• Title/Summary/Keyword: Locking Protocol

Search Result 40, Processing Time 0.021 seconds

An Efficient Altruistic Looking Protocol for the Mobile Transaction Management System (이동 데이터베이스 시스템을 위한 효율적인 이타적 잠금기법)

  • 권혁신;김세윤;김응모
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.1
    • /
    • pp.53-67
    • /
    • 2004
  • We propose an advanced transaction scheduling protocol to improve the concurrency and to guarantee the mobility for the mobile database management systems. Mobility, portability, and wireless link In mobile computing environment can cause certain drawbacks, and thus it is more difficult to solve the concurrency control problems. However, a locking scheme should be used to guarantee the data consistency and to prevent the data conflicts. It is well known that data consistency is guaranteed by standard transaction scheduling schemes like two-phase locking (2PL). It has two of operation, lock and unlock. But 2PL does not give solution for mobile system. Altruistic Locking (AL) and classifying transactions, we adapt, can give solution for the previous problems. AL, as an advanced protocol, has attempted to reduce delay effects associated with lock release moment by the use of donation. In this paper, we extend those approaches and classify the transactions to reduce delay effects of short-lived transaction caused by long-lived transaction. In addition, we show efficient solution for the case of disconnection occurrence. Our protocol, namely, Mobile Altruistic Locking (MAL) is shown to be efficiently used in order to reduce delay effects and to guarantee database consistency in a state of the slippery connection in mobile database systems.

  • PDF

A Two-way Donation Locking Protocol for Concurrency Control in Multilevel Secure Database (다단계 보안 데이터베이스에서 동시성 제어를 위한 양방향 기부 잠금 규약)

  • 김희완;이혜경;김응모
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.24-31
    • /
    • 2001
  • In this paper, we present an advanced transaction scheduling protocol to improve the degree of concurrency and satisfy the security requirements for multilevel secure database. We adapted two-phase locking protocol, namely traditional syntax-oriented serializability notions, to multilevel secure database. Altruistic locking, as an advanced protocol, has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of altruism has also been deployed for extended altruistic locking OffiLl. This is in a way that scope of data to be early released is enlarged to include even data initially not intended to be donated. We also adapted XAL to multilevel secure database and we first of all investigated limitations inherent in both altruistic schemes from the perspective of alleviating starvation occasions for transactions in particular of short-lived nature for multilevel secure database. Our protocol is based on extended altruistic locking for multilevel secure database (XAL/MLS), but a new method, namely two-way donation locking for multilevel secure database (2DL!/-MLS), is additionally used in order to satisfy security requirements and concurrency. The efficiency of the proposed protocol was verified by experimental results.

  • PDF

Design and Implementation of Real-Time Static Locking Protocol for Main-memory Database Systems (주기억장치 데이타베이스 시스템을 위한 실시간 정적 로킹 기법의 설계 및 구현)

  • Kim, Young-Chul;You, Han-Yang;Kim, Jin-Ho;Kim, June;Seo, Sang-Ku
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.464-476
    • /
    • 2002
  • Main-memory database systems which reside entire databases in main memory are suitable for high-performance real-time transaction processing. If two-phase locking(2PL) as concurrency control protocol is used for the transactions accessing main-memory databases, however, the possibility of lock conflict will be low but lock operations become relatively big overhead in total transaction processing time. In this paper, We designed a real-time static locking(RT-SL) protocol which minimizes lock operation overhead and reflects the priority of transactions and we implemented it on a main-memory real-time database system, Mr.RT. We also evaluate and compare its performance with the existing real-time locking protocols based on 2PL such as 2PL-PI and 2PL-HP. The extensive experiments reveal that our RT-SL outperforms the existing ones in most cases.

A Distributed Altruistic Locking Scheme For Multilevel Secure Database in Wireless Mobile Network Environments (무선 이동 네트워크 환경에서 다단계 보안 데이터베이스를 위한 분산 이타적 잠금 기법)

  • Kim, Hee-Wan;Park, Dong-Soon;Rhee, Hae-Kyung;Kim, Ung-Mo
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.235-242
    • /
    • 2002
  • We propose an advanced transaction scheduling protocol for concurrency control of multilevel secure databases in wireless mobile network environment. Wireless communication is characterized by frequent spurious disconnections. So short-lived transaction must quickly access database without any delay by long-lived one. We adapted two-phase locking protocol, namely traditional syntax-oriented serializability notions, to multilevel secure databases in wireless mobile network environment. Altruistic locking, as an advanced protocol, has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of a1truism has also been deployed for extended a1truistic locking. This is in a way that scope of data to he early released is enlarged to include even data initially not intended to be donated. Our protocol is based on extended altruistic locking, but a new method, namely bi-directional donation locking for multilevel secure databases (MLBiDL), is additionally used in order to satisfy security requirements and concurrency. We showed the Simulation experiments that MLBiDL outperforms the other locking protocols in terms of the degree of throughput and average waiting time.

List Locking Protocol for XML Data Sharing (XML 데이터 공유를 위한 리스트 잠금 프로토콜)

  • Lee Eunjung
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1367-1374
    • /
    • 2004
  • For sharing XML data by many users, a way of concurrency and access control is required for isolating update actions such as inserting and deleting subtrees. Exisiting locking mechanisms as 2PL or MGL suffer low concurrency when applied to tree structures. In this paper, list data subtrees model is proposed based on the semantics expressed in DTD. In this model, tree updating actions such as inserting and deleting subtrees are considered only for the repetitive parts of XML trees. The proposed model guarantees that the result XML tree after applying a tree updating action is always valid, even when multiple users access the tree at the same time. Also, a new locking mechanism called list lock-ing protocol is proposed. The new locking protocol is expected to show better accessility with less number of locking objects compared to the Helmer's OO2PL model. Since update actions on a shared XML tree usually applied to the repetitive parts of the tree, the proposed model is expected to provide a useful way for efficient data sharing when combined with previous locking methods on terminal node data.

The Locking Protocol using Identifier in an Object-Oriented Database Systems (객체지향 데이타베이스 시스템에서 식별자를 이용한 로킹 프로토콜)

  • Bae, Seok-Chan;Hwang, Bu-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.2
    • /
    • pp.154-162
    • /
    • 1994
  • In this paper, a new locking protocol which can increase the concurrency in an Object Oriented Database Systems is proposed. The proposed locking protocol uses the Root object identifier to identify the root of a component object in a composite object. The transaction that requests a lock on the component object checks whether the Rid of the component object has been locked by another transaction. Even though the class of the component object is locked by one transaction, other transactions can concurrently access other instances in the class, if each Rid of them is not locked by any other transactions. This can increase the degree of concurrency.

  • PDF

LIVELOCK-THIN LOCKING PROTOCOL FOR TRANSACTION SCHEDULING IN DISTRIBUTED DATA NETWORK MANAGEMENT (분산망 거래관리를 위한 기아현상 극소화 잠금규약)

  • 이혜경;김응모
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12A
    • /
    • pp.1891-1898
    • /
    • 1999
  • Traditional syntax-oriented serializability notions are considered to be not enough to handle in particular various types of transaction in terms of duration of execution. To deal with this situation, altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of altruism has also been deployed in extended altruistic locking in a way that scope of data to be early released is enlarged to include even data initially not intended to be donated. In this paper, we first of all investigated limitations inherent in both altruistic schemes from the perspective of alleviating starvation occasions for transactions in particular of short-lived nature. The idea of two-way donation locking(2DL) has then been experimented to see the effect of more than single donation in distributed database systems. Simulation experiments shows that 2DL outperforms the conventional two-phase locking in terms of the degree of oncurrency and average transaction waiting time.

  • PDF

A Locking-based Transaction Management Scheme of Database Systems for Supporting Web-based Classes (웹기반 수업을 지원하는 데이터베이스 시스템의 로킹 기반 트랜잭션 관리기법)

  • Park, Chan-Jung;Kim, Han-Il
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.2
    • /
    • pp.51-61
    • /
    • 2001
  • With the advance of computer and communication technologies, a lot of virtual schools provide web-based classes that provide learning environments out of temporal and spatial constraints and many research works on the web-based classes have been proposed. Various techniques are required to build the virtual schools efficiently. One of them is the scheme for transaction management. However, existing transaction management schemes have inappropriate features for supporting web-based classes. In this paper, we propose a new locking-based transaction processing protocol that satisfies the requirements after presenting the requirements for transaction management to support web-based classes. In the protocol, a new method, called mark, is adopted to satisfy the requirements. The proposed protocol also eliminates unnecessary delays or abortions and thus, the proposed protocol can improve the performance of database systems.

  • PDF

A Proposal on Data Priority Based Transaction Scheduling Algorithm and the Comparative Performance Evaluation in Real Time Database Management System (데이타 우선순의에 기초한 트랜잭션 스체줄링 알고리즘의 제안 및 실시간 DBMS에서의 성능 비교연구)

  • Yun, Seok-Hwan;Lee, Jae-Yeong;Park, Chi-Hang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.803-816
    • /
    • 1996
  • It is possible to prevent deadlock if the priority which is conventionally given to transactions is endowed to data items and the transactions with the highest priority among transactions accessing the data item is allowed to proceed. Based on this observation, we proposed a Data-Priority Based Locking Protocol(DPLP) and evaluated its performance against known locking protocols in Real Time Database Management System(RTDBMS). Transaction inter-arrival time(IAT) was varied to determine success ratio, average-lateness, confict ratio and restart ratio, In these simulations we verified that the proposed DPLP performs better than the other protocols.

  • PDF

Optimistic Concurrency Control for Secure Real-Time Database Systems (실시간 보안 데이타베이스 시스템을 위한 낙관적 동시성 제어 기법)

  • Kim, Dae-Ho;Jeong, Byeong-Soo;Lee, Sung-Young
    • Journal of KIISE:Databases
    • /
    • v.27 no.1
    • /
    • pp.42-52
    • /
    • 2000
  • In many real time applications that the system maintains sensitive information to be shared by multiple users with different security levels, security is another important requirement. A secure real time database system must satisfy not only logical data consistency but also timing constrains and security requirements associated with transactions. Even though an optimistic concurrency control method outperforms locking based method in firm real time database systems, where late transactions are immediately discarded, most existing secure real time concurrency control methods are based on locking. In this paper, we propose a new optimistic concurrency control protocol for secure real time database systems, and compare the performance characteristics of our protocol with locking based method while varying workloads. The result shoes that our proposed O.C.C protocol has good performance in case of many data conflict.

  • PDF