The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Implementing New Approach for Enhancing Performance and Throughput in

 A distributed database system consists of a number  of sites over a network and has a huge amount of da ta. Besides a  high  number  of  users  use  these  data.  The  lock  manag er  coordinates  the  use  of  database  resources  among distributed  transactions.  Because  a  distributed  transaction  con sists  of  several  participants  to  execute  over  sites;  all  participants  must  guarantee  that  any  change  to  data  will  be  permanent   in  order  to  commit  the  transaction.  Because  the  number  of  users  is  increasingly  growing  and  the data  must  be  available   all  of  the  time,  this  research  applied  a  new  method  for  reducing  the  size  of  lockable  entities  to  allow  several  transactions  to  access  the  same  database  row  simultaneously,  the   other  attributes remain  available to other users if needed. It is possible  to do that by increasing the granularity hierarchy  tree one more level down at  the attributes. The experimental results proved tha t using attribute level locking will increase the throughput and enhance the  system performance.   


[1] Bernstein P. and Newcomer E., Principles of Transaction Processing for the Syste ms Professional , Bentham Press, 2004.

[2] Chandy K., Misra J., and Hass L., Distributed Deadlock detection, ACM Transactions on Computer Systems , vol. 1, no. 2, pp. 144-156, 1983.

[3] Coffman E., Elphick M., and Shoshani A., System Deadlocks, ACM Computing Surveys , vol. 3, no. 2, PP. 67-78, 1971.

[4] Croker A., Improvements in Database Concurrency Control with Locking, Journal of Management Information Systems , vol. 4, no. 2, pp. 74, 1987.

[5] Elmasri R. and Navathe S., Fundamentals of Database Systems , Pearson Addison Wesley, Boston, 2010.

[6] Krivokapi N., Kemper A., and Gudes E., Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis, The VLDB Journal, vol. 8, no. 2, pp. 79-100, 1999.

[7] Maabreh K. and Hamami A., Increasing Database Concurrency Control Based on Attribute Level Locking, in Proceedings of International Conference on Electronic Design, Penang, pp. 1-4, 2008.

[8] Maabreh K. and Hamami A., Applying Attribute Level Locking to Decrease the Deadlock on Distributed Database, in Proceedings of the 11 th International Arab Conference on Information Technology , Libya, 2010.

[9] Matthias N. and Matthias J., Performance Modeling of Distributed and Replicated Databases, IEEE Transactions on Knowledge 296 The International Arab Journal of Informa tion Technology, Vol. 10, No. 3, May 2013 Data Engineering, vol. 12, no. 4, pp. 645-672, 2000.

[10] Ozsu T. and Valduriez P., Principles of Distributed Database Systems , Springer Science and Business, New York, 2011.

[11] Silberschatz A., Korth H., and Sudarshan S., Database System Concepts , McGraw-Hill, New York, 2010.

[12] Sinha M. Constraints: Consistency and Integrity, ACM SIGMOD Record , vol. 13, no. 2, pp. 60-63, 1983.

[13] Taibi T., Abid A., Jiann W., Fei Y., and Ting C., Design and Implementation of a Two-Phase Commit Protocol Simulator, The International Arab Journal of Information Technology , vol. 3, no. 1, pp. 20-27, 2006.

[14] Weikum G. and Vossen G., Transactional Information Systems, Theory, Algorithms and the Practice of Concurrency Control and Recovery , Morgan Kaufman Publishers, USA, 2002.

[15] Wu H., Chin W., and Jaffar J., An Efficient Distributed Deadlock Avoidance Algorithm for the AND Model, IEEE Transactions on Software Engineering , vol. 28, no. 1, pp. 18-29, 2002. Khaled Maabreh is a lecturer in computer information system at Zarqa University, Jordan. He holds PhD degree in computer science from Amman Arab University for Graduate Studies in 2008. He has more than 17 years of experience including developing IT-related projects. He also teaches different courses at BSc level in computer science and computer information systems. Alaa Al-Hamami is senior lecturer in computer science. He holds a BS in physics from Baghdad University, in 1970, MSc in computer science from Loughborough University, England in 1979, and a PhD degree in computer science-database security from the University of East Anglia-England in 1984. He has a membership in many different scientific societies including ACM and IEEE. He is a deanship of Graduate College of Computer Studies- Amman Arab University for Graduate Studies. He has more than 31 years of experience including extensiv e project management experience in planning and leading a range of IT-related projects in addition to management posts. He has more than 117 published papers in different indexed journals. He supervises more than 50 PhD and MSc students in computer science, information management and integration, security, and knowledge management. He also leads and teaches modules at BSc, MSc and PhD levels in computer science and security.