This Article 
 Bibliographic References 
 Add to: 
An Adaptive Checkpointing Scheme for Distributed Databases with Mixed Types of Transactions
December 1989 (vol. 1 no. 4)
pp. 450-458

A checkpointing algorithm that is noninterfering with transaction processing is presented. It prevents the well-known domino effect and saves the intermediate results of a long-lived transaction in an adaptive manner, managing effectively both short- and long-lived transactions in the system.

[1] P.A. Bernstein, V. Hadzilacos, and N. Goodman,Concurrency Control and Recovery in Database Systems, Addison-Wesley, Reading, Mass., 1987.
[2] K. M. Chandy and L. Lamport, "Distributed snapshots: Determining global states of distributed systems,"ACM Trans. Comput. Syst., vol. 3, no. 1, pp. 63-75, Feb. 1985.
[3] P. Dadam and G. Schlageter, "Recovery in distributed databases based on non-synchronized local checkpoints,"Information Processing '80. Amsterdam: North-Holland, 1980, pp. 457-462.
[4] K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger, "The notions of consistency and predicate locks in a database system,"Commun. ACM, vol. 19, no. 11, pp. 624-633, Nov. 1976.
[5] M. Fischer, N. Griffeth, and N. Lynch, "Global states of a distributed system,"IEEE Trans. Software Eng., pp. 198-202, May 1982.
[6] K. Salem and H. Garcia-Molina, "Checkpointing memory-resident databases," inProc. 5th Data Eng. Conf., Feb. 1989, pp. 452-462.
[7] M. Hammer and D. Shipman, "Reliability mechanisms for SDD-1: A system for distributed databases,"ACM Trans. Database Syst., pp. 431-466, Dec. 1980.
[8] R. Koo and S. Toueg, "Checkpointing and rollback-recovery for distributed systems,"IEEE Trans. Software Eng., vol. SE-13, pp. 23-31, Jan. 1987.
[9] H. Kuss, "On totally ordering checkpoints in distributed databases," inProc. ACM SIGMOD, 1982, pp. 293-302.
[10] L. Lamport, "Time, clocks, and the ordering of events in a distributed system,"Commun. ACM, vol. 21, no. 7, pp. 558-565, July 1978.
[11] T. V. Lakshman and A. K. Agrawala, "Efficient decentralized consensus protocols,"IEEE Trans. Software Eng., vol. SE-12, no. 5, pp. 600-607, May 1986.
[12] C. Mohan, R. Strong, and S. Finkelstein, "Methods for distributed transaction commit and recovery using byzantine agreement within clusters of processes," inProc. 2nd ACM Symp. Principles Distrib. Computing, 1983, pp. 29-43.
[13] G. Ricart and A. K. Agrawala, "An optimal algorithm for mutual exclusion in computer networks,"Commun. ACM, vol. 24, pp. 9-17, 1981.
[14] D. Ries, "The effect of concurrency control on the performance of a distributed data management system," inProc. 4th Berkeley Conf. Distributed Data Management Comput. Networks, Aug. 1979, pp. 221-234.
[15] G. Schlageter and P. Dadam, "Reconstruction of consistent global states in distributed databases," inProc. Int. Symp. Distributed Databases. North-Holland, INRIA, 1980, pp. 191-200.
[16] K. G. Shin, T.-H. Lin, and Y.-H. Lee, "Optimal checkpointing of real-time tasks," inProc. 5th Symp. Reliability in Distributed Software and Database Syst., Jan. 1986, pp. 151-158.
[17] D. Skeen, "Nonblocking commit protocols," inProc. ACM SIGMOD Int. Conf. Management of Data, 1981, pp. 133-142.
[18] S. H. Son, "Synchronization of replicated data in distributed systems,"Inform. Syst., vol. 12, no. 2, pp. 191-202, 1987.
[19] S. H. Son and A. Agrawala, "Practicality of non-interfering checkpoints in distributed database systems," inProc. IEEE Real-Time Syst. Symp., New Orleans, LA, Dec. 1986, pp. 234-241.
[20] S. H. Son and A. Agrawala, "An algorithm for database reconstruction in distributed environments," inProc. 6th Int. Conf. Distributed Comput. Syst., Cambridge, MA, May 1986, pp. 532-539.
[21] S. H. Son, "Efficient decentralized checkpointing in distributed database systems," inProc. 21st Int. Conf. Systems Sciences, 1988.

Index Terms:
adaptive checkpointing scheme; distributed databases; mixed types of transactions; distributed databases; transaction processing
S.H. Son, "An Adaptive Checkpointing Scheme for Distributed Databases with Mixed Types of Transactions," IEEE Transactions on Knowledge and Data Engineering, vol. 1, no. 4, pp. 450-458, Dec. 1989, doi:10.1109/69.43420
Usage of this product signifies your acceptance of the Terms of Use.