skip to main content
article
Free Access

Scheduling real-time transactions: a performance evaluation

Published:01 September 1992Publication History
First page image

References

  1. 1 ABBOTI', t~., AND GARCIA-MOLINA, H. Scheduling real-time transactions. ACM SIGMOD Rec. (Mar. 1988), 71-81. Google ScholarGoogle Scholar
  2. 2 ABBOTT, R., AND GARCIA-MOLINA, H. Scheduling real-time transactions: A performance evaluation. In Proceedings of the 14th VLDB Conference (Los Angeles, Aug. 29-Sept. 1, 1988), pp. 1-12. Google ScholarGoogle Scholar
  3. 3 ABBOTT, R., AND GARCIA-MOLINA, H. Scheduling real-time transactions with disk resident data. In Proceedings of the 15th VLDB Conference (Amsterdam, Aug. 22-25, 1989), pp. 385 396. Google ScholarGoogle Scholar
  4. 4 ABBOTT, R., AND GARCIA-MOLINA, H. Scheduling I/O requests with deadlines: A performance evaluation. IEEE Real-Time Syst. Syrup. (Dec. 1990), 113-124.Google ScholarGoogle Scholar
  5. 5 BRYANT, R. M. SIMPAS 5.0 User Manual. Computer Sciences Dept., TR-146, Univ. of Wisconsin-Madison, Nov. 1981.Google ScholarGoogle Scholar
  6. 6 CAREY, M., JAUHARI, R., AND LIVNY, M. Priority in DBMS resource scheduling. In Proceedtngs of the 15th VLDB Conference (Amsterdam, Aug. 22-25, 1989), pp. 397 410. Google ScholarGoogle Scholar
  7. 7 COFFMAN, E., AND DENNING, P. Operating Systems Theory. Prentice-Hall, Englewood Cliffs, N.J., 1973. Google ScholarGoogle Scholar
  8. 8 DAVIDSON, S., LEE, I., AND WOLFE, V. A protocol for timed atomic commitment. In the IEEE Internattonal Conference on Distributed Computing Systems (Newport Beach, Calif., June 5-9, 1989), pp. 199 206.Google ScholarGoogle Scholar
  9. 9 DAYAL, U., BLAUSTEIN, B., BUCHMANN, A., CHAKRAVARTHY, U., Hsu, M., LEDIN, R., MCCARTHY, D., ROSENTHAL, A., SARIN, S., CAREY, M., LIVNY, M., AND JAVHARI, R. The HiPAC project: Combining active databases and timing constraints. ACM SIGMOD Rec. (Mar. 1988), 51-70. Google ScholarGoogle Scholar
  10. 10 ESWARAN, K. P., GRAY, J. N., LORm, R. A, AND Tr~IGER, I.L. The notions of consistency and predicate locks in a database system. Commun. ACM 19, 11 (Nov. 1976), 624-633. Google ScholarGoogle Scholar
  11. 11 GARCIA-MOLINA, H. Using semantic knowledge for transaction processing in a distributed database. ACM Trans. Database Syst. 8 (June 1983), 186-213. Google ScholarGoogle Scholar
  12. 12 H~RDER, T., AND REUTER, A. Principles of transaction-oriented database recovery. ACM Comput. Surv. 15, 4 (1983), 287-317. Google ScholarGoogle Scholar
  13. 13 HARITSA, J., CAREY, M., AND LWNY, M. On being optimistic about real-time constraints. In Proceedings of the ACM Symposium on Principles of Database Systems (Nashville, Tenn., April 1990), pp. 331-343. Google ScholarGoogle Scholar
  14. 14 HARITSA, J., CAREY, M., AND LIVNY, M. Dynamic real-time optimistic concurrency control. IEEE Real-Time Sys. Syrup. (Dec. 1990), 94-103.Google ScholarGoogle Scholar
  15. 15 HUANG, J., AND STANKOVIC, J. Buffer management in real-time databases. COINS TR 90-65, Dept. of Computer and Information Science, Univ. of Massachusetts, July 1990. Google ScholarGoogle Scholar
  16. 16 HUANG, J., STANKOVIC, J., RAMARITHAM, K., AND TOWSLEY, D. On using priority inheritance in real-time databases. COINS TR 90-121, Dept. of Computer and Information Science, Univ. of Massachussetts, Nov. 1990. Google ScholarGoogle Scholar
  17. 17 HUANG, J., STANKOVIC, J., TOWSLEY, D., AND RAMARITHAM, K. Experimental evaluation of real-time transaction processing. IEEE Real-Time Syst. Symp. (Dec. 1989), 144 153.Google ScholarGoogle Scholar
  18. 18 ISLOOR, S., AND MARS~ND, T. The deadlock problem: An overview. IEEE Comput. (Sept. 1980), 55-78.Google ScholarGoogle Scholar
  19. 19 IYER, B., Yu, P., AND LEE, Y. Analysis of recovery protocols in distributed on-line transaction processing systems. IEEE Real-time Syst. Symp. (Dec. 1986), 226-233.Google ScholarGoogle Scholar
  20. 20 JAUHARI, R., CAREY, M., AND LiVNY M. Priority hints: An algorithm for priority based buffer management. TR 911, Computer Sciences Dept., Univ. of Wisconsin-Madison, Feb. 1990.Google ScholarGoogle Scholar
  21. 21 JENSEN, E., LOCKE, C. D., AND TOKUDA, H. A time-driven scheduling model for real-time operating systems. IEEE Real-Time Syst. Symp. (Dec. 1985), 112-122.Google ScholarGoogle Scholar
  22. 22 LEE, I., AND DAVIDSON, S. Adding time to synchronous process communications. IEEE Trans. Comput. C-36, 8 (Aug. 1987), 941-948. Google ScholarGoogle Scholar
  23. 23 LEE, Y. H., Yu, P. S., AND IYER, B. R. Progressive transaction recovery in distributed DB/DC systems. IEEE Trans. Comput. C-36, 8 (Aug. 1987), 976-987. Google ScholarGoogle Scholar
  24. 24 LIN, K., AND LIN, M. Enhancing availability in distributed real-time databases. ACM SIGMOD Rec. (Mar. 1988), 34 43. Google ScholarGoogle Scholar
  25. 25 LIN, Y., AND SON, S. Concurrency control in real-time databases by dynamic adjustment of serialization order. IEEE Real-time Syst. Syrup. (Dec. 1990), 104-112.Google ScholarGoogle Scholar
  26. 26 LIu, C. L., ANO WAYLAND, J. W. Scheduling algorithms for multiprogramming in hard real-time environment. J. ACM 20, (Jan. 1973), 46-61. Google ScholarGoogle Scholar
  27. 27 MoK, A. Fundamental design problems of distributed systems for the real-time environment. Ph.D. thesis, Dept. of Electrical Engineering and Computer Science, MIT, Cambridge, Mass., May 1983.Google ScholarGoogle Scholar
  28. 28 PETERSON, J., AND SILBERSCHATZ, A. OpercttlTgg System Concepts. Addison-Wesley, Reading, Mass., 1986. Google ScholarGoogle Scholar
  29. 29 SHA, L., LEHOCZKY, J. P., AND JENSEN, E. D. Modular concurrency control and failure recovery IEEE Trans. Comput. 37 (Feb. 1988), 146-159. Google ScholarGoogle Scholar
  30. 30 SHA, L., RAJKUMAR, R., AND LEHOCZKY, J.P. Priority inheritance protocols: An approach to real-time synchronization, CMU-CS-87-181, Dept. of Computer Science, Carnegie-Mellon Univ., Dec. 1987.Google ScholarGoogle Scholar
  31. 31 SHA, L., RAJKUMAR, R., AND LEHOCZKY, J.P. Concurrency control for distributed real-time databases. ACM SIGMOD Rec. 17 (Mar. 1988), 82-98. Google ScholarGoogle Scholar
  32. 32 S?ANKOV~C, J., AND ZHAO, W. On real-time transactions. ACM SIGMOD Rec. 17 (Mar. 1988), 4-18. Google ScholarGoogle Scholar
  33. 33 STOK, P. VAN DER. The feasibility of a relational database programming language in process control. IEEE Real-Tzme Syst. Syrup. (Dec. 1984), 105-113.Google ScholarGoogle Scholar
  34. 34 VOELCKER, J How computers helped stampede the stock market. IEEE Spectrum 24 (Dec. 1987), 30-33. Google ScholarGoogle Scholar

Index Terms

  1. Scheduling real-time transactions: a performance evaluation

        Recommendations

        Reviews

        Susan Ann Mengel

        The authors present a readable paper about scheduling real-time database transactions. They present appropriate motivation for their work and outline what their work does and does not address. The list of references can serve as a good starting point for those interested in the area. The paper starts by showing a motivation for real-time database transactions in the example of a database to model a financial market, where stock trading must be performed within a limited time frame or lower prices will be forfeit. The authors discuss previous work to a limited degree, relying mostly on references to papers. They present their algorithms for scheduling real-time transactions in which the release time (earliest time a transaction can start), deadline, and estimate of the duration of the transaction are factors. Their algorithms have the objective of reducing missed deadlines. The algorithms for managing overloads (whenever transaction timing constraints are violated) are “all eligible,” in which transactions are not aborted; “not tardy,” which aborts transactions that have missed deadlines; and “feasible deadlines,” in which transactions with infeasible deadlines are aborted. They can assign priorities in three ways: “First come first served” gives a high priority to the transaction with the earliest release time. “Earliest deadline” gives a high priority to the transaction with the earliest deadline. “Least slack” assigns priorities based on the amount of time a transaction has before execution must begin in order to make its deadline (the time may be evaluated once or continuously). Four concurrency control methods are presented (to serialize concurrent transactions). In the “wait” approach, all transactions must wait on a locked portion of the database regardless of priority inversion (high priority waits on low priority). In “wait promote,” priority inversion is handled by raising the priority of the lower blocking transaction. In “high priority,” a higher priority transaction preempts a lower priority transaction only if the lower priority transaction will not eventually gain a higher priority than the preempting transaction (under the least slack algorithm). “Conditional restart” is like high priority, but the transaction is not aborted if it can finish within the slack time of the higher priority transaction. IO scheduling, needed to service high-priority requests even if seek time is not minimized, is either first-in first-out (close to transaction priorities) or priority, in which high-priority transactions can leap over low-priority transactions. The algorithms are simulated in a variety of combinations, with the usual simplifying assumptions of ignoring time to detect deadlocks and execute locks. Experiments are performed with the database completely in memory and with the database on disk. Many simulation results are presented. The proliferation of abbreviations of the different algorithm combinations is sometimes confusing. When the database is disk-resident, least slack, wait promote, and priority IO scheduling are best overall. When the database is memory-resident, earliest deadline is best at lower loads, least slack is best at higher loads, and wait promote and conditional restart perform well with least slack.

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Database Systems
          ACM Transactions on Database Systems  Volume 17, Issue 3
          Sept. 1992
          176 pages
          ISSN:0362-5915
          EISSN:1557-4644
          DOI:10.1145/132271
          Issue’s Table of Contents

          Copyright © 1992 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 September 1992
          Published in tods Volume 17, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader