Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Two epoch algorithms for disaster recovery
Proceedings of the sixteenth international conference on Very large databases
Management of a remote backup copy for disaster recovery
ACM Transactions on Database Systems (TODS)
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Algorithms for the Management of Remote Backup Data Bases for Disaster Recovery
Proceedings of the Ninth International Conference on Data Engineering
Notes on Data Base Operating Systems
Operating Systems, An Advanced Course
Efficient commit protocols for the tree of processes model of distributed transactions
PODC '83 Proceedings of the second annual ACM symposium on Principles of distributed computing
Dealing with partial failures in multiple processor primary-backup systems
CIKM '97 Proceedings of the sixth international conference on Information and knowledge management
Asynchronous Backup and Initialization of a Database Server for Replicated Database Systems
The Journal of Supercomputing
Pronto: High availability for standard off-the-shelf databases
Journal of Parallel and Distributed Computing
The case for determinism in database systems
Proceedings of the VLDB Endowment
Architecture of highly available databases
ISAS'04 Proceedings of the First international conference on Service Availability
Architecture for distributed ERP systems
TEAA'05 Proceedings of the 31st VLDB conference on Trends in Enterprise Application Architecture
Hi-index | 0.00 |
A remote backup is a copy of a primary database maintained at a geographically separate location and is used to increase data availability. Remote backup systems are typically log-based and can be classified into 2-safe and 1-safe, depending on whether transactions commit at both sites simultaneously or first commit at the primary and are later propagated to the backup. We have built an experimental database system on which we evaluated the performance of the epoch and the dependency reconstruction algorithms, two 1-safe algorithms we have developed. We compared the 1-safe with the 2-safe approach under various conditions.