Open Access Open Access  Restricted Access Subscription or Fee Access

Effective Nested Loop Reactive Join Algorithm for Multiple Relations on Input Data

S. Manikandan

Abstract


Adaptive join algorithms have recently attracted a lot of attention in emerging applications where data are provided by autonomous data sources through heterogeneous network environments. Their main advantage over traditional join techniques is that they can start producing join results as soon as the first input tuples are available, thus, improving pipelining by smoothing join result production and by masking source or network delays. In this paper, we first propose DINER (Double Index NEsted-loops Reactive join), a new adaptive two-way join algorithm for result rate maximization. DINER combines two key elements: an intuitive flushing policy that aims to increase the productivity of in-memory tuples in producing results during the online phase of the join, and a novel reentrant join technique that allows the algorithm to rapidly switch between processing in-memory and disk-resident tuples, thus, better exploiting temporary delays when new data are not available. We then extend the applicability of the proposed technique for a more challenging setup: handling more than two inputs. Multi Active Relational join Algorithm (MARA) is a multiway join operator that inherits its principles from DINER. Our experiments using real and synthetic data sets demonstrate that TARA outperforms previous adaptive join algorithms in producing result tuples at a significantly higher rate, while making better use of the available memory. Our experiments also shows that in the presence of multiple inputs, MARA manages to produce a high percentage of early results, outperforming existing techniques for adaptive multiway join.


Keywords


Query Processing, DINER, MARA, Join.

Full Text:

PDF

References


Babu S and Bizarro P (2005) “Adaptive Query Processing in the Looking Glass,” Proc. Conf. Innovative Data Systems Research (CIDR).

Li F, Chang C, Kollios G, and Bestavros A (2006) “Characterizing and Exploiting Reference Locality in Data Stream Applications,” Proc. IEEE Int’l Conf. Data Eng. (ICDE),.

Nandhini. R, Pavithra. P, Abinaya. P and S.Manikandan, "Information Technology Architectures for Grid Computing and Applications ", International Journal of Advanced Research Computer Engineering and Technology, ISSN: 2278-1323, Vol.3, No.06, pp: 2239-2242, June’2014.

Dittrich J, Seeger B, and Taylor D (2002) “Progressive Merge Join: A Generic and Non-Blocking Sort-Based Join Algorithm,” Proc. Int’l Conf. Very Large Data Bases (VLDB).

Haas P.J and Hellerstein J.M (1999) “Ripple Joins for Online Aggregation,” Proc. ACM SIGMOD.

Haripriya S, Indumathi , S.Manikandan, "Virtual Network Connection Using Mobile Phones", COMPUSOFT, An International Journal of Advanced Computer Technology, ISSN:2320-0790, Vol.03, Issue: 06, pp-980-984, June-2014.

Ives et al Z.G (1999) “An Adaptive Query Execution System for Data Integration,” Proc. ACM SIGMOD.

Baskins Judy Arrays D (2004) http://judy.sourceforge.net.

Bornea M.A , Vassalos V, Kotidis Y, and Deligiannakis A, (2009) “Double Index NEsted-loops Reactive join for Result Rate Optimization,” Proc. IEEE Int’l Conf. Data Eng. (ICDE).

Negri M. and Pelagatti G. (1985) “Join During Merge: An Improved Sort Based Algorithm,” Information Processing Letters vol. 21, no. 1, pp. 11-16.

A. Ramachandran, N. Feamster, and D. Dagon, “Revealing botnet membership using dnsbl counter-intelligence,” in USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06), June 2006.

E. Cooke, F. Jahanian, and D. McPherson, “The zombie roundup: Understanding, detecting, and disrupting botnets,” in Proceedings of SRUTI: Steps to Reducing Unwanted Traffic on the Internet, July 2005.

J. R. Binkley and S. Singh, “An algorithm for anomalybased botnet detection,” in USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06), June 2006.

I. Arce and E. Levy, “An analysis of the slapper worm,” IEEE Security & Privacy Magazine, Jan.-Feb. 2003.

F. Freiling, T. Holz, and G. Wicherski, “Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks,” CS Dept. of RWTH Aachen University, Tech. Rep. AIB-2005-07, April 2005.

D. Dagon, C. Zou, and W. Lee, “Modeling botnet propagation using time zones,” in Proceedings of 13th Annual Network and Distributed System Security Symposium (NDSS), Feburary 2006, pp. 235–249

S. Kandula, D. Katabi, M. Jacob, and A. Berger, “Botz-4- sale: Surviving organized ddos attacks that mimic flash crowds,” in 2nd Symposium on Networked Systems Design and Implementation (NSDI), May 2005.

C. T. News, “Expert: Botnets No. 1 emerging Internet threat,” 2006, http://www.cnn.com/2006/TECH/internet/01/31/furst/


Refbacks

  • There are currently no refbacks.