Sharing live data with a non cooperative DBMS
First Claim
Patent Images
1. A data-sharing method wherein a non-cooperative DBMS of a primary computer system participates in unaware applications and has a cache, respective lock structures, database log files and database data files responsive to data requests generated by the unaware applications, said method comprising the steps of:
- (a) nonintrusively monitoring data written to said database log files and said database data files and communicating information as to data written to said files to a secondary DBMS running on a potentially different computer and having a secondary cache and secondary lock requests and responsive to data requests by other unaware applications; and
(b) processing data in said secondary DBMS between said other unaware applications and with said secondary cache and said secondary lock requests while reading data from said non-cooperative DBMS data files without interrupting update or retrieval activities of said non-cooperative DBMS and while isolating said non-cooperative DBMS from said other applications, thereby enabling said other unaware applications to access the data maintained by said non-cooperative DBMS.
7 Assignments
0 Petitions
Accused Products
Abstract
The log file maintained by a DBMS is used, possibly in conjunction with hardware that listens to the communication between a computer and the storage controller to create cache buffers and a locking mechanism that enable applications running on one computer system to consistently access the data maintained and updated by a different computer.
42 Citations
20 Claims
-
1. A data-sharing method wherein a non-cooperative DBMS of a primary computer system participates in unaware applications and has a cache, respective lock structures, database log files and database data files responsive to data requests generated by the unaware applications, said method comprising the steps of:
-
(a) nonintrusively monitoring data written to said database log files and said database data files and communicating information as to data written to said files to a secondary DBMS running on a potentially different computer and having a secondary cache and secondary lock requests and responsive to data requests by other unaware applications; and
(b) processing data in said secondary DBMS between said other unaware applications and with said secondary cache and said secondary lock requests while reading data from said non-cooperative DBMS data files without interrupting update or retrieval activities of said non-cooperative DBMS and while isolating said non-cooperative DBMS from said other applications, thereby enabling said other unaware applications to access the data maintained by said non-cooperative DBMS. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19)
-
-
13. A computer system comprised of a secondary DBMS, a secondary cache and secondary lock structures and connectable for data sharing with a non-cooperative DBMS of a primary computer which participates in unaware applications and has a cache, respective lock structures, database log files and database data files responsive to data requests generated by the unaware applications, said computer system having a listener connected to said non-cooperative DBMS for:
-
(a) nonintrusively monitoring data written to said database log files and communicating information as to data written to said files to said secondary DBMS of said computer system, said computer system being responsive to data requests by other unaware applications; and
(b) processing data in said secondary DBMS between said other unaware applications and with said secondary cache and said secondary lock requests while reading data from said non-cooperative DBMS with said secondary DBMS without interrupting update or retrieval activities of said non-cooperative DBMS and while isolating said non-cooperative DBMS from said other applications, thereby enabling said other unaware applications to access the data maintained by the non-cooperative DBMS.
-
-
20. A method of supporting true repeatable read and serializable transactions which comprises the steps of:
-
(a) during a repeatable read and serializable transaction in a database management system, storing a transaction time for an entire duration of the transaction; and
(b) automatically based on the transaction time stored in step (a) further processing said transaction to create an appearance that said transaction occurred at a single point in time.
-
Specification