Identify all actions that need to be undone

Assignment Help Computer Engineering
Reference no: EM132105052

In this problem, you need to simulate the actions taken by the logging and recovery manager discussed in the class. Consider the following log records and buffer actions:

timeLSNLogBuffer Actions
0 00 update: T1 updates P7 P7 brought in to the buffer
1 10 update: T1 updates P8 P8 brought into the buffer
2 20 begin_checkpoint
3 30 end_checkpoint
4 40 update: T2 updates P7
5
CRASH RESTART

a) For the actions listed above, show Transaction Table (XT) and Dirty Page Table (DPT) after each action. Assume that DPT holds pageID and recLSN, and XT contains transID and lastLSN.

b) Simulate Analysis phase to reconstruct XT and DPT after crash. Identify the point where the Analysis phase starts scanning log records and show XT and DPT after each action.

c) Simulate Redo phase: first identify where the Redo phase starts scanning the log records.Then, for each action identify whether it needs to be redone or not.

d) Simulate Undo phase: identify all actions that need to be undone. In what order will they be undone?

Reference no: EM132105052

Questions Cloud

What is profit margin-brighton company : Brighton Company has income from operations of $36,000, invested assets of $180,000, and sales of $720,000.
Write down what is the domain of your function : He has 67 feet fencing material. He wants to make the biggest area for his garden, so he will use one side of the fence of his yard to save some material.
Actual and standard direct materials costs : The actual and standard direct materials costs for producing a specified quantity of product are as follows:
Reduction in income tax rates influence consumption : Proffered with the Keynesian consumption function, how would a reduction in income tax rates influence consumption?
Identify all actions that need to be undone : Simulate Redo phase: first identify where the Redo phase starts scanning the log records.Then, for each action identify whether it needs to be redone or not.
Accrual basis of accounting : Why is usually that the accrual basis of accounting is ordinarily of the preference as compared to over cash basis?
Ratio on reserve set : If a bank holds an access reserve of $8000 and the checkable deposits are at $150000 and the ratio on reserve set at 20%?
How much are the budgeted purchases for? november : Beginning inventory for November $47000 and ending inventory for November is estimated at $53000. How much are the budgeted purchases for? November?
Create an employee object using the constructor : Write another main function to answer the following parts. Only submit the main function for this problem.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Small number of biological attacks over the past decades

We have seen a small number of biological attacks over the past decades and concern about this form of attack has caused the US

  Create captioned slide show controlled by navigation buttons

COGS3 - Introduction to Computing Assignment. Create a captioned slide show controlled by navigation buttons. create an images directory in your public_html directory and place all of the images in it

  What is the underlying rationale for diversity jurisdiction

Describe a technological change you are familiar with that has changed a law.

  Define organizations access control policy

Research how organizations Access Control Policy builds enforcement measures to ensure their access control system is effective and safe.

  Create a gui pad that has numbers and letters

Create a GUI pad that has numbers and letters(That can be capitalized), and a text area to display One button that clears the text.

  Store a persons name in a variable and then print that name

Name Cases: Store a person's name in a variable, and then print that person's name in lowercase, uppercase, and title case.

  What is a misaligned operand

Design a universal programmable interface that can connect almost any peripheral to a 68000 system-even if the peripheral has unusual timing restrictions.

  Write an analysis of four papers on topic in Robotics

SIT740 Research and Development in Information Technology Assignments. Write an analysis of four papers on a given topic in AI & Robotics

  Describe the methods to mitigate the vulnerabilities

Describe the methods to mitigate the vulnerabilities, as they relate to the seven domains. Describe the impact and the vulnerability of the SCADA.

  How does the given situation serve as an analogy

Suppose there is a small commercial retail building in town. How does this situation serve as an analogy for the concept of IP addresses with TCP port numbers?

  How do the servers and clients interact

Describe the characteristics of any commercial distributed system you have access to. What services are provided? How do the servers and clients interact?

  Generate a few more visualizations that examine any aspect

Generate a few more visualizations that examine any other weather aspect you're interested in for any locations you're curious about.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd