Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Evaluation of remote backup algorithms for transaction-processing systems
Polyzois C., García-Molina H. ACM Transactions on Database Systems19 (3):423-449,1994.Type:Article
Date Reviewed: Aug 1 1995

To ensure the operation of a database system after a disaster, a backup copy of the database and of the changes applied to it, that is, the redo-log, must be maintained at a remote geographical location. If the redo-log is only applied after a disaster, the impact on the production system is small. If the redo-log is applied continuously as if the backup site were part of a distributed database system, the impact is significant. In both options there is no loss of data. They differ only in the time necessary to recover after a disaster. The algorithms used are called 2-safe. Algorithms that allow fast recovery, but still have only a small impact on the production system, are called 1-safe. With 1-safe algorithms, data may be lost.

Polyzois and García-Molina present their research on the performance of a 2-safe algorithm and two 1-safe algorithms in a distributed environment. They explain in detail their “dependency reconstruction” and “epoch” algorithms and their testbed, but they do not define the format of their redo-logfile. From the context, we can guess that they assume a redo-logfile consisting of transaction and database records. Other possibilities include a redo-logfile recording the physical datapages that were changed. I also missed an explanation of why anyone who needs continuous operation would accept loss of data.

The algorithms perform as expected. Was the outcome ever in doubt? Database administrators will appreciate this paper not so much for its performance study as for the clarity of the presentation of disaster recovery mechanisms.

Reviewer:  C. Bannwart Review #: CR118855 (9508-0629)
Bookmark and Share
 
Logging And Recovery (H.2.7 ... )
 
 
Distributed Databases (C.2.4 ... )
 
 
Fault-Tolerance (D.4.5 ... )
 
 
Transaction Processing (H.2.4 ... )
 
 
Distributed Systems (C.2.4 )
 
 
Reliability (D.4.5 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Logging And Recovery": Date
Database integrity block construct: concepts and design issues
Lilien L., Bhargava B. IEEE Transactions on Software Engineering SE-11(9): 865-885, 1985. Type: Article
Apr 1 1986
On modeling of information retrieval concepts in vector spaces
Wong S., Ziarko W., Raghavan V., Wong P. ACM Transactions on Database Systems 12(2): 299-321, 1987. Type: Article
Apr 1 1988
Extended ephemeral logging: log storage management for applications with long lived transactions
Keen J., Dally W. ACM Transactions on Database Systems 22(1): 1-42, 1997. Type: Article
Sep 1 1997
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy