search
HomeDatabaseMysql TutorialA brief discussion on database transactions and isolation levels

A brief discussion on database transactions and isolation levels

Transaction

Transaction refers to a set of operations that meet ACID characteristics. You can submit a transaction through Commit. You can also use Rollback to roll back.

ACID

1. Atomicity

Transactions are considered indivisible The smallest unit of the transaction, all operations of the transaction are either submitted successfully, or all operations fail and are rolled back. Rollback can be implemented using rollback logs. The rollback log records the modification operations performed by the transaction. These modification operations can be performed in reverse during rollback.

2. Consistency

Consistency means that a transaction must transform the database from one consistency state to another consistency state, that is to say a A transaction must be in a consistent state both before and after it is executed.

Take transfers as an example, assuming that the total money of user A and user B is 5,000, then no matter how the transfer is between A and B, or how many times the transfer is completed, the money of the two users will be the same after the transaction is completed. The total should add up to 5000, which is the consistency of the transaction.

3. Isolation

Isolation is when multiple users access the database concurrently, such as when operating the same table, the database is opened for each user The transaction cannot be interfered by the operations of other transactions, and multiple concurrent transactions must be isolated from each other.

To achieve such an effect: for any two concurrent transactions T1 and T2, from the perspective of transaction T1, T2 either ends before T1 starts, or starts after T1 ends, so Each transaction is unaware that other transactions are executing concurrently.

4. Durability

Durability means that once a transaction is submitted, the changes to the data in the database are permanent, even if The operation of committing transactions will not be lost even if the database system encounters a failure.

Concurrency consistency issues

1. Dirty read

Dirty read refers to a Data from another uncommitted transaction was read during transaction processing.

T1 modifies a data, and T2 then reads this data. If T1 undoes this modification, then the data read by T2 is dirty data.

A brief discussion on database transactions and isolation levels

2. Non-repeatable read

Non-repeatable read refers to a certain data in the database within the scope of a transaction Multiple queries returned different data values. This is because it was modified and committed by another transaction between queries.

For example, transaction T1 is reading certain data, and transaction T2 immediately modifies the data and submits the transaction to the database. When transaction T1 reads the data again, it gets a different result and sends a non-repeatable read.

The difference between non-repeatable read and dirty read is that dirty read is when a transaction reads the uncommitted dirty data of another transaction, while non-repeatable read is when the data submitted by the previous transaction is read.

A brief discussion on database transactions and isolation levels

3. Phantom reading

Phantom reading is a phenomenon that occurs when transactions are not executed independently. For example, transaction T1 modifies a data item in all rows in a table from "1" to "2". At this time, transaction T2 inserts a row of data items into the table, and the value of this data item Still "1" and submitted to the database. If the user who operates transaction T1 looks at the data that was just modified, he will find that there is still one row that has not been modified. In fact, this row was added from transaction T2. ​​It is like an hallucination. This is a phantom read.

Phantom reading and non-repeatable reading both read another committed transaction (this is different from dirty reading). The difference is that non-repeatable reading queries the same data item, while phantom reading queries Reading targets a batch of data as a whole (such as the number of data).

T1 reads data in a certain range, T2 inserts new data in this range, and T1 reads data in this range again. The result read at this time is different from the result read the first time. .

A brief discussion on database transactions and isolation levels

MySQL isolation level

##1. Serializable: Force transactions to be executed serially.

It can avoid the occurrence of dirty reads, non-repeatable reads and phantom reads.

2. Repeatable read: Ensure that the result of reading the same data multiple times in the same transaction is the same

Avoid dirty reads, A non-repeatable read occurs.

3. Read committed: A transaction can only read the modifications made by the committed transaction

This can avoid the occurrence of dirty reads.

4. Read uncommitted: Modifications in a transaction are visible to other transactions even if they are not committed

The lowest level, no guarantee in any situation.

The highest isolation level is the Serializable level, and the lowest is the Read uncommitted level. The higher the level, the lower the execution efficiency.

A level like Serializable uses a lock table (similar to the lock in Java multi-threading) so that other threads can only wait outside the lock, so the isolation level you usually choose should be based on the actual situation. .

The default isolation level in the MySQL database is Repeatable read (repeatable read).

In Oracle database, only two levels are supported: Serializable (serialization) level and Read committed (read committed). The default is Read committed level.

Recommended learning: MySQL tutorial

The above is the detailed content of A brief discussion on database transactions and isolation levels. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:csdn. If there is any infringement, please contact admin@php.cn delete
深入理解MySQL索引优化器工作原理深入理解MySQL索引优化器工作原理Nov 09, 2022 pm 02:05 PM

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了关于索引优化器工作原理的相关内容,其中包括了MySQL Server的组成,MySQL优化器选择索引额原理以及SQL成本分析,最后通过 select 查询总结整个查询过程,下面一起来看一下,希望对大家有帮助。

sybase是什么数据库sybase是什么数据库Sep 22, 2021 am 11:39 AM

sybase是基于客户/服务器体系结构的数据库,是一个开放的、高性能的、可编程的数据库,可使用事件驱动的触发器、多线索化等来提高性能。

visual foxpro数据库文件是什么visual foxpro数据库文件是什么Jul 23, 2021 pm 04:53 PM

visual foxpro数据库文件是管理数据库对象的系统文件。在VFP中,用户数据是存放在“.DBF”表文件中;VFP的数据库文件(“.DBC”)中不存放用户数据,它只起将属于某一数据库的 数据库表与视图、连接、存储过程等关联起来的作用。

数据库系统的构成包括哪些数据库系统的构成包括哪些Jul 15, 2022 am 11:58 AM

数据库系统由4个部分构成:1、数据库,是指长期存储在计算机内的,有组织,可共享的数据的集合;2、硬件,是指构成计算机系统的各种物理设备,包括存储所需的外部设备;3、软件,包括操作系统、数据库管理系统及应用程序;4、人员,包括系统分析员和数据库设计人员、应用程序员(负责编写使用数据库的应用程序)、最终用户(利用接口或查询语言访问数据库)、数据库管理员(负责数据库的总体信息控制)。

microsoft sql server是什么软件microsoft sql server是什么软件Feb 28, 2023 pm 03:00 PM

microsoft sql server是Microsoft公司推出的关系型数据库管理系统,是一个全面的数据库平台,使用集成的商业智能(BI)工具提供了企业级的数据管理,具有使用方便可伸缩性好与相关软件集成程度高等优点。SQL Server数据库引擎为关系型数据和结构化数据提供了更安全可靠的存储功能,使用户可以构建和管理用于业务的高可用和高性能的数据应用程序。

go语言可以写数据库么go语言可以写数据库么Jan 06, 2023 am 10:35 AM

go语言可以写数据库。Go语言和其他语言不同的地方是,Go官方没有提供数据库驱动,而是编写了开发数据库驱动的标准接口,开发者可以根据定义的接口来开发相应的数据库驱动;这样做的好处在于,只要是按照标准接口开发的代码,以后迁移数据库时,不需要做任何修改,极大方便了后期的架构调整。

数据库的什么是指数据的正确性和相容性数据库的什么是指数据的正确性和相容性Jul 04, 2022 pm 04:59 PM

数据库的“完整性”是指数据的正确性和相容性。完整性是指数据库中数据在逻辑上的一致性、正确性、有效性和相容性。完整性对于数据库系统的重要性:1、数据库完整性约束能够防止合法用户使用数据库时向数据库中添加不合语义的数据;2、合理的数据库完整性设计,能够同时兼顾数据库的完整性和系统的效能;3、完善的数据库完整性有助于尽早发现应用软件的错误。

mysql查询慢的因素除了索引,还有什么?mysql查询慢的因素除了索引,还有什么?Jul 19, 2022 pm 08:22 PM

mysql查询为什么会慢,关于这个问题,在实际开发经常会遇到,而面试中,也是个高频题。遇到这种问题,我们一般也会想到是因为索引。那除开索引之外,还有哪些因素会导致数据库查询变慢呢?

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software