Week 3-7 PPT

advertisement
Transaction Management and
Concurrent Control
What is a Transaction?
• Any action that reads from and/or writes
to a database may consist of
– Simple SELECT statement to generate a list
of table contents
– A series of related UPDATE statements to
change the values of attributes in various
tables
– A series of INSERT statements to add rows to
one or more tables
– A combination of SELECT, UPDATE, and
INSERT statements
2
What is a Transaction? (continued)
• A logical unit of work that must be either entirely
completed or aborted
• Successful transaction changes the database
from one consistent state to another
– One in which all data integrity constraints are
satisfied
• Most real-world database transactions are
formed by two or more database requests
– The equivalent of a single SQL statement in an
application program or transaction
3
Example Transaction
• Examine current account balance
SELECT ACC_NUM, ACC_BALANCE
FROM CHECKACC
WHERE ACC_NUM = ‘0908110638’;
• Consistent state after transaction
• No changes made to Database
4
Example Transaction
• Register credit sale of 100 units of product X to
customer Y for $500
UPDATE PRODUCT
SET PROD_QOH = PROD_QOH - 100
WHERE PROD_CODE = ‘X’;
UPDATE ACCT_RECEIVABLE
SET ACCT_BALANCE = ACCT_BALANCE + 500
WHERE ACCT_NUM = ‘Y’;
• Consistent state only if both transactions are fully
completed
• DBMS doesn’t guarantee transaction represents
real-world event
5
Incomplete Transactions
• Reasons:
– An anomaly arises during execution
(automatically restart)
– System crashes
– An unexpected situation during transaction
execution
• May bring database to inconsistent state
6
Transaction Properties
• Atomicity
– All transaction operations must be completed
– Incomplete transactions aborted
• Durability
– Permanence of consistent database state
• Serializability
– Conducts transactions in serial order
– Important in multi-user and distributed databases
• Isolation
– Transaction data cannot be reused until its execution
complete
7
Transaction Management with
SQL
• Transaction Support
– COMMIT
– ROLLBACK
• User initiated transaction sequence must
continue until:
–
–
–
–
COMMIT statement is reached
ROLLBACK statement is reached
End of a program reached
Program reaches abnormal termination
8
Transaction Log
• Tracks all transactions that update database
• May be used by ROLLBACK command
• May be used to recover from system failure
• Log stores
– Record for beginning of transaction
– Each SQL statement
• Operation
• Names of objects
• Before and after values for updated fields
• Pointers to previous and next entries
– Commit Statement
9
Transaction Log
Example
10
Example
• Suppose that you are a manufacturer of product ABC, which
is composed of parts A, B, C. Each time a new product ABC is
created, it must be added to the product inventory, using the
PROD_QOH in PRODUCT table. And each time the product is
created the parts inventory, using PART_QOH in PART table
must be reduced by one each of parts, A, B, and C.
PART
PRODUCT
PART_CODE
PART_QOH
PROD_CODE
PROD_QOH
A
567
ABC
1205
B
98
C
549
11
Example (Cont’d)
Given the information, answer:
• How many database requests can you identify for an
inventory update for both PRODUCT and PART?
• Using SQL, write each database request you have
identified above.
• Write the complete transactions.
• Write the transaction log, using the template in slide 11.
12
Concurrency Control
• Coordinates simultaneous transaction
execution in multiprocessing database
– Ensure serializability of transactions in
multiuser database environment
– Potential problems in multiuser
environments
•Lost updates
•Uncommitted data
•Inconsistent retrievals
13
Normal Execution of Two
Transactions
14
Lost Updates
15
More Example
16
Correct Execution of Two
Transactions
17
An Uncommitted Data Problem
18
Retrieval During Update
19
Transaction Results:
Data Entry Correction
20
Inconsistent Retrievals
21
Example
• A department store runs a multiuser DBMS on a local area
network file server which does not enforce concurrency control.
One customer has a balance due of $250 when the following
three transactions related to this customer were processed at
the same time:
–Payment of $250
–Purchase on credit of $100
–Merchandise return of $50.
Each transaction reads the customer record when the balance was
$250. the updated record was returned to the database in the
order shown above.
• What balance will be for the customer after the last transaction
was completed?
22
The Scheduler
• Establishes order of concurrent
transaction execution
• Interleaves execution of database
operations to ensure serializability
• Bases actions on concurrency control
algorithms
– Locking
– Time stamping
• Ensures efficient use of computer’s CPU
23
Read/Write Conflict Scenarios:
24
Concurrency Control
with Locking Methods
• Lock guarantees current transaction exclusive
use of data item
• Acquires lock prior to access
• Lock released when transaction is completed
• DBMS automatically initiates and enforces
locking procedures
• Managed by lock manager
• Lock granularity indicates level of lock use
25
Locking Mechanisms
• Locking level:
–
–
–
–
Database – used during database updates
Table – used for bulk updates
Block or page – very commonly used
Row – only requested row; fairly commonly
used
– Field – requires significant overhead;
impractical
26
Locking Granularity
• Granularity refers to the level of the database
item locked.
• A trade-off between overhead and waiting.
• Holding locks at a fine level decreases waiting
among users but increase the system
overhead.
• Holding locks at a coarser level reduces the
number of locks but increases the amount of
waiting.
27
A Database-Level Locking
Sequence
28
An Example of a Table-Level Lock
29
Example of a Page-Level Lock
30
An Example of a Row-Level Lock
31
Binary Locks
• Two states
– Locked (1)
– Unlocked (0)
• Locked objects unavailable to other
objects
– Unlocked objects open to any transaction
– Transaction unlocks object when complete
32
An Example of a Binary Lock
33
Shared/Exclusive Locks
• Shared
– Exists when concurrent transactions granted READ
access
– Produces no conflict for read-only transactions
– Issued when transaction wants to read and exclusive
lock not held on item
• Exclusive
– Exists when access reserved for locking transaction
– Used when potential for conflict exists
– Issued when transaction wants to update unlocked
data
34
Shared/Exclusive Locks (Cont’d)
T2
X
S
_
X
No
No
Yes
S
No
Yes
Yes
_
Yes
Yes
Yes
T1
35
Two-Phase Locking
to Ensure Serializability
• Defines how transactions acquire and
relinquish locks
• Guarantees serializability, but it does
not prevent deadlocks
– Growing phase, in which a transaction
acquires all the required locks without
unlocking any data
– Shrinking phase, in which a transaction
releases all locks and cannot obtain any
new lock
36
Two-Phase Locking
to Ensure Serializability (continued)
• Governed by the following rules:
– Two transactions cannot have conflicting
locks
– No unlock operation can precede a lock
operation in the same transaction
– No data are affected until all locks are
obtained—that is, until the transaction is in
its locked point
37
Two-Phase Locking Protocol
38
Deadlocks
• Condition that occurs when two transactions
wait for each other to unlock data
• Possible only if one of the transactions wants to
obtain an exclusive lock on a data item
– No deadlock condition can exist among shared locks
• Control through
– Prevention
– Detection
– Avoidance
39
How a Deadlock Condition Is
Created
40
Example on Concurrency Control
Given schedule S1 as follows, and the locks won’t be
released until commit. Is there any deadlock in S1
using Shared/Exclusive lock.
T1
T2
T3
R(A)
W(B)
W(A)
Commit A, B
W(B)
Commit B
W(B)
Commit B
41
More Example
T1
T2
T3
R(C)
R(B)
W(B)
R(B)
R(A)
W(A)
W(C)
W(B)
R(A)
R(B)
W(B)
W(A)
Commit A
Commit A, B & C
Commit B
42
Concurrency Control
with Time Stamping Methods
• Assigns a global unique time stamp to each
transaction
• Produces an explicit order in which transactions
are submitted to the DBMS
• Uniqueness
– Ensures that no equal time stamp values can exist
• Monotonicity
– Ensures that time stamp values always increase
43
Wait/Die and Wound/Wait
Schemes
• Wait/die
– Older transaction waits and the younger is
rolled back and rescheduled
• Wound/wait
– Older transaction rolls back the younger
transaction and reschedules it
44
Wait/Die and Wound/Wait
Concurrency Control Schemes
45
Example
Concurrency control is implemented based on time
stamping method. Consider the following schedule:
T1
T2
R(A)
W(A)
W(B)
W(B)
W(C)
R(C)
46
Concurrency Control
with Optimistic Methods
• Optimistic approach
– Based on the assumption that the majority
of database operations do not conflict
– Does not require locking or time stamping
techniques
– Transaction is executed without
restrictions until it is committed
– Phases are read, validation, and write
47
Better Performance than Locking
48
Example
T1
T2
R(A)
W(A)
R(B)
R(B)
commit
49
Database Recovery Management
• Database recovery
– Restores database from a given state, usually
inconsistent, to a previously consistent state
– Based on the atomic transaction property
• All portions of the transaction must be treated as a
single logical unit of work, in which all operations must
be applied and completed to produce a consistent
database
– If transaction operation cannot be completed,
transaction must be aborted, and any changes to the
database must be rolled back (undone)
50
Transaction Recovery
• Deferred write
– Transaction operations do not immediately update
the physical database
– Only the transaction log is updated
– Database is physically updated only after the
transaction reaches its commit point using the
transaction log information
• Write-through
– Database is immediately updated by transaction
operations during the transaction’s execution, even
before the transaction reaches its commit point
51
Example
• Describe the restart work if transaction T1 is
committed after the checkpoint but prior to
the failure. Assume that the recovery manager
uses
– the deferred update approach
– The write though approach
Backup
Checkpoint
Failure
T1
52
Review
• Transaction property
• Transaction log
• Potential problems in multiuser
environments
• Different locking methods and how they
work
• Database recovery management
53
Download