• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Supporting Parallelism in Engineering Databases by Nested Transactions. (1992)

by T Härder, M Profit, H Schöning
Add To MetaCart

Tools

Sorted by:
Results 1 - 8 of 8

Multi-level transaction management for complex objects: implementation, performance, parallelism

by G Weikum, C Hasse - The VLDB Journal , 1993
"... ..."
Abstract - Cited by 15 (2 self) - Add to MetaCart
Abstract not found

Efficient support for customizing concurrency control in Persistent Java

by Laurent Daynes, Malcolm P. Atkinson, Patrick Valduriez , 1996
"... We report on the issues raised when designing a customizable locking mechanism for Persistent Java, a type-safe, object-oriented, orthogonally persistent system based on the language Java. Customizable locking mechanisms are supported by locking capabilities. A locking capability is a book-keeper of ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
We report on the issues raised when designing a customizable locking mechanism for Persistent Java, a type-safe, object-oriented, orthogonally persistent system based on the language Java. Customizable locking mechanisms are supported by locking capabilities. A locking capability is a book-keeper of locks that automatically acquires locks with a customizable conflict detection mechanism. It implements the concepts of delegation of locks and ignorable conflicts, automatically keeps track of the dependencies created because of allowance of conflicts, supports querying of details about these dependencies, and supports the setting of user-defined notifications for conflicts that can't be ignored. Locking capabilities don't change the Java language specification, and allow use of any Java classes without changing a single line of their code to implement the body of transactions. We also present several novel techniques to implement efficiently this customizable locking mechanism in a persis...

Transaction Identifiers in Nested Transactions: Implementation Schemes and Performance

by Fernando de Ferreira Rezende, Theo Härder, Jan Zielinski , 1997
"... ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract not found

Detection Arcs for Deadlock Management in Nested Transactions and their Performance

by Fernando De , Ferreira Rezende , Theo Härder , Andreas Gloeckner , Jörg Lutze
"... Abstract -In this paper, we address deadlock management in nested transactions. In our strategy, deadlocks are detected through the occurrence of cycles in a waits-for graph (WFG). However, the process of looking for cycles in the WFG considering all its nodes and edges can be very time-consuming. ..."
Abstract - Add to MetaCart
Abstract -In this paper, we address deadlock management in nested transactions. In our strategy, deadlocks are detected through the occurrence of cycles in a waits-for graph (WFG). However, the process of looking for cycles in the WFG considering all its nodes and edges can be very time-consuming. To accelerate this process, we propose the detection arcs. In essence, a detection arc represents a higher level abstraction embodying a hidden waiting relation between two transactions that is caused by a lock wait. Thus, the deadlock detection process needs to traverse only a minimal subset of the WFG's edges when it is started, the set of detection arcs. Therefore, the overall performance of deadlock management is improved, as confirmed by our performance measurements.
(Show Context)

Citation Context

...dered to determine the lowest-cost victim for rollback and to break all the cycles appeared. There are several aspects that can influence the selection of the victim, as for example: • the transaction level in the hierarchy and consequently the number of inferior transactions; • the number of log records written thus far; • the total execution time; • objects changed so far; • objects touched so far; • processor time used so far; etc. In contrast to Moss’s nested transaction model [13], in other more flexible models − such as Camelot [20, 4], Clouds [2, 3], Eden [1, 14], LOCUS [12, 21], PRIMA [6, 8], KRISYS [17, 16], etc. − the transactions involved in the deadlock can occur everywhere in the transaction trees. Consequently, the derivation of the backout cost is much more complex; it must include the cost of aborting not only the victim transaction, but also of the corresponding transaction tree of committed and active subtransactions, and it must consider their work lost. Finally, when choosing the victim, the deadlock manager must be concerned about starvation, i.e., it must permit all transactions in the system to proceed eventually, in order to guarantee the progress of the system as...

Locking in OODBMS Client Supporting Nested Transactions

by Laurent Dayn, Olivier Gruber, Patrick Valduriez, Projet Rodin - in Proc. of the 11th Int. Conf. on Data Engineering , 1995
"... Nested transactions facilitate the control of complex persistent applications by enabling both fine-tuning of the scope of rollback and safe intra-transaction parallelism. In this paper, we are concerned with supporting concurrent nested transactions on client workstations of an OODBMS. Use of the t ..."
Abstract - Add to MetaCart
Nested transactions facilitate the control of complex persistent applications by enabling both fine-tuning of the scope of rollback and safe intra-transaction parallelism. In this paper, we are concerned with supporting concurrent nested transactions on client workstations of an OODBMS. Use of the traditional design and implementation of a lock manager results in a high CPU overhead: in-cache traversals of the OO7 benchmark perform, at best, 4.5 times slower than the same traversal achieved in virtual memory by a nonpersistent programming language. We propose a new design and implementation of a lock manager which cuts that factor down to 1.8. This lock manager supports nested transactions with both sibling and parent /child parallelisms, and provides object locking at a cost comparable to page locking. Object locking is therefore a better alternative due to its higher functionality. 1 Introduction Object-Oriented Database Management Systems (OODBMS) are advocated for complex applica...

On the Cost of Lock Inheritance in Lock Managers Supporting Nested Transactions

by Laurent Daynes, Olivier Gruber, Patrick Valduriez , 1994
"... The flexibility of nested transactions is generally provided at the expense of a more complex locking mechanism which must deal with expensive lock inheritance. In this paper, we give a solution for efficient lock inheritance. Our solution does not change the original nested transactions model but d ..."
Abstract - Add to MetaCart
The flexibility of nested transactions is generally provided at the expense of a more complex locking mechanism which must deal with expensive lock inheritance. In this paper, we give a solution for efficient lock inheritance. Our solution does not change the original nested transactions model but does revisit its locking rules using set-oriented semantics. This allows us to trade the cost of lock propagation at sub-transaction commit for a potentially more complex conflict detection. Then we propose an efficient lock implementation which maintains the overhead of lock requests comparable to the traditional overhead in flat transactions. We conducted a number of comparative measurements in order to evaluate our trade-off. Our benchmarks show a cut off from 7% to 60% of the global time spent in lock operations, which includes lock requests, locks inheritance and release of locks. 1 Introduction The traditional flat transaction model has long been recognised as too limited for complex d...

Customizing Concurrency Controls using Graph of Locking Capabilities

by Laurent Daynes, Olivier Gruber , 1994
"... As persistent object store technology reaches a mature state with respect to orthogonal persistence support, the lack of efficient and flexible concurrency control that could make them an attractive alternative to database systems is cruelly felt. In the search for more flexibility, an increasing tr ..."
Abstract - Add to MetaCart
As persistent object store technology reaches a mature state with respect to orthogonal persistence support, the lack of efficient and flexible concurrency control that could make them an attractive alternative to database systems is cruelly felt. In the search for more flexibility, an increasing trend towards independent control over the basic transaction properties of atomicity, permanence and serializability has emerged [11, 13]. Following this approach, this paper propose a new mechanism, called locking capability graph, which allows quick prototyping of concurrency control independently of other transaction properties. This mechanism allows (1) generic conflict detection based on a no conflict with relationship between lock owners, (2) arbitrary delegation of locks, and (3), automated tracking of dependencies between lock owners. The mechanism is flexible enough to support a variety of popular transaction models' concurrency control. Our measurements using a first prototype show ...

Lock Inheritance in Nested Transactions

by Laurent Daynès, Olivier Gruber, Patrick Valduriez
"... The flexibility of nested transactions is generally provided at the expenses of a more complex locking mechanism which must deal with expensive lock inheritance. In this paper, we give a solution for efficient lock inheritance. Our solution does not change the original nested transaction model but d ..."
Abstract - Add to MetaCart
The flexibility of nested transactions is generally provided at the expenses of a more complex locking mechanism which must deal with expensive lock inheritance. In this paper, we give a solution for efficient lock inheritance. Our solution does not change the original nested transaction model but does revisit its locking rules using set-oriented semantics. This allows us to trade the cost of lock propagation at sub-transaction commit for a potentially more complex conflict detection. Then we propose an efficient lock implementation which maintain the overhead of lock requests comparable to the traditional overhead in flat transactions. We conducted a number of comparative measurements in order to evaluate our trade-off. Our benchmarks show a cut off from 10% to 40% of the global time spent in lock operations, including lock requests and commits. 1 Introduction The traditional flat transaction model has long been recognised as too limited for complex dataintensive application domains l...
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University