Explain the log based recovery method, Database Management System

Assignment Help:

Explain the Log Based Recovery Method?

The system log that is generally written on stable storage consists of the redundant data required to recover from volatile storage failures and as well from errors discovered by the transaction or the database system. System log is as well known as log and has sometimes been known as the DBMS journal. In case of system crash the log is processed from the starting to the point where system crashes. Every transaction, those have been recorded their-of-transaction marker, will be committed if not rolled back. The simplicity and very easy to use the main benefits of this method.

The drawback are:

(A) Inefficient for the application, which have large volume of information,

(b) In case of system crash along with loss of volatile information, the log information collected in buffers will as well be lost and transaction that had been completed for some period prior to the system crash might be missing their relevant end-of-transaction markers in the log; if such transactions are rolled back then similarly to be partially undone.


Related Discussions:- Explain the log based recovery method

horizontal fragmentation, Horizontal Fragmentation- Horizontal fragmentati...

Horizontal Fragmentation- Horizontal fragmentation groups together the tuples in a relation that are collectively used by the main transactions. A horizontal fragment is produced b

Development of an ER diagram and database implementation, i want answers th...

i want answers this assignment now if yiu can maket for me now ?

Which is an advantage of view, Which is an advantage of view? The Advan...

Which is an advantage of view? The Advantages of view is Data security, Derived columns and Hiding of complex queries

Er diagrams, in an organization several projects are undertaken. Each proje...

in an organization several projects are undertaken. Each project can employ one or more employees. Each employee can work on one or more projects. Each project is undertaken on the

Explain the weak entity set, Explain the Weak Entity Set An Entity set...

Explain the Weak Entity Set An Entity set which does not have sufficient attribute to make a primay key is known as weak entity set. For instance, dependents of an employee in

Describe graphical user interface, Describe Graphical User Interface? ...

Describe Graphical User Interface? Graphical User Interfaces (GUIs) - A GUI typically displays a schema to the user in diagrammatic form. The user can then specify a query th

Define atom of domain relational calculus, Define Atom of domain relational...

Define Atom of domain relational calculus An atom has the outline 1 , x 2 , ... , x n > -> r , in which r stands for a relation on n attributes and x 1 , x 2 , ... , x n ar

Please answer me., gyan gurukul is a software company that provides softwar...

gyan gurukul is a software company that provides software related solution.

What is a hash index, What is a hash index? A hash index organizes the ...

What is a hash index? A hash index organizes the search keys, with their associated pointers, into a hash file structure.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd