{"title":"Efficient technique for performance analysis of locking protocols","authors":"S. Hung, K. Lam, K. Lam","doi":"10.1109/MASCOT.1994.284410","DOIUrl":null,"url":null,"abstract":"The validity of many analytic studies of the performance of database systems are often hampered by the many approximations made. This is especially true of the way the block queue delays and deadlocks have been handled. An efficient approach to the derivation of the blocking delays of transactions under the static and dynamic two phase locking protocols is given. The problem of deadlocks which has either been neglected or assumed to be of cycle-length two (involving two transactions only) has also been tackled with some degree of success. The analysis is based on simple combinatorial arguments and probability theory. MVA techniques are then applied to the two models. Several conclusions can be drawn regarding the behaviour of the database systems. The analytic results show remarkable good agreement with simulation results.<<ETX>>","PeriodicalId":288344,"journal":{"name":"Proceedings of International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MASCOT.1994.284410","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The validity of many analytic studies of the performance of database systems are often hampered by the many approximations made. This is especially true of the way the block queue delays and deadlocks have been handled. An efficient approach to the derivation of the blocking delays of transactions under the static and dynamic two phase locking protocols is given. The problem of deadlocks which has either been neglected or assumed to be of cycle-length two (involving two transactions only) has also been tackled with some degree of success. The analysis is based on simple combinatorial arguments and probability theory. MVA techniques are then applied to the two models. Several conclusions can be drawn regarding the behaviour of the database systems. The analytic results show remarkable good agreement with simulation results.<>