Preview

Database

Powerful Essays
Open Document
Open Document
24717 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database
Concurrency Control in Distributed Database Systems
PHILIP A. BERNSTEIN AND NATHAN GOODMAN Computer Corporation of America, Cambridge, Massachusetts 02139

In this paper we survey, consolidate, and present the state of the art in distributed database concurrency control. The heart of our analysts is a decomposition of the concurrency control problem into two major subproblems: read-write and write-write synchronization. We describe a series of synchromzation techniques for solving each subproblem and show how to combine these techniques into algorithms for solving the entire concurrency control problem. Such algorithms are called "concurrency control methods." We describe 48 principal methods, including all practical algorithms that have appeared m the literature plus several new ones. We concentrate on the structure and correctness of concurrency control algorithms. Issues of performance are given only secondary treatment. Keywords and Phrases: concurrency control, deadlock, dtstnbuted database management systems, locking, senahzability, synchromzation, tunestamp ordering, timestamps, twophase commit, two-phase locking CR Categories: 4.33, 4.35 INTRODUCTION The Concurrency Control Problem C o n c u r r e n c y control is the activity of coordinating concurrent accesses to a database in a multiuser d a t a b a s e m a n a g e m e n t s y s t e m (DBMS). C o n c u r r e n c y control permits users to access a d a t a b a s e in a multip r o g r a m m e d fashion while preserving the illusion t h a t each user is executing alone on a dedicated system. T h e m a i n technical difficulty in attaining this goal is to p r e v e n t d a t a b a s e u p d a t e s p e r f o r m e d b y one user f r o m interfering with d a t a b a s e retrievals and u p d a t e s p e r f o r m e d b y another. T h e concurrency control p r o b l e m is e x a c e r b a t e d in a distributed D B M S ( D D B M S ) because (1) users m a y access d a t a stored in m a n y different c o m p u t



References: 1. Cert~fwrs: BADA79,BAYE80, CASA79,KUNG81, PAPA79, THOM79 2. Concurrency control theory: BERN79b, BERN80C, CASA79, ESWA76, KUNG79, MXNO78, PAPA77, PAPA79, SCHL78, SILB80, STEA76 3. Performance: BADA80,GARC78,GARC79a, GARC79b, GELE78, REIS79a, RExs79b, ROTH77 4. Reliabihty General: ALSB76a,ALSB76b, BELF76, BERN79a, HAMMS0,LAMP76 Two-phase commzt: HAMM80,LAMP76 5. Timestamp-ordered scheduling (T/O) General: BADA78,BERN78a, BERN80a, BERN80b, BERN80d, LELA78, LIN79, RAMI79 Thomas ' Wrtte Rule: THOM79 Multivers~on t~mestamp ordering: MONT78, REED78 T~mestamp and clock management: LAMP78, THOM79 6. Two-phase locking (2PL) General. BERN79b, BREI79, ESWA76,GARD77, GRAY75, GRAY78,PAPA79, SCHL78, SILB80, STEA81 D~str~buted 2PL: MENA80, MINO79, ROSE78, STON79 Primary copy 2PL: STOle77, STON79 Centralized 2PL: ALSB76a,ALSB76b, GARc79b, GARC79C Voting 2PL: GIFF79, SEQU79, THOM79 Deadlock detection/prevention: GRAY78,KXNG74, KAWA79,ROSE78, STON79 Received April 1980; final revision accepted February 1981 Computing Surveys, Vol. 13, No 2, June 1981

You May Also Find These Documents Helpful

  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Database

    • 504 Words
    • 4 Pages

    Copy and paste the specified ipconfig /all command output from the Windows CLI into the Task 1 box provided below.…

    • 504 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    * In an inventory order system, you don't want an order to be deleted if there are inventory order items, or those items will be orphaned.…

    • 579 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Data Base

    • 2312 Words
    • 10 Pages

    * Each value manipulated by an Oracle database possesses a data type. The data type of a value links a selection of attributes to the value. These attributes of the value differentiate one data type from the others. Oracle treats certain data types in a distinct way. For instance, one can add values of NUMBER data type, but not values of RAW data type. When one builds a table or a cluster, one must assign data types for all its columns. In Oracle, the arguments of a procedure or stored function also need to be allocated data types. The data types specify the domain of values which…

    • 2312 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    database mgnt

    • 730 Words
    • 3 Pages

    5. Identify and discuss the serious data redundancy problems exhibited by the file structure shown in Figure P1.5.…

    • 730 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Database

    • 330 Words
    • 2 Pages

    There are three problems. First is deletion problem, second is update problem, third is insertion problem.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Base

    • 250 Words
    • 1 Page

    Review and describe the most important criteria for selecting internetworking devices at the core, access, and distribution layer in a computer network…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    References: [1] C. J. Dimmer, “The Tandem Non-stop System”, Resilient Computing Systems, (T. Anderson , ed.), pp. 178196, Collins, 1985 [2] D. Wilson, “The STRATUS Computer system”, Resilient Computing Systems, (T. Anderson , ed.), pp. 208231, Collins, 1985. [3] S. K. Shrivastava, G. N. Dixon, and G. D. Parrington, “An Overview of Arjuna: A Programming System for Reliable Distributed Computing,” IEEE Software, Vol. 8, No. 1, pp. 63-73, January 1991. [4]G. D. Parrington et al, “The Design and Implementation of Arjuna”, USENIX Computing Systems Journal, Vol. 8., No. 3, pp. 253-306, Summer 1995. [5] S. K. Shrivastava, “Lessons learned from building and using the Arjuna distributed programming system,” Int. Workshop on Distributed Computing Systems: Theory meets Practice, Dagsthul, September 1994, LNCS 938, Springer-Verlag, July 1995. [6] P.A. Bernstein et al, “Concurrency Control and Recovery in Database Systems”, Addison-Wesley, 1987. [7] M. C. Little, “Object Replication in a Distributed System”, PhD Thesis, University of Newcastle upon Tyne, September 1991. (ftp://arjuna.ncl.ac.uk/pub/Arjuna/Docs/Theses/TR-376-9-91_EuropeA4.tar.Z) [8] M. C. Little and S. K. Shrivastava, “Object Replication in Arjuna”, BROADCAST Project Technical Report No. 50, October 1994. (ftp://arjuna.ncl.ac.uk/pub/Arjuna/Docs/Papers/Object_Replication_in_Arjuna.ps.Z)…

    • 8069 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    Arrakis OS

    • 719 Words
    • 3 Pages

    Peter, Simon. “Arrakis: The Operating System is The Control Plane.” washington.edu, 14 October 2013. Web. 6 May 2014. http://faculty.washington.edu/simpeter/arrakis-tr.pdf…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Coronel, C., Morris, S., & Rob, P. (2012). Database systems. (10th ed.). Independence, KY: Cengage.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Relational Database

    • 632 Words
    • 3 Pages

    To create a family reunion database using Microsoft Access, we first need to break down the information currently available to us.…

    • 632 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Sdlc

    • 3069 Words
    • 13 Pages

    • Synchronous Data Link Control—A communications protocol that divides network functions into clearly defined layers.…

    • 3069 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    In a large modern enterprise, information is almost inevitably distributed among several database management systems. Despite considerable attention from the research community, relatively few commercial systems have attempted to address this issue. This article describes the technology that enables clients of IBM's federated database engine to access and integrate the data and specialized computational capabilities of a wide range of relational and nonrelational data sources.…

    • 5658 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Term paper about deadlock

    • 1423 Words
    • 6 Pages

    A deadlock is a situation which occurs when a process or thread enters a waiting state because a resource requested is being held by another waiting process, which in turn is waiting for another resource. If a process is unable to change its state indefinitely because the resources requested by it are being used by another waiting process, then the system is said to be in a deadlock. In a transaction database, a deadlock happens when two processes each within its own transaction updates two of information but in the opposite order. Several highlights of our proposals are emphasized.…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    We are thankful to all those who have helpe d us directly or indirectly with…

    • 2132 Words
    • 9 Pages
    Better Essays