Locking and deadlock detection in distributed data bases
DA Menasce, RR Muntz - IEEE Transactions on Software …, 1979 - ieeexplore.ieee.org
IEEE Transactions on Software Engineering, 1979•ieeexplore.ieee.org
This paper descrbes two protocols for the detection of deadlocks in distributed data bases–a
hierarchically organized one and a distributed one. A graph model which depicts the state of
execution of all transactions in the system is used by both protocols. A cycle in this graph is a
necessary and sufficient condition for a deadlock to exist. Nevertheless, neither protocol
requires that the global graph be built and maintained in order for deadlocks to be detected.
In the case of the hierarchical protocol, the communications cost can be optimized if the …
hierarchically organized one and a distributed one. A graph model which depicts the state of
execution of all transactions in the system is used by both protocols. A cycle in this graph is a
necessary and sufficient condition for a deadlock to exist. Nevertheless, neither protocol
requires that the global graph be built and maintained in order for deadlocks to be detected.
In the case of the hierarchical protocol, the communications cost can be optimized if the …
This paper descrbes two protocols for the detection of deadlocks in distributed data bases–a hierarchically organized one and a distributed one. A graph model which depicts the state of execution of all transactions in the system is used by both protocols. A cycle in this graph is a necessary and sufficient condition for a deadlock to exist. Nevertheless, neither protocol requires that the global graph be built and maintained in order for deadlocks to be detected. In the case of the hierarchical protocol, the communications cost can be optimized if the topology of the hierarachy is appropriately chosen.
ieeexplore.ieee.org