skip to main content
article
Free Access

ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging

Published:01 March 1992Publication History
Skip Abstract Section

Abstract

DB2TM, IMS, and TandemTM systems. ARIES is applicable not only to database management systems but also to persistent object-oriented languages, recoverable file systems and transaction-based operating systems. ARIES has been implemented, to varying degrees, in IBM's OS/2TM Extended Edition Database Manager, DB2, Workstation Data Save Facility/VM, Starburst and QuickSilver, and in the University of Wisconsin's EXODUS and Gamma database machine.

References

  1. 1 BAKER, J., CRUS, R., AND HADERLE, D. Method for assuring atomicity of multi-row update operations in a database system. U.S. Patent 4,498,145, IBM, Feb. 1985.Google ScholarGoogle Scholar
  2. 2 BADRINATH, B. R., AND RAMAMRITHAM, K. Semantics-based concurrency control: Beyond commutativity. In Proceedings 3rd IEEE International Conference on Data Engineering (Feb. 1987). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 BERNSTEIN, P., HADZILACOS, V., AND GOODMAN, N. Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading, Mass., 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 BORR, A. Robustness to crash in a distributed database: A non-shared-memory multiprocessor approach. In Proceedings l Oth International Conferene~ on V~ry Large Data Bases (Singapore, Aug. 1984). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 CHAMBERLm, D., GmSER% A., AND YOST, R. A history of System R and SQL/Data System. In Proceedings 7th International Conference on Very Large Data Bases (Cannes, Sept. 1981).Google ScholarGoogle Scholar
  6. 6 CHANG, A., AND M~RGE~, M. 801 storage: Architecture and programming. ACM Trans. Comput. Syst., 6, I (Feb. 1988), 28-50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 CHANG, P. Y., AND MYRE, W. W. 0S/2 EE database manager: Overview and technical hlghllghts. IBM Syst. J. 27, 2 (1988). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 COPELANO, G., KHOSHAFIAN, S., SMITH, M., AND VALDURIEZ, P. Buffering schemes for permanent data. In Proceedings International Conference on Data Engineering (Los Angeles, Feb. 1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 CLARK, B. E., AND CORRIGAN, M.J. Application System/400 performance characteristics. IBM Syst. J. 28, 3 (1989). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 CHENG, J., LOOSELY, C., SHmAMIYA, A., AND WORTmNGTON, P. IBM Database 2 performance: Design, implementation, and tuning. IBM Syst. J. 23, 2 (1984).Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 CRus, R, HADERLE, D., AND HERRON, H. Method for managing lock escalation in a multiprocessing, multiprogramming environment. U.S. Patent 4,716,52 8, IBM, Dec. 1987.Google ScholarGoogle Scholar
  12. 12 CRUS, R., MALKEMUS, T., AND PUTZOLU, G. R. Index mini-pages IBM Tech. Disclosure Bull. 26, 4 (April 1983), 5460-5463.Google ScholarGoogle Scholar
  13. 13 CRUS, R., PUTZOLU, F., AND MORTENSON, J. A Incremental data base log image copy IBM Tech. D~sclosure Bull. 25, 7B (Dec. 1982), 3730-373 2.Google ScholarGoogle Scholar
  14. 14 CRus, R., AND PUTZOLU, F. Data base allocation table. IBM Tech. Disclosure Bull. 25, 7B (Dec. 1982), 3722-2724.Google ScholarGoogle Scholar
  15. 15 CRUS, R. Data recovery in IBM Database 2. IBM Syst. J. 23, 2 (1984).Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16 CURTIS, R. Informix-Turbo, In Proceedmgs IEEE Compcon Sprmg '88 (Feb.-March 1988).Google ScholarGoogle Scholar
  17. 17 DASGUPTA, P., LEBLANC, R., JR., AND APPELBE, W. The Clouds distributed operating system. In Proceedings 8th International Conference on Distributed Computing Systems (San Jose, Calif., June 1988).Google ScholarGoogle Scholar
  18. 18 DATE, C. A Guide to INGRES. Addison-Wesley, Reading, Mass., 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19 DEY, R., SHAN, M., AND TRAIGER, I. Method for dropping data sets. IBM Tech. Disclosure Bull. 25, 11A (April 1983), 5453-5455.Google ScholarGoogle Scholar
  20. 20 DEWITT, D., GHANDEHARIZADEH, S., SCHNEIDER, D., BRICKER, A., HSIAO, H.-I., ANn RASMUSSEN, R. The Gamma database machine project. IEEE Trans. Knowledge Data EnAE. 2, 1 (March 1990). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21 DELORME, D., HOLM, M., LEE, W., PASSE, P., RICARD, G., TIMMS, G., JR., AND YOUNGREN, L. Database index journaling for enhanced recovery. U.S. Patent 4,819,156, IBM, April 1989Google ScholarGoogle Scholar
  22. 22 DIXON, G. N., PARRLNGTON, G. D., SHRIVASTAVA, S., AND WHEATER, S.M. The treatment of persistent objects in Arjuna. Comput. J. 32, 4 (1989). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23 DUCHAMP, D. Transaction management. Ph.D. dissertation, Tech. Rep. CMU-CS-88-192, Carnegie-Mellon Unir., Dec. 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24 EFFELSBERG, W., AND HAERDER, T. Principles of database buffer management. ACM Trans. Database Syst. 9, 4 (Dec. 1984). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25 ELHARDT, K, AND BAYER, R. A database cache for hlgh performance and fast restart in database systems. ACM Trans Database Syst. 9, 4 (Dec. 1984). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26 FEKETE, A., LYNCH, N., MERRITT, M., AND WEIHL, W. Commutativity-based locking for nested transactions. Tech. Rep. MIT/LCS/TM-370.b, MIT, July 1989.Google ScholarGoogle Scholar
  27. 27 FOSSUM, B Data base integrity as provided for by a partlcular data base management system. In Data Base Management, J. W. Klimbie and K. L. Koffeman, Eds, North-Holland, Amsterdam, 1974.Google ScholarGoogle Scholar
  28. 28 GAWLICK, D., AND KINKADE, D. Varieties of concurrency control in IMS/VS Fast Path. IEEE Database Eng. 8, 2 (June 1985).Google ScholarGoogle Scholar
  29. 29 GARZA, J., AND KIM, W. Transaction management in an object-oriented database system. In Proceedings ACM-SIGMOD International Conference on Management of Data (Chicago, June 1988). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30 GHEITH, A., AND SCHWAN, K. CHAOSart: Support for reaLtime atomic transactions. In Proceedings 19th International Symposium on Fault-Tolerant Computing (Chicago, June 1989).Google ScholarGoogle Scholar
  31. 31 GRA~, J., MCJONES, P., BLASGEN, M., LINDSA~, B., LORm, R., PINCE, T., PUTZOLU, F., AND TRAIGER, I. The recovery manager of the System R database manager. ACM Compat. Surv. 13, 2 (June 1981). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. 32 GRA~, J. Notes on data base operating systems. In Operating Systems--An Advanced Course, R. Bayer, R. Graham, and G. Seegmuller, Eds., LNCS Vol. 60, Springer-Verlag, New York, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. 33 HADZILACOS, V. A theory of reliability m database systems. J. ACM 35, 1 (Jan. 1988), 121-145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. 34 HAERDER, T. Handling hot spot data in DB-sharing systems. Inf. Syst. 13, 2 (1988), 155-166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. 35 HADERLE, D., AND JACKSON, R. IBM Database 2 overview. IBM Syst. J. 23, 2 (1984).Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. 36 HAERDER, T., AND REUTER, A. Principles of transaction oriented database recovery--A taxonomy. ACM Comput. Surv. 15, 4 (Dec. 1983). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. 37 HELLAND, P. The TMF application programming interface: Program to program communication, transactions, and concurrency in the Tandem NonStop system. Tandem Tech. Rep. TR89.3, Tandem Computers, Feb. 1989.Google ScholarGoogle Scholar
  38. 38 HERLIHY, M., AND WEmL, W. Hybrid eoncurrency control for abstract data types. In Proceedings 7th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (Austin, Tex., March 1988). Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. 39 HERLIHY, M., AND WING, J. M. Avalon: Language support for reliable distributed systems. In Proceedings 17th International Symposium on Fault-Tolerant Computing (Pittsburgh, Pa., July 1987).Google ScholarGoogle Scholar
  40. 40 HASKIN, R., MALACHI, Y., SAWDON, W., AND CHAN, G. Recovery management in Quick- Silver. ACM Trans. Comput. Syst. 6, i (Feb. 1988), 82-108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. 41 IMS/ VS Version 1 Release 3 Recovery/Restart. Doc. GG24-1652, IBM, April 1984.Google ScholarGoogle Scholar
  42. 42 IMS/VS Version 2 Application Programming. Doc. SC26-4178, IBM, March 1986.Google ScholarGoogle Scholar
  43. 43 IMS/ VS Extended Recovery Facility (XRF): Technical Reference. Doc. GG24-3153, IBM, April 1987.Google ScholarGoogle Scholar
  44. 44 IBM Workstation Data Save Facility / VM: General Information. Doc. GH24-5232, IBM, 1990.Google ScholarGoogle Scholar
  45. 45 KORTH, H. Locking primitives in a database systern. JACM 30, i (Jan. 1983), 55-79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. 46 LUM, V., DADAM, P., ERBE, R., GUENAUER, J., PISTOR, P., WALCH, G., WERNER, H., AND WOODFILL, J. Design of an integrated DBMS to support advanced applications. In Proceedings International Conference on Foundations of Data Organization (Kyoto, May 1985).Google ScholarGoogle ScholarCross RefCross Ref
  47. 47 LEWNE, F., AND MOHAN, C. Method for concurrent record access, insertion, deletion and alteration using an index tree. U.S. Patent 4,914,569, IBM, April 1990.Google ScholarGoogle Scholar
  48. 48 LEW~S, R. Z. IMS Prvgram Isolation Locking. Doc. GG66-3193, IBM Dallas Systems Center, Dec. 1990.Google ScholarGoogle Scholar
  49. 49 LINDSAY, B., HAAS, L., MOHAN, C., WILMS, P., AND YOST, R. Computation and communication in R*: A distributed database manager. ACM Trans. Comput. Syst. 2, 1 (Feb. 1984). Also in Proceedings 9th ACM Symposium on Operating Systems Principles (Bretton Woods, Oct. 1983). Also available as IBM Res. Rep. RJ3740, San Jose, Calif., Jan. 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. 50 LINDSAY, B., MOHAN, C., AND PIRAHESH, H. Method for reserving space needed for "rollback" actions. IBM Tech. Disclosure Bull. 29, 6 (Nov. 1986).Google ScholarGoogle Scholar
  51. 51 LISKOV, B., AND SCHEIFLER, R. Guardians and actions: Linguistic support for robust, distributed programs. ACM Trans. Program. Lang. Syst. 5, 3 (July 1983). Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. 52 LINDSAY, B., SELINGER, P., GALTIERI, C., GRAY, J., LORIE, R., PUTZOLU, F., TRAIGER, I., AND WADE, B. Notes on distributed databases. IBM Res. Rep. RJ2571, San Jose, Calif., July 1979.Google ScholarGoogle Scholar
  53. 53 McGEE, W.C. The information management system IMS/VS--Part II: Data base facilities; Part V: Transaction proeessing facilities. 1BM Syst. J. 16, 2 (1977).Google ScholarGoogle Scholar
  54. 54 MOHAN, C., HADERLE, D., WANG, Y., AND CHENG, J. Single table access using multiple indexes: Optimization, execution, and concurrency control techniques. In Proceedings International Conference on Extending Data Base Technology (Venice, March 1990). An expanded version of this paper is available as IBM Res. Rep. RJ7341, IBM Almaden Research Center, March 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. 55 MOHAN, C., FUSSELL, D., AND SILBERSCHATZ, A. Compatibility and commutativity of lock modes. Inf Control 61, 1 (April 1984). Also available as IBM Res. Rep. RJ3948, San Jose, Calif., July 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. 56 Moss, E., GRIFFETH, N., AND GRAHAM, M. Abstraction in reeovery management. In Proceedings A CM SIGMOD International Conference on Management of Data (Washington, D.C., May 1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. 57 MOHAN, C. ARIES/KVL: A key-value locking method for concurrency control of multiaction transactions operating on B-tree indexes. In Proceedings 16th International Conference on Very Large Data Bases (Brisbane, Aug. 1990). Another version of this paper is available as IBM Res. Rep. RJ7008, IBM Almaden Research Center, Sept. 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. 58 MOHAN, C. Commit-LSN: A novel and simple method for reducing locking and latching in transaction processing systems In Proceedings 16th International Conference on Very Large Data Bases (Brisbane, Aug. 1990). Also available as IBM Res. Rep. RJ7344, IBM Almaden Research Center, Feb. 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. 59 MOHAN, C. ARIES/LHS: A concurrency control and recovery method usmg write-ahead logging for linear hashing with separators. IBM Res. Rep., IBM Almaden Research Center, Nov. 1990.Google ScholarGoogle Scholar
  60. 60 MOHAN, C. A cost-effective method for providing improved data avallability durmg DBMS restart recovery after a failure In Proceedtngs of the 4th International Workshop on Htgh Performance Transactton Systems (Asilomar, Calif., Sept. 1991). Also available as IBM Res. Rep. RJ8114, IBM Almaden Research Center, April 1991.Google ScholarGoogle Scholar
  61. 61 Moss, E., LEBAN, B., AND CHRYSANTUtS, P. Fine grained concurrency for the database cache. In Proceedings 3rd IEEE International Conference on Data Engtneering (Los Angeles, Feb. 1987). Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. 62 MOHAN, C., AND LEVINE, F. ARIES/IM: An efficient and high concurrency index management method using write-ahead logging. IBM Res. Rep. RJ6846, IBM Almaden Research Center, Aug. 1989.Google ScholarGoogle Scholar
  63. 63 MOHAN, C., AND LtNnSAY, B. Efficient commit protocols for the tree of processes model of distributed transactions. In Proceedings 2nd A CM SIGA CT / SIGOPS Sympostum on Prmciples of Distrtbuted Computing (Montreal, Aug. 1983). Also available as IBM Res. Rep. RJ3881, IBM San Jose Research Laboratory, June 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. 64 MOHA~, C., LI~DSAY, B., AND OBE~MARCK, R. Transaction management in the R* distributed database management system. ACM Trans. Database Syst. 11, 4 (Dec. 1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. 65 MOHAN, C., AND NARANG, I. Recovery and coherency-control protocols for fast intersystem page transfer and fine-granularity locking in a shared disks transaction environment. In Proceedings 17th International Conference on Very Large Data Bases (Barcelona, Sept. 1991). A longer version is available as IBM Res. Rep. RJ8017, IBM Almaden Research Center, March 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. 66 MOU^N, C., AND NARANG, I. Efficient locking and cachmg of data in the multisystem shared disks transaction environment. In Proceedtngs of the International Conference on Extending Database Technology (Vienna, Mar. 1992). Also available as IBM Res. Rep. RJ8301, IBM Almaden Research Center, Aug. 1991.Google ScholarGoogle Scholar
  67. 67 MOHAN, C., NAR^NG, I., AND PALMER, J. A case study of problems in migrating to distributed computing: Page recovery using multiple logs in the shared disks environment. IBM Res. Rep. RJ7343, IBM Almaden Research Center, March 1990.Google ScholarGoogle Scholar
  68. 68 MOn^N, C., NARANG, I., SILEN, S. Solutions to hot spot problems in a shared disks transaction environment. In Proceedmgs of the 4th International Workshop on High Performance Transaction Systems (Asilomar, Calif., Sept. 1991). Also avaitable as IBM Res Rep. 8281, IBM Almaden Research Center, Aug. 1991.Google ScholarGoogle Scholar
  69. 69 MOHAN, C., AND PmA~ES~, H. ARIES-RRH: Restricted repeating of history in the ARIES transaction recovery method. In Proceedings 7th International Conference on Data Engineertng (Kobe, April 1991). Also available as IBM Res. Rep. RJ7342, IBM Almaden Research Center, Feb. 1990 Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. 70 MOHAN, C, AND ROTHERMEL, K. Recovery protocol for nested transactions using wriLeahead logging. IBM Tech. Dtsclosure Bull. 31, 4 (Sept 1988).Google ScholarGoogle Scholar
  71. 71 Moss, ~}_ Checkpolnt and restart in di~/cributed transac/clon systams. In Proceeclings 3rd Symposium on Reliability in Dtstributed Software and Database Systems (Clearwater Beach, Oct. 1983).Google ScholarGoogle Scholar
  72. 72 Moss, E Log-based recovery for nested transactions. In Proceedings 13th International Conference on Very Large Data Bases (Brighton, Sept. 1987). Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. 73 MottAN, C., TmEBER, K., A~I~ OBE~MA~CK, R. Algomthms for the management of remote backup databases for disaster recovery. IBM Res. Rep. RJ7885, IBM Almaden Research Center, Nov. 1990.Google ScholarGoogle Scholar
  74. 74 Nm~?, E., KAtSER, J., ANn KROGER, R. Providing recoverability in a transaction oriented distributed operating system. In Proceedings 6th International Conference on Distributed Computing Systems (Cambridge, May 1986).Google ScholarGoogle Scholar
  75. 75 NOE, J., KAISER, J., KROGER, R., AND NETT, E. The commit/abort problem in type-specific locking. GMD Tech. Rep. 267, GMD mbH, Sankt Augustin, Sept. 1987.Google ScholarGoogle Scholar
  76. 76 OBERMARCK, R. IMS/VS program isolation feature. IBM Res. Rep. RJ2879, San Jose, Calif., July 1980.Google ScholarGoogle Scholar
  77. 77 O'NEmL, P.The Escrow transaction method. ACM Trans. Database Syst. 11, 4 (Dec. 1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. 78 ONG, K. SYNAPSE approach to database recovery. In Proceedings 3rd ACM SIGACT- SIGMOD Symposium on Principles of Database Systems (Waterloo, April 1984). Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. 79 PEINL, P., REUTER, A., AND SAMMER, H. High contention in a stock trading database: A case study. In Proceedings ACM SIGMOD International Conference on Management of Data (Chicago, June 1988). Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. 80 PETERSON, R. J., AND STRICKLAND, J.P. Log write-ahead protocols and IMS/VS logging. In Proceedings 2nd ACM SIGACT-SIGMOD Symposium on Principles of Database Systems (Atlanta, Ga., March 1983). Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. 81 RENGARAJAN, T. K., SPmo, P., AND WmGHT, W. High availability mechanisms of VAX DBMS software. Digital Tech. J. 8 (Feb. 1989).Google ScholarGoogle Scholar
  82. 82 RSUTER, A. A fast transaction~oriented logging scheme for UNDO recovery. IEEE Trans. Sofiw. Eng. SE-6, 4 (July 1980).Google ScholarGoogle Scholar
  83. 83 R~UTER, A. Concurrency on high-traffic data elements. In Proceedings ACM SIGACT- SIGMOD Symposium on Principles of Database Systems (Los Angeles, March 1982). Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. 84 REUTER, A. Performance analysis of recovery techniques. ACM Trans. Database Syst. 9, 4 (Dec. 1984), 526-559. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. 85 ROTHERMEL, K., AND MOHAN, C. ARIES/NT: A recovery method based on write-ahead logging for nested transactions. In Proceedings 15th International Conference on Very Large Data Bases (Amsterdam, Aug. 1989). A longer version of this paper is available as IBM Res. Rep. RJ6650, IBM Almaden Research Center, Jan. 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. 86 ROWE, L., AND STONESRAKER, M. The commercial{ INGRES epilogue. Ch. 3 in The IN- GRES Papers, Stonebraker, M., Ed., Addson-Wesley, Reading, Mass., 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. 87 SCHWARZ, P., CHANG, W., FREYTAG, J., LOHMAN, G., McPHERSON, J., MOHAN, C., AND PIRAHESH, H. Extensibility in the Starburst database system. In Proceedings Workshop on Object-Oriented Data Base Systems (Asilomar, Sept. 1986). Also available as IBM Res. Rep. RJ5311, San Jose, Calif., Sept. 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. 88 SCHWARZ, P. Transactions on typed objects. Ph.D. dissertation, Tech. Rep. CMU-CS-84-166, Carnegie Mellon Univ., Dec. 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. 89 SHASHA, D., AND GOODMAN, N. Concurrent search structure algorithms. ACM Trans. Database Syst. 13, 1 (March 1988). Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. 90 SPECTOR, A., PAUSCH, R., AND BRUELL, G. Camelot: A flexible, distributed transaction processing system. In Proceedings IEEE Compcon Spring '88 (San Francisco, Calif., March 1988).Google ScholarGoogle ScholarCross RefCross Ref
  91. 91 SPRATT, L. The transaction resolution journal: Extending the before journal. ACM Oper. Syst. Rev. 19, 3 (July 1985). Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. 92 STONSSRAKER, M. The design of the POSTGRES storage system. In Proceedings 13th International Conference on Very Large Data Bases (Brighton, Sept. 1987). Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. 93 STmLWELL, J. W., AND RADER, P.M.IMS/VS Version i Release 3 Fast Path Notebook. Doc. G320-0149-0, IBM, Sept. 1984.Google ScholarGoogle Scholar
  94. 94 STRICKLAND, J., UHROWCZIK, P., AND WATTS, V. IMS/VS: An evolving system. IBM Syst. J. 21, 4 (1982).Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. 95 THE TANDEM DATABASE GROUP. NonStop SQL: A distributed, high-performance, high-availability implementation of SQL. In Lecture Notes in Computer Science Vol. 359, D. Gawlick, M. Haynie, and A. Reuter~ Eds., Springer-Verlag, New York, 1989.Google ScholarGoogle Scholar
  96. 96 TEND, J., AND GUMAER, R. Managing IBM Databese 2 buffers to maximize performance. IBM Syst. J. 23, 2 (1984).Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. 97 TRMGER, I. Virtua} memory management for database systems. ACM Oper. Syst. Rev. 16, 4 (Oct. 1982), 26-48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. 98 VURAL, S. A simulation study for the performance analysis of the ARIES transaction recovery method. M.Sc. thesis, Middle East Technical Univ., Ankara, Feb. 1990.Google ScholarGoogle Scholar
  99. 99 WATSON, C. T., AND ABERLE, G. F System/38 machine database support. In IBM Syst. 38/Tech. Dev., Doc. G580-0237, IBM July 1980.Google ScholarGoogle Scholar
  100. 100 WEIKUM, G. Principles and realization strategies of multi-level transaction management. ACM Trans. Database Syst. 16, i (Mar. 1991). Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. 101 WEINSTEIN, M., PAGE, T., JR, LIVEZEY, B., AND POPEK, G. Transactions and synchronization in a distributed operating system. In Proceedings lOth ACM Symposium on Operating Systems Principles (Orcas Island, Dec. 1985). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging

                Recommendations

                Reviews

                Charles William Bash

                New algorithms for database recovery and rollbacks are described. The paper assumes that the database uses write-ahead logging (WAL), but it describes in fine detail how the various activities during the update, rollback, and recovery phases are to act so as to maximize concurrency and minimize both overhead and time. In their introduction, the authors also provide an excellent description of the current state of the art of logging, failures, and recovery methods. The paper is broken into 12 sections and has an extensive bibliography (101 citations). The sections are an introduction, goals, an overview of ARIES, a description of the major data structures, a discussion of the actions that are part of normal processing (including transaction failure), a description of restart processing (after system failure), a description of the impact of checkpoints during restart, the methods necessary for media recovery, top actions (independent transactions kicked off by running transactions such as file extension), recovery paradigms (mostly problems caused by them), properties of other WAL-based methods (including references to several commercial implementations), and a summary of the attributes of ARIES. This paper is excellent both for those who wish to know more about restart/recovery methods and for those who wish to improve them. My only problem reading the paper was the profusion of three-letter acronyms. These acronyms do reduce the length of the paper significantly, and they are defined well on first usage. Due to the length of the paper, however, the reader sometimes wishes to find that definition again, which may be difficult. A short glossary would help, and if it included a reference to the defining section, the reader could again find the details easily. I would like to thank the authors for documenting this excellent work, which clearly will improve the state of the art in recovery/restart. I recommend it for all who are involved in database management system design or wish to understand the internals better.

                Access critical reviews of Computing literature here

                Become a reviewer for Computing Reviews.

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader