SlideShare a Scribd company logo
REAL TIME DATABASE
A real-time database system is a database system
  in which a timely response to a user request is
                      needed
Types of Real-Time Database Systems
• Hard real-time database systems, e.g. early warning
system
• Soft real-time database systems, e.g., banking system,
airline reservation system, digital library, stock market
 etc.
TRANSACTION
   • It is said to be set of read or write operations.

QUERY
   • A transaction is said to be a query if it contains either
     a read or update operation.
   • Commit is a point of no return, once a transaction is
     commited we are certain that, the changes to the
     database are permanent.
ACID PROPERTIES
ACID PROPERTIES

   A- ATOMICITY
   C- CONSISTENCY
   I-ISOLATION
   D- DURABILITY
ACID PROPERTIES
ATOMICITY

Atomicity requires that each transaction is "all or nothing": if one part of
the transaction fails, the entire transaction fails, and the database state is
left unchanged.

CONSISTENCY

The consistency property ensures that any transaction will bring the
database from one valid state to another. Any data written to the database
must be valid according to all defined rules.
ISOLATION

Until and unless a transaction is commited, the actions of it are not visible
to any other transactions

DURABILITY

Durability means that once a transaction has been committed, it will
remain so, even in the event of power loss, crashes, or any errors.
QUERIES IN REALTIME DATA BASE
SYSTEM
 • The queries associated with a RTDBS are associated with a
 deadline, there may be some response after the queries passed the
 deadlines.
 •The data returned in response to a query must have absolute and
 relative consistency
   ABSOLUTE CONSISTENCY
        It is accuracy. The data returned in response to a query must be
 close to the result expected. Ex. If temperature or pressure is interrogated in
 a chemical vessel the data returned to be close to the current temperature or
 pressure.

   RELATIVE CONSISTENCY
          In case of multiple data is to be collected, it must be close to each
 other.
MEMORY FOR RTDBS
MAIN MEMORY
•The entire database is residing on the main memory is
the concept behind main memory databases

•Main memory databases are faster than disk based
databases. Since accessing data in memory reduces the I/
O reading activity when querying the data which provides
faster and more predictable performance than disk
Many MMDBs add durability via the following mechanisms

•Snapshot files or checkpoint images which record the state of the
database at a given moment in time.

•Transaction logging, which records changes to the database in a file
and facilitates easy recovery

•Non-volatile random access memory (NVRAM), usually in the form of
static RAM backed up with battery power or an electrically erasable
programmable ROM (EEPROM). With this storage, the MMDB
system can recover the data stored from its last consistent state upon
reboot.
•A clone database is created, which can be used when the primary
database crashes.
DEADLOCK CONDITION
DEAD LOCK CONDITION IN DATABASE


•There may be situations when two or more transactions are put into wait state
simultaneously .
•In this position each would be waiting for the other transaction to get released.
•EXAMPLE
        Suppose we have two transactions 1 and 2 both executing simultaneously.
        The transaction 1 is to update student table and then update course table.
        The transaction 2 is to update course table and then student table.
•When a table is updated by a transaction it is locked for preventing access from other
 transaction.
•In the example both transaction 1 and 2 lock student and course table respectively,
so both are locked.
•The two transactions should be executed simultaneously, so each one waits for other
and causing a deadlock.
DEAD LOCK REMOVAL IN RTDBS
 •If a deadlock cycle is detected, one of the transactions involved in the cycle must
 be aborted in order to break the cycle.

 •In a RTDB system, the victim transaction should be chosen such that the largest
 number of remaining transactions can meet their deadline

 •Five deadlock resolution policies that take into account the timing properties of the
 transactions and the cost of abort operations have been given. They are

          Always aborts the transaction invoking deadlock detection.

                     Trace the deadlock cycle, and abort the transaction with the
          furthest deadline.

                      Trace the deadlock cycle, abort the transaction with the earliest
          deadline.
Trace the deadlock cycle, and abort the transaction with the least
criticalness.

           Abort the infeasible transaction with the least criticalness. If all
transactions are feasible, then abort a feasible transaction with the least
criticalness.
T TREE INDEXING



•A T-tree is a balanced index tree data structure optimized for cases where both
the index and the actual data are fully kept in memory


•The actual data is always in main memory together with the index so that they just
contain pointers to the actual data fields.

•A T-tree node usually consists of pointers to the parent node, the left and right
child node, an ordered array of data pointers and some extra control data
TTREE STRUCTURE
SEARCH

•Search starts at the root node
•If the current node is the bounding node for the search value
then search its data array. Search fails if the value is not found
in the data array
•If the search value is less than the minimum value of the
current node then continue search in its left subtree. Search
fails if there is no left sub tree
•If the search value is greater than the maximum value of the
current node then continue search in its right subtree. Search
failes if there is no right sub tree
ALGORTHIM USED IN REAL TIME DATABASE
   .



•Most of the transactions in the real time DB are associated with a deadline,
hence Earliest Deadline First (EDF) algorithm finds a greater solution to
schedule those transactions. But EDF algorithm will be working efficiently if
the number of transactions are moderate. But usually the DB transactions
are huge in a systems and EDF may not be suitable which leads to
congestion.

•To manage with huge transactions an algorithm called Adaptive Earliest
Deadline (AED) is implemented. It uses the congestion control and can
process huge number of transactions. It uses two groups HIT and MISS
group.

    Each transaction associated with deadline are put in HIT group

    Transaction not having deadline are put in MISS group

      First the HIT group transaction will be executed and then the MISS
group transaction will be executed
Ex
  In a flight cockpit the cabin temperature, pressure, humidity should be monitored
continuously
  In a flight other things such as entrainment system, air-conditioning system are also to
be monitored
  But they are not much important as cockpit status. So the earlier one is put in HIT
group and the latter one is put in MISS group
WEBSITE
   Pradeepkumar.org
THANK   U

More Related Content

What's hot

contiguous memory allocation.pptx
contiguous memory allocation.pptxcontiguous memory allocation.pptx
contiguous memory allocation.pptx
Rajapriya82
 
OS concepts 6 OS for various computing environments
OS concepts 6 OS for various computing environmentsOS concepts 6 OS for various computing environments
OS concepts 6 OS for various computing environments
Vaibhav Khanna
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
Wayne Jones Jnr
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
MNM Jain Engineering College
 
Os Threads
Os ThreadsOs Threads
Os Threads
Salman Memon
 
Operations on Processes and Cooperating processes
Operations on Processes and Cooperating processesOperations on Processes and Cooperating processes
Operations on Processes and Cooperating processes
VishnuMenon59
 
operating system question bank
operating system question bankoperating system question bank
operating system question bank
rajatdeep kaur
 
IO and file systems
IO and file systems IO and file systems
IO and file systems
EktaVaswani2
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architecture
Mrinmoy Dalal
 
Chapter 8 : Memory
Chapter 8 : MemoryChapter 8 : Memory
Chapter 8 : Memory
Amin Omi
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
Mukesh Chinta
 
Underlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computingUnderlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computing
GOVERNMENT COLLEGE OF ENGINEERING,TIRUNELVELI
 
Process of operating system
Process of operating systemProcess of operating system
Process scheduling
Process schedulingProcess scheduling
Process scheduling
Riya Choudhary
 
EMBEDDED OS
EMBEDDED OSEMBEDDED OS
EMBEDDED OS
AJAL A J
 
Process management in os
Process management in osProcess management in os
Process management in os
Sumant Diwakar
 
process creation OS
process creation OSprocess creation OS
process creation OS
Kiran Kumar Thota
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
Uday Wankar
 
scheduling.pptx
scheduling.pptxscheduling.pptx
scheduling.pptx
NiharikaGour2
 
Cluster and Grid Computing
Cluster and Grid ComputingCluster and Grid Computing
Cluster and Grid Computing
Sayed Chhattan Shah
 

What's hot (20)

contiguous memory allocation.pptx
contiguous memory allocation.pptxcontiguous memory allocation.pptx
contiguous memory allocation.pptx
 
OS concepts 6 OS for various computing environments
OS concepts 6 OS for various computing environmentsOS concepts 6 OS for various computing environments
OS concepts 6 OS for various computing environments
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
Os Threads
Os ThreadsOs Threads
Os Threads
 
Operations on Processes and Cooperating processes
Operations on Processes and Cooperating processesOperations on Processes and Cooperating processes
Operations on Processes and Cooperating processes
 
operating system question bank
operating system question bankoperating system question bank
operating system question bank
 
IO and file systems
IO and file systems IO and file systems
IO and file systems
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architecture
 
Chapter 8 : Memory
Chapter 8 : MemoryChapter 8 : Memory
Chapter 8 : Memory
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
 
Underlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computingUnderlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computing
 
Process of operating system
Process of operating systemProcess of operating system
Process of operating system
 
Process scheduling
Process schedulingProcess scheduling
Process scheduling
 
EMBEDDED OS
EMBEDDED OSEMBEDDED OS
EMBEDDED OS
 
Process management in os
Process management in osProcess management in os
Process management in os
 
process creation OS
process creation OSprocess creation OS
process creation OS
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
 
scheduling.pptx
scheduling.pptxscheduling.pptx
scheduling.pptx
 
Cluster and Grid Computing
Cluster and Grid ComputingCluster and Grid Computing
Cluster and Grid Computing
 

Similar to Real time database

Transaction Management, Concurrency Control and Deadlocks.pdf
Transaction Management, Concurrency Control and Deadlocks.pdfTransaction Management, Concurrency Control and Deadlocks.pdf
Transaction Management, Concurrency Control and Deadlocks.pdf
beshahashenafe20
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
Subhasish Pati
 
Data warehouse
Data warehouseData warehouse
Data warehouse
sudhir Pawar
 
Rt databases vs general purpose tsp
Rt databases vs general purpose  tspRt databases vs general purpose  tsp
Rt databases vs general purpose tsp
Pradeep Kumar TS
 
Unit 4 chapter - 8 Transaction processing Concepts (1).pptx
Unit 4 chapter - 8 Transaction processing Concepts (1).pptxUnit 4 chapter - 8 Transaction processing Concepts (1).pptx
Unit 4 chapter - 8 Transaction processing Concepts (1).pptx
Koteswari Kasireddy
 
Concurrency Control in Distributed Systems.pptx
Concurrency Control in Distributed Systems.pptxConcurrency Control in Distributed Systems.pptx
Concurrency Control in Distributed Systems.pptx
MArshad35
 
Dbms voc 5 unit
Dbms voc 5 unitDbms voc 5 unit
Dbms voc 5 unit
gurjotkawatra
 
Tps
TpsTps
Transaction conccurency
Transaction conccurencyTransaction conccurency
Transaction conccurency
Esraa Farrag
 
Tps presentation
Tps presentationTps presentation
Tps presentation
kushal arora
 
Transaction Processing Concept
Transaction Processing ConceptTransaction Processing Concept
Transaction Processing Concept
Nishant Munjal
 
Distributed Database Design and Relational Query Language
Distributed Database Design and Relational Query LanguageDistributed Database Design and Relational Query Language
Distributed Database Design and Relational Query Language
AAKANKSHA JAIN
 
Concurrency Control
Concurrency ControlConcurrency Control
Concurrency Control
Nishant Munjal
 
Dbms
DbmsDbms
data warehousing need and characteristics. types of data w data warehouse arc...
data warehousing need and characteristics. types of data w data warehouse arc...data warehousing need and characteristics. types of data w data warehouse arc...
data warehousing need and characteristics. types of data w data warehouse arc...
aasifkuchey85
 
Transaction ps
Transaction psTransaction ps
Transaction ps
MR Z
 
E-Business Information System BBA AVI.pptx
E-Business Information System BBA AVI.pptxE-Business Information System BBA AVI.pptx
E-Business Information System BBA AVI.pptx
thejaswini40
 
Presentation on Transaction
Presentation on TransactionPresentation on Transaction
Presentation on Transaction
Rahul Prajapati
 
Anatomy behind Fast Data Applications.pptx
Anatomy behind Fast Data Applications.pptxAnatomy behind Fast Data Applications.pptx
Anatomy behind Fast Data Applications.pptx
dusavamsikrisna
 
UNIT II.pptx
UNIT II.pptxUNIT II.pptx
UNIT II.pptx
ssuserec53e73
 

Similar to Real time database (20)

Transaction Management, Concurrency Control and Deadlocks.pdf
Transaction Management, Concurrency Control and Deadlocks.pdfTransaction Management, Concurrency Control and Deadlocks.pdf
Transaction Management, Concurrency Control and Deadlocks.pdf
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Rt databases vs general purpose tsp
Rt databases vs general purpose  tspRt databases vs general purpose  tsp
Rt databases vs general purpose tsp
 
Unit 4 chapter - 8 Transaction processing Concepts (1).pptx
Unit 4 chapter - 8 Transaction processing Concepts (1).pptxUnit 4 chapter - 8 Transaction processing Concepts (1).pptx
Unit 4 chapter - 8 Transaction processing Concepts (1).pptx
 
Concurrency Control in Distributed Systems.pptx
Concurrency Control in Distributed Systems.pptxConcurrency Control in Distributed Systems.pptx
Concurrency Control in Distributed Systems.pptx
 
Dbms voc 5 unit
Dbms voc 5 unitDbms voc 5 unit
Dbms voc 5 unit
 
Tps
TpsTps
Tps
 
Transaction conccurency
Transaction conccurencyTransaction conccurency
Transaction conccurency
 
Tps presentation
Tps presentationTps presentation
Tps presentation
 
Transaction Processing Concept
Transaction Processing ConceptTransaction Processing Concept
Transaction Processing Concept
 
Distributed Database Design and Relational Query Language
Distributed Database Design and Relational Query LanguageDistributed Database Design and Relational Query Language
Distributed Database Design and Relational Query Language
 
Concurrency Control
Concurrency ControlConcurrency Control
Concurrency Control
 
Dbms
DbmsDbms
Dbms
 
data warehousing need and characteristics. types of data w data warehouse arc...
data warehousing need and characteristics. types of data w data warehouse arc...data warehousing need and characteristics. types of data w data warehouse arc...
data warehousing need and characteristics. types of data w data warehouse arc...
 
Transaction ps
Transaction psTransaction ps
Transaction ps
 
E-Business Information System BBA AVI.pptx
E-Business Information System BBA AVI.pptxE-Business Information System BBA AVI.pptx
E-Business Information System BBA AVI.pptx
 
Presentation on Transaction
Presentation on TransactionPresentation on Transaction
Presentation on Transaction
 
Anatomy behind Fast Data Applications.pptx
Anatomy behind Fast Data Applications.pptxAnatomy behind Fast Data Applications.pptx
Anatomy behind Fast Data Applications.pptx
 
UNIT II.pptx
UNIT II.pptxUNIT II.pptx
UNIT II.pptx
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Real time database

  • 2. A real-time database system is a database system in which a timely response to a user request is needed
  • 3. Types of Real-Time Database Systems • Hard real-time database systems, e.g. early warning system • Soft real-time database systems, e.g., banking system, airline reservation system, digital library, stock market etc.
  • 4. TRANSACTION • It is said to be set of read or write operations. QUERY • A transaction is said to be a query if it contains either a read or update operation. • Commit is a point of no return, once a transaction is commited we are certain that, the changes to the database are permanent.
  • 6. ACID PROPERTIES A- ATOMICITY C- CONSISTENCY I-ISOLATION D- DURABILITY
  • 7. ACID PROPERTIES ATOMICITY Atomicity requires that each transaction is "all or nothing": if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged. CONSISTENCY The consistency property ensures that any transaction will bring the database from one valid state to another. Any data written to the database must be valid according to all defined rules.
  • 8. ISOLATION Until and unless a transaction is commited, the actions of it are not visible to any other transactions DURABILITY Durability means that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or any errors.
  • 9. QUERIES IN REALTIME DATA BASE SYSTEM • The queries associated with a RTDBS are associated with a deadline, there may be some response after the queries passed the deadlines. •The data returned in response to a query must have absolute and relative consistency ABSOLUTE CONSISTENCY It is accuracy. The data returned in response to a query must be close to the result expected. Ex. If temperature or pressure is interrogated in a chemical vessel the data returned to be close to the current temperature or pressure. RELATIVE CONSISTENCY In case of multiple data is to be collected, it must be close to each other.
  • 10. MEMORY FOR RTDBS MAIN MEMORY •The entire database is residing on the main memory is the concept behind main memory databases •Main memory databases are faster than disk based databases. Since accessing data in memory reduces the I/ O reading activity when querying the data which provides faster and more predictable performance than disk
  • 11. Many MMDBs add durability via the following mechanisms •Snapshot files or checkpoint images which record the state of the database at a given moment in time. •Transaction logging, which records changes to the database in a file and facilitates easy recovery •Non-volatile random access memory (NVRAM), usually in the form of static RAM backed up with battery power or an electrically erasable programmable ROM (EEPROM). With this storage, the MMDB system can recover the data stored from its last consistent state upon reboot. •A clone database is created, which can be used when the primary database crashes.
  • 12.
  • 14. DEAD LOCK CONDITION IN DATABASE •There may be situations when two or more transactions are put into wait state simultaneously . •In this position each would be waiting for the other transaction to get released. •EXAMPLE Suppose we have two transactions 1 and 2 both executing simultaneously. The transaction 1 is to update student table and then update course table. The transaction 2 is to update course table and then student table. •When a table is updated by a transaction it is locked for preventing access from other transaction. •In the example both transaction 1 and 2 lock student and course table respectively, so both are locked. •The two transactions should be executed simultaneously, so each one waits for other and causing a deadlock.
  • 15. DEAD LOCK REMOVAL IN RTDBS •If a deadlock cycle is detected, one of the transactions involved in the cycle must be aborted in order to break the cycle. •In a RTDB system, the victim transaction should be chosen such that the largest number of remaining transactions can meet their deadline •Five deadlock resolution policies that take into account the timing properties of the transactions and the cost of abort operations have been given. They are Always aborts the transaction invoking deadlock detection. Trace the deadlock cycle, and abort the transaction with the furthest deadline. Trace the deadlock cycle, abort the transaction with the earliest deadline.
  • 16. Trace the deadlock cycle, and abort the transaction with the least criticalness. Abort the infeasible transaction with the least criticalness. If all transactions are feasible, then abort a feasible transaction with the least criticalness.
  • 17. T TREE INDEXING •A T-tree is a balanced index tree data structure optimized for cases where both the index and the actual data are fully kept in memory •The actual data is always in main memory together with the index so that they just contain pointers to the actual data fields. •A T-tree node usually consists of pointers to the parent node, the left and right child node, an ordered array of data pointers and some extra control data
  • 19. SEARCH •Search starts at the root node •If the current node is the bounding node for the search value then search its data array. Search fails if the value is not found in the data array •If the search value is less than the minimum value of the current node then continue search in its left subtree. Search fails if there is no left sub tree •If the search value is greater than the maximum value of the current node then continue search in its right subtree. Search failes if there is no right sub tree
  • 20. ALGORTHIM USED IN REAL TIME DATABASE . •Most of the transactions in the real time DB are associated with a deadline, hence Earliest Deadline First (EDF) algorithm finds a greater solution to schedule those transactions. But EDF algorithm will be working efficiently if the number of transactions are moderate. But usually the DB transactions are huge in a systems and EDF may not be suitable which leads to congestion. •To manage with huge transactions an algorithm called Adaptive Earliest Deadline (AED) is implemented. It uses the congestion control and can process huge number of transactions. It uses two groups HIT and MISS group. Each transaction associated with deadline are put in HIT group Transaction not having deadline are put in MISS group First the HIT group transaction will be executed and then the MISS group transaction will be executed
  • 21. Ex In a flight cockpit the cabin temperature, pressure, humidity should be monitored continuously In a flight other things such as entrainment system, air-conditioning system are also to be monitored But they are not much important as cockpit status. So the earlier one is put in HIT group and the latter one is put in MISS group
  • 22. WEBSITE Pradeepkumar.org
  • 23. THANK U