..............................
..............................
..............................
Implementing New Approach for Enhancing Performance and Throughput in
A distributed database system consists of a number of sites over a network and has a huge amount of da ta. Besides a
high number of users use these data. The lock manag er coordinates the use of database resources among distributed
transactions. Because a distributed transaction con sists of several participants to execute over sites; all participants must
guarantee that any change to data will be permanent in order to commit the transaction. Because the number of users is
increasingly growing and the data must be available all of the time, this research applied a new method for reducing the size
of lockable entities to allow several transactions to access the same database row simultaneously, the other attributes remain
available to other users if needed. It is possible to do that by increasing the granularity hierarchy tree one more level down at
the attributes. The experimental results proved tha t using attribute level locking will increase the throughput and enhance the
system performance.
[1] Bernstein P. and Newcomer E., Principles of Transaction Processing for the Syste ms Professional , Bentham Press, 2004.
[2] Chandy K., Misra J., and Hass L., Distributed Deadlock detection, ACM Transactions on Computer Systems , vol. 1, no. 2, pp. 144-156, 1983.
[3] Coffman E., Elphick M., and Shoshani A., System Deadlocks, ACM Computing Surveys , vol. 3, no. 2, PP. 67-78, 1971.
[4] Croker A., Improvements in Database Concurrency Control with Locking, Journal of Management Information Systems , vol. 4, no. 2, pp. 74, 1987.
[5] Elmasri R. and Navathe S., Fundamentals of Database Systems , Pearson Addison Wesley, Boston, 2010.
[6] Krivokapi N., Kemper A., and Gudes E., Deadlock Detection in Distributed Database Systems: A New Algorithm and a Comparative Performance Analysis, The VLDB Journal, vol. 8, no. 2, pp. 79-100, 1999.
[7] Maabreh K. and Hamami A., Increasing Database Concurrency Control Based on Attribute Level Locking, in Proceedings of International Conference on Electronic Design, Penang, pp. 1-4, 2008.
[8] Maabreh K. and Hamami A., Applying Attribute Level Locking to Decrease the Deadlock on Distributed Database, in Proceedings of the 11 th International Arab Conference on Information Technology , Libya, 2010.
[9] Matthias N. and Matthias J., Performance Modeling of Distributed and Replicated Databases, IEEE Transactions on Knowledge 296 The International Arab Journal of Informa tion Technology, Vol. 10, No. 3, May 2013 Data Engineering, vol. 12, no. 4, pp. 645-672, 2000.
[10] Ozsu T. and Valduriez P., Principles of Distributed Database Systems , Springer Science and Business, New York, 2011.
[11] Silberschatz A., Korth H., and Sudarshan S., Database System Concepts , McGraw-Hill, New York, 2010.
[12] Sinha M. Constraints: Consistency and Integrity, ACM SIGMOD Record , vol. 13, no. 2, pp. 60-63, 1983.
[13] Taibi T., Abid A., Jiann W., Fei Y., and Ting C., Design and Implementation of a Two-Phase Commit Protocol Simulator, The International Arab Journal of Information Technology , vol. 3, no. 1, pp. 20-27, 2006.
[14] Weikum G. and Vossen G., Transactional Information Systems, Theory, Algorithms and the Practice of Concurrency Control and Recovery , Morgan Kaufman Publishers, USA, 2002.
[15] Wu H., Chin W., and Jaffar J., An Efficient Distributed Deadlock Avoidance Algorithm for the AND Model, IEEE Transactions on Software Engineering , vol. 28, no. 1, pp. 18-29, 2002. Khaled Maabreh is a lecturer in computer information system at Zarqa University, Jordan. He holds PhD degree in computer science from Amman Arab University for Graduate Studies in 2008. He has more than 17 years of experience including developing IT-related projects. He also teaches different courses at BSc level in computer science and computer information systems. Alaa Al-Hamami is senior lecturer in computer science. He holds a BS in physics from Baghdad University, in 1970, MSc in computer science from Loughborough University, England in 1979, and a PhD degree in computer science-database security from the University of East Anglia-England in 1984. He has a membership in many different scientific societies including ACM and IEEE. He is a deanship of Graduate College of Computer Studies- Amman Arab University for Graduate Studies. He has more than 31 years of experience including extensiv e project management experience in planning and leading a range of IT-related projects in addition to management posts. He has more than 117 published papers in different indexed journals. He supervises more than 50 PhD and MSc students in computer science, information management and integration, security, and knowledge management. He also leads and teaches modules at BSc, MSc and PhD levels in computer science and security.