• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jiang Tianyang, Zhang Guangyan, Li Zhiyue. Survey on Concurrency Control Protocols of In-Memory Transactions[J]. Journal of Computer Research and Development, 2022, 59(4): 721-736. DOI: 10.7544/issn1000-1239.20210231
Citation: Jiang Tianyang, Zhang Guangyan, Li Zhiyue. Survey on Concurrency Control Protocols of In-Memory Transactions[J]. Journal of Computer Research and Development, 2022, 59(4): 721-736. DOI: 10.7544/issn1000-1239.20210231

Survey on Concurrency Control Protocols of In-Memory Transactions

Funds: This work was supported by the National Natural Science Foundation of China (62025203,61672315) and the National Key Research and Development Program of China (2018YFB0203902).
More Information
  • Published Date: March 31, 2022
  • Transactions provide strong guarantees for the upper-level applications based on databases and other systems. NoSQL databases obtain higher scalability by weakening the support for transactions, but it is difficult to meet the transactional requirements of applications such as OLTP. To retrieve the support for highly consistent transactions, the NewSQL database architecture proposed later takes into account the efficient management of massive data. NewSQL databases therefore migrate data accessed by transactions from disk to memory to accelerate transaction processing. However, existing concurrency control protocols of in-memory transactional systems are challenged by the incompatibility with emerging storage and network technology. We categorized the concurrency control protocols of in-memory transactions in the past ten years from the three dimensions of processing strategy, version control, and conflict resolution. Subsequently, we offer detailed comparisons of typical concurrency control protocols from the three aspects of performance, scalability, and durability. Then four technical solutions are summarized to improve concurrency control protocols of in-memory transactions including eliminating the bottleneck of scalability, accelerating transaction processing with emerging hardware, reducing the probability of transaction aborts and ensuring the durability of in-memory transactions efficiently. Finally, we point out the future research direction of concurrency control protocols of in-memory transactions.
  • Related Articles

    [1]Wang Haitao, Li Zhanhuai, Zhang Xiao, Bu Hailong, Kong Lanxin, Zhao Xiaonan. Virtual Machine Resources Allocation Methods Based on History Data[J]. Journal of Computer Research and Development, 2019, 56(4): 779-789. DOI: 10.7544/issn1000-1239.2019.20170831
    [2]Liu Weijie, Wang Lina, Tan Cheng, Xu Lai. A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC[J]. Journal of Computer Research and Development, 2017, 54(10): 2310-2320. DOI: 10.7544/issn1000-1239.2017.20170452
    [3]Shi Yuan, Zhang Huanguo, Wu Fusheng. A Method of Constructing the Model of Trusted Virtual Machine Migration[J]. Journal of Computer Research and Development, 2017, 54(10): 2284-2295. DOI: 10.7544/issn1000-1239.2017.20170465
    [4]Luo Yang, Xia Chunhe, Li Yazhuo, Wei Zhao, Liang Xiaoyan. A Polymorphic Shellcode Detection Method Based on Dual-Mode Virtual Machine[J]. Journal of Computer Research and Development, 2014, 51(8): 1704-1714. DOI: 10.7544/issn1000-1239.2014.20121149
    [5]Cai Wanwei, Tai Yunfang, Liu Qi, Zhang Ge. Memory Virtulization on MIPS Architecture[J]. Journal of Computer Research and Development, 2013, 50(10): 2247-2252.
    [6]Zhang Xiang, Huo Zhigang, Ma Jie, Meng Dan. Fast and Live Whole-System Migration of Virtual Machines[J]. Journal of Computer Research and Development, 2012, 49(3): 661-668.
    [7]Wang Kai, Hou Zifeng. A Relaxed Co-Scheduling Method of Virtual CPUs on Xen Virtual Machines[J]. Journal of Computer Research and Development, 2012, 49(1): 118-127.
    [8]Wang Kai, Hou Zifeng. An Adaptive Scheduling Method of Weight Parameter Adjustment on Virtual Machines[J]. Journal of Computer Research and Development, 2011, 48(11): 2094-2102.
    [9]Jin Hai, Zhong Alin, Wu Song, and Shi Xuanhua. Virtual Machine VCPU Scheduling in the Multi-core Environment:Issues and Challenges[J]. Journal of Computer Research and Development, 2011, 48(7): 1216-1224.
    [10]Chen Hui, Chen Yiyun, Wu Ping, and Xiang Sen. A Typed Low-Level Language Used in Java Virtual Machine[J]. Journal of Computer Research and Development, 2006, 43(1): 15-22.
  • Cited by

    Periodical cited type(2)

    1. 刘海峰,徐丽丽,武堂颖. 无线传感器网络恶意信标干扰信号协同过滤方法. 传感技术学报. 2024(11): 1971-1975 .
    2. 崔莉,周钧锴,王念,肖京,季宇宣,姜美驰. 便携式非特异性腰痛测量系统研制. 中国医疗器械杂志. 2021(05): 473-478 .

    Other cited types(2)

Catalog

    Article views (697) PDF downloads (454) Cited by(4)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return