(Translated by https://www.hiragana.jp/)
Principles of transaction-oriented database recovery | ACM Computing Surveys skip to main content
article
Free Access

Principles of transaction-oriented database recovery

Published:02 December 1983Publication History
First page image

References

  1. ASTRAHAN, M. M., BLASGEN, M. W., CHAMBERLIN, D. D., GRAY, J. N., KINa, W. F., LINDSAY, B. G., LORIE, R., MEHL, J. W., PRICE, T. G., PUTZOLU, F., SELINGER, P. G., SCHKOLNICK, M., SLUTZ, D. R., TRAIOER, I. L., WADE, B. W., AND YOST, R. A. 1981. History and evaluation of System R. Commun. ACM 24, 10 (Oct.), 632-646. Google ScholarGoogle Scholar
  2. BERNSTEIN, P. A., AND GOODMAN, N. 1981. Concurrency control in distributed database systems. ACM Comput. Surv. 13, 2 (June), 185-221. Google ScholarGoogle Scholar
  3. BJORK, L. A. 1973. Recovery scenario for a DB/DC system. In Proceedings of the A CM 73 National Conference (Atlanta, Ga., Aug. 27-29). ACM, New York, pp. 142-146. Google ScholarGoogle Scholar
  4. CHAMBERLIN, D. D. 1980. A summary of user experience with the SQL data sublanguage. In Proceedings of the International Conference on Databases (Aberdeen, Scotland, July), S. M. Deen and P. Hammersley, Eds. Heyden, London, pp. 181-203.Google ScholarGoogle Scholar
  5. CHANDY, K. M., BROWN, J. C., DISSLEY, C. W., AND UHRIG, W. R. 1975. Analytic models for rollback and recovery strategies in data base systems. IEEE Trans Softw Eng. SE-1, 1 (Mar.), 100- 110.Google ScholarGoogle Scholar
  6. CHEN, T. C. 1978. Computer technology and the database user. In Proceedings of the 4th International Conference on Very Large Database Systerns (Berlin, Oct.). IEEE, New York, pp. 72-86.Google ScholarGoogle Scholar
  7. CODASYL 1973. CODASYL DDL Journal of Developrnent June Report. Available from IFIP Administrative Data Processing Group, 40 Paulus Potterstraat, Amsterdam.Google ScholarGoogle Scholar
  8. CODASYL 1978. CODASYL: Report of the Data Description Language Committee. Inf. Syst. 3, 4, 247-320.Google ScholarGoogle Scholar
  9. CODD, E. F. 1982. Relational database: A practical foundation for productivity. Commun. ACM 25, 2 (Feb.), 109-117. Google ScholarGoogle Scholar
  10. DATE, C. J. 1981. An Introduction to Database Systerns, 3rd ed. Addison-Wesley, Reading, Mass. Google ScholarGoogle Scholar
  11. DAVIES, C. T. 1973. Recovery semantics for a DB/ DC System. In Procee&ngs of the A CM 73 Natwnal Conference, (Atlanta, Ga., Aug. 27-29). ACM, New York, pp. 136-141. Google ScholarGoogle Scholar
  12. DAVIES, C. T. 1978. Data processing spheres of control. IBM Syst. J. 17, 2, 179-198.Google ScholarGoogle Scholar
  13. EFFELSBERG, W., HAERDER, T., REUTER, A., AND SCHULZE-BOHL, J. 1981. Performance measurement in database systems--Modeling, interpretation and evaluation. In Informatik Fachbertchte 41. Springer-Verlag, Berlin, pp. 279-293 (in German).Google ScholarGoogle Scholar
  14. ELHARDT, K. 1982. The database cache--Principles of operation. Ph.D. dissertation, Technical University of Munich, Munich, West Germany (in German).Google ScholarGoogle Scholar
  15. ESWARAN, K. P., GRAY, J. N., LORIE, R. A., AND TRAIGER, I. L. 1976. The notions of consistency and predicate locks in a database system. Commun. ACM 19, 11 (Nov.), 624-633. Google ScholarGoogle Scholar
  16. GRAY, J. 1978. Notes on data base operating systems. In Lecture Notes on Computer Science, vol. 60, R. Bayer, R. N. Graham, and G. Seegmueller, Eds. Springer-Verlag, New York. Google ScholarGoogle Scholar
  17. GRAY, J. 1981. The transaction concept: Virtues and limitations. In Proceedings of the 7th International Conference on Very Large Database Systerns (Cannes, France, Sept. 9-11). ACM, New York, pp. 144-154.Google ScholarGoogle Scholar
  18. GRAY, J., LORIE, R., PUTZOLU, F., AND TRAIGER, I. L. 1976. Granularity of locks and degrees of consistency in a large shared data base. In Modeling in Data Base Management Systems. Elsevier North-Holland, New York, pp. 365-394.Google ScholarGoogle Scholar
  19. GRAY, J., MCJONES, P., BLASGEN, M., LINDSAY, B., LORIE, R., PRICE, T., PUTZOLU, F., AND TRAIGER, I. L. 1981. The recovery manager of the System R database manager. ACM Comput. Surv. 13, 2 (June), 223-242. Google ScholarGoogle Scholar
  20. HAERDER, T., AND REUTER, A. 1979. Optimization of logging and recovery in a database system. In Database Architecture, G. Bracchi, Ed. Elsevier North-Holland, New York, pp. 151-168.Google ScholarGoogle Scholar
  21. HAERDER, T., AND REUTER, A. 1983. Concepts for implementing a centralized database management system. In Proceedings of the International Computing Symposium (Inwted Paper) (Nuernberg, W. Germany, Apr.), H. J. Schneider, Ed. German Chapter of ACM, B. G. Teubner, Stuttgart, pp. 28-6O.Google ScholarGoogle Scholar
  22. IMS/VS-DB N.d. IMSfVS-DB Primer, IBM World Trade Center, Paid Alto, July 1976.Google ScholarGoogle Scholar
  23. KOHLER, W. H. 1981. A survey of techniques for synchronization and recovery in decentralized computer systems. ACM Comput. Surv. 13, 2 (June), 149-183. Google ScholarGoogle Scholar
  24. LAMPSON, B. W., AND STURGIS, H. E. 1979. Crash recovery in a distributed data storage system. XEROX Res. Rep. Paid Alto, Calif. Submitted for publication.Google ScholarGoogle Scholar
  25. LINDSAY, B. G., SELINGER, P. G., GALTIERI, C., GRAY, J. N., LORIE, R., PRICE, T. G., PUTZOLU, F., TRMGER, I. L., AND WADE, B. W. 1979. Notes on distributed databases. IBM Res. Rep. RJ 2571, San Jose, Calif.Google ScholarGoogle Scholar
  26. LORIE, R. A. 1977. Physical integrity in a large segmented database. ACM Trans. Database Sys. 2, 1 (Mar.), 91-104. Google ScholarGoogle Scholar
  27. REUTER, A. 1980. A fast transaction-oriented logging scheme for UNDO-recovery. IEEE Trans. Softw. Eng. SE-6 (July), 348-356.Google ScholarGoogle Scholar
  28. REUTER, A. 1981. Recovery in Database Systems. Carl Hanser Verlag, Munich (in German).Google ScholarGoogle Scholar
  29. REUTER, A. 1982. Performance Analysis of Recovery Techniques, Res. Rep., Computer Science Department, Univ. of Kaiserslautern, 1982. To be published.Google ScholarGoogle Scholar
  30. SENKO, M. E., ALTMAN, E. B., ASTRAHAN, M. M., AND FEHBER, P. L. 1973. Data structures and accessing in data base systems. IBM Syst. J. 12, 1 (Jan), 30-93.Google ScholarGoogle Scholar
  31. SEVERANCE, D. G., AND LOHMAN, G. M. 1976. Differential files: Their application to the maintenance of large databases. ACM Trans Database Syst. 1, 3 (Sept.), 256-267. Google ScholarGoogle Scholar
  32. SMITH, D. D. P., AND SMZTH, J. M. 1979. Relational database machines. IEEE Comput. 12, 3 28-38.Google ScholarGoogle Scholar
  33. STONEBRAKER, M. 1980. Retrospection on a database system. A CM Trans. Database Syst. 5, 2 (June), 225-240. Google ScholarGoogle Scholar
  34. STONEBRAKER, M., WONG, E., KREPS, P., AND HELD, G. 1976. The design and implementation of INGRES. ACM Trans. Database Syst. 1, 3 (Sept.), 189-222. Google ScholarGoogle Scholar
  35. STURGiS, H., MITCHELL, J., AND ISRAEL, J. 1980. Issues in the design and use of a distributed file system. A CM Oper. Syst. Rev. 14, 3 (July), 55-69. Google ScholarGoogle Scholar
  36. TANDEM. N.d. TANDEM 16, ENSCRIBE Data Base Record Manager, Programming Manual, TANDEM Computer Inc., Cupertino.Google ScholarGoogle Scholar
  37. UDS, N.d. UDS, Universal Data Base Management System, UDS-V2 Reference Manual Package, Siemens AG, Munich, West Germany.Google ScholarGoogle Scholar
  38. VERHOFSTADT, J. M. 1978. Recovery techniques for database systems. ACM Comput. Surv. 10, 2 (June), 167-195. Google ScholarGoogle Scholar

Recommendations

Reviews

Vijay Varadachari Raghavan

The paper aims to remedy the problems stemming from a lack of adequate and precise terminology for describing and coming to grips with the variety of concepts and algorithms used in the area of database recovery. To achieve this, a systematic framework for establishing and evaluating the basic concepts for fault-tolerant database operation is formulated. The concept central to their framework, that of a transaction, is stated and is used to describe the types of failures to be anticipated and the kinds of recovery actions that would, as a result, be required. Thus, this survey, unlike that of Verhofstadt [1], assumes a sppecific notion of consistency, which derives from treating the transaction as the only unit of recovery. The main contribution is a taxonomy with which arbitrary implementations for database recovery can be classified. It is based on four criteria: (1)whether a set of modified pages are materialized as a unit (ATOMIC) or blocks are updated in-place, leaving open the possibility of the write of a set of pages to be interrupted by system crashes ( :9I ATOMIC), (2)whether the time of replacement of modified pages are solely determined by the buffer manager (STEAL) or modified pages are kept in buffer at least until the end of transaction ( :9I STEAL), (3)whether or not all modified pages are materialized during end-of-transaction processing (FORCE) and (4)the kind of checkpoint scheme employed. The first criterion defines the state in which a database is left when the system terminates abnormally. STEAL :9I STEAL dichotomy has important implications for UNDO recovery. The othr criterion converning buffer handling (FORCE :9I FORCE) is related to the necessity of partial REDO. Depending on the choices for the above, the type of log data and the database state that is logged would vary. Finally, checkpointing helps to constrain partial REDO to different extents depending on the criteria for determining when to start checkpointing activities. Some existing DBMs and implementing concepts are classified and described using a classification tree based on these options. Important conclusions concerning the behavior and performance of these recovery techniques are made.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM Computing Surveys
    ACM Computing Surveys  Volume 15, Issue 4
    December 1983
    95 pages
    ISSN:0360-0300
    EISSN:1557-7341
    DOI:10.1145/289
    Issue’s Table of Contents

    Copyright © 1983 ACM

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 2 December 1983
    Published in csur Volume 15, Issue 4

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader