{"title":"Analytical performance modelling of lock management in distributed systems","authors":"E. Born","doi":"10.1088/0967-1846/3/1/008","DOIUrl":null,"url":null,"abstract":"From a project on upgrading an existing commercially used operating system for support of a distributed system architecture, we present results and experience from a comprehensive analytical performance evaluation of a large number of different implementation strategies for distributed lock management. The various lock management policies we consider differ in the management of the lock database, in optimization concepts applied, and in the corresponding communication protocol. The system architectures discussed include a centralized lock management, a lock management with a partitioned lock database both with immediate and direct communication and with a token ring based communication, and a lock management with a replicated lock database and token ring communication. We derive analytical formulae for the dependence of expected response time of lock requests and their throughput, and provide a practical example.","PeriodicalId":404872,"journal":{"name":"Distributed Syst. Eng.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1996-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Distributed Syst. Eng.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/0967-1846/3/1/008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
From a project on upgrading an existing commercially used operating system for support of a distributed system architecture, we present results and experience from a comprehensive analytical performance evaluation of a large number of different implementation strategies for distributed lock management. The various lock management policies we consider differ in the management of the lock database, in optimization concepts applied, and in the corresponding communication protocol. The system architectures discussed include a centralized lock management, a lock management with a partitioned lock database both with immediate and direct communication and with a token ring based communication, and a lock management with a replicated lock database and token ring communication. We derive analytical formulae for the dependence of expected response time of lock requests and their throughput, and provide a practical example.