A Deadlock Prevention Algorithm for The Two-Phase Locking Protocol Based on Petri Net

Author(s):  
Yao XiaoLing
2006 ◽  
Vol 07 (04) ◽  
pp. 437-450 ◽  
Author(s):  
TOMOYA ENOKIDO

In the role-based access control model, a role is a set of access rights. A subject doing jobs is granted roles showing the jobs in an enterprise. A transaction issued by a subject is associated with a subset of roles granted to the subject, which is named purpose. A method with a more significant purpose is performed before another method with a less significant purpose. We discuss which purpose is more significant than another purpose. We discuss two types of Role-Ordering (RO) schedulers SRO and PRO where multiple conflicting transactions are serializable in the significant order of subjects and purposes, respectively. We evaluate the RO schedulers compared with the traditional two-phase locking protocol in terms of throughput.


2021 ◽  
Vol 14 (11) ◽  
pp. 2230-2243
Author(s):  
Jelle Hellings ◽  
Mohammad Sadoghi

The emergence of blockchains has fueled the development of resilient systems that can deal with Byzantine failures due to crashes, bugs, or even malicious behavior. Recently, we have also seen the exploration of sharding in these resilient systems, this to provide the scalability required by very large data-based applications. Unfortunately, current sharded resilient systems all use system-specific specialized approaches toward sharding that do not provide the flexibility of traditional sharded data management systems. To improve on this situation, we fundamentally look at the design of sharded resilient systems. We do so by introducing BYSHARD, a unifying framework for the study of sharded resilient systems. Within this framework, we show how two-phase commit and two-phase locking ---two techniques central to providing atomicity and isolation in traditional sharded databases---can be implemented efficiently in a Byzantine environment, this with a minimal usage of costly Byzantine resilient primitives. Based on these techniques, we propose eighteen multi-shard transaction processing protocols. Finally, we practically evaluate these protocols and show that each protocol supports high transaction throughput and provides scalability while each striking its own trade-off between throughput, isolation level, latency , and abort rate. As such, our work provides a strong foundation for the development of ACID-compliant general-purpose and flexible sharded resilient data management systems.


Author(s):  
Tianli Wei ◽  
Dewei Wu ◽  
Qiang Miao ◽  
Chunyan Yang

Abstract Entanglement has attracted great attention in the past few decades due to its potential applications in the field of quantum information protocols. From now, achieving excellent phase locking in entanglement generation is significant yet a challenging task in cryogenic quantum technology. In this work, we propose and demonstrate a comprehensive paradigm of phase locking protocol for quadrature entanglement at the microwave wavelengths. We carry out a theoretical derivation of the quadrature entangled microwaves generated based on Josephson Parametric Amplifiers (JPAs), and the phase locking error signal, which is used to lock the relative phase of zero between the two quadrature squeezed microwaves. Simulating data for the phase locking scheme are shown under different parameter settings for comparison. Finally, we use the proposed phase locking scheme to enable a stable output of quadrature entangled microwave.


Sign in / Sign up

Export Citation Format

Share Document