Publication | Closed Access
Protocols for Deadlock Detection in Distributed Database Systems
63
Citations
6
References
1982
Year
Cluster ComputingAvailabilityEngineeringDistributed AlgorithmsVerificationNetwork AnalysisConcurrent SystemFault-tolerant MessagingConcurrency ControlFormal VerificationDistributed DatabaseSystems EngineeringData ManagementDeadlock Detection ProtocolsDistributed SystemsComputer ScienceDemand GraphDistributed ComputingCloud ComputingFormal MethodsConsistent Demand GraphDeadlock DetectionDistributed Transaction
In distributed databases, deadlocks may occur due to conflicts in data file lockings A system is in a deadlock if and only if there is a directed cycle in its demand graph. However, due to the inherent communication delay in a distributed system, it is not easy to construct a consistent demand graph for a distributed system. In this paper, three deadlock detection protocols are discussed. The first protocol uses two communication phases. The second protocol uses a single communication phase. Based on the second protocol, a one-phase hierarchical deadlock detection protocol is developed.
| Year | Citations | |
|---|---|---|
Page 1
Page 1