Wait-die scheme -deadlock prevention, Database Management System

Assignment Help:

Wait-die" scheme: The idea is based on non-preventive method. It is based on a simple rule:

                                If Ti requests a database resource that is held by Tj

                                then if Ti has a smaller timestamp than that of Tj

                                 it is permitted to wait;

                else Ti aborts.

A timestamp may loosely be described as the system generated sequence number that is unique for every transaction. Therefore, a smaller timestamp means an older transaction. For example, suppose that 3 transactions T1, T2 and T3 were generated in that series, then if T1requests for a data item which is presently held by transaction T2, it is permitted to wait as it has a smaller time stamping than that of T1. Though, if T3 requests for a data item which is presently held by transaction T2, then T3 is rolled back (die).

                                       1541_Wait-die scheme -Deadlock prevention.png

                                                            Figure: Wait-die Scheme of Deadlock prevention


Related Discussions:- Wait-die scheme -deadlock prevention

Software engineering, Critically evaluate the bulleted list of information-...

Critically evaluate the bulleted list of information-related items in this case study. How are each contradictory to the notion of being an information-literate knowledge worker?

Define the terms ddl and dml, Define the terms i) DDL ii) DML DDL: Data...

Define the terms i) DDL ii) DML DDL: Data base schema is particular by a set of definitions expressed by a special language known as a data definition language. DML: A data

What are the disadvantages of file-processing system, What are the disadvan...

What are the disadvantages of file-processing system?  Ans: The Disadvantages of File-Processing System a. Data redundancy and inconsistency - Data redundancy means not nece

In case of entity integrity the primary key may be declared, In case of ent...

In case of entity integrity, the primary key may be declared? In a case of entity integrity primary key may be not Null.

Fundamental operations that are regular to mysql programs, What are the thr...

What are the three fundamental operations that are regular to MySQL Programs? a) Establishing a connection to the MySQL server b) Choosing a database. c) Disconnecting fr

Whta is the advantage of the database management approach, Whta is the adva...

Whta is the advantage of the database management approach? The advantage of the database management approach is data is integrated and can be accessed by multiple programs.

What is the use of keyword isa, What is the use of keyword ISA? The use...

What is the use of keyword ISA? The use of keyword ISA is to show that a class is a specialization of another class.

What are the responsibility of file manager, What are the responsibility of...

What are the responsibility of File manager? File Manager : Manager allocation of space on disk storage and the data structures used to represent within stored on disk. It is a

Explain the disadvantages of file oriented approach, Explain the disadvanta...

Explain the disadvantages of file oriented approach? In the oriented approach Applications are designed in isolation. Design of application is optimized for one application. In

What is secondary index, What is Secondary Index While making the index...

What is Secondary Index While making the index, generally the index table is kept in the primary memory (RAM) and the main table, because of its size is keeps in the secondary

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd