Describe a design of a logging protocol for distributed savepoints.

What will be an ideal response?


The transaction manager, TM, provides a tx_create_savepoint procedure that can be called from the application. TM knows the identity of all resource managers participating in the transaction. It calls those resource managers using the xa interface to request that they each create a local savepoint for the transaction and return the savepoint’s identity. TM then writes a savepoint record to its log and returns a distributed savepoint identifier to the application. TM also provides a tx_rollback procedure that can be called by the application. The application provides a distributed savepoint identifier as an argument to the procedure. The procedure locates the savepoint record in its log and calls each resource manager, requesting it to rollback to the appropriate local

Computer Science & Information Technology

You might also like to view...

A ‘null’ RMI that takes no parameters, calls an empty procedure and returns no values delays the caller for 2.0 milliseconds. Explain what contributes to this time.

In the same RMI system, each 1K of user data adds an extra 1.5 milliseconds. A client wishes to fetch 32K of data from a file server. Should it use one 32K RMI or 32 1K RMIs?

Computer Science & Information Technology

To distributeobjects means to position one or more selected objects in relation to each other, in relation to the margins of a document, or in relation to the boundaries of the page or spread.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a JavaScript, the entire Case structure is enclosed in a set of braces. However, the scope for each condition does not have to be enclosed in a separate set of braces.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To process data using post order processing:

a. Node is processed first, then the left branch, then the right. b. The left branch is processed first, then the node and then the right branch c. The left branch is processed first, then the right branch, and then the node d. The right branch is processed first, then the node, and then the left branch.

Computer Science & Information Technology