peer to peer caching of queries.
      • the rules define compression.
      • the rules define encryption.
      • the rules define predictive pre-fetching.
      • the rules define string replacement.
      • the rules define query batching.
      • the rules define re-routing to specific database servers for load balancing or fail-over.
      • the rules define request modification.
      • the rules pre-validate requests.
      • the rules define auditing and logging.
      • the rules automatically tune, adapt or improve.
      • the rules can be selectively enabled or disabled based on factors such as initiator and server addresses or locations, time of day, configuration, server load.
      • the rules are applied at different points in the request/response stream.
      • the rules are custom rules.
  • According to a second aspect of the invention, there is provided a method of distributing software applications, comprising the steps of:
      • a. providing multiple software applications accessible in an application store;
      • b. routing data between one or more of the software applications and a database server, via a WAN such as the Internet, and through a data optimisation system that applies rules to speed up the interaction between the or each software application and the database server.
  • In this second aspect, the software applications may include database client applications and may be distributed to end users' PCs; the software applications may also be distributed to system integrators.
  • The database server may be cloud-based. The software applications may be deployed, managed or updated to end-users using application virtualisation software.
  • According to a third aspect of the invention, there is provided a computer system including:
      • a. a remotely accessible database server
      • b. an application or database connected over a network to the database server, and
      • c. an optimisation system
  • in which the optimisation system analyses data requests from the application or database and applies rules to the data to speed up the interaction between the application or database and the database server.
  • According to a fourth aspect of the invention, there is provided computer readable media storing software defining an optimisation system to optimize the flow of data between an application or database and a database server, the optimisation system being operable to analyse the data and apply rules to the data to speed up the interaction between the application or database and the database server.
  • According to a fifth aspect of the invention, there is provided a method of optimizing the interaction between a file requestor and a file server, comprising the steps of:
      • a. routing data between the file requestor and the file server through an optimisation system;
      • b. the optimisation system analysing the data and applying rules to the data to speed up the interaction between the file requestor and the file server.
  • According to a sixth aspect of the invention, there is provided a method of optimizing the interaction between a web data requestor and a web server, comprising the steps of:
      • a. routing data between the web data requestor and the web server through an optimisation system;
      • b. the optimisation system analysing the data and applying rules to the data to speed up the interaction between the web data requestor and the web server.
    Benefits of the Data Accelerator Implementation Reduced Number of DBMS Servers for an Enterprise
  • The main benefit to an organisation is that when a DBMS request is sent, it can be served faster and more efficiently with as minimal impact or load on the actual DBMS as possible. The reason that the load on the DBMS needs to be minimised is that they are traditionally expensive systems to operate, either through licensing or the hardware that is required in order that the responses can be served quickly enough. By minimising load, Data Accelerator can lead to a significant reduction in the number of DBMS servers that an organization needs to run and can therefore lead to a significant reduction in both costs and the environmental impact of running those servers.
  • Data Base in the Cloud or Database as a Service
  • The second main benefit is because of the extra work that goes on at the network (and/or client) level like caching, compression or string replacement, it is now possible to locate the DBMS system over a slow link, either a secured link to another site or over the internet to a cloud. Because of the nature of the environment, the DBMS system can be scaled cheaply. With the network optimization that Data Accelerator carries out, moving DBMS systems into the cloud can be made a reality for both new and legacy systems.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows areas impacted by changes in a software life cycle.
  • FIG. 2 shows areas impacted by changes in a software life cycle, contrasting known approaches with that possible using an implementation of the invention.
  • FIG. 3 shows new delivery models emerging and Data Accelerator's proposition.
  • FIG. 4 shows Data Accelerator's Product Offering to service the markets.
  • FIG. 5 shows how the data optimization services can interact with other services, initiators and DBMS (database management system) servers. RDBMS is Relational DBMS.
  • FIG. 6 shows a response data set.
  • FIG. 7 is a schematic of the approach where the rules have not been able to stop the request from being sent to the DBMS so the request is forwarded.
  • FIG. 8 shows the response is able to be served directly from the Data Accelerator optimization server and the DBMS system does not need to do anything.
  • FIG. 9 shows caching of request and response data, to return the response direct from a cache without having to run the request on the DBMS.
  • FIG. 10 shows Query Batching i.e. duplicate queries which have been requested at the same time can be stopped because the first request can be run while the duplicates are held, when the response to the first one is sent, it can be sent to all of the initiators; this Figure shows the requests being held.
  • FIG. 11 shows Query Batching i.e. duplicate queries which have been requested at the same time can be stopped because the first request can be run while the duplicates are held, when the response to the first one is sent, it can be sent to all of the initiators; this Figure shows the response being served to multiple initiators.
  • FIG. 12 shows a single Data Accelerator instance.
  • FIG. 13 shows two Data Accelerator Instances.
  • FIG. 14 shows multiple Data Accelerator instances.
  • FIG. 15 shows that Different initiators at either the same or separate locations can go through any route of Data Accelerator instances.
  • FIG. 16 shows how the Data Accelerator can change the route to the DBMS depending on where the request came from or a specific property of the request.
  • FIG. 17 shows the different points that the rules can be applied and the flow through the application. There are a number of different types of rules that can be applied at different points within the request/response stream.
  • FIG. 18 shows that the first query was run three times, the first time it ran, the next request included the query “SELECT B FROM C”, but all subsequent requests were for “SELECT D FROM E”, so the pre-caching rule on the Feb. 1, 2010 (format: day/month/year) would have added a request for “SELECT B FROM C” which would not have been used, so this would then not be selected for pre-caching again but on the Mar. 1, 2010 the same query was run again so would have been selected for pre-caching and would have had the results ready when it was requested.
  • FIG. 19 shows two DBMS systems that replicate data between themselves and the Data Accelerator sending requests to the DBMS 1 system.
  • FIG. 20 shows that if the load balancing rule determines that system 1 is under too much load and it is affecting query performance, it can switch to send requests to DBMS 2.
  • FIG. 21 shows how there are two separate workgroups, Accounting and Marketing; they both use the same DBMS but rarely run the same queries.
  • FIG. 22 shows a number of different configurations that instances can have to connect to a DBMS.
  • FIG. 23 shows the Data Accelerator instance chain when the laptop is out of the office.
  • FIG. 24 shows how the instance, when in the office shares information and data with its peers.
  • FIG. 25 shows a Data Accelerator instance which includes a WAN link.
  • FIG. 26 shows an example of a configuration.
  • FIG. 27 shows an example of a configuration.
  • FIG. 28 shows a table of examples for use cases for Data Accelerator.
  • DETAILED DESCRIPTION Section A: Overview
  • A problem facing current DB based apps is that they are written on the assumption that the client is on the same LAN as the DB. Because the LAN is assumed to be fast, there is no optimization of the data traffic. But many people now want to deliver their DB apps over the internet, with their DB servers somewhere in the cloud. Software as Service apps all require this, for example. But a DB app, designed for a server and client talking to each other over a high bandwidth LAN, will be very slow when working over the internet.
  • The conventional solution is to analyse the traffic between client and server and get rid of bottlenecks using bespoke coding. But that is costly.
  • One of the broad ideas in Data Accelerator is to re-direct traffic between a client and DB (e.g. SQL) server so that the traffic passes between a small app on the client and a server component that is on a LAN with the DB server. The small app and the server component apply traffic optimization and traffic shaping. This should yield a generic solution that can retro-fit to any legacy DB that needs to migrate to the cloud or deliver software as a service.
  • Four core technologies are used by the small app on the client and a server component:
  • 1. Compression and encryption
  • 2. Caching data on each client, with peer to peer transfer of cached data between clients.
  • The DB side Server Component maps out which clients are on the network and what data they each cache and can hence restrict itself to delivering just deltas to clients as needed. It can also trigger the peer to peer transfer of data between clients—many of which will be on the same fast LAN.
  • 3. Predictive pre-caching in which the Server Component understands the likely flow of client side interactions and can hence predict what data the client is likely to request and can then send it in advance to the client side cache. This is an adaptive process, learning incrementally, for each application, the likely interaction flow by monitoring actual useage.
  • 4. SQL (or other DB) string replacement by indexing lengthy strings with compact references. The Server Component dynamically learns what SQL strings are being used frequently and can then tell the client to stop using specific full strings and instead start using a compact reference. When the client adopts that compact reference, the server component can then interpret it correctly.
  • Here these technologies are used individually or collectively in the context of re-directing traffic between a client and DB (e.g. SQL) server so that the traffic passes between a small app on the client and a server component that can apply traffic optimization and traffic shaping.
  • The present invention is implemented in a system from Data Accelerator Limited: Data Accelerator is pioneering a new paradigm of software delivery and management that will go further than any that exist today. Data Accelerator's solution will permit businesses to purchase not just the limited selection of web 2.0 applications currently available, but to have an AppStore for any kind of business, conceivably delivering ALL of the applications needed by a business to run a business, including database applications. The benefits, which are explained below, are far-reaching and fundamental, going beyond the point of increased efficiencies in initial purchase and delivery. Achieving this goal, particularly if a relatively slow (e.g. under 5 MB per second) network is used, requires new ways of optimising the flow of data across the network—for example across the network that links a database client application obtained from the App Store and the database server for that application.
  • One of the key reasons businesses have moved to buying from web AppStores, is for the simplicity of both purchase and deployment, auditing and updating. But critically, with the implementation of application virtualisation, they are doing so to reduce the cost of the ongoing day to day management of these applications on the desk-top, even more so for very large enterprises. Now, by enabling all of their business applications, including those that are not web 2.0 apps, to be delivered through web stores and streamed from centrally hosted databases, businesses can get all of the benefits associated with web 2.0 applications for the rest of their inventory of software. This has a huge impact for almost any company's entire legacy IT infrastructure. The areas most impacted by these changes in a software life cycle may be those shown in FIG. 1 and in FIG. 2. FIG. 2 contrasts the present approach to that possible with Data Accelerator's approach for each step in the lifecycle.
  • What Will Data Accelerator Offer the Market?
  • Data Accelerator's AppStore will enable any application, including even database applications, to be delivered over the Internet giving users access to their applications and their data on any Internet connection from any computer. For small, medium and large enterprises this transition provides an enormous cost reduction on their existing technology infrastructure and significantly increases the productivity of their users. (For the purpose of broad definition, an SME will typically use a publically run AppStore and hosting in public cloud, whilst an enterprise will typically use an internal privately run AppStore and private cloud).
  • With reference to FIG. 3, the new delivery models emerging are shown in the columns headed “Mobile AppStores since C. 2000” and “Web AppStores 2007-Present”, and Data Accelerator's proposition is shown in the columns headed “Data Accelerator AppStore 2010” and “Data Accelerator Appstore for Entreprise DB Apps 2010” of the Table.
  • In FIG. 4, Data Accelerator's Product Offering to service the markets is identified in the Table. Key to a business oriented AppStore is the provision of database applications. In the past, database applications have required a high bandwidth (e.g. over 5 MB per second) LAN linking a powerful server with multiple client computers. That approach is however not relevant to database applications bought from an AppStore since those database applications will typically have to operate efficiently over a relatively slow connection such as the internet or wireless connectivity such as GPRS.
  • How are we Doing this?
  • Data Accelerator Limited is developing its own proprietary technology, Data Accelerator, for accelerating and optimizing the flow of data between any application and a database server. Specifically the solution will enable practical access to a database application across a wide area network (WAN) or the Internet that is not currently possible or is prohibitively slow at present. Data Accelerator is the only known product of its type. Data Accelerator may also make use of a leading technology in application virtualisation, such as Application Jukebox from Endeavors Technolgies of Irvine, Calif. Together with Data Accelerator this will create the first of its kind in a data flow optimization model that works for the cloud, capitalising on and meeting three principal global market opportunities:
  • 1. A PC application store for any Windows application.
  • This SME based offering will be targeted at telephone company (Telco) operators, hardware vendors, retailers and Independent Software Vendors (ISVs) to re-sell to their end users. On top of streaming applications to users moreover, we have the added advantage of being able to deliver and store end-user data in the public or private cloud because of Data Accelerator (explained below).
  • 2. A private application store for enterprises targeted at system integrators to resell to their customers, managed centrally from a private or public cloud.
  • Data Accelerator's solution will aid the sales process and return on investment (ROI) of a system integrator's own products or services, especially where they are managing desktops, by reducing the cost and complexity of delivering applications to enterprise users and the overheads of administering and paying for expensive server set-ups.
  • 3. An independent App Store targeted at Independent Software Vendors (ISVs) for new and existing markets.
  • Those ISVs that have a database back end on their application will normally suffer from complex and long sales cycles and high costs of implementation as each time they sell their software their customer also has to make an additional investment in the database infrastructure to support the application.
  • If the ISV uses Data Accelerator however, they can run a central hosted database in the Cloud for their customers to use. This is delivered at a much lower cost to the end customer due to economies of scale and it means that the ISV only has to focus on selling the benefits of their software. Then the ISV can use an application virtualisation technology, such as Application Jukebox, to deploy their client software and updates to the customer over a WAN. This gives complete control over licensing to the ISV and it means that there is a very simple implementation process for the customer with a lower Total Cost of Ownership.
  • A hypothetical, fictional example of an ISV that has this kind of problem is Bert's Glasses, which supplies replacement car windsceens. A significant part of their business involves gathering data on vehicles and then making that available to car traders, insurers and car repair centres. The software they provide for car repair centres is called Glassbert and has a client application and a back end database that stores the car repair costing data for quoting to insurers. This application is not appropriate to become a web-based application due to the need to communicate with local large files, such as photos of the repairs themselves. Currently Bert's Glasses requires each customer to install and maintain their own SQL (Structured Query Language) server at each customer office. This presents a large problem for them during the sales cycle to a new customer since car repair centres have little or no information technology (IT) knowledge and to maintain such a server in each office costs around GBP 1,000 a year for a small SQL server. Also, the current set-up makes updating the data a very complex and expensive process involving sending out a CD ROM to 1,000 customers every month to update the database. Bert's Glasses have previously investigated providing a central database for their customers and know that this would reduce their sales cycle and significantly reduce their costs of updating and supporting those customers. However their investigations correctly found that the database would be too slow to be used over a WAN (either a virtual private network (VPN) or internet) so the only option would be to use Citrix XenApp (Presentation Server) to serve the application remotely. This would be prohibitively expensive for them and add around GBP 600 per user to the cost of their application. Given that Bert's Glasses has 1,000 customers with approximately 10,000 users each charged GBP 1000 per year, this is over a 50% increase in the cost of implementing such a solution—many GBP millions.
  • The other area where Data Accelerator can help ISVs is if they have a web-based application. Any web-based application has a back end database and as the ISV scales up the number of users they also have to scale up the database infrastructure; this comes at a cost that can be very high.
  • Data Accelerator can be used to scale the number of users that can use a web based application without needing to increase the number of database servers. This can reduce the cost for the ISV and improve the performance of the web application for the user.
  • Section B: Data Accelerator What does it do?
  • Data Accelerator Optimizes Data Traffic Between an SQL Server and any Client Application.
  • How Will it Work?
  • The Data Accelerator data flow optimisation system will analyse the specific SQL traffic and perform various proprietary optimization techniques to reduce the amount of information sent to the SQL server and the amount of processing required of that server.
  • Furthermore, Data Accelerator is a totally transparent solution that can be retrofitted on any database application to improve speed of response times and overall query performance over a WAN. This significantly increases the size of the addressable market. An added benefit in terms of ease of adoption is that Data Accelerator and application virtualisation software, such as Application Jukebox, can be implemented incrementally rather than a wholesale replacement of systems and methods at a huge cost, e.g. Virtual Desktop Infrastructures (VDI).
  • What does this Mean for Enterprises?
  • Reduced Number of DBMS (Database Management Servers) for an Enterprise
  • The main benefit to an organisation is that when a DBMS request is sent, it can be served faster and more efficiently with minimal impact or load on the actual DBMS. The reason that the load on the DBMS needs to be minimised is that they are traditionally expensive systems to operate, either through licensing or the hardware that is required in order that the responses can be served quickly enough. With Data Accelerator we can, in one variant, use the far cheaper and more abundant processing power of the users' PC (e.g. the optimisation system can include a client component running on client PCs, taking advantage of the computational power of those PCs). By minimising load, Data Accelerator can lead to a significant reduction in the number of DBMS servers that an organization needs to run leading to a significant reduction in both costs and the environmental impact of running those servers.
  • Databases in the Cloud or Database as a Service
  • The second main benefit is because of the improvements that Data Accelerator gives at the network level (such as caching, compression or string replacement) it is now possible to locate the DBMS system over a slow link, either a secured link to another site, a VPN or over the internet to a cloud. Because of the nature of the environment, the DBMS system can be scaled cheaply. With the network optimization that Data Accelerator achieves, moving DBMS systems into the cloud can be made a reality for both new and legacy systems.
  • How is the Benefit Measured?
  • The benefit will depend on the application itself but in the real world would allow a financial application that would normally takes a user 10 minutes to log into over the internet using conventional techniques to be reduced to a few seconds or allow a large enterprise to reduce their number of severs by up to 10 times. With each customer, the exact saving will be accurately demonstrable with live data feedback that can measure and quantify the saving and efficiency benefit on each application for every client in real time.
  • Because Server Virtualisation only reduces the number of physical hardware boxes but not the amount of computing power required, the benefits accruing through Data Accelerator will be a much greater improvement. Server Virtualisation has swept the market over the last 5 years, hence the growth of VMware and Citrix, showing us the potential of the market for fast adoption.
  • Where and how Will it be Applied and Installed?
  • The server software will be a standalone application that can be installed on either the SQL server or any other server on the same local area network (LAN) segment of the SQL Server. The client side will be able to be installed as an application or as a client install on each PC, or a combination of both. The client will be installable in user mode, meaning without the requirement for Administrator rights on the end PC. IT departments will of course also be able to use Data Accelerator for all their corporate database applications to improve performance, extending the use of applications to home users and branch offices and reduce the costs of their server infrastructure or in fact to any employee who needs to be mobile.
  • What Techniques Lie Behind the Implementation of the Invention?
  • The SQL data will be cached and we are developing techniques to automatically prefetch the subsequent SQL data that is needed for any given application query. When responding to a query, the client will get the results from a local client's cache if available and only the differential will be sent over the WAN. The key part of this method is that the SQL server and application will not be aware of the optimization taking place. Data Accelerator is a totally transparent solution that can be retrofitted on any database application to improve speed of response times and overall query performance over a WAN. This of course massively increases our addressable market since it will be applicable to all historic database applications currently running It achieves this by rerouting the SQL traffic that normally flows directly between the client application and the SQL server. With Data Accelerator now the SQL traffic flows via our additional client and server application so that we can dynamically add in optimization techniques to the communication.
  • The diagrammatic example of FIG. 5 shows how the data optimization services can interact with other services, initiators and DBMS servers: the optimization servers are labelled in FIG. 5 as ‘Optimization Points’.
  • There will be four main optimization techniques used on the SQL traffic and these will improve over time. These are:
      • Peer to Peer Caching of queries
      • Compressions and Encryption
      • Predictive Pre-fetching
      • String replacement
    How Will it Improve Over Time?
  • The initial release will contain the framework and rules to accelerate database connection but it will have to be manually configured to a specific application. The following releases will allow the acceleration (i.e. the applicable optimisation rules) to automatically adapt, improve and/or tune itself to any application. Subsequent releases will also use the network effect data (the aggregated data from all customers) that is generated from the users of the application to help us further improve the acceleration.
  • Section C: Application Juke Box What does it do?
  • Application Jukebox streams applications or any files to a Windows desktop from a server with central control and management over the application and its license. Once the application is on the users' desktop, it is virtualized, meaning only the parts of it required to work while running the application are temporarily available and therefore there are restrictions to stop the application from conflicting with other applications on the desktop, thus preventing support issues. Also, this protects the software from piracy.
  • Why do we Need it?
  • Using Data Accelerator to centralise the database or move it into the cloud, removes the requirement for onsite database servers and onsite support for those servers. Combining this with application virtualisation like Application Jukebox also allows the client application to be managed and supported centrally rather than onsite. Thus the combined benefit allows a total centrally managed solution thereby giving reduction in cost and increased productivity.
  • Application Jukebox
  • The product gives the good control mechanisms for the virtualised delivery of an application as well as a flexible combination of Integrated or Isolated Virtualisation capabilities. It has Digital Rights Management for preventing piracy and controlling billing and the use of the application, which in turn enables us to have innovative new revenue models and safely enter emerging markets.
  • How Will Application Jukebox be Integrated with Data Accelerator?
  • Application Jukebox is used for delivering the binary files for applications or data while Data Accelerator is used for the transfer of structured information between an application and its database. The integration of these products will allow any type of application to be delivered and for users to be able to access the back end data for the application.
  • Section D: More Technical Detail
  • Data Accelerator is a system that intercepts requests that are being sent to a relational database, decomposing the request in order to understand the request and applying a set of rules in order to improve the performance of the request. This can be applied to any Relational Database Management System (DBMS) database system. It enables, for example, legacy DBMS platforms to be migrated efficiently to cloud-based operation.
  • A set of rules can be applied to optimize the request so that the initiator of the request gets the results as quickly as possible. The present implementation of the invention is predicated on the fact that requests sent to a DBMS are often unnecessary duplicates, the requests often return a large amount of data that may or may not be actually used and the DBMS systems do not take into account external factors such as the performance of the network, the load on the DBMS and whether the client already has some or all the data it needs to fulfil the request. Instead of getting the DBMS system to run every request, an implementation of the invention can for example analyse the request and decide on a course of action that can either avoid having the DBMS re-run the query, thereby saving the time it takes to execute the query and the time it takes to transfer over the network, or it can alter the request and/or the response in order to serve the response more efficiently. We will refer to this as an optimization system, optimization server or optimization point. These optimization systems can be implemented in hardware, software, or a combination: for example, they may be implemented in a computer running appropriate software; the computer is located between the initiator and the DBMS. Similarly, they may form part of the DBMS, for example being part of the software controlling the DBMS, or be part of the software running on the initiator's computer. Or they may be distributed across the DBMS, the initiators' computers, or one or more intermediary servers. In each case, the existing client application (running on the initiator's computers) and the server (the DBMS) are substantially unchanged by the optimisation system; this is very different from conventional and costly bespoke coding approaches to data flow optimisation.
  • Multiple implementations of the invention (each providing optimization services) may (optionally) be used at different network points between the initiator of the request and the DBMS. When routing is done between two or more of the systems that each provide optimization services, then these systems (i.e. optimization systems) can include additional information either in or around the request for upstream or downstream optimization services in order to learn more about the request and responses so that they can understand the effectiveness of any rule applied and also offer other guidance about results of the optimization and possible further optimizations.
  • When there are other versions of the optimization services running which are not in the direct path between the initiator and the DBMS, such as separate clients on a peer-to-peer network, then they may optionally also share both request and response data as well as information to learn about the effective methods of optimizations described above. Rules can be selectively enabled or disabled based on a number of factors such as initiator and DBMS addresses, the locations, time of day, configuration or other methods such as server load. An example of how the optimization services can interact with other services, initiators and DBMS servers is shown in FIG. 5: the optimization servers are labelled in FIG. 5 as ‘Optimization Points’.
  • DETAILED DESCRIPTION OF THE PREFERRED IMPLEMENTATION
  • Data Accelerator provides the interception, analysis and database traffic optimization described in the preceding sections. To re-cap on the fundamentals, the traditional approach for database systems (DBMS) is for the initiator of a request to send every request to a DBMS and for that system to run every single request. In one example, the present implementation of the invention challenges this orthodoxy by requiring that the requests and responses have rules applied to them to limit what is actually run on the DBMS, running queries more intelligently and making better use of network bandwidth to improve performance for users of DBMS systems. The example of the approach can be summarised as intelligently “intercept and analyse then respond, change or ignore” at the Data Accelerator optimization server. FIG. 7 is a schematic of the approach where the rules have not been able to stop the request from being sent to the DBMS so the request is forwarded. FIG. 8 shows the response is able to be served directly from the Data Accelerator optimization server and the DBMS system does not need to do anything. Typically the responsiveness of a DBMS system is affected by a number of factors such as, query compilation, load, data access (reading and writing to disks) and network response time. By using a rules based framework that is able to intelligently learn how to apply the rules to give the maximum performance benefit, significant savings can be made whilst still having a scalable DBMS architecture.
  • The Data Accelerator can apply many different kinds of rules, such as any one or more of the rules in this non-exhaustive list:
      • Caching of request and response data, to return the response direct from a cache without having to run the request on the DBMS—see FIG. 9.
      • Pre-Caching of requests can take place so when a request has been seen before with other requests, those other requests can be sent to the DBMS so when the initiator requires them, they are available immediately.
      • Query Batching i.e. duplicate queries which have been requested at the same time can be stopped because the first request can be run while the duplicates are held, when the response to the first one is sent, it can be sent to all of the initiators. See FIG. 10 which shows the requests being held and FIG. 11 which shows the response being served to multiple initiators.
      • Compression of the request and/or the response which will decrease the time it takes to send the actual data over the network.
      • Replacement of common strings to minimise the data travelling over the network.
      • Re-Routing of requests to separate specific DBMS systems to provide a load balancing feature
      • Re-Routing of requests over separate specific network paths depending on which one is online and fastest.
      • Request modification which will modify queries to only request the data that is required, for example adding a TOP X clause to a query that only requires a certain amount of data but requests more than it needs.
      • Pre-Validating the request for errors such as incorrect syntax of the query language being used or for security issues, so these can be failed before even having to get the DBMS to fail the request.
      • To address issues such as auditing and logging, a rule can be put in place to call the auditing or logging systems so that these can still be used.
      • To address issues such as security over WAN links a rule can be put in place to encrypt the traffic between two Data Accelerator instances.
  • These and other rules give numerous advantages over the existing method of having a DBMS run each and every request that it receives, the specific advantages include:
      • Lowering the actual cost and ownership cost of high performance DBMS systems, notably:
  • The cost of having to have additional and more powerful hardware.
  • The power costs associated with more physical servers and more powerful servers.
  • The personnel cost of having to maintain the equipment and keep it running optimally
      • Typically with DBMS systems, because of the amount of data that is transferred over the network, using a wide area link to connect to the DBMS is not possible, however using the Data Accelerator you can host your DBMS system anywhere in the world.
      • As the Data Accelerator reduces the amount of requests being sent to the DBMS, the requests that it does have to deal with get more resources to complete in a more efficient manner, so even queries that cannot be helped by the rules framework will still complete faster.
  • Some examples should help to show how wasteful traditional systems are and how they can be optimized. The first example is of a national healthcare provider who without Data Accelerator would have to either host their DBMS in one location and use an expensive remote virtualization solution or have a DBMS in each branch office and replicate data around between branches which can be inefficient, prone to failure and expensive. Using the present implementation of the invention they can connect directly from each client via a local Data Accelerator instance, which applies any caching and pre-caching rules it can or compresses and encrypts all traffic connecting over the WAN to the Data Accelerator instance at the DBMS site where it is uncompressed and unencrypted and forwarded onto the DBMS. The response is similarly compressed and encrypted before sending back.
