Issues in Concurrency Control for Different Databases Concurrency Control Methods for Different Databases a Survey of Concurrenc

Issues in Concurrency Control for Different Databases Concurrency Control Methods for Different Databases a Survey of Concurrenc

Volume II, Issue IV, April 2015 IJRSI ISSN 2321 - 2705 Issues in Concurrency Control for Different Databases Concurrency Control Methods for Different Databases a Survey of Concurrency Control Protocols Gitanjali Mishra*, Jyotirmaya Mishra Assistant Professor, Computer Science and Engineering, Gandhi Institute of Engineering & Technology, Gunupur, Odisha, INDIA. Abstract: This paper reviews the coverage of concurrency The basic idea of locking is that whenever a transaction control in different Databases. Database becomes more accesses a data item, it locks it, and that a transaction which popular, the need for improvement in database management wants to lock a data item which is already locked by another systems becomes even more important to maintain reliability. transaction must wait until the other transaction has released The main challenges are identified as-: (1)Preserving the ACID the lock (unlock). property atomicity, consistency, isolation and durability property when concurrent transactions perform read and Let us see some important terminologies related to this write operation; (2) provides recovery method when concept: distributed data is fail; (3)whatever method that is chosen they Lock Mode: Transaction locks the data item in the must provide feasible solutions with respect to performance. following modes: o Shared Mode: Here the transaction wants only to Keywords: Centralized Database system, Distributed Database read the data item. System, object-oriented database System, Distributed Object- o Exclusive Mode: Here the transaction wants edit Oriented Database System , Mobile Database System, Real-Time the data item. Database System ,Multilevel Secure Databases, Replicated Real Time Databases, Concurrency control, Transaction, Locking The Well-formed Transactions:The transactions are protocol always well-formed if it always locks a data item in shared mode before reading it, and it always I. INTRODUCTION locks a data item in exclusive mode before writing it n today’s world of universal dependence on information I systems, with the rising need for secure, reliable and Compatibility Rules existing between Lock Modes: accessible information in today’s business environment, the o A transaction can lock a data item in need for databases and client/ server applications is also shared mode if it is not locked at all or it increasing. This paper reviews the concurrency control in is locked in shared mode by another dissimilar databases. Database becomes more trendy and to transaction supervise different types of database management systems o A transaction can lock a data item in are required. Many transactions are accessing the databases exclusive mode only if it is not locked at concurrently. The main challenges are identified for the all. transactions are -: (1)Preserving the ACID property Conflicts: Two transactions are in conflict if they atomicity, consistency, isolation and durability property want to want to lock the same data item with two when concurrent transactions perform read and write compatible modes; two types of conflicts: Read- operation; (2) provides recovery method when data is failed; Write conflict and Write-Write conflict. (3)whatever method that is chosen they must provide feasible solutions with respect to performance. One most Granularity of Locking: This term relates to the important mechanism to control the concurrent transactions size of objects that are locked with a single lock is concurrent control mechanism. Here we are focusing operation. In general, it is possible to lock at the different types of concurrency control mechanism for record level (i.e to lock individual tuples)or at the different databases. In this paper weaddress lock concept in File level (to lock at the fragment level). different databases transactions. Concurrent transactions are successful if the following rules are followed: II. CONCURRENCYCONTROL IN CENTRALIZED o mTransactions are well-formed o Compatibility rules are observed DATABASESYSTEM www.rsisinternational.org/IJRSI.html Page 49 Volume II, Issue IV, April 2015 IJRSI ISSN 2321 - 2705 o Each transaction does not request new heterogeneous, transaction-aware resource managers in a locks after it has released a lock. distributed environment. The execution of a distributed transaction requires coordination between a global A sophisticated locking mechanism known as 2-Phase transaction management system and all the local resource locking which includes the above said principles is normally managers of all the involved systems. The resource manager used. According to this, there are two separate phases: and transaction processing monitor are the two primary Growing phase: Each transactions there is a first elements of any distributed transactional system. Distributed phase during which new locks are acquired transactions, like local transactions, must observe the ACID Shrinking Phase: A second phase during which properties. However, maintenance of these properties is locks are only released. very complicated for distributed transactions because a failure can occur in any process. If such a failure occurs, We will simply assume that all transactions are performed each process must undo any work that has already been according to the following scheme: done on behalf of the transaction. A distributed transaction (Begin Application) processing system maintains the ACID properties in Begin transaction distributed transactions by using two features: Acquire locks before reading or Recoverable processes: Recoverable processes log writing their actions and therefore can restore earlier states Commit if a failure occurs. Release locks A commit protocol: A commit protocol allows (End application) multiple processes to coordinate the committing or In this way the transactions are well formed, 2-Phase locked aborting of a transaction. The most common and isolated. commit protocol is the two-phase commit protocol. Deadlock: A deadlock between two transactions arises if Distributed Two-Phase Locking (2PL): each transaction has locked a data item and is waiting to lock a different data item which has already been locked by In order to ensure serializability of parallel executed he other transaction in the conflicting mode. Both transactions states different methods of concurrency control. transactions will wait forever in this situation, and system One of these methods is locking method. There are different intervention is required to unblock the situation. The system forms of locking method. Two phase locking protocol is one must first find out the deadlock situation and force one of the basic concurrency control protocols in distributed transaction to release its locks, so that the other one can database systems which will ensure serializability. The main proceed. i.e one transaction is aborted. This method is called approach of this protocol is “read any, write all”. as Deadlock detection. Transactions set read locks on items that they read, and they convert their read locks to write locks on items that need to III. CONCURRENCY CONTROL IN DISTRIBUTED be updated. To read an item, it suffices to set a read lock on DATABASE SYSTEM any copy of the item, so the local copy is locked; to update anitem, write locks are required on all copies. Write locks In distributed database systems, database is typically used are obtained as the transaction executes, with the transaction by many users. These systems usually allow multiple blocking on a write request until all of the copies of the item transactions to run concurrently i.e. at the same time. to be updated have been successfully locked. All locks are Concurrency control is the activity of coordinating held until the transaction has successfully committed or concurrent accesses to a database in a multiuser database aborted [3]. management system (DBMS). Concurrency control permits users to access a database in a multi-programmed fashion The 2PL Protocol oversees locks by determining when while preserving the illusion that each user is executing transactions can acquire and release locks. The 2PL protocol alone on a dedicated system. The main technical difficulty forces each transaction to make a lock or unlock request in in attaining this goal is to prevent database updates two steps: performed by one user from interfering with database retrievals and updates performed by another. When the o Growing Phase: A transaction may obtain locks transactions are updating data concurrently, it may lead to but may not release any locks. several problems with the consistency of the data. o Shrinking Phase: A transaction may release locks but not obtain any new lock. Distributed Transaction: The transaction first enters into the Growing Phase, makes A distributed transaction is a transaction that runs in requests for required locks, then gets into the Shrinking multiple processes. Distributed transaction processing phase where it releases all locks and cannot make any more systems are designed to facilitate transactions that span requests. Transactions in 2PL Protocol should get all needed www.rsisinternational.org/IJRSI.html Page 50 Volume II, Issue IV, April 2015 IJRSI ISSN 2321 - 2705 locks before getting into the unlock phase. While the 2PL assumed that the databaseenvironment allows for protocol guarantees serializability, it does not ensure that extensibility, permitting users to dynamically modify the deadlocks do not happen. So deadlock is a possibility in this class definitions. As such, we can regard class definitions as

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us