* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Concurrent Control
Microsoft Access wikipedia , lookup
Microsoft SQL Server wikipedia , lookup
Consistency model wikipedia , lookup
Oracle Database wikipedia , lookup
Open Database Connectivity wikipedia , lookup
Global serializability wikipedia , lookup
Relational model wikipedia , lookup
Clusterpoint wikipedia , lookup
Database model wikipedia , lookup
Microsoft Jet Database Engine wikipedia , lookup
Commitment ordering wikipedia , lookup
Versant Object Database wikipedia , lookup
Extensible Storage Engine wikipedia , lookup
Concurrency Control User 2 Read User 1 Write Read R/R R/W Write R/W W/W R/W: Inconsistent Read problem. W/W: Lost Update problem. Example • Husband/Wife joint account with $1000 balance. • Transactions: – Husband: Withdraw 800 – Wife: Withdraw 100 • Processing: – Read Balance, Calculate New Balance, Write New Balance Husband:ReadBalance 1000 Wife: CalNewBalance WriteNewBalance (In memory) (On disk) New=1000-800 200 ReadBalance CalNewBalance WriteNewBalance 1000 New=1000-100 900 Serializable Schedule • Serial Schedule: The operations of each concurrent transaction are executed consecutively without any interleaved operations from other transactions. • Nonserial Schedule: The operations from a set of concurrent transactions are interleaved. – Maximizing database availability • Serializable schedule: If a set of transactions executes concurrently, the nonserial schedule is called serializable if it produces the same results as a serial schedule. Locking • Locking is the most widely used approach to ensure serializability of concurrent transactions. • Shared lock: read only access • Exclusive lock: for both read and write access. Two-Phase Locking • A transaction must acquire a lock (read or write) on an item before operating on the item. • Once the transaction releases a lock, it cannot acquire any new locks. • All locking operations precede the first unlock operation in the transaction: – Growing phase – Shrinking phase Lock Granularity • The size of data items protected by a lock. – Entire database – Entire table – A page – A record – A Field • The coarser the data item size, the lower the degree of concurrency permitted. Dead Lock • Two transactions wait for locks on items held by the other. DataItem 1 Lock T1 Wait For T2 Wait For DataItem 2 Lock Transaction • An unit of work on database that is either completed in its entirety or is not performed at all. • ACID Properties: – Atomicity: All or nothing – Consistency: A transaction transforms a database from one consistent state to another consistent state. – Isolation: Transactions execute independently of one another. • Serializability – Durability: The effects of a successfully completed transaction are permanently recorded in the database and must not be lost. Read/ Write Begin Transaction Commit Partially Committed Active State Committed Abort Abort Failed aborted Transaction Commands • • • • • Begin Transaction Update commands Commit RollBack End Transaction Log File (Journal) • A file that contains all information about all updates to the database. It may contain the following data: – Transaction records: • Transaction ID • Type of action: – Begin, Insert,Delete, Modify, Commit, Rollback, End • Before-image • After-image – Checkpoint records • The point of synchronization between the database and the transaction log file. Completed Transaction • All calculations done by the transaction in its work space (RAM) must have finished, and a copy of the results of the transaction must have been written in a secure place (log file). The action of committing the transaction must also be written in the log. Two Phase Commit • A transaction cannot commit until it has recorded all its changes in the log. • A transaction cannot write into the database until it has committed. Recovery Technique Using Deferred Update • When a transaction starts, write a Transaction Start record to the log. • When any write operation is performed, write a log record containing the after-image of the update. • When a transaction is about to commit: – write a Transaction Commit log record, – write all the log records for the transaction to disk, then – Use the log records to perform the actual updates to the database. • If a transaction aborts, write a Transaction Abort log record and do not perform the writes. – A transaction without a Transaction Abort record is also aborted. To Recover • In the event of a failure, examine the log startng from the most recent checkpoint record. • Any transaction with Transaction Start and Transaction Commit records should be redone: – Perform all the writes to the database using the after-image log records in the order in which they were written to the log. DefiningTransaction in An Application • Truck Rental System: – Vehicle Table: » » – VReservation: » VID, VType, VStatus V1 V2 PickUp Available TowTruck Booked RID, VID, Date R1 V2 1/2/04 Transaction Example Sub Rent(RID, VID, RDate) Begin Transaction Insert (RID, VID, RDate) into VReservation table If No Error Then Update Vehicle Status If No Error Then Commit Transaction Else Roll Back End if Else Roll Back End if End Sub Database Security Database Security • Theft and fraud; • Loss of confidentiality; – Data critical to the organization • Loss of privacy; • Loss of integrity; • Loss of availability. Potential Threats • Hardware: physical damages • Software: – DBMS: security mechanism, privilege – Application software: program alteration • People: – Users: using another person’s means of access, viewing unauthorized data, introduction of viruses – Programmers/Operators – Database administrator: Inadequate security policy • Database – Theft, unauthorized update/copy Countermeasures to Threats • Authorization – Authentication • • • • • Access controls: privileges Database views BackUp and Recovery Enforcing integrity rules Encryption – Symmetric encryption:use same key for encryption and decryption – Asymmetric encryption: • Public key: for encryption • Private key: decryption • RAID SQL Injection • Exploits applications that use external input for database commands. • In the textbox, enter: – ‘ OR 1=1 OR CID = ‘ Demo ( demoweb112/webform9) Dim strConn As String = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source = c:\salesDB.mdb" Dim objConn As New OleDbConnection(strConn) Dim strSQL As String = "select * from customer where cid = '" & TextBox1.Text & "'" Dim objComm As New OleDbCommand(strSQL, objConn) objConn.Open() Dim objDataReader As OleDbDataReader objDataReader = objComm.ExecuteReader() DataGrid1.DataSource = objDataReader DataGrid1.DataBind()