William Easton. Introduction  Mobile Environments  Locking and Data Starvation  Mobile DB Architecture  Timing Mechanisms  Static Timer  Dynamic.

Slides:



Advertisements
Similar presentations
Chapter 6 Concurrency: Deadlock and Starvation Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee Community.
Advertisements

Chapter 6 Concurrency: Deadlock and Starvation Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee Community.
1 Concurrency Control III Dead Lock Time Stamp Ordering Validation Scheme.
Chapter 6 Concurrency: Deadlock and Starvation Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee Community.
Concurrency: Deadlock and Starvation Chapter 6. Deadlock Permanent blocking of a set of processes that either compete for system resources or communicate.
CPU Scheduling Questions answered in this lecture: What is scheduling vs. allocation? What is preemptive vs. non-preemptive scheduling? What are FCFS,
Nummenmaa & Thanish: Practical Distributed Commit in Modern Environments PDCS’01 PRACTICAL DISTRIBUTED COMMIT IN MODERN ENVIRONMENTS by Jyrki Nummenmaa.
Concurrency Control.
Chapter 9 Uniprocessor Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Dave Bremer Otago Polytechnic, N.Z. ©2008,
Chapter 9 Uniprocessor Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Dave Bremer Otago Polytechnic, N.Z. ©2008,
Avishai Wool lecture Introduction to Systems Programming Lecture 5 Deadlocks.
Ceng Operating Systems Chapter 2.2 : Process Scheduling Process concept  Process scheduling Interprocess communication Deadlocks Threads.
More on transactions…. Dealing with concurrency (OR: how to handle the pressure!) Locking Timestamp ordering Multiversion protocols Optimistic protocols.
Preemptive Behavior Analysis and Improvement of Priority Scheduling Algorithms Xiaoying Wang Northeastern University China.
CPSC 4650 Operating Systems Chapter 6 Deadlock and Starvation
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
1 Concurrency: Deadlock and Starvation Chapter 6.
Concurrency Control by Validation (Section 18.9) Priyadarshini.S Cs_257_117_ch 18_18.9.
SRDS’03 Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Xinyu Chen and Michael R. Lyu The Chinese Univ. of Hong Kong Hong.
Transaction. A transaction is an event which occurs on the database. Generally a transaction reads a value from the database or writes a value to the.
© 1997 UW CSE 11/13/97N-1 Concurrency Control Chapter 18.1, 18.2, 18.5, 18.7.
Client-Server Computing in Mobile Environments
Concurrency: Deadlock and Starvation Chapter 6. Goal and approach Deadlock and starvation Underlying principles Solutions? –Prevention –Detection –Avoidance.
1 Concurrency: Deadlock and Starvation Chapter 6.
AN OPTIMISTIC CONCURRENCY CONTROL ALGORITHM FOR MOBILE AD-HOC NETWORK DATABASES Brendan Walker.
Chapter 6 Concurrency: Deadlock and Starvation Operating Systems: Internals and Design Principles, 6/E William Stallings Dave Bremer Otago Polytechnic,
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Cosc 4740 Chapter 6, Part 3 Process Synchronization.
Progress Report 2014/02/12. Previous in IPDPS’14 Energy-efficient task scheduling on per- core DVFS architecture ◦ Batch mode  Tasks with arrival time.
ONLINE GAME NETWORK TRAFFIC OPTIMIZATION Jaewoo kim Youngho yi Minsik cho.
The Owner Share scheduler for a distributed system 2009 International Conference on Parallel Processing Workshops Reporter: 李長霖.
CPU Scheduling CSCI 444/544 Operating Systems Fall 2008.
Chapter 11 Concurrency Control. Lock-Based Protocols  A lock is a mechanism to control concurrent access to a data item  Data items can be locked in.
Chapter 15 Concurrency Control Yonsei University 1 st Semester, 2015 Sanghyun Park.
1 Announcements The fixing the bug part of Lab 4’s assignment 2 is now considered extra credit. Comments for the code should be on the parts you wrote.
1 Deadlocks Chapter Resource 3.2. Introduction to deadlocks 3.3. The ostrich algorithm 3.4. Deadlock detection and recovery 3.5. Deadlock avoidance.
Low Cost Commit Protocols for Mobile Computing Environments Marc Perron & Baochun Bai.
Deadlocks Silberschatz Ch. 7 and Priority Inversion Problems.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
1 Multiversion Reconciliation for Mobile Databases Shirish Hemanath Phatak & B.R.Badrinath Presented By Presented By Md. Abdur Rahman Md. Abdur Rahman.
Uniprocessor Scheduling Chapter 9. Aim of Scheduling Assign processes to be executed by the processor or processors: –Response time –Throughput –Processor.
Article by: Weibo Li, Hong Yang and Ping He Presented by: Shawn Karnoski The Research And Application of Embedded Mobile Database.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Chapter 6 Concurrency: Deadlock and Starvation Operating Systems: Internals and Design Principles, 6/E William Stallings.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
NMT’s Computer Science and Engineering Education & Research Programs Dr. Lorie M. Liebrock Chair, Computer Science and Engineering.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
Database System Concepts, 6 th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 15 : Concurrency.
Academic Year 2014 Spring Academic Year 2014 Spring.
Chapter 9 Uniprocessor Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Dave Bremer Otago Polytechnic, N.Z. ©2008,
DBMS Deadlock.
Copyright ©: Nahrstedt, Angrave, Abdelzaher1 Deadlock.
Informationsteknologi Monday, October 1, 2007Computer Systems/Operating Systems - Class 111 Today’s class Deadlock.
Chapter 6 Concurrency: Deadlock and Starvation Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee Community.
Persistent Memory (PM)
Introduction to Load Balancing:
Transaction Management
April 6, 2001 Gary Kimura Lecture #6 April 6, 2001
Concurrency Control.
Part- A Transaction Management
A Power Reset is one of the best methods to fix lots of problems associated with your HP laptop, like Windows not.
18.5 An Architecture for a Locking Scheduler
Essbase Data Integrity
Chapter 15 : Concurrency Control
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri and Eugen Bleim
CSE 542: Operating Systems
CSE 542: Operating Systems
System-Level Support CIS 640.
Brahim Ayari, Abdelmajid Khelil and Neeraj Suri
Presentation transcript:

William Easton

Introduction  Mobile Environments  Locking and Data Starvation  Mobile DB Architecture  Timing Mechanisms  Static Timer  Dynamic Timer  Preemptive Timer

Mobile Environments  Prone to Connection loss Timeouts Loss of bandwidth Reduced storage Limited battery power All these contribute to the frequency of failures of mobile databases.

Data Starvation  Phone connects and locks data Phone disconnects Phone holds that lock (indefinitely) Other mobile devices cannot access that information  These locking strategies are good for traditional databases but are not optimal for mobile

Mobile DB Architecture  Mobile host  Fixed host  Mobile host may not always be connected to the fixed host

Timing Mechanisms  Static timer A transaction must commit before the timer is finished ○ If not the transaction is aborted and locked data is aquired by the next mobile host attempting to access the information  Dynamic Timer The solution this paper introduces

Dynamic Timer  Starts off with specified timer  As transactions are executed it changes according to how they are being executed  If transactions are running past the timer and are rolled back then the timer is increased slightly

Dynamic Timer  So processes that would’ve unsuccessfully processed earlier might be able to be completed Leads to fewer rollbacks There has to be a catch ○ Larger overhead ○ Processes in the queue will have to wait longer to access the data they need  There is a threshold time that the dynamic timer cannot surpass

Dynamic Timer This is an activity diagram from the paper to depict how the timer will be adjusted.

Static Timer

Dynamic Timer

Preemptive Timer

Final Metrics  Timeout(static)  Dynamic  Preemption  Overall the preemptive has the best commit rate with the least time but does require the knowledge of execution times

Questions  Mobile environments  Static methods  Dynamic method  Preemptive method  Conclusions