The locking protocol, Database Management System

The Locking Protocol: To manage concurrency related problems we use locking. A lock is mainly a variable that is associated with a data item in the database. A lock can be located by a transaction on a shared resource that it needs to use. When this is completed, the data item is available for the exclusive use for that transaction that is other transactions are locked out of that data item. When the transaction that has locked a data item does not need to use it any longer, it should unlock the data item so that other transactions can use it. If a transaction attempts to lock a data item already locked by some other transaction, it cannot do so and remains for the data item to be unlocked. The parts of DBMS that controls and stores lock information is known as the Lock Manager. The locking mechanism helps us to change a schedule into a serialisable schedule. We had definite what a schedule is, but what serialisable schedule is?

 

Posted Date: 3/12/2013 1:53:06 AM | Location : United States







Related Discussions:- The locking protocol, Assignment Help, Ask Question on The locking protocol, Get Answer, Expert's Help, The locking protocol Discussions

Write discussion on The locking protocol
Your posts are moderated
Related Questions
he SQL query that will return the order number, quantity ordered, price each and total cost of an order (quantity * price each) from the order details table. Label the calculated c

Primary Index In primary index, there is a one-to-one relationship among the entries in the index table and the records in the major table. Primary index can be of two types:

Example -GRANT CREATE SESSION TO MCA12; (This command gives system level permission on creating a session - not portable) GRANT SELECT ON EMP TO MCA12; (Object level permi

Logical Operators Rules of Precedence: Order evaluated Operator 1 All comparison operators 2

This project will involve designing and creating a database for an organization.  In the design of a database, there is no single "perfect" design.  So your database design may not

What are the benefits of OOA technology? Using OOA technology can produce many benefits, such as:  i) Reusability of code  ii) Productivity is gained through direct mappi

What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar

Explain about primary key Primary Key: It is one of the candidate keys that are taken to be the recognizing key for the entire table. E.g. although there are two candidate ke

Design Documentation  The Design Document shall be an extension of Requirements Analysis Design. "The Design Document will comprise a revised and much more detailed descrip

Consider the E/R schema with weak entity sets shown below. Come up with the SQL CREATE TABLE statements (with appropriate primary key, unique and foreign key constraints). Include