| 1. |
Devise A Time Stamp-based Protocol That Avoids The Phantom Phenomenon? |
|
Answer» Answer :In the text, we CONSIDERED two approaches to dealing with the PHANTOM phenomenon by means of locking. The coarser granularity approach OBVIOUSLY works for time stamps as well. The B+-tree index based approach can be adapted to time stamping by treating index buckets as data items with time stamps associated with them, and requiring that all read accesses use an index. We now show that this simple method works. Suppose a transaction TI wants to access all tuples with a particular range of search-key values, using a B+- tree index on that search-key. Ti will need to read all the buckets in that index which have key values in that range. It can be seen that any delete or insert of a tuple with a key-value in the same range will need to WRITE one of the index buckets read by Ti. Thus the logical conflict is converted to a conflict on an index bucket, and the phantom phenomenon is avoided. |
|