By Topic

Using separate algorithms to process read-only transactions in real-time systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Kwok-Wa Lam ; Dept. of Comput. Sci., City Univ. of Hong Kong, Kowloon, Hong Kong ; Son, S.H. ; Lee, V.C.S. ; Sheung-Lun Hung

In this paper, we investigate the approach of using separate algorithms to process read-only transactions in real-time systems. A read-only transaction (ROT) is a transaction that only reads, but does not update any data item. Since there is a significant proportion of ROTs in several real-time systems, it is important to investigate how to process ROTs effectively. Using an algorithm to process ROTs separately from update transactions may reduce the interference between ROTs and update transactions. This reduced interference alleviates the impact of concurrency control on real-time priority-driven scheduling and improves the timeliness of the system. Moreover, we explore the different consistency requirements of ROTs. Particularly, we define a weaker form of consistency, view consistency, which allows ROTs to perceive different serialization order of update transactions. While view consistency permits non-serializability, ROTs are still ensured to see consistent data. We propose two robust algorithms for different consistency requirements of ROTs. The two algorithms are robust in the sense that they can be used in a compatible way so that a real-time system can provide different consistent data for different applications. The performance of two algorithms was examined through a series of simulation studies. The simulation results show that the two algorithms outperform the high-priority two-phase locking protocol

Published in:

Real-Time Systems Symposium, 1998. Proceedings., The 19th IEEE

Date of Conference:

2-4 Dec 1998