WO2003003252A1 - Partitioning ownership of a database among different database servers to control access to the database - Google Patents

Partitioning ownership of a database among different database servers to control access to the database Download PDF

Info

Publication number
WO2003003252A1
WO2003003252A1 PCT/US2001/020842 US0120842W WO03003252A1 WO 2003003252 A1 WO2003003252 A1 WO 2003003252A1 US 0120842 W US0120842 W US 0120842W WO 03003252 A1 WO03003252 A1 WO 03003252A1
Authority
WO
WIPO (PCT)
Prior art keywords
ownership
ownership group
data
database
group
Prior art date
Application number
PCT/US2001/020842
Other languages
French (fr)
Inventor
Gianfranco Putzolu
Original Assignee
Oracle International Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/022,577 external-priority patent/US6089532A/en
Priority to EP12179800.3A priority Critical patent/EP2562662B1/en
Priority to EP04028402A priority patent/EP1521184A3/en
Priority to PCT/US2001/020842 priority patent/WO2003003252A1/en
Priority to CA002435388A priority patent/CA2435388C/en
Priority to AU2001271680A priority patent/AU2001271680B2/en
Application filed by Oracle International Corporation filed Critical Oracle International Corporation
Priority to JP2003509358A priority patent/JP4746838B2/en
Priority to EP01950713A priority patent/EP1399847B1/en
Priority to CNB018228445A priority patent/CN100517303C/en
Priority to US09/896,373 priority patent/US6711571B2/en
Publication of WO2003003252A1 publication Critical patent/WO2003003252A1/en
Priority to HK04102447.1A priority patent/HK1059971A1/en

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F16ENGINEERING ELEMENTS AND UNITS; GENERAL MEASURES FOR PRODUCING AND MAINTAINING EFFECTIVE FUNCTIONING OF MACHINES OR INSTALLATIONS; THERMAL INSULATION IN GENERAL
    • F16KVALVES; TAPS; COCKS; ACTUATING-FLOATS; DEVICES FOR VENTING OR AERATING
    • F16K7/00Diaphragm valves or cut-off apparatus, e.g. with a member deformed, but not moved bodily, to close the passage ; Pinch valves
    • F16K7/12Diaphragm valves or cut-off apparatus, e.g. with a member deformed, but not moved bodily, to close the passage ; Pinch valves with flat, dished, or bowl-shaped diaphragm
    • F16K7/14Diaphragm valves or cut-off apparatus, e.g. with a member deformed, but not moved bodily, to close the passage ; Pinch valves with flat, dished, or bowl-shaped diaphragm arranged to be deformed against a flat seat
    • F16K7/17Diaphragm valves or cut-off apparatus, e.g. with a member deformed, but not moved bodily, to close the passage ; Pinch valves with flat, dished, or bowl-shaped diaphragm arranged to be deformed against a flat seat the diaphragm being actuated by fluid pressure
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F16ENGINEERING ELEMENTS AND UNITS; GENERAL MEASURES FOR PRODUCING AND MAINTAINING EFFECTIVE FUNCTIONING OF MACHINES OR INSTALLATIONS; THERMAL INSULATION IN GENERAL
    • F16KVALVES; TAPS; COCKS; ACTUATING-FLOATS; DEVICES FOR VENTING OR AERATING
    • F16K31/00Actuating devices; Operating means; Releasing devices
    • F16K31/12Actuating devices; Operating means; Releasing devices actuated by fluid
    • F16K31/126Actuating devices; Operating means; Releasing devices actuated by fluid the fluid acting on a diaphragm, bellows, or the like
    • F16K31/1268Actuating devices; Operating means; Releasing devices actuated by fluid the fluid acting on a diaphragm, bellows, or the like with a plurality of the diaphragms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Definitions

  • the present invention relates to database systems and, more particularly, to a partitioning ownership of a database among different database servers to control access to the database.
  • Multi-processing computer systems are systems that include multiple processing units that are able to execute instructions in parallel relative to each other.
  • different aspects of a task maybe assigned to different processing units.
  • the different aspects of a task are referred to herein as work granules, and the process responsible for distributing the work granules among the available processing units is referred to as a coordinator process.
  • Multi-processing computer systems typically fall into three categories: shared everything systems, shared disk systems, and shared nothing systems.
  • the constraints placed on the distribution of work to processes performing granules of work vary based on the type of multi-processing system involved.
  • processors In shared everything systems, processes on all processors have direct access to all dynamic memory devices (hereinafter generally referred to as “memory”) and to all static memory devices (hereinafter generally referred to as “disks”) in the system. Consequently, in a shared everything system there are few constraints with respect to how work granules may be assigned. However, a high degree of wiring between the various computer components is required to provide shared everything functionality. In addition, there are scalability limits to shared everything architectures. In shared disk systems, processors and memories are grouped into nodes. Each node in a shared disk system may itself constitute a shared everything system that includes multiple processors and multiple memories.
  • Processes on all processors can access all disks in the system, but only the processes on processors that belong to a particular node can directly access the memory within the particular node.
  • Shared disk systems generally require less wiring than shared everything systems. However, shared disk systems are more susceptible to unbalanced workload conditions. For example, if a node has a process that is working on a work granule that requires large amounts of dynamic memory, the memory that belongs to the node may not be large enough to simultaneously store all required data. Consequently, the process may have to swap data into and out of its node's local memory even though large amounts of memory remain available and unused in other nodes.
  • shared nothing systems all processors, memories and disks are grouped into nodes.
  • each node may itself constitute a shared everything system or a shared disk system. Only the processes running on a particular node can directly access the memories and disks within the particular node.
  • shared nothing systems typically require the least amount of wiring between the various system components.
  • shared nothing systems are the most susceptible to unbalanced workload conditions. For example, all of the data to be accessed during a particular work granule may reside on the disks of a particular node. Consequently, only processes running within that node can be used to perform the work granule, even though processes on other nodes remain idle.
  • Shared nothing systems provide compartmentalization of software failures resulting in memory and/or disk corruption. The only exceptions are the control blocks controlling "ownership" of data subsets by different nodes. Ownership is much more rarely modified than shared disk lock management information. Hence, the ownership techniques are simpler and more reliable than the shared disk lock management techniques, because they do not have high performance requirements.
  • Databases that run on multi-processing systems typically fall into two categories: shared disk databases and shared nothing databases.
  • Shared disk database systems in which multiple database servers (typically running on different nodes) are capable of reading and writing to any part of the database. Data access in the shared disk architecture is coordinated via a distributed lock manager.
  • Shared disk databases may be run on both shared nothing and shared disk computer systems.
  • software support may be added to the operating system or additional hardware may be provided to allow processes to have direct access to remote disks.
  • a shared nothing database assumes that a process can only directly access data if the data is contained on a disk that belongs to the same node as the process. Specifically, the database data is subdivided among the available database servers. Each database server can directly read and write only the portion of data owned by that database server. If a first server seeks to access data owned by a second server, then the first database server must send messages to the second database server to cause the second database server to perform the data access on its behalf.
  • Shared nothing databases may be run on both shared disk and shared nothing multi-processing systems.
  • a software mechanism may be provided for logically partitioning the database, and assigning ownership of each partition to a particular node.
  • shared nothing and shared disk systems each have favorable advantages associated with its particular architecture. For example, shared nothing databases provide better performance if there are frequent write accesses (write hot spots) to the data. Shared disk databases provide better performance if there are frequent read accesses (read hot spots). Also, as mentioned above, shared nothing systems provide better fault containment in the presence of software failures.
  • a database system is provided in wliich a database or some portion thereof is partitioned into ownership groups.
  • Each ownership group is assigned one or more database servers as owners of the ownership group.
  • the database servers that are assigned as owners of an ownership group are treated as the owners of all data items that belong to the ownership group. That is, they are allowed to directly access the data items within the ownership group, while other database servers are not allowed to directly access those data items.
  • a database system which includes one or more persistent storage devices having a database stored thereon, and a plurality of database servers executing on a plurality of nodes. Each node has direct access to the persistent storage devices. At least a portion of the database is partitioned into a plurality of ownership groups. Each ownership group is assigned an owner set. Only processes that are executing on database servers that are members of the owner set of an ownership group are allowed to directly access data within the ownership group.
  • Each ownership group is designated as either a shared nothing ownership group or a shared disk ownership group.
  • Each shared nothing ownership group is assigned an owner from among the database servers. Only the owner of each shared nothing ownership group is allowed to directly access data within the shared nothing ownership group.
  • Each of the database servers is allowed to directly access data within ownership groups that are designated as shared disk ownership groups.
  • Figure 1 is a block diagram of a computer system on which an embodiment of the invention may be implemented
  • Figure 2 is a block diagram of a distributed database system that uses ownership groups according to an embodiment of the invention
  • Figure 3 is a flowchart illustrating steps for performing an operation on a data item in a system that supports ownership groups
  • Figure 4 is a flowchart illustrating steps for changing the owner set of an ownership group according to an embodiment of the invention.
  • Figure 5 is a block diagram that illustrates a technique for making an atomic change according to an embodiment of the invention.
  • FIG. 1 is a block diagram that illustrates a computer system 100 upon which an embodiment of the invention may be implemented.
  • Computer system 100 includes a bus 102 or other communication mechanism for communicating information, and a processor 104 coupled with bus 102 for processing information.
  • Computer system 100 also includes a main memory 106, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 102 for storing information and instructions to be executed by processor 104.
  • Main memory 106 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 104.
  • Computer system 100 further includes a read only memory (ROM) 108 or other static storage device coupled to bus 102 for storing static information and instructions for processor 104.
  • ROM read only memory
  • a storage device 110 such as a magnetic disk or optical disk, is provided and coupled to bus 102 for storing information and instructions.
  • Computer system 100 may be coupled via bus 102 to a display 112, such as a cathode ray tube (CRT), for displaying information to a computer user.
  • a display 112 such as a cathode ray tube (CRT)
  • An input device 114 is coupled to bus 102 for communicating information and command selections to processor 104.
  • cursor control 116 is Another type of user input device
  • cursor control 116 such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 104 and for controlling cursor movement on display 112.
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • the invention is related to the use of computer system 100 for providing a hybrid shared disk/shared nothing database system.
  • a database system is provided by computer system 100 in response to processor 104 executing one or more sequences of one or more instructions contained in main memory 106.
  • Such instructions may be read into main memory 106 from another computer-readable medium, such as storage device 110.
  • Execution of the sequences of instructions contained in main memory 106 causes processor 104 to perform the process steps described herein.
  • hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention.
  • embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
  • Non- volatile media includes, for example, optical or magnetic disks, such as storage device 110.
  • Volatile media includes dynamic memory, such as main memory 106.
  • Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 102. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
  • Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 104 for execution.
  • the instructions may initially be carried on a magnetic disk of a remote computer.
  • the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
  • a modem local to computer system 100 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal.
  • An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 102.
  • Bus 102 carries the data to main memory 106, from which processor 104 retrieves and executes the instructions.
  • the instructions received by main memory 106 may optionally be stored on storage device 110 either before or after execution by processor 104.
  • Computer system 100 also includes a communication interface 118 coupled to bus 102.
  • Communication interface 118 provides a two-way data communication coupling to a network link 120 that is connected to a local network 122.
  • communication interface 118 maybe an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line.
  • ISDN integrated services digital network
  • communication interface 118 maybe a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links may also be implemented.
  • communication interface 118 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 120 typically provides data communication through one or more networks to other data devices.
  • network link 120 may provide a connection through local network 122 to a host computer 124 or to data equipment operated by an Internet Service Provider (ISP) 126.
  • ISP 126 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet” 128.
  • Internet 128 uses electrical, electromagnetic or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on network link 120 and through communication interface 118, which carry the digital data to and from computer system 100, are exemplary forms of carrier waves transporting the information.
  • Computer system 100 can send messages and receive data, including program code, through the network(s), network link 120 and communication interface 118.
  • a server 130 might transmit a requested code for an application program through Internet 128, ISP 126, local network 122 and communication interface 118.
  • ISP 126 ISP 126
  • local network 122 ISP 126
  • communication interface 118 ISP 126
  • one such downloaded application provides for a hybrid shared disk/shared nothing database system as described herein.
  • the received code may be executed by processor 104 as it is received, and/or stored in storage device 110, or other non- volatile storage for later execution. In this manner, computer system 100 may obtain application code in the form of a carrier wave.
  • a database (or some portion thereof) is partitioned into ownership groups.
  • Each ownership group is assigned one or more database servers as owners of the ownership group.
  • the database servers that are assigned as owners of an ownership group are treated as the owners of all data items that belong to the ownership group. That is, they are allowed to directly access the data items within the ownership group, while other database servers are not allowed to directly access those data items.
  • ownership groups allow operations to be performed on a group of related data items by treating the group of related data items as an atomic unit. For example, ownership of all data items within an ownership group may be transferred from a first database server to a second database server by transferring ownership of the ownership group from the first database server to the second database server.
  • FIG. 2 is a block diagram that depicts a hybrid database system architecture according to an embodiment of the invention.
  • Figure 2 includes three nodes 202, 204 and 206 on which are executing three database servers 208, 210 and 212, respectively.
  • Database servers 208, 210 and 212 are respectively associated with buffer caches 220, 222 and 224.
  • Each of nodes 202, 204 and 206 are connected to a system bus 218 that allows database servers 208, 210 and 212 to directly access data within a database 250 that resides on two disks 214 and 216.
  • each ownership group includes one or more tablespaces.
  • a tablespace is a collection of one or more datafiles.
  • the invention is not limited to any particular granularity of partitioning, and may be used with ownership groups of greater or lesser scope.
  • each ownership group is designated as a shared disk ownership group or a shared nothing ownership group.
  • Each ownership group that is designated as a shared nothing ownership group is assigned one of the available database servers as its owner.
  • ownership group 230 is a shared nothing ownership group owned by server 210
  • ownership group 232 is a shared disk ownership group
  • ownership group 234 is a shared nothing ownership group owned by server 212
  • ownership group 236 is a shared nothing ownership group owned by server 208.
  • ownership group 230 is a shared nothing ownership group owned by server 210, only server 210 is allowed to directly access data (Dl) within ownership group 230. Any other server that seeks to access data in ownership group 230 is normally required to send message requests to server 210 that request server 210 to perform the desired data access on the requesting server's behalf.
  • ownership groups 234 and 236 are also shared nothing ownership groups, and may only be directly accessed by their respective owners.
  • any database server may directly access the set of data contained therein. As shown in Figure 2, each database server may contain a copy of this data (D2) within its buffer cache.
  • a distributed lock manager is employed to coordinate access to the shared data.
  • the database system includes a mechanism to dynamically change a particular ownership group from shared disk to shared nothing, and visa versa. For example, if a particular set of shared nothing data is subj ect to frequent read accesses (read hot spots), then that data can be converted to shared disk by converting the ownership group to which it belongs from shared nothing to shared disk. Likewise, if a particular set of shared disk data is subject to frequent write accesses (write hot spots), then that data can be converted to shared nothing data by changing the ownership group that contains the data to a shared nothing ownership group and assigning ownership of the ownership group to a database server.
  • the database system also includes a mechanism to reassign ownership of a shared nothing ownership group from one node to another node. This may be requested by an operator to improve load balancing, or may happen automatically to continue to support access to the data of a shared nothing ownership group owned by a node Nl after Nl fails.
  • OWNERSHIP As described above, a database system is provided in which some ownership groups are designated as shared nothing ownership groups, and some ownership groups are designated as shared disk ownership groups. An owner is assigned to every shared nothing ownership group. The ownership of a shared nothing ownership group is made known to all database servers so that they can send requests to the owner of the ownership group when they require tasks performed on data within the ownership group.
  • ownership information for the various ownership groups is maintained in a control file, and all database servers that have access to the database are allowed to access the control file.
  • Each database server may store a copy of the control file in its cache. With a copy of the control file in its cache, a database server may determine the ownership of ownership groups without always having to incur the overhead associated with reading the ownership information from disk.
  • FIG. 3 is a flowchart illustrating the steps performed by a database server that desires data in a system that employs both shared disk and shared nothing ownership groups.
  • the database server determines the ownership group to which the desired data belongs.
  • the database server determines the owner of the ownership group that contains the desired data.
  • step 302 may be performed by accessing a control file, a copy of which may be stored in the cache associated with the database server. If the ownership group is a shared disk ownership group, then all database servers are considered to be owners of the ownership group. If the ownership group is a shared nothing ownership group, then a specific database server will be specified in the control file as the owner of the ownership group.
  • step 304 the database server determines whether it is the owner of the ownership group that holds the desired data.
  • the database server will be the owner of the ownership group if either (1) the ownership group is a shared disk ownership group, or (2) the ownership group is a shared nothing ownership group and the database server is designated in the control file as the owner of the shared nothing ownership group. If the database server is the owner of the ownership group that holds the desired data, control passes to step 310, where the database server directly retrieves the desired data.
  • step 306 the database server sends a request to the owner of the ownership group for the owner to access the desired data on behalf of the requestor.
  • step 308 the database server receives the desired data from the owner of the ownership group.
  • an ownership group is not limited to being either (1) owned by only one database server (shared nothing) or (2) owned by all . database servers (shared disk). Rather, a ownership group may alternatively be owned by any specified subset of the available database servers.
  • the set of database servers that own a particular ownership group are referred to herein as the owner set for the ownership group.
  • a shared nothing ownership group is equivalent to a ownership group that includes only one database server in its owner set
  • a shared disk ownership group is equivalent to a ownership group that includes all available database servers in its owner set.
  • a database server that does not belong to the owner set of the ownership group sends a request to one of the database servers that belong to the owner set of the ownership group.
  • the recipient of the request directly accesses the data in the ownership group and performs the requested task. Contention caused by write hot spots within the ownership group only occurs among the database servers that belong to the owner set of the ownership group.
  • CHANGING THE OWNERSHIP OF AN OWNERSHIP GROUP it may be desirable to change an ownership group from shared nothing to shared disk, or from shared disk to shared nothing. Such changes may be initiated automatically in response to the detection of read or write hot spots, or manually (e.g. in response to a command issued by a database administrator).
  • FIG. 4 is a flowchart that illustrates steps performed for changing the owner set of an ownership group according to one embodiment of the invention.
  • a "disable change” message is broadcast to all of the available database servers.
  • the disable change message instructs the database servers to cease making forward changes to data within the ownership group whose owner set is going to be changed (the "fransitioning ownership group").
  • Forward changes are changes that create a version that has previously not existed (i.e. create a new "current” version of a data item).
  • Backward changes are changes that result in the recreation of a previously existing version of a data item.
  • the portion of the database system responsible for changing the owner set of ownership groups (the "owner changing mechanism") waits until all transactions that have made changes to the transitioning ownership group either commit or roll back.
  • step 400 Those transactions that have performed some but not all of their updates to data within the transitioning ownership group prior to step 400 will roll back because forward changes to the ownership group are no longer allowed. Because step 400 prevents only forward changes to the transitioning ownership group, database servers are not prevented from rolling back the changes that they have already made to the transitioning ownership group.
  • an embodiment of the invention is provided in which the database system does not attempt to track the transactions that have updated data within the transitioning ownership group. However, without tracking this information, it must be assumed that any of the transactions that were allowed to access data in the transitioning ownership group and that were begun prior to step 400 may have made changes to data within the transitioning ownership group.
  • step 402 requires the owner changing mechanism to wait until all of the transactions that (1) may have possibly accessed data in the transitioning ownership group, and (2) were begun prior to step 400 either commit or roll back.
  • the owner changing mechanism must wait until all transactions in all database servers that were begun prior to step 400 either commit or roll back.
  • the transitioning ownership group is shared nothing, then the owner changing mechanism must wait until all transactions in the database server that owns the transitioning ownership group either commit or roll back. Note that this includes user transactions that may have originated in other nodes, and have created subtransactions local to the transitioning ownership group.
  • step 404 the owner changing mechanism changes the owner set of the transitioning ownership group by updating the control file in an atomic operation.
  • the designation change may cause the transitioning ownership group to transition from a shared nothing ownership group to a shared disk ownership group or visa versa.
  • the designation change may simply change the database server that owns a shared nothing ownership group, without changing the ownership group type.
  • control proceeds to step 406.
  • a "refresh cache” message is sent to all available database servers.
  • each database server invalidates the copy of the control file that it contains in its cache. Consequently, when the database servers subsequently need to inspect the control file to determine ownership of an ownership group, they retrieve the updated version of the control file from persistent storage. Thus they are made aware of the new owner set of the transitioning ownership group.
  • the query is typically stored within the database.
  • Most database systems generate an execution plan for a stored query at the time that the stored query is initially submitted to the database system, rather than recomputing an execution plan every time the stored query is used.
  • the execution plan of a query must take into account the ownership of the ownership groups that contain the data accessed by the query. For example, if the query specifies an update to a data item in ownership group owned exclusively by a particular database server, the execution plan of the query must include shipping that update operation to that particular database server.
  • a mechanism is provided for changing the ownership of ownership groups. Such ownership changes may take place after the execution plan for a particular stored query has been generated. As a consequence, execution plans may require certain database servers to perform operations on data within ownership groups that they no longer own. According to one embodiment of the invention, database servers that are asked to perform operations on data within ownership groups that they do not own return an "ownership error" message to the processes that request the operations. In response to receiving an ownership error message, a new execution plan is generated for the query that caused the error. The new execution plan takes into account the current ownership of ownership groups, as indicated by the current version of the control file. CONTROL FILE MANAGEMENT
  • control file includes a bitmap and a series of block pairs, as illustrated in Figure 5. Each bit in the bitmap 512 corresponds to a block pair.
  • bit 502 is associated with block pair 504 that includes blocks 506 and 508.
  • the value of bit 502 (e.g. "0") indicates that block 506 is the current block within block pair 504.
  • the value of bit 502 may be changed to "1" to indicate that the data in block 508 is current (and consequently that the data in block 506 is no longer valid).
  • the data in the non-current block of a block pair is considered invalid, data may be written into the non-current block without changing the effective contents of the control file.
  • the contents of the control file are effectively changed only when the value of a bit in the bitmap 512 is changed.
  • the contents of the current block 506 of a block pair 504 may be loaded into memory, modified, and stored into the non-current block 508 of the block pair 504. After these preliminary steps have been performed, the change can be atomically made by changing the value of the bit 502 within the bitmap 512 that corresponds to the block pair 504.
  • MOVING DATA ITEMS BETWEEN OWNERSHIP GROUPS One way to change ownership of a data item, such as a tablespace, is to change the owner set of the ownership group to which the data item belongs.
  • a second way to change ownership of a data item is to reassign the data item to a different ownership group.
  • the owner of tablespace A can be changed from server A to server B by removing tablespace A from an ownership group assigned to server A and placing it in an ownership group assigned to server B.
  • the membership of ownership groups is maintained in a data dictionary within the database. Consequently, to move a data item from a first ownership group to a second ownership group, the membership information for both the first and second ownership groups have to be updated within the data dictionary.
  • the various steps involved in changing to which ownership group a data item belongs are similar to those described above for changing the owner set of an ownership group. Specifically, access to the tablespace that is being transferred (the "transitioning tablespace") is disabled. The ownership change mechanism then waits for all transactions that hold locks on the data item (or a component thereof) to either roll back or commit.
  • the data dictionary is modified to indicate the new ownership group of the data item.
  • the control file is then modified to indicate that the owner set of the ownership group to which the data item was moved is now the owner set of the data item. This change atomically enables the target owner to access the data item. If the ownership group is in the middle of an ownership change, the control file is updated to indicate that the data item is in a "moving delayed" state.
  • Changing the ownership group to which a data item belongs may or may not cause the owner of the data item to change. If the owner set of the source ownership group is the same as the owner set of the transitioning ownership group, then the owner of the data item is not changed when the data item is moved from the source ownership group to the transitioning ownership group. On the other hand, if the owner set of the source ownership group is not the same as the owner set of the transitioning ownership group, then the owner of the data item is changed when the data item is moved from the source ownership group to the transitioning ownership group.
  • an embodiment of the invention provides within the control file one or more status flags for each data item (e.g. tablespace) that belongs to an ownership group. For example, a flag may be used to indicate whether the ownership group to which a data item belongs is in the process of being assigned a new owner. Similarly, a flag may indicate that a data item is in the process of being transferred to a different ownership group.
  • the ownership change mechanism inspects the status flags of the data items that belong to the ownership group to determine whether any data item that belongs to the ownership group is in the middle of being transferred to a different ownership group. If any data item that belongs to the ownership group is in the middle of being transferred to a different ownership group, then the attempt to change the owner set of the ownership group is aborted. If no data items that belong to the ownership group are in the middle of being transferred to a different ownership group, then the status flags of the data items that belong to the ownership group are set to indicate that the ownership of the ownership group to which the data items belong is in transition. A message is also sent to the various database servers to invalidate their cached versions of the control file. This ensures that they see the new values of the status flags.
  • the status flags of the data item are checked to determine whether the destination ownership group is in the middle of having its owner set changed. According to one embodiment, this check is performed after modifying the data dictionary to reflect the new ownership group of the data item, but before updating the confrol file to give the owner of the new ownership group access to the data item. If the ownership group to which the data item belongs is in the middle of having its owner set changed, then the status flags for the data item in the control file are set to indicate a "move delayed" condition, hi addition, a database-wide "move delayed” flag is set to indicate that the database contains some data items that are in a move delayed state.
  • the process performing the transfer updates the status flags to indicate that the ownership group is no longer in the process of an ownership transfer.
  • the process clears the "move delayed" flags of any data items that have moved to this ownership group during the ownership transfer of this ownership group.
  • the failure may be the result of a "process death” or a "server death".
  • a process death occurs when a particular process involved in the ownership change fails.
  • a server death occurs when an entire database server fails. With both of these failure types, all of the changes that have not yet been stored on persistent storage may be lost. After such a failure, it is necessary to return the database to a consistent state.
  • a state object is a data structure that is allocated in a memory region associated with the database server to which the process belongs.
  • the process Prior to performing an action, the process updates the state object to indicate the action it is going to perform. If the process dies, another process within the database server (e.g. a "process monitor") invokes a method of the state object (a "clean up routine") to return the database to a consistent state.
  • process failures during an ownership change of an ownership group are handled as follows:
  • the process monitor completes the move and performs the appropriate change to the control file. If the ownership group is in the middle of an ownership change, the data items are marked as "move delayed". If the process performing the transfer dies after the final control file change but before the state object is deleted, the process monitor will delete the state object.
  • server death is an event that triggers an automatic ownership change, where all ownership groups exclusively owned by the failed server are assigned to new owners.
  • server failures during an ownership change of an ownersliip group are handled as follows:
  • the ownership group is assigned to another thread, and the status information in the control file is updated to indicate that the ownership group is no longer in transition.
  • the target database server dies, then either (1) the process performing the transition will detect that the instance died and abort the transition, or (2) during recovery of the dead server, the ownership group will be reassigned from the dead server to another server.
  • the move operation will be finished by either assigning the right owner to the data item, or by marking it as move delayed.
  • the data item is marked as "move delayed”.
  • the ownership of the transitioning ownership group will be reassigned and the move delayed flag will be cleared.
  • step 402 requires the ownership change mechanism to wait until all transactions that made changes to data than belongs to the transitioning ownership group to either commit or roll back. During this wait, all data in the transitioning ownership group is unavailable. Therefore, it is important to minimize the duration of the wait.
  • the ownership change mechanism waits for all transactions that are executing in all database servers that belong to the source owner set of the transitioning ownership group to either commit or roll back. Due to the number of transactions the ownership change mechanism must wait upon, many of which may not have even made changes to data from the transitioning ownership group, the delay may be significant.
  • a mechanism is provided that allows the data that is being transitioned between owners to remain available during this delay.
  • a disable change message is not sent to all database servers.
  • a "new owner" message is sent to all database servers indicating the target owner set of the ownership group.
  • the new owner message may be broadcast, for example, by sending a refresh cache message to all database servers after updating the control file to indicate (1) the source owner set, (2) the target owner set, and (3) that the ownership group is in transition.
  • control file is updated a second time.
  • the control file is updated to indicate that the target owner set is the exclusive owner set for the ownership group, and that the ownership group is no longer in transition.

Abstract

At least a portion of a database (250) is partioned into ownership groups (230, 232, 234, 236) that are each assigned one or more database servers (208, 210, 212) as owners. The database servers (208, 210, 212) assigned as owners (s208, s210, s121) are treated as the owners of all data items in the ownership group. That is, they are allowed to directly access the data items within the ownership group, while other database servers are not allowed to directly access those data items. A database system includes one or more presistent storage devices (214, 216) having a database (250) stored thereon, and a plurality of database servers (208, 210, 212) executing on a plurality of nodes (202, 204, 206) that directly access the persistent storage devices (214,216). At least a portion of the database (250) is partitioned into a plurality of ownership groups (230, 232, 234, 236) that are each assigned an owner set. Only process executing on database servers that belong to an owner set are allowed to directly access data within the ownership group.

Description

PARTITIONING OWNERSHIP OF A DATABASE AMONG DIFFERENT DATABASE SERVERS TO CONTROL ACCESS TO THE DATABASE
RELATED APPLICATIONS
This application is related to prior U.S. application Ser. No. 09/222,577, filed December 28, 1998, titled "Hybrid Shared Nothing/Shared Disk Database System," naming as inventor Gianfranco Putzolu, and U.S. application Ser. No. 09/896,373, filed concurrently with the present application, titled "Partitioning Ownership of a Database Among Different Database Servers to Control Access to the Database," naming as inventor Gianfranco Putzolu.
FIELD OF THE INVENTION
The present invention relates to database systems and, more particularly, to a partitioning ownership of a database among different database servers to control access to the database.
BACKGROUND OF THE INVENTION
Multi-processing computer systems are systems that include multiple processing units that are able to execute instructions in parallel relative to each other. To take advantage of parallel processing capabilities, different aspects of a task maybe assigned to different processing units. The different aspects of a task are referred to herein as work granules, and the process responsible for distributing the work granules among the available processing units is referred to as a coordinator process.
Multi-processing computer systems typically fall into three categories: shared everything systems, shared disk systems, and shared nothing systems. The constraints placed on the distribution of work to processes performing granules of work vary based on the type of multi-processing system involved.
In shared everything systems, processes on all processors have direct access to all dynamic memory devices (hereinafter generally referred to as "memory") and to all static memory devices (hereinafter generally referred to as "disks") in the system. Consequently, in a shared everything system there are few constraints with respect to how work granules may be assigned. However, a high degree of wiring between the various computer components is required to provide shared everything functionality. In addition, there are scalability limits to shared everything architectures. In shared disk systems, processors and memories are grouped into nodes. Each node in a shared disk system may itself constitute a shared everything system that includes multiple processors and multiple memories. Processes on all processors can access all disks in the system, but only the processes on processors that belong to a particular node can directly access the memory within the particular node. Shared disk systems generally require less wiring than shared everything systems. However, shared disk systems are more susceptible to unbalanced workload conditions. For example, if a node has a process that is working on a work granule that requires large amounts of dynamic memory, the memory that belongs to the node may not be large enough to simultaneously store all required data. Consequently, the process may have to swap data into and out of its node's local memory even though large amounts of memory remain available and unused in other nodes.
Shared disk systems provide compartmentalization of software failures resulting in memory corruption. The only exceptions are the control blocks used by the inter-node lock manager, that are virtually replicated in all nodes.
In shared nothing systems, all processors, memories and disks are grouped into nodes. In shared nothing systems as in shared disk systems, each node may itself constitute a shared everything system or a shared disk system. Only the processes running on a particular node can directly access the memories and disks within the particular node. Of the three general types of multi-processing systems, shared nothing systems typically require the least amount of wiring between the various system components. However, shared nothing systems are the most susceptible to unbalanced workload conditions. For example, all of the data to be accessed during a particular work granule may reside on the disks of a particular node. Consequently, only processes running within that node can be used to perform the work granule, even though processes on other nodes remain idle.
Shared nothing systems provide compartmentalization of software failures resulting in memory and/or disk corruption. The only exceptions are the control blocks controlling "ownership" of data subsets by different nodes. Ownership is much more rarely modified than shared disk lock management information. Hence, the ownership techniques are simpler and more reliable than the shared disk lock management techniques, because they do not have high performance requirements.
Databases that run on multi-processing systems typically fall into two categories: shared disk databases and shared nothing databases. Shared disk database systems in which multiple database servers (typically running on different nodes) are capable of reading and writing to any part of the database. Data access in the shared disk architecture is coordinated via a distributed lock manager. Shared disk databases may be run on both shared nothing and shared disk computer systems. To run a shared disk database on a shared nothing computer system, software support may be added to the operating system or additional hardware may be provided to allow processes to have direct access to remote disks.
A shared nothing database assumes that a process can only directly access data if the data is contained on a disk that belongs to the same node as the process. Specifically, the database data is subdivided among the available database servers. Each database server can directly read and write only the portion of data owned by that database server. If a first server seeks to access data owned by a second server, then the first database server must send messages to the second database server to cause the second database server to perform the data access on its behalf.
Shared nothing databases may be run on both shared disk and shared nothing multi-processing systems. To run a shared nothing database on a shared disk machine, a software mechanism may be provided for logically partitioning the database, and assigning ownership of each partition to a particular node.
Shared nothing and shared disk systems each have favorable advantages associated with its particular architecture. For example, shared nothing databases provide better performance if there are frequent write accesses (write hot spots) to the data. Shared disk databases provide better performance if there are frequent read accesses (read hot spots). Also, as mentioned above, shared nothing systems provide better fault containment in the presence of software failures.
In light of the foregoing, it would be desirable to provide a single database system that is able to provide the performance advantages of both types of database architectures. Typically, however, these two types of architectures are mutually exclusive.
SUMMARY OF THE INVENTION
A database system is provided in wliich a database or some portion thereof is partitioned into ownership groups. Each ownership group is assigned one or more database servers as owners of the ownership group. The database servers that are assigned as owners of an ownership group are treated as the owners of all data items that belong to the ownership group. That is, they are allowed to directly access the data items within the ownership group, while other database servers are not allowed to directly access those data items.
According to one aspect of the invention, a database system is provided which includes one or more persistent storage devices having a database stored thereon, and a plurality of database servers executing on a plurality of nodes. Each node has direct access to the persistent storage devices. At least a portion of the database is partitioned into a plurality of ownership groups. Each ownership group is assigned an owner set. Only processes that are executing on database servers that are members of the owner set of an ownership group are allowed to directly access data within the ownership group.
Each ownership group is designated as either a shared nothing ownership group or a shared disk ownership group. Each shared nothing ownership group is assigned an owner from among the database servers. Only the owner of each shared nothing ownership group is allowed to directly access data within the shared nothing ownership group. Each of the database servers is allowed to directly access data within ownership groups that are designated as shared disk ownership groups.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
Figure 1 is a block diagram of a computer system on which an embodiment of the invention may be implemented;
Figure 2 is a block diagram of a distributed database system that uses ownership groups according to an embodiment of the invention;
Figure 3 is a flowchart illustrating steps for performing an operation on a data item in a system that supports ownership groups;
Figure 4 is a flowchart illustrating steps for changing the owner set of an ownership group according to an embodiment of the invention; and
Figure 5 is a block diagram that illustrates a technique for making an atomic change according to an embodiment of the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
An approach for partitioning ownership of a database among different database servers to control access to the database is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details, h other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
HARDWARE OVERVIEW
Figure 1 is a block diagram that illustrates a computer system 100 upon which an embodiment of the invention may be implemented. Computer system 100 includes a bus 102 or other communication mechanism for communicating information, and a processor 104 coupled with bus 102 for processing information. Computer system 100 also includes a main memory 106, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 102 for storing information and instructions to be executed by processor 104. Main memory 106 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 104. Computer system 100 further includes a read only memory (ROM) 108 or other static storage device coupled to bus 102 for storing static information and instructions for processor 104. A storage device 110, such as a magnetic disk or optical disk, is provided and coupled to bus 102 for storing information and instructions.
Computer system 100 may be coupled via bus 102 to a display 112, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 114, including alphanumeric and other keys, is coupled to bus 102 for communicating information and command selections to processor 104. Another type of user input device is cursor control 116, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 104 and for controlling cursor movement on display 112. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
The invention is related to the use of computer system 100 for providing a hybrid shared disk/shared nothing database system. According to one embodiment of the invention, such a database system is provided by computer system 100 in response to processor 104 executing one or more sequences of one or more instructions contained in main memory 106. Such instructions may be read into main memory 106 from another computer-readable medium, such as storage device 110. Execution of the sequences of instructions contained in main memory 106 causes processor 104 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
The term "computer-readable medium" as used herein refers to any medium that participates in providing instructions to processor 104 for execution. Such a medium may take many forms, including but not limited to, non- volatile media, volatile media, and transmission media. Non- volatile media includes, for example, optical or magnetic disks, such as storage device 110. Volatile media includes dynamic memory, such as main memory 106. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 102. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 104 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 100 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 102. Bus 102 carries the data to main memory 106, from which processor 104 retrieves and executes the instructions. The instructions received by main memory 106 may optionally be stored on storage device 110 either before or after execution by processor 104.
Computer system 100 also includes a communication interface 118 coupled to bus 102. Communication interface 118 provides a two-way data communication coupling to a network link 120 that is connected to a local network 122. For example, communication interface 118 maybe an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 118 maybe a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 118 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
Network link 120 typically provides data communication through one or more networks to other data devices. For example, network link 120 may provide a connection through local network 122 to a host computer 124 or to data equipment operated by an Internet Service Provider (ISP) 126. ISP 126 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet" 128. Local network 122 and Internet 128 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 120 and through communication interface 118, which carry the digital data to and from computer system 100, are exemplary forms of carrier waves transporting the information.
Computer system 100 can send messages and receive data, including program code, through the network(s), network link 120 and communication interface 118. In the Internet example, a server 130 might transmit a requested code for an application program through Internet 128, ISP 126, local network 122 and communication interface 118. In accordance with the invention, one such downloaded application provides for a hybrid shared disk/shared nothing database system as described herein.
The received code may be executed by processor 104 as it is received, and/or stored in storage device 110, or other non- volatile storage for later execution. In this manner, computer system 100 may obtain application code in the form of a carrier wave.
The approach for partitioning ownership of a database among different database servers to control access to the database described herein is implemented on a computer system for which shared disk access to all disks is may be provided from all nodes, i.e. is a system that could be used for strictly shared disk access, although according to one aspect of the invention, access to some "shared nothing" disk data is restricted by the software. OWNERSHIP GROUPS
According to an embodiment of the invention, a database (or some portion thereof) is partitioned into ownership groups. Each ownership group is assigned one or more database servers as owners of the ownership group. The database servers that are assigned as owners of an ownership group are treated as the owners of all data items that belong to the ownership group. That is, they are allowed to directly access the data items within the ownership group, while other database servers are not allowed to directly access those data items.
According to one embodiment, data items that are frequently accessed together are grouped into the same ownership group, thus ensuring that they will be owned by the same database servers. Ownership groups allow operations to be performed on a group of related data items by treating the group of related data items as an atomic unit. For example, ownership of all data items within an ownership group may be transferred from a first database server to a second database server by transferring ownership of the ownership group from the first database server to the second database server.
HYBRID DATABASE SYSTEM Figure 2 is a block diagram that depicts a hybrid database system architecture according to an embodiment of the invention. Figure 2 includes three nodes 202, 204 and 206 on which are executing three database servers 208, 210 and 212, respectively. Database servers 208, 210 and 212 are respectively associated with buffer caches 220, 222 and 224. Each of nodes 202, 204 and 206 are connected to a system bus 218 that allows database servers 208, 210 and 212 to directly access data within a database 250 that resides on two disks 214 and 216.
The data contained on disks 214 and 216 is logically partitioned into ownership groups 230, 232, 234 and 236. According to an embodiment of the invention, each ownership group includes one or more tablespaces. A tablespace is a collection of one or more datafiles. However, the invention is not limited to any particular granularity of partitioning, and may be used with ownership groups of greater or lesser scope.
According to one embodiment, each ownership group is designated as a shared disk ownership group or a shared nothing ownership group. Each ownership group that is designated as a shared nothing ownership group is assigned one of the available database servers as its owner. In the system illustrated in Figure 2, ownership group 230 is a shared nothing ownership group owned by server 210, ownership group 232 is a shared disk ownership group, ownership group 234 is a shared nothing ownership group owned by server 212, and ownership group 236 is a shared nothing ownership group owned by server 208.
Because ownership group 230 is a shared nothing ownership group owned by server 210, only server 210 is allowed to directly access data (Dl) within ownership group 230. Any other server that seeks to access data in ownership group 230 is normally required to send message requests to server 210 that request server 210 to perform the desired data access on the requesting server's behalf. Likewise, ownership groups 234 and 236 are also shared nothing ownership groups, and may only be directly accessed by their respective owners.
Since ownership group 232 is a shared disk ownership group, any database server may directly access the set of data contained therein. As shown in Figure 2, each database server may contain a copy of this data (D2) within its buffer cache. A distributed lock manager is employed to coordinate access to the shared data.
According to one embodiment, the database system includes a mechanism to dynamically change a particular ownership group from shared disk to shared nothing, and visa versa. For example, if a particular set of shared nothing data is subj ect to frequent read accesses (read hot spots), then that data can be converted to shared disk by converting the ownership group to which it belongs from shared nothing to shared disk. Likewise, if a particular set of shared disk data is subject to frequent write accesses (write hot spots), then that data can be converted to shared nothing data by changing the ownership group that contains the data to a shared nothing ownership group and assigning ownership of the ownership group to a database server.
According to one aspect of the invention, the database system also includes a mechanism to reassign ownership of a shared nothing ownership group from one node to another node. This may be requested by an operator to improve load balancing, or may happen automatically to continue to support access to the data of a shared nothing ownership group owned by a node Nl after Nl fails.
OWNERSHIP As described above, a database system is provided in which some ownership groups are designated as shared nothing ownership groups, and some ownership groups are designated as shared disk ownership groups. An owner is assigned to every shared nothing ownership group. The ownership of a shared nothing ownership group is made known to all database servers so that they can send requests to the owner of the ownership group when they require tasks performed on data within the ownership group.
According to one embodiment of the invention, ownership information for the various ownership groups is maintained in a control file, and all database servers that have access to the database are allowed to access the control file. Each database server may store a copy of the control file in its cache. With a copy of the control file in its cache, a database server may determine the ownership of ownership groups without always having to incur the overhead associated with reading the ownership information from disk.
Figure 3 is a flowchart illustrating the steps performed by a database server that desires data in a system that employs both shared disk and shared nothing ownership groups. In step 300, the database server determines the ownership group to which the desired data belongs. In step 302, the database server determines the owner of the ownership group that contains the desired data. As explained above, step 302 may be performed by accessing a control file, a copy of which may be stored in the cache associated with the database server. If the ownership group is a shared disk ownership group, then all database servers are considered to be owners of the ownership group. If the ownership group is a shared nothing ownership group, then a specific database server will be specified in the control file as the owner of the ownership group.
In step 304, the database server determines whether it is the owner of the ownership group that holds the desired data. The database server will be the owner of the ownership group if either (1) the ownership group is a shared disk ownership group, or (2) the ownership group is a shared nothing ownership group and the database server is designated in the control file as the owner of the shared nothing ownership group. If the database server is the owner of the ownership group that holds the desired data, control passes to step 310, where the database server directly retrieves the desired data.
If the database server is not the owner of the ownership group that holds the data, control passes to step 306. At step 306, the database server sends a request to the owner of the ownership group for the owner to access the desired data on behalf of the requestor. At step 308, the database server receives the desired data from the owner of the ownership group. OWNER SETS
According to an alternative embodiment, an ownership group is not limited to being either (1) owned by only one database server (shared nothing) or (2) owned by all . database servers (shared disk). Rather, a ownership group may alternatively be owned by any specified subset of the available database servers. The set of database servers that own a particular ownership group are referred to herein as the owner set for the ownership group. Thus, a shared nothing ownership group is equivalent to a ownership group that includes only one database server in its owner set, while a shared disk ownership group is equivalent to a ownership group that includes all available database servers in its owner set.
When owner sets are used to perform a task on data in an ownership group, a database server that does not belong to the owner set of the ownership group sends a request to one of the database servers that belong to the owner set of the ownership group. In response to the request, the recipient of the request directly accesses the data in the ownership group and performs the requested task. Contention caused by write hot spots within the ownership group only occurs among the database servers that belong to the owner set of the ownership group.
CHANGING THE OWNERSHIP OF AN OWNERSHIP GROUP As mentioned above, it may be desirable to change an ownership group from shared nothing to shared disk, or from shared disk to shared nothing. Such changes may be initiated automatically in response to the detection of read or write hot spots, or manually (e.g. in response to a command issued by a database administrator).
Various techniques may be used to transition an ownership group from one owner set (the "source owner set") to the other (the "destination owner set"). Figure 4 is a flowchart that illustrates steps performed for changing the owner set of an ownership group according to one embodiment of the invention.
Referring to Figure 4, at step 400 a "disable change" message is broadcast to all of the available database servers. The disable change message instructs the database servers to cease making forward changes to data within the ownership group whose owner set is going to be changed (the "fransitioning ownership group"). Forward changes are changes that create a version that has previously not existed (i.e. create a new "current" version of a data item). Backward changes, on the other hand, are changes that result in the recreation of a previously existing version of a data item. At step 402, the portion of the database system responsible for changing the owner set of ownership groups (the "owner changing mechanism") waits until all transactions that have made changes to the transitioning ownership group either commit or roll back.
Those transactions that have performed some but not all of their updates to data within the transitioning ownership group prior to step 400 will roll back because forward changes to the ownership group are no longer allowed. Because step 400 prevents only forward changes to the transitioning ownership group, database servers are not prevented from rolling back the changes that they have already made to the transitioning ownership group.
Unfortunately, a significant amount of overhead may be required to determine which transactions have updated the transitioning ownership group. Therefore, an embodiment of the invention is provided in which the database system does not attempt to track the transactions that have updated data within the transitioning ownership group. However, without tracking this information, it must be assumed that any of the transactions that were allowed to access data in the transitioning ownership group and that were begun prior to step 400 may have made changes to data within the transitioning ownership group.
Based on this assumption, step 402 requires the owner changing mechanism to wait until all of the transactions that (1) may have possibly accessed data in the transitioning ownership group, and (2) were begun prior to step 400 either commit or roll back. Typically, only transactions that are executing in database servers that belong to the source owner set of the transitioning ownership group may have possibly accessed data in the transitioning ownership group. Thus, if the transitioning ownership group is shared disk, then the owner changing mechanism must wait until all transactions in all database servers that were begun prior to step 400 either commit or roll back. If the transitioning ownership group is shared nothing, then the owner changing mechanism must wait until all transactions in the database server that owns the transitioning ownership group either commit or roll back. Note that this includes user transactions that may have originated in other nodes, and have created subtransactions local to the transitioning ownership group.
When all transactions that could possibly have updated data within the transitioning ownership group have either committed or aborted, control proceeds to step 404. At step 404, the owner changing mechanism changes the owner set of the transitioning ownership group by updating the control file in an atomic operation. For example, the designation change may cause the transitioning ownership group to transition from a shared nothing ownership group to a shared disk ownership group or visa versa. Alternatively, the designation change may simply change the database server that owns a shared nothing ownership group, without changing the ownership group type.
After the control file has been changed to reflect the new owner set of the transitioning ownership group, control proceeds to step 406. At step 406, a "refresh cache" message is sent to all available database servers. Upon receiving the refresh cache message, each database server invalidates the copy of the control file that it contains in its cache. Consequently, when the database servers subsequently need to inspect the control file to determine ownership of an ownership group, they retrieve the updated version of the control file from persistent storage. Thus they are made aware of the new owner set of the transitioning ownership group.
ADJUSTING TO OWNERSHIP CHANGES When a particular query is going to be used frequently, the query is typically stored within the database. Most database systems generate an execution plan for a stored query at the time that the stored query is initially submitted to the database system, rather than recomputing an execution plan every time the stored query is used. The execution plan of a query must take into account the ownership of the ownership groups that contain the data accessed by the query. For example, if the query specifies an update to a data item in ownership group owned exclusively by a particular database server, the execution plan of the query must include shipping that update operation to that particular database server.
However, as explained above, a mechanism is provided for changing the ownership of ownership groups. Such ownership changes may take place after the execution plan for a particular stored query has been generated. As a consequence, execution plans may require certain database servers to perform operations on data within ownership groups that they no longer own. According to one embodiment of the invention, database servers that are asked to perform operations on data within ownership groups that they do not own return an "ownership error" message to the processes that request the operations. In response to receiving an ownership error message, a new execution plan is generated for the query that caused the error. The new execution plan takes into account the current ownership of ownership groups, as indicated by the current version of the control file. CONTROL FILE MANAGEMENT
As described above, an atomic operation is used to update the control file to change the designation of an ownership group (step 404). Various mechanisms maybe used to ensure that this operation is atomic. For example, according to one embodiment of the invention , the control file includes a bitmap and a series of block pairs, as illustrated in Figure 5. Each bit in the bitmap 512 corresponds to a block pair.
At any given time, only one of the blocks in a block pair contains current data. The value of the bit associated with a block pair indicates which of the two blocks in the corresponding block pair holds the current data. For example, bit 502 is associated with block pair 504 that includes blocks 506 and 508. The value of bit 502 (e.g. "0") indicates that block 506 is the current block within block pair 504. The value of bit 502 may be changed to "1" to indicate that the data in block 508 is current (and consequently that the data in block 506 is no longer valid).
Because the data in the non-current block of a block pair is considered invalid, data may be written into the non-current block without changing the effective contents of the control file. The contents of the control file are effectively changed only when the value of a bit in the bitmap 512 is changed. Thus, as preliminary steps to an atomic change, the contents of the current block 506 of a block pair 504 may be loaded into memory, modified, and stored into the non-current block 508 of the block pair 504. After these preliminary steps have been performed, the change can be atomically made by changing the value of the bit 502 within the bitmap 512 that corresponds to the block pair 504.
This is merely one example of a technique for performing changes atomically. Other techniques are possible. Thus, the present invention is not limited to any particular technique for performing changes atomically.
MOVING DATA ITEMS BETWEEN OWNERSHIP GROUPS One way to change ownership of a data item, such as a tablespace, is to change the owner set of the ownership group to which the data item belongs. A second way to change ownership of a data item is to reassign the data item to a different ownership group. For example, the owner of tablespace A can be changed from server A to server B by removing tablespace A from an ownership group assigned to server A and placing it in an ownership group assigned to server B. According to one embodiment of the invention, the membership of ownership groups is maintained in a data dictionary within the database. Consequently, to move a data item from a first ownership group to a second ownership group, the membership information for both the first and second ownership groups have to be updated within the data dictionary. The various steps involved in changing to which ownership group a data item belongs are similar to those described above for changing the owner set of an ownership group. Specifically, access to the tablespace that is being transferred (the "transitioning tablespace") is disabled. The ownership change mechanism then waits for all transactions that hold locks on the data item (or a component thereof) to either roll back or commit.
Once all of the transactions that hold locks on the data item have either committed or rolled back, the data dictionary is modified to indicate the new ownership group of the data item. The control file is then modified to indicate that the owner set of the ownership group to which the data item was moved is now the owner set of the data item. This change atomically enables the target owner to access the data item. If the ownership group is in the middle of an ownership change, the control file is updated to indicate that the data item is in a "moving delayed" state.
Changing the ownership group to which a data item belongs may or may not cause the owner of the data item to change. If the owner set of the source ownership group is the same as the owner set of the transitioning ownership group, then the owner of the data item is not changed when the data item is moved from the source ownership group to the transitioning ownership group. On the other hand, if the owner set of the source ownership group is not the same as the owner set of the transitioning ownership group, then the owner of the data item is changed when the data item is moved from the source ownership group to the transitioning ownership group.
SPECIFIC OWNERSHIP CHANGE CONDITIONS According to one embodiment, techniques are provided to handle situations in which (1) an attempt is made to change the owner set of an ownership group when a data item that belongs to the ownership group is in the middle of being transferred to a different ownership group; and (2) an attempt is made to transfer a data item to a different ownership group when that destination ownership group is in the middle of having its owner set changed. To detect these conditions, an embodiment of the invention provides within the control file one or more status flags for each data item (e.g. tablespace) that belongs to an ownership group. For example, a flag may be used to indicate whether the ownership group to which a data item belongs is in the process of being assigned a new owner. Similarly, a flag may indicate that a data item is in the process of being transferred to a different ownership group.
When an attempt is made to change the owner set of an ownership group, the ownership change mechanism inspects the status flags of the data items that belong to the ownership group to determine whether any data item that belongs to the ownership group is in the middle of being transferred to a different ownership group. If any data item that belongs to the ownership group is in the middle of being transferred to a different ownership group, then the attempt to change the owner set of the ownership group is aborted. If no data items that belong to the ownership group are in the middle of being transferred to a different ownership group, then the status flags of the data items that belong to the ownership group are set to indicate that the ownership of the ownership group to which the data items belong is in transition. A message is also sent to the various database servers to invalidate their cached versions of the control file. This ensures that they see the new values of the status flags.
When an attempt is made to transfer a data item to a different ownership group, the status flags of the data item are checked to determine whether the destination ownership group is in the middle of having its owner set changed. According to one embodiment, this check is performed after modifying the data dictionary to reflect the new ownership group of the data item, but before updating the confrol file to give the owner of the new ownership group access to the data item. If the ownership group to which the data item belongs is in the middle of having its owner set changed, then the status flags for the data item in the control file are set to indicate a "move delayed" condition, hi addition, a database-wide "move delayed" flag is set to indicate that the database contains some data items that are in a move delayed state.
When the operation of transferring ownership of the transitioning ownership group is completed, the process performing the transfer updates the status flags to indicate that the ownership group is no longer in the process of an ownership transfer. In addition, the process clears the "move delayed" flags of any data items that have moved to this ownership group during the ownership transfer of this ownership group. FAILURE RECOVERY
It is possible for a failure to occur while an ownership change is in progress. The failure may be the result of a "process death" or a "server death". A process death occurs when a particular process involved in the ownership change fails. A server death occurs when an entire database server fails. With both of these failure types, all of the changes that have not yet been stored on persistent storage may be lost. After such a failure, it is necessary to return the database to a consistent state.
According to one embodiment of the invention, recovery from process death is performed through the use of a state object. A state object is a data structure that is allocated in a memory region associated with the database server to which the process belongs. Prior to performing an action, the process updates the state object to indicate the action it is going to perform. If the process dies, another process within the database server (e.g. a "process monitor") invokes a method of the state object (a "clean up routine") to return the database to a consistent state.
The specific acts performed to clean up after a process failure depend on what operation the dead process was performing, and how far the dead process had executed before it died. According to one embodiment, process failures during an ownership change of an ownership group are handled as follows:
If the process performing the ownership change dies before it makes the final control file change, then the original owner is restored as the owner of the ownership group.
If the process performing the ownership change dies after it makes the final control file change but before it deletes the state object, then' the new owner remains the owner, and the state object is deleted.
Process failures that occur while transferring a data item from one ownership group to another are handled as follows:
If the process performing the transfer dies before the change to the data dictionary, then the original owner of the data item will be restored as the owner of the data item.
If the process performing the transfer dies after the changes to the dictionary have been committed, but before the final control file change, then the process monitor completes the move and performs the appropriate change to the control file. If the ownership group is in the middle of an ownership change, the data items are marked as "move delayed". If the process performing the transfer dies after the final control file change but before the state object is deleted, the process monitor will delete the state object.
SERVER DEATH
While a database server is dead, no access is provided to the data in the ownership groups that were owned exclusively by the dead server. Therefore, according to one embodiment of the invention, server death is an event that triggers an automatic ownership change, where all ownership groups exclusively owned by the failed server are assigned to new owners.
The specific acts performed to clean up after a server failure depend on what operation the database server was performing, and how much of an ownership transfer operation was performed before the server died. According to one embodiment, server failures during an ownership change of an ownersliip group are handled as follows:
If the source database server dies before the final control file change is made, then the ownership group is assigned to another thread, and the status information in the control file is updated to indicate that the ownership group is no longer in transition.
If the target database server dies, then either (1) the process performing the transition will detect that the instance died and abort the transition, or (2) during recovery of the dead server, the ownership group will be reassigned from the dead server to another server.
Server failures that occur while transferring a data item from one ownership group to another are handled as follows:
If the source server dies before the dictionary change, then during recovery of the server, new owners will be assigned to the source ownership group and the move flag of the data item will be cleared.
If the source server dies after the dictionary change but before the final control file change, then during the recovery of the source server, the move operation will be finished by either assigning the right owner to the data item, or by marking it as move delayed.
If the target server dies and the final control file change is made, then the data item is marked as "move delayed". During the recovery of the dead server, the ownership of the transitioning ownership group will be reassigned and the move delayed flag will be cleared. REDUCING DOWNTIME DURING OWNERSHIP CHANGE
As described above, the steps illustrated in Figure 4 represent one technique for changing the ownership of an ownership group. In this technique, step 402 requires the ownership change mechanism to wait until all transactions that made changes to data than belongs to the transitioning ownership group to either commit or roll back. During this wait, all data in the transitioning ownership group is unavailable. Therefore, it is important to minimize the duration of the wait.
As described above, it may not be practical to track which transactions actually made changes to data that belongs to the transitioning ownership group. Therefore, the ownership change mechanism waits for all transactions that are executing in all database servers that belong to the source owner set of the transitioning ownership group to either commit or roll back. Due to the number of transactions the ownership change mechanism must wait upon, many of which may not have even made changes to data from the transitioning ownership group, the delay may be significant.
According to an alternative embodiment, a mechanism is provided that allows the data that is being transitioned between owners to remain available during this delay. Specifically, a disable change message is not sent to all database servers. Rather, a "new owner" message is sent to all database servers indicating the target owner set of the ownership group. The new owner message may be broadcast, for example, by sending a refresh cache message to all database servers after updating the control file to indicate (1) the source owner set, (2) the target owner set, and (3) that the ownership group is in transition.
All transactions started by a server after the server receives the new owner message act as though the target owner set owns the ownership group. All transactions that started in a server before the server receives the new owner message continue to act as though the source owner set owns the ownership group. Thus, during the waiting period, ownership of the transitioning ownership group is effectively shared between the members of the source owner set and the members of the target owner set. In other words, the data of the transitioning ownership group is temporarily shared among two database servers and the shared disk locking mechanism is temporarily activated for access to such data.
When all of the transactions in the source ovmer set that were begun prior to the broadcast of the new owner message have either committed or rolled back, the control file is updated a second time. During the second update, the control file is updated to indicate that the target owner set is the exclusive owner set for the ownership group, and that the ownership group is no longer in transition.
In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes maybe made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims

CLAIMSWhat is claimed is:
1. A database system including: one or more persistent storage devices having a database stored thereon; a plurality of database servers executing on a plurality of nodes; wherein each node of said plurality of nodes has direct access to said one or more persistent storage devices; wherein at least a portion of said database is partitioned into a plurality of ownership groups; wherein each ownership group of said plurality of ownership groups is assigned an owner set; wherein only processes that are executing on database servers that are members of the owner set of an ownership group are allowed to directly access data within said ownership group.
2. The database system of Claim 1 wherein: each ownership group of said plurality of ownership groups is designated as either a shared nothing ownersliip group or a shared disk ownership group; each shared nothing ownership group is assigned an owner from among said plurality of database servers; only the owner of each shared nothing ownership group is allowed to directly access data within said shared nothing ownership group; and each of said plurality of database servers are allowed to directly access data within ownership groups that are designated as shared disk ownership groups.
3. The database system of Claim 2 further including a mechanism for changing the designation of a shared disk ownership group to a shared nothing ownersliip group.
4. The database system of Claim 3 wherein the mechanism is configured to change the designation of the shared disk ownership group to a shared nothing ownership group automatically in response to determining that said shared disk ownership group contains a write hot spot.
5. The database system of Claim 2 further including a mechanism for changing the designation of a shared nothing ownership group to a shared disk ownership group.
6. The database system of Claim 5 wherein the mechanism is configured to change the designation of the shared nothing ownership group to a shared disk ownership group automatically in response to determining that said shared nothing ownership group contains a read hot spot.
7. The database system of Claim 3 wherein the mechanism is further configured to change the designation of a shared nothing ownership group to a shared disk ownership group.
8. The database system of Claim 7 wherein the mechanism is configured to change the designation of the shared nothing ownership group to a shared disk ownership group automatically in response to determining that said shared nothing ownership group contains a read hot spot.
9. The database system of Claim 2 further including a distributed lock manager configured to manage access to data within ownership groups designated as shared disk ownership groups but not access to data within ownership groups designated as shared nothing ownership groups.
10. A method for managing access to a database stored on one or more persistent storage devices that are directly accessible to a plurality of database servers executing on a plurality of nodes, the method including the steps of: partitioning at least a portion of said database into a plurality of ownership groups; assigning an owner set to each ownership group of said plurality of ownership groups; and allowing only processes executing in database servers that belong to the owner set of each ownership group to directly access data within said ownership group.
11. The method of Claim 10 wherein the step of assigning an owner set to each ownership group of said plurality of ownership groups includes: designating each ownership group of said plurality of ownership groups as either a shared nothing ownership group or a shared disk ownership group; assigning each shared nothing ownership group an owner from among said plurality of database servers; allowing only the owner of each shared nothing ownership group to directly access data within said shared nothing ownership group; and allowing each of said plurality of database servers to directly access data within ownership groups that are designated as shared disk ownership groups.
12. The method of Claim 11 further including the step of changing the designation of a shared disk ownership group to a shared nothing ownership group.
13. The method of Claim 12 wherein the step of changing the designation of the shared disk ownership group to a shared nothing ownership group is automatically performed in response to determining that said shared disk ownership group contains a write hot spot.
14. The method of Claim 11 further including the step of changing the designation of a shared nothing ownership group to a shared disk ownership group.
15. The method of Claim 14 wherein the step of changing the designation of the shared nothing ownership group to a shared disk ownership group is performed automatically in response to determining that said shared nothing ownership group contains a read hot spot.
16. The method of Claim 12 further including the step of changing the designation of a shared nothing ownership group to a shared disk ownership group.
17. The method of Claim 16 wherein the step of changing the designation of the shared nothing ownership group to a shared disk ownership group automatically in response to determining that said shared nothing ownership group contains a read hot spot.
18. The method of Claim 11 further including the step of using a distributed lock manager to manage access to data within ownership groups designated as shared disk ownership groups but not access to data within ownership groups designated as shared nothing ownership groups.
19. A computer readable medium carrying instructions for managing access to a database stored on one or more persistent storage devices that are directly accessible to a plurality of database servers executing on a plurality of nodes, the instructions including instructions for performing the steps of: partitioning at least a portion of said database into a plurality of ownership groups; assigning an owner set to each ownership group of said plurality of ownership groups; and allowing only processes executing in database servers that belong to the owner set of each ownership group to directly access data within said ownership group.
20. The computer readable medium of Claim 19 wherein the step of assigning an owner set to each ownership group of said plurality of ownership groups includes: designating each ownership group of said plurality of ownership groups as either a shared nothing ownership group or a shared disk ownership group; assigning each shared nothing ownership group an owner from among said plurality of database servers; allowing only the owner of each shared nothing ownership group to directly access data within said shared nothing ownership group; and allowing each of said plurality of database servers to directly access data within ownership groups that are designated as shared disk ownership groups.
21. The computer readable medium of Claim 20 further including instructions for performing the step of changing the designation of a shared disk ownership group to a shared nothing ownership group.
22. The computer readable medium of Claim 21 wherein the step of changing the designation of the shared disk ownership group to a shared nothing ownership group is automatically performed in response to determining that said shared disk ownership group contains a write hot spot.
23. The computer readable medium of Claim 20 further including instructions for performing the step of changing the designation of a shared nothing ownership group to a shared disk ownership group.
24. The computer readable medium of Claim 23 wherein the step of changing the designation of the shared nothing ownership group to a shared disk ownership group is performed automatically in response to determining that said shared nothing ownership group contains a read hot spot.
25. The computer readable medium of Claim 21 further including instructions for performing the step of changing the designation of a shared nothing ownership group to a shared disk ownership group.
26. The computer readable medium of Claim 25 wherein the step of changing the designation of the shared nothing ownership group to a shared disk ownership group automatically in response to determining that said shared nothing ownership group contains a read hot spot.
27. The computer readable medium of Claim 20 further including instructions for performing the step of using a distributed lock manager to manage access to data within ownership groups designated as shared disk ownership groups but not access to data within ownership groups designated as shared nothing ownership groups.
28. A system comprising: a plurality of nodes that have direct access to a database; the database including: a first set of data that each node of the plurality of nodes is allowed to directly access; and a second set of data that only a subset of the plurality of nodes is allowed to directly access; wherein nodes that do not belong to the subset are configured to send requests to nodes that belong to the subset when the nodes that do not belong to the subset are requested to perform operations that involve data within said second set of data.
29. The system of Claim 28, wherein: said subset has a single node; and all access to said second set of data is through the single node.
30. The system of Claim 28, wherein: said subset is a first subset; the database includes a third set of data that only a second subset of the plurality of nodes is allowed to directly access; and said first subset is different from said second subset.
31. The system of Claim 30, wherein at least one node of the plurality of nodes belongs to both said first subset and said second subset.
32. The system of Claim 28, further comprising: a mechanism for changing the nodes that belong to said subset.
33. The system of Claim 28, further comprising: a mechanism for automatically changing the nodes that belong to the subset in response to a failure of a node that belongs to the subset.
34. The system of Claim 28, wherein the database includes a plurality of data items, wherein the first set of data includes one or more data items of the plurality of data items, and the system further comprising: a mechanism for changing which data items of the plurality of data items are in the first set of data.
35. The system of Claim 28, wherein the database includes a plurality of data items, wherein the second set of data includes one or more data items of the plurality of data items, and the system further comprising: a mechanism for changing which data items of the plurality of data items are in the second set of data.
36. The system of Claim 28, wherein the first set of data is a first ownership group and the second set of data is a second ownership group.
37. The system of Claim 28, wherein the subset is an owner set.
38. A database system including: a database; a plurality of database servers; wherein each database server of said plurality of database servers has direct access to said database; wherein at least a portion of said database is partitioned into a plurality of ownership groups; wherein at least one ownership group of said plurality of ownership groups is assigned an owner set; and wherein processes that are executing on database servers that are members of the owner set of an ownership group are allowed to directly access data within said ownership group.
39. The database system of Claim 38, wherein each ownership group of said plurality of ownership groups is assigned an owner set.
40. The database system of Claim 38, wherein only processes that are executing on database servers that are members of the owner set of an ownership group are allowed to directly access data within said ownership group.
41. The database system of Claim 38, wherein at least one ownership group of said plurality of ownership groups includes one or more tablespaces.
42. The database system of Claim 41, wherein at least one tablespace of the one or more tablespaces is a collection of datafiles.
43. The database system of Claim 38 wherein: at least one ownership group of said plurality of ownership groups is designated as a shared nothing ownership group; at least one shared nothing ownership group is assigned an owner from among said plurality of database servers; and only the owner of each shared nothing ownership group is allowed to directly access data within said shared nothing ownership group.
44. The database system of Claim 38 wherein: at least one ownership group of said plurality of ownership groups is designated as a shared disk ownership group; and each of said plurality of database servers are allowed to directly access data within ownership groups that are designated as shared disk ownership groups.
45. The database system of Claim 38 wherein: each ownership group of said plurality of ownership groups is designated as either a shared nothing ownership group or a shared disk ownership group; and each shared nothing ownership group is assigned a single owner from among said plurality of database servers.
46. The database system of Claim 38, wherein at least one ownership group of said plurality of ownership groups is designated as a particular type of ownership group of a plurality of types of ownership groups.
47. The database system of Claim 46, further including a mechanism for changing the particular type of ownership group that is designated.
48. The database system of Claim 46, wherein: at least one ownership group of the plurality of ownership groups is designated as a first type of ownership group of the plurality of types of ownership groups; and at least one ownership group of the plurality of ownership groups is designated as a second type of ownership group of the plurality of types of ownership groups.
49. The database system of Claim 48, wherein: the first type of ownership group is a shared nothing ownership group; and the second type of ownership group is a shared disk ownership group.
50. The database system of Claim 49, wherein each ownership group of said plurality of ownership groups is designated as either as shared nothing ownership group or shared disk ownership group.
51. The database system of Claim 46, wherein for at least one type of ownership group of the plurality of types of ownership groups, only one database server of the plurality of database servers is allowed in the owner set for each ownership group that is designated as the at least one type of ownership group.
52. The database system of Claim 46, wherein for at least one type of ownership group of the plurality of types of ownership groups, each database server of the plurality of database servers is included in the owner set for each ownership group that is designated as the at least one type of ownership group.
53. The database system of Claim 46, wherein for at least one type of ownership group of the plurality of types of ownership groups, at least two database servers but fewer than all database servers of the plurality of database servers are included in the owner set for each ownership group that is designated as the at least one type of ownership group.
54. The database system of Claim 38, further comprising: a first database server of the plurality of database servers, wherein the first database server desires data that is included in a particular ownership group assigned to a particular owner set; wherein, if the first database server is included in the particular owner set, a process executing on the first database server directly retrieves the data; and wherein, if the first database server is not included in the particular owner set, the process executing on the first database server requests and receives the data from a second database server, of the plurality of database servers, that is included in the particular owner set.
55. The database system of Claim 54, wherein the particular ownership group is a shared disk ownership group, the particular owner set includes the plurality of database servers, and the process executing on the first database server directly retrieves the data.
56. The database system of Claim 54, wherein the particular ownership group is a shared nothing ownership group and the second database server of the plurality of database servers is the only database server in the particular owner set.
57. The database system of Claim 54, wherein the particular ownership group is a shared nothing ownership group and the first database server of the plurality of database servers is the only database server in the particular owner set.
58. The database system of Claim 38, wherein at least one ownership group of the plurality of ownership groups is assigned an owner from among said plurality of database servers, and wherein the database system further includes: a mechanism for reassigning the owner for the at least one ownership group from a first database server of the plurality of database servers to a second database server of the plurality of database servers.
59. The database system of Claim 58, wherein the at least one ownership group is a shared nothing ownership group.
60. The database system of Claim 58, wherein the mechanism is configured to reassign the owner for the at least one ownership group in response to a request.
61. The database system of Claim 58, wherein the mechanism is configured to reassign the owner for the at least one ownership group automatically in response to a failure of the first database server.
62. The database system of Claim 38, further including: a mechanism for transitioning a particular ownership group from a first owner set to a second owner set, wherein the mechanism is configured to: instruct the plurality of database servers to cease creating new versions of data within the particular ownership group; and when all transactions that are accessing said data through said first owner set have either committed or aborted, change data that indicates ownership of the particular ownership group to indicate that the second owner set is the owner of the particular ownership group.
63. The database system of Claim 62, wherein in response to a failure of the mechanism to transition the particular ownership group from the first owner set to the second owner set, the mechanism is further configured to: determine whether the failure occurred prior to changing the data that indicates ownership of the particular ownership group; if the failure occurred before changing the data that indicates ownership of the particular ownership group, restore the first owner set as owner of the particular ownership group; and if the failure occurred after changing the data that indicates ownership of the particular ownership group, retain the second owner set as owner of the particular ownership group.
64. The database system of Claim 38, further comprising: a mechanism for fransitioning a particular ownership group from a first owner set to a second owner set; and a query that is included in the database, wherein the query is associated with an execution plan that refers to the first owner set, and wherein after the particular ownership group is transitioned by the mechanism from the first owner set to the second owner set, a new execution plan is generated that refers to the second owner set.
65. The database system of Claim 38, further including: a mechanism to reassign a data item from a first ownership group to a second ownership group, wherein the mechanism is configured to: disable access by the plurality of database servers to the data item; and when all transactions that are accessing said data item have either committed or aborted, change data that indicates to which ownership group the data item belongs to indicate that the data item belongs to the second ownership group.
66. The database system of Claim 65, wherein the mechanism is further configured to: change first data to indicate to which ownership group the data item belongs; and before changing the first data, change second data to indicate to which ownership group the data item belongs.
67. The database system of Claim 66, wherein the first data is in a control file and the second data is in a data dictionary.
68. The database system of Claim 66, wherein in response to a failure of the mechanism to reassign the data item from the first ownership group to the second ownership group, the mechanism is further configured to: determine whether the failure occurred before changing the second data; if the failure occurred before changing the second data, restore the data item to the first ownership group; and if the failure occurred after changing second data, complete reassigning the data item from the first ownership group to the second ownership group by changing the first data.
69. The database system of Claim 65, wherein the mechanism is further configured to: determine whether the second ownership group is undergoing an ownership change; and if the second ownership group is undergoing an ownership change, mark the data item as move delayed.
70. A system for fransitioning ownership of a data item from a first owner set to a second owner set, the system comprising: a plurality of database servers; a database that includes the data item; a mechanism for managing access to the data item; wherein said plurality of database servers are informed that the data item is being transitioned from the first owner set to the second owner set; wherein the mechanism is configured to allow members of said first owner set and members of said second owner set to directly access said data item, after said plurality of database servers are informed; wherein data is stored that indicates that the second owner set is the exclusive owner of the data item; and wherein the mechanism is configured to allow only members of said second owner set to directly access the data item, after detecting that all transactions that are accessing said data item through said first owner set have either committed or aborted.
71. The system of Claim 70, wherein all fransactions that are accessing said data item through said first owner set have either committed or aborted when all fransactions that began execution prior to the step of informing have either committed or aborted.
72. The system of Claim 70, wherein the plurality of database servers are informed by a refresh cache message that is sent to the plurality of database servers.
73. The system of Claim 70, wherein prior to the plurality of database servers being informed, data is stored that identifies the first owner set, the second owner set, and that indicates that the owner of the data item is in transition.
74. The system of Claim 70, wherein: if a particular database server of the plurality of database servers begins a transaction prior to being informed that the data item is being transitioned from the first owner set to the second owner set, the transaction is processed as if the first owner set is the owner of the data item; and if the particular database server of the plurality of database servers begins the transaction after being informed that the data item is being transitioned from the first owner set to the second owner set, the transaction is processed as if the second owner set is the owner of the data item.
75. The system of Claim 70, wherein the mechanism is a shared disk locking mechanism.
76. A method for managing access to a database by a plurality of nodes having direct access to the database, the method comprising the steps of: partitioning at least a first portion of the database into a first set of data that each node of the plurality of nodes is allowed to directly access; and partitioning at least a second portion of the database into a second set of data that only a subset of the plurality of nodes is allowed to directly access; wherein nodes that do not belong to the subset are configured to send requests to nodes that belong to the subset when the nodes that do not belong to the subset are requested to perform operations that involve data within said second set of data.
77. The method of Claim 76, wherein: said subset has a single node; and all access to said second set of data is through the single node.
78. The method of Claim 76, wherein said subset is a first subset, and wherein the method further comprises the step of: partitioning at least a third portion of the database into a third set of data that only a second subset of the plurality of nodes is allowed to directly access, wherein said first subset is different from said second subset.
79. The method of Claim 78, wherein at least one node of the plurality of nodes belongs to both said first subset and said second subset.
80. The method of Claim 76, further comprising the step of: changing the nodes that belong to said subset.
81. The method of Claim 76, further comprising the step of: automatically changing the nodes that belong to the subset in response to a failure of a node that belongs to the subset.
82. The method of Claim 76, wherein the database includes a plurality of data items, wherein the first set of data includes one or more data items of the plurality of data items, and wherein the method further comprises the step of: changing which data items of the plurality of data items are in the first set of data.
83. The method of Claim 76, wherein the database includes a plurality of data items, wherein the second set of data includes one or more data items of the plurality of data items, and wherein the method further comprises the step of: changing which data items of the plurality of data items are in the second set of data.
84. The method of Claim 76, wherein the first set of data is a first ownership group and the second set of data is a second ownership group.
85. The method of Claim 76, wherein the subset is an owner set.
86. A method for managing access to a database that is directly accessible by a plurality of database servers, the method including the steps of: partitioning at least a portion of said database into a plurality of ownership groups; assigning an owner set to at least one ownership group of said plurality of ownership groups; and allowing processes executing in database servers that belong to the owner set of each ownership group to directly access data within each ownership group.
87. The method of Claim 86, further comprising the step of: assigning one owner set to each ownership group of said plurality of ownership groups.
88. The method of Claim 86, further comprising the step of: allowing only processes that are executing on database servers that are members of the owner set of a particular ownership group to directly access data within the particular ownership group.
89. The method of Claim 86, wherein at least one ownership group of said plurality of ownership groups includes one or more tablespaces.
90. The method of Claim 89, wherein at least one tablespace of the one or more tablespaces is a collection of datafiles.
91. The method of Claim 86, further comprising the steps of: designating at least one ownership group of said plurality of ownership groups as a shared nothing ownership group; assigning at least one shared nothing ownership group an owner from among said plurality of database servers; and allowing only the owner of each shared nothing ownership group to directly access data within said shared nothing ownership group.
92. The method of Claim 86, further comprising the steps of: designating at least one ownership group of said plurality of ownership groups as a shared disk ownership group; and allowing each of said plurality of database servers to directly access data within ownership groups that are designated as shared disk ownership groups.
93. The method of Claim 86, further comprising the steps of: designating each ownership group of said plurality of ownership groups as either a shared nothing ownership group or a shared disk ownership group; and assigning each shared nothing ownership a single owner from among said plurality of database servers.
94. The method of Claim 86, further comprising the step of: designating at least one ownership group of said plurality of ownership groups as a particular type of ownership group of a plurality of types of ownership groups.
95. The method of Claim 94, further comprising the step of: changing the type of ownership group that is designated.
96. The method of Claim 94, further comprising the steps of: designating at least one ownership group of the plurality of ownership groups as a first type of ownership group of the plurality of types of ownership groups; and designating at least one ownership group of the plurality of ownership groups as a second type of ownership group of the plurality of types of ownership groups.
97. The method of Claim 96, wherein: the first type of ownership group is a shared nothing ownership group; and the second type of ownership group is a shared disk ownership group.
98. The method of Claim 97, further comprising the step of: designating each ownership group of said plurality of ownership groups as either as shared nothing ownership group or shared disk ownership group.
99. The method of Claim 94, further comprising the step of: for at least one type of ownership group of the plurality of types of ownership groups, allowing only one database server of the plurality of database servers in the owner set for each ownership group that is designated as the at least one type of ownership group.
100. The method of Claim 94, further comprising the step of: for at least one type of ownership group of the plurality of types of ownership groups, including each database server of the plurality of database servers in the owner set for each ownership group that is designated as the at least one type of ownership group.
101. The method of Claim 94, further comprising the step of: for at least one type of ownership group of the plurality of types of ownership groups, including at least two database servers but fewer than all database servers of the plurality of database servers in the ovmer set for each ovmership group that is designated as the at least one type of ownership group.
102. The method of Claim 86, wherein: a first database server of the plurality of database servers desires data that is included in a particular ownership group assigned to a particular owner set; if the first database server is included in the particular owner set, a process executing on the first database server directly retrieves the data; and if the first database server is not included in the particular owner set, the process executing on the first database server requests and receives the data from a second database server, of the plurality of database servers, that is included in the particular owner set.
103. The method of Claim 102, wherein the particular ownership group is a shared disk ownership group, the particular owner set includes the plurality of database servers, and the process executing on the first database server directly retrieves the data.
104. The method of Claim 102, wherein the particular ownership group is a shared nothing ownership group and the second database server of the plurality of database servers is the only database server in the particular owner set.
105. The method of Claim 102, wherein the particular ownership group is a shared nothing ownership group and the first database server of the plurality of database servers is the only database server in the particular owner set.
106. The method of Claim 86, further comprising the steps of: assigning at least one ownership group of the plurality of ownership groups an owner from among said plurality of database servers; and reassigning the owner for the at least one ownership group from a first database server of the plurality of database servers to a second database server of the plurality of database servers.
107. The method of Claim 106, wherein the at least one ownersliip group is a shared nothing ownership group.
108. The method of Claim 106, wherein the step of reassigning the owner set for the at least one ownership group is performed in response to a request.
109. The method of Claim 106, wherein the step of reassigning the owner set for the at least one ownership group is performed automatically in response to a failure of the first database server.
110. The method of Claim 86, further comprising the step of: transitioning a particular ownership group from a first owner set to a second owner set by performing the steps of: instructing the plurality of database servers to cease creating new versions of data within the particular ownership group; and when all transactions that are accessing said data through said first owner set have either committed or aborted, changing data that indicates ownership of the particular ownership group to indicate that the second owner set is the owner of the particular ownership group.
111. The method of Claim 110, further comprising the steps of: in response to a failure in transitioning the particular ownership group from the first owner set to the second owner set, determining whether the failure occurred prior to changing the data that indicates ownership of the particular ownership group; if the failure occurred before changing the data that indicates ownership of the particular ownership group, restoring the first owner set as owner of the particular ownership group; and if the failure occurred after changing the data that indicates ownership of the particular ownership group, retaining the second owner set as owner of the particular ownership group.
112. The method of Claim 86, wherein a query is included in the database, wherein the query is associated with an execution plan that refers to a first owner set, and wherein the method further comprises the steps of: transitioning a particular ownership group from the first owner set to a second owner set; and after transitioning the particular ownership group from the first owner set to the second owner set, generating a new execution plan that refers to the second owner set.
113. The method of Claim 86, further comprising the steps of: reassigning a data item from a first ownership group to a second ownership group by performing the steps of: disabling access by the plurality of database servers to the data item; and when all transactions that are accessing said data item have either committed or aborted, changing data that indicates to which ownership group the data item belongs to indicate that the data item belongs to the second ownership group.
114. The method of Claim 113, further comprising the steps of: changing first data to indicate to which ownership group the data item belongs; and before changing the first data, changing second data to indicate to which ownership group the data item belongs.
115. The method of Claim 114, wherein the first data is in a control file and the second data is in a data dictionary.
116. The method of Claim 114, further comprising the steps of: in response to a failure of reassigning the data item from the first ownership group to the second ownership group, determining whether the failure occurred before changing the second data; if the failure occurred before changing the second data, restoring the data item to the first ownership group; and if the failure occurred after changing second data, completing the reassignment of the data item from the first ownership group to the second ownership group by changing the first data.
117. The method of Claim 113, further comprising the steps of: determining whether the second ownership group is undergoing an ownership change; and if the second ownership group is undergoing an ownership change, marking the data item as move delayed.
118. A method for transitioning ownership of a data item from a first owner set to a second owner set, the method comprising the steps of: informing a plurality of database servers that the data item is being transitioned from the first owner set to the second owner set; after informing said plurality of database servers, allowing members of said first owner set and members of said second owner set to directly access said data item; detecting when all transactions that are accessing said data item through said first owner set have either committed or aborted; and after detecting when all fransactions that are accessing said data item through said first owner set have either committed or aborted, performing the steps of: storing data that indicates that the second owner set is the exclusive owner of the data item; and allowing only members of said second owner set to directly access said data item.
119. The method of Claim 118, wherein the step of detecting when all transactions that are accessing said data item through said first owner set have either committed or aborted includes the step of: detecting when all fransactions that began execution prior to the step of informing have either committed or aborted.
120. The method of Claim 118, wherein the step of informing the plurality of database servers that the data item is being transitioned from the first owner set to the second owner set includes the step of: sending a refresh cache message to the plurality of database servers.
121. The method of Claim 118, wherein prior to the step of informing the plurality of database servers, performing the step of: storing data that identifies the first owner set, the second owner set, and that indicates that the owner of the data item is in transition.
122. The method of Claim 118, wherein the step of allowing members of said first owner set and said second owner set to directly access said data item includes the steps of: if a particular database server of the plurality of database servers begins a transaction' prior to being informed that the data item is being transitioned from the first owner set to the second owner set, processing the transaction as if the first owner set is the owner of the data item; and if the particular database server of the plurality of database servers begins the transaction after being informed that the data item is being transitioned from the first owner set to the second owner set, processing the transaction as if the second owner set is the owner of the data item.
123. The method of Claim 118, wherein a shared disk locking mechanism performs the steps of: allowing members of said first owner set and members of said second owner set to directly access said data item; and allowing only members of said second owner set to directly access said data item.
124. A computer-readable medium carrying one or more sequences of instructions for managing access to a database by a plurality of nodes having direct access to the database, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of: partitioning at least a first portion of the database into a first set of data that each node of the plurality of nodes is allowed to directly access; and partitioning at least a second portion of the database into a second set of data that only a subset of the plurality of nodes is allowed to directly access; wherein nodes that do not belong to the subset are configured to send requests to nodes that belong to the subset when the nodes that do not belong to the subset are requested to perform operations that involve data within said second set of data.
125. The computer-readable medium of Claim 124, wherein: said subset has a single node; and all access to said second set of data is through the single node.
126. The computer-readable medium of Claim 124, wherein said subset is a first subset, and further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: partitioning at least a third portion of the database into a third set of data that only a second subset of the plurality of nodes is allowed to directly access, wherein said first subset is different from said second subset.
127. The computer-readable medium of Claim 126, wherein at least one node of the plurality of nodes belongs to both said first subset and said second subset.
128. The computer-readable medium of Claim 124, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: changing the nodes that belong to said subset.
129. The computer-readable medium of Claim 124, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: automatically changing the nodes that belong to said subset in response to a failure of a node that belongs to said subset.
130. The computer-readable medium of Claim 124, wherein the database includes a plurality of data items, wherein the first set of data includes one or more data items of the plurality of data items, and further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: changing which data items of the plurality of data items are in the first set of data.
131. The computer-readable medium of Claim 124, wherein the database includes a plurality of data items, wherein the first set of data includes one or more data items of the plurality of data items, and further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: changing which data items of the plurality of data items are in the second set of data.
132. The computer-readable medium of Claim 124, wherein the first set of data is a first ownership group and the second set of data is a second ownership group.
133. The computer-readable medium of Claim 124, wherein the subset is an owner set.
134. A computer-readable medium carrying one or more sequences of instructions for managing access to a database that is directly accessible by a plurality of database servers, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of: partitioning at least a portion of said database into a plurality of ownership groups; assigning an owner set to at least one ownership group of said plurality of ownership groups; and allowing processes executing in database servers that belong to the owner set of each ownership group to directly access data within each ownership group.
135. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: assigning one owner set to each ownership group of said plurality of ownership groups.
136. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: allowing only processes that are executing on database servers that are members of the owner set of a particular ownership group to directly access data within the particular ownership group.
137. The computer-readable medium of Claim 134, wherein at least one ownership group of said plurality of ownership groups includes one or more tablespaces.
138. The computer-readable medium of Claim 137, wherein at least one tablespace of the one or more tablespaces is a collection of datafiles.
139. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: designating at least one ownership group of said plurality of ownership groups as a shared nothing ownership group; assigning at least one shared nothing ownership group an owner from among said plurality of database servers; and allowing only the owner of each shared nothing ownership group to directly access data within said shared nothing ownership group.
140. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: designating at least one ownership group of said plurality of ownership groups as a shared disk ownership group; and allowing each of said plurality of database servers to directly access data within ownership groups that are designated as shared disk ownership groups.
141. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: designating each ownership group of said plurality of ownership groups as either a shared nothing ownership group or a shared disk ownership group; and assigning each shared nothing ownership a single owner from among said plurality of database servers.
142. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: designating at least one ownership group of said plurality of ownership groups as a particular type of ownership group of a plurality of types of ownership groups.
143. The computer-readable medium of Claim 142, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: changing the type of ownership group that is designated.
144. The computer-readable medium of Claim 142, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: designating at least one ownership group of the plurality of ownership groups as a first type of ownership group of the plurality of types of ownership groups; and designating at least one ownership group of the plurality of ownership groups as a second type of ownership group of the plurality of types of ownership groups.
145. The computer-readable medium of Claim 144, wherein: the first type of ownership group is a shared nothing ownership group; and the second type of ownership group is a shared disk ownership group.
146. The computer-readable medium of Claim 145, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: designating each ownership group of said plurality of ownership groups as either as shared nothing ownership group or shared disk ownership group.
147. The computer-readable medium of Claim 142, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: for at least one type of ownership group of the plurality of types of ownership groups, allowing only one database server of the plurality of database servers in the owner set for each ownership group that is designated as the at least one type of ownership group.
148. The computer-readable medium of Claim 142, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: for at least one type of ownership group of the plurality of types of ownership groups, including each database server of the plurality of database servers in the owner set for each ownership group that is designated as the at least one type of ownership group.
149. The computer-readable medium of Claim 142, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: for at least one type of ownership group of the plurality of types of ownership groups, including at least two database servers but fewer than all database servers of the plurality of database servers in the owner set for each ownership group that is designated as the at least one type of ownership group.
150. The computer-readable medium of Claim 134, wherein: a first database server of the plurality of database servers desires data that is included in a particular ownership group assigned to a particular owner set; if the first database server is included in the particular owner set, a process executing on the first database server directly retrieves the data; and if the first database server is not included in the particular owner set, the process executing on the first database server requests and receives the data from a second database server, of the plurality of database servers, that is included in the particular owner set.
151. The computer-readable medium of Claim 150, wherein the particular ownership group is a shared disk ownership group, the particular owner set includes the plurality of database servers, and the process executing on the first database server directly retrieves the data.
152. The computer-readable medium of Claim 150, wherein the particular ownership group is a shared nothing ownership group and the second database server of the plurality of database servers is the only database server in the particular owner set.
153. The computer-readable medium of Claim 150, wherein the particular ownership group is a shared nothing ownership group and the first database server of the plurality of database servers is the only database server in the particular owner set.
154. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: assigning at least one ownership group of the plurality of ownership groups an owner from among said plurality of database servers; and reassigning the owner for the at least one ownership group from a first database server of the plurality of database servers to a second database server of the plurality of database servers.
155. The computer-readable medium of Claim 154, wherein the at least one ownership group is a shared nothing ownership group.
156. The computer-readable medium of Claim 154, wherein the step of reassigning the owner set for the at least one ownership group is performed in response to a request.
157. The computer-readable medium of Claim 154, wherein the step of reassigning the owner set for the at least one ownership group is performed automatically in response to a failure of the first database server.
158. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: fransitioning a particular ownership group from a first owner set to a second owner set by performing the steps of: instructing the plurality of database servers to cease creating new versions of data within the particular ownership group; and when all fransactions that are accessing said data through said first owner set have either committed or aborted, changing data that indicates ownership of the particular ownership group to indicate that the second owner set is the owner of the particular ownership group.
159. The computer-readable medium of Claim 158, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: in response to a failure in transitioning the particular ownership group from the first owner set to the second owner set, determining whether the failure occurred prior to changing the data that indicates ownership of the particular ownership group; if the failure occurred before changing the data that indicates ownership of the particular ownership group, restoring the first owner set as owner of the particular ownership group; and if the failure occurred after changing the data that indicates ownership of the particular ownership group, retaining the second owner set as owner of the particular ownership group.
160. The computer-readable medium of Claim 134, wherein a query is included in the database, wherein the query is associated with an execution plan that refers to a first owner set, and further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: transitioning a particular ownership group from the first owner set to a second owner set; and after transitioning the particular ownership group from the first owner set to the second owner set, generating a new execution plan that refers to the second owner set.
161. The computer-readable medium of Claim 134, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: reassigning a data item from a first ownership group to a second ownership group by performing the steps of: disabling access by the plurality of database servers to the data item; and when all fransactions that are accessing said data item have either committed or aborted, changing data that indicates to which ownership group the data item belongs to indicate that the data item belongs to the second ownership group.
162. The computer-readable medium of Claim 161, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: changing first data to indicate to which ownership group the data item belongs; and before changing the first data, changing second data to indicate to which ownership group the data item belongs.
163. The computer-readable medium of Claim 162, wherein the first data is in a control file and the second data is in a data dictionary.
164. The computer-readable medium of Claim 162, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: in response to a failure of reassigning the data item from the first ownership group to the second ownership group, determining whether the failure occurred before changing the second data; if the failure occurred before changing the second data, restoring the data item to the first ownership group; and if the failure occurred after changing second data, completing the reassignment of the data item from the first ownership group to the second ownership group by changing the first data.
165. The computer-readable medium of Claim 161, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the steps of: determining whether the second ownership group is undergoing an ownership change; and if the second ownership group is undergoing an ownership change, marking the data item as move delayed.
166. A computer-readable medium carrying one or more sequences of instructions for transitioning ownership of a data item from a first owner set to a second owner set, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of: informing a plurality of database servers that the data item is being transitioned from the first owner set to the second owner set; after informing said plurality of database servers, allowing members of said first owner set and members of said second owner set to directly access said data item; detecting when all transactions that are accessing said data item through said first owner set have either committed or aborted; and after detecting when all transactions that are accessing said data item through said first owner set have either committed or aborted, performing the steps of: storing data that indicates that the second owner set is the exclusive owner of the data item; and allowing only members of said second owner set to directly access said data item.
167. The computer-readable medium of Claim 166, wherein the instructions for detecting when all transactions that are accessing said data item through said first owner set have either committed or aborted further comprise instructions which, when executed by one or more processors, cause the one or more processors to carry out the step of: detecting when all transactions that began execution prior to the step of informing have either committed or aborted.
168. The computer-readable medium of Claim 166, wherein the instructions for informing the plurality of database servers that the data item is being transitioned from the first owner set to the second owner set further comprise instructions which, when executed by one or more processors, cause the one or more processors to carry out the step of: sending a refresh cache message to the plurality of database servers.
169. The computer-readable medium of Claim 166, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to carry out the step of: prior to informing the plurality of database servers, storing data that identifies the first owner set, the second owner set, and that indicates that the owner of the data item is in transition.
170. The computer-readable medium of Claim 166, wherein the instructions for allowing members of said first owner set and said second owner set to directly access said data item further comprise instructions which, when executed by one or more processors, cause the one or more processors to carry out the steps of: if a particular database server of the plurality of database servers begins a transaction prior to being informed that the data item is being transitioned from the first owner set to the second owner set, processing the transaction as if the first owner set is the owner of the data item; and if the particular database server of the plurality of database servers begins the transaction after being informed that the data item is being transitioned from the first owner set to the second owner set, processing the transaction as if the second owner set is the owner of the data item.
171. The computer-readable medium of Claim 166, wherein a shared disk locking mechanism performs the steps of: allowing members of said first owner set and members of said second owner set to directly access said data item; and allowing only members of said second owner set to directly access said data item.
PCT/US2001/020842 1998-02-12 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database WO2003003252A1 (en)

Priority Applications (10)

Application Number Priority Date Filing Date Title
US09/896,373 US6711571B2 (en) 1998-12-28 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database
EP04028402A EP1521184A3 (en) 2001-06-28 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database
PCT/US2001/020842 WO2003003252A1 (en) 1998-02-12 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database
CA002435388A CA2435388C (en) 2001-06-28 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database
AU2001271680A AU2001271680B2 (en) 2001-06-28 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database
EP12179800.3A EP2562662B1 (en) 2001-06-28 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database
JP2003509358A JP4746838B2 (en) 2001-06-28 2001-06-28 Partitioning database ownership between different database servers to control access to the database
EP01950713A EP1399847B1 (en) 2001-06-28 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database
CNB018228445A CN100517303C (en) 2001-06-28 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database
HK04102447.1A HK1059971A1 (en) 2001-06-28 2004-04-06 Partitioning ownership of a database among different database servers to control access to the database

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/022,577 US6089532A (en) 1998-02-12 1998-02-12 Valve for use with agricultural sprayers
PCT/US2001/020842 WO2003003252A1 (en) 1998-02-12 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database

Publications (1)

Publication Number Publication Date
WO2003003252A1 true WO2003003252A1 (en) 2003-01-09

Family

ID=26680518

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/020842 WO2003003252A1 (en) 1998-02-12 2001-06-28 Partitioning ownership of a database among different database servers to control access to the database

Country Status (1)

Country Link
WO (1) WO2003003252A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7409588B2 (en) 2004-05-28 2008-08-05 Hitachi, Ltd. Method and system for data processing with high availability
US7447711B2 (en) 2003-04-21 2008-11-04 Hitachi, Ltd. Method and system for high-availability database
US8234517B2 (en) 2003-08-01 2012-07-31 Oracle International Corporation Parallel recovery by non-failed nodes
US8510334B2 (en) 2009-11-05 2013-08-13 Oracle International Corporation Lock manager on disk
WO2023246251A1 (en) * 2022-06-21 2023-12-28 International Business Machines Corporation Data management

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5625811A (en) * 1994-10-31 1997-04-29 International Business Machines Corporation Method and system for database load balancing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5625811A (en) * 1994-10-31 1997-04-29 International Business Machines Corporation Method and system for database load balancing
US5675791A (en) 1994-10-31 1997-10-07 International Business Machines Corporation Method and system for database load balancing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1399847A4

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7447711B2 (en) 2003-04-21 2008-11-04 Hitachi, Ltd. Method and system for high-availability database
US8234517B2 (en) 2003-08-01 2012-07-31 Oracle International Corporation Parallel recovery by non-failed nodes
US7409588B2 (en) 2004-05-28 2008-08-05 Hitachi, Ltd. Method and system for data processing with high availability
US8201022B2 (en) 2004-05-28 2012-06-12 Hitachi, Ltd. Method and system for data processing with high availability
US8510334B2 (en) 2009-11-05 2013-08-13 Oracle International Corporation Lock manager on disk
WO2023246251A1 (en) * 2022-06-21 2023-12-28 International Business Machines Corporation Data management

Similar Documents

Publication Publication Date Title
US6711571B2 (en) Partitioning ownership of a database among different database servers to control access to the database
US6341340B1 (en) Transitioning ownership of data items between ownership groups
EP2562662B1 (en) Partitioning ownership of a database among different database servers to control access to the database
AU2001271680A1 (en) Partitioning ownership of a database among different database servers to control access to the database
US7120651B2 (en) Maintaining a shared cache that has partitions allocated among multiple nodes and a data-to-partition mapping
EP1652082B1 (en) Ownership reassignment in a shared-nothing database system
CA2532048C (en) Parallel recovery by non-failed nodes
US5920872A (en) Resource management using resource domains
US7814065B2 (en) Affinity-based recovery/failover in a cluster environment
US20040148289A1 (en) One-phase commit in a shared-nothing database system
Mohan et al. Efficient locking and caching of data in the multisystem shared disks transaction environment
JP4664931B2 (en) Partitioning database ownership between different database servers to control access to the database
WO2003003252A1 (en) Partitioning ownership of a database among different database servers to control access to the database
CA2534066C (en) One-phase commit in a shared-nothing database system
JPH0683702A (en) Control method for data transfer and data removal and computer system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2435388

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2001271680

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 1007/KOLNP/2003

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 01006/KOLNP/2003

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 018228445

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2001950713

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2003509358

Country of ref document: JP

WWP Wipo information: published in national office

Ref document number: 2001950713

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWG Wipo information: grant in national office

Ref document number: 2001271680

Country of ref document: AU