1 / 28

Transaction Management: Concurrency Control

Transaction Management: Concurrency Control. CS634 Class 18, Apr 9, 2014. Slides based on “Database Management Systems” 3 rd ed , Ramakrishnan and Gehrke. Transaction Execution. Example: Reading Uncommitted Data ( Dirty Reads ) We are assuming each transaction is single-threaded

tanith
Télécharger la présentation

Transaction Management: Concurrency Control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Transaction Management: Concurrency Control CS634Class 18, Apr 9, 2014 • Slides based on “Database Management Systems” 3rded, Ramakrishnan and Gehrke

  2. Transaction Execution • Example: Reading Uncommitted Data (Dirty Reads) • We are assuming each transaction is single-threaded • Usually the case in practice, though not universal • And, for simplicity, that operations for the whole DB happen in some order, possibly interleaving the transactions • This is not true in reality: in fact, parallel execution of transactions happens on multi-processors, • But it’s close enough to show the important behaviors T1: R(A), W(A), R(B), W(B) T2: R(A), W(A), R(B), W(B)

  3. Transaction Schedule Notation • Example: Reading Uncommitted Data (Dirty Reads) Another notation: Using subscripts for transaction ids • Arrows mark conflicts, yield arcs in PG: T1->T2, T2->T1 R1(A) W1 (A) R2(A) W2 (A) R2 (B) W2 (B) R1 (B) W1 (B) Note: commits are not involved in locating conflicts T1: R(A), W(A), R(B), W(B) T2: R(A), W(A), R(B), W(B)

  4. Example: RW Conflicts • Unrepeatable Reads • Alternatively: R1(A) R2 (A) W2(A) C2 R1 (A) W1 (A) C1 • Again T1->T2, T2->T1, cycle in PG, not conflict serializable • See conflicts reaching across a commit here T1: R(A), R(A), W(A), Commit T2: R(A), W(A), Commit

  5. Conflict Serializable Schedules • Two schedules are conflict equivalent if: • Involve the same actions of the same transactions • Every pair of conflicting actions is ordered the same way • Schedule S is conflict serializableif S is conflict equivalent to some serial schedule • Example: T1->T2 only, and conflict serializable, as shown below R1(A) R1 (B) W1 (C) R2(B) W2 (A) R2 (C) R1 (B) C1C2 R1(A) R1 (B) W1 (C) R1 (B) C1 R2(B) W2 (A) R2 (C) C2

  6. Dependency Graph • Dependency graph: • one node per transaction • edge from Ti to Tj if action of Ti precedes and conflicts with action of Tj • Theorem: Schedule is conflict serializable if and only if its dependency graph is acyclic • Equivalent serial schedule given by topological sort of dependency graph

  7. Example • A schedule that is not conflict serializable: • The cycle in the graph reveals the problem. The output of T1 depends on T2, and vice-versa. T1: R(A), W(A), R(B), W(B) T2: R(A), W(A), R(B), W(B) R1(A) W1(A) R2(A) W2(A)R2(B)2 W(B)2 R1 (B) W1 (B) A T1 T2 Dependency graph B

  8. Strict Two-Phase Locking (Strict 2PL) • Protocol steps • Each transaction must obtain a S (shared) lock on object before reading, and an X (exclusive) lock on object before writing. • All locks held are released when the transaction completes • (Non-strict) 2PL: Release locks anytime, but cannot acquire locks after releasing any lock. • Strict 2PL allows only serializable schedules. • It simplifies transaction aborts • (Non-strict) 2PL also allows only serializable schedules, but involves more complex abort processing

  9. Strict 2PL Example S(B) R(B) C T1: S(A) R(A) T2: S(A) R(A) X(B) R(B) W(B) C where S1 (B) blocked Using subscripted notation: blow-by-blow actions S1(A) R1(A) S2(A) R2(A) X2(B) <S1 (B)-blocked> R2(B) W2(B) C2 <S1 (B)-unblocked> R1(B) C1

  10. Aborting Transactions • When Tiis aborted, all its actions have to be undone • if Tjreads an object last written by Ti, Tj must be aborted as well! • cascading abortscan be avoided by releasing locks only at commit • If Ti writes an object, Tj can read this only after Ticommits • In Strict 2PL, cascading aborts are prevented • At the cost of decreased concurrency • No free lunch! • Increased parallelism leads to locking protocol complexity

  11. Deadlocks • Cycle of transactions waiting for locks to be released by each other: case of “deadly embrace” T1: X(A) W(A) S(B) [R(B) …] T2: X(B) W(B) S(A) [R(A) …] Using subscripted notation: X1(A) W1 (A) X2(B) W2(B) <S2(A) blocked> <S1(B) blocked>…

  12. Deadlock Detection • Create a waits-for graph: • Nodes are transactions • Edge from Ti to Tj if Ti is waiting for Tj to release a lock T1: S(A), R(A), S(B) T2: X(B),W(B) X(C) T3: S(C), R(C) T4: X(B) X(A) T1 T2 T4 T3

  13. More Dynamic Databases • If the set of DB objects changes, Strict 2PL will not ensure serializability • Example: • T1 finds oldest sailor for each of rating=1 and rating=2 • T2 does an insertion and a deletion • T1 locks all pages with rating = 1, finds oldest sailor (age= 71) • Next, T2 inserts a new sailor; rating = 1, age = 96 • T2 deletes oldest sailor with rating = 2 (age= 80), commits • T1 locks all pages with rating = 2, and finds oldest(age= 63) • No serial schedule gives same outcome!

  14. The “Phantom” Problem • T1 implicitly assumes that it has locked the set of all sailor records with rating = 1 • Assumption only holds if no sailor records are added while T1 is executing! • Two mechanisms to address the problem • Index locking • Predicate locking

  15. Another phantom example • Table tasks has one row for each worker task, with worker name, task name, number of hours • Rule that no worker has more than 8 hours total • Application A to add a task sums hours for worker, adds task if it fits under 8 hours max • T1 running A sees ‘Joe’ has 6 hours, adds task of 2 hours • Concurrently, T2 running A sees ‘Joe’ has 6 hours, adds task of 1 hour. • Joe ends up with 9 hours of work. • Again, the problem is there is no lock on the set of rows being examined to make a decision

  16. Index Locking • Assume index on the ratingfield using Alternative (2) • T1 should lock the index page containing the data entries with rating = 1 • If there are no records with rating = 1, T1 must lock the index page where such a data entry wouldbe, if it existed! • e.g., lock the page with rating = 0 and beginning of rating=2 • If there is no suitable index, T1 must lock all data pages, and lock the file to prevent new pages from being added

  17. Index Locking • Assume index on the ratingfield using Alternative (2) • Row locking is the industry standard now • T1 should lock all the data entries with rating = 1 • If there are no records with rating = 1, T1 must lock the entries adjacent to where data entry wouldbe, if it existed! • e.g., lock the last entry with rating = 0 and beginning of rating=2 • If there is no suitable index, T1 must lock the table

  18. Predicate Locking • Grant lock on all records that satisfy some logical predicate • Index locking is a special case of predicate locking • Index supports efficient implementation of the predicate lock • Predicate is specified in WHERE clause • In general, predicate locking is expensive to implement!

  19. Locking for B+ Trees • Naïve solution • Ignore tree structure, just lock pages following 2PL • Very poor performance! • Root node (and many higher level nodes) become bottlenecks • Every tree access begins at the root! • Not needed anyway! • Only row data needs 2PL (contents of tree) • Tree structure also needs protection from concurrent access • But only like other shared data of the server program • Note this modern view is not covered in book • See Graefe, A Survey of B-tree locking techniques (2010) • B-tree locking is a huge challenge!

  20. Locking vs. Latching • To protect shared data in memory, multithreaded programs use mutex (semaphores) • API: enter_section/leave_section, or lock/unlock • Every Java object contains a mutex, for convenience of Java programming: underlies synchronized methods • Database people call mutexes “latches” • Need background in multi-threaded programming to understand this topic fully • The tree structure needs mutex/latch protection • Latches can be provided by the same lock manager as does 2PL locking—this is assumed in the text • In these slides, will use “lock” in quotes to mean non-2PL lock/latch…

  21. Locking for B+ Trees (contd.) • Searches • Higher levels only direct searches for leaf pages • Insertions • Node on a path from root to modified leaf must be “locked” in X mode only if a split can propagate up to it • Similar point holds for deletions • There are efficient locking protocols that keep the B-tree healthy under concurrent access, and support 2PL on rows

  22. A Simple Tree Locking Algorithm • Search • Start at root and descend • repeatedly, get S “lock” for child then “unlock” parent, end up with S “lock” on leaf page • Get 2PL S lock on row, provide row pointer to caller • Later, caller is done with reading row, arranges release of S “lock” • Insert/Delete • Start at root and descend, obtaining X “locks” as needed • Once child is “locked”, check if it is safe • If child is safe, release all “locks” on ancestors, leaving X “lock” on leaf • Get 2PL X lock on place for new row/old row, insert/delete row, release “lock” • Safe node • If changes will not propagate up beyond this node • Inserts: Node is not full • Deletes: Node is not half-empty • When control gets back to QP, transaction only has 2PL locks on rows

  23. Difference from text • The algorithms described in the text are valid, for example, crabbing down the tree, worrying about full nodes, etc. • What’s different is that the locks for index nodes are shorter lived than described in the text: only 2PL locks on rows are kept until end of transaction, not any locks on index nodes. • Note the admission on pg. 564 that the text’s coverage on this topic is “not state of the art”. Graefe’s paper is.

  24. An Example A 20 Do: Search 38* Insert 45* Insert 25* Delete 38* B 35 F C 23 38 44 H G I D E 20* 22* 23* 24* 35* 36* 38* 41* 44*

  25. A Variation on Algorithms • Search • As before • Insert/Delete • Set “locks” as if for search, get to leaf, and set 2PL X lock on leaf • If leaf is not safe, release all “locks”, and restart using previous Insert/Delete protocol • This is what happens if the search down the tree happens on a page that is not in buffer—don’t want to hold a latch across a disk i/o (takes too long)

  26. Database Files Pages Tuples Multiple-Granularity Locks • Hard to decide what granularity to lock • tuples vs. pages vs. files • Shouldn’t have to decide! • Data containers are nested: contains

  27. IS IX S X -- Ö Ö Ö Ö Ö -- IS Ö Ö Ö Ö IX Ö Ö Ö S Ö Ö Ö Ö X New Lock Modes, Protocol • Allow transactions to lock at each level, but with a special protocol using new intention locks • Before locking an item, must set intention locks on ancestors • For unlock, go from specific to general (i.e., bottom-up). • SIX mode: Like S & IX at the same time.

  28. Multiple Granularity Lock Protocol • Each transaction starts from the root of the hierarchy • To get S or IS lock on a node, must hold IS or IX on parent node • To get X or IX or SIX on a node, must hold IX or SIX on parent node. • Must release locks in bottom-up order

More Related