Lock-Free Consistency Control for Web 2.0 Applications Jiang-Ming Yang 1,3, Hai-Xun Wang 2, Ning Gu 1, Yi-Ming Liu 1, Chun-Song Wang 1, Qi-Wei Zhang 1.

Slides:



Advertisements
Similar presentations
ACM Group 2005 Conference Consistency Maintenance Based on the Mark & Retrace Technique in Groupware Systems Ning Gu, Jiang-Ming Yang and Qi-Wei Zhang.
Advertisements

DCV: A Causality Detection Approach for Large- scale Dynamic Collaboration Environments Jiang-Ming Yang Microsoft Research Asia Ning Gu, Qi-Wei Zhang,
Lock-Free Consistency Control for Web 2.0 Applications Jiang-Ming Yang, Hai-Xun Wang, Ning Gu, Yi-Ming Liu, Chun- Song Wang, Qi-Wei Zhang 25 April 2008.
Service Access Management Tool Tour: Contract Number
Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke1 Transaction Management Overview Chapter 16.
1 Lecture 11: Transactions: Concurrency. 2 Overview Transactions Concurrency Control Locking Transactions in SQL.
Transaction Management: Concurrency Control CS634 Class 17, Apr 7, 2014 Slides based on “Database Management Systems” 3 rd ed, Ramakrishnan and Gehrke.
Database System Principles 18.7 Tree Locking Protocol CS257 Section 1 Spring 2012 Dhruv Jalota ID: 115.
Topic 6.3: Transactions and Concurrency Control Hari Uday.
Experiments on Query Expansion for Internet Yellow Page Services Using Log Mining Summarized by Dongmin Shin Presented by Dongmin Shin User Log Analysis.
Transaction Management Overview. Transactions Concurrent execution of user programs is essential for good DBMS performance. –Because disk accesses are.
CS 582 / CMPE 481 Distributed Systems
1 SCHEMALESS APPROACH OF MAPPING XML DOCUMENTS INTO RELATIONAL DATABASE Ibrahim Dweib, Ayman Awadi, Seif Elduola Fath Elrhman, Joan Lu CIT 2008 Sydney,
1 Transaction Management Overview Yanlei Diao UMass Amherst March 15, 2007 Slides Courtesy of R. Ramakrishnan and J. Gehrke.
18.7 The Tree Protocol Andy Yang. Outline Introduction Motivation Rules for Access to Tree-Structured Data Why the Tree Protocol Works.
Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke1 Transaction Management Overview Chapter 16.
6.4 Data And File Replication Presenter : Jing He Instructor: Dr. Yanqing Zhang.
ASP.NET Programming with C# and SQL Server First Edition
1 Transaction Management Overview Chapter Transactions  Concurrent execution of user programs is essential for good DBMS performance.  Because.
Database Management Systems, 2 nd Edition. R. Ramakrishnan and J. Gehrke1 Transaction Management Overview Chapter 18.
Efficient Keyword Search over Virtual XML Views Feng Shao and Lin Guo and Chavdar Botev and Anand Bhaskar and Muthiah Chettiar and Fan Yang Cornell University.
Unifying Data and Domain Knowledge Using Virtual Views IBM T.J. Watson Research Center Lipyeow Lim, Haixun Wang, Min Wang, VLDB Summarized.
04/18/2005Yan Huang - CSCI5330 Database Implementation – Distributed Database Systems Distributed Database Systems.
Microsoft FrontPage 2003 Illustrated Complete Using a Dynamic Web Template.
COLLABORATIVE TEXT EDITOR Multiple users distributed geographically can access the same document simultaneously. CHARACTERISTICS – high concurrency –
Transaction Communications Yi Sun. Outline Transaction ACID Property Distributed transaction Two phase commit protocol Nested transaction.
© 2011 Delmar, Cengage Learning Chapter 12 Creating and Using Templates.
CS 245Notes 101 CS 245: Database System Principles Notes 10: More TP Hector Garcia-Molina.
Databases Illuminated
A Collaborative Writing Mode for Avoiding Blind Modifications Center for E-Business Technology Seoul National University Seoul, Korea Nam, Kwang-hyun Intelligent.
