Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Bounded ignorance: a technique for increasing concurrency in a replicated system

Published: 01 December 1994 Publication History

Abstract

Databases are replicated to improve performance and availability. The notion of correctness that has commonly been adopted for concurrent access by transactions to shared, possibly replicated, data is serializability. However, serializability may be impractical in high-performance applications since it imposes too stringent a restriction on concurrency. When serializability is relaxed, the integrity constraints describing the data may be violated. By allowing bounded violations of the integrity constraints, however, we are able to increase the concurrency of transactions that execute in a replicated environment. In this article, we introduce the notion of an N-ignorant transaction, which is a transaction that may be ignorant of the results of at most N prior transactions, which is a transaction that may be ignorant of the results of at most N prior transactions. A system in which all transactions are N-ignorant can have an N + 1-fold increase in concurrency over serializable systems, at the expense of bounded violations of its integrity constraints. We present algorithms for implementing replicated databases in N-ignorant systems. We then provide constructive methods for calculating the reachable states in such systems, given the value of N, so that one may assess the maximum liability that is incurred in allowing constraint violation. Finally, we generalize the notion of N-ignorance to a matrix of ignorance for the purpose of higher concurrency.

References

[1]
AGRAWAL, D. AND MALPANI, A. 1991. Efficient dissemination of information in computer networks. Comput. J. 34, (Dec.), 534-541.
[2]
ALONSO, R., BARBARA, D., AND GARCIA-MOLINA, H. 1988. Quasi-copies: Efficient data sharing for reformation retrieval systems. In Advances' tn Database Technology--EDBT 88, J. W. Schmidt, S. Ceri, and M. Missikoff, Eds. Lecture Notes in Computer Science, vol. 303. Springer-Verlag, New York, 443 468.
[3]
BARBARA, D. AND GARCIA-MOLINA, H. 1992. The demarcation protocol: A technique for maintaining arithmetic constraints in dmtributed database systems. In Proceedings of the International Conference on Extending Data Base Technology. Springer-Verlag, New York.
[4]
BERNSTEIN, P. A., HADZILACOS, Y., AND GOODMAN, N. 1987. Concurrency Control and Recovery ~n Database Systems. Addison-Wesley, Reading, Mass.
[5]
BIRMAN, K., SCHIPER, A., AND STEPHENSON, r. 1991. Light causal and atomic multicast. Tech. Rep. TR-91-1192, Cornell Univ., Ithaca, N. Y.
[6]
BmRELL, A. D., LEVIN, R., NEEDHAM, R. M., AND SCHRODER, M.D. 1982. Grapevine: An exercise in distributed computing. Commun. ACM 25, 4 (Apr.), 260-274.
[7]
DURFEE, ~. H., LESSER, V. R. AND CORKILL, D.D. 1987. Cooperation through communication in a distributed problem solving network. In Dtstributed Artificial Intelltgence, M. N. Huhns, Ed. Research Notes in Artificial Intelligence. Morgan Kaufmann, San Mateo, Calif.
[8]
ELMAGARMID, A., ED. 1991. Data Eng. Bull. 14, 1 (Mar.).
[9]
ESWARAN, K. P., GRAY, J. N., LORIE, R. A., AND TRAIGER, I.L. 1976. The notion of consistency and predmate locks m a database system. Comrnun ACM 19, 11 (Nov.) 624 633.
[10]
FAnRACL A. A. AND OZSU, M T 1990. Usmg semantic knowledge of transactions to increase concurrency. ACM Trans Database 5(~st. 15, 2 (Mar.), 484 502.
[11]
FISCHER, M. J. AND MICHAEL, A. 1982 Sacrificing seriahzability to attain high avafiabfilty of data in an unreliable network In Proceedings of the ACM SIGACT-SIGMOD Symposium on Principles of Database Systems. ACM, New York, 70-75.
[12]
GARCLk-MOLINA, H. 1983. Usmg semantic knowledge for transaction processing in a d~stributed database. ACM Trans. Database Syst, 8, 2 (June), 186 213.
[13]
GARCIA-MOLINA, H., GAWLICK, D, KLEIN, J., KLEISSNER, a., AND SALEM, K. 1991. Modeling' long-running activities as nested sagas. Data Eng. Bull. 14, 1 (Mar.), 39 43.
[14]
GOLDING, R.A. 1992. The timestamped anti-entropy weak-consistency group communication protocol Tech Rap UCSC-CRL-92-29, Univ, of California, Santa Cruz, Calif.
[15]
GRAY, J.N. 1978. Notes on database operating systems. In Operating Systems: An Advanced Course. Lecture Notes in Computer Science, voL 60. Sprmger-Verlag, Berlin, 393-481
[16]
HEDDAYA, A., HSU, M., ANU WE1HL, W.E. 1989. Two phase gossip. Managing distributed event histories Inf Scz. 49, 1, 35 57
[17]
HEnLIHY, M.P. 1990. Apologizing versus askmg permmslon' Optimistic concurrency control for abstract data types. ACM Trans. Database Syst 15, i (Mar), 96-124.
[18]
HERLIHY, M P. 1987 Concurrency vs availability: Atomicity mechanisms for replicated data ACM Trans. Carnput Syst 5, 3 (Aug.), 249-274.
[19]
HERLmY, M P. ANn WEmL, W E. 1988 Hybrid concurrency control for abstract data types In Proceedings of the ACM Symposium on Principles of Database Systems. ACM, New York, 201-210.
[20]
HERLIHY, M. P. AND Wm'G, J M. 1987. Specifying graceful degradation in distributed systems In Proceedings of the 6th Annual ACM Symposium on Principles of Dzstrtbuted Cornputmg. ACM, New York, 167-177.
[21]
HERMAN, D. 1983. Towards a systematic approach to implement distributed control of synchromzatmn. In Distributed Computing Sysierns~ Y Paker, and J.-P. Veljus, Eds. Academic Press, New York, 3 22
[22]
JEFFERSON, D. 1985. Virtual time. ACM 7kans, Program Lang. Syat 7, 3 (July), 404-425
[23]
KIM, J H, PARK, K H, ANU KIM, M 1989. A model of distributed control Dependency and uncertainty Inf Proce.~'s'. Lett 30, i (Jan.), 73 77
[24]
KORTH, H. ANl> SPEEGLE, G. 1988. Formal model of correctness without seriahzabfiity. In Proceedings o/ the ACM SIGMOD Internatmnal Conference on Management of Data. ACM, New York, 379-388
[25]
KORTH, H, KiM, W., AND BANCILHON, F. 1988. On long-duratmn CAD transactmns. In/ Scz. 46.
[26]
KO~Tm H F, Lr;vY, E., AND SmnaaCnATZ, A. 1990. A formal approach to recovery by compensating transactions. In Proceedings of the 16 Internatmnal Conference on Very Large Data Base VLDB Endowment, 95-106.
[27]
KRISHNAKUMAR, N. 1992. Increasing concurrency and autonomy in replicated database systems Ph.D. thes~s, State Univ. of New York, Stony Brook, N Y.
[28]
KmSHNAKUMAn, N. 1991. On computing serial dependency relations. Tech. Rep. SUSB-TR-91- 10, State Umv. of New York, Stony Brook, N, Y. To appear m J Cornput. Syst Sca
[29]
KRISHNAKUMAR, N. AND BERNSTEIN, A. 1992 High throughput escrow algorithms for replicated databases. In Proceedings o/the 18 International Conference on Very Large Data Bases. VLDB Endowment, 175 186
[30]
KRISHNAKUMAR, N. AND BERNSTEIN, A J. 1990 Bounded ignorance in replicated systems Tech. Rep SUSB-TR-90-29, State Umv. of New York, Stony Brook, N. Y.
[31]
LADIN, R, LISKOV, B., AND SHRIRA, L. 1990. Lazy replicatmn: Exploiting the semantics of distributed serwces. In Proceedings of the 9th Annual ACM Syrnposzum on Prmczples of Dzstrtbuted Computing ACM, New York
[32]
LAMPORT, L. 1978 Time, clocks and ordenng of events in a dmtnbuted system. Contmun ACM 21, 7 (July), 558 565.
[33]
LEVY, E, KORTH, H, AND SILBERSCHATZ, m. 1991. A theory of relaxed atomicity In Proceedings o/the 10 Annual AC~I Symposturn on Prtnctp{es of Dzstrtbuted Compuhng. ACM, New York.
[34]
LISKOV, B., LADIN, R., AND SHRIRA, L. 1988. A technique for constructing highly available distributed services. Algorithmtca 3, 393 420.
[35]
LYNCH, N.A. 1983. Multilevel atomicity a new correctness criterion for database concurrency control. ACM Trans. Database Syst. 8, 4 (Dec.), 484-502.
[36]
LYNCH, N. A., BLAUSTEIN, B. T., AND SIEGEL, M. 1986. Correctness conditmns for highly available replicated databases. In Proceedings of the 5th Annual ACM Sympostum on Principles of Dtstributed Computing. ACM, New York, 11 28.
[37]
O'NEIL, P.E. 1986. The escrow transactional model. ACM Trans. Database Syst. 11, 4 (Dec.), 405-430.
[38]
PAIGE, R. 1990. Symbolic finite differencing--part i. In the European Symposium on Prograraming. Sprmger-Verlag, New York, 36-56.
[39]
Pu, C. AND LEFF, A. 1991. Execution autonomy m distributed transaction processing. Tech. Rep. CUCS-024-91 Columbia Univ., New York.
[40]
QIAN, X. AND WIEDERHOLD, G. 1986. Knowledge-based integrity constraint validation. In Proceedings of the 12 Internalzonal Conference on Very Large Data Bases. VLDB Endowment, 3 12.
[41]
REUTER, A. AND WACHTER, H. 1991. The contract model. Data Eng. Bull. 14, 1 (Mar.), 39 43.
[42]
RUSINKIEWICZ, M. AND SHETH, A. 1991. Polytransactions for managing interdependent data Data Eng. Bull. 14, 1 (Mar.), 39 43.
[43]
RUSiNKmW~CZ, M., SHETH, A., AND I~R^B^?IS, G. 1991. Specifying interdatabase dependencies in multidatabase environments. Tech. Rep. TM-STS-018609/1, Bellcore, Morristown, N J.
[44]
SARIN, S. K. 1986. Robust application design in highly available distributed databases. In Proceedings of the 5th Symposium on Reliability in Distributed Software and Database Systems. IEEE, New York, 87-94.
[45]
SARIN, S. K., DEWITT, M., AND ROSENBURG, R. 1988. Overview of SHARD: A system for highly available replicated data. Tech. Rep. CCA-88-01, Computer Corp. of America, Boston, Mass.
[46]
SAraN, S. K., KAUFMAN, C. W., AND SOME~S, J.E. 1986. Using history information to process delayed database updates. In Proceedzngs of the 12 International Conference on Very Large Data Bases. VLDB Endowment, 71-78.
[47]
SHA, L., LEHOCZKY, J. P., AND JENSEN, E.D. 1988. Modular concurrency control and failure recovery. 1EEE Trans. Comput. 37, 2 (Feb.), 146 159
[48]
SHETH, A, LEU, Y., AND ELMAGARMiD, A. 1991. Maintaining consistency of interdependent data in multidatabase systems. Tech. Rep. TM-STS-019409/1, Bellcore, Mornstown, N. J.
[49]
SKEEN, M.D. 1!)82. Crash recovery in a distributed database system. Ph.D. thesis, Univ. of California, Berkeley, Calif.
[50]
VER,JUS, J.-P. 1983. Synchronization in distributed systems. In Dtstrtbuted Computtng Systems, Y. Paker and J.-P Verjus, Eds. Academic Press, New York, 3 22.
[51]
WEIHL, W.E. 1989. Local atomicity propertms: Modular concurrency control for abstract data types. ACM Trans. Program. Lang. Syst. 11, 2 (Apr.), 249 282.
[52]
WEmL, W.E. 1988. Commutativity-based concurrency control for abstract data types. IEEE Trans. Comput 37, 12 (Dec.), 1488-1505.
[53]
WEIKUM, G. AND SCHEK, H.-J. 1991. Multi-level transactions and open-nested transactions. Data Eng. Bull. 14, i (Mar.), 39-43.
[54]
WON% M. H. AND ACmAWAL, D. 1992. Tolerating bounded inconsistency for increasing concurrency in database systems. In Proceedings of the 11th ACM SIGACT-SIGMOD Symposzum on Principles of Database Systems. ACM, New York, 236-245.
[55]
Wuu, G. T. J. AND BERNSTEIN, A. 1984. Efficient solutions to the replicated log and dictionary problems. In Proceedings of the 3rd Annual ACM Symposium on Prtnczples of Dtstnbuted Computing. ACM, New York, 233-244.

Cited By

View all
  • (2022)BFT in Blockchains: From Protocols to Use CasesACM Computing Surveys10.1145/350304254:10s(1-37)Online publication date: 13-Sep-2022
  • (2014)Interest Aware Consistency for Cooperative Editing in Heterogeneous EnvironmentsInternational Journal of Cooperative Information Systems10.1142/S021884301440002423:01(1440002)Online publication date: Mar-2014
  • (2013)Adaptive Consistency and Awareness Support for Distributed Software DevelopmentOn the Move to Meaningful Internet Systems: OTM 2013 Conferences10.1007/978-3-642-41030-7_16(259-266)Online publication date: 2013
  • Show More Cited By

Recommendations

Reviews

Asuman Dogac

The authors present a method to increase concurrency in a replicated database system. For this purpose, the notion of N -ignorance is introduced. An N -ignorant transaction does not need to see the results of at most N prior transactions that it would have seen if serializability had been enforced as the correctness criterion. By relaxing the correctness criterion and allowing bounded violations of the integrity constraints, concurrency can be increased N+1 -fold compared to a serializable system. In an N -ignorant system, each transaction enforces a set of integrity constraints on its view of the database, but only the weakened constraint set needs to be enforced globally. This allows a transaction executing at a replica site to be unaware of N concurrently executing transactions at other sites. Thus, by relaxing the integrity constraint, N+1 transactions can run concurrently in the system, as against just one in the serializable case. Violations of the integrity constraints are formalized as a function of the number of conflicting transactions that can execute concurrently. To increase the autonomy of sites in executing transactions, the work aims at reducing the number of sites that a site has to communicate with after a transaction is submitted. The algorithms to guarantee that a transaction is no more than N -ignorant, and hence the relaxed constraints always hold, are presented in section 4. In these algorithms, quorum locking controls the number of transactions that can simultaneously access replicas of the same data object. Gossip messages are used to limit the extent to which a site may be ignorant of the effects of prior transactions executed at nonquorum sites. An extension to the algorithms is given to allow transactions that access disjoint data sets to run concurrently. The authors argue that, to verify that a given N -ignorant system is correct according to their relaxed definition of correctness, it is necessary to determine its reachable states and demonstrate that they do not violate the relaxed constraints. A systematic analysis of reachable states of the system is provided in section 5. The technique is useful in systems where transactions make incremental changes to the database state. How the system behaves in the case of failures or deadlock is not clear, however. Also, a performance comparison of an N -ignorant system with other systems would have been useful to give an idea of how well the technique proposed performs in real life.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 1994
Published in TODS Volume 19, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. concurrency control
  2. integrity constraints
  3. reachability analysis
  4. replication
  5. serializability

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)5
Reflects downloads up to 28 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)BFT in Blockchains: From Protocols to Use CasesACM Computing Surveys10.1145/350304254:10s(1-37)Online publication date: 13-Sep-2022
  • (2014)Interest Aware Consistency for Cooperative Editing in Heterogeneous EnvironmentsInternational Journal of Cooperative Information Systems10.1142/S021884301440002423:01(1440002)Online publication date: Mar-2014
  • (2013)Adaptive Consistency and Awareness Support for Distributed Software DevelopmentOn the Move to Meaningful Internet Systems: OTM 2013 Conferences10.1007/978-3-642-41030-7_16(259-266)Online publication date: 2013
  • (2013)Transaction Management in Mobile Database SystemsFundamentals of Pervasive Information Management Systems10.1002/9781118647714.ch07(127-218)Online publication date: Jul-2013
  • (2012)Adaptive consistency for replicated state in real-time-strategy multiplayer gamesProceedings of the 11th International Workshop on Adaptive and Reflective Middleware10.1145/2405679.2405682(1-7)Online publication date: 3-Dec-2012
  • (2012)Maintaining Data Consistency in Structured P2P SystemsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2012.8123:11(2125-2137)Online publication date: 1-Nov-2012
  • (2012)Distributed Virtual Environments: From client server to cloud and P2P architectures2012 International Conference on High Performance Computing & Simulation (HPCS)10.1109/HPCSim.2012.6266885(8-17)Online publication date: Jul-2012
  • (2012)Semantic and Locality Aware Consistency for Mobile Cooperative EditingOn the Move to Meaningful Internet Systems: OTM 201210.1007/978-3-642-33606-5_23(380-397)Online publication date: 2012
  • (2010)Replicating for performanceReplication10.5555/2172338.2172343(73-89)Online publication date: 1-Jan-2010
  • (2010)Unifying divergence bounding and locality awareness in replicated systems with vector-field consistencyJournal of Internet Services and Applications10.1007/s13174-010-0011-x1:2(95-115)Online publication date: 21-Aug-2010
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media