What is the two-phase locking protocol

Assignment Help Database Management System
Reference no: EM13890963

Part -1:

1. Review questions

(a) What is the two-phase locking protocol? How does it guarantee serializability?

(b) Describe the wait-die and wound-wait protocols for deadlock prevention.

(c) Describe the cautious waiting, no waiting, and timeout protocols for deadlock prevention.

(d) What is a timestamp? How does the system generate timestamp?

2. Modify the data structure for multiple-mode locks (shared and exclusive) and the algorithm for read_lock(X), write_lock(X), and unlock(X) so that upgrading and downgrading of locks are possible. (The lock and unlock operations can be found on the course page under "figures for Chapter 20"; Hint: The lock needs to check the transaction id(s) that hold the lock, if any.) (20)

read_lock (X):

  B: if LOCK (X)="unlocked"

  then begin LOCK (¬ X) "read-locked"; no_of_reads(X) 1

  end

  else if LOCK(X)="read-locked"

  then no_of_reads(X) ¬ no_of _reads(X) + 1

  else begin wait (until LOCK (X)="unlocked" and

  the lock manager wakes up the transaction);

  go to B

  end;

write_lock (X):

  B: if LOCK (X)="unlocked"

  then LOCK (X) ¬ "write-locked"

  else begin

  wait (until LOCK(X)="unlocked" and

  he lock manager wakes up the transaction);

  go to B

  end;

unlock_item (X):

  if LOCK (X)="write-locked"

  then begin LOCK (X) "unlocked;" wakeup one of the waiting transactions, if any

  end

  else if LOCK(X)="read-locked"

  then begin

  no_of_reads(X) ¬ no_of_reads(X) - 1;

  if no_of_reads(X)=0

  then begin LOCK (X)="unlocked"; wakeup one of the waiting transactions, if any

  end

  end;

3. Apply the timestamp ordering algorithm to the schedules of Figure 19.8(b) and (c), and determine whether the algorithm will allow the execution of the schedules. (the figures can be found on the course page under "figures for chapter 19".)

186_Spatial and Temporal Data Management.png

4. The compatibility matrix of Figure 20.8 shows that IS and IX locks are compatible. Explain why this is valid. (the figures can be found on the course page under "figures for chapter 20".)

5. What is ‘certify' lock? Explain why this kind of locks is needed for multiversion 2PL.


IS IX S SIX X

yes yes yes yes no
IX yes yes no no no 
S yes no yes no no 
SIX yes no no no no 
X no no no no no 

Part -2:

1. What is the shadow paging principle? Assume that a database contains 7 pages and during the execution of a transaction page 5 and 1 are changed. Give the structures of the current directory and shadow directory before and after the transaction execution, respectively.

2. (a) Consider the five types of transactions given in Fig. 1. If "deferred update" strategy is used, which needs to be redone after the crash?

(b) Consider the five types of transactions given in Fig. 1. If "immediate update" strategy is used, which needs to be undone/redone after the crash?

1939_Spatial and Temporal Data Management1.png

3. (a) Discuss the two main types of constraints on specializations and generalization.

(b) How does a category differ from a regular shared subclass?

(c) Map the EER diagram shown in Fig. 4.1 into a relational schema.

4. Construct an R-tree over a set of records for geographical objects with the following coordinates [(x1, y1), (x2, y2)]:

[(0, 40), (60, 50)] ---- road1
[(40, 0), (60, 40)] ---- road2
[(15, 25), (35, 35)] ---- house1
[(70, 40), (80, 50)] ---- house2
[(70, 5), (80, 15)] ---- house3
[(35, 25), (80, 35)] ---- pipeline

Assume that each node (either leaf or interior) can store 3 entries.

5. Given the spatial database shown in the lecture notes on Spatial and Temporal Data Management. Design an SQL statement to find all the cities which are closer to Limerick than to Dublin.

Reference no: EM13890963

Questions Cloud

Summarize the role of religion for latinos : Summarize the role of religion for Latinos
What are the long-term consequences of manifest destiny? : What are the long-term consequences of Manifest Destiny?
Define various cultural groups in research studies : Can someone help me with finding the problems that may be associated with underrepresentation of various cultural groups in research studies, and does it devalue the data collection? Are there any efforts that can be made to assure inclusion of al..
Calculate the companys average income tax rate : Calculate the effective interest rate on the notes payable for DeBauge Realtors, Inc. Calculate the company's average income tax rate.
What is the two-phase locking protocol : What is the two-phase locking protocol? How does it guarantee serializability and describe the wait-die and wound-wait protocols for deadlock prevention.
Compare and contrast the concepts of conformity and obedienc : Prepare a response in which you evaluate the effect of group influence on the self-using classical and contemporary literature. Address the following in your paper: Compare and contrast the concepts of conformity and obedience.
Diversity within health and medicine : Conduct a comprehensive literature review of your selected application area finding peer-reviewed, scholarly journal articles that focus on the intersection between social psychology and Diversity within Health and Medicine. Focus your presentatio..
Identify at least two issues that misa and jennifer : Assume Misa Chien and Jennifer Green of Nom Nom Truck plan on expanding their business to accommodate more product lines.
Discuss the implications to the public-private governance : Examine and discuss the implications to the public-private governance.

Reviews

Write a Review

Database Management System Questions & Answers

  Describe seperation between users and database administrator

describe seperation between users and database administrators

  1 explain the concept of physical data independence and its

1. explain the concept of physical data independence and its importance in database systems2. explain what problems are

  Define what is a data warehouse and why is rei building one

What is a data warehouse and why is REI building one and What are some of the risks or concerns surrounding the creation of a data warehouse

  Write query to display first name and last name as full name

Write query to display first name and last name as full name

  Describe the entities of the database

Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity

  Draw an entity relationship diagram

1. Draw an entity relationship diagram (ERD) for the following situation: A company has a number of employees. Each employee is identified by an Employee_Id. The company wants to store Employee_Name, Employee_Address, and Employee_BirthDate in the da..

  Patients post cardiac bypass surgery

Monitor Renal Outcomes in patients post cardiac bypass surgery?

  1distinguish between the terms lsquoerp implementation and

1.distinguish between the terms lsquoerp implementation and lsquoerp configuration2.explain the purpose of the entity

  Database and programming design

Database and Programming Design

  Explain the purpose of sql data access

Why is SQL Data Access considered middleware? Explain the purpose of SQL Data Access. How does it differ from other types of middleware

  Use sql to create database

Use SQL to create the following database; to including referential integrity. You may NOT use the GUI for this part of the exercise. COURSE ( CourseNu, CourseName, CreditHrs).

  The strayer oracle server may be used to test and compile

the strayer oracle server may be used to test and compile the sql queries developed for this assignment. your

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd