Explain recovery process after system failure, Database Management System

Assignment Help:

Explain recovery process after system failure using checkpoint.

Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to limit the volume of log information which has to be handled and processed in the event of a system failure including the loss of volatile data. The checkpoint operation is carried out periodically copies log information onto the stable storage. 

At every checkpoint, subsequent information is kept.

a. A start-of-checkpoint record that provides the identification that it is a checkpoint. 

b. Each and every log information from the buffers in the volatile storage is copied to the log on stable storage. 

c. All database updates from the buffers in the volatile storage are propagated to physical database. 

d. An end-of-checkpoint record is written and the address of the checkpoint record is saved on a file accessible to the recovery routine on start-up after a system crash.   

While failure do occur, it is often possible to resume processing from the most current checkpoint. All transactions which were saved before the checkpoint time need not be referred for the recovery operation. All transactions which were started before the checkpoint time but were not committed at that time are placed in an undo list that is a list of transactions to be undone. 

Now here is the recovery system scans the log in a backward direction from the time of the system crash. If it finds out that a transaction in the undo list has committed, that transaction is removed from the undo list and placed in the REDO list, which consists of all the transactions that have to be redone. So a system crash occurring during the checkpoint operation needs recovery to be done using the most current previous checkpoint.


Related Discussions:- Explain recovery process after system failure

Define the concept of design documentation, Design Documentation  The ...

Design Documentation  The Design Document shall be an extension of Requirements Analysis Design. "The Design Document will comprise a revised and much more detailed descrip

What are the reasons of bucket overflow, What are the reasons of bucket ove...

What are the reasons of bucket overflow? Explain any two methods for solving this problem. Ans:  It is general for file structures to be divided into equal-length partitions, k

Implement a cache simulator, You are required to program (in a high level l...

You are required to program (in a high level language such as C, C++, Java) and implement a cache simulator which will have the following inputs and outputs:- INPUTS

What do you understand by a view, What do you understand by a view? What do...

What do you understand by a view? What does WITH CHECK OPTION clause for a view do? - A view is a virtual table which comprises fields from one or more real tables. - It is

Which file organization provides very fast access, Which file organization ...

Which file organization provides very fast access to any arbitrary record of a file? Hashed file organization provides very fast access to any arbitrary record of a file.

What are the issues are formed while selecting a database, What are the Iss...

What are the Issues when Selecting a Database Issues when Selecting a Database Storage space requirement: A database requires about triple storage space of the actua

Draw enhanced er-diagram for hierarchy of a student database, Draw an EER d...

Draw an EER diagram that captures the "is-a" hierarchy of students in another simple database. The database captures both the "basic" information (say, student ID and student name)

Explain current page table and shadow page table, Explain current page tabl...

Explain current page table and shadow page table. The key idea behind the shadow paging method is to maintain two page tables during the life of the transaction: the current pa

Database schemas and dependencies, 1. Staff(staffID, firstName, lastName, a...

1. Staff(staffID, firstName, lastName, availabilityID, experience, phone, mobile, email); 2. Availability(availabilityID, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday,

Define object oriented model, Object Oriented model :An object has values...

Object Oriented model :An object has values stored in instance variables within the object. An object also has bodies of code that execute on the object. These bodies of code are

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd