TELETRAFFIC THEORY APPLIED TO THE ANALYSIS OF HASH-STRUCTURED FILES

被引:0
|
作者
COOPER, RB
SOLOMON, MK
机构
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Certain hash-structured files consist of sequence,s (chains) of computer memory locations (slots) into which records are inserted, and from which they are later retrieved or deleted. If we assume that the records arrive to the file according to a Poisson process for insertion into a chain (randomly selected by the hash function), and reside in memory for a random length of time before being deleted, then we can associate this with a teletraffic model in which the records are ''calls'' and the slots in the chain are ''trunks.'' In particular, we consider two models: (1) hardpack, where a deleted record is immediately physically removed from the file and is replaced by the last record on its chain, and (2) softpack, where a deleted record is marked, and a subsequent arriving record is written over the first marked record on its chain. The slots can be accessed individually or in groups (called ''buckets''). In each case we are interested in the length of a successful search (the number of buckets inspected until an arbitrary record is located) and the length of an unsuccessful search (the number of buckets inspected until it is determined that an arbitrary record is not in the file). If we identify these file structures as analogous to trunk groups with ordered hunt, then these models can be analyzed using results obtained many years ago (in particular, Kosten (1937) and Burke (1971)) for teletraffic applications, results which are not well known or easily accessible to the database-performance-analysis community.
引用
收藏
页码:336 / 341
页数:6
相关论文
共 50 条
  • [21] Local bifurcation and instability theory applied to formability analysis
    Marta C. Oliveira
    José L. Alves
    Luís F. Menezes
    Koichi Ito
    Naomichi Mori
    International Journal of Material Forming, 2011, 4 : 347 - 356
  • [22] ACTIVITY ANALYSIS APPLIED TO CLASSICAL THEORY OF DEMAND AND SUPPLY
    WICHERS, CR
    ECONOMETRICA, 1971, 39 (04) : 371 - &
  • [24] ON THE THEORY OF IMPORTANCE SAMPLING APPLIED TO THE ANALYSIS OF DETECTION SYSTEMS
    ORSAK, G
    AAZHANG, B
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (04) : 332 - 339
  • [25] Local Bifurcation and Instability Theory Applied to Formability Analysis
    Buco, B. D.
    Oliveira, M. C.
    Alves, J. L.
    Menezes, L. F.
    Ito, K.
    Mori, N.
    NUMIFORM 2010, VOLS 1 AND 2: DEDICATED TO PROFESSOR O. C. ZIENKIEWICZ (1921-2009), 2010, 1252 : 409 - +
  • [26] INFORMATION-THEORY AS APPLIED TO CHEMICAL-ANALYSIS
    ECKSCHLAGER, K
    ANALYTICAL CHEMISTRY, 1977, 49 (08) : 1265 - 1267
  • [27] ASPECTS OF SYSTEM ANALYSIS IN THE APPLIED INFORMATION THEORY FOR TELECOMMUNICATIONS
    Ilchenko, M. Ye.
    Uryvvsky, L. A.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2010, 46 (05) : 737 - 743
  • [28] SOCIAL-THEORY AND CRITICAL ANALYSIS IN APPLIED ANTHROPOLOGY
    COHEN, R
    AMERICAN BEHAVIORAL SCIENTIST, 1985, 29 (02) : 249 - 264
  • [29] Organizational theory applied to school reform - A critical analysis
    Bonner, M
    Koch, T
    Langmeyer, D
    SCHOOL PSYCHOLOGY INTERNATIONAL, 2004, 25 (04) : 455 - 471
  • [30] Systematic reviews of health economic evaluations: A structured analysis of characteristics and methods applied
    Luhnen, Miriam
    Prediger, Barbara
    Neugebauer, Edmund A. M.
    Mathes, Tim
    RESEARCH SYNTHESIS METHODS, 2019, 10 (02) : 195 - 206