  • The benefit of this approach is that the healthcare provider simply needs one site which keeps costs low whilst still getting the performance they need. Typically when a patient goes to reception their details are first loaded so the receptionist's traffic can be prioritised by the Data Accelerator, as the data that is required is common i.e. there are a number of requests which get the patient records (e.g. names, address, date of birth etc.) the pre-caching can have a massive benefit. As the patient moves to the specific department, the information is already available at the local cache so it can be served immediately. This shows a situation where the Data Accelerator can be used where imperfect solutions were previously used.
  • The second example is of a global insurance company which has a number of reports showing the daily claims and policy sales data which are run by various levels of management every day. By using the Data Accelerator they are able to drastically reduce the amount of processing that the DBMS system needs to do during the online day so it can be used for other processing or a cheaper system can be put in place. The hierarchy of managers who view the reports are:
      • 1×Global Director
      • 5×Regional Directors
      • 50×Country Managers—Each region has an average of 10 countries
      • 2500×District Managers—Each Country has an average of 50 districts
  • There is one report for each manager so the global director has a global report, regional directors have a report and each country manager has their own report etc. A report consists of one DBMS request. Typically each person views their own report, their peers reports (district managers peers are those in their country and not in all countries) and also their direct subordinates.
  • The data is refreshed once overnight and without the present implementation of the invention and request caching the amount of requests the DBMS needs to cope with is:
      • Global Director=6 Reports—1 Global Report and 5 Regional Reports
      • Regional Directors=275 Reports—Each regional director views the 5 regional reports and their own countries reports
      • County Managers=27500 Reports—Each country manager views all 50 country reports and their own districts
      • District Managers=25000 Reports—Each district manager views their own reports and all the districts in their own country
      • Total Requests=52781
  • If however we use caching, so that reports are only run once, then we simply count the number of reports that are available:
      • 1 Global Report
      • 5 Regional Reports
      • 50 Country Reports
      • 500 District Reports
      • Total Requests=556
  • That is 1.053% of the number of original requests. Because the same reports are run every day, once the data has been refreshed the Data Accelerator can employ pre-caching to generate the data the reports require before anyone has even requested the first report. Deploying this for enterprise reporting solutions often means that it is possible to restrict the use of complicated and expensive pre-aggregating solutions such as online analytical processing (OLAP) cubes.
  • For a final example we can take a look at a web site which shows dynamic pages directly from a DBMS system. The site is 24/7 and has pages modified by editors as well as data feeds constantly updating pages. By using the Data Accelerator they are able to improve the performance of the site and ensure that the resources needed to serve the site are reduced so the running costs are cheaper.
  • A page consists of, a site header, site footer, a site tree and the page itself where each item is a separate DBMS request.
  • On average:
      • 1 Page every 5 minutes is added or deleted which changes the site tree
      • The header or footer are changed once every 7 days
      • The site receives 50 page views a minute
  • The situation without Data Accelerator is that the DBMS handles 2,000 requests/minute which are:
      • 50×Site Tree
      • 50×Site Header
      • 50×Site Footer
      • 50×Pages
  • This equates to 12,000 requests per hour, 288,000 per day and 2,016,000 requests a week.
  • Using Data Accelerator, depending on which pages are shown, in the worst case scenario, where the page requested is always the page that has been modified there is still a massive reduction in requests:
      • 1×Site Tree—every 5 minutes
      • 1×Site Header—every 7 days
      • 1×Site Footer—every 7 days
      • 1×Page—every 5 minutes (if the changed page is not requested then this can be even lower)
  • This equates to 12 requests per hour, 288 requests per day and 2,018 DBMS requests every week. This is a reduction in the worst case scenario to 0.1% of the original requests.
  • The Data Accelerator optimisation system can work as either the only instance between an initiator and an DBMS or as part of a chain involving two or more instances; using multiple instances allows rules to do things to the request that they could not otherwise (compress, encrypt etc.) and share diagnostics and performance information between the instances. FIG. 12 shows a single Data Accelerator instance, FIG. 13 shows two Data Accelerator Instances and FIG. 14 shows multiple instances.
  • The path through a chain of Data Accelerator instances is not fixed but variable. Different initiators at either the same or separate locations can go through any route of Data Accelerator instances: see FIG. 15. FIG. 16 shows how the Data Accelerator can change the route to the DBMS depending on where the request came from or a specific property of the request. The Data Accelerators must be aware of other instances both up and down stream because some rules such as the compression rule will modify the request and it must be uncompressed before reaching the destination DBMS server otherwise the request would be invalid.
  • When the Data Accelerator sends a packet that has been modified, it wraps the contents of the packet in a specific message that the Data Accelerator will remove before forwarding to the DBMS or the initiator. In order that the Data Accelerator instances can know what rules they are allowed to apply to a packet, it uses a number of methods to understand where it is in the chain between the initiator and DBMS. One such method is for the first Data Accelerator instance in a chain to send a specially crafted DBMS request up the stream and to monitor for the response. Each instance has its own unique id. The first instance creates a request such as “SELECT uniqueID”, the second adds its own id so it becomes “SELECT uniqueID, uniqueID” each instance in the chain adds its own id then when the response is received, the order of the instances unique id in the result set shows where it is in the stream.
  • Because Data Accelerator instances are aware of the chain and of other instances they are able to communicate between themselves within the network channel that has already been opened for the initiator. These messages allow the instances to share information about the requests and responses, such as how quickly they are being received at each point. With this information instances can dynamically determine how effective or detrimental a specific rule has been in a particular case so can choose to vary the applied rules (either not apply the rule or change the parameters to the rule or even test a different rule) to find the optimum performance enhancements. It is this dynamic learning that means Data Accelerator instances can consistently add benefit over time.
  • In order to analyse requests that are being sent to a DBMS, the Data Accelerator will extract the command that is being sent such as “SELECT A, B, C FROM XYZ” or the DBMS specific command in their own language such as Procedural Language/SQL (PL/SQL) for Oracle or Transact-SQL (T-SQL) for Microsoft SQL Server and use the command as the basis for applying the different rules that it has available.
  • There are a number of different types of rules that can be applied at different points within the request/response stream. Section E below expands on these rules. FIG. 17 shows the different points that the rules can be applied and the flow through the application. The rules are as follows:
      • Initiator In-Flight Rules
  • The request is received and rules such as the caching rule can decide to allow the request or serve a response directly from cache
      • Initiator Post-Send Rules
  • The request has been sent so rules such as the pre-caching rule can send other requests which may well be needed
      • DBMS In-Flight Rules
  • The response is received from the DBMS; rules such as the compression rule can be applied before it is sent to a downstream Data Accelerator instance.
      • DBMS Post-Send Rules
  • The response has been sent so the diagnostics rule can determine how good a job it did and how it could have been better.
  • We can follow a request with a specific example:
  • 1. A request comes in and the protocol specific parser determines that the command is “SELECT a, b, c FROM xyz”.
  • 2. The initiator In-Flight rules are applied
      • a. The caching rule determines that it is in cache but has expired so cannot serve it
      • b. The compression rule determines that there is an upstream Data Accelerator instance and the network link is slow so the data is compressed and wrapped in a Data Accelerator packet.
  • 3. The request is sent upstream.
  • 4. The Initiator Post-Send rules are applied
      • a. The pre-caching rule determines that normally when this is sent, there are an additional 5 commands which are always run so it schedules the next 5 requests, the 5 requests are sent through the normal set of rules so caching and compression etc. can still be applied.
  • 5. While the Initiator Post-Send rules are in progress, the response is received from the upstream servers. It is then passed through the DBMS server in-flight rules.
      • a. The compression rule determines that the data is compressed and there are no downstream Data Accelerator servers so the data is uncompressed.
  • 6. The response is then sent back to the initiator
  • 7. The DBMS Post-Send rule is then applied
      • a. A diagnostics rule determines that the upstream link is a fast link and there is little or no latency so after running a test to compare how long it takes to compress data and how long to send over the network, the compression rule is turned off for upstream packets less than 1 k in size.
      • b. The pre-caching rule discovers that only 4 of the 5 commands it expected have been used and this has been the case for the last 5 times the specific request was sent so the caching rule has been modified to only request the 4 queries instead of the original 5.
  • The key is that the Data Accelerator provides the rules but also diagnostics and in-built learning to change the rules dynamically to react to events as they happen.
  • Section E: The Optimisation Rules
  • We now look at how each of the individual rules work to provide the benefits already mentioned.
  • Simple Caching Rule
  • If we start with the simple caching rule, there are three parts, the actual caching of data called the “cache data rule”, the serving of cached data called the “cache serve rule” and the diagnostics component “cache diagnostics and management”.
  • In order that the Data Accelerator can cache data, the cache data rule runs after the response has been sent back to the initiator because, at this point the Data Accelerator has seen the request that was sent and the response that was returned, it has everything it needs to cache the data. There are a number of different types of cache that can be used, these include an in-process and out-of-process or separate machine cache and on permanent storage such as a hard disk. The cache is effectively a hash table lookup with the key being either the SQL command from the request or a hash of that SQL command. Depending on the type of cache, it will either store a pointer to the first response packet or it will store the actual packets as an array.
  • Before a response can be added to the cache, the rule must determine whether a request is actually cacheable. There are a number of factors which affect whether or not something is cacheable, there are certain types of SQL command which are inherently non-cacheable, for example an UPDATE or INSERT request, if this was cached and not forwarded onto the DBMS it could cause data corruption which is not acceptable. Other commands need to be looked at in the context that they are being used, for example an DBMS will have a command to retrieve the current date and time. If a request is sent to get all records in the future, depending on when the query was next run and if any records were added or deleted, it may or may not have a different set of results. If it is determined that the request can be cached, it is stored in the actual cache. If it cannot be cached, then we still store the request so further requests don't have to be verified.
  • Once a request/response are stored in a cache, the cache serve rule can be applied to requests as they arrive but before they are sent onto the DBMS, if the request is in the cache, it is verified to ensure that it is still valid, for example there have not been rows added to, deleted from or modified in the cached response. The users' permissions are then verified to ensure that they have the correct level of security to access the response and if they are allowed access then the response is returned.
  • The cache diagnostics and management rule's role is to verify how well the cache has worked for a specific request, to manage the cache size by expiring unused or not often used requests as well as expiring items which are no longer valid. To work out how effective a cached response was, it compares the total time it took the DBMS to return the response and compare it to how long it took to verify that it was still valid, check security and return the cached response—if the request is such that it is small and responds almost instantly then it may not be worth caching. If the diagnostics determine that caching the request is not adding a benefit, it will still monitor later requests to see if at any time it does become worth caching.
  • To see if a request is still valid the rule has a record of the items that the request used within the DBMS and monitors those for changes, if the changes affect the response then it can either decide to just evict the item from the cache or it can re-run the query so it has the latest response available in cache.
  • To manage the size of the cache, every time an item is served a counter is incremented and the time noted, if an item hasn't been used for a set amount of time or it is only rarely used then it can be evicted from the cache.
  • Intelligent Caching Rule
  • The next rule is the intelligent cache rule; this is similar to the simple cache rule in that it has three components and in fact can share a cache with the simple caching. In some situations the simple caching is not as effective as it could be. For example if the response to a request changes, the entire response is discarded. With the intelligent rule, it can assess how much of the response has changed and if it is under a certain percentage, which is determined by the diagnostics component, the cached response will be modified so that it is up to date. Where this is of most use is where a chain of Data Accelerator instances are being used perhaps, one close to the DBMS and others at remote offices, the intelligent caching rule can just request the portions of packets that have been changed from the upstream instance that is close to the DBMS so that the minimal amount of data is sent over the network to the local instance, which then merges the changes and then returns the cached response as required. The cache data rule works in exactly the same way as the basic caching rule, in that it determines the cacheability and stores it in a hash table.
  • The cache serve rule and the diagnostic rules however need a much more complex method to determine if the results can be merged or simply discarded. The rules will decide on whether to do a merge based on factors including the size of the response in that a small response may be quicker to get direct from the DBMS. It also takes into consideration how much of the data has changed. It does this by getting an upstream Data Accelerator instance to physically re-run the request. Once the upstream instance gets the response, it can analyse each packet in turn to see if it has changed at all and if it has what percentage of the packet is different. Once the rule knows how much of the data has changed, it can determine what to do and how complicated it is. Some changes are more complicated, for example, if the size of a packet has changed, either due to extra rows being returned, or a string changed then details like the packet size and protocol specific information need updating, but if something has changed but the length of the packet is the same i.e. swapping “Company A” for “Company B” then it is simply a matter of swapping the “A” for “B” which is an easier modification to make.
  • Compression Rule
  • If we now look at how the compression is implemented, compression relies on there being a chain of Data Accelerator instances between the initiator and DBMS, at the very least there needs to be two instances, one to compress and one to decompress the packets. Either the request or the response can be compressed but typically requests are small enough that compression is usually ignored. The compression piece is made up of three rules, the “compress rule”, “decompress rule” and the “compression diagnostics”.
  • The diagnostics component analyses network bandwidth within the chain of Data Accelerator instances to discover what speed each of the up and down stream networks are running so a score based on the performance can be used. Over time the performance will be verified to ensure if anything changes, or if there is a particularly busy period on a portion of the network, it is taken into consideration. The diagnostics component also checks to see how long it takes to compress/decompress packets and compares that to the time it takes to send over the network to find the best ratio of packet size/compression size over CPU cost to decide what to compress and what to ignore.
  • The compression rule will use both the network performance and the CPU compression cost ratios to determine whether a specific request or response should be compressed. If it is to be compressed it takes the packet(s), compresses and wraps the compressed data in a Data Accelerator compression envelope which can then be forwarded. The wrapper which contains the data is then sent either up or down stream depending on whether or not it was a request or response which was compressed.
  • The decompression rule examines each request and response to determine if they are compressed or not. If they are compressed, the rule will determine whether the link contains a Data Accelerator instance. If there is no instance that exists then the data is always uncompressed. If an instance does exist then the data is still uncompressed but only so that rules like the caching rule can be applied at each level; in this case the uncompressed data is not forwarded.
  • Pre-Caching Rule
