Browse Definitions :
Definition

OpLock (opportunistic lock)

Opportunistic lock (OpLock) is a form of file locking used to facilitate caching and access control and improve performance.

OpLocks are made to enable simultaneous file access by multiple users while also improving performance for synchronized caches. In a synchronized cache, when a client requests a file from a server, the shared file may be cached to avoid subsequent trips over the network to retrieve it.

OpLock is part of the Server message block (SMB) protocol, also known as the Common Internet File System (CIFS) protocol.  OpLocks include batch locks, exclusive locks and level 2 OpLocks.

Batch locks are used where frequent open and close requests can be paired; the system ignores unnecessary close requests if the file is to be reopened, thus reducing the performance impact of the requests.

Exclusive locks are used when a client is the only entity or process that has the file open. In that case, all changes are cached before sending the file back to the server.

Level 2 OpLocks come into effect when an OpLock held by a client is opened by a third party, substituting the client’s former exclusive lock.

An OpLock is not a command but a request typically sent from client to server and fulfilled under allowable conditions or the particular opportunity for which it is named. When a lock is no longer valid a break is sent to the client to end it.

There are some implications that OpLocks can cause corruption and performance issues in ISAM  (Indexed Sequential Access Method) databases. As a result, some companies – Symantec among them -- have recommended disabling OpLocks as a best practice.

This was last updated in May 2015

Continue Reading About OpLock (opportunistic lock)

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close