EASE: An Effective 3-in-1 Keyword Search Method for Unstructured, Semi-structured and Structured Data Cuoliang Li, Beng Chin Ooi, Jianhua Feng, Jianyong.
Database Systems/COMP4910/Spring05/Melikyan1 Transaction Management Overview Unit 2 Chapter 16.
Copyright © 2008 Pearson Prentice Hall. All rights reserved Committed to Shaping the Next Generation of IT Experts. Chapter 7 Advanced Queries Robert.
Module 10 Administering and Configuring SharePoint Search.
Databases Illuminated
Transaction Management for XML Taro L. Saito Department of Information Science University of Tokyo
Working with Versioned Data and Feature Service Sync Gary MacDougall Russell Brennan.
Flickr Tag Recommendation based on Collective Knowledge BÖrkur SigurbjÖnsson, Roelof van Zwol Yahoo! Research WWW Summarized and presented.
7 February 2008Dietrich Beck A LabVIEW Interface to ELOG ELOG Possible solution paths Status Integration into – CS ? – Domain Management System?
Automatic Video Tagging using Content Redundancy Stefan Siersdorfer 1, Jose San Pedro 2, Mark Sanderson 2 1 L3S Research Center, Germany 2 University of.
Lazy Maintenance of Materialized Views Jingren Zhou, Microsoft Research, USA Paul Larson, Microsoft Research, USA Hicham G. Elmongui, Purdue University,
Enhancing Web Search by Promoting Multiple Search Engine Use Ryen W. W., Matthew R. Mikhail B. (Microsoft Research) Allison P. H (Rice University) SIGIR.
Write Conflicts in Optimistic Replication Problem: replicas may accept conflicting writes. How to detect/resolve the conflicts? client B client A replica.
Securing and Sharing Workbooks Lesson 11. The Review Tab Microsoft Excel provides several layers of security and protection that enable you to control.
Transaction Management Overview. Transactions Concurrent execution of user programs is essential for good DBMS performance. – Because disk accesses are.
Context-Aware Query Classification Huanhuan Cao, Derek Hao Hu, Dou Shen, Daxin Jiang, Jian-Tao Sun, Enhong Chen, Qiang Yang Microsoft Research Asia SIGIR.
Transaction Management and Recovery, 2 nd Edition. R. Ramakrishnan and J. Gehrke1 Transaction Management Overview Chapter 18.
Exploring Traversal Strategy for Web Forum Crawling Yida Wang, Jiang-Ming Yang, Wei Lai, Rui Cai Microsoft Research Asia, Beijing SIGIR
Predicting User Interests from Contextual Information R. W. White, P. Bailey, L. Chen Microsoft (SIGIR 2009) Presenter : Jae-won Lee.
Scheduling of Transactions on XML Documents Author: Stijin Dekeyser Jan Hidders Reviewed by Jason Chen, Glenn, Steven, Christian.
© 2010 Delmar, Cengage Learning Chapter 11 Creating and Using Templates.
Incorporating Site-level Knowledge for Incremental Crawling of Web Forums: A List-wise Strategy KDD 2009 Jiang-Ming Yang, Rui Cai, Chunsong Wang, Hua Huang,
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
Ivy: A Read/Write Peer-to- Peer File System Authors: Muthitacharoen Athicha, Robert Morris, Thomer M. Gil, and Benjie Chen Presented by Saurabh Jha 1.
1 11 Chapter 7 Action Queries Exploring Microsoft Office Access 2007.
Distributed Databases – Advanced Concepts Chapter 25 in Textbook.
Database Recovery Techniques
By A. Aboulnaga, A. R. Alameldeen and J. F. Naughton Vldb’01
Transaction Management Overview
Consistency in Distributed Systems
Exploring Microsoft Office Access 2010
Transaction Management Overview
Transaction Management Overview
Fundamentals of Databases
Using Templates and Library Items
Transaction Management
Transaction Management Overview
Transaction Management Overview
Presentation transcript:

Lock-Free Consistency Control for Web 2.0 Applications Jiang-Ming Yang 1,3, Hai-Xun Wang 2, Ning Gu 1, Yi-Ming Liu 1, Chun-Song Wang 1, Qi-Wei Zhang 1 1 Fudan University, 2 IBM T.J. Watson Research Center, 3 Microsoft Research Asia WWW Summarized and presented by Hwang Inbeom, IDS Lab., Seoul National University

Copyright  2008 by CEBT Introduction  Many popular web sites have multiple mirrors Mirror sites – Easiest solution to achieve scalability – Users are able to choose nearest mirrors to get faster response 2 Mirror Sites

Copyright  2008 by CEBT Motivation  Traditional method for achieving consistency Aims to provide serialization of transactions – Locking protocol such as 2PL is used Bottleneck problem – More severe in Web 2.0 environment Shared documents could be edited by anyone Locking a object blocks all operations regarding it 3

Copyright  2008 by CEBT Main Ideas  Lock-free control Does not lock anything – More flexible concurrency control – Users can edit any part of shared document at any time Some inconsistency may exist – Execution order can be different site by site  Resolve conflicts by document synchronization Undoing and redoing operations are possible 4

Copyright  2008 by CEBT Problem Setting  Shared XML document  Operations expressed in two forms Querying Updating 5

Copyright  2008 by CEBT Causality Preservation  Causality Operation B is causally after operation A (A → B) – The user intends to execute B based on A’s result Example – A: Change the title “Advanced Statistical Learning” to “Statistical Learning” – B: Set the category of “Statistical Learning” to “Math” 6 Advanced Statistical LearningStatistical Learning Math

Copyright  2008 by CEBT Causality Preservation (contd.)  Dataflow 7 Site 1 Site 2 AA B B

Copyright  2008 by CEBT State Vector  State vector SV = Represents the state of a mirror site Each element is number of operations executed originated from site i  Causality preservation with state vector O is causally ready for execution at site j if – SV O [i] = SV j [i] + 1 – SV O [k] <= SV j [k] for all 1 ≤ k ≤ N and k ≠ i Remote site executing an operation must ensure it has been through the state at moment of initial execution – Remote site at least has same information of which site the operation is originated 8

Copyright  2008 by CEBT State Vector (contd.)  Example with dataflow 9 Site 1 Site 2 A A B B SV A = (1, 0) SV B = (2, 0) SV A = (1, 0) SV 2 = (0, 0) Hold SV 1 = (0, 0)

Copyright  2008 by CEBT Transactions  Each site creates a dummy operation Transaction operation executes after all dummy operations are executed Ensures all sites are in the same state before executing transaction operation 10

Copyright  2008 by CEBT Transactions (contd.)  Consistency control with a locking protocol and transaction operation work in almost same way  Then why is this scalable? Locking protocol treats every update operation as a transaction This does not – Not every update is a transaction – It can be treated like a transaction if it is needed (by users) 11

Copyright  2008 by CEBT Consistency Control  Non-transactional operations are executed immediately at their local site Different execution order of concurrent operations – May create inconsistent state Unified execution order is needed  Steps of execution Retrace and find an appropriate order, undo some operations Find nodes relevant to operation – For querying: Which nodes are descendant of this? – For updating: Is this node exist at the execution moment? Apply operation and redo undone operations 12

Copyright  2008 by CEBT Consistency Control (contd.)  How can we decide execution order of non-transactional operations? Operation C originated from site 1 – Add a “discount” tag to books in “Math” category Operation D originated from site 3 – Set the category of “Statistical Learning” to “CS” 13 Site 1 Site 3 CCDD Site 2 CD

Copyright  2008 by CEBT Consistency Control (contd.)  Ordering of non-transactional operations TOrder – if and only if sum(SV a ) < sum(SV b ) or a < b when sum(SV a ) = sum(SV b ) Operation with less information comes first in order If we cannot decide which operation has less information, use the ordering between sites they are originated  Ordering of transactions TOrder between NOOPs 14

Copyright  2008 by CEBT Storage Model  Keeps a inverted list of all nodes Interval-basis labels helps to find descendant and ancestor Providing faster response time 15

Copyright  2008 by CEBT Storage Model (contd.)  Attaches (create, delete) timestamp (=SV) to each XML node Nodes are not really deleted – Delete timestamp is added only Update operation consists of a delete and a create operation If timestamp of an operation is between (create, delete) of a node, the node can be affected by that operation – Retracing state of document when the operation is executed 16

Copyright  2008 by CEBT Experimental Setup  Five types of operations Three with this system – Query (AST Query ), non-transaction update (AST NU ), transaction update (AST TU ) Two with locking protocol – Query (LOCK Query ), update (LOCK Update ) 17

Copyright  2008 by CEBT Experiments  With varying command frequency AST NU (red) is almost same with LOCK Query (purple) Faster response to update operations 18

Copyright  2008 by CEBT Experiments (contd.)  Response time with varying operations’ proportion More non-transactional update, faster response 19

Copyright  2008 by CEBT Conclusions and Discussions  Authors proposed a new lock-free consistency control for Web 2.0 applications Providing more concurrency – Better load balance, high-speed access and faster response Supporting transactions also  Discussions Pros – Cut off the cost of non-transactional operations, which are not really needed to be a transaction Cons – What about conflict between operations within single site? – If data is not fully duplicated, which solution is possible? 20