Chapter 21 Recoverable Techniques

Chapter 21 Recoverable Techniques PowerPoint PPT Presentation


  • 81 Views
  • Uploaded on
  • Presentation posted in: General

19-1. 21-2. Strategy for recoveryCatastrophic failureRestore a past copy of the databaseReconstruct a more current state by reapplying or redoing committed transaction operationsNoncatastrophic failureReverse the changes by undoing some operationsRedo some operations to restore a consistent st

Download Presentation

Chapter 21 Recoverable Techniques

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


1. Chapter 21 Recoverable Techniques

2. 19-1 21-2 Strategy for recovery Catastrophic failure Restore a past copy of the database Reconstruct a more current state by reapplying or redoing committed transaction operations Noncatastrophic failure Reverse the changes by undoing some operations Redo some operations to restore a consistent state

3. 19-2 21-3 Deferred update (NO-UNDO/REDO Algorithm) Do not update the database until after a transaction reaches its commit point Before commit transaction workspace (buffers) During commit log. database

4. 19-2 21-4 Immediate update (UNDO/REDO Algorithm) update by some operations before a transaction reaches its commit point.

5. 19-3 21-5 DBMS cache: hold database items ?directory ?flush ?dirty bit Flushing a modified data item In-place updating ? data items are written in the same disk location BFIM?AFIM ? single copy of each database block Shadowing new items are written at different disk location In-place updating REDo-type log entry: after image (AFIM) UNDo-type log enty : before image (BFIM) WRITE-AHEAD LOGGING (WAL) BFIM ?log ?disk BFIM is replaced

6. 19-3.1 21-6

7. 19-3.2 21-7

8. 19-4 21-8

9. 19-5 21-9

10. 19-6 21-10 Deferred Update Protocol (NO-UNDO / REDO recovery algorithm) A transaction cannot change the database until it reaches its commit point. A transaction does not reach its commit point until all its update operations are recorded in the log and log is force-written to disk. (WAL protocol)

11. 19-6 21-11 Single User Environment RDU_S (recovery using deferred update in a single-user environment) Apply the REDO operation to all the write_item operations of committed transactions from the log in the order in which they were written to the log. Restart the active transaction (at most one)

12. 19-7 21-12

13. 19-8 21-13

14. 19-9 21-14 Multi user Environment the locks remain until commit point Example concurrency control: (strict & serializable schedules) two-phase locking Recovery process: deferred update The greater the degree of concurrency, the more time consuming the task of recovery RDU_M (recovery using deferred update in a multi user environment) REDo all the WRITE operations of the committed transactions from the log in the order they were written into log The active transactions are effectively canceled and must be resubmitted.

15. 19-10 21-15

16. 19-10.1 21-16

17. 19-11 21-17

18. 19-12 21-18

19. 19-12.1 21-19

20. 19-13 21-20 UNDO (WRITE_OP) Examine the log entry [write_item, T, X, old_value, new_value] set X to old_value When more than one write_item is undone, proceed in the reverse order from the order in which the operations were written in the log.

21. 19-14 21-21 UNDO/REDO Immediate Update with Concurrent Execution Concurrency Control Protocol- strict two phase locking protocol a transaction is not allowed to read or write an item unless the transaction writing the item has committed (or aborted) deadlock?rollback?undo

22. 19-14 21-22 UNDO/REDO Immediate Update with Concurrent Execution (Cont.) PROCEDURE RIU_M Use two lists of transactions Committed transactions Active transactions Undo all the write_item_operations of the active transactions in the reverse order in which they were written into the log. Redo all the write_item operations of the committed transactions from the log in the order in which they were written into the log. vs. redo from the end of the log (redo the last update of each item X)

23. 19-15 21-23 Shadow Paging Database is made up of a number of fixed-size disk pages. (n) A page table with n entries is constructed Current page table Shadow page table (not updated copy) for each transaction

24. 19-15 21-24

25. 19-16 21-25

26. 10-8 21-26 Security in Statistical Databases Statistical databases – a database, such as a census database, that (a) contains a large number of individually sensitive records, but (b) is intended to supply only statistical summary information to its users, not information referring to some specific individual. The only permissible queries – (statistical query) Apply COUNT, SUM, AVERAGE to some subset of the records in the database Problem: deduction of confidential information by inference.

27. 10-9 21-27

28. 10-9 21-28 Assume some (authorized) user U knows from Outside sources that Able is a programmer and is male. Q1. SELECT COUNT(*) FROM STATS WHERE SET=‘M’ AND OCCUPATION =‘PROGRAMMER’ Q2. SELECT SUM(SALARY), SUM(TAX) FROM STATS WHERE SEX=‘M’ AND OCCUPATION=‘PROGRAMMER’

29. 10-10 21-29

30. 10-11 21-30

31. 10-12 21-31

32. 10-13 21-32

33. 10-14 21-33

34. 10-14/15

35. 10-15 21-35

36. 10-15 21-36 Summary A general tracker “almost always” exists, and is usually both easy to find and easy to use. Security in a statistical database is a real problem Data swapping,…

37. 3-1 21-37 Logic as a Data Model (1) boss (E, M) :– manages (E,M). (2) boss (E, M) :– boss (E,N) & manages(N,M).

38. 3-1 21-38 The meaning of logical rules Proof-theoretic interpretation the set of facts derivable from given, or database facts, using the rules in the “forward” direction only. backward direction: ( q :– p. and ? q ) ? ? p forward direction: p ? q infer left sides (consequents, or conclusions) from right sides (antecedents or hypotheses)

39. 3-2 21-39

40. 3-2 21-40

41. 3-3 21-41 Minimal model Suppose r(1) is true, while r(x) is false for X?1. That is, r(1) is a database instance. M1 = { r(1), q(1), p(1), q(2), p(2), p(3) } is a possible world M2 = { r(1), q(1), p(1)} is also a consistent model M3 = { r(1), q(1), p(1), q(2), p(2) }…

42. 3-4 21-42 Computational definitions provide an algorithm for “ executing” them to tell whether a potential fact is true. Prolog: left-to-right computation rule depth-first search rule 1. p(x) :– q(x) 2. q(x) :– r(x) 3. r(1).

43. 3-5 21-43 The Datalog Data Model datalog- a version of prolog suitable for database systems Datalog does not allow function symbol in arguments. (I.E., only variable and constants are allowed) The “meaning” of datalog programs follows the model-theoretical point of view. The underling mathematical model for datalog-relational model predicate symbols in datalog-relations

44. 3-6 21-44 The Datalog Data Model (Cont.) In datalog, there are two ways relations can be defined: (a) extensional database (EDB) (b) intensional database (IDB) In relational model, all relations are EDB relations. Example boss (E,M) :– manages (E, M) boss (E,M) :– boss (E, N) & manages (N,M) manages (b, a). manages (c, a). manages (d, b). manages (e, b). (1) and (2) -IDB (3) -EDB, I.E. manages relation.

45. 3-7 21-45 Atomic formulas (Atoms) Predicate symbols with a list of arguments (variable or constant) predicate of arity K p(K). An atomic formula denotes a relation. Select for equality between a constant and the component, e.g. customers (joe, Address, Balance) = s$1= joe (CUSTOMERS) Selecting for equality between components that have the same variable. e.g. includes(X, Item, X) = s$1=$3 (INCLUDES)

46. 3-8 21-46 Clauses and Horn Clauses Literal: an atomic formula or a negated atomic formula Clause: a disjunction of literals Horn clause: A single positive literal -- fact One or more negative literals with no positive literal -- integrity constraint A positive literal and one or more negative literals -- rule

47. 3-9 21-47 Logic program - a collection of Horn Clauses Sibling(X,Y) :– parent(X,Z) & parent(Y,Z) & X?Y

48. 3-10 21-48

49. 3-11 21-49 Dependency Graphs and Recursion Node: predicate Link: predicate p ? predicate q (1) sibling(X,Y) :– parent(X,Z) & parent(Y,Z) & X?Y sibling parent A logic program is recursive if its dependency graph has one or more cycles. All the predicates that are on one or more cycles are said to be recursive predicates.

50. 3-12 21-50

51. 3-13 21-51 Safe Rules source of infiniteness Variable that appears only in a built_in predicate. biggerThan(X,Y) :– X > Y. Variable that appears only in the head of a rule loves(X,Y) :– lover(Y).

52. 3-14 21-52 Definition limited variable Any variable that appears as an argument in an ordinary predicate of the body is limited. Any variable X that appears in a subgoal X=a or a=X, where a is a constant, is limited. Variable X is limited if it appears in a subgoal X=Y or Y=X, where Y is a variable already know to be limited.

53. 3-15 21-53

54. 3-16 21-54 Evaluating Nonrecursive Rules Nonrecursive datalog rules?relational algebra expressions Order the nodes of the dependency graph P1,…Pn so that if there is an arc Pi?Pj then i < j. Compute the relation for the predicates of P1,…,Pn in that order. cousin(X,Y) :– parent(X,Xp) & parent(Y,Yp) & sibling(Xp,Yp).

55. 3-17 21-55 The computation of the relation for Pi For each rule r, with Pi at the head, compute the relation corresponding to the body of the rule. Natural join of the relations corresponding to various susbgoals of r. Because rules are nonrecursive, and predicates are evaluated in some order, the relations for the subgoals are already evaluated. Compute the relation for Pi itself by Projecting the relations for each Pi’s rules onto components corresponding to the variables of the head, and Taking the union over all rules with Pi in the head.

