Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Ullman et al. : Database System Principles Notes 09: Concurrency Control.

Similar presentations


Presentation on theme: "1 Ullman et al. : Database System Principles Notes 09: Concurrency Control."— Presentation transcript:

1 1 Ullman et al. : Database System Principles Notes 09: Concurrency Control

2 2 Chapter 18 [18] Concurrency Control T1T2…Tn DB (consistency constraints)

3 Interactions among concurrently executing transactions can cause the database state to become inconsistent, even when the transactions individually preserve correctness of the state, and there is no system failure. Thus, the timing of individual steps of different transactions needs to be regulated in some manner. This regulation is the job of the scheduler component of the DBMS, and the general process of assuring that transactions preserve consistency when executing simultaneously is called concurrency control. 3

4 In most situations, the scheduler will execute the reads and writes directly, first calling on the buffer manager if the desired database element is not in a buffer. However, in some situations, it is not safe for the request to be executed immediately. The scheduler must delay the request. In some concurrency-control techniques, the scheduler may even abort the transaction that issued the request 4

5 5 Example: T1:Read(A)T2:Read(A) A  A+100A  A  2Write(A)Read(B) B  B+100B  B  2Write(B) Constraint: A=B

6 A schedule is a sequence of the important actions taken by one or more transactions. When studying concurrency control, the important read and write actions take place in the main-memory buffers, not the disk. That is, a database element A that is brought to a buffer by some transaction T may be read or written in that buffer not only by T but by other transactions that access A. A schedule is serial if its actions consist of all the actions of one transaction, then all the actions of another transaction, and so on. No mixing of the actions is allowed. 6

7 7 Schedule A (serial) T1T2 Read(A); A  A+100 Write(A); Read(B); B  B+100; Write(B); Read(A);A  A  2; Write(A); Read(B);B  B  2; Write(B); AB25 125 250 250

8 8 Schedule B (serial) T1T2 Read(A);A  A  2; Write(A); Read(B);B  B  2; Write(B); Read(A); A  A+100 Write(A); Read(B); B  B+100; Write(B); AB25 50 150 150

9 A schedule S is serializable if there is a serial schedule S' such that for every initial database state, the effects of S and S‘ are the same. 9

10 10 Schedule C (serializable) T1T2 Read(A); A  A+100 Write(A); Read(A);A  A  2; Write(A); Read(B); B  B+100; Write(B); Read(B);B  B  2; Write(B); AB25 125 250 125 250250

11 11 Schedule D (not serializable) T1T2 Read(A); A  A+100 Write(A); Read(A);A  A  2; Write(A); Read(B);B  B  2; Write(B); Read(B); B  B+100; Write(B); AB25 125 250 50 150 250150

12 12 Schedule E T1T2’ Read(A); A  A+100 Write(A); Read(A);A  A  1; Write(A); Read(B);B  B  1; Write(B); Read(B); B  B+100; Write(B); AB25 125 25 125125 Same as Schedule D but with new T2’

13 13 Want schedules that are “good”, regardless of –initial state and –transaction semantics Only look at order of read and writes It is not realistic for the scheduler to concern itself with the details of computation undertaken by transactions. Any database element A that a transaction T writes is given a value that depends on the database state in such a way that no arithmetic coincidences occur.

14 14 To make the notation precise: 1. An action is an expression of the form r i (X ) or W i (X), meaning that transaction T i, reads or writes, respectively, the database element X. 2. A transaction T i is a sequence of actions with subscript i. 3. A schedule S of a set of transactions T is a sequence of actions, in which for each transaction T i in T, the actions of T i appear in S in the same order that they appear in the definition of T i itself. We say that S is an interleaving of the actions of the transactions of which it is composed.

15 15 Sc’=r 1 (A)w 1 (A) r 1 (B)w 1 (B)r 2 (A)w 2 (A)r 2 (B)w 2 (B) T 1 T 2 Example: Sc=r 1 (A)w 1 (A)r 2 (A)w 2 (A)r 1 (B)w 1 (B)r 2 (B)w 2 (B)

16 16 However, for Sd: Sd=r 1 (A)w 1 (A)r 2 (A)w 2 (A) r 2 (B)w 2 (B)r 1 (B)w 1 (B) as a matter of fact, T 2 must precede T 1 in any equivalent schedule, i.e., T 2  T 1

17 17 T 1 T 2 Sd cannot be rearranged into a serial schedule Sd is not “equivalent” to any serial schedule Sd is “bad” T 2  T 1 Also, T 1  T 2

18 18 Returning to Sc Sc=r 1 (A)w 1 (A)r 2 (A)w 2 (A)r 1 (B)w 1 (B)r 2 (B)w 2 (B) T 1  T 2 T 1  T 2  no cycles  Sc is “equivalent” to a serial schedule (in this case T 1,T 2 )

19 19 Concepts Transaction: sequence of r i (x), w i (x) actions Conflicting actions: r 1(A) w 2(A) w 1(A) w 2(A) r 1(A) w 2(A) Schedule: represents chronological order in which actions are executed Serial schedule: no interleaving of actions or transactions

20 20 What about concurrent actions? Ti issuesSystemInput(X) t  X read(X,t)issuescompletes input(X) time T2 issues write(B,s) System issues input(B) completes B  s System issues output(B) completes

21 21 So net effect is either S=…r 1 (X)…w 2 (B)… or S=…w 2 (B)…r 1 (X)…

22 22 Assume equivalent to either r 1 (A) w 2 (A) orw 2 (A) r 1 (A)  low level synchronization mechanism Assumption called “atomic actions” What about conflicting, concurrent actions on same object? start r 1 (A)end r 1 (A) start w 2 (A) end w 2 (A) time

23 23 Definition S 1, S 2 are conflict equivalent schedules if S 1 can be transformed into S 2 by a series of non-conflicting swaps of adjacent actions. A schedule is conflict serializable if it is conflict equivalent to some serial schedule.

24 24 Example: r 1 (A); w 1 (A); r 2 (A); w 2 (A); r 1 (B); w 1 (B); r 2 (B); w 2 (B); We claim this schedule is conflict-serializable. 1.r 1 (A) ; w 1 (A) ; r 2 (A) ; w 2 (A) ; r 1 (B) ; w 1 (B) ; r 2 (B) ; w 2 (B) ; 2.r 1 (A) ; w 1 (A) ; r 2 (A) ; r 1 (B) ; w 2 (A) ; w 1 (B) ; r 2 (B) ; w 2 (B) ; 3.r 1 (A) ; w 1 (A) ; r 1 (B) ; r 2 (A) ; w 2 (A) ; w 1 (B) ; r 2 (B) ; w 2 (B) ; 4.r 1 (A) ; w 1 (A) ; r 1 (B) ; r 2 (A) ; w 1 (B) ; w 2 (A) ; r 2 (B) ; w 2 (B) ; 5.r 1 (A) ; w 1 (A) ; r 1 (B) ; w 1 (B) ; r 2 (A) ; w 2 (A) ; r 2 (B) ; w 2 (B) ;

25 25 Conflict-serializability is a sufficient condition for serializability i.e., a conflict-serializable schedule is a serializable schedule. Conflict-serializability is not required for a schedule to be serializable. Schedulers in commercial systems generally use conflict-serializability when they need to guarantee serializability.

26 26 Nodes: transactions in S Arcs: Ti  Tj whenever - p i (A), q j (A) are actions in S - p i (A) < S q j (A) - at least one of p i, q j is a write Precedence graph P(S) (S is schedule )

27 27 Exercise: What is P(S) for S = w 3 (A) w 2 (C) r 1 (A) w 1 (B) r 1 (C) w 2 (A) r 4 (A) w 4 (D) Is S serializable?

28 28 Another Exercise: What is P(S) for S = w 1 (A) r 2 (A) r 3 (A) w 4 (A) ?

29 29 Lemma S 1, S 2 conflict equivalent  P(S 1 )=P(S 2 )

30 30 Lemma S 1, S 2 conflict equivalent  P(S 1 )=P(S 2 ) Proof: Assume P(S 1 )  P(S 2 )   T i : T i  T j in S 1 and not in S 2  S 1 = …p i (A)... q j (A)… p i, q j S 2 = …q j (A)…p i (A)... conflict  S 1, S 2 not conflict equivalent

31 31 Note: P(S 1 )=P(S 2 )  S 1, S 2 conflict equivalent Counter example: S 1 =w 1 (A) r 2 (A) w 2 (B) r 1 (B) (cannot swap) S 2 =r 2 (A) w 1 (A) r 1 (B) w 2 (B)

32 32 Theorem P(S 1 ) acyclic  S 1 conflict serializable (  ) Assume S 1 is conflict serializable   S s : S s, S 1 conflict equivalent  P(S s ) = P(S 1 )  P(S 1 ) acyclic since P(S s ) is acyclic

33 33 (  ) Assume P(S 1 ) is acyclic Transform S 1 as follows: (1) Take T 1 to be transaction with no incident arcs (2) Move all T 1 actions to the front S 1 = ……. q j (A)……. p 1 (A)….. (3) we now have S 1 = (4) repeat above steps to serialize rest! T 1 T 2 T 3 T 4 Theorem P(S 1 ) acyclic  S 1 conflict serializable

34 34 How to enforce serializable schedules? Option 1: run system, recording P(S); at end of day, check for P(S) cycles and declare if execution was good

35 35 Option 2: prevent P(S) cycles from occurring T 1 T 2 …..T n Scheduler DB How to enforce serializable schedules?

36 36 A locking protocol Two new actions: lock (exclusive):l i (A) unlock:u i (A) scheduler T 1 T 2 lock table

37 37 Rule #1: Consistency of transactions T i : … l i (A) … p i (A) … u i (A)... 1. A transaction can only read or write an element if it previously was granted a lock on that element and hasn’t yet released the lock. 2. If a transaction locks an element, it must later unlock that element.

38 38 Rule #2 Legality of schedules S = …….. l i (A) ………... u i (A) ……... Locks must have their intended meaning: no two transactions may have locked the same element without one having first released the lock. no l j (A)

39 39 What schedules are legal? What transactions are consistent? S1 = l 1 (A)l 1 (B)r 1 (A)w 1 (B)l 2 (B)u 1 (A)u 1 (B) r 2 (B)w 2 (B)u 2 (B)l 3 (B)r 3 (B)u 3 (B) S2 = l 1 (A)r 1 (A)w 1 (B)u 1 (A)u 1 (B) l 2 (B)r 2 (B)w 2 (B)l 3 (B)r 3 (B)u 3 (B) S3 = l 1 (A)r 1 (A)u 1 (A)l 1 (B)w 1 (B)u 1 (B) l 2 (B)r 2 (B)w 2 (B)u 2 (B)l 3 (B)r 3 (B)u 3 (B) Exercise:

40 40 What schedules are legal? What transactions are consistent? S1 = l 1 (A)l 1 (B)r 1 (A)w 1 (B)l 2 (B)u 1 (A)u 1 (B) r 2 (B)w 2 (B)u 2 (B)l 3 (B)r 3 (B)u 3 (B) S2 = l 1 (A)r 1 (A)w 1 (B)u 1 (A)u 1 (B) l 2 (B)r 2 (B)w 2 (B)l 3 (B)r 3 (B)u 3 (B) S3 = l 1 (A)r 1 (A)u 1 (A)l 1 (B)w 1 (B)u 1 (B) l 2 (B)r 2 (B)w 2 (B)u 2 (B)l 3 (B)r 3 (B)u 3 (B) Exercise:

41 41 Schedule F (legal schedule of consistent transactions) T1 T2 25 25 l 1 (A);Read(A) A A+100;Write(A);u 1 (A) 125 l 2 (A);Read(A) A Ax2;Write(A);u 2 (A) 250 l 2 (B);Read(B) B Bx2;Write(B);u 2 (B) 50 l 1 (B);Read(B) B B+100;Write(B);u 1 (B) 150 250 150 A B

42 42 Rule #3 Two phase locking (2PL) for transactions T i = ……. l i (A) ………... u i (A) ……... no unlocks no locks

43 43 # locks held by Ti Time Growing Shrinking Phase Phase

44 44 Schedule G delayed

45 45 Schedule G delayed

46 46 Schedule G delayed

47 47 Schedule G T1 T2 25 25 l 1 (A);Read(A); A A+100 Write(A); l 1 (B);u 1 (A) 125 l 2 (A);Read(A) A Ax2;Write(A);u 2 (A) 250 l 2 (B); delayed Read(B); B B+100;Write(B);u 1 (B) 125 l 2 (B);Read(B) B Bx2;Write(B);u 2 (B) 250 250 A B

48 48 Schedule H (T 2 reversed) delayed

49 49 Assume deadlocked transactions are rolled back –They have no effect –They do not appear in schedule E.g., Schedule H = This space intentionally left blank!

50 50 Deadlocks Detection –Wait-for graph Prevention –Resource ordering –Timeout –Wait-die –Wound-wait

51 51 Deadlock Detection Build Wait-For graph Use lock table structures Build incrementally or periodically When cycle found, rollback victim T1T1 T3T3 T2T2 T6T6 T5T5 T4T4 T7T7

52 52 Resource Ordering Order all elements A 1, A 2, …, A n A transaction T can lock A i after A j only if i > j Problem : Ordered lock requests not realistic in most cases

53 53 Timeout If transaction waits more than L sec., roll it back! Simple scheme Hard to select L

54 54 Theorem Rules #1,2,3  conflict (consistency, legality, 2PL) serializable schedule

55 55 Intuitively, each two-phase-locked transaction may be thought to execute in its entirety at the instant it issues its first unlock request. In a conflict-equivalent serial schedule transactions appear in the same order as their first unlocks. Theorem Rules #1,2,3  conflict (consistency, legality, 2PL) serializable schedule

56 56 Proof: BASIS: If n = 1, there is nothing to do; S is already a serial schedule. INDUCTION: Suppose S involves n transactions T 1,T 2,..., T n, and let T i be the transaction with the first unlock action in the entire schedule S, say u i (x). We claim it is possible to move all the read and write actions of T i forward to the beginning of the schedule without passing any conflicting reads or writes. Theorem Rules #1,2,3  conflict serializable schedule

57 57 2PL subset of Serializable 2PL Serializable

58 58 S1: w1(x) w3(x) w2(y) w1(y) S1 cannot be achieved via 2PL: The lock by T1 for y must occur after w2(y), so the unlock by T1 for x must occur after this point (and before w3(x)). Thus, w3(x) cannot occur under 2PL where shown in S1 because T1 holds the x lock at that point. However, S1 is serializable (equivalent to T2, T1, T3).

59 59 Beyond this simple 2PL protocol, it is all a matter of improving performance and allowing more concurrency…. –Shared locks –Multiple granularity –Inserts, deletes and phantoms –Other types of C.C. mechanisms

60 60 Shared locks So far: S =...l 1 (A) r 1 (A) u 1 (A) … l 2 (A) r 2 (A) u 2 (A) … Do not conflict

61 61 Shared locks So far: S =...l 1 (A) r 1 (A) u 1 (A) … l 2 (A) r 2 (A) u 2 (A) … Do not conflict Instead: S=... ls 1 (A) r 1 (A) ls 2 (A) r 2 (A) …. us 1 (A) us 2 (A)

62 62 Lock actions l-t i (A): lock A in t mode (t is S or X) u-t i (A): unlock t mode (t is S or X) Shorthand: u i (A): unlock whatever modes T i has locked A

63 63 Rule #1 Consistency of transactions T i =... l-S 1 (A) … r 1 (A) … u 1 (A) … T i =... l-X 1 (A) … w 1 (A) … u 1 (A) … A transaction may not write without holding an exclusive lock, and may not read without holding some lock. All locks must be followed by an unlock of the same element.

64 64 Two-phase locking of transactions: Locking must precede unlocking. Legality of schedules: An element may either be locked exclusively by one transaction or by several in shared mode, but not both.

65 65 What about transactions that read and write same object? Option 1: Request exclusive lock T i =...l-X 1 (A) … r 1 (A)... w 1 (A)... u(A) …

66 66 Option 2: Upgrade (E.g., need to read, but don’t know if will write…) T i =... l-S 1 (A) … r 1 (A)... l-X 1 (A) …w 1 (A)...u(A)… Think of - Get 2nd lock on A, or - Drop S, get X lock What about transactions that read and write same object?

67 67 Rule #2 Legal scheduler S =....l-S i (A) … … u i (A) … no l-X j (A) S =... l-X i (A) … … u i (A) … no l-X j (A) no l-S j (A)

68 68 A way to summarize Rule #2 Compatibility matrix Comp S X S true false Xfalse false

69 69 Rule # 3 2PL transactions No change except for upgrades: (I) If upgrade gets more locks (e.g., S  {S, X}) then no change! (II) If upgrade releases read (shared) lock (e.g., S  X) - can be allowed in growing phase

70 70 Proof: similar to X locks case Detail: l-t i (A), l-r j (A) do not conflict if comp(t,r) l-t i (A), u-r j (A) do not conflict if comp(t,r) Theorem Rules 1,2,3  Conf.serializable for S/X locks schedules

71 71 Lock types beyond S/X Examples: (1) increment lock (2) update lock

72 72 Example (1): increment lock Atomic increment action: IN i (A) {Read(A); A  A+k; Write(A)} IN i (A), IN j (A) do not conflict! A=7 A=5A=17 A=15 IN i (A) +2 IN j (A) +10 IN j (A) +2 IN i (A)

73 73 CompSXI S X I

74 74 CompSXI STFF XFFF IFFT

75 75 Update locks

76 76 Solution If T i wants to read A and knows it may later want to write A, it requests update lock (not shared)

77 77 CompSXU STFT XFFF U F FF -> symmetric table? New request Lock already held in

78 78 Note: object A may be locked in different modes at the same time... S 1 =...l-S 1 (A)…l-S 2 (A)…l-U 3 (A)… l-S 4 (A)…? l-U 4 (A)…? To grant a lock in mode t, mode t must be compatible with all currently held locks on object

79 79 How does locking work in practice? Every system is different (E.g., may not even provide CONFLICT-SERIALIZABLE schedules) But here is one (simplified) way...

80 80 (1) Don’t trust transactions to request/release locks (2) Hold all locks until transaction commits # locks time Sample Locking System:

81 81 Ti Read(A),Write(B) l(A),Read(A),l(B),Write(B)… Read(A),Write(B) Scheduler, part I Scheduler, part II DB lock table

82 82 Lock table Conceptually A  B C ... Lock info for B Lock info for C If null, object is unlocked Every possible object

83 83 But use hash table: A If object not found in hash table, it is unlocked Lock info for A A... H

84 84 Lock info for A - example tran mode wait? Nxt T_link Object:A Group mode:U Waiting:yes List: T1 S no T2 U no T3X yes  To other T3 records

85 85 What are the objects we lock? ? Relation A Relation B... Tuple A Tuple B Tuple C... Disk block A Disk block B... DB

86 86 Locking works in any case, but should we choose small or large objects?

87 87 Locking works in any case, but should we choose small or large objects? If we lock large objects (e.g., Relations) –Need few locks –Low concurrency If we lock small objects (e.g., tuples,fields) –Need more locks –More concurrency

88 88 We can have it both ways!! Ask any janitor to give you the solution... hall Stall 1Stall 2Stall 3Stall 4 restroom

89 89 Example R1 t1t1 t2t2 t3t3 t4t4

90 90 Example R1 t1t1 t2t2 t3t3 t4t4 T 1 (IS) T 1 (S)

91 91 Example R1 t1t1 t2t2 t3t3 t4t4 T 1 (IS) T 1 (S), T 2 (S)

92 92 Example (b) R1 t1t1 t2t2 t3t3 t4t4 T 1 (IS) T 1 (S)

93 93 Example R1 t1t1 t2t2 t3t3 t4t4 T 1 (IS) T 1 (S), T 2 (IX) T 2 (IX)

94 94 Multiple granularity CompRequestor IS IX S SIX X IS Holder IX S SIX X

95 95 Multiple granularity CompRequestor IS IX S SIX X IS Holder IX S SIX X TTTTF F F F FFFFF FFFT FTFT FFTT

96 96 ParentChild can belocked in IS IX S SIX X P C

97 97 ParentChild can be locked locked inby same transaction in IS IX S SIX X P C IS, S IS, S, IX, X, SIX none X, IX, [SIX] none not necessary

98 98 Rules (1) Follow multiple granularity comp function (2) Lock root of tree first, any mode (3) Node Q can be locked by Ti in S or IS only if parent(Q) locked by Ti in IX or IS (4) Node Q can be locked by Ti in X,SIX,IX only if parent(Q) locked by Ti in IX,SIX (5) Ti is two-phase (6) Ti can unlock node Q only if none of Q’s children are locked by Ti

99 99 Exercise: Can T 2 access object f 2.2 in X mode? What locks will T 2 get? R1 t1t1 t2t2 t3t3 t4t4 T 1 (IX) f 2.1 f 2.2 f 3.1 f 3.2 T 1 (IX) T 1 (X)

100 100 Exercise: Can T 2 access object f 2.2 in X mode? What locks will T 2 get? R1 t1t1 t2t2 t3t3 t4t4 T 1 (X) f 2.1 f 2.2 f 3.1 f 3.2 T 1 (IX)

101 101 Exercise: Can T 2 access object f 3.1 in X mode? What locks will T 2 get? R1 t1t1 t2t2 t3t3 t4t4 T 1 (S) f 2.1 f 2.2 f 3.1 f 3.2 T 1 (IS)

102 102 Exercise: Can T 2 access object f 2.2 in S mode? What locks will T 2 get? R1 t1t1 t2t2 t3t3 t4t4 T 1 (IX) f 2.1 f 2.2 f 3.1 f 3.2 T 1 (SIX) T 1 (X)

103 103 Exercise: Can T 2 access object f 2.2 in X mode? What locks will T 2 get? R1 t1t1 t2t2 t3t3 t4t4 T 1 (IX) f 2.1 f 2.2 f 3.1 f 3.2 T 1 (SIX) T 1 (X)

104 104 Insert + delete operations Insert A Z ...

105 105 Modifications to locking rules: (1) Get exclusive lock on A before deleting A (2) At insert A operation by Ti, Ti is given exclusive lock on A

106 106 Phantoms Still have a problem: Phantoms Example: relation R (E#,name,…) constraint: E# is key use tuple locking RE#Name…. o155Smith o275Jones

107 107 T 1 : Insert into R T 2 : Insert into R T 1 T 2 S 1 (o 1 ) S 2 (o 1 ) S 1 (o 2 ) S 2 (o 2 ) Check Constraint Insert o 3 [08,Obama,..] Insert o 4 [08,McCain,..]...

108 108 Solution Use multiple granularity tree Before insert of node Q, lock parent(Q) in X mode R1 t1t1 t2t2 t3t3

109 109 Back to example T 1 : Insert T 2 : Insert T 1 T 2 X 1 (R) Check constraint Insert U(R) X 2 (R) Check constraint Oops! e# = 08 already in R! delayed

110 110 Instead of using R, can use index on R: Example: R Index 0<E#<100 Index 100<E#<200 E#=2E#=5 E#=107 E#=109...

111 111 This approach can be generalized to multiple indexes...

112 112 Next: Tree-based concurrency control Validation concurrency control

113 113 Example A B C D EF all objects accessed through root, following pointers

114 114 Example A B C D EF all objects accessed through root, following pointers T 1 lock

115 115 Example A B C D EF all objects accessed through root, following pointers T 1 lock  can we release A lock if we no longer need A??

116 116 Idea: traverse like “Monkey Bars” A B C D EF

117 117 Idea: traverse like “Monkey Bars” A B C D EF T 1 lock

118 118 Idea: traverse like “Monkey Bars” A B C D EF T 1 lock

119 119 Why does this work? Assume all T i start at root; exclusive lock T i  T j  T i locks root before T j Actually works if we don’t always start at root Root Q T i  T j

120 120 Rules: tree protocol (exclusive locks) (1) First lock by T i may be on any item (2) After that, item Q can be locked by T i only if parent(Q) locked by T i (3) Items may be unlocked at any time (4) After T i unlocks Q, it cannot relock Q

121 121 Tree-like protocols are used typically for B-tree concurrency control E.g., during insert, do not release parent lock, until you are certain child does not have to split Root

122 122 Tree Protocol with Shared Locks Rules for shared & exclusive locks? A B C D EF T 1 S lock(released) T 1 S lock (held) T 1 X lock (released) T 1 X lock (will get)

123 123 Tree Protocol with Shared Locks Rules for shared & exclusive locks? A B C D EF T 1 S lock(released) T 1 S lock (held) T 1 X lock (released) T 1 X lock (will get) T 2 reads: B modified by T 1 F not yet modified by T 1

124 124 Need more restrictive protocol Will this work?? –Once T 1 locks one object in X mode, all further locks down the tree must be in X mode Tree Protocol with Shared Locks

125 125 Validation Transactions have 3 phases: (1) Read –all DB values read –writes to temporary storage –no locking (2) Validate –check if schedule so far is serializable (3) Write –if validate ok, write to DB

126 126 Key idea Make validation atomic If T 1, T 2, T 3, … is validation order, then resulting schedule will be conflict equivalent to S s = T 1 T 2 T 3...

127 127 To implement validation, system keeps two sets: FIN = transactions that have finished phase 3 (and are all done) VAL = transactions that have successfully finished phase 2 (validation)

128 128 Example of what validation must prevent: RS(T 2 )={B} RS(T 3 )={A,B} WS(T 2 )={B,D} WS(T 3 )={C} time T 2 start T 2 validated T 3 validated T 3 start  = 

129 129 T 2 finish phase 3 Example of what validation must prevent: RS(T 2 )={B} RS(T 3 )={A,B} WS(T 2 )={B,D} WS(T 3 )={C} time T 2 start T 2 validated T 3 validated T 3 start  =  allow T 3 start

130 130 Another thing validation must prevent: RS(T 2 )={A} RS(T 3 )={A,B} WS(T 2 )={D,E} WS(T 3 )={C,D} time T 2 validated T 3 validated finish T 2

131 131 Another thing validation must prevent: RS(T 2 )={A} RS(T 3 )={A,B} WS(T 2 )={D,E} WS(T 3 )={C,D} time T 2 validated T 3 validated finish T 2 BAD: w 3 (D) w 2 (D)

132 132 finish T 2 Another thing validation must prevent: RS(T 2 )={A} RS(T 3 )={A,B} WS(T 2 )={D,E} WS(T 3 )={C,D} time T 2 validated T 3 validated allow finish T 2

133 133 Validation rules for T j : (1) When T j starts phase 1: ignore(T j )  FIN (2) at T j Validation: if check (T j ) then [ VAL  VAL U {T j }; do write phase; FIN  FIN U {T j } ]

134 134 Check (T j ): For T i  VAL - IGNORE (T j ) DO IF [ WS(T i )  RS(T j )   OR T i  FIN ] THEN RETURN false; RETURN true;

135 135 Check (T j ): For T i  VAL - IGNORE (T j ) DO IF [ WS(T i )  RS(T j )   OR T i  FIN ] THEN RETURN false; RETURN true; Is this check too restrictive ?

136 136 Improving Check(T j ) For T i  VAL - IGNORE (T j ) DO IF [ WS(T i )  RS(T j )   OR ( T i  FIN AND WS(T i )  WS(T j )   )] THEN RETURN false; RETURN true;

137 137 Exercise: T: RS(T)={A,B} WS(T)={A,C} V: RS(V)={B} WS(V)={D,E} U: RS(U)={B} WS(U)={D} W: RS(W)={A,D} WS(W)={A,C} start validate finish

138 138 Is Validation = 2PL? 2PL Val 2PL Val 2PL Val 2PL

139 139 S2: w2(y) w1(x) w2(x) Achievable with 2PL? Achievable with validation?

140 140 S2: w2(y) w1(x) w2(x) S2 can be achieved with 2PL: l2(y) w2(y) l1(x) w1(x) u1(x) l2(x) w2(x) u2(y) u2(x) S2 cannot be achieved by validation: The validation point of T2, val2 must occur before w2(y) since transactions do not write to the database until after validation. Because of the conflict on x, val1 < val2, so we must have something like S2: val1 val2 w2(y) w1(x) w2(x) With the validation protocol, the writes of T2 should not start until T1 is all done with its writes, which is not the case.

141 141 Validation subset of 2PL? Possible proof (Check!): –Let S be validation schedule –For each T in S insert lock/unlocks, get S’: At T start: request read locks for all of RS(T) At T validation: request write locks for WS(T); release read locks for read-only objects At T end: release all write locks –Clearly transactions well-formed and 2PL –Must show S’ is legal (next page)

142 142 Say S’ not legal (due to w-r conflict): S’:... l1(x) w2(x) r1(x) val1 u1(x)... –At val1: T2 not in Ignore(T1); T2 in VAL –T1 does not validate: WS(T2)  RS(T1)   –contradiction! Say S’ not legal (due to w-w conflict): S’:... val1 l1(x) w2(x) w1(x) u1(x)... –Say T2 validates first (proof similar if T1 validates first) –At val1: T2 not in Ignore(T1); T2 in VAL –T1 does not validate: T2  FIN AND WS(T1)  WS(T2)   ) –contradiction!

143 143 Conclusion: Validation subset 2PL 2PL Val 2PL Val 2PL Val 2PL

144 144 Validation (also called optimistic concurrency control) is useful in some cases: - Conflicts rare - System resources plentiful - Have real time constraints

145 145 Summary Have studied C.C. mechanisms used in practice - 2 PL - Multiple granularity - Tree (index) protocols - Validation


Download ppt "1 Ullman et al. : Database System Principles Notes 09: Concurrency Control."

Similar presentations


Ads by Google