High Volume Transaction Processing Without Concurrency Control, Two Phase Commit, SQL Or

Total Page:16

File Type:pdf, Size:1020Kb

High Volume Transaction Processing Without Concurrency Control, Two Phase Commit, SQL Or High Volume Transaction Pro cessing Without Concurrency Control Two Phase Commit SQL or C Arthur Whitney Dennis Shasha Stevan Apter KX Systems Courant Institute NYU Union Bank of Switzerland Harker Avenue Mercer Street Park Avenue Palo Alto CA New York NY New York NY Abstract Imagine an application environment in which subsecond response to thousands of events gives the user a distinct competitive advantage yet transactional guarantees are important Imag ine also that the data ts comfortably into a few gigabytes of Random Access Memory These attributes characterize many nancial trading applications Which engine should one use in such a case IBM FastPath Sybase Oracle or Object Store We argue that an unconventional approach is cal led for we use a listbased language cal led K having optimized support for bulk array operators and that integrates networking and a graphical user interface Locking is unnecessary when singlethreading such applications because the data ts into memory obviating the need to go to disk except for logging purposes Multithreading can be hand led for OLTP applications by analyzing the arguments to transactions The result is a private sizereduced TPCB benchmark that achieves transactions per second with ful l recoverability and TCPIP overhead on an Megahertz UltraSparc I Further hot disaster recovery can be done with far less overhead than required by two phase commit by using a sequential state machine approach We show how to exploit multiple processors without complicating the language or our basic framework A Brief Description of the K Language K is listbased language integrating bulk op erators interpro cess communication and graphical user interface facilities designed and implemented by Arthur Whitney It is extremely concise For example a simple spreadsheet has b een implemented in ab out characters including the graphical user interface as illustrated in Figure Partly supp orted by NSF grants IRI and IRI Authors email addresses nnyaptnyubscom Steve Apter shashacsnyuedu Dennis Shasha asapnetcomcom Arthur Whitney FtD yF FfD The first line executes each formula of F and assigns the results to the corresponding positions of D The second line assigns those values of D to the corresponding display fields of F FDabcd across and deep showF Figure This K program implements a by spreadsheet including a user interface and full access to vector functionality Comments b egin with slashes The program has two data structures a set of formulas and constants F and a set of data D Every time a formula is changed the trigger Ft res This trigger up dates the data D based on the data and for mulas The strings F and data D are initialized to b e by arrays of blanks The last line displays the spreadsheet This program has slightly more functionality b ecause arbi trary formulas are allowed than a simple spreadsheet written in Java presented at lo cation httpwwwjavasoftcomappletsappletsSpreadSheetexamplehtml Unlike most other listbased languages K is extremely fast For example sorting three million records in memory takes two seconds on an IBM K is also small The entire runtime system written in C ts in bytes The basic data structures are arbitrary length multilists and dictionaries asso ciative arrays Binary op erations on equilength multilists include elementbyelement addition multiplication subtraction and division max and min Bo olean comparison op erators are also elementbyelement returning a list of s and s These op erators are overloaded with scalar variants as in APL So one can for example compare to every element in a list L and get a list of s and s of length jLj such that p osition i is if is equal to the ith p osition in the list and otherwise Rearrangement op erators include sort duplicate removal and partition Partition on a list L returns a list of sublists of p ositions where a given sublist of p ositions consists of all those p ositions in L having equal values For example applying partition to the list returns a list consisting of sublists p ositions having value p ositions having value and p ositions having value Lo cation functions include memb er ie is a value in a list nd viz nd rst place in a list having a value and where nd all places in a list having a value Find can b e optimized using hashing Any op erator can b e mo died to form a crosspro duct as well as left and right halfcross pro ducts Using the full crosspro duct one can for example compare every memb er of list L with every memb er of another list L This returns a list of s and s whose length is the pro duct of the cardinalities of L and of L Using the left halfcrosspro duct one can also compare or add or divide or any other binary op erations each memb er of L with all of L returning a list of sublists where each sublist is of the length of L and the numb er of sublists is the length of L Reduction op erators include count and prex scan For example one can mo dify the op erator plus with prex scan on the list and get the result Another op erator called over gives the last element of the plus prex scan for the example ab ove Twodimensional tables are built from multiple lists a fully vertically partitioned representa tion in which each attribute is asso ciated with a list Each value in an attribute can itself b e a list Vertical partitioning works well for decision supp ort b ecause only the attributes necessary for a query are brought in Also the scanning rates in K are very fast For example million records in RAM can b e scanned in seconds on an UltraSparc I to check that a eld value is greater than using the where feature mentioned ab ove The op erators ab ove allow K to implement relational algebra and aggregates including group by and having clauses An ecient library for all of relational algebra ts comfortably on a page Since K treats names as regular data one can p erform secondorder queries Supp ose for example that you want to union certain elds of a group of tables where the group is presented as a list of names SQL do esnt allow this but Ks second order facility makes this a short one liner In addition K has unied le inputoutput with TCPIP supp ort and has a graphical user interface built on top of XWindows in which the values of variables can determine their color This is useful on Wall Street where painting losses red is a useful visual cue K do es not have p ointers so do es not need to worry ab out p ointer swizzling Instead data structures are memorymapp ed from les Having a language with bulk op erators implies that there is no discontinuity b etween data intensive op erators and other op erators In the Wall Street context for example K supp orts b oth trading and analytics in a seamless fashion There is no need for cursors th genera tion languages emb edding calls from C or C SQL OSQL PowerBuilder Motif or Op en ClientOp enServer packages Note The Sigmo d reviewers found it annoying that we had no references for K The language is in fact proprietary even its description We therefore dep end on the readers cultural knowledge of APL as well as the descriptions ab ove to get a sense of what the language is Transaction Pro cessing Strategy The rest of this pap er concentrates on only the most essential asp ects of the K language A full and very fast programming language with bulk op erators that can easily express SQL emb o dies order eg top ten queries and that can b oth access disks and send and receive TCPIP messages How do we construct an online transaction pro cessing from such a language It turns out to b e embarrassingly simple Assume that a transaction program is implemented as a K pro cedure so it can b e describ ed by its name and its arguments Typical Wall Street programs enter a trade and up date the traders p osition as well as many subsidiary risk tables and back oce billclearing databases A message may consist of many transaction instances hereafter just transactions Our basic strategy is to log all incoming messages onto disk and then to p erform the transactions in those messages on the inmemory version of the database Recovery consists of replaying the logged transactions on disk after repro ducing the state from an appropriate dump In our applications so far this is the dump of the state as of last night Message logging is sucient b ecause the database is up dated sequentially Group Logging The basic strategy is slow if every transaction is logged separately So we write many trans actions each transaction is represented by its transaction typ e and all its parameters at a time to disk Once they are written to disk they are secure against main memory failure b ecause one can always recover the state of the database by replaying the log Disaster Recovery Warm start recovery might b e slow even with group logging b ecause one might have to recover from a transaction log that is very long Avoiding this problem requires frequent ie intraday dumping but let us step back a minute In the Wall Street setting we are worried not only ab out warm start recovery pro cessor failure and media failure lo cal disk but site failure as well rememb er the World Trade Center b ombing So we are interested in remote backups Further we want to dump the database state p erio dically for fast recovery in case of a massive p ower failure For these reasons the backup sites b ehave dierently from the primary as seen in gure On the primary a single pro cess logs a batch of transactions and applies them to the inmemory database In every backup a logger pro cess
Recommended publications
  • Let's Talk About Storage & Recovery Methods for Non-Volatile Memory
    Let’s Talk About Storage & Recovery Methods for Non-Volatile Memory Database Systems Joy Arulraj Andrew Pavlo Subramanya R. Dulloor [email protected] [email protected] [email protected] Carnegie Mellon University Carnegie Mellon University Intel Labs ABSTRACT of power, the DBMS must write that data to a non-volatile device, The advent of non-volatile memory (NVM) will fundamentally such as a SSD or HDD. Such devices only support slow, bulk data change the dichotomy between memory and durable storage in transfers as blocks. Contrast this with volatile DRAM, where a database management systems (DBMSs). These new NVM devices DBMS can quickly read and write a single byte from these devices, are almost as fast as DRAM, but all writes to it are potentially but all data is lost once power is lost. persistent even after power loss. Existing DBMSs are unable to take In addition, there are inherent physical limitations that prevent full advantage of this technology because their internal architectures DRAM from scaling to capacities beyond today’s levels [46]. Using are predicated on the assumption that memory is volatile. With a large amount of DRAM also consumes a lot of energy since it NVM, many of the components of legacy DBMSs are unnecessary requires periodic refreshing to preserve data even if it is not actively and will degrade the performance of data intensive applications. used. Studies have shown that DRAM consumes about 40% of the To better understand these issues, we implemented three engines overall power consumed by a server [42]. in a modular DBMS testbed that are based on different storage Although flash-based SSDs have better storage capacities and use management architectures: (1) in-place updates, (2) copy-on-write less energy than DRAM, they have other issues that make them less updates, and (3) log-structured updates.
    [Show full text]
  • Failures in DBMS
    Chapter 11 Database Recovery 1 Failures in DBMS Two common kinds of failures StSystem filfailure (t)(e.g. power outage) ‒ affects all transactions currently in progress but does not physically damage the data (soft crash) Media failures (e.g. Head crash on the disk) ‒ damagg()e to the database (hard crash) ‒ need backup data Recoveryyp scheme responsible for handling failures and restoring database to consistent state 2 Recovery Recovering the database itself Recovery algorithm has two parts ‒ Actions taken during normal operation to ensure system can recover from failure (e.g., backup, log file) ‒ Actions taken after a failure to restore database to consistent state We will discuss (briefly) ‒ Transactions/Transaction recovery ‒ System Recovery 3 Transactions A database is updated by processing transactions that result in changes to one or more records. A user’s program may carry out many operations on the data retrieved from the database, but the DBMS is only concerned with data read/written from/to the database. The DBMS’s abstract view of a user program is a sequence of transactions (reads and writes). To understand database recovery, we must first understand the concept of transaction integrity. 4 Transactions A transaction is considered a logical unit of work ‒ START Statement: BEGIN TRANSACTION ‒ END Statement: COMMIT ‒ Execution errors: ROLLBACK Assume we want to transfer $100 from one bank (A) account to another (B): UPDATE Account_A SET Balance= Balance -100; UPDATE Account_B SET Balance= Balance +100; We want these two operations to appear as a single atomic action 5 Transactions We want these two operations to appear as a single atomic action ‒ To avoid inconsistent states of the database in-between the two updates ‒ And obviously we cannot allow the first UPDATE to be executed and the second not or vice versa.
    [Show full text]
  • What Is Nosql? the Only Thing That All Nosql Solutions Providers Generally Agree on Is That the Term “Nosql” Isn’T Perfect, but It Is Catchy
    NoSQL GREG SYSADMINBURD Greg Burd is a Developer Choosing between databases used to boil down to examining the differences Advocate for Basho between the available commercial and open source relational databases . The term Technologies, makers of Riak. “database” had become synonymous with SQL, and for a while not much else came Before Basho, Greg spent close to being a viable solution for data storage . But recently there has been a shift nearly ten years as the product manager for in the database landscape . When considering options for data storage, there is a Berkeley DB at Sleepycat Software and then new game in town: NoSQL databases . In this article I’ll introduce this new cat- at Oracle. Previously, Greg worked for NeXT egory of databases, examine where they came from and what they are good for, and Computer, Sun Microsystems, and KnowNow. help you understand whether you, too, should be considering a NoSQL solution in Greg has long been an avid supporter of open place of, or in addition to, your RDBMS database . source software. [email protected] What Is NoSQL? The only thing that all NoSQL solutions providers generally agree on is that the term “NoSQL” isn’t perfect, but it is catchy . Most agree that the “no” stands for “not only”—an admission that the goal is not to reject SQL but, rather, to compensate for the technical limitations shared by the majority of relational database implemen- tations . In fact, NoSQL is more a rejection of a particular software and hardware architecture for databases than of any single technology, language, or product .
    [Show full text]
  • Oracle Nosql Database
    An Oracle White Paper November 2012 Oracle NoSQL Database Oracle NoSQL Database Table of Contents Introduction ........................................................................................ 2 Technical Overview ............................................................................ 4 Data Model ..................................................................................... 4 API ................................................................................................. 5 Create, Remove, Update, and Delete..................................................... 5 Iteration ................................................................................................... 6 Bulk Operation API ................................................................................. 7 Administration .................................................................................... 7 Architecture ........................................................................................ 8 Implementation ................................................................................... 9 Storage Nodes ............................................................................... 9 Client Driver ................................................................................. 10 Performance ..................................................................................... 11 Conclusion ....................................................................................... 12 1 Oracle NoSQL Database Introduction NoSQL databases
    [Show full text]
  • The Integration of Database Systems
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1993 The Integration of Database Systems Tony Schaller Omran A. Bukhres Ahmed K. Elmagarmid Purdue University, [email protected] Xiangning Liu Report Number: 93-046 Schaller, Tony; Bukhres, Omran A.; Elmagarmid, Ahmed K.; and Liu, Xiangning, "The Integration of Database Systems" (1993). Department of Computer Science Technical Reports. Paper 1061. https://docs.lib.purdue.edu/cstech/1061 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. The Integration of Database Systems Tony Schaller, Omran A. Bukhres, Ahmed K. Elmagarmid and Xiangning Liu CSD-TR-93-046 July 1993 I I The Integration of Database Systems Tony Schaller Molecular Design Ltd. 2132 Farallon Drive San Leandro, CA 94577 Omran A. Bukhres, Ahmed K. Elmagarmid and Xiangning Liu DeparLment of Computer Sciences Purdue University West Lafayette, IN 47907 eJIlail: {bukhres,ake,xl} .es.purdue.edu 1 Introduction A database system is composed of two elements: a software program, called a database management system, and a set of data, called a database. The data in a database is organized according to some data model, such as the relational model used in a DB2 database [DW88] or the hierarchical model found with IMS databases [Dat77] . Users access the data through an interface (the query language) provided by the database management system. A schema describes the actual data structures and organization within the system. During the decade ofthe nineteen-seventies, centralized databases were predominant, but recent innovations in communications and database technologies have engendered a revolution in data processing, giving rlse to a new generation of decentralized database systems.
    [Show full text]
  • High-Performance Transaction Processing in SAP HANA
    High-Performance Transaction Processing in SAP HANA Juchang Lee1, Michael Muehle1, Norman May1, Franz Faerber1, Vishal Sikka1, Hasso Plattner2, Jens Krueger2, Martin Grund3 1SAP AG 2Hasso Plattner Insitute, Potsdam, Germany, 3eXascale Infolab, University of Fribourg, Switzerland Abstract Modern enterprise applications are currently undergoing a complete paradigm shift away from tradi- tional transactional processing to combined analytical and transactional processing. This challenge of combining two opposing query types in a single database management system results in additional re- quirements for transaction management as well. In this paper, we discuss our approach to achieve high throughput for transactional query processing while allowing concurrent analytical queries. We present our approach to distributed snapshot isolation and optimized two-phase commit protocols. 1 Introduction An efficient and holistic data management infrastructure is one of the key requirements for making the right deci- sions at an operational, tactical, and strategic level and is core to support all kinds of enterprise applications[12]. In contrast to traditional architectures of database systems, the SAP HANA database takes a different approach to provide support for a wide range of data management tasks. The system is organized in a main-memory centric fashion to reflect the shift within the memory hierarchy[2] and to consistently provide high perfor- mance without prohibitively slow disk interactions. Completely transparent for the application, data is orga- nized along its life cycle either in column or row format, providing the best performance for different workload characteristics[11, 1]. Transactional workloads with a high update rate and point queries can be routed against a row store; analytical workloads with range scans over large datasets are supported by column oriented data struc- tures.
    [Show full text]
  • A Transaction Processing Method for Distributed Database
    Advances in Computer Science Research, volume 87 3rd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2019) A Transaction Processing Method for Distributed Database Zhian Lin a, Chi Zhang b School of Computer and Cyberspace Security, Communication University of China, Beijing, China [email protected], [email protected] Abstract. This paper introduces the distributed transaction processing model and two-phase commit protocol, and analyses the shortcomings of the two-phase commit protocol. And then we proposed a new distributed transaction processing method which adds heartbeat mechanism into the two- phase commit protocol. Using the method can improve reliability and reduce blocking in distributed transaction processing. Keywords: distributed transaction, two-phase commit protocol, heartbeat mechanism. 1. Introduction Most database services of application systems will be distributed on several servers, especially in some large-scale systems. Distributed transaction processing will be involved in the execution of business logic. At present, two-phase commit protocol is one of the methods to distributed transaction processing in distributed database systems. The two-phase commit protocol includes coordinator (transaction manager) and several participants (databases). In the process of communication between the coordinator and the participants, if the participants without reply for fail, the coordinator can only wait all the time, which can easily cause system blocking. In this paper, heartbeat mechanism is introduced to monitor participants, which avoid the risk of blocking of two-phase commit protocol, and improve the reliability and efficiency of distributed database system. 2. Distributed Transactions 2.1 Distributed Transaction Processing Model In a distributed system, each node is physically independent and they communicates and coordinates each other through the network.
    [Show full text]
  • Transaction Management in the R* Distributed Database Management System
    Transaction Management in the R* Distributed Database Management System C. MOHAN, B. LINDSAY, and R. OBERMARCK IBM Almaden Research Center This paper deals with the transaction management aspects of the R* distributed database system. It concentrates primarily on the description of the R* commit protocols, Presumed Abort (PA) and Presumed Commit (PC). PA and PC are extensions of the well-known, two-phase (2P) commit protocol. PA is optimized for read-only transactions and a class of multisite update transactions, and PC is optimized for other classes of multisite update transactions. The optimizations result in reduced intersite message traffic and log writes, and, consequently, a better response time. The paper also discusses R*‘s approach toward distributed deadlock detection and resolution. Categories and Subject Descriptors: C.2.4 [Computer-Communication Networks]: Distributed Systems-distributed datahes; D.4.1 [Operating Systems]: Process Management-concurrency; deadlocks, syndvonization; D.4.7 [Operating Systems]: Organization and Design-distributed sys- tems; D.4.5 [Operating Systems]: Reliability--fault tolerance; H.2.0 [Database Management]: General-concurrency control; H.2.2 [Database Management]: ‘Physical Design-recouery and restart; H.2.4 [Database Management]: Systems-ditributed systems; transactionprocessing; H.2.7 [Database Management]: Database Administration-logging and recouery General Terms: Algorithms, Design, Reliability Additional Key Words and Phrases: Commit protocols, deadlock victim selection 1. INTRODUCTION R* is an experimental, distributed database management system (DDBMS) developed and operational at the IBM San Jose Research Laboratory (now renamed the IBM Almaden Research Center) 118, 201. In a distributed database system, the actions of a transaction (an atomic unit of consistency and recovery [13]) may occur at more than one site.
    [Show full text]
  • A Simple Guide to Transaction Processing
    @ WORK SERIES Hands-on OneWorld Documentation A Simple guide to Transaction Processing Technology Demographic Table Product OneWorld Version B733.x Platform/OS All Industry All Application All Database All Keywords Strategic, OneWorld, B9 Date July 2000 ? erpSourcing. All Rights Reserved October 2000 - A Simple Guide to Transaction Processing Disclaimer All information contained in this document should be treated as a hypothetical project plan. It is often the case that with upgrades to production and development objects, that there are issues that will be raised. This will therefore dramatically increase project timelines. None of the entries in this document are in any way a replacement for the JDEdwards OneWorld Xe Upgrade Guide – instead, this document should be treated as a complement. Overview This document is release independent - ie, I will attempt to describe Transaction Processing. The latter parts of this email are SAR posts directly affecting pre-B733 and post-B733 (including Xe) versions - and lastly I attach a list of applications in B7.3.3.1 that were Transaction Processing activated. Note that Transaction Processing is now called "Lock Manager" (since B7.3.3) and has absolutely NOTHING to do with row-level database locking ! Chapter 1 - What is it ? Definitions and Abbreviations used throughout this document ??TMS (Transaction Management Server) - the server that is used to serve as a central "checkpoint" for all database transactions. ??TP (Transaction Processing) Monitor - the process that runs on the TMS that is capable of timestamping database record changes and notifying the user if he/she has retrieved a record (and left it unchanged) that has since been changed by another user.
    [Show full text]
  • Implementing Distributed Transactions Distributed Transaction Distributed Database Systems ACID Properties Global Atomicity Atom
    Distributed Transaction • A distributed transaction accesses resource managers distributed across a network Implementing Distributed • When resource managers are DBMSs we refer to the Transactions system as a distributed database system Chapter 24 DBMS at Site 1 Application Program DBMS 1 at Site 2 2 Distributed Database Systems ACID Properties • Each local DBMS might export • Each local DBMS – stored procedures, or – supports ACID properties locally for each subtransaction – an SQL interface. • Just like any other transaction that executes there • In either case, operations at each site are grouped – eliminates local deadlocks together as a subtransaction and the site is referred • The additional issues are: to as a cohort of the distributed transaction – Global atomicity: all cohorts must abort or all commit – Each subtransaction is treated as a transaction at its site – Global deadlocks: there must be no deadlocks involving • Coordinator module (part of TP monitor) supports multiple sites ACID properties of distributed transaction – Global serialization: distributed transaction must be globally serializable – Transaction manager acts as coordinator 3 4 Atomic Commit Protocol Global Atomicity Transaction (3) xa_reg • All subtransactions of a distributed transaction Manager Resource must commit or all must abort (coordinator) Manager (1) tx_begin (cohort) • An atomic commit protocol, initiated by a (4) tx_commit (5) atomic coordinator (e.g., the transaction manager), commit protocol ensures this. (3) xa_reg Resource Application – Coordinator
    [Show full text]
  • Distributed Transaction Processing: Reference Model, Version 3
    Guide Distributed Transaction Processing: Reference Model, Version 3 HNICA C L E G T U I D E S [This page intentionally left blank] X/Open Guide Distributed Transaction Processing: Reference Model, Version 3 X/Open Company Ltd. February 1996, X/Open Company Limited All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. X/Open Guide Distributed Transaction Processing: Reference Model, Version 3 ISBN: 1-85912-170-5 X/Open Document Number: G504 Published by X/Open Company Ltd., U.K. Any comments relating to the material contained in this document may be submitted to X/Open at: X/Open Company Limited Apex Plaza Forbury Road Reading Berkshire, RG1 1AX United Kingdom or by Electronic Mail to: [email protected] ii X/Open Guide Contents Chapter 1 Introduction............................................................................................... 1 1.1 Overview ...................................................................................................... 1 1.2 Benefits of X/Open DTP ........................................................................... 1 1.3 Areas Not Addressed................................................................................. 2 1.4 Relationship to International Standards................................................ 2 Chapter 2 Definitions.................................................................................................
    [Show full text]
  • Concurrency Control and Recovery ACID • Transactions • Recovery Transaction Model Concurency Control Recovery
    Data Management Systems • Transaction Processing • Concurrency control and recovery ACID • Transactions • Recovery Transaction model Concurency Control Recovery Gustavo Alonso Institute of Computing Platforms Department of Computer Science ETH Zürich Transactions-CC&R 1 A bit of theory • Before discussing implementations, we will cover the theoretical underpinning behind concurrency control and recovery • Discussion at an abstract level, without relation to implementations • No consideration of how the concepts map to real elements (tuples, pages, blocks, buffers, etc.) • Theoretical background important to understand variations in implementations and what is considered to be correct • Theoretical background also key to understand how system have evolved over the years Transactions-CC&R 2 Reference Concurrency Control and Recovery in Database Systems Philip A. Bernstein, Vassos Hadzilacos, Nathan Goodman • https://www.microsoft.com/en- us/research/people/philbe/book/ Transactions-CC&R 3 ACID Transactions-CC&R 4 Conventional notion of database correctness • ACID: • Atomicity: the notion that an operation or a group of operations must take place in their entirety or not at all • Consistency: operations should take the database from a correct state to another correct state • Isolation: concurrent execution of operations should yield results that are predictable and correct • Durability: the database needs to remember the state it is in at all moments, even when failures occur • Like all acronyms, more effort in making it sound cute than in
    [Show full text]