Inconsistent analysis-problems of concurrent transactions, Database Management System

Assignment Help:

Inconsistent Analysis: The problem as given with transactions T1 and T2 where two transactions interleave to make incorrect result during an analysis by Audit is the instance of such a problem. This problem happens when more than one data items are being used for analysis, whereas another transaction has modified some of that value and some are yet to be modified. Therefore, an analysis transaction reads values from the inconsistent state of the database those results in inconsistent analysis.

Therefore, we can conclude that the prime reason of troubles of concurrent transactions is that a transaction reads an inconsistent state of the database that has been formed by other transaction.

But how do we ensure that implementation of two or more transactions have not resulted in a concurrency related problem?

Well one of the commonest techniques used for this purpose is to restrict access to data items that are being written or read by single transaction and is being written by another transaction. This technique is known as locking.

 


Related Discussions:- Inconsistent analysis-problems of concurrent transactions

Three level architecture of dbms-logical architecture, Three Level Architec...

Three Level Architecture of DBMS or Logical DBMS Architecture The logical architecture defines how data in the database is perceived by users. It is not deals with how the da

Define the term- control as state within program, Control as State within P...

Control as State within Program 1.  The term control exactly means to check effect of input within a program. For illustration, in Figure, after the ATM card is inserted (a

Functional dependencies, 1. Staff (staffID --> availabilityID) 2. Servic...

1. Staff (staffID --> availabilityID) 2. Services (servicesID --> itemBasedID --> timedBasedID) 3. TimedBased (timedbasedID--> priceid) 4. Clients (clientId, serviceId-->

Short note on mid square method of hashing, Short Note on mid Square Method...

Short Note on mid Square Method of hashing? Mid square method of hashing: In the method midsquare hashing, the key is squared and the address selected from the center of the s

Give the reasons for allowing concurrency, Give the reasons for allowing co...

Give the reasons for allowing concurrency? The reasons for allowing concurrency is if the transactions run serially, a short transaction might have to wait for a preceding long

Describe the major steps in the implementation process, Question: (a) ...

Question: (a) One of the steps in the five-step problem-solving model is implementation. Implementation is considered a key step in the problem-solving model. A problem may be

Which language used in application programs for request data, Which languag...

Which language used in application programs to request data from the DBMS is referred? Language which is used in application program is DML to request data from the DBMS is ref

Determine the benefits of object oriented design, Determine the benefits of...

Determine the benefits of Object oriented design OOD also gives reusability, which saves time, costs and productivity gains through direct mapping to properties of Object-Orie

What are the several forms of identity, What are the several forms of ident...

What are the several forms of identity? a) Value b) Name c) Built-in

Purchase orber , Run the following queries. For each query show 1) What yo...

Run the following queries. For each query show 1) What you expect the output to be based upon the data 2) the SQL code and 3) the output running the query in Oracle. 1. Show all c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd