Pro Members, SQL Server, Standard Members

Transaction Using ACID Properties Timestamp Protocol and Security Procedures – Part 2

How should timestamps be used? The timestamp order protocol ensures that two conflicting read / write operations are executed in the corresponding timestamp order. It is an alternative solution to the use of locks. For Reading operations: If TS (T) is < W timestamp (P), transaction T attempts to read a value of P data that has already been overwritten......

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale and Standard Member Monthly - Fall Sale members only.
Log In Register

Comments are closed.