TY - GEN
T1 - Using lock-based checking protocol for efficient data broadcast in mobile environments
AU - Wong, Arthur C. S.
AU - Lam, Kwok-Wa
AU - Ho, Karmen K. M.
AU - Lee, Victor C. S.
PY - 2004
Y1 - 2004
N2 - In this paper, the issue of reading the entire database by the broadcast transaction for data broadcasting in mobile environments is addressed. The broadcast transaction is a long-lived read-only transaction which creates significant amount of data conflicts with other concurrent update transactions. Using conventional concurrency control to handle the broadcast transaction is inadequate. Recently, some algorithms are proposed for reading the entire database. However, they suffer from late detection of data conflicts. This leads to many data entities being locked unnecessarily, reducing the availability of data. To solve this problem, an effective protocol based on a data locking approach is devised. Data conflicts can be detected at the early stage of the execution of update transactions by a set of predefined rules. As a result, the lock holding time of data entities is effectively reduced and unnecessary acquisitions of data locks are avoided. The simulation results show that the system performance can be significantly improved.
AB - In this paper, the issue of reading the entire database by the broadcast transaction for data broadcasting in mobile environments is addressed. The broadcast transaction is a long-lived read-only transaction which creates significant amount of data conflicts with other concurrent update transactions. Using conventional concurrency control to handle the broadcast transaction is inadequate. Recently, some algorithms are proposed for reading the entire database. However, they suffer from late detection of data conflicts. This leads to many data entities being locked unnecessarily, reducing the availability of data. To solve this problem, an effective protocol based on a data locking approach is devised. Data conflicts can be detected at the early stage of the execution of update transactions by a set of predefined rules. As a result, the lock holding time of data entities is effectively reduced and unnecessary acquisitions of data locks are avoided. The simulation results show that the system performance can be significantly improved.
UR - http://www.scopus.com/inward/record.url?scp=3042590146&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-3042590146&origin=recordpage
M3 - RGC 32 - Refereed conference paper (with host publication)
VL - 24
SP - 484
EP - 489
BT - Proceedings - International Conference on Distributed Computing Systems
T2 - Proceedings - 24th International Conference on Distributed Computing Systems Workshops
Y2 - 23 March 2004 through 24 March 2004
ER -