1 / 34

Concurrent Transactions

Concurrent Transactions. Even when there is no “failure,” several transactions can interact to turn a consistent state into an inconsistent state. Overview.

rosebarry
Download Presentation

Concurrent Transactions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Concurrent Transactions • Even when there is no “failure,”several transactions can interact to turn a consistent state into an inconsistent state.

  2. Overview • Scheduler manages read/write requests from transactions; allows execution in an order that is “serializable,” i.e., it “looks like” the transactions executed one­at­a­time(serial)

  3. Example • Assume A = B is required for consistency. • Note that we omit OUTPUT steps for succinctness; they always come at the end. We deal only with Reads and Writes in the main memory buffers. • T1 and T2 individually preserve DB consistency.

  4. An Acceptable Schedule S1 • Assume initially A = B = 25. Here is one way to execute (S1= T1; T2) so they do not interfere.

  5. Another Acceptable Schedule S2 • Here, transactions are executed as (S2=T2; T1). The result is different, but consistency is maintained.

  6. Interleaving Doesn't Necessarily Hurt (S3)

  7. But Then Again, It Might!

  8. The Semantics of transactions is also important. Suppose T3 is identical to T2 but it multiplies by 1

  9. We Need a Simpler Model • Assume that whenever a transaction T writes X, it changes X in some unique way. • Arithmetic coincidence never happens • Thus, we focus on the reads and writes only, assuming that whenever transaction T reads X and then writes it, X has changed in some unique way. • Notation: rT(X) denotes T reads the DB element X wT(X) denotes T writes X • If transactions are T1,…,Tk, then we will simply use ri and wi, instead of rTi and wTi

  10. Transactions and Schedules • A transaction (model) is a sequence of r and w actions on database elements. • A schedule is a sequence of reads/writes actions performed by a collection of transactions. • Serial Schedule = All actions for each transaction are consecutive. • r1(A); w1(A); r1(B); w1(B); r2(A); w2(A); r2(B); w2(B); …

  11. Transactions and Schedules (Cont’d) • Serializable Schedule: A schedule whose “effect” is equivalent to that of some serial schedule. • We will introduce a sufficient condition for serializability.

  12. Conflicts • Suppose for fixed DB elements X & Y, ri(X); rj(Y) is part of a schedule, and we flip the order of these operations. • ri(X); rj(Y) ≡ rj(Y); ri(X) … In what sense? • This holds always (even when X=Y) • We can flip ri(X); wj(Y), as long as X≠Y • That is, ri(X); wj (X) wj(X); ri (X) • In the RHS, Ti reads the value of X written by Tj, whereas it is not so in the LHS.

  13. Conflicts (Cont’d) • We can flip wi(X); wj(Y); provided X≠Y • However, wi(X); wj(X) ≢ wj(X); wi(X); • The final value of X may be different depending on which write occurs last. • There is a conflict if 2 conditions hold. • A read and a write of the same X, or • Two writes of X conflict in general and may not be swapped in order. All other events (reads/writes) may be swapped without changing the effect of the schedule (on the DB).

  14. Precedence Graphs • If by swapping pairs of non-conflicting actions in a schedule S, we end up in a serial schedule, then S is called a conflict-serializable schedule. S:r1(A); w1(A);r2(A); w2(A); r1(B); w1(B);r2(B); w2(B); • Conflict-serializability is a sufficient condition for serializability but not necessary. • Serializability/precedence graph for S • Nodes: transactions {T1,…,Tk} • Arcs: There is an arc from Ti to Tj if they have conflict access to the same database element X and Ti is first; in written Ti <S Tj.

  15. If there is a cycle in the graph • Then, there is no serial schedule which is conflict­equivalent to S. • Each arc represents a requirement on the order of transactions in a conflict­ equivalent serial schedule. • A cycle puts too many requirements on any linear order of transactions. • If there is no cycle in the graph • Then anytopological order of the graph suggests a conflict­equivalent schedule.

  16. Why the Precedence-Graph Test Works? • Idea: if the precedence graph is acyclic, then we can swap actions to form a serial schedule consistent with some topological order; Proof: By induction on n, number of transactions. • Basis: n = 1. That is, S={T1}; then S is already serial. • Induction: S={T1,T2,…,Tn}. Given that SG(S) is acyclic, then pick Tiin S such that no Tj in S is dependent on. • We swap all actions of Ti to the front (of S). • (Actions of Ti)(Actions of the other n-1 transactions) • The tail is a precedence graph that is the same as the original without Ti, i.e. it has n-1 nodes.  By the induction hyposthesis, we can reorder the actions of the other transactions to turn it into a serial schedule

  17. Schedulers • A scheduler takes requests from transactions for reads and writes, and decides if it is “OK” to allow them to operate on DB or defer them until it is safe to do so. • Ideal: a scheduler forwards a request iffit cannot lead to inconsistency of DB • Too hard to decide this in real time. • Real: it forwards a request if it cannot result in a violation of conflict­serializability. • We thus need to develop schedulers which ensure conflict-serializablility.

  18. Lock Actions • Before reading or writing an element X, a transaction Ti requests a lock on X from the scheduler. • The scheduler can either grant the lock to Ti or make Ti wait for the lock. • If granted, Ti should eventually unlock (release) the lock on X. • Shorthands: • li(X) = “transaction Ti requests a lock on X” • ui(X) = “Ti unlocks/releases the lock on X”

  19. The use of lock must be proper in 2 senses: • Consistency of Transactions: • Read or write X only when hold a lock on X. • ri(X) or wi(X) must be preceded by some li(X) with no intervening ui(X). • If Ti locks X, Ti must eventually unlock X. • Every li(X) must be followed by ui(X). • Legality of Schedules: • Two transactions may not have locked the same element X without one having first released the lock. • A schedule with li(X) cannot have another lj(X) until ui(X) appears in between

  20. Legal Schedule Doesn’t Mean Serializable

  21. Two Phase Locking There is a simple condition, which guarantees confict-serializability: In every transaction, all lock requests (phase 1) precede all unlock requests (phase 2).

  22. Why 2PL Works? • Precisely: a legal schedule S of 2PL transactions is conflict­serializable. • Proof is an induction on n, the number of transactions. • Remember, conflicts involve only read/write actions, not locks, but the legality of the transaction requires that the r/w's be consistent with the l/u's.

  23. Why 2PL Works (Cont’d) • Basis: if n=1, then S={T1}, and hence S is conflict-serializable. • Induction: S={T1,…,Tn}. Find the first transaction, say Ti, to perform an unlock action, say ui(X). • Can we show that the r/w actions of Ti can be moved to the front of the other transactions without conflict? • Consider some action such as wi(Y). Can it be preceded by some conflicting action wj(Y) or rj(Y)? In such a case we cannot swap them. • If so, then uj(Y) and li(Y) must intervene, as wj(Y)...uj(Y)...li(Y)...wi(Y). • Since Ti is the first to unlock, ui(X) appears before uj(Y). • But then li(Y) appears after ui(X), contradicting 2PL. • Conclusion: wi(Y) can slide forward in the schedule without conflict; similar argument for a ri(Y) action.

  24. Shared/Exclusive Locks • Problem: while simple locks + 2PL guarantee conflict­serializability, they do not allow two readers of DB element X at the same time. • But having multiple readers is not a problem for conflict­serializability (since read actions commute).

  25. Shared/Exclusive Locks (Cont’d) • Solution: Two kinds of locks: 1. Shared lock sli(X) allows Ti to read, but not write X. • It prevents other transactions from writing X but not from reading X. 2. Exclusive lock xli(X) allows Ti to read and/or write X; no other transaction may read or write X.

  26. Consistency of transaction conditions: • A read ri(X) must be preceded by sli(X) or xli(X), with no intervening ui(X). • A write wi(X) must be preceded by xli(X), with no intervening ui(X). • Legal schedules: • No two exclusive locks. • If xli(X) appears in a schedule, then there cannot be a xlj(X) until after a ui(X) appears. • No exclusive and shared locks. • If xli(X) appears, there can be no slj(X) until after ui(X). • If sli(X) appears, there can be no wlj(X) until after ui(X). • 2PL condition: • No transaction may have a sl(X) or xl(X) after a u(Y).

  27. Scheduler Rules • When there is more than one kind of lock, the scheduler needs a rule that says “if there is already a lock of type A on DB element X, can I grant a lock of type B on X?” • The compatibility matrix answers the question. Compatibility Matrix for Shared/Exclusive Locks is:

  28. Upgrading Locks • Instead of taking an exclusive lock immediately, a transaction can take a shared lock on X, read X, and then upgrade the lock to exclusive so that it can write X.

  29. Upgrading Locks (Cont.) Had T1 asked for an exclusive lock on B before reading B, the request would have been denied, because T2 already has a shared lock on B.

  30. Deadlocks Example:T1 and T2 each reads X and later writes X. Problem: when we allow upgrades, it is easy to get into a deadlock situation.

  31. Solution: Update Locks • Update lock uli(X) with asymetric compatibility matrix. • Only an update (not read) can be upgraded to write (If there are no shared locks anymore). • Legal schedules: read action permitted when there is either a shared or update lock. • An update can be granted while there is a shared­lock, but the scheduler will not grant a shared­lock when there is an update.

  32. Compatibility Matrix for Shared, Exclusive, and Update Locks

  33. Example: T1 and T2 each read X and later write X.

More Related