Download Maintaining Global Integrity in Federated Relational Databases

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Extensible Storage Engine wikipedia , lookup

Serializability wikipedia , lookup

Open Database Connectivity wikipedia , lookup

Global serializability wikipedia , lookup

Microsoft Jet Database Engine wikipedia , lookup

Commitment ordering wikipedia , lookup

Database wikipedia , lookup

Clusterpoint wikipedia , lookup

Relational model wikipedia , lookup

Database model wikipedia , lookup

ContactPoint wikipedia , lookup

Concurrency control wikipedia , lookup

Transcript
Maintaining Global Integrity in Federated
Relational Databases using Interactive
Component Systems
Christopher Popfinger · Stefan Conrad
[email protected]
Department of Computer Science
University of Düsseldorf, Germany
Christopher Popfinger – University of Düsseldorf – Coopis‘05
Outline
Application Scenario
Active Component Database Systems
- Enhanced Activity
- External Program Calls
- Architecture
Global Integrity Maintenance
- Partial Integrity Constraints
- Checking Constraints
Current and Future Work
Christopher Popfinger – University of Düsseldorf – Coopis‘05
2
Application Scenario
Information System /
Global Application
Local
Application
Local
Application
Department A
Department B
global key constraint
eid
name
salary
nr
fullname
salary
12
George Mason
18000
8
Jack Bauer
22000
15
Chase Edmunds
17500
37
Michelle Dessler
16870
56
Nina Myers
19500
23
Tony Almeida
20650
Christopher Popfinger – University of Düsseldorf – Coopis‘05
3
Enhanced Active Database Systems
Until recently: Scope of triggers an stored procedures
limited to local system
New developments: Execution of external programs
from within DBMS
Definition
Ability of a DBS to execute methods or programs from
within ist DBMS to interact with software or hardware
components beyond ist system border is called
Enhanced Activity. A database with Enhanced Activity
is an Enhanced Active Database System (EADBS)
Christopher Popfinger – University of Düsseldorf – Coopis‘05
4
Enhanced Active Functionality
Database Connectivity
- Remote State Query: Querying the state of a remote
data source directly during the execution of a trigger
- Injected Transactions: Modifying a remote data stock
directly during the execution of a trigger
Server-Client Connections: The database is able to use
external services from within triggers via
- Sockets
- Remote Method Invocations
- ..
..
Christopher Popfinger – University of Düsseldorf – Coopis‘05
5
External Program Call
UDF
Trigger
EP
UDF
JD
BC
&
SQ
L
Trigger
Local
Application
Christopher Popfinger – University of Düsseldorf – Coopis‘05
6
Architecture
Christopher Popfinger – University of Düsseldorf – Coopis‘05
7
Checking Global Constraints
Attribute Constraint: Salary of each employee less than
certain value
Key Constraint: Global unique employee identifier
Referential Integrity Constraints: Employee in B can
only be inserted, if it also exists in A
Aggregated Constraints: Sum of salary of all employees
less than certain value
Christopher Popfinger – University of Düsseldorf – Coopis‘05
8
Partial Integrity Constraints
Global constraints expressed over a a set of local
schemata
Global constraint is decomposed into a set of partial
integrity constraints for all affected component systems
A partial integrity constraint consists of:
- a local integrity check
- one or more remote constraint check on interrelated
data
Global constraint is assured, iff all affected component
systems enforce their partial constraints
Christopher Popfinger – University of Düsseldorf – Coopis‘05
9
Partial Key Constraint - Example
global key constraint
eid
name
salary
nr
fullname
salary
12
George Mason
18000
8
Jack Bauer
22000
15
Chase Edmunds
17500
37
Michelle Dessler
16870
56
Nina Myers
19500
23
Tony Almeida
20650
employeeA
define rule partialkeyA
on insert or update of employeeA
if checklocalkey yields false or
checkremotekey yields false
do reject transaction
Department A
employeeB
define rule partialkeyB
on insert or update of employeeB
if checklocalkey yields false or
checkremotekey yields false
do reject transaction
Department B
Christopher Popfinger – University of Düsseldorf – Coopis‘05
10
Partial Key Constraint on Database A
checklocalkey(23)
checkremotekey(23)
false
true
Insert (23,‘Tony Almeida‘,20650)
reject transaction
Department A
Department B
global key constraint
eid
name
salary
nr
fullname
salary
12
George Mason
18000
8
Jack Bauer
22000
15
Chase Edmunds
17500
37
Michelle Dessler
16870
56
Nina Myers
19500
23
Tony Almeida
20650
Christopher Popfinger – University of Düsseldorf – Coopis‘05
11
Implementation
1. Create Java functions using JDBC to connect to
remote database and execute queries
2. Load java archive into enhanced active database
3. Create external UDFs in database with mappings to
the external Java functions
4. Create appropriate triggers on relations to be
monitored that execute the corresponding UDFs
Concrete implementation depends on the capabilities and
specific requirements of the data source
Christopher Popfinger – University of Düsseldorf – Coopis‘05
12
Trigger Definition in DB2 (example)
local
check
remote
check
CREATE TRIGGER employInsert
AFTER INSERT ON employeeA
REFERENCING NEW AS n
FOR EACH ROW MODE DB2SQL
BEGIN ATOMIC
DECLARE numlocal INTEGER;
SET numlocal = (select count(*) from employeeA where eid = n.eid);
IF (numlocal > 1) THEN
SIGNAL SQLSTATE '75000' SET MESSAGE_TEXT=
'Global Key Constraint Violation: Key exists in local database';
END IF;
IF(checkKey('B', 'employeeB', 'nr', n.id) = -1) THEN
SIGNAL SQLSTATE '75000' SET MESSAGE_TEXT =
'Global Key Constraint Violation: Key exists in remote database';
END IF;
END
Christopher Popfinger – University of Düsseldorf – Coopis‘05
13
Characteristics
Implementation of Local Test Transaction (LTT)
protocol (Grefen/Widom)
Referential Integrity with/without cascading
Generalization to more than two sites using nontransaction-based protocols (DRQ,TRQ)
Synchronous and asynchronous protocols possible
Christopher Popfinger – University of Düsseldorf – Coopis‘05
14
Current and Future Work
Current implementations
- Global Constraint Toolkit
- Tightly coupled wrappers with event detection
subsystem1)
- P2P Information Sharing Environment (Dígame)2)
Future Work
- Heterogeneous data replication using Interactive
Component Systems
- External Mapping Manager
1.
Popfinger,C., Conrad,S.: Tightly coupled Wrappers with event detection subsystem for
Heterogeneous Information Systems. In: DEXA Workshop Proceedings, IEEE, 62-66, 2005
2.
Pérez de Laborda,C., Popfinger,C., Conrad,S.: Dynamic Intra- and Inter-Enterprise Collaboration
Using an Enhanced Multidatabase Architecture. In: DEXA Workshop Proceedings, IEEE, 626631,2005.
Christopher Popfinger – University of Düsseldorf – Coopis‘05
15
[email protected]
Christopher Popfinger – University of Düsseldorf – Coopis‘05
16