Access manager for databases

Information

  • Patent Application
  • 20030093413
  • Publication Number
    20030093413
  • Date Filed
    November 15, 2001
    23 years ago
  • Date Published
    May 15, 2003
    21 years ago
Abstract
The present invention provides methods and systems for database replication. In general, a source database management system is configured with an access manager. The access manager implements a replication schedule for replicating data to one or more client systems. Replication is performed for a particular client when the access manager determines that one or more threshold criteria have been satisfied.
Description


BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention


[0002] The present invention relates generally to methods and systems for accessing information stored in a source database of a database management system (DBMS), and in particular, providing replicated data from the source database to a remote user according to a schedule implemented on the (DBMS).


[0003] 2. Description of the Related Art


[0004] Databases are computerized information storage and retrieval systems. One common database is known as a relational database management system (RDBMS), which is a computer database management system that uses relational techniques for storing and retrieving data. Databases are computerized information storage and retrieval systems in which data in the form of tables (formally denominated “relations”) are typically stored for use on disk drives or similar mass data stores. A “table” includes a set of rows (formally denominated “tuples” or “records”) spanning several columns. Data in the tables is stored, retrieved and deleted using high-level query languages, such as the Structured Query Language (SQL). Reference is made to C. J. Date, An Introduction to Database Systems, 6th edition, Addison-Wesley Publishing Co. Reading, Mass. (1994) for an comprehensive general treatment of the database art.


[0005] Commonly, database management systems (DBMS) are part of a distributed system comprising a plurality of servers and clients, as in the case of the client-server model. Typically, the clients and servers communicate via a local area network (LAN) or wide area network (WAN) using well-known protocols such as Transmission Control Protocol and Internet Protocol (TCP/IP). The clients typically make requests to the servers, which manage one or more databases. Once a response for the client's request is formulated, the response is provided to the client.


[0006] One of the many capabilities offered by database management systems is a data replication function. Data replication refers to the copying of data (e.g., a database or a portion of a database) from a primary database to the user's local system. In one aspect, replication allows the user to retrieve updated data information pertinent to previous database requests as the data becomes available in the DBMS. Further, databases are often replicated to reduce contention or access to a primary database or provide stand alone work systems and spaces. Replicated databases provide work fields that allow users and clients to create or inspect data without limiting access by others to a primary database. For clients interested in only specific aspects of the primary database, replicas of particular regions or fragments can be provided to avoid absorbing excess resources. Replicated databases also provide a backup in the event of media failure.


[0007] In current systems, the data replication function is implemented as follows. The client sends a request to the DBMS via a replication server and waits for a response. The DBMS then computes all essential data (using changed data, logs, and relational joins) required to allow the client to update its resident table. This process is repeated for each table that the client subscribes to.


[0008] One problem with conventional data replication functions is that they are under the control of the end-users. Typically, end-users set up replication to databases for quicker access to information of interest without regard to overall system performance or ease of system management. The utility of the replication feature is further limited because most users are unfamiliar with and/or don't care to learn about the replication feature. As a result, typically only knowledgeable users take advantage of the replication feature. In order to achieve some level of success with replication, administrators of the source database (i.e., the database containing the data to be replicated) are left in a position of mandating that users should replicate databases.


[0009] Accordingly, there is a need for an improved system and method for data replication.



SUMMARY OF THE INVENTION

[0010] The present invention generally provides systems, methods and articles of manufacture for automatically replicating source data from a source database to target databases.


[0011] One embodiment provides a method of automatically replicating source data stored in one or more source database tables in a source database management system to at least one of a plurality of clients. The method comprises determining, by the source database management system, whether the source data should be replicated to the at least one client; and if so, replicating the source data to the at least one client.


[0012] Another embodiment provides a computer readable medium containing a program which, when executed, performs an operation for automatically replicating source data stored in one or more source database tables in a source database management system to at least one of a plurality of clients. The operation comprises determining, by the source database management system, whether the source data should be replicated to the at least one client; and if so, replicating the source data to the at least one client.


[0013] Still another embodiment provides a computer system configurable to replicate source data to a plurality of remote computers. The computer system comprises a processor and a memory containing at least a database comprising a plurality of source database tables containing the source data and an access manager program. When executing the access manager program, the processor is configured to at least determine whether the source data should be replicated to the at least one remote computer; and if so, replicate the source data to the at least one remote computer.







BRIEF DESCRIPTION OF THE DRAWINGS

[0014] So that the manner in which the above recited features, advantages and objects of the present invention are attained and can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings.


[0015] It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.


[0016]
FIG. 1 is a networked database system.


[0017]
FIG. 2 is a flowchart illustrating the operation of the networked database system of FIG. 1.







DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0018] The present invention provides methods and systems for database replication. In general, a source database management system is configured with an access manager. The access manager implements a replication schedule for replicating data to one or more client systems. Replication is performed for a particular client when the access manager determines that one or more threshold criteria have been satisfied.


[0019] One embodiment of the invention is implemented as a program product for use with a computer system such as, for example, the network environment 100 shown in FIG. 1 and described below. The program(s) of the program product defines functions of the embodiments (including the methods described below) and can be contained on a variety of signal-bearing media. Illustrative signal-bearing media include, but are not limited to: (i) information permanently stored on non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive); (ii) alterable information stored on writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive); or (iii) information conveyed to a computer by a communications medium, such as through a computer or telephone network, including wireless communications. The latter embodiment specifically includes information downloaded from the Internet and other networks. Such signal-bearing media, when carrying computer-readable instructions that direct the functions of the present invention, represent embodiments of the present invention.


[0020] In general, the routines executed to implement the embodiments of the invention, may be part of an operating system or a specific application, component, program, module, object, or sequence of instructions. The computer program of the present invention typically is comprised of a multitude of instructions that will be translated by the native computer into a machine-readable format and hence executable instructions. Also, programs are comprised of variables and data structures that either reside locally to the program or are found in memory or on storage devices. In addition, various programs described hereinafter may be identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature that follows is used merely for convenience, and thus the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature.


[0021] One illustrative networked database environment 100 is shown in FIG. 1. In general, the networked database environment 100 comprises a server (source) computer 102 in communication with a plurality of client (target) computers 1201, 1202, . . . 120N (collectively referred to as the client computers 120). Each of the client computers 120 includes a database management system 1251, 1252, . . . 125N (collectively referred to as the database management systems 125) comprising a receiving server 1261, 1262, . . . 126N (collectively referred to as the receiving servers 126) and a target database 1281, 1282, . . . 128N (collectively referred to as the target databases 128). The receiving servers 126 are each configured to make requests against the respective target database 128 as well as a source database 106 of the server computer 102. Data received from the server computer 102 is written to the target databases 128 to update the information contained therein. Transmissions between the client computers 120 and the server computer 102 are made via a dedicated Channel 1151, 1152, . . . 115N established over a network connection 114 (e.g., a TCP/IP connection). In this regard, it is contemplated that the client computers 120 and the server computer 102 may be configured with messaging facilities. One messaging facility that can be used to advantage is IBM's MQ Series. The particular methods for data transmission are not limiting of the present invention and persons skilled in the art will recognize a number of suitable mechanisms, whether known or unknown.


[0022] The sending server computer 102 generally comprises a processor 116, a memory 117 and a storage device 118 connected by a bus 119. Illustratively, the processor is a PowerPC available from International Business Machines of Armonk, N.Y. More generally, however, any processor configured to implement the methods of the present invention may be used to advantage.


[0023] Storage 118 is preferably a direct access storage device (DASD), although it is shown as a single unit, it could be a combination of fixed and/or removable storage devices, such as fixed disc drives, floppy disc drives, tape drives, removable memory cards, or optical storage. Memory 117 and storage 118 could be part of one virtual address space spanning multiple primary and secondary storage devices.


[0024] The main memory 117 could be one or a combination of memory devices, including Random Access Memory, nonvolatile or backup memory, (e.g., programmable or Flash memories, read-only memories, etc.) and the like. In addition, memory 117 may be considered to include memory physically located elsewhere in the system 100, for example, any storage capacity used as virtual memory or stored on a mass storage device or on another computer coupled to the server computer 102 via the bus 119.


[0025] The memory 117 includes a database management system 105 comprising a source database 104 and a sending server 106. The database 104 contains a plurality of tables 107 which can be accessed by the sending server 106. In general, the sending server 106 accesses the database 104 as instructed by an access manager 109. More specifically, the access manager 109 is configured with rules 110 which determine under what conditions the access manager 109 invokes the sending server 106 to access the database 104. The rules 110 generally implement a replication schedule 113 for one or more clients 120 when predefined replication thresholds 112 are met. If, for a given client, the predefined replication thresholds are met, then one or more tables 107 of the source database 104 are replicated to the client's local system. To this end, various information (referred to herein as “access manager metrics”) is recorded by the access manager 109 in a log 111. Illustratively, the access manager metrics include when a database request was issued, when the request was processed, the frequency of requests from a particular client, etc. The access manager 109 may then utilize these metrics to determine whether replication is appropriate. In any case, when data is to be sent to one or more clients 120, the sending server 106 sends the data via the appropriate dedicated Channel 1151, 1152, . . . 115N established over the network connection 114 (e.g., a TCP/IP connection).


[0026] Illustrative threshold criteria 112 which may be checked by the rules 110 include time of day used, volume used, frequency of use, user class (e.g., managers, architects, users with read only access, etc.) and user class tolerance of data latency. User class tolerance of data latency is a criterion defined as the latency of a request (i.e., the time duration to satisfy the request) for a particular user class. Illustratively, the rules 110 are configured by an administrator of the sending server computer 102. Alternatively or additionally, the rules may be configured automatically as requests are processed. In the latter embodiment, the server computer 102 possesses sufficient intelligence to implement an optimized replication schedule for the client computers 120. In this manner, the server computer 102, not the client computers 120, dictates replication.


[0027] As noted above replication occurs according to a replication schedule 113. That is, the replication schedule 113 dictates when replication takes place. In general, the replication schedule 113 is created and maintained by an administrator of the server 102. For example, a database administrator for the server 102 may desire to schedule replication for off-hours in order to minimize network load. As an alternative to manual generation of the replication schedule 113, the replication schedule may be automatically generated by the access manager 109 according to the rules 110 and the metrics contained in the log 111.


[0028] In one implementation, the server database management system 105 and the client database management systems 125 are part of collaborative software 103 and 123, respectively. In such an embodiment, an instance of the collaborative software executes on the server computer 102 and each of the client computers 120. The collaborative software maybe any software which allows development, management and distribution of information in a group environment via a database. Examples of collaborative software include Lotus Notes available from IBM, Inc., and Microsoft Exchange available from Microsoft, Inc.


[0029] The systems of FIG. 1 are merely illustrative configurations for data processing systems. Embodiments of the invention can apply to any comparable configuration, regardless of whether the data processing systems are complicated multi-user apparatus, single-user workstations, or network appliances that do not have non-volatile storage of their own. Further, although not shown, each of the client computers 120 may be equipped with well-known hardware, such as a memory, processor, storage, input/output devices, etc. Accordingly, the collaborative software 123 and the database management systems 125 may be understood as contents residing in memory.


[0030]
FIG. 2 is a flow chart of a method 200 illustrating one embodiment of handling client requests and data replication in the networked database environment 100 of FIG. 1. In particular, the method 200 comprises a client routine 202 (i.e., illustrative steps taken by a client computer 120) and a server routine 204 (i.e., illustrative steps taken by the server 102). The method 200 is initiated at step 206 when a client computer 120 requests data from the server 102. The request is transmitted over the network 114 via the appropriate channel 115 and received by the server 102 at step 208. At step 210, the access manager 109 processes the request and logs various access manager metrics. Access manager metrics, some of which have been described above, include the time of day, the size of the request, the user making the request, the frequency with which this user makes requests, the class of the user, etc. More generally, the access manager metrics include any information that can be compared against the threshold criteria 112 to determine whether a replication threshold has been satisfied.


[0031] At step 212, the server 102 sends a response containing the request the data. The data is received by the requesting client 120 at step 214. At step 216, the requesting client 120 sends an acknowledgment to the server 102. In response to receiving the acknowledgment, the access manager 109 logs additional access manager metrics at step 218. The metrics logged at step 218 may include, for example, the latency associated with request.


[0032] At step 220, the server 102 (and more specifically, the access manager 109) determines whether a replication threshold is met. This determination is made by the access manager 109 by comparing, according to the rules 110, selected metrics contained in the log 111 with the threshold criteria 112. The selected metrics used are those metrics associated with the particular user whose request was just handled by the server 102 (in steps 208, 210, 212 and 218). If the replication threshold is not met, then processing proceeds to step 222 where no action is taken. If, however, the replication threshold is met, processing proceeds to step 224 where a replication event is logged in the log 111. At step 226, the data is replicated based on the access manager rules 110.


[0033] The client 120 then receives the replicated data at step 228 and sends an acknowledgment at step 230. Subsequent to receiving the acknowledgement at step 232, the server 102 notifies the client 120 of the replication and the replication schedule 113, as indicated by step 234. The client 120 receives the notification at step 236. The client notification may be handled in any of a variety of methods. For example, in one embodiment the client 120 is notified by e-mail. In another embodiment, the notification is provided to a user as an on-screen message upon attempting to access the primary database 104.


[0034] Of course, database consistency becomes an important issue when multiple replicas exist simultaneously with respect to a primary database. The client-side replicas must be updated to predictably reflect changes entered in the primary database. In one embodiment, the replication schedule 113 dictates when replicas are updated. However, the particular techniques used to update the replicas is a design choice left to the discretion of those skilled in the art. Accordingly, a variety of techniques can be used to advantage to maintain database consistency in the embodiments of the invention. In general, any update technique should demonstrate reasonable throughput and consume limited resources. Amending replica databases to reflect changes entered in a primary database should not unduly limit either replica or primary database access.


[0035] In one embodiment copy replication is used to advantage. Copy replication has been employed to ensure predictable database consistency. Although resource consumptive, copy replication is useful when extensive record changes have been made. In copy replication, copies of the primary database are mapped into database replicas associated with particular users or clients that seek access to the information of the primary database. A copy of the primary is created and is typically applied to the replica database through the local database management system controlling the local replica database. In accordance with a predetermined schedule, database access is locked and the replica is overwritten with the data of the updated primary. The replica database thus reflects changes entered by other clients and users on a predictable basis.


[0036] Another method which may be used to advantage to ensure consistency is update replication. Update replication is more flexible than copy replication and typically updates only records that contain changed data. It can also be structured to update only records of interest to particular database users or clients. In one known type of update replication, a log skimmer monitors a transaction record log for data changes. When a change of interest is identified, the change is imposed on the target database through the local database manager. When a client is interested in only periodic, rather than immediate updates, applicable changes are queued in structured query language (“SQL”) statements corresponding to a sequence of transactions. The channel between the queue and the application process that specifies the changes is blocked until indicated by the update schedule. When scheduled, the block is removed and the application program sequentially specifies a transaction and corresponding subject record to the local database manager which, in response, brings the applicable data page of the target database out of storage for processing in a buffer according to the specified transaction. Once updated, the processed page is over-written into the appropriate area of the target database. This process continues down through a pending queue.


[0037] Persons skilled in the art will recognize that the foregoing methods for ensuring consistency are merely illustrative. More generally, any method for maintaining consistency, whether known or unknown, may be used.


[0038] Accordingly, embodiments of the present invention automate the process of replicating a database without requiring any action or technical replication skills by end-users. The replication is performed automatically by the access manager 109 according to the system behavior of the various users and the threshold criteria 112. For example, an administrator of the server computer 102 may decide that users who submit requests to the database management system 105 once a week do not merit local database replication while users who submit requests to the database management system 105 daily should have to database 104 replicated locally. In this regard, the database administrator could set a threshold such that N (where N is some integer) consecutive days of database access triggers replication.


[0039] In addition, different groups of users accessing the database at different time periods may result in varying latency in the database requests. Accordingly, the database administrator may desire to set a latency threshold such that users in heavy-use time periods trigger database replication where is users and lighter-use time periods do not.


[0040] Further, this process significantly eases resource management by allowing groups (i.e., classes) of users to share rules. For example, all managers in a particular business group can have the same replication rules apply to them at once, instead of having to coordinate local replication for each individual manager using the same database. Those managers causing detrimental performance issues will satisfy the replication threshold and have the appropriate database replicated locally without any action on their part. In contrast, those managers not causing detrimental performance issues will not satisfy the replication threshold and, accordingly, will not induce automatic replication. In either case, no action is required with regard to replication.


[0041] While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.


