17 Locking Intro to Database Systems Andy Pavlo AP AP - - PowerPoint PPT Presentation

17
SMART_READER_LITE
LIVE PREVIEW

17 Locking Intro to Database Systems Andy Pavlo AP AP - - PowerPoint PPT Presentation

Two-Phase 17 Locking Intro to Database Systems Andy Pavlo AP AP 15-445/15-645 Computer Science Carnegie Mellon University Fall 2020 2 ADM IN ISTRIVIA Project #3 is due Sun Nov 22 nd @ 11:59pm. Homework #4 is due Sun Nov 8 th @ 11:59pm.


slide-1
SLIDE 1

Intro to Database Systems 15-445/15-645 Fall 2020 Andy Pavlo Computer Science Carnegie Mellon University

AP AP

17

Two-Phase Locking

slide-2
SLIDE 2

15-445/645 (Fall 2020)

ADM IN ISTRIVIA

Project #3 is due Sun Nov 22nd @ 11:59pm. Homework #4 is due Sun Nov 8th @ 11:59pm.

2

slide-3
SLIDE 3

15-445/645 (Fall 2020)

ADM IN ISTRIVIA

Sign up for the student-run discussion groups.

→ Small group of at most 10 students where you can discuss the implementation details of the projects. → You can share test code, but you are not allowed to share implementation code.

See Piazza@906 for more details.

3

slide-4
SLIDE 4

15-445/645 (Fall 2020)

UPCO M IN G DATABASE TALKS

MySQL Query Optimizer

→ Monday Nov 2nd @ 5pm ET

EraDB "Magical Indexes"

→ Monday Nov 9th @ 5pm ET

FaunaDB Serverless DBMS

→ Monday Nov 16th @ 5pm ET

4

slide-5
SLIDE 5

15-445/645 (Fall 2020)

LAST CLASS

Conflict Serializable

→ Verify using either the "swapping" method or dependency graphs. → Any DBMS that says that they support "serializable" isolation does this.

View Serializable

→ No efficient way to verify. → Andy doesn't know of any DBMS that supports this.

5

slide-6
SLIDE 6

15-445/645 (Fall 2020)

EXAM PLE

6

BEGIN R(A) W(A) R(A) COMMIT BEGIN R(A) W(A) COMMIT

TIM E

Schedule

T1 T2

slide-7
SLIDE 7

15-445/645 (Fall 2020)

EXAM PLE

6

BEGIN R(A) W(A) R(A) COMMIT BEGIN R(A) W(A) COMMIT

TIM E

Schedule

T1 T2

slide-8
SLIDE 8

15-445/645 (Fall 2020)

O BSERVATIO N

We need a way to guarantee that all execution schedules are correct (i.e., serializable) without knowing the entire schedule ahead of time. Solution: Use locks to protect database objects.

7

slide-9
SLIDE 9

15-445/645 (Fall 2020)

Lock Manager

EXECUTIN G WITH LO CKS

8

Granted (T1→A) Denied! Granted (T2→A) Released (T1→A) Released (T2→A)

TIM E

BEGIN LOCK(A) R(A) W(A) R(A) UNLOCK(A) COMMIT BEGIN LOCK(A) R(A) W(A) UNLOCK(A) COMMIT

Schedule

T1 T2

slide-10
SLIDE 10

15-445/645 (Fall 2020)

TO DAY'S AGEN DA

Lock Types Two-Phase Locking Deadlock Detection + Prevention Hierarchical Locking Isolation Levels

9

slide-11
SLIDE 11

15-445/645 (Fall 2020)

LO CKS VS. LATCH ES

10

Locks Latches

Separate… User transactions Threads Protect… Database Contents In-Memory Data Structures During… Entire Transactions Critical Sections Modes… Shared, Exclusive, Update, Intention Read, Write Deadlock Detection & Resolution Avoidance …by… Waits-for, Timeout, Aborts Coding Discipline Kept in… Lock Manager Protected Data Structure

Source: Goetz Graefe

slide-12
SLIDE 12

15-445/645 (Fall 2020)

BASIC LO CK TYPES

S-LOCK: Shared locks for reads. X-LOCK: Exclusive locks for writes.

11

Shared Exclusive Shared

X

Exclusive

X X

Compatibility Matrix

slide-13
SLIDE 13

15-445/645 (Fall 2020)

EXECUTIN G WITH LO CKS

Transactions request locks (or upgrades). Lock manager grants or blocks requests. Transactions release locks. Lock manager updates its internal lock-table.

→ It keeps track of what transactions hold what locks and what transactions are waiting to acquire any locks.

12

slide-14
SLIDE 14

15-445/645 (Fall 2020)

Schedule Lock Manager

BEGIN X-LOCK(A) R(A) W(A) UNLOCK(A) S-LOCK(A) R(A) UNLOCK(A) COMMIT BEGIN X-LOCK(A) W(A) UNLOCK(A) COMMIT

EXECUTIN G WITH LO CKS

13

Granted (T1→A) Granted (T2→A) Released (T1→A) Released (T2→A) Granted (T1→A) Released (T1→A)

TIM E

T1 T2

slide-15
SLIDE 15

15-445/645 (Fall 2020)

Schedule Lock Manager

BEGIN X-LOCK(A) R(A) W(A) UNLOCK(A) S-LOCK(A) R(A) UNLOCK(A) COMMIT BEGIN X-LOCK(A) W(A) UNLOCK(A) COMMIT

EXECUTIN G WITH LO CKS

13

Granted (T1→A) Granted (T2→A) Released (T1→A) Released (T2→A) Granted (T1→A) Released (T1→A)

TIM E

T1 T2

slide-16
SLIDE 16

15-445/645 (Fall 2020)

CO N CURREN CY CO N TRO L PROTO CO L

Two-phase locking (2PL) is a concurrency control protocol that determines whether a txn can access an object in the database on the fly. The protocol does not need to know all the queries that a txn will execute ahead of time.

14

slide-17
SLIDE 17

15-445/645 (Fall 2020)

TWO - PH ASE LO CKIN G

Phase #1: Growing

→ Each txn requests the locks that it needs from the DBMS’s lock manager. → The lock manager grants/denies lock requests.

Phase #2: Shrinking

→ The txn is allowed to only release locks that it previously

  • acquired. It cannot acquire new locks.

15

slide-18
SLIDE 18

15-445/645 (Fall 2020)

TWO - PH ASE LO CKIN G

The txn is not allowed to acquire/upgrade locks after the growing phase finishes.

16

# of Locks

TIM E

Growing Phase Shrinking Phase

Transaction Lifetime

slide-19
SLIDE 19

15-445/645 (Fall 2020)

TWO - PH ASE LO CKIN G

The txn is not allowed to acquire/upgrade locks after the growing phase finishes.

17

TIM E

Transaction Lifetime

# of Locks

2PL Violation!

Growing Phase Shrinking Phase

slide-20
SLIDE 20

15-445/645 (Fall 2020)

Lock Manager

BEGIN X-LOCK(A) R(A) W(A) R(A) UNLOCK(A) COMMIT BEGIN X-LOCK(A) W(A) UNLOCK(A) COMMIT

EXECUTIN G WITH 2PL

18

Granted (T1→A) Denied!

TIM E

Schedule

T1 T2

slide-21
SLIDE 21

15-445/645 (Fall 2020)

Lock Manager

BEGIN X-LOCK(A) R(A) W(A) R(A) UNLOCK(A) COMMIT BEGIN X-LOCK(A) W(A) UNLOCK(A) COMMIT

EXECUTIN G WITH 2PL

18

Granted (T1→A) Denied! Released (T2→A) Released (T1→A) Granted (T2→A)

TIM E

Schedule

T1 T2

slide-22
SLIDE 22

15-445/645 (Fall 2020)

TWO - PH ASE LO CKIN G

2PL on its own is sufficient to guarantee conflict serializability.

→ It generates schedules whose precedence graph is acyclic.

But it is subject to cascading aborts.

19

slide-23
SLIDE 23

15-445/645 (Fall 2020)

Schedule

T1 T2

2PL CASCADIN G ABO RTS

20

This is a permissible schedule in 2PL, but the DBMS has to also abort T2 when T1 aborts.

→ Any information about T1 cannot be "leaked" to the outside world.

BEGIN X-LOCK(A) X-LOCK(B) R(A) W(A) UNLOCK(A) R(B) W(B) ABORT BEGIN X-LOCK(A) R(A) W(A) ⋮

This is all wasted work!

TIM E

slide-24
SLIDE 24

15-445/645 (Fall 2020)

2PL O BSERVATIO N S

There are potential schedules that are serializable but would not be allowed by 2PL.

→ Locking limits concurrency.

May still have "dirty reads".

→ Solution: Strong Strict 2PL (aka Rigorous 2PL)

May lead to deadlocks.

→ Solution: Detection or Prevention

21

slide-25
SLIDE 25

15-445/645 (Fall 2020)

STRO N G STRICT TWO - PH ASE LO CKIN G

The txn is not allowed to acquire/upgrade locks after the growing phase finishes. Allows only conflict serializable schedules, but it is

  • ften stronger than needed for some apps.

22

TIM E

# of Locks

Release all locks at end of txn.

Growing Phase Shrinking Phase

slide-26
SLIDE 26

15-445/645 (Fall 2020)

STRO N G STRICT TWO - PH ASE LO CKIN G

A schedule is strict if a value written by a txn is not read or overwritten by other txns until that txn finishes. Advantages:

→ Does not incur cascading aborts. → Aborted txns can be undone by just restoring original values of modified tuples.

23

slide-27
SLIDE 27

15-445/645 (Fall 2020)

EXAM PLES

T1 – Move $100 from Andy’s account (A) to his bookie’s account (B). T2 – Compute the total amount in all accounts and return it to the application.

24

BEGIN A=A-100 B=B+100 COMMIT BEGIN ECHO A+B COMMIT

T1 T2

slide-28
SLIDE 28

15-445/645 (Fall 2020)

Schedule

T1 T2

N O N- 2PL EXAM PLE

25

A=1000, B=1000

Initial Database State

A+B=1100

T2 Output

BEGIN X-LOCK(A) R(A) A=A-100 W(A) UNLOCK(A) X-LOCK(B) R(B) B=B+100 W(B) UNLOCK(B) COMMIT BEGIN S-LOCK(A) R(A) UNLOCK(A) S-LOCK(B) R(B) UNLOCK(B) ECHO A+B COMMIT

TIM E

slide-29
SLIDE 29

15-445/645 (Fall 2020)

2PL EXAM PLE

26

BEGIN X-LOCK(A) R(A) A=A-100 W(A) X-LOCK(B) UNLOCK(A) R(B) B=B+100 W(B) UNLOCK(B) COMMIT BEGIN S-LOCK(A) R(A) S-LOCK(B) R(B) UNLOCK(A) UNLOCK(B) ECHO A+B COMMIT

TIM E

Schedule

T1 T2

A=1000, B=1000

Initial Database State

A+B=2000

T2 Output

slide-30
SLIDE 30

15-445/645 (Fall 2020)

STRO N G STRICT 2PL EXAM PLE

27

BEGIN X-LOCK(A) R(A) A=A-100 W(A) X-LOCK(B) R(B) B=B+100 W(B) UNLOCK(A) UNLOCK(B) COMMIT BEGIN S-LOCK(A) R(A) S-LOCK(B) R(B) ECHO A+B UNLOCK(A) UNLOCK(B) COMMIT

TIM E

Schedule

T1 T2

A=1000, B=1000

Initial Database State

A+B=2000

T2 Output

slide-31
SLIDE 31

15-445/645 (Fall 2020)

All Schedules

UN IVERSE O F SCH EDULES

28

View Serializable Conflict Serializable No Cascading Aborts Strong Strict 2PL Serial

slide-32
SLIDE 32

15-445/645 (Fall 2020)

2PL O BSERVATIO N S

There are potential schedules that are serializable but would not be allowed by 2PL.

→ Locking limits concurrency.

May still have "dirty reads".

→ Solution: Strong Strict 2PL (Rigorous)

May lead to deadlocks.

→ Solution: Detection or Prevention

29

slide-33
SLIDE 33

15-445/645 (Fall 2020)

Schedule

T1 T2

Lock Manager

BEGIN X-LOCK(A) R(A) X-LOCK(B) BEGIN S-LOCK(B) R(B) S-LOCK(A)

SH IT J UST GOT REAL, SO N

30

Granted (T1→A) Denied! Granted (T2→B) Denied!

TIM E

slide-34
SLIDE 34

15-445/645 (Fall 2020)

Schedule

T1 T2

Lock Manager

BEGIN X-LOCK(A) R(A) X-LOCK(B) BEGIN S-LOCK(B) R(B) S-LOCK(A)

SH IT J UST GOT REAL, SO N

30

Granted (T1→A) Denied! Granted (T2→B) Denied!

TIM E

slide-35
SLIDE 35

15-445/645 (Fall 2020)

2PL DEADLO CKS

A deadlock is a cycle of transactions waiting for locks to be released by each other. Two ways of dealing with deadlocks:

→ Approach #1: Deadlock Detection → Approach #2: Deadlock Prevention

31

slide-36
SLIDE 36

15-445/645 (Fall 2020)

DEADLO CK DETECTIO N

The DBMS creates a waits-for graph to keep track of what locks each txn is waiting to acquire:

→ Nodes are transactions → Edge from Ti to Tj if Ti is waiting for Tj to release a lock.

The system periodically checks for cycles in waits- for graph and then decides how to break it.

32

slide-37
SLIDE 37

15-445/645 (Fall 2020)

DEADLO CK DETECTIO N

33

T1 T2 T3

BEGIN S-LOCK(A) S-LOCK(B) BEGIN X-LOCK(B) X-LOCK(C) BEGIN S-LOCK(C) X-LOCK(A)

TIM E

Schedule

T1 T2 T3

Waits-For Graph

slide-38
SLIDE 38

15-445/645 (Fall 2020)

DEADLO CK DETECTIO N

33

T1 T2 T3

BEGIN S-LOCK(A) S-LOCK(B) BEGIN X-LOCK(B) X-LOCK(C) BEGIN S-LOCK(C) X-LOCK(A)

TIM E

Schedule

T1 T2 T3

Waits-For Graph

slide-39
SLIDE 39

15-445/645 (Fall 2020)

DEADLO CK DETECTIO N

33

T1 T2 T3

BEGIN S-LOCK(A) S-LOCK(B) BEGIN X-LOCK(B) X-LOCK(C) BEGIN S-LOCK(C) X-LOCK(A)

TIM E

Schedule

T1 T2 T3

Waits-For Graph

slide-40
SLIDE 40

15-445/645 (Fall 2020)

DEADLO CK H AN DLIN G

When the DBMS detects a deadlock, it will select a "victim" txn to rollback to break the cycle. The victim txn will either restart or abort(more common) depending on how it was invoked. There is a trade-off between the frequency of checking for deadlocks and how long txns have to wait before deadlocks are broken.

34

slide-41
SLIDE 41

15-445/645 (Fall 2020)

DEADLO CK H AN DLIN G: VICTIM SELECTIO N

Selecting the proper victim depends on a lot of different variables….

→ By age (lowest timestamp) → By progress (least/most queries executed) → By the # of items already locked → By the # of txns that we have to rollback with it

We also should consider the # of times a txn has been restarted in the past to prevent starvation.

35

slide-42
SLIDE 42

15-445/645 (Fall 2020)

DEADLO CK H AN DLIN G: RO LLBACK LEN GTH

After selecting a victim txn to abort, the DBMS can also decide on how far to rollback the txn's changes. Approach #1: Completely Approach #2: Minimally

36

slide-43
SLIDE 43

15-445/645 (Fall 2020)

DEADLO CK PREVEN TIO N

When a txn tries to acquire a lock that is held by another txn, the DBMS kills one of them to prevent a deadlock. This approach does not require a waits-for graph

  • r detection algorithm.

37

slide-44
SLIDE 44

15-445/645 (Fall 2020)

DEADLO CK PREVEN TIO N

Assign priorities based on timestamps:

→ Older Timestamp = Higher Priority (e.g., T1 > T2)

Wait-Die ("Old Waits for Young")

→ If requesting txn has higher priority than holding txn, then requesting txn waits for holding txn. → Otherwise requesting txn aborts.

Wound-Wait ("Young Waits for Old")

→ If requesting txn has higher priority than holding txn, then holding txn aborts and releases lock. → Otherwise requesting txn waits.

38

slide-45
SLIDE 45

15-445/645 (Fall 2020)

DEADLO CK PREVEN TIO N

39

BEGIN X-LOCK(A) ⋮ BEGIN X-LOCK(A) ⋮ BEGIN X-LOCK(A) ⋮ BEGIN X-LOCK(A) ⋮

Wait-Die

T1 waits

Wound-Wait

T2 aborts

Wait-Die

T2 aborts

Wound-Wait

T2 waits T1 T2 T1 T2

slide-46
SLIDE 46

15-445/645 (Fall 2020)

DEADLO CK PREVEN TIO N

Why do these schemes guarantee no deadlocks? Only one "type" of direction allowed when waiting for a lock. When a txn restarts, what is its (new) priority? Its original timestamp. Why?

40

slide-47
SLIDE 47

15-445/645 (Fall 2020)

O BSERVATIO N

All these examples have a one-to-one mapping from database objects to locks. If a txn wants to update one billion tuples, then it must acquire one billion locks. Acquiring locks is a more expensive operation than acquiring a latch even if that lock is available.

41

slide-48
SLIDE 48

15-445/645 (Fall 2020)

LO CK GRAN ULARITIES

When a txn wants to acquire a "lock", the DBMS can decide the granularity (i.e., scope) of that lock.

→ Attribute? Tuple? Page? Table?

The DBMS should ideally obtain fewest number of locks that a txn needs. Trade-off between parallelism versus overhead.

→ Fewer Locks, Larger Granularity vs. More Locks, Smaller Granularity.

42

slide-49
SLIDE 49

15-445/645 (Fall 2020)

DATABASE LO CK H IERARCH Y

43

Database Table 1 Table 2 Tuple 1 Attr 1 Tuple 2 Attr 2 Tuple n Attr n

T1

slide-50
SLIDE 50

15-445/645 (Fall 2020)

EXAM PLE

T1 – Get the balance of Andy's shady off-shore bank account. T2 – Increase Biden's bank account balance by 1%. What locks should these txns obtain?

→ Exclusive + Shared for leaf nodes of lock tree. → Special Intention locks for higher levels.

44

slide-51
SLIDE 51

15-445/645 (Fall 2020)

IN TEN TIO N LO CKS

An intention lock allows a higher-level node to be locked in shared or exclusive mode without having to check all descendent nodes. If a node is locked in an intention mode, then some txn is doing explicit locking at a lower level in the tree.

45

slide-52
SLIDE 52

15-445/645 (Fall 2020)

IN TEN TIO N LO CKS

Intention-Shared (IS)

→ Indicates explicit locking at lower level with shared locks.

Intention-Exclusive (IX)

→ Indicates explicit locking at lower level with exclusive locks.

Shared+Intention-Exclusive (SIX)

→ The subtree rooted by that node is locked explicitly in shared mode and explicit locking is being done at a lower level with exclusive-mode locks.

46

slide-53
SLIDE 53

15-445/645 (Fall 2020)

CO M PATIBILITY M ATRIX

47

IS IX S SIX X IS ✔ ✔ ✔ ✔ × IX ✔ ✔ × × × S ✔ × ✔ × × SIX ✔ × × × × X × × × × ×

T1 Holds T2 Wants

slide-54
SLIDE 54

15-445/645 (Fall 2020)

LO CKIN G PROTO CO L

Each txn obtains appropriate lock at highest level

  • f the database hierarchy.

To get S or IS lock on a node, the txn must hold at least IS on parent node. To get X, IX, or SIX on a node, must hold at least IX on parent node.

48

slide-55
SLIDE 55

15-445/645 (Fall 2020)

EXAM PLE TWO - LEVEL H IERARCH Y

49

Table R Tuple 2 Tuple 1 Tuple n

T1

Read

Read Andy's record in R.

slide-56
SLIDE 56

15-445/645 (Fall 2020)

EXAM PLE TWO - LEVEL H IERARCH Y

49

Table R Tuple 2 Tuple 1 Tuple n

T1

S

T1

IS

T1

Read

Read Andy's record in R.

slide-57
SLIDE 57

15-445/645 (Fall 2020)

EXAM PLE TWO - LEVEL H IERARCH Y

49

Table R Tuple 2 Tuple 1 Tuple n

T1

S

T1

IS

T1

T2

Write

Update Biden's record in R.

slide-58
SLIDE 58

15-445/645 (Fall 2020)

EXAM PLE TWO - LEVEL H IERARCH Y

49

Table R Tuple 2 Tuple 1 Tuple n

T1

S

T1

IS

T1

T2

X

T2

IX

T2

Write

Update Biden's record in R.

slide-59
SLIDE 59

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

Assume three txns execute at same time:

→ T1 – Scan R and update a few tuples. → T2 – Read a single tuple in R. → T3 – Scan all tuples in R.

50

Table R Tuple 2 Tuple 1 Tuple n

slide-60
SLIDE 60

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

51

Table R Tuple 1 Tuple n

T1

Read Read+Write

Tuple 2

Read

Scan R and update a few tuples.

slide-61
SLIDE 61

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

51

Table R Tuple 1 Tuple n

T1

SIX

T1

X

T1

Tuple 2

Scan R and update a few tuples.

slide-62
SLIDE 62

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

51

Table R Tuple 1 Tuple n

T1

SIX

T1

T2

X

T1

Read

Tuple 2

Read a single tuple in R.

slide-63
SLIDE 63

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

51

Table R Tuple 1 Tuple n

T1

S

T2

SIX

T1

T2

X

T1

IS

T2

Tuple 2

Read a single tuple in R.

slide-64
SLIDE 64

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

51

Table R Tuple 1 Tuple n

T1

S

T2

SIX

T1

T2

X

T1

IS

T2

Read

T3

Tuple 2

Read Read

Scan all tuples in R.

slide-65
SLIDE 65

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

51

Table R Tuple 1 Tuple n

T1

S

T2

SIX

T1

T2

X

T1

IS

T2

T3

Tuple 2

Scan all tuples in R. S

slide-66
SLIDE 66

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

51

Table R Tuple 1 Tuple n

T1

SIX

T1

X

T1

T3

Tuple 2

Scan all tuples in R. S

slide-67
SLIDE 67

15-445/645 (Fall 2020)

EXAM PLE TH REESO M E

51

Table R Tuple 1 Tuple n

X

T1

T3

Tuple 2

Scan all tuples in R. S S

T3

slide-68
SLIDE 68

15-445/645 (Fall 2020)

M ULTIPLE LO CK GRAN ULARITIES

Hierarchical locks are useful in practice as each txn

  • nly needs a few locks.

Intention locks help improve concurrency:

→ Intention-Shared (IS): Intent to get S lock(s) at finer granularity. → Intention-Exclusive (IX): Intent to get X lock(s) at finer granularity. → Shared+Intention-Exclusive (SIX): Like S and IX at the same time.

52

slide-69
SLIDE 69

15-445/645 (Fall 2020)

LO CK ESCALATIO N

Lock escalation dynamically asks for coarser- grained locks when too many low-level locks acquired. This reduces the number of requests that the lock manager must process.

53

slide-70
SLIDE 70

15-445/645 (Fall 2020)

LO CKIN G IN PRACTICE

You typically don't set locks manually in txns. Sometimes you will need to provide the DBMS with hints to help it to improve concurrency. Explicit locks are also useful when doing major changes to the database.

54

slide-71
SLIDE 71

15-445/645 (Fall 2020)

LO CK TABLE

Explicitly locks a table. Not part of the SQL standard.

→ Postgres/DB2/Oracle Modes: SHARE, EXCLUSIVE → MySQL Modes: READ, WRITE

55

LOCK TABLE <table> IN <mode> MODE; LOCK TABLE <table> <mode>; SELECT 1 FROM <table> WITH (TABLOCK, <mode>);

slide-72
SLIDE 72

15-445/645 (Fall 2020)

SELECT...FO R UPDATE

Perform a select and then sets an exclusive lock on the matching tuples. Can also set shared locks:

→ Postgres: FOR SHARE → MySQL: LOCK IN SHARE MODE

56

SELECT * FROM <table> WHERE <qualification> FOR UPDATE;

slide-73
SLIDE 73

15-445/645 (Fall 2020)

CO N CLUSIO N

2PL is used in almost DBMS. Automatically generates correct interleaving:

→ Locks + protocol (2PL, SS2PL ...) → Deadlock detection + handling → Deadlock prevention

57

slide-74
SLIDE 74

15-445/645 (Fall 2020)

N EXT CLASS

Timestamp Ordering Concurrency Control

58

slide-75
SLIDE 75

15-445/645 (Fall 2020)

PRO J ECT # 3 Q UERY EXECUTIO N

You will build a query execution engine in your DBMS.

59

R S

R.id=S.id value>100 MAX(R.val)

s

γ

SELECT MAX(R.val) FROM R JOIN S ON R.id = S.id WHERE S.value > 100

AggregationExecutor NestLoopJoinExecutor SeqScanExecutor IndexScanExecutor

Next() Next() Next()

slide-76
SLIDE 76

15-445/645 (Fall 2020)

PRO J ECT # 3 TASKS

Install Tables + Indexes in Catalog Plan Node Executors

→ Access Methods: Sequential Scan, Index Scan → Modifications: Insert, Update, Delete → Miscellaneous: Nest Loop Join, Index Join, Hash-based Aggregation, Limit/Offset

60

https://15445.courses.cs.cmu.edu/fall2020/project3/

slide-77
SLIDE 77

15-445/645 (Fall 2020)

DEVELO PM EN T H IN TS

Implement the Insert and Sequential Scan executors first so that you can populate tables and read from it. You do not need to worry about transactions. The aggregation hash table does not need to be backed by your buffer pool (i.e., use STL) Gradescope is for meant for grading, not

  • debugging. Write your own local tests.

61

slide-78
SLIDE 78

15-445/645 (Fall 2020)

TH IN GS TO N OTE

Do not change any file other than the ones that you submit to Gradescope. Rebase on top of the latest BusTub master branch. Post your questions on Piazza or come to TA

  • ffice hours.

62

slide-79
SLIDE 79

15-445/645 (Fall 2020)

PLAGIARISM WARN IN G

Your project implementation must be your own work.

→ You may not copy source code from other groups or the web. → Do not publish your implementation on Github.

Plagiarism will not be tolerated. See CMU's Policy on Academic Integrity for additional information.

63