Invisible loading: Access-driven data transfer from raw files into database systems

Azza Abouzied, Daniel J. Abadi, Avi Silberschatz

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Commercial analytical database systems suffer from a high "time-to-first-analysis": before data can be processed, it must be modeled and schematized (a human effort), transferred into the database's storage layer, and optionally clustered and indexed (a computational effort). For many types of structured data, this upfront effort is unjustifiable, so the data are processed directly over the file system using the Hadoop framework, despite the cumulative performance benefits of processing this data in an analytical database system. In this paper we describe a system that achieves the immediate gratification of running MapReduce jobs directly over a file system, while still making progress towards the long-term performance benefits of database systems. The basic idea is to piggyback on MapReduce jobs, leverage their parsing and tuple extraction operations to incrementally load and organize tuples into a database system, while simultaneously processing the file system data. We call this scheme Invisible Loading, as we load fractions of data at a time at almost no marginal cost in query latency, but still allow future queries to run much faster.

Original languageEnglish (US)
Title of host publicationAdvances in Database Technology - EDBT 2013
Subtitle of host publication16th International Conference on Extending Database Technology, Proceedings
Pages1-10
Number of pages10
DOIs
StatePublished - 2013
Event16th International Conference on Extending Database Technology, EDBT 2013 - Genoa, Italy
Duration: Mar 18 2013Mar 22 2013

Publication series

NameACM International Conference Proceeding Series

Other

Other16th International Conference on Extending Database Technology, EDBT 2013
CountryItaly
CityGenoa
Period3/18/133/22/13

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Invisible loading: Access-driven data transfer from raw files into database systems'. Together they form a unique fingerprint.

Cite this