Wound-wait scheme-deadlock prevention, Database Management System

"Wound-wait" scheme: It is based on a preemptive method. It is based on a simple rule:

                  If Ti requests a database resource that is held by Tj

                   then if Ti has a larger timestamp (Ti is younger) than that of Tj 

                    it is allowed to wait;

     else Tj is wounded up by Ti.

For example, suppose that 3 transactions T1, T2 and T3 were generated in that series, then if T1requests for a data item which is presently held by transaction T2, then T2 is rolled back and data item is allotted to T1 as T1 has a smaller time stamping than that of T2. Though, if T3 requests for a data item which is presently held by transaction T2, then T3 is permitted to wait.

                                    2389_Wound-wait scheme-deadlock prevention.png

                                                   Figure: Wound-wait Scheme of Deadlock prevention

It is vital to see that whenever any transaction is rolled back, it would not make a starvation condition, i.e., no transaction gets rolled back repeatedly and is never permitted to make progress. Also both "wait-die" & "wound-wait" idea avoid starvation. The number of aborts & rollbacks will be higher in wait-die scheme than in the wound-wait idea. But one main problem with both of these ideas is that these ideas may result in unnecessary rollbacks.

Posted Date: 3/12/2013 3:11:29 AM | Location : United States







Related Discussions:- Wound-wait scheme-deadlock prevention, Assignment Help, Ask Question on Wound-wait scheme-deadlock prevention, Get Answer, Expert's Help, Wound-wait scheme-deadlock prevention Discussions

Write discussion on Wound-wait scheme-deadlock prevention
Your posts are moderated
Related Questions
Determine the Strong and Weak Entity Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and a

Problem: ‘Users and Information system specialists need to spend inordinate amounts of time locating and gathering data' (Watson and Hal, 1998) Recent developments in the ar

Explain how the object classes are mapped to tables. Each object class maps to one or more than one tables in the database. The objects in the class may be partitioned horizont

what do you mean by consistency in rdbms?

1. Create a subroutine that does the remote blast on the file protein.fa. 2. Pass that returned files from the blast to another subroutine that parses the output and sends it to

Clustering Indexes It may be an excellent idea to keep data of the students in the order of the programme they have registered as most of the data file accesses may need studen

Function requirement as given: 1> manage fans and likes and followings those information from facebook. twitter. google+ and linkedin etc 2> Organize the clients from email m

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What types of adjustments are required to increase chances of inheritance. a)   Some attributes can be added or ignored in  the base class operation  b) Some changes can be

please describe the data base management with the easy example &give the application?