
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question

Transcribed Image Text:Transaction management deals with the problems of always keeping the database in a consistent state even when concurrent accesses and failures occur. Isolation requires that each transaction sees a consistent database at all times and that an executing transaction cannot reveal its results to other concurrent transactions before its commitment.
ANSWER
If two concurrent transactions access a data item that is being updated by one of them, it is not possible to guarantee that the second will read the correct value. Dirty reads and nonrepeatable reads may occur when one transaction can see intermediate results of another transaction before it has been committed.. Given below are two concurrent transactions T1 and T2 whose balances of amount x
(balx) were recorded at times t, between t₁ and tg. As shown in the table below:
If these two transactions interfere with each other, fill in the table below by selecting from the drop down list the values of balance X (bal,) at specified times between t₁ and tg.
Time
T1
[₁
t₂
t3
t4
t5
t6
t7
tg
Begin_Transaction
Read(baly)
baly = baly - 10
Write(baly)
Commit
T2
Begin_Transaction
Read(bal.)
bal, = balx + 100
Write(bal.)
rollback
balx
100
100
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 2 steps

Knowledge Booster
Similar questions
- A relational database has the following schema: Customer (Cno, name, address, age, loan_type, loan_amount, year) Solve following queries in relational algebra: Select the records where loan_type is 'Personal'. Select the records where age is geater than 30 and loan_type is ‘soft’. Select records from Customer table where loan_type is ‘Personal' and loan_amount is Rs200000 or those customers who opened an account after 2017. Project the columns name and address from the Customer table.arrow_forwardWhen the application of an optimistic approach to concurrency control is implemented, it is frequently observed that transactions experience prolonged durations for completion. Explain?arrow_forwardALGORITHM QUESTION: Assume that UQU wants to perform the following operations on its retained records of students and staffs: NameLookup (ID): Return the name of the person whose identification is ID, andNumLookup (Name): Return the ID of the person whose name is Name. Let n is the total number of students and staffs at UQU, present a data structure that take O(logn) time and O(n) space to perform each of the above operations, explain your answer.arrow_forward
- The recurring transaction type that generates an alert when we should use a recurring transaction to enter a new transaction isarrow_forwardConsider a schedule with 4 transactions with 1, 2, 3, and 4 operations respectively. Calculate the possible number ofa) Serial schedulesb) Non serial schedules Please answer these question in detail with full explaination. I need a proper long answer. Thanks :)arrow_forwardThe Oracle database system uses undo log records to provide a snapshot view of the database under snapshot isolation. The snapshot view seen by transaction Ti reflects updates of all transactions that had committed when Ti started and the updates of Ti; updates of all other transactions are not visible to Ti. Describe a scheme for buffer handling whereby transactions are given a snapshot view of pages in the buffer. Include details of how to use the log to generate the snapshot view. You can assume that operations as well as their undo actions affect only one page.arrow_forward
- The following two transactions result in a deadlock. Show through examples how this deadlock can be dealt with or avoided using conservative and basic two-phase locking algorithms. T'1 read_lock (Y); read_item (Y); write_lock (X); (waits for X) T'2 read_lock (X); read_item (X); write_lock (Y); (waits for Y)arrow_forwardConsider the schedule below. Here, R(*) and W(*) stand for 'Read' and 'Write', respectively. T1, T2, T3, T4 and T5 represent five transactions and ti represents a time slot. ti t2 t3 t4 t5 t6 t7 t8 t9 ti0 t11 t12 t13 t14 t15 t16 t17 t18 T1 R(A) R(B) W(A) W(B) T2 R(C) W(C) T3 R(B) R(C) W(B) W(C) T4 R(D) W(D) R(A) W(A) T5 R(C) R(A) W(C) W(A) Each transaction begins at the time slot of its first Read and commits right after its last Write (same time slot). Regarding the following questions, give and justify your answers. 3) Construct a schedule (which is different from above) of these five transactions which causes deadlock when using two-phase locking protocol. You should clearly indicate all the locks and the corresponding unlocks in your schedule. If no such schedule exists, explain why. 4) Construct a schedule (which is different from above) of these five transactions which does not cause deadlock when using two-phase locking protocol. You should clearly indicate all the locks and the…arrow_forwardTransactions often take a very long time to finish when an optimistic approach to concurrency management is used. Explain.arrow_forward
- When an optimistic approach to concurrency management is used, transactions often take a very lengthy time to complete. Explain.arrow_forwardConsider the database containing transaction data as shown in the table below. Apply Apriori algorithm and find the frequent itemsets where min-sup=2. TID Items Bought 1 Daiper, Bread, Juice 2 Eggs, Bread, Pasta 3 Daiper, Eggs, Bread, Pasta 4 Eggs, Pasta 5 Ricearrow_forwardAll transactions have four properties: Atomicity, Consistency, Isolation, and Durability. These four properties are also known as the ACID test of transactions. In addition, multiple transactions must conform to the property of serializability. Concurrency controlling techniques ensure that multiple transactions are executed simultaneously while maintaining the ACID properties of the transactions and serializability in the schedules. Explain the following statement: a transaction is a logical unit of work.What are some disadvantages of time-stamping methods for concurrency control?Why might it take a long time to complete transactions when an optimistic approach to concurrency control is used?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY