In a database, locking objects that contain other objects
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Multiple granularity locking" – news · newspapers · books · scholar · JSTOR(January 2021) (Learn how and when to remove this message)
In computer science, multiple granularity locking (MGL) is a locking method used in database management systems (DBMS) and relational databases.
In multiple granularity locking, locks are set on objects that contain other objects. MGL exploits the hierarchical nature of the contains relationship. For example, a database may have files, which contain pages, which contain records. This can be thought of as a tree of objects, where each node contains its children. A lock on this structure (such as a shared or exclusive lock) locks the targeted node as well as all of its descendants.[1]
Multiple granularity locking is usually used with non-strict two-phase locking to guarantee serializability.
^Jim Gray; Raymond A. Lorie; G. R. Putzolu; Iriving L. Traiger (1976). "Granularity of locks and degrees of consistency in a shared data base". IBM Technical Report. IBM. CiteSeerX 10.1.1.92.8248.
and 23 Related for: Multiple granularity locking information
multiplegranularitylocking (MGL) is a locking method used in database management systems (DBMS) and relational databases. In multiplegranularity locking...
account. This is analogous to a record level lock and is normally the highest degree of lockinggranularity in a database management system. In a SQL database...
lipase, a human protein Multiple grenade launcher, such as the Milkor MGL Multiplegranularitylocking, a method for locking in databases This disambiguation...
flip-flop-based) frequency dividers, the drawback is their low locking range. The ILFD locking range is inversely proportional to the quality factor (Q) of...
One key software innovation in the late 1980s was to reduce update lockinggranularity from tables and disk blocks to individual rows. This eliminated a...
// instruction executes at time = Tx . In cases where a locking mechanism with finer granularity is not needed, a critical section is important. In the...
is unlocked. Locking can be supported by the version control system, or via informal communications between developers (aka social locking). Similar to...
span multiple instances of physical hardware, and data-management functions like data replication and data distribution at object-level granularity. Object...
leaves. The level of granularity to be used is defined on a per-database basis by the database administrator. While a fine-grained locking system allows more...
reliability. Lockingmultiple variables using non-atomic locks introduces the possibility of program deadlock. An atomic lock locks multiple variables all...
automatic index selection is performed. Both fine-grained and multi-granularitylocking strategies are used for high concurrency without incurring too much...
manuals that Haswell maintains both read-sets and write-sets at the granularity of a cache line, tracking addresses in the L1 data cache of the processor...
color calibration More granular customizability including modifying status bar icons, volume and power button cutomization, lock screen cutomizations Screen...
image size drops and peak locking might occur with loss of sub pixel precision. There are methods to overcome the peak locking effect, but they require...
elements to be loaded from non-contiguous memory locations DWORD- and QWORD-granularity any-to-any permutes vector shifts. Sometimes three-operand fused multiply-accumulate...
objects shared between threads, locking access to shared methods or blocks when they are used by one of the threads. Locking a block or an object is a time-consuming...
minimum required privileges for the process. Another limitation is the granularity of control that the operating environment has over privileges for an...
writing to their data". There is debate in the industry as to whether the granularity of backup must be "every write" to be CDP, or whether a "near-CDP" solution...
or file metadata. For instance, file locking cannot prevent TOCTTOU race conditions on symbolic links. File locking also cannot automatically roll back...
Network claims to provide several advantages over on-chain transactions: Granularity: According to Andreas Antonopoulos, some implementations of the Lightning...
by other types of receivables are asset-backed securities (ABS). The granularity of pools of securitized assets can mitigate the credit risk of individual...