{"title":"Main Memory Commit Protocols for Multiple Backups","authors":"Heine Kolltveit, Svein-Olaf Hvasshovd","doi":"10.1109/ICN.2008.39","DOIUrl":null,"url":null,"abstract":"Atomic commitment protocols are needed to preserve ACID properties of distributed transactional systems. The performance of such protocols is essential to avoid adding too much overhead to transaction processing. Also, many applications require levels of availability, which cannot be met by using only one backup source (disk or process). Combining these two requirements, this paper presents protocols for use with main memory primary-backup systems, where there are multiple backup processes for each primary. These protocols are evaluated by simulation and verified by statistical analysis. The results show that the best choice of protocol is not static, but varies with the transactional load of the system.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh International Conference on Networking (icn 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICN.2008.39","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Atomic commitment protocols are needed to preserve ACID properties of distributed transactional systems. The performance of such protocols is essential to avoid adding too much overhead to transaction processing. Also, many applications require levels of availability, which cannot be met by using only one backup source (disk or process). Combining these two requirements, this paper presents protocols for use with main memory primary-backup systems, where there are multiple backup processes for each primary. These protocols are evaluated by simulation and verified by statistical analysis. The results show that the best choice of protocol is not static, but varies with the transactional load of the system.