Wound-wait scheme-deadlock prevention, Database Management System

"Wound-wait" scheme: It is based on a preemptive method. It is based on a simple rule:

                  If Ti requests a database resource that is held by Tj

                   then if Ti has a larger timestamp (Ti is younger) than that of Tj 

                    it is allowed to wait;

     else Tj is wounded up by Ti.

For example, suppose that 3 transactions T1, T2 and T3 were generated in that series, then if T1requests for a data item which is presently held by transaction T2, then T2 is rolled back and data item is allotted to T1 as T1 has a smaller time stamping than that of T2. Though, if T3 requests for a data item which is presently held by transaction T2, then T3 is permitted to wait.

                                    2389_Wound-wait scheme-deadlock prevention.png

                                                   Figure: Wound-wait Scheme of Deadlock prevention

It is vital to see that whenever any transaction is rolled back, it would not make a starvation condition, i.e., no transaction gets rolled back repeatedly and is never permitted to make progress. Also both "wait-die" & "wound-wait" idea avoid starvation. The number of aborts & rollbacks will be higher in wait-die scheme than in the wound-wait idea. But one main problem with both of these ideas is that these ideas may result in unnecessary rollbacks.

Posted Date: 3/12/2013 3:11:29 AM | Location : United States







Related Discussions:- Wound-wait scheme-deadlock prevention, Assignment Help, Ask Question on Wound-wait scheme-deadlock prevention, Get Answer, Expert's Help, Wound-wait scheme-deadlock prevention Discussions

Write discussion on Wound-wait scheme-deadlock prevention
Your posts are moderated
Related Questions
Project Description: Hi I'm seeking someone to make my dBase application work. I know it's not a 'modern' language but it's what I know. I have written an order program and I ne

sql is relationally complete-justify

List the Armstrong's axioms for functional dependencies.  What do you understand by soundness and completeness of these axioms?      Ans: The Armstrong's axioms are: F1:

What are the DBMS languages? Briefly explain? Data Definition language (DDL):A database schema is specified through a set of definitions expressed through a special language

Write a short note on built in function in QBE? Built in function in QBE: QBE involves various built in functions like AVG, MAX,MIN,SUM and CNT. We must prefix these operator

Birla Institute of Technology & Science, Pilani Work-Integrated Learning Programmes Division Second Semester 2012-2013 EC-1 Assignment 2 (7.5% of the grade) Course No. : SS ZG

Explain the systems development life cycle. This is the traditional method to develop, maintain, and replace information systems that contains the project identification and se

Which method is used to key transformation ? A hash method is used to key transformation.

Need 2 projects completed in 3NF format.

Prepare a gantt chart for the stock control project: Scenario Lucas-TVS is the Leader in Auto Electricals in India today with 50 years experience in desig