GTU MCA MATERIAL FOR DBMS II

RSS
  • Home
  • Quick Review
  • Assignment
  • Backup and Recovery
  • Differences
  • About Me

Monday, March 29, 2010

Checkpoints

Checkpoints

When System failure occurs

o We must consult log to determine those transaction that need to be redone and those transaction that need to be undone.

o We need to search entire log to determine this information.

There are two major difficulties with this

o Search process is time consuming

o Most of transaction that need to be redone have already written their update into the database. Although redoing them will cause no harm.

  • To reduce this type of overhead, we introduced checkpoints.
  • During execution system maintains the log, using one of the two techniques Deferred update or Immediate update.
  • In addition, System periodically performs checkpoints, which requires following sequence of action to take place
  • Output onto stable storage all log records currently residing in main memory.
  • Output to the disk all modified buffer blocks
  • Output onto stable storage a log record.
  • Transactions are not allowed to perform any update actions such as
    • Writing to a buffer block or
    • Writing to log record

While a checkpoint is in progress.

  • Checkpoint can be occur automatically and manually.
  • Checkpoints continue to occur whenever the database is shut down (normal or immediate) or when a redo log switch occurs.
  • To force a checkpoint, issue the following SQL command:

o alter system switch logfile;

o Alter system checkpoint;

Example :


  • T1 can be ignored (updates already output to disk due to checkpoint)
  • T2 and T3 redone.
  • T4 undone
Posted by Dr. Parag Shukla at 10:40:00 PM
Email This BlogThis! Share to X Share to Facebook
Labels: Checkpoints

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Total Pageviews

255091

Blog Archive

  • ►  2019 (1)
    • ►  March (1)
  • ►  2016 (7)
    • ►  August (6)
    • ►  July (1)
  • ►  2011 (16)
    • ►  May (2)
    • ►  April (6)
    • ►  March (5)
    • ►  February (3)
  • ▼  2010 (9)
    • ►  May (4)
    • ▼  March (5)
      • Shadow Paging
      • Checkpoints
      • Immediate Update Method
      • Log Based Recovery
      • Defferred Update method
  • ►  2009 (1)
    • ►  December (1)

Followers

Blog List

Search

Parag Shukla. Powered by Blogger.

Popular Posts

  • Serial Schedule Vs Non-Serial Schedule
    Serial Schedule Non-Serial Schedule A serial schedule is a sequence of operat...
  • Dirty Read Vs Unrepeatable Read
    Dirty Read Unrepeatable Read A dirty read problem occurs when one transaction updates a ...
  • Log Based Recovery
    Log Based Recovery The most widely used structure for recording database modification is the log. The log is a sequence of log ...
  • Lost Update Vs Uncommitted Data
    Lost Update Uncommitted Data This problem is also known as “Multiple Update...
  • Shadow Paging
    Shadow Paging This technique does not require LOG in single user environment In mult...
  • Starvation Vs Deadlock
    Starvation Deadlock Starvation happens if same transaction is always choosen ...
  • Checkpoints
    Checkpoints When System failure occurs o We must consult log to determine those transaction that need to be redone and those tra...
  • Defferred Update method
    Deferred update Do not physically update the database on disk until after a transaction reaches its commit point; Then updates are r...
  • Assignment - 7 Query Processing & Optimization
    Assignment – 7         Query Processing & optimization    Submission Date 30-05-11   Q-1. Explain th...
  • Immediate Update Method
    Immediate update technique Database may be updated by some operations of a transaction before the transaction reaches its commit poi...
Copyright © 2010 GTU MCA MATERIAL FOR DBMS II