skip to main content
10.1145/800177.810032acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-national-conferenceConference Proceedingsconference-collections
Article
Free Access

A model of the performance of a rollback algorithm

Published:01 January 1979Publication History

ABSTRACT

The performance characteristics of a rollback algorithm are analyzed in a simulation experiment. An overview of the operation of the rollback algorithm is presented, followed by a discussion of the simulation model and its parameters. The model, as implemented, consists of data definition, data manipulation command processing, and rollback facilities. The model is parameterized in terms of number of application tasks and amount of data sharing and driven by randomized streams of data manipulation language commands. The simulation experiment applies the model to a CODASYL DBMS in an environment in which the rollback algorithm is initiated by a deadlock detection procedure. The overhead of the rollback algorithm in this environment is projected in terms of CPU utilization and file accesses. The results indicate that the factors having the strongest influence upon the performance of the rollback algorithm are update frequency and the degree of data sharing among programs. The performance projections indicate that the rollback algorithm introduces only a small amount of overhead even in worst case situations.

References

  1. 1.Colliat, G. and Bachman, C., "Commitment in a Distributed Database," Conf. on Very Large Data Bases, Sept. 1978.Google ScholarGoogle Scholar
  2. 2.Deppe, M. E., "Recovery and Restart in a Distributed Environment," Hewlett-Packard, General Systems Division, Santa Clara, CA 95059, June 1978.Google ScholarGoogle Scholar
  3. 3.Eswaran, K. P. et al., "The Notions of Consistency and Predicate Locks in a Data Base System," CACM (19, 11), Nov. 1976, pp. 624-633. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.Everest, G. C., "Concurrent Update Control and Database Integrity," in Data Base Management (Klimbie, J. W. and Koffeman, K. L., eds.), North-Holland, Apr. 1974, pp. 241-270.Google ScholarGoogle Scholar
  5. 5.Gray, J. N.; Lorie, R. A.; and Putzolu, G. R., "Granularity of Locks in a Shared Data Base," Conf. on Very Larg Data Bases, Sept. 1975, pp. 428-451.Google ScholarGoogle Scholar
  6. 6.Hill, E. Jr., "Analysis of An Inverted Data Base Structure," ACM SIGIR Conf., May 1978, pp. 37-64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Holt, R. C., "Some Deadlock Properties of Computer Systems," Computing Surveys (4,3), Sept. 1972, pp. 179-196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.King, P. F. and Collmeyer, A. J., "Database Sharing—An Efficient Mechanism for Supporting Concurrent Processes," National Computer Conf. Vol. 42, June 1973, pp. 271-275.Google ScholarGoogle Scholar
  9. 9.Lomet, D. B., "A Practical Deadlock Avoidance Algorithm for Data Base Systems," ACM SIGMOD Conf., Aug. 1977, pp. 122-127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.Macri, P. P., "Deadlock Detection and Resolution in a CODASYL Based Data Management System," ACM SIGMOD Conf., May 1976, pp. 45-49. Google ScholarGoogle Scholar
  11. 11.March, S. T. and Severance, D. G., "The Determination of Efficient Record Segmentations and Blocking Factors for Shared Data Files," ACM TODS (2, 3), Sept. 1977, pp. 279-296. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Maryanski, F. J., "Restart and Recovery in Distributed Databases," Distributed Database, Infotech-State-of-the-Art Report, 1979.Google ScholarGoogle Scholar
  13. 13.Maryanski, F. J. and Fisher, P. S., "Rollback and Recovery in Distributed Data Base Management Systems," ACM Annual Conf., Oct. 1977, pp. 33-38.Google ScholarGoogle Scholar
  14. 14.Menasce, D.; Muntz, R.; and Popek, G., "A Formal Model of Crash Recovery in Computer Systems," Hawaii Int. Conf. on System Sciences, Vol. I, Jan. 1979.Google ScholarGoogle Scholar
  15. 15.Munz, R. and Krenz, G., "Concurrency in Database Systems—A Simulation Study," ACM SIGMOD Conf., Aug. 1977, pp. 111-120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.Norsworthy, K. A., "Simulation of a Selective Rollback and Recovery Methodology," M.S. Report, Dept. Of Computer Science, Kansas State University, Manhattan, KS, Aug. 1978.Google ScholarGoogle Scholar
  17. 17.Ries, D. P. and Stonebaker, M., "Effects of Locking Granularity in a Database Management System," ACM TODS (2,3), Sept. 1977, pp. 233-246. 18 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.Severance, D. G. and Lohman, G. M., "Differential Files: Their Application to the Maintenance of Large Databases," ACM TODS (1,3), Sept. 1976, pp. 256-267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.Shemer, J. E. and Collmeyer, A. J., "Database Sharing: A Study of Interference, Roadblock, and Deadlock," ACM SIGFIDET Workshop, Nov. 1972, pp. 147-163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.Verhofstad, J. S. M., "Recovery and Crash Resistance in a Filing System," ACM SIGMOD Conf., Aug. 1977, pp. 158-167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.Verhofstad, J. S. M., "Recovery Techniques for Database Systems," ACM computing surveys (10, 2), June 1978, pp, 167-196. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A model of the performance of a rollback algorithm

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ACM '79: Proceedings of the 1979 annual conference
            January 1979
            260 pages
            ISBN:0897910087
            DOI:10.1145/800177

            Copyright © 1979 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 January 1979

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader