Using restricted transactional memory to build a scalable in-memory database

Zhaoguo Wang, Hao Qian, Jinyang Li, Haibo Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The recent availability of Intel Haswell processors marks the transition of hardware transactional memory from research toys to mainstream reality. DBX is an in-memory database that uses Intel's restricted transactional memory (RTM) to achieve high performance and good scalability across multicore machines. The main limitation (and also key to practicality) of RTM is its constrained working set size: An RTM region that reads or writes too much data will always be aborted. The design of DBX addresses this challenge in several ways. First, DBX builds a database transaction layer on top of an underlying shared-memory store. The two layers use separate RTM regions to synchronize shared memory access. Second, DBX uses optimistic concurrency control to separate transaction execution from its commit. Only the commit stage uses RTM for synchronization. As a result, the working set of the RTMs used scales with the meta-data of reads and writes in a database transaction as opposed to the amount of data read/written. Our evaluation using TPC-C workload mix shows that DBX achieves 506,817 transactions per second on a 4-core machine.

Original languageEnglish (US)
Title of host publicationProceedings of the 9th European Conference on Computer Systems, EuroSys 2014
PublisherAssociation for Computing Machinery
DOIs
StatePublished - 2014
Event9th ACM European Conference on Computer Systems, EuroSys 2014 - Amsterdam, Netherlands
Duration: Apr 14 2014Apr 16 2014

Other

Other9th ACM European Conference on Computer Systems, EuroSys 2014
CountryNetherlands
CityAmsterdam
Period4/14/144/16/14

ASJC Scopus subject areas

  • Hardware and Architecture
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'Using restricted transactional memory to build a scalable in-memory database'. Together they form a unique fingerprint.

  • Cite this

    Wang, Z., Qian, H., Li, J., & Chen, H. (2014). Using restricted transactional memory to build a scalable in-memory database. In Proceedings of the 9th European Conference on Computer Systems, EuroSys 2014 [26] Association for Computing Machinery. https://doi.org/10.1145/2592798.2592815