Failures and recovery, Database Management System

Failures and Recovery

In practice various things might occur to prevent a transaction from completing. Recovery methods are used to bring database, which does not satisfy consistency needs, into a consistent state.  If a transaction finishes normally and commits then all the alters made by the transaction on the database are permanently registered in the database. They should not be lost. But, if a transaction does not finish normally and terminates abnormally then all the changes made by it should be discarded.  An abnormal termination of a transaction may be because of various causes, including:

a)  User may decide to terminate the transaction issued by him/ her

 b)  There may be a deadlock in the system

c)   There may be a system failure.

The recovery mechanisms must make sure that a consistent state of database can be restored under all circumstances.  In case of transaction terminate or deadlock, the system remains in control and can deal with the failure but in case of a system failure the system loses control because the computer itself has failed. Will the results of such type of failure be catastrophic? A database has a vast amount of useful information and any system failure should be recognised on the restart of the system. The DBMS should recover from some such failures.

 

Posted Date: 3/12/2013 3:32:44 AM | Location : United States







Related Discussions:- Failures and recovery, Assignment Help, Ask Question on Failures and recovery, Get Answer, Expert's Help, Failures and recovery Discussions

Write discussion on Failures and recovery
Your posts are moderated
Related Questions
gyan gurukul is a software company that provides software related solution.

Question (a) Differentiate between the following terms: (i) Distributed Database v/s Distributed Database management System (ii) Homogeneous Distributed Database v/s Hete

What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar

a publishing company produce scientific books on various subjects. the books are written by authors who specialize in one particular subject. the company employs editors who, not n

what is difference between circular inked lust and grunded linked list

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

A file manipulation command that extracts some of the records from a file is called ? A file manipulation command that extracts some of the records from a file is called SELECT

Association as a cache This association must be updated when any new element is added to it, but testing for overlap using association is more efficient.    Figure:

Explain the Concept of Two-phase Locking It concerns the positions of locking and unlocking operations in each transaction.  In this protocol every transaction issue lock and u

Project Description: Looking to prepare automated trading engine for alternate cyprto currencies starting with Cryptsy, finally integrating into other exchanges. Need to work wi