WO2001006413A1 - System for accessing database tables mapped into memory for high performance data retrieval - Google Patents

System for accessing database tables mapped into memory for high performance data retrieval Download PDF

Info

Publication number
WO2001006413A1
WO2001006413A1 PCT/US1999/016769 US9916769W WO0106413A1 WO 2001006413 A1 WO2001006413 A1 WO 2001006413A1 US 9916769 W US9916769 W US 9916769W WO 0106413 A1 WO0106413 A1 WO 0106413A1
Authority
WO
WIPO (PCT)
Prior art keywords
database
information
file
recited
access
Prior art date
Application number
PCT/US1999/016769
Other languages
French (fr)
Inventor
Mikael Dahlberg
Original Assignee
American Management Systems, Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by American Management Systems, Incorporated filed Critical American Management Systems, Incorporated
Priority to CA002302303A priority Critical patent/CA2302303A1/en
Priority to EP99937435A priority patent/EP1204938A1/en
Priority to AU52274/99A priority patent/AU5227499A/en
Publication of WO2001006413A1 publication Critical patent/WO2001006413A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • G06F16/24534Query rewriting; Transformation
    • G06F16/24539Query rewriting; Transformation using cached or materialised query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/217Database tuning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • G06F16/24534Query rewriting; Transformation
    • G06F16/24547Optimisations to support specific applications; Extensibility of optimisers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99943Generating database or data structure, e.g. via user interface

Definitions

  • a microfiche appendix having 3 microfiche and 216 frames is included herewith and includes a detailed design specification of the present invention.
  • the present invention is directed to a system for enhancing application processing performance involving read-only access to database tables. More particularly, to a system to enhance execution of complex business transaction applications, such as those performed in telecommunications billing systems, that requires quick access to data stored in a database by placing a portion of the data into RAM memory using a master file and an incremental file.
  • SUBSTITUTE SHEET (RULE 25) It is also an object of the present invention to provide a method of accessing a database by placing information extracted from the database into a first data structure in memory. Then the present invention updates the information in memory periodically or when requested when a change in the information occurs in the database by placing the updated information into a second data structure in memory which is linked to the first data structure.
  • the above objects can be attained by a system and method that partially or fully extracts data from a database and places the data in RAM for access by application programs. Further, the foregoing objects can be attained by a system and method that updates data in RAM (random access memory), transparent to the application programs, whenever the data changes in the database.
  • RAM random access memory
  • Figure 2 is an overall hardware and software layer configuration of the present invention.
  • Figure 3 is a data flow diagram of the present invention.
  • Figure 4 is a flowchart of the algorithm to create full extractions in the present invention.
  • Figure 5 is a diagram depicting an example of the full and incremental extraction of data in the present invention.
  • Figure 6 is a flowchart of the algorithm used to create incremental extractions in the present invention.
  • Figure 7 is a flowchart of the algorithm used to access incremental extractions in the present invention.
  • Figure 8 is a flowchart of the algorithm used to advance to the next valid entry in the present invention.
  • Figure 9 is a flowchart of the algorithm used to skip invalid entries in the present invention.
  • Figure 10 is an example identifying incremental information using a database table and a trigger table in the present invention.
  • Figure 11 further illustrates the example shown in figure 10.
  • Figure 1 is an overall modular configuration of the present invention illustrating the major modular components thereof.
  • Xref Framework 10 has three fundamental modules including: Xref Storage Manager 20 (XSM 20); ExtractManager 30; and the Xref Interface 40. Each of these modules will be discussed in detail below.
  • the XSM 20 module is used to extract the information stored in database 60 and transfer it to Xref files 50.
  • Xref files 50 comprise several standard flat files.
  • a flat file is sequential file of a single record type with no linked structures or direct record access capability.
  • Each Xref file 50 contains only entries (possibly converted) returned by a system query language ("SQL") select statement as configured for the database 60.
  • SQL system query language
  • Application 70 and application 80 are notified when full extracts or updates are available by XSM 20.
  • Applications 70 and 80 utilize the high performance access to data provided by the Xref Framework 10 for the specific business process that they perform. An example of such a business process where performance is essential is rating and billing of large telecommunication customer accounts.
  • XSM 20 is able to extract incremental updates from database 60 and place them into separate update files which are part of the Xref Files 50. These incremental updates contain information for rows in the database 60 that have been changed, added or deleted since the last
  • SUBSTITUTE SHEET (RULE 25) full extraction of the database 60.
  • the incremental extraction is needed because full extraction is a slow process and it would introduce a performance problem to force the applications 70 and 80 using the Xref Interface 40 to reload a new version of the full extracted Xref files 50 for each new extraction.
  • the applications 70 and 80 are notified as soon as an incremental update is available by XSM 20 sending a message to the Xref interface 40.
  • ExtractManager 30 is a module that sends messages to the XSM 20 and tells XSM 20 which database 60 table(s) to extract and whether to perform a full or incremental extraction.
  • the ExtractManager 30 is run periodically to send a message to XSM 20 requesting XSM 20 to create incremental extracts. This ensures that applications 70 and 80 using extracted data, are provided with updates at periodic intervals.
  • Xref Interface 40 is the part of the framework used by applications to manage and access data stored in
  • the Xref Interface 40 manages the mapping of Xref files 50 to memory and handles access of incremental updates, transparent to applications 70 and 80. Memory (not shown) storing the Xref data extracted from database 60 is shared by applications 70 and 80 to improve performance and save resources.
  • SUBST ⁇ UTE SHEET (RULE 25) as methods for stepping through some or all entries.
  • the queries supported are: searching for a certain entries using a key; searching for the best matching entry using a key; searching using a key and an effective date. Also supported is stepping through some or all entries in the order provided in the Xref Files 50 starting at the entry returned by a query with respect to incremental updates and effective date.
  • Figure 2 is an overall hardware and software layer configuration of the present invention. As shown in Figure 2, the present invention is implemented in a distributed client server system format comprising an application server 100 and a database server
  • the application server 100 is implemented using application code 102 (C++ programming language) running on a HP-UNIX 110 platform.
  • the application server 100 also uses an Oracle database 106 to store persistent objects.
  • XSM 20, ExtractManager 30 and applications 70 and 80 using the Xref Interface 40 reside on the application server 100.
  • the Xref Framework 10 uses the Oracle client libraries to access the database server 120.
  • the Xref Framework 10 components communicate using an asynchronous message queuing system, see 130 figure 3, provided by the infrastructure 104. The de- coupling of the Xref components using queues allows distributed deployment and flexible configuration of the system.
  • the database server 120 hosts the Oracle database 116 running on a HP JNIX 110 platform.
  • the Xref Framework 10 uses Oracle database 114 triggers to identify data to be included in incremental updates.
  • FIG. 3 is a data flow diagram of the present invention.
  • the XSM 20 is started and sends a broadcast message to all applications
  • Applications 70 and 80 announcing its availability via queue 130.
  • Applications 70 and 80 send a registration message to XSM 20 via Xref Interface 40 and message queuing system 130 to indicate which database tables 62 they want to use.
  • the ExtractManager 30 is started and sends a message using the message queuing system 130 to XSM 20 to generate a full extraction of one or multiple tables 62 in database 60.
  • Database 60 contains table 62 and trigger table 64.
  • XSM 20 When XSM 20 receives the message from the message queuing system 130 to perform a full extraction, XSM 20 executes a query to retrieve all data from table 62 and writes the information to the Xref master file 56. When the extraction process has finished, XSM 20 sends a message using the message queuing system 130, to all registered applications 70 and 80 interested in the extracted table, to announce that a full extraction is ready for use.
  • Application 70 uses the Xref Interface 40 to load the data into shared memory 150 from master file 56 and also to access the data through the Xref Interface 40 from shared memory 150. If application 80 is interested in the same data as used by application 70 and both processes reside on the same application server 100, as shown in Figure 2, the Xref Interface 40 will share the memory 150 already used by Application
  • SUBST ⁇ UTE SHEET (RULE 25) 70 The sharing of memory saves important resources and improves performance since the data only needs to be loaded to memory once. Still referring to Figure 3, application 90 modifies the data in the table 62 that was extracted earlier. This change in table 62 causes database triggers 114, shown in Figure 2, to be executed in database
  • the database triggers 114 then copy the modified data to the trigger table 64 and mark it with a time stamp, sequence number and a type code for the modification.
  • the ExtractManager 30 is executed periodically and sends a message using the message queuing system 130 instructing XSM 20 to create an incremental extraction.
  • XSM 20 scans the corresponding trigger table 64 for rows that have not been included in the last full extraction. This is determined using the time stamp on each row.
  • XSM 20 uses this data to create an incremental file 52 and an index file 54.
  • XSM 20 then sends a notification message to all registered applications 70 and 80 using the message queuing system 130, announcing that a new incremental update is available.
  • the Xref interface 40 is used by application 70 and 80 to load the incremental file 52 and the index file 54 into shared memory 150.
  • Applications 70 and 80 are now provided with the updated information. This processing is transparent to the application logic of application 70 and 80. Once either application 70 or 80 terminate or are no longer interested in Xref data, application 70 or 80 send a message to XSM 20 to using the message queuing system 130. XSM 20 will not send further update messages to applications 70 or 80.
  • the XSM 20 provides the capability of creating full database extractions and saving the extracted information to a Xref master file 56.
  • a SQL seiect statement can be created for the extraction process. This provides the ability to do a partial or a full database extraction based on business needs.
  • Creating a full extraction of a large table is processor intensive. Full table extractions need to be created in two situations. First, upon start up of the system, the Xref files 50 must be created. Second, when incremental update information reaches such a volume that the application accessing the data is noticeably slowed.
  • the rows in the trigger table 64 can either be deleted or kept to provide the history of modifications applied to the table 60. in the case where the rows in the trigger table 64 are kept, the rows need to be marked so that they are not included in the next incremental extract. This marking can either be achieved by adding an additional column to the trigger table 64 in order to mark rows or to use a time stamp on each row to identify the updates that were performed after the last full extract took place. The description that is provided herein utilizes a time stamp for this purpose.
  • Figure 4 is a flowchart of the algorithm used to create full extractions in the present invention. Once a request for a full database extraction is received, the extraction process starts by initiating XSM 20, shown in Figure 1 , in operation 1000 of Figure 4. In
  • XSM 20 starts by retrieving 1010 the SQL select statement
  • SUBSTITUTE SHEET (RULE 25) configured for the table to be extracted. This provides the flexibility to only extract the data required for the business process and helps to save resources.
  • XSM 20 now extracts all the data in the database table using the created SQL select statement in operation 1030. If other applications are allowed to update the table while the extraction is in process, it is possible that the trigger table 64 will contain entries that are also contained in the full extraction. These additional entries are filtered out when generating an incremental extraction.
  • the extracted data is converted into structures in memory 150 and data conversion is performed if necessary.
  • the data structures are the data containers in memory 150 where the data is accessed. This provides a mechanism to have different data representations in applications using the database 60 and applications 70 and 80 using the present invention.
  • Xref Interface 40 will only need to reload the updated information. As disk access is slow relative to RAM memory access, this is a major performance advantage.
  • XSM 20 is able to extract incremental updates into separate files 52, 54.
  • the incremental updates contain information for rows in the table 62 that have been changed, added or deleted since the last full extraction of the table 62.
  • the Xref Interface 40 provides a completely transparent interface to the incremental information and an application 70 or 80 using a Xref table will not know if it is receiving an entry from the full extraction or from the incremental extraction. In this way incremental updates can be switched on or off for individual database tables 60 without having any impact on the applications 70 or 80 using those tables 60.
  • the master file 56 and the incremental file 54 can be merged periodically. This keeps the size of the incremental file small, which in turn increases the access performance and avoids the need to perform performance intensive full extractions.
  • This implementation uses trigger table 64 for this purpose.
  • the trigger table 64 contains the complete row data, a field used to distinguish between insertions, updates and deletions and a sequence number that is needed to keep the database operations in a consistent order.
  • the database trigger (not shown) provides the necessary logic for generating the sequence number.
  • XSM 20 uses the primary key, see 641 in figure 10 and 561 in figure 5, to link entries in the trigger table 64 to entries in the master file 56 when performing an incremental extract.
  • FIG. 10 depicts an example where table 62, shown in Figure 3, contains business data and trigger table 64, shown in figure
  • SUBSTITUTE SHEET (RULE 25) incremental updates.
  • table 62 is initially filled with three data rows 624, 625 and 626.
  • the trigger table 64 is initially empty.
  • the table 62 contains effective dated data. This means that for a particular primary key multiple entries can exist over time. For processing only the entry active on the processing date is considered.
  • the table 62 comprises three items, First, the primary key column 621 used to identify logical objects. Second, the effective date column 622 used to specify the date when a particular entry is active. Third, the data column 623 that contains the business data contained in the row.
  • the trigger table 64 consists of six columns.
  • the first three columns 641 , 642 and 643 replicate the data of columns 621 , 622 and 623 in table 62.
  • the update type 644 coiumn is used to distinguish between insertions, updates and deletions.
  • the sequence number column 645 is needed to keep database operation in a consistent order.
  • the time stamp column 646 is used to determine whether trigger table entries have been included in the last full extract when performing a full extract. Starting with this data scenario shown in figure 10 a full extract is created of the table 62.
  • the master file 56 contains the data as depicted in figure 5, discussed in detail below.
  • the master file 56 shown in figure 5, comprises the three fields 561 , 563, 565 containing the data of columns 621 , 622 and 623 in table 62.
  • one or multiple applications 90 as shown in figure 3, modify table 62 containing the
  • SUBSTITUTE SHEET (RULE 25) business data. Each modification fires database triggers that write the information about the modification to the trigger table 64.
  • a row 627 with a primary key of 2 is inserted. This event is marked in the trigger table as row 649 with the sequence number 5002 in figure 11. 4.
  • a new effective dated entry 628 is inserted for the row with the primary key 3. This event is marked in the trigger table as row 650 with the sequence number 5003 in figure 11. 5.
  • a row 629 with a primary key of 4 gets inserted. This event gets marked in the trigger table as row 651 with the sequence number 5004 in figure 11.
  • SUBSTITUTE SHEET (RULE 25) 6.
  • the row 626 with a primary key of 5 is deleted. This event is marked in the trigger table as row 652 with the sequence number 5005 in figure 11.
  • the incremental file 52 and the index file 54 contain the data as depicted in figure 5.
  • the incremental file 52 layout contains the three fields 521 , 523, 525 containing the data of the columns 641 , 642 and 643 in trigger table 64.
  • XSM 20 uses the trigger table 64 to identify the rows in the database 60 that have been altered since the last full extraction.
  • the ExtractManager 30 is executed periodically and sends a message to XSM 20 requesting a new incremental extract using the message queuing system 130. This ensures that applications are provided with up-to-date data without continuously accessing the database.
  • XSM 20 only reads the rows that have not been included in the last fuil extract, this is determined using the time stamp on each row.
  • the entries are ordered by primary key and sequence number. By sorting according to primary key and sequence number, all entries with the same primary key are grouped together and all but the last one (with the largest sequence-number) are disregarded. Only the entry for a primary key with the largest sequence number is used, as discussed above, since all other entries represent outdated
  • Incremental information is stored in a separate file called the incremental file 52 shown in figures 3 and 5.
  • the reason for use of a separate file is it is not possible to extend the master file without forcing all applications 70 and 80 using it to first unload the old version and then load the new version which would have a negative performance impact on the applications.
  • the incremental file 52 shown in Figure 5 only contains the inserted/updated rows (deleted rows are managed using the index file), and additional information needed for quick access of incremental data.
  • the incremental file 52 is created by the XSM 20 shown in Figure 3.
  • the first is the update type field 527 that contains the update type code which can be either 'U'(pdated), 'l'(nserted) or 'D'(eleted).
  • the XSM 20 searches the master file 56 for the updated entry to determine how the row should be stored in the incremental file 52.
  • the update type 527 is transformed as provided in the following table.
  • the second field in the incremental file 52 is the index field 529 that is an index to predecessor row in the master file 56.
  • the index is the row number in the master file 56 for the updated entry.
  • the index field 529 is the row number for the last entry in the master file 56 that has a primary key 561 with a value less than the inserted row (i.e. the row 'preceding' the inserted one). It is possible for several entries in the incremental file 52 to have the same index 529 in the case that they are all successors to the same entry in the master file 56.
  • the index file 54 provides information about deleted rows and a reference to quickly find inserted or updated entries in the incremental file 52 from the master file 56.
  • Each row in the master file 56 has a corresponding row in the index file 54.
  • the index file 54 has three fields: deleted 545; updated 541 , and successor 543.
  • the deleted 545 field is a fiag indicating if the
  • SUBSTITUTE SHEET (RULE 25) corresponding row in the master file 56 has been deleted.
  • the updated 541 field is an index to the incremental file 52.
  • a row in the master file 56 has been updated, the corresponding row in the index file 54 will have the update 541 field set to the index of the corresponding entry in the incremental file 52 for the updated version of the row.
  • the successor field 543 is used in the case when an insert has been made. Upon an insertion, the successor field 543 will then contain the index of the first inserted successor in the incremental file 52 of the corresponding row in the master file 56.
  • this can be either a later effective date version for the same primary key 561 or a row with a primary key value that is larger than the value for the primary key of the row in the master file 56.
  • a value -1 is used in the successor 543 field of the index file 54 for non-valid entries (i.e., to indicate that the row has not been updated or does not have any successors).
  • the first row in the master file 56 has been updated which is the first row in the incremental file 52.
  • the first row in the master file 56 also has a successor which is the second row in the incremental file 52.
  • the successor has a primary key 561 value that is greater than the value for the row in the master file 56.
  • the second row in the master file 56 has two successors as shown in the incremental file 52.
  • the first one is an effective-date-successor that has the same primary key 561 equal to the value 3 as the row in the master file 56 but a different effective date 563 of 1/3/98 as shown in the incremental file 52.
  • the second successor in the incremental file 52 has a primary key 521
  • SUBST ⁇ SHEET (RULE 25) equal to the value 4 which is greater than the row in the master file 56. These two successors share the same predecessor entry in the index file 54 and they therefore will have the same index value of 1. The third entry in the master file 56 has been deleted as indicated in the index file 54 column 545.
  • Figure 6 is a flowchart of the algorithm used to create incremental extractions in the present invention.
  • the algorithm shown in Figure 6 is used by XSM 20 to create an incremental extraction from database 60.
  • This incremental extraction combined with the previously extracted master file 56, is used to provide applications 70 and 80 using the Xref Interface 40 with the most up- to-date information.
  • the XSM 20, shown in figure 3, is started in order to execute an incremental table extraction in operation 1110.
  • the XSM 20 starts by retrieving the SQL select statement configured for table 62, shown in Figure 3, to be extracted. This provides the flexibility to only extract the data required for the business process and help to reduce resources required.
  • the XSM 20 extracts the data in the trigger table 64, that has not been included in the last full extract, using the configured SQL select statement from operation 1 120. The time stamp on each row is used to determine whether the row has been included in the last full extract.
  • the extracted data is converted into structures in memory and data conversion is performed if necessary. This provides a mechanism to have different data representations in applications using the database and applications using the present
  • SUBST ⁇ SHEET (RULE 25) invention Data conversion or custom order requirements can make it necessary to sort the data at this point and this determination that sorting is required is made in operation 1145. If sorting is required this is done in operation 1150. This also allows applications 70 and 80 to use different primary keys or ordering rules than those defined in the database.
  • XSM 20 compares the sorted entries to entries in the master file 56, shown in Figure 3. In this operation it is determined whether trigger table 64 entries represent update, insert or delete operations. If multiple entries for one primary key exist in trigger tabie 64, only the entry with the highest sequence number is considered. Only the entry for a primary key with the largest sequence number is used since all other entries represent outdated entries that have been superceded by updated with higher sequence numbers.
  • XSM 20 determines the index 529 for each entry in incremental file 52 and maintains a list for all index 529 entries.
  • the index 529 information is now written to index file 54.
  • the sorted and filtered data is now written to the incremental file 52.
  • XSM 20 sends a message to all registered applications 70 and 80 announcing the availability of a new incremental update information.
  • the incremental extraction process terminates.
  • XSM 20 When XSM 20 is done extracting the incremental information in operation 1180, it sends a message to applications 70 and 80 that have registered as Xref users that a new incremental file 52 is now available. The applications 70 and 80 then load the new incremental
  • Figure 7 is a flowchart of the algorithm used to access incremental extractions in the present invention.
  • the algorithm shown in Figure 7 is executed by the Xref Interface 40, shown in Figure 3, and is activated when an application uses the Xref Interface 40 to look up data entries. It is transparent to applications 70 and 80 whether the data returned is stored in the master file 56 or incremental file 52.
  • the algorithm accepts a full primary key or partial primary key as a search parameter.
  • Xref Interface 40 is activated to find an entry in operation 1300.
  • the Xref interface is provided with a search key to perform the operation.
  • Xref Interface 40 starts by performing a binary search for the search key in the master file 56 in operation 1310.
  • the binary search returns the closest matching entry with a key value smaller than the search key. If the binary search operation 1310 determines that several matching entries exist, the first one is returned.
  • the search key is smaller than the primary key 561 of the first entry in the master file 56, NULL is returned. If no entry was found by the binary search, then in operation 1340, the first entry of the incremental file 52 is used as the current entry.
  • SUBST ⁇ SHEET (RULE 25) updated or deleted.
  • the Xref interface 40 reads the next record until the next valid entry in the either the incremental file 52 or master file 56 is reached.
  • a valid entry refers to an entry that is up-to-date and has not been updated or deleted. This is also discussed in the description of the skip invalid entries algorithm provided below.
  • operation 1360 if the primary key of the current entry has a value smaller than the search key, then processing proceeds to operation 1370.
  • the next logical successor of the current entry is taken from the master file 56 or incremental file 52. This is also discussed in the algorithm to advance to next valid entry described below.
  • Xref interface 40 compares the primary key 561 of the current entry to determine if it matches the search key. If the two keys do not match, then, in operation 1420, a NULL value is returned and processing terminates in operation 1430. If the keys match, then in operation 1380 Xref interface 40 checks whether the extracted table contains effective dated data. Effective dated data can have multiple entries for the same primary key over time. Only one entry is active at one particular point in time. If the data is effective dated the algorithm has to find the entry active on the processing date. In operation 1410, if the data is not effective dated, the current entry is returned as the search result and processing terminates in operation 1430. If the data is effective dated, Xref
  • SUBST ⁇ SHEET (RULE 25) interface 40 advances until an entry which is active on the search date is found in operation 1390. If such an entry is found in operation 1400, Xref interface 40 returns the entry in operation 1410. If no entry is found then in operation 1400, then in operation 1420 a NULL value is returned.
  • Figure 8 is a flowchart of the algorithm used to advance to the next valid entry in the present invention.
  • the algorithm of Figure 8 takes a master file 56 or incremental file 52 entry as a parameter and returns the next valid entry.
  • Valid entries refer to entries that are up- to-date. Entries that have been updated or deleted are not considered valid entries.
  • a master file 56 entry that has been updated is superceded by an entry in the incremental file and is therefore not valid.
  • the next valid entry can either be located in the master file 56 or the incremental file 52.
  • Figure 8 further details operation 1370 shown in figure 6.
  • Operation 1500 advances to the next valid entry in master file 56 or incremental file 52.
  • a determination is made whether the entry is a master file 56 entry or a incremental file 52 entry. If the entry is a master file 56 entry, then, in operation 1520, the index file 52 entry is used to determine whether a successor exist for the entry. If successors exist, then processing returns the first successor from the incremental file 52 in operation 1540. If no successors exist, then the next entry is retrieved from the master file 56, in operation 1550. In operation 1570, invalid entries are skipped, as further discussed below. In operation 1530, if the entry is an incremental file 52 entry, a determination is made whether the next
  • SUBST ⁇ SHEET (RULE 25) entry in the incremental file 52 has the same predecessor index as the current entry. If the index is not the same, then the next entry from master file 56 is retrieved. Operation 1570 skips invalid entries as further described below. In operation 1560, If the index is the same, the next entry is returned in the incremental file 52.
  • Figure 9 is a flowchart of the algorithm used to skip invalid entries in the present invention and serves to further detail operation 1370 shown in figure 6.
  • the flowchart of Figure 9 further details the operation of operation 1570 shown in Figure 8 and discussed above.
  • the algorithm shown in figure 9 takes a master file 56 entry as a parameter and skips the invalid entries starting at the current entry.
  • Invalid entry refers to an entry that is not up-to-date. Invalid entries have been updated or deleted.
  • a master file 56 entry for which a update exists is not valid or up-to-date.
  • the next valid entry can either be located in the master file 56 or the incremental file 52. If the current entry is a valid entry the algorithm does not skip any entries.
  • Figure 9 further details skip processing shown in operation 1350 of figure 7 and operation 1570 of figure 8.
  • the index file 54 entry is examined corresponding to the master file 56 entry to determine if the entry has been updated. If an update entry exists, then in operation 1670 the update entry is returned from the incremental file 52. If no update exist, then, in operation 1620, the index file 54 entry is examined to determine if the entry has been deleted. In operation 1660, if the entry has not been deleted, it is a valid entry and is returned by the algorithm. In operation 1630, if the entry was deleted, the index file 54 entry is examined to determine
  • SUBST ⁇ SHEET (RULE 25) whether successors exist for the entry. This is indicated by the successor field 543 in the index file 54.
  • the first successor is returned from the incremental file 52.
  • processing terminates in operation 1680.
  • no successors are found to exist in operation 1630, then, in operation 1640, the next entry is retrieved from the master file 56 and continues processing until a valid entry is found.
  • NULL is returned.
  • any suitable operating system may be used.
  • UNIX may also be used as well as any comparable operating system. Almost any processor or computer may be used such as a Sun computer.

Abstract

A system and method that enables quick access to large volumes of data on a realtime basis and is totally transparent to application programs that use the data. This is accomplished by placing information extracted from the database into a master file stored in a data storage device and then loaded into memory for access by application programs. When information in the database changes the corresponding information is updated using an incremental file and an index file that are then loaded into memory for access by application programs. The master file, index file and incremental file are linked in such as fashion to enable quick access to data desired.

Description

SYSTEM FOR ACCESSING DATABASE TABLES
MAPPED INTO MEMORY FOR
HIGH PERFORMANCE DATA RETRIEVAL
Reference To Microfiche Appendix
A microfiche appendix having 3 microfiche and 216 frames is included herewith and includes a detailed design specification of the present invention.
BACKGROUND OF THE INVENTION
Field of the Invention
The present invention is directed to a system for enhancing application processing performance involving read-only access to database tables. More particularly, to a system to enhance execution of complex business transaction applications, such as those performed in telecommunications billing systems, that requires quick access to data stored in a database by placing a portion of the data into RAM memory using a master file and an incremental file.
Description of the Related Art
In today's business data processing systems, business data is stored in relational databases. The performance of these relational
SUBSTITUTE SHEET (RULE 25) databases in accessing data is usually adequate to meet most needs. However, for high performance applications the access to data stored in these relational databases turns into a performance bottleneck and hampers quick retrieval. Solutions have been developed in which data is either cached from the database or simply loaded into memory for access. However, these solutions don't provide the combination of the flexibility to extract only the data needed and provide updates of modified data in increments.
This is a particular problem in complex business transactions, like those performed in telecommunications billing systems, require access to data stored in a database to validate business rules or to look up reference data. This type of data is mostly static and is not frequently changed. Database access is often the performance bottleneck for high volume data processing. Therefore, what is needed is a system and method that allows for quick access to large volumes of static data on a realtime basis and is totally transparent to application programs. In addition, when data changes in a database a method and system is needed to notify application programs of the change and have them access the most up-to-date data.
SUMMARY OF THE INVENTION It is an object of the present invention to reduce database bottlenecks seen by business application programs, by providing fast read-oniy access to data extracted from a database and loaded in memory.
SUBSTITUTE SHEET (RULE 25) It is also an object of the present invention to provide a method of accessing a database by placing information extracted from the database into a first data structure in memory. Then the present invention updates the information in memory periodically or when requested when a change in the information occurs in the database by placing the updated information into a second data structure in memory which is linked to the first data structure.
It is a further object of the present invention to seamlessly update data in memory provided to the applications to reflect changes in the database.
It is another object of the present invention to provide significant performance improvement over that seen in direct database access. It is also an object of the present invention to provide a standard interface for application programs to database data.
The above objects can be attained by a system and method that partially or fully extracts data from a database and places the data in RAM for access by application programs. Further, the foregoing objects can be attained by a system and method that updates data in RAM (random access memory), transparent to the application programs, whenever the data changes in the database.
These together with other objects and advantages which will be subsequently apparent, reside in the details of construction and operation as more fully hereinafter described and claimed, reference
SUBSTITUTE SHEET (RULE 25) being had to the accompanying drawings forming a part hereof, wherein like numerals refer to like parts throughout.
BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is an overall modular configuration of the present invention.
Figure 2 is an overall hardware and software layer configuration of the present invention.
Figure 3 is a data flow diagram of the present invention. Figure 4 is a flowchart of the algorithm to create full extractions in the present invention.
Figure 5 is a diagram depicting an example of the full and incremental extraction of data in the present invention.
Figure 6 is a flowchart of the algorithm used to create incremental extractions in the present invention.
Figure 7 is a flowchart of the algorithm used to access incremental extractions in the present invention.
Figure 8 is a flowchart of the algorithm used to advance to the next valid entry in the present invention. Figure 9 is a flowchart of the algorithm used to skip invalid entries in the present invention.
Figure 10 is an example identifying incremental information using a database table and a trigger table in the present invention.
Figure 11 further illustrates the example shown in figure 10.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
SUBSTΓΓUTE SHEET (RULE 25) Figure 1 is an overall modular configuration of the present invention illustrating the major modular components thereof.
Referring to Figure 1 , Xref Framework 10 has three fundamental modules including: Xref Storage Manager 20 (XSM 20); ExtractManager 30; and the Xref Interface 40. Each of these modules will be discussed in detail below.
Xref Storage Manager XSM-20
Still referring to Figure 1 , the XSM 20 module is used to extract the information stored in database 60 and transfer it to Xref files 50.
Xref files 50 comprise several standard flat files. A flat file is sequential file of a single record type with no linked structures or direct record access capability. Each Xref file 50 contains only entries (possibly converted) returned by a system query language ("SQL") select statement as configured for the database 60. This provides the ability to produce a partial and or a full database extraction based on business needs. Application 70 and application 80 are notified when full extracts or updates are available by XSM 20. Applications 70 and 80 utilize the high performance access to data provided by the Xref Framework 10 for the specific business process that they perform. An example of such a business process where performance is essential is rating and billing of large telecommunication customer accounts. XSM 20 is able to extract incremental updates from database 60 and place them into separate update files which are part of the Xref Files 50. These incremental updates contain information for rows in the database 60 that have been changed, added or deleted since the last
SUBSTITUTE SHEET (RULE 25) full extraction of the database 60. The incremental extraction is needed because full extraction is a slow process and it would introduce a performance problem to force the applications 70 and 80 using the Xref Interface 40 to reload a new version of the full extracted Xref files 50 for each new extraction. The applications 70 and 80 are notified as soon as an incremental update is available by XSM 20 sending a message to the Xref interface 40.
ExtractManager-30 Still referring to Figure 1 , ExtractManager 30 is a module that sends messages to the XSM 20 and tells XSM 20 which database 60 table(s) to extract and whether to perform a full or incremental extraction. The ExtractManager 30 is run periodically to send a message to XSM 20 requesting XSM 20 to create incremental extracts. This ensures that applications 70 and 80 using extracted data, are provided with updates at periodic intervals.
Xref interface-40
Still referring to figure 1 , Xref Interface 40 is the part of the framework used by applications to manage and access data stored in
Xref files 50. The Xref Interface 40 manages the mapping of Xref files 50 to memory and handles access of incremental updates, transparent to applications 70 and 80. Memory (not shown) storing the Xref data extracted from database 60 is shared by applications 70 and 80 to improve performance and save resources. Xref Interface
40 provides several different access methods to query data, as well
SUBSTΓΓUTE SHEET (RULE 25) as methods for stepping through some or all entries. The queries supported are: searching for a certain entries using a key; searching for the best matching entry using a key; searching using a key and an effective date. Also supported is stepping through some or all entries in the order provided in the Xref Files 50 starting at the entry returned by a query with respect to incremental updates and effective date.
Figure 2 is an overall hardware and software layer configuration of the present invention. As shown in Figure 2, the present invention is implemented in a distributed client server system format comprising an application server 100 and a database server
120. The application server 100 is implemented using application code 102 (C++ programming language) running on a HP-UNIX 110 platform. The application server 100 also uses an Oracle database 106 to store persistent objects. XSM 20, ExtractManager 30 and applications 70 and 80 using the Xref Interface 40 reside on the application server 100. The Xref Framework 10 uses the Oracle client libraries to access the database server 120. The Xref Framework 10 components communicate using an asynchronous message queuing system, see 130 figure 3, provided by the infrastructure 104. The de- coupling of the Xref components using queues allows distributed deployment and flexible configuration of the system.
The database server 120 hosts the Oracle database 116 running on a HP JNIX 110 platform. The Xref Framework 10 uses Oracle database 114 triggers to identify data to be included in incremental updates.
SUBSTΓΓUTE SHEET (RULE 25) As would be appreciated by a person of ordinary skill in the art any suitable general purpose computer, programming language and database may be used to implement the present invention.
Figure 3 is a data flow diagram of the present invention. The XSM 20 is started and sends a broadcast message to all applications
70 and 80 announcing its availability via queue 130. Applications 70 and 80 send a registration message to XSM 20 via Xref Interface 40 and message queuing system 130 to indicate which database tables 62 they want to use. The ExtractManager 30 is started and sends a message using the message queuing system 130 to XSM 20 to generate a full extraction of one or multiple tables 62 in database 60. Database 60 contains table 62 and trigger table 64.
When XSM 20 receives the message from the message queuing system 130 to perform a full extraction, XSM 20 executes a query to retrieve all data from table 62 and writes the information to the Xref master file 56. When the extraction process has finished, XSM 20 sends a message using the message queuing system 130, to all registered applications 70 and 80 interested in the extracted table, to announce that a full extraction is ready for use. Application 70 uses the Xref Interface 40 to load the data into shared memory 150 from master file 56 and also to access the data through the Xref Interface 40 from shared memory 150. If application 80 is interested in the same data as used by application 70 and both processes reside on the same application server 100, as shown in Figure 2, the Xref Interface 40 will share the memory 150 already used by Application
SUBSTΓΓUTE SHEET (RULE 25) 70. The sharing of memory saves important resources and improves performance since the data only needs to be loaded to memory once. Still referring to Figure 3, application 90 modifies the data in the table 62 that was extracted earlier. This change in table 62 causes database triggers 114, shown in Figure 2, to be executed in database
60. The database triggers 114 then copy the modified data to the trigger table 64 and mark it with a time stamp, sequence number and a type code for the modification. The ExtractManager 30 is executed periodically and sends a message using the message queuing system 130 instructing XSM 20 to create an incremental extraction. XSM 20 scans the corresponding trigger table 64 for rows that have not been included in the last full extraction. This is determined using the time stamp on each row. XSM 20 uses this data to create an incremental file 52 and an index file 54. XSM 20 then sends a notification message to all registered applications 70 and 80 using the message queuing system 130, announcing that a new incremental update is available. After receiving the notification message, the Xref interface 40 is used by application 70 and 80 to load the incremental file 52 and the index file 54 into shared memory 150. Applications 70 and 80 are now provided with the updated information. This processing is transparent to the application logic of application 70 and 80. Once either application 70 or 80 terminate or are no longer interested in Xref data, application 70 or 80 send a message to XSM 20 to using the message queuing system 130. XSM 20 will not send further update messages to applications 70 or 80.
Full Extraction
SUBSTITUTE SHEET (RULE 25) Still referring to Figure 3, the XSM 20 provides the capability of creating full database extractions and saving the extracted information to a Xref master file 56. For each database table 62, a SQL seiect statement can be created for the extraction process. This provides the ability to do a partial or a full database extraction based on business needs. Creating a full extraction of a large table is processor intensive. Full table extractions need to be created in two situations. First, upon start up of the system, the Xref files 50 must be created. Second, when incremental update information reaches such a volume that the application accessing the data is noticeably slowed.
This process is usually executed outside heavy load operating hours to avoid disturbing other applications utilizing the database. When creating a full extract, the rows in the trigger table 64 can either be deleted or kept to provide the history of modifications applied to the table 60. in the case where the rows in the trigger table 64 are kept, the rows need to be marked so that they are not included in the next incremental extract. This marking can either be achieved by adding an additional column to the trigger table 64 in order to mark rows or to use a time stamp on each row to identify the updates that were performed after the last full extract took place. The description that is provided herein utilizes a time stamp for this purpose.
Figure 4 is a flowchart of the algorithm used to create full extractions in the present invention. Once a request for a full database extraction is received, the extraction process starts by initiating XSM 20, shown in Figure 1 , in operation 1000 of Figure 4. In
Figure 4, XSM 20 starts by retrieving 1010 the SQL select statement
SUBSTITUTE SHEET (RULE 25) configured for the table to be extracted. This provides the flexibility to only extract the data required for the business process and helps to save resources.
Still referring to figure 4, XSM 20 now extracts all the data in the database table using the created SQL select statement in operation 1030. If other applications are allowed to update the table while the extraction is in process, it is possible that the trigger table 64 will contain entries that are also contained in the full extraction. These additional entries are filtered out when generating an incremental extraction. In operation 1040, the extracted data is converted into structures in memory 150 and data conversion is performed if necessary. The data structures are the data containers in memory 150 where the data is accessed. This provides a mechanism to have different data representations in applications using the database 60 and applications 70 and 80 using the present invention. In operation
1050, a determination is made whether data conversion or custom order requirements should take place. If such data conversion or customs order requirements are necessary, then in operation 1060 the data conversion or order (sorting) requirements take place. This also allows applications 70 and 80, using the present invention, to use different primary keys or ordering rules than those defined in the database 60.
Still referring to Figure 4, in operation 1070 the sorted data is written to the Xref master file 56 shown in Figure 3. XSM 20 then sends a message to all registered applications 70 and 80, shown in figure 3, announcing the availability of a new fuil table extract as
SUBSTΓΠΠΈ SHEET (RULE 25) shown in operation 1080. Processing then terminates for full extracts in operation 1090. Incremental Extracts
Referring to Figure 3, incremental extractions can be used to reduce the time spent extracting Xref data from the database 60.
Instead of extracting the whole table, only the information that has changed since the last full extraction is extracted. This also improves application performance as the incremental file 52 can be loaded into shared memory 150 independent of the master file 56. Incremental extraction takes less time and the applications, 70 and 80, using the
Xref Interface 40 will only need to reload the updated information. As disk access is slow relative to RAM memory access, this is a major performance advantage. XSM 20 is able to extract incremental updates into separate files 52, 54. The incremental updates contain information for rows in the table 62 that have been changed, added or deleted since the last full extraction of the table 62. The Xref Interface 40 provides a completely transparent interface to the incremental information and an application 70 or 80 using a Xref table will not know if it is receiving an entry from the full extraction or from the incremental extraction. In this way incremental updates can be switched on or off for individual database tables 60 without having any impact on the applications 70 or 80 using those tables 60. For further performance tuning, the master file 56 and the incremental file 54 can be merged periodically. This keeps the size of the incremental file small, which in turn increases the access performance and avoids the need to perform performance intensive full extractions.
SUBSTTΠΠΈ SHEET (RULE 25) Identifying Incremental Information
Referring to Figure 3, to be able to create incremental file 52 containing only the modifications performed since the last full extraction, the modified information must be tagged. This implementation uses trigger table 64 for this purpose. On each update to the database table 62, the information about the modification is stored in the trigger table 64 using the database triggers. The trigger table 64 contains the complete row data, a field used to distinguish between insertions, updates and deletions and a sequence number that is needed to keep the database operations in a consistent order. The database trigger (not shown) provides the necessary logic for generating the sequence number. XSM 20 uses the primary key, see 641 in figure 10 and 561 in figure 5, to link entries in the trigger table 64 to entries in the master file 56 when performing an incremental extract. If a field that is a part of the primary key is updated in a row, XSM 20 cannot link the trigger table 64 entry (new key) to the master file 56 entry (old key), because the old primary key is not stored in the trigger table 64. For this reason all updates involving primary key modifications must be carried out in two operations. The first operation is to delete the old row and the second is to insert the updated row into the table. An alternative solution is to keep the old primary key and the new primary key in the trigger table. An example of identifying incremental information is provided in figure 10. Figure 10 depicts an example where table 62, shown in Figure 3, contains business data and trigger table 64, shown in figure
3, that is used to capture the data that needs to be included in
SUBSTITUTE SHEET (RULE 25) incremental updates. In this example, table 62 is initially filled with three data rows 624, 625 and 626. The trigger table 64 is initially empty. In this example, the table 62 contains effective dated data. This means that for a particular primary key multiple entries can exist over time. For processing only the entry active on the processing date is considered.
Referring to Figure 10, the table 62 comprises three items, First, the primary key column 621 used to identify logical objects. Second, the effective date column 622 used to specify the date when a particular entry is active. Third, the data column 623 that contains the business data contained in the row.
Still referring to Figure 10, the trigger table 64 consists of six columns. The first three columns 641 , 642 and 643 replicate the data of columns 621 , 622 and 623 in table 62. The update type 644 coiumn is used to distinguish between insertions, updates and deletions. The sequence number column 645 is needed to keep database operation in a consistent order. The time stamp column 646 is used to determine whether trigger table entries have been included in the last full extract when performing a full extract. Starting with this data scenario shown in figure 10 a full extract is created of the table 62. The master file 56 contains the data as depicted in figure 5, discussed in detail below. The master file 56, shown in figure 5, comprises the three fields 561 , 563, 565 containing the data of columns 621 , 622 and 623 in table 62. After the initial full extract is performed, one or multiple applications 90, as shown in figure 3, modify table 62 containing the
SUBSTITUTE SHEET (RULE 25) business data. Each modification fires database triggers that write the information about the modification to the trigger table 64.
Referring to figure 11 for this example, the -following events discussed below take place. 1. The data in the row 624 with the primary key 1 gets updated to 'b'. This event gets marked in the trigger table as row 647 with the sequence number 5000 shown in Figure 11.
2. The data in the row 624 with the primary key 1 is updated again, this time to 'x'. This event is marked in the trigger table as row 648 with the sequence number 5001. Now two entries, 647 and 648, exist in the trigger table for the primary key 1. Since only the entry with the largest sequence number 648 for the primary key 1 will get processed the first update 647 will be ignored when performing an incremental extraction.
3. A row 627 with a primary key of 2 is inserted. This event is marked in the trigger table as row 649 with the sequence number 5002 in figure 11. 4. A new effective dated entry 628 is inserted for the row with the primary key 3. This event is marked in the trigger table as row 650 with the sequence number 5003 in figure 11. 5. A row 629 with a primary key of 4 gets inserted. This event gets marked in the trigger table as row 651 with the sequence number 5004 in figure 11.
SUBSTITUTE SHEET (RULE 25) 6. The row 626 with a primary key of 5 is deleted. This event is marked in the trigger table as row 652 with the sequence number 5005 in figure 11.
7. After all these events have taken place the tables contain the data as depicted in figure 11.
Starting with this data scenario an incremental extract is created of table 62. The incremental file 52 and the index file 54 contain the data as depicted in figure 5. The incremental file 52 layout contains the three fields 521 , 523, 525 containing the data of the columns 641 , 642 and 643 in trigger table 64.
Extracting Incremental Information
Still referring to Figure 3, XSM 20 uses the trigger table 64 to identify the rows in the database 60 that have been altered since the last full extraction. The ExtractManager 30 is executed periodically and sends a message to XSM 20 requesting a new incremental extract using the message queuing system 130. This ensures that applications are provided with up-to-date data without continuously accessing the database. XSM 20 only reads the rows that have not been included in the last fuil extract, this is determined using the time stamp on each row. When XSM 20 extracts the rows from the trigger table 64, the entries are ordered by primary key and sequence number. By sorting according to primary key and sequence number, all entries with the same primary key are grouped together and all but the last one (with the largest sequence-number) are disregarded. Only the entry for a primary key with the largest sequence number is used, as discussed above, since all other entries represent outdated
SUBSTTΠΠΈ SHEET (RULE 25) entries that have been superceded by updated higher sequence numbers.
Storing Incremental Information
Incremental information is stored in a separate file called the incremental file 52 shown in figures 3 and 5. The reason for use of a separate file is it is not possible to extend the master file without forcing all applications 70 and 80 using it to first unload the old version and then load the new version which would have a negative performance impact on the applications. The incremental file 52 shown in Figure 5 only contains the inserted/updated rows (deleted rows are managed using the index file), and additional information needed for quick access of incremental data.
The incremental file 52, shown in Figures 3 and 5, is created by the XSM 20 shown in Figure 3. Referring to Figure 5, in addition to a copy of the fields 525 from the inserted or updated rows, two additional fields are stored in the incremental file. The first is the update type field 527 that contains the update type code which can be either 'U'(pdated), 'l'(nserted) or 'D'(eleted). When processing the incremental information extracted from the database 60, the XSM 20 searches the master file 56 for the updated entry to determine how the row should be stored in the incremental file 52. Depending upon the type of update and if the entry can be found in the master file 56, the update type 527 is transformed as provided in the following table.
Figure imgf000018_0001
SUBSTITUTE SHEET (RULE 25)
Figure imgf000019_0001
Still referring to Figure 5, the second field in the incremental file 52 is the index field 529 that is an index to predecessor row in the master file 56. For updated rows the index is the row number in the master file 56 for the updated entry. For inserted rows, the index field 529 is the row number for the last entry in the master file 56 that has a primary key 561 with a value less than the inserted row (i.e. the row 'preceding' the inserted one). It is possible for several entries in the incremental file 52 to have the same index 529 in the case that they are all successors to the same entry in the master file 56.
When the XSM 20, shown in Figure 3, is done creating the incremental file 52, it will create an index file 54 shown in Figures 3 and 5. Referring to Figure 5, the index file 54 provides information about deleted rows and a reference to quickly find inserted or updated entries in the incremental file 52 from the master file 56. Each row in the master file 56 has a corresponding row in the index file 54. The index file 54 has three fields: deleted 545; updated 541 , and successor 543. The deleted 545 field is a fiag indicating if the
SUBSTITUTE SHEET (RULE 25) corresponding row in the master file 56 has been deleted. The updated 541 field is an index to the incremental file 52. In this case, a row in the master file 56 has been updated, the corresponding row in the index file 54 will have the update 541 field set to the index of the corresponding entry in the incremental file 52 for the updated version of the row. The successor field 543 is used in the case when an insert has been made. Upon an insertion, the successor field 543 will then contain the index of the first inserted successor in the incremental file 52 of the corresponding row in the master file 56. It should be noted that this can be either a later effective date version for the same primary key 561 or a row with a primary key value that is larger than the value for the primary key of the row in the master file 56. A value -1 is used in the successor 543 field of the index file 54 for non-valid entries (i.e., to indicate that the row has not been updated or does not have any successors).
Still referring to Figure 5, in this example the first row in the master file 56 has been updated which is the first row in the incremental file 52. However, the first row in the master file 56 also has a successor which is the second row in the incremental file 52. The successor has a primary key 561 value that is greater than the value for the row in the master file 56. The second row in the master file 56 has two successors as shown in the incremental file 52. The first one is an effective-date-successor that has the same primary key 561 equal to the value 3 as the row in the master file 56 but a different effective date 563 of 1/3/98 as shown in the incremental file 52. The second successor in the incremental file 52 has a primary key 521
SUBSTΓΠΠΈ SHEET (RULE 25) equal to the value 4 which is greater than the row in the master file 56. These two successors share the same predecessor entry in the index file 54 and they therefore will have the same index value of 1. The third entry in the master file 56 has been deleted as indicated in the index file 54 column 545.
Figure 6 is a flowchart of the algorithm used to create incremental extractions in the present invention. The algorithm shown in Figure 6 is used by XSM 20 to create an incremental extraction from database 60. This incremental extraction, combined with the previously extracted master file 56, is used to provide applications 70 and 80 using the Xref Interface 40 with the most up- to-date information.
Referring to Figure 6, the XSM 20, shown in figure 3, is started in order to execute an incremental table extraction in operation 1110. In operation 1120, the XSM 20 starts by retrieving the SQL select statement configured for table 62, shown in Figure 3, to be extracted. This provides the flexibility to only extract the data required for the business process and help to reduce resources required. In operation 1130, the XSM 20 extracts the data in the trigger table 64, that has not been included in the last full extract, using the configured SQL select statement from operation 1 120. The time stamp on each row is used to determine whether the row has been included in the last full extract. In operation 1140, the extracted data is converted into structures in memory and data conversion is performed if necessary. This provides a mechanism to have different data representations in applications using the database and applications using the present
SUBSTΓΠΠΈ SHEET (RULE 25) invention. Data conversion or custom order requirements can make it necessary to sort the data at this point and this determination that sorting is required is made in operation 1145. If sorting is required this is done in operation 1150. This also allows applications 70 and 80 to use different primary keys or ordering rules than those defined in the database. In operation 1160, XSM 20 compares the sorted entries to entries in the master file 56, shown in Figure 3. In this operation it is determined whether trigger table 64 entries represent update, insert or delete operations. If multiple entries for one primary key exist in trigger tabie 64, only the entry with the highest sequence number is considered. Only the entry for a primary key with the largest sequence number is used since all other entries represent outdated entries that have been superceded by updated with higher sequence numbers. XSM 20 determines the index 529 for each entry in incremental file 52 and maintains a list for all index 529 entries. In operation 1170, the index 529 information is now written to index file 54. in operation 1180, the sorted and filtered data is now written to the incremental file 52. Then in operation 1190, XSM 20 sends a message to all registered applications 70 and 80 announcing the availability of a new incremental update information. Finally, in operation 1200, the incremental extraction process terminates. Loading incremental Information
When XSM 20 is done extracting the incremental information in operation 1180, it sends a message to applications 70 and 80 that have registered as Xref users that a new incremental file 52 is now available. The applications 70 and 80 then load the new incremental
SUBSTΓΠΠΈ SHEET (RULE 25) file 52 and the corresponding index file 54 into shared memory 150. This is done automatically without user input by the present invention.
Figure 7 is a flowchart of the algorithm used to access incremental extractions in the present invention. The algorithm shown in Figure 7 is executed by the Xref Interface 40, shown in Figure 3, and is activated when an application uses the Xref Interface 40 to look up data entries. It is transparent to applications 70 and 80 whether the data returned is stored in the master file 56 or incremental file 52. The algorithm accepts a full primary key or partial primary key as a search parameter.
Referring to Figure 7, Xref Interface 40 is activated to find an entry in operation 1300. The Xref interface is provided with a search key to perform the operation. Xref Interface 40 starts by performing a binary search for the search key in the master file 56 in operation 1310. In operation 1310, if no exact match is found, the binary search returns the closest matching entry with a key value smaller than the search key. If the binary search operation 1310 determines that several matching entries exist, the first one is returned. In operation 1320, if the search key is smaller than the primary key 561 of the first entry in the master file 56, NULL is returned. If no entry was found by the binary search, then in operation 1340, the first entry of the incremental file 52 is used as the current entry. This is done to handle the case where entries have been inserted with keys smaller than the primary key 561 of the first entry in the master file 56. In operation 1330, if an entry was found by the binary search, it is evaluated using the index file 54 to determine whether the current entry has been
SUBSTΓΠΠΈ SHEET (RULE 25) updated or deleted. In operation 1350, further detailed in figure 9, if the entry has been updated or deleted the Xref interface 40 reads the next record until the next valid entry in the either the incremental file 52 or master file 56 is reached. A valid entry refers to an entry that is up-to-date and has not been updated or deleted. This is also discussed in the description of the skip invalid entries algorithm provided below. In operation 1360, if the primary key of the current entry has a value smaller than the search key, then processing proceeds to operation 1370. In operation 1370, further detailed in figure 8, the next logical successor of the current entry is taken from the master file 56 or incremental file 52. This is also discussed in the algorithm to advance to next valid entry described below. In operation 1360 and 1370, processing continues until the key of the current entry has a value greater than or equal to the search key. In operation 1375, Xref interface 40 then compares the primary key 561 of the current entry to determine if it matches the search key. If the two keys do not match, then, in operation 1420, a NULL value is returned and processing terminates in operation 1430. If the keys match, then in operation 1380 Xref interface 40 checks whether the extracted table contains effective dated data. Effective dated data can have multiple entries for the same primary key over time. Only one entry is active at one particular point in time. If the data is effective dated the algorithm has to find the entry active on the processing date. In operation 1410, if the data is not effective dated, the current entry is returned as the search result and processing terminates in operation 1430. If the data is effective dated, Xref
SUBSTΓΠΠΈ SHEET (RULE 25) interface 40 advances until an entry which is active on the search date is found in operation 1390. If such an entry is found in operation 1400, Xref interface 40 returns the entry in operation 1410. If no entry is found then in operation 1400, then in operation 1420 a NULL value is returned.
Figure 8 is a flowchart of the algorithm used to advance to the next valid entry in the present invention. The algorithm of Figure 8 takes a master file 56 or incremental file 52 entry as a parameter and returns the next valid entry. Valid entries refer to entries that are up- to-date. Entries that have been updated or deleted are not considered valid entries. A master file 56 entry that has been updated is superceded by an entry in the incremental file and is therefore not valid. The next valid entry can either be located in the master file 56 or the incremental file 52. Figure 8 further details operation 1370 shown in figure 6.
Operation 1500 advances to the next valid entry in master file 56 or incremental file 52. In operation 1510, a determination is made whether the entry is a master file 56 entry or a incremental file 52 entry. If the entry is a master file 56 entry, then, in operation 1520, the index file 52 entry is used to determine whether a successor exist for the entry. If successors exist, then processing returns the first successor from the incremental file 52 in operation 1540. If no successors exist, then the next entry is retrieved from the master file 56, in operation 1550. In operation 1570, invalid entries are skipped, as further discussed below. In operation 1530, if the entry is an incremental file 52 entry, a determination is made whether the next
SUBSTΓΠΠΈ SHEET (RULE 25) entry in the incremental file 52 has the same predecessor index as the current entry. If the index is not the same, then the next entry from master file 56 is retrieved. Operation 1570 skips invalid entries as further described below. In operation 1560, If the index is the same, the next entry is returned in the incremental file 52.
Figure 9 is a flowchart of the algorithm used to skip invalid entries in the present invention and serves to further detail operation 1370 shown in figure 6. The flowchart of Figure 9 further details the operation of operation 1570 shown in Figure 8 and discussed above. The algorithm shown in figure 9 takes a master file 56 entry as a parameter and skips the invalid entries starting at the current entry. Invalid entry refers to an entry that is not up-to-date. Invalid entries have been updated or deleted. A master file 56 entry for which a update exists is not valid or up-to-date. The next valid entry can either be located in the master file 56 or the incremental file 52. If the current entry is a valid entry the algorithm does not skip any entries.
Figure 9 further details skip processing shown in operation 1350 of figure 7 and operation 1570 of figure 8. In operation 1610, the index file 54 entry is examined corresponding to the master file 56 entry to determine if the entry has been updated. If an update entry exists, then in operation 1670 the update entry is returned from the incremental file 52. If no update exist, then, in operation 1620, the index file 54 entry is examined to determine if the entry has been deleted. In operation 1660, if the entry has not been deleted, it is a valid entry and is returned by the algorithm. In operation 1630, if the entry was deleted, the index file 54 entry is examined to determine
SUBSTΓΠΠΈ SHEET (RULE 25) whether successors exist for the entry. This is indicated by the successor field 543 in the index file 54. In operation 1650, if successors exist, the first successor is returned from the incremental file 52. Once either operation 1650, or 1660, or 1670 complete processing, processing terminates in operation 1680. However, if no successors are found to exist in operation 1630, then, in operation 1640, the next entry is retrieved from the master file 56 and continues processing until a valid entry is found. In 1640, if processing reaches the last entry in the master file, NULL is returned.
Alternate Embodiments
The procedures presented herein are not inherently related to any particular computer. In particular, various general-purpose machines may be used with programs described herein. The recommended configuration is a multiprocessor UNIX server.
However, any suitable operating system may be used.
Further, any number of computer languages may be used. For example, Java may be used instead of C++. Different versions of
UNIX may also be used as well as any comparable operating system. Almost any processor or computer may be used such as a Sun computer.
The many features and advantages of the invention are apparent from the detailed specification and, thus, it is intended by the appended claims to cover all such features and advantages of the invention which fall within the true spirit and scope of the invention.
Further, since numerous modifications and changes will readily occur
SUBSTΓΠΠΈ SHEET (RULE 25) to those skilled in the art, it is not desired to limit the invention to the exact construction and operation illustrated and described, and accordingly all suitable modifications and equivalents may be resorted to, failing within the scope of the invention.
SUBSTΓΠΠΈ SHEET (RULE 25)

Claims

What is claimed is:
1. A method of accessing a database, comprising: placing information extracted from the database into a first data structure in a storage device; and updating the information in the storage device periodically or when requested when a change in the information occurs in the database by placing the updated information into a second data structure in the storage device which is linked to the first data structure.
2. A method of accessing a database as recited in claim 1 , wherein the information extracted from the database is convertible to different data formats and different data values.
3. A method of accessing a database as recited in claim 1 , wherein the first data structure and second data structures are tables.
4. A method of accessing a database as recited in claim 3, wherein the first data structure is a master file and the second data structure is an incremental file.
5. A method of accessing a database as recited in claim 4, wherein the first data structure and second data structure are accessible by a plurality of application programs.
SUBSTTΠΠΈ SHEET (RULE 26)
6. A method of accessing a database as recited in claim 5, wherein the first data structure and the second data structure are linked by a third data structure.
7. A method of accessing a database as recited in claim 6, wherein the third data structure is an index file.
8. A method of accessing a database as recited in claim 7, wherein the placing information extracted from the database into a first data structure in the storage device further comprises: creating a first system query language statement; extracting information from the database using the system first query language statement; sorting the extracted information based on primary key; placing the sorted information into the master file in the storage device; and sending a message to said plurality of application programs that the master file has been created.
9. A method of accessing a database as recited in claim 8, further comprising: placing the data contained in the master file, the index file and the incremental file into memory for access by a plurality of application programs.
SUBSTΓΠΠΈ SHEET (RULE 25)
10. A method of accessing a database as recited in claim 9, further comprising: updating the information in memory when an incremental extraction is done.
11. A method of accessing a database as recited in claim 10, wherein the updating the information in the storage device periodically or when requested when a change in the information occurs in the database, further comprises: creating a second system query language statement; extracting information from the database using the second system query language statement; extracting update information from a table indicating by key which information of the extracted database information has been updated, added or deleted; converting the extracted information and the extracted update information into update data structures; sorting the update data structures by primary key; comparing the update data structures to the master file; creating another index file based on the comparison of the update data structures to the master file; creating another incremental file based on the master file and the index file; and sending a message to said plurality of application programs that another index file and another incremental file have been created.
SUBSTΓΠΠΈ SHEET (RULE 25)
12. A method of accessing a database as recited in claim 11 , wherein the information can be effective dated data and accessed by effective date.
13. A method of accessing a database, comprising: creating a first system query language statement; extracting information from the database using the system first query language statement; sorting the extracted information based on primary key; placing the sorted information into a master file in a data storage device; sending a message to a plurality of application programs that the master file has been created; and updating the information in the data storage device periodically or when requested when a change in the information occurs in the database, comprising: creating a second system query language statement; extracting information from the database using the second system query language statement; extracting update information from a table indicating by key which information of the extracted database information has been updated, added or deleted; converting the extracted information and the extracted update information into update data structures; sorting the update data structures by primary key; comparing the update data structures to the master file;
SUBSTΓΠΠΈ SHEET (RULE 25) creating another index file based on the comparison of the update date structures to the master file; creating another incremental file based on the master file and the index file; and sending a message to said plurality of application programs that another index file and another incremental file have been created.
14. A system to access a database, comprising: an Xref storage manager to extract information from the database and place the information into a first data structure in a storage device and to update the information in the storage device periodically or when requested when a change in the information occurs in the database by placing the updated information into a second data structure in the data storage device which is linked to the first data structure.
15. A system to access a database as recited in claim 14, wherein the information extracted from the database is convertible to different data formats and different data values.
16. A system to access a database as recited in claim 15, wherein the first data structure and second data structures are tables.
SUBSTΓΠΠΈ SHEET (RULE 25)
17. A system to access a database as recited in claim 16, wherein the first data structure is a master file and the second data structure is an incremental file.
18. A system to access a database as recited in claim 17, further comprising: a plurality of application programs; and a Xref Interface to interface with the plurality of application programs and retrieve information stored in the master file and incremental file requested by the plurality of application programs.
19. A system to access a database as recited in claim 18, wherein the first data structure and the second data structure are linked by a third data structure.
20. A system to access a database as recited in claim 19, wherein the third data structure is an index file.
21. A system to access a database as recited in claim 20, wherein the Xref Storage Manager creates a system query language statement and uses this system query language statement to retrieve the information from the database.
22. A system to access a database as recited in claim 21 , wherein the Xref Storage Manager sorts the extracted information based on primary key and places the sorted information into the
SUBSTΓΠΠΈ SHEET (RULE 25) master file in the storage device.
23. A system to access a database as recited in claim 22, wherein the Xref Storage Manager sends a message to said plurality of application programs that the master file has been created.
24. A system to access a database as recited in claim 23, wherein the Xref interface places the data contained in the master file, the index file and the incremental file into memory for access by a plurality of application programs.
25. A system to access a database as recited in claim 24, wherein the Xref Interface updates the information in memory when an incremental extraction is done.
26. A system to access a database as recited in claim 25, wherein the Xref Storage Manager updates the information in the storage device periodically or when requested when a change in the information occurs in the database by extracting update information from a table indicating by key which information of the extracted database information has been updated, added or deleted and creating another incremental file, and another index file based on the master file and the update information.
27. A system to access a database as recited in claim 26, wherein the Xref Storage Manager sends a message to said plurality
SUBSTTΠΠΈ SHEET (RULE 25) of application programs that another index file and another incremental file have been created.
28. A system to access a database as recited in claim 27, wherein the information can be effective dated data and accessed by effective date.
29. A system to access a database, comprising: a plurality of application programs; an Xref storage manager to extract information from the database and place the information into a master file in a storage device and to update the information in the storage device periodically or on request when a change in the information occurs in the database by placing the updated information into an incremental file in a storage device which is linked to the first data structure; and a Xref Interface to interface with the plurality of application programs and retrieve information stored in the master file and incremental file requested by the plurality of application programs.
30. A system to access a database as recited in claim 29, wherein the information can be effective dated data and accessed by effective date.
31. A computer program embodied on a computer-readable medium to access a database, comprising:
SUBSTITUTE SHEET (RULE 25) an Xref storage manager code segment to extract information from the database and place the information into a first data structure in a data storage device and to update the information in the data storage device periodically or when requested when a change in the information occurs in the database by placing the updated information into a second data structure in data storage device which is linked to the first data structure.
32. A computer program embodied on a computer-readable medium to access a database as recited in claim 31 , wherein the information extracted from the database is convertible to different data formats and different data values.
33. A computer program embodied on a computer-readable medium to access a database as recited in claim 32, wherein the first data structure and second data structures are tables.
34. A computer program embodied on a computer-readable medium to access a database as recited in claim 33, wherein the first data structure is a master file and the second data structure is an incremental file.
35. A computer program embodied on a computer-readable medium to access a database as recited in claim 34, further comprising: a plurality of application program code segments; and
SUBSTITUTE SHEET (RULE 25) a Xref Interface code segment to interface with the plurality of application programs and retrieve information stored in the master file and incremental file requested by the plurality of application programs.
36. A computer program embodied on a computer-readable medium to access a database as recited in claim 35, wherein the first data structure and the second data structure are linked by a third data structure.
37. A computer program embodied on a computer-readable medium to access a database as recited in claim 36, wherein the third data structure is an index file.
38. A computer program embodied on a computer-readable medium to access a database as recited in claim 37, wherein the Xref
Storage Manager code segment creates a system query language statement and uses this system query language statement to retrieve the information from the data.
39. A computer program embodied on a computer-readable medium to access a database as recited in claim 38, wherein the Xref Storage Manager code segment sorts the extracted information based on primary key and places the sorted information into the master file.
40. A computer program embodied on a computer-readable medium to access a database as recited in claim 39, wherein the Xref
SUBSTΓΠΠΈ SHEET (RULE 25) Storage Manager code segment sends a message to said plurality of application programs that the master file has been created.
41. A computer program embodied on a computer-readable medium to access a database as recited in claim 40, wherein the Xref interface code segment places the data contained in the master file, the index file and the incremental file into memory for access by a plurality of application programs.
42. A computer program embodied on a computer-readable medium to access a database as recited in claim 41 , wherein the Xref Interface code segment updates the information in memory when an incremental extraction is done.
43. A computer program embodied on a computer-readable medium to access a database as recited in claim 42, wherein the Xref Storage Manager code segment updates the information in the storage device periodically or on request when a change in the information occurs in the database by extracting update information from a table indicating by key which information of the extracted database information has been updated, added or deleted and creating another incremental file, and another index file based on the master file and the update information.
SUBSTITUTE SHEET (RULE 25)
44. A computer program embodied on a computer-readable medium to access a database as recited in claim 43, wherein the Xref Storage Manager code segments sends a message to said plurality of application program code segments that another index file and another incremental file have been created.
45. A computer program embodied on a computer-readable medium to access a database as recited in claim 44, wherein the information can be effective dated data and accessed by effective date.
46. A computer program embodied on a computer-readable medium to access a database, comprising: a plurality of application program code segments; an Xref storage manager code segment to extract information from the database and place the information into a master file in a storage device and to update the information in the storage device periodically or upon request when a change in the information occurs in the database by placing the updated information into a incremental file in the storage device which is linked to the first data structure; an index file to link the master file to the incremental file; and a Xref Interface code segment to interface with the plurality of application programs and retrieve information stored in the master file and incremental file requested by the plurality of application programs.
SUBSTΓΠΠΈ SHEET (RULE 25)
PCT/US1999/016769 1999-07-15 1999-07-26 System for accessing database tables mapped into memory for high performance data retrieval WO2001006413A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CA002302303A CA2302303A1 (en) 1999-07-15 1999-07-26 System for accessing database tables mapped into memory for high performance
EP99937435A EP1204938A1 (en) 1999-07-15 1999-07-26 System for accessing database tables mapped into memory for high performance data retrieval
AU52274/99A AU5227499A (en) 1999-07-15 1999-07-26 System for accessing database tables mapped into memory for high performance data retrieval

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/353,395 1999-07-15
US09/353,395 US6463439B1 (en) 1999-07-15 1999-07-15 System for accessing database tables mapped into memory for high performance data retrieval

Publications (1)

Publication Number Publication Date
WO2001006413A1 true WO2001006413A1 (en) 2001-01-25

Family

ID=23388909

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/016769 WO2001006413A1 (en) 1999-07-15 1999-07-26 System for accessing database tables mapped into memory for high performance data retrieval

Country Status (5)

Country Link
US (1) US6463439B1 (en)
EP (1) EP1204938A1 (en)
AU (1) AU5227499A (en)
CA (1) CA2302303A1 (en)
WO (1) WO2001006413A1 (en)

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181478B1 (en) * 2000-08-11 2007-02-20 General Electric Company Method and system for exporting flight data for long term storage
US6988095B1 (en) * 2001-05-07 2006-01-17 Hearst Business Communications, Inc. Systems and methods for performing parametric searches
US6687702B2 (en) * 2001-06-15 2004-02-03 Sybass, Inc. Methodology providing high-speed shared memory access between database middle tier and database server
JP3695581B2 (en) * 2001-08-08 2005-09-14 ソニー株式会社 Recording apparatus, recording method, recording medium, and electronic camera
US8099393B2 (en) 2002-03-22 2012-01-17 Oracle International Corporation Transaction in memory object store
US7206793B2 (en) * 2002-05-22 2007-04-17 Sbc Properties L.P. Generalized file matching method and system
US20040010524A1 (en) * 2002-07-12 2004-01-15 Wallace Michael W. Efficient method and system for delivering resources in broadcast environment
US7251683B1 (en) * 2002-10-25 2007-07-31 Sandeep Shah Information handling system including arrangements for initiating an application in response to usage of cross reference between information and for initiating usage of a workflow flow chart associated with and information work
US7430569B2 (en) * 2002-11-27 2008-09-30 Sap Ag Computerized replication of data objects
US7464091B2 (en) * 2002-11-27 2008-12-09 Sap Ag Method and software for processing data objects in business applications
US7225302B2 (en) * 2002-11-27 2007-05-29 Sap Ag Method and software application for avoiding data loss
US7409412B2 (en) 2002-11-27 2008-08-05 Sap Ag Data element and structure for data processing
US7149752B2 (en) 2002-12-03 2006-12-12 Jp Morgan Chase Bank Method for simplifying databinding in application programs
US7085759B2 (en) 2002-12-06 2006-08-01 Jpmorgan Chase Bank System and method for communicating data to a process
US8032439B2 (en) 2003-01-07 2011-10-04 Jpmorgan Chase Bank, N.A. System and method for process scheduling
US7165072B2 (en) * 2003-03-26 2007-01-16 Taiwan Semiconductor Manufacturing Company, Ltd. Method for merging information from effective dated base tables
US7379998B2 (en) 2003-03-31 2008-05-27 Jp Morgan Chase Bank System and method for multi-platform queue queries
US7366722B2 (en) 2003-05-15 2008-04-29 Jp Morgan Chase Bank System and method for specifying application services and distributing them across multiple processors using XML
US7509641B2 (en) 2003-05-16 2009-03-24 Jp Morgan Chase Bank Job processing framework
WO2004114160A2 (en) * 2003-06-13 2004-12-29 Equifax, Inc. Systems and processes for automated criteria and attribute generation, searching, auditing and reporting of data
US11132183B2 (en) 2003-08-27 2021-09-28 Equifax Inc. Software development platform for testing and modifying decision algorithms
US20070179827A1 (en) 2003-08-27 2007-08-02 Sandeep Gupta Application processing and decision systems and processes
US7424467B2 (en) 2004-01-26 2008-09-09 International Business Machines Corporation Architecture for an indexer with fixed width sort and variable width sort
US7293005B2 (en) * 2004-01-26 2007-11-06 International Business Machines Corporation Pipelined architecture for global analysis and index building
US8296304B2 (en) * 2004-01-26 2012-10-23 International Business Machines Corporation Method, system, and program for handling redirects in a search engine
US7499913B2 (en) 2004-01-26 2009-03-03 International Business Machines Corporation Method for handling anchor text
JP2005214779A (en) * 2004-01-29 2005-08-11 Xanavi Informatics Corp Navigation system and method for updating map data
CN100461164C (en) * 2004-03-29 2009-02-11 微软公司 Systems and methods for versioning based triggers
CA2563354C (en) 2004-04-26 2010-08-17 Jp Morgan Chase Bank System and method for routing messages
US20060095413A1 (en) * 2004-05-07 2006-05-04 Lombardi Software, Inc. Method of exposing normalized data as denormalized tables
US7392471B1 (en) 2004-07-28 2008-06-24 Jp Morgan Chase Bank System and method for comparing extensible markup language (XML) documents
US7461064B2 (en) * 2004-09-24 2008-12-02 International Buiness Machines Corporation Method for searching documents for ranges of numeric values
US7792839B2 (en) * 2005-01-13 2010-09-07 International Business Machines Corporation Incremental indexing of a database table in a database
JP4675174B2 (en) * 2005-07-12 2011-04-20 株式会社日立製作所 Database processing method, system and program
US8417693B2 (en) 2005-07-14 2013-04-09 International Business Machines Corporation Enforcing native access control to indexed documents
US7499933B1 (en) 2005-11-12 2009-03-03 Jpmorgan Chase Bank, N.A. System and method for managing enterprise application configuration
US20070124345A1 (en) * 2005-11-30 2007-05-31 Heinz Kathy K Library backup
US7610172B2 (en) 2006-06-16 2009-10-27 Jpmorgan Chase Bank, N.A. Method and system for monitoring non-occurring events
US8313005B2 (en) * 2006-08-03 2012-11-20 Kraft Foods Global Brands, Llc Plastic coffee container with pinch grip
US8417731B2 (en) * 2006-12-28 2013-04-09 Sap Ag Article utilizing a generic update module with recursive calls identify, reformat the update parameters into the identified database table structure
EP2750098A3 (en) * 2007-02-16 2014-08-06 BodyMedia, Inc. Systems and methods for understanding and applying the physiological and contextual life patterns of an individual or set of individuals
US20080201290A1 (en) * 2007-02-16 2008-08-21 International Business Machines Corporation Computer-implemented methods, systems, and computer program products for enhanced batch mode processing of a relational database
WO2009021011A2 (en) * 2007-08-07 2009-02-12 Equifax, Inc. Systems and methods for managing statistical expressions
US8584140B2 (en) * 2007-09-21 2013-11-12 Presenceid, Inc. Systems and methods for receiving and sending messages about changes to data attributes
JP5012628B2 (en) * 2008-04-04 2012-08-29 日本電気株式会社 Memory database, memory database system, and memory database update method
CN103136315A (en) * 2011-11-22 2013-06-05 中兴通讯股份有限公司 Storage processing method and storage processing device for call detail record (CDR) data
CN105224527B (en) * 2014-05-27 2018-07-13 北京宸瑞科技股份有限公司 General ETL methods suitable for a variety of purpose table update modes
US10417212B1 (en) * 2015-01-15 2019-09-17 Qad, Inc. Database modification replay
CN110019181B (en) * 2017-08-10 2024-04-16 中兴通讯股份有限公司 Warehouse-in method and device computer readable storage medium
CN116719971B (en) * 2023-05-08 2024-04-09 中银金融科技有限公司 Pull chain table data loading method and device and electronic equipment
US11899636B1 (en) * 2023-07-13 2024-02-13 Fmr Llc Capturing and maintaining a timeline of data changes in a relational database system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5603024A (en) * 1993-10-08 1997-02-11 International Business Machines Corporation Lossless distribution of time series data in a relational data base network

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5664177A (en) * 1988-04-13 1997-09-02 Digital Equipment Corporation Data processing system having a data structure with a single, simple primitive
US5729730A (en) * 1995-03-28 1998-03-17 Dex Information Systems, Inc. Method and apparatus for improved information storage and retrieval system
US5740423A (en) * 1995-12-28 1998-04-14 Csg Systems, Inc. System and method for accessing distributed data on a plurality of databases
US6208993B1 (en) * 1996-07-26 2001-03-27 Ori Software Development Ltd. Method for organizing directories
US5797008A (en) * 1996-08-09 1998-08-18 Digital Equipment Corporation Memory storing an integrated index of database records
US5974407A (en) * 1997-09-29 1999-10-26 Sacks; Jerome E. Method and apparatus for implementing a hierarchical database management system (HDBMS) using a relational database management system (RDBMS) as the implementing apparatus
US6061678A (en) * 1997-10-31 2000-05-09 Oracle Corporation Approach for managing access to large objects in database systems using large object indexes

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5603024A (en) * 1993-10-08 1997-02-11 International Business Machines Corporation Lossless distribution of time series data in a relational data base network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ADIBA M E ET AL: "DATABASE SNAPSHOTS", IBM RESEARCH REPORT,US,SAN JOSE, CA, 7 March 1980 (1980-03-07), pages 1 - 16, XP000747603 *
LINDSAY B ET AL: "A snapshot differential refresh algorithm", PROCEEDINGS OF ACM SIGMOD '86. INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, WASHINGTON, DC, USA, 28-30 MAY 1986, vol. 15, no. 2, SIGMOD Record, June 1986, USA, pages 53 - 60, XP002134864, ISSN: 0163-5808 *
SEVERANCE D G ET AL: "Differential files: their application to the maintenance of large databases", ACM TRANSACTIONS ON DATABASE SYSTEMS, SEPT. 1976, USA, vol. 1, no. 3, pages 256 - 267, XP002134863, ISSN: 0362-5915 *

Also Published As

Publication number Publication date
CA2302303A1 (en) 2001-01-15
US6463439B1 (en) 2002-10-08
AU5227499A (en) 2001-02-05
EP1204938A1 (en) 2002-05-15

Similar Documents

Publication Publication Date Title
US6463439B1 (en) System for accessing database tables mapped into memory for high performance data retrieval
US6035303A (en) Object management system for digital libraries
US5802524A (en) Method and product for integrating an object-based search engine with a parametrically archived database
EP2264617B1 (en) Method and apparatus for replicating a database
US6058389A (en) Apparatus and method for message queuing in a database system
US6349310B1 (en) Database management system and method for accessing rows in a partitioned table
JP3848085B2 (en) High-speed storage resident processing method and processing system for transaction data
JP4866495B2 (en) Method and apparatus for executing combined queries in a database system
US4914569A (en) Method for concurrent record access, insertion, deletion and alteration using an index tree
US6339772B1 (en) System and method for performing database operations on a continuous stream of tuples
US6240422B1 (en) Object to relational database mapping infrastructure in a customer care and billing system
US6453313B1 (en) Database management system and method for dequeuing rows published to a database table
US6438562B1 (en) Parallel index maintenance
US7103589B1 (en) Method and system for searching, accessing and updating databases
US6397227B1 (en) Database management system and method for updating specified tuple fields upon transaction rollback
US20020095421A1 (en) Methods of organizing data and processing queries in a database system, and database system and software product for implementing such methods
US7246124B2 (en) Methods of encoding and combining integer lists in a computer system, and computer software product for implementing such methods
US20020095397A1 (en) Method of processing queries in a database system, and database system and software product for implementing such method
US20060041606A1 (en) Indexing system for a computer file store
JP5844333B2 (en) Sustainable data storage technology
EP0663641A1 (en) Summary catalogs
US7499920B2 (en) Multi-column multi-data type internationalized sort extension method for web applications
US20100274795A1 (en) Method and system for implementing a composite database
JPH08235040A (en) Data file management system
JP2675958B2 (en) Information retrieval computer system and method of operating storage device thereof

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2302303

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 1999937435

Country of ref document: EP

AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1999937435

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1999937435

Country of ref document: EP