Concurrency Control. Data Base Management Systems. Inherently Concurrent Systems: The requirements

Size: px
Start display at page:

Download "Concurrency Control. Data Base Management Systems. Inherently Concurrent Systems: The requirements"

Transcription

1 Concurrency Control Inherently Concurrent Systems: These are Systems that respond to and manage simultaneous activities in their external environment which are inherently concurrent and maybe broadly classified as: Real-time Systems DBMS (Transaction Processing Systems) Operating Systems The requirements There is a need to support separate activities. There is a need to ensure that these activities access and update common data without interference. There is a need that the results of transactions are recorded permanently and securely before the user is told that the operation has been done. Data Base Management Systems Concurrency control is the controlling of Transactions that operate on the same db simultaneously. Gives shorter response times by running several transactions in parallel. We have seen that a Transaction is defined as a sequence of operations (read, write, update) that transforms the db from one consistent state to another consistent state. BUT it does not always happen - there is a need for rules. So here are the rules: 1. A Transaction must be protected against inconsistencies caused by other transactions. 2. If a Transaction terminates abnormally or runs into unforeseen problems, the updating of the transaction must be canceled so that the db is left in a consistent state. Examples Two or more users accessing the same db as a repository Two or more people reading the same book Two or more people accessing the same bank account Two or more TV remote controls Two or more garage door openers, Playing chess one against two or more Cooking two or more course meals simultaneously. Two or more users use the same compiler to compile their programs.

2 Concurrent Atomic Transactions Serializability and Recoverability In order that we have control over concurrency we need to schedule transactions in such a way as to avoid any interference between them, when they compete during execution. A simple single-user situation is to allow only one Transaction to execute at a time: T1 is committed before T2 begins its execution. A multi-user DBMS objective is to maximize the degree of concurrency or parallelism in the system. Thus Transactions should be able to run concurrently without interfering with each other. (These are the same objectives with Real-Time Systems and Operating Systems) The ultimate goal is then to examine the serializability as a means of helping to identify those executions of transactions that are guaranteed to ensure consistency of the db. Schedule A Schedule is a sequence of the operations by a set of concurrent transactions that preserves the order of the operations in each of the individual transactions. Alternatively, schedules are execution sequences that represent the chronological order in which instructions are executed in the system. Serializability The execution is serializable when a new transaction is not started until the previous transaction is finished. A serial schedule is a schedule where the operations of each transaction are executed consecutively or serially without any interleaved operations from other transactions. A Non-serial schedule is a schedule where the operations from a set of concurrent transactions are interleaved. When concurrent Transactions are executing, its results are correct only if it produces the same results as some serial execution. Such a schedule is called serializable. To ensure integrity and consistency of the db, schedules should be serializable. The ordering of the read and write operations is important: 1. Two Transactions only read Data Item (DI), they do not conflict and order is not important. 2. Two Transactions either read or write completely separate DIs, they do not conflict and the order is not important. 3. If one Transaction writes a DI and another either reads or writes the same DI, the order of execution is important.

3 Concurrency Control Techniques These techniques include the following protocols: Locking Based Protocols Locking Two Phase Locking (2PL) Graph-Based Protocols (Index or Tree Structures) Time Stamping Protocols Basic Time Stamping Thomas' Write Rule Multi-version Time stamping Granularity of Data Items Multi-version Read Consistency (Oracle9i, 2004) Lock Based Protocols Access to the data items (DI) are done in a mutually exclusive (ME) manner. While one Transaction accesses a data item (DI) no other transaction can modify that DI. The most common way to achieve concurrency is to hold a lock on that data item (DI). Many systems hold a lock on the entire db (very bad), a file or a Relation (??), a record or a tuple (OK), a field (good). Mutually Exclusive means that if a Transaction holds a lock on that data item (DI), no other Transaction can interfere. Safeguarding against incorrect results - which in turn may compromise the consistency of the db.

4 Locks There are various types of lock modes: Shared If a transaction Ti has obtained a shared mode lock (SL) on data item DI then Ti can read but not write. So, only READ. Exclusive If TI has obtained an exclusive mode lock (XL) on data item DI then Ti can READ and WRITE. Lock Compatibility SL XL SL TRUE FALSE XL FALSE FALSE NOTE: SL is compatible with SL but not with XL, therefore at any time several SLs can be held simultaneously by different Transactions on a particular DI or tuple or file. A subsequent XL has to wait until the currently held XLs or SLs are released. Wait A Transaction Ti must request a lock first, for a DI or a file, in order to access it. If the file or DI is already locked by another Transaction Tj in an incompatible mode, then Ti must wait until all incompatible locks held by other Ts have been explicitly released. Tj will eventually release the lock (unlock) that DI, which already had locked at a previous time. Ergo, Ti will be granted the request. Example Consider two accounts A and B accessed by two transactions T1 and T2. T1 transfers $50 from B to A. T2 displays the sum of A + B. Suppose A = $100 and B = $200 Consider the following four (4) examples:

5 Example L1 Time T1 T2 B = B -50 Write(B) Lock_XL(A) A = A + 50 Write (A) Lock_SL(A) Lock_SL(B) Print (A+B) This is not good because although is serializable, there is no concurrency. If T1 & T2 are executed serially (either T1T2 or T2T1) the result A + B = $300 is the same. If they are executed concurrently the following results are possible!! Example L2 Time T1 T2 B = B -50 Write(B) Lock_SL(A) Lock_SL(B) Print (A+B) Lock_XL(A) A = A + 50 Write (A) The result of A + B = 250 (WRONG) T1 has unlocked B too early and as a result brought T2 to an inconsistent state!!!

6 Example L3 Now delay unlocking until the end of both Transactions. Time T1 T2 B = B -50 Write(B) Lock_XL(A) A = A + 50 Write (A) Lock_SL(A) Lock_SL(B) Print (A+B) Here we have that T2 has to wait for T1 to release the lock on B (Last line of T1 & 3rd line of T2). Notice the value of A. Example L4 Furthermore consider the following partial schedule (a variation of L3): Time T1 T2 B = B -50 Write(B) Lock_SL(A) Lock_SL(B) Lock_XL(A) Note Since T1 is XL on B and T2 is requesting a Shared mode Lock on B, T2 is waiting for T1 to unlock B. Since T2 is requesting a SL on A and T1 is requesting an XL on A, T1 is waiting for T2 to unlock A. This is a DEADLOCK! Neither of the Transactions can proceed normally!!! When deadlock occurs, the system must rollback one of the two Transactions. Once a Transaction has been rolled back, the data items that were locked by that Transaction are unlocked and available to other transactions, which in turn may continue with normal execution. Avoid STARVATION.

7 Deadlock A standstill, an impasse, or a stalemate of two or more Transactions. This is a result when one Transaction holds a lock (or a resource) on a DI and it needs another DI that is held by another Transaction which in turn needs the DI held by the first Transaction. Deadlock Detection and Prevention a) Deadlock Prevention A simple, mostly used approach to deadlock prevention is TIMEOUTs. Here a Transaction that requests a lock will wait for only a period of time defined by the system, called quantum (or quanta, pl.). If the lock has not been granted for this period, the lock request has timed out. When this occurs, the DBMS: i. assumes that the Transaction is in a deadlock, but in reality it may not be the case, ii. it aborts thetransaction, iii. it automatically restarts the Transaction (new). i.e. Rollbacks. This is very simple and practical solution to the deadlock problem and it is employed by most of the commercial DBMSs. But unfortunately is extremely time consuming. N.B. Operating Systems, such as Unix, employ a similar scheme, in which the OS chooses a victim (one of the two deadlocked processes) and applies (i), (ii), (iii) above. See below for Recovery from a deadlock. b) Deadlock Detection One way to detect deadlocks is to build a wait-for graph, or a DBMS graph. This is a special case locking protocol, where prior knowledge is used in order to avoid deadlocks. See next topic: Graph-based Protocols. c) Recovery from Deadlock The DBMS has to select one or more Transactions as victims. But this selection should depend on several issues: i. Choice of a victim: Should depend on, How long the T has been running (less time better), how many Dls have been updated (better if few), and how many Dls will update (better if many). ii. How far a Transaction has to rollback. (better less) iii. Avoid Starvation. When the same T is chosen as a victim, it can never complete. Solution: A counter that counts the number of times that T has been a victim.

8 Two-Phase Locking (2PL) Another way to ensure serializability is with two-phase locking. Transactions issue lock and unlock requests in 2 phases: 1. Growing phase: A T may obtain locks but may not release any lock (initially). 2. Shrinking phase: A T may release locks but may not obtain any new locks. Notes: i. Examples L1 and L2 above are not two-phase locking but L3 and L4 are. ii. Although L4 uses two-phase locking, it is also deadlocked! Graph Based Locking Protocols As mentioned above, one way to solve the Deadlock problem and to ensure serializability is to build a simple model from the requirements specification (prior knowledge) of the data items DIs (which and how) will be accessed. A DBMS graph or a wait-for graph is a directed acyclic graph G = (N, E) that consists of a set of nodes N and a set of directed edges E. It is rooted like a tree. Construction: In order to construct such a graph: i. Create a node for each Transaction. ii. Create a directed Edge Ti to Tj, if Ti is waiting to lock an item that is currently locked by Tj. Deadlock exists if and only if the graph contains a cycle. Rules: i. The first lock by Ti may be on any DI. ii. Then a DI can be locked by Ti only if the parent of that DI is currently locked by Ti. iii. DIs may be locked or unlocked at any time. iv. A DI that has been locked by Ti can not be subsequently relocked by Ti Example Consider the following lock and unlock instructions of four Transactions T1, T2, T3 and T4 that lock and unlock DIs: A, B, C, D, E, F, G, H, J, I as in the Graph.

9 T1 T2 T3 T4 Lock_XL(D) Lock_XL(D) Lock_XL(E) Unlock(E) Lock_XL(D) Lock_XL(G) Lock_XL(H) Lock_XL(E) Lock_XL(H) Unlock(D) Unlock(E) Unlock(D) Lock_XL(J) Unlock(H) Unlock(H) Unlock(J) Unlock(D) Unlock(G) This can be serialized so that there is a deadlock free solution. I can be shown. T1 T2 T3 T4 Lock_XL(E) Unlock(E) Lock_XL(D) Lock_XL(G) Unlock(D) Lock_XL(D) Lock_XL(H) Unlock(D) Unlock(H) Lock_XL(J) Unlock(J) Lock_XL(E) Unlock(E) Lock_XL(D) Lock_XL(H) Unlock(D) Unlock(H) Unlock(G) Advantages: Unlocking may occur earlier, i.e. less waiting time and increase in concurrency. Also No Rollbacks, since it is deadlock free. Less time, etc. Disadvantages: In some cases it is necessary for a T to lock DIs the T does not access (this is BAD). For example - A T needs to access DIs A and J in the graph. It must lock not only A and J, but also B, D and H. This increases locking overhead (waiting time) which may decrease concurrency. Note: There are schedules that are not possible under the 2PL and are not possible under the Graph based Protocol, and vice versa.

10 Time Stamped Based Protocols In the last two protocols, the order between every pair of conflicting transactions is determined at execution time by the first lock that both transactions request that involves incompatible modes. The problem is that Deadlock still may exist. Timestamp: A unique identifier created by the DBMS that indicated the relative starting time of a Transaction. Timestamping: A Concurrency control protocol that orders Ts in such a way that older Ts, that is Ts with smaller timestamps, get priority in the event of conflict. Thus, in the timestamp protocol, the serializability order is determined by selecting an ordering among Ts in advance, i.e. before execution. A fixed unique timestamp (TS), is associated with each Ti. TS(Ti) by the system. It is assigned by the system before execution of Ti. If a new Tj enters the system after Ti has been assigned a TS, then TS(Ti) is less than TS(Tj) => TS(Ti) < TS(Tj). Implementation There are two methods to implement Timestamps: i. The System Clock is used as the Timestamp; i.e., a Transaction timestamp TS(Ti) = "The value of the system clock when Ti enters the system." ii. A logical counter is used that is incremented after a new timestamp has been assigned; i.e., a Transaction Ti = "The value of the counter when the T enters the system. " Serializability order The TSs determine the serializability order: If TS(Ti) < TS(Tj) then the system must ensure that the produced schedule is equivalent to a serial schedule in which Ti appears before Tj. To implement this we need to associate with each DI two timestamp values: 1) W- Timestamp - denotes largest TS of any T which has successfully executed a Write(DI) 2) R- Timestamp - denotes largest TS of Read(DI). Notes i. These are updated whenever a Read(DI) or Write(DI) is executed ii. In Rollback, a Ti - if it issues a read or write operation it is then assigned a new timestamp and it is restarted. iii. Usually a TS is assigned immediately before its first instruction. Example TS Assigned -> T1 T2 <- TS Assigned

11 Timestamp Ordering: The Scheduler From above: each DI, I, has 2 TSs: a W-TS(I) and R-TS(I), which have the highest TSs of the Ts that carried out the read and write operation on DI, I. The Scheduler receives requests for access to Dis, I, as: read (I, ts) and write (I, ts), where ts is the Timestamp of the requesting Transaction. The protocol The scheduler now accepts or rejects the request as follows: Read (I, ts): If ts < W-TS(I) then the request is rejected and the T is killed (Aborted - Rollback), otherwise the request is accepted and R-TS(I) is set equal to the greater of R-TS(I) and TS, i.e. max(r-ts(i), ts)). Write(l, ts): if ts < W-ts(l) or ts < R-ts(l) then the request is rejected and the T is killed (Aborted, Rollback), otherwise the request is accepted and W-ts is set equal to TS. N.B. In practice, NO Transaction can read or write a DI written by a T with greater Timestamp (TS), and cannot write a DI that has been read by a T with greater TS. Example T2 Suppose r-ts(l) is equal to 7, and w-ts(i) is equal to 5. Request to (Scheduler) Reply from (Scheduler) New Values/Comments read(i, 6) OK still 7 (no change) read(i, 8) OK r-ts(i) = 8 read(i, 9) OK r-ts(i) = 9 write(i, 8) NO conflict: killed - rollback write(i, 11) OK w-ts(i) = 11 read(i, 10) NO conflict: killed - rollback Note: DI, I, was read by the T with highest ts (7), and written by the T with highest ts(5). Example T3 read(t1, B, 1) OK r-ts(i) = 1 T1 adds and prints the contents of A and B. read(t2, B, 2) OK r-ts(i) = 2 T2 transfers 50 from A to B write(t2, B, 3) OK w-ts(i) = 3 T1: read(b), read(a), print(a+b) read(ti, A, 4) OK r-ts(i) = 4 T2: read(b), B=B-50,write(B),read(A) write(t2, A, 5) OK w-ts(i) = 5 A=A+50,write(A),print(A+B)

2 nd Semester 2009/2010

2 nd Semester 2009/2010 Chapter 16: Concurrency Control Departamento de Engenharia Informática Instituto Superior Técnico 2 nd Semester 2009/2010 Slides baseados nos slides oficiais do livro Database System Concepts c Silberschatz,

More information

Concurrency Control. Transaction Management. Lost Update Problem. Need for Concurrency Control. Concurrency control

Concurrency Control. Transaction Management. Lost Update Problem. Need for Concurrency Control. Concurrency control Concurrency Control Process of managing simultaneous operations on the database without having them interfere with one another. Transaction Management Concurrency control Connolly & Begg. Chapter 19. Third

More information

Lecture 22 Concurrency Control Part 2

Lecture 22 Concurrency Control Part 2 CMSC 461, Database Management Systems Spring 2018 Lecture 22 Concurrency Control Part 2 These slides are based on Database System Concepts 6 th edition book (whereas some quotes and figures are used from

More information

Concurrency Control! Snapshot isolation" q How to ensure serializability and recoverability? " q Lock-Based Protocols" q Other Protocols"

Concurrency Control! Snapshot isolation q How to ensure serializability and recoverability?  q Lock-Based Protocols q Other Protocols Concurrency Control! q How to ensure serializability and recoverability? q Lock-Based Protocols q Lock, 2PL q Lock Conversion q Lock Implementation q Deadlock q Multiple Granularity q Other Protocols q

More information

Chapter 13 : Concurrency Control

Chapter 13 : Concurrency Control Chapter 13 : Concurrency Control Chapter 13: Concurrency Control Lock-Based Protocols Timestamp-Based Protocols Validation-Based Protocols Multiple Granularity Multiversion Schemes Insert and Delete Operations

More information

Graph-based protocols are an alternative to two-phase locking Impose a partial ordering on the set D = {d 1, d 2,..., d h } of all data items.

Graph-based protocols are an alternative to two-phase locking Impose a partial ordering on the set D = {d 1, d 2,..., d h } of all data items. Graph-based protocols are an alternative to two-phase locking Impose a partial ordering on the set D = {d 1, d 2,..., d h } of all data items. If d i d j then any transaction accessing both d i and d j

More information

! A lock is a mechanism to control concurrent access to a data item! Data items can be locked in two modes :

! A lock is a mechanism to control concurrent access to a data item! Data items can be locked in two modes : Lock-Based Protocols Concurrency Control! A lock is a mechanism to control concurrent access to a data item! Data items can be locked in two modes : 1 exclusive (X) mode Data item can be both read as well

More information

Chapter 22. Transaction Management

Chapter 22. Transaction Management Chapter 22 Transaction Management 1 Transaction Support Transaction Action, or series of actions, carried out by user or application, which reads or updates contents of database. Logical unit of work on

More information

UNIT-IV TRANSACTION PROCESSING CONCEPTS

UNIT-IV TRANSACTION PROCESSING CONCEPTS 1 Transaction UNIT-IV TRANSACTION PROCESSING CONCEPTS A Transaction refers to a logical unit of work in DBMS, which comprises a set of DML statements that are to be executed atomically (indivisibly). Commit

More information

Lecture 21 Concurrency Control Part 1

Lecture 21 Concurrency Control Part 1 CMSC 461, Database Management Systems Spring 2018 Lecture 21 Concurrency Control Part 1 These slides are based on Database System Concepts 6 th edition book (whereas some quotes and figures are used from

More information

TRANSACTION PROCESSING CONCEPTS

TRANSACTION PROCESSING CONCEPTS 1 Transaction CHAPTER 9 TRANSACTION PROCESSING CONCEPTS A Transaction refers to a logical unit of work in DBMS, which comprises a set of DML statements that are to be executed atomically (indivisibly).

More information

CS352 Lecture - Concurrency

CS352 Lecture - Concurrency CS352 Lecture - Concurrency Objectives: Last revised 11/16/06 1. To introduce locking as a means of preserving the serializability of concurrent schedules. 2. To briefly introduce other approaches to this

More information

Chapter 12 : Concurrency Control

Chapter 12 : Concurrency Control Chapter 12 : Concurrency Control Chapter 12: Concurrency Control Lock-Based Protocols Timestamp-Based Protocols Validation-Based Protocols Multiple Granularity Multiversion Schemes Insert and Delete Operations

More information

References. Concurrency Control. Administração e Optimização de Bases de Dados 2012/2013. Helena Galhardas e

References. Concurrency Control. Administração e Optimização de Bases de Dados 2012/2013. Helena Galhardas e Administração e Optimização de Bases de Dados 2012/2013 Concurrency Control Helena Galhardas DEI@Técnico e DMIR@INESC-ID Chpt 15 Silberchatz Chpt 17 Raghu References 1 Summary Lock-Based Protocols Multiple

More information

Concurrency Control Algorithms

Concurrency Control Algorithms Concurrency Control Algorithms Given a number of conflicting transactions, the serializability theory provides criteria to study the correctness of a possible schedule of execution it does not provide

More information

UNIT 4 TRANSACTIONS. Objective

UNIT 4 TRANSACTIONS. Objective UNIT 4 TRANSACTIONS Objective To study about the transaction concepts. To know the recovery management. To have a clear understanding of concurrent executions. To know how these are facilitated in SQL.

More information

Chapter 15 : Concurrency Control

Chapter 15 : Concurrency Control Chapter 15 : Concurrency Control What is concurrency? Multiple 'pieces of code' accessing the same data at the same time Key issue in multi-processor systems (i.e. most computers today) Key issue for parallel

More information

Review. Review. Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications. Lecture #21: Concurrency Control (R&G ch.

Review. Review. Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications. Lecture #21: Concurrency Control (R&G ch. Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications Lecture #21: Concurrency Control (R&G ch. 17) Review DBMSs support ACID Transaction semantics. Concurrency control and Crash

More information

Concurrency Control. Concurrency Control Ensures interleaving of operations amongst concurrent transactions result in serializable schedules

Concurrency Control. Concurrency Control Ensures interleaving of operations amongst concurrent transactions result in serializable schedules Concurrency Control Concurrency Control Ensures interleaving of operations amongst concurrent transactions result in serializable schedules How? transaction operations interleaved following a protocol

More information

DB2 Lecture 10 Concurrency Control

DB2 Lecture 10 Concurrency Control DB2 Lecture 10 Control Jacob Aae Mikkelsen November 28, 2012 1 / 71 Jacob Aae Mikkelsen DB2 Lecture 10 Control ACID Properties Properly implemented transactions are commonly said to meet the ACID test,

More information

CMSC 424 Database design Lecture 22 Concurrency/recovery. Mihai Pop

CMSC 424 Database design Lecture 22 Concurrency/recovery. Mihai Pop CMSC 424 Database design Lecture 22 Concurrency/recovery Mihai Pop Admin Signup sheet for project presentations Recap...1 ACID properties: Atomicity (recovery) Consistency (transaction design,, concurrency

More information

Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications. Last Class. Last Class. Faloutsos/Pavlo CMU /615

Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications. Last Class. Last Class. Faloutsos/Pavlo CMU /615 Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications C. Faloutsos A. Pavlo Lecture#21: Concurrency Control (R&G ch. 17) Last Class Introduction to Transactions ACID Concurrency

More information

UNIT IV TRANSACTION MANAGEMENT

UNIT IV TRANSACTION MANAGEMENT UNIT IV TRANSACTION MANAGEMENT The term transaction refers to a collection of operations that form a single logical unit of work. For instance, transfer of money from one account to another is a transaction

More information

Transaction Management. Pearson Education Limited 1995, 2005

Transaction Management. Pearson Education Limited 1995, 2005 Chapter 20 Transaction Management 1 Chapter 20 - Objectives Function and importance of transactions. Properties of transactions. Concurrency Control Deadlock and how it can be resolved. Granularity of

More information

Concurrency Control in Distributed Systems. ECE 677 University of Arizona

Concurrency Control in Distributed Systems. ECE 677 University of Arizona Concurrency Control in Distributed Systems ECE 677 University of Arizona Agenda What? Why? Main problems Techniques Two-phase locking Time stamping method Optimistic Concurrency Control 2 Why concurrency

More information

CS352 Lecture - Concurrency

CS352 Lecture - Concurrency CS352 Lecture - Concurrency Objectives: Last revised 3/21/17 1. To introduce locking as a means of preserving the serializability of concurrent schedules. 2. To briefly introduce other approaches to this

More information

A lock is a mechanism to control concurrent access to a data item Data items can be locked in two modes:

A lock is a mechanism to control concurrent access to a data item Data items can be locked in two modes: Concurrency Control Concurrency Control Lock-Based and Tree-Based Protocols Timestamp-Based Protocols Validation-Based Protocols Multiple Granularity Multiversion Schemes Insert and Delete Operations Concurrency

More information

mywbut.com Concurrency Control

mywbut.com Concurrency Control C H A P T E R 1 6 Concurrency Control This chapter describes how to control concurrent execution in a database, in order to ensure the isolation properties of transactions. A variety of protocols are described

More information

Chapter 5. Concurrency Control Techniques. Adapted from the slides of Fundamentals of Database Systems (Elmasri et al., 2006)

Chapter 5. Concurrency Control Techniques. Adapted from the slides of Fundamentals of Database Systems (Elmasri et al., 2006) Chapter 5 Concurrency Control Techniques Adapted from the slides of Fundamentals of Database Systems (Elmasri et al., 2006) Chapter Outline Purpose of Concurrency Control Two-Phase Locking Techniques Concurrency

More information

Transactions. Kathleen Durant PhD Northeastern University CS3200 Lesson 9

Transactions. Kathleen Durant PhD Northeastern University CS3200 Lesson 9 Transactions Kathleen Durant PhD Northeastern University CS3200 Lesson 9 1 Outline for the day The definition of a transaction Benefits provided What they look like in SQL Scheduling Transactions Serializability

More information

Concurrency Control Overview. COSC 404 Database System Implementation. Concurrency Control. Lock-Based Protocols. Lock-Based Protocols (2)

Concurrency Control Overview. COSC 404 Database System Implementation. Concurrency Control. Lock-Based Protocols. Lock-Based Protocols (2) COSC 404 Database System Implementation Concurrency Control Dr. Ramon Lawrence University of British Columbia Okanagan ramon.lawrence@ubc.ca Concurrency Control Overview Concurrency control (CC) is a mechanism

More information

Transaction Processing: Basics - Transactions

Transaction Processing: Basics - Transactions Transaction Processing: Basics - Transactions Transaction is execution of program that accesses DB Basic operations: 1. read item(x): Read DB item X into program variable 2. write item(x): Write program

More information

DATABASE DESIGN I - 1DL300

DATABASE DESIGN I - 1DL300 DATABASE DESIGN I - 1DL300 Spring 2011 An introductory course on database systems http://www.it.uu.se/edu/course/homepage/dbastekn/vt11/ Manivasakan Sabesan Uppsala Database Laboratory Department of Information

More information

Synchronization Part II. CS403/534 Distributed Systems Erkay Savas Sabanci University

Synchronization Part II. CS403/534 Distributed Systems Erkay Savas Sabanci University Synchronization Part II CS403/534 Distributed Systems Erkay Savas Sabanci University 1 Election Algorithms Issue: Many distributed algorithms require that one process act as a coordinator (initiator, etc).

More information

A can be implemented as a separate process to which transactions send lock and unlock requests The lock manager replies to a lock request by sending a lock grant messages (or a message asking the transaction

More information

CSE 444: Database Internals. Lectures Transactions

CSE 444: Database Internals. Lectures Transactions CSE 444: Database Internals Lectures 13-14 Transactions CSE 444 - Spring 2014 1 Announcements Lab 2 is due TODAY Lab 3 will be released today, part 1 due next Monday HW4 is due on Wednesday HW3 will be

More information

Page 1. Goals of Todayʼs Lecture" Two Key Questions" Goals of Transaction Scheduling"

Page 1. Goals of Todayʼs Lecture Two Key Questions Goals of Transaction Scheduling Goals of Todayʼs Lecture" CS162 Operating Systems and Systems Programming Lecture 19 Transactions, Two Phase Locking (2PL), Two Phase Commit (2PC)" Transaction scheduling Two phase locking (2PL) and strict

More information

Today s Class. Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications. Formal Properties of Schedules. Conflicting Operations

Today s Class. Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications. Formal Properties of Schedules. Conflicting Operations Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB pplications C. Faloutsos. Pavlo Lecture#21: Concurrency Control (R&G ch. 17) Today s Class Serializability: concepts and algorithms Locking-based

More information

Lecture 13 Concurrency Control

Lecture 13 Concurrency Control Lecture 13 Concurrency Control Shuigeng Zhou December 23, 2009 School of Computer Science Fudan University Outline Lock-Based Protocols Multiple Granularity Deadlock Handling Insert and Delete Operations

More information

Page 1. Goals of Today s Lecture" Two Key Questions" Goals of Transaction Scheduling"

Page 1. Goals of Today s Lecture Two Key Questions Goals of Transaction Scheduling Goals of Today s Lecture" CS162 Operating Systems and Systems Programming Lecture 19 Transactions, Two Phase Locking (2PL), Two Phase Commit (2PC)" Transaction scheduling Two phase locking (2PL) and strict

More information

T ransaction Management 4/23/2018 1

T ransaction Management 4/23/2018 1 T ransaction Management 4/23/2018 1 Air-line Reservation 10 available seats vs 15 travel agents. How do you design a robust and fair reservation system? Do not enough resources Fair policy to every body

More information

Chapter 18 Concurrency Control Techniques

Chapter 18 Concurrency Control Techniques Chapter 18 Concurrency Control Techniques Copyright 2004 Pearson Education, Inc. Chapter 18 Outline Databases Concurrency Control 1 Purpose of Concurrency Control 2 Two-Phase locking 5 Limitations of CCMs

More information

CS Reading Packet: "Transaction management, part 2"

CS Reading Packet: Transaction management, part 2 CS 325 - Reading Packet: "Transaction management, part 2" p. 1 Sources: CS 325 - Reading Packet: "Transaction management, part 2" * Ricardo, "Databases Illuminated", Chapter 10, Jones and Bartlett. * Kroenke,

More information

Checkpoints. Logs keep growing. After every failure, we d have to go back and replay the log. This can be time consuming. Checkpoint frequently

Checkpoints. Logs keep growing. After every failure, we d have to go back and replay the log. This can be time consuming. Checkpoint frequently Checkpoints Logs keep growing. After every failure, we d have to go back and replay the log. This can be time consuming. Checkpoint frequently Output all log records currently in volatile storage onto

More information

Database design and implementation CMPSCI 645. Lectures 18: Transactions and Concurrency

Database design and implementation CMPSCI 645. Lectures 18: Transactions and Concurrency Database design and implementation CMPSCI 645 Lectures 18: Transactions and Concurrency 1 DBMS architecture Query Parser Query Rewriter Query Op=mizer Query Executor Lock Manager Concurrency Control Access

More information

Distributed Transaction Management. Distributed Database System

Distributed Transaction Management. Distributed Database System Distributed Transaction Management Advanced Topics in Database Management (INFSCI 2711) Some materials are from Database Management Systems, Ramakrishnan and Gehrke and Database System Concepts, Siberschatz,

More information

Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 18-1

Copyright 2007 Ramez Elmasri and Shamkant B. Navathe. Slide 18-1 Slide 18-1 Chapter 18 Concurrency Control Techniques Chapter 18 Outline Databases Concurrency Control 1. Purpose of Concurrency Control 2. Two-Phase locking 3. Limitations of CCMs 4. Index Locking 5. Lock

More information

Introduction to Data Management CSE 414

Introduction to Data Management CSE 414 Introduction to Data Management CSE 414 Lecture 23: Transactions CSE 414 - Winter 2014 1 Announcements Webquiz due Monday night, 11 pm Homework 7 due Wednesday night, 11 pm CSE 414 - Winter 2014 2 Where

More information

Intro to DB CHAPTER 15 TRANSACTION MNGMNT

Intro to DB CHAPTER 15 TRANSACTION MNGMNT Intro to DB CHAPTER 15 TRANSACTION MNGMNT Chapter 15: Transactions Transaction Concept Transaction State Implementation of Atomicity and Durability Concurrent Executions Serializability Recoverability

More information

Foundation of Database Transaction Processing. Copyright 2012 Pearson Education, Inc.

Foundation of Database Transaction Processing. Copyright 2012 Pearson Education, Inc. Foundation of Database Transaction Processing Copyright 2012 Pearson Education, Inc. Chapter Outline - 17.1 Introduction to Transaction Processing - 17.2 Transaction and System Concepts - 17.3 Desirable

More information

CS 4604: Introduc0on to Database Management Systems. B. Aditya Prakash Lecture #17: Transac0ons 2: 2PL and Deadlocks

CS 4604: Introduc0on to Database Management Systems. B. Aditya Prakash Lecture #17: Transac0ons 2: 2PL and Deadlocks CS 4604: Introduc0on to Database Management Systems B. Aditya Prakash Lecture #17: Transac0ons 2: 2PL and Deadlocks Review (last lecture) DBMSs support ACID Transac0on seman0cs. Concurrency control and

More information

L i (A) = transaction T i acquires lock for element A. U i (A) = transaction T i releases lock for element A

L i (A) = transaction T i acquires lock for element A. U i (A) = transaction T i releases lock for element A Lock-Based Scheduler Introduction to Data Management CSE 344 Lecture 20: Transactions Simple idea: Each element has a unique lock Each transaction must first acquire the lock before reading/writing that

More information

Chapter 6 Distributed Concurrency Control

Chapter 6 Distributed Concurrency Control Chapter 6 Distributed Concurrency Control Table of Contents Serializability Theory Taxonomy of Concurrency Control Algorithms Locking-Based Concurrency Control Timestamp-Based Concurrency Control Optimistic

More information

Database System Concepts

Database System Concepts Chapter 15+16+17: Departamento de Engenharia Informática Instituto Superior Técnico 1 st Semester 2010/2011 Slides (fortemente) baseados nos slides oficiais do livro c Silberschatz, Korth and Sudarshan.

More information

Chapter 9: Concurrency Control

Chapter 9: Concurrency Control Chapter 9: Concurrency Control Concurrency, Conflicts, and Schedules Locking Based Algorithms Timestamp Ordering Algorithms Deadlock Management Acknowledgements: I am indebted to Arturas Mazeika for providing

More information

Transaction Management

Transaction Management Instructional Objectives Upon completion of this Unit, students will be introduced to the following About Transaction Processing Transaction and System Concepts Desirable Properties of Transactions Schedules

More information

Database Management Systems

Database Management Systems Database Management Systems Associate Professor Dr. Raed Ibraheem Hamed University of Human Development, College of Science and Technology Computer Science Department 2015 2016 1 Points to Cover Transaction

More information

Concurrency Control Techniques

Concurrency Control Techniques Concurrency Control Techniques Chapter 18 March 24, 2008 ADBS: Concurrency control 1 Chapter Objectives Discusses a number of concurrency control techniques that are used to insure the noninterference

More information

Introduction to Data Management CSE 344

Introduction to Data Management CSE 344 Introduction to Data Management CSE 344 Lecture 21: Transaction Implementations CSE 344 - Winter 2017 1 Announcements WQ7 and HW7 are out Due next Mon and Wed Start early, there is little time! CSE 344

More information

Page 1. Goals of Today s Lecture. The ACID properties of Transactions. Transactions

Page 1. Goals of Today s Lecture. The ACID properties of Transactions. Transactions Goals of Today s Lecture CS162 Operating Systems and Systems Programming Lecture 19 Transactions, Two Phase Locking (2PL), Two Phase Commit (2PC) Finish Transaction scheduling Two phase locking (2PL) and

More information

Distributed Databases Systems

Distributed Databases Systems Distributed Databases Systems Lecture No. 07 Concurrency Control Naeem Ahmed Email: naeemmahoto@gmail.com Department of Software Engineering Mehran Univeristy of Engineering and Technology Jamshoro Outline

More information

Transactions and Concurrency Control. Dr. Philip Cannata

Transactions and Concurrency Control. Dr. Philip Cannata Transactions and Concurrency Control Dr. Philip Cannata 1 To open two SQLDevelopers: On the Mac do the following: click on the SQLDeveloper icon to start one instance from the command line run the following

More information

CSE 344 MARCH 9 TH TRANSACTIONS

CSE 344 MARCH 9 TH TRANSACTIONS CSE 344 MARCH 9 TH TRANSACTIONS ADMINISTRIVIA HW8 Due Monday Max Two Late days Exam Review Sunday: 5pm EEB 045 CASE STUDY: SQLITE SQLite is very simple More info: http://www.sqlite.org/atomiccommit.html

More information

Multiversion schemes keep old versions of data item to increase concurrency. Multiversion Timestamp Ordering Multiversion Two-Phase Locking Each

Multiversion schemes keep old versions of data item to increase concurrency. Multiversion Timestamp Ordering Multiversion Two-Phase Locking Each Multiversion schemes keep old versions of data item to increase concurrency. Multiversion Timestamp Ordering Multiversion Two-Phase Locking Each successful write results in the creation of a new version

More information

Distributed Database Management System UNIT-2. Concurrency Control. Transaction ACID rules. MCA 325, Distributed DBMS And Object Oriented Databases

Distributed Database Management System UNIT-2. Concurrency Control. Transaction ACID rules. MCA 325, Distributed DBMS And Object Oriented Databases Distributed Database Management System UNIT-2 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi-63,By Shivendra Goel. U2.1 Concurrency Control Concurrency control is a method

More information

Operating Systems. Operating Systems Sina Meraji U of T

Operating Systems. Operating Systems Sina Meraji U of T Operating Systems Operating Systems Sina Meraji U of T Remember example from third week? My_work(id_t id) { /* id can be 0 or 1 */... flag[id] = true; /* indicate entering CS */ while (flag[1-id]) ;/*

More information

Concurrency control CS 417. Distributed Systems CS 417

Concurrency control CS 417. Distributed Systems CS 417 Concurrency control CS 417 Distributed Systems CS 417 1 Schedules Transactions must have scheduled so that data is serially equivalent Use mutual exclusion to ensure that only one transaction executes

More information

Chapter 7 (Cont.) Transaction Management and Concurrency Control

Chapter 7 (Cont.) Transaction Management and Concurrency Control Chapter 7 (Cont.) Transaction Management and Concurrency Control In this chapter, you will learn: What a database transaction is and what its properties are What concurrency control is and what role it

More information

Phantom Problem. Phantom Problem. Phantom Problem. Phantom Problem R1(X1),R1(X2),W2(X3),R1(X1),R1(X2),R1(X3) R1(X1),R1(X2),W2(X3),R1(X1),R1(X2),R1(X3)

Phantom Problem. Phantom Problem. Phantom Problem. Phantom Problem R1(X1),R1(X2),W2(X3),R1(X1),R1(X2),R1(X3) R1(X1),R1(X2),W2(X3),R1(X1),R1(X2),R1(X3) 57 Phantom Problem So far we have assumed the database to be a static collection of elements (=tuples) If tuples are inserted/deleted then the phantom problem appears 58 Phantom Problem INSERT INTO Product(name,

More information

Intro to Transactions

Intro to Transactions Reading Material CompSci 516 Database Systems Lecture 14 Intro to Transactions [RG] Chapter 16.1-16.3, 16.4.1 17.1-17.4 17.5.1, 17.5.3 Instructor: Sudeepa Roy Acknowledgement: The following slides have

More information

Deadlock Prevention (cont d) Deadlock Prevention. Example: Wait-Die. Wait-Die

Deadlock Prevention (cont d) Deadlock Prevention. Example: Wait-Die. Wait-Die Deadlock Prevention Deadlock Prevention (cont d) 82 83 When there is a high level of lock contention and an increased likelihood of deadlocks Prevent deadlocks by giving each Xact a priority Assign priorities

More information

Chapter 16 : Concurrency Control

Chapter 16 : Concurrency Control Chapter 16 : Concurrency Control Database System Concepts 5 th Ed. Silberschatz, Korth and Sudarshan, 2005 See www.db-book.com for conditions on re-use Chapter 16: Concurrency Control Lock-Based Protocols

More information

Lock Granularity and Consistency Levels (Lecture 7, cs262a) Ali Ghodsi and Ion Stoica, UC Berkeley February 7, 2018

Lock Granularity and Consistency Levels (Lecture 7, cs262a) Ali Ghodsi and Ion Stoica, UC Berkeley February 7, 2018 Lock Granularity and Consistency Levels (Lecture 7, cs262a) Ali Ghodsi and Ion Stoica, UC Berkeley February 7, 2018 Papers Granularity of Locks and Degrees of Consistency in a Shared Database, J. N. Gray,

More information

Comp 5311 Database Management Systems. 14. Timestamp-based Protocols

Comp 5311 Database Management Systems. 14. Timestamp-based Protocols Comp 5311 Database Management Systems 14. Timestamp-based Protocols 1 Timestamps Each transaction is issued a timestamp when it enters the system. If an old transaction T i has time-stamp TS(T i ), a new

More information

Database Systems CSE 414

Database Systems CSE 414 Database Systems CSE 414 Lecture 27: Transaction Implementations 1 Announcements Final exam will be on Dec. 14 (next Thursday) 14:30-16:20 in class Note the time difference, the exam will last ~2 hours

More information

Transaction Management

Transaction Management Transaction Management 1) Explain properties of a transaction? (JUN/JULY 2015) Transactions should posses the following (ACID) properties: Transactions should possess several properties. These are often

More information

For more Articles Go To: Whatisdbms.com CONCURRENCY CONTROL PROTOCOL

For more Articles Go To: Whatisdbms.com CONCURRENCY CONTROL PROTOCOL For more Articles Go To: Whatisdbms.com CONCURRENCY CONTROL PROTOCOL In the multi-user system, we all know that multiple transactions run in parallel, thus trying to access the same data and suppose if

More information

Unit 10.5 Transaction Processing: Concurrency Zvi M. Kedem 1

Unit 10.5 Transaction Processing: Concurrency Zvi M. Kedem 1 Unit 10.5 Transaction Processing: Concurrency 2016 Zvi M. Kedem 1 Concurrency in Context User Level (View Level) Community Level (Base Level) Physical Level DBMS OS Level Centralized Or Distributed Derived

More information

Silberschatz and Galvin Chapter 18

Silberschatz and Galvin Chapter 18 Silberschatz and Galvin Chapter 18 Distributed Coordination CPSC 410--Richard Furuta 4/21/99 1 Distributed Coordination Synchronization in a distributed environment Ð Event ordering Ð Mutual exclusion

More information

11/7/2018. Event Ordering. Module 18: Distributed Coordination. Distributed Mutual Exclusion (DME) Implementation of. DME: Centralized Approach

11/7/2018. Event Ordering. Module 18: Distributed Coordination. Distributed Mutual Exclusion (DME) Implementation of. DME: Centralized Approach Module 18: Distributed Coordination Event Ordering Event Ordering Mutual Exclusion Atomicity Concurrency Control Deadlock Handling Election Algorithms Reaching Agreement Happened-before relation (denoted

More information

Transaction Management and Concurrency Control. Chapter 16, 17

Transaction Management and Concurrency Control. Chapter 16, 17 Transaction Management and Concurrency Control Chapter 16, 17 Instructor: Vladimir Zadorozhny vladimir@sis.pitt.edu Information Science Program School of Information Sciences, University of Pittsburgh

More information

CS377: Database Systems Concurrency Control. Li Xiong Department of Mathematics and Computer Science Emory University

CS377: Database Systems Concurrency Control. Li Xiong Department of Mathematics and Computer Science Emory University CS377: Database Systems Concurrency Control Li Xiong Department of Mathematics and Computer Science Emory University 1 Concurrent Execution of Transactions Concurrent execution of transactions is necessary

More information

Concurrency. Consider two ATMs running in parallel. We need a concurrency manager. r1[x] x:=x-250 r2[x] x:=x-250 w[x] commit w[x] commit

Concurrency. Consider two ATMs running in parallel. We need a concurrency manager. r1[x] x:=x-250 r2[x] x:=x-250 w[x] commit w[x] commit DBMS ARCHITECTURE Concurrency Consider two ATMs running in parallel T1 T2 r1[x] x:=x-250 r2[x] x:=x-250 w[x] commit w[x] commit We need a concurrency manager Examples of interference T1: r[x=100] w[x:=600]

More information

CSE 344 MARCH 25 TH ISOLATION

CSE 344 MARCH 25 TH ISOLATION CSE 344 MARCH 25 TH ISOLATION ADMINISTRIVIA HW8 Due Friday, June 1 OQ7 Due Wednesday, May 30 Course Evaluations Out tomorrow TRANSACTIONS We use database transactions everyday Bank $$$ transfers Online

More information

Transactions and Concurrency Control

Transactions and Concurrency Control Transactions and Concurrency Control Computer Science E-66 Harvard University David G. Sullivan, Ph.D. Overview A transaction is a sequence of operations that is treated as a single logical operation.

More information

Concurrency Control. Chapter 17. Comp 521 Files and Databases Fall

Concurrency Control. Chapter 17. Comp 521 Files and Databases Fall Concurrency Control Chapter 17 Comp 521 Files and Databases Fall 2012 1 Conflict Serializable Schedules Recall conflicts (WR, RW, WW) were the cause of sequential inconsistency Two schedules are conflict

More information

Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition. Chapter 13 Managing Transactions and Concurrency

Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition. Chapter 13 Managing Transactions and Concurrency Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition Chapter 13 Managing Transactions and Concurrency Objectives In this chapter, you will learn: What a database transaction

More information

Transaction Processing: Concurrency Control. Announcements (April 26) Transactions. CPS 216 Advanced Database Systems

Transaction Processing: Concurrency Control. Announcements (April 26) Transactions. CPS 216 Advanced Database Systems Transaction Processing: Concurrency Control CPS 216 Advanced Database Systems Announcements (April 26) 2 Homework #4 due this Thursday (April 28) Sample solution will be available on Thursday Project demo

More information

Conflict Equivalent. Conflict Serializability. Example 1. Precedence Graph Test Every conflict serializable schedule is serializable

Conflict Equivalent. Conflict Serializability. Example 1. Precedence Graph Test Every conflict serializable schedule is serializable Conflict Equivalent Conflict Serializability 34 35 Outcome of a schedule depends on the order of conflicting operations Can interchange non-conflicting ops without changing effect of the schedule If two

More information

Conflict serializability

Conflict serializability Lock manager process that receives messages from transactions and receives replies. Responds to lock request messages with lock-grant or messages to rollback (deadlock). Acknowledges unlock (may generate

More information

CS 370 Concurrency worksheet. T1:R(X); T2:W(Y); T3:R(X); T2:R(X); T2:R(Z); T2:Commit; T3:W(X); T3:Commit; T1:W(Y); Commit

CS 370 Concurrency worksheet. T1:R(X); T2:W(Y); T3:R(X); T2:R(X); T2:R(Z); T2:Commit; T3:W(X); T3:Commit; T1:W(Y); Commit CS 370 Concurrency worksheet Name Student ID 1) Apply the appropriate locks and show the resulting schedule for the following sequence of operations using strict 2PL. Assume locks can be upgraded. :R(X);

More information

Concurrency Control. Chapter 17. Comp 521 Files and Databases Spring

Concurrency Control. Chapter 17. Comp 521 Files and Databases Spring Concurrency Control Chapter 17 Comp 521 Files and Databases Spring 2010 1 Conflict Serializable Schedules Recall conflicts (WW, RW, WW) were the cause of sequential inconsistency Two schedules are conflict

More information

In This Lecture. Exam revision. Main topics. Exam format. Particular topics. How to revise. Exam format Main topics How to revise

In This Lecture. Exam revision. Main topics. Exam format. Particular topics. How to revise. Exam format Main topics How to revise In This Lecture Exam format Main topics How to revise Database Systems Lecture 18 Natasha Alechina Exam format Answer three questions out of five Each question is worth 25 points I will only mark three

More information

transaction - (another def) - the execution of a program that accesses or changes the contents of the database

transaction - (another def) - the execution of a program that accesses or changes the contents of the database Chapter 19-21 - Transaction Processing Concepts transaction - logical unit of database processing - becomes interesting only with multiprogramming - multiuser database - more than one transaction executing

More information

Introduction to Transaction Management

Introduction to Transaction Management Introduction to Transaction Management CMPSCI 645 Apr 1, 2008 Slide content adapted from Ramakrishnan & Gehrke, Zack Ives 1 Concurrency Control Concurrent execution of user programs is essential for good

More information

Advanced Databases. Lecture 9- Concurrency Control (continued) Masood Niazi Torshiz Islamic Azad University- Mashhad Branch

Advanced Databases. Lecture 9- Concurrency Control (continued) Masood Niazi Torshiz Islamic Azad University- Mashhad Branch Advanced Databases Lecture 9- Concurrency Control (continued) Masood Niazi Torshiz Islamic Azad University- Mashhad Branch www.mniazi.ir Multiple Granularity Allow data items to be of various sizes and

More information

Transaction Processing Concurrency control

Transaction Processing Concurrency control Transaction Processing Concurrency control Hans Philippi March 14, 2017 Transaction Processing: Concurrency control 1 / 24 Transactions Transaction Processing: Concurrency control 2 / 24 Transaction concept

More information

Datenbanksysteme II: Implementation of Database Systems Synchronization of Concurrent Transactions

Datenbanksysteme II: Implementation of Database Systems Synchronization of Concurrent Transactions Datenbanksysteme II: Implementation of Database Systems Synchronization of Concurrent Transactions Material von Prof. Johann Christoph Freytag Prof. Kai-Uwe Sattler Prof. Alfons Kemper, Dr. Eickler Prof.

More information

ISSN: Monica Gahlyan et al, International Journal of Computer Science & Communication Networks,Vol 3(3),

ISSN: Monica Gahlyan et al, International Journal of Computer Science & Communication Networks,Vol 3(3), Waiting Algorithm for Concurrency Control in Distributed Databases Monica Gahlyan M-Tech Student Department of Computer Science & Engineering Doon Valley Institute of Engineering & Technology Karnal, India

More information

Concurrency Control. Chapter 17. Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1

Concurrency Control. Chapter 17. Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Concurrency Control Chapter 17 Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Conflict Schedules Two actions conflict if they operate on the same data object and at least one of them

More information