The present invention relates to methods of estimating SQL-like queries over data-streams, and more particularly, to methods for optimizing workloads of multi-join queries over multiple data-streams.
Traditional database management systems (DBMS) deal with persistent data sets that are reliably stored and may be accessed multiple times during any query. In several important application domains, however, data arrives continuously and needs to be processed in a single pass. Such continuous data-streams arise naturally in a number of applications including telecommunication networks, retail chain transactions and banking automated teller machine (ATM) transactions.
In order to monitor these data-streams and detect patterns that may, for instance, indicate fraudulent use, equipment malfunction or non-optimal configuration, it is necessary to query these data-streams in real time using algorithms that only have access to each data element in the stream once, in the arbitrary order in which the data element appears in the data-stream. Because of the limitations of the computers doing the monitoring it is also necessary that these algorithms use only a relatively small amount of memory. Moreover, the need for real-time answers means that the time for processing each element must also be small.
Briefly described, the present invention provides a method of efficiently providing estimated answers to multiple, concurrent, aggregate SQL-like queries over a number of input data streams. The method is capable of processing multi-join queries, only examines each data element in the data-stream once, uses a limited amount of computer memory and is effective on large volumes of data.
A multi-join query may be represented by a join query graph which has a distinct vertex v for each data-stream R referenced in the query, and a distinct, undirected edge e for each equality constraint of the query.
The approximate answer to a multi-join query may be obtained using the join graph and atomic sketches. The atomic sketches are essentially pseudo-random summaries of the data and may be represented mathematically by the equation:
Xv=Σi
where Xv represents the atomic sketch at the vertex v of the join graph, A represents a join attribute of the query, f represents a frequency vector, ξ represents a random binary variable, and i, j and k represent integers. An important constraint is that while the binary random variable associated with attributes from a common edge are shared, the binary random variable associated with attributes from distinct edges are independent.
The estimated answer to the query is then the product of all the atomic sketches for all the vertices in the join graph, i.e., the estimated answer to the query may be represented mathematically by the equation:
XQ=ΠvXv
where XQ represents the estimate for the query Q, and Xv represents the atomic sketch for vertex v of the query's join graph.
In a preferred embodiment of the invention, a query workload of multiple, multi-join aggregate queries is processed efficiently by identifying and sharing atomic sketches common to distinct queries in the workload. Sketches that may be shared are identified by transforming the collection of join graphs representing the query workload into one or more transformed join graphs. In the transformed join graphs, vertices corresponding to the same data-stream R, and where the query concerns the same attribute A of R, are coalesced. In transforming the join graph it is, however, important to make sure that while the binary variables on the same edge are the same, the binary variables of distinct edges of a single query that share a common vertex are independent. Transformed join graphs in which the binary variables meet these requirements are said to be well-formed.
A further embodiment of the invention includes an algorithm that automatically produces well-formed transform join graphs and minimizes the average query error.
Another further embodiment of the invention includes an algorithm that produces well-formed transform join graphs and minimizes the maximum query error over the workload.
These and other features of the invention will be more fully understood by references to the following drawings.
a is an example of a well-formed join graph using sketch-sharing.
b is an example of a join graph that is not well formed.
a-b show a flow graph over two iterations of the ComputeSpace algorithm.
The present invention relates to monitoring data-streams and particularly to performing real-time monitoring on data that is only seen once and in which data elements arrive in an arbitrary order.
A particularly desirable form of monitoring is to perform queries on these data-streams that are similar to the structured query language (SQL) queries performed on more traditional fixed data bases.
In particular, it is desirable to efficiently process workloads of multiple, concurrent aggregate SQL queries over a number of input data streams and provide reasonably accurate approximate answers to the queries when the data is arriving in a data-stream and each data element can only be examined once. The processing algorithms need to be capable of dealing with multi-join SQL-like queries and the answer needs to be provided in real time using limited computer memory.
The present invention relates to methods of efficiently providing estimated answers to workloads of multiple, concurrent, aggregate multi-join SQL-like queries over a number of input data streams. The methods are based on computing small, pseudo-random sketch synopses of the data. Furthermore, the methods only examine each data element in the data-stream once, use a limited amount of computer memory, are effective on large volumes of data and can accommodate both the insertion and deletion of data elements. By intelligently sharing sketches among concurrent queries of the workload, the present invention provides substantial improvements in the utilization of available space for storing sketches and in the quality of the approximation error guarantees.
Multi-join queries may be represented by join query graphs having a distinct vertex v for each data-stream R referenced in the query, and a distinct, undirected edge e for each equality constraint of the query, as shown in
The approximate answer to a multi-join query may be obtained using the join graph and sketches that are essentially pseudo-random summaries of the data.
The basic technique of using sketches may be illustrated by considering how to estimate the size of a binary join of two data-streams R1 and R2 on attributes R1.A1 and R2.A2, i.e. the result of query Q=COUNT(R1|X|R1.A1=R2.A2R2), as the tuples of R1 and R1 stream in. If dom(A) denotes the domain of an attribute A and fR(i) is the frequency of attribute value i, then the answer to the query is given by the expression Q=Σiεdom(A1)fr1(i)fr2(i), i.e., the inner product of the frequency vectors. In order to estimate this answer, a random variable XQ can be defined, such that it is easily computed over streaming values, is an unbiased estimator for the join size and allows probabilistic guarantees on the quality of the estimate. This may be done by:
1). Selecting a family of four-wise independent binary random variables {ξi:i=1, . . . |dom(A1)|}, where each ξiε{−1, +1} and the probability P|ξi=+1|=P|ξi=+1|=½.
2). Defining XQ=X1.X2 where Xk=Σiεdom(A1)fr1(i)ξi for k=1,2.
XQ is then an estimate of Q, i.e., an estimate of the required answer. Xk is a randomized linear projection of the frequency vector of Rk.Ak and the vector ξ. Xk can be efficiently generated by starting with Xk equal to zero, and adding ξi to it whenever the ith value of Ak appears in the stream.
The quality of the estimation guarantees of such a sketch based estimation can be improved using a standard boosting technique that maintains several independent, identically-distributed, instantiations of the above process, and uses average and median selection over the XQ estimates to boost accuracy and probabilistic confidence, as detailed in, for instance, Dobral et al.
This basic sketch based technique can be extended to approximate the result of general, multi-join aggregate SQL-like queries over a collection of streams, as will now be described in detail by reference to the accompanying drawings.
The R data-streams 12 are all unordered sequences of elements. The element values may themselves be vectors or have vectors associated with them. These vectors may include values that indicate if the data elements are insert or delete operations.
In contrast to conventional database management systems (DBMS), the stream query processing engine 14 only sees each data element in streams 12 once and in the fixed order in which the elements happen to arrive. The order of element arrival in each stream is arbitrary, and elements with duplicate values can occur anywhere over the duration of the stream.
The computer memory 18 is small compared to the number of data elements in the data-streams and is used to maintain a concise and accurate synopsis of each data-stream, each synopsis 16 comprising one or more atomic sketches 20 for data-steams 12. The main constraints on each synopsis are (1) that it is much smaller than the total number of data elements (also known as “tuples”) in the data stream, in particular that its size is logarithmic or poly-logarithmic with respect to the size of the data-stream, and (2) that the synopsis can be computed in a single pass over the tuples in the data-stream, in any, arbitrary order of their arrival. Furthermore, at any point in time, the query processing algorithms must be able to combine the maintained synopses to produce an approximate answer to all queries 22 in the query workload 21.
The query workload 21 may be represented mathematically as ={Q1, . . . Qq}, i.e., a collection of arbitrary, SQL-like queries over a set of relations R1 . . . Re, with each query typically referencing a subset of the relations/attributes in the input.
The join graph Q) can be used to represent a multi-join query Q of the form: “SELECT COUNT FROM R1, . . . Rr WHERE ε”, where ε represents the conjunction of n equi-join constraints of the form Ri.Aj=Rk.Al. The result of Q is the number of tuples in the cross-product R1, . . . Rr that satisfy the equality constraints over the join attributes.
An unbiased, bounded-variance probabilistic estimate XQ for Q can be constructed using atomic sketches built on the join graph Q). More specifically, for each edge e of the join graph a family of four-wise independent random variables ξe is selected, where ξe={ξei: i=1, . . . |dom(Av(e))|}, where each ξeiε{−1, +1}. It is important that while an equi-join attribute pair that share an edge also share a random variable, equi-join attributes of a give query that are on distinct edges e having a common vertex v use independent random variables.
Let e1 . . . , ek be the edges incident on v and, for i1ε dom(Av(ei)), . . . ikε dom(Av(ek))., let fv(i1, . . . , ik) denote the number of tuples in R(v) that match values i1, . . . , ik in their join attributes. Then the atomic sketch at v may be represented as:
Xv=Σi
The estimated answer to the query is then the product of all the atomic sketches for all the vertices in the join graph, i.e., the estimated answer to the query may be represented mathematically by the equation:
XQ=ΠvXv
where XQ represents the estimate for the query Q, and Xv represents the atomic sketch for vertex v of the query join graph.
Each atomic sketch Xv can be efficiently computed as the tuples of R(v) stream in, by initially setting Xv to zero and then adding IIkj=1 ξejt|Av(ej)| to it for each tuple t in the stream.
A naïve approach to processing the workload of
Because, relation R1.A1 appears in both edges e1 and e3 a more economic way to evaluate the work load is to use the same atomic sketch for R1.A1 for both edges e1 and e3, a with a single binary random variables ξ for both edges. This reduces the total number of atomic sketches that need to be maintained to four and uses only two families of binary random variable.
b shows an attempt to coalesce the join graph further because of the additional observation that the relation R3.A2 appears in both edges e2 and e3. This further coalescence of vertices, however, results in a join graph that is ill-formed, because it has the contradictory requirements that edges e1, e2 and e3 use the same, non-independent, family of random binary variables ξ and that edges e1 and e2 each use a different, independent family of random binary variables ξ. This contradiction arises because e1 and e3 share an atomic sketch and therefore require the same family of binary variables. Furthermore, in the ill-formed coalescence represented in
This problem of when a coalesced join graph is well-formed can be formalized by introducing a notion of transitive ξ-equivalence among edges of a multi-query graph. Two edges e1 and e2 are defined to be ξ-equivalent if either (1) e1 and e2 are incident on a common vertex and Av(e1)=Av(e2); or (2) there exists an edge e3 such that e1 and e3 are ξ-equivalent and e2 and e3 are ξ-equivalent.
A well-formed join graph can then be defined as one in which, for every pair of ξ-equivalent edges, the queries containing the edges are distinct.
Given a large workload of complex queries, they may be a large number of well-formed join graphs, all of which can be used to provide approximate answers to the queries. Since a key resource constraint in a data-streaming environment is the amount of memory available to the query processor, an important objective is to compute approximate answers to the queries in the workload that are as accurate as possible, given a fixed amount of memory. So, in addition to computing well-formed join graphs for a workload of queries, it is also important to be able to allocate memory to the various vertices of the graphs so than an appropriate aggregate error, such as the average or maximum error, is minimized over all queries in the workload.
One method of finding the minimum average error is to find groups of nodes and edges that have the same memory allocation in the optimal solution. These groups are called equivalent-components (≡-components).
In a preferred embodiment of the invention, a query workload of multiple, multi-join aggregate queries are processed efficiently by identifying and sharing sketches common to distinct queries so that the average error over the workload is minimized. Sketches that may be shared are identified by transforming the collection of join graphs representing the query workload into one or more transformed join graphs in which common vertices are coalesced, i.e., vertices corresponding to the same data-stream R, and where the query concerns the same attribute A of R, are joined. In transforming the join graph, however, it is important to make sure that, while the binary variables on the same edge are the same, the binary variables of distinct edges that share a common vertex are independent. Transformed join graphs in which the binary variables meet these requirements are said to be well-formed.
Table 1 outlines an algorithm ComuputeSpace that, for a given join graph J and a given amount of space M in which to store sketches, provides a set of components that characterize the optimal solution for space allocation. The components can be used to calculate the optimal values of the space MQ required for each query Q, and the space mv for each vertex v, in the workload and the associated error. When using the sketches of the preferred embodiment of this invention, it is also necessary that the join graph J is well formed, as detailed above.
Formal proofs of algorithm ComuputeSpace and its associated algorithms are described in detail in Dobra et al., while the following description represents an overview of the relevant function of the steps of the algorithm.
In steps 1-3, algorithm ComuputeSpace is initialized to contain all the components in the well formed join graph J, and to make the optimized set of components initially equal to zero.
In step 5, all the components in the join graph are examined to identify connected components.
In steps 6-14, the algorithm loops though all the connected components and deletes from the set of edges E a subset of edges E′ that connect between pairs of distinct ≡-components, until contains the final set of ≡-components.
As defined in Dobra et al, distinct ≡-components are ones that satisfy the following conditions:
where the weight WQ of query Q is given by the appropriate multiple of the variance of the query atomic sketch over the squared error of the atomic sketch, i.e., WQ=8Var[XQ]/E[XQ2. WQ is a constant for each query Q for a given, fixed confidence parameter δ. As long as there is some historical information or a coarse a-priori knowledge of the data distributions, E[XQ] and Var[XQ] can be obtained by estimating join and self-join sizes. W(C) is the combined weights of all the queries in component C.
The algorithm SelectEdges, shown in table 2 below, computes the set of edges E′ that need to be deleted.
In step 15 of algorithm ComuputeSpace, the two equations above that define the memory allocation of ≡-components are solved to provide the optimal memory allocation MQ that minimizes the error ΣQWQΦ(MQ), where Φ is an arbitrary convex, strictly decreasing function This average error optimization algorithm can be used for multi-query processing irrespective of the summarization technique used as long as the error is a strict concave function of the size of the summary, which is almost always the case.
Table 2 shows the steps of algorithm SelectEdges, which identifies the edges between ≡-components that can be eliminated. The algorithm uses a max-flow solution of the flow graph of C. A flow graph of a component is a directed graph with capacity on the edges. The max-flow solution may be found by any well-known technique such as, but not limited to, the Ford-Fulkerson algorithm.
In steps 2 and 3, SelectEdges uses the algorithms Forward-Mark and Backward-Mark, detailed below in tables 3 and 4, to provide sets of edges SF and SB that are sets of vertices reachable in C from unsaturated v and Q vertices respectively, but which do not traverse 0-flow edges.
In step 4, SelectEdge identifies the vQ edges that span SF and SB, i.e., the edges between ≡-components.
Table 3 shows the steps of algorithm Forward-Mark, which finds the set S of vertices reachable from an unsaturated v vertex in a component of a flow graph with out traversing any 0-flow edges from a Q vertex to a v vertex.
Table 4 shows the steps of algorithm Backward-Mark, which finds the set S of vertices reachable from an unsaturated Q vertex in a component of a flow graph with out traversing any 0-flow edges from a Q vertex to a v vertex.
a and 5b show a flow graph over two iterations of algorithm ComputeSpace. The flow graph F(C) shown in
a shows the flow graph F(C) for the initial connect component C invoked by SelectEdges in a first iteration of algorithm ComputeSpace. Each edge in the flow graph is labeled with its capacity and the max-flow that can be pushed along that edge. For instance, the capacity for the edge out of Q1 is WQ1.|V(C)|/W(C)=3.5/15=1. All the vertices in
In this first iteration, the call to algorithm Backward-Mark returns the set SF={v1, v2, v3, Q1, Q2}, i.e., the set of vertices reachable from unsaturated vertex v3 without traversing a 0-flow edge from a Q vertex to a v vertex.
The call to algorithm Forward-Mark in the same iteration returns the set SB={v4, v5, Q3}, i.e., the set of vertices reachable from unsaturated query Q3 without traversing any 0-flow edges from a Q vertex to a v vertex.
Since v4 ε SB and Q1 ε SF, the edge (v4, Q1) is between ≡-components, and is returned by SelectEdges as an edge to be deleted from the edge set E.
In the second iteration, ComputeSpace now invokes SelectEdges with the components shown in
Since there are no unsaturated edges in either component C1 or C2, calls to Forward-Mark and Backward-Mark are moot, and algorithm SelectEdges returns nothing. ComputeSpace therefore terminates and returns the optimal memory allocation component set ={C1, C2}. Solving for the two equations above that the memory allocation for ≡-components must satisfy, yields the results M(Q1)=M(Q2)=mv1=mv2=mv3=M(C2)=M/6 and M(Q3)=mv4=mv5=M(C2)=M/4.
The final step is to go from this optimal continuous solution to a near-optimal integer solution by rounding down each of the M(Q) returned by the algorithm ComputeSpace. The average-error for the rounded down solution can be shown to be not too far from the average-error for the optimal integral Solution, as detailed in Dobra et al.
In a further embodiment of the present invention, memory can also be allocated to the vertices of J to minimize the maximum query error in the workload, rather than the average error in the workload. This can be achieved by using a simple max-min linear optimization algorithm. That this is possible may be seen by first rewriting the objective function in the following way:
Since max QεQ(v)WQ is a constant for a given vertex v, the transformation above shows that the maximum error problem is substantially equivalent to a linear max-min optimization which can be solved by standard techniques. For example, a simple, optimal, algorithm that solves this problem is the following: first compute the optimal continuous solution, where each mv is simply proportional to max QεQ(v)WQ; then round down each mv component to the nearest integer. Any remaining space is then allocated by applying one extra unit of space to each of the nodes with the s smallest values of mv/max QεQ(v)WQ.
When the algorithm ComputeSpace detailed above is used with the sketches of the preferred embodiment of the invention, a further constrain on the join graph, () is that it is well formed, as detailed above. The algorithm CoalesceJoinGraphs in table 5 is a greedy heuristic for computing such a well-formed join graph with small error.
Given a query workload, the algorithm CoalesceJoinGraphs of table 5 returns a well-formed graph. In the main while loop of the algorithm, i.e., from lines 4 to 19, pairs of vertices that minimize the error are coalesced. In each iteration, the algorithm ComputeSpace is used to compute the error and determine which pair of vertices, if coalesced, minimizes the error. This process is repeated until the error cannot be reduced further. In order to ensure that the join graph J is always well-formed, the join graph is initially set to be equal to the set of all the individual join graphs for the queries in the workload. In subsequent iterations, only vertices for identical relations that have the same attribute sets, and preserve the well-formedness of J, are coalesced.
In step 10 of the algorithm CoalesceJoinGraph, the well-formedness of the graph is checked. This is done efficiently, in a time proportional to the number of edges in J′, by first partitioning the edges into equivalence classes of ξ-equivalent edges, and then checking that none of them contains multiple edges from the same query.
The algorithms presented above have been tested experimentally using three workloads chosen from the table of
Workload 1 consists of queries Q1 through Q12, which are the standard TCP-H queries that only contain equi-join constraints.
Workload 2 consists of queries Q1 through Q29 and was selected to get a feel for the benefits of sketch sharing as the degree of sharing increased. Workload 2 has a larger number of queries that are over the same relations. A bigger improvement from sketch sharing is therefore expected in processing workload 2 than the improvement obtained from sketch sharing when processing workload 1.
Workload 3 consists of queries Q6 to Q12 and Q28, and is used to demonstrate the accuracy gains obtained as a result of using non-uniform query weights.
a-f show the experimental results obtained using these workloads of queries to compare the relative error between using the sketch sharing algorithms of this invention to making estimates without any sketch sharing, as a function of the total memory used for storing the sketches. In particular,
From these graphs, it is clear that the accuracy of the query estimates over a workload is improved significantly by using the sketch sharing method of this invention. For instance, with workload 1, errors are generally a factor of two smaller with sharing, and are even greater with workload 2. The results are discussed in greater detail in Dobra et al.
The above-described steps can be implemented using standard well-known programming techniques. Software programming code which embodies the present invention is typically stored in permanent memory of some type, such as permanent storage of a workstation located at Bell Labs of Lucent Technologies in Murry Hill, N.J. In a client/server environment, such software programming code may be stored in memory associated with a server. The software programming code may be embodied on any of a variety of known media for use with a data processing system, such as a diskette, or hard drive, or CD-ROM. The code may be distributed on such media, or may be distributed to users from the memory or storage of one computer system over a network of some type to other computer systems for use by users of such other systems. The techniques and methods for embodying software program code on physical media and/or distributing software code via networks are well known and will not be further discussed herein.
It will be understood that each element of the illustrations, and combinations of elements in the illustrations, can be implemented by general and/or special purpose hardware-based systems that perform the specified functions or steps, or by combinations of general and/or special-purpose hardware and computer instructions.
These program instructions may be provided to a processor to produce a machine, such that the instructions that execute on the processor create means for implementing the functions specified in the illustrations. The computer program instructions may be executed by a processor to cause a series of operational steps to be performed by the processor to produce a computer-implemented process such that the instructions that execute on the processor provide steps for implementing the functions specified in the illustrations. Accordingly, the figures support combinations of means for performing the specified functions, combinations of steps for performing the specified functions, and program instruction means for performing the specified functions.
Although the invention has been described in language specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claimed invention.