10.1145/2745947.2746688acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedings
research-article

Reducing the vulnerability window in distributed transactional protocols

ABSTRACT

In this paper, we introduce a technique that can be used by distributed transactional protocols to reduce the vulnerability window of transactions. For this purpose, we propose a so far unexplored (to the best of our knowledge) usage of hybrid clocks. On one hand, loosely synchronized physical clocks are used to maximize the freshness of the snapshots used by transactions to read. On the other hand, logical clocks are used to reduce the extent to which the snapshot of update transactions is advanced upon their commit.

We claim that the joint usage of these two techniques can potentially reduce the abort rate in comparison to previous protocols such as Clock-SI, GMU, and SCORe.

References

  1. Cockroach. https://github.com/cockroachdb/cockroach.Google ScholarGoogle Scholar
  2. IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems. IEEE Std 1588-2002, pages i--144, 2002.Google ScholarGoogle Scholar
  3. P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Boston, MA, USA, 1987. Google ScholarGoogle Scholar
  4. J. Du, S. Elnikety, and W. Zwaenepoel. Clock-si: Snapshot isolation for partitioned data stores using loosely synchronized clocks. In SRDS '13, pages 173--184, Sept 2013. Google ScholarGoogle Scholar
  5. A. Fekete, D. Liarokapis, E. O'Neil, P. O'Neil, and D. Shasha. Making snapshot isolation serializable. ACM Trans. Database Syst., 30(2): 492--528, June 2005. Google ScholarGoogle Scholar
  6. C. J. Fidge. Timestamps in message-passing systems that preserve the partial ordering. 1987.Google ScholarGoogle Scholar
  7. S. Kulkarni, M. Demirbas, D. Madappa, B. Avva, and M. Leone. Logical physical clocks. In Principles of Distributed Systems, volume 8878 of Lecture Notes in Computer Science, pages 17--32. 2014.Google ScholarGoogle Scholar
  8. L. Lamport. Time, clocks, and the ordering of events in a distributed system. Commun. ACM, 21(7): 558--565, July 1978. Google ScholarGoogle Scholar
  9. F. Mattern. Virtual time and global states of distributed systems. Parallel and Distributed Algorithms, 1(23): 215--226, 1989.Google ScholarGoogle Scholar
  10. D. L. Mills. A brief history of ntp time: Memoirs of an internet timekeeper. ACM SIGCOMM Computer Communication Review, 33 (2): 9--21, 2003. Google ScholarGoogle Scholar
  11. S. Peluso, P. Romano, and F. Quaglia. Score: A scalable one-copy serializable partial replication protocol. In Proceedings of the 13th International Middleware Conference, Middleware '12, pages 456--475, New York, NY, USA, 2012. Google ScholarGoogle Scholar
  12. S. Peluso, P. Ruivo, P. Romano, F. Quaglia, and L. Rodrigues. When scalability meets consistency: Genuine multiversion update-serializable partial data replication. In ICDCS '12, pages 455--465, June 2012. Google ScholarGoogle Scholar
  13. S. K. Sarin and N. A. Lynch. Discarding obsolete information in a replicated database system. Software Engineering, IEEE Transactions on, (1): 39--47, 1987. Google ScholarGoogle Scholar
  14. N. Schiper, P. Sutra, and F. Pedone. P-store: Genuine partial replication in wide area networks. In SRDS '10, pages 214--224, Washington, DC, USA, 2010. Google ScholarGoogle Scholar
  15. D. Sciascia, F. Pedone, and F. Junqueira. Scalable deferred update replication. In Proceedings of the 2012 42Nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), DSN '12, pages 1--12, Washington, DC, USA, 2012. Google ScholarGoogle Scholar
  16. G. T. Wuu and A. J. Bernstein. Efficient solutions to the replicated log and dictionary problems. In Proceedings of the third annual ACM symposium on Principles of distributed computing, pages 233--242. ACM, 1984. Google ScholarGoogle Scholar

Index Terms

  1. Reducing the vulnerability window in distributed transactional protocols

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Article Metrics

        • Downloads (Last 12 months)12
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!