Explain deadlock detection and recovery, Database Management System

Assignment Help:

Explain Deadlock detection and recovery

Deadlock Detection - A deadlock is said to take place when there is a circular chain of transaction, every waiting for the release of a data - item held by the next transaction in the chain, the algorithm to detect a deadlock is relies on the detection of such type of a circular chain in the current system in wait - for - graph. The algorithm produces the wait - for - graph at regular intervals and observes it for a chain. The algorithm begins with the assumption that there is no deadlock. 

Deadlock Recovery - To recover from deadlock. The cycles in the wait - for - graph should be broken. The general method of doing this is to roll back one or much more transactions in the cycles till the system shows no further deadlock situation. The procedure of deadlock recovery must make sure that a given transaction is not constantly the one chosen for rollback. The selection of the transaction to be rolled back is relies on the following considerations: 

  • The progress of the transaction and the number of data - items it has employed and modified.
  • The amount of computing lasting for the transaction and the number of data - items that have yet to be accessed through the transaction.
  • The relative cost of rolling back a transaction.

Related Discussions:- Explain deadlock detection and recovery

Sql queries, find a name whose address is erode from student table

find a name whose address is erode from student table

Triggers and Stored Procedures, 10A.53 Code an Oracle Database trigger to e...

10A.53 Code an Oracle Database trigger to enforce the constraint that an employee can never change his or her department. 10A.54 Code an Oracle Database trigger to allow the delet

What you understand by client-server environment, Problem: a) Briefly d...

Problem: a) Briefly describe what you understand by Client-Server environment b) The File Server is a simple form of Client-Server. Describe the principles of the File Serve

Define the two phase locking protocol, Define the Two Phase Locking Protoco...

Define the Two Phase Locking Protocol This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and u

Define union compatibility, Define union compatibility? Explain why INTERSE...

Define union compatibility? Explain why INTERSECTION of two relations cannot be performed if they are not union compatible? Two relations R(A1, A2,-------, An) and S(B1, B2,--

gaps in sequence values can happen when-sequences, Gaps in sequence values...

Gaps in sequence values can happen when: -     A rollback happens that is when a statement changes are not accepted. -     When the system crashes -     When a sequence i

Domain constraint, Domain Constraint It shows that each attribute in a ...

Domain Constraint It shows that each attribute in a relation has to contain an atomic value only from the corresponding domains. The data types associated with commercial RDBMS

Finkelstein methodology, PART MARKING: For this section, we will use part m...

PART MARKING: For this section, we will use part marking. This means we will supply model answers to all questions but we will only mark six questions. We will choose these randoml

What are referential integrity constraints, What are referential integrity ...

What are referential integrity constraints? A value that appears in single relation for a given set of attributes also appears for a particular set of attributes in another rel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd