Exclusive lock, Database Management System

Assignment Help:

Exclusive lock

  • It is asked for by a transaction on a data item that it wants to update.
  • No other transaction can put either a shared lock or an exclusive lock on a data item that is locked in an exclusive mode.

Let us explain the above two modes with the help of an instance. We will once again consider the transactions T1 and T2 but in addition a transaction T11 that search the total of accounts Y and Z.

Schedule

T1

T2

T11

S_Lock X

 

S_Lock X

 

S_Lock Y

 

S_Lock Y

 

Read X

 

Read X

 

S_Lock Y

 

 

S_Lock Y

S_Lock Z

 

 

S_Lock Z

 

 

 

Read Y

 

 

 

Read Z

X_Lock X

X_Lock X. The exclusive lock request on X is denied as T2 holds the Read lock. The transaction T1 Waits.

Read Y

 

Read Y

 

Display X+Y

 

Display X+Y

 

Unlock X

 

Unlock X

 

X_Lock Y

X_Lock Y. The previous exclusive lock request on X is granted as X is unlocked. But the new exclusive lock request on Y is not granted as Y is locked by T2 and T11 in read mode. Thus T1 waits till both T2 and T11 will release the read lock on Y.

Display Y+Z

 

 

Display Y+Z

Unlock Y

 

Unlock Y

 

Unlock Y

 

 

Unlock Y

Unlock Z

 

 

Unlock Z

Read X

Read X

 

 

Subtract 100

Subtract 100

 

 

Write X

Write X

 

 

Read Y

Read Y

 

 

Add 100

Add 100

 

 

Write Y

Write Y

 

 

Unlock X

Unlock X

 

 

Unlock Y

Unlock Y

 

 

                                                               Figure: Example of Locking in multiple-modes

Therefore, the locking as above results in a serialisable schedule. Now the query is can we release locks a bit early and have still no concurrency related problem?Yes, we can do it if we lock using two-phase locking protocol.


Related Discussions:- Exclusive lock

Explain heap file with advantages, Explain heap file with advantages? H...

Explain heap file with advantages? Heap File is an unordered set or a group of records, stored on a set of pages. This class gives basic support for inserting, updating, select

Explain recovery process after system failure, Explain recovery process aft...

Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to

Improved availability, Improved availability: The data in a distributed sys...

Improved availability: The data in a distributed system may be replicated so that it is at more than one site. Thus, the failure of a node or a communication link does not necessar

Cube building in dataware housing , 1) Define a job scheduling strategy tha...

1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pict

What are metrics for choosing the best algorithm, What are metrics for choo...

What are metrics for choosing the best algorithm? Matrices for choosing the best algorithms are as below: Computational complexity Ease of understand ability and im

What are uncommitted modifications, What are uncommitted modifications? ...

What are uncommitted modifications? The immediate-modification technique permits database modifications to be output to the database whereas the transaction is still in the act

What are domain constraints, What are domain constraints? A domain is a...

What are domain constraints? A domain is a set of values that might be assigned to an attribute .all values that appear in a column of a relation must be taken from the similar

Define timestamp ordering, Define Timestamp ordering Ans In timestamp-b...

Define Timestamp ordering Ans In timestamp-based method, a serial order is made among the concurrent transaction by assigning to every transaction a unique nondecreasing number

Describe embedded query language, Describe Embedded Query Language? Emb...

Describe Embedded Query Language? Embedded Query Language - A query language (e.g., SQL) can be implemented in two ways. It can be used interactively or embedded within a host

What are domain constraints, What are domain constraints?  A  domain is...

What are domain constraints?  A  domain is  a  set  of  values  that  might  be  assigned to an attribute  .all  values that appear in a  column of a relation must be taken fro

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd