Method, system and data structures for implementing nested databases

A technology of data structure and data processing system, which is applied in the direction of memory system, electrical digital data processing, special data processing application, etc., and can solve problems such as ACID characteristic conflicts and difficulties

Inactive Publication Date: 2004-10-20
XYMPHONIC SYST
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is very difficult to let each person or each transaction do whatever he, she, or it wants to do at any time, while completely maintaining the individual characteristics of the transaction
[0009] Simply letting the data in use be accessed by another user will lead to an inherent conflict with the properties of ACID

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and data structures for implementing nested databases
  • Method, system and data structures for implementing nested databases
  • Method, system and data structures for implementing nested databases

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Referring now to the accompanying drawings, more specifically, such as the figure 1 , which illustrates a database management system 100 (DBMS), and in these drawings, the same reference numerals represent the same or corresponding parts. The operation and management of transactions is handled by a transaction manager 102 and a lock manager 104, both of which are software programs executed by the data processor or CPU 106 of the system. A transaction list 108 is maintained in the transaction manager, often implemented as a tree structure, to keep track of the status and attributes of pending transactions. The lock manager 104 maintains a lock list 110, commonly implemented using hash tables and various linked lists and / or tree structures (this will be discussed in more detail later). Lock list 110 keeps track of lock requests for data resources on database 112 . Lock list 110 may store information about a transaction's memory address, a transaction identifier, a lock ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and system for processing and managing requests for concurrent use of data. Nested databases are utilized in order to create different environments in which the data can be accessed and modified. For each transaction which is in existence, there is an indication or reference to a database or subdatabase associated with that transaction. There are also data structures which indicate, for each data item at issue, which database or subdatabase is associated with that item. The use of data structures relating the transactions, subdatabases, and data items allows the creation of spheres of control for the various transactions and subdatabases. Thus, data can be readily shared among a plurality of users. The creation of the subdatabases does not require plural copies of data and the database management system may be implemented using one copy of the data, although multiple copies may be utilized, if desired.

Description

technical field [0001] The present invention generally relates to a data management system. More particularly, the present invention relates to data management systems and transaction processing systems utilizing a lock management in a manner that protects data resources from corruption by erroneous use. The invention also relates to the manner in which the database management system is implemented to employ nested databases based on data structures in computer memory. Moreover, the present invention is also applicable to any system where shared data can be accessed by multiple people at the same time. Background technique [0002] Inherent conflicts and problems arise when two persons or groups require access to information in one database, or want to simultaneously access information in another location, or want to write the same information to a database at or about the same time . Where data is shared, these problems are likely to occur in any type of application, wor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/00G06F17/30
CPCG06F17/30362G06F16/2343
Inventor J·O·安番森
Owner XYMPHONIC SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products