skip to main content
article
Free access

Evaluation of remote backup algorithms for transaction-processing systems

Published: 01 September 1994 Publication History

Abstract

A remote backup is a copy of a primary database maintained at a geographically separate location and is used to increase data availability. Remote backup systems are typically log-based and can be classified into 2-safe and 1-safe, depending on whether transactions commit at both sites simultaneously or first commit at the primary and are later propagated to the backup. We have built an experimental database system on which we evaluated the performance of the epoch and the dependency reconstruction algorithms, two 1-safe algorithms we have developed. We compared the 1-safe with the 2-safe approach under various conditions.

References

[1]
ABBOTT, R. K., AND GARCI^-MOLINA, H. 1987. Reliable distributed database management. Proc. IEEE 75, 5 (May), 601-620]]
[2]
BERNSA'EIN, P. A., I-~ADZILACOS, V., AND GOODMAN, N. 1987. Concurrency Control and Recovery ~n Database OEystems. Addison-Wesley, Reading, Mass.]]
[3]
BURKES, D., AND TREIBER, K. 1989. Design approaches for real rime recovery. Presentation at the 3rd International Workshop on High Performance Transactwn Systems (Pacific Grove, Ca., Sept.).]]
[4]
GARCIA-MOLINA, H., AND POLYZOIS, C.A. 1991a. A generalized disaster recovery model and algorithm. In the 4th International Workshop on High Performance Transaction Systems.]]
[5]
GARCIA-MOLINA, H., AND POLYZOIS, C.A. 1991b. Processing of read-only queries ata remote backup. Tech. Rep. CS-TR-354-91, Dept. of Computer Science, Princeton Univ., Princetom N.J.]]
[6]
GARCrA-MOLINA, H., AND POLYZOIS, C.A. 1990. Issues in disaster recovery. In IEEE Compcon. IEEE, New York, 573-577.]]
[7]
GARCIA-MOLINA, H., HAGMANN, R., AND POLYZOIS, C. A. 1990a. Two epoch algorithms for disaster recovery. In the 16th International Conference on Very Large Data Bases. VLDB Endowment, 222-230.]]
[8]
GA-CIA-MOLrNA, H., HAHM, N., KING, R. P., AND Po~~YZO~S, C.A. 1990b. Overview of disaster recovery for transaction processing systems. In IEEE lOth ICDCS. IEEE, New York, 286 293.]]
[9]
GARCIA-MOLINA, H., HALIM, N., KING, R. P, AND POLYZOIS, C.A. 1991. Management of a remote backup copy for disaster recovery. ACM Trans. Database Syst. 16, 2, 338 368.]]
[10]
GAWLICK, D., AND I~NKADE, D. 1985. Varieties of concurrency control in IMS/VS fast patb. Data Eng. Bull. 8, 2 (June), 3 10.]]
[11]
GRAY, J.N. 1979. Notes on database operating systems. In Operattng Systems: An Advanced Course. Springer-Verlag, Berlin, 393 481.]]
[12]
GRAY, J. N., AND REUTER, A. 1993. Transactton Processing: Concepts and Techt~iqaes. Morgan Kaufmann, San Mateo, Calif.]]
[13]
GRAY, J. N., AND REUTER, A. 1988. Transaction processing. Course Notes from CS#445, Stanford Univ., Spring Terre, Stanford, Calif.]]
[14]
LAMPORT, L. 1978. Time, clocks, and the ordering of events in a distributed system. Commuv. ACM 21, 7 (July), 558-565.]]
[15]
LYON, J. 1990. Tandem's remote data ~acility. In IEEE Compcon. IEEE, New York, 562-567.]]
[16]
LYON, J. 1988. Design conslderations in replicated database systems for disaster protection. In IEEE Compcon. IEEE, New York, 428-430.]]
[17]
MOHAN, C., AND LINDSAY, B. 1983. Efficient commit protocols for the tree of processes model of distributed transactions. In 2nd ACM SIGACT/SIGOPS Symposzum on Prmciples of Distributed Computing. ACM, New York.]]
[18]
MOHAN, C., AND NARANG, I. 1991. Solutions to hot spot problems in a shared disks transaction environment. In the 4th International Workshop on High Performance Transaction Systems]]
[19]
MOHAN, C., TREIBER, K., AND OBERMARCK, R. 1993. Algorithms for the management of remote backup databases for disaster recovery. In IEEE 9th International Conference on Data Engineering. IEEE, New York, 511-518.]]
[20]
SELTZER, M., CHEN, P., AND OUSTERHOUT, J. 1990. Disk scheduling revisited. In Wmter 1990 USENIX. USENIX Association, Berkeley, Califi, 313-323.]]
[21]
SAEE~, D. 1982. Nonblocking commit protocots. In ACM SIGMOD Conference on Management of Data. ACM, New York, 133-147.]]
[22]
STAELIN, C., AND GARCIA-MoLINA, H. 1990. Clustering active disk data to improve disk performance. Tech. Rep. CS-TR-283-90, Dept. of Computer Science, Princeton Univ., Princeton, N.J.]]
[23]
TANDEM COMPUTERS. 1987. Remote Duplicate Database Facility (RDF) System Managemeltt Manual. Tandem Computer Corp.]]

Cited By

View all

Recommendations

Reviews

Christoph E. Bannwart

To ensure the operation of a database system after a disaster, a backup copy of the database and of the changes applied to it, that is, the redo-log, must be maintained at a remote geographical location. If the redo-log is only applied after a disaster, the impact on the production system is small. If the redo-log is applied continuously as if the backup site were part of a distributed database system, the impact is significant. In both options there is no loss of data. They differ only in the time necessary to recover after a disaster. The algorithms used are called 2-safe. Algorithms that allow fast recovery, but still have only a small impact on the production system, are called 1-safe. With 1-safe algorithms, data may be lost. Polyzois and Garci´a-Molina present their research on the performance of a 2-safe algorithm and two 1-safe algorithms in a distributed environment. They explain in detail their “dependency reconstruction” and “epoch” algorithms and their testbed, but they do not define the format of their redo-logfile. From the context,<__?__Pub Caret> we can guess that they assume a redo-logfile consisting of transaction and database records. Other possibilities include a redo-logfile recording the physical datapages that were changed. I also missed an explanation of why anyone who needs continuous operation would accept loss of data. The algorithms perform as expected. Was the outcome ever in doubt__?__ Database administrators will appreciate this paper not so much for its performance study as for the clarity of the presentation of disaster recovery mechanisms.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Database Systems
ACM Transactions on Database Systems  Volume 19, Issue 3
Sept. 1994
169 pages
ISSN:0362-5915
EISSN:1557-4644
DOI:10.1145/185827
  • Editor:
  • Won Kim
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 1994
Published in TODS Volume 19, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. disaster recovery
  2. hot spare
  3. hot standby
  4. remote backup

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)64
  • Downloads (Last 6 weeks)13
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media