skip to main content
10.1145/509252.509257acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article
Free Access

Dynamic database dumping

Published:31 May 1978Publication History

ABSTRACT

Several methods are studied for dynamically creating a dump copy of a database while the database is on-line and being updated by user transactions. The methods can be characterized by whether the dump represents the database that existed at the beginning of the dump creation, at the end, or sometime in the middle. The methods are analyzed to understand the performance tradeoffs between alternate methods. The methods vary in the time required to create the dump and the amount of extra storage needed. A key parameter of a given system is shown to be the ratio of the rate at which database entities are copied into the dump to the rate at which database entities are updated. For certain methods to work, the ratio must exceed one. However, by combining two methods into a hybrid scheme, the ratio need only exceed one half.

References

  1. Davenport, R. A., Database integrity. Computer J. 19, 2 (May 1976), 110-116.Google ScholarGoogle ScholarCross RefCross Ref
  2. Fossum, B. W., Database integrity as provided for by a particular data base management system. In Data Base Management, J. W. Klimbe and K. L. Koffeman (Eds.), North-Holland Pub. Co., Amsterdam, 1974, pp. 271-288.Google ScholarGoogle Scholar
  3. Fraser, A. G., Integrity of a mass storage filing system. Computer J. 12, 1 (February 1969), 1-5.Google ScholarGoogle ScholarCross RefCross Ref
  4. Giordano, N. J., and Schwartz, M. S., Database recovery at CMIC. Proc. ACM 1976 SIGMOD Int. Conf. on Management of Data, pp. 33-42. Google ScholarGoogle Scholar
  5. Gunton, A., Recovery procedures for direct access commercial systems. Computer J. 13, 2 (May 1970), 123-126.Google ScholarGoogle ScholarCross RefCross Ref
  6. Ishizaki, S., Designing a large-scale on-line real-time system. Proc. AFIPS 1971 Spring Joint Computer Conf., Vol. 38, AFIPS Press, Montvale, New Jersey, pp. 191-198.Google ScholarGoogle Scholar
  7. Lorie, R. A., Physical integrity in a large segmented database. ACM Trans. Database Systems 2, 1 (March 1977), 91-104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Oppenheimer, G. and Clancy, K. P., Considerations for software protection and recovery from hardware failures in a multiaccess multiprogramming, single processor system. Proc. AFIPS 1968 Fall Joint Computer Conf., Vol. 33, Thompson Books, Washington, D. C. , pp. 29-37.Google ScholarGoogle Scholar
  9. Sayani, H. H. Restart and recovery in a transaction oriented information processing system. Proc. ACM SIGMOD Workshop on Data Description, Access, and Control, May 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Severence, D. G., and Lohman, G. M., Differential files: their application to the maintenance of large databases. ACM Trans. Database Systems 1, 3 (September 1976), 256-267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Wiederhold, G., Database Design, McGraw-Hill, New York, N. Y., 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wilkes, M. V., On preserving the integrity of data bases. Computer J., 15, 3 (August 1972), 191-194.Google ScholarGoogle ScholarCross RefCross Ref
  13. Yourdon, E. Design of On-Line Computer Systems. Prentice-Hall, Englewood Cliffs N. J., 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chandy, K. M., A survey of analytic models of rollback and recovery strategies. Computer 8, 5 (May 1975) 40-47.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chandy, K. M., Browne, J. C., Dissly, C. W., and Uhrig, W. R., Analytic models for rollback and recovery strategies in data base systems. IEEE Trans. Software Eng. SE-1, 1 (March 1975) 100-110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lohman, G. M. and Muckstadt, J. A., Optimal policy for batch operations: backup, checkpointing, reorganization, and updating. ACM Trans. Database Systems 2, 3 (September 1977) 209-222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Schneiderman, B., Optimum data base reorganization points. Comm. ACM 16, 6 (June 1973) 362-365. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Young, J. W., A first order approximation to the optimum checkpoint interval. Comm. ACM 17, 9 (September 1974) 530-531. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sperry Univac., Data Management System (DMS 1100) Level 7RI System Support Functions, UP-7909 Rev. 4.Google ScholarGoogle Scholar
  20. Hutchison, J. S., Private communication.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SIGMOD '78: Proceedings of the 1978 ACM SIGMOD international conference on management of data
    May 1978
    180 pages
    ISBN:9781450373425
    DOI:10.1145/509252
    • Conference Chair:
    • John Lyon,
    • General Chairs:
    • Alfred G. Dale,
    • Nell B. Dale,
    • Program Chair:
    • Eugene I. Lowenthal

    Copyright © 1978 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 31 May 1978

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate785of4,003submissions,20%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader