Recovery Mechanisms in Database Systems

Overview

This is the first book to bring together all you need to know about database recovery - both theory and practice. It covers not just recovery mechanisms in today's relational databases, but also the critically important new techniques for main memory databases, mobile computing, and enterprise workflow systems. Recovery Mechanisms in Database Systems will be an essential resource for all database designers, architects, decision-makers, and advanced students in the field. ...
See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (10) from $18.00   
  • New (3) from $79.5   
  • Used (7) from $18.0   
Close
Sort by
Page 1 of 1
Showing 1 – 2 of 3
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$79.50
Seller since Tue Oct 07 09:35:53 EDT 2014

Feedback rating:

(294)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$105.00
Seller since Tue Oct 07 09:37:03 EDT 2014

Feedback rating:

(184)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing 1 – 2 of 3
Close
Sort by
Sending request ...

Overview

This is the first book to bring together all you need to know about database recovery - both theory and practice. It covers not just recovery mechanisms in today's relational databases, but also the critically important new techniques for main memory databases, mobile computing, and enterprise workflow systems. Recovery Mechanisms in Database Systems will be an essential resource for all database designers, architects, decision-makers, and advanced students in the field.
Read More Show Less

Editorial Reviews

Booknews
Brings together 31 research papers from the last decade on recovery mechanisms in current relational databases and techniques for main memory databases, mobile computing, and enterprise workflow systems. Covers subjects such as: four major recovery algorithms; hardware solutions, including RAID5, disk array striping, and safe RAM; and many approaches to recovery, including compensating transactions, nested sagas, fuzzy checkpointing, update-in-place, and shadow approaches. Annotation c. by Book News, Inc., Portland, Or.
Read More Show Less

Product Details

  • ISBN-13: 9780136142157
  • Publisher: Prentice Hall Professional Technical Reference
  • Publication date: 12/24/1997
  • Edition number: 1
  • Pages: 944
  • Product dimensions: 7.33 (w) x 9.54 (h) x 1.45 (d)

Read an Excerpt

PREFACE: Preface

Recovery is a process of restitution. In the spiritual world the recovery process restores and reveals our true self. When we arrive in this world, we are in our true self. Our interaction with the materialistic world then makes us believe that the world as we perceive with our senses is real and it is the absolute truth, thus falling into the state of ignorance (called MAYA in Indian philosophy). The recovery process salvages us from this state of ignorance and establishes us in the state of bliss, where duality does not exist.

The theme of this book, however, is recovery as practiced in database systems.
We describe here the concept and the process of recovery to database systems. To some of us, database recovery has been made more obscure than recovery in the spiritual world. The book, therefore, has tried to provide both the theoretical and the applied aspects of database recovery.
It covers recovery in traditional database systems, as well as in emerging technologies such as main memory databases, mobile computing, and workflow systems. It compiles valuable past and present works. Some of the chapters have been exclusively written for the book, and some have been selected from previously published works. One of our main goals is to gather together in one place the different perspectives on the subject currently scattered over time in many places.

The book begins with a historical perspective on database recovery. Ron Obermarck is the narrator, and he has done an excellent job in capturing most of the interesting events in the early evolution of the subject. Ron was one of the members of this ``recoverygang" whose motto was ``to recover from failure without loss of the customer's work."
He takes us back to the fall of 1968, at some corner of an IBM laboratory, when database recovery was ``born." He describes the advent of a number of ``magics" such as ``Write-Ahead-Log Tape," ``Undo," and ``Redo."
L It is interesting to note that mother nature did play an active role in the birth of database recovery by stimulating events such as lightning and thunderstorms that led to the development of some of these techniques.
Chapter 1, therefore, serves as an appetizer. Ron's history of recovery also complements nicely the history of database concurrency control, as given by Jim Gray in an earlier book edited by one of us, Performance of Concurrency Control Mechanisms in Centralized Database Systems, published by Prentice Hall, in 1996.
Since then, database recovery has become an important area of research. However, it lags behind concurrency control in the level of conceptual abstraction.

Every chapter of this book exposes some aspect of database recovery. We will only mention a few here as examples.
In Chapter 4, Weihl lucidly exposes the intricate relationship between recovery and concurrency control, and shows how some recovery methods place a set of constraints on concurrency control.
In Chapter 18, Hsu and Kleissner introduce and describe their perspectives on recovery in workflow systems, a subject still being debated in the research community and evolving in commercial systems.
In Chapters 23 and 24, Krishna and colleagues and Bertino and colleagues take readers to the area of mobile recovery. In Chapters 25 through 28, veteran researchers who have worked intensively with commercial database systems describe database recovery in practice. In Chapter 30, Thomasian presents performance issues of the RAID5 disk arrays.

It is our sincere hope that, with the help of the experts who contributed to this volume, we have compiled a book on database recovery that our readers will enjoy reading and consider a valuable source of reference.

Acknowledgements
This book would not have been completed without the generous contributions from the authors. Practically every one of them accepted our invitation to contribute an article to the book with little persuasion. Their cooperation also made our lives much easier during manuscript preparation. Some even offered to help in formatting the manuscript, a very time-consuming task.

We are grateful to so many people for helping us to complete this project that we would not attempt to provide a complete list. We will, however, give a special mention to Ron Obermarck, Dave Lomet, Dave DeWitt, Jim Gray, Elisa Bertino, and Krithi Ramamritham.
We especially enjoyed communicating with Ron Obermarck and Dave Lomet, who not only provided us technical guidance, but also generously offered moral support, which we at times greatly needed. Phil Bernstein was very kind in accepting our invitation to write a foreword.

Preparing the camera-ready copy of the book proved to be a very time-consuming process. It would have been worse had we not been rescued by Panos Chrysanthis; Bala Jayabalan and Yutong Wong, Vijay's Master and Ph.D. students; and Professor Gian Paolo Rossi's Ph.D. student Elena Pagani. Panos was generous with his help. Whenever we had a LaTex problem, we fired an e-mail to or called him and his response was immediate, and he never even threatened to change his e-mail address!

Bala laboriously incorporated copy editor's corrections to all chapters. Yutong helped us to redraw some of the graphs of our chapter, and Elena was very quick and precise in reformatting graphs of her chapter to fit in the book. We are thankful to these three wonderful students.

Our thanks also go to Mark Taub, Executive Editor, and Jane Bonnell at Prentice Hall PTR, and Cindy Kilborn, our representative at Prentice Hall. We communicated most of the time with Jane during the preparation of camera-ready chapters. Without her support and understanding we would not have succeeded in completing the camera-ready manuscript. Mark was very patient with us. Although he reminded us gently from time to time about the deadlines, he never exerted undue pressure, and was always kind enough to give us more time when we needed it. Cindy was instrumental in getting the project approved quickly.

Family members always play an important role in the completion of any project. Our children (Vijay's Krishna and Arjun, and Mei's baby Noelle) always greeted us with their wonderful smiles even when we stole some of their share of time in formatting the book chapters. The support and encouragement of Vijay's wife Elizabeth and Mei's husband Hoomin in completing this book have a special significance.

Finally, we wish to thank the Association for Computing Machinery, Institute of Electrical and Electronics Engineers, the VLDB Endowment, and Elsevier Science Publishing for granting permission to reprint the articles.

Vijay Kumar University of Missouri Kansas City, Missouri

Meichun Hsu Hewlett-Packard Laboratories Palo Alto, California

PERMISSION ACKNOWLEDGMENTS
Chapter 3. Haerder, T. and A. Reuter, ``Principles of Transaction-Oriented Database Recovery," Computing Survey, 15(4) (December 1983).

Chapter 5. Weihl, B. ``The Impact of Recovery on Concurrency Control," Journal of Computer and Systems Sciences, 47(1) (August 1993).

Chapter 6. Lomet, D. and Mark R. Tuttle, ``Redo Recovery after System Crashes," Proceedings of Very Large Databases, Zurich, September 1995.

Chapter 7. Lomet. D., ``MLR: A Recovery Method for Multi-Level Systems," ACM SIGMOD, San Diego, 21(2) (June 1992).

Chapter 8. Mohan, C., Don Haderle, Bruce Lindsay, Hamid Pirahesh, and Peter Schwarz. ``ARIES: A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging," ACM Transactions on Database Systems, 17(1) (March 1992).

Chapter 9. Kumar, V. and Shown Moe. ``Performance of Recovery Algorithms for Centralized Database Management Systems," Information Sciences, 86(1--3)\ (September 1995).

Chapter 10. Goes, P.B., and U. Sumita, ``Stochastic Models for Performance Analysis of Database Recovery Control," IEEE Transactions on Computers, 44(4) (April 1995).

Chapter 12. Dan, A., Philip S. Yu, and A. Jhingran. ``Recovery Analysis of Data Sharing Systems under Deferred Dirty Page Propagation Policies," IEEE Transactions on Parallel and Distributed Systems, 8(7) (July 1997).

Chapter 14. Franklin, M., Michael Zwilling, C.K. Tan, Michael Carey, and D. DeWitt, ``Crash Recovery in Client-Server EXODUS," ACM SIGMOD, San Diego, 21(2) (June 1992).

Chapter 19. Copeland, G., T. Keller, R. Krishnamurthy, and M. Smith. ``Case for Safe Ram," Proc. of Very Large Databases, Amsterdam, 1989.

Chapter 22. Kumar, V. and A. Bueger. ``Performance Measurement of Main Memory Database Recovery Algorithms Based on Update-in-Place and Shadow Approaches," IEEE Transactions on Knowledge and Data Engineering, 4(6), (December 1992).

Chapter 23. Pradhan, D. K., P. Krishna, and N. H. Vaidya. ``Recovery in Mobile Environment: Design and Trade-off Issues," IEEE Proc. of Symposium for Fault-tolerant Computing, June 1996.

Chapter 27. Gray, J., P. McJones, M. Blasgen, B. Lindsey, R. Lorie, T. Price, F. Putzolu, and I. Traiger. ``The Recovery Manager of the System R Database Manager," ACM Computing Surveys, 13(2) (June 1981).

Chapter 28. White, Seth J., and David J. DeWitt. ``Implementing Crash Recovery in QuickStore: A Performance Study," ACM SIGMOD, San Jose, 24(2)2 (May 1995).


Read More Show Less

Table of Contents

Foreword
Preface
Acknowledgement
1 IMS/360 and IMS/VS Recovery: Historical Recollections 1
2 Introduction to Database Recovery 6
3 Principles of Transaction-Oriented Database Recovery 16
4 Recovery-Enhanced, Reliability, Dependability, and Performability 56
5 The Impact of Recovery on Concurrency Control 71
6 Redo Recovery After System Crashes 101
7 MLR: A Recovery Method for Multilevel Systems 125
8 ARIES: A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging 145
9 Performance of Recovery Algorithms for Centralized Database Management Systems 219
10 Stochastic Models for Performance Analysis of Database Recovery Control 259
11 Analytical Modeling and Comparison of Buffer Coherency and Dirty-Page Propagation Policies under Different Recovery Complexities 295
12 Recovery Analysis of Data Sharing Systems under Deferred Dirty Page Propagation Policies 335
13 Recovery and Performance of Atomic Commit Processing in Distributed Database Systems 370
14 Crash Recovery in Client-Server EXODUS 417
15 A Formal Approach to Recovery by Compensating Transactions 444
16 Coordinating Multitransaction Activities with Nested Sagas 466
17 Recovery Options in Directory-Based Software Coherency Schemes 482
18 ObjectFlow and Recovery in Workflow Systems 505
19 The Case for Safe RAM 528
20 Recovering from Main-Memory Lapses 548
21 Fuzzy Checkpointing Alternatives for Main-Memory Databases 574
22 Performance Measurement of Main-Memory Database Recovery Algorithms Based on Update-in-Place and Shadow Approaches 617
23 Recoverable Mobile Environment: Design and Trade-Off Analysis 638
24 Fault Tolerance and Recovery in Mobile Computing Systems 661
25 Advanced Recovery Techniques in Practice 697
26 Logging and Recovery in Commercial Systems 711
27 The Recovery Manager of the System R Database Manager 721
28 Implementing Crash Recovery in QuickStore: A Performance Study 749
29 Disk Array Striping 780
30 RAID5 Disk Arrays and Their Performance Evaluation 807
31 A Performance Comparison of RAID5 and Log-Structured Arrays 847
Selected Biography 881
Read More Show Less

Preface

PREFACE: Preface

Recovery is a process of restitution. In the spiritual world the recovery process restores and reveals our true self. When we arrive in this world, we are in our true self. Our interaction with the materialistic world then makes us believe that the world as we perceive with our senses is real and it is the absolute truth, thus falling into the state of ignorance (called MAYA in Indian philosophy). The recovery process salvages us from this state of ignorance and establishes us in the state of bliss, where duality does not exist.

The theme of this book, however, is recovery as practiced in database systems.
We describe here the concept and the process of recovery to database systems. To some of us, database recovery has been made more obscure than recovery in the spiritual world. The book, therefore, has tried to provide both the theoretical and the applied aspects of database recovery.
It covers recovery in traditional database systems, as well as in emerging technologies such as main memory databases, mobile computing, and workflow systems. It compiles valuable past and present works. Some of the chapters have been exclusively written for the book, and some have been selected from previously published works. One of our main goals is to gather together in one place the different perspectives on the subject currently scattered over time in many places.

The book begins with a historical perspective on database recovery. Ron Obermarck is the narrator, and he has done an excellent job in capturing most of the interesting events in the early evolution of the subject. Ron was one of the members of this``recoverygang" whose motto was ``to recover from failure without loss of the customer's work."
He takes us back to the fall of 1968, at some corner of an IBM laboratory, when database recovery was ``born." He describes the advent of a number of ``magics" such as ``Write-Ahead-Log Tape," ``Undo," and ``Redo."
L It is interesting to note that mother nature did play an active role in the birth of database recovery by stimulating events such as lightning and thunderstorms that led to the development of some of these techniques.
Chapter 1, therefore, serves as an appetizer. Ron's history of recovery also complements nicely the history of database concurrency control, as given by Jim Gray in an earlier book edited by one of us, Performance of Concurrency Control Mechanisms in Centralized Database Systems, published by Prentice Hall, in 1996.
Since then, database recovery has become an important area of research. However, it lags behind concurrency control in the level of conceptual abstraction.

Every chapter of this book exposes some aspect of database recovery. We will only mention a few here as examples.
In Chapter 4, Weihl lucidly exposes the intricate relationship between recovery and concurrency control, and shows how some recovery methods place a set of constraints on concurrency control.
In Chapter 18, Hsu and Kleissner introduce and describe their perspectives on recovery in workflow systems, a subject still being debated in the research community and evolving in commercial systems.
In Chapters 23 and 24, Krishna and colleagues and Bertino and colleagues take readers to the area of mobile recovery. In Chapters 25 through 28, veteran researchers who have worked intensively with commercial database systems describe database recovery in practice. In Chapter 30, Thomasian presents performance issues of the RAID5 disk arrays.

It is our sincere hope that, with the help of the experts who contributed to this volume, we have compiled a book on database recovery that our readers will enjoy reading and consider a valuable source of reference.

Acknowledgements
This book would not have been completed without the generous contributions from the authors. Practically every one of them accepted our invitation to contribute an article to the book with little persuasion. Their cooperation also made our lives much easier during manuscript preparation. Some even offered to help in formatting the manuscript, a very time-consuming task.

We are grateful to so many people for helping us to complete this project that we would not attempt to provide a complete list. We will, however, give a special mention to Ron Obermarck, Dave Lomet, Dave DeWitt, Jim Gray, Elisa Bertino, and Krithi Ramamritham.
We especially enjoyed communicating with Ron Obermarck and Dave Lomet, who not only provided us technical guidance, but also generously offered moral support, which we at times greatly needed. Phil Bernstein was very kind in accepting our invitation to write a foreword.

Preparing the camera-ready copy of the book proved to be a very time-consuming process. It would have been worse had we not been rescued by Panos Chrysanthis; Bala Jayabalan and Yutong Wong, Vijay's Master and Ph.D. students; and Professor Gian Paolo Rossi's Ph.D. student Elena Pagani. Panos was generous with his help. Whenever we had a LaTex problem, we fired an e-mail to or called him and his response was immediate, and he never even threatened to change his e-mail address!

Bala laboriously incorporated copy editor's corrections to all chapters. Yutong helped us to redraw some of the graphs of our chapter, and Elena was very quick and precise in reformatting graphs of her chapter to fit in the book. We are thankful to these three wonderful students.

Our thanks also go to Mark Taub, Executive Editor, and Jane Bonnell at Prentice Hall PTR, and Cindy Kilborn, our representative at Prentice Hall. We communicated most of the time with Jane during the preparation of camera-ready chapters. Without her support and understanding we would not have succeeded in completing the camera-ready manuscript. Mark was very patient with us. Although he reminded us gently from time to time about the deadlines, he never exerted undue pressure, and was always kind enough to give us more time when we needed it. Cindy was instrumental in getting the project approved quickly.

Family members always play an important role in the completion of any project. Our children (Vijay's Krishna and Arjun, and Mei's baby Noelle) always greeted us with their wonderful smiles even when we stole some of their share of time in formatting the book chapters. The support and encouragement of Vijay's wife Elizabeth and Mei's husband Hoomin in completing this book have a special significance.

Finally, we wish to thank the Association for Computing Machinery, Institute of Electrical and Electronics Engineers, the VLDB Endowment, and Elsevier Science Publishing for granting permission to reprint the articles.

Vijay Kumar University of Missouri Kansas City, Missouri

Meichun Hsu Hewlett-Packard Laboratories Palo Alto, California

PERMISSION ACKNOWLEDGMENTS
Chapter 3. Haerder, T. and A. Reuter, ``Principles of Transaction-Oriented Database Recovery," Computing Survey, 15(4) (December 1983).

Chapter 5. Weihl, B. ``The Impact of Recovery on Concurrency Control," Journal of Computer and Systems Sciences, 47(1) (August 1993).

Chapter 6. Lomet, D. and Mark R. Tuttle, ``Redo Recovery after System Crashes," Proceedings of Very Large Databases, Zurich, September 1995.

Chapter 7. Lomet. D., ``MLR: A Recovery Method for Multi-Level Systems," ACM SIGMOD, San Diego, 21(2) (June 1992).

Chapter 8. Mohan, C., Don Haderle, Bruce Lindsay, Hamid Pirahesh, and Peter Schwarz. ``ARIES: A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging," ACM Transactions on Database Systems, 17(1) (March 1992).

Chapter 9. Kumar, V. and Shown Moe. ``Performance of Recovery Algorithms for Centralized Database Management Systems," Information Sciences, 86(1--3)\\ (September 1995).

Chapter 10. Goes, P.B., and U. Sumita, ``Stochastic Models for Performance Analysis of Database Recovery Control," IEEE Transactions on Computers, 44(4) (April 1995).

Chapter 12. Dan, A., Philip S. Yu, and A. Jhingran. ``Recovery Analysis of Data Sharing Systems under Deferred Dirty Page Propagation Policies," IEEE Transactions on Parallel and Distributed Systems, 8(7) (July 1997).

Chapter 14. Franklin, M., Michael Zwilling, C.K. Tan, Michael Carey, and D. DeWitt, ``Crash Recovery in Client-Server EXODUS," ACM SIGMOD, San Diego, 21(2) (June 1992).

Chapter 19. Copeland, G., T. Keller, R. Krishnamurthy, and M. Smith. ``Case for Safe Ram," Proc. of Very Large Databases, Amsterdam, 1989.

Chapter 22. Kumar, V. and A. Bueger. ``Performance Measurement of Main Memory Database Recovery Algorithms Based on Update-in-Place and Shadow Approaches," IEEE Transactions on Knowledge and Data Engineering, 4(6), (December 1992).

Chapter 23. Pradhan, D. K., P. Krishna, and N. H. Vaidya. ``Recovery in Mobile Environment: Design and Trade-off Issues," IEEE Proc. of Symposium for Fault-tolerant Computing, June 1996.

Chapter 27. Gray, J., P. McJones, M. Blasgen, B. Lindsey, R. Lorie, T. Price, F. Putzolu, and I. Traiger. ``The Recovery Manager of the System R Database Manager," ACM Computing Surveys, 13(2) (June 1981).

Chapter 28. White, Seth J., and David J. DeWitt. ``Implementing Crash Recovery in QuickStore: A Performance Study," ACM SIGMOD, San Jose, 24(2)2 (May 1995).


Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)