Failure Handling in an Optimized Two-Safe Approach to Maintaining Primary-Backup Systems
نویسندگان
چکیده
In a primary-backup system, transaction processing takes place at the primary and the log records generated are propagated to the backup which uses them to reconstruct a recent state of the database. If the primary fails, the backup takes over transaction processing without causing users to observe a breach in service. Existing approaches can be broadly classi ed as 2-safe or 1-safe based on whether or not log propagation from primary to backup is synchronized with the transaction commitment at the primary. While the 2-safe (synchronous) approaches guarantee ACID properties of transactions even in case of primary failure and backup takeover, they incur a higher overhead and reduced primary system performance. Recently, in [9], we introduced an optimized 2-safe approach which attempts to achieve the desirable properties of both 1-safe and 2-safe approaches by careful addition of partial synchrony in the log transfer protocol. Many approaches to maintaining primary-backup systems have been developed for a variety of system architectures including environments where both primary and backup consist of multiple processors connected via multiple communication lines. A limitation of existing algorithms for such environments is that they ignore the issue of partial primary and backup failures in which one or more primary/backup processors fail but the system as a whole survives. This paper describes a design of a primary-backup system which uses the backup to provide continued availability not only during disasters but also during partial failures as long as both the primary and its corresponding backup do not fail at the same time. Furthermore, the developed approach does not compromise disaster protection of the database in the presence of partial system failures. The approach is developed in the context of the optimized 2-safe approach to log propagation.
منابع مشابه
Failure Handling in an Optimized Two-Safe Approach to Maintaining Remote Backup Systems
In a primary-backup system, transaction processing takes place at the primary and the log records generated are propagated to the backup which uses them to reconstruct a recent state of the database. If the primary fails, the backup takes over transaction processing without causing users to observe a breach in service. Existing approaches can be broadly classiied as 2-safe or 1-safe based on wh...
متن کاملAn Optimized Two-Safe Approach to Maintaining Remote Backup Systems
In a remote backup system, transaction processing takes place at the primary and the log records generated at the primary are propagated to the remote backup which uses them to reconstruct a recent state of the database at the primary. In the event of a primary failure, the backup system takes over transaction processing without causing users to observe a breach in service. Existing remote back...
متن کاملFault Tolerance in Transaction Systems
We survey two schemes for fault tolerance for diierent fault models. The rst, primary-backup approach deals with disaster recovery. The second, is aimed at developing commit protocols that tolerate commission failures. A remote backup database system tracks the state of a primary system, taking over transaction processing when disaster hits the primary site. The primary and backup sites are phy...
متن کاملA Markov Model for Performance Evaluation of Coal Handling Unit of a Thermal Power Plant
The present paper discusses the development of a Markov model for performance evaluation of coal handling unit of a thermal power plant using probabilistic approach. Coal handling unit ensures proper supply of coal for sound functioning of thermal Power Plant. In present paper, the coal handling unit consists of two subsystems with two possible states i.e. working and failed. Failure and repair...
متن کاملEfficient Bandwidth Allocation for Backup Paths
In MPLS networks, failure resilience of a Label Switched Path (LSP) is essential in guaranteeing the QoS of the path. This can be achieved by allocating backup LSPs through which packets can be routed in case of primary LSP failiures. bandwidth efficiency and expeditious path restoration are two desirable features for the design of backup LSPs. This paper tackles the bandwidth efficiency with a...
متن کامل