Claims
  • 1. A method of automatically replicating source data stored in one or more source database tables in a source database management system to at least one of a plurality of clients, comprising: determining, by the source database management system, whether the source data should be replicated to the at least one client; and if so, replicating the source data to the at least one client.
  • 2. The method of claim 1, wherein the source data is replicated to at least two of the plurality of clients and wherein the replicated source data is different for each of the at least two clients.
  • 3. The method of claim 1, wherein the source database management system comprises a server configured to access the one or more source database tables and an access manager configured to perform the determining.
  • 4. The method of claim 1, wherein the source database management system is a component of a computer system and further comprising: programmatically generating, by the computer system, a replication schedule indicative of when replication should occur the at least one client; and transmitting the replication schedule from the computer system to the at least one client.
  • 5. The method of claim 1, further comprising, prior to determining, receiving a request from the at least one client wherein the request specifies one or more client database tables to be updated.
  • 6. The method of claim 1, wherein the source database management system comprises an access manager configured with threshold criteria and wherein determining whether the source data should be replicated comprises executing the access manager to compare the threshold criteria against network behavior of the at least one client.
  • 7. The method of claim 6, wherein the threshold criteria comprises at least one of a time of day criterion, a request size criterion, a user criterion, a user-specific request frequency criterion, a user class criterion, and a combination thereof.
  • 8. The method of claim 6, wherein the network behavior comprises at least one of a time of day, a request size, a user identification, a user class identification, a request frequency, and a combination thereof.
  • 9. A computer readable medium containing a program which, when executed, performs an operation for automatically replicating source data stored in one or more source database tables in a source database management system to at least one of a plurality of clients, the operation comprising: determining, by the source database management system, whether the source data should be replicated to the at least one client; and if so, replicating the source data to the at least one client.
  • 10. The computer readable medium of claim 9, wherein the program is part of a collaborative software package and wherein the plurality of clients each execute an instance of the collaborative software package.
  • 11. The computer readable medium of claim 9, wherein the source data is replicated to at least two of the plurality of clients and wherein the replicated source data is different for each of the at least two clients.
  • 12. The computer readable medium of claim 9, wherein the source database management system comprises a server configured to access the one or more source database tables and an access manager configured to perform the determining.
  • 13. The computer readable medium of claim 9, wherein the operation further comprises: generating a replication schedule indicative of when replication should occur for the at least one client; and transmitting the replication schedule to the at least one client.
  • 14. The computer readable medium of claim 9, wherein the determining occurs after receiving a request from the at least one client wherein the request specifies one or more client database tables to be updated.
  • 15. The computer readable medium of claim 9, wherein the source database management system comprises an access manager configured with threshold criteria and wherein determining whether the source data should be replicated comprises executing the access manager to compare the threshold criteria against network behavior of the at least one client.
  • 16. The computer readable medium of claim 15, wherein the threshold criteria comprises at least one of a time of day criterion, a request size criterion, a user criterion, a user-specific request frequency criterion, a user class criterion, and a combination thereof.
  • 17. The computer readable medium of claim 15, Wherein the threshold criteria are configurable by an administrator of the source database management system.
  • 18. The computer readable medium of claim 15, wherein the network behavior comprises at least one of a time of day, a request size, a user identification, a user class identification, a request frequency, and a combination thereof.
  • 19. A computer system configurable to replicate source data to a plurality of remote computers, the computer system comprising: a memory containing at least: a database comprising a plurality of source database tables containing the source data; and an access manager program; a processor which, when executing the access manager program, is configured to at least: determine whether the source data should be replicated to the at least one remote computer; and if so, replicate the source data to the at least one remote computer.
  • 20. The system of claim 19, wherein the processor executing the access manager program is further configured to: generate a replication schedule indicative of when replication should occur for the at least one remote computer; and transmit the replication schedule to the at least one remote computer.
  • 21. The system of claim 19, wherein the processor executing the access manager program determines whether the source data should be replicated after the computer system receives a request from the at least one remote computer wherein the request specifies one or more remote computer database tables to be updated.
  • 22. The system of claim 19, wherein the database and the access manager program define at least a portion of a database management system.
  • 23. The system of claim 19, wherein the memory further contains collaborative software and wherein the remote computers are each executing an instance of the collaborative software.
  • 24. The system of claim 19, further comprising a server configured to access the plurality of source database tables.
  • 25. The system of claim 24, wherein the database, the access manager program and the server define at least a portion of a database management system.
  • 26. The system of claim 19, wherein the processor executing the access manager program is further configured to determine whether the source data should be replicated by comparing threshold criteria against network behavior of the at least one remote computer.
  • 27. The system of claim 26, wherein the threshold criteria comprises at least one of a time of day criterion, a request size criterion, a user criterion, a user-specific request frequency criterion, a user class criterion, and a combination thereof.
  • 28. The system of claim 26, wherein the network behavior comprises at least one of a time of day, a request size, a user identification, a user class identification, a request frequency, and a combination thereof.
  • 29. The system of claim 26, wherein the memory further contains a log in which the access manager program records the network behavior.