multiple-mode locks, Database Management System

Assignment Help:

Multiple-mode locks: It offers two locks: exclusive locks and shared locks. But why do we require these two locks? There are a lot of transactions in the database system that never updates the data values. These transactions can coexist with some other transactions that update the database. In such a condition multiple reads are permitted on a data item, so multiple transactions can lock a data item in the read or shared lock. On the other hand, if a transaction is an updating transaction, i.e., it updates the data items, it has to make sure that no other transaction can access (read or write) those data items that it needs to update. In this situation, the transaction places an exclusive lock on the data items. Therefore, a somewhat higher level of concurrency can be achieved in comparison to the binary locking scheme


Related Discussions:- multiple-mode locks

Data base design, how to design a bakery business in data base

how to design a bakery business in data base

The tools that are available for managing mysql server, Describe the tools ...

Describe the tools that are available for managing MySQL Server. Given below are the tools to manage MySQL server: mysqld - MySQL server daemon. This is used to begain t

Create a table to record a passengers information, Given the following rela...

Given the following relations TRAIN (NAME, START, DEST) TICKET (PNRNO., START, DEST, FARE) PASSENGER (NAME, ADDRESS, PNRNO.) Write SQL expressions for the following queries: No

Define single valued and multivalued attributes, Define single valued and m...

Define single valued and multivalued attributes. Single valued attributes: attributes with a single value for a particular entity are known as single valued attributes. Mult

Explain entity integrity and referential integrity rules, Explain entity in...

Explain entity integrity and referential integrity rules within relational model. Show how these are realized in SQL? Entity Integrity Rule - No primary key value could be nu

Differentiate between static hashing and dynamic hashing, Differentiate bet...

Differentiate between static hashing and dynamic hashing.  Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we requ

Define two phase commit, Define Two phase commit Two phase commit: To m...

Define Two phase commit Two phase commit: To make sure atomicity, all the sites where a transaction is being executed must agree on the final outcome of the execution. The tran

How relational calculus is different from relational algebra, How Relationa...

How Relational Calculus is different from Relational Algebra? What do understand by TRC queries and DRC queries?  Ans: Relational calculus contain two calculi, the tuple relati

Explain the need of parallel database, Probelm: a) In the context of OO...

Probelm: a) In the context of OODBMS, define the following terms with appropriate examples. (i) Object class. (ii) Abstract class. (iii) Aggregation. (iv)

Describe log based recovery, Describe log based recovery The most usabl...

Describe log based recovery The most usably structure for recording data base modification is the LOG the log is a sequence of log records recording all the update activities i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd