ABSTRACT
Several methods are studied for dynamically creating a dump copy of a database while the database is on-line and being updated by user transactions. The methods can be characterized by whether the dump represents the database that existed at the beginning of the dump creation, at the end, or sometime in the middle. The methods are analyzed to understand the performance tradeoffs between alternate methods. The methods vary in the time required to create the dump and the amount of extra storage needed. A key parameter of a given system is shown to be the ratio of the rate at which database entities are copied into the dump to the rate at which database entities are updated. For certain methods to work, the ratio must exceed one. However, by combining two methods into a hybrid scheme, the ratio need only exceed one half.
- Davenport, R. A., Database integrity. Computer J. 19, 2 (May 1976), 110-116.Google ScholarCross Ref
- Fossum, B. W., Database integrity as provided for by a particular data base management system. In Data Base Management, J. W. Klimbe and K. L. Koffeman (Eds.), North-Holland Pub. Co., Amsterdam, 1974, pp. 271-288.Google Scholar
- Fraser, A. G., Integrity of a mass storage filing system. Computer J. 12, 1 (February 1969), 1-5.Google ScholarCross Ref
- Giordano, N. J., and Schwartz, M. S., Database recovery at CMIC. Proc. ACM 1976 SIGMOD Int. Conf. on Management of Data, pp. 33-42. Google Scholar
- Gunton, A., Recovery procedures for direct access commercial systems. Computer J. 13, 2 (May 1970), 123-126.Google ScholarCross Ref
- Ishizaki, S., Designing a large-scale on-line real-time system. Proc. AFIPS 1971 Spring Joint Computer Conf., Vol. 38, AFIPS Press, Montvale, New Jersey, pp. 191-198.Google Scholar
- Lorie, R. A., Physical integrity in a large segmented database. ACM Trans. Database Systems 2, 1 (March 1977), 91-104. Google ScholarDigital Library
- Oppenheimer, G. and Clancy, K. P., Considerations for software protection and recovery from hardware failures in a multiaccess multiprogramming, single processor system. Proc. AFIPS 1968 Fall Joint Computer Conf., Vol. 33, Thompson Books, Washington, D. C. , pp. 29-37.Google Scholar
- Sayani, H. H. Restart and recovery in a transaction oriented information processing system. Proc. ACM SIGMOD Workshop on Data Description, Access, and Control, May 1974. Google ScholarDigital Library
- Severence, D. G., and Lohman, G. M., Differential files: their application to the maintenance of large databases. ACM Trans. Database Systems 1, 3 (September 1976), 256-267. Google ScholarDigital Library
- Wiederhold, G., Database Design, McGraw-Hill, New York, N. Y., 1977. Google ScholarDigital Library
- Wilkes, M. V., On preserving the integrity of data bases. Computer J., 15, 3 (August 1972), 191-194.Google ScholarCross Ref
- Yourdon, E. Design of On-Line Computer Systems. Prentice-Hall, Englewood Cliffs N. J., 1972. Google ScholarDigital Library
- Chandy, K. M., A survey of analytic models of rollback and recovery strategies. Computer 8, 5 (May 1975) 40-47.Google ScholarDigital Library
- Chandy, K. M., Browne, J. C., Dissly, C. W., and Uhrig, W. R., Analytic models for rollback and recovery strategies in data base systems. IEEE Trans. Software Eng. SE-1, 1 (March 1975) 100-110.Google ScholarDigital Library
- Lohman, G. M. and Muckstadt, J. A., Optimal policy for batch operations: backup, checkpointing, reorganization, and updating. ACM Trans. Database Systems 2, 3 (September 1977) 209-222. Google ScholarDigital Library
- Schneiderman, B., Optimum data base reorganization points. Comm. ACM 16, 6 (June 1973) 362-365. Google ScholarDigital Library
- Young, J. W., A first order approximation to the optimum checkpoint interval. Comm. ACM 17, 9 (September 1974) 530-531. Google ScholarDigital Library
- Sperry Univac., Data Management System (DMS 1100) Level 7RI System Support Functions, UP-7909 Rev. 4.Google Scholar
- Hutchison, J. S., Private communication.Google Scholar
Recommendations
Fast database restarts at facebook
SIGMOD '14: Proceedings of the 2014 ACM SIGMOD International Conference on Management of DataFacebook engineers query multiple databases to monitor and analyze Facebook products and services. The fastest of these databases is Scuba, which achieves subsecond query response time by storing all of its data in memory across hundreds of servers. We ...
Let's Talk About Storage & Recovery Methods for Non-Volatile Memory Database Systems
SIGMOD '15: Proceedings of the 2015 ACM SIGMOD International Conference on Management of DataThe advent of non-volatile memory (NVM) will fundamentally change the dichotomy between memory and durable storage in database management systems (DBMSs). These new NVM devices are almost as fast as DRAM, but all writes to it are potentially persistent ...
Associative hardware and software techniques for integrity control
This paper presents the integrity control mechanism of the associative processing system, CASSM. The mechanism takes advantage of the associative techniques, such as content and context addressing, tagging and marking data, parallel processing, ...
Comments