Transactions and concurrency management, Database Management System

Transactions And Concurrency Management

 Introduction

One of the main benefits of storing data in an integrated repository or a database is to permit sharing of it between multiple users. Various users access the database or perform transactions at the similar time. What if a user's transactions try to access a data item that is being used /modified by another transaction? This unit attempts to give details on how concurrent transactions are implemented under the control of DBMS. Though, in order to describe the concurrent transactions, first we must explain the term transaction.

Concurrent implementation of user programs is essential for good performance of DBMS, as concurrent running of various user programs keeps utilizing CPU time efficiently, as disk accesses are frequent and are relatively slow in case of DBMS. Also, a user's program may carry out a lot of operations on the data returned from DB, but DBMS is only concerned about what data is being written from / read / into the database.

 

Posted Date: 3/11/2013 5:16:52 AM | Location : United States







Related Discussions:- Transactions and concurrency management, Assignment Help, Ask Question on Transactions and concurrency management, Get Answer, Expert's Help, Transactions and concurrency management Discussions

Write discussion on Transactions and concurrency management
Your posts are moderated
Related Questions
Describe Query evaluation engine? Query Evaluation engine: Vehicle executes low-level instructions obtained through the DML compiler. The Storage Manager Components gives in

The Structured Query Language INTRODUCTION Database is an organised set of information about an entity having controlled redundancy and serves numerous applications. DBMS

Can i get help with weka software

Explain the term High level DML? High level DML A high-level or non-procedural DML permit the user to specify what data is needed without specifying how it is to be acquired.

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Demonstrate the Design of associations During object design phase we must design a strategy to implement associations. Association may be unidirectional or bi-directional. Wha

Illustrate different types of Locks in SQL Server. There are three kinds of locks in SQL Server i.) Shared locks - These are used for operations which don't allow any update

What is foreign key? Foreign Key - Let there are two relations in tables R and S. Any candidate key of the relation R that is referred in the relation S is known as the forei

i have a homework assignment identical to one you have listed

Define the concept of Object Diagram An object diagram shows a set of the objects and their relationships with each other at a point of time. In a static view, object diagram