skip to main content
research-article
Free Access

The Five-Minute Rule 20 Years Later: and How Flash Memory Changes the Rules: The old rule continues to evolve, while flash memory adds two new rules.

Published:01 July 2008Publication History
Skip Abstract Section

Abstract

In 1987, Jim Gray and Gianfranco Putzolu published their now-famous five-minute rule for trading off memory and I/O capacity. Their calculation compares the cost of holding a record (or page) permanently in memory with the cost of performing disk I/O each time the record (or page) is accessed, using appropriate fractions of prices for RAM chips and disk drives. The name of their rule refers to the break-even interval between accesses. If a record (or page) is accessed more often, it should be kept in memory; otherwise, it should remain on disk and read when needed.

References

  1. Gray, J., Putzolu, G.R. 1987. The 5-minute rule for trading memory for disk accesses and the 10-byte rule for trading memory for CPU time. SIGMOD Record 16(3): 395-398. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Gray, J., Graefe, G. 1997. The five-minute rule ten years later, and other computer storage rules of thumb. SIGMOD Record 26(4): 63-68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Larus, J.R., Rajwar, R. 2007. Transactional Memory. Synthesis Lectures on Computer Architecture. Morgan and Claypool. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hamilton, J. 2007. An architecture for modular data centers. CIDR (Conference on Innovative Data Systems Research).Google ScholarGoogle Scholar
  5. Gray, J., Fitzgerald, B. Flash Disk Opportunity for Server-Applications; http://research.microsoft.com/~gray/papers/FlashDiskPublic.doc.Google ScholarGoogle Scholar
  6. Härder, T., Reuter, A. 1983. Principles of transactionoriented database recovery. ACM Computing Surveys 15(4): 287-317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Chen, P.M., Lee, E.L., Gibson, G.A., Katz, R.H., Patterson, D.A. 1994. RAID: High-performance, reliable secondary storage. ACM Computing Surveys 26(2): 145-185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. See reference 7.Google ScholarGoogle Scholar
  9. Ousterhout, J.K., Douglis, F. 1989. Beating the I/O bottleneck: A case for log-structured file systems. Operating Systems Review 23(1): 11-28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Woodhouse, D. 2001. JFFS: the Journaling Flash File System. Ottawa Linux Symposium. Red Hat Inc.Google ScholarGoogle Scholar
  11. See reference 1.Google ScholarGoogle Scholar
  12. See reference 1.Google ScholarGoogle Scholar
  13. See reference 2.Google ScholarGoogle Scholar
  14. See reference 1.Google ScholarGoogle Scholar
  15. See reference 5.Google ScholarGoogle Scholar
  16. See reference 1.Google ScholarGoogle Scholar
  17. See reference 2.Google ScholarGoogle Scholar
  18. Graefe, G. 2007. Master-detail clustering using merged indexes. Informatik ¿ Forschung und Entwicklung 21 (3-4): 127-145.Google ScholarGoogle Scholar
  19. Carey, M.J., DeWitt, D.J., Richardson, J.E., Shekita, E.J. 1989. Storage management in EXODUS. Object-Oriented Concepts, Databases, and Applications: 341-369. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Stonebraker, M. 1981. Operating system support for database management. Communications of the ACM 24(7): 412-418 . Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Graefe, G. 2004. Write-optimized B-trees. VLDB: 672-683. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. See reference 21.Google ScholarGoogle Scholar
  23. See reference 2.Google ScholarGoogle Scholar
  24. Bayer, R., McCreight, E.M. 1970. Organization and maintenance of large ordered indexes. SIGFIDET Workshop: 107-141.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Bayer, R., Unterauer, K. 1977. Prefix B-trees. ACM Transactions on Database Systems 2(1): 11-26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. O'Neil, P.E. 1992. The SB-Tree: An index-sequential structure for high-performance sequential access. Acta Informatica 29(3): 241-265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Lomet, D.B. 2001. The evolution of effective Btree page organization and techniques: A personal account. SIGMOD Record 30(3): 64-69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Bender, M.A., Demaine, E.D., Farach-Colton, M. 2005. Cache-oblivious B-trees. SIAM Journal on Computing 35(2): 341-358. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Graefe, G. 2006. Implementing sorting in database systems. ACM Computing Surveys 38(3). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Nyberg, C., Barclay, T., Cvetanovic, Z., Gray, J., Lomet, D.B. 1995. AlphaSort: A cache-sensitive parallel external sort. VLDB Journal 4(4): 603-627. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Rivoire, S., Shah, M. Ranganathan, P., Kozyrakis, C. 2007. JouleSort: A balanced energy-efficiency benchmark. SIGMOD. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Shatdal, A., Kant, C., Naughton, J.F. 1994. Cacheconscious algorithms for relational query processing. VLDB: 510-521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. DeWitt, D.J., Naughton, J.F., Burger, J. 1993. Nested loops revisited. PDIS: 230-242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Graefe, G. 2003. Executing nested queries. BTW: 58-77.Google ScholarGoogle Scholar
  35. See reference 24.Google ScholarGoogle Scholar
  36. See reference 18.Google ScholarGoogle Scholar
  37. Härder, T. 1978. Implementing a generalized access path structure for a relational database system. ACM Transactions on Database Systems 3(3): 285-298. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Five-Minute Rule 20 Years Later: and How Flash Memory Changes the Rules: The old rule continues to evolve, while flash memory adds two new rules.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Queue
              Queue  Volume 6, Issue 4
              Enterprise Flash Storage
              July/August 2008
              51 pages
              ISSN:1542-7730
              EISSN:1542-7749
              DOI:10.1145/1413254
              Issue’s Table of Contents

              Copyright © 2008 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 July 2008

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format