© Copyright 2008 STI - INNSBRUCK www.sti-innsbruck.at
Presentation of
Advance Database
on
Concurrenccy Control & DB Recovery
Designed and Prepared by Rafi Uah & Fazli Mola Jan
Chapter 12 © 2007 by Prentice Hall 2
Database Recovery
 Mechanism for restoring a database
quickly and accurately after loss or
damage
 Recovery facilities:
• Backup Facilities
• Journalizing Facilities
• Checkpoint Facility
• Recovery Manager
Chapter 12 © 2007 by Prentice Hall 3
Back-up Facilities
 Automatic dump facility that produces
backup copy of the entire database
 Periodic backup (e.g. nightly, weekly)
 Backups stored in secure, off-site
location
Chapter 12 © 2007 by Prentice Hall 4
Checkpoint Facilities
 DBMS periodically refuses to accept new
transactions
  system is in a quiet simple
 Database and transaction logs are
synchronized
This allows recovery manager to resume processing
from short period, instead of repeating entire day
Chapter 12 © 2007 by Prentice Hall 5
Concurrency Control
 Problem–in a multiuser environment,
simultaneous access to data can result
in interference and data loss
 Solution–Concurrency Control
 The process of managing simultaneous
operations against a database so that data
integrity is maintained and the operations
do not interfere with each other in a multi-
user environment
Chapter 12 © 2007 by Prentice Hall 6
Concurrency Control
 Process of managing simultaneous
execution of transactions in a shared
database, to ensure the serializability of
transactions, is known as concurrency
control.
Chapter 12 © 2007 by Prentice Hall 7
Concurrency Control Techniques
 Pessimistic concurrency control
 Optimistic concurrency control
Chapter 12 © 2007 by Prentice Hall 8
Pessimistic Concurrency Control
• Pessimistic Concurrency Control
assumes that conflicts will happen
• Pessimistic Concurrency Control
techniques detect conflicts as soon as
they occur and resolve them using
blocking.
Chapter 12 © 2007 by Prentice Hall 9
Optimistic Concurrency Control
• Optimistic Concurrency Control assumes
that conflicts between transactions are
rare.
• Does not require locking
• Transaction executed without
restrictions
Chapter 12 © 2007 by Prentice Hall 10
Concurrency Control Techniques
 Serializability
 Finish one transaction before starting
another
 Locking Mechanisms
 The most common way of achieving
serialization
 Data that is retrieved for the purpose of
updating is locked for the updater
 No other user can perform update until
unlocked
Chapter 12 © 2007 by Prentice Hall 11
Locking Mechanisms
 Locking level:
 Database–The entire database is locked and
become unavailable to other users.This is used
during the backup of the entire Database.
 Table–The entire Table containing a requested
record is locked
 Page–very commonly used
 Record–only the requested row is locked; fairly
commonly used
 Field–only particular field or column is locked;
impractical
Chapter 12 © 2007 by Prentice Hall 12
Locking Mechanisms
 Types of locks:
 Shared lock–Read but no update permitted.
 Exclusive lock–No access permitted. Used when
preparing to update
13

More Related Content

PPS
Hosted Revolution Online Backup V2 001
PPT
Invantive at Eusprig 2014
PDF
Data migration
PPTX
Reconciliation Migration Project - A Case Study
PDF
N-able and Arcserve® talk Backup and Recovery
PPT
The Database Environment Chapter 12
PPTX
Concurrency.education presentation schoolpptx
PPTX
DBMS Session 6 Transactions Management and Concurrency Control.pptx
Hosted Revolution Online Backup V2 001
Invantive at Eusprig 2014
Data migration
Reconciliation Migration Project - A Case Study
N-able and Arcserve® talk Backup and Recovery
The Database Environment Chapter 12
Concurrency.education presentation schoolpptx
DBMS Session 6 Transactions Management and Concurrency Control.pptx

Similar to Fazal rafi.. database concurancy control and recovery (20)

PDF
Chapter 5 Database Transaction Management
PPT
concurrency-control-techniques.ppt
DOCX
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
PDF
Advanced Database Chapter 4.pdf shnsbxlajmndm woweosmkl m,xcnkl C NOOxcx xcbnxc
PDF
chp13.pdf
PPT
Ch 13 D B Admin
PPTX
Transaction management
PPTX
Ch10.pptx
DOC
Concurrency control
PPT
Chapter Three _Concurrency Control Techniques_ETU.ppt
PPT
Chapter 4 Concrruncy controling techniques (1).ppt
PPTX
Concurrency control
PPT
5-Chapter Five - Concurrenc.ppt
PPTX
1. Transaction Processing and Concurrency Control.pptx
PDF
Coronel_PPT_hdgshaahaakjhfakjdhfajkdCh10.pdf
PDF
Concurrncy_database_mangment ststem_sql1
PPTX
PPTX
DBMS Presentation.pptx
PPTX
Concurrency Control in Distributed Systems.pptx
PPT
Data & database administration hoffer
Chapter 5 Database Transaction Management
concurrency-control-techniques.ppt
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
Advanced Database Chapter 4.pdf shnsbxlajmndm woweosmkl m,xcnkl C NOOxcx xcbnxc
chp13.pdf
Ch 13 D B Admin
Transaction management
Ch10.pptx
Concurrency control
Chapter Three _Concurrency Control Techniques_ETU.ppt
Chapter 4 Concrruncy controling techniques (1).ppt
Concurrency control
5-Chapter Five - Concurrenc.ppt
1. Transaction Processing and Concurrency Control.pptx
Coronel_PPT_hdgshaahaakjhfakjdhfajkdCh10.pdf
Concurrncy_database_mangment ststem_sql1
DBMS Presentation.pptx
Concurrency Control in Distributed Systems.pptx
Data & database administration hoffer
Ad

Recently uploaded (20)

PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
Feature types and data preprocessing steps
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Petroleum Refining & Petrochemicals.pptx
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
Principal presentation for NAAC (1).pptx
PPTX
wireless networks, mobile computing.pptx
PPTX
Software Engineering and software moduleing
PDF
Unit1 - AIML Chapter 1 concept and ethics
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
August -2025_Top10 Read_Articles_ijait.pdf
Cryptography and Network Security-Module-I.pdf
Feature types and data preprocessing steps
Exploratory_Data_Analysis_Fundamentals.pdf
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
Amdahl’s law is explained in the above power point presentations
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
Module 8- Technological and Communication Skills.pptx
Soil Improvement Techniques Note - Rabbi
Petroleum Refining & Petrochemicals.pptx
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
Principal presentation for NAAC (1).pptx
wireless networks, mobile computing.pptx
Software Engineering and software moduleing
Unit1 - AIML Chapter 1 concept and ethics
Ad

Fazal rafi.. database concurancy control and recovery

  • 1. © Copyright 2008 STI - INNSBRUCK www.sti-innsbruck.at Presentation of Advance Database on Concurrenccy Control & DB Recovery Designed and Prepared by Rafi Uah & Fazli Mola Jan
  • 2. Chapter 12 © 2007 by Prentice Hall 2 Database Recovery  Mechanism for restoring a database quickly and accurately after loss or damage  Recovery facilities: • Backup Facilities • Journalizing Facilities • Checkpoint Facility • Recovery Manager
  • 3. Chapter 12 © 2007 by Prentice Hall 3 Back-up Facilities  Automatic dump facility that produces backup copy of the entire database  Periodic backup (e.g. nightly, weekly)  Backups stored in secure, off-site location
  • 4. Chapter 12 © 2007 by Prentice Hall 4 Checkpoint Facilities  DBMS periodically refuses to accept new transactions   system is in a quiet simple  Database and transaction logs are synchronized This allows recovery manager to resume processing from short period, instead of repeating entire day
  • 5. Chapter 12 © 2007 by Prentice Hall 5 Concurrency Control  Problem–in a multiuser environment, simultaneous access to data can result in interference and data loss  Solution–Concurrency Control  The process of managing simultaneous operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multi- user environment
  • 6. Chapter 12 © 2007 by Prentice Hall 6 Concurrency Control  Process of managing simultaneous execution of transactions in a shared database, to ensure the serializability of transactions, is known as concurrency control.
  • 7. Chapter 12 © 2007 by Prentice Hall 7 Concurrency Control Techniques  Pessimistic concurrency control  Optimistic concurrency control
  • 8. Chapter 12 © 2007 by Prentice Hall 8 Pessimistic Concurrency Control • Pessimistic Concurrency Control assumes that conflicts will happen • Pessimistic Concurrency Control techniques detect conflicts as soon as they occur and resolve them using blocking.
  • 9. Chapter 12 © 2007 by Prentice Hall 9 Optimistic Concurrency Control • Optimistic Concurrency Control assumes that conflicts between transactions are rare. • Does not require locking • Transaction executed without restrictions
  • 10. Chapter 12 © 2007 by Prentice Hall 10 Concurrency Control Techniques  Serializability  Finish one transaction before starting another  Locking Mechanisms  The most common way of achieving serialization  Data that is retrieved for the purpose of updating is locked for the updater  No other user can perform update until unlocked
  • 11. Chapter 12 © 2007 by Prentice Hall 11 Locking Mechanisms  Locking level:  Database–The entire database is locked and become unavailable to other users.This is used during the backup of the entire Database.  Table–The entire Table containing a requested record is locked  Page–very commonly used  Record–only the requested row is locked; fairly commonly used  Field–only particular field or column is locked; impractical
  • 12. Chapter 12 © 2007 by Prentice Hall 12 Locking Mechanisms  Types of locks:  Shared lock–Read but no update permitted.  Exclusive lock–No access permitted. Used when preparing to update
  • 13. 13