Home Database Mysql Tutorial 数据库事务四个特性

数据库事务四个特性

Jun 07, 2016 pm 05:39 PM
affairs database characteristic

数据库事务四个特性 数据库事务需要满足四个特性,ACID,即原子性(Atomic),一致性(Consistency),隔离性(Isolation),持久性(Durability)。 在关系数据库中,这些特性需要借助借助redo log、锁、snapshot等手段来实现。 隔离性要求各事务之间相互独立,所进

数据库事务四个特性

 

数据库事务需要满足四个特性,ACID,即原子性(Atomic),一致性(Consistency),隔离性(Isolation),,持久性(Durability)。

在关系数据库中,这些特性需要借助借助redo log、锁、snapshot等手段来实现。

隔离性要求各事务之间相互独立,所进行的操作不会相互影响,其用意还是保证各数据读写操作的一致性

标准SQL92规范定义了四种隔离级别,以及相应要禁止的三种现象(Phenomena)。

隔离级别越高,数据一致性的保证越强,但同时数据库的并发能力也越差。  数据库并发操作引起的问题(现象 ) 有:

1. 脏读(Dirty read)。

事务A读取了事务B中尚未提交的数据。如果事务B回滚,则A读取使用了错误的数据。

2. 不可重复度(Unrepeatable read)。

在事务A多次的读取过程中,事务 B对数据进行了修改,导致事务A多次读取的数据不一致。

3. 幻读(Phantom read)。

在事务A多次读取构成中,事务B对数据进行了新增操作,导致事务A多次读取的数据不一致。幻读和不可重复读的区别在于,

不可重复是针对记录的update操作,只要在记录上加写锁,就可避免;幻读是对记录的insert操作,

要禁止幻读必须加上全局的写锁(比如在表上加写锁)。 另外说一下两类丢失更新:

4. 第一类丢失更新(回滚丢失,Lost update)。

在事务A期间,事务 B对数据进行了更新;在事务A撤销之后,覆盖了事务B已经提交的数据。SQL92没有定义这种现象,标准定义的所有隔离界别都不允许第一类丢失更新发生。

5. 第二类丢失更新(覆盖丢失, Second lost update)。

在事务A期间,事务B对数据进行了更新;在事务A提交之后,覆盖了事务B已经提交的数据。第二类丢失更新,实际上和不可重复读是同一种问题。

SQL92定义的四种隔离级别:

1. 未提交读(Read uncommitted)。

写操作加写锁,读操作不加锁。禁止第一类丢失更新,但是会出现所有其他数据并发问题

2.提交读(Read committed)。

写操作加写锁,读操作加读锁。禁止第一类丢失更新和脏读。这是大部分关系数据库的默认 隔离级别。

3.可重复读(Read repeatable)。

对于读操作加读锁到事务结束,其他事务的更新操作只能等到事务结束之后进行。和提交 读的区别在于,

提交读的读操作是加读锁到本次读操作结束,可重复读的锁粒度更大。禁止两类丢失更新,禁止脏读和不可 重复度,但是可能出现幻读.

4.序列化(Serializable)。

读操作加表级读锁至事务结束。可以禁止幻读。

 

                                第一类丢失更新   不可重复读     脏读    第二类丢失更新     幻读

Read uncommitted         禁止               不禁止      不禁止      不禁止         不禁止 

Read committed        禁止                禁止       不禁止      不禁止         不禁止

Read repeatable        禁止                禁止       禁止        禁止           不禁止 

Serializable        禁止                禁止       禁止       禁止             禁止

大多数关系数据库默认使用Read committed的隔离级别,Mysql InnoDB默认使用Read repeatable的隔离级别,

这和Mysql replication 机制使用Statement日志格式有关。各数据库隔离级别的实现也是有差别的,

例如Oracle支持Read committed 和Serializable两种隔离级别,

另外可以通过使用读快照在Read committed级别上禁止不可重复读问题;

Mysql InnoDB在Read repeatable级别上使用next-key locking 策略来避免幻读现象的产生。

 posted on

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How does Go language implement the addition, deletion, modification and query operations of the database? How does Go language implement the addition, deletion, modification and query operations of the database? Mar 27, 2024 pm 09:39 PM

Go language is an efficient, concise and easy-to-learn programming language. It is favored by developers because of its advantages in concurrent programming and network programming. In actual development, database operations are an indispensable part. This article will introduce how to use Go language to implement database addition, deletion, modification and query operations. In Go language, we usually use third-party libraries to operate databases, such as commonly used sql packages, gorm, etc. Here we take the sql package as an example to introduce how to implement the addition, deletion, modification and query operations of the database. Assume we are using a MySQL database.

How does Hibernate implement polymorphic mapping? How does Hibernate implement polymorphic mapping? Apr 17, 2024 pm 12:09 PM

Hibernate polymorphic mapping can map inherited classes to the database and provides the following mapping types: joined-subclass: Create a separate table for the subclass, including all columns of the parent class. table-per-class: Create a separate table for subclasses, containing only subclass-specific columns. union-subclass: similar to joined-subclass, but the parent class table unions all subclass columns.

iOS 18 adds a new 'Recovered' album function to retrieve lost or damaged photos iOS 18 adds a new 'Recovered' album function to retrieve lost or damaged photos Jul 18, 2024 am 05:48 AM

Apple's latest releases of iOS18, iPadOS18 and macOS Sequoia systems have added an important feature to the Photos application, designed to help users easily recover photos and videos lost or damaged due to various reasons. The new feature introduces an album called "Recovered" in the Tools section of the Photos app that will automatically appear when a user has pictures or videos on their device that are not part of their photo library. The emergence of the "Recovered" album provides a solution for photos and videos lost due to database corruption, the camera application not saving to the photo library correctly, or a third-party application managing the photo library. Users only need a few simple steps

Detailed tutorial on establishing a database connection using MySQLi in PHP Detailed tutorial on establishing a database connection using MySQLi in PHP Jun 04, 2024 pm 01:42 PM

How to use MySQLi to establish a database connection in PHP: Include MySQLi extension (require_once) Create connection function (functionconnect_to_db) Call connection function ($conn=connect_to_db()) Execute query ($result=$conn->query()) Close connection ( $conn->close())

An in-depth analysis of how HTML reads the database An in-depth analysis of how HTML reads the database Apr 09, 2024 pm 12:36 PM

HTML cannot read the database directly, but it can be achieved through JavaScript and AJAX. The steps include establishing a database connection, sending a query, processing the response, and updating the page. This article provides a practical example of using JavaScript, AJAX and PHP to read data from a MySQL database, showing how to dynamically display query results in an HTML page. This example uses XMLHttpRequest to establish a database connection, send a query and process the response, thereby filling data into page elements and realizing the function of HTML reading the database.

How to handle database connection errors in PHP How to handle database connection errors in PHP Jun 05, 2024 pm 02:16 PM

To handle database connection errors in PHP, you can use the following steps: Use mysqli_connect_errno() to obtain the error code. Use mysqli_connect_error() to get the error message. By capturing and logging these error messages, database connection issues can be easily identified and resolved, ensuring the smooth running of your application.

Analysis of the basic principles of MySQL database management system Analysis of the basic principles of MySQL database management system Mar 25, 2024 pm 12:42 PM

Analysis of the basic principles of the MySQL database management system MySQL is a commonly used relational database management system that uses structured query language (SQL) for data storage and management. This article will introduce the basic principles of the MySQL database management system, including database creation, data table design, data addition, deletion, modification, and other operations, and provide specific code examples. 1. Database Creation In MySQL, you first need to create a database instance to store data. The following code can create a file named "my

How does Java database connection handle transactions and concurrency? How does Java database connection handle transactions and concurrency? Apr 16, 2024 am 11:42 AM

Transactions ensure database data integrity, including atomicity, consistency, isolation, and durability. JDBC uses the Connection interface to provide transaction control (setAutoCommit, commit, rollback). Concurrency control mechanisms coordinate concurrent operations, using locks or optimistic/pessimistic concurrency control to achieve transaction isolation to prevent data inconsistencies.

See all articles