Solved

IsolationLevel Enumeration..???

Posted on 2004-07-31
3
305 Views
Last Modified: 2008-02-26
I don't understand about all of property of IsolationLevel Enumeration.....I see it on MSDN but...I can't understand....so can you explain for me about these property and Examples about these property.....
0
Comment
Question by:sonbinary
  • 2
3 Comments
 
LVL 37

Expert Comment

by:gregoryyoung
ID: 11688653
what exactly do you not understand about it ? MSDN has a fairly clear explanation on the differences here http://msdn.microsoft.com/library/default.asp?url=/library/en-us/cpref/html/frlrfSystemDataIsolationLevelClassTopic.asp. Perhaps a more specific question on what needs clarification ?
0
 

Author Comment

by:sonbinary
ID: 11691782
Yes....I want more clarification for those explain.....I want a compare with those property so I can understand its....Can you give me some example case adn situation for that property..???
0
 
LVL 37

Accepted Solution

by:
gregoryyoung earned 500 total points
ID: 11695293
These are mostly the ANSI defined isolation levels

Chaos
 The pending changes from more highly isolated transactions cannot be overwritten.
this is fairly obvious

ReadCommitted
 Shared locks are held while the data is being read to avoid dirty reads, but the data can be changed before the end of the transaction, resulting in non-repeatable reads or phantom data.
You only see committed data

ReadUncommitted
 A dirty read is possible, meaning that no shared locks are issued and no exclusive locks are honored.
you read the data whether or NOT it has been committed

RepeatableRead
 Locks are placed on all data that is used in a query, preventing other users from updating the data. Prevents non-repeatable reads but phantom rows are still possible.
places a Write lock on the row being modified so that no other database user can update the row in the database (aka pessimistic locking during your transaction)

Serializable
 A range lock is placed on the DataSet, preventing other users from updating or inserting rows into the dataset until the transaction is complete.
this would be used during a process such as serialization so that when you are serializing out the data noone else can change the data ... this allows you to make whats called a snapshot of the data. This is needed due to the fact that after I write out table1 if you insert into table2 which has a p->c relationship with table1 and then insert the parent into table1 when I get to table2 my output will be erroneous as the relationship constraint would not have been met


Unspecified
 A different isolation level than the one specified is being used, but the level cannot be determined.
I do not think that this needs much more explanation .....

further explanation is given here
http://media.datadirect.com/download/docs/odbc/odbcref/locking.html
http://www.winnetmag.com/SQLServer/Article/ArticleID/5336/5336.html
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Form design in vb.net 7 34
Protecting vb6 & .Net code Obfuscation 18 94
VB.Net - Windows UserName index and length error 4 20
VB.NET Repostiory Pattern 7 8
I think the Typed DataTable and Typed DataSet are very good options when working with data, but I don't like auto-generated code. First, I create an Abstract Class for my DataTables Common Code.  This class Inherits from DataTable. Also, it can …
Introduction When many people think of the WebBrowser (http://msdn.microsoft.com/en-us/library/2te2y1x6%28v=VS.85%29.aspx) control, they immediately think of a control which allows the viewing and navigation of web pages. While this is true, it's a…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now