Explain the timestamp ordering protocol, Database Management System

Assignment Help:

Timestamp Ordering Protocol

A timestamp is a tag that can be attached to any transaction or any data item, which indicates a specific time on which the transaction or data item had been activated in any way. We, who use computers, must all be familiar with the methods of "Date Created" or "Last Modified" properties of files and folders. Well, timestamps are things like that.

A timestamp can be executed in two ways. The simplest one is to directly assign the current value of the clock to the transaction or the data item. The other policy is to attach the value of a logical counter that keeps incrementing as new timestamps are needed.

The timestamp of a transaction shows the time when it was first activated. The timestamp of a data item can be of the following two types:

W-timestamp (Q): This means the latest time when the data item Q has been written into.

R-timestamp (Q): This means the latest time when the data item Q has been read from.

 


Related Discussions:- Explain the timestamp ordering protocol

Project, I have a small project that contains 3 deliverable s. I have done ...

I have a small project that contains 3 deliverable s. I have done the first one and I would like you to help me with second one

Describe the primary key functions, Describe the primary key functions? ...

Describe the primary key functions? Primary Key : The primary key is an attribute or a set of attributes in which uniquely identify a specific example of an entity. Every entit

What is system catalog or catalog relation, What is system catalog or catal...

What is system catalog or catalog relation? How is better known as? A RDBMS maintains a explanation of all the data that it contains, information about every relation and index

E - r schema with weak entity, Consider the E/R schema with weak entity set...

Consider the E/R schema with weak entity sets shown below. Come up with the SQL CREATE TABLE statements (with appropriate primary key, unique and foreign key constraints). Include

Heuristics, Benefits of using heuristics

Benefits of using heuristics

Explain two phase locking protocol, Explain Two phase locking protocol ...

Explain Two phase locking protocol A transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first unlock operation in the tra

View serialiabilty-labelled precedence graph, how to construct labelled pre...

how to construct labelled precedence graph for view serialiability.please explain insteps with one solved examples

E-R, Mention various steps required to draw an E-R Diagram. Draw an E-R Dia...

Mention various steps required to draw an E-R Diagram. Draw an E-R Diagram for Student Information System. Mention all suitable assumptions to justify your answer.

Organize the clients from email marketing, Function requirement as given: ...

Function requirement as given: 1> manage fans and likes and followings those information from facebook. twitter. google+ and linkedin etc 2> Organize the clients from email m

What is meant by object identifiers, What is meant by object identifiers? ...

What is meant by object identifiers? Object-oriented systems use an object identifier to recognize objects. Object identifiers are unique: that is every object has a single ide

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd