Explain the shadow paging recovery technique, Database Management System

Assignment Help:

Explain the shadow paging recovery technique. 

Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages in a database. Throughout a transaction, the pages influenced by the transaction are copied from the database file into a workspace, like volatile memory, and modified in that workspace. While a transaction is committed, all of the pages that were altered by the transaction are written from the workspace to not used pages in the database file.

Throughout execution of the transaction, the state of the database exposed to the user is that where the database existed prior to the transaction, as the database file still consist of the original versions of the modified pages, like they existed before being copied into the workspace. If a user accesses the database previous to the transaction is complete, or on the recovery of a failure, it will come out as though the transaction has not occurred.


Related Discussions:- Explain the shadow paging recovery technique

Define the canonical cover, Define the Canonical cover Ans: A canonical...

Define the Canonical cover Ans: A canonical cover F c for F is a set of dependencies like F logically implies all dependencies in F c , and F c logically entails all dependen

Explain the structure of well formed formulae, Explain the structure of wel...

Explain the structure of well formed formulae in relational calculus. Ans: a. An atom is a formula b. If P1 is a formula, after that so are ¬P1 and (P1) c. If P1 and P2 a

What is a candidate key, What is a candidate key? Minimal super keys ar...

What is a candidate key? Minimal super keys are known as candidate keys.

State the process of inheritance adjustment, Inheritance Adjustment As...

Inheritance Adjustment As in object oriented analysis and design terms inheritance defines a relationship between classes, where as one class shares structure or behaviour def

Define control files, Control Files : The redo and control files logs supp...

Control Files : The redo and control files logs support the rest of the architecture. Every database must have at least one control file, although you have more than one to guard

System error-database errors, System error :These contain errors in databas...

System error :These contain errors in database system or the OS, example, deadlocks.Such errors are fairly hard to detect and need reprogramming the erroneous components of the sys

Explain function group, What is a function group? A function group is ...

What is a function group? A function group is a collection of logically related modules that share global data with every other.  All the modules in the group are contained in

Explain the fourth normal form, Fourth Normal Form (4NF) When attribut...

Fourth Normal Form (4NF) When attributes in a relation have multi-valued dependency, further Normalization to 4NF and 5NF are needed. Let us first find out what multi-valued d

Explain the two constraints check and foreign key in sql, Explain the two c...

Explain the two constraints, check and foreign key in SQL along with an example for each. Give the syntax. CHECK constraint - CHECK constraint specifies an expression which

Example of sequences, Example : Create a sequence named SEQSS that starts a...

Example : Create a sequence named SEQSS that starts at 105, has a step of 1 and can take maximum value as 2000.  CREATE SEQUENCE SEQSS START WITH 105 INCREMENT BY 1 MAX VA

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd