locking
play

LOCKING CS 2550 / Spring 2006 Principles of Database Systems under - PowerPoint PPT Presentation

LOCKING CS 2550 / Spring 2006 Principles of Database Systems under multiple granularities 11 Timestamp Locking and Multiversion CC Alexandros Labrinidis University of Pittsburgh 2 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 /


  1. LOCKING CS 2550 / Spring 2006 Principles of Database Systems under multiple granularities 11 – Timestamp Locking and Multiversion CC Alexandros Labrinidis University of Pittsburgh 2 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Granularity And Atomicity Of Granularity of Locks Reads And Writes  Locking granularity is the size of the data item being Assume that locked.  Read/Write is done by blocks Example:  Locking granularity is record, and  page  Block b contains three records r1, r2, r3.  file  tuple (record)  field in a tuple  a particular field of all tuples (column)  The granularity of locks is unimportant w.r.t. correctness , but it is important w.r.t. performance . 3 4 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 1

  2. Granularity And Atomicity Of Granularity And Atomicity Of Reads And Writes Reads And Writes Database T 1 T 2 The granularity of locking must be at least as coarse as  b: r 1 r 2 r 3 the granularity of the atomic read and write. b: 0 0 0 rl(r 1 ) OR b’= r(b) [b’:000] Place another lock on block while read or write is performed; r 1 ← 8 [b’:800]   release it when operation completes (not according to 2PL rule). rl(r 2 ) Use Multi-Granularity Locking. wl(r 1 ) b’= r(b) [b’:000]   b: 8 0 0 w(b, b’) r 2 ← 6 [b’:060] wl(r 2 ) b: 0 6 0 w(b, b’) 5 6 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Multi-Granularity Locking Multi-Granularity Locking Define a hierarchy of granules where lower level granules are finer:  An instance of this hierarchy might be:  Database Areas Files Records 7 8 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 2

  3. Explicit, Implicit, And Intention Locks Explicit, Implicit, And Intention Locks  A lock on a granule x , explicitly locks x , and implicitly all  An intention lock on an item x means that a transaction its descendants in the same mode. performs some operation on a descendant of x .  What is the need for intention locks ?  If T i wants to lock a record, say R1.1, all R1.1's ancestors must be checked for a lock; R1.1 may be implicitly locked.  The operation may be determined by the type (mode of the intention lock:  If implicit locking is not available, a transaction T i that locks coarse granules should also lock all descendants.  irl (intention to read lock)  This defeats the purpose of introducing multiple granules!  iwl (intention to write lock) Why ?  riwl (read intention to write lock) 9 10 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Multi-Granularity 2PL Protocol Multi-Granularity 2PL Protocol Growing Phase (top down manner) The root of hierarchy must be locked first.   r w ir iw riw To set rl( x ) or irl(x), T i must have an irl or iwl on x's parent.   To set wl(x) or iwl(x), T i must have an iwl on x's parent.   r y n y n n To read (write) x, T i must have an rl (wl) on x or one of its ancestors (i.e., must be   implicitly or explicitly locked). w n n n n n Shrinking Phase (bottom up manner) ir y n y y y T i cannot release a lock on x if it holds a lock on any of x's children.   iw n n y y n Once T i unlocks at item, it cannot request another lock on any item.   riw n n y n n 11 12 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 3

  4. Implementing MGL Implementing MGL To rl(x) (or wl(x)), we must first irl (or iwl) all of x's ancestors  To rl(x) (or wl(x)), we must first irl (or iwl) all of x's  Who does this ? ancestors Who knows the granularity hierarchy in a system ? How about the Lock Manager ? Who does this ?  The LM has no idea of granules, etc. Who knows the granularity hierarchy in a system ? How about application programmers ?  They do not bother with lock/unlock operations even for a single item .  How about the Lock Manager ? A scheduler sends the appropriate lock requests to the LM. It predicts the need for coarse granularity   How about application programmers ? locks based on the transaction's recent behavior using escalation. In the system, where queries are compiled, the compiler may also generate coarse grain requests.   Scheduler?  It predicts the need for coarse granularity locks based on the transaction's recent behavior  it uses lock escalation.  In the system, where queries are compiled, the compiler may also generate coarse grain requests. 13 14 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Lock Escalation Lock Escalation  Transactions start locking at fine granularity.   When the number of lock requests exceeds a threshold, the scheduler (or TM) may do one of the following:  Escalate the granularity of the transaction's lock requests.  Escalating lock requests from level l k to level l k – 1 implies a lock conversion on level l k - 1 .  Restart the transaction, this time setting coarser grain locks. 15 16 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 4

  5. Timestamp Ordering  The basic idea: Timestamp Ordering  Each transaction T i has a timestamp ts(T i ) .  If the scheduler receives an operation by T i  and it has already processed a conflicting operation by T j  and ts(T i ) < ts(T j )  then T i is aborted .  When a transaction aborts, it must restart with a new (i.e. larger ) timestamp. 17 18 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Max Read/Write Timestamps Read/Write in Basic TO Read i (x) To decide whether an operation is in timestamp order, we associate two values   with each data item x . if ts(T i ) < max- wts(x) then max- rts(x) : Abort T i  the max ts of transactions that performed a Read on x . else send R i (x) to DM; max- rts(x) = max(max- rts(x), ts(T i )) If ts(Ti) = max- rts(x) then Ti is the youngest transaction that has read X successfully endif ; max- wts(x) :  Write i (x) the max ts of transactions that performed a Write on x .  if ts(T i ) < max- rts(x) or ts(T i ) < max- wts(x) then If ts(Ti) = max- wts(x) then Ti is the youngest transaction that has written X Abort T i successfully Else send W i (x) to DM; max- wts(x) = ts(T i ) endif 19 20 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 5

  6. Timestamp Table Timestamp Table  These rules assume that each operation runs to completion before the next one is submitted to DM.  This information is stored in the timestamp table .  For example, S:W 1 (x)R 2 (x) , with ts(T 1 ) < ts(T 2 ) is a legal TO schedule.  However, when the the scheduler sends R 2 (x) to DM, it must know that W 1 (x) is finished.  Thus, we need 1  r-in-progress(x) : number of transactions reading x  w-in-progress(x) : number of transactions writing x (0 or 1)  waiting-list(x) : transactions waiting to access x . 21 22 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Implementing Basic TO Rules Implementing Basic TO Rules  Write i (X)  Read i (x) if ts(T i ) < max- rts(x) or ts(T i ) < max- wts(x) then if ts(T i ) < max- wts(x) then Abort T i Abort T i Must also consider waiting list else if r-in-progress (x) = 0 and w-in-progress(x) = else if w-in-progress(x) = 0 then 0 send R i (x) to DM then Must also consider waiting list max- rts(x) = max(max- rts(x), ts(T i )) send W i (x) to DM r-in-progress ( x ) = r-in-progress ( x ) + 1 max- wts(x) = ts(Ti) else w-in-progress (x) = 1 insert R i to waiting-list ( x ) in timestamp order else insert W i to writing-list(x) in timestamp order end if end if 23 24 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 Alexandros Labrinidis, Univ. of Pittsburgh CS 2550 / Spring 2006 6

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend