美文网首页
Database Isolation

Database Isolation

作者: KevinWu12 | 来源:发表于2018-06-13 19:16 被阅读0次

Isolation is the database-level property that controls how and when changes are made and if they become visible to each other. One of the goals of isolation is to allow multiple transactions occurring at the same time without impacting each other’s execution.


Capture.PNG
  • Lost update: a transaction write is ignored by another transaction. write->write

  • Dirty read: a transaction reads an object written by another transaction which again modifies the object afterwards. write->read

  • Non repeatable read: a transaction reads an object twice and gets different values. read->write

Mode of Lock

Capture.PNG

Dependency relation

  • In a history sequence H, consisting of tuples of the form
    (T, action, object).
    If T1 and T2 are transactions, O is an object, and there exists
    indexes i and j such that i < j, H[i] involves action a1 on O by
    T1, (i.e. H[i] = (T1,a1,O)) H[j] involves action a2 on O by
    T2 (i.e. H(j) = (T2, a2,O)) and there are no
    H(k) = (T’,WRITE,O) for i < k < j, the
    dependency of T1 on T2 can be written as:
    (T1, O, T2)
  • A history is said to be isolated if it is equal to a serial history.
    A serial history is history that is resulted as a consequence of
    running transactions sequentially one at a time. N transactions
    can result in a maximum of N! serial histories.
    Capture1.PNG
    Wormhole theorem: A history is isolated if and only if it has no
    wormholes.

Isolation Concept:

  • A transactions is a sequence of READ, WRITE, SLOCK, XLOCK actions on objects ending with COMMIT or ROLLBACK.
  • A transaction is well formed if each READ, WRITE and UNLOCK operation is covered earlier by a corresponding lock operation.
  • A history is legal if does not grant conflicting grants.
  • A transaction is two phase if its all lock operations precede its unlock operations
  • Locking theorem: If all transactions are well formed (READ, WRITE and UNLOCK operation is covered earlier by a corresponding lock operation) and two-phased, then any legal (does not grant conflicting grants) history will be isolated.
  • Locking theorem (Converse): If a transaction is not well formed or is not two-phase, then it is possible to write another transaction such that it is a wormhole.
  • Rollback theorem: An update transaction that does an UNLOCK and then does a ROLLBACK is not two phase.

Degree of Isolation



image.png

Granularity of Locking

  • Why

  1. Problem:
    C1 queries DB for all suspects with blue eyes red hair and C2 inserts new suspect with blue eyes & red hair, C1 may lock all appropriate suspects, but this won't prevent C2 from inserting new suspect, violating consistency
  2. Phantoms and predicate locks
phantom lock

sometimes called an anti-insert lock, is placed on a scan position to prevent the subsequent creation of phantom rows by other transactions. When a phantom lock is acquired, it prevents other transactions from inserting a row into a table immediately before the row that is anti-insert locked. A phantom lock is a long-term lock, that is held until the end of the transaction.

Predicate lock

Predicate locking is a method of locking based upon logical conditions as a solution to so-called phantom rows, such that if a transaction has issued SELECT ... WHERE age > 18, no other transaction would be able to add new rows where age greater than 18, delete rows where age greater than 18, or update an existing row so that it would conflict with the initial transaction.

  • It is NP complete
  • Hard to capture predicates
  1. Solution

Granular Lock:

Build hierarchy and locks can be taken at any level will automatically grant the locks on its descendants




Update lock mode

  • The situation here could cause deadlock, as after anyone of the T1, T2, T3 acquire share lock, no one could require the exclusive lock.


  • Solution 1


  • Solution 2


    Capture.PNG

Optimistic Locking

  • Allows you to lower the isolation level that you use in an application so that fewer locks are placed on the database
  • It is effective two phase locking with short-duration of locking.
  • It allows more applications to run concurrently against the database, and potentially increase the throughput of your applications.


Snapshot Isolation

相关文章

  • Database Isolation

    Isolation is the database-level property that controls ho...

  • Database Isolation Level

    参考文档:https://www.cnblogs.com/huanongying/p/7021555.html几个...

  • Spring:事务处理isolation参数

    @Transactional(isolation=xx) 1.Isolation.READ_UNCOMMITTED...

  • 事务隔离级别

    事务隔离级别: @Transactional(isolation = Isolation.READ_UNCOMMI...

  • isolation

    雨不是雨 尘埃在上升 幸好叶子不会说话 石头很凉 空气明明很清晰 为什么我嗅不到? 在白天盼望夜晚 在夜晚挽留夜晚...

  • Isolation

    我想,我大抵是一个不太负责的人 没有后路的辞职,迷茫的度日,心里有整片天空的梦想,但是连一滴水那么大的路都无处可走...

  • MySQL8.0 查询默认事务隔离级别

    MySQL8.0 已删除原来的 tx_isolation ,改用 transaction_isolation 查...

  • 2021-12-01

    Aloneness is obviously not isolation, and it is not uniqu...

  • MySql8设置事务隔离级别

    MySQL8查询tx_isolation为空的问题解决 只要把tx_isolation换成transaction_...

  • Isolation Memo

    是的,所有的痛苦来源于比较,这种比较让我痛苦的原因是因为美好的光让我看见了自己的暗影。

网友评论

      本文标题:Database Isolation

      本文链接:https://www.haomeiwen.com/subject/skgdeftx.html