Problems of concurrent transactions-lost updates, Database Management System

Assignment Help:

Lost Updates: Suppose the two transactions T3 and T4 run simultaneously and they happen to be interleaved in the following way (suppose the initial value of X as

10000):

T3

T4

Value of X

T3

T4

READ X

 

10000

 

 

READ X

 

10000

SUB 5000

 

5000

 

 

ADD 3000

 

13000

WRITE X

 

5000

 

 

WRITE X

 

13000

After the implementation of both the transactions the value X is 13000 whereas the semantically correct value should be 8000. The trouble occurred as the update made by T3 has been overwritten by T4. The root cause of the trouble was the fact that both the transactions had read the value of X as 10000. Therefore one of the two updates has been lost and we say that a lost update has occurred.

There is one more way in which the lost updates can happen. Consider the following part of some transactions:

T5

T6

Value of x originally

2000

T5

T6

UPDATE X

 

3000

 

 

UPDATE X

 

4000

ROLLBACK

 

2000

 

Here T5 & T6 updates the similar item X. After that T5 decides to undo its action and rolls back causing the value of X to go back to the original value that was 2000. In this case also the update performed by T6 had got lost and a lost update is said to have happened.


Related Discussions:- Problems of concurrent transactions-lost updates

Define the notation for classes and atrributes, Define the notation for cla...

Define the notation for classes and atrributes The notation for class, attribute, and operations are shown below:     Figure: Class with attributes and operations A

Operator precedence-data manipulation language, Operator Precedence The...

Operator Precedence The basic operators used in SQL are * /   - + Operators of the similar priority are evaluated From Left to right Parentheses are used to force priorit

Why were functional methods fashionable in early days, Why were functional ...

Why were functional methods fashionable in early days? These are inspired directly by computer architecture and thus popular among computer scientist in early days. The divisio

Execute sql queries, Consider the relations described below: PHYSICIAN (re...

Consider the relations described below: PHYSICIAN (regno, name, telno, city) PATIENT (pname, street, city) VISIT (pname, regno, date_of_visit, fee) Where the regno and pname ide

State about the advance object design, ADVANCE OBJECT DESIGN Introduct...

ADVANCE OBJECT DESIGN Introduction Analysis is the initial step of the OMT methodology. It is apprehensive with devising a precise, concise, correct and understandable mo

Differentiate between key and superkey, Differentiate between Key and super...

Differentiate between Key and superkey? Key and superkey - A key a single attribute or a combination of two or more attributes of an entity set in which is used to identify o

What are the disadvantages of file processing system, What are the disadvan...

What are the disadvantages of file processing system? The drawbacks of file processing systems are a) Data redundancy and inconsistency b) Complexity in accessing data

Create a database schema, Consider a database schema consisting of four rel...

Consider a database schema consisting of four relations, whose schemas are: Product (maker, model, type) PC (model, speed, ram, hd, price) Laptop (model, speed, ram, hd, s

Which method is used to key transformation, Which method is used to key tra...

Which method is used to key transformation ? A hash method is used to key transformation.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd