Explain the lock based protocol, Database Management System

Assignment Help:

Lock Based Protocol

A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are two types of operations, i.e. read and write, whose basic nature are dissimilar, the locks for read and write operation might be behave differently.

Read operation performed by dissimilar transactions on the same data item poses less of a challenge. The value of the data item, if constant, can be read by any number of transactions at any given time.

 


Related Discussions:- Explain the lock based protocol

Project, I have a small project that contains 3 deliverable s. I have done ...

I have a small project that contains 3 deliverable s. I have done the first one and I would like you to help me with second one

What is meant by the degree of relationship set, What is meant by the degre...

What is meant by the degree of relationship set? The degree of relationship type is the number of participating entity types.

Differentiate between primary and secondary storage, Differentiate between ...

Differentiate between Primary and secondary storage? Primary and secondary storage - Primary storage device stores the data temporarily. Primary storage is commonly used thro

ERD, entity relationship diagram about finance

entity relationship diagram about finance

Explain er relationship model, Explain ER Relationship model? An entity...

Explain ER Relationship model? An entity-relationship model (ERM): An entity-relationship model (ERM) is an abstract theoretical illustration of structured data. Entity-relatio

How to control as concurrent tasks, Control as Concurrent Tasks The ex...

Control as Concurrent Tasks The expression control as simultaneous task means applying control for those events of object which can happen simultaneously. An object can be imp

SQL, Ask Write the SQL code that will create the table structure for a tabl...

Ask Write the SQL code that will create the table structure for a table named EMP _1. This table is a subset of the EMPLOYEE table. The basic EMP_1 table structure is summarized in

Need for multiple access paths, Need for Multiple Access Paths In pract...

Need for Multiple Access Paths In practice, most of the online information systems need the support of multi-key files. For example, consider a banking database application hav

What are metrics for choosing the best algorithm, What are metrics for choo...

What are metrics for choosing the best algorithm? Matrices for choosing the best algorithms are as below: Computational complexity Ease of understand ability and im

Parallelism of transaction execution-data fragmentation, Parallelism of tra...

Parallelism of transaction execution: A transaction can be divided into various sub-queries that can operate on fragments in parallel. This enhances the degree of concurrency in t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd