1 / 29

Chapter 16: Concurrency Control

Lock-Based Protocols Timestamp-Based Protocols Validation-Based Protocols (Optimistic Conc. Control) Multiple Granularity Multiversion Schemes Deadlock Handling Insert and Delete Operations. Chapter 16: Concurrency Control. A lock is a mechanism to control concurrent access to a data item

loman
Download Presentation

Chapter 16: Concurrency Control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lock-Based Protocols Timestamp-Based Protocols Validation-Based Protocols (Optimistic Conc. Control) Multiple Granularity Multiversion Schemes Deadlock Handling Insert and Delete Operations Chapter 16: Concurrency Control

  2. A lock is a mechanism to control concurrent access to a data item Data items can be locked in two modes 1. Exclusive (X) mode: read/write 2. Shared (S) mode: read Lock requests are made to concurrency-control manager. Transaction can proceed only after request is granted. Lock-Based Protocols

  3. Lock-compatibility matrix A transaction may be granted a lock on an item if the requested lock is compatible with locks already held on the item by other transactions Any number of transactions can hold shared locks on an item No other transaction may hold any lock on the item if any transaction holds an exclusive lock on the item If a lock cannot be granted, the requesting transaction must wait till all incompatible locks held by other transactions have been released. Lock-Based Protocols (Cont.)

  4. Example lock-S(A); read (A); unlock(A); lock-S(B); read (B); unlock(B); display(A+B) Locking as above is not sufficient to guarantee serializability If A and B get updated between the read of A and B, the displayed sum would be wrong. A locking protocol is a set of rules followed by all transactions while requesting and releasing locks. Locking protocols restrict the set of possible schedules. Lock-Based Protocols (Cont.)

  5. Deadlock Neither T3 nor T4 can make progress — executing lock-S(B) causes T4 to wait for T3 to release its lock on B, while executing lock-X(A) causes T3 to wait for T4 to release its lock on A. Pitfalls of Lock-Based Protocols

  6. Starvation A transaction may be waiting for an X-lock on an item, while a sequence of other transactions request and are granted an S-lock on the same item. Concurrency control manager can be designed to prevent starvation. Pitfalls of Lock-Based Protocols (Cont.)

  7. Supports conflict serializability Growing Phase Transaction may obtain locks Transaction may not release locks Shrinking Phase Transaction may release locks Transaction may not obtain locks Transactions can be serialized in the order of their lock points (i.e. the points where transactions acquire their final locks). Two Phase Locking Protocol

  8. Potential deadlocks Possible cascading roll-backs To avoid, use strict 2PL. A transaction must hold all its exclusive locks till it commits/aborts. Rigorous 2PL All locks are held till commit/abort. Transactions can be serialized in their commit order Most commercial DB’s implement strict or rigorous 2PL Two-Phase Locking Protocol (Cont.)

  9. Each transaction is issued a timestamp when it enters the system Time-stamps determine the serializability order Ensure that any conflicting read and write operations are executed in timestamp order For each data Q maintaintwo timestamp values: W-timestamp(Q) is the largest time-stamp of any transaction that executed write(Q) successfully R-timestamp(Q) is the largest time-stamp of any transaction that executed read(Q) successfully Timestamp-Based Protocols

  10. Suppose a transaction Ti issues a read(Q) 1. If TS(Ti) <W-timestamp(Q) Reject the read operation and roll back Ti 2. If TS(Ti)  W-timestamp(Q) Execute read operation R-timestamp(Q) = max(R-timestamp(Q), TS(Ti)) Timestamp Ordering Protocol

  11. Suppose Ti issues write(Q) If TS(Ti) < R-timestamp(Q) or TS(Ti) < W-timestamp(Q) Reject the write operation and roll back Ti Else Execute the write operation TS(Ti) = W-timestamp(Q) Timestamp Ordering Protocol

  12. The timestamp-ordering protocol guarantees serializability since all the arcs in the precedence graph are of the form: No cycles in the precedence graph No deadlock since no transaction ever waits May not be cascade free May not even be recoverable. Correctness of Timestamp-Ordering Protocol transaction with smaller timestamp transaction with larger timestamp

  13. Problem with timestamp-ordering protocol: Suppose Ti aborts, but Tj has read a data item written by Ti Tjmust abort; if Tjhad been allowed to commit earlier, the schedule is not recoverable Any transaction that has read a data item written by Tj must abort Cascading rollback Solution: Perform all writes at the end of a transaction Exclusive access Locking Ensure transactions do not read data written by uncommitted transactions Recoverability and Cascade Freedom

  14. Modified version of the timestamp-ordering protocol Obsolete write operations may be ignored under certain circumstances. When Ti attempts to write data item Q, if TS(Ti) < W-timestamp(Q), then Ti is attempting to write an obsolete value of {Q}. Ignore this {write} operation rather than rolling back Ti Thomas' Write Rule allows greater potential concurrency. Allows some view serializable schedules that are not conflict-serializable DoesThomas’ write rule eliminate the casecding rollback problem? Why or why not? Thomas’ Write Rule

  15. Transaction (Ti) execution phases 1. Read phase Ti writes only to local variables 2. Validation phase Transaction Ti performs a validation test to determine if local variables can be written without violating serializability. 3. Write phase If Ti is validated, the updates are applied to the database; otherwise, Ti is rolled back Optimistic concurrency control Transaction executes fully in the hope that all will go well during validation Validation-Based Protocol

  16. Each transaction Ti has 3 timestamps Start(Ti) : the time when Ti started its execution Validation(Ti): the time when Ti entered its validation phase Finish(Ti) : the time when Ti finished its write phase Serializability order is determined by timestamp given at validation time to increase concurrency. TS(Ti) = Validation(Ti) Greater degree of concurrency if probability of conflicts is low The serializability order is not pre-decided and relatively less transactions will have to be rolled back Validation-Based Protocol (Cont.)

  17. If for all Ti with TS (Ti) < TS (Tj) either one of the following condition holds: finish(Ti) < start(Tj) No overlapped execution start(Tj) < finish(Ti) < validation(Tj) andthe set of data items written by Ti does not intersect with the set of data items read by Tj then validation succeeds and Tj can be committed. Otherwise, validation fails and Tj is aborted. The writes of Tjdo not affect reads of Ti since they occur after Ti has finished its reads The writes of Ti do not affect reads of Tj since Tjdoes not read any item written by Ti Validation Test for Transaction Tj

  18. Valid schedule; conflict serializable? Schedule Produced by Validation T14 T15 read(B) read(B) B = B-50 read(A) A = A+50 read(A) (validate) display (A+B) (validate) write (B) write (A)

  19. Multiversion schemes keep old versions of data item to increase concurrency Each successful write results in the creation of a new version Use timestamps to label versions When a read(Q) operation is issued, select an appropriate version of Q based on the timestamp of the transaction reads never have to wait as an appropriate version is returned immediately Ensureserializability Efficient mechanism to select the appropriate version Multiversion Schemes

  20. Consider the following two transactions: T1: write (X) T2: write(Y) write(Y) write(X) Schedule with deadlock Deadlock Handling T1 T2 lock-X on X write (X) lock-X on Y write (X) wait for lock-X on X wait for lock-X on Y

  21. Deadlock prevention Ensure that the system will never enter into a deadlock state Acquire all locks before starting execution Impose partial ordering of all data items and require that a transaction can lock data items only in the specified order Any problem? Deadlock Handling

  22. wait-die scheme — non-preemptive Older transaction may wait for younger one to release data item. Younger are rolled back. A transaction may die several times before acquiring needed data item wound-wait scheme — preemptive Older transaction wounds (forces rollback) younger transaction instead of waiting for it. Younger transactions may wait for older ones. Fewer rollbacks than wait-die scheme More Deadlock Prevention Strategies

  23. Both in wait-die and in wound-wait schemes, a rolled back transactions is restarted with its original timestamp. Older transactions thus have precedence over newer ones, and starvation is hence avoided. Timeout-Based Schemes : A transaction waits for a lock only for a specified amount of time. After that, the wait times out and the transaction is rolled back. Deadlocks are not possible Potential starvation Difficult to determine good value of the timeout interval Deadlock prevention (Cont.)

  24. Wait-for graphG = (V, E), V is a set of vertices (all the transactions in the system) E is a set of edges; each element is an ordered pair TiTj Ti is waiting for Tj to release a data item The system is in a deadlock state iff the wait-for graph has a cycle Invoke a deadlock-detection algorithm periodically to look for cycles Deadlock Detection

  25. Deadlock Detection (Cont.) Wait-for graph with a cycle Wait-for graph without a cycle

  26. When deadlock is detected : Roll back some victim transactions to break deadlock Select that transaction as victim that will incur minimum cost. Include the number of rollbacks in the cost factor to avoid starvation Deadlock Recovery

  27. If two-phase locking is used : Exclusive lock is necessary to insert or delete a tuple Insertions and deletions can lead to the phantom phenomenon. T1: find all accounts in Perryridge T2: insert a tuple in the relation, e.g., insert a new account at Perryridge If the serialization order should be <T1, T2>, T1 & T2 conflict although they do not access any tuple in common If only tuple locks are used, non-serializable schedules can result Lock tables: low concurrency Insert and Delete Operations

  28. One solution: Associate a data item with the relation, to represent the information about what tuples the relation contains Transactions scanning the relation acquire a shared lock in the data item Transactions inserting or deleting a tuple acquire an exclusive lock on the data item Low concurrency for insertions/deletions e.g., two insertions of different tuples can not be executed concurrently Index locking protocols Higher concurrency Prevent the phantom phenomenon by requiring locks on certain index buckets e.g., lock B+tree nodes based on the serach key values Insert and Delete Operations (Cont.)

  29. End of Chapter

More Related