UniKL Logo

Lehrgebiet Informationssysteme

FB Informatik

FB Informatik
 
LG IS
AG DBIS
AG HIS
Jobs / Tasks
Courses
Publications
Contact
Misc
Impressum
(C) AG DBIS
 

Verification of Protocol taDOM2

For the taDOM2 locking protocol the following locks are used:

 Lock on
Context Node
Lock on
Parent Node
Description
 IRIRIntention read: At least one descendant of the context node has been read.
 NRIRNode read: The context node has been read.
 LRIRLevel read: The context node and all its child nodes have been read.
 SRIRSubtree read: The context node and all its descendants have been read.
 IXIXIntention exclusive: At least one descendant node (but not a child node) of the context node has been modified.
 CXIXChild exclusive: At least on child node of the context node has been modified.
 SUIRSubtree update: The context node and all its descendant nodes have been read. Possible downgrade to SR or upgrade to SX.
 SXCXSubtree exclusive: The context node and all its descendants are locked for deletion.

Lock Compatibility Matrix:

 -IRNRLRSRIXCXSUSX
IR+++++++--
NR+++++++--
LR++++++---
SR+++++----
IX++++-++--
CX+++--++--
SU+++++----
SX+--------
Compatibility matrix for taDOM2
Check of Compatibility Matrix: Ok

Lock Conversion Matrix:

Lock Strength-Relationships:

 IRis stronger thanNR
 NRis stronger thanIR
 LRis stronger thanIR, NR
 SRis stronger thanIR, NR, LR
 IXis stronger thanIR, NR
 CXis stronger thanIR, NR, IX
 SUis stronger thanIR, NR, LR, SR, IX, CX, SX
 SXis stronger thanIR, NR, LR, SR, IX, CX, SU

 -IRNRLRSRIXCXSUSX
IRIRIRNRLRSRIXCXSUSX
NRNRNRNRLRSRIXCXSUSX
LRLRLRLRLRSRIXNRCXNRSUSX
SRSRSRSRSRSRIXSRCXSRSRSX
IXIXIXIXIXNRIXSRIXCXSXSX
CXCXCXCXCXNRCXSRCXCXSXSX
SUSUSUSUSUSUSXSXSUSX
SXSXSXSXSXSXSXSXSXSX
Conversion matrix for taDOM2
Check of Conversion Matrix: Ok