Define the two phase locking protocol, Database Management System

Assignment Help:

Define the Two Phase Locking Protocol

This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and unlock requests in two phases:

Growing Phase: A transaction may acquire locks, but may not release any lock.

Shrinking Phase: A transaction may release locks, but may not acquire any new locks. Basically, a transaction is in growing phase. The transaction obtains locks as required. Just one time the transaction releases a lock, it comes in the shrinking phase, and it can issue no more lock requests. Two-phase locking makes sure conflict serializability, but does not make sure freedom from deadlock.


Related Discussions:- Define the two phase locking protocol

Query processor in database management system, Query Processor The qu...

Query Processor The query language processor is responsible for taking query language statements or shifting them from the English-like syntax of the query language to a form

Cartesian product, If R1 and R2 are two relations or functions, then the re...

If R1 and R2 are two relations or functions, then the result of R3 = R1 × R2 is the combination of tuples that are in R1 and R2. The product is associative and commutative. Degr

Create table, What are the advantages of creating a table from existing tab...

What are the advantages of creating a table from existing table?

Data model in DBMS, how many types of data model in DBMS? explain data abst...

how many types of data model in DBMS? explain data abstraction with its different level

Having clause with sub queries, Having Clause with sub queries: First we h...

Having Clause with sub queries: First we have to recollect the GROUP BYclause. The following query searches the minimum salary in every department. SELECT DEPTNO, MIN (SAL)

Explain hashing techniques, Explain Hashing techniques The hashing tech...

Explain Hashing techniques The hashing techniques can be categorized as: Static Hashing Techniques - In this method, the data can be viewed a collection of buckets, along with

Primary index, Primary index A primary index is a file that has a sorte...

Primary index A primary index is a file that has a sorted series of records having two columns: a block address for that key field in the data file; and the ordering key field.

Dbms, Retrieve the S&S In-Chapter Database (in Microsoft Access format) fro...

Retrieve the S&S In-Chapter Database (in Microsoft Access format) from the text's Web site (or create the tables in Table 4-5 in a relational DBMS product). Write queries to answer

Differences between structured data and unstructured data, Explain the diff...

Explain the differences between structured data and unstructured data. Structured data are facts concerning objects and events. The most significant structured data are numeric

Explain the function of input controls, Explain the function of input contr...

Explain the function of input controls. Identify four types of input control and explain the function of each. Provide an example of a data integrity error that could occur i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd