skip to main content
article
Free Access

A practical guide to the design of differential files for recovery of on-line databases

Published:01 December 1982Publication History
Skip Abstract Section

Abstract

The concept of a differential file has previously been proposed as an efficient means of collecting database updates for on-line systems. This paper studies the problem of database backup and recovery for such systems, and presents an analytic model of their operation. Five key design decisions are identified and an optimization procedure for each is developed. A design algorithm that quickly provides parameters for a near-optimal differential file architecture is provided.

References

  1. 1 AGmLI, H. Differential file architecture: Analysis and applications. Ph.D. dissertation, The University of Michigan, Ann Arbor.Google ScholarGoogle Scholar
  2. 2 AGHILI, H., AND SEVERANCE, D.G. The use of differential files in an 80/20 update environment. Unpublished working paper.Google ScholarGoogle Scholar
  3. 3 BECKER, J.R. EXPLORE: A computer code for solving nonlinear continuous optimization problems. Tech. Rep. 73-6, IOE Department, The University of Michigan, Ann Arbor, 1973.Google ScholarGoogle Scholar
  4. 4 BEIGHTLER, C.S., PHILLIPS, D.T., AND WILD, D.J. Foundations of Optimization. Prentice-Hall, Englewoods Cliffs, N.J., 1979.Google ScholarGoogle Scholar
  5. 5 BLOOM, B.H. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7 (July 1970), 422-426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 CANNING, R.G. Recovery in data base systems. EDP Analyzer 14, 11 (November 1976).Google ScholarGoogle Scholar
  7. 7 CHANDY, K.M., BROWNE, J.C., DISSLY, C.W., AND UHRIG, W.R. Analytic models for rollback and recovery strategies in database systems. IEEE Trans. Softw. Eng. SE-1, 1 (March 1975), 100-110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 LOHMAN, G.M. Optimal data storage and organization in computerized information processing systems subject to failure. Ph.D. dissertation Cornell University, Ithaca, N.Y., January 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 LOH~dAN, G.M., AND MUCKSTADT, J.A. Optimal policy for batch operations: Backup, checkpointing, reorganization, and updating. ACM Trans. Database Syst. 2, 3 (September 1977), 209-222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 POWELL, M.J.D. A FORTRAN subroutine for solving systems of nonlinear algebraic equations. Rep. No. R-5947 A.E.R.E. Harwell, Didcot, Berkshire, England, 1968.Google ScholarGoogle Scholar
  11. 11 POWELL, M.J.D. A hybrid method for nonlinear equations. Rep. No. T.P. 364, A.E.R.E. Harwell, Didcot, Berkshire, England, 1969.Google ScholarGoogle Scholar
  12. 12 SAYANI, H.H. Restart and recovery in transaction oriented information processing system. In Proc. 1974 ACM SIGMOD Workshop on Data Description, Access, and Control (May 1-3, 1974), ACM, New York, pp. 351-366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 SEVERANCE, D.G., AND CARLIS, J.V. A practical approach to selecting record access paths. Comput. Surv. 9, 4 (December 1977), 259-272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14 SEVERANCE, D.G., AND DUHNE, R.A. A practitioner's guide to addressing algorithms. Commun. ACM 19, 6 (June 1976), 314-326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 SEVERANCE, D.G., AND LOHMAN, G.M. Differential files: Their application to the maintenance of large databases. ACM Trans. Database Syst. 1, 3 (September 1976}, 256-267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16 YOUNG, J.W. A first order approximation to the optimum checkpoint interval. Cornmun. ACM 17, 9 (September 1974), 530-531. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A practical guide to the design of differential files for recovery of on-line databases

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader