17933635. DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES

Organization Name

International Business Machines Corporation

Inventor(s)

Peng Hui Jiang of Beijing (CN)

Jun Su of Beijing (CN)

Guang Han Sui of Beijing (CN)

Di Li Hu of Beijing (CN)

DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17933635 titled 'DATA INGESTION TO AVOID CONGESTION IN NOSQL DATABASES

Simplified Explanation

The abstract of the patent application describes a method, computer program product, and computer system for analyzing database access patterns and directing traffic based on activity thresholds.

  • Traffic is collected against a NoSQL database by an activity collector.
  • A database transaction log is periodically extracted and analyzed.
  • The collected traffic and analyzed database transaction log are used to build a knowledge base of database access patterns.
  • Current traffic is captured to compute an activity threshold.
  • Traffic is directed to a workload processor based on the activity threshold.
  • Traffic is directed to an intensive insert/update/delete (IUD) processor if the activity threshold exceeds a configured threshold.
  • Temporary shards are generated along with adaptive keys and indexes to handle intensive IUD processor traffic.

Potential Applications

This technology could be applied in database management systems, data analytics, and workload optimization tools.

Problems Solved

This technology solves the problem of efficiently managing database traffic based on real-time activity thresholds and access patterns.

Benefits

The benefits of this technology include improved performance, optimized resource allocation, and enhanced scalability in database systems.

Potential Commercial Applications

The potential commercial applications of this technology include database management software, cloud computing platforms, and big data analytics tools.

Possible Prior Art

One possible prior art for this technology could be systems that analyze database access patterns for optimization purposes.

Unanswered Questions

How does this technology handle security and privacy concerns in database traffic analysis?

This article does not address the specific methods or mechanisms used to ensure the security and privacy of the data being analyzed.

What are the scalability limitations of this technology in handling large volumes of database traffic?

This article does not provide information on the scalability limitations of the system when dealing with a high volume of database traffic.


Original Abstract Submitted

Method, computer program product, and computer system are provided. Traffic is collected against a NoSQL database by an activity collector. A database transaction log is periodically extracted and analyzed. The collected traffic and the analyzed database transaction log are input to building a knowledge base of database access patterns. Current traffic is captured and used to compute an activity threshold. Traffic is directed to a workload processor based on the activity threshold. Traffic is directed to an intensive insert/update/delete (IUD) processor in response to the activity threshold exceeding a configured threshold. A plurality of temporary shards is generated along with an adaptive key and adaptive index in the plurality of temporary shards. The intensive IUD processor traffic is re-directed to the plurality of temporary shards while the activity threshold exceeds the configured threshold.