skip to main content
article
Free Access

Fundamental techniques for order optimization

Published:01 June 1996Publication History
Skip Abstract Section

Abstract

Decision support applications are growing in popularity as more business data is kept on-line. Such applications typically include complex SQL queries that can test a query optimizer's ability to produce an efficient access plan. Many access plan strategies exploit the physical ordering of data provided by indexes or sorting. Sorting is an expensive operation, however. Therefore, it is imperative that sorting is optimized in some way or avoided all together. Toward that goal, this paper describes novel optimization techniques for pushing down sorts in joins, minimizing the number of sorting columns, and detecting when sorting can be avoided because of predicates, keys, or indexes. A set of fundamental operations is described that provide the foundation for implementing such techniques. The operations exploit data properties that arise from predicate application, uniqueness, and functional dependencies. These operations and techniques have been implemented in IBM's DB2/CS.

References

  1. Ant93 G. Antosheknov. Query processing in dec rdb: Major issues and future challenges. In IEEE Bulletin on the Technical Comittee on Data Engineer:ng, December 1993.Google ScholarGoogle Scholar
  2. BB79 C. Beeri and P. Bernstein. Computational problems related to the design of normal form relational schemas. In A CM Transactions on Database Systems, March 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. BD83 D. Bitton and D. DeWitt. Duplicate record elimination in large data files. In A CM Transactions on Database Systems, June 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. BE76 M. Blasgen and K. Eswaran. On the evaluation of queries in a relational data base system. Technical Report 1745, IBM Santa Teresa Lab, April 1976.Google ScholarGoogle Scholar
  5. CS93 S. Chaudhuri and K. Shim. Including group-by in query optimization. In Proceedings of the 19th International Conference on Very Large Data Bases, August 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. DD92 H. Darwen and C. Date. The role of functional dependencies in query decomposition. In Relatzonal Database Writings 1989-1991~ Addison Wesley, 1992.Google ScholarGoogle Scholar
  7. DKO+84 D. DeWitt, R. Katz, F. Olken, L. Shapiro, M. Stonebraker, and D. Wood. Implementation techniques for main memory database systems. In Proceedings of the 198~ A CM SIGMOD International Conference on Management of Data, June 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Eng95 S. Englert. Tpc benchmark d. In Transact:on Processing Performance Council, 777 N. First St, Suite 600, San Jose CA 95112-6311, October 1995.Google ScholarGoogle Scholar
  9. GD87 G. Graefe and D. DeWitt. The exodus optimizer generator. In Proceedings of the 1987 A CM SIG- MOD International Conference on Management of Data, June 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Gra93 G. Graefe. Query evaluation techniques for large databases. In A CM Computing Surveys, June 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hel94 J. Hellerstein. Pratical predicate placement. In Proceedings of the 1994 A CM SIGMOD Internatzonal Conference on Management of Data, June 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. HFLP89 L. Haas, J. Freytag, G. Lohman, and H. Pirahesh. Extensible query processing in starburst. In Proceedings of the 1989 A CM SIGMOD International Conference on Management of Data, June 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. JV84 M. Jarke and Y. Vassi}iou. Query optimization in database systems. In A CM Computing Surveys, June 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Loh88 G. Lohman. Grammar-like functional rules for representing query optimization alternatives. In Proceedings of the 1988 A CM SIGMOD Internatzonal Conference on Management of Data, June 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. OL90 K. Ono and G. Lohman. Measuring the complexity of join enumeration in query optimization. In Proceedings of the 16th International Conference on Very Large Data Bases, August 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. PHH92 H. Pirahesh, J. Hellstein, and W. Hasan. Extensible rule based query rewrite optimization in starburst. In Proceedings of the I99~ A CM SIG- MOD International Conference on Management of Data, June 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. PL94 G. PauUey and P. Larson. Exploiting uniqueness in query optimization. In International Conference on Data Engineering, February 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. SAC+79 P. Se}inger, M. Astrahan, D. Chamber}in, R. Lorie, and T. Price. Access path selection in a relational database system. In Proceedings of the 1979 A CM SIGMOD Internatzonal Conference on Management of Data, June 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. YL93 P. Yah and P. Larson. Performing group-by before join. In International Conference on Data Engineemng, February 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fundamental techniques for order optimization

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGMOD Record
        ACM SIGMOD Record  Volume 25, Issue 2
        June 1996
        557 pages
        ISSN:0163-5808
        DOI:10.1145/235968
        Issue’s Table of Contents
        • cover image ACM Conferences
          SIGMOD '96: Proceedings of the 1996 ACM SIGMOD international conference on Management of data
          June 1996
          560 pages
          ISBN:0897917944
          DOI:10.1145/233269

        Copyright © 1996 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 1996

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader