Detailed explanation of PHP optimistic locking principle
1. Why do we need locks (concurrency control)?
In a multi-user environment, multiple users may update the same record at the same time, which may cause conflicts. This is the famous concurrency problem.
Typical conflicts are:
1. Lost updates: The updates of one transaction overwrite the update results of other transactions, which is the so-called lost update. For example: User A changes the value from 6 to 2, and user B changes the value from 2 to 6, then user A loses his update.
2. Dirty read: When a transaction reads the records of other half-completed transactions, a dirty read occurs. For example: the values seen by users A and B are both 6, user B changes the value to 2, and the value read by user A is still 6.
In order to solve these problems caused by concurrency. We need to introduce a concurrency control mechanism.
2. Concurrency control mechanism
Lock, that is, lock the target data we selected so that it cannot be modified by other programs.
1. Pessimistic lock: refers to a conservative attitude towards data being modified by the outside world (including other current transactions of this system and transaction processing from external systems). Therefore, during the entire data processing process, The data is in a locked state
2. Optimistic locking: Assume that no concurrency conflicts will occur, and only check whether data integrity is violated when submitting the operation. Optimistic locking cannot solve the problem of dirty reads.
3. Implementation of optimistic locking
It is implemented using the data version (Version) recording mechanism. This is the most commonly used implementation method of optimistic locking. What is a data version? That is to add a version identifier to the data, usually by adding a numeric "version" field to the database table. When reading data, read the value of the version field together. Every time the data is updated, the version value is increased by one. When we submit an update, we compare the current version information of the corresponding record in the database table with the version value taken out for the first time. If the current version number of the database table is equal to the version value taken out for the first time, it will be updated. Otherwise, it is considered to be expired data
1. Database table design
task
There are three fields, namely id, value, version
2. Implementation
1) First read the data in the task table (actually there is only one record in this table), and get the value of version as versionValue
2) Every time the value field in the task table is updated, in order to prevent If a conflict occurs, you need to do this
Update task set value = newValue,version = versionValue + 1 where version = versionValue;
Only when this statement is executed will it indicate that the value field is updated this time Value Success
For example, suppose there are two nodes A and B that want to update the value field value in the task table. At almost the same time, the version value read by node A and node B from the task table is 2. Then when node A and node B update the value field value, they both operate update task set value = newValue, version = 3 where version = 2;. In fact, only one node successfully executes the SQL statement. Assuming that node A executes successfully, Then the value of the version field of the task table is 3 at this time. Node B then operates update task set value = newValue, version = 3 where version = 2; this SQL statement will not be executed, thus ensuring that the task table is not updated. A conflict occurs.
Related recommendations:
Yii2.0 optimistic lock and pessimistic lock examples detailed explanation
Methods to implement transaction mechanism and optimistic locking in redis
Database things optimistic locking and pessimistic locking
The above is the detailed content of Detailed explanation of PHP optimistic locking principle. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.
