For each of the following schedules, state whether the schedule is serializable, conflict- serializable, view-serializable, recoverable, and whether it avoids cascading aborts:
(a) read(T1, balx), read(T2, balx), write(T1, balx), write(T2, balx), commit(T1),
commit(T2)
(b) read(T1, balx), read(T2, baly), write(T3, balx), read(T2, balx), read(T1, baly),
commit(T1), commit(T2)
(c) read(T1, balx), write(T2, balx), write(T1, balx), abort(T2), commit(T1)
(d) write(T1, balx), read(T2, balx), write(T1, balx), commit(T2), abort(T1)
(e) read(T1, balx), write(T2, balx), write(T1, balx), read(T3, balx), commit(T1),
commit(T2), commit(T3)
(a) read(T1, balx), read(T2, balx), write(T1, balx), write(T2, balx), commit(T1),
commit(T2)
Not (conflict) serializable; not view serializable. Recoverable; avoids cascading abort.
(b) read(T1, balx), read(T2, baly), write(T3, balx), read(T2, balx), read(T1, baly),
commit(T1), commit(T2)
Conflict serializable and so view serializable. Recoverable; (however, does not avoid
cascading abort if T 3 had aborted, T 2 would also have to abort as it has read the value of an
aborted transaction).
(c) read(T1, balx), write(T2, balx), write(T1, balx), abort(T2), commit(T1)
Assuming abort occurs, then only transaction T 1 occurs making schedule serial and thus
conflict serializable and view serializable. Without abort, then not (conflict) serializable; not
view serializable. Recoverable; avoids cascading abort.
(d) write(T1, balx), read(T2, balx), write(T1, balx), commit(T2), abort(T1)
Assuming abort occurs, then only transaction T 2 occurs making schedule serial and thus
conflict serializable and view serializable. Without abort, then not (conflict) serializable; not
view serializable. Not recoverable therefore not avoiding cascading abort.
(e) read(T1, balx), write(T2, balx), write(T1, balx), read(T3, balx), commit(T1),
commit(T2), commit(T3)
Not (conflict) serializable; not view serializable. Recoverable but not avoiding cascading
aborts.
You might also like to view...
Which criterion cannot be used in an ACL rule to match a packet?
a. Source address b. Source port c. Destination address d. Destination port f. Protocol e. Direction
Which of the following tasks are completed during the Implement or Assess step in the Security System Development Life Cycle?
A. Assess the system's risk. B. Determine the security category of the system. C. Integrate security into the system. D. Review operational readiness.