Define deadlock recovery measures, Database Management System

Assignment Help:

Define Deadlock recovery measures                  

To recover from deadlock, the cycle in the wait-for-graph should be broken. The common technique of doing this is to rollback one or more than one transactions in the cycles until the system shows no further deadlock situation. The choice of the transaction to be rolled back is relies on the following deadlock recovery measures:

  • The progress of the transaction and the number of data-items it has employed and modified. It is preferable to rollback a transaction which has just started or has not altered any data-item.
  • The amount of computing remaining for the transaction and the number of data items which have yet to be accessed by the transaction. It is favourable not to rollback a transaction it has approximately run to completion and/or it needs very few additional data-items earlier than its termination.
  • The relative cost of rolling back a transaction. It is favourable to roll back a less significant or non-critical transaction.

Related Discussions:- Define deadlock recovery measures

What are the strategies of implementation of the statecharts, What are the ...

What are the different strategies of implementation of the Statecharts?  There are two strategies for implementation of state charts: i)   Basic Implementation Strategy

What is a value, What is a value? A data value is used for identity. Th...

What is a value? A data value is used for identity. This form of identity is used in relational systems.eg: The primary key value of a tuple recognize the tuple.

Differentiate between natural join and outer join, Differentiate between na...

Differentiate between natural join and outer join? Natural join is a binary operator which is written as (R * S) where as R and S are relations. The output of the natural join

Objectives-database recovery and security, Objectives Define the te...

Objectives Define the terms RECOVERY and INTEGRITY; Define Recovery Techniques; Explain Error and Error detection techniques, and Define types of Authorisation.

Give the general form of sql query, Give the general form of SQL query? ...

Give the general form of SQL query? Select  A1, A2............., An From  R1, R2..............., Rm Where  P

How the one-to-one associations have to be implemented, Discuss how the one...

Discuss how the one-to-one associations have to be implemented. Some of properties of associations can be implemented directly by providing suitable declarations of the data me

What are the two integrity rules, What are the two integrity rules?  An...

What are the two integrity rules?  Ans:  The two integrity rules are: Entity Integrity Rule & Referential Integrity Rule.   Entity Integrity Rule - If the attribute A of rel

What are the different kinds of database end users, What are the different ...

What are the different kinds of database end users? Discuss the major activities of each? End-Users - End-users are the people whose jobs need access to the database for que

Discuss the concept of data independence, Question: a) Discuss the conc...

Question: a) Discuss the concept of data independence, explaining its importance in a database environment. b) To address the issue of data independence, the ANSI-SPARC t

Wound-wait scheme-deadlock prevention, " Wound-wait" scheme : It is based o...

" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule:                   If Ti requests a database resource that is held by Tj

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd