Data Management Technology(5) -- Recovery
Recovery
Types of Failures
Wrong data entry
- Prevent by having constraints in the database
- Fix with data cleaning
Disk crashes
- Prevent by using redundancy (RAID, archive)
- Fix by using archives
Fire, theft, bankruptcy…
- Buy insurance, change profession…
System failures: most frequent (e.g. power)
- Use recovery
System Failures
Each transaction has internal state
When system crashes, internal state is lost
- Don’t know which parts executed and which didn’t
Remedy: use a log
- A file that records every single action of the transaction
Transactions
Assumption: the database is composed of elements
Usually 1 element = 1 block
Can be smaller (=1 record) or larger (=1 relation)
Assumption: each transaction reads/writes some elements
Correctness Principle
There exists a notion of correctness for the database
- Explicit constraints (e.g. foreign keys)
- Implicit conditions (e.g. sum of sales = sum of invoices)
Correctness principle: if a transaction starts in a correct database state, it ends in a correct database state
Consequence: we only need to guarantee that transactions are atomic, and the database will be correct forever
Primitive Operations of Transactions
INPUT(X)
- read element X to memory buffer
READ(X,t)
- copy element X to transaction local variable t
WRITE(X,t)
- copy transaction local variable t to element X
OUTPUT(X)
- write element X to disk
The Log
An append-only file containing log records
Note: multiple transactions run concurrently, log records are interleaved
After a system crash, use log to:
- Redo some transaction that didn’t commit
- Undo other transactions that didn’t commit
Undo Logging
Log records
transaction T has begun
T has committed
T has aborted
<T,X,v> T has updated element X, and its old value was v
Undo-Logging Rules
U1: If T modifies X, then <T,X,v> must be written to disk before X is written to disk
U2: If T commits, then must be written to disk only after all changes by T are written to disk
Hence: OUTPUTs are done early
Recovery with Undo Log
After system’s crash, run recovery manager
Idea 1. Decide for each transaction T whether it is completed or not
Idea 2. Undo all modifications by incompleted transactions
Recovery manager:
Read log from the end; cases:
- : mark T as completed
- : mark T as completed
- <T,X,v>: if T is not completed
then write X=v to disk
else ignore - : ignore
阅读方向,从下向上
Note: all undo commands are idempotent, If we perform them a second time, no harm is done
stop reading the log:
- We cannot stop until we reach the beginning of the log file
- This is impractical
- Better idea: use checkpointing
Checkpointing
Checkpoint the database periodically
- Stop accepting new transactions
- Wait until all curent transactions complete
- Flush log to disk
- Write a log record, flush
- Resume transactions
Redo Logging
Log records
<T,X,v>= T has updated element X, and its new value is v
R1: If T modifies X, then both <T,X,v> and must be written to disk before X is written to disk
Hence: OUTPUTs are done late
After system’s crash, run recovery manager
Step 1. Decide for each transaction T whether it is completed or not
Step 2. Read log from the beginning, redo all updates of committed transactions
Undo/Redo Logging
Log records, only one change
<T,X,u,v>= T has updated element X, its old value was u, and its new value is v
Recovery with Undo/Redo Log
After system’s crash, run recovery manager
Redo all committed transaction, top-down
Undo all uncommitted transactions, bottom-up
总结
日志undo先写日志(从下向上读)redo先写磁盘(从上到下读)
冲突可串行 & 两阶锁
两个事物使用同一个资源并有一个是写就是冲突的,简单讲就是在冲突可串行并发操作的前驱图中是没有环路的,前驱图无环就是冲突可串行的。
每个事物在使用资源的时候都是先统一取再统一放的,也就是其图示先增后减,斜率不会出现其他变动。
E.g.
Consider the following schedule:
T1 STARTS
T1 reads item B
T1 writes item B with old value 11, new value 12
T2 STARTS
T2 reads item B
T2 writes item B with old value 12, new value 13
T3 STARTS
T3 reads item A
T3 writes item A with old value 29, new value 30
T2 reads item A
T2 writes item A with old value 30, new value 31
T2 COMMITS
T1 reads item D
T1 writes item D with old value 44, new value 45
T3 COMMITS
T1 COMMITS
(a) What serial schedule is this equivalent to? If none, then explain why.
The serializability graph for the above schedule is: T1T2 T3. Any order that complies with the
topological order of the graph like T1 T3 T2 is an equivalent serial schedule for our schedule
(b) Is this schedule consistent with two phase locking? Explain why.
If we assume that all
transactions get the locks exactly before the operation and release them
afterwards, it is not consistent with two phase locking. This is
because T1 releases its lock on B after its second operation while
acquiring a lock on D at its last two operations. By removing the last
two operations of T1 the schedule becomes 2PL.
If we assume that the
transactions get all the locks they need at the beginning of the
transaction, and release them after the finish the operation, this
schedule will be 2PL. The minimum operations that could be added to the
schedule will be “T1 reads item A”. In this case, T1 has to acquire the
lock on A again after releasing its lock on A after its first
write.(这段话太深奥了,我用百度翻译都没看懂。。。)
Data Management Technology(5) -- Recovery的更多相关文章
- Data Management Technology(1) -- Introduction
1.Database concepts (1)Data & Information Information Is any kind of event that affects the stat ...
- Data Management Technology(3) -- SQL
SQL is a very-high-level language, in which the programmer is able to avoid specifying a lot of data ...
- Data Management Technology(2) -- Data Model
1.Data Model Model Is the abstraction of real world Reveal the essence of objects, help people to lo ...
- Data Management Technology(4) -- 关系数据库理论
规范化问题的提出 在规范化理论出现以前,层次和网状数据库的设计只是遵循其模型本身固有的原则,而无具体的理论依据可言,因而带有盲目性,可能在以后的运行和使用中发生许多预想不到的问题. 在关系数据库系统中 ...
- [Windows Azure] Data Management and Business Analytics
http://www.windowsazure.com/en-us/develop/net/fundamentals/cloud-storage/ Managing and analyzing dat ...
- Intel Active Management Technology
http://en.wikipedia.org/wiki/Intel_Active_Management_Technology Intel Active Management Technology F ...
- MySQL vs. MongoDB: Choosing a Data Management Solution
原文地址:http://www.javacodegeeks.com/2015/07/mysql-vs-mongodb.html 1. Introduction It would be fair to ...
- 场景3 Data Management
场景3 Data Management 数据管理 性能优化 OLTP OLAP 物化视图 :表的快照 传输表空间 :异构平台的数据迁移 星型转换 :事实表 OLTP : 在线事务处理 1. trans ...
- Data Management and Data Management Tools
Data Management ObjectivesBy the end o this module, you should understand the fundamentals of data m ...
随机推荐
- 简单实用的git命令
1.下载项目 先进入目录然后使用jit $ git clone +"url" 2.项目配置 $ composer install 3.上传项目 $ git add . () $ g ...
- API访问控制设计
References ● OAuth 2.0 for native apps: https://datatracker.ietf.org/doc/rfc8252/ ● OAuth 2.0 for br ...
- Dockerfile制作镜像
Dockerfile简介 dockerfile 是一个文本格式的配置文件, 用户可以使用 Dockerfile 来快速创建自定义的镜像, 另外,使用Dockerfile去构建镜像好比使用pom去构建m ...
- 一篇文章看懂JS闭包,都要2020年了,你怎么能还不懂闭包?
壹 ❀ 引 我觉得每一位JavaScript工作者都无法避免与闭包打交道,就算在实际开发中不使用但面试中被问及也是常态了.就我而言对于闭包的理解仅止步于一些概念,看到相关代码我知道这是个闭包,但闭包 ...
- PHP+jQuery中国地图热点数据统计展示实例
一款PHP+jQuery实现的中国地图热点数据统计展示实例,当鼠标滑动到地图指定省份区域,在弹出的提示框中显示对应省份的数据信息. 首先在页面中加一个div#tip,用来展示地图信息的提示框和#map ...
- vue 脚手架
Vue 脚手架的基本用法 1. 基于 3.X 版本的脚手架 创建vue项目 命令行(CLI) 的方式创建 vue 项目 vue create my-project 图形化界面(GUI) 的方式创建 v ...
- Python 获取MD5加密值
Python 获取MD5加密值方法封装 import hashlib def get_md5(s): """获取MD5加密值 :param s: 需要加密的字符串 :re ...
- Linux基础 —基础要点
一.请简述Linux安装时的两个必备分区.挂载点和类型. 一般情况下,安装红旗Linux需要两个必备分区,即一个根文件系统分区,挂载点(/),类型为ext3.ext2或reiserfs:一个交换分区, ...
- 获取IP的三种方法
第一种 取本主机ip地址 public string GetLocalIp() { ///获取本地的IP地址 string AddressIP = string.Empty; foreach (IPA ...
- Pro Micro
选择这块Arduino板主要是因为它便宜(淘宝上20元左右搞定),引脚相对较多,体积小,而且其使用的处理器核心ATmega32U4(兼容Arduino Leonardo)可用于模拟HID设备,可以配合 ...