viously LACs can contain other information. When
the transaction T executed on site 2 needs a write ac-
cess to the data item d, it locks the local copy of d
and sends write lock requests to each replica. Once a
write lock is hold on a copy, its LAC is modified and
it contains only the write lock sender identifier. Each
site sends to site 2 a confirmation message when the
local copy of d is locked, and LACs are modified to
contain only site 2 Identifier. From this stage, site 2
behaves as a primary copy of the data item d since
each transaction which needs an access to d is auto-
matically sent to site 2.
At the commit phase, site 2 updates syn-
chronously as many replicas of d as possible. Since
messages have predictable transmission and delivery
time, site 2 can estimate the number of updates that
it can perform without missing the deadline of trans-
action T. For the data item d, site 2 can update only
two copies, then it chooses two sites (site 1 and site 4)
for which it will send updates. A new LAC is joined
to the message in which appear the three identifiers
of the updated sites. The main goal of sending up-
dates before committing the transaction is to avoid
overloading site 2 by making available replicas of d.
After the committing phase, site which performs
the transaction sends updates and a new LAC to each
site in which copy of d is not updated yet. Thus, site 2
sends an update message to site 3 and site 5 and joins
to each message a new LAC. Each LAC contains, in
addition to the receiver identifier, identifiers of sites
in which replicas of d are up-to-date when the mes-
sage is sent. At this stage of the protocol, all copies
of the data item d are updated. However, LACs con-
tains different informations according to the order of
receiving updates. Once site 2 has finished updating
sites, it brodcasts to all sites a new LAC which con-
tains all sites identifiers.
We note that RT-RCP introduces a new round of
messages exchange in order to update LACs. The aim
of this messages exchange is to inform sites that a data
item is already up-to-date everywhere in the network.
Without this messages, the database seems to be not
fully replicated. This means that the degree of repli-
cation for a data item viewed by each site is not the
same. Keeping the system at this state can be benifical
when the system is overloaded. Eliminating the dif-
fered updates and the final LACs updating step in case
of system overload could not affect efficiency of RT-
RCP since updates may be done by a new transaction.
This can be an interesting issue for DRTDBS since
changing the behavior of RT-RCP according to the
system load and transactions requirements can greatly
improve the performance of DRTDBS.
5 CONCLUSIONS
RT-RCP finds a trade-off between respecting tempo-
ral constraints of real time transactions and updating
replicas. In fact, RT-RCP is not anxious to update all
replicas synchronously. We have a dynamic degree of
replication which changes with the system load and
the real time transactions requirements. RT-RCP en-
sures the use of fresh data by real time transactions.
Indeed, sites refer to the LAC of each data item in or-
der to make an adequate choice about participant sites
in the execution of a transaction. Since a LAC related
to a data item is delivred each time by the site which
holds write locks on this data item, sites which appear
in this LAC contain an updated copy of the data item.
REFERENCES
Bernstein, P. A., Hadzilacos, V., and Goodman, N. (1987).
Concurrency Control and Recovery in Database Sys-
tems. Addison-Wesley.
Gray, J. N., Holland, P., Shasha, D., and O’Neil, P. (1996).
The dangers of Replication and a Solution. In 1996
ACM SIGMOD on Management of Data, pages 173–
182, Montreal, Canada.
Gray, J. N. and Reuter, A. (1993). Transaction Process-
ing:Concepts and Techniques. Morgan Kaufmann
Publisher.
Pu, C. and Leff, A. (1991). Replica Control in Distributed
Systems: An Asynchronous Approach. In Clifford, J.
and King, R., editors, Proc. of the ACM SIGMOD on
Management of Data, pages 377–386.
Ramamritham, K., Son, S., and Dipippo, L. (2004). Real-
Time Databases and Data Services. Real-Time Sys-
tems, pages 179–215.
Shu, L., Stankovic, J., and Son, S. (2002). Real-Time Log-
ging and Failure Recovery. In In IEEE Real-Time
Technology and Applications Symposium.
Son, S. H. and F.Zhang (1995). Real-Time Replication Con-
trol for Distributed Database Systems: Algorithms
and Their Performance. In Proc. of the 4th Intl. Conf.
DASFAA’95, Singapore, pages 214–221.
Wei, Y., Aslinger, A. A., Son, S. H., and Stankovic, J. A.
(2004). ORDER : A Dynamic Replication Alogorithm
for Periodic Transactions in Distributed Real-Time
Databases. In 10
th
Int’l Conf. RTCSA 2004.
Wiesmann, M., Pedone, F., Schiper, A., Kemme, B., and
Alonso, G. (2000). Database Replication Techniques:
A Three Parameter Classification. In Proceedings of
19th IEEE Symposium on Reliable Distributed Sys-
tems (SRDS2000), Germany.
Xiong, M., Ramamritham, K., Haritsa, J. R., and Stankovic,
J. A. (2002). Mirror: a State-Conscious Concurrency
Control Protocol for Replicated Real-Time Databases.
Inf. Syst., pages 277–297.
ICEIS 2008 - International Conference on Enterprise Information Systems
504