DBMS Unit4
DBMS Unit4
Program: AI
Course Code: BCS 501
Course Name: Database Management System
Unit: IV
Faculty Name: Manisha Bhati
Email: [email protected]
.…………………... Department of Artificial Intelligence.
Transaction-
A transaction is an action or series of actions. It is performed by a single user to perform operations for
accessing the contents of the database.
Example: Suppose an employee of bank transfers Rs 800 from X's account to Y's account. This small transaction
contains several low-level tasks:
X's Account Y's Account
Operations of Transaction:
Following are the main operations of transaction:
Read(X): Read operation is used to read the value of X from the database and stores it in a buffer in main memory.
Write(X): Write operation is used to write the value back to the database from the buffer.
Let's take an example to debit transaction from an account which consists of following operations:
1.. X = X - 500;
2. R(X);
3. W(X);
.…………………... Department of Artificial Intelligence.
The first operation reads X's value from database and stores it in a buffer.
The second operation will decrease the value of X by 500. So buffer will contain 3500.
The third operation will write the buffer's value to the database. So X's final value will be 3500.
But it may be possible that because of the failure of hardware, software or power, etc. that transaction may fail
before finished all the operations in the set.
For example: If in the above transaction, the debit transaction fails after executing operation 2 then X's value will
remain 4000 in the database which is not acceptable by the bank.
Transaction property-
The transaction has the four properties. These are used to maintain consistency in a
database, before and after the transactio
Atomicity
Consistency
Isolation
Durability
1.Atomicity-
It states that all operations of the transaction take place at once if not, the transaction is aborted.
There is no midway, i.e., the transaction cannot occur partially. Each transaction is treated as one unit and either run to
completion or is not executed at all.
.…………………... Department of Artificial Intelligence.
Abort: If a transaction aborts then all the changes made are not visible.
Commit: If a transaction commits then all the changes made are visible
Example: Let's assume that following transaction T consisting of T1 and T2. A consists of Rs 600 and B consists of Rs
300. Transfer Rs 100 from account A to account B.
If the transaction T fails after the completion of transaction T1 but before Read(A) Read(B)
A:= A-100 Y:= Y+100
completion of transaction T2, then the amount will be deducted from A but not Write(A) Write(B)
added to B. This shows the inconsistent database state. In order to ensure
correctness of database state, the transaction must be executed in entirety.
.…………………... Department of Artificial Intelligence.
2.Consistency-
The integrity constraints are maintained so that the database is consistent before and after the transaction.
The execution of a transaction will leave a database in either its prior stable state or a new stable state.
The consistent property of database states that every transaction sees a consistent database instance.
The transaction is used to transform the database from one consistent state to another consistent state.
For example: The total amount must be maintained before or after the transaction.
3.Isolation-
It shows that the data which is used at the time of execution of a transaction cannot be used by the second
transaction until the first one is completed.
In isolation, if the transaction T1 is being executed and using the data item X, then that data item can't be accessed
by any other transaction T2 until the transaction T1 ends.
The concurrency control subsystem of the DBMS enforced the isolation property.
4.Durability-
The durability property is used to indicate the performance of the database's consistent state. It states that the
transaction made the permanent changes.
They cannot be lost by the erroneous operation of a faulty transaction or by the system failure. When a transaction
is completed, then the database reaches a state known as the consistent state. That consistent state cannot be lost,
even in the event of a system's failure.
The recovery subsystem of the DBMS has the responsibility of Durability property.
.…………………... Department of Artificial Intelligence.
Schedule-
A series of operation from one transaction to another transaction is known as schedule. It is used to preserve
the order of the operation in each of the individual transaction.
.…………………... Department of Artificial Intelligence.
1. Serial Schedule-
The serial schedule is a type of schedule where one transaction is executed completely before starting another
transaction. In the serial schedule, when the first transaction completes its cycle, then the next transaction is
executed.
For example: Suppose there are two transactions T1 and T2 which have some operations. If it has no interleaving of
operations, then there are the following two possible outcomes:
Execute all the operations of T1 which was followed by all the operations of T2.
Execute all the operations of T1 which was followed by all the operations of T2.
In the given (a) figure, Schedule A shows the serial schedule where T1 followed by T2.
In the given (b) figure, Schedule B shows the serial schedule where T2 followed by T1.
.…………………... Department of Artificial Intelligence.
2. Non-serial Schedule-
3. Serializable schedule-
The serializability of schedules is used to find non-serial schedules that allow the transaction to execute
concurrently without interfering with one another.
It identifies which schedules are correct when executions of the transaction have interleaving of their
operations.
A non-serial schedule will be serializable if its result is equal to the result of its transactions executed serially.
.…………………... Department of Artificial Intelligence.
.…………………... Department of Artificial Intelligence.
.…………………... Department of Artificial Intelligence.
Testing of Serializability
Serialization Graph is used to test the Serializability of a schedule.
Assume a schedule S. For S, we construct a graph known as precedence graph. This graph has a pair G = (V, E), where
V consists a set of vertices, and E consists a set of edges. The set of vertices is used to contain all the transactions
participating in the schedule. The set of edges is used to contain all edges Ti ->Tj for which one of the three
conditions holds:
If a precedence graph contains a single edge Ti → Tj, then all the instructions of Ti are executed before the first
instruction of Tj is executed.
If a precedence graph for schedule S contains a cycle, then S is non-serializable. If the precedence graph has
no cycle, then S is known as serializable.
.…………………... Department of Artificial Intelligence.
For example:
Explanation:
Explanation:
The precedence graph for schedule S2 contains no cycle that's why ScheduleS2 is serializable.
.…………………... Department of Artificial Intelligence.
A schedule is called conflict serializability if after swapping of non-conflicting operations, it can transform into a
serial schedule.
Example:
Swapping is possible only if S1 and S2 are logically equal.
Conflict Equivalent-
In the conflict equivalent, one can be transformed to another by swapping non-conflicting operations. In the given example,
S2 is conflict equivalent to S1 (S1 can be converted to S2 by swapping non-conflicting operations).
Read(A)
Write(A)
Read(B) Read(A)
Write(B) Write(A)
Read(B)
Write(B)
.…………………... Department of Artificial Intelligence.
View Serializability-
A schedule will view serializable if it is view equivalent to a serial schedule.
If a schedule is conflict serializable, then it will be view serializable.
The view serializable which does not conflict serializable contains blind writes.
View Equivalent-
Two schedules S1 and S2 are said to be view equivalent if they satisfy the following conditions:
1. Initial Read-
An initial read of both schedules must be the same. Suppose two schedule S1 and S2. In schedule S1, if a transaction
T1 is reading the data item A, then in S2, transaction T1 should also read A.
2. Updated Read-
In schedule S1, if Ti is reading A which is updated by Tj then in S2 also, Ti should read A which is updated by Tj.
Above two schedules are not view equal because, in S1, T3 is reading A updated by T2
and in S2, T3 is reading A updated by T1.
.…………………... Department of Artificial Intelligence.
3. Final Write-
A final write must be the same between both the schedules. In schedule S1, if a transaction T1 updates A at last
then in S2, final writes operations should also be done by T1.
Above two schedules is view equal because Final write operation in S1 is done by
T3 and in S2, the final write operation is also done by T3.
.…………………... Department of Artificial Intelligence.
Recoverability of Schedule-
Sometimes a transaction may not execute completely due to a software issue, system crash or hardware failure. In
that case, the failed transaction has to be rollback. But some other transaction may also have used value produced
by the failed transaction. So we also have to rollback those transactions.
The above table 1 shows a schedule which has two transactions. T1 reads and writes the value of A and that value is
read and written by T2. T2 commits but later on, T1 fails. Due to the failure, we have to rollback T1. T2 should also be
rollback because it reads the value written by T1, but T2 can't be rollback because it already committed. So this type
of schedule is known as irrecoverable schedule.
.…………………... Department of Artificial Intelligence.
Irrecoverable schedule: The schedule will be irrecoverable if Tj reads the updated value of Ti and Tj committed before
Ti commit.
The above table 2 shows a schedule with two transactions. Transaction T1 reads and writes A, and that value is read
and written by transaction T2. But later on, T1 fails. Due to this, we have to rollback T1. T2 should be rollback because
T2 has read the value written by T1. As it has not committed before T1 commits so we can rollback transaction T2 as
well. So it is recoverable with cascade rollback.
.…………………... Department of Artificial Intelligence.
Recoverable with cascading rollback: The schedule will be recoverable with cascading rollback if Tj reads the updated
value of Ti. Commit of Tj is delayed till commit of Ti.
The above Table 3 shows a schedule with two transactions. Transaction T1 reads and write A and commits, and
that value is read and written by T2. So this is a cascade less recoverable schedule.
.…………………... Department of Artificial Intelligence.
Failure Classification-
To find that where the problem has occurred, we generalize a failure into the following categories:
Transaction failure
System crash
Disk failure
1. Transaction failure-
The transaction failure occurs when it fails to execute or when it reaches a point from where it can't go any further.
If a few transaction or process is hurt, then this is called as transaction failure.
Logical errors: If a transaction cannot complete due to some code error or an internal error condition, then the
logical error occurs.
Syntax error: It occurs where the DBMS itself terminates an active transaction because the database system is not
able to execute it. For example, The system aborts an active transaction, in case of deadlock or resource
unavailability.
.…………………... Department of Artificial Intelligence.
2. System Crash-
System failure can occur due to power failure or other hardware or software failure. Example: Operating system error.
Fail-stop assumption: In the system crash, non-volatile storage is assumed not to be corrupted.
3. Disk Failure-
It occurs where hard-disk drives or storage drives used to fail frequently. It was a common problem in the early days of
technology evolution.
Disk failure occurs due to the formation of bad sectors, disk head crash, and unreachability to the disk or any other
failure, which destroy all or part of disk storage.
.…………………... Department of Artificial Intelligence.
Log-Based Recovery-
The log is a sequence of records. Log of each transaction is maintained in some stable storage so that if any
failure occurs, then it can be recovered from there.
If any operation is performed on the database, then it will be recorded in the log.
But the process of storing the logs should be done before the actual transaction is applied in the database.
Let's assume there is a transaction to modify the City of a student. The following logs are written for this
transaction.
When the transaction is initiated, then it writes 'start' log. <Tn, Start>
When the transaction modifies the City from 'Noida' to 'Bangalore', then another log is written to the file.
When the transaction is finished, then it writes another log to indicate the end of the transaction.
<Tn, Commit>
When the system is crashed, then the system consults the log to find which transactions need to be undone and
which need to be redone.
If the log contains the record <Ti, Start> and <Ti, Commit> or <Ti, Commit>, then the Transaction Ti needs to
be redone
If log contains record<Tn, Start> but does not contain the record either <Ti, commit> or <Ti, abort>, then the
Transaction Ti needs to be undone.
.…………………... Department of Artificial Intelligence.
Checkpoint-
The checkpoint is a type of mechanism where all the previous logs are removed from the system and
permanently stored in the storage disk.
The checkpoint is like a bookmark. While the execution of the transaction, such checkpoints are marked,
and the transaction is executed then using the steps of the transaction, the log files will be created.
When it reaches to the checkpoint, then the transaction will be updated into the database, and till that
point, the entire log file will be removed from the file. Then the log file is updated with the new step of
transaction till next checkpoint and so on.
The checkpoint is used to declare a point before which the DBMS was in the consistent state, and all
transactions were committed.
.…………………... Department of Artificial Intelligence.
The recovery system reads log files from the end to start. It reads log files from T4 to T1.
Recovery system maintains two lists, a redo-list, and an undo-list.
The transaction is put into redo state if the recovery system sees a log with <Tn, Start> and <Tn, Commit> or just
<Tn, Commit>. In the redo-list and their previous list, all the transactions are removed and then redone before
saving their logs.
For example: In the log file, transaction T2 and T3 will have <Tn, Start> and <Tn, Commit>. The T1 transaction will
have only <Tn, commit> in the log file. That's why the transaction is committed after the checkpoint is crossed.
Hence it puts T1, T2 and T3 transaction into redo list.
The transaction is put into undo state if the recovery system sees a log with <Tn, Start> but no commit or abort
log found. In the undo-list, all the transactions are undone, and their logs are removed.
For example: Transaction T4 will have <Tn, Start>. So T4 will be put into undo list since this transaction is not yet
complete and failed amid.
.…………………... Department of Artificial Intelligence.
But before knowing about concurrency control, we should know about concurrent execution.
In a multi-user system, multiple users can access and use the same database at one time, which is known as the
concurrent execution of the database. It means that the same database is executed simultaneously on a multi-
user system by different users.
While working on the database transactions, there occurs the requirement of using the database by multiple
users for performing different operations, and in that case, concurrent execution of the database is performed.
.…………………... Department of Artificial Intelligence.
The thing is that the simultaneous execution that is performed should be done in an interleaved manner,
and no operation should affect the other executing operations, thus maintaining the consistency of the
database. Thus, on making the concurrent execution of the transaction operations, there occur several
challenging problems that need to be solved.
.…………………... Department of Artificial Intelligence.
Lock-Based Protocol-
In this type of protocol, any transaction cannot read or write data until it acquires an appropriate lock on it.
There are two types of lock:
1. Shared lock:
It is also known as a Read-only lock. In a shared lock, the data item can only read by the transaction.
It can be shared between the transactions because when the transaction holds a lock, then it can't update the
data on the data item.
2. Exclusive lock:
In the exclusive lock, the data item can be both reads as well as written by the transaction.
This lock is exclusive, and in this lock, multiple transactions do not modify the same data simultaneously.
.…………………... Department of Artificial Intelligence.
Pre-claiming Lock Protocols evaluate the transaction to list all the data items on which they need locks.
Before initiating an execution of the transaction, it requests DBMS for all the lock on all those data items.
If all the locks are granted then this protocol allows the transaction to begin. When the transaction is completed
then it releases all the lock.
If all the locks are not granted then this protocol allows the transaction to rolls back and waits until all the locks are
granted.
.…………………... Department of Artificial Intelligence.
.…………………... Department of Artificial Intelligence.
The two-phase locking protocol divides the execution phase of the transaction into three parts.
In the first part, when the execution of the transaction starts, it seeks permission for the lock it requires.
In the second part, the transaction acquires all the locks. The third phase is started as soon as the
transaction releases its first lock.
In the third phase, the transaction cannot demand any new locks. It only releases the acquired locks.
.…………………... Department of Artificial Intelligence.
Growing phase: In the growing phase, a new lock on the data item may be acquired by the transaction, but none
can be released.
.…………………... Department of Artificial Intelligence.
Shrinking phase: In the shrinking phase, existing lock held by the transaction may be released, but no new
locks can be acquired.
In the below example, if lock conversion is allowed then the following phase can happen:
Example:
.…………………... Department of Artificial Intelligence.
Transaction T1:
Transaction T2:
The first phase of Strict-2PL is similar to 2PL. In the first phase, after acquiring all the locks, the transaction
continues to execute normally.
The only difference between 2PL and strict 2PL is that Strict-2PL does not release a lock after using it.
Strict-2PL waits until the whole transaction to commit, and then it releases all the locks at a time.