• Title/Summary/Keyword: 데이타베이스 시스템 튜닝

Search Result 6, Processing Time 0.022 seconds

Database System Parameter Toning in the TPC-W Benchmark (TPC-W 성능 평가에서의 데이타베이스 시스템 성능 인자 튜닝)

  • 류문수;정회진;이상호
    • Journal of KIISE:Databases
    • /
    • v.31 no.4
    • /
    • pp.373-383
    • /
    • 2004
  • There have been an emerging interests in the importance of database tuning techniques under modem database environments in which very large-scale data should be managed. In Particular. database performance parameters should be tuned to reflect system loads appropriately. This paper presents two parameter tuning strategies, namely throughput-based and response-time-based, which tune each performance parameter accordingly. The proposed techniques are applied to two commercial database systems in the TPC-W benchmark to see the effectiveness of those methods. The results show that they can help improve system performance considerably.

A Log Analyzer for Database Tuning (데이타베이스 튜닝을 위한 로그 분석 도구)

  • Lee, Sang-Hyup;Kim, Sung-Jin;Lee, Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1041-1048
    • /
    • 2004
  • Database logs contain various information on database operations, but they are used to recover database systems from failures generally. This paper proposes a log analysis tool that provides useful information for database tuning. This tool provides users with information on work-load organization, database schemas, and resources usages of queries. This paper describes the tool in views of its architecture, functions, implementation, and verification. The tool is verified by running the TPC-W benchmark, and representative analysis results are also presented.

Database Workload Analysis : An Empirical Study (데이타베이스 워크로드 분석 : 실험적 연구)

  • Oh, Jeong-Seok;Lee, Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.747-754
    • /
    • 2004
  • Database administrators should be aware of performance characteristics of database systems in order to manage database system effectively. The usages of system resources in database systems could be quite different under database workloads. The objective of this paper is to identify and analyze performance characteristics of database systems in different workloads, which could help database tuners tune database systems Under the TPC-C and TPC-W workloads, which represent typical workloads of online transaction processing and electronic commerce respectively, we investigated usage types of resource that are determined by fourteen performance indicator, and are behaved in response to changes of four tuning parameters (data buffer, private memory, I/O process, shared memory). Eight out of the fourteen performance indicators cleary show the performance differences under the workloads. Changes of data buffer parameter give a influences to database system. The tuning parameter that affects the system performance significantly is the database buffer size in the both workloads.

Automatic Verification and Tuning of Transaction-based Database Applications (트랜잭션 기반 데이타베이스 응용프로그램의 안전성 자동 검증 및 자동 튜닝)

  • Kang Hyun-Goo;Yi Kwangkeun
    • Journal of KIISE:Databases
    • /
    • v.32 no.1
    • /
    • pp.86-99
    • /
    • 2005
  • In this paper, we suggest a system which automatically verifies and tunes transaction processing database applications based on program analysis technology. This system automatically verifies two kinds of transaction processing errors. The first case is the un-closed transaction. In this case, data is not updated as expected or performance of overall system can decrease seriously by locking some database tables until the process terminates. The second case is the miss-use of transaction isolation(inking) level. This causes runtime exception or abnormal termination of the program depending on runtime environment. This system automatically tunes two kinds of inefficient definition of transaction processing which decrease the performance of overall system. The first case happens when opened transaction is closed too late. And the second case happens when transaction isolation level is set too high.

An Index Method for Wireless XML Streams (무선 XML 스트림을 위한 색인 기법)

  • Chung, Yon-Dohn;Lee, Ji-Yeon
    • Journal of KIISE:Databases
    • /
    • v.32 no.4
    • /
    • pp.416-428
    • /
    • 2005
  • In the paper we propose an index method for XML streaming services, where a server broadcasts XML data to a lot of clients in wireless information systems. In order to control the access and tuning time of mobile clients, the proposed method constructs the XML stream through replicating partial index intermixed with parts of data. For this purpose, we propose a two-level tree structure for separating index and XML data into two parts: replicated vs. non-replicated. We analyze the performance of the proposed method with respect to access time and tuning time. With the analysis result, we derive the optimal level value.

A Case Study on SK Telecom's Next Generation Marketing System Development (SK텔레콤의 차세대 마케팅 시스템 개발사례 연구)

  • Lee, Sang-Goo;Jang, Si-Young;Yang, Jung-Yeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.158-170
    • /
    • 2008
  • In response to the changing demands of ever competitive market, SK Telecom has built a new marketing system that can support dynamic marketing campaigns and, at the same time, scale up to the large volumes of data and transactions for the next decade. The system which employs Unix-based client-server (using Web browser interfaces) architecture will replace the current mainframe-based COIS system. The project, named NGM (Next Generation Marketing ), is unprecedentedly large in scale. However, both managerial and technical problems led the project into a crisis. The application framework that depended on a software solution from a major global vendor could not support the dynamic functionalities required for the new system. In March 2005, SK telecom declared the suspension of the NGM project. The second phase of the project started in May 2005 following a comprehensive replanning. It was decided that no single existing solution could cope with the complexity of the new system and hence the new system would be custom-built. As such. a number of technical challenges emerged. In this paper, we report on the three key dimensions of technical challenges - middleware and application framework, database architecture and tuning, and system performance. The processes and approaches, adopted in building NGM system, may be viewed as "best practices" in the telecom industry. The completed NGM system, now called "U.key System," successfully came into operation on the ninth of October, 2006. This new infrastructure is expected to give birth to a series of innovative, fruitful, and customer-oriented applications in the near future.