Using lock-based checking protocol for efficient data broadcast in mobile environments

Arthur C. S. Wong, Kwok-Wa Lam, Karmen K. M. Ho, Victor C. S. Lee

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

1 Citation (Scopus)

Abstract

In this paper, the issue of reading the entire database by the broadcast transaction for data broadcasting in mobile environments is addressed. The broadcast transaction is a long-lived read-only transaction which creates significant amount of data conflicts with other concurrent update transactions. Using conventional concurrency control to handle the broadcast transaction is inadequate. Recently, some algorithms are proposed for reading the entire database. However, they suffer from late detection of data conflicts. This leads to many data entities being locked unnecessarily, reducing the availability of data. To solve this problem, an effective protocol based on a data locking approach is devised. Data conflicts can be detected at the early stage of the execution of update transactions by a set of predefined rules. As a result, the lock holding time of data entities is effectively reduced and unnecessary acquisitions of data locks are avoided. The simulation results show that the system performance can be significantly improved.
Original languageEnglish
Title of host publicationProceedings - International Conference on Distributed Computing Systems
Pages484-489
Volume24
Publication statusPublished - 2004
EventProceedings - 24th International Conference on Distributed Computing Systems Workshops - Hachioji, Japan
Duration: 23 Mar 200424 Mar 2004

Publication series

Name
Volume24

Conference

ConferenceProceedings - 24th International Conference on Distributed Computing Systems Workshops
Country/TerritoryJapan
CityHachioji
Period23/03/0424/03/04

Fingerprint

Dive into the research topics of 'Using lock-based checking protocol for efficient data broadcast in mobile environments'. Together they form a unique fingerprint.

Cite this