Define the two phase locking protocol, Database Management System

Assignment Help:

Define the Two Phase Locking Protocol

This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and unlock requests in two phases:

Growing Phase: A transaction may acquire locks, but may not release any lock.

Shrinking Phase: A transaction may release locks, but may not acquire any new locks. Basically, a transaction is in growing phase. The transaction obtains locks as required. Just one time the transaction releases a lock, it comes in the shrinking phase, and it can issue no more lock requests. Two-phase locking makes sure conflict serializability, but does not make sure freedom from deadlock.


Related Discussions:- Define the two phase locking protocol

What is nested relational model, What is nested relational model? The n...

What is nested relational model? The nested relational model is an extension of relational model in which domains might be either atomic or relation valued.

Define ssn of salesman by using database of business trips, Consider the su...

Consider the subsequent relations for a database which keeps track of business trips of salespersons in a sales office: SALESPERSON (SSN, Name, start_year, Dept_no) TRIP (SSN, Fr

List the requirements needed to design a trigger, List the requirements nee...

List the requirements needed to design a trigger. The requirements are:- Specifying when a trigger is to be implemented. State the actions to be taken when the trigger im

What are the types of indices, Normal 0 false false false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Query evolution, what is query processing ,query optimization and performan...

what is query processing ,query optimization and performance turring?

Define the term- actors and data stores, Define the term- Actors and Data...

Define the term- Actors and Data Stores Actors: An actor is the active object which drives data flow graph by producing or consuming values. Actors are attached to inputs a

Explain the weak entity set, Explain the Weak Entity Set An Entity set...

Explain the Weak Entity Set An Entity set which does not have sufficient attribute to make a primay key is known as weak entity set. For instance, dependents of an employee in

What is vertical fragmentation, What is vertical fragmentation? Vertica...

What is vertical fragmentation? Vertical fragmentation divides the relation by decomposing the scheme R of relation r.

Decompose the table - 3nf or bcnf, Decompose the table with the following ...

Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF. A long-standing international treaty am

Heap files (unordered file), Heap files (unordered file) Mostly these f...

Heap files (unordered file) Mostly these files are unordered files. It is the easiest and most basic type. These files having of randomly ordered records. The records will have

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd