• Keine Ergebnisse gefunden

DISTRIBUTED LOCKING PROTOCOLS – OVERVIEW

N/A
N/A
Protected

Academic year: 2022

Aktie "DISTRIBUTED LOCKING PROTOCOLS – OVERVIEW"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Non-Standard Database Systems Nikolaus Augsten

DISTRIBUTED LOCKING PROTOCOLS – OVERVIEW

Single-Lock Manager Primary Copy Majority Biased

Deadlock Handling Centralized Distributed Distributed Distributed

Availability (*) global SPoF

(central lock manager)

SPoF per data itemQ (primary copy ofQ)

No SPoF

(bn2c+ 1 replicas must be up)

Read: No SPoF

Write: all nreplicas of Q must be up

Bottleneck Yes No No No

Supports Replicas Yes Yes Yes Yes

# of Messages Read: 2 Write: 2 Unlock: 1

Read: 2 Write: 2 Unlock: 1

Read/Write: 2 bn2c+ 1 Unlock: bn2c+ 1

Read: 2 Write: 2n

Unlock: Read: 1, Write: n

Read from Replicas Any Any Any Any

Write to Replicas All All All All

SPoF Single Point of Failure

Q data item to be locked / unlocked n number of replicas for a data itemQ

(*) The availability discussion is limited to lock requests only. Even if a lock is granted, depending on the replication policy it may not be possible to write. For example, the majority protocol grants a write lock if more than half of the replicas are available, but the replication policy may require writes to be executed on all replicas, which requiresall replicas to be available.

Database Research Group Department of Computer Sciences

University of Salzburg

1

Referenzen

ÄHNLICHE DOKUMENTE

A transaction may be granted a lock on an item if the requested lock is compatible with locks already held on the item by other transactions Any number of transactions can hold

In particular, the overall power demand of the network is optimized by using flexibilities resulting from distributed storage devices and controllable loads..

With a growing number of people in transfer to other companies in the group or to affiliated firms, the Japanese companies try to maintain their competitiveness.. Since long

Whereas bathing had been considered to be a normal and respectable activity for most of the medieval period, when bath houses were used regularly by men and women, both Christians

3.3.1 Euclidean on-shell action in a fundamental domain 17 3.3.2 Lorentzian on-shell action in a fundamental domain 19 4 Rényi entropies in 2d CFTs: disjoint intervals 22.. 4.1

We suggest a statistic for the group mean difference with a known distribution under any true group membership, which can be used in a frequentist test as well as in a

These include the role and nature of the state; the definition of human rights; tensions between Shari‘ah and pluralism; gender equality; the limits of religious freedom; the

[r]