Abstract
A read-only transaction (ROT) does not modify any data. The main issues regarding processing ROTs are correctness, data currency and performance. Two-phase Locking (2PL) protocol is widely used for concurrency control with serializabilty as correctness criteria. Even though 2PL processes ROTs correctly with no data currency related issues, the performance deteriorates as data contention increases. To improve the performance over 2PL, snapshot isolation (SI)-based protocols have been proposed. SI-based protocols process ROTs by reading from a snapshot of the committed data and ignoring the modifications produced by the concurrent active transactions. Even though SI-based algorithms improve the performance of ROTs, both data currency of ROTs and correctness (serializability) are compromised. In this paper, we propose an approach to improve the performance of ROTs using speculation without compromising data currency of transactions and correctness. The proposed approach improves the performance of ROTs by trading extra computing resources without violating serializability as correctness criteria. The simulation results show that with the proposed protocol the throughput performance is improved significantly over 2PL and SI-based approaches with manageable extra resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Eswaran, K., Gray, J., Lorie, R., Traiger, I.: The notions of consistency and predicate locks in database systems. Communications of the ACM 19(11), 624–633 (1976)
Gray, J., Reuter, A.: Transaction Processing: Concepts and techniques. Morgan Kaufmann, San Francisco (1993)
Berenson, H., Bernstein, P., Gray, J., Melton, J., O’Neil, E., O’Neil, P.: A Crtique of ANSI SQL Isolation Levels. ACM SIGMOD (1995)
Fekete, A., Liarokapis, D., O’neil, E., O’neil, P., Shasha, D.: Making Snapshot Isolation Serializable. ACM Transactions on Database Systems 30(2), 492–528 (2005)
Theodoratos, D., Bouzeghoub, M.: Data Currency Quality Factors in Data Warehouse Design. In: Proceedings of the International Workshop on Design and Management of Data Warehouses, Germany, pp. 1–15 (June 1999)
Krishna Reddy, P., Kitusuregawa, M.: Speculative Locking Protocols to Improve Performance for Distributed Database Systems. IEEE Transactions on Knowledge and Data Engineering 16(2), 154–169 (2004)
Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)
ANSI X3.135-1992, American National Standard for Information Systems- Database Language-SQL (November 1992)
Adya, A., Liskov, B., O’Neil, P.: Generalized Isolation Level Definitions. In: Proceedings of the IEEE International Conference on Data Engineering, IEEE Computer Society Press, Los Alamitos (March 2000)
Garcia-Molina, H., Wiederhold, G.: Read-Only Transactions in a Distributed Database. In: ACM Transactions on Database Systems, pp. 209–234. ACM Press, New York (June 1982)
Satyanarayanan, O.T., Agrawal, D.: Efficient Execution of Read-only Transactions in Replicated Multiversion Databases. IEEE transactions on Knowledge and Data Engineering 5(5), 859–871 (1993)
Mohan, C., Pirahesh, H., Lorie, R.: Efficient and Flexible Methods for Transient Versioning of Records to Avoid Locking by Read-Only Transactions. In: ACM SIGMOD (1992)
Lu, B., Zou, Q., Perrizo, W.: A Dual Copy method for Transaction Separation with Multiversion Control for Read-only Transactions. In: Proceedings of the ACM Symposium on Applied Computing, pp. 290–294 (2001)
Seifert, A., Scholl, M.H.: Processing Read-Only Transactions in Hybrid Data Delivery Environments with Consistency and Currency Guarantees. In: Mobile Networks and Applications, vol. 8, pp. 327–342. Kluwer Academic Publishers, Dordrecht (2003)
Bestavros, A., Braoudakis, S.: Value-Cognizant Speculative Concurrency Control Protocol. In: Proceedings of 21st Very Large Databases Conference, pp. 122–133 (1995)
Agrawal, D., El Abbadi, A., Lang, A.E.: The Performance of Protocols Based on Locks with Ordered Sharing. IEEE Transactions on Knowledge and Data Engineering 6(5), 805–818 (1994)
Salem, K., Garcimolina, H., Shands, J.: Altruist Locking. ACM Transactions Data base Systems 19(1), 117–165 (1994)
Agrawal, R., Carey, M.J., Livny, M.: Concurrency Control Performance Modeling: Alternatives and Implications. ACM Transactions on Database Systems 12(4), 609–654 (1987)
Kwok-Wa, L., Son, S.H., Lee, V.C.S., Sheung-Lun, H.: Using Separate Algorithms to Process Read-Only Transactions in Real-Time Systems. In: Proceedings of the IEEE Real-Time Systems Symposium, pp. 50–59. IEEE Computer Society Press, Los Alamitos (1998)
Kam-Yiu, L., Rei-Wei, K., Kao, B., Lee, T.S.H., Cheng, R.: Evaluation of Concurrency Control Strategies for Mixed Soft Real-Time Database Systems. Information Systems Journal 27(2), 123–149 (2002)
Barracuda E.S.: The highest-capacity drives for the enterprise, (November 2006), http://www.seagate.com/docs/pdf/marketing/po_barracuda_es.pdf
Badrinath, B.R., Ramamirtham, K.: Performance Evaluation of Semantics-based Multilevel Concurrency Control Protocols. In: Proceedings of the ACM SIGMOD Conference, pp. 163–172. ACM Press, New York (1990)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ragunathan, T., Reddy, P.K. (2007). Improving the Performance of Read-Only Transactions Through Speculation. In: Bhalla, S. (eds) Databases in Networked Information Systems. DNIS 2007. Lecture Notes in Computer Science, vol 4777. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75512-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-75512-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75511-1
Online ISBN: 978-3-540-75512-8
eBook Packages: Computer ScienceComputer Science (R0)