1994
DOI: 10.1016/0140-3664(94)90005-1
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of the send-on-demand: A distributed database concurrency control protocol for high-speed networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

1999
1999
2004
2004

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…However, this restricts all requests to having the same exponentially distributed service time. More generally, some studies modeled the local databases as M/G/1/FCFS [15] and M/G/1/RR [16] queues with generally distributed service time. However, most of these models are based on the homogeneity assumption where all database sites and their respective workload are identical [8].…”
Section: Related Work On Performance Modeling and Analysismentioning
confidence: 99%
“…However, this restricts all requests to having the same exponentially distributed service time. More generally, some studies modeled the local databases as M/G/1/FCFS [15] and M/G/1/RR [16] queues with generally distributed service time. However, most of these models are based on the homogeneity assumption where all database sites and their respective workload are identical [8].…”
Section: Related Work On Performance Modeling and Analysismentioning
confidence: 99%
“…Most authors also assume uniformly distributed data access, i.e. each data item is accessed with equal probability [14,28,10,5,23,18,29,21,20,3]. Non-uniform data access is more realistic but modeled in very few analytical studies [31,16].…”
Section: General Modeling Concepts and Communicationmentioning
confidence: 99%
“…However, this still restricts all transactions to have the same exponentially distributed service times. More general, [5,16] model the local databases as M/G/1 queues with arbitrarily distributed service times, while [13,20] use networks of M/H 2 /1 systems with 2-phase hyper-exponentially distributed service times to assign different exponentially distributed service times to read-only transactions and updates. Nevertheless, such models do not allow to evaluate realworld systems with more than two transaction types.…”
Section: General Modeling Concepts and Communicationmentioning
confidence: 99%
“…The studies in [37,38,73,103] [13], and using an M/G/l/RR queueing model in [138]. Constant ex ecution demands for the lock request are used in [20] to analyze the distributed database at the level of lock requests.…”
Section: Modeling Replication In Queueing Networkmentioning
confidence: 99%
“…13 shows a PDF for the delay of thread 1, that executes activity a1 inFigure 5.11, with y l = 2, C x i = 15. y2 = 2, Cx2 = 5, and with geoemtric requests. The PDFs are obtained from the simulation run, and from fitting the delay to the closed-form Reproduced with permission of the copyright owner.…”
mentioning
confidence: 99%