SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Transaction Management Overview


                                        Chapter 16




There are three side effects of acid.
Enhanced long term memory,
decreased short term memory,
and I forget the third.
              - Timothy Leary




 Concurrency Control & Recovery

 • Concurrency Control
    – Provide correct and highly available access to data
      in the presence of concurrent access by large and
      diverse user populations
 • Recovery
    – Ensures database is fault tolerant, and not
      corrupted by software, system or media failure
    – 7x24 access to mission critical data
 • Existence of CC&R allows applications to be
   written without explicit concern for
   concurrency and fault tolerance
Roadmap

• Overview (Today)
• Concurrency Control
• Recovery




   Structure of a DBMS

    Query Optimization
      and Execution

   Relational Operators
 Files and Access Methods   These layers must
                            consider concurrency
   Buffer Management        control and recovery
 Disk Space Management      (Transaction, Lock,
                            Recovery Managers)

           DB
Transactions and Concurrent Execution
    • Transaction - DBMS’s abstract view of a user program (or
      activity):
       – A sequence of reads and writes of database objects.
       – Unit of work that must commit and abort as a single atomic unit
    • Transaction Manager controls the execution of transactions.
    • User program may carry out many operations on the data
      retrieved from the database, but the DBMS is only concerned
      about what data is read/written from/to the database.
    • Concurrent execution of multiple transactions essential for
      good performance.
       – Disk is the bottleneck (slow, frequently used)
       – Must keep CPU busy w/many queries
       – Better response time




       ACID properties of Transaction Executions

•   A tomicity:     All actions in the Xact happen, or none
    happen.
•   C onsistency:  If each Xact is consistent, and the DB
    starts consistent, it ends up consistent.
• I solation:   Execution of one Xact is isolated from that
    of other Xacts.
•   D urability:     If a Xact commits, its effects persist.
Atomicity and Durability
• A transaction might commit after completing all its
  actions, or it could abort (or be aborted by the DBMS)
  after executing some actions. Also, the system may
  crash while the transaction is in progress.
• Important properties:
   – Atomicity : Either executing all its actions, or none of its
     actions.
   – Durability : The effects of committed transactions must
     survive failures.
• DBMS ensures the above by logging all actions:
   – Undo the actions of aborted/failed transactions.
   – Redo actions of committed transactions not yet
     propagated to disk when system crashes.




      Transaction Consistency
  • A transaction performed on a database that is
    internally consistent will leave the database in an
    internally consistent state.
  • Consistency of database is expressed as a set of
    declarative Integrity Constraints
     – CREATE TABLE/ASSERTION statements
         • E.g. Each CSC434 student can only register in one project
           group. Each group must have 2 students.
      – Application-level
         • E.g. Bank account of each customer must stay the same during
           a transfer from savings to checking account
  • Transactions that violate ICs are aborted.
Isolation (Concurrency)
• Concurrency is achieved by DBMS, which interleaves
  actions (reads/writes of DB objects) of various
  transactions.
• DBMS ensures transactions do not step onto one
  another.
• Each transaction executes as if it was running by
  itself.
   – Transaction’s behavior is not impacted by the presence of
     other transactions that are accessing the same database
     concurrently.
   – Net effect must be identical to executing all transactions
     for some serial order.
   – Users understand a transaction without considering the
     effect of other concurrently executing transactions.




       Example
• Consider two transactions (Xacts):
    T1:   BEGIN A=A+100, B=B-100 END
    T2:   BEGIN A=1.06*A, B=1.06*B END

•   1st xact transfers $100 from B’s account to A’s
•   2nd credits both accounts with 6% interest.
•   Assume at first A and B each have $1000. What are the
    legal outcomes of running T1 and T2?
     • T1 ; T2 (A=1166,B=954)
     • T2 ; T1 (A=1160,B=960)
     • In either case, A+B = $2000 *1.06 = $2120
     • There is no guarantee that T1 will execute before T2 or
       vice-versa, if both are submitted together.
Example (Contd.)
• Consider a possible interleaved schedule:

      T1:    A=A+100,               B=B-100
      T2:               A=1.06*A,             B=1.06*B
   This is OK (same as T1;T2). But what about:
      T1:    A=A+100,                         B=B-100
      T2:               A=1.06*A, B=1.06*B
•   Result: A=1166, B=960; A+B = 2126, bank loses $6 !
•   The DBMS’s view of the second schedule:
      T1:    R(A), W(A),                            R(B), W(B)
      T2:                  R(A), W(A), R(B), W(B)




      Scheduling Transactions
• Serial schedule: Schedule that does not interleave the
  actions of different transactions.
• Equivalent schedules: For any database state, the
  effect (on the set of objects in the database) of
  executing the first schedule is identical to the effect of
  executing the second schedule.
• Serializable schedule: A schedule that is equivalent to
  some serial execution of the transactions.
  (Note: If each transaction preserves consistency, every
  serializable schedule preserves consistency. )
Anomalies with Interleaved Execution

• Reading Uncommitted Data (WR Conflicts, “dirty
  reads”):
   T1:     R(A), W(A),                   R(B), W(B), Abort
   T2:                   R(A), W(A), C

• Unrepeatable Reads (RW Conflicts):

  T1:     R(A),                   R(A), W(A), C
  T2:             R(A), W(A), C




    Anomalies (Continued)

    • Overwriting Uncommitted Data (WW
      Conflicts):

  T1:     W(A),                   W(B), C
  T2:             W(A), W(B), C
Lock-Based Concurrency Control
• Here’s a simple way to allow concurrency but
  avoid the anomalies just described…
• Two-phase Locking (2PL) Protocol:
   – Each Xact must obtain a S (shared) lock on object before
     reading, and an X (exclusive) lock on object before writing.
   – If an Xact holds an X lock on an object, no other Xact can
     get a lock (S or X) on that object.
   – System can obtain these locks automatically
   – Two phases: acquiring locks, and releasing them
         •   No lock is ever acquired after one has been released
         •   “Growing phase” followed by “shrinking phase”.
• Lock Manager keeps track of request for locks and
  grants locks on database objects when they become
  available.




             Strict 2PL
     •       2PL allows only serializable schedules but is
             subjected to cascading aborts.
     •       Example: rollback of T1 requires rollback of
             T2!
     T1:         R(A), W(A),                                  Abort
     T2:                         R(A), W(A), R(B), W(B)

     •        To avoid Cascading aborts, use Strict 2PL
     •        Strict Two-phase Locking (Strict 2PL)
              Protocol:
             – Same as 2PL, except:
             – All locks held by a transaction are released only
                when the transaction completes
Introduction to Crash Recovery
     • Recovery Manager
        – When a DBMS is restarted after crashes, the
          recovery manager must bring the database to a
          consistent state
        – Ensures transaction atomicity and durability
        – Undos actions of transactions that do not commit
        – Redos actions of committed transactions during
          system failures and media failures (corrupted
          disk).
     • Recovery Manager maintains log information
       during normal execution of transactions for
       use during crash recovery




       The Log
• Log consists of “records” that are written sequentially.
   – Typically chained together by Xact id
   – Log is often duplexed and archived on stable storage.
• Log stores modifications to the database
   – if Ti writes an object, write a log record with:
   – If UNDO required need “before image”
   – IF REDO required need “after image”.
   – Ti commits/aborts: a log record indicating this action.
• Need for UNDO and/or REDO depend on Buffer Mgr.
   – UNDO required if uncommitted data can overwrite stable
     version of committed data (STEAL buffer management).
   – REDO required if xact can commit before all its updates are
     on disk (NO FORCE buffer management).
Logging Continued
• Write Ahead Logging (WAL) protocol
   – Log record must go to disk before the changed page!
       • implemented via a handshake between log manager
         and the buffer manager.
   – All log records for a transaction (including it’s commit
     record) must be written to disk before the transaction is
     considered “Committed”.
• All log related activities (and in fact, all CC related
  activities such as lock/unlock, dealing with
  deadlocks etc.) are handled transparently by the
  DBMS.




       ARIES Recovery
• There are 3 phases in ARIES recovery:
   – Analysis: Scan the log forward (from the most recent
     checkpoint) to identify all Xacts that were active, and all
     dirty pages in the buffer pool at the time of the crash.
   – Redo: Redoes all updates to dirty pages in the buffer pool,
     as needed, to ensure that all logged updates are in fact
     carried out and written to disk.
   – Undo: The writes of all Xacts that were active at the crash
     are undone (by restoring the before value of the update, as
     found in the log), working backwards in the log.
• At the end --- all committed updates and only those
  updates are reflected in the database.
• Some care must be taken to handle the case of a crash
  occurring during the recovery process!
Summary
• Concurrency control and recovery are among the most
  important functions provided by a DBMS.
• Concurrency control is automatic.
   – System automatically inserts lock/unlock requests and
     schedules actions of different Xacts in such a way as to
     ensure that the resulting execution is equivalent to
     executing the Xacts one after the other in some order.
• Write-ahead logging (WAL) and the recovery protocol
  are used to undo the actions of aborted transactions
  and to restore the system to a consistent state after a
  crash.

Mais conteúdo relacionado

Mais procurados

Deadlock- Operating System
Deadlock- Operating SystemDeadlock- Operating System
Deadlock- Operating SystemRajan Shah
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactionsNilu Desai
 
Lecture 04 normalization
Lecture 04 normalization Lecture 04 normalization
Lecture 04 normalization emailharmeet
 
Fifth normal form
Fifth normal formFifth normal form
Fifth normal formAthi Sethu
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency controlDhani Ahmad
 
Transactions in dbms
Transactions in dbmsTransactions in dbms
Transactions in dbmsNancy Gulati
 
Distributed datababase Transaction and concurrency control
Distributed datababase Transaction and concurrency controlDistributed datababase Transaction and concurrency control
Distributed datababase Transaction and concurrency controlbalamurugan.k Kalibalamurugan
 
Concurrency Control Techniques
Concurrency Control TechniquesConcurrency Control Techniques
Concurrency Control TechniquesRaj vardhan
 
Database ,10 Transactions
Database ,10 TransactionsDatabase ,10 Transactions
Database ,10 TransactionsAli Usman
 
Database , 8 Query Optimization
Database , 8 Query OptimizationDatabase , 8 Query Optimization
Database , 8 Query OptimizationAli Usman
 
Databases: Locking Methods
Databases: Locking MethodsDatabases: Locking Methods
Databases: Locking MethodsDamian T. Gordon
 
Referential integrity
Referential integrityReferential integrity
Referential integrityJubin Raju
 
Query processing in Distributed Database System
Query processing in Distributed Database SystemQuery processing in Distributed Database System
Query processing in Distributed Database SystemMeghaj Mallick
 

Mais procurados (20)

Deadlock- Operating System
Deadlock- Operating SystemDeadlock- Operating System
Deadlock- Operating System
 
Deadlock Presentation
Deadlock PresentationDeadlock Presentation
Deadlock Presentation
 
Triggers and active database
Triggers and active databaseTriggers and active database
Triggers and active database
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
 
Lecture 04 normalization
Lecture 04 normalization Lecture 04 normalization
Lecture 04 normalization
 
Fifth normal form
Fifth normal formFifth normal form
Fifth normal form
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency control
 
Transactions in dbms
Transactions in dbmsTransactions in dbms
Transactions in dbms
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Distributed datababase Transaction and concurrency control
Distributed datababase Transaction and concurrency controlDistributed datababase Transaction and concurrency control
Distributed datababase Transaction and concurrency control
 
Concurrency Control Techniques
Concurrency Control TechniquesConcurrency Control Techniques
Concurrency Control Techniques
 
Transaction states PPT
Transaction states PPTTransaction states PPT
Transaction states PPT
 
Database ,10 Transactions
Database ,10 TransactionsDatabase ,10 Transactions
Database ,10 Transactions
 
ER Model in DBMS
ER Model in DBMSER Model in DBMS
ER Model in DBMS
 
Database , 8 Query Optimization
Database , 8 Query OptimizationDatabase , 8 Query Optimization
Database , 8 Query Optimization
 
Databases: Locking Methods
Databases: Locking MethodsDatabases: Locking Methods
Databases: Locking Methods
 
Referential integrity
Referential integrityReferential integrity
Referential integrity
 
Query processing in Distributed Database System
Query processing in Distributed Database SystemQuery processing in Distributed Database System
Query processing in Distributed Database System
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
 
Distributed database
Distributed databaseDistributed database
Distributed database
 

Destaque

Chapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlChapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlAbDul ThaYyal
 
12 ipt 0501 transaction processing systems 01
12 ipt 0501   transaction processing systems 0112 ipt 0501   transaction processing systems 01
12 ipt 0501 transaction processing systems 01ctedds
 
Databases: Concurrency Control
Databases: Concurrency ControlDatabases: Concurrency Control
Databases: Concurrency ControlDamian T. Gordon
 
Transaction concurrency control
Transaction concurrency controlTransaction concurrency control
Transaction concurrency controlAnand Grewal
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Gyanmanjari Institute Of Technology
 
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)Beat Signer
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemuday sharma
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems greg robertson
 

Destaque (12)

Chapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlChapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency control
 
12 ipt 0501 transaction processing systems 01
12 ipt 0501   transaction processing systems 0112 ipt 0501   transaction processing systems 01
12 ipt 0501 transaction processing systems 01
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Distributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data ControlDistributed DBMS - Unit 5 - Semantic Data Control
Distributed DBMS - Unit 5 - Semantic Data Control
 
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & RecoveryDistributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
 
Databases: Concurrency Control
Databases: Concurrency ControlDatabases: Concurrency Control
Databases: Concurrency Control
 
Transaction concurrency control
Transaction concurrency controlTransaction concurrency control
Transaction concurrency control
 
Transaction Processing System
Transaction Processing SystemTransaction Processing System
Transaction Processing System
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
 
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems
 

Semelhante a Transaction & Concurrency Control

7. transaction mang
7. transaction mang7. transaction mang
7. transaction mangkhoahuy82
 
Concepts of Data Base Management Systems
Concepts of Data Base Management SystemsConcepts of Data Base Management Systems
Concepts of Data Base Management SystemsDinesh Devireddy
 
What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...Raj vardhan
 
Database recovery techniques
Database recovery techniquesDatabase recovery techniques
Database recovery techniquespusp220
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and RecoveryMaham Huda
 
recovery system
recovery systemrecovery system
recovery systemshreeuva
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Dartabase Transaction.pptx
Dartabase Transaction.pptxDartabase Transaction.pptx
Dartabase Transaction.pptxBibus Poudel
 
FALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptx
FALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptxFALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptx
FALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptxhritikraj888
 
Data guard logical_r3.1
Data guard logical_r3.1Data guard logical_r3.1
Data guard logical_r3.1Ram Naani
 

Semelhante a Transaction & Concurrency Control (20)

7. transaction mang
7. transaction mang7. transaction mang
7. transaction mang
 
Unit 06 dbms
Unit 06 dbmsUnit 06 dbms
Unit 06 dbms
 
Lec08
Lec08Lec08
Lec08
 
Concepts of Data Base Management Systems
Concepts of Data Base Management SystemsConcepts of Data Base Management Systems
Concepts of Data Base Management Systems
 
transaction_processing.ppt
transaction_processing.ppttransaction_processing.ppt
transaction_processing.ppt
 
Transaction processing
Transaction processingTransaction processing
Transaction processing
 
What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...
 
Database recovery techniques
Database recovery techniquesDatabase recovery techniques
Database recovery techniques
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
 
recovery system
recovery systemrecovery system
recovery system
 
Recovery
RecoveryRecovery
Recovery
 
DBMS Vardhaman.pdf
DBMS Vardhaman.pdfDBMS Vardhaman.pdf
DBMS Vardhaman.pdf
 
Hbase hivepig
Hbase hivepigHbase hivepig
Hbase hivepig
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
DBMS 4.pdf
DBMS 4.pdfDBMS 4.pdf
DBMS 4.pdf
 
Unit 4 dbms
Unit 4 dbmsUnit 4 dbms
Unit 4 dbms
 
Dartabase Transaction.pptx
Dartabase Transaction.pptxDartabase Transaction.pptx
Dartabase Transaction.pptx
 
FALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptx
FALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptxFALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptx
FALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptx
 
Data guard logical_r3.1
Data guard logical_r3.1Data guard logical_r3.1
Data guard logical_r3.1
 
Hbase hive pig
Hbase hive pigHbase hive pig
Hbase hive pig
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Transaction & Concurrency Control

  • 1. Transaction Management Overview Chapter 16 There are three side effects of acid. Enhanced long term memory, decreased short term memory, and I forget the third. - Timothy Leary Concurrency Control & Recovery • Concurrency Control – Provide correct and highly available access to data in the presence of concurrent access by large and diverse user populations • Recovery – Ensures database is fault tolerant, and not corrupted by software, system or media failure – 7x24 access to mission critical data • Existence of CC&R allows applications to be written without explicit concern for concurrency and fault tolerance
  • 2. Roadmap • Overview (Today) • Concurrency Control • Recovery Structure of a DBMS Query Optimization and Execution Relational Operators Files and Access Methods These layers must consider concurrency Buffer Management control and recovery Disk Space Management (Transaction, Lock, Recovery Managers) DB
  • 3. Transactions and Concurrent Execution • Transaction - DBMS’s abstract view of a user program (or activity): – A sequence of reads and writes of database objects. – Unit of work that must commit and abort as a single atomic unit • Transaction Manager controls the execution of transactions. • User program may carry out many operations on the data retrieved from the database, but the DBMS is only concerned about what data is read/written from/to the database. • Concurrent execution of multiple transactions essential for good performance. – Disk is the bottleneck (slow, frequently used) – Must keep CPU busy w/many queries – Better response time ACID properties of Transaction Executions • A tomicity: All actions in the Xact happen, or none happen. • C onsistency: If each Xact is consistent, and the DB starts consistent, it ends up consistent. • I solation: Execution of one Xact is isolated from that of other Xacts. • D urability: If a Xact commits, its effects persist.
  • 4. Atomicity and Durability • A transaction might commit after completing all its actions, or it could abort (or be aborted by the DBMS) after executing some actions. Also, the system may crash while the transaction is in progress. • Important properties: – Atomicity : Either executing all its actions, or none of its actions. – Durability : The effects of committed transactions must survive failures. • DBMS ensures the above by logging all actions: – Undo the actions of aborted/failed transactions. – Redo actions of committed transactions not yet propagated to disk when system crashes. Transaction Consistency • A transaction performed on a database that is internally consistent will leave the database in an internally consistent state. • Consistency of database is expressed as a set of declarative Integrity Constraints – CREATE TABLE/ASSERTION statements • E.g. Each CSC434 student can only register in one project group. Each group must have 2 students. – Application-level • E.g. Bank account of each customer must stay the same during a transfer from savings to checking account • Transactions that violate ICs are aborted.
  • 5. Isolation (Concurrency) • Concurrency is achieved by DBMS, which interleaves actions (reads/writes of DB objects) of various transactions. • DBMS ensures transactions do not step onto one another. • Each transaction executes as if it was running by itself. – Transaction’s behavior is not impacted by the presence of other transactions that are accessing the same database concurrently. – Net effect must be identical to executing all transactions for some serial order. – Users understand a transaction without considering the effect of other concurrently executing transactions. Example • Consider two transactions (Xacts): T1: BEGIN A=A+100, B=B-100 END T2: BEGIN A=1.06*A, B=1.06*B END • 1st xact transfers $100 from B’s account to A’s • 2nd credits both accounts with 6% interest. • Assume at first A and B each have $1000. What are the legal outcomes of running T1 and T2? • T1 ; T2 (A=1166,B=954) • T2 ; T1 (A=1160,B=960) • In either case, A+B = $2000 *1.06 = $2120 • There is no guarantee that T1 will execute before T2 or vice-versa, if both are submitted together.
  • 6. Example (Contd.) • Consider a possible interleaved schedule: T1: A=A+100, B=B-100 T2: A=1.06*A, B=1.06*B  This is OK (same as T1;T2). But what about: T1: A=A+100, B=B-100 T2: A=1.06*A, B=1.06*B • Result: A=1166, B=960; A+B = 2126, bank loses $6 ! • The DBMS’s view of the second schedule: T1: R(A), W(A), R(B), W(B) T2: R(A), W(A), R(B), W(B) Scheduling Transactions • Serial schedule: Schedule that does not interleave the actions of different transactions. • Equivalent schedules: For any database state, the effect (on the set of objects in the database) of executing the first schedule is identical to the effect of executing the second schedule. • Serializable schedule: A schedule that is equivalent to some serial execution of the transactions. (Note: If each transaction preserves consistency, every serializable schedule preserves consistency. )
  • 7. Anomalies with Interleaved Execution • Reading Uncommitted Data (WR Conflicts, “dirty reads”): T1: R(A), W(A), R(B), W(B), Abort T2: R(A), W(A), C • Unrepeatable Reads (RW Conflicts): T1: R(A), R(A), W(A), C T2: R(A), W(A), C Anomalies (Continued) • Overwriting Uncommitted Data (WW Conflicts): T1: W(A), W(B), C T2: W(A), W(B), C
  • 8. Lock-Based Concurrency Control • Here’s a simple way to allow concurrency but avoid the anomalies just described… • Two-phase Locking (2PL) Protocol: – Each Xact must obtain a S (shared) lock on object before reading, and an X (exclusive) lock on object before writing. – If an Xact holds an X lock on an object, no other Xact can get a lock (S or X) on that object. – System can obtain these locks automatically – Two phases: acquiring locks, and releasing them • No lock is ever acquired after one has been released • “Growing phase” followed by “shrinking phase”. • Lock Manager keeps track of request for locks and grants locks on database objects when they become available. Strict 2PL • 2PL allows only serializable schedules but is subjected to cascading aborts. • Example: rollback of T1 requires rollback of T2! T1: R(A), W(A), Abort T2: R(A), W(A), R(B), W(B) • To avoid Cascading aborts, use Strict 2PL • Strict Two-phase Locking (Strict 2PL) Protocol: – Same as 2PL, except: – All locks held by a transaction are released only when the transaction completes
  • 9. Introduction to Crash Recovery • Recovery Manager – When a DBMS is restarted after crashes, the recovery manager must bring the database to a consistent state – Ensures transaction atomicity and durability – Undos actions of transactions that do not commit – Redos actions of committed transactions during system failures and media failures (corrupted disk). • Recovery Manager maintains log information during normal execution of transactions for use during crash recovery The Log • Log consists of “records” that are written sequentially. – Typically chained together by Xact id – Log is often duplexed and archived on stable storage. • Log stores modifications to the database – if Ti writes an object, write a log record with: – If UNDO required need “before image” – IF REDO required need “after image”. – Ti commits/aborts: a log record indicating this action. • Need for UNDO and/or REDO depend on Buffer Mgr. – UNDO required if uncommitted data can overwrite stable version of committed data (STEAL buffer management). – REDO required if xact can commit before all its updates are on disk (NO FORCE buffer management).
  • 10. Logging Continued • Write Ahead Logging (WAL) protocol – Log record must go to disk before the changed page! • implemented via a handshake between log manager and the buffer manager. – All log records for a transaction (including it’s commit record) must be written to disk before the transaction is considered “Committed”. • All log related activities (and in fact, all CC related activities such as lock/unlock, dealing with deadlocks etc.) are handled transparently by the DBMS. ARIES Recovery • There are 3 phases in ARIES recovery: – Analysis: Scan the log forward (from the most recent checkpoint) to identify all Xacts that were active, and all dirty pages in the buffer pool at the time of the crash. – Redo: Redoes all updates to dirty pages in the buffer pool, as needed, to ensure that all logged updates are in fact carried out and written to disk. – Undo: The writes of all Xacts that were active at the crash are undone (by restoring the before value of the update, as found in the log), working backwards in the log. • At the end --- all committed updates and only those updates are reflected in the database. • Some care must be taken to handle the case of a crash occurring during the recovery process!
  • 11. Summary • Concurrency control and recovery are among the most important functions provided by a DBMS. • Concurrency control is automatic. – System automatically inserts lock/unlock requests and schedules actions of different Xacts in such a way as to ensure that the resulting execution is equivalent to executing the Xacts one after the other in some order. • Write-ahead logging (WAL) and the recovery protocol are used to undo the actions of aborted transactions and to restore the system to a consistent state after a crash.