Using Versions in Update Transactions

نویسندگان

  • Francois Llirbat
  • Eric Simon
  • Dimitri Tombroff
چکیده

This paper proposes an extension of the multiversion two phase locking protocol, called EMV2PL, which enables update transactions to use versions while guaranteeing the serializability of all transactions. The use of the protocol is restricted to transactions, called write-then-read transactions that consist of two consecutive parts: a write part containing both read and write operations in some arbitrary order, and an abusively called read part, containing read operations or write operations on data items already locked in the write part of the transaction. With EMV2PL, read operations in the read part use versions and read locks acquired in the write part can be released just before entering the read part. We prove the correctness of our protocol, and show that its implementation requires very few changes to classical implementations of MV2PL. After presenting various methods used by application developers to implement integrity checking, we show how EMV2PL can be eeectively used to optimize the processing of update transactions that perform integrity checks. Finally, performance studies show the beneets of our protocol compared to a (strict) two phase locking protocol. Utilisation de versions par des transactions d' ecriture R esum e : Cet article propose un protocole de contr^ ole de concurrence multiver-sion appel e EMV2PL. Ce protocole permet d'ex ecuter eecacement des transactions d' ecriture particuli eres compos ees de deux parties: une partie d' ecriture qui contient des op erations d' ecriture et de lecture dans un ordre arbitraire et une partie de lecture qui contient des op erations de lecture et/ou des op erations d' ecriture sur des objets d ejj a verrouill es dans la partie d' ecriture de la transaction. Avec EMV2PL, ces transactions (1) rel^ achent leurs verrous de lecture avant d'ex ecuter leur partie de lecture et (2) ex ecutent les op erations de lecture de la partie de lecture sur des versions, sans prendre de verrous. Nous montrons la correction de ce protocole et le fait que sa mise en oeuvre ne n ecessite que de l eg eres modiications des algorithmes et des structures de donn ees utilis ees par le protocole classique MV2PL. Nous pr e-sentons dii erentes m ethodes employ ees pour v eriier l'int egrit e des donn ees dans les applications de bases de donn ees et montrons comment EMV2PL optimise ces applications. Ennn, une etude par simulation nous permet d'illustrer les gains en performances de notre protocole …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Versions in Update Transactions: Application to Integrity Checking

This paper proposes an extension of the multiversion two phase locking protocol, called EMVZPL, which enables update transactions to use versions while guaranteeing the serializability of all transactions. The use of the protocol is restricted to transactions, called write-then-read transactions that consist of two consecutive parts: a write part containing both read and write operations in som...

متن کامل

Asynchronous Version Advancement in a Distributed Three-Version Database

We present an eecient protocol for multi-version concurrency control in distributed databases. The protocol creates no more than three versions of any data item, while guaranteeing that (1) update transactions never interfere with read-only transactions, (2) the version advancement mechanism is completely asynchronous with (both update and read-only) user transactions, and (3) read-only transac...

متن کامل

Towards serializable replication with snapshot isolation

Replicated database systems necessarily deal with multiple versions of data items active concurrently across nodes in a replication group. As a consequence, there is a natural fit between replication and snapshot isolation (SI), which uses multiple versions of data within a single site to provide nonblocking read operations. However, snapshot isolation does not guarantee serializable execution ...

متن کامل

Prevention of cross-update privacy leaks on android

Updating applications is an important mechanism to enhance their availability, functionality, and security. However, without careful considerations, application updates can bring other security problems. In this paper, we consider a novel attack that exploits application updates on Android: a cross-update privacy-leak attack called COUPLE. The COUPLE attack allows an application to secretly lea...

متن کامل

Weak Voting Database Replication Protocols Providing Different Isolation Levels

Recently, several works have taken advantage of a database isolation notion suitable for replicated approaches, called Generalized Snapshot Isolation, that provides greater performance since read-only transactions are never blocked nor cause update transactions to block or abort. However, this concept has not been formally described for replicated environments where a logical copy of the system...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996