Database system architecture relies on hardware aspects of secondary storage like disks. Disk access times are slow compared to memory, with typical seek times of 10-40ms and transfer rates of 1-3MB/s. Optimizations aim to minimize random I/O by clustering related data and reading multiple blocks sequentially. Disk failures are addressed through redundancy at the operating system, file system, and database levels using techniques like RAID, logging, and maintaining backup copies.
Understanding the lock manager internals via the fb_lock_print utility
This session will provide a short introduction to the Firebird lock manager and its usage patterns. It will describe how the lock manager can affect the performance of highly loaded systems and outlines the possible bottlenecks and other problems like unexpected lock-ups/freezes that may require special analysis. The structure of the lock table will also be explained.
It will also include a detailed description of the fb_lock_print utility and its usage that will enable the research of issues that are related to the lock manager. A few practical examples illustrating how to analyze the utility output will be provided. This session is mainly of interest to Classic Server users and DBAs.
This talk/tutorial was one that I delivered to multiple organizations -- ranging from semiconductor houses, to start-up system vendors, to research and academic institutions, back in the 2002 time frame. As the abstract below illustrates, it captures the key essence & principles behind the router designs of two of the most popular and landmark switch/routers in our industry -- the Cisco...
Emulex OneConnect Universal Converged Network Adapter (UCNA) platform enables efficient, robust and high-performance connectivity for all business applications while protecting IT investment in existing LAN and SAN infrastructure.
COTS aplicaciones y monitorización de la producción en los pozosMarketing Donalba
Conoce qué aplicaciones existen actualmente para la extracción de pozos, así como herramientas de monitorización del trabajo en los mismos. Todo ello de la mano de nuestra empresa representada Crystal Group.
Application of Cryopreserved Human Hepatocytes in Trichloroethylene
Risk Assessment: Relative Disposition of Chloral Hydrate to Trichloroacetate
and Trichloroethanol
Discover the first panoramic photo album of the beloved city of Beijing. Professional photographer Tamas D.Varga traveled to China’s capital with the desire to discover the remains of ancient times, but ended up encountering a bustling city that was modernizing at a high speed. Readers will witness the beauty of Beijing’s most exquisite sites, from the ancient Great Wall of China and The Forbidden City to the modern teashops, flea markets, and fast-paced nightlife. All of these images belong to Bejing and each of them attests to the unexpected harmony that tradition, modernization, east, and west have found in China. Bejing 360 is a remarkable collection of the landscapes, cityscapes, and people that make up the city of Bejing, China, and the areas that surround it. The panorama shots that make up this book focus on the historical, the modern, and the picturesque coexistence they have achieved in Bejing. This book offers readers a look at the culture and history of a city that is at once modern and ancient.
Webinar: Untethering Compute from StorageAvere Systems
Enterprise storage infrastructures are gradually sprawling across the globe and consumers of data increasingly require access to remote storage resources. Solutions for mitigating the pain associated with this growth are out there, but performance varies. This Webinar will take a look at these challenges, review available solutions, and compare tests of performance.
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
Endpoint security is one of the greatest concerns on the minds of senior management today. Protecting your data and controlling how systems access resources is of the utmost importance. You must take actions to protect your infrastructure while ensuring your employees can continue to perform their jobs effectively and efficiently. Come to this session to learn how you can leverage the power of Novell ZENworks Endpoint Security Management across your enterprise to achieve this delicate balance—so you and the rest of your organization can sleep at night.
Understanding the lock manager internals via the fb_lock_print utility
This session will provide a short introduction to the Firebird lock manager and its usage patterns. It will describe how the lock manager can affect the performance of highly loaded systems and outlines the possible bottlenecks and other problems like unexpected lock-ups/freezes that may require special analysis. The structure of the lock table will also be explained.
It will also include a detailed description of the fb_lock_print utility and its usage that will enable the research of issues that are related to the lock manager. A few practical examples illustrating how to analyze the utility output will be provided. This session is mainly of interest to Classic Server users and DBAs.
This talk/tutorial was one that I delivered to multiple organizations -- ranging from semiconductor houses, to start-up system vendors, to research and academic institutions, back in the 2002 time frame. As the abstract below illustrates, it captures the key essence & principles behind the router designs of two of the most popular and landmark switch/routers in our industry -- the Cisco...
Emulex OneConnect Universal Converged Network Adapter (UCNA) platform enables efficient, robust and high-performance connectivity for all business applications while protecting IT investment in existing LAN and SAN infrastructure.
COTS aplicaciones y monitorización de la producción en los pozosMarketing Donalba
Conoce qué aplicaciones existen actualmente para la extracción de pozos, así como herramientas de monitorización del trabajo en los mismos. Todo ello de la mano de nuestra empresa representada Crystal Group.
Application of Cryopreserved Human Hepatocytes in Trichloroethylene
Risk Assessment: Relative Disposition of Chloral Hydrate to Trichloroacetate
and Trichloroethanol
Discover the first panoramic photo album of the beloved city of Beijing. Professional photographer Tamas D.Varga traveled to China’s capital with the desire to discover the remains of ancient times, but ended up encountering a bustling city that was modernizing at a high speed. Readers will witness the beauty of Beijing’s most exquisite sites, from the ancient Great Wall of China and The Forbidden City to the modern teashops, flea markets, and fast-paced nightlife. All of these images belong to Bejing and each of them attests to the unexpected harmony that tradition, modernization, east, and west have found in China. Bejing 360 is a remarkable collection of the landscapes, cityscapes, and people that make up the city of Bejing, China, and the areas that surround it. The panorama shots that make up this book focus on the historical, the modern, and the picturesque coexistence they have achieved in Bejing. This book offers readers a look at the culture and history of a city that is at once modern and ancient.
Webinar: Untethering Compute from StorageAvere Systems
Enterprise storage infrastructures are gradually sprawling across the globe and consumers of data increasingly require access to remote storage resources. Solutions for mitigating the pain associated with this growth are out there, but performance varies. This Webinar will take a look at these challenges, review available solutions, and compare tests of performance.
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
Endpoint security is one of the greatest concerns on the minds of senior management today. Protecting your data and controlling how systems access resources is of the utmost importance. You must take actions to protect your infrastructure while ensuring your employees can continue to perform their jobs effectively and efficiently. Come to this session to learn how you can leverage the power of Novell ZENworks Endpoint Security Management across your enterprise to achieve this delicate balance—so you and the rest of your organization can sleep at night.
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)Serhad MAKBULOĞLU, MBA
Serhad Makbuloğlu tarafından verilecek bu web seminerinde, Windows Server 2012 Active Directory Domain and Trust (Forest Trust) konusu anlatılacaktır. Bu web semineri teknik içeriğe sahiptir. Ayrıca Web seminer sonundaki soru&cevap bölümünde de bu ürünle ilgili merak ettiğiniz soruların cevaplarını bulabilirsiniz.
DFX Architecture for High-performance Multi-core MicroprocessorsIshwar Parulkar
This presentation was given at ITC 2008 (International Test Conference). It deals with DFX challenges and solution for high count multi-core microprocessors. Acknowledgment: Co-authors on ITC presentation - Gaurav Agarwal, Sriram Anandakumar, Gordon Liu, Rajesh Pendurkar, Krishna Rajan and Frank Chiu.
Sürat Teknoloji, 18 Ekim 2012 tarihinde İstanbul Kongre Merkezi'nde gerçekleştirilen EMC Forum etkinliğine altın sponsor oldu. “İşinizi + BT’yi + Kendinizi Dönüştürün” ana temalı etkinliğe bilişim sektöründen çok sayıda davetli katıldı.
Etkinlikte, Sürat Teknoloji Veri Depolama Kıdemli Uzmanı Murat Güneş “Büyük Veri Sizi Korkutmasın” başlığı ile EMC Isilon sunumu yaptı. Bu sunumu Slideshare'de paylaşıma açıyoruz.
Büyük Veri ve EMC Isilon hakkında detaylı bilgiye ihtiyaç duymanız halinde çekinmeden bize ulaşabilirsiniz. Size yardımcı olmaktan mutluluk duyarız.
Saygılarımızla,
Sürat Teknoloji
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Hardware
1. CSE232A: Database System
Principles
Notes 02: Hardware
1
Database System Architecture
Query Processing Transaction Management
SQL query Calls from Transactions (read,write)
Parser Transaction
relational algebra Manager
Query View
Hardware
Rewriter definitions aspects of
Concurrency Lock
Controller Table
and
Optimizer
Statistics &
Catalogs &
storing and
query execution
System Data retrieving data
Recovery
plan Manager
Execution Buffer
Engine Manager
Data + Indexes Log
Memory Hierarchy
• Cache memory
– On-chip and L2
– Caching outside control of DB
Cost per byte
system
• RAM
Capacity
Access Speed
– Addressable space includes virtual
memory but DB systems avoid it
– Main memory DBs rely more on
OS
• Disk
– Access speed & Transfer rate
– Winchester, arrays,…
• Tertiary storage
– Tapes, jukeboxes, DVDs
3
1
2. Storage Cost
nearline offline
1015 tape & tape
optical
typical capacity (bytes)
1013 magnetic disks
optical
1011 electronic disks
secondary online
109 electronic tape
main
107
from Gray & Reuter
105 cache
103
10-9 10-6 10-3 10-0 103
access time (sec)
4
Storage Cost from Gray & Reuter
104 cache
electronic
102 online
main
tape
dollars/MB
electronic
secondary magnetic
optical nearline
100 tape &
disks
optical
disks
10-2 offline
tape
10-4
10-9 10-6 10-3 10-0 103
access time (sec)
5
Volatile Vs Non-Volatile
Storage
• Persistence important for transaction
atomicity and durability
• Even if database fits in main memory
changes have to be written in non-
volatile storage
• Hard disk
• RAM disks w/ battery
• Flash memory
6
2
3. Cost of Disk Access
• How many blocks were accessed ?
• Clustered/consecutive ?
7
Moore’s Law: Different Rates
of Improvement
• Processor speed Clustered/sequential
access-based algorithms
Disk Transfer Rate
• Main memory bit/$
become relatively
• Disk bit/$ better
• RAM access speed
• Disk access speed
• Disk transfer rate
Access
Time
Disk
8
Moore’s Law: Different Rates
of Improvement
Cost of “miss”
increases
Cache Capacity
RAM Capacity
Access
Time
Disk
9
3
4. Focus on: “Typical Disk”
Controller
BUS
Disk
…
Terms: Platter, Head, Actuator
Cylinder, Track
Sector (physical),
Block (logical), Gap
10
Often different numbers
Top View of sectors per track
Sector
Track
Block
(typically Gap
multiple
sectors) 11
“Typical” Numbers
Diameter: 1 inch ® 15 inches
Cylinders: 100 ® 20000
Surfaces: 1 (CDs) ®
(Tracks/cyl) 2 (floppies) ®
® 5 (typical hd)
® 30
Sector Size: 512B ® 50K
Capacity: 360 KB (old floppy)
® 30 GB
12
4
5. Key performance metric: Time
to fetch block
I want block x
block X in memory
?
Time = Seek Time (locate track) +
Rotational Delay (locate sector)+
Transfer Time (fetch block) +
Other (disk controller, …)
13
Track
Seek Delay Where
Head
must go
Track
Where
Head is
14
Rotational Delay
Head Here
Block I Want
15
5
6. Seek Time
3 or 5x
Time
x
Few ms
1 N
Cylinders Traveled
16
Average Random Seek Time
N N
å å SEEKTIME (i ® j)
i=1 j=1
S= j¹i
N(N-1)
“Typical” S: 10 ms ® 40 ms
17
Average Rotational Delay
R = 1/2 revolution
“typical” R = 8.33 ms (7200 RPM)
Assume we have to start reading
from start of first sector
18
6
7. Transfer Rate: t
• “typical” t: 1 ® 3 MB/second
• transfer time: block size
t
19
Other Delays
• CPU time to issue I/O
• Contention for controller
• Contention for bus, memory
“Typical” Value: 0
20
Practice Problem
• Single surface
• Rotation speed 7200rpm
• 16,384 tracks
• 128 sectors/track
• 4096 bytes/sector
• 4 sectors/block (16,384 bytes/block)
• SEEKTIME (i ® j) = [1000 + (j-i)] µs
• Neglect gaps
• Calculate minimum, maximum, average time
to fetch one block
21
7
8. Practice Problem: Minimum Time
• Head is at the start of the first sector of
the block
• Just compute transfer time
• 4 sectors cover 4/128 of a track
• 1 full rotation takes 60/7200=8.33ms
• Transfer time is 8.33 * 4 /128 = 0.26ms
22
Practice Problem: Maximum Time
• Assume read must start at the first
sector
• Head is at innermost, required track is
the outermost
• Seek time = …
• Head just missed the beginning
• Rotational delay = …
• Transfer time = …
23
Practice problem: Average
time
• Solve…
24
8
9. • So far: Random Block Access
• What about: Reading “Next” block?
Time to get = Block Size + Negligible
block t
- skip gap
- switch track
- once in a while,
next cylinder
25
Rule of Random I/O: Expensive
Thumb Sequential I/O: Much less
• Ex: 1 KB Block
» Random I/O: ~ 20 ms.
» Sequential I/O: ~ 1 ms.
26
Practice Problem cont’d:
Sustained Bandwidth over Track
• Assume required blocks are consecutive
on single track
• What is the sustained bandwidth of
fetching consecutive blocks?
• 128 sectors/track * 4KB/sector in
8.33ms/track full rotation =
512KB/8.33ms = 61.46KB/ms
27
9
10. Suggested optimization
• Cluster data in consecutive blocks
• Give an extra point to algorithms that
– exploit data clustering by avoiding
“random” accesses
– Read/write consecutive blocks
28
Example: 2-Phase Merge Sort
P K AD L E ZW J C RH Y F X I
Main Memory: 4 blocks
READ
P K A D L E ZW
SORT
A D K P L D WP
E K P K Z WRITE A D K P L DWP
E K P K Z
…
MERGE
AD DP
C K F
WRITE
C F H I J R X Y
Improve by bringing max number of 29
blocks in memory
Cost for Writing similar to Reading
…. unless we want to verify!
need to add (full) rotation + Block size
t
30
10
11. • To Modify a Block?
To Modify Block:
(a) Read Block
(b) Modify in Memory
(c) Write Block
[(d) Verify?]
31
Block Address:
• Physical Device
• Cylinder #
• Surface #
• Sector
Once upon a time DBs
had access to such – now
it is the OS’s domain
32
Optimizations (in controller or O.S.)
• Disk Scheduling Algorithms
– e.g., elevator algorithm
• Track (or larger) Buffer
• Pre-fetch
• Arrays
• Mirrored Disks
33
11
12. Double Buffering
Problem: Have a File
» Sequence of Blocks B1, B2
Have a Program
» Process B1
» Process B2
» Process B3
...
34
Single Buffer Solution
(1) Read B1 ® Buffer
(2) Process Data in Buffer
(3) Read B2 ® Buffer
(4) Process Data in Buffer ...
35
Say P = time to process/block
R = time to read in 1 block
n = # blocks
Single buffer time = n(P+R)
36
12
13. Double Buffering
process process
Memory:
C
A B
Disk:
A B C D E F G
done
done
37
Say P ³ R
P = Processing time/block
R = IO time/block
n = # blocks
What is processing time?
• Double buffering time = R + nP
• Single buffering time = n(R+P)
Improvement much more dramatic if
consequtive blocks: … 38
Block Size Selection?
• Big Block ® Amortize I/O Cost
Unfortunately...
• Big Block Þ Read in more useless stuff!
and takes longer to read
39
13
14. Trend
• memory prices drop and memory capacities
increase,
• transfer rates increase
• Disk access times do not increase that much
Þ blocks get bigger ...
40
Disk Failures (Sec 2.5)
• Partial ® Total
• Intermittent ® Permanent
41
Coping with Disk Failures
• Detection
– e.g. Checksum
• Correction
Þ Redundancy
42
14
15. At what level do we cope?
• Single Disk
– e.g., Error Correcting Codes
• Disk Array
Logical Physical
43
Operating System
e.g., Stable Storage
Logical Block Copy A Copy B
44
Database System
• e.g.,
Log
Current DB Last week’s DB
45
15