Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Log based recovery:Let us first describe the term transaction log in the context of DBMS. A transaction log is a record in DBMS that remains track of all the transactions of a database system that update any data values in the database. A log haves the following information about a transaction:
In a database system various transactions run simultaneously. When a transaction commits, the data buffers used by it require not be written back to the physical database stored on the secondary storage as these buffers may be used by various other transactions that have not yet committed. On the other hand, some of the data buffers that may have updates by various uncommitted transactions may be forced back to the physical database, as they is no longer being used by the database. So the transaction log helps in remembering which transaction did which alters. Therefore the system knows exactly how to divide the changes made by transactions that have already committed from those alters that is made by the transactions that did not yet commit. Any operation such as start transaction, insert /delete/update and end transaction (commit), adds information to the log having the transaction identifier and enough information to redo or undo the changes.
But how do we recover using log? Let us show this with the help of an example having three concurrent transactions that are active on ACCOUNTS table as:
Transaction T1
Transaction T2
Transaction T3
Read X
Read A
Read Z
Subtract 100
Add 200
Subtract 500
Write X
Write A
Write Z
Read Y
Add 100
Write Y
Figure: The sample transactions
Suppose that these transactions have the following log file (hypothetical) at a point:
Transaction Begin Marker
Transaction
Id
Operation on ACCOUNTS table
UNDO values (assumed)
REDO
values
Transaction Commit Marker
Y
T1
Sub on X Add on Y
500
800
400
Not done yet
N
T2
Add on A
1000
1200
T3
Sub on Z
900
Figure: A sample (hypothetical) Transaction log
Now suppose at this point of time a failure occurs, then how the recovery of the database will be completed on restart.
Values
Initial
Just before the failure
Operation
Required for recovery
Recovered Database Values
X
400 (assuming update has been done in physical database also)
UNDO
A
1000 (assuming update has not been done in physical database)
Z
900 (assuming update has not been done in physical database)
Question 1 Explain the functions of the following Storage Manager Buffer Manager Transaction Manager 2 Discuss about system catalog in a relational DBMS 3
What is called mirroring? The simplest approach to introducing redundancy is to duplicate each disk. This method is called mirroring or shadowing.
What is Distributed system ? Distributed System - A distributed system consists of a number of processing parts in which are interconnected through a computer network and in
Define multivalued dependency. What do understand by trivial multivalued dependency? Ans: A multivalued dependency is a full constraint among two sets of attributes in a rela
To do the division operation R1 ÷ R2, R2 should be a correct subset of R1. In the following example R1 have attributes A and B and R2 have only attribute B so R2 is a correct subse
Name the metrics for selecting top algorithm There are a number of metrics for selecting top algorithm: i) Computational complexity: Computational complexity refers to eff
What does authentication refer? Authentication refers to the task of verifying the uniqueness of a person.
Differance between Unordered and ordered file ? Unordered file do no has any sequence although ordered file has arranged in a few sequence and data are assigned in ordered form
Multi-list file Organisation Multi-list file organisation is a multi-index linked file organisation. A linked file organisation is a logical organisation where physical orderin
When a function module is activated syntax checking is performed automatically. YEs, a function module is activated syntax checking.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd