Concurrency control is provided in a database to:
- (i) enforce isolation among transactions.
- (ii) preserve database consistency through consistency preserving execution of transactions.
- (iii) resolve read-write and write-read conflicts.
Various concurrency control techniques are:
1. Two-phase locking Protocol 2. Time stamp ordering Protocol 3. Multi version concurrency control 4. Validation concurrency control
These are briefly explained below.
1. Two-Phase Locking Protocol:
Locking is an operation which secures: permission to read, OR permission to write a data item. Two phase locking is a process used to gain ownership of shared resources without creating the possibility of deadlock.
The 3 activities taking place in the two phase update algorithm are:
(i). Lock Acquisition (ii). Modification of Data (iii). Release Lock
Two phase locking prevents deadlock from occurring in distributed systems by releasing all the resources it has acquired, if it is not possible to acquire all the resources required without waiting for another process to finish using a lock. This means that no process is ever in a state where it is holding some shared resources, and waiting for another process to release a shared resource which it requires. This means that deadlock cannot occur due to resource contention.
A transaction in the Two Phase Locking Protocol can assume one of the 2 phases:
- (i) Growing Phase:
In this phase a transaction can only acquire locks but cannot release any lock. The point when a transaction acquires all the locks it needs is called the Lock Point.
- (ii) Shrinking Phase:
In this phase a transaction can only release locks but cannot acquire any.
2. Time Stamp Ordering Protocol:
A timestamp is a tag that can be attached to any transaction or any data item, which denotes a specific time on which the transaction or the data item had been used in any way. A timestamp can be implemented in 2 ways. One is to directly assign the current value of the clock to the transaction or data item. The other is to attach the value of a logical counter that keeps increment as new timestamps are required.
The timestamp of a data item can be of 2 types:
- (i) W-timestamp(X):
This means the latest time when the data item X has been written into.
- (ii) R-timestamp(X):
This means the latest time when the data item X has been read from. These 2 timestamps are updated each time a successful read/write operation is performed on the data item X.
3. Multiversion Concurrency Control:
Multiversion schemes keep old versions of data item to increase concurrency.
Multiversion 2 phase locking:
Each successful write results in the creation of a new version of the data item written. Timestamps are used to label the versions. When a read(X) operation is issued, select an appropriate version of X based on the timestamp of the transaction.
4. Validation Concurrency Control:
The optimistic approach is based on the assumption that the majority of the database operations do not conflict. The optimistic approach requires neither locking nor time stamping techniques. Instead, a transaction is executed without restrictions until it is committed. Using an optimistic approach, each transaction moves through 2 or 3 phases, referred to as read, validation and write.
- (i) During read phase, the transaction reads the database, executes the needed computations and makes the updates to a private copy of the the database values. All update operations of the transactions are recorded in a temporary update file, which is not accessed by the remaining transactions.
- (ii) During the validation phase, the transaction is validated to ensure that the changes made will not affect the integrity and consistency of the database. If the validation test is positive, the transaction goes to a write phase. If the validation test is negative, he transaction is restarted and the changes are discarded.
- (iii) During the write phase, the changes are permanently applied to the database.
- Concurrency Control in DBMS
- Timestamp based Concurrency Control
- Two Phase Locking (2-PL) Concurrency Control Protocol | Set 3
- Congestion Control techniques in Computer Networks
- Graph Based Concurrency Control Protocol in DBMS
- Lock Based Concurrency Control Protocol in DBMS
- Difference between Flow Control and Congestion Control
- Techniques to handle Thrashing
- Analysis of different sorting techniques
- Concurrency problems in DBMS Transactions
- Resource Allocation Techniques for Processes
- Database Recovery Techniques in DBMS
- Advanced compression and encoding techniques in HP Vertica
- TCP Congestion Control
- Error Control in TCP
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.