Deadlock Detection Techniques in Distributed Database System

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deadlock Detection Techniques in Distributed Database System

Distributed database system provides resource sharing environment for optimal performance of various database activities, especially when data is spread over a large number of sites. Distributed nature of transactions occurring at different sites and requiring resources from diverse sites pose various operational problems, such as deadlocks, concurrency and data recovery. A deadlock may occur w...

متن کامل

Deadlock Detection in Distributed Database

Volume 2, Issue 2 March – April 2013 Page 95 Abstract: In distributed database, data resides in various sites and many transactions can originate at any number of sites randomly. These transactions can execute concurrently. This concurrency leads to deadlock in which transactions may enter into an infinite waiting state so deadlock handling is an important criteria in distributed transaction pr...

متن کامل

Analysis for Deadlock Detection and Resolution Techniques in Distributed Database

In a distributed database environment, where the data is spread across several sites there are many concerns to deal with such as concurrency control, deadlock. Deadlocks impact the overall performance of the system. A deadlock is a condition in a system where a process cannot proceed because it needs to obtain a resource held by another process which it itself is holding a resource that the ot...

متن کامل

Approaches for Deadlock Detection and Prevention in Distributed Database System

Approaches for Deadlock Detection and Prevention in Distributed Database System Swati Gupta Lecturer, Department of Computer Science Amity University Haryana ,Gurgaon, India _______________________________________________________________________________________ Abstract: A distributed database system consists of different number of sites that are inter connected by a communication network. A de...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2013

ISSN: 0975-8887

DOI: 10.5120/13045-0162