Compare wait-die deadlock prevention with wait-wound scheme, Database Management System

Assignment Help:

Compare wait-die deadlock prevention scheme with wait-wound scheme  

Ans:  Wait-Die Scheme 

a) Based upon a nonpreemptive technique. 

b) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a smaller timestamp after that does Pj (Pi is older than Pj). Otherwise, Pi is rolled back (dies). 

c) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, correspondingly. 

d) If P1 requests a resource held by P2, after that P1 will wait. 

e) If P3 requests a resource held through the P2, then P3 will be rolled back.  Wound-Wait Scheme 

f)  Based upon a preemptive methods; counterpart to the wait-die system. 

g) If Pi requests a resource presently held by Pj, Pi is allowed to wait only if it has a larger timestamp after that does Pj ( Pi is younger than Pj). If not, Pj is rolled back ( Pj is wounded by Pi). 

h) Example: Assume that processes P1, P2, and P3 have timestamps 5, 10, and 15, respectively. 

i) If P1 requests a resource held by P2, after that the resource will be preempted from P2 and P2 will be rolled back. 

j) If P3 requests a resource held by P2, after that P3 will wait.


Related Discussions:- Compare wait-die deadlock prevention with wait-wound scheme

What is the aim of logical schema, What is the aim of logical schema ? ...

What is the aim of logical schema ? The main motive of the logical schema is to ensure the portability of procedures and models on various physical schemas at runtime.

Which data type can store unstructured data, Which data type can store unst...

Which data type can store unstructured data? Raw data type can store unstructured data.

Explain the lock based protocol, Lock Based Protocol A lock is nothing ...

Lock Based Protocol A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are t

Strong entity set and weak entity set, Strong entity set and weak entity se...

Strong entity set and weak entity set? Strong entity set and weak entity set: A strong entity set has a primary key. All tuples in the set are distinguishable through that key.

Define deadlock prevention, Define Deadlock prevention These protocols...

Define Deadlock prevention These protocols make sure that the system will never enter a deadlock state. There are two methods to deadlock prevention. One approach makes sure t

Create table, What are the advantages of creating a table from existing tab...

What are the advantages of creating a table from existing table?

Objectives of database manangement system, OBJECTIVES After going thro...

OBJECTIVES After going through this unit you should be capable to: Explain the File Based system and its limitations; Explain the structure of DBMS; Explain the

How to rearrange classes and operations, Rearrange Classes and Operations ...

Rearrange Classes and Operations Sometimes, the similar operation is defined across different classes and can easily be inherited from a familiar ancestor, but more often oper

Explain about primary key, Explain about primary key Primary Key: It ...

Explain about primary key Primary Key: It is one of the candidate keys that are taken to be the recognizing key for the entire table. E.g. although there are two candidate ke

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd