Concurrency Control and Recovery Management

Video Lessons & Revision Notes

Lock Based Protocols
Lock Based Protocols
1. Lock Based Protocols
In this 55 mins Video Lesson
Introduction, Lock Based Protocols, Starvation, Desdlocks, 2 Phase Locking Protocol, Strict 2PL, Rogorous 2PL, Lock Conversion Based Protocol, and other topics.
Timestamp based and Optimistic Protocols
Timestamp based and Optimistic Protocols
2. Timestamp based and Optimistic Protocols
In this 46 mins Video Lesson
Timestamp based Protocols, Timestamp Ordering protocol, Thomas' Write Rule, Optimistic/ Validation Based Protocols, Multiversion Scheme, and other topics.
Deadlocks
Deadlocks
3. Deadlocks
In this 38 mins Video Lesson
DeadLocks, Deadlock Prevention, Preemtion/ Rollback Scheme, Wait-Die Scheme, Wound-Wait Scheme, Deadlock Detection, Deadlock Recovery, Selection of Victim, Rollbacks, and other topics.
Failures and Log based Recovery Techniques
Failures and Log based Recovery Techniques
4. Failures and Log based Recovery Techniques
In this 45 mins Video Lesson
Introduction, Types of Failures, Log Based Recovery, Deferred Database Modification, Immediate Database Modification, and other topics.
Check point based Recovery and Shadow Paging
Check point based Recovery and Shadow Paging
5. Check point based Recovery and Shadow Paging
In this 36 mins Video Lesson
Checkpoint Based Recovery, Shadow Paging, and other topics.

Revision Notes

Concurrency Control: Need, Locking Methods, Deadlocks, Timestamping Methods, Optimistic Techniques, Multi-Version Concurrency Control, Different Crash Recovery methods such as Shadow-Paging and Log-Based Recovery: Deferred and Immediate, Checkpoints

Member's Zone