Pro Members, SQL Server, Standard Members

Transaction Using ACID Properties Timestamp Protocol and Security Procedures – Part 2

How should timestamps be used? The timestamp order protocol ensures that two conflicting read / write operations are executed in the corresponding timestamp order. It is an alternative solution to the use of locks. For Reading operations: If TS (T) is < W timestamp (P), transaction T attempts to read a value of P data that has already been overwritten...

This content is for Pro, Pro Member, Pro Member Annual – Fall Sale, Pro Member Monthly – Fall Sale, Standard, Standard Member, Standard Member Annual – Fall Sale, and Standard Member Monthly – Fall Sale members only.
Register
Already a member? Log in here

Comments are closed.