-
公开(公告)号:US11550771B2
公开(公告)日:2023-01-10
申请号:US17070277
申请日:2020-10-14
Applicant: Oracle International Corporation
Inventor: Jesse Kamp , Allison L. Holloway , Meichun Hsu , Hideaki Kimura , Boris Klots , Vasudha Krishnaswamy , Kartik Kulkarni , Teck Hua Lee , Yunrui Li , Aurosish Mishra , Ajit Mylavarapu , Sukhada Pendse , Garret F. Swart , Shasank K. Chavan , Tirthankar Lahiri , Juan R. Loaiza
Abstract: A shared-nothing database system is provided in which parallelism and workload balancing are increased by assigning the rows of each table to “slices”, and storing multiple copies (“duplicas”) of each slice across the persistent storage of multiple nodes of the shared-nothing database system. When the data for a table is distributed among the nodes of a shared-nothing system in this manner, requests to read data from a particular row of the table may be handled by any node that stores a duplica of the slice to which the row is assigned. For each slice, a single duplica of the slice is designated as the “primary duplica”. All DML operations (e.g. inserts, deletes, updates, etc.) that target a particular row of the table are performed by the node that has the primary duplica of the slice to which the particular row is assigned. The changes made by the DML operations are then propagated from the primary duplica to the other duplicas (“secondary duplicas”) of the same slice.
-
公开(公告)号:US20210390075A1
公开(公告)日:2021-12-16
申请号:US17176856
申请日:2021-02-16
Applicant: Oracle International Corporation
Inventor: Tinggang Wang , Shuo Yang , Hideaki Kimura , Garret F. Swart , Spyros Blanas
IPC: G06F15/173 , G06F16/2453
Abstract: Systems and methods for reducing latency of probing operations of remotely located linear hash tables are described herein. In an embodiment, a system receives a request to perform a probing operation on a remotely located linear hash table based on a key value. Prior to performing the probing operation, the system dynamically predicts a number of slots for a single read of the linear hash table to minimize total cost for an average probing operation. The system determines a hash value based on the key value and determines a slot of the linear hash table to which the hash value corresponds. After predicting the number of slots, the system issues an RDMA request to perform a read of the predicted number of slots from the linear hash table starting at the slot to which the hash value corresponds.
-
公开(公告)号:US20200057731A1
公开(公告)日:2020-02-20
申请号:US16542222
申请日:2019-08-15
Applicant: Oracle International Corporation
Inventor: Hideaki Kimura , Garret F. Swart , Spyros Blanas
IPC: G06F12/1081 , G06F16/23
Abstract: Techniques are described for offloading remote direct memory operations (RDMOs) to “execution candidates”. The execution candidates may be any hardware capable of performing the offloaded operation. Thus, the execution candidates may be network interface controllers, specialized co-processors, FPGAs, etc. The execution candidates may be on a machine that is remote from the processor that is offloading the operation, or may be on the same machine as the processor that is offloading the operation. Details for certain specific RDMOs, which are particularly useful in online transaction processing (OLTP) and hybrid transactional/analytical (HTAP) workloads, are provided.
-
公开(公告)号:US20200042489A1
公开(公告)日:2020-02-06
申请号:US16055978
申请日:2018-08-06
Applicant: Oracle International Corporation
Inventor: Tirthankar Lahiri , Juan R. Loaiza , Garret F. Swart , Jesse Kamp , Avneesh Pant , Hideaki Kimura
IPC: G06F15/167 , G06F15/173 , G06F9/54 , G06F9/455
Abstract: Techniques are provided to allow more sophisticated operations to be performed remotely by machines that are not fully functional. Operations that can be performed reliably by a machine that has experienced a hardware and/or software error are referred to herein as Remote Direct Memory Operations or “RDMOs”. Unlike RDMAs, which typically involve trivially simple operations such as the retrieval of a single value from the memory of a remote machine, RDMOs may be arbitrarily complex. The techniques described herein can help applications run without interruption when there are software faults or glitches on a remote system with which they interact.
-
公开(公告)号:US20230050727A1
公开(公告)日:2023-02-16
申请号:US17974152
申请日:2022-10-26
Applicant: Oracle International Corporation
Inventor: Jesse Kamp , Allison L. Holloway , Meichun Hsu , Hideaki Kimura , Boris Klots , Vasudha Krishnaswamy , Kartik Kulkarni , Teck Hua Lee , Yunrui Li , Aurosish Mishra , Ajit Mylavarapu , Sukhada Pendse , Garret F. Swart , Shasank K. Chavan , Tirthankar Lahiri , Juan R. Loaiza
Abstract: A shared-nothing database system is provided in which parallelism and workload balancing are increased by assigning the rows of each table to “slices”, and storing multiple copies (“duplicas”) of each slice across the persistent storage of multiple nodes of the shared-nothing database system. When the data for a table is distributed among the nodes of a shared-nothing system in this manner, requests to read data from a particular row of the table may be handled by any node that stores a duplica of the slice to which the row is assigned. For each slice, a single duplica of the slice is designated as the “primary duplica”. All DML operations (e.g. inserts, deletes, updates, etc.) that target a particular row of the table are performed by the node that has the primary duplica of the slice to which the particular row is assigned. The changes made by the DML operations are then propagated from the primary duplica to the other duplicas (“secondary duplicas”) of the same slice.
-
公开(公告)号:US11347678B2
公开(公告)日:2022-05-31
申请号:US16055978
申请日:2018-08-06
Applicant: Oracle International Corporation
Inventor: Tirthankar Lahiri , Juan R. Loaiza , Garret F. Swart , Jesse Kamp , Avneesh Pant , Hideaki Kimura
IPC: G06F9/54 , G06F15/173 , G06F15/167 , G06F9/455
Abstract: Techniques are provided to allow more sophisticated operations to be performed remotely by machines that are not fully functional. Operations that can be performed reliably by a machine that has experienced a hardware and/or software error are referred to herein as Remote Direct Memory Operations or “RDMOs”. Unlike RDMAs, which typically involve trivially simple operations such as the retrieval of a single value from the memory of a remote machine, RDMOs may be arbitrarily complex. The techniques described herein can help applications run without interruption when there are software faults or glitches on a remote system with which they interact.
-
公开(公告)号:US10977193B2
公开(公告)日:2021-04-13
申请号:US16542222
申请日:2019-08-15
Applicant: Oracle International Corporation
Inventor: Hideaki Kimura , Garret F. Swart , Spyros Blanas
IPC: G06F13/00 , G06F12/1081 , G06F16/23
Abstract: Techniques are described for offloading remote direct memory operations (RDMOs) to “execution candidates”. The execution candidates may be any hardware capable of performing the offloaded operation. Thus, the execution candidates may be network interface controllers, specialized co-processors, FPGAs, etc. The execution candidates may be on a machine that is remote from the processor that is offloading the operation, or may be on the same machine as the processor that is offloading the operation. Details for certain specific RDMOs, which are particularly useful in online transaction processing (OLTP) and hybrid transactional/analytical (HTAP) workloads, are provided.
-
公开(公告)号:US11720522B2
公开(公告)日:2023-08-08
申请号:US17176856
申请日:2021-02-16
Applicant: Oracle International Corporation
Inventor: Tinggang Wang , Shuo Yang , Hideaki Kimura , Garret F. Swart , Spyros Blanas
IPC: G06F16/245 , G06F15/173
CPC classification number: G06F15/17331 , G06F16/245
Abstract: Systems and methods for reducing latency of probing operations of remotely located linear hash tables are described herein. In an embodiment, a system receives a request to perform a probing operation on a remotely located linear hash table based on a key value. Prior to performing the probing operation, the system dynamically predicts a number of slots for a single read of the linear hash table to minimize total cost for an average probing operation. The system determines a hash value based on the key value and determines a slot of the linear hash table to which the hash value corresponds. After predicting the number of slots, the system issues an RDMA request to perform a read of the predicted number of slots from the linear hash table starting at the slot to which the hash value corresponds.
-
公开(公告)号:US20230127110A1
公开(公告)日:2023-04-27
申请号:US18088353
申请日:2022-12-23
Applicant: Oracle International Corporation
Inventor: Tinggang Wang , Shuo Yang , Hideaki Kimura , Garret F. Swart , Spyros Blanas
IPC: G06F15/173 , G06F16/245
Abstract: Systems and methods for reducing latency of probing operations of remotely located linear hash tables are described herein. In an embodiment, a system receives a request to perform a probing operation on a remotely located linear hash table based on a key value. Prior to performing the probing operation, the system dynamically predicts a number of slots for a single read of the linear hash table to minimize total cost for an average probing operation. The system determines a hash value based on the key value and determines a slot of the linear hash table to which the hash value corresponds. After predicting the number of slots, the system issues an RDMA request to perform a read of the predicted number of slots from the linear hash table starting at the slot to which the hash value corresponds.
-
公开(公告)号:US11526462B2
公开(公告)日:2022-12-13
申请号:US17071164
申请日:2020-10-15
Applicant: ORACLE INTERNATIONAL CORPORATION
Inventor: Tirthankar Lahiri , Juan R. Loaiza , Garret F. Swart , Jesse Kamp , Avneesh Pant , Hideaki Kimura
IPC: G06F9/54 , G06F15/167 , G06F9/455 , G06F15/173
Abstract: Techniques are provided to allow more sophisticated operations to be performed remotely by machines that are not fully functional. Operations that can be performed reliably by a machine that has experienced a hardware and/or software error are referred to herein as Remote Direct Memory Operations or “RDMOs”. Unlike RDMAs, which typically involve trivially simple operations such as the retrieval of a single value from the memory of a remote machine, RDMOs may be arbitrarily complex. The techniques described herein can help applications run without interruption when there are software faults or glitches on a remote system with which they interact.
-
-
-
-
-
-
-
-
-