HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2007 | Volume: 7 | Issue: 2 | Page No.: 165-174
DOI: 10.3923/jas.2007.165.174
A Threshold Based Dynamic Data Allocation Algorithm-A Markov Chain Model Approach
Mitat Uysal and Tolga Ulus

Abstract: In this study, a new dynamic data allocation algorithm for non-replicated Distributed Database Systems (DDS), namely the threshold algorithm, is formulated and proposed. The threshold algorithm reallocates data with respect to changing data access patterns. The proposed algorithm is distributed in the sense that each node autonomously decides whether to transfer the ownership of a fragment in DDS to another node or not. The transfer decision depends on the past accesses of the fragment. Each fragment continuously migrates from the node where it is not accessed locally more than a certain number of past accesses, namely a threshold value. The threshold algorithm is modeled for a fragment of the database as a finite Markov chain with constant node access probabilities. In the model, a special case, where all nodes have equal access probabilities except one with a different access probability, is analyzed. It has been shown that for positive threshold values the fragment will tend to remain at the node with the higher access probability. It is also shown that the greater the threshold values are, the greater the tendency of the fragment to remain at the node with higher access probability will be. The threshold algorithm is especially suitable for a DDS where data access pattern changes dynamically.

Fulltext PDF Fulltext HTML

How to cite this article
Mitat Uysal and Tolga Ulus, 2007. A Threshold Based Dynamic Data Allocation Algorithm-A Markov Chain Model Approach. Journal of Applied Sciences, 7: 165-174.

Keywords: Markov chain, dynamic data allocation and Distributed databases

INTRODUCTION

Developments in database and networking technologies in the past few decades led to advances in distributed database systems. A DDS is a collection of sites connected by a communication network, in which each site is a database system in its own right, but the sites have agreed to work together, so that a user at any site can access data anywhere in the network exactly as if the data were all stored at the user=s own site (Date, 1990; Özsu and Valduriez, 1991).

The primary concern of a DDS is to design the fragmentation and allocation of the underlying database. Fragmentation unit can be a file where allocation issue becomes the file allocation problem. File allocation problem is studied extensively in the literature, started by Chu (1969) and continued for non-replicated and replicated models (Apers, 1988; Casey, 1972; Grapa and Belford, 1977; Mahmoud and Riordan 1976; Morgan and Levin, 1977; Ramamoorthy and Wah, 1983; Whitney, 1970). Some studies considered dynamic file allocation (Ames, 1977; Smith, 1981; Wah, 1979; Wang and Chen, 2005; Ahn and Kim, 2005).

Data allocation problem was introduced when Eswaran (1974) first proposed the data fragmentation. Studies on vertical fragmentation (Babad, 1977; Ceri et al., 1989; Hoffer, 1976; Navathe et al., 1984), horizontal fragmentation (Ceri et al., 1983) and mixed fragmentation (Chang and Cheng, 1980; Cheng et al., 2002; March, 1983; Sacca and Wieder hold, 1985; Sacco, 1986; Zhang and Orlowska, 1994) were conducted. The allocation of the fragments is also studied extensively (Ahmad et al., 2002; Apers, 1988; Bakker, 2000; Chang, 2002; Kwok et al., 1996; So et al., 1999; Zhou et al., 1999; Gorawski et al., 2005).

In these studies, data allocation has been proposed prior to the design of a database depending on some static data access patterns and/or static query patterns. In a static environment where the access probabilities of nodes to the fragments never change, a static allocation of fragments provides the best solution. However, in a dynamic environment where these probabilities change over time, the static allocation solution would degrade the database performance. Initial studies on dynamic data allocation give a framework for data redistribution (Wilson and Navathe, 1986) and demonstrate how to perform the redistribution process in minimum possible time (Rivera-Vega et al., 1990). In (Brunstrom et al., 1995), a dynamic data allocation algorithm for non-replicated database systems is proposed, but no modeling is done to analyze the algorithm. Instead, the paper focused on load balancing issue.

This study proposes a new dynamic data allocation algorithm for non-replicated distributed databases and analyzes the algorithm using a finite-state Markov chain. Present study is based on the research conducted by Ulus, (1999). In this study, horizontal, vertical or mixed fragmentation can be used. Allocation unit can even be as small as a record or an attribute.

THE THRESHOLD ALGORITHM

In some cases, due to extra storage space need, it could be very costly to use the optimal algorithm (Ulus, 1999) in its original form. For a less costly algorithm, the solution is to decrease the need for extra storage space. The proposed threshold algorithm in this paper serves this purpose.

Let the number of nodes be n and let Xs denote the access probability of a node to a particular fragment. Suppose the fragment is stored in this particular node (i.e., it is the owner node). For the sake of simplicity, let Xd denote the access probability of all the other nodes to this particular fragment. The owner does local access, whereas the remaining nodes do remote access to the fragment.

The probability that the owner node does not access the fragment is (n-1) Xd. The probability that the owner node does not perform two successive accesses is ((n-1) Xd)2. Similarly, the probability that the owner node does not perform m successive accesses is ((n-1) Xd)m. Therefore, the probability that the owner node performs at least one access of m successive accesses is 1-((n-1) Xd)m.

Table 1 shows the probabilities that the owner node performs at least one access out of m successive accesses, where xs ranges from 0.1 through 0.9 and where m is 5, 10, 25, 50 and 100. The values in the table are truncated to five decimal digits.

According to the table, the probability that the owner node with the access probability of 0.1 performs at least one access of ten successive accesses is 0.65132. It is trivial from the table that as the access probability of owner node increases, so as the probability that at least one local access occurs in m accesses.

Applying the same idea, a new threshold based algorithm (or threshold algorithm) can be proposed. In threshold algorithm, only one counter per fragment is stored. Figure 1 shows fragment I together with its counter. Comparing it to the optimal algorithm, this radically decreases the extra amount of storage space to just one value compared to an array of values in the optimal algorithm.

In the threshold algorithm, the initial value of the counter is zero. The counter value is increased by one for each remote access to the fragment. It is reset to zero for a local access. In other words, the counter always shows the number of successive remote accesses.

Table 1: The probability that at least one local access occurs in m accesses

Fig. 1: Any fragment i in threshold algorithm

Fig. 2: Threshold algorithm

Whenever the counter exceeds a predetermined threshold value, the ownership of the fragment is transferred to another node.

At this point, the critical question is which node will be the fragment's new owner. The algorithm gives very little information about the past accesses to the fragment. In fact, throughout the entire access history only the last node that accessed the fragment is known. So, there are two strategies to select the new owner. Either it is chosen randomly, or the last accessing node is chosen. In the former, the randomly chosen node could be one that has never accessed the fragment before. So picking the latter strategy is heuristically more reasonable.

Initially, all fragments are distributed to the nodes according to any method. A threshold value t is chosen. Afterwards, any node j, runs the threshold algorithm given in Fig. 2 for every fragment i, that it stores.

Threshold algorithm overcomes the volley of a fragment between two nodes provided that a threshold value greater than one is chosen. The algorithm guarantees the stay of the fragment for at least (t+1) accesses in the new node after a migration. In other words, it delays the migration of the fragment from any node for at least (t+1) accesses.

An important point in the algorithm is the choice of threshold value. This value will directly affect the mobility of the fragments. It is trivial that as the threshold value increases, the fragment will tend to stay more at a node; and as the threshold value decreases, the fragment will tend to visit more nodes.

Another point in the algorithm is the distribution of the access probabilities. If the access probabilities of all nodes for a particular fragment are equal, the fragment will visit all the nodes. The same applies for two nodes when there are two highest equal access probabilities.

MARKOV CHAIN MODEL OF THRESHOLD ALGORITHM

General Case: Let there be n nodes (n 0 Z+), denoted by 0 through (n -1). Let the threshold value be t (t 0 Z c {0}). For simplicity, suppose the access probabilities of the nodes are discrete random variables. Assume the nodes have access probabilities X0 through Xn-1 for a particular fragment, subscripts showing the node index. The following is satisfied for the access probabilities where Xi 0 [0, 1] for all i = 0,…, n -1.

Figure 3 shows the finite state diagram of the system described.

In the diagram, two numbers determine the name of each state; first number denotes the node name where the fragment is currently stored, and the second number denotes the successive remote access counter. For example, when the system is in state 00, this means that the fragment is currently stored in node 0, and the current successive remote access counter is 0 (which implies that either last access performed on the fragment is local or the fragment has just migrated to node 0).

There are (t+1) states per node. In all these states, the fragment is stored in that particular node. These states correspond to the different values of successive remote access counter for the node.

The state transition probabilities are given next to each transition indicated by the arrows. For example, for the state 00 there are several incoming and outgoing transitions. One transition is both incoming and outgoing with a probability of x0. This transition implies that with a probability of x0, node 0 accesses the fragment, and the counter, that is already zero, is reset to zero and the fragment stays at node 0. As a result, the system does not change a state. Besides this transition, there is only one outgoing transition to state 01 with a probability of (1-x0).

Fig. 3: Finite-state diagram of the system in general case

This transition implies that with a probability of (1-x0) a remote node accesses the fragment, and the counter is increased by one, to one. As a result, the fragment still stays at node 0, but a state change from 00 to 01 takes place. Besides these two transitions, there are two groups of incoming transitions all with a probability of x0. One group of transitions comes from the states 01 through 0t. A local access causes these transitions. As a result of these transitions, the counter is reset to zero and the fragment still stays in node 0, but it leads to a state change from the previous state (01 through 0t) to 00. The other group of transitions comes from the states 0t through (n-1)t. Before these transitions, the fragment is in a node other than node 0 and the counter is t. The transition occurs when node 0 accesses the fragment. As a result, the counter value exceeds the predetermined threshold value and the fragment is transferred to the ownership of node 0. Hence a state change from the previous state (0t through (n-1)t) to 00 occurs.

Figure 3 shows a Markov chain due to its memory less property. It is memory less because, for any state the system can enter, the next state entered depends solely on the current state of the system. Furthermore, this Markov chain has discrete-time, finite-state, irreducible, aperiodic and recurrent properties. It is discrete-time, because the state transitions occur in discrete times (when an access to the fragment is performed) and state transition duration is negligible. It is finite-state, because the number of states is finite. It is irreducible, because every state can be reached from every other state. This Markov chain is aperiodic, because for every state, the entrance to the same state is not periodic. This Markov chain is recurrent, because it is finite-state and irreducible (Kleinrock, 1975).

Let π be a 1 by n probability vector whose elements πk, show the steady state probability that the system is in state k.

Let P be the n by n state transition probability matrix whose elements pij, show the state transition probability from state i to state j.

Equation 1 defines the steady state of a discrete-time, finite-state, irreducible, aperiodic and recurrent Markov chain. Given the state transition probability matrix P, the system determines the steady-state probability vector π (Kleinrock, 1975).

(1)

Readjusting Eq. 1 and 2 is obtained.

(2)

are n equations and n unknowns. But since one of the equations is linearly dependent on the others, one more equation is needed to solve the system (Kleinrock, 1975). Last equation is, the one that shows the summation of the steady state probabilities, given by Eq. 3.

(3)

Replacing the first equation in Eq. 2 by Eq. 3 and 4 is obtained.

(4)

In Eq. 4, Q, π' and r are as follows.


These equations can be adapted to system in Fig. 3. For the threshold algorithm model in general case of Fig. 3, let πg be the 1 by n probability vector and Pg be the n by n state transition probability matrix. They are as follows.


Notice that πg elements have two indices. First index is the node name and the second index is the successive remote access counter. And finally, Qg is as follows.

After solving for πg vector in Eq. 4, the probabilities, that the fragment is in a particular node, are calculated as follows for all i = 0,.., (n-1) where Oi denotes the probability that the fragment is in node i (here notice that the node names are used as subscripts in calculation).

(5)

Since the number of unknowns, namely the equilibrium probabilities in the general case is very large, it is very hard to investigate the general case situation. For the sake of simplicity, a special case, that will decrease the number of unknowns to just two, will be examined.

Special case: Assume an n node DDS. Assume further that one particular node denoted by s has an access probability of xs to a particular fragment of DDS. Suppose all the other nodes denoted by d1 through dn-1 have the equal access probabilities of xd to the same fragment. The following equation is satisfied for the access probabilities where xε[0,1] and xdε[0,1]

The finite-state diagram of this system is given in Fig. 6.

In the Fig. 4, states s0 through st corresponds to node s that has an access probability of xs to the fragment. For the rest of the nodes d1 through dn-1, there are the states di0 through dit, (n-1) of each.

Fig. 4: Finite-state diagram of the system in special case

Lemma 1: For the system of Fig. 4, the steady state probabilities of all nodes, except node s, corresponding to a particular threshold value t, is equal. In other words,

where h shows any node index varying from 1 to (n-1) and f shows any threshold value varying from 0 to t.

Proof: (Ulus.,1999).

The finite-state diagram of the system after Lemma 1 is given in Fig. 5.

In Fig. 5, states s0 through st corresponds to node s that has an access probability of xs to the fragment. For the rest of the nodes d1 through dn-1, there are the states d0 through dt as a corollary to Lemma 1.

For the threshold algorithm model of Fig. 7, let πm be a 1 by n(t+1) steady state probability vector and let Pm be the n(t+1) by n(t+1) state transition probability matrix. They are as follows.


It can be easily seen that in πm vector the elements πd0 through πdt repeat themselves (n-1) times. The dimension of the system can be decreased as shown in Lemma 2.

Lemma 2: Let πr be a 1 by 2(t+1) steady state probability vector and let Pr be the 2(t+1) by 2(t+1) state transition probability matrix as shown below.

The system of equations given by πmm Pm and πrrPr are the same

Fig. 5: Simplified finite-state diagram of the system in special case

Proof: (Ulus, 1999)

Theorem 1: Assume that the fragments of a DDS are allocated to n nodes, denoted by 0 through (n-1). Assume all nodes have equal access probability of xd to a particular fragment except node 0, which has a different access probability of xs where xs ε [0, 1] and xd ε [0, 1]. When the threshold algorithm with a threshold t is used, the fragment will be in node 0 with the probability Os given by

(6)

where xs≠0, xd≠0 and xs≠1.

Proof: (Ulus, 1999)

Theorem 2: Assume that the fragments of a DDS are allocated to n nodes, denoted by 0 through (n-1). Assume all nodes have equal access probability of xd to a particular fragment except node 0, which has a different access probability of xs where xs ε [0, 1] and xd ε [0, 1]. When the threshold algorithm with a threshold t is used, the fragment will be in the nodes other than node 0 with the probability Od given by

(7)

where xs≠0, xd≠0 and xs≠1.

Proof: (Ulus, 1999)

Equation 6 gives the probability that the fragment is in node 0, whereas Eq. 7 gives the probability that the fragment is in the other nodes. Since the fragment is either in node 0 or in a node other than node 0, the sum of Os and Od is 1.

RESULTS

Let us investigate Eq. 6 and 7. Since, Os+Od=1, investigating only Os is sufficient.

In Eq. 6, the parameters are xs, xd and t. In other words, the probability that the fragment is in node 0 is determined by the access probability of node 0, the access probability of the other nodes and the threshold value. Furthermore, the number of nodes, n, is another parameter, since it specifies the relationship between xs and xd with the following formula.

Now, let us find how a change in the access probabilities and the threshold value effect the probability that the fragment is in any node.

Change in Access Probability: The relation between xs and xd is given by the following equation.

Since xs and xd are access probabilities, the following inequalities are satisfied.

When n is held constant, xs and xd are inversely proportional. So, it is sufficient to investigate only the change in xs of Os.

Lemma 3: When Xs = 1, Os = 1.

Proof: When xs = 1, all πsj values of Os given by Eq. 5 are 0 except πs0 value. πs0 value is 1 which makes Os value 1 as well.

Lemma 4: When xs = 0, Os = 0.

Proof: When xs = 0, all πsj values of Os given by Eq. 5 are 0 which makes Os value 0 as well.

Lemma 5: Os is strictly increasing with respect to xs in the interval of (0,1).

Proof: Let us investigate the change in Os with respect to xs. The partial derivative of Os with respect to xs gives the change in Os with respect to xs. The partial derivative is as shown below where O1 and O2 are the nominator and the denominator of Os, respectively.

It is obvious that the partial derivative is positive for all xsε[0,1]. Therefore, Os is strictly increasing with respect to xs in (0,1).

Figure 6 shows the behaviour of Os as a function of xs in a five-node system. Figure 6 is drawn for three different threshold values, 0, 3 and 10.

For the threshold of 0, Os is a linear function of xs with a slope of 1. This means that when the threshold is 0, the access probability of a node directly gives the steady-state probability that the fragment is in the corresponding node.

For threshold values of 3 and 10, notice the change in steepness of the curve.

Change in threshold value: Threshold t can take only non-negative integer values. Let us investigate under which circumstances Os is increasing or decreasing with respect to t.

Lemma 6: The following holds for the change in Os with respect to t, provided that xs≠0, xd≠0 and xs≠1:

When xs = xd, Os is constant with respect to t.
When xs>xd, Os is increasing with respect to t.
When xs<xd, Os is decreasing with respect to t.

Proof: To investigate the behaviour of Os with respect to the threshold, the partial derivative of Os with respect to t should be examined. But since Os is defined only for non-negative integer values of t, it is not continuous for t. Therefore it is not possible to find the partial derivative of Os with respect to t. Instead, to investigate the sign of the difference Os(r + 1) - Os(r), for any positive integer r, would be sufficient. If the sign of this expression is positive, the probability will be increasing. Otherwise it will be decreasing.

For simplicity, let us substitute a and b given by the equations a = 1-xs and b = 1-xd in Eq. 6. The difference will be as follows.


Fig. 6: Os as a function of xs in a five-node system for thresholds 0, 3 and 10.

In this expression, all the terms except (b-a+ar+2 (1-b)-br+2 (1-a) in the nominator are positive provided that xs≠0, xd≠0 and xs≠1. Only the sign of this term determines the sign of the whole expression. Let D denote this term and let us substitute a and b expressions back in. The result is as follows.

Let us multiply and divide D by xsxd and readjust it. The expression takes the following form.

Applying Eq. C.2, D is found as follows.

The sign of D depends on the relation between xs and xd. According to this:

If xs = xd, D is zero. Therefore, when xs = xd, Os is constant with respect to t.
If xs>xd, D is positive. Therefore, when xs> xd, Os is increasing with respect to t.
If xs<xd, D is negative. Therefore when xs<xd, Os is decreasing with respect to t.

Lemma 7: provided that xd≠0.

Proof: Readjusting Eq.6, the following formula is obtained:

Fig. 7: Os as a function of t in a five-node system for xs values of 0.28, 0.24, 0.16, 0.12 and 0.2

Using this formula, provided that xd≠ 0:

Figure 7 shows the behavour of Os as a function of t in a five-node system. Figure 7 is drawn for five different access probabilities xs of 0.28, 0.24, 0.2, 0.16 and 0.12.

For 0.28 and 0.24, Os converges to one. This is because xs>xd. Noticing the change in steepness of two curves, it converges faster for greater access probabilities.

For 0.2, Os is constant at 0.2. This is because xs = xd. In this case, the access probability of a node directly gives the steady-state probability that the fragment is in the corresponding node.

For 0.16 and 0.12, Os converges to zero. This is because xs<xd. Noticing the change in steepness of two curves, it converges faster for smaller access probabilities.

CONCLUSIONS

In this study, a new dynamic data allocation algorithm, namely threshold algorithm, for non-replicated DSSs is introduced. In the threshold algorithm, the fragments, previously distributed over a DDS, are continuously reallocated according to the changing data access patterns. The node in which a fragment is stored is considered the owner of that particular fragment. When its owner in the past few successive accesses, specified by the threshold value, never accesses a fragment, the ownership of the fragment is transferred to another node.

The threshold algorithm is modeled using a finite-state Markov chain. To simplify the model, a special case where the access probabilities of the nodes are all equal except a single node is examined. The equilibrium probabilities for a fragment in any node are obtained in terms of access probabilities and the threshold value. The behavior of a fragment, in reaction to a change in access probabilities or to a change in threshold value, is investigated. It is shown that the fragment tends to stay at the node with higher access probability. As the access probability of the node increases, the tendency to remain at this node also increases. It is also shown that as the threshold value increases, the fragment will tend to stay more at the node with higher access probability.

Threshold algorithm can be used for dynamic data allocation to enhance the performance of non-replicated DDSs. For further research, the algorithm can be extended to use on the replicated DSSs as in (Sistla et al., 1998; Wolfson et al., 1995, 1997).

REFERENCES

  • Ahmad, I., K. Karlapalem, Y.K. Kwok and S.K. Kwok, 2002. Evolutionary algorithms for allocating data in distributed database systems. Distributed Parallel Databases, 11: 5-32.


  • Ahn, K. and D.H. Kim, 2005. Implementation of a database management system for the comprehensive use of severe accident risk information. Progress Nuclear Energy, 46: 5-46.


  • Ames, J.E., 1977. Dynamic file allocation in a distributed database system. Ph.D. Thesis, Duke University, Durham.


  • Apers, P.M.G., 1988. Data allocation in distributed database systems. ACM Trans. Database Syst., 13: 263-304.


  • Babad, M.J., 1977. A record and file partitioning model. Commun. ACM., 20: 22-31.


  • Bakker, J.A., 2000. Semantic partitioning as a basis for parallel i/o in database management systems. Parallel Comput., 26: 1491-1513.


  • Brunstrom, A., S.T. Leutenegger and R. Simha, 1995. Experimental evaluation of dynamic data allocation strategies in a distributed database with changing workloads. Proceedings of the 4th International IEEE Conference Information Knowledge Managment, November 29-December 2, 1995, Baltimore, MD., pp: 395-402.


  • Casey, R.G., 1971. Allocation of copies of a file in an information network. Proceedings of the Fall Joint Computer Conference, November 16-18, 1971, ACM New York, pp: 617-625.


  • Ceri, S., S.B. Navathe and G. Wiederhold, 1983. Distribution design of logical database schemas. IEEE Trans. Software Eng., 9: 487-503.


  • Ceri, S., B. Pernici and G. Wiederhold, 1989. Optimization problems and solution methods in the design of data distribution. Inform. Syst., 14: 261-272.


  • Chang, S.K. and W.H. Cheng, 1980. A methodology for structured database decomposition. IEEE Trans. Software Eng., 6: 205-218.


  • Chang, C.T., 2002. Optimization approach for data allocation in multidisk database. Eur. J. Operat. Res., 143: 210-217.
    CrossRef    


  • Cheng, C.H., W.K. Lee and K.F. Wong, 2002. A genetic algorithm-based clustering approach for database partitioning. IEEE Trans. Syst. Man Cybernetics Part C Appl. Rev., 32: 215-230.
    Direct Link    


  • Chu, W.W., 1969. Optimal file allocation in a multiple computer system. IEEE Trans. Comput., 18: 885-889.


  • Date, C.J., 1990. An Introduction to Database Systems. 5th Edn., Addison-Wesley, UK


  • Eswaran, K.P., 1974. Placement of records in a file and file allocation in a computer network. Proceedings of the IFIP Congress on Information Processing, August 5-10, 1974, Stockholm, Sweden, pp: 304-307.


  • Gorawski, M. and R. Chechelski, 2005. Parallel telemetric data warehouse balancing algorithm. Proc. Int. Conf. Intelligent Syst. Design Applied, 8: 387-392.


  • Grapa, E. and G.G. Belford, 1977. Some theorems to aid in solving the file allocation problem. Commun ACM., 20: 878-882.


  • Hoffer, J.A., 1976. An Integer programming formulation of computer database design problems. Info. Sci., 11: 29-48.


  • Kleinrock, L., 1975. Queueing Systems. John Wiley and Sons, New York


  • Kwok, Y.K., K. Karlapalem and I.M.P. Ng Ahmad, 1996. Design and evaluation of data allocation algorithms for distributed multimedia database systems. IEEE J. Selected Areas Commun., 14: 1332-1348.
    Direct Link    


  • Mahmoud, S. and J.S. Riordan, 1976. Optimal allocation of resources in distributed information networks. ACM Trans. Database Syst., 1: 66-78.


  • March, S.T., 1983. Techniques for structuring database records. ACM Comput. Surveys, 15: 45-79.


  • Morgan, H.L. and K.D. Levin, 1977. Optimal program and data locations in computer networks. Commun. ACM, 206: 315-321.


  • Navathe, S.B., S. Ceri, G. Wiederhold and J. Dou, 1984. Vertical partitioning algorithms for database design. ACM Trans. Database Syst., 9: 680-710.
    CrossRef    Direct Link    


  • Ozsu, T. and P. Valduriez, 1991. Principles of Distributed Database Systems. Prentice-Hall, Englewood Cliffs, NJ., USA., ISBN-13: 9780136916437, Pages: 562


  • Ramamoorthy, C.V. and B.W. Wah, 1983. The isomorphism of simple file allocation. IEEE Trans. Comput., 23: 221-231.


  • Rivera-Vega, P.I., R. Varadarajan and S.B. Navathe, 1990. Scheduling data redistribution in distributed databases. Proceedings of the 6th International Conference Data Engineering, February 5-9, 1990, IEEE Computer Society Press, pp: 166-173.


  • Sacca, D. and G. Wiederhold, 1985. Database partitioning in a cluster of processors. ACM Trans. Database Syst., 10: 28-56.


  • Sacco, G., 1986. Fragmentation: A technique for efficient query processing. ACM Trans. Database Syst., 11: 113-133.


  • Sistla, A.P., O. Wolfson and Y. Huang, 1998. Minimization of communication cost through caching in mobile environments. IEEE Trans. Parallel Distributed Syst., 9: 378-390.
    Direct Link    


  • Smith, A.J., 1981. Long-term file migration: Development and evaluation of algorithms. Commun. ACM, 24: 512-532.


  • So, S.K., I. Ahmad and K. Karlapalem, 1999. Response time driven multimedia data objects allocation for browsing documents in distributed environments. IEEE Trans. Knowledge Data Eng., 11: 386-405.
    Direct Link    


  • Ulus, T., 1999. Data Allocation algorithms in distributed database systems (In Turkish). Ph.D. Thesis, Istanbul University, Istanbul.


  • Wah, B.W., 1979. Data management in distributed systems and distributed data bases. Ph.D. Thesis, University of California, Berkeley.


  • Whitney, V.K.M., 1970. A study of optimal file assignment and communication network configuration in remote access computer message processing and communication systems. Ph.D. Thesis, University of Michigan, Ann Arbor.


  • Wilson, B. and S.B. Navathe, 1986. An analytical framework for the redesign of distributed databases. Proceeding of the 6th Advanced Database Symposium, August 1986, Tokyo, Japan, pp: 77-83.


  • Wolfson, O. and S. Jajodia, 1995. An algorithm for dynamic data allocation in distributed systems. Info. Proc. Lett., 53: 113-119.
    Direct Link    


  • Wolfson, O. and S. Jajodia, 1997. An adaptive data replication algorithm. ACM Trans. Database Syst., 22: 255-314.
    Direct Link    


  • Zhang, Y. and M.E. Orlowska, 1994. On fragmentation approaches for distributed database design. Inform. Sci., 1: 117-132.


  • Zhou, S., H.M. Williams and K.F. Wong, 1999. Data placement in shared-nothing database systems. High Performance Cluster Comput., 2: 440-453.

  • © Science Alert. All Rights Reserved