skip to main content
research-article
Free Access

The five-minute rule 20 years later (and how flash memory changes the rules)

Published:01 July 2009Publication History
Skip Abstract Section

Abstract

Revisiting Gray and Putzolu's famous rule in the age of Flash.

References

  1. ]]Ailamaki, A., DeWitt, D.J. and Hill, M.D. Data page layouts for relational databases on deep memory hierarchies. VLDB Journal 11, 3 (2002), 198--215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ]]Bender, M.A. Demaine, E.D. and Farach-Colton, M. Cache-oblivious B-trees. SIAM Journal on Computing 35, 2 (2005), 341--358. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ]]Bayer, R. and McCreight, E.M. Organization and maintenance of large ordered indexes. SIGFI-DET Workshop (1970), 107--141.Google ScholarGoogle Scholar
  4. ]]Bayer, R. and Unterauer, K. Prefix B-trees. ACM Transactions on Database Systems 2, 1 (1977), 11--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ]]Carey, M.J., DeWitt, D.J., Richardson, J.E. and Shekita, E.J. Storage management in EXODUS. In Object-Oriented Concepts, Databases, and Applications. W. Kim and F. Lochovsky, Eds. ACM, N.Y., 1989, 341--369. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ]]Chen, P.M., Lee, E.L. Gibson, G.A, Katz, R.H. and Patterson, D.A. 1994. RAID: high-performance, reliable secondary storage. ACM Computing Surveys 26(2): 145--185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. ]]DeWitt, D.J., Naughton, J.F. and Burger, J. Nested loops revisited. Parallel and Distributed Information Systems (1993), 230--242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ]]Graefe, G. Query evaluation techniques for large databases. ACM Computing Surveys 25,2 (1993), 73--170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. ]]Graefe, G. Executing nested queries. Database Systems for Business, Technology and Web (2003), 58--77.Google ScholarGoogle Scholar
  10. ]]Graefe, G. Write-optimized B-trees. VLDB Journal (2004), 672--683. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ]]Graefe, G. Implementing sorting in database systems. ACM Computing Surveys 38, 3 (2006), 69--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. ]]Graefe, G. Master-detail clustering using merged indexes. Informatik--Forschung und Fntwicklun, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  13. ]]Gray, J. and Fitzgerald, B. 2007. Flash disk opportunity for server-applications; http://research.microsoft.com/~gray/papers/FlashDiskPublic.doc.Google ScholarGoogle Scholar
  14. ]]Gray, J., Graefe, G. 1997. The five-minute rule ten years later, and other computer storage rules of thumb. SIGMOD Record 26, 4 (1997), 63--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. ]]Gray, J. and Putzolu, G.R. The 5-minute rule for trading memory for disk accesses and the 10-byte rule for trading memory for CPU time. SIGMOD Journal (1987), 395--398. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. ]]Härder, T. Implementing a generalized access path structure for a relational database system. ACM Transactions on Database Systems 3, 3 (1978), 285--298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. ]]Hamilton, J. An architecture for modular data centers. In Proceedings of the Conference on Innovative Data Systems Research, 2007.Google ScholarGoogle Scholar
  18. ]]Härder, T. and Reuter, A. Principles of transaction-oriented database recovery. ACM Computing Surveys 15, 4 (1983), 287--317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. ]]Lomet, D.B. The evolution of effective B-tree page organization and techniques: a personal account. SIGMOD Record 30, 3, 64--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. ]]Larus, J.R. and Rajwar, R. Transactional Memory. Synthesis Lectures on Computer Architecture. Morgan & Claypool, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. ]]Nyberg, C., Barclay, T., Cvetanovic, Z., Gray, J. and Lomet, D.B. AlphaSort: A cache-sensitive parallel external sort. VLDB Journal (1995), 603--627. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. ]]Ousterhout, J.K. and Douglis, F. Beating the I/O bottleneck: A case for log-structured file systems. Operating Systems Review 23, 1 (1989), 11--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. ]]0'Neil, P.W. The SB-tree: An index-sequential structure for high-performance sequential access. Acta Informatica 29, 3 (1992), 241--265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. ]]Rivoire, S., Shah, M., Ranganathan, P. and Kozyrakis, C. JouleSort: A balanced energy-efficiency benchmark. SIGMOD Record, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. ]]Stonebraker, M. Operating system support for database management. Commun. ACM 24, 7 (July 1981), 412--418. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. ]]Shatdal, A., Kant, C. and Naughton, J.F. Cache-conscious algorithms for relational query processing. VLDB Journal (1994), 510--521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. ]]Woodhouse, D. JFFS: The Journaling Flash File System. Ottawa Linux Symposium, Red Hat Inc., 2001.Google ScholarGoogle Scholar

Index Terms

  1. The five-minute rule 20 years later (and how flash memory changes the rules)

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 52, Issue 7
              Barbara Liskov: ACM's A.M. Turing Award Winner
              July 2009
              141 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/1538788
              Issue’s Table of Contents

              Copyright © 2009 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 July 2009

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format