Presentation on theme: "By Snigdha Rao Parvatneni"— Presentation transcript:
1 By Snigdha Rao Parvatneni CS25715.7 Buffer ManagementBy Snigdha Rao ParvatneniSJSU ID:Class Roll Number: 124Course: CS257
2 Agenda Introduction Role of Buffer Manager Architecture of Buffer ManagementBuffer Management StrategiesRelation between Physical Operator Selection and Buffer ManagementExample
3 IntroductionGenerally, we assume that operators in relations have some main memory buffers to store the data.It is very rare that these buffers are allocated in advance to the operator.Task of assigning main memory buffers to processes is given to the Buffer Manager.The Buffer Manager is responsible for allocating the main memory to the process as per the need and minimizing the delays and unsatisfiable requests.
4 Role of Buffer ManagerBuffer Manager responds to the request for main memory access to disk blocks. Below picture depicts it.
5 Architecture of Buffer Management There are two broad architectures for a buffer manager:Buffer manager controls main memory directly like in many Relational DBMS.Buffer manager allocates buffers in virtual memory and let the OS decide which buffers should be in main memory and which buffer should be in OS managed disk swap space like in many Object Oriented DBMS and Main Memory DBMS.
6 ProblemIrrespective of approach there is a problem that buffer manager has to limit number of buffers, to fit in available main memory.When buffer manager controls main memory directlyIf requests exceeds available space then buffer manager has to select a buffer to empty by returning its contents to disk.When blocks have not been changed then they are simply erased from main memory. But, when blocks have been changed then they are written back to its place on disk.When buffer manager allocates space in virtual memoryBuffer manager has the option of allocating more buffers, which can actually fit into main memory. When all these buffers will be in use then there will be thrashing.It is an operating system problem where many blocks are moved in and out of disk’s swap space. Therefore, system will end up spending most of time in swapping blocks and getting very little work done.
7 SolutionTo resolve this problem When DBMS is initialized then the number of buffers is set.User need not worry about mode of buffering used.For users there is a fixed size buffer pool, in other words set of buffers are available to query and to other database actions.
8 Buffer Management Strategies Buffer Manager needs to make a critical choice of which block to keep and which block to discard when buffer is needed for newly requested blocks.Then buffer manager uses buffer replacement strategies. Some common strategies are –Least-Recently-Used (LRU)First-In-First-Out (FIFO)The Clock Algorithm (Second Chance)System Control
9 Last-Recently Used (LRU) This rule is to throw out the block which has not been read or written from long time.To do this the Buffer Manager needs to maintain a table which will indicate the last time when block in each buffer was accessed.It is also needed that each database access should make an entry in this table. Significant amount of is involved effort in maintaining this information.Buffers which are not used from long time is less likely to be accessed before than those buffers which have been accessed recently. Hence, It is an effective strategy.
10 First-In-First-Out (FIFO) In this rule, when buffer is needed then the buffer which has been occupied for longest by same block is emptied and used by new block.To do this Buffer Manager needs to know only the time at which block occupying the buffer was loaded into the buffer.Entry in the table is made when block is read from disk, not every time it is accessed.Involves less maintenance than LRU but it is more prone to mistakes.
11 The Clock AlgorithmIt is an efficient approximation of LRU and is commonly implemented.Buffers are treated to be arranged in circle where arrow points to one of the buffers. Arrow will rotate clockwise if it needs to find a buffer to place a disk block.Each buffer has an associated flag with value 0 or 1. Buffers with flag value 0 are vulnerable to content transfer to disk whereas buffer with flag value 1 are not vulnerable.Whenever block is read into buffer or contents of buffer are accessed, flag associated with it is set to 1.
12 Working of Clock’s Algorithm Whenever buffer is needed for theblock arrow looks for first 0 itcan find in clockwise direction.Arrow move changes flag valuefrom 1 to 0.Block is thrown out of buffer onlywhen it remains unaccessed i.e.flag value 0 for the timebetween two rotations of the arrow.First rotation when flag is set from1 to 0 and second rotation whenarrow comes back to check flag value.
13 System ControlQuery processor and other DBMS components can advice buffer manager to avoid some mistake which occurs with LRU, FIFO or Clock.Some blocks cannot be moved out of main memory without modifying other blocks pointing to it. Such blocks are called pinned blocks.Buffer Manager needs to modify buffer replacement strategy, to avoid expelling pinned blocks. That’s why some blocks are remains in main memory even though there is no technical reason for not writing it to the disk.
14 Relation Between Physical Operator Selection And Buffer Management CS257Relation Between Physical Operator Selection And Buffer ManagementQuery optimizer selects the physical operator to execute the query. These physical operator expects certain number of buffers for execution.However, the buffer Manager does not guarantee the availability of these buffers when query is executed.In this situation two question arisesCan an algorithm adapt to changes in the number of available main memory buffers?When expected number of available buffers are less, then some blocks needs to be put in the disk instead of main memory. How buffer replacement strategy affects the performance?
15 ExampleBlock based nested loop join – algorithm does not depends upon number of available buffers M, but performance depends.For each M-1 blocks of outer loop relation S, read blocks in main memory, organize the tuple into search structure where key is the common attribute between R and S.Now for each block b of inner loop relation R, read b into main memory and for each tuple t of b find tuples in S that join with t.The S uses M-1 buffers and it depends upon average number of buffers available at each iteration. One buffer is reserved for R.If we pin M-1 block that we use for S in one iteration of outer loop then we cannot loose these buffers during that round. If more buffers will become available then more blocks of R can be kept in the memory. Will it improve the running time?
16 Cases with LRU Case1 Case2 When LRU is used as buffer replacement strategy and k buffers are available to hold blocks of R.R is read in order such that blocks that remains in the buffer at the end of iteration of outer loop will be last k blocks of R.For next iteration we will again start from beginning of R. Therefore, k buffers for R needs to be replace.Case2With better implementation of nested loop join when LRU is used visit blocks of R in order that alternates first to last then last to first.In this we save k disk I/O on each iteration except first iteration.
17 With Other AlgorithmsOther algorithms also are impacted by the fact that availability of buffer can vary and by the buffer-replacement strategy used by the buffer manager.In sort based algorithm when availability of buffers reduces we can change the size of a sub-lists. Major limitation of this is we will be forced to create many sub-lists that we cannot then allocate a buffer for each sub-list in the merging process.In hash based algorithm when availability of buffers reduces we can reduce the size of buckets, provided bucket then should not become so large that they do not fit into the allotted main memory.
18 ReferencesDATABASE SYSTEMS: The Complete Book, Second Edition by Hector Garcia-Molina, Jeffrey D. Ullman & Jennifer Widom