SlideShare a Scribd company logo
Database Systems: Design,
Implementation, and
Management
Eighth Edition
Chapter 10
Transaction Management
and Concurrency Control
Database Systems, 8th
Edition 2
Objectives
• In this chapter, you will learn:
– About database transactions and their properties
– What concurrency control is and what role it
plays in maintaining the database’s integrity
– What locking methods are and how they work
Database Systems, 8th
Edition 3
Objectives (continued)
• In this chapter, you will learn: (continued)
– How stamping methods are used for
concurrency control
– How optimistic methods are used for
concurrency control
– How database recovery management is used to
maintain database integrity
Database Systems, 8th
Edition 4
What is a Transaction?
• Logical unit of work that must be either entirely
completed or aborted
• Successful transaction changes database from
one consistent state to another
– One in which all data integrity constraints are
satisfied
• Most real-world database transactions are
formed by two or more database requests
– Equivalent of a single SQL statement in an
application program or transaction
Database Systems, 8th
Edition 5
Database Systems, 8th
Edition 6
Evaluating Transaction Results
• Not all transactions update database
• SQL code represents a transaction because
database was accessed
• Improper or incomplete transactions can have
devastating effect on database integrity
– Some DBMSs provide means by which user can
define enforceable constraints
– Other integrity rules are enforced automatically
by the DBMS
Database Systems, 8th
Edition 7
Figure 9.2
Database Systems, 8th
Edition 8
Transaction Properties
• Atomicity
– All operations of a transaction must be
completed
• Consistency
– Permanence of database’s consistent state
• Isolation
– Data used during transaction cannot be used by
second transaction until the first is completed
Database Systems, 8th
Edition 9
Transaction Properties (continued)
• Durability
– Once transactions are committed, they cannot
be undone
• Serializability
– Concurrent execution of several transactions
yields consistent results
• Multiuser databases subject to multiple
concurrent transactions
Database Systems, 8th
Edition 10
Transaction Management with SQL
• ANSI has defined standards that govern SQL
database transactions
• Transaction support is provided by two SQL
statements: COMMIT and ROLLBACK
• Transaction sequence must continue until:
– COMMIT statement is reached
– ROLLBACK statement is reached
– End of program is reached
– Program is abnormally terminated
Database Systems, 8th
Edition 11
The Transaction Log
• Transaction log stores:
– A record for the beginning of transaction
– For each transaction component:
• Type of operation being performed (update,
delete, insert)
• Names of objects affected by transaction
• “Before” and “after” values for updated fields
• Pointers to previous and next transaction log
entries for the same transaction
– Ending (COMMIT) of the transaction
Database Systems, 8th
Edition 12
Database Systems, 8th
Edition 13
Concurrency Control
• Coordination of simultaneous transaction
execution in a multiprocessing database
• Objective is to ensure serializability of
transactions in a multiuser environment
Database Systems, 8th
Edition 14
Lost Updates
• Lost update problem:
– Two concurrent transactions update same data
element
– One of the updates is lost
• Overwritten by the other transaction
Database Systems, 8th
Edition 15
Database Systems, 8th
Edition 16
Uncommitted Data
• Uncommitted data phenomenon:
– Two transactions executed concurrently
– First transaction rolled back after second already
accessed uncommitted data
Database Systems, 8th
Edition 17
Database Systems, 8th
Edition 18
Inconsistent Retrievals
• Inconsistent retrievals:
– First transaction accesses data
– Second transaction alters the data
– First transaction accesses the data again
• Transaction might read some data before they
are changed and other data after changed
• Yields inconsistent results
Database Systems, 8th
Edition 19
Database Systems, 8th
Edition 20
Database Systems, 8th
Edition 21
The Scheduler
• Special DBMS program
– Purpose is to establish order of operations within
which concurrent transactions are executed
• Interleaves execution of database operations:
– Ensures serializability
– Ensures isolation
• Serializable schedule
– Interleaved execution of transactions yields
same results as serial execution
Database Systems, 8th
Edition 22
Concurrency Control
with Locking Methods
• Lock
– Guarantees exclusive use of a data item to a
current transaction
– Required to prevent another transaction from
reading inconsistent data
• Lock manager
– Responsible for assigning and policing the locks
used by transactions
Database Systems, 8th
Edition 23
Lock Granularity
• Indicates level of lock use
• Locking can take place at following levels:
– Database
– Table
– Page
– Row
– Field (attribute)
Database Systems, 8th
Edition 24
Lock Granularity (continued)
• Database-level lock
– Entire database is locked
• Table-level lock
– Entire table is locked
• Page-level lock
– Entire diskpage is locked
Database Systems, 8th
Edition 25
Lock Granularity (continued)
• Row-level lock
– Allows concurrent transactions to access
different rows of same table
• Even if rows are located on same page
• Field-level lock
– Allows concurrent transactions to access same
row
• Requires use of different fields (attributes) within
the row
Database Systems, 8th
Edition 26
Database Systems, 8th
Edition 27
Database Systems, 8th
Edition 28
Database Systems, 8th
Edition 29
Database Systems, 8th
Edition 30
Lock Types
• Binary lock
– Two states: locked (1) or unlocked (0)
• Exclusive lock
– Access is specifically reserved for transaction that
locked object
– Must be used when potential for conflict exists
• Shared lock
– Concurrent transactions are granted read access on
basis of a common lock
Database Systems, 8th
Edition 31
Database Systems, 8th
Edition 32
Two-Phase Locking
to Ensure Serializability
• Defines how transactions acquire and
relinquish locks
• Guarantees serializability, but does not prevent
deadlocks
– Growing phase
• Transaction acquires all required locks without
unlocking any data
– Shrinking phase
• Transaction releases all locks and cannot obtain
any new lock
Database Systems, 8th
Edition 33
Two-Phase Locking
to Ensure Serializability (continued)
• Governed by the following rules:
– Two transactions cannot have conflicting locks
– No unlock operation can precede a lock
operation in the same transaction
– No data are affected until all locks are obtained
Database Systems, 8th
Edition 34
Database Systems, 8th
Edition 35
Deadlocks
• Condition that occurs when two transactions
wait for each other to unlock data
• Possible only if one of the transactions wants
to obtain an exclusive lock on a data item
– No deadlock condition can exist among
shared locks
Database Systems, 8th
Edition 36
Deadlocks (continued)
• Three techniques to control deadlock:
– Prevention
– Detection
– Avoidance
• Choice of deadlock control method depends
on database environment
– Low probability of deadlock, detection
recommended
– High probability, prevention recommended
Database Systems, 8th
Edition 37
Database Systems, 8th
Edition 38
Concurrency Control
with Time Stamping Methods
• Assigns global unique time stamp to each
transaction
• Produces explicit order in which transactions
are submitted to DBMS
• Uniqueness
– Ensures that no equal time stamp values can
exist
• Monotonicity
– Ensures that time stamp values always increase
Database Systems, 8th
Edition 39
Wait/Die and Wound/Wait Schemes
• Wait/die
– Older transaction waits and younger is rolled
back and rescheduled
• Wound/wait
– Older transaction rolls back younger transaction
and reschedules it
Database Systems, 8th
Edition 40
Database Systems, 8th
Edition 41
Concurrency Control
with Optimistic Methods
• Optimistic approach
– Based on assumption that majority of database
operations do not conflict
– Does not require locking or time stamping
techniques
– Transaction is executed without restrictions until
it is committed
– Phases: read, validation, and write
Database Systems, 8th
Edition 42
Database Recovery Management
• Restores database to previous consistent state
• Based on atomic transaction property
– All portions of transaction treated as single
logical unit of work
– All operations applied and completed to produce
consistent database
• If transaction operation cannot be completed
– Transaction aborted
– Changes to database rolled back
Database Systems, 8th
Edition 43
Transaction Recovery
• Write-ahead-log protocol: ensures transaction
logs are written before data is updated
• Redundant transaction logs: ensure physical
disk failure will not impair ability to recover
• Buffers: temporary storage areas in primary
memory
• Checkpoints: operations in which DBMS writes
all its updated buffers to disk
Database Systems, 8th
Edition 44
Transaction Recovery (continued)
• Deferred-write technique
– Only transaction log is updated
• Recovery process:
– Identify last checkpoint
– If transaction committed before checkpoint
• Do nothing
– If transaction committed after checkpoint
• Use transaction log to redo the transaction
– If transaction had ROLLBACK operation
• Do nothing
Database Systems, 8th
Edition 45
Transaction Recovery (continued)
• Write-through technique
– Database is immediately updated by transaction
operations during transaction’s execution
• Recovery process
– Identify last checkpoint
– If transaction was committed before checkpoint
• Do nothing
– If transaction committed after last checkpoint
• DBMS redoes the transaction using “after” values
– If transaction had ROLLBACK or was left active
• Do nothing because no updates were made
Database Systems, 8th
Edition 46
Database Systems, 8th
Edition 47
Summary
• Transaction: sequence of database operations
that access database
– Logical unit of work
• No portion of transaction can exist by itself
– Five main properties: atomicity, consistency,
isolation, durability, and serializability
• COMMIT saves changes to disk
• ROLLBACK restores previous database state
• SQL transactions are formed by several SQL
statements or database requests
Database Systems, 8th
Edition 48
Summary (continued)
• Transaction log keeps track of all transactions
that modify database
• Concurrency control coordinates simultaneous
execution of transactions
• Scheduler establishes order in which
concurrent transaction operations are executed
• Lock guarantees unique access to a data item
by transaction
• Two types of locks: binary locks and
shared/exclusive locks
Database Systems, 8th
Edition 49
Summary (continued)
• Serializability of schedules is guaranteed
through the use of two-phase locking
• Deadlock: when two or more transactions wait
indefinitely for each other to release lock
• Three deadlock control techniques: prevention,
detection, and avoidance
• Time stamping methods assign unique time
stamp to each transaction
– Schedules execution of conflicting transactions
in time stamp order
Database Systems, 8th
Edition 50
Summary (continued)
• Optimistic methods assume the majority of
database transactions do not conflict
– Transactions are executed concurrently, using
private copies of the data
• Database recovery restores database from
given state to previous consistent state

More Related Content

PPTX
Nested loops
PPT
Joint stock company
PPTX
Introduction to Data Science
PPTX
Concurrency Control in Database Management System
PPT
Introduction to operations management
PPTX
Transactions and Concurrency Control
PDF
Simple linear regression
PDF
Remote Method Invocation (RMI)
Nested loops
Joint stock company
Introduction to Data Science
Concurrency Control in Database Management System
Introduction to operations management
Transactions and Concurrency Control
Simple linear regression
Remote Method Invocation (RMI)

What's hot (20)

PPTX
Data Structure and Algorithms.pptx
PPTX
Chapter-7 Relational Calculus
PPT
Chapter 11 - File System Implementation
PPT
Data integrity
PPT
15. Transactions in DBMS
PPTX
Acid properties
PPT
Chapter 10 - File System Interface
PPTX
Transaction management DBMS
PPTX
Distributed database management system
PPTX
DBMS - RAID
PPTX
Concurrency Control in Distributed Database.
PPTX
Join dependency
PPTX
Timestamp protocols
PPT
data modeling and models
PPTX
Normalization in DBMS
PPT
Transactions in dbms
PPT
20. Parallel Databases in DBMS
PPT
Codd's rules
PPTX
Relational algebra ppt
Data Structure and Algorithms.pptx
Chapter-7 Relational Calculus
Chapter 11 - File System Implementation
Data integrity
15. Transactions in DBMS
Acid properties
Chapter 10 - File System Interface
Transaction management DBMS
Distributed database management system
DBMS - RAID
Concurrency Control in Distributed Database.
Join dependency
Timestamp protocols
data modeling and models
Normalization in DBMS
Transactions in dbms
20. Parallel Databases in DBMS
Codd's rules
Relational algebra ppt
Ad

Viewers also liked (20)

PPT
Transaction concurrency control
PPTX
Database Transactions and SQL Server Concurrency
PPT
Concurrency control
PPT
4. concurrency control
PDF
Transaction & Concurrency Control
PPT
16. Concurrency Control in DBMS
PPT
Transaction management
PDF
Chapter 5 Database Transaction Management
PPT
Databases: Concurrency Control
PPT
Advanced data modeling
PDF
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
PPT
Distributed database management systems
PPT
Transaction slide
PPTX
Concurrency control
PPT
Business intelligence and data warehouses
PPT
Database administration and security
PPT
Database connectivity and web technologies
PPT
Introduction to structured query language (sql)
PPTX
Transaction Management
PDF
DBMS-chap 2-Concurrency Control
Transaction concurrency control
Database Transactions and SQL Server Concurrency
Concurrency control
4. concurrency control
Transaction & Concurrency Control
16. Concurrency Control in DBMS
Transaction management
Chapter 5 Database Transaction Management
Databases: Concurrency Control
Advanced data modeling
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Distributed database management systems
Transaction slide
Concurrency control
Business intelligence and data warehouses
Database administration and security
Database connectivity and web technologies
Introduction to structured query language (sql)
Transaction Management
DBMS-chap 2-Concurrency Control
Ad

Similar to Transaction management and concurrency control (20)

PDF
Advanced database chapter three PowerPoint
PPTX
1. Transaction Processing and Concurrency Control.pptx
PPTX
Presentation on Transaction
PPTX
Transation in data base management system.pptx
PPTX
UNIT II in the part of Database at the PG
PPTX
Hbase hivepig
PPTX
FALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptx
PPTX
Unit 4 chapter - 8 Transaction processing Concepts (1).pptx
PPTX
Chapter-10 Transaction Processing and Error Recovery
PPT
Chap3.ppt
PPTX
E-Business Information System BBA AVI.pptx
PPTX
Hbase hive pig
PPTX
2Chapter Two- Process Management(2) (1).pptx
PDF
chp13.pdf
PPT
Taking Full Advantage of Galera Multi Master Cluster
PDF
Transaction Management, Concurrency Control and Deadlocks.pdf
PPTX
Concurrency Control in Distributed Systems.pptx
PPTX
Module 3 - DBMS System Architecture Principles
PPTX
On the integrity of data in Java Applications
PPTX
Integrity of data lucas jellema
Advanced database chapter three PowerPoint
1. Transaction Processing and Concurrency Control.pptx
Presentation on Transaction
Transation in data base management system.pptx
UNIT II in the part of Database at the PG
Hbase hivepig
FALLSEM2023-24_BCSE302L_TH_VL2023240100957_2023-06-21_Reference-Material-I.pptx
Unit 4 chapter - 8 Transaction processing Concepts (1).pptx
Chapter-10 Transaction Processing and Error Recovery
Chap3.ppt
E-Business Information System BBA AVI.pptx
Hbase hive pig
2Chapter Two- Process Management(2) (1).pptx
chp13.pdf
Taking Full Advantage of Galera Multi Master Cluster
Transaction Management, Concurrency Control and Deadlocks.pdf
Concurrency Control in Distributed Systems.pptx
Module 3 - DBMS System Architecture Principles
On the integrity of data in Java Applications
Integrity of data lucas jellema

More from Dhani Ahmad (20)

PPT
Strategic planning
PPT
Strategic information system planning
PPT
Opportunities, threats, industry competition, and competitor analysis
PPT
Information system
PPT
Information resource management
PPT
Types of islamic institutions and records
PPT
Islamic information seeking behavior
PPT
Islamic information management
PPT
Islamic information management sources in islam
PPT
The need for security
PPT
The information security audit
PPT
Security technologies
PPT
Security policy
PPT
Security and personnel
PPT
Secure
PPT
Risk management ii
PPT
Risk management i
PPT
Privacy & security in heath care it
PPT
Physical security
PPT
Legal, ethical & professional issues
Strategic planning
Strategic information system planning
Opportunities, threats, industry competition, and competitor analysis
Information system
Information resource management
Types of islamic institutions and records
Islamic information seeking behavior
Islamic information management
Islamic information management sources in islam
The need for security
The information security audit
Security technologies
Security policy
Security and personnel
Secure
Risk management ii
Risk management i
Privacy & security in heath care it
Physical security
Legal, ethical & professional issues

Recently uploaded (20)

PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Database Infoormation System (DBIS).pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
1_Introduction to advance data techniques.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PDF
Business Analytics and business intelligence.pdf
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPTX
Computer network topology notes for revision
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Introduction-to-Cloud-ComputingFinal.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Database Infoormation System (DBIS).pptx
IB Computer Science - Internal Assessment.pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
1_Introduction to advance data techniques.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Clinical guidelines as a resource for EBP(1).pdf
Data_Analytics_and_PowerBI_Presentation.pptx
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Business Analytics and business intelligence.pdf
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
Computer network topology notes for revision
STUDY DESIGN details- Lt Col Maksud (21).pptx

Transaction management and concurrency control

  • 1. Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control
  • 2. Database Systems, 8th Edition 2 Objectives • In this chapter, you will learn: – About database transactions and their properties – What concurrency control is and what role it plays in maintaining the database’s integrity – What locking methods are and how they work
  • 3. Database Systems, 8th Edition 3 Objectives (continued) • In this chapter, you will learn: (continued) – How stamping methods are used for concurrency control – How optimistic methods are used for concurrency control – How database recovery management is used to maintain database integrity
  • 4. Database Systems, 8th Edition 4 What is a Transaction? • Logical unit of work that must be either entirely completed or aborted • Successful transaction changes database from one consistent state to another – One in which all data integrity constraints are satisfied • Most real-world database transactions are formed by two or more database requests – Equivalent of a single SQL statement in an application program or transaction
  • 6. Database Systems, 8th Edition 6 Evaluating Transaction Results • Not all transactions update database • SQL code represents a transaction because database was accessed • Improper or incomplete transactions can have devastating effect on database integrity – Some DBMSs provide means by which user can define enforceable constraints – Other integrity rules are enforced automatically by the DBMS
  • 8. Database Systems, 8th Edition 8 Transaction Properties • Atomicity – All operations of a transaction must be completed • Consistency – Permanence of database’s consistent state • Isolation – Data used during transaction cannot be used by second transaction until the first is completed
  • 9. Database Systems, 8th Edition 9 Transaction Properties (continued) • Durability – Once transactions are committed, they cannot be undone • Serializability – Concurrent execution of several transactions yields consistent results • Multiuser databases subject to multiple concurrent transactions
  • 10. Database Systems, 8th Edition 10 Transaction Management with SQL • ANSI has defined standards that govern SQL database transactions • Transaction support is provided by two SQL statements: COMMIT and ROLLBACK • Transaction sequence must continue until: – COMMIT statement is reached – ROLLBACK statement is reached – End of program is reached – Program is abnormally terminated
  • 11. Database Systems, 8th Edition 11 The Transaction Log • Transaction log stores: – A record for the beginning of transaction – For each transaction component: • Type of operation being performed (update, delete, insert) • Names of objects affected by transaction • “Before” and “after” values for updated fields • Pointers to previous and next transaction log entries for the same transaction – Ending (COMMIT) of the transaction
  • 13. Database Systems, 8th Edition 13 Concurrency Control • Coordination of simultaneous transaction execution in a multiprocessing database • Objective is to ensure serializability of transactions in a multiuser environment
  • 14. Database Systems, 8th Edition 14 Lost Updates • Lost update problem: – Two concurrent transactions update same data element – One of the updates is lost • Overwritten by the other transaction
  • 16. Database Systems, 8th Edition 16 Uncommitted Data • Uncommitted data phenomenon: – Two transactions executed concurrently – First transaction rolled back after second already accessed uncommitted data
  • 18. Database Systems, 8th Edition 18 Inconsistent Retrievals • Inconsistent retrievals: – First transaction accesses data – Second transaction alters the data – First transaction accesses the data again • Transaction might read some data before they are changed and other data after changed • Yields inconsistent results
  • 21. Database Systems, 8th Edition 21 The Scheduler • Special DBMS program – Purpose is to establish order of operations within which concurrent transactions are executed • Interleaves execution of database operations: – Ensures serializability – Ensures isolation • Serializable schedule – Interleaved execution of transactions yields same results as serial execution
  • 22. Database Systems, 8th Edition 22 Concurrency Control with Locking Methods • Lock – Guarantees exclusive use of a data item to a current transaction – Required to prevent another transaction from reading inconsistent data • Lock manager – Responsible for assigning and policing the locks used by transactions
  • 23. Database Systems, 8th Edition 23 Lock Granularity • Indicates level of lock use • Locking can take place at following levels: – Database – Table – Page – Row – Field (attribute)
  • 24. Database Systems, 8th Edition 24 Lock Granularity (continued) • Database-level lock – Entire database is locked • Table-level lock – Entire table is locked • Page-level lock – Entire diskpage is locked
  • 25. Database Systems, 8th Edition 25 Lock Granularity (continued) • Row-level lock – Allows concurrent transactions to access different rows of same table • Even if rows are located on same page • Field-level lock – Allows concurrent transactions to access same row • Requires use of different fields (attributes) within the row
  • 30. Database Systems, 8th Edition 30 Lock Types • Binary lock – Two states: locked (1) or unlocked (0) • Exclusive lock – Access is specifically reserved for transaction that locked object – Must be used when potential for conflict exists • Shared lock – Concurrent transactions are granted read access on basis of a common lock
  • 32. Database Systems, 8th Edition 32 Two-Phase Locking to Ensure Serializability • Defines how transactions acquire and relinquish locks • Guarantees serializability, but does not prevent deadlocks – Growing phase • Transaction acquires all required locks without unlocking any data – Shrinking phase • Transaction releases all locks and cannot obtain any new lock
  • 33. Database Systems, 8th Edition 33 Two-Phase Locking to Ensure Serializability (continued) • Governed by the following rules: – Two transactions cannot have conflicting locks – No unlock operation can precede a lock operation in the same transaction – No data are affected until all locks are obtained
  • 35. Database Systems, 8th Edition 35 Deadlocks • Condition that occurs when two transactions wait for each other to unlock data • Possible only if one of the transactions wants to obtain an exclusive lock on a data item – No deadlock condition can exist among shared locks
  • 36. Database Systems, 8th Edition 36 Deadlocks (continued) • Three techniques to control deadlock: – Prevention – Detection – Avoidance • Choice of deadlock control method depends on database environment – Low probability of deadlock, detection recommended – High probability, prevention recommended
  • 38. Database Systems, 8th Edition 38 Concurrency Control with Time Stamping Methods • Assigns global unique time stamp to each transaction • Produces explicit order in which transactions are submitted to DBMS • Uniqueness – Ensures that no equal time stamp values can exist • Monotonicity – Ensures that time stamp values always increase
  • 39. Database Systems, 8th Edition 39 Wait/Die and Wound/Wait Schemes • Wait/die – Older transaction waits and younger is rolled back and rescheduled • Wound/wait – Older transaction rolls back younger transaction and reschedules it
  • 41. Database Systems, 8th Edition 41 Concurrency Control with Optimistic Methods • Optimistic approach – Based on assumption that majority of database operations do not conflict – Does not require locking or time stamping techniques – Transaction is executed without restrictions until it is committed – Phases: read, validation, and write
  • 42. Database Systems, 8th Edition 42 Database Recovery Management • Restores database to previous consistent state • Based on atomic transaction property – All portions of transaction treated as single logical unit of work – All operations applied and completed to produce consistent database • If transaction operation cannot be completed – Transaction aborted – Changes to database rolled back
  • 43. Database Systems, 8th Edition 43 Transaction Recovery • Write-ahead-log protocol: ensures transaction logs are written before data is updated • Redundant transaction logs: ensure physical disk failure will not impair ability to recover • Buffers: temporary storage areas in primary memory • Checkpoints: operations in which DBMS writes all its updated buffers to disk
  • 44. Database Systems, 8th Edition 44 Transaction Recovery (continued) • Deferred-write technique – Only transaction log is updated • Recovery process: – Identify last checkpoint – If transaction committed before checkpoint • Do nothing – If transaction committed after checkpoint • Use transaction log to redo the transaction – If transaction had ROLLBACK operation • Do nothing
  • 45. Database Systems, 8th Edition 45 Transaction Recovery (continued) • Write-through technique – Database is immediately updated by transaction operations during transaction’s execution • Recovery process – Identify last checkpoint – If transaction was committed before checkpoint • Do nothing – If transaction committed after last checkpoint • DBMS redoes the transaction using “after” values – If transaction had ROLLBACK or was left active • Do nothing because no updates were made
  • 47. Database Systems, 8th Edition 47 Summary • Transaction: sequence of database operations that access database – Logical unit of work • No portion of transaction can exist by itself – Five main properties: atomicity, consistency, isolation, durability, and serializability • COMMIT saves changes to disk • ROLLBACK restores previous database state • SQL transactions are formed by several SQL statements or database requests
  • 48. Database Systems, 8th Edition 48 Summary (continued) • Transaction log keeps track of all transactions that modify database • Concurrency control coordinates simultaneous execution of transactions • Scheduler establishes order in which concurrent transaction operations are executed • Lock guarantees unique access to a data item by transaction • Two types of locks: binary locks and shared/exclusive locks
  • 49. Database Systems, 8th Edition 49 Summary (continued) • Serializability of schedules is guaranteed through the use of two-phase locking • Deadlock: when two or more transactions wait indefinitely for each other to release lock • Three deadlock control techniques: prevention, detection, and avoidance • Time stamping methods assign unique time stamp to each transaction – Schedules execution of conflicting transactions in time stamp order
  • 50. Database Systems, 8th Edition 50 Summary (continued) • Optimistic methods assume the majority of database transactions do not conflict – Transactions are executed concurrently, using private copies of the data • Database recovery restores database from given state to previous consistent state