Browse Definitions :
Definition

OpLock (opportunistic lock)

Opportunistic lock (OpLock) is a form of file locking used to facilitate caching and access control and improve performance.

OpLocks are made to enable simultaneous file access by multiple users while also improving performance for synchronized caches. In a synchronized cache, when a client requests a file from a server, the shared file may be cached to avoid subsequent trips over the network to retrieve it.

OpLock is part of the Server message block (SMB) protocol, also known as the Common Internet File System (CIFS) protocol.  OpLocks include batch locks, exclusive locks and level 2 OpLocks.

Batch locks are used where frequent open and close requests can be paired; the system ignores unnecessary close requests if the file is to be reopened, thus reducing the performance impact of the requests.

Exclusive locks are used when a client is the only entity or process that has the file open. In that case, all changes are cached before sending the file back to the server.

Level 2 OpLocks come into effect when an OpLock held by a client is opened by a third party, substituting the client’s former exclusive lock.

An OpLock is not a command but a request typically sent from client to server and fulfilled under allowable conditions or the particular opportunity for which it is named. When a lock is no longer valid a break is sent to the client to end it.

There are some implications that OpLocks can cause corruption and performance issues in ISAM  (Indexed Sequential Access Method) databases. As a result, some companies – Symantec among them -- have recommended disabling OpLocks as a best practice.

This was last updated in May 2015

Continue Reading About OpLock (opportunistic lock)

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

  • sales pipeline

    A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

Close