Computer Science Engineering (CSE) Exam  >  Computer Science Engineering (CSE) Notes  >  Database Management System (DBMS)  >  Introduction to Timestamp & Deadlock Prevention Schemes

Introduction to Timestamp & Deadlock Prevention Schemes | Database Management System (DBMS) - Computer Science Engineering (CSE) PDF Download

Introduction

Deadlock occurs when each transaction T in a schedule of two or more transaction waiting for some item locked by some other transaction T‘ in the set. Thus, both end up in a deadlock situation, waiting for the other to release the lock on the item. Deadlocks are a common problem and we have introduced the problem while solving the Concurrency Control by the introduction of Locks. Deadlock avoidance is a major issue and some protocols were suggested to avoid them, like Conservative 2-PL and Graph Based protocols but some drawbacks are still there.
Here, we will discuss a new concept of Transaction Timestamp TS(Ti). A timestamp is a unique identifier created by the DBMS to identify a transaction. They are usually assigned in the order in which they are submitted to the system, so a timestamp may be thought of as the transaction start time.
There may be different ways of generating timestamps such as

  • A simple counter that increments each time its value is assigned to a transaction. They may be numbered 1, 2, 3…. Though we’ll have to reset the counter from time to time to avoid overflow.
  • Using the current date/time from the system clock. Just ensuring that no two transactions are given the same value in the same clock tick, we will always get a unique timestamp. This method is widely used.

Deadlock Prevention Schemes based on Timestamp…

As discussed, Timestamps are unique identifiers assigned to each transaction. They are based on the order in which Transactions are started. Say if T1 starts before T2 then TS(T1) will be less then(<) TS(T2).
There are two schemes to prevent deadlock called wound-wait and wait-die. Say there are two transactions Ti and Tj, now say Ti tries to lock an item X but item X is already locked by some Tj, now in such a conflicting situation the two schemes which prevents deadlock. We’ll use this context shortly.

  • Wait_Die: An older transaction is allowed to wait for a younger transaction, whereas a younger transaction requesting an item held by an older transaction is aborted and restarted.
    From the context above, if TS(Ti) < TS(Tj), then (Ti older than Tj) Ti is allowed to wait; otherwise abort Ti (Ti younger than Tj) and restart it later with the same timestamp.
  • Wound_Wait: It is just the opposite of the Wait_Die technique. Here, a younger transaction is allowed to wait for an older one, whereas if an older transaction requests an item held by the younger transaction, we preempt the younger transaction by aborting it.
    From the context above, if TS(Ti) < TS(Tj), then (Ti older than Tj) Tj is aborted (i.e., Ti wounds Tj) and restarts it later with the same Timestamp; otherwise (Ti younger than Tj) Ti is allowed to wait.

Thus, both the schemes end up in aborting the younger of the two transactions that may be involved in a deadlock. It is done on the basis of the assumption that aborting the younger transaction will waste less processing which is logical. In such a case there cannot be a cycle since we are waiting linearly in both the cases.
Another group of protocols which prevents deadlock but does not require Timestamps. They are discussed below:

  • No-waiting Algorithm: This follows a simple approach, if a Transaction is unable to obtain a lock, it is immediately aborted and then restarted after a certain time delay without checking if a deadlock will occur or not. Here, no Transaction ever waits so there is no possibility for deadlock.
    This method is somewhat not practical. It may cause transaction to abort and restart unnecessarily.
  • Cautious Waiting: If Ti tries to lock an item X but is not able to do because X is locked by some Tj. In such a conflict, if Tj is not waiting for some other locked item, then Ti is allowed to wait, otherwise abort Ti.

Another approach, to deal with deadlock is deadlock detection, we can use Wait-for-Graph. This uses a similar approach when we used to check for cycles while checking for serializablity.

Starvation: One problem that may occur when we use locking is starvation which occurs when a transaction cannot proceed for an indefinite period of time while other transactions in the system continue normally. This may occur if the waiting scheme for locked items is unfair, giving priority to some transactions over others. We may have some solutions for Starvation. One is using a first come first serve queue; transactions are enabled to lock an item in the order in which they originally requested the lock. This is a widely used mechanism to reduce starvation. Our Concurrency Control Manager is responsible to schedule the transactions, so it employs different methods to overcome them.

Implementation of Locking in DBMS

Locking protocols are used in database management systems as a means of concurrency control. Multiple transactions may request a lock on a data item simultaneously. Hence, we require a mechanism to manage the locking requests made by transactions. Such a mechanism is called as Lock Manager. It relies on the process of message passing where transactions and lock manager exchange messages to handle the locking and unlocking of data items.

Data structure used in Lock Manager
The data structure required for implementation of locking is called as Lock table.

  1. It is a hash table where name of data items are used as hashing index.
  2. Each locked data item has a linked list associated with it.
  3. Every node in the linked list represents the transaction which requested for lock, mode of lock requested (mutual/exclusive) and current status of the request (granted/waiting).
  4. Every new lock request for the data item will be added in the end of linked list as a new node.
  5. Collisions in hash table are handled by technique of separate chaining.

Consider the following example of lock table:

Introduction to Timestamp & Deadlock Prevention Schemes | Database Management System (DBMS) - Computer Science Engineering (CSE)

Explanation: In the above figure, the locked data items present in lock table are 5, 47, 167 and 15.
The transactions which have requested for lock have been represented by a linked list shown below them using a downward arrow.
Each node in linked list has the name of transaction which has requested the data item like T33, T1, T27 etc.
The colour of node represents the status i.e. whether lock has been granted or waiting.

Note that a collision has occurred for data item 5 and 47. It has been resolved by separate chaining where each data item belongs to a linked list. The data item is acting as header for linked list containing the locking request.

Working of Lock Manager

  • Initially the lock table is empty as no data item is locked.
  • Whenever lock manager receives a lock request from a transaction Ti on a particular data item Qi following cases may arise:
    1. If Qi is not already locked, a linked list will be created and lock will be granted to the requesting transaction Ti.
    2. If the data item is already locked, a new node will be added at the end of its linked list containing the information about request made by Ti.
  • If the lock mode requested by Ti is compatible with lock mode of transaction currently having the lock, Ti will acquire the lock too and status will be changed to ‘granted’. Else, status of Ti’s lock will be ‘waiting’.
  • If a transaction Ti wants to unlock the data item it is currently holding, it will send an unlock request to the lock manager. The lock manager will delete Ti’s node from this linked list. Lock will be granted to the next transaction in the list.
  • Sometimes transaction Ti may have to be aborted. In such a case all the waiting request made by Ti will be deleted from the linked lists present in lock table. Once abortion is complete, locks held by Ti will also be released.
The document Introduction to Timestamp & Deadlock Prevention Schemes | Database Management System (DBMS) - Computer Science Engineering (CSE) is a part of the Computer Science Engineering (CSE) Course Database Management System (DBMS).
All you need of Computer Science Engineering (CSE) at this link: Computer Science Engineering (CSE)
62 videos|66 docs|35 tests

Top Courses for Computer Science Engineering (CSE)

FAQs on Introduction to Timestamp & Deadlock Prevention Schemes - Database Management System (DBMS) - Computer Science Engineering (CSE)

1. What is a timestamp in the context of concurrency control?
Ans. In the context of concurrency control, a timestamp is a unique identifier assigned to each transaction in a database system. It represents the order in which transactions are executed and helps in enforcing serializability by determining the precedence of conflicting operations.
2. How does a timestamp-based concurrency control scheme prevent deadlock?
Ans. A timestamp-based concurrency control scheme prevents deadlock by using a wait-die or wound-wait scheme. In the wait-die scheme, if a younger transaction requests a conflicting item held by an older transaction, it is made to wait. In the wound-wait scheme, if a younger transaction requests a conflicting item held by an older transaction, the older transaction is rolled back.
3. What are some advantages of using timestamp-based concurrency control schemes?
Ans. Some advantages of using timestamp-based concurrency control schemes include: - High degree of concurrency: Transactions with non-conflicting operations can execute concurrently, improving system throughput. - Deadlock prevention: By enforcing the wait-die or wound-wait scheme, deadlock situations can be avoided. - Deterministic execution: The order of transactions can be precisely determined based on their timestamps, ensuring consistent and predictable results.
4. Are timestamp-based concurrency control schemes suitable for all types of database systems?
Ans. No, timestamp-based concurrency control schemes may not be suitable for all types of database systems. They are primarily designed for environments with a large number of short transactions. In systems with long-running transactions or complex dependencies, other concurrency control schemes might be more appropriate.
5. Can timestamp-based concurrency control schemes guarantee serializability in all scenarios?
Ans. No, timestamp-based concurrency control schemes cannot guarantee serializability in all scenarios. They are susceptible to certain anomalies such as cascading rollbacks and lost updates. To ensure serializability, additional techniques like strict two-phase locking or validation may be required.
62 videos|66 docs|35 tests
Download as PDF
Explore Courses for Computer Science Engineering (CSE) exam

Top Courses for Computer Science Engineering (CSE)

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

Previous Year Questions with Solutions

,

Introduction to Timestamp & Deadlock Prevention Schemes | Database Management System (DBMS) - Computer Science Engineering (CSE)

,

Important questions

,

ppt

,

Introduction to Timestamp & Deadlock Prevention Schemes | Database Management System (DBMS) - Computer Science Engineering (CSE)

,

mock tests for examination

,

Semester Notes

,

Exam

,

Sample Paper

,

Objective type Questions

,

Viva Questions

,

video lectures

,

MCQs

,

shortcuts and tricks

,

pdf

,

past year papers

,

Free

,

practice quizzes

,

Summary

,

Extra Questions

,

study material

,

Introduction to Timestamp & Deadlock Prevention Schemes | Database Management System (DBMS) - Computer Science Engineering (CSE)

;