skip to main content
10.1145/800220.806695acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article
Free Access

Edge locks and deadlock avoidance in distributed systems

Published:18 August 1982Publication History

ABSTRACT

Two locking protocols are defined for distributed database systems. One protocol provides deadlock avoidance without the need to roll back transactions. The other allows a useful weakening of the protocol in which only a limited class of easily handled deadlocks may occur. The protocols are capable of handling replicated as well as partitioned data. Like the centralized protocol on which they are based, the protocol of this paper permits locking at multiple granularities and allows collections of locks to be constructed to correspond to an arbitrary collection of database operations. Special provisions are made in the protocol to allow readers, and in particular, readers that touch data at only one site, to execute with less locking overhead than writers. Following the description of the protocol, comparisons are made between the protocol of this paper and other protocols previously published that offer similar features.

References

  1. 1.Attar, R., P.A. Bernstein, and N. Goodman (1982), "Site Initialization, Recovery, and Back-Up in a Distributed Database System," Proc. 6 Berkeley Workshop on Distributed Databases and Computer Networks, pp. 185-202.Google ScholarGoogle Scholar
  2. 2.Bernstein, P.A., and N. Goodman (1981), "Concurrency Control in Distributed Database Systems," ACM Computing Surveys, 13:2, pp. 185-221. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Eswaran, K.E., J.N. Gray, R.A. Lorie, and I.L. Traiger (1976), "On the Notions of Consistency and Predicate Locks in a Relational Database System," Comm. ACM 14:11, pp. 624-634. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.Gray, J.N. (1978), "Notes on Database Operating Systems," RJ3120, IBM Research Laboratory, San Jose, CA., also in Operating Systems, An Advanced Course, Lecture Notes in Computer Science 60, Goos and Hartmanis, eds. Springer-Verlag, pp. 393-481. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Gray, J.N., R.A. Lorie, G.R. Putzolu, and I.L. Traiger (1975), "Granularity of Locks and Degrees of Consistency in a Shared Data Base," RJ1654, IBM Research Laboratory, San Jose, CA.Google ScholarGoogle Scholar
  6. 6.Korth, H.F. (1981a), "Locking Primitives in a Database System," to appear, J. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Korth, H.F. (1981b), "Deadlock Freedom Using Edge Locks," to appear, ACM Transactions on Database Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Lamport, L. (1978), "Time, Clocks and the Ordering of Events in a Distributed System," Comm. ACM, 21:7, pp. 558-565. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Lindsay, B.G., P.G. Selinger, C. Galtieri, J.N. Gray, R.A. Lorie, T.G. Price, F. Putzolu, I.L. Traiger, B.W. Wade (1979), "Notes on Distributed Databases," RJ2571, IBM Research Laboratory, San Jose, CA.Google ScholarGoogle Scholar
  10. 10.Menasce, D.A., G.J. Popek, and R.R. Muntz (1980), "A Locking Protocol for Resource Coordination is Distributed Databases," ACM Transactions on Database Systems, 5:2, pp. 103-138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.Rosenkrantz, D.J., R.E. Stearns, and P.M. Lewis (1978), "System Level Concurrency Control for Distributed Database Systems," ACM Transactions on Database Systems, 3:2, pp. 178-198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Traiger, I.L., J.N. Gray, C.A. Galtieri, and B.G. Lindsay (1978), "Transactions and Consistency in Distributed Database Systems," RJ2555, IBM Research Laboratory, San Jose, CA.Google ScholarGoogle Scholar
  13. 13.Ullman, J.D. (1980), Principles of Database Systems, Computer Science Press, Potomac, MD. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Edge locks and deadlock avoidance in distributed systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          PODC '82: Proceedings of the first ACM SIGACT-SIGOPS symposium on Principles of distributed computing
          August 1982
          261 pages
          ISBN:0897910818
          DOI:10.1145/800220

          Copyright © 1982 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 August 1982

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate740of2,477submissions,30%

          Upcoming Conference

          PODC '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader