Ad Hoc Transactions: What They Are and Why We Should Care

被引:8
|
作者
Tang, Chuzhe [1 ,2 ]
Wang, Zhaoguo [1 ,2 ]
Zhang, Xiaodong [1 ,2 ]
Yu, Qianmian [1 ,2 ]
Zang, Binyu [1 ,2 ]
Guan, Haibing [3 ]
Chen, Haibo [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Parallel & Distributed Syst, Shanghai, Peoples R China
[2] Minist Educ, Engn Res Ctr Domain Specif Operating Syst, Beijing, Peoples R China
[3] Shanghai Jiao Tong Univ, Shanghai Key Lab Scalable Comp & Syst, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1145/3514221.3526120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many transactions in web applications are constructed ad hoc in the application code. For example, developers might explicitly use locking primitives or validation procedures to coordinate critical code fragments. We refer to database operations coordinated by application code as ad hoc transactions. Until now, little is known about them. This paper presents the first comprehensive study on ad hoc transactions. By studying 91 ad hoc transactions among 8 popular open-source web applications, we find that (i) every studied application uses ad hoc transactions (up to 16 per application), 71 of which play critical roles; (ii) compared with database transactions, concurrency control of ad hoc transactions is much more flexible; (iii) ad hoc transactions are error-prone-53 of them have correctness issues, and 33 of them are confirmed by developers; and (iv) ad hoc transactions have the potential to improve performance in contentious workloads by utilizing application semantics such as access patterns. Finally, implications of ad hoc transactions to the database research community are discussed.
引用
收藏
页码:7 / 15
页数:9
相关论文
共 50 条