Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Atomicity indicates the permanence of the database's consistent state

07/12/2021 Client: muhammad11 Deadline: 2 Day

Database Fundamentals- Content Analysis

Database Principles: Fundamentals of Design, Implementations and Management

Lecture11- CHAPTER 12: Transaction Management and Concurrency Control
Presented by Rabia Cherouk

*

Objectives

In this chapter, you will learn:
About database transactions and their properties
What concurrency control is and what role it plays in maintaining the database’s integrity
What locking methods are and how they work
How stamping methods are used for concurrency control
How optimistic methods are used for concurrency control
How database recovery management is used to maintain database integrity
*

What is a Transaction?

A transaction is a logical unit of work that must be either entirely completed or aborted
Successful transaction changes database from one consistent state to another
One in which all data integrity constraints are satisfied
Most real-world database transactions are formed by two or more database requests
Equivalent of a single SQL statement in an application program or transaction
Same as Fig. 12.1 in your book

*

Same as Fig. 12.1 in your book

*

Evaluating Transaction Results

Not all transactions update the database
SQL code represents a transaction because database was accessed
Improper or incomplete transactions can have devastating effect on database integrity
Some DBMSs provide means by which user can define enforceable constraints
Other integrity rules are enforced automatically by the DBMS
Same as Fig. 12.2 in your book

*

Figure 9.2

Same as Fig. 12.2 in your book

*

Transaction Properties

All transactions must display atomicity, consistency, durability and serializability (ACIDS).

Atomicity
All operations of a transaction must be completed
Consistency
Permanence of database’s consistent state
Isolation
Data used during transaction cannot be used by second transaction until the first is completed
*

Transaction Properties (cont..)

Durability
Once transactions are committed, they cannot be undone
Serializability
Concurrent execution of several transactions yields consistent results
Multiuser databases are subject to multiple concurrent transactions
*

Transaction Management with SQL

ANSI (American National Standard Institute) has defined standards that govern SQL database transactions
Transaction support is provided by two SQL statements: COMMIT and ROLLBACK
Transaction sequence must continue until:
COMMIT statement is reached
ROLLBACK statement is reached
End of program is reached
Program is abnormally terminated
*

The Transaction Log

A DBMS uses a Transaction log to store:
A record for the beginning of transaction
For each transaction component:
Type of operation being performed (update, delete, insert)
Names of objects affected by transaction
“Before” and “after” values for updated fields
Pointers to previous and next transaction log entries for the same transaction
Ending (COMMIT) of the transaction
Table 12.1 in your book

*

The Transaction Log

Table 12.1 in your book

*

Concurrency Control

Is the coordination of simultaneous transaction execution in a multiprocessing database
Objective is to ensure serializability of transactions in a multiuser environment
Simultaneous execution of transactions over a shared database can create several data integrity and consistency problems
Lost updates
Uncommitted data
Inconsistent retrievals
*

Lost Updates

Lost update problem:
Two concurrent transactions update same data element
One of the updates is lost
Overwritten by the other transaction
Lost Updates

*

Lost Updates (cont..)

*

*

Uncommitted Data

Uncommitted data phenomenon:
Two transactions executed concurrently
First transaction rolled back after second already accessed uncommitted data
Uncommitted Data

*

Uncommitted Data (cont..)

*

*

Inconsistent Retrievals

Inconsistent retrievals:
First transaction accesses data
Second transaction alters the data
First transaction accesses the data again
Transaction might read some data before they are changed and other data after changed
Yields inconsistent results
*

*

*

The Scheduler

Special DBMS program
Purpose is to establish order of operations within which concurrent transactions are executed
Interleaves execution of database operations:
Ensures serializability
Ensures isolation
Serializable schedule
Interleaved execution of transactions yields same results as serial execution
The Scheduler (cont..)

Bases its actions on concurrency control algorithms
Ensures computer’s central processing unit (CPU) is used efficiently
Facilitates data isolation to ensure that two transactions do not update same data element at same time
*

*

Database Recovery Management

Database recovery

Restores database from given state, usually inconsistent, to previously consistent state
Based on atomic transaction property
All portions of transaction treated as single logical unit of work
All operations applied and completed to produce consistent database
If transaction operation cannot be completed, transaction must be aborted, and any changes to database must be rolled back (undone)

Transaction Recovery

Makes use of deferred-write and write-through techniques
Deferred write
Transaction operations do not immediately update physical database
Only transaction log is updated
Database is physically updated only after transaction reaches its commit point using transaction log information
*

*

Transaction Recovery (cont..)

