Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

The Datacycle architecture

Published: 01 December 1992 Publication History
First page of PDF

References

[1]
Belkin, NJ~. and Croft, W,B. Information filtering 'and information retrieval: Two sides of the same coin. Commun. ACM 3.5, 12 (Dec. 1992).]]
[2]
Bowen, T.F., Gopal, G. Herman, G.E. and Mansfield, WH. A scalable database architecture for network services. In Proceedings of the Eighth International Switching Symposiun, (Stockholm, Sweden, May 1990).]]
[3]
Codd, E.F. A relational model for large shared data banks. Commun. ACM 14, 6 (June 1970), 377-387.]]
[4]
Date, C.J. An introduction to Database Systems. Vol 1, Fourth Ed. Addison- Wesley, Reading, Mass., 1986.]]
[5]
Eswaran K.P., Gray, J.N., Lorie, R.A. and Traiger, I.L. The notions of consistency and predicate locks in a database system. Commun. ACM 19, 11 (Nov. 1976), 624-633.]]
[6]
Gawlick, D. Processing hot spots in high performance systems. In the Proceedings of Spring COMPCON '85. IEEE Computer Society, Los Alamires, Calif., 1985.]]
[7]
Gold, I. and Boral, H. The power of the private workspace model. Inf. Syst. 11, 1 (1986), 1- 7,]]
[8]
Goldberg, D., Nichols, D., Oki, B. and Terry, D. Using collaborative filtering to weave an information tapestry. Commun. ACM 35, 12 (Dec. 1992).]]
[9]
Herman, G. and Gopal, G. The case for orderly sharing. In Lecture Notes in Computer Science on High Performance Transaction Systems, D. Gawlick, M. Haynie, and A. Reuter, Eds. Springer-Verlag, New York, 1987.]]
[10]
Herman, G.E., Gopal, G., Lee, K.C. and Weinrib, A. The Datacycle architecture for very high throughput database systems. In Proceedings of ACM SIGM OD (San Francisco). ACM, New York, 1987.]]
[11]
Hsiao, D.K. Advances in Database Machine Architectures. Prentice-Hall, Englewood Cliffs, NJ., 1983.]]
[12]
Kung, H.T. aud Robinson, J.T, On optimistic methods tbr concurrency control. ACM Trans. Database Syst. 6, 2 (June 1981), 213-226.]]
[13]
Lee, K.C. and Herman, G.E. A high performance VLSI data tilter. In Database Machines and Knowledge Base Machines. Kluwer Academic Publishers, Boston, 1988, pp. 251-268.]]
[14]
Lee, K.C., Hickey, T.M., Mak, V.W. and Herman, G.E. VLSI accelerators for large database systems. IEEE Micro mag. (Dec. 1991).]]
[15]
Lee, K.C. and Mak, V.W. Design and analysis of a parallel VLSI stringsearch algorithm. In Proceedings of the Sbcth International Workshop, IWDM '89 (DeauvilJe, France, June). 1989, pp. 215-222.]]
[16]
Leilich, H.-O., Stiege, G. and Zeidler, H.C. A search processor for data base management systems. In Proceedings of the Fourth Conference on Very Large Databases (West Berlin, June 1978), pp. 280-287.]]
[17]
Loeb, S. Dedicated filters for casual users: Architecting personalized delivery of multimedia information. Commun. ACM 35, 12 (Dec. 1992).]]
[18]
Mak. V.W., Lee, K.C. and Frieder, O. Exploiting parallelism in pattern matching: An information retrieval applicatiom ACM Trans. Inf. Syst. (1991).]]
[19]
Mansfield, W.H. and Fleischman, R.M. A high performance ad-hoc fuzzy query processing system for relational databases. North American Fuzzy Information Processing Society Workshop (1992).]]
[20]
Matoba, T., Lee, K.C., Herman, G.E. and Manstield, W.H. A rapid turnaround design of a high speed VLSI search processor. Integr,: The VLSI J. 10 (1991), 319-337.]]
[21]
Oracle RDBMS Database Administrator's Guide Version. 6.0. 1990, pp. 18-19.]]
[22]
St. Ama nd, J. A common file approach to data processing. In Proceedings of Trends and Applications: 1978 Distributed Processing (Gaithersburg, Md., May 1978), pp. 78-83.]]
[23]
Stonebraker, M. Triggers and inference in data base systems. In Proceedings of the Islamorada Conference on Expert Data Bases (Islamorada Fla., Feb. 1985).]]
[24]
Transputer Databook. INMOS Corp., 1989.]]
[25]
Volliollah, T. A.conceptual framework for fuzzy query processing-A step toward very intelligent database systems. Inf. Process. Manage. 13 (1977), 289-303.]]
[26]
Weikum, G. Enhancing concurrency in layered systems. In Lecture Notes in Computer Science on High Peroformance Transactions Systems, d. Gawlick, M. Haynie and A. Reuter, Eds. Springer- Verlag, New York, 1987.]]
[27]
Zadeh, L.A. Fuzzy sets. Inf. contr. 8 (1965), 338-353.]]

Cited By

View all
  • (2020)A Broadcasting Scheme for Transaction Processing in a Wireless EnvironmentHandling Priority Inversion in Time-Constrained Distributed Databases10.4018/978-1-7998-2491-6.ch005(86-102)Online publication date: 2020
  • (2020)A Novel Method of Smart Communication using PSoC for Wireless Push System2020 International Conference on Emerging Smart Computing and Informatics (ESCI)10.1109/ESCI48226.2020.9167681(184-187)Online publication date: Mar-2020
  • (2018)Even Delta-Matroids and the Complexity of Planar Boolean CSPsACM Transactions on Algorithms10.1145/323064915:2(1-33)Online publication date: 7-Dec-2018
  • Show More Cited By

Recommendations

Reviews

William Campbell McGee

In contrast to conventional DBMS architectures, in which the database is held in a central location to which applications send requests for data, the Datacycle architecture employs the radical notion of sending the entire database cyclically to the application sites and allowing applications to extract data of interest as it goes by. The technology that makes this approach feasible is high-bandwidth fiber optic communication facilities for broadcasting the database, and special VLSI hardware at the application sites for extracting data. A sense of the performance possible with this approach is given in the 1987 paper [1] that first described the architecture, which states that a database of more than four gigabytes can be transmitted in less than one second over a single fiber. The approach is not unlike the operation of early information retrieval systems, in which batches of requests were processed periodically with a single pass of the data. The difference now is that batches are processed in under a second rather than in minutes, hours, or days. This paper describes a prototype implementation of the Datacycle architecture and its use in the advanced telephone directory service application for which it was initially conceived. While the Datacycle architecture appears well suited to information filtering applications (for example, it provides an efficient database trigger facility that could be used to alert subscribers to the appearance of relevant information in the database), the paper says nothing specific about information filtering. The paper consists of an overview section, which introduces the key elements of the architecture (a centralized storage pump and update manager and distributed access managers) and describes the application interface (SQL); a section on query processing, giving more detail on the access managers and the VLSI hardware required for efficient data selection; and a section on transaction processing, where the mechanism used for serializing transactions (optimistic concurrency control) is discussed in detail. The paper concludes with a discussion of the telephone directory service application, and some of the steps needed to upgrade the prototype to production status. One of the main strengths cited for the architecture is its scalability: database capacity is increased by adding storage pumps (all multiplexed onto a single optical fiber), and processing capability is increased by adding access managers. The number of read-only transactions that can execute concurrently is not limited by processing resources. Update transaction throughput may be limited by the centralized update manager and by inter-transaction update interference requiring transaction backout, however. It is interesting how many “hard” database problems go away with this approach. This system has no need for indexes and their attendant optimization problems; no need for periodic data reorganization to improve performance; simple methods for evaluating database triggers and global data consistency; efficient search on any attribute in a record; efficient processing of queries that require inspection of many records in the database (such as spatial and fuzzy queries); and freedom from traditional hotspots that limit concurrency (for example, summary data can be calculated on demand without performance penalty). So impressive are these gains that one must look carefully for problems that are not solved. One area cited by the paper is operations that are necessarily centralized and therefore potential bottlenecks or system availability exposures. Also, the authors note that the prototype is not well suited to selection based on unformatted data (such as text), although work is under way on hardware assists for this operation. They are careful to point out that the architecture is, in a sense, special purpose, although it appears to be much more broadly applicable than the authors admit. The paper is clearly written and sufficiently detailed to provide a good idea of the potential and problems in the Datacycle architecture.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 35, Issue 12
Special issue on information filtering
Dec. 1992
85 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/138859
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 1992
Published in CACM Volume 35, Issue 12

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. VLSI filtering
  2. concurrency control
  3. data filtering
  4. database architectures
  5. database machines
  6. fuzzy queries
  7. high performance
  8. transaction processing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)140
  • Downloads (Last 6 weeks)14
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2020)A Broadcasting Scheme for Transaction Processing in a Wireless EnvironmentHandling Priority Inversion in Time-Constrained Distributed Databases10.4018/978-1-7998-2491-6.ch005(86-102)Online publication date: 2020
  • (2020)A Novel Method of Smart Communication using PSoC for Wireless Push System2020 International Conference on Emerging Smart Computing and Informatics (ESCI)10.1109/ESCI48226.2020.9167681(184-187)Online publication date: Mar-2020
  • (2018)Even Delta-Matroids and the Complexity of Planar Boolean CSPsACM Transactions on Algorithms10.1145/323064915:2(1-33)Online publication date: 7-Dec-2018
  • (2018)Subquadratic Algorithms for the Diameter and the Sum of Pairwise Distances in Planar GraphsACM Transactions on Algorithms10.1145/321882115:2(1-38)Online publication date: 7-Dec-2018
  • (2018)Completeness for First-order Properties on Sparse Structures with Algorithmic ApplicationsACM Transactions on Algorithms10.1145/319627515:2(1-35)Online publication date: 18-Dec-2018
  • (2018)Beating Approximation Factor Two for Weighted Tree Augmentation with Bounded CostsACM Transactions on Algorithms10.1145/318239515:2(1-26)Online publication date: 7-Dec-2018
  • (2018)Firefighting on Trees Beyond Integrality GapsACM Transactions on Algorithms10.1145/317304615:2(1-33)Online publication date: 7-Dec-2018
  • (2014)Structured Signature Scheme for Efficient Dissemination of Tree Structured DataProceedings of the 2014 International Conference on Computational Intelligence and Communication Networks10.1109/CICN.2014.186(882-889)Online publication date: 14-Nov-2014
  • (2013)Exploration and exploitation in evolutionary algorithmsACM Computing Surveys10.1145/2480741.248075245:3(1-33)Online publication date: 3-Jul-2013
  • (2013)3D Virtual worlds and the metaverseACM Computing Surveys10.1145/2480741.248075145:3(1-38)Online publication date: 3-Jul-2013
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media