International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 6 Issue 4 July-August 2024 Submit your research before last 3 days of August to publish your research paper in the issue of July-August.

Exploring Concurrency Control Techniques in Multi-User Database Systems: A Comprehensive Review

Author(s) Rupali Banerjee
Country India
Abstract Multi-user database systems require concurrency control techniques in order to maintain data consistency and integrity while handling concurrent transactions. Four important concurrency control techniques are examined in this paper: timestamp-based, validation-based, lock-based (including the popular Two-Phase Locking (2PL) protocols). Lock-based protocols use locks to control access to shared resources; on the other hand, two-phase logic (2PL) guarantees transaction serialization. Timestamp-based protocols provide a consistent execution order by scheduling and ordering transactions according to distinct timestamps.Optimistic concurrency control, or validation-based protocols, validate transactions after they are executed in order to reduce conflicts without first obtaining locks. By means of an extensive investigation of various protocols, the principles, methods, benefits, and drawbacks are clarified, assisting in the well-informed choice and application of concurrency control techniques that are customized to meet particular database system needs.
Keywords DDBMS, 2PL, Time stamp, Validation based protocol
Field Computer > Data / Information
Published In Volume 6, Issue 3, May-June 2024
Published On 2024-06-28
Cite This Exploring Concurrency Control Techniques in Multi-User Database Systems: A Comprehensive Review - Rupali Banerjee - IJFMR Volume 6, Issue 3, May-June 2024. DOI 10.36948/ijfmr.2024.v06i03.23286
DOI https://doi.org/10.36948/ijfmr.2024.v06i03.23286
Short DOI https://doi.org/gt2427

Share this