Book ChapterDOI
A Reliable Nested Transaction Model with Extension of Real-Time Characteristics
Seung-Jin Moon,Sanghoon Lee +1 more
- pp 123-142
Reads0
Chats0
TLDR
A reliable nested transaction model with realtime characterization, based upon the concept of subtransactions, is presented, yielding an integrated concurrency control and scheduling algorithm that guarantees timing constraints of a set of nested transactions and maintains consistency of the database.Abstract:
This paper focuses on the simpler problem of scheduling reliable nested transaction for a single processor. As real-time systems are becoming more complex and more distributed, a concept of nested transactions proposed by Moss are needed to provide flexibility and performance in distributed complex and dynamic systems. Mosss model is extended to hard real-time systems by the addition of explicit timing constraints. Though the model allows multiprocessor and distributed implementations, solving a real-time nested transaction model scheduling problem for a single processor is viewed first step toward solving the more general problem. The concepts of ACID properties: atomicity, consistency, isolation and durability are extended to nested transaction. A reliable nested transaction model with realtime characterization, based upon the concept of subtransactions, is presented. For a single-processor environment, the well-known Priority Ceiling Protocol can be extended to support the reliable nested transaction model, yielding an integrated concurrency control and scheduling algorithm that guarantees timing constraints of a set of nested transactions and maintains consistency of the database. It can be verified that the Real-Time Nested Priority Ceiling Protocol prevents unbounded blocking and deadlock, and maintains the serializability of a set of hard real-time transactions.read more
Citations
More filters
Journal ArticleDOI
Transaction scheduling protocols for controlling priority inversion: A review
Sarvesh Pandey,Udai Shanker +1 more
TL;DR: The objective is to comprehensively discuss the state-of-the-art transaction scheduling protocols with an emphasis on the handling of execute–execute & execute–commit conflicts, and real-time optimistic concurrency control (OCC) protocols.
Book ChapterDOI
EDRC: An Early Data Lending-Based Real-Time Commit Protocol
Sarvesh Pandey,Udai Shanker +1 more
Journal ArticleDOI
Research on the Cost of Open Nested Transaction in the Open Reconfigurable Network
TL;DR: This paper builds the cost model of the path deployment of three kinds of sub-transactions execution and proposes the optimal way to execute nested transaction in the ORN, based on the comprehensive consideration of cost and time.
Journal ArticleDOI
Research on Time Performance of Dynamic Nested Transactions in Open Reconfigurable Network
TL;DR: This paper proposed the dynamic nested transaction algorithm on the basis of the existing nested transaction and established the nested transaction mathematical model in the ORN, and proved the superiority of the model compared with the traditional model through mathematical analysis.
References
More filters
Journal ArticleDOI
Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment
C. L. Liu,James W. Layland +1 more
TL;DR: The problem of multiprogram scheduling on a single processor is studied from the viewpoint of the characteristics peculiar to the program functions that need guaranteed service and it is shown that an optimum fixed priority scheduler possesses an upper bound to processor utilization.
Book
Concurrency Control and Recovery in Database Systems
TL;DR: In this article, the design and implementation of concurrency control and recovery mechanisms for transaction management in centralized and distributed database systems is described. But this can lead to interference between queries and updates.
Journal ArticleDOI
Priority inheritance protocols: an approach to real-time synchronization
TL;DR: An investigation is conducted of two protocols belonging to the priority inheritance protocols class; the two are called the basic priority inheritance protocol and the priority ceiling protocol, both of which solve the uncontrolled priority inversion problem.
Journal ArticleDOI
The notions of consistency and predicate locks in a database system
TL;DR: It is argued that a transaction needs to lock a logical rather than a physical subset of the database, and an implementation of predicate locks which satisfies the consistency condition is suggested.
Journal ArticleDOI
Principles of transaction-oriented database recovery
Theo Haerder,Andreas Reuter +1 more
TL;DR: A terminological framework is provided for describing different transactionoriented recovery schemes for database systems in a conceptual rather than an implementation-dependent way by introducing the terms materialized database, propagation strategy, and checkpoint, and a means for classifying arbitrary implementations from a unified viewpoint.