摘要:
A data storage system includes a column store and a row store. The data storage system may generate a query summary. The data storage system determines query summary fields comprised of a subset of fields from a schema used to store data in the row store. The data storage system searches the column store or the row store for query results in the query summary fields. A query summary field is generated from the query results in the query summary fields.
摘要:
A data storage system (122) includes a column store (281) and a row store (282). The data storage system (122) may generate a query summary. The data storage system (122) determines query summary fields comprised of a subset of fields from a schema used to store data in the row store (282). The data storage system (122) searches the column store (281) or the row store (282) for query results in the query summary fields. A query summary field is generated from the query results in the query summary fields.
摘要:
Systems and methods for processing log data are provided. A set of data chunks is determined. Each data chunk is associated with a set of events, which are grouped according to a primary time dimension field of each event of the set of events. A metadata structure is determined for each of the data chunks. The metadata structure includes comprises a range of the primary time dimension field of all of the events in the data chunk and a range of a secondary time dimension field of all of the events in the data chunk. A subset of the data chunks is selected. A data chunk associated with at least one event of the plurality of events is generated according to the secondary time dimension field of the at least one event.
摘要:
Systems and methods for processing log data are provided. A set of data chunks is determined. Each data chunk is associated with a set of events, which are grouped according to a primary time dimension field of each event of the set of events. A metadata structure is determined for each of the data chunks. The metadata structure includes comprises a range of the primary time dimension field of all of the events in the data chunk and a range of a secondary time dimension field of all of the events in the data chunk. A subset of the data chunks is selected. A data chunk associated with at least one event of the plurality of events is generated according to the secondary time dimension field of the at least one event.
摘要:
A peer-to-peer system includes a plurality of nodes. The plurality of nodes includes at least an initial node and a neighboring node. The initial node is operable to determine whether to place an object at either the initial node or another node in the system based on a comparison of storage utilizations for the initial node and the neighboring node.
摘要:
According to at least one embodiment, a method comprises receiving, into a capacity planning system, workload information representing an expected workload of client accesses of streaming media files from a site. The method further comprises receiving, into the capacity planning system, at least one service parameter that defines a desired service characteristic to be provided by a media server configuration under the expected workload. The method further comprises determining, by the capacity planning system, for at least one server configuration, how many servers of the at least one server configuration to be included at the site for supporting the expected workload in compliance with the at least one service parameter.
摘要:
According to at least one embodiment, a method comprises receiving a session trace log identifying a plurality of sessions accessing streaming media files from a media server. The method further comprises deriving from the session trace log a segment trace log that identifies for each of a plurality of time intervals the segments of the streaming media files accessed, and using the segment trace log to develop an analytical cache performance model. According to at least one embodiment, a method comprises receiving workload information representing client accesses of streaming media files from a media server, and using an analytical cache performance model to compute a cache hit ratio for the media server under the received workload.
摘要:
A method and system for handing-off TCP states in a communication network. Specifically, the present invention allows for handing-off TCP states between nodes in an associated network that is optimized for rare handoff of TCP states. The handoff occurs between dynamically loadable modules that wrap around the TCP/IP stack located at a front-end node and a selected back-end web server. A handoff protocol implemented by the loadable modules works within the kernel level of the existing TCP/IP code. As such, no changes to the existing TCP/IP code is necessary. The loadable modules at the front-end are able to select a back-end web server depending on the content of the web request, coordinate handing off TCP states, and forward packets to the back-end web server. Loadable modules at the selected back-end modify response packets going out to reflect the proper TCP state of the front-end node.
摘要:
In certain embodiments, a method for modeling the memory of a streaming media server is provided. The method comprises creating a segment-based access model for at least one streaming media file available on a streaming media server, and using the segment-based access model to construct a segment-based model of the media server's memory. In certain embodiments, a system comprises a server comprising a memory having a capacity, the server operable to serve at least one streaming file to clients communicatively coupled thereto. The system further comprises a controller operable to determine an amount of unique bytes of the at least one streaming file served by the server during an elapsed time interval, wherein the amount of unique bytes are equal to the capacity of the server's memory.
摘要:
According to one embodiment of the present invention, a method for reconstructing client web page accesses is provided that comprises capturing network-level information for client accesses of at least one web page. The method further comprises constructing a knowledge base of reliable information identifying content of at least one web page, and reconstructing at least one client web page access from the captured network-level information using the reliable information of the knowledge base.