7.22- Concurrency Control Techniques- Introduction | DBMS Free Online Course | DBMS Tutorials
Notes Link:
http://www.tutorialsspace.com/Downloa...
Complete Playlist:
(Eng) DBMS Tutorials | Sql Tutorials | RDBMS Lectures
• (Eng) DBMS Tutorials | Sql Tutorials | RDB...
DBMS - Data Base Management System Tutorials
• DBMS Complete Syllabus- All University exa...
[With Notes & PDF File] | Database Management System In HINDI
• [With Notes & PDF File] | Database Managem...
Transactions & Concurrency Control In DBMS | Serializability | Recoverability | recovery System | Time stamp
• Transactions & Concurrency Control In DBMS...
transaction in dbms, transaction management system in dbms, dbms ugc net lectures,
dbms gate lectures,
serial schedule in dbms, what is schedule in dbms, schedule in dbms, non serial schedule in dbms, serializable schedule, Serializability in dbms, conflict serializable schedule in dbms, conflict serializable schedule, view serializability in dbms, recoverability of schedule, recoverable schedule, cascading rollback shedule, cascade less schedule, concurrency control techniques, lock based protocol in dbms, granularity of locks, shared and exclusive lock, two phase locking in transaction, time stamp based protocol in transaction, validation based protocol in dbms, multiversion concurrency control,
#dbms #gatedbms #ugcnetdbms #gatedbmslectures #ugcnetdbmslectures #dbmsLectures #dbmsTutorials
#dbmsTutorials
Social Links
Twitter Account: / tutorialsspace
FaceBook Page: / tutorialsspace
Instagram : / tutorialsspace
Telegram Channel: https://t.me/TutorialsSpace
Telegram Group: t.me/TutorialsSpace
Pin-Interst: / tutorialsspace
youtube: / tutorialsspace
Concurrency Control Techniques
To avoid concurrency related problems and to maintain consistency, some rules (protocols) need
to be made so that system can be protected from such situations and increase the efficiency.
8.5.1 Lock-Based Protocols
To maintain consistency, restrict modification of the data item by any other transaction which
is presently accessed by some transaction. These restrictions can be applied by applying locks
on data items. To access any data item, transaction have to obtain lock on it.
8.5.1.1 Granularity of Locks
The level and type of information that the lock protects is called locking granularity.
In other words, the size of data items that the data manager locks is called the locking
granularity. The granularity of locks in a database refers to how much of the data is locked
at one time. In theory, a database server can lock as much as the entire database or as little
as one column of data. The level of locking used depends on the typical access needs of
transactions as well as consideration of performance tradeoffs. Locking granularity affects
performance since more work is necessary to maintain and coordinate the increased number
of locks. To achieve optimum performance, a locking scheme must balance the needs of
concurrency and overhead. Locking can occur on the following levels
Информация по комментариям в разработке