Next:
2.15.2.1 Conflict rules
Up:
2.15 Concurrency Control and
Previous:
2.15.1 Why concurrency control?
2.15.2 Locking
As in operating systems, locks control access for different clients
Granularity of data locked should be small so as to maximise concurrency, with trade-off against complexity.
To prevent intermediate leakage, once lock is obtained, it must be held till transaction commits or aborts
Subsections
2.15.2.1 Conflict rules
2.15.2.2 Rules for strict two phase locking
2.15.2.3 Locking Implementation
2.15.2.4 Example
2.15.2.5 Deadlocks
2.15.2.6 Drawbacks of Locking
Next:
2.15.2.1 Conflict rules
Up:
2.15 Concurrency Control and
Previous:
2.15.1 Why concurrency control?
Ian Wakeman 2005-02-22