Transactional Information Systems:
|
|
|
- Joanna Henderson
- 9 years ago
- Views:
Transcription
1 Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery Gerhard Weikum and Gottfried Vossen 2002 Morgan Kaufmann ISBN Teamwork is essential. It allows you to blame someone else. (Anonymous) 1 / 17
2 Part III: Recovery 11 Transaction Recovery 12 Crash Recovery: Notion of Correctness 13 Page-Model Crash Recovery Algorithms 14 Object-Model Crash Recovery Algorithms 15 Special Issues of Recovery 16 Media Recovery 17 Application Recovery 2 / 17
3 Chapter 12: Crash Recovery Notion of Correctness 12.2 System Architecture and Interfaces 12.3 System Model 12.4 Correctness Criterion 12.5 Roadmap of Algorithms 12.6 Lessons Learned We will meet again if your memory serves you well. (Bob Dylan) 3 / 17
4 Goal of Crash Recovery Failure-resilience: redo recovery for committed transactions undo recovery for uncommitted transactions Failure model: soft (no damage to secondary storage) fail-stop (no unbounded failure propagation) captures most (server) software failures, both Bohrbugs and Heisenbugs Requirements: fast restart for high availability (= MTTF / (MTTF + MTTR) ) low overhead during normal operation simplicity, testability, very high confidence in correctness 4 / 17
5 Examples Server fails once a month, recovery takes 2 hours 720/722 = 0,997 i.e., server availability is 99,7 % server is down 26 hours per year Server fails every 48 hours, but can recover within 30 sec / = 0,9998 i.e., server availability is 99,98 % server is down 105 min per year Fast recovery is essential, not long uptime! 5 / 17
6 Actions During Normal Operation All of the following actions are tagged with unique, monotonically increasing sequence numbers Transaction actions: begin (t) commit (t) rollback (t) save (t) restore (t, s) Data actions: read (pageno, t) write (pageno, t) full-write (pageno, t) exec (op, obj, t) Caching actions: fetch (pageno) flush (pageno) Log actions: force ( ) 6 / 17
7 Overview of System Architecture Database Cache Database Server Volatile Memory Stable Storage read write Database Page begin commit, rollback write Log Buffer Log Entry fetch flush force Stable Database Database Page Stable Log Log Entry 7 / 17
8 Chapter 12: Crash Recovery Notion of Correctness 12.2 System Architecture and Interfaces 12.3 System Model 12.4 Correctness Criterion 12.5 Roadmap of Algorithms 12.6 Lessons Learned 8 / 17
9 Logging Definition 12.1 (Extended History): The extended history of a transactional data server is a partially ordered forest of actions where the roots are transaction identifiers or caching actions, the leaves are read, write, or full-write actions or transaction actions, only exec actions can appear as intermediate nodes, and the ordering of actions is tree-consistent. Definition 12.2 (Stable Log): For a given extended history the stable log is a totally ordered subset of the history's actions such that the log ordering is compatible with the history order. Definition 12.3 (Log Buffer): For a given extended history the log buffer is a totally ordered subset of the history's actions such that the log ordering is compatible with the history order and all entries in the log buffer follow (w.r.t. the total order) all entries in the stable log. 9 / 17
10 Impact of Caching Definition 12.4 (Cached Database): For a given extended history the cached database is a partially ordered subset of the history's write actions such that the order is a subset of the the history order, and for each page p the maximum element among the write actions on p in the history is also the maximum element for p in the cached database. Definition 12.5 (Stable database): For a given extended history the stable database is a partially ordered subset of the history's write actions such that the order is a subset of the history order, and for each page p all write actions on p that precede the most recent flush(p) in the history are included in the stable database, and the maximum element among all included write actions in the history is also the maximum element for p in the stable database. The maximum element among all writes on a page p is tracked by the page sequence number in the header of p. 10 / 17
11 Chapter 12: Crash Recovery Notion of Correctness 12.2 System Architecture and Interfaces 12.3 System Model 12.4 Correctness Criterion 12.5 Roadmap of Algorithms 12.6 Lessons Learned 11 / 17
12 Correctness Criterion Definition 12.6 (Correct Crash Recovery): A crash recovery algorithm is correct if it guarantees that, after a system failure, the cached database will eventually, i.e., possibly after repeated failures and restarts, be equivalent (i.e., reducible) to a serial order of the committed transactions that coincides with the serialization order of the history. 12 / 17
13 Logging Rules Definition 12.7 (Logging Rules): During normal operation, a recovery algorithm satisfies the redo logging rule if for every committed transaction t, all data actions of t are in the stable log or the stable database, the undo logging rule if for every data action p of an uncommitted transaction t the presence of p in the stable database implies that p is in the stable log, the garbage collection rule if for every data action p of transaction t the absence of p from the stable log implies that p is in the stable database if and only if t is committed. 13 / 17
14 Chapter 12: Crash Recovery Notion of Correctness 12.2 System Architecture and Interfaces 12.3 System Model 12.4 Correctness Criterion 12.5 Roadmap of Algorithms 12.6 Lessons Learned 14 / 17
15 Taxonomy of Crash-Recovery Algorithms crash recovery algorithms update-in-place (with-undo) deferred-update (no-undo) with-undo / with-redo (steal / no-force) with-undo / no-redo (steal / force) no-undo / with-redo (no-steal / no-force) no-undo / no-redo (no-steal / force) steal/no-force algorithms are most versatile and cost-effective 15 / 17
16 Chapter 12: Crash Recovery Notion of Correctness 12.2 System Architecture and Interfaces 12.3 System Model 12.4 Correctness Criterion 12.5 Roadmap of Algorithms 12.6 Lessons Learned 16 / 17
17 Lessons Learned During normal operation and during restart, operations are captured in the log buffer, the stable log, the cached database, and the stable database. Correct recovery requires preserving the original serialization order of the committed transactions. The redo logging, undo logging, and garbage collection rules are necessary prerequisites for the ability to provide correct recovery. 17 / 17
Recovery and the ACID properties CMPUT 391: Implementing Durability Recovery Manager Atomicity Durability
Database Management Systems Winter 2004 CMPUT 391: Implementing Durability Dr. Osmar R. Zaïane University of Alberta Lecture 9 Chapter 25 of Textbook Based on slides by Lewis, Bernstein and Kifer. University
Recovery: Write-Ahead Logging
Recovery: Write-Ahead Logging EN 600.316/416 Instructor: Randal Burns 4 March 2009 Department of Computer Science, Johns Hopkins University Overview Log-based recovery Undo logging Redo logging Restart
Information Systems. Computer Science Department ETH Zurich Spring 2012
Information Systems Computer Science Department ETH Zurich Spring 2012 Lecture VI: Transaction Management (Recovery Manager) Recovery Manager ETH Zurich, Spring 2012 Information Systems 3 Failure Recovery
UVA. Failure and Recovery. Failure and inconsistency. - transaction failures - system failures - media failures. Principle of recovery
Failure and Recovery Failure and inconsistency - transaction failures - system failures - media failures Principle of recovery - redundancy - DB can be protected by ensuring that its correct state can
! Volatile storage: ! Nonvolatile storage:
Chapter 17: Recovery System Failure Classification! Failure Classification! Storage Structure! Recovery and Atomicity! Log-Based Recovery! Shadow Paging! Recovery With Concurrent Transactions! Buffer Management!
Chapter 14: Recovery System
Chapter 14: Recovery System Chapter 14: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Remote Backup Systems Failure Classification Transaction failure
Chapter 16: Recovery System
Chapter 16: Recovery System Failure Classification Failure Classification Transaction failure : Logical errors: transaction cannot complete due to some internal error condition System errors: the database
Last Class Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications
Last Class Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications C. Faloutsos A. Pavlo Lecture#23: Crash Recovery Part 2 (R&G ch. 18) Write-Ahead Log Checkpoints Logging Schemes
Chapter 15: Recovery System
Chapter 15: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Shadow Paging Recovery With Concurrent Transactions Buffer Management Failure with Loss of
DATABASDESIGN FÖR INGENJÖRER - 1DL124
1 DATABASDESIGN FÖR INGENJÖRER - 1DL124 Sommar 2005 En introduktionskurs i databassystem http://user.it.uu.se/~udbl/dbt-sommar05/ alt. http://www.it.uu.se/edu/course/homepage/dbdesign/st05/ Kjell Orsborn
Database Concurrency Control and Recovery. Simple database model
Database Concurrency Control and Recovery Pessimistic concurrency control Two-phase locking (2PL) and Strict 2PL Timestamp ordering (TSO) and Strict TSO Optimistic concurrency control (OCC) definition
Transactions and Recovery. Database Systems Lecture 15 Natasha Alechina
Database Systems Lecture 15 Natasha Alechina In This Lecture Transactions Recovery System and Media Failures Concurrency Concurrency problems For more information Connolly and Begg chapter 20 Ullmanand
How To Recover From Failure In A Relational Database System
Chapter 17: Recovery System Database System Concepts See www.db-book.com for conditions on re-use Chapter 17: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery
Review: The ACID properties
Recovery Review: The ACID properties A tomicity: All actions in the Xaction happen, or none happen. C onsistency: If each Xaction is consistent, and the DB starts consistent, it ends up consistent. I solation:
Outline. Failure Types
Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten
Recovery: An Intro to ARIES Based on SKS 17. Instructor: Randal Burns Lecture for April 1, 2002 Computer Science 600.416 Johns Hopkins University
Recovery: An Intro to ARIES Based on SKS 17 Instructor: Randal Burns Lecture for April 1, 2002 Computer Science 600.416 Johns Hopkins University Log-based recovery Undo logging Redo logging Restart recovery
Introduction to Database Management Systems
Database Administration Transaction Processing Why Concurrency Control? Locking Database Recovery Query Optimization DB Administration 1 Transactions Transaction -- A sequence of operations that is regarded
Crash Recovery. Chapter 18. Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke
Crash Recovery Chapter 18 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke Review: The ACID properties A tomicity: All actions in the Xact happen, or none happen. C onsistency: If each Xact
Recovery Principles in MySQL Cluster 5.1
Recovery Principles in MySQL Cluster 5.1 Mikael Ronström Senior Software Architect MySQL AB 1 Outline of Talk Introduction of MySQL Cluster in version 4.1 and 5.0 Discussion of requirements for MySQL Cluster
Recovery System C H A P T E R16. Practice Exercises
C H A P T E R16 Recovery System Practice Exercises 16.1 Explain why log records for transactions on the undo-list must be processed in reverse order, whereas redo is performed in a forward direction. Answer:
Recovery algorithms are techniques to ensure transaction atomicity and durability despite failures. Two main approaches in recovery process
Database recovery techniques Instructor: Mr Mourad Benchikh Text Books: Database fundamental -Elmesri & Navathe Chap. 21 Database systems the complete book Garcia, Ullman & Widow Chap. 17 Oracle9i Documentation
DB2 backup and recovery
DB2 backup and recovery IBM Information Management Cloud Computing Center of Competence IBM Canada Lab 1 2011 IBM Corporation Agenda Backup and recovery overview Database logging Backup Recovery 2 2011
Unit 12 Database Recovery
Unit 12 Database Recovery 12-1 Contents 12.1 Introduction 12.2 Transactions 12.3 Transaction Failures and Recovery 12.4 System Failures and Recovery 12.5 Media Failures and Recovery Wei-Pang Yang, Information
CS 245 Final Exam Winter 2013
CS 245 Final Exam Winter 2013 This exam is open book and notes. You can use a calculator and your laptop to access course notes and videos (but not to communicate with other people). You have 140 minutes
Chapter 10: Distributed DBMS Reliability
Chapter 10: Distributed DBMS Reliability Definitions and Basic Concepts Local Recovery Management In-place update, out-of-place update Distributed Reliability Protocols Two phase commit protocol Three
Redo Recovery after System Crashes
Redo Recovery after System Crashes David Lomet Microsoft Corporation One Microsoft Way Redmond, WA 98052 [email protected] Mark R. Tuttle Digital Equipment Corporation One Kendall Square Cambridge, MA
Lesson 12: Recovery System DBMS Architectures
Lesson 12: Recovery System DBMS Architectures Contents Recovery after transactions failure Data access and physical disk operations Log-Based Recovery Checkpoints Recovery With Concurrent Transactions
Recovery Protocols For Flash File Systems
Recovery Protocols For Flash File Systems Ravi Tandon and Gautam Barua Indian Institute of Technology Guwahati, Department of Computer Science and Engineering, Guwahati - 781039, Assam, India {r.tandon}@alumni.iitg.ernet.in
Transaction Management Overview
Transaction Management Overview Chapter 16 Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Transactions Concurrent execution of user programs is essential for good DBMS performance. Because
Recovery Theory. Storage Types. Failure Types. Theory of Recovery. Volatile storage main memory, which does not survive crashes.
Storage Types Recovery Theory Volatile storage main memory, which does not survive crashes. Non-volatile storage tape, disk, which survive crashes. Stable storage information in stable storage is "never"
Crashes and Recovery. Write-ahead logging
Crashes and Recovery Write-ahead logging Announcements Exams back at the end of class Project 2, part 1 grades tags/part1/grades.txt Last time Transactions and distributed transactions The ACID properties
Oracle Architecture. Overview
Oracle Architecture Overview The Oracle Server Oracle ser ver Instance Architecture Instance SGA Shared pool Database Cache Redo Log Library Cache Data Dictionary Cache DBWR LGWR SMON PMON ARCn RECO CKPT
Course Content. Transactions and Concurrency Control. Objectives of Lecture 4 Transactions and Concurrency Control
Database Management Systems Fall 2001 CMPUT 391: Transactions & Concurrency Control Dr. Osmar R. Zaïane University of Alberta Chapters 18 and 19 of Textbook Course Content Introduction Database Design
COS 318: Operating Systems
COS 318: Operating Systems File Performance and Reliability Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics File buffer cache
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals
Oracle Database 10g: Backup and Recovery 1-2
Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed
Cloud Computing at Google. Architecture
Cloud Computing at Google Google File System Web Systems and Algorithms Google Chris Brooks Department of Computer Science University of San Francisco Google has developed a layered system to handle webscale
How To Write A Transaction System
Chapter 20: Advanced Transaction Processing Remote Backup Systems Transaction-Processing Monitors High-Performance Transaction Systems Long-Duration Transactions Real-Time Transaction Systems Weak Levels
File System Reliability (part 2)
File System Reliability (part 2) Main Points Approaches to reliability Careful sequencing of file system opera@ons Copy- on- write (WAFL, ZFS) Journalling (NTFS, linux ext4) Log structure (flash storage)
Performance Tuning for the Teradata Database
Performance Tuning for the Teradata Database Matthew W Froemsdorf Teradata Partner Engineering and Technical Consulting - i - Document Changes Rev. Date Section Comment 1.0 2010-10-26 All Initial document
Textbook and References
Transactions Qin Xu 4-323A Life Science Building, Shanghai Jiao Tong University Email: [email protected] Tel: 34204573(O) Webpage: http://cbb.sjtu.edu.cn/~qinxu/ Webpage for DBMS Textbook and References
Lecture 18: Reliable Storage
CS 422/522 Design & Implementation of Operating Systems Lecture 18: Reliable Storage Zhong Shao Dept. of Computer Science Yale University Acknowledgement: some slides are taken from previous versions of
Synchronization and recovery in a client-server storage system
The VLDB Journal (1997) 6: 209 223 The VLDB Journal c Springer-Verlag 1997 Synchronization and recovery in a client-server storage system E. Panagos, A. Biliris AT&T Research, 600 Mountain Avenue, Murray
Module 2: Database Architecture
Module 2: Database Architecture Overview Schema and Data Structure (Objects) Storage Architecture Data Blocks, Extents, and Segments Storage Allocation Managing Extents and Pages Tablespaces and Datafiles
- An Oracle9i RAC Solution
High Availability and Scalability Technologies - An Oracle9i RAC Solution Presented by: Arquimedes Smith Oracle9i RAC Architecture Real Application Cluster (RAC) is a powerful new feature in Oracle9i Database
Agenda. Transaction Manager Concepts ACID. DO-UNDO-REDO Protocol DB101
Concepts Agenda Database Concepts Overview ging, REDO and UNDO Two Phase Distributed Processing Dr. Nick Bowen, VP UNIX and xseries SW Development October 17, 2003 Yale Oct 2003 Database System ACID index
HP OpenView Smart Plug-in for Microsoft SQL Server
HP OpenView Smart Plug-in for Microsoft SQL Server Product brief The HP OpenView Smart Plug-in (SPI) for Microsoft (MS) SQL Server is the intelligent choice for managing SQL Server environments of any
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Seth Gilbert Nancy Lynch Abstract When designing distributed web services, there are three properties that
D12C-AIU Oracle Database 12c: Admin, Install and Upgrade Accelerated NEW
D12C-AIU Oracle Database 12c: Admin, Install and Upgrade Accelerated NEW Duration: 5 Days What you will learn This Oracle Database 12c: Admin, Install and Upgrade Accelerated course will provide you with
Using Logs to Increase Availability in Real-Time. Tiina Niklander and Kimmo Raatikainen. University of Helsinki, Department of Computer Science
Using Logs to Increase Availability in Real-Time Main-Memory Tiina Niklander and Kimmo Raatikainen University of Helsinki, Department of Computer Science P.O. Box 26(Teollisuuskatu 23), FIN-14 University
Transaction Processing Monitors
Chapter 24: Advanced Transaction Processing! Transaction-Processing Monitors! Transactional Workflows! High-Performance Transaction Systems! Main memory databases! Real-Time Transaction Systems! Long-Duration
The Google File System
The Google File System By Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung (Presented at SOSP 2003) Introduction Google search engine. Applications process lots of data. Need good file system. Solution:
Oracle 11g DBA Training Course Content
Oracle 11g DBA Training Course Content ORACLE 10g/11g DATABASE ADMINISTRATION CHAPTER1 Important Linux commands Installing of Redhat Linux as per oracle database requirement Installing of oracle database
Data Management in the Cloud
Data Management in the Cloud Ryan Stern [email protected] : Advanced Topics in Distributed Systems Department of Computer Science Colorado State University Outline Today Microsoft Cloud SQL Server
6. Backup and Recovery 6-1. DBA Certification Course. (Summer 2008) Recovery. Log Files. Backup. Recovery
6. Backup and Recovery 6-1 DBA Certification Course (Summer 2008) Chapter 6: Backup and Recovery Log Files Backup Recovery 6. Backup and Recovery 6-2 Objectives After completing this chapter, you should
File-System Implementation
File-System Implementation 11 CHAPTER In this chapter we discuss various methods for storing information on secondary storage. The basic issues are device directory, free space management, and space allocation
Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays
Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays V Tsutomu Akasaka (Manuscript received July 5, 2005) This paper gives an overview of a storage-system remote copy function and the implementation
Course 20462C: Administering Microsoft SQL Server Databases
Course 20462C: Administering Microsoft SQL Server Databases Duration: 35 hours About this Course The course focuses on teaching individuals how to use SQL Server 2014 product features and tools related
High Availability Essentials
High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result
Tashkent: Uniting Durability with Transaction Ordering for High-Performance Scalable Database Replication
EuroSys 2006 117 Tashkent: Uniting Durability with Transaction Ordering for High-Performance Scalable Database Replication Sameh Elnikety Steven Dropsho Fernando Pedone School of Computer and Communication
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
www.wardyit.com [email protected] Administering Microsoft SQL Server Databases
Administering Microsoft SQL Server Databases This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The course focuses on
UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)
Audience Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Related Training Required Prerequisites Working knowledge of SQL and use of PL/SQL
DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager
DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database
How To Improve Performance On A Single Chip Computer
: Redundant Arrays of Inexpensive Disks this discussion is based on the paper:» A Case for Redundant Arrays of Inexpensive Disks (),» David A Patterson, Garth Gibson, and Randy H Katz,» In Proceedings
EMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
Promise of Low-Latency Stable Storage for Enterprise Solutions
Promise of Low-Latency Stable Storage for Enterprise Solutions Janet Wu Principal Software Engineer Oracle [email protected] Santa Clara, CA 1 Latency Sensitive Applications Sample Real-Time Use Cases
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
COURCE TITLE DURATION. Oracle Database 11g: Administration Workshop I
COURCE TITLE DURATION DBA 11g Oracle Database 11g: Administration Workshop I 40 H. What you will learn: This course is designed to give students a firm foundation in basic administration of Oracle Database
Oracle Database 12c: Administration Workshop NEW
Oracle University Contact Us: 1.800.529.0165 Oracle Database 12c: Administration Workshop NEW Duration: 5 Days What you will learn The Oracle Database 12c: Administration Workshop will teach you about
DataBlitz Main Memory DataBase System
DataBlitz Main Memory DataBase System What is DataBlitz? DataBlitz is a general purpose Main Memory DataBase System that enables: Ð high-speed access to data Ð concurrent access to shared data Ð data integrity
CS3210: Crash consistency. Taesoo Kim
1 CS3210: Crash consistency Taesoo Kim 2 Administrivia Quiz #2. Lab4-5, Ch 3-6 (read "xv6 book") Open laptop/book, no Internet 3:05pm ~ 4:25-30pm (sharp) NOTE Lab6: 10% bonus, a single lab (bump up your
INTRODUCTION TO DATABASE SYSTEMS
1 INTRODUCTION TO DATABASE SYSTEMS Exercise 1.1 Why would you choose a database system instead of simply storing data in operating system files? When would it make sense not to use a database system? Answer
Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
ARIES: A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging
ARIES: A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging C. MOHAN IBM Almaden Research Center and DON HADERLE IBM Santa Teresa Laboratory
D-ARIES: A Distributed Version of the ARIES Recovery Algorithm
D-ARIES: A Distributed Version of the ARIES Recovery Algorithm Jayson Speer and Markus Kirchberg Information Science Research Centre, Department of Information Systems, Massey University, Private Bag 11
Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 2 Hardware Basics Win2K File System Formats Sector: addressable block on storage medium usually 512 bytes (x86 disks) Cluster:
Replication on Virtual Machines
Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism
Chapter 10. Backup and Recovery
Chapter 10. Backup and Recovery Table of Contents Objectives... 1 Relationship to Other Units... 2 Introduction... 2 Context... 2 A Typical Recovery Problem... 3 Transaction Loggoing... 4 System Log...
Journaling the Linux ext2fs Filesystem
Journaling the Linux ext2fs Filesystem Stephen C. Tweedie [email protected] Abstract This paper describes a work-in-progress to design and implement a transactional metadata journal for the Linux ext2fs
Persistent Binary Search Trees
Persistent Binary Search Trees Datastructures, UvA. May 30, 2008 0440949, Andreas van Cranenburgh Abstract A persistent binary tree allows access to all previous versions of the tree. This paper presents
