Two Phase Locking
We'll cover the following
Databases can achieve serializable isolation using a technique called two phase locking (2PL) combined with either predicate or index-range locks to eliminate write skew and phantom reads.
Two phase locking and Predicate locking
Two phase locking and Index-range (a.k.a next-key) locking
Get hands-on with 1200+ tech skills courses.