Skip to main content

Restart-Oriented Locking Methods

  • Chapter
Database Concurrency Control

Part of the book series: The Springer International Series on Advances in Database Systems ((ADBS,volume 1))

  • 89 Accesses

Abstract

Restart-oriented locking methods combine blocking and aborts (followed by restarts) to cope with the performance limits of standard locking. A subset of restart-oriented locking methods limit the wait depth of blocked transactions, where the wait depth is the distance of a blocked transaction from active transactions in the waits-for graph (it is shown below that this directed graph is acyclic). Wait depth limited methods are a subset of restart-oriented locking methods which limit d to a small value, d = 0 in the case of the no-waiting method and d = 1 in the case of some other methods discussed in this chapter. The wait depth limited WDL method [FrRT92] is a subset of wait depth limited methods, which in selecting the transaction to be aborted takes into account the progress made by conflicting transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. P. Franaszek, J. T. Robinson, and A. Thomasian. “Concurrency control for high contention environments,” ACM Transactions on Database Systems 17, 2 (June 1992), 304–345.

    Google Scholar 

  2. Y. C. Tay, R. Suri, and N. Goodman. “A mean value performance model for locking in databases,” Journal of the ACM 32, 3 (July 1985), 618–651.

    MathSciNet  Google Scholar 

  3. R. Agrawal, M. J. Carey, and M. Livny. “Concurrency control performance modeling: Alternatives and implications,” ACM Transactions on Database Systems 12, 4 (December 1987), 609–654.

    Google Scholar 

  4. P. Franaszek and J. T. Robinson. “Limitations of concurrency in transaction processing,” ACM Transactions on Database Systems 10, 1 (March 1985), 1–28.

    Article  MATH  Google Scholar 

  5. P. A. Franaszek, J. T. Robinson, and A. Thomasian. “Adaptive concurrency control scheme for transaction processing,” IBM Technical Disclosure Bulletin 33, 9 (February 1991), 29–30.

    Google Scholar 

  6. M. Hsu and B. Zhang. “Performance evaluation of cautious waiting,” ACM Transactions on Database Systems 17, 3 (September 1992), 477–512.

    Google Scholar 

  7. A. Thomasian. “A performance comparison of locking policies with limited wait depth,” IEEE Transactions on Knowledge and Data Engineering, to appear (also IBM Research Report RC 19967, Hawthorne, NY, February 1993 ).

    Google Scholar 

  8. D. J. Rosenkrantz, R. E. Stearns, and P. M. Lewis II. “System level concurrency control for distributed database systems.” ACM Transactions on Database Systems 3, 2 (June 1978), 178–198.

    Google Scholar 

  9. R. Agrawal, M. J. Carey, and L. W. McVoy. “The performance of alternative strategies for dealing with deadlocks in database management systems,” IEEE Transactions on Software Engineering 13, 12 (December 1987), 1348–1363.

    Google Scholar 

  10. A. Chesnais, E. Gelenbe, and I. Mitrani. “On the modeling of parallel access to shared data,” Communications of the ACM 26, 3 (March 1983), 198–202.

    Google Scholar 

  11. P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems, Addison-Wesley, 1987.

    Google Scholar 

  12. J. N. Gray and A. Reuter. Transaction Processing: Concepts and Facilities, Morgan Kauffman, 1992.

    Google Scholar 

  13. I. K. Ryu and A. Thomasian. “Performance analysis of dynamic locking with the no-waiting method,” IEEE Transactions on Software Engineering 16, 7 (July 1990), 684–698.

    Article  Google Scholar 

  14. Y. C. Tay. Locking Performance in Centralized Databases, Academic Press, 1987.

    Google Scholar 

  15. S. Tasaka. Performance Analysis of Multiple Access Protocols, MIT Press, 1986.

    Google Scholar 

  16. A. Thomasian. “Performance analysis of locking policies with limited wait depth,” Proceedings Performance 92 and ACM SIGMETRICS Joint Conference Conference on Measurement and Modeling of Computer Systems, Newport, RI, June 1992, pp. 115–127.

    Google Scholar 

  17. M. Hsu and B. Zhang. “Performance evaluation of cautious waiting,” ACM Transactions on Database Systems 17, 3 (September 1992), 477–512.

    Google Scholar 

  18. G. Weikum, C. Hasse, A. Moenkeberg, and P. Zabback. “The COMFORT automatic tuning project, Information Systems 19, 5 (1994), 381–432.

    Article  Google Scholar 

  19. L. Kleinrock. Queueing Systems, Volume I: Theory, John Wiley and Sons, 1975.

    Google Scholar 

  20. P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems, Addison-Wesley, 1987.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer Science+Business Media New York

About this chapter

Cite this chapter

Thomasian, A. (1996). Restart-Oriented Locking Methods. In: Database Concurrency Control. The Springer International Series on Advances in Database Systems, vol 1. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-2473-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-2473-8_4

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-5161-8

  • Online ISBN: 978-1-4757-2473-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics