Strict 2pl-two phase locking (2pl), Database Management System

Assignment Help:

Strict 2PL:Though, this basic 2PL suffers from the trouble that it can result into loss of isolation / atomic property of transaction as theoretically speaking once a lock is released on a data item it can be changed by another transaction before the first transaction aborts or commits.

To leave such a situation we use strict two phase locking. The strict 2PL is graphically depicted in Figure. Though, the basic drawbacks of strict 2PL are that it restricts concurrency as it locks the item afar the time it is required by a transaction.

                                 693_Strict 2PL.png

                                                           Figure: Strict Two Phase Locking

Does the two phase locking solve all the problems of concurrent transactions? No, the strict 2PL answers the problem of concurrency and atomicity, though it introduces another problem.


Related Discussions:- Strict 2pl-two phase locking (2pl)

Data mining, 1.Why we need data mining? Give an example to illustrate your ...

1.Why we need data mining? Give an example to illustrate your answer. 2. Why data mining is considered as "misleading name"? 3. Distinguish the difference between database an

What is known as fudge factor, What is known as fudge factor? The numbe...

What is known as fudge factor? The number of partitions is enhanced by a small value called the fudge factor, which is usually 20 percent of the number of hash partitions compu

Write short note on events, Write short note on Events Events consist ...

Write short note on Events Events consist of inputs, interrupts, decisions and actions performed by any external device or users. Every event always has a sender and receiver.

Database schema, #Use the following database schema: 1) Patient—PatientID, ...

#Use the following database schema: 1) Patient—PatientID, Name, DOB 2) Doctor—DoctorID, Name, MedLicenseNumber, Phone 3) Medication—MedicationID, BrandName, GenericName 4) Prescrip

List the types of authorization, List the types of authorization. A) R...

List the types of authorization. A) Read authorization B) Write authorization C) Update authorization D) Drop authorization

Explain key benefits of a content management system, Question: (a) What...

Question: (a) What do you meant by content management and briefly describe four major components of a Content Management System? (b) Explain key benefits of a Content Manage

Define value set, Define value set? Value set: It is a set of values. Y...

Define value set? Value set: It is a set of values. You do not always need a user to enter junk free text within all the fields. Therefore, Oracle Apps uses value set to valida

Super keys, A super key is an attribute or set of attributes used to recogn...

A super key is an attribute or set of attributes used to recognize the records uniquely in a relation. For instance, in the Relation PERSON defines earlier PERSON_ID is a super

Determine candidate and primary key, A video rental company has several bra...

A video rental company has several branches. The data held on each branch is the branch address made up of street, city, state, and zip code, and the telephone number. Ea

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd