Illustrating wait-die and wound-wait strategies

Assignment Help Database Management System
Reference no: EM133337495

Basics of Concurrency Control

Question 1. Deadlock prevention. In the lecture notes, there is an example illustrating Wait-die and wound-wait strategies for deadlock prevention:
• Assuming TS(T22) = 22, TS(T23) = 23, TS(T24) = 24. Data items X and Y are held by T23.
• Wait-die: If T22 requests write (X), it must wait. If T24 requests write(Y), it will be rolled back.
• Wound-wait: If T22 requests write (X), T23 is wound. If T24 requests write(Y), T24 will wait.
Provide a schedule involving three transactions T22, T23 and T24. Each transaction should access at least two data items. The schedule uses locking schedule but does not use 2PL. In order to prevent deadlock, timestamps are used and we assume TS(Ti) = I; for example TS(T22) = 22. Transactions with smaller timestamps are older. The schedule should be able to demonstrate the deadlock prevention strategies.

Question 2. Wait-for graph.
(a). For each of the two wait-for graph examples, show a concrete schedule (with read and write operations involving T25, T26, T27 and T28) which would produce that graph.

2191_Concurrency Control.jpg

 

Question 3. Timestamp-based protocol. Verify (or point out problems of) the partial schedule shown in a slide (duplicated below) using timestamp-based protocol.

2456_Concurrency Control1.jpg

 

Assuming all the data items having initial timestamp 0, and initial timestamp for Ti = i (for example, TS(T1) = 1, TS(T2) = 2, etc.) For each read or write operation, you should plug in the data (i.e., timestamps involved) to verify each comparison needed for condition checking, and indicate whether any timestamp has changed due to this , operation; and if yes, what is the new value of the read or write timestamp of a particular data item.

Question 4. 2PL and timestamp schedules.
(a) Consider the following schedule. Is it a valid 2PL schedule? Is this schedule possible under timestamp protocol? Justify your answer. (Assuming the subscript of a transaction indicates the timestamp of the transaction.) For checking timestamp schedule, the same requirement of indicated in the previous question applies. [Note: R stands for read, W stands for write, L-S stands for shared lock, UL-S stands for unlock of shared lock, etc.].

T1

T2

L-S(A)

R(A)

 

 

 

L-S(B)

R(B)

UL(A)

UL(B)

 

 

L-X(B)

W(B)

UL(B)

 

 

 

 

(b) Consider the following schedule. Is it allowed in timestamp protocol? Is it possible under 2PL? Justify your answer.

T1

T2

T3

W(A)

 

 

W(B)

 

W(A)

 

 

W(B)

 

 

W(A)

(c) What kind of conclusion you can draw from (a) and (b)?

Reference no: EM133337495

Questions Cloud

Preference in terms of how you communicate : Do you have a preference in terms of how you communicate? This preference can be related to technology
Provides system management tools for network : SolarWinds is a major software company which provides system management tools for network and infrastructure.
Discuss one challenge your team will face : Discuss one challenge your team will face in each of the process groups.
Recommended implementation and management strategies : Project Plan: Illustrate your recommended implementation and management strategies.
Illustrating wait-die and wound-wait strategies : CSCI 8340 Database Management Systems, University of Nebraska Omaha show a concrete schedule (with read and write operations involving T25, T26, T27 and T28)
Describe sqli attack types : Describe SQLi attack types that require actual transfer of data, and highlight the main difference among them.
Unix systems to support extended access control lists : Explain the strategy used by Unix systems to support extended access control lists.
Property issue of information regarding expert systems : Illustrate examples of the four ethical issues in today's society, if any. Critique on the property issue of information regarding the expert systems
Explain the three roles in scrum project : How would one make a progress report to be presented to project stakeholders? Explain the three roles in a Scrum project.

Reviews

Write a Review

Database Management System Questions & Answers

  Roles and responsibilities of database administrator

For this assignment, research different roles and responsibilities of a database administrator. Research 3 routine tasks involved in database administration

  How many records would you expect to be removed

A dataset has 1000 records and 50 variables with 5% of the values missing, spread randomly throughout. About how many records would you expect to be removed?

  Companys traditional costing system-pacchiana manufacturing

Unit product cost of product R21V under the company's traditional costing system - unit product cost of product D00B under the activity-based costing system is closest

  Create an internal dtd for the xml document

Create an internal DTD for the XML document above, write the whole XML document - Create an external DTD for the XML document above, write the whole XML document by linking the external DTD to the XML document

  Describe use case for implementing edge computing solutions

Describe one use case for implementing Edge Computing solutions. For example, a smart fridge that sends out information about its temperature.

  Seconds of elapsed time to execute

Suppose that a certain program takes 500 seconds of elapsed time to execute. Out of these 500 seconds, 280 seconds is the CPU time and the rest is I/O time. What will be the I/O time?

  Creating an information system using ms excel based macros

Provide a user manual/instructions on how their database and excel work sheets works and how they help their client improve their business processes

  Dependencies can you infer does not hold over relation s

From the JD, the set of relation schemes SP, PJ, and JS is a lossless-join decomposition of SPJ. Construct an instance of SPJ to illustrate that no two of these schemes su?ce.

  Determine the functional dependencies

Write SQL queries (do not use QBE) for the following questions and execute the queries after creating the above database on MS Access.

  Sales transaction in retail clothing

Examine different sales transactions. Design a context diagram and a level-0 diagram that represent the selling system at the store.

  Explain why is hashing all database inputs not considered

question 1 what are the similarities between an md5 hash and a fingerprint?question 2 how would you encrypt a web

  Database for a library of a university

Each book has different ID (also each book of same name and same author (but number of copies) will have different ID), author name and any additional information you think it is important

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd