skip to main content
article
Free Access

Performance analysis of recovery techniques

Published:05 December 1984Publication History
Skip Abstract Section

Abstract

Various logging and recovery techniques for centralized transaction-oriented database systems under performance aspects are described and discussed. The classification of functional principles that has been developed in a companion paper is used as a terminological basis. In the main sections, a set of analytic models is introduced and evaluated in order to compare the performance characteristics of nine different recovery techniques with respect to four key parameters and a set of other parameters with less influence. Finally, the results of model evaluation as well as the limitations of the models themselves are discussed.

References

  1. 1 ADABAS User Manual. Software AG, Hilpertstrasse 20, 6100 Darmstadt, West Germany.Google ScholarGoogle Scholar
  2. 2 BAYER, R. Database system design for high performance. In Proceedings IFIP 9th World Computer Congress (Paris, 1983), 147-155.Google ScholarGoogle Scholar
  3. 3 CHANDY, K.M., BROWNE, J.C., DISSLY, C.W., AND UHRIG, W.R. Analytic models for rollback and recovery strategies in database systems. IEEE Trans. So#w. Eng. SE-1, 1 (Mar. 1975), 100- 110.Google ScholarGoogle Scholar
  4. 4 EFFELSBERG, W., AND HAERDER, T. Principles of database buffer management. Res. Rep., Univ. of Kaiserslautern, 1982.Google ScholarGoogle Scholar
  5. 5 ELHARDT, K. Das Datenbank-Cache. Ph.D. dissertation, Techn. Univ. of Munich, Dept. of Computer Sciences, Munich, 1982 (in German).Google ScholarGoogle Scholar
  6. 6 FossuM, B.M. Database integrity as provided for by a particular database management system. In Data Base Management, J.W. Klimbie and K.L. Koffeman, Eds., North-Holland Publ. Co., 1974, 271-288.Google ScholarGoogle Scholar
  7. 7 GELENBE, E. Performance of rollback recovery systems under intermittent failures. Commun. ACM 21, 5 (June 1978). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 GIORDANO, N.J., AND SCHWARTZ, M.S. Database recovery at CMIC. In Proceedings ACM SIGMOD Conference (Washington, D.C., June 1976), 38-42. Google ScholarGoogle Scholar
  9. 9 GRAY, J.N. Notes on database operating systems. In Lecture Notes in Computer Science, Vol. 60, Springer-Verlag, New York, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 GRAY, J.N., MCJONES, P., BLASGEN, M., LINDSAY, B., LORm, R., PRICE, T., PUTZOLU, F., AND TRAIGER, I.L. The recovery manager of the System R database manager. ACM Comput. Surv. 13, 2 (June 1982), 223-242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 HAERDER, T., AND REUTER, A. Optimization of logging and recovery in a database system, in Data Base Architecture, North Holland Publ. Co., New York, 1979, 151-168.Google ScholarGoogle Scholar
  12. 12 HAERDER, T., AND REUTER, A. Principles of transaction-oriented database recovery. IB 50/82, Dept. of Computer Sciences, Univ. of Kaiserslautern. Submitted for publication.Google ScholarGoogle Scholar
  13. 13 IMS/VS Version i, Application Programming Reference Manual. No. SH20-9026-6, 1978.Google ScholarGoogle Scholar
  14. 14 KIN~, W.F. Relational database systems: Where we stand today. In Proceedings GI-Jahrestagung 1980, Saarbruecken, Informatik-Fachberichte, Bd. 33, Springer-Verlag, 15-44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 LAMPSON, B.W., AND STURGIS, H.E. Crash recovery in a distributed data storage system. XEROX Res. Rep., Palo Alto, Calif., April 1979. Submitted for publication.Google ScholarGoogle Scholar
  16. 16 LINDSA~, B.G., SELINGER, P.G., GALTIERI, C., GRAY, J.N., LORIE, R., PRICE, T.G., PUTZOLU, F., TRAINER, I.L., AND WADE, B.W. Notes on distributed databases. IBM Res. Rep. RJ2571, San Jose, Calif., 1979.Google ScholarGoogle Scholar
  17. 17 LORIE, R.A. Physical integrity in a large segmented database. ACM Trans. Database Syst. 2, 1 (Mar. 1977), 91-104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18 REUTER, A. A fast transaction-oriented logging scheme for UNDO recovery. IEEE Trans. Softw. Eng. SE-6 (July 1980).Google ScholarGoogle Scholar
  19. 19 REUTER, A. Schnelle Datenbankrecovery mit Hilfe eines hardware-gestuetzten Schattenspeicher-Algorithmus. In German Chapter of the ACM, Berichte Nr. 6, B.G. Teubner-Verlag, Stuttgart, 1980, 258-272. (In German)Google ScholarGoogle Scholar
  20. 20 REUTER, A. Fehlerbehandlung in Datenbanksystemen. Carl Hanser Verlag, Munich, 1981.Google ScholarGoogle Scholar
  21. 21 SEVERANCE, D.G., AND LOHMAN, G.M. Differential files: Their application to the maintenance of large databases. ACM Trans. Database Syst. 1, 3 (Sept. 1976), 256-267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22 SPIRN, J.R., AND DENNING, P.G. Experiments with program locality. In AFIPS Conference Proceedings, Vol. 41, FJCC, 1972, 611-621.Google ScholarGoogle Scholar
  23. 23 Universal Database Management System, UDS-V3, Reference Manual Package. Siemens AG, Munich.Google ScholarGoogle Scholar
  24. 24 VERHOFSTAD, J.S.M. Recovery techniques for database systems. ACM Comput. Surv. 10, 2 (June 1978), 167-195. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25 VERHOFSTAD, J.S.M. Recovery based on types. In Data Base Architecture, North-Holland Publ. Co., New York, 1979, 125-139.Google ScholarGoogle Scholar

Index Terms

  1. Performance analysis of recovery techniques

                  Recommendations

                  Reviews

                  Jane B. Grimson

                  Database recovery is an area which has been largely neglected by researchers, yet there is unanimous agreement that recovery is a vital component of every DBMS. A number of recovery algorithms have been put forward. While there have been many attempts to compare the performance of, for example, concurrency control algorithms, there has been no parallel development for recovery. This is all the more surprising, as the author points out, given that experience has shown that the recovery component has a strong impact on overall system performance. Predicting the performance of recovery algorithms is a difficult task because it is almost impossible to analyze the recovery component in isolation from other components of the system. This paper develops a fairly simplistic model of DB recovery, with a view to identifying the influence of the most significant parameters on performance. The author classifies recovery algorithms according to a number of different characteristics. These include the timing of the propagation of updates to the database; for examples, algorithms using update-in-place entail immediate propagation, whereas under shadow-page algorithms, propagation only takes place when the next checkpoint is taken. Recovery algorithms are also classified according to whether or not pages can be written to disk prior to end-of-transaction. Similarly, algorithms will vary according to whether or not propagation of all pages involved in a transaction is tied to end-of-transaction. Finally, the taxonomy of recovery algorithms distinguishes between different checkpoint schemes by the events triggering the checkpoint generation, e.g., at end-of-transaction. Clearly, logging activity is an integral part of the recovery technique since it is the log information which provides the input to the recovery component. Having produced a classification scheme for recovery and logging techniques, the author identifies the principal performance measures for these techniques. These include overhead during normal DB processing, speed of recovery after failure, degree of reliability achieved by the algorithm, space requirements of the log file, and the software complexity of the logging and recovery components. The author points out that these measures are difficult to quantify and rank. For the purposes of his model, he takes a much more simplistic view, identifying the number of I/O operations caused by the logging and recovery activities. The main aim is to determine the maximum transaction rate beyond which the system becomes I/O bound due to recovery-related activity. A number of different models of various recovery and logging techniques, according to the classification scheme developed in the paper, are given and evaluated. From this a number of broad conclusions are drawn. Of particular interest is that for applications with a high degree of communality (i.e., there is a high probability of finding a page referenced by a transaction in the buffer); techniques which do not tie update propagation to end-of-transaction are superior. Also, where the meantime between failure is orders of magnitude greater than the time for restart (the normal situation), techniques without checkpoints can be ruled out. The results also show that page logging is more costly than entry logging (cf., the role of lock granularity in concurrency control). This is an interesting paper which addresses a difficult subject. The model is undoubtedly somewhat oversimplified, although the results obtained analytically and empirically, through a very small study, do support intuitive notions about the performance of recovery algorithms. It is to be hoped that this paper will stimulate research in the vital area of recovery in DBMS.

                  Access critical reviews of Computing literature here

                  Become a reviewer for Computing Reviews.

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  • Published in

                    cover image ACM Transactions on Database Systems
                    ACM Transactions on Database Systems  Volume 9, Issue 4
                    Dec. 1984
                    208 pages
                    ISSN:0362-5915
                    EISSN:1557-4644
                    DOI:10.1145/1994
                    Issue’s Table of Contents

                    Copyright © 1984 ACM

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 5 December 1984
                    Published in tods Volume 9, Issue 4

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • article

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader