1 / 18

5. Database recovery techniques

5. Database recovery techniques. Closely related to concurrency control protocols Goals: After failure (for example deadlock & abort), restore a consistent state Minimize the loss of work Means: Auxiliary data sets (log, backup). Recovery concepts: Log.

Download Presentation

5. Database recovery techniques

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 5. Database recovery techniques Closely related to concurrency control protocols Goals: • After failure (for example deadlock & abort), restore a consistent state • Minimize the loss of work Means: • Auxiliary data sets (log, backup) AdvDB-5 J. Teuhola 2015

  2. Recovery concepts: Log • Keeps information about operations made by transactions: • Before-image (undoentry) of updated items • After-image (redo entry) of updated items • Enables restoring a consistent state after non-catastrophic failure (forward/backward). • Alternatives: • undo/no-redo • no-undo/redo • undo/redo • no-undo/no-redo. AdvDB-5 J. Teuhola 2015

  3. Write-Ahead Logging (WAL) (1) No overwrite of disk data before undo-type log records are forced to disk. (2) Both undo- and redo-type log records (= before- and after-images) must be forced to disk before end of commit. WAL is the most important principle inlog-based recovery. AdvDB-5 J. Teuhola 2015

  4. Recovery concepts: Backup • Copy of database on archival storage(off-line, often on tape). • Enables partial recovery from catastrophic failures: • For committed transactions:Load backup and apply redo operations from thelog (if the log survived). • Non-committed transactions must be restarted(= re-executed). AdvDB-5 J. Teuhola 2015

  5. Recovery concepts: Cache • In-memory buffer for database pages. • A directory (page table) keeps track of pagesin cache. • Page-replacement strategy needed, e.g.FIFO (First-In-First-Out), orLRU (Least Recently Used) • Dirty bit tells for each page, if it has changed • Flushing means (force-)writing buffer pages to disk. • Pin/unpin bit tells if the page can be written AdvDB-5 J. Teuhola 2015

  6. Recovery concepts: Rollback • At failure, apply undo-type log records (before-images) to updated items. • A recoverable schedule may allow cascading rollback. • Most practical protocols avoid cascading rollbacks. Then no read-entries are required in the log (no dirty reads). AdvDB-5 J. Teuhola 2015

  7. Undo/redo procedures Undo: • Scan the log file backwards and apply the before-images in this order, or scan the log file forward and apply only the first before-image of each updated item. Redo: • Scan the file forward and apply the after-images in this order, orscan the log file backwards and apply only the last after-image of each updated item. AdvDB-5 J. Teuhola 2015

  8. Update alternatives: Deferred update • NO-UNDO/REDO • Updates first to local copies in transaction workspace, at commit to the log and then to the database. • Buffer space may become restrictive (transactions should be small). • NO UNDO: Effects become visible at commit • REDO: Needed if the system fails after commit but before all cache pages are written to disk. But: Is the write phase during commit atomic?(Is rollback needed, anyway?) AdvDB-5 J. Teuhola 2015

  9. Update alternatives: Immediate update • Updated values from the buffer first to the log, then to the database (even before commit);WAL-rule • The most common in practice. • Rollback (undo) may occur • Two alternatives: • All writes forced to disk before commit(UNDO/NO-REDO) • Some writes from buffer to disk after commit(UNDO/REDO) AdvDB-5 J. Teuhola 2015

  10. Update alternatives (cont.) In-place updating: • Write the updated value in the same location as before; the log is needed for recovery;this approach is applied by most DBMSs. ‘Shadowing’: • Write the new (updated) entry in a different disk location; the log can possibly be avoided(NO-UNDO / NO-REDO), but different versionsof data must be managed. AdvDB-5 J. Teuhola 2015

  11. Recovery concepts: Steal & force Steal approach: • Updated page can be written to disk before commit (opposite: no-steal approach).Advantage of steal: smaller buffer. Force approach (UNDO/NO-REDO): • All updated pages are written to disk at commit. Advantage: no redo No-force approach (UNDO/REDO): • Physical write possible after commit.Advantage: More hits from the buffer. AdvDB-5 J. Teuhola 2015

  12. Transaction lists & checkpoints Transaction lists maintained for recovery: • Active transactions • Committed transactions since the last checkpoint • Aborted transactions since the last checkpoint Fuzzy checkpoint: • Writing of the checkpoint is done parallel with transactions (no interrupt in processing). • The new checkpoint becomes valid when completed. AdvDB-5 J. Teuhola 2015

  13. Shadow paging • Assumes an indirect addressing scheme:References to database objects consist of<page-no, slot-no> pairs, where page-no isthe index to a page table (’directory’), which contains the true physical addresses. • Updated pages are written to different locations • Two page tables are kept: • Shadow (pointing to original pages on disk) • Current (pointing to updated pages) AdvDB-5 J. Teuhola 2015

  14. Address of a data object: <page-no, slot-no> Disk page (= block) Data object Logicalpagenumber Physicalpageaddress Slotindex Page table Indirect addressing AdvDB-5 J. Teuhola 2015

  15. Shadow paging (cont.) Functions: • Start of transaction: Copy the current page table to the shadow table. • Commit: Discard the shadow page table, free the referenced old pages. • Recovery: Discard the current page table,reinstate the shadow page table, free thenew pages. AdvDB-5 J. Teuhola 2015

  16. Shadow paging (cont.) Advantages: • Simple recovery, no log in single-user systems (in multi-user systems, logs and checkpoints needed for concurrency control). Disadvantages: • Fragmentation of storage (clustering lost). • Writing the shadow table to disk takes time. • Garbage collection of pages needed. AdvDB-5 J. Teuhola 2015

  17. Summary of recovery alternatives REDO NO REDO UNDO NO UNDO AdvDB-5 J. Teuhola 2015

  18. Recovery from catastrophic failures Solution: Backup to a different device • Copy of the whole database (more seldom) • Copy of the log file (shorter; more often) Recovery: • Load the backup and restart the system. • Reconstruct the effects of committed transactions from the log. AdvDB-5 J. Teuhola 2015

More Related