skip to main content
10.1145/130283.130321acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article
Free Access

Evaluation of remote backup algorithms for transaction processing systems

Published:01 June 1992Publication History

ABSTRACT

A remote backup is a copy of a primary database maintained at a geographically separate location and is used to increase data availability. Remote backup systems are typically log-based and can be classified into 2-safe and 1-safe, depending on whether transactions commit at both sites simultaneously or they first commit at the primary and are later propagated to the backup. We have built an experimental database system on which we evaluated the performance of the epoch algorithm, a 1-safe algorithm we have developed, and compared it with the 2-safe approach under various conditions. We also report on the use of multiple log streams to propagate information from the primary to the backup.

References

  1. 1.Bernstein, P. A., Hadzilacos, V., and Goodman, N. Concurrency Control and Recovery in Database Systems. Addison-Wesley, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Burkes, D., and Treiber, K. Design Approaches for Real Time Recovery. Presentation at the Third International Workshop on High Performance Transaction Systems, Pacific Grove, CA, September 1989.Google ScholarGoogle Scholar
  3. 3.Garcia-Molina, H., and Abbott, R. K. Reliable distributed database management. In Proceedings of the 1EEE, Special Issue on Distributed Database Systems, pp 601-620, May 1987.Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.Garcia-Molina, H., and Polyzois, C. A. Issues in Disaster Recovery. In Proceedings of IEEE Compcon, San Francisco, CA, February 1990, pp 573-577.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.Garcia-Molina, H., and Polyzois, C. A. A Generalized Disaster Recovery Model and Algorithln. In Proceedings of the Fourth international Workshop on High Performance Transaction Systems, Asilomar, CA, September 1991.Google ScholarGoogle Scholar
  6. 6.Garcia-Molina, H., Halim, N., King, R. P., and Polyzois, C. A. Management of a Remote Backup Copy for Disaster Recovery. A CM Transactions on Database Systems, Vol. 16, No. 2 (June 1991), pp 338-368. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Garcia-Molina, H., Halim, N., King, R. P., and Polyzois, C. A. Overview of Disaster Recovery for Transaction Processing Systems. In Proceedings of IEEE lOth ICDCS, Pads, France, May 1990, pp 286-293.Google ScholarGoogle Scholar
  8. 8.Garcia-Molina, H., Polyzois, C., A. and Hagmann, R. Two Epoch Algorithms for Disaster Recovery. In Proceedings of 16th VLDB, Brisbane, Australia, August 1990, pp 222-230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Garcia-Molina, H., and Polyzois, C. A. Processing of Read-Only Queries at a Remote Backup. Technical Report CS-TR-354-91, Department of Computer Science, Princeton University, December 1991.Google ScholarGoogle Scholar
  10. 10.Gawlick, D., and Kinkade, D. Varieties of Concurrency Control in IMS/VS Fast Path. In Data Engineering Bulletin, Vol. 8, No. 2 (June 1985), pp 3-10.Google ScholarGoogle Scholar
  11. 11.Gray, J. N. Notes on Database Operating Systems. In Operating Systems: An Advanced Course, Ro Bayer et al., editors. Springer Verlag, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Gray, J'. N., and Reuter, A. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Gray, J. N., and Reuter, A. Transaction Processing. Course Notes from CS#445 Stanford Spring Term, 1988.Google ScholarGoogle Scholar
  14. 14.Lamport, L. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the A CM, Vol. 21, No. 7 (July 1978), pp 558-565. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.Lyon, J. Design Considerations in Replicated Database Systems for Disaster Protection. In Proceedings oflEEE Compcon, San Francisco, CA, 1988.Google ScholarGoogle Scholar
  16. 16.Lyon, J. Tandem's Remote Data Facility. In Proceedings of IEEE Compcon, San Francisco, CA, February 1990, pp 562-567.Google ScholarGoogle Scholar
  17. 17.Mohan, C., and Narang, I. Solutions to Hot Spot Problems in a Shared Disks Transaction Environment. In Proceedings of the Fourth International Workshop on High Performance Transaction Systems, Asilomar, CA, September 1991.Google ScholarGoogle Scholar
  18. 18.Mohan, C., and Lindsay, B. Efficient Commit protocols for the Tree of Processes Model of Distributed Transactions. In Proceedings of 2nd A CM SIGACT/SIGOPS Symposium on Principles of Distributed Computing, Montreal, Canada, August 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.Mohan, C., Treiber, K., and Obemmrck, R. Algorithms for the Management of Remote Backup Databases for Disaster Recovery. IBM Research Report RJ 7885R, IBM Almaden Research Center, June 1990.Google ScholarGoogle Scholar
  20. 20.Seltzer, M., Chen P., and Ousterhout, J. Disk Scheduling Revisited. In Proceedings Winter 1990 USENIX, 1990.Google ScholarGoogle Scholar
  21. 21.Skeen, D. Nonblocking Commit Protocols. In Proceedings of A CM SIGMOD Conf. on Management of Data, Orlando, FL, June 1982, pp 133-147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.Staelin, C., and Garcia-Molina, H. Clustering Active Disk Data to Improve Disk Performance. Technical Report CS-TR-283-90, Department of Computer Science, Princeton University, September 1990.Google ScholarGoogle Scholar
  23. 23.Tandem Computers. Remote Duplicate Database Facility (RDF) System Management Manual March 1987.Google ScholarGoogle Scholar

Index Terms

  1. Evaluation of remote backup algorithms for transaction processing systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGMOD '92: Proceedings of the 1992 ACM SIGMOD international conference on Management of data
          June 1992
          416 pages
          ISBN:0897915216
          DOI:10.1145/130283

          Copyright © 1992 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 June 1992

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate785of4,003submissions,20%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader