Download Concurrent Control

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Microsoft Access wikipedia , lookup

Microsoft SQL Server wikipedia , lookup

Consistency model wikipedia , lookup

IMDb wikipedia , lookup

Oracle Database wikipedia , lookup

Open Database Connectivity wikipedia , lookup

Global serializability wikipedia , lookup

Relational model wikipedia , lookup

Database wikipedia , lookup

Clusterpoint wikipedia , lookup

Database model wikipedia , lookup

Microsoft Jet Database Engine wikipedia , lookup

Commitment ordering wikipedia , lookup

Versant Object Database wikipedia , lookup

Extensible Storage Engine wikipedia , lookup

Concurrency control wikipedia , lookup

Serializability wikipedia , lookup

Transcript
Concurrency Control
User 2
Read
User 1
Write
Read
R/R
R/W
Write
R/W
W/W
R/W: Inconsistent Read problem.
W/W: Lost Update problem.
Example
• Husband/Wife joint account with $1000
balance.
• Transactions:
– Husband: Withdraw 800
– Wife: Withdraw 100
• Processing:
– Read Balance, Calculate New Balance, Write New Balance
Husband:ReadBalance
1000
Wife:
CalNewBalance WriteNewBalance
(In memory)
(On disk)
New=1000-800
200
ReadBalance
CalNewBalance WriteNewBalance
1000
New=1000-100
900
Serializable Schedule
• Serial Schedule: The operations of each concurrent
transaction are executed consecutively without any
interleaved operations from other transactions.
• Nonserial Schedule: The operations from a set of
concurrent transactions are interleaved.
– Maximizing database availability
• Serializable schedule: If a set of transactions executes
concurrently, the nonserial schedule is called serializable
if it produces the same results as a serial schedule.
Locking
• Locking is the most widely used approach
to ensure serializability of concurrent
transactions.
• Shared lock: read only access
• Exclusive lock: for both read and write
access.
Two-Phase Locking
• A transaction must acquire a lock (read or
write) on an item before operating on the
item.
• Once the transaction releases a lock, it
cannot acquire any new locks.
• All locking operations precede the first
unlock operation in the transaction:
– Growing phase
– Shrinking phase
Lock Granularity
• The size of data items protected by a lock.
– Entire database
– Entire table
– A page
– A record
– A Field
• The coarser the data item size, the lower
the degree of concurrency permitted.
Dead Lock
• Two transactions wait for locks on items
held by the other.
DataItem 1
Lock
T1
Wait For
T2
Wait For
DataItem 2
Lock
Transaction
• An unit of work on database that is either
completed in its entirety or is not performed at
all.
• ACID Properties:
– Atomicity: All or nothing
– Consistency: A transaction transforms a database
from one consistent state to another consistent state.
– Isolation: Transactions execute independently of one
another.
• Serializability
– Durability: The effects of a successfully completed
transaction are permanently recorded in the database
and must not be lost.
Read/
Write
Begin
Transaction
Commit
Partially
Committed
Active State
Committed
Abort
Abort
Failed
aborted
Transaction Commands
•
•
•
•
•
Begin Transaction
Update commands
Commit
RollBack
End Transaction
Log File (Journal)
• A file that contains all information about all
updates to the database. It may contain the
following data:
– Transaction records:
• Transaction ID
• Type of action:
– Begin, Insert,Delete, Modify, Commit, Rollback, End
• Before-image
• After-image
– Checkpoint records
• The point of synchronization between the database and the
transaction log file.
Completed Transaction
• All calculations done by the transaction in
its work space (RAM) must have finished,
and a copy of the results of the transaction
must have been written in a secure place
(log file). The action of committing the
transaction must also be written in the log.
Two Phase Commit
• A transaction cannot commit until it has
recorded all its changes in the log.
• A transaction cannot write into the
database until it has committed.
Recovery Technique Using Deferred
Update
• When a transaction starts, write a Transaction Start
record to the log.
• When any write operation is performed, write a log
record containing the after-image of the update.
• When a transaction is about to commit:
– write a Transaction Commit log record,
– write all the log records for the transaction to disk, then
– Use the log records to perform the actual updates to the
database.
• If a transaction aborts, write a Transaction Abort log
record and do not perform the writes.
– A transaction without a Transaction Abort record is also aborted.
To Recover
• In the event of a failure, examine the log
startng from the most recent checkpoint
record.
• Any transaction with Transaction Start and
Transaction Commit records should be
redone:
– Perform all the writes to the database using
the after-image log records in the order in
which they were written to the log.
DefiningTransaction in An
Application
• Truck Rental System:
– Vehicle Table:
»
»
– VReservation:
»
VID, VType, VStatus
V1
V2
PickUp Available
TowTruck Booked
RID, VID, Date
R1
V2
1/2/04
Transaction Example
Sub Rent(RID, VID, RDate)
Begin Transaction
Insert (RID, VID, RDate) into VReservation table
If No Error Then
Update Vehicle Status
If No Error Then
Commit Transaction
Else
Roll Back
End if
Else
Roll Back
End if
End Sub
Database Security
Database Security
• Theft and fraud;
• Loss of confidentiality;
– Data critical to the organization
• Loss of privacy;
• Loss of integrity;
• Loss of availability.
Potential Threats
• Hardware: physical damages
• Software:
– DBMS: security mechanism, privilege
– Application software: program alteration
• People:
– Users: using another person’s means of access,
viewing unauthorized data, introduction of viruses
– Programmers/Operators
– Database administrator: Inadequate security policy
• Database
– Theft, unauthorized update/copy
Countermeasures to Threats
• Authorization
– Authentication
•
•
•
•
•
Access controls: privileges
Database views
BackUp and Recovery
Enforcing integrity rules
Encryption
– Symmetric encryption:use same key for encryption and
decryption
– Asymmetric encryption:
• Public key: for encryption
• Private key: decryption
• RAID
SQL Injection
• Exploits applications that use external
input for database commands.
• In the textbox, enter:
– ‘ OR 1=1 OR CID = ‘
Demo
( demoweb112/webform9)
Dim strConn As String = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source
= c:\salesDB.mdb"
Dim objConn As New OleDbConnection(strConn)
Dim strSQL As String = "select * from customer where cid = '" &
TextBox1.Text & "'"
Dim objComm As New OleDbCommand(strSQL, objConn)
objConn.Open()
Dim objDataReader As OleDbDataReader
objDataReader = objComm.ExecuteReader()
DataGrid1.DataSource = objDataReader
DataGrid1.DataBind()