Explain strict two-phase locking, Database Management System

Assignment Help:

Explain Strict Two-Phase locking

A transaction T does not release any type of its exclusive (X) locks until that transaction commits or aborts. In this method no other transaction can access the item which is written by T unless the transaction T commits. This is a better method than the two discussed.

In 2PL, a transaction may not be capable to release its locks even after make use of it. The data item will stay locked until the transaction ends all the actions on all the data items. If each transaction in a schedule follows 2PL after that conflict serializability can be made sure. This is since if the schedule is not serializable, the precedence graph for schedule S contains transactions T1, T2 ..... Tn will have a cycle ... assume that a cycle consists of T1, T2 ..... Tn ,T1.  The meaning of this is that a lock operation by T2 is followed by an unlock operation by T1; A Lockoperation T3 is followed by an unlock operation by T2 ... and etc.  Though this is a contradiction of the assertion that T1 is by using two phase locking protocol. So the assumption that graph is having a cycle is wrong and therefore S is serializable.


Related Discussions:- Explain strict two-phase locking

What is specialization, What is Specialization? Specialization: Special...

What is Specialization? Specialization: Specialization permits you to describe new types of information (new structural types or latest domains of information), although reusin

Define sequence, Define Sequence A sequence is a set of integers 1, 2, ...

Define Sequence A sequence is a set of integers 1, 2, 3 that are generated in order on demand. Sequences are regularly used in databases because lots of applications require ev

Give expression in both tuple calculus and domain calculus, Consider the fo...

Consider the following relational schema: Doctor(DName,Reg_no) Patient(Pname, Disease) Assigned_To (Pname,Dname) Give expression in both Tuple calculus and Domain calculus for

Explain different addressing modes of 8086, 1. Explain different addressing...

1. Explain different addressing modes of 8086 Explanation of all addressing modes 2. Write a sequence of instructions to exchange two register contents using stack

Software failures-database recovery and security, Software failures :  In s...

Software failures :  In such cases, a software error abruptly stops the implementation of the current transaction (or all transactions), therefore leading to losing the state of pr

Advantages of data distribution, Advantages of Data Distribution The pr...

Advantages of Data Distribution The primary benefit of distributed database systems is the ability to access and share data in a reliable and efficient manner.

Can you delete data element, Can we delete data element, which is being use...

Can we delete data element, which is being used by table fields. No we cant delete data element.

How to create values of structured type, How to create values of structured...

How to create values of structured type? Constructor functions are used to make values of structured types. A function with the similar name as a structured type is a construct

What is meant by heuristic optimisation, What is meant by heuristic optimis...

What is meant by heuristic optimisation?Discuss the major heuristics that are applied during query optimisation.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd