Pii: S0950-5849(99)00062-2
نویسندگان
چکیده
Two-phase locking (2PL) is the concurrency control mechanism that is used in most commercial database systems. In 2PL, for a transaction to access a data item, it has to hold the appropriate lock (read or write) on the data item by issuing a lock request. While the way transactions set their lock requests and the way the requests are granted would certainly affect a system’s performance, such aspects have not received much attention in the literature. In this paper, a general transaction-processing model is proposed. In this model, a transaction is comprised of a number of stages, and in each stage the transaction can request to lock one or more data items. Methods for granting transaction requests and scheduling policies for granting blocked transactions are also proposed. A comprehensive simulation model is developed from which the performance of 2PL with our proposals is evaluated. Results indicate that performance models in which transactions request locks on an item-by-item basis and use first-come-first-served (FCFS) scheduling in granting blocked transactions underestimate the performance of 2PL. The performance of 2PL can be greatly improved if locks are requested in stages as dictated by the application. A scheduling policy that uses global information and/or schedules blocked transactions dynamically shows a better performance than the default FCFS. q 2000 Elsevier Science B.V. All rights reserved.
منابع مشابه
Pii: S0950-5849(99)00077-4
This paper discusses Brooks’ The Mythical Man-Month, a landmark work in the software project management field, and compares the software project management advice given there with practices employed some 25 years later. To find out the state of today’s practice 20 experienced software developers were interviewed regarding their impressions of factors leading to success or failure of software de...
متن کاملPii: S0950-5849(99)00087-7
This paper outlines the historical development of data management systems in order to identify the key issues for successful systems. It identifies the need for data independence and the embedding of structural and behavioural semantics in the database as key issues in the development of modern systems. Hierarchical, Network, Relational, Object-oriented and Object-relational data management sys...
متن کاملPii: S0950-5849(99)00033-6
To deal with the increased complexity related to the testing of communications software, we propose the integration and application of finite state machine based specification transformations and testability measures early in the communications software development process. Based on this integration, the testability of a given design is estimated and appropriate specification transformations ar...
متن کاملPii: S0950-5849(99)00014-2
The submodule construction problem (SCP) as stated and formulated by Merlin and Bochmann [P. Merlin, G.V. Bochmann, On the construction of submodule specification and communication protocols, ACM Trans. Prog. Lang. Sys., 5(1) (1983) 1–25] is considered: given the specification of a system (module) and that of its n 2 1 submodules, determine the specification of the nth submodule that together w...
متن کاملExperience in developing and testing network protocol software using FDTs
paper presents the research effort to formally specify, develop and test a complex life protocol for mobile network radios (MIL-STD 188-220). As a result, the team of rchers from the University of Delaware and the City University of the City College of York, collaborating with scientists from CECOM (an R&D facility of the U.S. Army) the U.S. Army Research Laboratory, have helped advance the sta...
متن کامل