ADB Chapter 3
ADB Chapter 3
ADB Chapter 3
2
1. Introduction to Transaction Processing (1)
• Single-User System:
– At most one user at a time can use the system.
• Multiuser System:
– Many users can access the system concurrently.
• Concurrency
– Interleaved processing:
• Concurrent execution of processes is interleaved in a single CPU
– Parallel processing:
• Processes are concurrently executed in multiple CPUs.
3
Introduction to Transaction Processing (2)
• A Transaction:
– Logical unit of database processing that includes one or more access operations (read
(retrieval), write (insert) or update, delete).
• Transaction boundaries:
• An application program may contain several transactions separated by the Begin and End
transaction boundaries.
4
Introduction to Transaction Processing (3)
• Granularity is the level of detail at which data are stored in a database. how detail-oriented
a single field is.
– read_item(X): Reads a database item named X into a program variable. To simplify our
notation, we assume that the program variable is also named X.
– write_item(X): Writes the value of program variable X into the database item named X.
5
Introduction to Transaction Processing (4)
READ AND WRITE OPERATIONS:
• Basic unit of data transfer from the disk to the computer main memory is one block. In
general, a data item (that is read or written) will be the field of some record in the database,
although it may be a larger unit such as a record or even a whole block.
– Copy that disk block into a buffer in main memory (if that disk block is not already in
some main memory buffer).
6
Introduction to Transaction Processing (5)
READ AND WRITE OPERATIONS (contd.):
– Copy that disk block into a buffer in main memory (if that disk block is not already in
some main memory buffer).
– Copy item X from the program variable named X into its correct location in the buffer.
– Store the updated block from the buffer back to disk (either immediately or at some later
point in time).
7
Two sample transactions
• FIGURE 17.2 Two sample transactions:
– (a) Transaction T1
– (b) Transaction T2
8
The functions that a DBMS should provide
• Among the various functions the three closely related functions that are intended to ensure that the
database is reliable and remains in a consistent state are:
1. transaction support,
2. concurrency control services, and
3. recovery services
• They are mutually dependent.
• Both concurrency control and recovery are required to protect the database from data
inconsistencies and data loss.
• concurrency control protocol prevents database accesses from interfering with one another.
• Database recovery is the process of restoring the database to a correct state following a
failure.
9
Introduction to Transaction Processing (6)
Why Concurrency Control is needed:
11
Concurrent execution is uncontrolled: (b) The temporary update
problem.
12
Concurrent execution is uncontrolled: (c) The incorrect summary problem.
13
Introduction to Transaction Processing (12)
Why recovery is needed:
14
Introduction to Transaction Processing (13)
Why recovery is needed (Contd.):
– For recovery purposes, the system needs to keep track of when the transaction starts,
terminates, and commits or aborts.
• Transaction states:
– Active state
– Committed state
– Failed state
– Terminated/Aborted State
17
Transaction and System Concepts (2)
• Recovery manager keeps track of the following operations:
– begin_transaction: This marks the beginning of transaction execution.
– read or write: These specify read or write operations on the database items that are
executed as part of a transaction.
– end_transaction: This specifies that read and write transaction operations have ended
and marks the end limit of transaction execution.
• At this point it may be necessary to check whether the changes introduced by the
transaction can be permanently applied to the database or whether the transaction
has to be aborted because it violates concurrency control or for some other reason.
18
Transaction and System Concepts (3)
– commit_transaction: This signals a successful end of the transaction so that any changes
(updates) executed by the transaction can be safely committed to the database and will
not be undone.
– rollback (or abort): This signals that the transaction has ended unsuccessfully, so that
any changes or effects that the transaction may have applied to the database must be
undone.
19
Transaction and System Concepts (4)
– redo: This specifies that certain transaction operations must be redone to ensure that all
the operations of a committed transaction have been applied successfully to the
database.
20
State transition diagram illustrating the states for transaction execution
21
Transaction and System Concepts (6)
– Log or Journal: The log keeps track of all transaction operations that affect the values of
database items.
• The log is kept on disk, so it is not affected by any type of failure except for disk or
catastrophic failure.
22
Transaction and System Concepts (7)
• The System Log (cont):
– T in the following discussion refers to a unique transaction-id that is generated
automatically by the system and is used to identify each transaction:
– Types of log record:
• [start_transaction,T]: Records that transaction T has started execution.
• [write_item,T,X,old_value,new_value]: Records that transaction T has changed the value of
database item X from old_value to new_value.
• [read_item,T,X]: Records that transaction T has read the value of database item X.
• [commit,T]: Records that transaction T has completed successfully, and affirms that its effect
can be committed (recorded permanently) to the database.
• [abort,T]: Records that transaction T has been aborted.
23
Transaction and System Concepts (9)
Recovery using log records:
• If the system crashes, we can recover to a consistent database state by examining the log:
1. Because the log contains a record of every write operation that changes the value of some
database item, it is possible to undo the effect of these write operations of a transaction T
by tracing backward through the log and resetting all items changed by a write operation of
T to their old_values.
2. We can also redo the effect of the write operations of a transaction T by tracing forward
through the log and setting all items changed by a write operation of T (that did not get
done permanently) to their new_values.
25
Transaction and System Concepts (10)
Commit Point of a Transaction:
• Definition a Commit Point:
– A transaction T reaches its commit point when all its operations that access the database have been
executed successfully and the effect of all the transaction operations on the database has been
recorded in the log.
– Beyond the commit point, the transaction is said to be committed, and its effect is assumed to be
permanently recorded in the database.
• Redoing transactions:
– Transactions that have written their commit entry in the log must also have recorded all their write
operations in the log; otherwise they would not be committed, so their effect on the database can be
redone from the log entries. (Notice that the log file must be kept on disk)
– At the time of a system crash, only the log entries that have been written back to disk are considered in the
recovery process because the contents of main memory may be lost.)
– Before a transaction reaches its commit point, any portion of the log that has not been written to the disk
yet must now be written to the disk.
– This process is called force-writing the log file before committing a transaction.
27
3. Desirable Properties of Transactions (1)
ACID properties:
• Consistency preservation: A correct execution of the transaction must take the database from
one consistent state to another.
• Isolation: A transaction should not make its updates visible to other transactions until it is
committed; this property, when enforced strictly, solves the temporary update problem and
makes cascading rollbacks of transactions unnecessary.
• Durability or permanency: Once a transaction changes the database and the changes are
committed, these changes must never be lost because of subsequent failure.
28
4. Characterizing Schedules based on Recoverability (1)
Schedules and Recoverability
– Note, however, that operations from other transactions Tj can be interleaved with the operations of
Ti in S.
Characterizing Schedules based on Recoverability (2)
Schedules classified on recoverability:
• Recoverable schedule:
• Cascadeless schedule:
– One where every transaction reads only the items that are written by committed
transactions.
Characterizing Schedules based on Recoverability (3)
Schedules classified on recoverability (contd.):
– A schedule in which uncommitted transactions that read an item from a failed transaction
must be rolled back.
• Strict Schedules:
– A schedule in which a transaction can neither read or write an item X until the last
transaction that wrote X has committed.
5. Characterizing Schedules based on Serializability (1)
• Serial schedule:
– A schedule S is serial if, for every transaction T participating in the schedule, all the
operations of T are executed consecutively in the schedule.
• Serializable schedule:
• Serializability
• In serializability, the ordering of read and write operations is important:
– If two transactions only read a data item, they do not conflict and order is not important.
– If two transactions either read or write completely separate data items, they do not
conflict and order is not important.
– If one transaction writes a data item and another either reads or writes the same data
item, the order of execution is important.
Characterizing Schedules based on Serializability (2)
• Result equivalent:
– Two schedules are called result equivalent if they produce the same final state of the
database.
• Conflict equivalent:
– Two schedules are said to be conflict equivalent if the order of any two conflicting
operations is the same in both schedules.
• Conflict serializable:
– The interleaving is appropriate and will result in a state as if the transactions were
serially executed, yet will achieve efficiency due to concurrent execution.
35
Characterizing Schedules based on Serializability (4)
36
Characterizing Schedules based on Serializability (5)
• It’s not possible to determine when a schedule begins and when it ends.
– Hence, we reduce the problem of checking the whole schedule to checking only a
committed project of the schedule (i.e. operations from only the committed
transactions.)
• There are two main concurrency control techniques that allow transactions to execute safely
in parallel subject to certain constraints:
– locking and
– timestamp methods.
37
Characterizing Schedules based on Serializability (6)
• View serializability:
38
Characterizing Schedules based on Serializability (7)
Two schedules are said to be view equivalent if the following three conditions hold:
1. The same set of transactions participates in S and S’, and S and S’ include the
same operations of those transactions.
2. For any operation Ri(X) of Ti in S, if the value of X read by the operation has
been written by an operation Wj(X) of Tj (or if it is the original value of X before
the schedule started), the same condition must hold for the value of X read by
operation Ri(X) of Ti in S’.
3. If the operation Wk(Y) of Tk is the last operation to write item Y in S, then Wk(Y)
of Tk must also be the last operation to write item Y in S’.
39
Characterizing Schedules based on Serializability (8)
– As long as each read operation of a transaction reads the result of the same write
operation in both schedules, the write operations of each transaction must
produce the same results.
– “The view”: the read operations are said to see the same view in both schedules.
40
Characterizing Schedules based on Serializability (9)
– The two are same under constrained write assumption which assumes that if T
writes X, it is constrained by the value of X it read; i.e., new X = f(old X)
– Any conflict serializable schedule is also view serializable, but not vice versa.
41
Characterizing Schedules based on Serializability (10)
• Relationship between view and conflict equivalence (cont):
• In Sa, the operations w2(X) and w3(X) are blind writes, since T1 and T3 do not read
the value of X.
– Sa is view serializable, since it is view equivalent to the serial schedule T1, T2, T3.
42
Characterizing Schedules based on Serializability (11)
Testing for conflict serializability: Algorithm:
– The schedule is serializable if and only if the precedence graph has no cycles.
43
Constructing the Precedence Graphs
FIGURE 17.7 Constructing the precedence graphs for schedules A and D from Figure 17.5 to
test for conflict serializability.
– (a) Precedence graph for serial schedule A.
– (b) Precedence graph for serial schedule B.
– (c) Precedence graph for schedule C (not serializable).
– (d) Precedence graph for schedule D (serializable, equivalent to schedule A).
44
Another example of serializability Testing
45
Another Example of Serializability Testing
46
Another Example of Serializability Testing
47
Characterizing Schedules based on Serializability (14)
• Under special semantic constraints, schedules that are otherwise not conflict
serializable may work correctly.
48
6. Transaction Support in SQL2 (1)
– Either the statement completes execution without error or it fails and leaves the
database unchanged.
• Every transaction must have an explicit end statement, which is either a COMMIT or
ROLLBACK.
49
Transaction Support in SQL2 (2)
Characteristics specified by a SET TRANSACTION statement in SQL2:
• Access mode:
• The default is READ WRITE unless the isolation level of READ UNCOMITTED is
specified, in which case READ ONLY is assumed.
50
Transaction Support in SQL2 (3)
Characteristics specified by a SET TRANSACTION statement in SQL2 (contd.):
– With SERIALIZABLE: the interleaved execution of transactions will adhere to our notion of
serializability.
– However, if any transaction executes at a lower level, then serializability may be violated.
51
Transaction Support in SQL2 (4)
Potential problem with lower isolation levels:
• Dirty Read:
• Non-repeatable Read:
– Allowing another transaction to write a new value between multiple reads of one
transaction.
– A transaction T1 may read a given value from a table. If another transaction T2 later
updates that value and T1 reads that value again, T1 will see a different value.
• Consider that T1 reads the employee salary for Smith. Next, T2 updates the salary for
Smith. If T1 reads Smith's salary again, then it will see a different value for Smith's
salary.
52
Transaction Support in SQL2 (5)
– Phantoms:
• New rows being read using the same read with a condition.
– Now suppose that a transaction T2 inserts a new row that also satisfies the
WHERE clause condition of T1, into the table used by T1.
– If T1 is repeated, then T1 will see a row that previously did not exist, called a
phantom.
53
Transaction Support in SQL2 (6)
Type of Violation
______________________________________________________
Isolation Dirty non repeatable
level read read phantom
_______________________________________________________
READ UNCOMMITTED yes yes yes
READ COMMITTED no yes yes
REPEATABLE READ no no yes
SERIALIZABLE no no no
Slide 17- 55