Compare wait-die deadlock prevention with wait-wound scheme, Database Management System

Assignment Help:

Compare wait-die deadlock prevention scheme with wait-wound scheme  

Ans:  Wait-Die Scheme 

a) Based upon a nonpreemptive technique. 

b) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a smaller timestamp after that does Pj (Pi is older than Pj). Otherwise, Pi is rolled back (dies). 

c) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, correspondingly. 

d) If P1 requests a resource held by P2, after that P1 will wait. 

e) If P3 requests a resource held through the P2, then P3 will be rolled back.  Wound-Wait Scheme 

f)  Based upon a preemptive methods; counterpart to the wait-die system. 

g) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a larger timestamp after that does Pj ( Pi is younger than Pj). If not, Pj is rolled back ( Pj is wounded by Pi). 

h) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, respectively. 

i) If P1 requests a resource held by P2, after that the resource will be preempted from P2 and P2 will be rolled back. 

j) If P3 requests a resource held by P2, after that P3 will wait.


Related Discussions:- Compare wait-die deadlock prevention with wait-wound scheme

Er diagram, Design a generalization–specialization hierarchy for a motor-ve...

Design a generalization–specialization hierarchy for a motor-vehicle sales company. The company sells motorcycles, passenger cars, vans, and buses. Justify your placement of attrib

Key constraint - relational constraints, This constraint shows that the key...

This constraint shows that the key attribute value in each tuple must be unique, i.e., no two tuples have the similar value for the key attribute. This is because the value of the

Give concurrent sub states diagram for the classroom, Give Concurrent sub s...

Give Concurrent sub states diagram for the classroom and exam held. In Figure, simultaneous substrates have been taken. After passing Minor 1 test you could give Minor 2 test. T

A basic model of database access control, A basic model of Database Access ...

A basic model of Database Access Control Models of database access control have grown out of previous work on protection in operating systems. Let us talk about one simple mode

Determine set of minimal functional dependency-normalization, 1. Determine ...

1. Determine the set of minimal functional dependencies for the following data. The local bakery, Happy Cakes, needs your help designing a database that will support a kiosk in

Determine the object-oriented design process, An object-oriented design pro...

An object-oriented design process  1. Define the context and modes 2. Designs the system architecture 3. Identifies the principal system objects 4. Identifies concurrency in

Attributes, Attributes and its types explain?

Attributes and its types explain?

Exclusive lock, Exclusive lock It is asked for by a transaction on...

Exclusive lock It is asked for by a transaction on a data item that it wants to update. No other transaction can put either a shared lock or an exclusive lock on a dat

Binary relationship, explain in details about one to one binary relationshi...

explain in details about one to one binary relationship

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd