Weak consistency of read-only transactions: A tool to improve concurrency in heterogeneous locking protocols
Three different types of consistencies, viz., semiweak, weak, and strong, of a read-only transaction in a schedule s of a set T of transactions are defined and these are compared with the existing notions of consistencies of a read-only transaction in a schedule. We present a technique that enables a user to control the consistency of a read-only transaction in heterogeneous locking protocols. Since the weak consistency of a read-only transaction improves concurrency in heterogeneous locking protocols, the users can help to improve concurrency in heterogeneous locking protocols by supplying the consistency requirements of read-only transactions. A heterogeneous locking protocol P' derived from a locking protocol P that uses exclusive mode locks only and ensures serializability need not be deadlock-free. We present a sufficient condition that ensures the deadlock-freeness of P′, when P is deadlock-free and all the read-only transactions in P′ are two phase.
KeywordsData Item Database Management System Strong Consistency Partial Schedule Weak Consistency
Unable to display preview. Download preview PDF.
- 3.Chan, A., and Gray, R.: Implementing distributed read-only transactions. IEEE Trans. Soft. Eng. SE-11, 2(Feb. 1985), 205–212.Google Scholar
- 4.Casanova, M. A.: The concurrency control problem for database systems. Lecture Notes in Computer Science, vol. 116, Berlin-Heidelberg-New York, Springer 1981.Google Scholar
- 5.Dasgupta, P., and Kedem, Z. M.: A non-2-phase locking protocol for general databases. In Proc. of the 8th Int. Conference on Very Large Databases, Oct. 1983, 92–96.Google Scholar
- 8.Hansdah, R. C., and Patnaik, L. M.: Update serializability in locking. In Proc. of the International Conference on Database Theory, Rome, Italy, Sept. 1986(Lecture Notes in Computer Science, vol. 243, pp. 171–185).Google Scholar
- 10.Kedem, Z. M., and Silberschatz, A.: Non-two phase locking protocols with shared and exclusive locks. In Proc. of the 6th Int. Conf. on VLDB, Montreal, 1980,309–317.Google Scholar
- 12.Korth, H.: Locking protocols: general lock classes and deadlock freedom. Ph.D. Thesis, Princeton University, Jun. 1981.Google Scholar
- 14.Mohan, C.: Strategies for enhancing concurrency and managing deadlocks in database locking protocols. Ph.D. Thesis, Dept. of Computer Science, University of Texas at Austin, 1981.Google Scholar
- 18.Silberschatz, A., and Kedem, Z. M.: A family of locking protocols for database systems that are modeled by directed graphs. IEEE Trans. Soft. Engg., SE-8,6(Nov. 1982), 558–602.Google Scholar
- 19.Stearns, R. E., Lewis, P. M. II, and Rosenkrantz, D. Z.: Concurrency control for database systems. In Proc. of the 17th Symp. on Foundations of Computer Science, Oct.1976, 19–32.Google Scholar
- 20.Ullman, J. D.: Principles of database systems. Computer Science Press Inc., Potomac, Md., 1982.Google Scholar