O'Reilly logo

DB2® 9 for Linux®, UNIX®, and Windows®: DBA Guide, Reference, and Exam Prep, Sixth Edition by Paul C. Zikopoulos, George Baklarz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Concurrency

• CONCURRENCY

• ISOLATION LEVELS

• LOCKS

• LOCK CONVERSION

• LOCK ESCALATION

• LOCK WAIT

A database server acts as a central source of data access for users. The number of users can vary from one to thousands. When more than one user accesses the same data source at the same time, some rules must be established for the reading, inserting, deleting, and updating of the data to guarantee data integrity.

The rules for data access are set by each application connected to a DB2 database and are established using two methods:

Explicit control—Locking resources using an SQL statement or using a DB2 command

Implicit control—Locking resources by specifying an isolation level

Some of the DB2 database resources, databases, table ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required