Whitepaper

An Analysis of Three Transaction Processing Architectures

This paper investigates the issues involved in using multiprocessors for high performance transaction processing applications. A simulation model is used to compare the performance of three different architectures, i.e, Shared Everything, Shared Nothing and Shared Disks. In Shared Everything, any processor can access any disk and all memory is shared. In Shared Nothing, neither disks nor memory is shared. In Shared Disks, any processor can access any disk, but each has its own private main memory.
 
The paper studies four different variations of the Shared Disks architecture which attempt to minimize lock request messages and compares the best Shared Disks variation with Shared Nothing and Shared Everything. In addition, it studies how intraquery parallelism affects the performance of the architectures.

Fill the form to download the whitepaper

Our Latest Whitepapers

Data Storage on the Edge

Whitepaper A Comparison of Two Approaches to Build Reliable Distributed File Server Edge computing solutions are driving enterprise offerings such as Private 5G and use...

Read More

Kubectrlbot – Speak & Manage Kubernetes

Nowadays, software development has moved from monolithic implementation to Microservices architecture. This helps to quickly run and deploy independent components without impacting the other components,...

Read More

Move faster with Microservices

Whitepaper Move faster with Microservices Microservices is a new age software development architectural style that is widely adopted for developing and managing software solutions at...

Read More

NextGenNAS File System

Whitepaper NextGenNAS File System As individual NAS boxes fill to capacity, additional units must be deployed to meet storage demand. Addition of NAS devices have...

Read More

Application Aware Snapshot Management

Whitepaper Application Aware Snapshot Management Exponential increase in data volume is making it increasingly difficult for enterprises to ensure availability and protection of valuable data....

Read More