Processing through Data - oriented Execution Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering
نویسنده
چکیده
Data management technology changes the world we live in by providing efficient access to huge volumes of constantly changing data and by enabling sophisticated analysis of those data. Recently there has been an unprecedented increase in the demand for data management services. In parallel, we have witnessed a tremendous shift in the underlying hardware technology toward highly parallel multicore processors. In order to cope with the increased demand and user expectations, data management systems need to fully exploit abundantly available hardware parallelism. Transaction processing is one of the most important and challenging database workloads and this dissertation contributes to the quest for scalable transaction processing software. Our research shows that in a highly parallel multicore landscape, rather than improving single-thread performance, system designers should prioritize the reduction of critical sections where hardware parallelism increases contention unbounded. In addition, this thesis describes solid improvements in conventional transaction processing technology. New transaction processing mechanisms show gains by avoiding the execution of unbounded critical sections in the lock manager through caching, and in the log manager by downgrading the critical sections to composable ones. More importantly, this dissertation shows that conventional transaction processing has inherent scalability limitations due to the unpredictable access patterns caused by the requestoriented execution model it follows. Instead, it proposes adopting a data-oriented execution model, and shows that transaction processing systems designed around data-oriented execution break the inherent limitations of conventional execution. The data-oriented design paves the way for transaction processing systems to maintain scalability as parallelism increases for the foreseeable future; as hardware parallelism increases, the benefits will only increase. In addition, the principles used to achieve scalability can be generally applied to other software systems facing similar scalability challenges as the shift to multicore hardware continues.
منابع مشابه
Support for Speculative Execution in High-performance Processors a Dissertation Submitted to the Department of Electrical Engineering and the Committee on Graduate Studies of Stanford University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy
متن کامل
اثربخشی آموزش ابراز وجود فرهنگمحور بر عزتنفس فرزندان طلاق
Brever, M.M.( 2010).The effects of child gender and child age at the time of parental divorce on the development. COLLEGE OF SOCIAL AND BEHAVIORAL SCIENCES, Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Psychology Educational Track.
متن کاملSubmitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering
متن کامل
Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering
............................................................................................................................................ 3 Acknowledgements ............................................................................................................................. 5 Table of
متن کاملAbstracting the Hardware / Software Boundary through a Standard System Support Layer and Architecture
ing the Hardware / Software Boundary through a Standard System Support Layer and Architecture Erik Konrad Anderson Submitted to the Department of Electrical Engineering & Computer Science and the Faculty of the Graduate School of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012