Compare wait-die deadlock prevention with wait-wound scheme, Database Management System

Assignment Help:

Compare wait-die deadlock prevention scheme with wait-wound scheme  

Ans:  Wait-Die Scheme 

a) Based upon a nonpreemptive technique. 

b) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a smaller timestamp after that does Pj (Pi is older than Pj). Otherwise, Pi is rolled back (dies). 

c) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, correspondingly. 

d) If P1 requests a resource held by P2, after that P1 will wait. 

e) If P3 requests a resource held through the P2, then P3 will be rolled back.  Wound-Wait Scheme 

f)  Based upon a preemptive methods; counterpart to the wait-die system. 

g) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a larger timestamp after that does Pj ( Pi is younger than Pj). If not, Pj is rolled back ( Pj is wounded by Pi). 

h) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, respectively. 

i) If P1 requests a resource held by P2, after that the resource will be preempted from P2 and P2 will be rolled back. 

j) If P3 requests a resource held by P2, after that P3 will wait.


Related Discussions:- Compare wait-die deadlock prevention with wait-wound scheme

The average amount of their orders , Make SQL statements for the following ...

Make SQL statements for the following scenarios. Your response should contain SQL statement, output and any other assumptions you have made to arrive at the answer. For Colorado cu

Mapping, How external/conceptual mapping and conceptual /internal mapping i...

How external/conceptual mapping and conceptual /internal mapping is performed

What type of view of total database content, What type of view of total dat...

What type of view of total database content? Data base content Conceptual view of total database contain.

HIT, Meaningful use refers to the use of certified EHR technology to "enhan...

Meaningful use refers to the use of certified EHR technology to "enhance quality, efficiency, and reduce health disparities

Update operations in dbms - insert operation, Update Operations and Dealing...

Update Operations and Dealing with Constraint Violations There are three basic operations to be executes on relations: Insertion Deletion Update The INSER

Give an example of enforcement in typing, Give an example of enforcement in...

Give an example of enforcement in Typing. You can understand the idea of enforcement as it makes sure objects of dissimilar classes may not be interchanged as below:  Exampl

Alter table command, ALTER TABLE Command : This command is used for variati...

ALTER TABLE Command : This command is used for variation of existing structure of the table in the given situation: When a new column is to be added to the table structure.

Entity identifier key attributes, An entity type usually has an attribute w...

An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd