Recovery Theory. Storage Types. Failure Types. Theory of Recovery. Volatile storage main memory, which does not survive crashes.
|
|
|
- Oscar Gregory
- 10 years ago
- Views:
Transcription
1 Storage Types Recovery Theory Volatile storage main memory, which does not survive crashes. Non-volatile storage tape, disk, which survive crashes. Stable storage information in stable storage is "never" lost. There is no such physical medium; it is an approximation that is implemented. 1 2 Failure Types Theory of Recovery Program Failures logical errors, bad input, unavailable data, user cancellation resource limits System Failures computer hardware malfunction, power failures bugs in O.S, operator error Media Failures disk head crash, data transfer error, disk controller failure Unrecoverable errors failure to make archive dumps destruction of archives The goals of the recovery system are: When a transaction T commits Make the updates permanent in the database so that they can survive subsequent failures. When a transaction T aborts Obliterate any updates on data items by aborted transactions in the database. Obliterate the effects of T on other transactions; i.e., transactions that read data items updated by T. When the system crashes after a system or media failure Bring the database to its most recent consistent state
2 Recovery Actions Recovering from Failures Recovery protocols implement two actions: Undo action: required for atomicity. Undoes all updates on the stable storage by an uncommitted transaction. Redo action: required for durability Redoes the update (on the stable storage) of committed transaction. Program Failures System Failures Media Failures Transaction Undo - Removes all the updates of the aborted transaction - Does not affect any other transaction Global Undo Partial Redo - Effects of committed transactions are reflected in the database Global Redo 5 6 Cascading Aborts Recoverable Executions (RC) Consider the execution: w 1 (x) r 2 (x) If T 1 aborts, T 2 must also abort. T 2 has an abort dependency on T 1. In general, any transaction that reads data items updated (written) by a transaction that aborts must also be aborted. What will happen if T 2 is committed before T 1 is aborted? w 1 (x) r 2 (x) c 2 α 1 The system cannot abort T 2 without violating the semantics of commit operations. To prevent unrecoverable situations the TM must keep full track of read/write operations and delay commit requests of transactions. A transaction T m reads x from transaction T n in an execution if T m reads x after T n has written into it T n does not abort before T m reads x and T k : wtk (x) occurred between wtn(x) and rtm(x), αtk precedes rtm(x)
3 Recoverable Executions (RC) Effects of Cascading Aborts An execution is recoverable (RC) if for every transaction T n commits, T n 's commit follows the commitment of every transaction T m from which T n reads. RULE 0: Delay the commit of a transaction that reads uncommitted data. Significant bookkeeping of who updated what and who read what is required. Transactions may be forced to abort because some other transaction happened to abort and all the effects of the aborted transaction need to be undone (isolation?). Significant amount of computation may be lost due to cascading aborts. In practice, most DBMS are designed to avoid cascading aborts Avoiding Cascading Aborts (ACA) Undoing Writes An execution avoids cascading aborts (ACA) if whenever a transaction T n reads data updated by T m, T m has already committed. That is it ensures that every transaction reads only those values there were written by committed transactions. This means the DBMS must delay each r(x) until all transactions that previously issued a w(x) have either aborted or committed. Assume Database = { x, y } with initial values x = 1, y = 0 Transactions: T1: write(x, 2); write(y, 3); abort T2: write(x, 8); write(y, 9); abort RULE 1: Do not permit reading of uncommitted data. Note rule 1 is stronger than Rule 0 (the necessary condition for recoverability)
4 An interleaved execution The Lost Update Problem T1 T2 before image of write(x, 8) x = 1 write(y, 9) y = 0 write(x, 2) x = 8 abort write(y, 3) y = 0 abort when T2 aborts x = before image of w 2 (x, 8) => x = 1 y = before image of w 2 (y, 9) => y = 0 when T1 aborts x = before image of w 1 (x, 2) => x = 8 y = before image of w 1 (y, 3) => y = 0 13 Assume Database = { x, y } initially x = 1, y = 0 Transactions: T1: write(x, 2); write(y, 3); abort T2: write(x, 8); write(y, 9); commit Consider the following execution w 1 (x, 2); w 2 (x, 8); w 2 (y, 9); c 2 ; w 1 (y, 3); α 1 What is the state of the database after this execution? 14 Strict Executions Recovery Correctness Criteria To solve the undoing writes problem, we must delay the execution of a write(x, val) operation until the transaction that has previously written x terminates, i.e., commits or aborts. An execution is strict (ST) if it avoids cascading aborts and overwriting of uncommitted data; i.e., it is ACA and RC. That is, a transaction T n can read or write a data item updated (written) by T m only after T m commits or aborts. RC ACA ST All Histories RC ACA ST RULE 2: Do not permit overwriting of uncommitted data
5 Reliability and Serializability All histories VSR CSR RC ACA ST RIG SERIAL 17 5
Transactions and Recovery. Database Systems Lecture 15 Natasha Alechina
Database Systems Lecture 15 Natasha Alechina In This Lecture Transactions Recovery System and Media Failures Concurrency Concurrency problems For more information Connolly and Begg chapter 20 Ullmanand
Chapter 14: Recovery System
Chapter 14: Recovery System Chapter 14: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Remote Backup Systems Failure Classification Transaction failure
Review: The ACID properties
Recovery Review: The ACID properties A tomicity: All actions in the Xaction happen, or none happen. C onsistency: If each Xaction is consistent, and the DB starts consistent, it ends up consistent. I solation:
Transaction Management Overview
Transaction Management Overview Chapter 16 Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Transactions Concurrent execution of user programs is essential for good DBMS performance. Because
Course Content. Transactions and Concurrency Control. Objectives of Lecture 4 Transactions and Concurrency Control
Database Management Systems Fall 2001 CMPUT 391: Transactions & Concurrency Control Dr. Osmar R. Zaïane University of Alberta Chapters 18 and 19 of Textbook Course Content Introduction Database Design
Chapter 15: Recovery System
Chapter 15: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Shadow Paging Recovery With Concurrent Transactions Buffer Management Failure with Loss of
Recovery and the ACID properties CMPUT 391: Implementing Durability Recovery Manager Atomicity Durability
Database Management Systems Winter 2004 CMPUT 391: Implementing Durability Dr. Osmar R. Zaïane University of Alberta Lecture 9 Chapter 25 of Textbook Based on slides by Lewis, Bernstein and Kifer. University
! Volatile storage: ! Nonvolatile storage:
Chapter 17: Recovery System Failure Classification! Failure Classification! Storage Structure! Recovery and Atomicity! Log-Based Recovery! Shadow Paging! Recovery With Concurrent Transactions! Buffer Management!
How To Recover From Failure In A Relational Database System
Chapter 17: Recovery System Database System Concepts See www.db-book.com for conditions on re-use Chapter 17: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery
Chapter 16: Recovery System
Chapter 16: Recovery System Failure Classification Failure Classification Transaction failure : Logical errors: transaction cannot complete due to some internal error condition System errors: the database
Database Tuning and Physical Design: Execution of Transactions
Database Tuning and Physical Design: Execution of Transactions David Toman School of Computer Science University of Waterloo Introduction to Databases CS348 David Toman (University of Waterloo) Transaction
Information Systems. Computer Science Department ETH Zurich Spring 2012
Information Systems Computer Science Department ETH Zurich Spring 2012 Lecture VI: Transaction Management (Recovery Manager) Recovery Manager ETH Zurich, Spring 2012 Information Systems 3 Failure Recovery
Chapter 10: Distributed DBMS Reliability
Chapter 10: Distributed DBMS Reliability Definitions and Basic Concepts Local Recovery Management In-place update, out-of-place update Distributed Reliability Protocols Two phase commit protocol Three
Unit 12 Database Recovery
Unit 12 Database Recovery 12-1 Contents 12.1 Introduction 12.2 Transactions 12.3 Transaction Failures and Recovery 12.4 System Failures and Recovery 12.5 Media Failures and Recovery Wei-Pang Yang, Information
Recovery: Write-Ahead Logging
Recovery: Write-Ahead Logging EN 600.316/416 Instructor: Randal Burns 4 March 2009 Department of Computer Science, Johns Hopkins University Overview Log-based recovery Undo logging Redo logging Restart
Concurrency control. Concurrency problems. Database Management System
Concurrency control Transactions per second (tps) is the measure of the workload of a operational DBMS; if two transactions access concurrently to the same data there is a problem: the module who resolve
UVA. Failure and Recovery. Failure and inconsistency. - transaction failures - system failures - media failures. Principle of recovery
Failure and Recovery Failure and inconsistency - transaction failures - system failures - media failures Principle of recovery - redundancy - DB can be protected by ensuring that its correct state can
Recovery: An Intro to ARIES Based on SKS 17. Instructor: Randal Burns Lecture for April 1, 2002 Computer Science 600.416 Johns Hopkins University
Recovery: An Intro to ARIES Based on SKS 17 Instructor: Randal Burns Lecture for April 1, 2002 Computer Science 600.416 Johns Hopkins University Log-based recovery Undo logging Redo logging Restart recovery
Last Class Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications
Last Class Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications C. Faloutsos A. Pavlo Lecture#23: Crash Recovery Part 2 (R&G ch. 18) Write-Ahead Log Checkpoints Logging Schemes
Transactions. SET08104 Database Systems. Copyright @ Napier University
Transactions SET08104 Database Systems Copyright @ Napier University Concurrency using Transactions The goal in a concurrent DBMS is to allow multiple users to access the database simultaneously without
Concurrency Control. Module 6, Lectures 1 and 2
Concurrency Control Module 6, Lectures 1 and 2 The controlling intelligence understands its own nature, and what it does, and whereon it works. -- Marcus Aurelius Antoninus, 121-180 A. D. Database Management
Datenbanksysteme II: Implementation of Database Systems Recovery Undo / Redo
Datenbanksysteme II: Implementation of Database Systems Recovery Undo / Redo Material von Prof. Johann Christoph Freytag Prof. Kai-Uwe Sattler Prof. Alfons Kemper, Dr. Eickler Prof. Hector Garcia-Molina
Chapter 10. Backup and Recovery
Chapter 10. Backup and Recovery Table of Contents Objectives... 1 Relationship to Other Units... 2 Introduction... 2 Context... 2 A Typical Recovery Problem... 3 Transaction Loggoing... 4 System Log...
Outline. Failure Types
Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten
Database Concurrency Control and Recovery. Simple database model
Database Concurrency Control and Recovery Pessimistic concurrency control Two-phase locking (2PL) and Strict 2PL Timestamp ordering (TSO) and Strict TSO Optimistic concurrency control (OCC) definition
Special Relativity and the Problem of Database Scalability
Special Relativity and the Problem of Database Scalability James Starkey NimbusDB, Inc. The problem, some jargon, some physics, a little theory, and then NimbusDB. Problem: Database systems scale badly
Introduction to Database Systems. Module 1, Lecture 1. Instructor: Raghu Ramakrishnan [email protected] UW-Madison
Introduction to Database Systems Module 1, Lecture 1 Instructor: Raghu Ramakrishnan [email protected] UW-Madison Database Management Systems, R. Ramakrishnan 1 What Is a DBMS? A very large, integrated
Recovery System C H A P T E R16. Practice Exercises
C H A P T E R16 Recovery System Practice Exercises 16.1 Explain why log records for transactions on the undo-list must be processed in reverse order, whereas redo is performed in a forward direction. Answer:
Lesson 12: Recovery System DBMS Architectures
Lesson 12: Recovery System DBMS Architectures Contents Recovery after transactions failure Data access and physical disk operations Log-Based Recovery Checkpoints Recovery With Concurrent Transactions
Transaction Processing Monitors
Chapter 24: Advanced Transaction Processing! Transaction-Processing Monitors! Transactional Workflows! High-Performance Transaction Systems! Main memory databases! Real-Time Transaction Systems! Long-Duration
Roadmap. 15-721 DB Sys. Design & Impl. Detailed Roadmap. Paper. Transactions - dfn. Reminders: Locking and Consistency
15-721 DB Sys. Design & Impl. Locking and Consistency Christos Faloutsos www.cs.cmu.edu/~christos Roadmap 1) Roots: System R and Ingres 2) Implementation: buffering, indexing, q-opt 3) Transactions: locking,
INTRODUCTION TO DATABASE SYSTEMS
1 INTRODUCTION TO DATABASE SYSTEMS Exercise 1.1 Why would you choose a database system instead of simply storing data in operating system files? When would it make sense not to use a database system? Answer
Transactions and the Internet
Transactions and the Internet Week 12-13 Week 12-13 MIE253-Consens 1 Schedule Week Date Lecture Topic 1 Jan 9 Introduction to Data Management 2 Jan 16 The Relational Model 3 Jan. 23 Constraints and SQL
Introduction to Database Management Systems
Database Administration Transaction Processing Why Concurrency Control? Locking Database Recovery Query Optimization DB Administration 1 Transactions Transaction -- A sequence of operations that is regarded
Introduction to Database Systems CS4320. Instructor: Christoph Koch [email protected] CS 4320 1
Introduction to Database Systems CS4320 Instructor: Christoph Koch [email protected] CS 4320 1 CS4320/1: Introduction to Database Systems Underlying theme: How do I build a data management system? CS4320
Recovery algorithms are techniques to ensure transaction atomicity and durability despite failures. Two main approaches in recovery process
Database recovery techniques Instructor: Mr Mourad Benchikh Text Books: Database fundamental -Elmesri & Navathe Chap. 21 Database systems the complete book Garcia, Ullman & Widow Chap. 17 Oracle9i Documentation
Failure Recovery Himanshu Gupta CSE 532-Recovery-1
Failure Recovery CSE 532-Recovery-1 Data Integrity Protect data from system failures Key Idea: Logs recording change history. Today. Chapter 17. Maintain data integrity, when several queries/modifications
Restore and Recovery Tasks. Copyright 2009, Oracle. All rights reserved.
Restore and Recovery Tasks Objectives After completing this lesson, you should be able to: Describe the causes of file loss and determine the appropriate action Describe major recovery operations Back
CHAPTER 6: DISTRIBUTED FILE SYSTEMS
CHAPTER 6: DISTRIBUTED FILE SYSTEMS Chapter outline DFS design and implementation issues: system structure, access, and sharing semantics Transaction and concurrency control: serializability and concurrency
Agenda. Transaction Manager Concepts ACID. DO-UNDO-REDO Protocol DB101
Concepts Agenda Database Concepts Overview ging, REDO and UNDO Two Phase Distributed Processing Dr. Nick Bowen, VP UNIX and xseries SW Development October 17, 2003 Yale Oct 2003 Database System ACID index
Chapter 6 The database Language SQL as a tutorial
Chapter 6 The database Language SQL as a tutorial About SQL SQL is a standard database language, adopted by many commercial systems. ANSI SQL, SQL-92 or SQL2, SQL99 or SQL3 extends SQL2 with objectrelational
Goals. Managing Multi-User Databases. Database Administration. DBA Tasks. (Kroenke, Chapter 9) Database Administration. Concurrency Control
Goals Managing Multi-User Databases Database Administration Concurrency Control (Kroenke, Chapter 9) 1 Kroenke, Database Processing 2 Database Administration All large and small databases need database
Topics. Introduction to Database Management System. What Is a DBMS? DBMS Types
Introduction to Database Management System Linda Wu (CMPT 354 2004-2) Topics What is DBMS DBMS types Files system vs. DBMS Advantages of DBMS Data model Levels of abstraction Transaction management DBMS
Microkernels & Database OSs. Recovery Management in QuickSilver. DB folks: Stonebraker81. Very different philosophies
Microkernels & Database OSs Recovery Management in QuickSilver. Haskin88: Roger Haskin, Yoni Malachi, Wayne Sawdon, Gregory Chan, ACM Trans. On Computer Systems, vol 6, no 1, Feb 1988. Stonebraker81 OS/FS
Lecture 7: Concurrency control. Rasmus Pagh
Lecture 7: Concurrency control Rasmus Pagh 1 Today s lecture Concurrency control basics Conflicts and serializability Locking Isolation levels in SQL Optimistic concurrency control Transaction tuning Transaction
4-06-60 DBMS Recovery Procedures Frederick Gallegos Daniel Manson
4-06-60 DBMS Recovery Procedures Frederick Gallegos Daniel Manson Payoff When a DBMS crashes, all or a portion of the data can become unusable, Appropriate procedures must be followed to restore, validate,
COS 318: Operating Systems
COS 318: Operating Systems File Performance and Reliability Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics File buffer cache
CS 245 Final Exam Winter 2013
CS 245 Final Exam Winter 2013 This exam is open book and notes. You can use a calculator and your laptop to access course notes and videos (but not to communicate with other people). You have 140 minutes
(Pessimistic) Timestamp Ordering. Rules for read and write Operations. Pessimistic Timestamp Ordering. Write Operations and Timestamps
(Pessimistic) stamp Ordering Another approach to concurrency control: Assign a timestamp ts(t) to transaction T at the moment it starts Using Lamport's timestamps: total order is given. In distributed
Redo Recovery after System Crashes
Redo Recovery after System Crashes David Lomet Microsoft Corporation One Microsoft Way Redmond, WA 98052 [email protected] Mark R. Tuttle Digital Equipment Corporation One Kendall Square Cambridge, MA
How To Write A Transaction System
Chapter 20: Advanced Transaction Processing Remote Backup Systems Transaction-Processing Monitors High-Performance Transaction Systems Long-Duration Transactions Real-Time Transaction Systems Weak Levels
Lecture 18: Reliable Storage
CS 422/522 Design & Implementation of Operating Systems Lecture 18: Reliable Storage Zhong Shao Dept. of Computer Science Yale University Acknowledgement: some slides are taken from previous versions of
CPS221 Lecture - ACID Transactions
Objectives: CPS221 Lecture - ACID Transactions Last Revised 7/20/11 1.To introduce the notion of a transaction and the ACID properties of a transaction 2.To introduce the notion of the state of a transaction
Recovery Protocols For Flash File Systems
Recovery Protocols For Flash File Systems Ravi Tandon and Gautam Barua Indian Institute of Technology Guwahati, Department of Computer Science and Engineering, Guwahati - 781039, Assam, India {r.tandon}@alumni.iitg.ernet.in
Crash Recovery. Chapter 18. Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke
Crash Recovery Chapter 18 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke Review: The ACID properties A tomicity: All actions in the Xact happen, or none happen. C onsistency: If each Xact
File System Reliability (part 2)
File System Reliability (part 2) Main Points Approaches to reliability Careful sequencing of file system opera@ons Copy- on- write (WAFL, ZFS) Journalling (NTFS, linux ext4) Log structure (flash storage)
Crashes and Recovery. Write-ahead logging
Crashes and Recovery Write-ahead logging Announcements Exams back at the end of class Project 2, part 1 grades tags/part1/grades.txt Last time Transactions and distributed transactions The ACID properties
Textbook and References
Transactions Qin Xu 4-323A Life Science Building, Shanghai Jiao Tong University Email: [email protected] Tel: 34204573(O) Webpage: http://cbb.sjtu.edu.cn/~qinxu/ Webpage for DBMS Textbook and References
Source: http://www.ontrackdatarecovery.com/understanding- data- loss
No one likes to lose data. Whether it is your personal photos or crucial business documents, losing data is not only an inconvenience, it can be a calamity. With more and more people capturing moments
Mana~ement of a Remote Backup Copy for Disaster Recovery
Mana~ement of a Remote Backup Copy for Disaster Recovery RICHARD P. KING and NAGUI HALIM IBM T. J, Watson Research Center and HECTOR GARCIA-MOLINA and CHRISTOS A. POLYZOIS Princeton University A remote
File System Design and Implementation
Transactions and Reliability Sarah Diesburg Operating Systems CS 3430 Motivation File systems have lots of metadata: Free blocks, directories, file headers, indirect blocks Metadata is heavily cached for
Oracle Database 10g: Backup and Recovery 1-2
Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed
Transactions, Views, Indexes. Controlling Concurrent Behavior Virtual and Materialized Views Speeding Accesses to Data
Transactions, Views, Indexes Controlling Concurrent Behavior Virtual and Materialized Views Speeding Accesses to Data 1 Why Transactions? Database systems are normally being accessed by many users or processes
Distributed Transactions
Distributed Transactions 1 Transactions Concept of transactions is strongly related to Mutual Exclusion: Mutual exclusion Shared resources (data, servers,...) are controlled in a way, that not more than
Overview. File Management. File System Properties. File Management
File Management Lecture 15b 1 2 File Management File management system consists of system utility programs that run as privileged applications Input to applications is by means of a file Output is saved
DATABASDESIGN FÖR INGENJÖRER - 1DL124
1 DATABASDESIGN FÖR INGENJÖRER - 1DL124 Sommar 2005 En introduktionskurs i databassystem http://user.it.uu.se/~udbl/dbt-sommar05/ alt. http://www.it.uu.se/edu/course/homepage/dbdesign/st05/ Kjell Orsborn
The ConTract Model. Helmut Wächter, Andreas Reuter. November 9, 1999
The ConTract Model Helmut Wächter, Andreas Reuter November 9, 1999 Overview In Ahmed K. Elmagarmid: Database Transaction Models for Advanced Applications First in Andreas Reuter: ConTracts: A Means for
Transactions and Concurrency Control. Goals. Database Administration. (Manga Guide to DB, Chapter 5, pg 125-137, 153-160) Database Administration
Transactions and Concurrency Control (Manga Guide to DB, Chapter 5, pg 125-137, 153-160) 1 Goals Database Administration Concurrency Control 2 Database Administration All large and small databases need
Distributed Databases: what is next?
Distributed Databases: what is next? Massive distribution / replication Nested transactions Transactions and web services Summary and final remarks New Challenges DDB and transactions in the past - few
Applying the Saga Pattern. Caitie McCafffrey
Applying the Saga Pattern Caitie McCafffrey Caitie McCaffrey! Distributed Systems Engineer @Caitie CaitieM.com Why Sagas? Sagas Paper Distributed Sagas Sagas in Halo 4 Systems Used to Be Simple Serializability
Week 1 Part 1: An Introduction to Database Systems. Databases and DBMSs. Why Use a DBMS? Why Study Databases??
Week 1 Part 1: An Introduction to Database Systems Databases and DBMSs Data Models and Data Independence Concurrency Control and Database Transactions Structure of a DBMS DBMS Languages Databases and DBMSs
Recover EDB and Export Exchange Database to PST 2010
Recover EDB and Export Exchange Database to PST 2010 Overview: The Exchange Store (store.exe) is the main repository of Exchange Server 2010 edition. In this article, the infrastructure of store.exe along
Extending Multidatabase Transaction Management Techniques to Software Development Environments
Purdue University Purdue e-pubs Computer Science Technical Reports Department of Computer Science 1993 Extending Multidatabase Transaction Management Techniques to Software Development Environments Aidong
Database and Data Mining Security
Database and Data Mining Security 1 Threats/Protections to the System 1. External procedures security clearance of personnel password protection controlling application programs Audit 2. Physical environment
Why disk arrays? CPUs improving faster than disks
Why disk arrays? CPUs improving faster than disks - disks will increasingly be bottleneck New applications (audio/video) require big files (motivation for XFS) Disk arrays - make one logical disk out of
Oracle Database Security and Audit
Copyright 2014, Oracle Database Security and Beyond Checklists Learning objectives Understand data flow through an Oracle database instance Copyright 2014, Why is data flow important? Data is not static
Storing Data: Disks and Files
Storing Data: Disks and Files (From Chapter 9 of textbook) Storing and Retrieving Data Database Management Systems need to: Store large volumes of data Store data reliably (so that data is not lost!) Retrieve
Transactional Information Systems:
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery Gerhard Weikum and Gottfried Vossen 2002 Morgan Kaufmann ISBN 1-55860-508-8 Teamwork is essential.
Rob Zoeteweij Zoeteweij Consulting
Rob Zoeteweij Zoeteweij Consulting Rob Zoeteweij Working with Oracle technology since 1985 (Oracle 3) Many Oracle DBA, Oracle Development projects Last 6 Years Oracle Expert Services RAC/ASM OEM Grid Control
Derby: Replication and Availability
Derby: Replication and Availability Egil Sørensen Master of Science in Computer Science Submission date: June 2007 Supervisor: Svein Erik Bratsberg, IDI Norwegian University of Science and Technology Department
CMSC724: Concurrency
CMSC724: Concurrency Amol Deshpande April 1, 2008 1 Overview Transactions and ACID Goal: Balancing performance and correctness Performance: high concurrency and flexible buffer management STEAL: no waiting
Logistics. Database Management Systems. Chapter 1. Project. Goals for This Course. Any Questions So Far? What This Course Cannot Do.
Database Management Systems Chapter 1 Mirek Riedewald Many slides based on textbook slides by Ramakrishnan and Gehrke 1 Logistics Go to http://www.ccs.neu.edu/~mirek/classes/2010-f- CS3200 for all course-related
Blurred Persistence in Transactional Persistent Memory
Blurred Persistence in Transactional Youyou Lu, Jiwu Shu, Long Sun Department of Computer Science and Technology, Tsinghua University, Beijing, China [email protected], [email protected], [email protected]
UMHLABUYALINGANA MUNICIPALITY
UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of
Configuring Apache Derby for Performance and Durability Olav Sandstå
Configuring Apache Derby for Performance and Durability Olav Sandstå Database Technology Group Sun Microsystems Trondheim, Norway Overview Background > Transactions, Failure Classes, Derby Architecture
6. Backup and Recovery 6-1. DBA Certification Course. (Summer 2008) Recovery. Log Files. Backup. Recovery
6. Backup and Recovery 6-1 DBA Certification Course (Summer 2008) Chapter 6: Backup and Recovery Log Files Backup Recovery 6. Backup and Recovery 6-2 Objectives After completing this chapter, you should
Why disk arrays? CPUs speeds increase faster than disks. - Time won t really help workloads where disk in bottleneck
1/19 Why disk arrays? CPUs speeds increase faster than disks - Time won t really help workloads where disk in bottleneck Some applications (audio/video) require big files Disk arrays - make one logical
DATABASE SECURITY, INTEGRITY AND RECOVERY
DATABASE SECURITY, INTEGRITY AND RECOVERY DATABASE SECURITY, INTEGRITY AND RECOVERY Database Security and Integrity Definitions Threats to security and integrity Resolution of problems DEFINITIONS SECURITY:
Journaling the Linux ext2fs Filesystem
Journaling the Linux ext2fs Filesystem Stephen C. Tweedie [email protected] Abstract This paper describes a work-in-progress to design and implement a transactional metadata journal for the Linux ext2fs
