Transaction
Transaction refers to a set of operations that meet ACID characteristics. You can submit a transaction through Commit. You can also use Rollback to roll back.
ACID
1. Atomicity
Transactions are considered indivisible The smallest unit of the transaction, all operations of the transaction are either submitted successfully, or all operations fail and are rolled back. Rollback can be implemented using rollback logs. The rollback log records the modification operations performed by the transaction. These modification operations can be performed in reverse during rollback.
2. Consistency
Consistency means that a transaction must transform the database from one consistency state to another consistency state, that is to say a A transaction must be in a consistent state both before and after it is executed.
Take transfers as an example, assuming that the total money of user A and user B is 5,000, then no matter how the transfer is between A and B, or how many times the transfer is completed, the money of the two users will be the same after the transaction is completed. The total should add up to 5000, which is the consistency of the transaction.
3. Isolation
Isolation is when multiple users access the database concurrently, such as when operating the same table, the database is opened for each user The transaction cannot be interfered by the operations of other transactions, and multiple concurrent transactions must be isolated from each other.
To achieve such an effect: for any two concurrent transactions T1 and T2, from the perspective of transaction T1, T2 either ends before T1 starts, or starts after T1 ends, so Each transaction is unaware that other transactions are executing concurrently.
4. Durability
Durability means that once a transaction is submitted, the changes to the data in the database are permanent, even if The operation of committing transactions will not be lost even if the database system encounters a failure.
Concurrency consistency issues
1. Dirty read
Dirty read refers to a Data from another uncommitted transaction was read during transaction processing.
T1 modifies a data, and T2 then reads this data. If T1 undoes this modification, then the data read by T2 is dirty data.
2. Non-repeatable read
Non-repeatable read refers to a certain data in the database within the scope of a transaction Multiple queries returned different data values. This is because it was modified and committed by another transaction between queries.
For example, transaction T1 is reading certain data, and transaction T2 immediately modifies the data and submits the transaction to the database. When transaction T1 reads the data again, it gets a different result and sends a non-repeatable read.
The difference between non-repeatable read and dirty read is that dirty read is when a transaction reads the uncommitted dirty data of another transaction, while non-repeatable read is when the data submitted by the previous transaction is read.
3. Phantom reading
Phantom reading is a phenomenon that occurs when transactions are not executed independently. For example, transaction T1 modifies a data item in all rows in a table from "1" to "2". At this time, transaction T2 inserts a row of data items into the table, and the value of this data item Still "1" and submitted to the database. If the user who operates transaction T1 looks at the data that was just modified, he will find that there is still one row that has not been modified. In fact, this row was added from transaction T2. It is like an hallucination. This is a phantom read.
Phantom reading and non-repeatable reading both read another committed transaction (this is different from dirty reading). The difference is that non-repeatable reading queries the same data item, while phantom reading queries Reading targets a batch of data as a whole (such as the number of data).
T1 reads data in a certain range, T2 inserts new data in this range, and T1 reads data in this range again. The result read at this time is different from the result read the first time. .
MySQL isolation level
##1. Serializable: Force transactions to be executed serially.
It can avoid the occurrence of dirty reads, non-repeatable reads and phantom reads.2. Repeatable read: Ensure that the result of reading the same data multiple times in the same transaction is the same
Avoid dirty reads, A non-repeatable read occurs.3. Read committed: A transaction can only read the modifications made by the committed transaction
This can avoid the occurrence of dirty reads.4. Read uncommitted: Modifications in a transaction are visible to other transactions even if they are not committed
The lowest level, no guarantee in any situation.
The highest isolation level is the Serializable level, and the lowest is the Read uncommitted level. The higher the level, the lower the execution efficiency.
A level like Serializable uses a lock table (similar to the lock in Java multi-threading) so that other threads can only wait outside the lock, so the isolation level you usually choose should be based on the actual situation. .
The default isolation level in the MySQL database is Repeatable read (repeatable read).
In Oracle database, only two levels are supported: Serializable (serialization) level and Read committed (read committed). The default is Read committed level.
Recommended learning: MySQL tutorial
The above is the detailed content of A brief discussion on database transactions and isolation levels. For more information, please follow other related articles on the PHP Chinese website!

本篇文章给大家带来了关于mysql的相关知识,其中主要介绍了关于索引优化器工作原理的相关内容,其中包括了MySQL Server的组成,MySQL优化器选择索引额原理以及SQL成本分析,最后通过 select 查询总结整个查询过程,下面一起来看一下,希望对大家有帮助。

sybase是基于客户/服务器体系结构的数据库,是一个开放的、高性能的、可编程的数据库,可使用事件驱动的触发器、多线索化等来提高性能。

visual foxpro数据库文件是管理数据库对象的系统文件。在VFP中,用户数据是存放在“.DBF”表文件中;VFP的数据库文件(“.DBC”)中不存放用户数据,它只起将属于某一数据库的 数据库表与视图、连接、存储过程等关联起来的作用。

数据库系统由4个部分构成:1、数据库,是指长期存储在计算机内的,有组织,可共享的数据的集合;2、硬件,是指构成计算机系统的各种物理设备,包括存储所需的外部设备;3、软件,包括操作系统、数据库管理系统及应用程序;4、人员,包括系统分析员和数据库设计人员、应用程序员(负责编写使用数据库的应用程序)、最终用户(利用接口或查询语言访问数据库)、数据库管理员(负责数据库的总体信息控制)。

microsoft sql server是Microsoft公司推出的关系型数据库管理系统,是一个全面的数据库平台,使用集成的商业智能(BI)工具提供了企业级的数据管理,具有使用方便可伸缩性好与相关软件集成程度高等优点。SQL Server数据库引擎为关系型数据和结构化数据提供了更安全可靠的存储功能,使用户可以构建和管理用于业务的高可用和高性能的数据应用程序。

go语言可以写数据库。Go语言和其他语言不同的地方是,Go官方没有提供数据库驱动,而是编写了开发数据库驱动的标准接口,开发者可以根据定义的接口来开发相应的数据库驱动;这样做的好处在于,只要是按照标准接口开发的代码,以后迁移数据库时,不需要做任何修改,极大方便了后期的架构调整。

数据库的“完整性”是指数据的正确性和相容性。完整性是指数据库中数据在逻辑上的一致性、正确性、有效性和相容性。完整性对于数据库系统的重要性:1、数据库完整性约束能够防止合法用户使用数据库时向数据库中添加不合语义的数据;2、合理的数据库完整性设计,能够同时兼顾数据库的完整性和系统的效能;3、完善的数据库完整性有助于尽早发现应用软件的错误。

mysql查询为什么会慢,关于这个问题,在实际开发经常会遇到,而面试中,也是个高频题。遇到这种问题,我们一般也会想到是因为索引。那除开索引之外,还有哪些因素会导致数据库查询变慢呢?


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version
Useful JavaScript development tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
