Explain strict two-phase locking, Database Management System

Assignment Help:

Explain Strict Two-Phase locking

A transaction T does not release any type of its exclusive (X) locks until that transaction commits or aborts. In this method no other transaction can access the item which is written by T unless the transaction T commits. This is a better method than the two discussed.

In 2PL, a transaction may not be capable to release its locks even after make use of it. The data item will stay locked until the transaction ends all the actions on all the data items. If each transaction in a schedule follows 2PL after that conflict serializability can be made sure. This is since if the schedule is not serializable, the precedence graph for schedule S contains transactions T1, T2 ..... Tn will have a cycle ... assume that a cycle consists of T1, T2 ..... Tn ,T1.  The meaning of this is that a lock operation by T2 is followed by an unlock operation by T1; A Lockoperation T3 is followed by an unlock operation by T2 ... and etc.  Though this is a contradiction of the assertion that T1 is by using two phase locking protocol. So the assumption that graph is having a cycle is wrong and therefore S is serializable.


Related Discussions:- Explain strict two-phase locking

Consistency-transaction , Consistency: This property makes sure that a com...

Consistency: This property makes sure that a complete transaction implementation takes a database from one consistent state to another consistent state. If the transaction fails e

What is odbc and what is its function, Question: (a) What is ODBC and w...

Question: (a) What is ODBC and what is its function? (b) What is Web application server, and how does it work from a database perspective? (c) What does e-commerce mean

An Apriori algorithm, Submission Requirements All answers must be co...

Submission Requirements All answers must be computer generated (including text and diagrams). The hand-in version must include a header page (or with sufficient space)

Database tables design and test queries, Load sample data into the database...

Load sample data into the database tables design and test queries to return the following information • All rows and columns for employees • All rows and columns for customers •

Why like predicate used for, Why Like predicate used for? LIKE predicat...

Why Like predicate used for? LIKE predicate: The LIKE predicate searches for strings in which have a certain pattern.

Correlated and uncorrelated queries, need to get answer for questions 3&4 o...

need to get answer for questions 3&4 on this page in part 1

Using literal character string-data manipulation language, Using Literal Ch...

Using Literal Character String Example: To print IS A as one string with column name employee SELECT ENAME || ' IS A ' || JOB AS "EMPLOYEE" FROM EMP;

Define a table in sql known as client for store information, Define a table...

Define a table in SQL known as Client that is used to store information about the clients. Define CLIENT_NO as the primary key whose first letter must begin with ‘C'. Also ensure t

Weak entity, Entity types that do not have any key attribute, and therefore...

Entity types that do not have any key attribute, and therefore cannot be identified independently, are known as weak entity types. A weak entity can be recognized uniquely only by

Please answer me., gyan gurukul is a software company that provides softwar...

gyan gurukul is a software company that provides software related solution.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd