Compare wait-die deadlock prevention with wait-wound scheme, Database Management System

Assignment Help:

Compare wait-die deadlock prevention scheme with wait-wound scheme  

Ans:  Wait-Die Scheme 

a) Based upon a nonpreemptive technique. 

b) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a smaller timestamp after that does Pj (Pi is older than Pj). Otherwise, Pi is rolled back (dies). 

c) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, correspondingly. 

d) If P1 requests a resource held by P2, after that P1 will wait. 

e) If P3 requests a resource held through the P2, then P3 will be rolled back.  Wound-Wait Scheme 

f)  Based upon a preemptive methods; counterpart to the wait-die system. 

g) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a larger timestamp after that does Pj ( Pi is younger than Pj). If not, Pj is rolled back ( Pj is wounded by Pi). 

h) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, respectively. 

i) If P1 requests a resource held by P2, after that the resource will be preempted from P2 and P2 will be rolled back. 

j) If P3 requests a resource held by P2, after that P3 will wait.


Related Discussions:- Compare wait-die deadlock prevention with wait-wound scheme

What is difference between primary index and secondary index, What is diffe...

What is difference between primary index and secondary index? Primary Index a) It is an ordered file whose records are of fixed length along with two fields. b) Only base

Relational algebraic operators, Problem Explain at least five relationa...

Problem Explain at least five relational algebraic operators with a suitable example. Note: All the above descriptions should be done by taking at least two examples from ou

Linear commit protocol, With the linear commit protocol, sites are connecte...

With the linear commit protocol, sites are connected in a chain, and the subtransaction at the left-hand end of the chain initiates the protocol. Propose a crash recovery protocol

Er digrams, what is er digram given that example of hospital,bank and libra...

what is er digram given that example of hospital,bank and library er digram.

The first normal form (1nf), The First Normal Form (1NF) Let us first d...

The First Normal Form (1NF) Let us first describe 1NF: Definition: A relation (table) is in 1NF if 1.      There are no duplicate tuples or rows in the relation. 2.

Differentiate between a unique key and a primary key, Differentiate between...

Differentiate between a unique key and a primary key. - By default, clustered index on column are created by primary key while nonclustered index are created by unique key.

Differentiate between horizontal and mixed partitioning, Question: In r...

Question: In relation to distributed database answer the following questions: (i) Give a brief definition of distributed database. Support your answer with an appropriate di

Concurrent transactions-backup and recovery, Representing complex relations...

Representing complex relationship among data A database may contain varieties of data interrelated to each other in numerous ways. A DBMS must have the capability to represent

ER DIAGRAM, NEED ER DIAGRAM WITH MINIMUM ENTITY AND RELATIONSHIP of Hospita...

NEED ER DIAGRAM WITH MINIMUM ENTITY AND RELATIONSHIP of Hospital Management System

What are domain constraints, What are domain constraints? A domain is a...

What are domain constraints? A domain is a set of values that might be assigned to an attribute .all values that appear in a column of a relation must be taken from the similar

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd