ABSTRACT
A remote backup is a copy of a primary database maintained at a geographically separate location and is used to increase data availability. Remote backup systems are typically log-based and can be classified into 2-safe and 1-safe, depending on whether transactions commit at both sites simultaneously or they first commit at the primary and are later propagated to the backup. We have built an experimental database system on which we evaluated the performance of the epoch algorithm, a 1-safe algorithm we have developed, and compared it with the 2-safe approach under various conditions. We also report on the use of multiple log streams to propagate information from the primary to the backup.
- 1.Bernstein, P. A., Hadzilacos, V., and Goodman, N. Concurrency Control and Recovery in Database Systems. Addison-Wesley, 1987. Google ScholarDigital Library
- 2.Burkes, D., and Treiber, K. Design Approaches for Real Time Recovery. Presentation at the Third International Workshop on High Performance Transaction Systems, Pacific Grove, CA, September 1989.Google Scholar
- 3.Garcia-Molina, H., and Abbott, R. K. Reliable distributed database management. In Proceedings of the 1EEE, Special Issue on Distributed Database Systems, pp 601-620, May 1987.Google ScholarCross Ref
- 4.Garcia-Molina, H., and Polyzois, C. A. Issues in Disaster Recovery. In Proceedings of IEEE Compcon, San Francisco, CA, February 1990, pp 573-577.Google ScholarCross Ref
- 5.Garcia-Molina, H., and Polyzois, C. A. A Generalized Disaster Recovery Model and Algorithln. In Proceedings of the Fourth international Workshop on High Performance Transaction Systems, Asilomar, CA, September 1991.Google Scholar
- 6.Garcia-Molina, H., Halim, N., King, R. P., and Polyzois, C. A. Management of a Remote Backup Copy for Disaster Recovery. A CM Transactions on Database Systems, Vol. 16, No. 2 (June 1991), pp 338-368. Google ScholarDigital Library
- 7.Garcia-Molina, H., Halim, N., King, R. P., and Polyzois, C. A. Overview of Disaster Recovery for Transaction Processing Systems. In Proceedings of IEEE lOth ICDCS, Pads, France, May 1990, pp 286-293.Google Scholar
- 8.Garcia-Molina, H., Polyzois, C., A. and Hagmann, R. Two Epoch Algorithms for Disaster Recovery. In Proceedings of 16th VLDB, Brisbane, Australia, August 1990, pp 222-230. Google ScholarDigital Library
- 9.Garcia-Molina, H., and Polyzois, C. A. Processing of Read-Only Queries at a Remote Backup. Technical Report CS-TR-354-91, Department of Computer Science, Princeton University, December 1991.Google Scholar
- 10.Gawlick, D., and Kinkade, D. Varieties of Concurrency Control in IMS/VS Fast Path. In Data Engineering Bulletin, Vol. 8, No. 2 (June 1985), pp 3-10.Google Scholar
- 11.Gray, J. N. Notes on Database Operating Systems. In Operating Systems: An Advanced Course, Ro Bayer et al., editors. Springer Verlag, 1979. Google ScholarDigital Library
- 12.Gray, J'. N., and Reuter, A. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1991. Google ScholarDigital Library
- 13.Gray, J. N., and Reuter, A. Transaction Processing. Course Notes from CS#445 Stanford Spring Term, 1988.Google Scholar
- 14.Lamport, L. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the A CM, Vol. 21, No. 7 (July 1978), pp 558-565. Google ScholarDigital Library
- 15.Lyon, J. Design Considerations in Replicated Database Systems for Disaster Protection. In Proceedings oflEEE Compcon, San Francisco, CA, 1988.Google Scholar
- 16.Lyon, J. Tandem's Remote Data Facility. In Proceedings of IEEE Compcon, San Francisco, CA, February 1990, pp 562-567.Google Scholar
- 17.Mohan, C., and Narang, I. Solutions to Hot Spot Problems in a Shared Disks Transaction Environment. In Proceedings of the Fourth International Workshop on High Performance Transaction Systems, Asilomar, CA, September 1991.Google Scholar
- 18.Mohan, C., and Lindsay, B. Efficient Commit protocols for the Tree of Processes Model of Distributed Transactions. In Proceedings of 2nd A CM SIGACT/SIGOPS Symposium on Principles of Distributed Computing, Montreal, Canada, August 1983. Google ScholarDigital Library
- 19.Mohan, C., Treiber, K., and Obemmrck, R. Algorithms for the Management of Remote Backup Databases for Disaster Recovery. IBM Research Report RJ 7885R, IBM Almaden Research Center, June 1990.Google Scholar
- 20.Seltzer, M., Chen P., and Ousterhout, J. Disk Scheduling Revisited. In Proceedings Winter 1990 USENIX, 1990.Google Scholar
- 21.Skeen, D. Nonblocking Commit Protocols. In Proceedings of A CM SIGMOD Conf. on Management of Data, Orlando, FL, June 1982, pp 133-147. Google ScholarDigital Library
- 22.Staelin, C., and Garcia-Molina, H. Clustering Active Disk Data to Improve Disk Performance. Technical Report CS-TR-283-90, Department of Computer Science, Princeton University, September 1990.Google Scholar
- 23.Tandem Computers. Remote Duplicate Database Facility (RDF) System Management Manual March 1987.Google Scholar
Index Terms
- Evaluation of remote backup algorithms for transaction processing systems
Recommendations
Evaluation of remote backup algorithms for transaction-processing systems
A remote backup is a copy of a primary database maintained at a geographically separate location and is used to increase data availability. Remote backup systems are typically log-based and can be classified into 2-safe and 1-safe, depending on whether ...
Management of a remote backup copy for disaster recovery
A remote backup database system tracks the state of a primary system, taking over transaction processing when disaster hits the primary site. The primary and backup sites are physically isolated so that failures at one site are unlikely to propogate to ...
Evaluation of remote backup algorithms for transaction processing systems
A remote backup is a copy of a primary database maintained at a geographically separate location and is used to increase data availability. Remote backup systems are typically log-based and can be classified into 2-safe and 1-safe, depending on whether ...
Comments