Locking Key Ranges with Unbundled Transaction Services
نویسندگان
چکیده
To adapt database technology to new environments like cloud platforms or multi-core hardware, or to try anew to provide an extensible database platform, it is useful to separate transaction services from data management elements that need close physical proximity to data. With “generic” transactional services of concurrency control and recovery in a separate transactional component (TC), indexing, cache and disk management, now in a data component (DC), can be simplified and tailored more easily to the platform or to a data type extension with a special purpose index. This decomposition requires that details of the DC’s management of data be hidden from the TC. Thus, locking and logging need to be “logical”, which poses a number of problems. One problem is the handling of locking for ranges of keys. Locks need to be taken at the TC prior to the records and their keys being known to the TC. We describe generic two approaches for dealing with this. (1) Make a “speculative” visit” to the DC to learn key values. (2) Lock a “covering resource” first, then learn and lock key values and ultimately release the covering resource lock. The “table” is the only logical (and hence known to the TC) covering resourse in the traditional locking hierarchy, but using it limits concurrency. Concurrency is improved with the introduction of new partition resources. We show how partitions as covering resources combine high concurrency with low locking overhead. Using partitions is sufficiently effective to consider adapting it for a traditional database kernel.
منابع مشابه
Key Range Locking Strategies for Improved Concurrency
“Phan~oma” are records inserted into a concurrently aelected set of records specified by a predicate such that Ihe selection does not eee a transaction conaietent result. The usual locking slrategy is lo lock only czisling records. However, records that satisfy the eeleclion predicate muat be locked even when they are nol present in the database to prevent their insertion. One way to cope with ...
متن کاملHierarchical locking in B-tree indexes
Three designs of hierarchical locking suitable for B-tree indexes are explored in detail and their advantages and disadvantages compared. Traditional hierarchies include index, leaf page, and key range or key value. Alternatively, locks on separator keys in interior B-tree pages can protect key ranges of different sizes. Finally, for keys consisting of multiple columns, key prefixes of differen...
متن کاملMulti-View Memory Support to Operating Systems in Locking for Transaction and Database Systems
Database (DB) and transaction processing systems utilize their own locking of data items instead of using locking services provided by operating systems (OSs). There are two major reasons for this, one deals with the size of lockable items while the other one with efficiency: (i) OSs provide efficient locking of pages by utilizing the Memory Management Unit. The problem is that the system page ...
متن کاملTransaction Supporting Realtime File System in a Distributed Environment
A transaction is a set of read and write comnands surrounded by BEGIN and END, and these structured commands are sent by a client to the file system. To ensure successful transaction update, it should have an atomic property and be processed in serially ordered fashion. The purpose of this paper is to develop a file system which has realtime attributes and wkich can support nested transaction s...
متن کاملImproving OLTP Scalability using Speculative Lock Inheritance
Transaction processing workloads provide ample request level concurrency which highly parallel architectures can exploit. However, the resulting heavy utilization of core database services also causes resource contention within the database engine itself and limits scalability. Meanwhile, many database workloads consist of short transactions which access only a few database records each, often ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- PVLDB
دوره 2 شماره
صفحات -
تاریخ انتشار 2009