A Deterministic Database Replication Protocol Where Multicast Writesets Never Get Aborted

Several approaches for the full replication of data in distributed databases [1] have been studied. One of the preferred techniques is the eager update everywhere based on the total-order multicast delivery service [2], where the most outstanding varieties are: certification-based and weak-voting [1]. Under this approach, the execution flow of a transaction can be split into two different main phases: the first one, all operations are entirely executed at the delegate replica of the transaction; and followed by the second phase, started when the transaction requests its commit, all updates are collected and grouped (denoted as writeset) at the delegate replica and sent to all replicas. The commitment or abortion of a transaction is decided upon the delivery of the message. In the case of certification-based ones, each replica holds an ordered log of already committed transactions and the writeset is certified [3], against the log, to commit or abort the transaction. On the other hand, weak-voting ones atomically apply the delivered writeset at remote replicas whilst the delegate, if it is still active, reliably multicasts [2] a commit message. Thus, the certification-based presents a better behavior in terms of performance, only one message is multicast per transaction, but with higher abortion rates [1]. Recently, due to the use of DBMS providing SI, we have found several certification-based protocols to achieve, actually a weaker form called GSI [3], this isolation level in a replicated setting [3] while quite a few weak-voting ones [4].

[1]  Francesc D. Muñoz-Escoí,et al.  A Recovery Protocol for Middleware Replicated Databases Providing GSI , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[2]  Francesc D. Muñoz-Escoí,et al.  A Weak Voting Database Replication Protocol Providing Different Isolation Levels , 2007 .

[3]  Ricardo Jiménez-Peris,et al.  Middleware based data replication providing snapshot isolation , 2005, SIGMOD '05.

[4]  Jim Gray,et al.  A critique of ANSI SQL isolation levels , 1995, SIGMOD '95.

[5]  Gustavo Alonso,et al.  Using Optimistic Atomic Broadcast in Transaction Processing Systems , 2003, IEEE Trans. Knowl. Data Eng..

[6]  J. E. Armend A Middleware Database Replication Protocol Providing Different Isolation Levels , 2006 .

[7]  Gustavo Alonso,et al.  Database replication techniques: a three parameter classification , 2000, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000.

[8]  Gustavo Alonso,et al.  A new approach to developing and implementing eager database replication protocols , 2000, TODS.

[9]  Dennis Shasha,et al.  The dangers of replication and a solution , 1996, SIGMOD '96.

[10]  Bettina Kemme,et al.  Postgres-R(SI): combining replica control with concurrency control based on snapshot isolation , 2005, 21st International Conference on Data Engineering (ICDE'05).

[11]  Francesc D. Muñoz-Escoí,et al.  Optimizing Certification-Based Database Recovery , 2007, Sixth International Symposium on Parallel and Distributed Computing (ISPDC'07).

[12]  Fernando Pedone,et al.  Database replication using generalized snapshot isolation , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).

[13]  Luis Irún-Briz,et al.  Managing Transaction Conflicts in Middleware-based Database Replication Architectures , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).

[14]  Idit Keidar,et al.  Group communication specifications: a comprehensive study , 2001, CSUR.

[15]  André Schiper,et al.  Comparison of database replication techniques based on total order broadcast , 2005, IEEE Transactions on Knowledge and Data Engineering.

[16]  Alan L. Cox,et al.  A comparative evaluation of transparent scaling techniques for dynamic content servers , 2005, 21st International Conference on Data Engineering (ICDE'05).

[17]  Flaviu Cristian,et al.  Understanding fault-tolerant distributed systems , 1991, CACM.

[18]  J. R. Garitagoitia,et al.  Non-blocking ROWA Protocols Implement GSI Using SI Replicas , 2007 .