Pessimistic vs Optimistic locking — [Notes]

Tarun Jain
2 min readDec 23, 2022

--

· Optimistic locking
· Pessimistic locking

Follow this link for all System design articles

Optimistic locking

  • It is another way of locking in which we just check if anyone else has updated the data before us, then we reject the transaction and re-read the data.
  • We generally use a versioning scheme by implementing a version column in data (other methods to do this involve dates, timestamps or checksums/hashes)
Source — https://enterprisecraftsmanship.com/posts/optimistic-locking-automatic-retry/
  • [Source] Optimistic Locking is a strategy where you read a record, take note of a version number (other methods to do this involve dates, timestamps or checksums/hashes) and check that the version hasn’t changed before you write the record back. When you write the record back you filter the update on the version to make sure it’s atomic. (i.e. hasn’t been updated between when you check the version and write the record to the disk) and update the version in one hit.

    If the record is dirty (i.e. different version to yours) you abort the transaction and the user can re-start it.
  • [Source] This strategy is most applicable to high-volume systems and three-tier architectures where you do not necessarily maintain a connection to the database for your session. In this situation the client cannot actually maintain database locks as the connections are taken from a pool and you may not be using the same connection from one access to the next.

Pessimistic locking

  • It is the basic form of locking in which we obtain the lock on the database table or record that we are going to update.
  • [Source] Pessimistic Locking is when you lock the record for your exclusive use until you have finished with it. It has much better integrity than optimistic locking but requires you to be careful with your application design to avoid Deadlocks. To use pessimistic locking you need either a direct connection to the database (as would typically be the case in a two tier client server application) or an externally available transaction ID that can be used independently of the connection. In the latter case you open the transaction with the TxID and then reconnect using that ID. The DBMS maintains the locks and allows you to pick the session back up through the TxID. This is how distributed transactions using two-phase commit protocols (such as XA or COM+ Transactions) work.

--

--