We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Networking

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Is Distributed Concurrency Control?

By T.S. Adams
Updated: May 16, 2024

Distributed concurrency control is a strategy that spreads responsibility for concurrency control across an entire network. Concurrency refers to having all of the computers working with the same version of the same files. Once computers are networked together, concurrency concerns — issues with keeping all of the files on the network identical for all users — climb to the forefront, as multiple users can have simultaneous access to any authorized files and folders on the system. Without enforcing concurrency, these files could easily become inconsistent from one computer to the next as users change and manipulate data in real-time, resulting in everyone quickly losing the ability to rely on network files as changes take place. Concurrency control keeps files consistent across the entire network, avoiding this concern.

The primary advantage to distributed concurrency control is that it spreads the workload for concurrency issues across multiple computers, reducing overhead on each. Without distributed concurrency control, keeping concurrency on a network could easily become a full time job for a single computer, rendering it useless for anything else. With distributed concurrency control, each computer on the network can help to share the workload, ensuring that end-users can still use the terminals for other network tasks.

Strong strict two phase locking is one of the most common types of distributed concurrency control. In strong strict two phase locking, as soon as an individual network file is accessed, it is locked for both read and write operations until the access ends. This means that only one user on the network can change a file at a time, making it impossible for the file to fall out of concurrency on the network. Once the end-user saves changes to the file or exits the file altogether, the locks are removed, allowing another user on the system to thereafter handle the file again.

One of the biggest disadvantages to strong strict two phase locking is the additional overhead it places on network resources. Each file under each user must be earmarked by the network as "locked," and that information must be retained in memory until the lock ends. In the aggregate, with hundreds of end-users running hundreds of files at the same time, this can easily cannibalize a significant portion of memory on the network. This excessive cannibalization of memory can slow down networks with inefficient or outdated hardware designs.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Discussion Comments
Share
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.