1 / 25

BACKUP/MASTER: Replication

This overview covers the fundamentals of database replication, exploring both file-based and database-based methods. We delve into asynchronous and synchronous replication, discussing their mechanisms, including caching and data transfer techniques. The anatomy of a database is examined, from tables and indexes to transaction logs, ensuring data integrity and recovery processes. Additionally, we address the security issues associated with different replication approaches and highlight strategies for effective backup and restoration, emphasizing the importance of reliable data management.

ann
Download Presentation

BACKUP/MASTER: Replication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BACKUP/MASTER:Replication Dorian CougiasCEO Network Frontiers

  2. What is being replicated? Volume File-based Database-based How it is being replicated? Asynchronously Synchronously “Timed” push or pull Caching An overview of replication

  3. Anatomy of a database • Tables of information • Index of tables • Transaction Log for repair in the event of failure • Cache that sits in RAM

  4. Database backup

  5. Restore from tape/disk after a crash

  6. Asynchronous replication

  7. Non-consistent operation

  8. Fast recovery

  9. Synchronous replication

  10. Non-consistent operation

  11. Transfer to secondary host

  12. Volume and file-based replication

  13. Block level replication (BLR)

  14. BLR (2)

  15. BLR (3)

  16. File-based replication

  17. Assured security issues

More Related