Professional Documents
Culture Documents
com
R05
Set No. 2
D
L
[8+8]
[8+8]
R
O
W
U
(b) Consider the data item x. Let RTM(x)=25 and WTM(x)=20. Let the pair(Ri(x),
TS) (Wi(x), TS) denote the read(write) request of transaction Ti on the item
x with timestamp TS. Indicate the behavior of the basic timestamp method
with the following sequence of requests.
(R1(x), 19), (R2(x), 22), (w3(x), 21)
(W4(x), 23), (R5(x), 28), (W6(x), 27).
[6+10]
T
N
[8+8]
[16]
www.jntuworld.com
www.jntuworld.com
R05
Set No. 4
R
O
D
L
[16]
W
U
T
N
[8+8]
[8+8]
[8+8]
www.jntuworld.com
www.jntuworld.com
R05
Set No. 1
D
L
[8+8]
R
O
(b) Consider the data item x. Let RTM(x)=25 and WTM(x)=20. Let the pair(Ri(x),
TS) (Wi(x), TS) denote the read(write) request of transaction Ti on the item
x with timestamp TS. Indicate the behavior of the basic timestamp method
with the following sequence of requests.
(R1(x), 19), (R2(x), 22), (w3(x), 21)
(W4(x), 23), (R5(x), 28), (W6(x), 27).
[6+10]
W
U
T
N
(a) Write-locks-all
[8+8]
[16]
www.jntuworld.com
[8+8]
www.jntuworld.com
R05
Set No. 3
D
L
[8+8]
R
O
[8+8]
W
U
T
N
[8+8]
(b) Consider the data item x. Let RTM(x)=25 and WTM(x)=20. Let the pair(Ri(x),
TS) (Wi(x), TS) denote the read(write) request of transaction Ti on the item
x with timestamp TS. Indicate the behavior of the basic timestamp method
with the following sequence of requests.
(R1(x), 19), (R2(x), 22), (w3(x), 21)
(W4(x), 23), (R5(x), 28), (W6(x), 27).
[6+10]
7. Explain about the push based technologies.
[16]
www.jntuworld.com