{"title":"锁协议性能分析的有效技术","authors":"S. Hung, K. Lam, K. Lam","doi":"10.1109/MASCOT.1994.284410","DOIUrl":null,"url":null,"abstract":"The validity of many analytic studies of the performance of database systems are often hampered by the many approximations made. This is especially true of the way the block queue delays and deadlocks have been handled. An efficient approach to the derivation of the blocking delays of transactions under the static and dynamic two phase locking protocols is given. The problem of deadlocks which has either been neglected or assumed to be of cycle-length two (involving two transactions only) has also been tackled with some degree of success. The analysis is based on simple combinatorial arguments and probability theory. MVA techniques are then applied to the two models. Several conclusions can be drawn regarding the behaviour of the database systems. The analytic results show remarkable good agreement with simulation results.<<ETX>>","PeriodicalId":288344,"journal":{"name":"Proceedings of International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Efficient technique for performance analysis of locking protocols\",\"authors\":\"S. Hung, K. Lam, K. Lam\",\"doi\":\"10.1109/MASCOT.1994.284410\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The validity of many analytic studies of the performance of database systems are often hampered by the many approximations made. This is especially true of the way the block queue delays and deadlocks have been handled. An efficient approach to the derivation of the blocking delays of transactions under the static and dynamic two phase locking protocols is given. The problem of deadlocks which has either been neglected or assumed to be of cycle-length two (involving two transactions only) has also been tackled with some degree of success. The analysis is based on simple combinatorial arguments and probability theory. MVA techniques are then applied to the two models. Several conclusions can be drawn regarding the behaviour of the database systems. The analytic results show remarkable good agreement with simulation results.<<ETX>>\",\"PeriodicalId\":288344,\"journal\":{\"name\":\"Proceedings of International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1994-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MASCOT.1994.284410\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MASCOT.1994.284410","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient technique for performance analysis of locking protocols
The validity of many analytic studies of the performance of database systems are often hampered by the many approximations made. This is especially true of the way the block queue delays and deadlocks have been handled. An efficient approach to the derivation of the blocking delays of transactions under the static and dynamic two phase locking protocols is given. The problem of deadlocks which has either been neglected or assumed to be of cycle-length two (involving two transactions only) has also been tackled with some degree of success. The analysis is based on simple combinatorial arguments and probability theory. MVA techniques are then applied to the two models. Several conclusions can be drawn regarding the behaviour of the database systems. The analytic results show remarkable good agreement with simulation results.<>