multiple-mode locks, Database Management System

Assignment Help:

Multiple-mode locks: It offers two locks: exclusive locks and shared locks. But why do we require these two locks? There are a lot of transactions in the database system that never updates the data values. These transactions can coexist with some other transactions that update the database. In such a condition multiple reads are permitted on a data item, so multiple transactions can lock a data item in the read or shared lock. On the other hand, if a transaction is an updating transaction, i.e., it updates the data items, it has to make sure that no other transaction can access (read or write) those data items that it needs to update. In this situation, the transaction places an exclusive lock on the data items. Therefore, a somewhat higher level of concurrency can be achieved in comparison to the binary locking scheme


Related Discussions:- multiple-mode locks

Explain the need for the bcnf normal form, Surgeons identified by doctor ID...

Surgeons identified by doctor ID (DOCID) operate on patients identified by patient ID (PATID) in operating theaters identified by room numbers (ROOMNO). Each surgeon can operate on

What are data models, What are data models? Explain it detail? Entity ...

What are data models? Explain it detail? Entity relationship model Rectangles Ellipse Diamonds Lines Relational model Relational model use a collection

Referential integrity, It can be easily defined as: The database must no...

It can be easily defined as: The database must not have any unmatched foreign key values. The term "unmatched foreign key value" means a foreign key value for which there doe

Synonyms and indexes, Synonyms and Indexes Some of the essential proper...

Synonyms and Indexes Some of the essential properties of indexes are: An Index is a schema Object Indexes can be formed explicitly or automatically Indexes are m

What is the aim of object design, What is the aim of object design The ...

What is the aim of object design The aim of object design is to identify object which the system   contains and the interactions among them. The system implements specification

Cataloguing, differences between a classified catalog and a dictionary cata...

differences between a classified catalog and a dictionary catalog

Hashed file organisation, Hashed File Organisation Hashing is the most ...

Hashed File Organisation Hashing is the most common form of purely random access to a database or file. It is also used to access columns that do not have an index as an optimi

Create a e-r diagram, Information about films holds information about movie...

Information about films holds information about movies, stars and studios. Movies have a title, year of production, length and the film type. Stars have a name and address. Studi

Describe the storage structure of indexed sequential files, Describe the st...

Describe the storage structure of indexed sequential files and their access method.  Ans:   Storage structure of Indexed Sequential files and their access: To achieve fast rand

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd