SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
International Journal of Computer2, Sept – Oct (2010), © IAEME
ISSN 0976 – 6375(Online) Volume 1, Number
                                               Engineering
and Technology (IJCET), ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online) Volume 1                                               IJCET
Number 2, Sept - Oct (2010), pp. 97-105                                     ©IAEME
© IAEME, http://www.iaeme.com/ijcet.html

            SURVEY ON TRANSACTION REORDERING
                                        Sneha S.Menon
                               Computer science and engineering
                                Karunya University, Tamil Nadu
                              E-Mail: sneha.menon86@gmail.com

                                     Mrs. G. Hemalatha
                                Assistant Professor, CSE Dept
                            Karunya University, Tamil Nadu, India
                             E-Mail: hema_latha207@yahoo.com

ABSTRACT
        Transactions in database are logical unit of work containing one or more sql
statements. Transactions can contain operations that might insert, update, delete, or select
data. If several transactions try to access the same data at a time concurrency issues occur
and which is when one of the transactions has to be aborted for the process to continue.
Contention manager takes care of aborting the needed transactions. But with increase in
number of aborts, performance and response time of the system decreases. Thus in order
to minimize number of aborts, the transactions must be reordered. Reordering the
transactions before submitting them to the execution unit would also increase the
throughput of the system. This paper presents a survey on some of the transaction
reordering done so far on the basis of resource conflict aborts and resource sharing.
Keywords- Transaction reordering, Resource sharing, Transaction aborts
1. INTRODUCTION
        Transactions can contain one or more sql statements which would try to access
same data at a time. If conflicting data accesses are detected between any two
transactions, one of them is aborted and usually restarted immediately. The immediate
restart of the aborted transaction might again conflict with the original transaction leading
to repeated aborts. Increase in the number of aborts leads to performance degradation and
also the response time of the system decreases. Thus the order in which transactions are



                                                 97
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME


executed, if reordered, could minimize number of aborts. The users expect higher
throughput from the RDBMS for supporting their applications. Reordering the
transactions before submitting them to the execution unit would increase the throughput
of the system. The research focus of Transaction Reordering is to improve transaction
throughput in a relational database management system by increasing resource sharing
and decreasing resource contention. In this paper we present a survey on some of the
transaction reordering done so far on the basis of resource conflict aborts and resource
sharing. Transaction reordering given by Mohammad Ansari[1], Fernando Pedone[2] and
Gang Luo[3] are based on resource conflicts where [1] presents a technique called Steal
on Abort which is used when there are aborts when two transaction of different threads
access same data. Similarly [2] shows the reordering used in replicated database systems
when aborts occur. While [3] gives the case of continuous data loading which leads to
lock conflicts in the presence of materialized join views. The reordering methods given
by Gang Luo, Jeffrey F. Naughton [4] and Gang Luo [5] talks about the resource sharing.
[4] presents transaction reordering which does synchronized scans using buffer pool
analysis as reordering criterion and [5] proposes a approach which makes use of both
lock conflict analysis and buffer pool analysis as reordering criterion. [5] Combines the
methods of [3] and [4].
2. RESOURCE CONFLICT ABORTS
2.1     Steal-on-abort
        In [1], Mohammad Ansari and Mikel Lujan proposed that in Transactional
Memory (TM) if any two concurrently executing transactions perform conflicting data
accesses, one of them is aborted. Aborted transactions waste computing resources, and
reduce performance. This paper presents a technique called steal-on- abort, which aims to
improve transaction ordering at run-time which would minimize the number of aborts.
The aborted transaction is stolen by the non-aborted transaction and queued behind it
preventing the two transactions from conflicting again.
        Transactional Memory (TM) is a parallel programming model which reduces
programming effort, while improving execution performance. The TM system compares
each transaction’s data accesses against all other transactions for conflicts, also known as



                                                 98
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME


conflict detection or validation. Once a conflict between two transactions is observed, it
is not executed concurrently again. Steal-on-abort does not restart the aborted transaction
immediately; it gives the aborted transaction to the opponent transaction, and a new
transaction is started in place of the aborted transaction.




                            Figure 1 Steal-on-abort in action
        This strategy aims to reduce the amount of temporally local aborts, and expects
that minimizing temporally local aborts minimizes the global number of aborts. During
implementation, a number of threads concurrently execute transactions. If one
transaction conflicts with other, it is removed from thread. Thread gets another
transaction to execute. In Figure 1 Thread A is executing a transaction based on Job 2,
and Thread B is executing a transaction based on Job 6. In step 1, thread A’s transaction
conflicts with, and aborts, Thread B’s transaction. In step 2, thread A steals thread B’s
job, and places it in its own stolen Deque. In step 3, after thread A finishes stealing,
thread B gets a new job, and starts executing it immediately.
2.2 Transaction Reordering in Replicated Databases
        In this paper Fernando Pedone, Rachid Guerraoui Andre Schiper [2] presents a
fault-tolerant lazy replication protocol. This protocol enables local transaction execution
and does not lead to any deadlock situation. It reduces the abort rate of transactions.
Protocol first executes transactions locally, and then broadcasts a transactions
certification message to all replication managers.
        Replication increases availability, but designing an efficient distributed protocol
that provides fault-tolerance and ensures replica consistency is a difficult issue. Lazy
protocols enable local transaction processing (i.e., do not require any remote



                                                 99
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME


communication during transaction execution), but before committing, the transactions
have to be certified. A transaction Ti is first executed locally at a replica server closest to
client that initiates transactions. Then, using non-blocking atomic broadcast, a
certification message for Ti is broadcast to all replica servers. Every server that delivers
Ti’s certification message executes a certification procedure, deciding for the commit or
the abort of Ti. Certification procedure checks if Ti, can be serialized after committed
transactions. If not, instead of aborting Ti, a reordering technique can be used to find out
whether Ti can be serialized somewhere before some committed transactions. If Ti
cannot be reordered, it is aborted. Figure 2 shows the states in which the transaction can
be in.




                                  Figure 2 Transaction states
         The reordering technique is based on the fact that transaction serialization order
does not need to be the same as the transaction certification order. By reordering a
transaction to a position other than the current one, the protocol increases the possibilities
of committing. A transaction Ti may be reordered to any position between two
transactions that executed concurrently with it but that have already committed. Let {T(l),
T(l+1), …, T(n)} be concurrent transactions. Although Ti reaches the certify state after
transactions {T(l), T(l+1), …, T(n)} have committed, Ti cannot read any value that was
updated by transactions ordered before it and must not update items that are read after it.
2.3      Transaction Reordering and Grouping for Continuous Data
Loading
         In this paper Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, and Michael W.
Watzke [3] have shown that in the presence of materialized join views, loading data


                                                100
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME


concurrently into multiple base relations of the same materialized join view can cause a
severe deadlock problem. To solve this problem, reordering is done to the data to be
loaded for execution so that at any time, for any materialized join view, data is only
loaded into one of its base relations. System uses high concurrency locking protocol.
Since data comes from multiple data sources in the form of modification operations
(insert, delete, or update), load utility opens multiple sessions which increases the
concurrency.      This is called partitioning method. Partitioning method allows the
modification to same relation through same session. Also, for load transactions on the
relations that contain “aggregate” attributes, pre-aggregation is used to reduce the number
of SQL statements in the load transactions.
2.3.1 The Pre-aggregation Method
        A large number of data warehouses have relations with certain attributes
representing aggregate information. Updates to these relations increment or decrement
the aggregate attribute values. When we load data continuously into these relations, we
combine multiple modification operations into a single load transaction. This creates an
opportunity for optimization: by pre-aggregation, we can reduce the number of SQL
statements in the load transactions on these relations. Suppose the following two
modification operations O1 and O2 are combined into a single load transaction T:
(1) O1: update R set R.b=R.b+b1 where R.a=v;
(2) O2: update R set R.b=R.b+b2 where R.a=v;
        If we let b3=b1+b2, then transaction T can be transformed into an equivalent
transaction T’ that contains only a single SQL statement:
update R set R.b=R.b+b3 where R.a=v;
        Compared to transaction T, transaction T′ saves one SQL statement. Hence,
transaction T′ is more efficient. Advantage of this technique is that the transaction
execution/response time is reduced. This may further improve database concurrency, as
the period that transactions hold lock is reduced.




                                                101
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME


3. RESOURCE SHARING
3.1 Transaction Reordering with Application to Synchronized Scan
        The transaction reordering method is turned into a general transaction reordering
framework by Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, and Michael W. Watzke
in [4] that can incorporate various factors as the reordering criteria. With the resource
utilization information of transactions, the transaction reordering method can also
improve the system throughput by increasing the resource sharing opportunities among
multiple transactions.
        Main idea is that if two transactions are scanning the same relation, then we can
group them together so that I/O can be shared between them. Example: Relation R
contains K1 pages. When we start full table scan, we add some information in in-memory
data structure. When T2 starts, it searches in data structure if any other transaction is
scanning same relation. If yes then it shares those pages with T1.
3.2 Transaction Reordering
        In this paper Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, and Michael W.
Watzke[5] have shown that throughput of an RDBMS that is processing a sequence of
transactions can be improved by reordering the transactions before submitting them for
execution. In this paper, two factors are considered: lock conflicts and buffer pool
performance which the Figure 3 shows.
                                           Transaction Reordering
                                           Reordering




                           Lock conflict                 Buffer pool analysis
                           analysis
                         Figure 3 Transaction reordering classification




                                                  102
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME


3.2.1 Using Lock Conflict Analysis as the Reordering Criterion
          Continuous load utilities make the following assumptions for continuous data
loading:
1) The RDBMS is running with standard ACID properties for transactions.
2) The RDBMS neither imposes nor assumes any particular order for these load
    transactions.
3) The RDBMS has no requirement on whether multiple modification operations can or
    cannot commit/abort together.
          To increase concurrency, a continuous load utility typically opens multiple
sessions to the RDBMS. Continuous load utilities usually combine multiple modification
operations into a single transaction to avoid per transaction overhead.
3.2.2 Deadlock Probability
          In the presence of materialized join views, the probability of deadlock can easily
be very high. Suppose the following cases stand true
(1) There are k > 1 concurrent transactions.
(2) Each transaction contains n modification operations and modifies either A or B with
    probability p and 1-p, respectively.
3) Within a transaction, each modification operation modifies a random tuple in A (B)
    and each of the n tuples to be modified has a distinct (and random) A.c (B. d) value.
(4) There are totally s distinct values for A.c (B.d).
(5) s>>kn.
Then the probability that any particular transaction deadlocks is approximately
p (1-p)(k-1)n2/(2s)
Rules for reordering:
(i) At any time, for any join view JV, data can only be loaded into one base relation of
    JV.
(ii) Modification operations on the same base relation use the partitioning method
(iii) The system uses a high concurrency locking protocol.




                                                103
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME


3.2.3 Using Buffer Pool Analysis as the Reordering Criterion
        Main idea is that if two transactions are scanning the same relation, then we can
group them together so that I/O can be shared between them. Two techniques are used:
        Technique 1 We maintain an in-memory hash table HT that keeps track of all
the full table scans in the transaction admission queue Q. Each time we find a desirable
transaction T in Q, if transaction T does full table scan on relation R, we move as many
transactions in Q that does full table scan on relation R as the system permits to Sr for
execution.
        Technique 2 When a new transaction T that does full table scan on relation R
arrives, before it is blocked in Q, we first check the data structure DS to see whether
some transaction in Sr is currently doing a full table scan on relation R. If so, we run
transaction T immediately so that it does not get blocked in Q.
                    Table 1 Comparison of various transaction reordering
Parameters        Steal-on        Transaction       Transaction        Transaction        Transaction
                  Abort           Reordering        Reordering         Reordering         Reordering
                                  in Replicated     and Grouping       with
                                  Databases         for continuous     Application to
                                                    Data Loading       Synchronized
                                                                       scan

Lock conflict     Yes             Yes               Yes                No                 Yes
Analysis
Resource          No              No                No                 Yes                Yes
sharing
Cost              High            Very high         Moderate           Moderate           Moderate
System            Standalone      Replicated        Standalone         Standalone         Standalone
Dynamic           Yes             Yes               Yes                Yes                Yes
Overhead          High            High              Low                Low                Low
Throughput        Increased       Increased         Increased          Increased          Increased
Average           Improved        Improved          Improved           Improved           Improved
response
Time
4. ANALYSIS
        The Table1 above shows the comparison of the various transaction reordering
done so far. The analysis is on the basis of some of the parameters like throughput,
average response time, overhead incurred and cost. The analysis also shows whether


                                                104
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME


system does lock conflict analysis, allows resource sharing and is dynamic or not. Type
of system is also taken as one of the parameters.
5. CONCLUSION
        This paper has presented a survey on some of the transaction reordering done so
far on the basis of resource conflict aborts and resource sharing. A study of runtime
approaches, which dynamically re-orders the transactions with the aim of reducing the
number of aborted transactions has been done. We also came to know that by knowing
the currently executing transaction and the ones waiting for execution, transaction
reordering can be done such that the resource sharing is achieved while reducing the lock
conflicts. In future work we would like to explore ways to detect transactions that are
appropriate for reordering and also would like to analyse the delays caused due to these
reordering.
REFERENCES
1. Mohammad Ansari, Mikel Lujan (2010), “Steal-on-abort: Dynamic Transaction
    Reordering to Reduce Conflicts in Transactional Memory”, CiteSeerX.
2. Pedone.F, Guerraoui.R, Schiper.A (1997), “Transaction Reordering in Replicated
    Databases” IEEE transactions, Proceedings of The Sixteenth Symposium on Reliable
    Distributed Systems 1997, pp. 175-182.
3. G. Luo, J.F. Naughton, C.J. Ellmann (2006), “Transaction Reordering and Grouping
    for continuous Data Loading”, BIRTE, pp. 34-49.
4. G. Luo, J.F. Naughton, C.J. Ellmann (2008), “Transaction Reordering with Application
    to Synchronized Scan”, DOLAP, pp. 17-24.
5. G. Luo, J.F. Naughton, C.J. Ellmann (2010), “Transaction Reordering”, Elsevier, Data
    & Knowledge Engineering, Vol. 69, Issue 1, pp. 29-49.
6. J. Gray, A. Reuter (1993), “Transaction Processing:Concepts and Techniques”,
    Morgan Kaufman Publishers.
7. M.J. Carey, S. Krishnamurthi, and M. Livny (1990), “Load Control for Locking: The
    'Half-and-Half' Approach”, PODS, pp. 72-84.




                                                105

More Related Content

What's hot

Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open networkeSAT Publishing House
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
 
Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Jaipal Dhobale
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
Overlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofOverlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofIAEME Publication
 
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...ijitcs
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
 
A Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksA Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksIJERA Editor
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIJCNCJournal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Distribution systems efficiency
Distribution systems efficiencyDistribution systems efficiency
Distribution systems efficiencyAlexander Decker
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
 
Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...IDES Editor
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
 

What's hot (20)

Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open network
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
Overlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofOverlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability of
 
Ie3514301434
Ie3514301434Ie3514301434
Ie3514301434
 
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
A Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksA Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical Networks
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
 
135 139
135 139135 139
135 139
 
Ax34298305
Ax34298305Ax34298305
Ax34298305
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Distribution systems efficiency
Distribution systems efficiencyDistribution systems efficiency
Distribution systems efficiency
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
170 328-1-pb
170 328-1-pb170 328-1-pb
170 328-1-pb
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
 

Similar to Survey on transaction reordering

Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIjiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIJIR JOURNALS IJIRUSA
 
Design & Development of an Advanced Database Management System Using Multiver...
Design & Development of an Advanced Database Management System Using Multiver...Design & Development of an Advanced Database Management System Using Multiver...
Design & Development of an Advanced Database Management System Using Multiver...IOSR Journals
 
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...IRJET Journal
 
Basic principles of blind write protocol
Basic principles of blind write protocolBasic principles of blind write protocol
Basic principles of blind write protocoljournalBEEI
 
A PRUDENT-PRECEDENCE CONCURRENCY CONTROL PROTOCOL FOR HIGH DATA CONTENTION DA...
A PRUDENT-PRECEDENCE CONCURRENCY CONTROL PROTOCOL FOR HIGH DATA CONTENTION DA...A PRUDENT-PRECEDENCE CONCURRENCY CONTROL PROTOCOL FOR HIGH DATA CONTENTION DA...
A PRUDENT-PRECEDENCE CONCURRENCY CONTROL PROTOCOL FOR HIGH DATA CONTENTION DA...ijdms
 
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOLDISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOLijasuc
 
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL ijasuc
 
68 transaction scheduling in distributed real time systems
68 transaction scheduling in distributed real time systems68 transaction scheduling in distributed real time systems
68 transaction scheduling in distributed real time systemsRoyalzig Luxury Furniture
 
Data Structures in the Multicore Age : Notes
Data Structures in the Multicore Age : NotesData Structures in the Multicore Age : Notes
Data Structures in the Multicore Age : NotesSubhajit Sahu
 
Scalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management SystemsScalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management SystemsIOSR Journals
 
Vol 4 No 1 - August 2013
Vol 4 No 1 - August 2013Vol 4 No 1 - August 2013
Vol 4 No 1 - August 2013ijcsbi
 
Towards a Concurrence Analysis in Business Processes
Towards a Concurrence Analysis in Business ProcessesTowards a Concurrence Analysis in Business Processes
Towards a Concurrence Analysis in Business ProcessesAnastasija Nikiforova
 
Transactions in dbms
Transactions in dbmsTransactions in dbms
Transactions in dbmsNancy Gulati
 
journal papers
journal papersjournal papers
journal papersakhila1001
 
journal publications
journal publicationsjournal publications
journal publicationsakhila1001
 

Similar to Survey on transaction reordering (20)

Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIjiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
 
F017213747
F017213747F017213747
F017213747
 
F017213747
F017213747F017213747
F017213747
 
Design & Development of an Advanced Database Management System Using Multiver...
Design & Development of an Advanced Database Management System Using Multiver...Design & Development of an Advanced Database Management System Using Multiver...
Design & Development of an Advanced Database Management System Using Multiver...
 
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
 
Basic principles of blind write protocol
Basic principles of blind write protocolBasic principles of blind write protocol
Basic principles of blind write protocol
 
A PRUDENT-PRECEDENCE CONCURRENCY CONTROL PROTOCOL FOR HIGH DATA CONTENTION DA...
A PRUDENT-PRECEDENCE CONCURRENCY CONTROL PROTOCOL FOR HIGH DATA CONTENTION DA...A PRUDENT-PRECEDENCE CONCURRENCY CONTROL PROTOCOL FOR HIGH DATA CONTENTION DA...
A PRUDENT-PRECEDENCE CONCURRENCY CONTROL PROTOCOL FOR HIGH DATA CONTENTION DA...
 
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOLDISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
 
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
DISCONNECTION TOLERANCE IN RELIABLE TIMEOUT BASED COMMIT PROTOCOL
 
68 transaction scheduling in distributed real time systems
68 transaction scheduling in distributed real time systems68 transaction scheduling in distributed real time systems
68 transaction scheduling in distributed real time systems
 
Ijetr012051
Ijetr012051Ijetr012051
Ijetr012051
 
DBMS UNIT 4
DBMS UNIT 4DBMS UNIT 4
DBMS UNIT 4
 
Data Structures in the Multicore Age : Notes
Data Structures in the Multicore Age : NotesData Structures in the Multicore Age : Notes
Data Structures in the Multicore Age : Notes
 
Scalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management SystemsScalable Transaction Management on Cloud Data Management Systems
Scalable Transaction Management on Cloud Data Management Systems
 
Vol 4 No 1 - August 2013
Vol 4 No 1 - August 2013Vol 4 No 1 - August 2013
Vol 4 No 1 - August 2013
 
24904 lecture11
24904 lecture1124904 lecture11
24904 lecture11
 
Towards a Concurrence Analysis in Business Processes
Towards a Concurrence Analysis in Business ProcessesTowards a Concurrence Analysis in Business Processes
Towards a Concurrence Analysis in Business Processes
 
Transactions in dbms
Transactions in dbmsTransactions in dbms
Transactions in dbms
 
journal papers
journal papersjournal papers
journal papers
 
journal publications
journal publicationsjournal publications
journal publications
 

More from iaemedu

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanismiaemedu
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cmaiaemedu
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presenceiaemedu
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineeringiaemedu
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacementiaemedu
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approachiaemedu
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentiaemedu
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationiaemedu
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyiaemedu
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 
A comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueA comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueiaemedu
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’siaemedu
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksiaemedu
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesiaemedu
 
Software process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsSoftware process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsiaemedu
 
Software metric analysis methods for product development
Software metric analysis methods for product developmentSoftware metric analysis methods for product development
Software metric analysis methods for product developmentiaemedu
 

More from iaemedu (20)

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanism
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cma
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presence
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineering
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacement
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approach
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environment
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow application
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classify
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 
A comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueA comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining technique
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networks
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
Software process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsSoftware process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various models
 
Software metric analysis methods for product development
Software metric analysis methods for product developmentSoftware metric analysis methods for product development
Software metric analysis methods for product development
 

Survey on transaction reordering

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), International Journal of Computer2, Sept – Oct (2010), © IAEME ISSN 0976 – 6375(Online) Volume 1, Number Engineering and Technology (IJCET), ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 1 IJCET Number 2, Sept - Oct (2010), pp. 97-105 ©IAEME © IAEME, http://www.iaeme.com/ijcet.html SURVEY ON TRANSACTION REORDERING Sneha S.Menon Computer science and engineering Karunya University, Tamil Nadu E-Mail: sneha.menon86@gmail.com Mrs. G. Hemalatha Assistant Professor, CSE Dept Karunya University, Tamil Nadu, India E-Mail: hema_latha207@yahoo.com ABSTRACT Transactions in database are logical unit of work containing one or more sql statements. Transactions can contain operations that might insert, update, delete, or select data. If several transactions try to access the same data at a time concurrency issues occur and which is when one of the transactions has to be aborted for the process to continue. Contention manager takes care of aborting the needed transactions. But with increase in number of aborts, performance and response time of the system decreases. Thus in order to minimize number of aborts, the transactions must be reordered. Reordering the transactions before submitting them to the execution unit would also increase the throughput of the system. This paper presents a survey on some of the transaction reordering done so far on the basis of resource conflict aborts and resource sharing. Keywords- Transaction reordering, Resource sharing, Transaction aborts 1. INTRODUCTION Transactions can contain one or more sql statements which would try to access same data at a time. If conflicting data accesses are detected between any two transactions, one of them is aborted and usually restarted immediately. The immediate restart of the aborted transaction might again conflict with the original transaction leading to repeated aborts. Increase in the number of aborts leads to performance degradation and also the response time of the system decreases. Thus the order in which transactions are 97
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME executed, if reordered, could minimize number of aborts. The users expect higher throughput from the RDBMS for supporting their applications. Reordering the transactions before submitting them to the execution unit would increase the throughput of the system. The research focus of Transaction Reordering is to improve transaction throughput in a relational database management system by increasing resource sharing and decreasing resource contention. In this paper we present a survey on some of the transaction reordering done so far on the basis of resource conflict aborts and resource sharing. Transaction reordering given by Mohammad Ansari[1], Fernando Pedone[2] and Gang Luo[3] are based on resource conflicts where [1] presents a technique called Steal on Abort which is used when there are aborts when two transaction of different threads access same data. Similarly [2] shows the reordering used in replicated database systems when aborts occur. While [3] gives the case of continuous data loading which leads to lock conflicts in the presence of materialized join views. The reordering methods given by Gang Luo, Jeffrey F. Naughton [4] and Gang Luo [5] talks about the resource sharing. [4] presents transaction reordering which does synchronized scans using buffer pool analysis as reordering criterion and [5] proposes a approach which makes use of both lock conflict analysis and buffer pool analysis as reordering criterion. [5] Combines the methods of [3] and [4]. 2. RESOURCE CONFLICT ABORTS 2.1 Steal-on-abort In [1], Mohammad Ansari and Mikel Lujan proposed that in Transactional Memory (TM) if any two concurrently executing transactions perform conflicting data accesses, one of them is aborted. Aborted transactions waste computing resources, and reduce performance. This paper presents a technique called steal-on- abort, which aims to improve transaction ordering at run-time which would minimize the number of aborts. The aborted transaction is stolen by the non-aborted transaction and queued behind it preventing the two transactions from conflicting again. Transactional Memory (TM) is a parallel programming model which reduces programming effort, while improving execution performance. The TM system compares each transaction’s data accesses against all other transactions for conflicts, also known as 98
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME conflict detection or validation. Once a conflict between two transactions is observed, it is not executed concurrently again. Steal-on-abort does not restart the aborted transaction immediately; it gives the aborted transaction to the opponent transaction, and a new transaction is started in place of the aborted transaction. Figure 1 Steal-on-abort in action This strategy aims to reduce the amount of temporally local aborts, and expects that minimizing temporally local aborts minimizes the global number of aborts. During implementation, a number of threads concurrently execute transactions. If one transaction conflicts with other, it is removed from thread. Thread gets another transaction to execute. In Figure 1 Thread A is executing a transaction based on Job 2, and Thread B is executing a transaction based on Job 6. In step 1, thread A’s transaction conflicts with, and aborts, Thread B’s transaction. In step 2, thread A steals thread B’s job, and places it in its own stolen Deque. In step 3, after thread A finishes stealing, thread B gets a new job, and starts executing it immediately. 2.2 Transaction Reordering in Replicated Databases In this paper Fernando Pedone, Rachid Guerraoui Andre Schiper [2] presents a fault-tolerant lazy replication protocol. This protocol enables local transaction execution and does not lead to any deadlock situation. It reduces the abort rate of transactions. Protocol first executes transactions locally, and then broadcasts a transactions certification message to all replication managers. Replication increases availability, but designing an efficient distributed protocol that provides fault-tolerance and ensures replica consistency is a difficult issue. Lazy protocols enable local transaction processing (i.e., do not require any remote 99
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME communication during transaction execution), but before committing, the transactions have to be certified. A transaction Ti is first executed locally at a replica server closest to client that initiates transactions. Then, using non-blocking atomic broadcast, a certification message for Ti is broadcast to all replica servers. Every server that delivers Ti’s certification message executes a certification procedure, deciding for the commit or the abort of Ti. Certification procedure checks if Ti, can be serialized after committed transactions. If not, instead of aborting Ti, a reordering technique can be used to find out whether Ti can be serialized somewhere before some committed transactions. If Ti cannot be reordered, it is aborted. Figure 2 shows the states in which the transaction can be in. Figure 2 Transaction states The reordering technique is based on the fact that transaction serialization order does not need to be the same as the transaction certification order. By reordering a transaction to a position other than the current one, the protocol increases the possibilities of committing. A transaction Ti may be reordered to any position between two transactions that executed concurrently with it but that have already committed. Let {T(l), T(l+1), …, T(n)} be concurrent transactions. Although Ti reaches the certify state after transactions {T(l), T(l+1), …, T(n)} have committed, Ti cannot read any value that was updated by transactions ordered before it and must not update items that are read after it. 2.3 Transaction Reordering and Grouping for Continuous Data Loading In this paper Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, and Michael W. Watzke [3] have shown that in the presence of materialized join views, loading data 100
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME concurrently into multiple base relations of the same materialized join view can cause a severe deadlock problem. To solve this problem, reordering is done to the data to be loaded for execution so that at any time, for any materialized join view, data is only loaded into one of its base relations. System uses high concurrency locking protocol. Since data comes from multiple data sources in the form of modification operations (insert, delete, or update), load utility opens multiple sessions which increases the concurrency. This is called partitioning method. Partitioning method allows the modification to same relation through same session. Also, for load transactions on the relations that contain “aggregate” attributes, pre-aggregation is used to reduce the number of SQL statements in the load transactions. 2.3.1 The Pre-aggregation Method A large number of data warehouses have relations with certain attributes representing aggregate information. Updates to these relations increment or decrement the aggregate attribute values. When we load data continuously into these relations, we combine multiple modification operations into a single load transaction. This creates an opportunity for optimization: by pre-aggregation, we can reduce the number of SQL statements in the load transactions on these relations. Suppose the following two modification operations O1 and O2 are combined into a single load transaction T: (1) O1: update R set R.b=R.b+b1 where R.a=v; (2) O2: update R set R.b=R.b+b2 where R.a=v; If we let b3=b1+b2, then transaction T can be transformed into an equivalent transaction T’ that contains only a single SQL statement: update R set R.b=R.b+b3 where R.a=v; Compared to transaction T, transaction T′ saves one SQL statement. Hence, transaction T′ is more efficient. Advantage of this technique is that the transaction execution/response time is reduced. This may further improve database concurrency, as the period that transactions hold lock is reduced. 101
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME 3. RESOURCE SHARING 3.1 Transaction Reordering with Application to Synchronized Scan The transaction reordering method is turned into a general transaction reordering framework by Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, and Michael W. Watzke in [4] that can incorporate various factors as the reordering criteria. With the resource utilization information of transactions, the transaction reordering method can also improve the system throughput by increasing the resource sharing opportunities among multiple transactions. Main idea is that if two transactions are scanning the same relation, then we can group them together so that I/O can be shared between them. Example: Relation R contains K1 pages. When we start full table scan, we add some information in in-memory data structure. When T2 starts, it searches in data structure if any other transaction is scanning same relation. If yes then it shares those pages with T1. 3.2 Transaction Reordering In this paper Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, and Michael W. Watzke[5] have shown that throughput of an RDBMS that is processing a sequence of transactions can be improved by reordering the transactions before submitting them for execution. In this paper, two factors are considered: lock conflicts and buffer pool performance which the Figure 3 shows. Transaction Reordering Reordering Lock conflict Buffer pool analysis analysis Figure 3 Transaction reordering classification 102
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME 3.2.1 Using Lock Conflict Analysis as the Reordering Criterion Continuous load utilities make the following assumptions for continuous data loading: 1) The RDBMS is running with standard ACID properties for transactions. 2) The RDBMS neither imposes nor assumes any particular order for these load transactions. 3) The RDBMS has no requirement on whether multiple modification operations can or cannot commit/abort together. To increase concurrency, a continuous load utility typically opens multiple sessions to the RDBMS. Continuous load utilities usually combine multiple modification operations into a single transaction to avoid per transaction overhead. 3.2.2 Deadlock Probability In the presence of materialized join views, the probability of deadlock can easily be very high. Suppose the following cases stand true (1) There are k > 1 concurrent transactions. (2) Each transaction contains n modification operations and modifies either A or B with probability p and 1-p, respectively. 3) Within a transaction, each modification operation modifies a random tuple in A (B) and each of the n tuples to be modified has a distinct (and random) A.c (B. d) value. (4) There are totally s distinct values for A.c (B.d). (5) s>>kn. Then the probability that any particular transaction deadlocks is approximately p (1-p)(k-1)n2/(2s) Rules for reordering: (i) At any time, for any join view JV, data can only be loaded into one base relation of JV. (ii) Modification operations on the same base relation use the partitioning method (iii) The system uses a high concurrency locking protocol. 103
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME 3.2.3 Using Buffer Pool Analysis as the Reordering Criterion Main idea is that if two transactions are scanning the same relation, then we can group them together so that I/O can be shared between them. Two techniques are used: Technique 1 We maintain an in-memory hash table HT that keeps track of all the full table scans in the transaction admission queue Q. Each time we find a desirable transaction T in Q, if transaction T does full table scan on relation R, we move as many transactions in Q that does full table scan on relation R as the system permits to Sr for execution. Technique 2 When a new transaction T that does full table scan on relation R arrives, before it is blocked in Q, we first check the data structure DS to see whether some transaction in Sr is currently doing a full table scan on relation R. If so, we run transaction T immediately so that it does not get blocked in Q. Table 1 Comparison of various transaction reordering Parameters Steal-on Transaction Transaction Transaction Transaction Abort Reordering Reordering Reordering Reordering in Replicated and Grouping with Databases for continuous Application to Data Loading Synchronized scan Lock conflict Yes Yes Yes No Yes Analysis Resource No No No Yes Yes sharing Cost High Very high Moderate Moderate Moderate System Standalone Replicated Standalone Standalone Standalone Dynamic Yes Yes Yes Yes Yes Overhead High High Low Low Low Throughput Increased Increased Increased Increased Increased Average Improved Improved Improved Improved Improved response Time 4. ANALYSIS The Table1 above shows the comparison of the various transaction reordering done so far. The analysis is on the basis of some of the parameters like throughput, average response time, overhead incurred and cost. The analysis also shows whether 104
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 2, Sept – Oct (2010), © IAEME system does lock conflict analysis, allows resource sharing and is dynamic or not. Type of system is also taken as one of the parameters. 5. CONCLUSION This paper has presented a survey on some of the transaction reordering done so far on the basis of resource conflict aborts and resource sharing. A study of runtime approaches, which dynamically re-orders the transactions with the aim of reducing the number of aborted transactions has been done. We also came to know that by knowing the currently executing transaction and the ones waiting for execution, transaction reordering can be done such that the resource sharing is achieved while reducing the lock conflicts. In future work we would like to explore ways to detect transactions that are appropriate for reordering and also would like to analyse the delays caused due to these reordering. REFERENCES 1. Mohammad Ansari, Mikel Lujan (2010), “Steal-on-abort: Dynamic Transaction Reordering to Reduce Conflicts in Transactional Memory”, CiteSeerX. 2. Pedone.F, Guerraoui.R, Schiper.A (1997), “Transaction Reordering in Replicated Databases” IEEE transactions, Proceedings of The Sixteenth Symposium on Reliable Distributed Systems 1997, pp. 175-182. 3. G. Luo, J.F. Naughton, C.J. Ellmann (2006), “Transaction Reordering and Grouping for continuous Data Loading”, BIRTE, pp. 34-49. 4. G. Luo, J.F. Naughton, C.J. Ellmann (2008), “Transaction Reordering with Application to Synchronized Scan”, DOLAP, pp. 17-24. 5. G. Luo, J.F. Naughton, C.J. Ellmann (2010), “Transaction Reordering”, Elsevier, Data & Knowledge Engineering, Vol. 69, Issue 1, pp. 29-49. 6. J. Gray, A. Reuter (1993), “Transaction Processing:Concepts and Techniques”, Morgan Kaufman Publishers. 7. M.J. Carey, S. Krishnamurthi, and M. Livny (1990), “Load Control for Locking: The 'Half-and-Half' Approach”, PODS, pp. 72-84. 105