  • The next rule is the pre-caching rule. This is made up of one component, which intercepts requests after they have been forwarded upstream or to the DBMS. The rule is based around a map of requests that have previously been run through the instance. Each request that has been run links to the next request that was sent, if that same series of links had been made before then the pre-caching rule can run the next set of queries.
  • If you look at FIG. 18 we see that the first query was run three times. The first time it ran, the next request included the query “SELECT B FROM C”, but all subsequent requests were for “SELECT D FROM E”, so the pre-caching rule on the 2/1/2010 (format: day/month/year) would have added a request for “SELECT B FROM C” which would not have been used, so this would then not be selected for pre-caching again but on the 3/1/2010 the same query was run again so would have been selected for pre-caching and would have had the results ready when it was requested.
  • The criteria the pre-caching uses for selecting or removing requests from pre-caching is based on how many times a sequence of queries has been run as well as how expensive to run a request is. If a series of requests complete very quickly then it may well be worth pre-caching those even if they are not always used. Conversely if a request takes a long time to complete then it might not be worth running it just in case it is used.
  • Pre-Caching can also look for patterns in requests. For example if a request came in with the SQL command “SELECT * FROM Country WHERE CountryName=‘England’” and then the next request was for “SELECT * FROM Employees WHERE CountryID=1024” it is likely that the CountryID was returned from the first query. The pre-caching rule can then get a list of all CountryName and CountryID fields by querying the Country table directly, so when a request such as “SELECT * FROM Country WHERE CountryName=‘Wales’” the id could be inserted into the next query “SELECT * FROM Employees WHERE CountryID=??”.
  • Query Batching
  • The next rule is the query batching rule which will stop duplicate queries running at the same time. This rule runs after the request has been received and before it has been sent to the upstream instance or DBMS. The rule has a list of currently executing requests and if the current request is already being run then it is held. The rule waits on the response from the request that is already executing and puts the new request on hold, adding it to a list of waiting requests. When the response returns, the rule copies the response to each waiting request.
  • The query batching rule needs to employ the same definition of cacheability that the caching rules use to decide whether or not something is cacheable because some things like INSERT or UPDATE queries need to be run on the server whether or not they are duplicates.
  • String Replacement Rule
  • The string replacement rule works by replacing common strings with specific id's which allows the rule to minimise the amount of data that is sent over the network. For example if a company name appears in a number of queries then depending on the length of the company name it can save quite a lot of network traffic by replacing “Company Name Corporation” with “:1:” or some similar identifier. This can work with either the request or the response and relies on there being more than one Data Accelerator instance in the chain: one to replace the strings and one to restore them.
  • If a packet contains string replacements then it is wrapped in a replacement envelope. When an instance receives a packet for forwarding, if there is an appropriate up or downstream Data Accelerator instance, it will replace the strings so it can apply any other rules on the instance but forward the original message. If however the upstream is the DBMS or the downstream is the initiator then the strings are put back into the message and forwarded on.
  • DBMS Load Balancing Re-Routing
  • The re-routing rule monitors the load of a DBMS and chooses to run the query on the least used DBMS system. The re-routing rule requires some configuration and some specific requirements of the DBMS. The rule must have the details of the DBMS systems that can handle specific requests and the databases themselves must be able to handle requests no matter where the request ends up. Examples of these are read only databases or where transactions are copied to each database. FIG. 19 shows two DBMS systems that replicate data between themselves and the Data Accelerator sending requests to the DBMS 1 system. If the load balancing rule determines that system 1 is under too much load and it is affecting query performance, it can switch to send requests to DBMS 2 as shown in FIG. 20.
  • Re-Routing of Requests Over Separate Network Paths
  • This rule needs to be configured with multiple upstream Data Accelerator instances which can be connected via separate network routes. It has two components, the diagnostics rule and the redirector rule. The diagnostics rule constantly checks the performance of both up and downstream routes to score each one based on performance. The redirector works by intercepting requests before they are sent upstream and sends them via the fastest route at that time. It works with responses by intercepting them before they are sent back downstream in the same way.
  • Request Modification
  • This rule works by taking the request that was sent and modifying it to send a request that only asks for the minimum amount of data that is actually required. This rule does require that it is configured with a list of SQL commands it can modify. When a request arrives, it is checked against a list of SQL commands which can be modified, if it can be changed it swaps the portion of the SQL command that can be changed with the replacement query and then the response is rebuilt and then forwarded on. This rule does not apply to responses.
  • An example of a query that can be modified is a search screen that only shows a small number of records at a particular time and for each page re-runs the query which selects all records in the system. The query “SELECT * FROM B” could be modified to “SELECT TOP 10* FROM B”, the benefit of this rule depends on the actual queries and how the initiators are using the results.
  • Pre-Validation Rule
  • The pre-validation rule takes the request, retrieves the SQL command and runs it through a series of checks to ensure that the request can actually be completed. If it finds that it cannot be completed then it returns the DBMS specific error message/code. The rule runs after the request has been received and before it is forwarded onto the upstream DBMS.
  • The checks it can carry out include a syntax check on the command to validate that the DBMS will actually accept the request. It can check that the request includes an actual command and is not just a comment, i.e. in a typical DBMS system “/* SELECT * FROM A*/” will not return a result as the command is commented out. It can also verify that the user has the permissions to run the query which will always result in a failure. The main benefit of this rule is that commands which are not valid do not need to travel over the network or to the DBMS for it to fail it outright.
  • Encryption Rule
  • The encryption rule requires that there be at least two Data Accelerator instances in the chain and typically the rule encrypts the traffic, both the request and the response when sending the data over an unsecured network like the internet. There are two parts to the encryption, the encrypt rule and the decrypt rule. When the request is received but before it is sent upstream towards the DBMS, the last thing that happens is that the data is encrypted if the link requires it. The encrypted data is wrapped in an encryption envelope and as the encryption is the last rule to run, the data may or may not be compressed or otherwise changed by an earlier rule. As each instance receives the request, if it is encrypted it decrypts it so the other rules can be applied. When it forwards the message, depending on whether or not the link is secure it either re-encrypts and sends the encryption envelope or simply forwards the unencrypted data. The type and level of encryption that can be used on a link are configurable and can be different depending on which link is used, for example on one link the rule could use Secure Hash Algorithm SHA-2 over Transport Layer Security TLS 2.0 but on another link use MD-5 (Message-Digest algorithm 5) over Secure Sockets Layer SSL 1.
  • Custom Rules
  • To ensure that things like auditing or logging occur in a DBMS system a custom rule can be put in place to run a specific command on the system as events occur in the Data Accelerator. In a typical system, there would be some auditing when a user carried out a specific action, for example if someone retrieved all the annual wages of all employees, it would need to be audited but if the caching rule had been applied then the request would not have arrived at the DBMS to be logged. The custom rules item is configured with a list of queries or events such as DBMS load balancing or network path re-routing and then a list of actions such as writing to a log file or sending a separate request to the DBMS.
  • Peer to Peer
  • If we now take a look at how the Data Accelerator instances in a chain or on a network can help each other by sharing diagnostics information and data between themselves and how that then can increase their effectiveness.
  • For individual rules to be most effective they typically use a diagnostic component to find optimum method of working to get the fastest response for the initiator, often where one instance has calculated something it is useful to the other instances that are available. There are two methods for communicating between Data Accelerator instances, the first is when the instance is not sure if the upstream point is another instance or the actual DBMS and it sends an DBMS request with the information that the Data Accelerator needs but that will not actually do anything if it does reach the DBMS. We can demonstrate this when an instance wants to enumerate the chain of instances and find the speed of each network link, it can send a request such as: “SELECT ‘1 January 2010 09:43:22.02’ As DAInstance4AA5888240B4448e9E20-62A8F70CF595, current_date As ServerTime”
  • The DAInstance4AA5888240B4448e9E20-62A8F70CF595 is the unique id of the Data Accelerator Instance, when the response comes back, it will include the time the request was started and the time on the server, and this gives an indication of how long it took to get a response from the network. When there is a chain of Data Accelerator instances, each instance adds its own uniqueID and time so the request actually ends up as “SELECT ‘1 January 2010 09:43:22.02’ As DAInstance4AA5888240B4448e9E20-62A8F70CF595, ‘1 January 2010 09:43:22.04’ As DAInstance936C4368DE18405881707A22FDBCFE59, ‘1 January 2010 09:43:23.09’ As DAInstance8F4AEA5AE4D544cd9B56DF16F7563913, current_date As ServerTime” The response from this will be a data set such as is shown in FIG. 6.
  • Each instance can then instantly see where it is in the chain and also that the speed of the link between the 2nd and 3rd instances is a slow link so they can make better decisions based on this knowledge.
  • Also if the first instance receives a request such as this, it then knows there is a downstream Data Accelerator instance and instead of re-running the query, after combining the request it received with the results it already has it can simply share the updated results with both the initiator and the upstream servers.
  • The second method of communication is where an instance knows that another instance exists and wants to either find out what it knows or wants to pass on some information, it creates a connection using the DBMS network method but instead of the network packet that the DBMS expects, it sends a Data Accelerator control packet. The control packet instructs the instance, not to forward packets up or down stream but to pass the packet onto the specified rule. The rules are given the information in the control packet and it acts on that as required. If we take a look at this in detail with an example of the caching rule, FIG. 21 shows how there are two separate workgroups, Accounting and Marketing, they both use the same DBMS but rarely run the same queries. Each department has their own Data Accelerator instance which connects directly to the DBMS. Because there is no chain the instances cannot communicate by sending requests up the chain. Instead they create a connection using the standard DBMS method and use this to send control packets. In the case of caching, where a request comes in from the Marketing which has already been served to Accounting, the caching rule, as well as checking its own cache can ask the Accounting instance if it has the query cached, if it does it can serve it without having to send the request to the DBMS.
  • Because the Data Accelerator can work and share information in this peer-to-peer way or via the instance chain, it can build a powerful network of shared data and knowledge. FIG. 22 shows a number of different configurations that instances can have to connect to a DBMS. If each of the initiators runs the same query, initiator A runs it for the first time so DA1 and DA2 both store it in their caches. Then initiator B sends the request. It has a local instance of Data Accelerator and that doesn't contain the response in cache and because of the network configuration it cannot talk to DA1. The request is forwarded to DA4. DA4 has a network link to DA2 and DA7 so it sends a control packet to both instances to see if they have the request. DA1 returns the response and DA4 then carries out the standard checks (is it allowed and has it expired). If the response is acceptable then it is returned to DA3 which sends it back to the initiator after caching the request itself. The initiator C then sends the request. Again DA6 does not have a copy so it forwards it to DA7, and DA7 does not have a copy but does have a link to DA4 which it knows has previously requested the query so it asks DA4 for the response. DA4 returns the response from its own cache. DA7 verifies and sends back to DA6 which caches the result and returns it to the initiator. At this point if initiator C resends the request it is served immediately from DA6. The initiator D then sends the request. DA8 does not have it in cache and has no peers it can connect to so forwards it on to DA5. This instance also does not have it in cache, but it does have a downstream instance that has the response but the link downstream is a slow WAN link so it needs to make a decision as to whether to send the request back down the link to DA4 or to send it to the DBMS. This decision is based on how long the query took to run on the server, how much data is in the response and how slow the WAN link is between DA4 and DA5.
  • Another scenario for the Data Accelerator is in a sales office where the salesmen have laptops. Each laptop has a local instance and when they are on the road this is mainly used for compressing the data. When the laptops are in the office, they can share their caches with the other laptops in the office. FIG. 23 shows the Data Accelerator instance chain when the laptop is out of the office and FIG. 24 shows how the instance, when in the office shares information and data with its peers.
  • The links that the Data Accelerator can work over can be local connections so the instance runs on the initiators computer as a windows service, a UNIX daemon or whatever type of process is best for the underlying operating system. It can run over LAN links which are typically fast or it can run over slower WAN links (eg. in FIG. 25) or links over public networks in cloud based systems. When running over unsecure networks the Data Accelerator can use encryption to secure both the requests and response data.
  • Section F: Use Cases
  • Finally if we take a look at the different applications for the Data Accelerator we can see who may use it and in what situations.
  • Examples for Use Cases for Data Accelerator
  • Data Accelerator can use the techniques described to help reduce the amount of queries that a database server has to make in order to produce the required results. This could be by serving the entire request from Cache or by requesting only portions of the information that has changed. Also clients can get the cached results from other clients using peer to peer.
  • An example of this may be a huge multi-terabyte database containing information from a supermarket's store card usage. When a team or internal staff are mining data from the database in order to track trends of customers or products, they may need to repeat many of the same queries but each time with some additional or different information required. By caching the results of the requests each time a team member runs a query they only need the database server to return any new results that no one else has already requested. With such a large database there is a significant amount of time required for each query and these apply significant load to the database server. This could mean that if a report is made up of 100 queries that each take around seconds to complete, without Data Accelerator the time to run a report or mine the required data is 50 minutes. But if the first 80 queries are cacheable and take sub-second to respond through data accelerator, the queries complete in 11 minutes and 20 seconds.
  • Another example of how Data Accelerator can reduce the load on a database server is for a reporting application. An organisation has a large database with a record of new and historical customer purchases. Each week the managers within the organisation run a report of the purchases made and compare that to historical data. Normally the database server would have to return all of the data required for the reports. Using Data Accelerator when a user runs the report they can access all the historical data from cached queries that have been run before, and the database server is only accessed to run a small query for the current week's data.
  • When a database server is replicating to other database servers or if it is running a backup Data Accelerator can be used to reduce the need for existing data or portions of data to be requested from the database server. This can result in a significant reduction in the load on a database server as the only queries that are run on the database are for data that has been added or changed since the last replication or backup.
  • The second main use for Data Accelerator is to help reduce the load on the connection from the client application to the database servers. This is achieved by using the various techniques described for each connection that the client makes to the database server, and eliminating the need for the connection where possible. By being able to improve the performance of the connection between the client and the database server it is possible to move the database server from a local network connection onto a slower WAN connection. This could mean that the database server is moved into a public datacentre or public cloud environment or for an enterprise it may mean that the database server is able to be centralised into a private datacentre or private cloud environment. For either a public or private datacentre or cloud Data Accelerator will deliver improved performance and lower costs for all types of connection speeds. FIG. 28 shows a matrix of various scenarios; an example for each scenario is given below.
  • Example 1a (see FIG. 28)
  • A university may have its application that tracks students' submissions of work and results currently running with a database server on each campus and the use of a Remote Desktop connection for students to log in from remote locations. The application without Data Accelerator is too slow to work without a high speed local network connection between the client application and the database server. The current infrastructure is very expensive to run and the experience for end users who connect remotely is very poor. By using Data Accelerator the database can be moved into a public cloud that provides low cost infrastructure and the campus locations and remote users or students can access the data using the client application on their local machine. To simplify the deployment of the client software application streaming can be used from a web page deployment. A typical use is for a tutor to download a students essay, which is stored in a binary format inside the database, so it can be marked. When the tutor is at home and using a dsl connection, it can take the tutor up to 5 minutes per essay but with the data accelerator using the rules to optimize the traffic, the same request can take as little as 25 seconds.
  • Example 1b (see FIG. 28)
  • Car repair garages require software to accurately estimate the cost of repairing damage to a vehicle and this price must be in correlation with amount the insurance companies are prepared to pay for such a repair. In order to cost a job there is an industry database with all part costs and labour estimates. Currently each car repair workshop has to install a database server as the application is too slow when running over a WAN connection. For example to open a contact and an estimate takes 44 seconds on a local network and 1 minute 53 seconds on a WAN connection. The problem with having a database server in each car repair workshop is that it is costly to install and maintain and also it is complex to update the database each month with the latest database. By using Data Accelerator the database can be moved into a public cloud environment but the performance of the application can be nearly the same as with a local server. The example above would only take 49 seconds over a standard ADSL connection with Data Accelerator.
  • Example 1c (see FIG. 28)
  • If a user is accessing an application over a mobile broadband, 3G or GPRS connection the problems caused by slow WAN performance are increased significantly. So if a user wanted to access the database server over a mobile broadband connection with the example above it would take several minutes on without Data Accelerator. With Data Accelerator it is possible to deliver near local network performance even over a very slow GPRS connection. This would apply to many types of applications that are used by mobile users, for example sales quotation applications.
  • Private Cloud
  • Enterprise organisations are more likely to want to centralise database servers into an internal private datacentre or private cloud.
  • Example 2a (see FIG. 28)
  • An example of this would be a healthcare application for recording doctors practise records about patient visits, appointments and bills. This application would currently require a server to be installed in each physical location. For a large hospital group this could mean a large number of servers on large hospital sites, servers in each practise which may include some rural locations, and many other ancillary buildings. The cost of deploying and managing this large number of database servers would be very significant. Even if each building were connected using a high speed leased line, the problems caused by latency and general lack of bandwidth are enough to make the application unusable without a local database server. With Data Accelerator it is possible to remove all database servers and to maybe even downgrade some connections, then having a single database server or a server farm located in a private cloud environment. This would result is a significant reduction in costs.
  • Example 2b (see FIG. 28)
  • An example of an application with a connection using a standard DSL line to a private cloud would be a Vetinary Clinic that has multiple branches with the animal database located at the head office. The Clinic is connected to head office over an ADSL line that has a maximum speed of 2.9 Mega Bits per second. The request to get animal history screen consists or 4 requests, 3 cacheable, 1 not. Without compression and caching it takes 2 minutes to open the history screen. With caching and compressions, after the details have been loaded once it only takes 5 seconds; the first time without caching but with compression takes 1 minute.
  • Example 2c (see FIG. 28)
  • As mentioned above any of these examples would be even more affected by the connection performance when used on a mobile internet connection (3G, GPRS etc.) Using Data Accelerator would also mean the mobile users would be able to access the application. This could be on either a laptop with a data card or even on a version of the application that runs on a smart phone or mobile phone device.
  • An additional benefit of Data Accelerator is that for connections that have any kind or packet loss or unreliability, especially mobile internet connections that are affected by network coverage, the connection is automatically re-established and the application can carry on working once the connection is working again. Normally many applications will crash or end if the connection is dropped even for a short time. By having Data Accelerator intercepting the connection it can prevent the application from being aware of the connection problem.
  • Section G: Additional Uses
  • The process of intercepting DBMS requests, decomposing the request and applying a set of rules to improve the performance can also be applied to other systems outside of DBMS specific requests. Two other types of system include opening files over a network and web or HTTP requests.
  • The performance of opening files stored on a remote file server (which is anything that can store files) across a slow network is often poor and the difference between that and of opening files when they are local to the requestor is very noticeable. The data accelerator can decompose the requests for files from a file requestor (anything that can request a file—and hence includes end-users, applications, databases etc.) and pass the request to the rules engine which can apply any rules that are appropriate to improve the responsiveness of the client application. For example when a client requests a list of all the files in a directory on a remote share that is located over a slow or unsecure link the Data Accelerator can apply the following rules:
      • The cache serve rule to see if it already has a list which it can immediately return
      • The cache serve rule can also see if a file was in cache but has changed and request the portions of the file which have changed to minimise the cost of re-caching the data
      • The cache date rule to cache the response so it is available for future requests
      • The pre cache rule can request all the files in the directory so they are immediately available when a future request is made
      • The compression rule can apply compression to the file so that the data that is needed can be requested as quick as possible
      • The encryption rule can be applied so documents and files can be carried securely over a public network.
  • A real world example of this would be a human resources (hr) department in a global blue chip company: the hr officers will store both general forms and also documents that relate to specific employees which vary in size and are confidential such as appraisal documents and details of behavioural and misconduct cases against employees. The hr officers will be based in remote offices and often travel to other offices and require fast access to the documents. Using the Data Accelerator means that the documents can be stored in one secure location and the users can access documents quickly and securely over remote links.
  • Web requests (from, generically, a ‘web data requestor’) can also apply the same set of rules that file requests can use because many webs requests contain static data which do not change such as images, documents and code files like html or css files. Traditional web caching services work by determining whether or not a resource has changed since it was last requested by using the If-Modified-Since HTTP header, whereas the Data Accelerator can be more forceful in applying more complex rules for example with a standard HTTP Get request that returns a html page, some images and some links:
      • The pre-cache rule can determine which images are required for the page and request them before the client does
      • The pre-cache rule can follow the links on the page and request those pages so that they are already in cache if the requestor follows a link.
      • The cache serve rule can determine whether to serve something from cache based on actual content rather than the web servers last modified time.
      • The cache serve rule can also request portions of files which have changed as opposed to the complete file
  • We can also apply the standard rules to:
      • The compression rule can compress in situations where the web server is not configured to compress data and smarter compression algorithms can compress data further than HTTP compression mat typically uses gzip, reducing the time it takes to send it over the network.
      • The encryption rule can provide secure communication over the public internet without the need to use HTTPS/SSL on the client or web server, easing the management on the server and the security on the client.
  • An example of where a company that might employ the data accelerator to optimize web requests could be a publisher who keeps an electronic copy of their books in html format. Users who are remote can read the books but without the Data Accelerator there is often a delay for the next page and for images in the book. The Data Accelerator can use the pre-caching rule to automatically start downloading the next page or chapter so that it is immediately available as well as downloading the images required. The full suite of rules can also be applied so the request and response is compressed and encrypted so it can be carried over public networks.
  • Note
  • It is to be understood that the above-referenced arrangements are only illustrative of the application for the principles of the present invention. Numerous modifications and alternative arrangements can be devised without departing from the spirit and scope of the present invention. While the present invention has been shown in the drawings and fully described above with particularity and detail in connection with what is presently deemed to be the most practical and preferred example(s) of the invention, it will be apparent to those of ordinary skill in the art that numerous modifications can be made without departing from the principles and concepts of the invention as set forth herein.
  • Concepts
  • Key Concept A—Covers the Core Data Optimisation Concept
  • Method of optimizing the interaction between an application or database and a database server, comprising the steps of:
      • a. routing data between the application or database and the database server through an optimisation system;
      • b. the optimisation system analysing the data and applying rules to the data to speed up the interaction between the application or database and the database server.
    Concepts Re the Key Functional Advantages
      • Optimisation system enables the interaction between the application/database and the database server to be sufficiently optimised to enable a practical connection to be made over a slow or high latency link such as the Internet.
      • Optimisation system reduces the amount of processing or operations to be performed by the server
      • Optimisation system reduces the amount of data needed to pass between the client application and the database server.
      • Interaction is the flow of data; the cessation of the flow of data; obviating the need for data to flow; managing the flow of data.
    Concepts Re the Key Applications
      • Database server is cloud-based, or on a local network, or on a WAN or if the DB server is local to the application.
      • application or database is deployed, managed or updated to end-users using application virtualisation software.
      • Method allows the number of database servers, or the load on the or each database server required, to be reduced.
      • Method allows the load on the or each database server to be balanced or redirected in cases of fail-over.
    Concepts that Differentiate Over Bespoke DB Coding
      • Optimisation system is added to an existing database client application or database server, and the structure of the tables and/or files of the database running on the database server, are each substantially unchanged by the optimisation system.
      • Optimisation system is not an integral part of the client application or the database server or bespoke coding to the client application or the database server.
      • Optimisation system changes either the application/database or the database server, but not both.
    Concepts Re the Optimisation System Structure
      • Optimisation system is implemented in software and includes a client application or a server application.
      • Optimisation system is implemented in software and includes a client application and a server application.
      • Optimisation system is implemented in hardware.
      • Optimisation system is located between the application/database and the database server.
      • Optimisation system is located on the application/database and/or the database server.
      • Optimisation system includes multiple instances of individual optimisation systems that each provide optimisation services.
      • The multiple instances include a chain or mesh of peers.
      • Path through the multiple instances of individual optimisation systems is variable.
      • Multiple instances of individual optimisation systems are able to communicate amongst themselves.
      • Multiple instances of individual optimisation systems share diagnostics and performance information.
      • Optimisation system can dynamically determine how effective or detrimental a specific rule is and can choose to vary the applied rules to find the optimum performance enhancement.
      • Multiple instances of individual optimisation systems each understand where they are in the chain or mesh of peers between initiator and the server.
      • Server is a SQL server.
      • Data includes DBMS requests and responses.
      • Optimisation system reduces the number of DBMS requests and/or responses.
    Concepts Re the Rules
      • Rule accessed through a rules engine.
      • Rules engine decides when and how to apply rules.
      • Rules define caching of queries.
      • Rules define how to obtain diagnostic, performance, cached data, cachability information.
      • Rules define how to configure other rules.
      • Rules define peer to peer caching of queries.
      • Rules define compression.
      • Rules define encryption.
      • Rules define predictive pre-fetching.
      • Rules define string replacement.
      • Rules define query batching.
      • Rules define re-routing to specific database servers for load balancing or fail-over.
      • Rules define re-routing to specific network paths for speed.
      • Rules define request modification.
      • Rules pre-validate requests.
      • Rules define auditing and logging.
      • Rules automatically tune, adapt or improve.
      • Rules can be selectively enabled or disabled based on factors such as initiator and server addresses or locations, time of day, configuration, server load.
      • Rules are applied at different points in the request/response stream.
      • Rules are custom rules.
  • Key Concept B—Covers the App Store
  • Method of distributing software applications, comprising the steps of:
      • a. providing multiple software applications accessible in an application store;
      • b. routing data between one or more of the software applications and a database server, via a WAN such as the Internet, and through a data optimisation system that applies rules to speed up the interaction between the or each software application and the database server.
    Additional Concepts
      • Software applications includes database client applications.
      • Applications are distributed to end users' PCs.
      • Applications are distributed to system integrators.
      • Database server is cloud-based.
      • Applications are deployed, managed or updated to end-users using application virtualisation software.
  • Key Concept C—Similar in Scope to Key Concept A, but to a System and not the Method Performed by the System
  • A computer system including:
      • a. a remotely accessible database server
      • b. an application or database connected over a network to the database server, and
      • c. an optimisation system
  • in which the optimisation system analyses data requests from the application or database and applies rules to the data to speed up the interaction between the application or database and the database server.
  • Key Concept D—Similar in Scope to Key Concept A, but to the Software Media Storing the Data Accelerator Type Code
  • Computer readable media storing software defining an optimisation system to optimize the flow of data between an application or database and a database server, the optimisation system being operable to analyse the data and apply rules to the data to speed up the interaction between the application or database and die database server.
  • Key Concept E—Optimizing the Interaction Between a File Requestor and a File Server
  • Method of optimizing the interaction between an application or database and a file server, comprising the steps of:
      • a. routing data between the file requestor and the file server through an optimisation system;
      • b. the optimisation system analysing the data and applying rules to the data to speed up the interaction between the file requestor and the file server.
  • Key Concept F—Optimizing the Interaction Between a Web Data Requestor and a Web Server
  • Method of optimizing the interaction between an application or database and a web server, comprising the steps of:
      • a. routing data between the web data requestor and the web server through an optimisation system;
      • b. the optimisation system analysing the data and applying rules to the data to speed up the interaction between the web data requestor and the web server.

Claims (21)

What is claimed is:
1. A method comprising:
receiving a request for a resource on a database server, the request being from a request initiator coupled to a network;
identifying, based on data optimization rules, redundant data in the request, the redundant data being unnecessary for the database server to satisfy the request for the resource;
removing, based on the data optimization rules, the redundant data from the request to create an optimized request;
providing, using the network, the optimized request to the database server.
2. The method of claim 1, wherein the data optimization rules instruct caching the redundant data to produce a cached portion of the request, the optimized request comprising the cached portion of the request.
3. The method of claim 2, wherein the data optimization rules instruct satisfying at least a portion of the request with the cached portion of the request.
4. The method of claim 1, wherein the data optimization rules instruct compressing the request to produce the optimized request.
5. The method of claim 1, wherein the data optimization rules instruct compressing the request based on one or more of a performance measure of the network and a processing measure of the request initiator.
6. The method of claim 1, wherein the data optimization rules instruct pre-caching the request if the resource has been previously requested by the request initiator.
7. The method of claim 1, wherein the data optimization rules instruct:
determining if the request corresponds to a duplicate request in a substantially similar time window as the request; and
stopping queries associated with the request if the request correspond to the duplicate request.
8. The method of claim 1, wherein the data optimization rules instruct:
finding common strings in the request; and
replacing each of the common strings with a replacement identifier, thereby reducing a size of the optimized request.
9. The method of claim 1, wherein the data optimization rules instruct:
identifying database commands in the request that can be replaced with simpler database commands;
replacing the database commands with the simpler database commands.
10. The method of claim 1, wherein the data optimization rules instruct encrypting the request in an encryption envelope, thereby reducing a size of the optimized request.
11. The method of claim 1, wherein identifying the redundant data comprises gathering the data optimization rules from a rules datastore.
12. The method of claim 1, further comprising:
receiving, using the network, a response comprising the resource from the database server in response to the optimized request;
optimizing, based on the data optimization rules, the response to produce an optimized response;
providing the optimized response to the request initiator.
13. The method of claim 12, wherein the data optimization rules instruct:
caching the redundant data to produce a cached portion of the request;
determining, based on the response, if the cached portion of the request has changed;
merging the changed portion of the response with the cached portion of the request.
14. The method of claim 12, wherein the data optimization rules instruct decompressing the response to produce the optimized response.
15. The method of claim 1, wherein the method is performed locally to the request initiator.
16. The method of claim 1, wherein the method is performed remotely to the request initiator.
17. The method of claim 1, wherein the method is performed at a plurality of locations on the network.
18. The method of claim 1, wherein the request initiator is agnostic to the method.
19. A system comprising:
a request initiator;
a data accelerator coupled to the request initiator and to a network;
a rules datastore coupled to the data accelerator;
wherein, in operation:
the request initiator provides a request for a resource on a database server;
the data accelerator:
receives a request for a resource on a database server, the request being from a request initiator coupled to a network;
identifies, based on data optimization rules, redundant data in the request, the redundant data being unnecessary for the database server to satisfy the request for the resource;
removes, based on the data optimization rules, the redundant data from the request to create an optimized request;
provides, using the network, the optimized request to the database server.
20. The system of claim 19, wherein the data accelerator is one of a plurality of data accelerators for the network.
21. A system comprising:
means for receiving a request for a resource on a database server, the request being from a request initiator coupled to a network;
means for identifying, based on data optimization rules, redundant data in the request, the redundant data being unnecessary for the database server to satisfy the request for the resource;
means for removing, based on the data optimization rules, the redundant data from the request to create an optimized request;
means for providing, using the network, the optimized request to the database server.
US14/033,375 2010-02-22 2013-09-20 Method of Optimizing Data Flow Between a Software Application and a Database Server Abandoned US20140025648A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/033,375 US20140025648A1 (en) 2010-02-22 2013-09-20 Method of Optimizing Data Flow Between a Software Application and a Database Server

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
GB1002961.9 2010-02-22
GB201002961 2010-02-22
GB1004449.3 2010-03-17
GBGB1004449.3A GB201004449D0 (en) 2010-02-22 2010-03-17 Data accelerator
GB1011179.7 2010-07-02
GB1011179A GB2478016A (en) 2010-02-22 2010-07-02 Method of optimizing data flow between an application or database and a database server
US12/862,962 US8543642B2 (en) 2010-02-22 2010-08-25 Method of optimizing data flow between a software application and a database server
US14/033,375 US20140025648A1 (en) 2010-02-22 2013-09-20 Method of Optimizing Data Flow Between a Software Application and a Database Server

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/862,962 Continuation US8543642B2 (en) 2010-02-22 2010-08-25 Method of optimizing data flow between a software application and a database server

Publications (1)

Publication Number Publication Date
US20140025648A1 true US20140025648A1 (en) 2014-01-23

Family

ID=42227867

Family Applications (5)

Application Number Title Priority Date Filing Date
US12/862,962 Active 2031-02-15 US8543642B2 (en) 2010-02-22 2010-08-25 Method of optimizing data flow between a software application and a database server
US13/880,707 Active 2033-07-19 US9396228B2 (en) 2010-02-22 2011-02-22 Method of optimizing the interaction between a software application and a database server or other kind of remote data source
US14/033,375 Abandoned US20140025648A1 (en) 2010-02-22 2013-09-20 Method of Optimizing Data Flow Between a Software Application and a Database Server
US14/728,817 Abandoned US20150294002A1 (en) 2010-02-22 2015-06-02 Data accelerator for managing data transmission
US15/213,272 Abandoned US20170046381A1 (en) 2010-02-22 2016-07-18 Method of optimizing the interaction between a software application and a database server or other kind of remote data source

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US12/862,962 Active 2031-02-15 US8543642B2 (en) 2010-02-22 2010-08-25 Method of optimizing data flow between a software application and a database server
US13/880,707 Active 2033-07-19 US9396228B2 (en) 2010-02-22 2011-02-22 Method of optimizing the interaction between a software application and a database server or other kind of remote data source

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14/728,817 Abandoned US20150294002A1 (en) 2010-02-22 2015-06-02 Data accelerator for managing data transmission
US15/213,272 Abandoned US20170046381A1 (en) 2010-02-22 2016-07-18 Method of optimizing the interaction between a software application and a database server or other kind of remote data source

Country Status (3)

Country Link
US (5) US8543642B2 (en)
GB (4) GB201004449D0 (en)
WO (1) WO2011101691A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140372388A1 (en) * 2013-06-14 2014-12-18 International Business Machines Corporation Hashing scheme using compact array tables
US9292560B2 (en) 2013-01-30 2016-03-22 International Business Machines Corporation Reducing collisions within a hash table
US9311359B2 (en) 2013-01-30 2016-04-12 International Business Machines Corporation Join operation partitioning
US9405858B2 (en) 2013-06-14 2016-08-02 International Business Machines Corporation On-the-fly encoding method for efficient grouping and aggregation
US9461971B1 (en) * 2014-07-10 2016-10-04 Emc Satcom Technologies Llc Optional compression of secure network traffic
WO2017035451A1 (en) * 2015-08-26 2017-03-02 Abb Schweiz Ag Distributed utility resource planning and forecast
US9672248B2 (en) 2014-10-08 2017-06-06 International Business Machines Corporation Embracing and exploiting data skew during a join or groupby
US9922064B2 (en) 2015-03-20 2018-03-20 International Business Machines Corporation Parallel build of non-partitioned join hash tables and non-enforced N:1 join hash tables
US10108653B2 (en) 2015-03-27 2018-10-23 International Business Machines Corporation Concurrent reads and inserts into a data structure without latching or waiting by readers
US10303791B2 (en) 2015-03-20 2019-05-28 International Business Machines Corporation Efficient join on dynamically compressed inner for improved fit into cache hierarchy
US10650011B2 (en) 2015-03-20 2020-05-12 International Business Machines Corporation Efficient performance of insert and point query operations in a column store
US10831736B2 (en) 2015-03-27 2020-11-10 International Business Machines Corporation Fast multi-tier indexing supporting dynamic update
WO2020247557A1 (en) * 2019-06-04 2020-12-10 Phantom Auto Inc. Platform for redundant wireless communications optimization
US11223667B2 (en) 2019-04-30 2022-01-11 Phantom Auto Inc. Low latency wireless communication system for teleoperated vehicle environments

Families Citing this family (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8775488B2 (en) * 2010-04-14 2014-07-08 Siemens Product Lifecycle Management Software Inc. System and method for data caching
US8856775B2 (en) * 2010-09-22 2014-10-07 International Business Machines Corporation Unstacking software components for migration to virtualized environments
WO2012065265A1 (en) * 2010-11-16 2012-05-24 Rayan Zachariassen Endpoint caching for data storage systems
US10108993B2 (en) * 2010-12-15 2018-10-23 Red Hat, Inc. Data driven rules engine to dynamically change product business rules
US9880796B2 (en) 2011-03-08 2018-01-30 Georgia Tech Research Corporation Rapid view mobilization for enterprise applications
TW201249198A (en) * 2011-04-21 2012-12-01 Sony Corp Supplying apparatus, supplying method, receiving apparatus, receiving method, program, and broadcasting system
US9009138B2 (en) * 2011-06-17 2015-04-14 International Business Machines Corporation Transparent analytical query accelerator
US9037680B2 (en) * 2011-06-29 2015-05-19 Instart Logic, Inc. Application acceleration
US9351028B2 (en) * 2011-07-14 2016-05-24 Qualcomm Incorporated Wireless 3D streaming server
US9521214B2 (en) 2011-09-20 2016-12-13 Instart Logic, Inc. Application acceleration with partial file caching
US8914502B2 (en) 2011-09-27 2014-12-16 Oracle International Corporation System and method for dynamic discovery of origin servers in a traffic director environment
US8671389B1 (en) 2011-09-27 2014-03-11 Google Inc. Web application resource manager on the web and localizable components
US9760236B2 (en) 2011-10-14 2017-09-12 Georgia Tech Research Corporation View virtualization and transformations for mobile applications
US9251037B2 (en) * 2011-11-04 2016-02-02 Hewlett Packard Enterprise Development Lp Providing elastic insight to information technology performance data
KR101329346B1 (en) * 2011-11-23 2013-12-19 건국대학교 산학협력단 A building system and method of cloud computing for parallel integrated medical information processing
JP5561298B2 (en) * 2012-03-23 2014-07-30 横河電機株式会社 Process control system
WO2013147821A1 (en) 2012-03-29 2013-10-03 Empire Technology Development, Llc Determining user key-value storage needs from example queries
KR101617987B1 (en) 2012-04-01 2016-05-03 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 Machine learning for database migration source
US20130275685A1 (en) * 2012-04-16 2013-10-17 International Business Machines Corporation Intelligent data pre-caching in a relational database management system
US9015744B1 (en) 2012-06-25 2015-04-21 IMBD.com, Inc. Ascertaining events in media
US9183540B2 (en) * 2012-07-03 2015-11-10 Sap Se Mobile device analytics engine
US10482135B2 (en) * 2012-07-12 2019-11-19 Salesforce.Com, Inc. Facilitating dynamic generation and customization of software applications at client computing devices using server metadata in an on-demand services environment
US11023487B2 (en) 2013-03-04 2021-06-01 Sap Se Data replication for cloud based in-memory databases
US9178931B2 (en) * 2013-03-12 2015-11-03 Pixia Corp. Method and system for accessing data by a client from a server
US9483655B2 (en) 2013-03-12 2016-11-01 Commvault Systems, Inc. File backup with selective encryption
US10318399B2 (en) * 2013-03-12 2019-06-11 Netflix, Inc. Using canary instances for software analysis
US10284649B2 (en) * 2013-05-31 2019-05-07 Nec Corporation Distributed processing system
US9225621B2 (en) * 2013-06-25 2015-12-29 Netflix, Inc. Progressive deployment and termination of canary instances for software analysis
US10362145B2 (en) * 2013-07-05 2019-07-23 The Boeing Company Server system for providing current data and past data to clients
US20150149218A1 (en) * 2013-11-22 2015-05-28 Gulfstream Telematics LLC Detection System for Analyzing Crash Events and Methods of the Same
US10311054B2 (en) * 2014-01-08 2019-06-04 Red Hat, Inc. Query data splitting
US10412016B2 (en) * 2014-01-30 2019-09-10 Salesforce.Com, Inc. Streaming information based on available bandwidth
CN104836821B (en) * 2014-02-10 2019-03-19 腾讯科技(深圳)有限公司 A kind of network accelerating method based on router device, device and equipment
US20150271225A1 (en) * 2014-03-18 2015-09-24 Qualcomm Incorporated Transport accelerator implementing extended transmission control functionality
US9433859B1 (en) 2014-04-08 2016-09-06 Kabam, Inc. Frequency based request throttling and aggregation
GB2525613A (en) * 2014-04-29 2015-11-04 Ibm Reduction of processing duplicates of queued requests
US9712542B1 (en) * 2014-06-27 2017-07-18 Amazon Technologies, Inc. Permissions decisions in a service provider environment
US9792447B2 (en) * 2014-06-30 2017-10-17 Nicira, Inc. Method and apparatus for differently encrypting different flows
US9405928B2 (en) * 2014-09-17 2016-08-02 Commvault Systems, Inc. Deriving encryption rules based on file content
US10027573B2 (en) 2014-10-10 2018-07-17 At&T Intellectual Property I, L.P. Centralized radio access network virtualization mechanism
KR20160065504A (en) * 2014-12-01 2016-06-09 엘지전자 주식회사 Multimedia device and method for controlling the same
US9465956B2 (en) * 2014-12-23 2016-10-11 Yahoo! Inc. System and method for privacy-aware information extraction and validation
US9582306B2 (en) 2015-03-31 2017-02-28 At&T Intellectual Property I, L.P. Method and system to dynamically instantiate virtual repository for any services
US10067989B2 (en) * 2015-04-17 2018-09-04 Microsoft Technology Licensing, Llc Technologies for mining temporal patterns in big data
US10255336B2 (en) * 2015-05-07 2019-04-09 Datometry, Inc. Method and system for transparent interoperability between applications and data management systems
US10313256B2 (en) * 2015-05-21 2019-06-04 Intel Corporation Apparatus and methods for adaptive data compression
US20170039212A1 (en) * 2015-08-04 2017-02-09 Utomik Bv Method and system for managing client data replacement
US9792108B2 (en) 2015-08-12 2017-10-17 Comcast Cable Communications, Llc Scheme for managing last-modified information
US10594779B2 (en) 2015-08-27 2020-03-17 Datometry, Inc. Method and system for workload management for data management systems
CN106657182B (en) 2015-10-30 2020-10-27 阿里巴巴集团控股有限公司 Cloud file processing method and device
CN106933872A (en) * 2015-12-30 2017-07-07 阿里巴巴集团控股有限公司 A kind of method and device that cloud storage service is accessed by traditional file systemses interface
US10089339B2 (en) * 2016-07-18 2018-10-02 Arm Limited Datagram reassembly
US10178173B2 (en) * 2016-08-02 2019-01-08 International Business Machines Corporation Cloud service utilization
US10387223B2 (en) * 2016-10-31 2019-08-20 Intuit Inc. Processing application programming interface (API) queries based on variable schemas
US20180276213A1 (en) * 2017-03-27 2018-09-27 Home Depot Product Authority, Llc Methods and system for database request management
US10938902B2 (en) * 2017-05-31 2021-03-02 Microsoft Technology Licensing, Llc Dynamic routing of file system objects
US20190014026A1 (en) * 2017-07-05 2019-01-10 Ford Global Technologies, Llc Method and apparatus for ignition state monitoring
CN110019259B (en) * 2017-09-26 2023-09-22 亿阳信通股份有限公司 Data updating method, device and storage medium of distributed index service engine
US11294869B1 (en) 2018-12-19 2022-04-05 Datometry, Inc. Expressing complexity of migration to a database candidate
US11620291B1 (en) 2018-12-19 2023-04-04 Datometry, Inc. Quantifying complexity of a database application
US11615062B1 (en) 2018-12-20 2023-03-28 Datometry, Inc. Emulation of database catalog for migration to a different database
JP7259456B2 (en) * 2019-03-25 2023-04-18 富士フイルムビジネスイノベーション株式会社 Information processing device and program
US11063823B2 (en) 2019-06-19 2021-07-13 International Business Machines Corporation Inter-service data transportation through data fragmentation and socket replication
KR20190096853A (en) * 2019-07-30 2019-08-20 엘지전자 주식회사 Speech processing method and apparatus therefor
CN110515850B (en) * 2019-08-29 2023-10-24 北京拉勾网络技术有限公司 Application program testing method, mobile terminal and storage medium
US11916765B2 (en) 2019-10-23 2024-02-27 Aryaka Networks, Inc. Correlation score based commonness indication associated with a point anomaly pertinent to data pattern changes in a cloud-based application acceleration as a service environment
US11070440B2 (en) 2019-10-23 2021-07-20 Aryaka Networks, Inc. Efficient detection and prediction of data pattern changes in a cloud-based application acceleration as a service environment
US11093477B1 (en) * 2020-03-17 2021-08-17 International Business Machines Corporation Multiple source database system consolidation
US11514100B2 (en) * 2020-12-17 2022-11-29 EMC IP Holding Company LLC Automatic detection and identification of gold image library files and directories
US11513904B2 (en) * 2020-12-17 2022-11-29 EMC IP Holding Company LLC Gold image library management system to reduce backup storage and bandwidth utilization
CN114780501A (en) * 2021-01-22 2022-07-22 伊姆西Ip控股有限责任公司 Data processing method, electronic device and computer program product
US20230004533A1 (en) * 2021-07-01 2023-01-05 Microsoft Technology Licensing, Llc Hybrid intermediate stream format
CN113791904B (en) * 2021-09-13 2022-11-08 北京百度网讯科技有限公司 Method, apparatus, device and readable storage medium for processing query input
US11848990B2 (en) * 2021-10-15 2023-12-19 Siden, Inc. Method and system for distributing and storing content using local clouds and network clouds
US11606432B1 (en) * 2022-02-15 2023-03-14 Accenture Global Solutions Limited Cloud distributed hybrid data storage and normalization
CN115239513B (en) * 2022-08-09 2022-12-23 杭州美云数据科技有限公司 Sharing farm intelligent operation system applied to village happy service
US20240086320A1 (en) * 2022-09-08 2024-03-14 Tencent America LLC Method of sharing unreal engine derived data cache files

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6973477B1 (en) * 1995-05-19 2005-12-06 Cyberfone Technologies, Inc. System for securely communicating amongst client computer systems

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5822747A (en) * 1996-08-23 1998-10-13 Tandem Computers, Inc. System and method for optimizing database queries
US6604143B1 (en) * 1998-06-19 2003-08-05 Sun Microsystems, Inc. Scalable proxy servers with plug-in filters
US6370522B1 (en) * 1999-03-18 2002-04-09 Oracle Corporation Method and mechanism for extending native optimization in a database system
US7039639B2 (en) * 1999-03-31 2006-05-02 International Business Machines Corporation Optimization of system performance based on communication relationship
US20030158842A1 (en) * 2002-02-21 2003-08-21 Eliezer Levy Adaptive acceleration of retrieval queries
US8086568B2 (en) * 2002-02-26 2011-12-27 International Business Machines Corporation Peer to peer (P2P) concept query notification of available query augmentation within query results
US7356523B2 (en) * 2002-05-23 2008-04-08 International Business Machines Corporation Dynamic optimization of prepared statements in a statement pool
US7127463B2 (en) * 2002-04-18 2006-10-24 International Business Machines Corporation Optimization of database network traffic based upon data-use analysis
US20040243555A1 (en) * 2003-05-30 2004-12-02 Oracle International Corp. Methods and systems for optimizing queries through dynamic and autonomous database schema analysis
US7685437B2 (en) * 2003-05-30 2010-03-23 International Business Machines Corporation Query optimization in encrypted database systems
US7467131B1 (en) * 2003-09-30 2008-12-16 Google Inc. Method and system for query data caching and optimization in a search engine system
WO2005076160A1 (en) 2004-02-06 2005-08-18 Critical Software, Sa Data warehouse distributed system and architecture to support distributed query execution
CN101495955B (en) * 2005-12-12 2013-06-19 特捷通讯公司 Mobile device retrieval and navigation
US7685194B2 (en) * 2006-08-31 2010-03-23 Microsoft Corporation Fine-grained access control in a database by preventing information leakage and removing redundancy
US7814095B2 (en) * 2006-12-27 2010-10-12 Sybase, Inc. Optimizing the navigation of one-to-one and one-to-many relationships using query batching in named transactions
US7966321B2 (en) * 2007-01-17 2011-06-21 Google Inc. Presentation of local results
US8095618B2 (en) * 2007-03-30 2012-01-10 Microsoft Corporation In-memory caching of shared customizable multi-tenant data
US8126873B2 (en) * 2007-04-13 2012-02-28 International Business Machines Corporation Portable and iterative re-usable suboptimization of database queries
US20090043745A1 (en) * 2007-08-07 2009-02-12 Eric L Barsness Query Execution and Optimization with Autonomic Error Recovery from Network Failures in a Parallel Computer System with Multiple Networks
US7917501B2 (en) * 2007-11-12 2011-03-29 International Business Machines Corporation Optimization of abstract rule processing
US20100121968A1 (en) * 2008-11-11 2010-05-13 Qwebl, Inc. System and method for automating operations of household systems from remote applications
KR20120039049A (en) * 2009-07-29 2012-04-24 코닌클리즈케 필립스 일렉트로닉스 엔.브이. Managing atmosphere programs for atmosphere creation systems
US9209652B2 (en) * 2009-08-21 2015-12-08 Allure Energy, Inc. Mobile device with scalable map interface for zone based energy management
US20110154208A1 (en) * 2009-12-18 2011-06-23 Nokia Corporation Method and apparatus for utilizing communication history
US9594384B2 (en) * 2012-07-26 2017-03-14 Honeywell International Inc. Method of associating an HVAC controller with an external web service
US9292568B2 (en) * 2012-10-10 2016-03-22 Dell Products L.P. Method and system for dynamically optimizing client queries to read-mostly servers

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6973477B1 (en) * 1995-05-19 2005-12-06 Cyberfone Technologies, Inc. System for securely communicating amongst client computer systems

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9317548B2 (en) 2013-01-30 2016-04-19 International Business Machines Corporation Reducing collisions within a hash table
US9292560B2 (en) 2013-01-30 2016-03-22 International Business Machines Corporation Reducing collisions within a hash table
US9311359B2 (en) 2013-01-30 2016-04-12 International Business Machines Corporation Join operation partitioning
US9665624B2 (en) 2013-01-30 2017-05-30 International Business Machines Corporation Join operation partitioning
US9471710B2 (en) 2013-06-14 2016-10-18 International Business Machines Corporation On-the-fly encoding method for efficient grouping and aggregation
US9367556B2 (en) * 2013-06-14 2016-06-14 International Business Machines Corporation Hashing scheme using compact array tables
US9405858B2 (en) 2013-06-14 2016-08-02 International Business Machines Corporation On-the-fly encoding method for efficient grouping and aggregation
US10592556B2 (en) 2013-06-14 2020-03-17 International Business Machines Corporation On-the-fly encoding method for efficient grouping and aggregation
US20140372388A1 (en) * 2013-06-14 2014-12-18 International Business Machines Corporation Hashing scheme using compact array tables
US9317517B2 (en) 2013-06-14 2016-04-19 International Business Machines Corporation Hashing scheme using compact array tables
US9461971B1 (en) * 2014-07-10 2016-10-04 Emc Satcom Technologies Llc Optional compression of secure network traffic
US9672248B2 (en) 2014-10-08 2017-06-06 International Business Machines Corporation Embracing and exploiting data skew during a join or groupby
US10489403B2 (en) 2014-10-08 2019-11-26 International Business Machines Corporation Embracing and exploiting data skew during a join or groupby
US9922064B2 (en) 2015-03-20 2018-03-20 International Business Machines Corporation Parallel build of non-partitioned join hash tables and non-enforced N:1 join hash tables
US11061878B2 (en) 2015-03-20 2021-07-13 International Business Machines Corporation Parallel build of non-partitioned join hash tables and non-enforced N:1 join hash tables
US10650011B2 (en) 2015-03-20 2020-05-12 International Business Machines Corporation Efficient performance of insert and point query operations in a column store
US10303791B2 (en) 2015-03-20 2019-05-28 International Business Machines Corporation Efficient join on dynamically compressed inner for improved fit into cache hierarchy
US10387397B2 (en) 2015-03-20 2019-08-20 International Business Machines Corporation Parallel build of non-partitioned join hash tables and non-enforced n:1 join hash tables
US10394783B2 (en) 2015-03-20 2019-08-27 International Business Machines Corporation Parallel build of non-partitioned join hash tables and non-enforced N:1 join hash tables
US10831736B2 (en) 2015-03-27 2020-11-10 International Business Machines Corporation Fast multi-tier indexing supporting dynamic update
US10108653B2 (en) 2015-03-27 2018-10-23 International Business Machines Corporation Concurrent reads and inserts into a data structure without latching or waiting by readers
US11080260B2 (en) 2015-03-27 2021-08-03 International Business Machines Corporation Concurrent reads and inserts into a data structure without latching or waiting by readers
US10250034B2 (en) 2015-08-26 2019-04-02 Abb Schweiz Ag Distributed utility resource planning and forecast
WO2017035451A1 (en) * 2015-08-26 2017-03-02 Abb Schweiz Ag Distributed utility resource planning and forecast
US11223667B2 (en) 2019-04-30 2022-01-11 Phantom Auto Inc. Low latency wireless communication system for teleoperated vehicle environments
US11799936B2 (en) 2019-04-30 2023-10-24 Phantom Auto Inc. Low latency wireless communication system for teleoperated vehicle environments
WO2020247557A1 (en) * 2019-06-04 2020-12-10 Phantom Auto Inc. Platform for redundant wireless communications optimization
US11223556B2 (en) 2019-06-04 2022-01-11 Phantom Auto Inc. Platform for redundant wireless communications optimization
US11706129B2 (en) 2019-06-04 2023-07-18 Phantom Auto Inc. Platform for redundant wireless communications optimization

Also Published As

Publication number Publication date
GB2478016A (en) 2011-08-24
GB2478189A (en) 2011-08-31
US20150294002A1 (en) 2015-10-15
GB201004449D0 (en) 2010-05-05
US9396228B2 (en) 2016-07-19
GB201103043D0 (en) 2011-04-06
WO2011101691A1 (en) 2011-08-25
GB2491751A (en) 2012-12-12
GB201216375D0 (en) 2012-10-31
US20110208808A1 (en) 2011-08-25
US8543642B2 (en) 2013-09-24
US20170046381A1 (en) 2017-02-16
GB201011179D0 (en) 2010-08-18
US20130325927A1 (en) 2013-12-05

Similar Documents

Publication Publication Date Title
US8543642B2 (en) Method of optimizing data flow between a software application and a database server
Varia Migrating your existing applications to the aws cloud
EP2279602B1 (en) Systems and methods for remoting multimedia plugin calls
Coyne et al. IBM private, public, and hybrid cloud storage solutions
US11411921B2 (en) Enabling access across private networks for a managed blockchain service
CN103959264A (en) Managing redundant immutable files using deduplication in storage clouds
US11360856B2 (en) Manifest index for block-level snapshots
US20190065536A1 (en) Modifying archive data without table changes
US20210216502A1 (en) System and method for synchronizing delete operations between primary and secondary databases
CN115344548A (en) Predictive storage service
US20220100386A1 (en) Snapshot block storage path structure
CN103595799A (en) Method for achieving distributed shared data bank
US10976953B2 (en) Optimized data replication in multi-tier storage environment
US20210158201A1 (en) Dynamically predict optimal parallel apply algorithms
Kryvenchuk et al. Research of servers and protocols as means of accumulation, processing and operational transmission of measured information
US11645284B2 (en) Distributed join filters in a dynamic distributed data processing service
CN116204580A (en) Replicating account security features in a multi-deployment database
US20210344771A1 (en) System and Method for Cloud Computing
CN115485677A (en) Secure data replication in a distributed data storage environment
JP2022549076A (en) Methods, systems and programs for improving cacheability of single page applications
US11656957B1 (en) Managing nodes of a DBMS
US10592415B2 (en) Modified consistency hashing rings for object store controlled WAN cache infrastructure
US20210382874A1 (en) System and method for performing online archiving operations
Cardenas et al. Management of a cooperative cache in grids with grid cache services
WO2023078003A1 (en) Optimizing cloud query execution

Legal Events

Date Code Title Description
AS Assignment

Owner name: DATA ACCELERATOR LTD., UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CORBETT, SEAN P.;ELLIOTT, EDWARD PHILIP EDWIN;CLOTHIER, MATTHEW P.;REEL/FRAME:031499/0483

Effective date: 20131029

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION