Transactions and concurrency management, Database Management System

Transactions And Concurrency Management

 Introduction

One of the main benefits of storing data in an integrated repository or a database is to permit sharing of it between multiple users. Various users access the database or perform transactions at the similar time. What if a user's transactions try to access a data item that is being used /modified by another transaction? This unit attempts to give details on how concurrent transactions are implemented under the control of DBMS. Though, in order to describe the concurrent transactions, first we must explain the term transaction.

Concurrent implementation of user programs is essential for good performance of DBMS, as concurrent running of various user programs keeps utilizing CPU time efficiently, as disk accesses are frequent and are relatively slow in case of DBMS. Also, a user's program may carry out a lot of operations on the data returned from DB, but DBMS is only concerned about what data is being written from / read / into the database.

 

Posted Date: 3/11/2013 5:16:52 AM | Location : United States







Related Discussions:- Transactions and concurrency management, Assignment Help, Ask Question on Transactions and concurrency management, Get Answer, Expert's Help, Transactions and concurrency management Discussions

Write discussion on Transactions and concurrency management
Your posts are moderated
Related Questions
Consider the relations City (city_name, state) Hotel (name, address) City_hotel (hotel_name, city_name, owner) Answer the following queries in relational algebra (i) Find

MySQL statements for extending the database to incorporate new facilities Deliverables for submission You must submit the following deliverables in the Assignment Dropbox in

Defining Internal Classes and Operations When we enlarge algorithms, new classes can be added to the store intermediate results. A complex operation could be looked at, as a c

List the types of authorization. A) Read authorization B) Write authorization C) Update authorization D) Drop authorization

For this application, we will consider IBM DB2 catalog data (i.e., metadata) for IBM's enterprise-class servers running the z/OS (formerly OS/390 or MVS) operating system.  One of


How are tables stored on Disk? We realise that every record of a table can have different amounts of data. This is due to in some records; some attribute values may be "zero".

Explain the function of input controls. Identify four types of input control and explain the function of each. Provide an example of a data integrity error that could occur i

Explain the challenges before an E-business management.

Give two profit of Reuse of Code. Reusing the implementation . Place existing class directly inside a new class. The new class can be made up of any number and type of the oth