You are on page 1of 4

D A T A M A N A G E M E N T :: S A P A S E

An Overview of
SAP Adaptive Server
Enterprise 16

S
AP has provided an Users response time expec- large number of concurrent
overview of the main tations are also changing. transactions and deliver re-
features in SAP Adap- Gone are the times when cord performance, economical-
tive Server Enterprise (ASE) applications returned infor- ly. Its widespread adoption in
16 and users will notice mation in seconds; responses transaction extreme industry
scale, speed, simplicity and are now expected within mil- sectors such as banking has
security for extreme trans- liseconds and microseconds. delivered a wealth of expe-
actional workloads as key Google recently concluded that rience to SAP, allowing its
and prominent elements of a 400 millisecond response engineers to deliver with SAP
this release. ISUG-TECH time is considered too long by ASE 16 unprecedented levels
provides you with a distilled their average users and other of speed, scalability, security
overview of SAP ASE 16. researchers determined that and simplicity to meet the in-
people will visit a web site creasing demand for extreme
Extreme Transaction less often if it is slower than a data transaction processing.
Processing: A Business close competitor by more than SAP ASE 16 delivers in-
Reality 250 milliseconds.3 creased scalability and speed
This is the age of extreme Additionally, IDC forecasts with extensive optimization
transaction processing. The that global telecom service in its transaction concurrency
amount of information that or- providers will reach 30 billion management, query plan
ganizations process constantly of autonomously connected execution, data compression
grows, and so does the volume end points by 20204, generat- and utilization of computing
of human and machine driven ing exponential growth in the resources in large SMP serv-
transactions that are per- number of transactions and ers. Internal OLTP bench-
formed. the velocity at which they are marks executed on an 80 core
With 333 billion worldwide generated. box, show linear scalability
non-cash payment transac- with transaction throughputs
tions processed in 20121 and SAP Adaptive Server exceeding one million transac-
the number of global e-com- Enterprise 16 Extreme tions per minute.
merce transactions expected Transaction Ready There are also strong secu-
to reach 34.8 billion in 2014,2 SAP ASE has been recognized rity and simplicity enhance-
transaction loads are increas- over the years for its ability ments in SAP ASE 16. In SAP
ingly measured in millions per to efficiently scale to support ASE 16 both the security en-
hour. forcement and system audit-
3 The New York Time, For Impatient Web
Users, an Eye Blink Is Just Too Long to Wait, ability have been augmented
1 Capgemini World Payments Report, 2013
2 Capgemini World Payments Report, 2013 2012 to deliver customers more
4 IDC's predictions for 2014

6 ISUG-TECH JOURNAL
S A P A S E :: D A T A M A N A G E M E N T

flexibility in the way they comply with specific SAP ASE 16 delivers increased scalability
compliance requirements. A broader integra-
tion with SAP Control Center and a wealth and speed with extensive optimization in its
of other enhancements also deliver simplified
transaction concurrency management, com-
management of SAP ASE installations, reduc-
ing their overall cost of ownership. plex query plan execution, data compression

Scale Enhancements and utilization of computing resources in


SAP ASE 16 delivers scalability with an op-
large SMP servers.
timal utilization of available computing and
memory resources in large SMP servers. The
scalability improvement is substantial, dem- SAP ASE structure that manages items such
onstrating linear scalability on an 80 core as user descriptors, index descriptors and simi-
machine with a throughput of over one million lar entities. Virtually any process that accesses
concurrent transactions per minute. a database table has to refer to the metadata
To achieve these results and serve the ex- cache. As a result, heavy concurrent transac-
treme transactional needs of many enterprises, tional workloads can generate high contention
SAP ASE 16 optimizes contention manage- levels and slowdown system operations. SAP
ment with a more effective and granular use of ASE prevents this potential bottleneck in two
locking and latching. It also improves transac- ways. First, it automatically maintains meta-
tion concurrency with improvement in query data objects of actively accessed entities in
parallelization and an optimized management main memory and second with SAP ASE 16, it
of shared internal resources, such as run-time uses atomic machine code operations to incre-
logging and metadata caching. ment use counts. As a result of these enhance-
Persisting concurrent transactions that ments, resource contention across the entire
operate on the same data under extreme work- system is reduced, resulting in overall scalabil-
loads can significantly slowdown system per- ity improvements.
formance. To deliver the necessary scalability,
database management systems must parallel- Speed Enhancements
ize their operations and manage contention of Many factors impact the response time of a
shared resources effectively, while maintaining data management system that operate under
the durability and integrity of their data. heavy transactional workloads, but undoubt-
SAP ASE 16 improves the access concur- edly the ability to reduce disk I/O operations,
rency for its metadata cache by avoiding CPU- increase the amount of data managed in main
spinning. The metadata cache is an internal memory and parallelize the execution of query
plans have a significant impact.
SAP ASE 16 addresses all these perfor-
mance dimensions with enhancement in index,
management, compression, and query plan
optimization.

Index Compression
The optimization of disk I/O operations has
an enormous impact on the performance of
data management systems and compression is
recognized as a valuable technique to cut the
number of I/O operations and reduce storage

APRIL 2014 7
An Overview of SAP Adaptive Server Enterprise 16

costs. Different database structures however query are then brought back to the SAP ASE
require tailored compression implementations server that completes the query.
to deliver tangible cost and performance ben- Additionally, to facilitate the interoperabil-
efits. ity with SAP HANA, SAP ASE 16 automati-
Previous releases of SAP ASE have de- cally maps SAP HANA data types to SAP ASE
livered advanced data compression of rows, data types and implements a new server class,
pages, database backups and LOBs, such as SAP HANA ODBC. To communicate with SAP
XML documents, image and video. SAP ASE HANA, the SAP HANA client package, which
16 adds support for index compression. includes the ODBC drivers, must run on the
Index compression in SAP ASE 16 adds to same server as SAP ASE 16.
the value delivered by other data compression
techniques. It helps reduce both the number Security Enhancements
of page allocation related operations and the Security enhancements in SAP ASE 16 not
occurrences of index block splits, improving only address data privacy protection and sys-
system performance and access concurrency. tem auditability, but also ensure that data is
Additionally, by allowing for larger portions of durable and always accessible within minimal
an index to reside in main memory, it acceler- delay, even in the event of a natural disaster.
ates data access and further reduces disk I/O. On the data privacy protection front, SAP
ASE 16 gives more flexibility to administra-
SAP ASE to HANA Data Access tors to choose how to protect their data to meet
The need to access data independent of its both compliance, and performance require-
physical location is pervasive across the en- ments more easily. It also provides improved
terprise, but with exponential growth in data system auditing capabilities to facilitate the
volumes, it is often unpractical to maintain monitoring and tracing of actions performed
several copies of the same data in multiple on sensitive data, so that administrators and
databases. security personal can operate on actionable
SAP ASE enables users to access data information, saving time and reducing audit-
residing in SAP ASE and in other supported ing costs.
databases transparently using the federation To ensure that transactions are durable and
capability implemented by the Component data is always accessible within minimal delay
Integration Services (CIS) functionalities. SAP to user of SAP Business Suite, SAP ASE 16 de-
ASE 16 expands its federation capabilities livers higher availability and shorter disaster
to include support for SAP HANA. For this and recovery (DR) windows, leveraging SAP
purpose, CIS has been extended with a new Replication Server synchronous replication.
native ODBC interface, which coexists with the In this way,enterprises can minimize business
proprietary CTLIB one. Both these interfaces
can be used simultaneously to communicate
with supported backend databases.
To interoperate with SAP HANA, SAP
ASE 16 creates local tables (referred as proxy
tables), which do not actually contain data,
but point to corresponding SAP HANA tables
where the data resides. When a query in SAP
ASE refers to data in tables and proxy tables,
the execution of the query on the proxy tables
is pushed to the remote SAP HANA server
and executed there. The results of this remote

8 ISUG-TECH JOURNAL
AN OvERvIEw Of SAP AdAPTIvE SERvER ENTERPRISE 16

DATA MANAGEMENT
operation disruption and experience zero data SAP ASE has been providing state of the art
loss even when one of their data centers is
destroyed in a disaster. column-level data encryption for quite some

time, and with SAP ASE 16, it adds support


Full-Database Encryption
New security threats are created every day for full database encryption.
and new industry regulations can at any time
require that new types of data be treated as
sensitive and appropriately protected. Data IT staffing (cost for RDBMS admin, server
encryption has become one of the preferred support, help desk support for database and
remediation techniques to protect sensitive training) is the highest, accounting for 75% of
data and it commonly complements database a database TCO1. SAP ASE 16 delivers simpli-
authentication, database access controls and fied database administration (delivered with
perimeter security. To be effective, data en- SCC) with analytic utilities that advise DBAs
cryption needs to provide the right degree on compression strategies and intuitive graphi-
of flexibility to adapt to specific compliance cal tools that reduce the complexity of setting
requirements and minimize interferences with up and managing large SAP ASE environ-
business operations. ments.
SAP ASE has been providing state of the art With SAP ASE 16, business applications
column-level data encryption for quite some can leverage multi-triggers to transparently
time, and with SAP ASE 16, it adds support implement data manipulations on SAP ASE
for full database encryption. Both encrypted data tables, without requiring application code
columns and fully encrypted databases can modification. The combination of these en-
help companies meet their security and privacy hancements is expected to reduce the staffing
requirements, however one solution might be and the level of expertise required to support
more suitable than the other, depending on SAP ASE 16 deployments.
specific circumstances.
Column-based encryption might be prefer- Conclusion
able when a company can easily identify what So once again, SAP ASE 16 has been designed
data is sensitive for their business and when to deliver the speed, scalability, security and
different users have different credentials. Full simplicity that enterprises need to meet the
database encryption might work better if it challenges of extreme transactional workloads,
is necessary to perform range searches over efficiently and economically. It scales linearly
sensitive data columns or when it is hard to delivering the transaction throughput and
identify which columns hold sensitive data. response time required to support the most
In SAP ASE 16 full-database encryption demanding transactional workloads.
automatically encrypts all database objects - Additionally, it provides the security and
including data files, indexes and transaction data reliability essential to minimize business
logs - and insulates existing applications from disruption and protect the privacy of enter-
the entire encryption process, because the data prise data effectively. Finally, it lowers the
is automatically decrypted when it is moved TCO of large deployments with a wealth of
from disk to memory and encrypted when is analytical and graphical tools that simplify the
moved from memory to disk. management and lower the expertise required
to manage even the most demanding SAP ASE
Simplicity Enhancements environments.
Among the various cost factors associated with
the deployment and operations of a database, 1 IDC, Calculating the True Cost of RDBMS Ownership, 2011

APRIL 2014 9

You might also like