GTU MCA MATERIAL FOR DBMS II

RSS
  • Home
  • Quick Review
  • Assignment
  • Backup and Recovery
  • Differences
  • About Me

Monday, March 29, 2010

Shadow Paging


Shadow Paging

  • This technique does not require LOG in single user environment
  • In multi-user may need LOG for concurrency control method
  • Shadow paging considers
    • The database is partitioned into fixed-length blocks referred to as PAGES.
    • Page table has n entries – one for each database page.
    • Each contain pointer to a page on disk (1 to 1st page on database and so on…).
The idea is to maintain 2 pages tables during the life of transaction.
    • The current page table
    • The shadow page table
When transaction starts, both page tables are identical
    • The shadow page table is never changed over the duration of the transaction.
    • The current page table may be changed when a transaction performs a write operation.
    • All input and output operations use the current page table to locate database pages on disk.
Advantages

  • No Overhead for writing log records.
  • No Undo /  No Redo algorithm.
  • Recovery is faster.
Disadvantages
  • Data gets fragmented  or scattered.
  • After every transaction completion database pages containing old version of modified data need to be garbage collected.
  • Hard to extend algorithm to allow transaction to run concurrently.
Posted by Dr. Parag Shukla at 10:56:00 PM
Email This BlogThis! Share to X Share to Facebook
Labels: Current Page Table, Recovery Technique, Shadow Copy, Shadow Page Table, Shadow Paging

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Total Pageviews

255014

Blog Archive

  • ►  2019 (1)
    • ►  March (1)
  • ►  2016 (7)
    • ►  August (6)
    • ►  July (1)
  • ►  2011 (16)
    • ►  May (2)
    • ►  April (6)
    • ►  March (5)
    • ►  February (3)
  • ▼  2010 (9)
    • ►  May (4)
    • ▼  March (5)
      • Shadow Paging
      • Checkpoints
      • Immediate Update Method
      • Log Based Recovery
      • Defferred Update method
  • ►  2009 (1)
    • ►  December (1)

Followers

Blog List

Search

Parag Shukla. Powered by Blogger.

Popular Posts

  • Serial Schedule Vs Non-Serial Schedule
    Serial Schedule Non-Serial Schedule A serial schedule is a sequence of operat...
  • Dirty Read Vs Unrepeatable Read
    Dirty Read Unrepeatable Read A dirty read problem occurs when one transaction updates a ...
  • Log Based Recovery
    Log Based Recovery The most widely used structure for recording database modification is the log. The log is a sequence of log ...
  • Lost Update Vs Uncommitted Data
    Lost Update Uncommitted Data This problem is also known as “Multiple Update...
  • Shadow Paging
    Shadow Paging This technique does not require LOG in single user environment In mult...
  • Starvation Vs Deadlock
    Starvation Deadlock Starvation happens if same transaction is always choosen ...
  • Checkpoints
    Checkpoints When System failure occurs o We must consult log to determine those transaction that need to be redone and those tra...
  • Defferred Update method
    Deferred update Do not physically update the database on disk until after a transaction reaches its commit point; Then updates are r...
  • Assignment - 7 Query Processing & Optimization
    Assignment – 7         Query Processing & optimization    Submission Date 30-05-11   Q-1. Explain th...
  • Immediate Update Method
    Immediate update technique Database may be updated by some operations of a transaction before the transaction reaches its commit poi...
Copyright © 2010 GTU MCA MATERIAL FOR DBMS II