Suppose that we use the deferred update protocol for the example in Figure 23.6. Show how the log would be different in the case of deferred update by removing the unnecessary log entries; then describe the recovery process, using your modified log. Assume that only redo operations are applied, and specify which operations in the log are redone and which are ignored.

What will be an ideal response?


In the case of deferred update, the write operations of uncommitted transactions are not
recorded in the database until the transactions commit. Hence, the write operations of T2
and T3 would not have been applied to the database and so T4 would have read the
previous (committed) values of items A and B, thus leading to a recoverable schedule.
By using the procedure RDU_M (deferred update with concurrent execution in a
multiuser environment), the following result is obtained:
The list of committed transactions T since the last checkpoint contains only transaction
T4. The list of active transactions T' contains transactions T2 and T3.
Only the WRITE operations of the committed transactions are to be redone. Hence, REDO
is applied to:
[write_item,T4,B,15]
[write_item,T4,A,20]
The transactions that are active and did not commit i.e., transactions T2 and T3 are
canceled and must be resubmitted. Their operations do not have to be undone since they
were never applied to the database.

Computer Science & Information Technology

You might also like to view...

The __________ is an Internet protocol that enables dynamic allocation of IP addresses to hosts.

A. VLAN B. IEEE 802.1X C. EAPS D. DHCP

Computer Science & Information Technology

Stacking an element takes that element out of the normal flow of the document and positions it along the left or right edge of its containing element.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Briefly explain the NIST general approach for testing computer forensics tools.

What will be an ideal response?

Computer Science & Information Technology

?Identify the letter of the choice that best matches the phrase or definition.

A. ?Part of the step pattern that species the direction the XSLT processor should move B. ?Used to distinguish one template from another when applied to the same node set C. ?Axis value that selects all children of the context node D. ?Axis value that selects all namespace nodes of the context node E. ?Indicates an optional ID F. ?Element used to simplify grouping in XSLT 2.0 G. ?Function to return the maximum value from node-set H. ?Function to return nodes with the highest value in node-set I. ?Extension used to create a loop with the Saxon processor J. ?Function used to test availability of an extension function

Computer Science & Information Technology