Skip to main content

Improving the Performance of Read-Only Transactions Through Speculation

  • Conference paper
Databases in Networked Information Systems (DNIS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4777))

Included in the following conference series:

Abstract

A read-only transaction (ROT) does not modify any data. The main issues regarding processing ROTs are correctness, data currency and performance. Two-phase Locking (2PL) protocol is widely used for concurrency control with serializabilty as correctness criteria. Even though 2PL processes ROTs correctly with no data currency related issues, the performance deteriorates as data contention increases. To improve the performance over 2PL, snapshot isolation (SI)-based protocols have been proposed. SI-based protocols process ROTs by reading from a snapshot of the committed data and ignoring the modifications produced by the concurrent active transactions. Even though SI-based algorithms improve the performance of ROTs, both data currency of ROTs and correctness (serializability) are compromised. In this paper, we propose an approach to improve the performance of ROTs using speculation without compromising data currency of transactions and correctness. The proposed approach improves the performance of ROTs by trading extra computing resources without violating serializability as correctness criteria. The simulation results show that with the proposed protocol the throughput performance is improved significantly over 2PL and SI-based approaches with manageable extra resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eswaran, K., Gray, J., Lorie, R., Traiger, I.: The notions of consistency and predicate locks in database systems. Communications of the ACM 19(11), 624–633 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  2. Gray, J., Reuter, A.: Transaction Processing: Concepts and techniques. Morgan Kaufmann, San Francisco (1993)

    MATH  Google Scholar 

  3. Berenson, H., Bernstein, P., Gray, J., Melton, J., O’Neil, E., O’Neil, P.: A Crtique of ANSI SQL Isolation Levels. ACM SIGMOD (1995)

    Google Scholar 

  4. Fekete, A., Liarokapis, D., O’neil, E., O’neil, P., Shasha, D.: Making Snapshot Isolation Serializable. ACM Transactions on Database Systems 30(2), 492–528 (2005)

    Article  Google Scholar 

  5. Theodoratos, D., Bouzeghoub, M.: Data Currency Quality Factors in Data Warehouse Design. In: Proceedings of the International Workshop on Design and Management of Data Warehouses, Germany, pp. 1–15 (June 1999)

    Google Scholar 

  6. Krishna Reddy, P., Kitusuregawa, M.: Speculative Locking Protocols to Improve Performance for Distributed Database Systems. IEEE Transactions on Knowledge and Data Engineering 16(2), 154–169 (2004)

    Article  Google Scholar 

  7. Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)

    Google Scholar 

  8. ANSI X3.135-1992, American National Standard for Information Systems- Database Language-SQL (November 1992)

    Google Scholar 

  9. Adya, A., Liskov, B., O’Neil, P.: Generalized Isolation Level Definitions. In: Proceedings of the IEEE International Conference on Data Engineering, IEEE Computer Society Press, Los Alamitos (March 2000)

    Google Scholar 

  10. Garcia-Molina, H., Wiederhold, G.: Read-Only Transactions in a Distributed Database. In: ACM Transactions on Database Systems, pp. 209–234. ACM Press, New York (June 1982)

    Google Scholar 

  11. Satyanarayanan, O.T., Agrawal, D.: Efficient Execution of Read-only Transactions in Replicated Multiversion Databases. IEEE transactions on Knowledge and Data Engineering 5(5), 859–871 (1993)

    Article  Google Scholar 

  12. Mohan, C., Pirahesh, H., Lorie, R.: Efficient and Flexible Methods for Transient Versioning of Records to Avoid Locking by Read-Only Transactions. In: ACM SIGMOD (1992)

    Google Scholar 

  13. Lu, B., Zou, Q., Perrizo, W.: A Dual Copy method for Transaction Separation with Multiversion Control for Read-only Transactions. In: Proceedings of the ACM Symposium on Applied Computing, pp. 290–294 (2001)

    Google Scholar 

  14. Seifert, A., Scholl, M.H.: Processing Read-Only Transactions in Hybrid Data Delivery Environments with Consistency and Currency Guarantees. In: Mobile Networks and Applications, vol. 8, pp. 327–342. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  15. Bestavros, A., Braoudakis, S.: Value-Cognizant Speculative Concurrency Control Protocol. In: Proceedings of 21st Very Large Databases Conference, pp. 122–133 (1995)

    Google Scholar 

  16. Agrawal, D., El Abbadi, A., Lang, A.E.: The Performance of Protocols Based on Locks with Ordered Sharing. IEEE Transactions on Knowledge and Data Engineering 6(5), 805–818 (1994)

    Article  Google Scholar 

  17. Salem, K., Garcimolina, H., Shands, J.: Altruist Locking. ACM Transactions Data base Systems 19(1), 117–165 (1994)

    Article  Google Scholar 

  18. Agrawal, R., Carey, M.J., Livny, M.: Concurrency Control Performance Modeling: Alternatives and Implications. ACM Transactions on Database Systems 12(4), 609–654 (1987)

    Article  Google Scholar 

  19. Kwok-Wa, L., Son, S.H., Lee, V.C.S., Sheung-Lun, H.: Using Separate Algorithms to Process Read-Only Transactions in Real-Time Systems. In: Proceedings of the IEEE Real-Time Systems Symposium, pp. 50–59. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  20. Kam-Yiu, L., Rei-Wei, K., Kao, B., Lee, T.S.H., Cheng, R.: Evaluation of Concurrency Control Strategies for Mixed Soft Real-Time Database Systems. Information Systems Journal 27(2), 123–149 (2002)

    Article  MATH  Google Scholar 

  21. Barracuda E.S.: The highest-capacity drives for the enterprise, (November 2006), http://www.seagate.com/docs/pdf/marketing/po_barracuda_es.pdf

  22. Badrinath, B.R., Ramamirtham, K.: Performance Evaluation of Semantics-based Multilevel Concurrency Control Protocols. In: Proceedings of the ACM SIGMOD Conference, pp. 163–172. ACM Press, New York (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Subhash Bhalla

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ragunathan, T., Reddy, P.K. (2007). Improving the Performance of Read-Only Transactions Through Speculation. In: Bhalla, S. (eds) Databases in Networked Information Systems. DNIS 2007. Lecture Notes in Computer Science, vol 4777. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75512-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75512-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75511-1

  • Online ISBN: 978-3-540-75512-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics