Comparative Study of Concurrency and Replica Control Protocols in Distributed Environment

Comparative Study of Concurrency and Replica Control Protocols in Distributed Environment

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com Comparative Study of Concurrency and Replica control protocols in Distributed Environment Anupam Singh Pranveer Singh Institute of Technology, Kanpur, India Raghuraj Singh Suryavanshi Pranveer Singh Institute of Technology, Kanpur, India Arun Kumar Singh Rajkiya Engineering College, Kannauj,India Abstract data is replicated [10]. To implement a distributed system, consistency, In a Distributed system, data replication is a well-known scalability, performance [11], accessibility and fault tolerance technique to improve availability and fault tolerance. It are areas of consideration. We have to make a trade-off improves availability because data is present local to site between consistency and replication. Level of consistency and it provides fault tolerance because data can be may be weak or strong. Weaker level consistency can be recovered from other sites during failure. Depending on managed through one-copy- serializability. Consistency can the application, replication may be full or partial. The be classified as data-centric or client-centric for data main problem of replication is to maintain the consistency replication. It is necessary to classify the consistency model of replicas allocated at different sites or node. In order to for data replication techniques [12]. control the replicas several replica control protocols have been proposed. In this paper, an investigation of In Section 2, we have discussed consistency models in replication protocols in a distributed environment is both ways as client view and server view, taken from the done. A brief discussion on consistency models in data theory of distributeddatabase concurrency control techniques. replication is also presented. After this discussion, we have defined concurrency control protocols in Section 3. In this section, we have given a comparison of different protocols to manage consistency in a Keywords:Distributed Database System, Concurrency distributed environment. Implementation properties can also Control, Consistency, Replication be analyzedin the same sequence. In the next section, wediscuss replication models anddata propagation techniques I. Introduction in a distributed environment. We have presented replica Data availability in the database system is a challenge if control protocols according to the foundation propagation the database is quite large. A larger database system [1,2] techniques and replication protocols in Section 5. With the is fundamental requirements in a cloud, grid environment above discussion section, 6 concludes the paper and describes [3], peer to peer network [4] or similar systems. In large future work. scale database system, for data availability at run time replication is one optimal approach. It increases II. Consistency Model reliability, availability, and performance of the system. In this section, we have expressed a number of consistency The system with extensive database system [5] typically models which is used to maintain concurrency without assigns computing replicas near their input data [6]. compromising on consistency. We have also discussed Replication strategy can be implemented by two ways differences between these consistency models. Different specifiedas static and dynamic replication system [7,8], methods to categorizing the consistency models can be which manages replica locations based on session taken from [13] and [14]. During system design, information of requests [9]. In a distributed environment consistency model is an important property. performance and scalability both cannot be optimized if Consistency model can be seen as one of the prime Page 329 of 334 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com requirement of a distributed system. Consistency model replicas at some time with the same order of their depends on some criterion which should be satisfied occurrence. during the assessment of operations [15] of a transaction. These are based on some properties known c) Distributed 2PL as ACID consistency requirements [16]. When a Distributed 2PL method implements the lock manager at transaction changes its state from running to committed each site of a distributed system. Thus the lock manager at all consistency requirements should be satisfied. Data- each site is responsible for maintaining locks on data items centric and client-centric are two basic types of defied that are stored locally. If data is not replicated, then consistency models [17]. In data-centric, all read and distributed 2PL becomes same as primary copy 2PL. write operations performed on data can be replicated to In this protocol, when a transaction submitted at any different workstations or sites immediately. While in site, the transaction coordinator sends a lock request to client-centric simultaneous updates cannot be handled. local lock manager to all participating sites. In distributed 2 To maintain consistency, individual updates will be PL locks are managed in a decentralized manner which carried out from one location to another location. overcomes the drawback of centralized 2PL. III. Concurrency Control Protocols d) Majority locking protocol In this section, we describe the concurrency control Majority locking protocol overcomes the disadvantage of protocols [18]. The ordering of operations of distributed 2 PL that all replicas of a data item must be transaction plays a vital role during the concurrent locked before an update operation. In this algorithm, a lock execution of multiple transactions on the same data manager is implemented each site to manage locks for all item. Conflicting operations can be controlled through data items stored at each site locally. concurrency control techniques which are categorized When a transaction is submitted at any site and the as pessimistic and optimistic based on synchronization same data item is replicated on n sites, then coordinator of techniques.Pessimistic algorithms can be further transaction sends lock requests to more than half of the divided as locking protocol, time stamping, and hybrid sites.Each lock manager determines whether the lock can protocols while optimistic approach can be seen as be granted or not immediately. If the lock compatibility locking based and time to stamp based algorithms. matrix is not satisfied, then the request will be not Locking protocols can be seen as centralized compatible and the response will be delayed.Majority 2PL,Primary copy 2PL, distributed2PL, Majority, and based replication protocol is used to maintain consistency Quorum-based protocols. We consider our in a distributed environment which consider the conversation on concurrency control models [19]. commitment of transaction on more than half of the sites. In this protocol, transaction restart will also be there if a) Centralized 2 PL more than half of the sites are available but the responses In centralized 2 PL, a single site is responsible for from remote sites (participant sites) to decision maker site managing all activities of the lock manager in a (coordinator site) are delayed. It causes restart overhead of distributed system. Before accessing any data item at the transaction which incurs extra cost. If the majority is any site, appropriate locks must be obtained from the not achieved in a certain time period, then the transaction central lock manager. coordinator sends an abort message to all sites. The transaction manager at the site S partitions the global transaction into multiple sub-transactions using e) Quorum consensus protocol information stored into global system catalog. Thus This protocol is a generalized version of majority based coordinator f transaction is responsible for maintaining protocol. To implement this protocol a non-negative consistency of data. If the data item is replicated, then weight is assigned to each site. It also assigns integer it is the responsibility of transaction coordinator to values to read operation known as reading quorum and ensure that all replicas are updated. In this protocol, write operation known as write quorum of the data deadlock detection can be handled easily. item.Read quorum of a data item D is denoted as Drand write quorum is denoted as Dw then the following b) Primary Copy 2PL condition should hold: In Primary replica protocol, one specific replica which Dr+Dw> N is known as the primary replica [20], is responsible for and 2*Dw> N the execution of the submitted transaction. This where N is total weights of all sites in a distributed copy(replica) of data is also responsible for updating system.To perform a read operation on a data item D, other replicas. There are certain requirements [21] of enough number of data item stored at multiple sites must this protocol to maintain consistency as all operations be read, so that their total weight is greater than or equal to whether read or write should be circulated on all Dr. On the other hand, to perform a write operation enough Page 330 of 334 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 2, 2019 (Special Issue) © Research India Publications. http://www.ripublication.com number of copies of data item should be written, so that consistency [27,28].Data can be accessed from local and their weight is greater than or equal to Dw. The major

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us