際際滷

際際滷Share a Scribd company logo
LOCK BASED PROTOCOL
LOCK BASED PROTOCOLS
 A lock is a mechanism to control concurrent access to a data item
 Data items can be locked in two modes :
1. exclusive (X) mode. Data item can be both read as well as
written. X-lock is requested using lock-X instruction.
2. shared (S) mode. Data item can only be read. S-lock is
requested using lock-S instruction.
 Lock requests are made to the concurrency-control manager by the
programmer. Transaction can proceed only after request is granted.
LOCK BASED PROTOCOL(CONTD)
 Lock-compatibility matrix
 A transaction may be granted a lock on an item if the requested lock is compatible
with locks already held on the item by other transactions
 Any number of transactions can hold shared locks on an item,
 But if any transaction holds an exclusive on the item no other transaction may hold
any lock on the item.
 If a lock cannot be granted, the requesting transaction is made to wait till all
incompatible locks held by other transactions have been released. The lock is then
granted.
LOCK BASED PROTOCOL(CONTD)
 Example of a transaction performing locking:
T2: lock-S(A);
read (A);
unlock(A);
lock-S(B);
read (B);
unlock(B);
display(A+B)
 Locking as above is not sufficient to guarantee serializability  if A and B get updated in-
between the read of A and B, the displayed sum would be wrong.
 A locking protocol is a set of rules followed by all transactions while requesting and releasing
locks. Locking protocols restrict the set of possible schedules.
TWO PHASE LOCKING PROTOCOL
 This protocol ensures conflict-serializable schedules.
 Phase 1: Growing Phase
 Transaction may obtain locks
 Transaction may not release locks
 Phase 2: Shrinking Phase
 Transaction may release locks
 Transaction may not obtain locks
 The protocol assures serializability. It can be proved that the transactions can
be serialized in the order of their lock points (i.e., the point where a
transaction acquired its final lock).
TWO PHASE LOCKING
PROTOCOL(CONTD)
 There can be conflict serializable schedules that cannot be obtained if two-
phase locking is used.
 However, in the absence of extra information (e.g., ordering of access to
data), two-phase locking is needed for conflict serializability in the following
sense:
 Given a transaction Ti that does not follow two-phase locking, we can find a
transaction Tj that uses two-phase locking, and a schedule for Ti and Tj that is not
conflict serializable.
THANK YOU

More Related Content

What's hot (20)

Deadlock dbms
Deadlock dbmsDeadlock dbms
Deadlock dbms
Vardhil Patel
Transaction states and properties
Transaction states and propertiesTransaction states and properties
Transaction states and properties
Chetan Mahawar
Concurrency control
Concurrency controlConcurrency control
Concurrency control
Subhasish Pati
Concurrency Control in Database Management System
Concurrency Control in Database Management SystemConcurrency Control in Database Management System
Concurrency Control in Database Management System
Janki Shah
serializability in dbms
serializability in dbmsserializability in dbms
serializability in dbms
Saranya Natarajan
Deadlock
DeadlockDeadlock
Deadlock
Rajandeep Gill
Free space managment46
Free space managment46Free space managment46
Free space managment46
myrajendra
File organization 1
File organization 1File organization 1
File organization 1
Rupali Rana
Transaction management DBMS
Transaction  management DBMSTransaction  management DBMS
Transaction management DBMS
Megha Patel
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMS
koolkampus
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS
koolkampus
deadlock avoidance
deadlock avoidancedeadlock avoidance
deadlock avoidance
wahab13
Introduction TO Finite Automata
Introduction TO Finite AutomataIntroduction TO Finite Automata
Introduction TO Finite Automata
Ratnakar Mikkili
Query optimization
Query optimizationQuery optimization
Query optimization
Pooja Dixit
Transaction processing ppt
Transaction processing pptTransaction processing ppt
Transaction processing ppt
Javed Khan
concurrency-control
concurrency-controlconcurrency-control
concurrency-control
Saranya Natarajan
Functional dependency
Functional dependencyFunctional dependency
Functional dependency
Tamajit Chakraborty
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
koolkampus
Binary Search Tree
Binary Search TreeBinary Search Tree
Binary Search Tree
sagar yadav
Databases: Normalisation
Databases: NormalisationDatabases: Normalisation
Databases: Normalisation
Damian T. Gordon
Transaction states and properties
Transaction states and propertiesTransaction states and properties
Transaction states and properties
Chetan Mahawar
Concurrency control
Concurrency controlConcurrency control
Concurrency control
Subhasish Pati
Concurrency Control in Database Management System
Concurrency Control in Database Management SystemConcurrency Control in Database Management System
Concurrency Control in Database Management System
Janki Shah
Free space managment46
Free space managment46Free space managment46
Free space managment46
myrajendra
File organization 1
File organization 1File organization 1
File organization 1
Rupali Rana
Transaction management DBMS
Transaction  management DBMSTransaction  management DBMS
Transaction management DBMS
Megha Patel
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMS
koolkampus
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS
koolkampus
deadlock avoidance
deadlock avoidancedeadlock avoidance
deadlock avoidance
wahab13
Introduction TO Finite Automata
Introduction TO Finite AutomataIntroduction TO Finite Automata
Introduction TO Finite Automata
Ratnakar Mikkili
Query optimization
Query optimizationQuery optimization
Query optimization
Pooja Dixit
Transaction processing ppt
Transaction processing pptTransaction processing ppt
Transaction processing ppt
Javed Khan
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
koolkampus
Binary Search Tree
Binary Search TreeBinary Search Tree
Binary Search Tree
sagar yadav
Databases: Normalisation
Databases: NormalisationDatabases: Normalisation
Databases: Normalisation
Damian T. Gordon

Similar to Lock based protocols (20)

concurrency control
concurrency controlconcurrency control
concurrency control
rajshreemuthiah
Cs501 concurrency
Cs501 concurrencyCs501 concurrency
Cs501 concurrency
Kamal Singh Lodhi
Concurrency control!
Concurrency control!Concurrency control!
Concurrency control!
Ashish K
Dbms
DbmsDbms
Dbms
kasthurimukila
Concurrency control PPT
Concurrency control PPTConcurrency control PPT
Concurrency control PPT
ShushrutGupta
Ch16
Ch16Ch16
Ch16
Welly Dian Astika
Concurrency Control Techniques
Concurrency Control TechniquesConcurrency Control Techniques
Concurrency Control Techniques
Raj vardhan
Transaction management
Transaction managementTransaction management
Transaction management
janani thirupathi
Concurrency Control database management system
Concurrency Control database management systemConcurrency Control database management system
Concurrency Control database management system
Mahima788170
Concurrency Control database management system
Concurrency Control database management systemConcurrency Control database management system
Concurrency Control database management system
Mahima788170
Concurrency Control.pptx
Concurrency Control.pptxConcurrency Control.pptx
Concurrency Control.pptx
VijaySourtha
Concurrency Control in Databases.Database management systems
Concurrency Control in Databases.Database management systemsConcurrency Control in Databases.Database management systems
Concurrency Control in Databases.Database management systems
ambikavenkatesh2
Database management system chapter16
Database management system chapter16Database management system chapter16
Database management system chapter16
Md. Mahedi Mahfuj
Chapter18
Chapter18Chapter18
Chapter18
gourab87
deadlock and locking - dbms
deadlock and locking -  dbmsdeadlock and locking -  dbms
deadlock and locking - dbms
Surya Swaroop
Concurrency control
Concurrency controlConcurrency control
Concurrency control
varsha singh
Vani dbms
Vani dbmsVani dbms
Vani dbms
SangeethaSasi1
Concurrency note.pdf
Concurrency note.pdfConcurrency note.pdf
Concurrency note.pdf
BijayNag1
Concurrency Control, Recovery, Case Studies
Concurrency Control, Recovery, Case StudiesConcurrency Control, Recovery, Case Studies
Concurrency Control, Recovery, Case Studies
Prabu U
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
mukul narayana
Concurrency control!
Concurrency control!Concurrency control!
Concurrency control!
Ashish K
Concurrency control PPT
Concurrency control PPTConcurrency control PPT
Concurrency control PPT
ShushrutGupta
Concurrency Control Techniques
Concurrency Control TechniquesConcurrency Control Techniques
Concurrency Control Techniques
Raj vardhan
Concurrency Control database management system
Concurrency Control database management systemConcurrency Control database management system
Concurrency Control database management system
Mahima788170
Concurrency Control database management system
Concurrency Control database management systemConcurrency Control database management system
Concurrency Control database management system
Mahima788170
Concurrency Control.pptx
Concurrency Control.pptxConcurrency Control.pptx
Concurrency Control.pptx
VijaySourtha
Concurrency Control in Databases.Database management systems
Concurrency Control in Databases.Database management systemsConcurrency Control in Databases.Database management systems
Concurrency Control in Databases.Database management systems
ambikavenkatesh2
Database management system chapter16
Database management system chapter16Database management system chapter16
Database management system chapter16
Md. Mahedi Mahfuj
Chapter18
Chapter18Chapter18
Chapter18
gourab87
deadlock and locking - dbms
deadlock and locking -  dbmsdeadlock and locking -  dbms
deadlock and locking - dbms
Surya Swaroop
Concurrency control
Concurrency controlConcurrency control
Concurrency control
varsha singh
Concurrency note.pdf
Concurrency note.pdfConcurrency note.pdf
Concurrency note.pdf
BijayNag1
Concurrency Control, Recovery, Case Studies
Concurrency Control, Recovery, Case StudiesConcurrency Control, Recovery, Case Studies
Concurrency Control, Recovery, Case Studies
Prabu U

Recently uploaded (20)

Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptxUnit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Kirankumar Jagtap
pptforclass10kkkkkkkclasseee2eewsw10scienve
pptforclass10kkkkkkkclasseee2eewsw10scienvepptforclass10kkkkkkkclasseee2eewsw10scienve
pptforclass10kkkkkkkclasseee2eewsw10scienve
jeevasreemurali
Cecille Seminario Marra - Specializes In Medical Technology
Cecille Seminario Marra - Specializes In Medical TechnologyCecille Seminario Marra - Specializes In Medical Technology
Cecille Seminario Marra - Specializes In Medical Technology
Cecille Seminario Marra
Artificial intelligence and Machine learning in remote sensing and GIS
Artificial intelligence  and Machine learning in remote sensing and GISArtificial intelligence  and Machine learning in remote sensing and GIS
Artificial intelligence and Machine learning in remote sensing and GIS
amirthamm2083
Floating Offshore Wind in the Celtic Sea
Floating Offshore Wind in the Celtic SeaFloating Offshore Wind in the Celtic Sea
Floating Offshore Wind in the Celtic Sea
permagoveu
DAY 4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV.pptx
DAY 4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV.pptxDAY 4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV.pptx
DAY 4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV.pptx
GellaBenson1
FIRST Tech Challenge/Robotics: Scouting out the competition
FIRST Tech Challenge/Robotics: Scouting out the competitionFIRST Tech Challenge/Robotics: Scouting out the competition
FIRST Tech Challenge/Robotics: Scouting out the competition
FTC Team 23014
Analysis of Daylighting in Interior Spaces using the Daylight Factor - A Manu...
Analysis of Daylighting in Interior Spaces using the Daylight Factor - A Manu...Analysis of Daylighting in Interior Spaces using the Daylight Factor - A Manu...
Analysis of Daylighting in Interior Spaces using the Daylight Factor - A Manu...
Ignacio J. J. Palma Carazo
Telehealth technology A new horizon in health care
Telehealth technology  A new horizon in health careTelehealth technology  A new horizon in health care
Telehealth technology A new horizon in health care
Dr INBAMALAR T M
Software security: Security a Software Issue
Software security: Security a Software IssueSoftware security: Security a Software Issue
Software security: Security a Software Issue
Dr Sarika Jadhav
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
ssuserb91a20
Caddlance PortfolioMixed Projects 2024.pdf
Caddlance PortfolioMixed Projects 2024.pdfCaddlance PortfolioMixed Projects 2024.pdf
Caddlance PortfolioMixed Projects 2024.pdf
sonam254547
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptxBrown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
shafieqadwasyazanee
Using 3D CAD in FIRST Tech Challenge - Fusion 360
Using 3D CAD in FIRST Tech Challenge - Fusion 360Using 3D CAD in FIRST Tech Challenge - Fusion 360
Using 3D CAD in FIRST Tech Challenge - Fusion 360
FTC Team 23014
Energy Transition Factbook Bloomberg.pdf
Energy Transition Factbook Bloomberg.pdfEnergy Transition Factbook Bloomberg.pdf
Energy Transition Factbook Bloomberg.pdf
CarlosdelaFuenteMnde
module-4.1-Class notes_R and DD_basket-IV -.pdf
module-4.1-Class notes_R and DD_basket-IV -.pdfmodule-4.1-Class notes_R and DD_basket-IV -.pdf
module-4.1-Class notes_R and DD_basket-IV -.pdf
ritikkumarchaudhury7
UHV UNIT-5 IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
UHV UNIT-5    IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...UHV UNIT-5    IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
UHV UNIT-5 IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
ariomthermal2031
02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf
ruioliveira1921
NBA Criteria TIER I and TIER II Comparison
NBA Criteria TIER I and TIER II ComparisonNBA Criteria TIER I and TIER II Comparison
NBA Criteria TIER I and TIER II Comparison
Dr INBAMALAR T M
Instill-AI------------------------------
Instill-AI------------------------------Instill-AI------------------------------
Instill-AI------------------------------
Jason Kuan
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptxUnit-03 Cams and Followers in Mechanisms of Machines.pptx
Unit-03 Cams and Followers in Mechanisms of Machines.pptx
Kirankumar Jagtap
pptforclass10kkkkkkkclasseee2eewsw10scienve
pptforclass10kkkkkkkclasseee2eewsw10scienvepptforclass10kkkkkkkclasseee2eewsw10scienve
pptforclass10kkkkkkkclasseee2eewsw10scienve
jeevasreemurali
Cecille Seminario Marra - Specializes In Medical Technology
Cecille Seminario Marra - Specializes In Medical TechnologyCecille Seminario Marra - Specializes In Medical Technology
Cecille Seminario Marra - Specializes In Medical Technology
Cecille Seminario Marra
Artificial intelligence and Machine learning in remote sensing and GIS
Artificial intelligence  and Machine learning in remote sensing and GISArtificial intelligence  and Machine learning in remote sensing and GIS
Artificial intelligence and Machine learning in remote sensing and GIS
amirthamm2083
Floating Offshore Wind in the Celtic Sea
Floating Offshore Wind in the Celtic SeaFloating Offshore Wind in the Celtic Sea
Floating Offshore Wind in the Celtic Sea
permagoveu
DAY 4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV.pptx
DAY 4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV.pptxDAY 4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV.pptx
DAY 4VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV.pptx
GellaBenson1
FIRST Tech Challenge/Robotics: Scouting out the competition
FIRST Tech Challenge/Robotics: Scouting out the competitionFIRST Tech Challenge/Robotics: Scouting out the competition
FIRST Tech Challenge/Robotics: Scouting out the competition
FTC Team 23014
Analysis of Daylighting in Interior Spaces using the Daylight Factor - A Manu...
Analysis of Daylighting in Interior Spaces using the Daylight Factor - A Manu...Analysis of Daylighting in Interior Spaces using the Daylight Factor - A Manu...
Analysis of Daylighting in Interior Spaces using the Daylight Factor - A Manu...
Ignacio J. J. Palma Carazo
Telehealth technology A new horizon in health care
Telehealth technology  A new horizon in health careTelehealth technology  A new horizon in health care
Telehealth technology A new horizon in health care
Dr INBAMALAR T M
Software security: Security a Software Issue
Software security: Security a Software IssueSoftware security: Security a Software Issue
Software security: Security a Software Issue
Dr Sarika Jadhav
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
Chapter1-Introduction 旅留粒粒旅虜劉 劉僚僚凌旅竜
ssuserb91a20
Caddlance PortfolioMixed Projects 2024.pdf
Caddlance PortfolioMixed Projects 2024.pdfCaddlance PortfolioMixed Projects 2024.pdf
Caddlance PortfolioMixed Projects 2024.pdf
sonam254547
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptxBrown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
Brown Vintage Minimalist Animated Artist Portfolio Presentation.pptx
shafieqadwasyazanee
Using 3D CAD in FIRST Tech Challenge - Fusion 360
Using 3D CAD in FIRST Tech Challenge - Fusion 360Using 3D CAD in FIRST Tech Challenge - Fusion 360
Using 3D CAD in FIRST Tech Challenge - Fusion 360
FTC Team 23014
Energy Transition Factbook Bloomberg.pdf
Energy Transition Factbook Bloomberg.pdfEnergy Transition Factbook Bloomberg.pdf
Energy Transition Factbook Bloomberg.pdf
CarlosdelaFuenteMnde
module-4.1-Class notes_R and DD_basket-IV -.pdf
module-4.1-Class notes_R and DD_basket-IV -.pdfmodule-4.1-Class notes_R and DD_basket-IV -.pdf
module-4.1-Class notes_R and DD_basket-IV -.pdf
ritikkumarchaudhury7
UHV UNIT-5 IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
UHV UNIT-5    IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...UHV UNIT-5    IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
UHV UNIT-5 IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON ...
ariomthermal2031
02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf02.BigDataAnalytics curso de Legsi (1).pdf
02.BigDataAnalytics curso de Legsi (1).pdf
ruioliveira1921
NBA Criteria TIER I and TIER II Comparison
NBA Criteria TIER I and TIER II ComparisonNBA Criteria TIER I and TIER II Comparison
NBA Criteria TIER I and TIER II Comparison
Dr INBAMALAR T M
Instill-AI------------------------------
Instill-AI------------------------------Instill-AI------------------------------
Instill-AI------------------------------
Jason Kuan

Lock based protocols

  • 2. LOCK BASED PROTOCOLS A lock is a mechanism to control concurrent access to a data item Data items can be locked in two modes : 1. exclusive (X) mode. Data item can be both read as well as written. X-lock is requested using lock-X instruction. 2. shared (S) mode. Data item can only be read. S-lock is requested using lock-S instruction. Lock requests are made to the concurrency-control manager by the programmer. Transaction can proceed only after request is granted.
  • 3. LOCK BASED PROTOCOL(CONTD) Lock-compatibility matrix A transaction may be granted a lock on an item if the requested lock is compatible with locks already held on the item by other transactions Any number of transactions can hold shared locks on an item, But if any transaction holds an exclusive on the item no other transaction may hold any lock on the item. If a lock cannot be granted, the requesting transaction is made to wait till all incompatible locks held by other transactions have been released. The lock is then granted.
  • 4. LOCK BASED PROTOCOL(CONTD) Example of a transaction performing locking: T2: lock-S(A); read (A); unlock(A); lock-S(B); read (B); unlock(B); display(A+B) Locking as above is not sufficient to guarantee serializability if A and B get updated in- between the read of A and B, the displayed sum would be wrong. A locking protocol is a set of rules followed by all transactions while requesting and releasing locks. Locking protocols restrict the set of possible schedules.
  • 5. TWO PHASE LOCKING PROTOCOL This protocol ensures conflict-serializable schedules. Phase 1: Growing Phase Transaction may obtain locks Transaction may not release locks Phase 2: Shrinking Phase Transaction may release locks Transaction may not obtain locks The protocol assures serializability. It can be proved that the transactions can be serialized in the order of their lock points (i.e., the point where a transaction acquired its final lock).
  • 6. TWO PHASE LOCKING PROTOCOL(CONTD) There can be conflict serializable schedules that cannot be obtained if two- phase locking is used. However, in the absence of extra information (e.g., ordering of access to data), two-phase locking is needed for conflict serializability in the following sense: Given a transaction Ti that does not follow two-phase locking, we can find a transaction Tj that uses two-phase locking, and a schedule for Ti and Tj that is not conflict serializable.