Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Freedom from Deadlock of Safe Locking Policies

Published: 01 May 1982 Publication History

Abstract

The usual method for preserving the consistency of a database when accessed (read and updated) concurrently by several transactions, is by locking the transactions according to some locking policy; a locking policy that guarantees the preservation of consistency of the database is called safe. Furthermore, if no deadlocks can arise the policy is called deadlock-free. In this paper we are concerned with the freedom from deadlock of safe locking policies. We show that a simple extension of the DAG policy of [Y] is the most general safe and deadlock-free policy for a pair of transactions. We prove however, that it is NP-complete to test whether a set of transactions is not deadlock-free even for the simplest kind of transactions, those that are two-phase locked [E]. We show that for the natural class of safe locking policies, the L-policies, studied in [Y], freedom from deadlock is determined only by the order in which entities are accessed by the transactions and not by the way in which safety is ensured. As a consequence of this fact we develop simple conditions that guarantee the freedom from deadlock of a safe L-policy.

References

[1]
Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, The design and analysis of computer algorithms, Addison-Wesley Publishing Co., Reading, Mass.-London-Amsterdam, 1975x+470
[2]
R. Bayer, M. Schkolnick, Concurrency of operations on B-trees, Acta Informat., 9 (1977/78), 1–21
[3]
K. P. Eswaran, J. N. Gray, R. A. Lorie, I. L. Traiger, The notions of consistency and predicate locks in a database system, Comm. ACM, 19 (1976), 624–633
[4]
Michael R. Garey, David S. Johnson, Computers and intractability, W. H. Freeman and Co., San Francisco, Calif., 1979x+338, A Guide to the Theory of NP-Completeness
[5]
J. N. Gray, R. A. Lorie, G. R. Putzolu, I. L. Traiger, Granularity of locks and degrees of consistency in a shared data base, Research Report, RJ 1654, IBM, 1975
[6]
J. N. Gray, Notes on database operating systems, Research Report, RJ 2188, IBM, 1978
[7]
Z. Kedem, A. Silberschatz, Controlling concurrency using locking protocols, Proc. of the 20th Annual Symp; on Foundations of Computer Science, 1979, 274–285
[8]
H. T. Kung, C. H. Papadimitriou, An optimality theory of concurrency control for databases, ACM/SIGMOD Intern. Symp. on Management of Data, 1979, 116–126
[9]
Y. E. Lien, P. J. Weinberger, Consistency, concurrency, and crash recovery, ACM/SIGMOD Intern. Symp, on Management of Data, 1978, 9–15
[10]
Christos H. Papadimitriou, The serializability of concurrent database updates, J. Assoc. Comput. Mach., 26 (1979), 631–653
[11]
Christos H. Papadimitriou, Philip A. Bernstein, James B. Rothnie, Some computational problems related to database concurrency control, Proceedings of a Conference on Theoretical Computer Science (Univ. Waterloo, Waterloo, Ont., 1977), Comput. Sci. Dept., Univ. Waterloo, Waterloo, Ont., 1978, 275–282
[12]
B. Samadi, B-trees in a system with multiple users, Information Processing Letters, 5 (1976), 107–112
[13]
Abraham Silberschatz, Zvi Kedem, Consistency in hierarchical database systems, J. Assoc. Comput. Mach., 27 (1980), 72–80
[14]
R. E. Stearns, P. M. Lewis, D. J. Rosenkrantz, Concurrency control for database systems, 17th Annual Symposium on Foundations of Computer Science (Houston, Tex., 1976), IEEE Comput. Soc., Long Beach, Calif., 1976, 19–32
[15]
Jeffrey D. Ullman, Principles of database systems, Computer Science Press, Rockville, Md., 1980, 379–
[16]
Mihalis Yannakakis, A theory of safe locking policies in database systems, J. Assoc. Comput. Mach., 29 (1982), 718–740
[17]
M. Yannakakis, C. H. Papadimitriou, H. T. Kung, Locking policies: safety and freedom from deadlock, Proc. of the 20th Annual Symp, on Foundations of Computer Science, 1979, 286–297

Cited By

View all
  • (1985)Safety of non-well-locked transaction systemsProceedings of the fifth ACM SIGACT-SIGMOD symposium on Principles of database systems10.1145/6012.15403(47-52)Online publication date: 1-Jun-1985
  • (1984)Concurrency control in graph protocols by using edge locksProceedings of the 3rd ACM SIGACT-SIGMOD symposium on Principles of database systems10.1145/588011.588019(45-50)Online publication date: 2-Apr-1984
  • (1984)Maximal concurrency by lockingProceedings of the 3rd ACM SIGACT-SIGMOD symposium on Principles of database systems10.1145/588011.588018(38-44)Online publication date: 2-Apr-1984

Recommendations

Comments

Information & Contributors

Information

Published In

cover image SIAM Journal on Computing
SIAM Journal on Computing  Volume 11, Issue 2
May 1982
208 pages
ISSN:0097-5397
DOI:10.1137/smjcat.1982.11.issue-2
Issue’s Table of Contents

Publisher

Society for Industrial and Applied Mathematics

United States

Publication History

Published: 01 May 1982

Author Tags

  1. database
  2. concurrency control
  3. transaction
  4. locking policy
  5. serializability
  6. safety
  7. deadlock

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (1985)Safety of non-well-locked transaction systemsProceedings of the fifth ACM SIGACT-SIGMOD symposium on Principles of database systems10.1145/6012.15403(47-52)Online publication date: 1-Jun-1985
  • (1984)Concurrency control in graph protocols by using edge locksProceedings of the 3rd ACM SIGACT-SIGMOD symposium on Principles of database systems10.1145/588011.588019(45-50)Online publication date: 2-Apr-1984
  • (1984)Maximal concurrency by lockingProceedings of the 3rd ACM SIGACT-SIGMOD symposium on Principles of database systems10.1145/588011.588018(38-44)Online publication date: 2-Apr-1984

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media