Write-through technique
Database is immediately updated by transaction operations during transaction’s execution, even before transaction reaches its commit point
Recovery process
Identify last checkpoint
If transaction was committed before checkpoint
Do nothing
If transaction committed after last checkpoint
DBMS redoes the transaction using “after” values
If transaction had ROLLBACK or was left active
Do nothing because no updates were made
Transaction Recovery (cont..)

*

*

Summary

Transaction: sequence of database operations that access database
Logical unit of work
No portion of transaction can exist by itself
Five main properties: atomicity, consistency, isolation, durability, and serializability
COMMIT saves changes to disk
ROLLBACK restores previous database state
SQL transactions are formed by several SQL statements or database requests
*

Summary (cont..)

Transaction log keeps track of all transactions that modify database
Concurrency control coordinates simultaneous execution of transactions
Scheduler establishes order in which concurrent transaction operations are executed
Lock guarantees unique access to a data item by transaction
Two types of locks: binary locks and shared/exclusive locks
*

Summary (cont..)

Serializability of schedules is guaranteed through the use of two-phase locking
Deadlock: when two or more transactions wait indefinitely for each other to release lock
Three deadlock control techniques: prevention, detection, and avoidance
Time stamping methods assign unique time stamp to each transaction
Schedules execution of conflicting transactions in time stamp order
*

Summary (cont..)

Optimistic methods assume the majority of database transactions do not conflict
Transactions are executed concurrently, using private copies of the data
Database recovery restores database from given state to previous consistent state

CHAPTER 12: Transaction Management and Concurrency Control

ADDITIONAL SLIDES pages 635 to 644 in your
Book..

*

*

Two-Phase Locking to Ensure Serializability (cont..)

Governed by the following rules:
Two transactions cannot have conflicting locks
No unlock operation can precede a lock operation in the same transaction
No data are affected until all locks are obtained—that is, until transaction is in its locked point
*

Concurrency Control
with Locking Methods

Lock
Guarantees exclusive use of a data item to a current transaction
Required to prevent another transaction from reading inconsistent data
Lock manager
Responsible for assigning and policing the locks used by transactions
*

Lock Granularity

Indicates level of lock use
Locking can take place at following levels:
Database
Table
Page
Row
Field (attribute)
*

Lock Granularity (cont..)

Database-level lock
Entire database is locked
Table-level lock
Entire table is locked
Page-level lock
Entire diskpage is locked
Row-level lock
Allows concurrent transactions to access different rows of same table
Even if rows are located on same page
Field-level lock
Allows concurrent transactions to access same row as long as they
Require the use of different fields (attributes) within the row
Fig 12.3 in your book

*

Fig 12.3 in your book

Fig 12.4 in your book

*

Fig 12.4 in your book

Fig. 12.5 in your book

*

Lock Granularity (cont..)

Fig. 12.5 in your book

Fig. 12.6 in your book

*

Lock Granularity (cont..)

Fig. 12.6 in your book

*

Lock Types

Binary lock
Two states: locked (1) or unlocked (0)
Exclusive lock
Access is specifically reserved for transaction that locked object
Must be used when potential for conflict exists
Shared lock
Concurrent transactions are granted read access on basis of a common lock
Table 12.10 in your book

*

Table 12.10 in your book

*

Two-Phase Locking to Ensure Serializability

Defines how transactions acquire and relinquish locks
Guarantees serializability, but does not prevent deadlocks
Growing phase
Transaction acquires all required locks without unlocking any data
Shrinking phase
Transaction releases all locks and cannot obtain any new lock
Deadlocks (cont..)

*

*

Deadlocks

Condition that occurs when two transactions wait for each other to unlock data
Possible only if one of the transactions wants to obtain an exclusive lock on a data item
No deadlock condition can exist among shared locks
*

Table 12.11 in your book

Deadlocks (cont..)

*

Deadlocks (cont..)

Three techniques to control deadlock:
Prevention
Detection
Avoidance
Choice of deadlock control method depends on database environment
Low probability of deadlock, detection recommended
High probability, prevention recommended
*

Concurrency Control
with Time Stamping Methods

Assigns global unique time stamp to each transaction
Produces explicit order in which transactions are submitted to DBMS
Uniqueness
Ensures that no equal time stamp values can exist
Monotonicity
Ensures that time stamp values always increase
*

Wait/Die and Wound/Wait Schemes

Wait/die
Older transaction waits and younger is rolled back and rescheduled
Wound/wait
Older transaction rolls back younger transaction and reschedules it
Wait/Die and Wound/Wait Schemes (cont..)

*

*

Concurrency Control
with Optimistic Methods

Optimistic approach
Based on assumption that majority of database operations do not conflict
Does not require locking or time stamping techniques
Transaction is executed without restrictions until it is committed
Phases: read, validation, and write

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Grade Tutor
Engineering Solutions
Buy Coursework Help
Academic Mentor
Math Specialist
Professor Smith
Writer Writer Name Offer Chat
Top Grade Tutor

ONLINE

Top Grade Tutor

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$30 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$24 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$35 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$20 Chat With Writer
Math Specialist

ONLINE

Math Specialist

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$39 Chat With Writer
Professor Smith

ONLINE

Professor Smith

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$30 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Word of the week 2 - Blue in the great gatsby - Ferrari case study analysis - Sample invitation letter to journalist - What does figure weights measure on the wisc-v - Experiment 2 tracking chromosomal dna movement through mitosis - Uniqlo country of origin - Proving a quadrilateral is a parallelogram examples - Jorgansen lighting inc. manufactures heavy-duty - How to change name on avaya phone 9608 - Cultural effects theory media - Marynet marymount university - Case study on data visualization - Life insurance sales script - Economics homework - Principles of everyday behavior analysis 4th edition pdf - Fantastic mr fox chapter 13 - Philosophy 347-Critical Thinking, Reasoning -Argumentative Paper - Flemings top 10 trees - Examples of common conflicts in nursing - Fingerprint scanner output format - Generate three address code for the following program segment - Sql injection attack lab - Luton bin collection days - Enhancing the Sustainability of EBP Initiatives - AHLTA - Armed Forces Health Longitudinal Technology Application - Automatic water level sensor - How many tens in 3648 - Humboldts secret golden tree msds - General motion examples in sport - My favourite toy car 5 lines - How to calculate the field of view in a microscope - Who owns mars pet food - What is a genotype made of the same alleles - Cs12a ucsc - The organic research centre - Billionaire card game kmart - Discussion: Quantitative Research Designs - Part 3 - Example of scholarly activity in nursing - Dewey system for primary schools - Other specified trauma and stressor related disorder icd 10 - Franken and davis he only took tips - Letter to a young refugee from another by andrew lam - A manufacturing company receives orders for engines - Which of the following best describes the trial balance - Kwl chart special education and learning disabilities - Augmentative Communication Devices - Math 59 Questions - I know why the caged bird sings resolution - Distance time graph worksheet - Health care career report - How to restart anz eftpos machine - Which of the following assets is the most liquid - Assignment - Do mcdonald's fries contain beef - Https www makesigns com sciposters_templates aspx - Coca cola supply chain management ppt - Al2 so4 3 colour - Foreigners dancing on tunak tunak - Which of the following statements is true of whistleblowing - St andrews village tamworth - Union catholic regional high school - Greenfield Investments - Eric helms intermediate powerlifting program - Business Analytic ( R,ggplot2,dplyr) - Resonance meaning in marketing - The peel medical practice - Man on wire movie - Ionisation smoke alarm ei151tl replacement - Prepare a network security plan outline - Geo 3030 - The blobz guide to electric circuits - Market segmentation target market selection and positioning pdf - Expert teachers have which of the following characteristics - List of jumbled words with answers - Comparing and contrasting - Making evidence based claims - Steep turns common errors - Why is allusion effective - Soham soham dhyan karo - Human resource - Kcl coursework cover sheet - Repose 2 - Halfen channel price list - The bridge church halloween - Multi channeled nonverbal communication definition - Oxidation number of so42 - Htm zone map den haag - What is best fit in hrm - E2bn myths and legends - In most spanish speaking countries married women legally - Bones for life worksheet - Https acrobat adobe com us en sign html - Financial aspect - Https://www.thephysicsaviary.com/Physics/Programs/Labs/MillikanOilDropLab/index.html - Rivacre valley primary school - Our vanishing night - Calculate the molarities of the following solutions - An oil rig searches for and finds oil reservoirs quizlet