Concurrency control in graph protocols by using edge locks

  • Authors:
  • Gael N. Buckley;Avi Silberschatz

  • Affiliations:
  • University of Texas at Austin, Austin, Texas;University of Texas at Austin, Austin, Texas

  • Venue:
  • PODS '84 Proceedings of the 3rd ACM SIGACT-SIGMOD symposium on Principles of database systems
  • Year:
  • 1984

Quantified Score

Hi-index 0.00

Visualization

Abstract

A large number of locking protocols use precedence relations among data items to ensure the serializability of the database system. These protocols have extended the semantics of the exclusive lock from prohibiting access to a data item to prohibiting access to an entire subgraph. In this paper we argue that combining the use of exclusive locks for these different purposes is ill conceived. We present a general theory on how these two distinct functions can be separated into the traditional locks operating on the individual data items, and a corresponding set operating on the edges of graph. This is illustrated by a general transformation from a given graph protocol to the new edge protocol which preserves the major properties of the original protocol. We then give a characterization for a large class of edge lock protocols within a database system, which includes most previous locking protocols defined on databases organized as graphs. We show how this separation increases concurrency, and generalizes previously unrelated concepts, such as using deadlock avoidance locks in general locking protocols.