Strict 2pl-two phase locking (2pl), Database Management System

Assignment Help:

Strict 2PL:Though, this basic 2PL suffers from the trouble that it can result into loss of isolation / atomic property of transaction as theoretically speaking once a lock is released on a data item it can be changed by another transaction before the first transaction aborts or commits.

To leave such a situation we use strict two phase locking. The strict 2PL is graphically depicted in Figure. Though, the basic drawbacks of strict 2PL are that it restricts concurrency as it locks the item afar the time it is required by a transaction.

                                 693_Strict 2PL.png

                                                           Figure: Strict Two Phase Locking

Does the two phase locking solve all the problems of concurrent transactions? No, the strict 2PL answers the problem of concurrency and atomicity, though it introduces another problem.


Related Discussions:- Strict 2pl-two phase locking (2pl)

What are the two types of errors, What are the two types of errors? The...

What are the two types of errors? The two types of errors are: a) Logical error b) System error

Read-set(t) and timestamps-optimistic concurrency contents, read-set(T) : E...

read-set(T) : Each data items that are read by a transaction T Timestamps : for all transaction T, the start-time and the end time are reserved for all the three phases.

What is catalog in dbms, What is catalog in DBMS? Catalog - A relationa...

What is catalog in DBMS? Catalog - A relational DBMS maintains information about every table and index in which it contains. A catalog is a collection of special tables that st

State the object design for processing, State the Object Design for Process...

State the Object Design for Processing  The object design phase comes after analysis and system design phase. The object design phase includes implementation details like as i

Objectives-database recovery and security, Objectives Define the te...

Objectives Define the terms RECOVERY and INTEGRITY; Define Recovery Techniques; Explain Error and Error detection techniques, and Define types of Authorisation.

Assign, #quesDefine a job scheduling strategy that will meet business requi...

#quesDefine a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pi

What is the function of io/m signal in the 8085, What is the function of IO...

What is the function of IO/M signal in the 8085? It is a status signal. It is used to differentiate among memory locations and I/O operations. When this signal is low (IO/M = 0

Primary key, The primary key is selected from the

The primary key is selected from the

Proposed information analysis, Add generation capabilities and/or tailor th...

Add generation capabilities and/or tailor the built-in functionality of generator. This enables you to produce "all" the test data for the MySQL tables you produced in the previous

Incident report to the database, The Form input elements are:           ...

The Form input elements are:             Reporter name                                                text type input             Password

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd