1 / 59

Data Concurrency Control And Data Recovery

Data Concurrency Control And Data Recovery. Group: -Lâm Hoài Minh Triết -Lê Trọng An Sinh. Data Concurrency Control. Content:. Why data concurrency control !? Deadlock and starvation. Data concurrency control techniques: (Multiversion) Two-phase locking (Multiversion) Timestamp based

edan
Télécharger la présentation

Data Concurrency Control And Data Recovery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Concurrency Control And Data Recovery Group: -Lâm Hoài Minh Triết -Lê Trọng An Sinh

  2. Data Concurrency Control

  3. Content: • Why data concurrency control !? • Deadlock and starvation. • Data concurrency control techniques: • (Multiversion) Two-phase locking • (Multiversion) Timestamp based • Validation • Multiple Granularity locking

  4. Why data concurrency control • Databaseshared data • Update datainconsistency • Analoguous to Synchronization in OS • Mutual exclusion • Deadlock & starvation • Validation • Atomic transactions

  5. Deadlock and starvation • The same as the concept in OS • Solutions: • Deadlock prevention (ex:two phase locking techniques) • Deadlock detection and resolution (using lock tree, and lock table to detect cycles wait-for-graph) • Starvation (will not be discussed here)

  6. Content: • Why data concurrency control !? • Deadlock and starvation. • Data concurrency control techniques: • Concepts • (Multiversion) Two-phase locking • (Multiversion) Timestamp based • Validation • Multiple Granularity locking

  7. Data concurrency control • Basic transaction: • Read • Write • Basic operation: • Lock • Unlock • atomic operation • Basic modes: • Read (shared) mode • Write (exclusive) mode on a data item, many transactions can be in read mode, while only one transaction can be in write mode

  8. Data concurrency control • Lock:

  9. Data concurrency control • Unlock:

  10. Data concurrency control • Conflict matrix:

  11. Data concurrency control • Locking table: • may be implemented using linked • list. • lock tree • Lock manager

  12. Data concurrency control • Well-formed transaction: • Lock data item before • reading/writing • Not try to unlock a free data item • Not lock an already locked data • item

  13. Data concurrency control • Lock upgrade: • Read lock-->write lock • no other transactions is reading • the data item • Lock downgrade: • Write lockread lock • no condition needed to be checked

  14. Content: • Why data concurrency control !? • Deadlock and starvation. • Data concurrency control techniques: • Concepts • (Multiversion) Two-phase locking • (Multiversion) Timestamp based • Validation • Multiple Granularity locking

  15. Two-phase locking • Basic two-phase locking • Lock data incrementally (just lock • what is being in need)

  16. Two-phase locking • Basic two-phase locking

  17. Two-phase locking • Strict basic two-phase locking • Lock data incrementally (just lock • what is being in need) • Unlock the data after terminating. • may cause deadlock • Conservative: (deadlock avoding) • Lock all data in need before starting.

  18. Content: • Why data concurrency control !? • Deadlock and starvation. • Data concurrency control techniques: • Concepts • (Multiversion) Two-phase locking • (Multiversion) Timestamp based • Validation • Multiple Granularity locking

  19. Timestamp-based technique • A monitornically increasing variable • the age of the transaction (timestamp) • (the older  the more recent) • Use: • To serialize transactions

  20. Timestamp-based technique

  21. Timestamp-based technique Strict Order: “Strict” only one read-transaction at a time

  22. Timestamp-based technique T is a write-transaction Thomas’s rule:

  23. Content: • Why data concurrency control !? • Deadlock and starvation. • Data concurrency control techniques: • Concepts • (Multiversion) Two-phase locking • (Multiversion)Timestamp based • Validation • Multiple Granularity locking

  24. Multiversion techniques • Modify copies only  update to the • original version when finish • modifying. (Multiverion-two-phase) • (new version created when in need to • modify data) • Using timestamp to decide which • version of the data will be • allocated for a reading transaction. • (Mutiversion-timestamp based) • (the read transaction will read the • version which have timestamp less than • or equal to its timestamp. )

  25. Multiversion techniques • Side effects: • More memory needed. • Garbage collector.

  26. Content: • Why data concurrency control !? • Deadlock and starvation. • Data concurrency control techniques: • Concepts • (Multiversion) Two-phase locking • (Multiversion)Timestamp based • Validation • Multiple Granularity locking

  27. Validation (optimistic) scheme • Serialization is checked before a write • transaction. • Three phase: • Read • Write divided into 2 phase: validation • and write. • (write to local copies only)

  28. Content: • Why data concurrency control !? • Deadlock and starvation. • Data concurrency control techniques: • Concepts • (Multiversion) Two-phase locking • (Multiversion)Timestamp based • Validation • Multiple Granularity locking

  29. Multiple Granularity Locking • What is granularity: • If we consider granularity as an index I, • Then, the more components the data has, • the higher the value of I . • granularity may be understood as the • level of discreteness. • Granularity hierachy

  30. Multiple Granularity Locking • What is granularity:

  31. Multiple Granularity Locking • Granularity hierachy

  32. Multiple Granularity Locking • Three more additional locking modes are • Used: • Intention-shared(IS): child request a • shared lock on parent. • Intention-exclusive(IX):child request an • exclusive lock on parent. • Shared-Intention-exclusive(SIX):parent • is currently locked in shared mode, but • Child requests an exclusive lock • on parent.

  33. Multiple Granularity Locking • Lock-compatibility matrix:

  34. Multiple Granularity Locking • Lock-rule description:

  35. Database recovery

  36. Content: • Why data recovery? • Some techniques. • Database recovey scheme. • ARIES algorithm

  37. Why data recovery • To bring the database into the • State before the failure. • To preseve transaction properties.

  38. Why data recovery Types of Failure: • Transaction failure. • System failure. • Media failure.

  39. Some techniques Transaction log:

  40. Some techniques Roll back & Roll forward: Roll Back (Undo): Restore BFIM on to disk (Remove all AFIMs). Roll Forward (Redo): Restore AFIM on to disk.

  41. Some techniques T1 T2 T3 read_item (A) read_item (B) read_item (C) read_item (D) write_item (B) write_item (B) write_item (D) read_item (D) read_item (A) write_item (A) write_item (A)

  42. Some techniques Data caching: Data items to be modified are first stored into database cache by the Cache Manager (CM) and after modification they are flushed (written) to the disk.

  43. Some techniques Data update • Immediate Update • Deferred Update • Shadow update • In-place update

  44. Some techniques Write-Ahead Logging (WAL): When in-place update (immediate or deferred) is used For Undo: BFIM is written to a log. For Redo: AFIM is written to a log.

  45. Some techniques Checkpointing: • Suspend transactions temporarily. • Force write modified buffer data to disk. • Write a [checkpoint] record to the log, save the log to disk. • Resume normal transaction execution.

  46. Content: • Why database recovery • Some techniques. • Recovery scheme • ARIES algorithm.

  47. Recovery scheme • Deferred update • Immediate update • Shadow paging

  48. Recovery scheme Deferred update (No Undo/ Redo): • After reboot, the log is used to redo all the transactions affected by the failure. • No undo needed.

  49. Recovery scheme Deferred update: With check point: transactions which were recorded in the log after the last checkpoint were redone

  50. Recovery scheme Deferred update : Two table are required: Active table: all active transactions Commit table: transactions to be committed Recovery: redo transactions in commit table only.

More Related