56. 3-18 21-56

57. 3-19 21-57

58. 3-20 21-58 Algorithm 3.1 Computing the Relation for a Rule Body, Using Relational Algebra Operations. Input: The body of a datalog rule r, which consists of subgoals S1,…Sn. For each Si = Pi (Ai1,…,Aiki), there is a relation Ri already computed. Output: An expression of relational algebra, EVAL(r, R1,…Rn)

59. 3-21 21-59

60. 3-21 21-60

61. 3-22 21-61

62. 3-23 21-62 Rectified Rules the rules for predicate P are rectified if all their heads are identical, and of the form P(X1,X2,…,Xk) for distinct variables X1,…,Xk Method: Introduce new variables for each of the arguments of the head predicate Introduce built-in subgoals into the body to enforce the constraints the head predicate formerly enforced

63. 3-24 21-63

64. 3-25 21-64 Computing the Relations for Nonrecursive Rules Algorithm 3.2 Evaluating Nonrecursive Rules Using Relational Algebra Operation Input: A nonrecursive datalog program and a relation for each EDB predicate appearing in the program Output: For each IDB predicate P, and expression of relation algebra for P in terms of relations R1,…,Rm for EDB predicate

65. 3-26 21-65

66. 3-27 21-66

67. 3-27/28 21-67

68. 3-28 21-68

69. 3-28 21-69

70. 3-29 21-70 Computing the Meaning of Recursive Rules recursive datalog program Consider a datalog program with given EDB relations R1,…,Rk and with IDB relations P1,…,Pm to be computed. For each i, 1= i = m, we can express the set of provable facts for the predicate Pi by Pi := EVAL(Pi, R1,…,Rk,P1,…,Pm) where EVAL is the union of EVAL-RULE for each of the rules for Pi. Datalog equations: equations derived from a datalog program

71. 3-30 21-71

72. 3-31 21-72

73. 3-31?1 21-73 Fixed point a solution for relation corresponding to the IDB predicates of equations.

74. 3-31?1 21-74 Least fixed point equations P1,…,Pm correspond to IDB predicates P1,…,Pm relations R1,…,Rk are assigned to EDB predicates r1,…,rk A fixed point for R1,…,Rk assigns to P1,…,Pm particular relations P1(1) ,…,Pm(1) s.t. the equations are satisfied. Given S1 = P1(1),…,Pm(1) and S2 = P1(2),…,Pm(2) If Pi(1) is a subset of Pi(2) for 1= i = m, S1 = S2. S0 is a least fixed point of a set of equations w.r.t. R1,…,Rk if for any solution S, S0 = S.

75. 3-31?2 21-75

76. 3-31?3 21-76

77. 3-31?4 21-77 Solving Recursive Datalog Equations Algorithm 3.3 Evaluation of Datalog Equations for i := 1 to m do Pi := Ř; repeat for i := 1 to m do Qi := Pi ; /*save old values Pi’s*/ for i := 1 to m do Pi := EVAL(Pi,R1,…,Rk,Q1,…,Qm); until Pi := Qi for all i, 1= i = m; output Pi’s

78. 3-31?5 21-78

79. 3-31?6 21-79

80. 3-31?7 21-80 Incremental Evaluation of Least Fixed Points Incremental tuple3 – the tuple3 found on previous round r :– S1,S2,…,Sn. (Built-in predicates are excluded) R1,…,Rn: current relations associated with subgoals S1,...,Sn. ?R1,…, ?Rn: in cremental relations. (the sets of tuples added to R1,…,Rn on the most recent round) Incremental relation for r = EVAL-RULE-INCR(r, R1,…,Rn, ?R1,…, ?Rn) = U1=i=n EVAL-RULE(r,R1,…,Ri-1, ?Ri, RiH,…,Rn)

81. 3-31?8 21-81

82. 3-31?8 21-82

83. 3-31?9 21-83

84. 3-31?10 21-84 Semi-Naďve Evaluation Algorithm for i := 1 to m do begin ?Pi := EVAL(Pi,R1,…,Rk,Ř,…, Ř); Pi := ?Pi end; repeat for i := 1 to m do begin ? Qi := ?Pi; /* save old ?P’s */ for i := 1 to m do begin ? Pi := EVAL-INCR(Pi,R1,…,Rk,P1,…,Pm, ?Q1,…, ?Qm); ? Pi := ? Pi - Pi end; for i := 1 to m do begin Pi := Pi ? ? Pi until ? Pi=Ř for all i; output Pi’s.

85. 3-31?11 21-85

  • Login