Compare wait-die deadlock prevention with wait-wound scheme, Database Management System

Assignment Help:

Compare wait-die deadlock prevention scheme with wait-wound scheme  

Ans:  Wait-Die Scheme 

a) Based upon a nonpreemptive technique. 

b) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a smaller timestamp after that does Pj (Pi is older than Pj). Otherwise, Pi is rolled back (dies). 

c) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, correspondingly. 

d) If P1 requests a resource held by P2, after that P1 will wait. 

e) If P3 requests a resource held through the P2, then P3 will be rolled back.  Wound-Wait Scheme 

f)  Based upon a preemptive methods; counterpart to the wait-die system. 

g) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a larger timestamp after that does Pj ( Pi is younger than Pj). If not, Pj is rolled back ( Pj is wounded by Pi). 

h) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, respectively. 

i) If P1 requests a resource held by P2, after that the resource will be preempted from P2 and P2 will be rolled back. 

j) If P3 requests a resource held by P2, after that P3 will wait.


Related Discussions:- Compare wait-die deadlock prevention with wait-wound scheme

What is hashing file organization, What is hashing file organization? ...

What is hashing file organization? In the hashing file organization, a hash function is computed on some attribute of every record. The result of the hash function specify in

State about the activity diagram, State about the Activity Diagram Act...

State about the Activity Diagram Activity diagrams show flow from one activity to other. It is an ongoing non atomic execution within a state machine. Activity finally results

Explain er model, Question 1 Explain ER model Question 2 What are the...

Question 1 Explain ER model Question 2 What are the characteristics of a computer provided information? Question 3 What are facts and guidelines to be considered when se

External failure-database recovery and security, External failure : A failu...

External failure : A failure can also result because of an external cause, such as earthquakes, fire, floods, etc. The database must be duly backed up to avoid troubles occurring d

Define aggregate functions, Define Aggregate functions and what aggregate f...

Define Aggregate functions and what aggregate functions supported by the MySQL To calculate a summary value from a set of individual values and uses one of the functions known

What is entity in dbms, What is entity in DBMS? Entity: A DBMS entity i...

What is entity in DBMS? Entity: A DBMS entity is either a thing in the modelled world or a drawing element in an ERD.

What are composite objects, What are composite objects? Objects that ha...

What are composite objects? Objects that have other objects are known as complex objects or composite objects.

Query, Use a Set operator to create a list of academics who have written or...

Use a Set operator to create a list of academics who have written or co-written less than 5 papers and also have greater than 3 interests. List their academic number in the output.

What is called as an n-way merge, What is called as an N-way merge? The...

What is called as an N-way merge? The merge operation is a generalization of the two-way merge used by the standard in-memory sort-merge algorithm. It merges N runs, so it is k

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd