{"id":62093,"date":"2026-01-23T16:23:59","date_gmt":"2026-01-23T10:53:59","guid":{"rendered":"https:\/\/www.techjockey.com\/blog\/?p=62093"},"modified":"2026-01-23T16:27:39","modified_gmt":"2026-01-23T10:57:39","slug":"understanding-concurrency-control-in-dbms","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms","title":{"rendered":"Understanding Concurrency Control in DBMS with Examples"},"content":{"rendered":"\n<p><strong>Key Points:<\/strong><\/p>\n\n\n\n<ul>\n<li>Concurrency control manages multiple transactions running at the same time.<\/li>\n\n\n\n<li>It prevents conflicts and keeps data consistent.<\/li>\n\n\n\n<li>Locking and timestamp protocols are the main control methods.<\/li>\n\n\n\n<li>It ensures safe, reliable, and correct database transactions.<\/li>\n<\/ul>\n\n\n\n<p>Imagine there is a large database of, say, a bank. Thousands of people are trying to access it, which could result in conflicts, interfere with each other\u2019s transactions, show incorrect account balances, and much more.<\/p>\n\n\n\n<p>To resolve this, concurrency control is used, which ensures modern applications like banking apps, ticket booking platforms, e-commerce websites, etc., run smoothly even when thousands of users work on the same database at the same time.<\/p>\n\n\n\n<p>This is why database concurrency control is not just a theoretical concept in textbooks; it is a real-world necessity for every multi-user environment.<\/p>\n\n\n\n<p>This blog explains<\/p>\n\n\n\n<ul>\n<li>what concurrency control is,<\/li>\n\n\n\n<li>why it is needed,<\/li>\n\n\n\n<li>how it works,<\/li>\n\n\n\n<li>key principles,<\/li>\n\n\n\n<li>popular concurrency control methods in DBMS and more.<\/li>\n<\/ul>\n\n\n\n<p>Let\u2019s dive in.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-concurrency-control-in-dbms\"><span class=\"ez-toc-section\" id=\"what_is_concurrency_control_in_dbms\"><\/span>What is Concurrency Control in DBMS?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Concurrency control in DBMS refers to the set of techniques and mechanisms that manage simultaneous execution of transactions in a database without causing data inconsistency.<\/p>\n\n\n\n<p>When multiple users access the same data concurrently, each user\u2019s transaction must behave as if it is executing in isolation, even though internally, many are being processed in parallel.<\/p>\n\n\n\n<p>In simpler words, concurrency control ensures that:<\/p>\n\n\n\n<ul>\n<li>multiple transactions can run at the same time<\/li>\n\n\n\n<li>data remains accurate and consistent<\/li>\n\n\n\n<li>one transaction does not negatively impact another<\/li>\n<\/ul>\n\n\n\n<p>Concurrency in DBMS is closely linked with transaction properties, especially the ACID properties- Atomicity, Consistency, Isolation, and Durability. Among these, isolation is central to database concurrency control because it regulates how the intermediate states of one transaction are hidden from others.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_18986\"><h3><span class=\"ez-toc-section\" id=\"lio\"><\/span>Lio<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"18986\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-do-we-need-concurrency-control-in-dbms\"><span class=\"ez-toc-section\" id=\"why_do_we_need_concurrency_control_in_dbms\"><\/span>Why do we need Concurrency Control in DBMS?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The need for concurrency control in DBMS arises because databases are shared systems. In real environments, hundreds or millions of transactions happen simultaneously. Without proper control, these concurrent transactions can cause severe anomalies. Concurrency problems in DBMS typically include lost updates, dirty reads, inconsistent reads, and phantom reads.<\/p>\n\n\n\n<p>Below is a simple example for better understanding.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-example-illustrating-the-need-for-concurrency-control\"><span class=\"ez-toc-section\" id=\"example_illustrating_the_need_for_concurrency_control\"><\/span>Example illustrating the need for concurrency control<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Imagine two users accessing the same bank account balance.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Scenario<\/th><th>Details<\/th><\/tr><\/thead><tbody><tr><td><strong>Initial Balance<\/strong><\/td><td>Shared bank account balance = INR 10,000<\/td><\/tr><tr><td><strong>User A Transaction<\/strong><\/td><td>Withdraws INR 2,000<\/td><\/tr><tr><td><strong>User B Transaction<\/strong><\/td><td>Deposits INR 1,000<\/td><\/tr><tr><td><strong>Result Without Concurrency Control<\/strong><\/td><td>Final balance may become INR 8,000 or INR 11,000 instead of the correct balance of INR 9,000         <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>In this case, because both transactions read the same old value at the same time, one update may overwrite the other. This leads to incorrect balances, which is unacceptable in financial systems.<\/p>\n\n\n\n<p>In this case, because both transactions read the same old value at the same time, one update may overwrite the other. This leads to incorrect balances, which is unacceptable in financial systems.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_3362\"><h3><span class=\"ez-toc-section\" id=\"microsoft_sql_server_standard_edition\"><\/span>Microsoft SQL Server Standard Edition<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"3362\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-problems-in-concurrency-control\"><span class=\"ez-toc-section\" id=\"problems_in_concurrency_control\"><\/span>Problems in concurrency control<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Some of the major concurrency problems in DBMS include:<\/p>\n\n\n\n<ul>\n<li><strong>Lost update problem<\/strong> where one transaction overwrites another transaction\u2019s result<\/li>\n\n\n\n<li><strong>Dirty read problem<\/strong> where a transaction reads data written by another uncommitted transaction<\/li>\n\n\n\n<li><strong>Inconsistent read problem <\/strong>where a transaction reads different values of the same data during execution<\/li>\n\n\n\n<li><strong>Uncommitted dependency <\/strong>where failure of one transaction corrupts results of others<\/li>\n<\/ul>\n\n\n\n<p>These issues clearly show why concurrency management in DBMS is necessary. Without it, databases become unreliable, error-prone, and unsafe for mission-critical applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-principles-of-concurrency-control\"><span class=\"ez-toc-section\" id=\"principles_of_concurrency_control\"><\/span>Principles of Concurrency Control<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Several fundamental principles govern concurrency control in <a href=\"https:\/\/www.techjockey.com\/category\/dbms-database-management-system\">database management systems<\/a>. The main objective is to maintain consistency and isolation while allowing maximum parallelism.<\/p>\n\n\n\n<p>The main principle is based on serializability, which states that even though transactions execute concurrently, the final result must be equivalent to some serial execution of those transactions.<\/p>\n\n\n\n<p>Another important principle is conflict control. When two transactions attempt to access the same data item, especially for writing, their execution must be ordered or regulated so that no conflict arises. This is often managed through locking techniques in DBMS and timestamp-based concurrency control in DBMS.<\/p>\n\n\n\n<p>Recovery and durability also play a role. If a concurrent transaction fails, the system must be able to undo or redo operations without affecting other correctly executed transactions. All these principles together ensure correctness, integrity, and reliability.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_3269\"><h3><span class=\"ez-toc-section\" id=\"flyspeed_data_export\"><\/span>FlySpeed Data Export<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"3269\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-database-concurrency-control-work\"><span class=\"ez-toc-section\" id=\"how_does_database_concurrency_control_work\"><\/span>How Does Database Concurrency Control Work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Database concurrency control works through control protocols and algorithms that schedule transactions intelligently. The aim is to allow transactions to run in parallel wherever possible, but delay or block operations where conflicts may arise.<\/p>\n\n\n\n<p>The DBMS checks:<\/p>\n\n\n\n<ul>\n<li>whether transactions are independent<\/li>\n\n\n\n<li>whether their operations conflict<\/li>\n\n\n\n<li>whether serializability can be preserved<\/li>\n<\/ul>\n\n\n\n<p>The scheduler inside the DBMS is responsible for deciding the execution order of transactions. It ensures that concurrency in DBMS does not violate isolation or consistency.<\/p>\n\n\n\n<p>Two major approaches are commonly used: locking-based protocols and timestamp-based protocols.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-two-phase-locking-protocol-in-dbms\"><span class=\"ez-toc-section\" id=\"two-phase_locking_protocol_in_dbms\"><\/span>Two-Phase Locking Protocol in DBMS<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>One of the most widely used concurrency control methods in DBMS is based on locks. Locking techniques in DBMS prevent multiple transactions from accessing the same data item in conflicting ways. There are typically two basic types of locks: shared lock for reading and exclusive lock for writing.<\/p>\n\n\n\n<p>The two-phase locking protocol in DBMS (2PL) is the most widely used. According to this protocol, each transaction must complete two phases:<\/p>\n\n\n\n<ul>\n<li><strong>Growing phase<\/strong>: the transaction acquires all the locks it needs and cannot release any lock<\/li>\n\n\n\n<li><strong>Shrinking phase<\/strong>: the transaction releases locks and cannot acquire any new ones<\/li>\n<\/ul>\n\n\n\n<p>This ensures serializability by preventing cyclic dependencies. However, two-phase locking can also lead to deadlocks, where two or more transactions wait for each other indefinitely. To solve this, deadlock detection and prevention techniques* are used.<\/p>\n\n\n\n<p>*<strong>Deadlock detection and prevention techniques<\/strong> either monitor transactions to identify circular waits and resolve them by aborting or rolling back one of the transactions, or they impose rules on resource allocation and transaction ordering so that circular waits never arise.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_8029\"><h3><span class=\"ez-toc-section\" id=\"mariadb\"><\/span>MariaDB<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"8029\"\/><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-timestamp-based-protocol-in-dbms\"><span class=\"ez-toc-section\" id=\"timestamp-based_protocol_in_dbms\"><\/span>Timestamp-based Protocol in DBMS<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Another major technique is the timestamp-based protocol in DBMS. In this method, every transaction is assigned a unique timestamp when it starts. The timestamp defines the order of execution logically.<\/p>\n\n\n\n<p>The DBMS then ensures that operations are executed according to timestamp order, not the physical time order of arrival. If a younger transaction tries to update data already modified by an older committed transaction, the system may force a rollback depending on the specific protocol used.<\/p>\n\n\n\n<p>This approach avoids deadlocks completely because no waiting cycle is formed. However, it can result in frequent rollbacks when conflicts occur, particularly in high-contention systems.<\/p>\n\n\n\n<p>There are different variations, such as basic timestamp protocol, multiversion timestamp protocol, and Thomas&#8217; write rule, each balancing performance and correctness differently.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-distributed-concurrency-control-in-dbms\"><span class=\"ez-toc-section\" id=\"distributed_concurrency_control_in_dbms\"><\/span>Distributed Concurrency Control in DBMS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When databases are distributed across multiple locations or network nodes, concurrency control becomes even more complex. Distributed concurrency control in DBMS deals with transactions executed over multiple interconnected databases, often in cloud and large enterprise systems.<\/p>\n\n\n\n<p>The key challenges include network latency, node failures, message delays, and synchronization issues. Algorithms such as distributed two-phase locking, distributed timestamp ordering, and quorum-based protocols are widely used. Modern distributed databases, such as NoSQL systems and NewSQL engines, also rely heavily on distributed concurrency techniques to ensure global consistency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-advantages-and-disadvantages-of-concurrency-control\"><span class=\"ez-toc-section\" id=\"advantages_and_disadvantages_of_concurrency_control\"><\/span>Advantages and Disadvantages of Concurrency Control<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Concurrency management in DBMS offers several benefits but also introduces certain overheads. A brief discussion helps understand its practical impact.<\/p>\n\n\n\n<p><strong>Advantages<\/strong><\/p>\n\n\n\n<ul>\n<li>Concurrency control prevents data inconsistency, enabling multiple users to work safely on the same database.<\/li>\n\n\n\n<li>It improves system utilization and throughput by allowing parallel execution instead of forcing serial processing.<\/li>\n\n\n\n<li>It protects integrity constraints and maintains ACID properties.<\/li>\n\n\n\n<li>It ensures user isolation so that intermediate, uncommitted changes of one transaction are not visible to others.<\/li>\n\n\n\n<li>Overall, it makes large-scale multiuser systems efficient and reliable.<\/li>\n<\/ul>\n\n\n\n<p><strong>Disadvantages<\/strong><\/p>\n\n\n\n<ul>\n<li>At the same time, concurrency control adds system complexity and overhead. Locking mechanisms may cause deadlocks and blocking delays.<\/li>\n\n\n\n<li>Timestamp-based approaches may cause high rollback rates. Implementation and maintenance require complex algorithms and careful transaction design.<\/li>\n\n\n\n<li>Performance tuning also becomes challenging, especially in distributed environments.<\/li>\n<\/ul>\n\n\n\n<p>However, despite these disadvantages, concurrency control remains indispensable because the alternative would be incorrect databases and unreliable applications.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_4154\"><h3><span class=\"ez-toc-section\" id=\"master_data_management\"><\/span>Master Data Management<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"4154\"\/><\/div>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Concurrency control in DBMS is the backbone of reliable multiuser database systems. As applications scale and more users interact simultaneously, concurrency in database management systems becomes unavoidable.<\/p>\n\n\n\n<p>Whether implemented through locking, timestamps, or hybrids, the ultimate goal of database concurrency control is the same: to allow safe parallel transaction execution while guaranteeing consistency.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key Points: Imagine there is a large database of, say, a bank. Thousands of people are trying to access it, which could result in conflicts, interfere with each other\u2019s transactions, show incorrect account balances, and much more. To resolve this, concurrency control is used, which ensures modern applications like banking apps, ticket booking platforms, e-commerce [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":62095,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1540],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Concurrency Control in DBMS with Examples<\/title>\n<meta name=\"description\" content=\"Understand concurrency control in DBMS with a simple bank transaction example showing how it prevents data inconsistency.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/62093\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Concurrency Control in DBMS with Examples\" \/>\n<meta property=\"og:description\" content=\"Understand concurrency control in DBMS with a simple bank transaction example showing how it prevents data inconsistency.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/62093\" \/>\n<meta property=\"og:site_name\" content=\"Techjockey.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Techjockey\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-23T10:53:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T10:57:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2026\/01\/22161046\/Concurrency-Control-in-DBMS_Featured-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mehlika Bathla\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:site\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mehlika Bathla\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Concurrency Control in DBMS with Examples","description":"Understand concurrency control in DBMS with a simple bank transaction example showing how it prevents data inconsistency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/62093","og_locale":"en_US","og_type":"article","og_title":"Understanding Concurrency Control in DBMS with Examples","og_description":"Understand concurrency control in DBMS with a simple bank transaction example showing how it prevents data inconsistency.","og_url":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/62093","og_site_name":"Techjockey.com Blog","article_publisher":"https:\/\/www.facebook.com\/Techjockey\/","article_published_time":"2026-01-23T10:53:59+00:00","article_modified_time":"2026-01-23T10:57:39+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2026\/01\/22161046\/Concurrency-Control-in-DBMS_Featured-.png","type":"image\/png"}],"author":"Mehlika Bathla","twitter_card":"summary_large_image","twitter_creator":"@TechJockeys","twitter_site":"@TechJockeys","twitter_misc":{"Written by":"Mehlika Bathla","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms#article","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms"},"author":{"name":"Mehlika Bathla","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/1881fce242347f9140121fec5114dcc8"},"headline":"Understanding Concurrency Control in DBMS with Examples","datePublished":"2026-01-23T10:53:59+00:00","dateModified":"2026-01-23T10:57:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms"},"wordCount":1408,"publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2026\/01\/22161046\/Concurrency-Control-in-DBMS_Featured-.png","articleSection":["Database Management Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms","url":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms","name":"Understanding Concurrency Control in DBMS with Examples","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms#primaryimage"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2026\/01\/22161046\/Concurrency-Control-in-DBMS_Featured-.png","datePublished":"2026-01-23T10:53:59+00:00","dateModified":"2026-01-23T10:57:39+00:00","description":"Understand concurrency control in DBMS with a simple bank transaction example showing how it prevents data inconsistency.","breadcrumb":{"@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms#primaryimage","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2026\/01\/22161046\/Concurrency-Control-in-DBMS_Featured-.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2026\/01\/22161046\/Concurrency-Control-in-DBMS_Featured-.png","width":1200,"height":628,"caption":"Concurrency control in DBMS illustration showing multiple users accessing shared database resources safely with synchronization arrows."},{"@type":"BreadcrumbList","@id":"https:\/\/www.techjockey.com\/blog\/understanding-concurrency-control-in-dbms#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techjockey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Database Management Software","item":"https:\/\/www.techjockey.com\/blog\/category\/dbms-database-management-system"},{"@type":"ListItem","position":3,"name":"Understanding Concurrency Control in DBMS with Examples"}]},{"@type":"WebSite","@id":"https:\/\/www.techjockey.com\/blog\/#website","url":"https:\/\/www.techjockey.com\/blog\/","name":"Techjockey.com Blog","description":"","publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techjockey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techjockey.com\/blog\/#organization","name":"Techjockey Infotech Private Limited","url":"https:\/\/www.techjockey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","width":72,"height":72,"caption":"Techjockey Infotech Private Limited"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Techjockey\/","https:\/\/twitter.com\/TechJockeys","https:\/\/www.linkedin.com\/company\/techjockey","https:\/\/www.youtube.com\/@techjockeydotcom"]},{"@type":"Person","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/1881fce242347f9140121fec5114dcc8","name":"Mehlika Bathla","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b4ccf9c0ec576de1b4b6b1d424bf97e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b4ccf9c0ec576de1b4b6b1d424bf97e?s=96&d=mm&r=g","caption":"Mehlika Bathla"},"description":"Mehlika Bathla is a passionate content writer who turns complex tech ideas into simple words. For over 4 years in the tech industry, she has crafted helpful content like technical documentation, user guides, UX content, website content, social media copies, and SEO-driven blogs. She is highly skilled in SaaS product marketing and end-to-end content creation within the software development lifecycle. Beyond technical writing, Mehlika dives into writing about fun topics like gaming, travel, food, and entertainment. She's passionate about making information accessible and easy to grasp. Whether it's a quick blog post or a detailed guide, Mehlika aims for clarity and quality in everything she creates.","sameAs":["https:\/\/www.linkedin.com\/in\/mehlika-bathla05\/"],"jobTitle":"Content Writer","url":"https:\/\/www.techjockey.com\/blog\/author\/mehlika"}]}},"_links":{"self":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/62093"}],"collection":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/comments?post=62093"}],"version-history":[{"count":7,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/62093\/revisions"}],"predecessor-version":[{"id":62141,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/62093\/revisions\/62141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media\/62095"}],"wp:attachment":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media?parent=62093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/categories?post=62093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/tags?post=62093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}