multiple-mode locks, Database Management System

Assignment Help:

Multiple-mode locks: It offers two locks: exclusive locks and shared locks. But why do we require these two locks? There are a lot of transactions in the database system that never updates the data values. These transactions can coexist with some other transactions that update the database. In such a condition multiple reads are permitted on a data item, so multiple transactions can lock a data item in the read or shared lock. On the other hand, if a transaction is an updating transaction, i.e., it updates the data items, it has to make sure that no other transaction can access (read or write) those data items that it needs to update. In this situation, the transaction places an exclusive lock on the data items. Therefore, a somewhat higher level of concurrency can be achieved in comparison to the binary locking scheme


Related Discussions:- multiple-mode locks

Define granularity and hierarchy of granularity of locks, Define granularit...

Define granularity, hierarchy of granularity of locks & multiple granularity locking. Explain the modified two phase locking along with multiple granularity locking. Ans: The s

RDBMS, why data in an RDMS need to be normalised

why data in an RDMS need to be normalised

Textbook ordering system, Question: Consider the following database rel...

Question: Consider the following database relations for a textbook ordering system used by a college bookshop: Book (b-copy#, bname, ISBN#, author, price, subject) Order (s#

Define the basic operations of the relational algebra, Define the basic ope...

Define the basic operations of the relational algebra?     Ans: Basic operators of relational algebra are: 1. Union (∪) - Selects tuples which are in either P or Q or in bot

Cases of constraint violations, (1)     Insert into PERSON Violated con...

(1)     Insert into PERSON Violated constraint: - Key constraint Reason: - Primary key 1 already exists in PERSON. Dealing: - DBMS could ask the user to provide valid PER

What is authorization graph, What is authorization graph? Passing of au...

What is authorization graph? Passing of authorization from single user to another can be shown by an authorization graph.

Mapping, external and internal mapping with examples

external and internal mapping with examples

Create table employee and enter employee data in sql, Create table employee...

Create table employee and enter employee data in SQL? Consider the following relational schemas: EMPLOYEE (EMPLOYEE_NAME, STREET, CITY) WORKS (EMPLOYEE_NAME, COMPANYNAME, SAL

What are costs to be considere when transaction is roll back, What are the ...

What are the costs to be considered when a transaction has to be rolled back when recovering from deadlock?         Ans: A few transaction will must rolled back (made a victim)

Private Tuition, Hi, Do you offer private tuition for DBMS?

Hi, Do you offer private tuition for DBMS?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd