Key-range locking with index trees

作者: Russell J. Green , David B. Lomet

DOI:

关键词: Node (networking)Key (lock)Bounded functionHash functionAlgorithmIndex (publishing)SequenceComputer scienceRange (statistics)

摘要: A database-management system (10) generates bounded-disorder indexes on its database keys. In such an index, the leaf nodes (51, 62) are large and divided into a number of buckets (52, 54, 56, 58), only one which ordinarily is accessed in any given single-record operation. The key values node distributed among node's accordance with hashing function. lockable ranges locked for scanning functions defined key-valued locking, each range bounded by successive that exist database. But multiple-bucket accesses would otherwise be required, because hash-function distribution several buckets, avoided sequence bucket rather than node. addition to existing values, moreover, buckets' key-value limits also employed bound ranges, even if no records contain those limits. This prevents end-of-bucket insertions deletions from needing further I/O operations order identify modify.

参考文章(15)
Yoshiyuki Etoh, Kinichiro Nakano, Kazuyuki Mori, Hiroyuki Nomura, Kiyoshi Yoshida, Isao Yamamoto, Hiroshi Inoue, Koichi Suzuki, System and method for automatically controlling vehicle speed to desired cruise speed ,(1988)
David B. Lomet, A simple bounded disorder file organization with good performance ACM Transactions on Database Systems. ,vol. 13, pp. 525- 551 ,(1988) , 10.1145/49346.50067
Peter Bernard Passe, Larry William Youngren, Gary Ross Ricard, Wilson Douglas Lee, William Simpson Davidson, Richard Lee Cole, Mark John Anderson, Index key range estimator ,(1987)