CONCURRENCY-CONTROL - METHODS, PERFORMANCE, AND ANALYSIS

Authors
Citation
A. Thomasian, CONCURRENCY-CONTROL - METHODS, PERFORMANCE, AND ANALYSIS, ACM computing surveys, 30(1), 1998, pp. 70-119
Citations number
115
Categorie Soggetti
Computer Science Theory & Methods","Computer Science Theory & Methods
Journal title
ISSN journal
03600300
Volume
30
Issue
1
Year of publication
1998
Pages
70 - 119
Database
ISI
SICI code
0360-0300(1998)30:1<70:C-MPAA>2.0.ZU;2-Z
Abstract
Standard locking (two-phase locking with on-demand lock requests and b locking upon lock conflict) is the primary concurrency control (CC) me thod for centralized databases. The main source of performance degrada tion with standard locking is blocking, whereas transaction (txn) rest arts to resolve deadlocks have a secondary effect on performance. We p rovide a performance analysis of standard locking that accurately esti mates its performance degradation leading to thrashing. We next introd uce two sets of methods to cope with its performance limitations. Rest art-oriented locking methods selectively abort txns to increase the le vel of concurrency for active txns with respect to standard locking in high-contention environments. For example, the running-priority metho d aborts blocked txns based on the essential blocking principle, which only allows blocking by active txns. The wait-depth-limited (WDL) met hod further minimizes wasted processing by basing abort decisions on t he progress made by a txn. Restart waiting serves as a load-control me chanism by deferring the restart of an aborted txn until conflicting t xns have left the system. These two methods have performance superior to other restart-oriented methods and standard locking in high-content ion environments. In two-phase processing methods an aborted txn may c ontinue its first phase of execution in ''virtual'' mode, that is, wit hout requesting any locks, prefetching data for its second execution p hase. The second execution phase is shorter since no disk I/O is requi red, resulting in a lower effective degree of txn concurrency and less data contention. This method is effective provided access invariance prevails; that is, txns access the same set of objects in the second p hase as they did in the first. The optimistic die method is appropriat e for the first phase and the optimistic kill method for further phase s. Lock preclaiming instead of the optimistic kill method in the secon d phase prevents further restarts, which is a weak point of the optimi stic CC method due to the quadratic effect, that is, the probability o f failed validation increases as the square of txn size. Several two-p hase processing methods are described and shown to outperform restart- oriented locking methods in high-contention environments provided adeq uate hardware resources are available. This tutorial reviews CC method s based on standard locking, restart-oriented locking methods, two-pha se processing methods including optimistic CC, and hybrid methods (com bining optimistic CC and locking) in centralized systems. Its main goa ls are as follows: (i) succinctly specify CC methods of interest; (ii) describe models for performance evaluation of CC methods, including n ew models that alleviate some of the shortcomings of models used in ea rlier studies; (iii) compare the performance of CC methods; (iv) list insights gained from analytic and simulation studies; (v) review metho ds to relieve the level of lock contention: special methods for indice s and aggregate data; modified txn structures; and relaxed levels of c onsistency for queries; (vi) survey performance evaluation studies of CC methods; (vii) illustrate the applicability of basic analytic metho ds to evaluating the performance of CC methods; and (viii) suggest are as of further investigation.