z-logo
Premium
Optimizing fragment constraints—A performance evaluation
Author(s) -
Ibrahim H.,
Gray W. A.,
Fiddian N. J.
Publication year - 2001
Publication title -
international journal of intelligent systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.291
H-Index - 87
eISSN - 1098-111X
pISSN - 0884-8173
DOI - 10.1002/1098-111x(200103)16:3<285::aid-int1008>3.0.co;2-s
Subject(s) - computer science , constraint (computer aided design) , data integrity , relational database , data mining , principal (computer security) , database , distributed computing , distributed database , mechanical engineering , engineering , operating system
A principal problem with integrity constraints' use for monitoring dynamically changing database integrity is evaluation cost. This cost associated with performance of checking mechanisms is the main quantitative measure which must be supervised carefully. Based on literature, evaluating an integrity constraint cost includes these main components: (i) data amount accessed; (ii) data amount transferred across network; and (iii) number of sites involved. In distributed databases, where many networked sites are involved, not only amount of data accessed must be minimized but also amount of data transferred across network and number of sites involved. In [Ibrahim H, Gray WA, Fiddian NJ. SICSDD: Techniques and implementation. In Proceedings of Constraint Databases and Applications, Second International Workshop on Constraint Database Systems (CDB'97), Delphi, Greece, January 1997, pp 187–207], we introduced an integrity constraint subsystem for a relational distributed database. The subsystem consists of several techniques necessary for efficient constraint checking, particularly in a distributed environment where data distribution is transparent to application domain. Here, we show how these techniques effectively reduce constraint checking cost in such a distributed environment. This is done by analyzing and comparing generated simplified forms to respective initial constraints respecting amount of data to be accessed, amount of data transferred across network, and number of sites involved during evaluation of constraints or simplified forms. Generally, our strategy reduces data amount needing to be accessed since only fragments of relations subject to update are evaluated. Data amount transferred across network and number of sites that are involved are minimized by evaluating simplified forms at target site, i.e., site where update is performed. © 2001 John Wiley & Sons, Inc.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here