Wait-die scheme -deadlock prevention, Database Management System

Assignment Help:

Wait-die" scheme: The idea is based on non-preventive method. It is based on a simple rule:

                                If Ti requests a database resource that is held by Tj

                                then if Ti has a smaller timestamp than that of Tj

                                 it is permitted to wait;

                else Ti aborts.

A timestamp may loosely be described as the system generated sequence number that is unique for every transaction. Therefore, a smaller timestamp means an older transaction. For example, suppose that 3 transactions T1, T2 and T3 were generated in that series, then if T1requests for a data item which is presently held by transaction T2, it is permitted to wait as it has a smaller time stamping than that of T1. Though, if T3 requests for a data item which is presently held by transaction T2, then T3 is rolled back (die).

                                       1541_Wait-die scheme -Deadlock prevention.png

                                                            Figure: Wait-die Scheme of Deadlock prevention


Related Discussions:- Wait-die scheme -deadlock prevention

Participation constraints, The participation Constraints shows whether the ...

The participation Constraints shows whether the existence of an entity depends on its being associated to another entity by the relationship type. There are two kinds of participat

What are the two aspect to the implementation of association, What are the ...

What are the two distinct aspects to the implementation of associations? i) It is required to define data declarations which will enable details of actual links to be stored. I

What are costs to be considere when transaction is roll back, What are the ...

What are the costs to be considered when a transaction has to be rolled back when recovering from deadlock?         Ans: A few transaction will must rolled back (made a victim)

Define entity integrity and referential integrity, Define entity integrity ...

Define entity integrity and referential integrity.  How does SQL allow specification of  these? Ans: Entity Integrity Rule- If the attribute A of relation R is a prime attribut

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Customer service, as a customer service employee, explain five measures you...

as a customer service employee, explain five measures you would recommend a displeased student to patronise a school canteen

Explain traditional programming languages, How persistent programming langu...

How persistent programming languages differ from traditional programming languages? Database languages vary from traditional programming languages in that they directly manipul

Define boyce codd normal form, Define Boyce codd normal form A relation...

Define Boyce codd normal form A relation schema R is in BCNF with respect to a set F of functional dependencies if, for all functional dependencies in F + of the form.α ->β.

Define and differentiate among ordered indexing and hashing, Define and dif...

Define and differentiate between ordered indexing and hashing. Ans: Ordered indexing: To gain fast random access to records in a file, we can make of an index structure. Every

What subschema expresses, What subschema expresses ? A subschema expres...

What subschema expresses ? A subschema expresses the external view. (External schemas are called also called as subschemas)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd