SlideShare a Scribd company logo
Recovery management with
concurrent controls
D. Shanmugapriya
II-Msc (IT)
Department of CS & IT
Nadar saraswathi college of arts and science
Theni.
Recovery Management
• Recovery manager is a utility that manages the
process of creating backups of all database files.
• Is the process of restoring the database to the most
recent consistent state that existed just failure the
system.
• Is the process of planning,testing and
implementing the recovery procedures and
standards required to restore service in the event
of a component failure.
3 states of recovery
• Pre-condition:In a consistant state.
• Condition:Occurs some kind of system failure.
• Post condition:Restore the data base to the
consistent state of the existed before the failure.
Types
• Transaction failure :Occurs when it fails to execute or when
it reaches a point from where it can’t go any further. If a
few transaction is hurt this is called as transaction
failure.(incorrect IP, deadlock)
• System failure :May result from a hard drive with bad
sectors, causing the operating system to not able to read
data from the hard drive. (is failure, ram failure).
• Media failure :A condition of not being able to read from
or write to a storage device such as a disk or tape due to a
defect in the recording surface. (power problem).
Database basic update strategies
• Deferred update:Transaction operating do not immediately
update the physical database.
• Database is physically updated only after the transaction
reaches it’s commit point.
• Immediate update:database is immediately updated by
the transaction operation during the execution of
transactions even before it reaches commit point.
• Example :word-to save the file and immediately updated.
Concurrent control
• The process of managing simultaneous operation on the
database without having them interface with each other.
• The problem of synchronizing concurrent transaction
such that the consistency of the database of the
maintained same time.
• Concurrent controls invlove identifying and preventing
problems in a organizing as they occur this means that as
they occur.
Why we need concurrency control
• Simultaneous execution of transaction over a shared
database can create several data integrity and consistency
problem.
• Three types
• 1)lost update
• 2)temporary uodate
• 3)incorrect summary
Lost update
• This problem occurs when two transactions that access
the same database items.
• Have their operation interlaced in a way that makes the
values of same database item incorrect.
• Successfully completed update is overridden by another
user.
• Example:T1 withdraws $10 from an account with
balance initially $ 100.
• T2 deposits $100 into same accoint
• Serially final balance would be $190.
Temporary update
• This problem occurs when one transaction updates a
database item and then the transaction fails for some
reasons.
• The updated item is accessed by another transactions
before it is changed back to its original value.
• Example :T4 updates balance to 200 but it aborts so
balance should be back at original value 100
• T3 has read new value of balance 200 and users value as
basis of 10 reduction giving a new balance of 190 instead
of 90.
Advantage
• Waiting time decrease
• Response time decrease.
• Resourse utilization increase.
• Efficiency utilization increase.
Thank you

More Related Content

What's hot

What is Database Management System
What is Database Management SystemWhat is Database Management System
What is Database Management System
AbhiPatel171
 
The Functions of the Operating System
The Functions of the Operating SystemThe Functions of the Operating System
The Functions of the Operating System
andyr91
 
The Functions of the Operating System
The Functions of the Operating SystemThe Functions of the Operating System
The Functions of the Operating System
andyr91
 
Introduction to transaction processing concepts and theory
Introduction to transaction processing concepts and theoryIntroduction to transaction processing concepts and theory
Introduction to transaction processing concepts and theory
Zainab Almugbel
 
An Overview of Distributed Debugging
An Overview of Distributed DebuggingAn Overview of Distributed Debugging
An Overview of Distributed Debugging
Anant Narayanan
 
Transaction
TransactionTransaction
Transaction
Amin Omi
 
Functions of the Operating System
Functions of the Operating SystemFunctions of the Operating System
Functions of the Operating System
andyr91
 
Advanced DBMS presentation
Advanced DBMS presentationAdvanced DBMS presentation
Advanced DBMS presentation
Hindustan Petroleum
 
Process scheduling
Process schedulingProcess scheduling
Tybsc cs dbms2 notes
Tybsc cs dbms2 notesTybsc cs dbms2 notes
Tybsc cs dbms2 notes
Niraj Bharambe
 
Recovery in Multi database Systems
Recovery in Multi database SystemsRecovery in Multi database Systems
Recovery in Multi database Systems
Moutasm Tamimi
 
Crash recovery in database
Crash recovery in databaseCrash recovery in database
Crash recovery in database
Prof.Nilesh Magar
 
Invantive at Eusprig 2014
Invantive at Eusprig 2014Invantive at Eusprig 2014
Invantive at Eusprig 2014
eusprig
 
Locks In Disributed Systems
Locks In Disributed SystemsLocks In Disributed Systems
Locks In Disributed Systems
mridul mishra
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
Nishant Munjal
 
Advance database system (part 2)
Advance database system (part 2)Advance database system (part 2)
Advance database system (part 2)
Abdullah Khosa
 
G.Sumithra,II-M.sc(computer science),Bon secours college for women,thanjavur.
G.Sumithra,II-M.sc(computer science),Bon secours college for women,thanjavur.G.Sumithra,II-M.sc(computer science),Bon secours college for women,thanjavur.
G.Sumithra,II-M.sc(computer science),Bon secours college for women,thanjavur.
SumithraG2
 
G.Sumithra,II-M.sc(computer Science),Bon Secours college for women,Thanjavur.
G.Sumithra,II-M.sc(computer Science),Bon Secours college for women,Thanjavur.G.Sumithra,II-M.sc(computer Science),Bon Secours college for women,Thanjavur.
G.Sumithra,II-M.sc(computer Science),Bon Secours college for women,Thanjavur.
SumithraG2
 
Advance database system(part 4)
Advance database system(part 4)Advance database system(part 4)
Advance database system(part 4)
Abdullah Khosa
 

What's hot (19)

What is Database Management System
What is Database Management SystemWhat is Database Management System
What is Database Management System
 
The Functions of the Operating System
The Functions of the Operating SystemThe Functions of the Operating System
The Functions of the Operating System
 
The Functions of the Operating System
The Functions of the Operating SystemThe Functions of the Operating System
The Functions of the Operating System
 
Introduction to transaction processing concepts and theory
Introduction to transaction processing concepts and theoryIntroduction to transaction processing concepts and theory
Introduction to transaction processing concepts and theory
 
An Overview of Distributed Debugging
An Overview of Distributed DebuggingAn Overview of Distributed Debugging
An Overview of Distributed Debugging
 
Transaction
TransactionTransaction
Transaction
 
Functions of the Operating System
Functions of the Operating SystemFunctions of the Operating System
Functions of the Operating System
 
Advanced DBMS presentation
Advanced DBMS presentationAdvanced DBMS presentation
Advanced DBMS presentation
 
Process scheduling
Process schedulingProcess scheduling
Process scheduling
 
Tybsc cs dbms2 notes
Tybsc cs dbms2 notesTybsc cs dbms2 notes
Tybsc cs dbms2 notes
 
Recovery in Multi database Systems
Recovery in Multi database SystemsRecovery in Multi database Systems
Recovery in Multi database Systems
 
Crash recovery in database
Crash recovery in databaseCrash recovery in database
Crash recovery in database
 
Invantive at Eusprig 2014
Invantive at Eusprig 2014Invantive at Eusprig 2014
Invantive at Eusprig 2014
 
Locks In Disributed Systems
Locks In Disributed SystemsLocks In Disributed Systems
Locks In Disributed Systems
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Advance database system (part 2)
Advance database system (part 2)Advance database system (part 2)
Advance database system (part 2)
 
G.Sumithra,II-M.sc(computer science),Bon secours college for women,thanjavur.
G.Sumithra,II-M.sc(computer science),Bon secours college for women,thanjavur.G.Sumithra,II-M.sc(computer science),Bon secours college for women,thanjavur.
G.Sumithra,II-M.sc(computer science),Bon secours college for women,thanjavur.
 
G.Sumithra,II-M.sc(computer Science),Bon Secours college for women,Thanjavur.
G.Sumithra,II-M.sc(computer Science),Bon Secours college for women,Thanjavur.G.Sumithra,II-M.sc(computer Science),Bon Secours college for women,Thanjavur.
G.Sumithra,II-M.sc(computer Science),Bon Secours college for women,Thanjavur.
 
Advance database system(part 4)
Advance database system(part 4)Advance database system(part 4)
Advance database system(part 4)
 

Similar to recovery management with concurrent controls

E-Business Information System BBA AVI.pptx
E-Business Information System BBA AVI.pptxE-Business Information System BBA AVI.pptx
E-Business Information System BBA AVI.pptx
thejaswini40
 
Database management system ch1 & 2.pptx
Database management system  ch1 & 2.pptxDatabase management system  ch1 & 2.pptx
Database management system ch1 & 2.pptx
anebek555
 
BIL406-Chapter-10-Problems with Asynchronous Parallelism.ppt
BIL406-Chapter-10-Problems with Asynchronous Parallelism.pptBIL406-Chapter-10-Problems with Asynchronous Parallelism.ppt
BIL406-Chapter-10-Problems with Asynchronous Parallelism.ppt
Kadri20
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
KRISHNARAJ207
 
Dbms
DbmsDbms
Process management in Operating System_Unit-2
Process management in Operating System_Unit-2Process management in Operating System_Unit-2
Process management in Operating System_Unit-2
mohanaps
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
sumitjain2013
 
The Power of Determinism in Database Systems
The Power of Determinism in Database SystemsThe Power of Determinism in Database Systems
The Power of Determinism in Database Systems
Daniel Abadi
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
RomyA2
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
MEGHANA508383
 
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & RecoveryDistributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Gyanmanjari Institute Of Technology
 
DBMS Vardhaman.pdf
DBMS Vardhaman.pdfDBMS Vardhaman.pdf
DBMS Vardhaman.pdf
NithishReddy90
 
What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...
Raj vardhan
 
Backup & Recovery
Backup & RecoveryBackup & Recovery
Backup & Recovery
Abhay Kumar
 
DBMS Bascis
DBMS BascisDBMS Bascis
database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques
Kalhan Liyanage
 
Database Management System - 2a
Database Management System - 2aDatabase Management System - 2a
Database Management System - 2a
SSN College of Engineering, Kalavakkam
 
Adbms 33 need for concurrency control
Adbms 33 need for concurrency controlAdbms 33 need for concurrency control
Adbms 33 need for concurrency control
Vaibhav Khanna
 
Platform Technology (2).pdf
Platform Technology (2).pdfPlatform Technology (2).pdf
Platform Technology (2).pdf
FranzLawrenzDeTorres1
 

Similar to recovery management with concurrent controls (20)

E-Business Information System BBA AVI.pptx
E-Business Information System BBA AVI.pptxE-Business Information System BBA AVI.pptx
E-Business Information System BBA AVI.pptx
 
Database management system ch1 & 2.pptx
Database management system  ch1 & 2.pptxDatabase management system  ch1 & 2.pptx
Database management system ch1 & 2.pptx
 
BIL406-Chapter-10-Problems with Asynchronous Parallelism.ppt
BIL406-Chapter-10-Problems with Asynchronous Parallelism.pptBIL406-Chapter-10-Problems with Asynchronous Parallelism.ppt
BIL406-Chapter-10-Problems with Asynchronous Parallelism.ppt
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
Dbms
DbmsDbms
Dbms
 
Process management in Operating System_Unit-2
Process management in Operating System_Unit-2Process management in Operating System_Unit-2
Process management in Operating System_Unit-2
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
The Power of Determinism in Database Systems
The Power of Determinism in Database SystemsThe Power of Determinism in Database Systems
The Power of Determinism in Database Systems
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
 
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & RecoveryDistributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
 
DBMS Vardhaman.pdf
DBMS Vardhaman.pdfDBMS Vardhaman.pdf
DBMS Vardhaman.pdf
 
What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...
 
Backup & Recovery
Backup & RecoveryBackup & Recovery
Backup & Recovery
 
DBMS Bascis
DBMS BascisDBMS Bascis
DBMS Bascis
 
database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques
 
Database Management System - 2a
Database Management System - 2aDatabase Management System - 2a
Database Management System - 2a
 
Adbms 33 need for concurrency control
Adbms 33 need for concurrency controlAdbms 33 need for concurrency control
Adbms 33 need for concurrency control
 
Platform Technology (2).pdf
Platform Technology (2).pdfPlatform Technology (2).pdf
Platform Technology (2).pdf
 

More from Siva Priya

source code metrics and other maintenance tools and techniques
source code metrics and other maintenance tools and techniquessource code metrics and other maintenance tools and techniques
source code metrics and other maintenance tools and techniques
Siva Priya
 
Class properties
Class propertiesClass properties
Class properties
Siva Priya
 
Planning the development process
Planning the development processPlanning the development process
Planning the development process
Siva Priya
 
Web technology
Web technology Web technology
Web technology
Siva Priya
 
Retail of big data analytics
Retail of big data analyticsRetail of big data analytics
Retail of big data analytics
Siva Priya
 
Deadlock and shadow paging
Deadlock and shadow pagingDeadlock and shadow paging
Deadlock and shadow paging
Siva Priya
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Siva Priya
 
density based method and expectation maximization
density based method and expectation maximizationdensity based method and expectation maximization
density based method and expectation maximization
Siva Priya
 
Classification by backpropacation
Classification by backpropacationClassification by backpropacation
Classification by backpropacation
Siva Priya
 
Disk scheduling & Disk management
Disk scheduling & Disk managementDisk scheduling & Disk management
Disk scheduling & Disk management
Siva Priya
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Siva Priya
 
Servlets & jdbc
Servlets & jdbcServlets & jdbc
Servlets & jdbc
Siva Priya
 

More from Siva Priya (12)

source code metrics and other maintenance tools and techniques
source code metrics and other maintenance tools and techniquessource code metrics and other maintenance tools and techniques
source code metrics and other maintenance tools and techniques
 
Class properties
Class propertiesClass properties
Class properties
 
Planning the development process
Planning the development processPlanning the development process
Planning the development process
 
Web technology
Web technology Web technology
Web technology
 
Retail of big data analytics
Retail of big data analyticsRetail of big data analytics
Retail of big data analytics
 
Deadlock and shadow paging
Deadlock and shadow pagingDeadlock and shadow paging
Deadlock and shadow paging
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
density based method and expectation maximization
density based method and expectation maximizationdensity based method and expectation maximization
density based method and expectation maximization
 
Classification by backpropacation
Classification by backpropacationClassification by backpropacation
Classification by backpropacation
 
Disk scheduling & Disk management
Disk scheduling & Disk managementDisk scheduling & Disk management
Disk scheduling & Disk management
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Servlets & jdbc
Servlets & jdbcServlets & jdbc
Servlets & jdbc
 

Recently uploaded

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

recovery management with concurrent controls

  • 1. Recovery management with concurrent controls D. Shanmugapriya II-Msc (IT) Department of CS & IT Nadar saraswathi college of arts and science Theni.
  • 2. Recovery Management • Recovery manager is a utility that manages the process of creating backups of all database files. • Is the process of restoring the database to the most recent consistent state that existed just failure the system. • Is the process of planning,testing and implementing the recovery procedures and standards required to restore service in the event of a component failure.
  • 3. 3 states of recovery • Pre-condition:In a consistant state. • Condition:Occurs some kind of system failure. • Post condition:Restore the data base to the consistent state of the existed before the failure.
  • 4. Types • Transaction failure :Occurs when it fails to execute or when it reaches a point from where it can’t go any further. If a few transaction is hurt this is called as transaction failure.(incorrect IP, deadlock) • System failure :May result from a hard drive with bad sectors, causing the operating system to not able to read data from the hard drive. (is failure, ram failure). • Media failure :A condition of not being able to read from or write to a storage device such as a disk or tape due to a defect in the recording surface. (power problem).
  • 5. Database basic update strategies • Deferred update:Transaction operating do not immediately update the physical database. • Database is physically updated only after the transaction reaches it’s commit point. • Immediate update:database is immediately updated by the transaction operation during the execution of transactions even before it reaches commit point. • Example :word-to save the file and immediately updated.
  • 6. Concurrent control • The process of managing simultaneous operation on the database without having them interface with each other. • The problem of synchronizing concurrent transaction such that the consistency of the database of the maintained same time. • Concurrent controls invlove identifying and preventing problems in a organizing as they occur this means that as they occur.
  • 7. Why we need concurrency control • Simultaneous execution of transaction over a shared database can create several data integrity and consistency problem. • Three types • 1)lost update • 2)temporary uodate • 3)incorrect summary
  • 8. Lost update • This problem occurs when two transactions that access the same database items. • Have their operation interlaced in a way that makes the values of same database item incorrect. • Successfully completed update is overridden by another user. • Example:T1 withdraws $10 from an account with balance initially $ 100. • T2 deposits $100 into same accoint • Serially final balance would be $190.
  • 9. Temporary update • This problem occurs when one transaction updates a database item and then the transaction fails for some reasons. • The updated item is accessed by another transactions before it is changed back to its original value. • Example :T4 updates balance to 200 but it aborts so balance should be back at original value 100 • T3 has read new value of balance 200 and users value as basis of 10 reduction giving a new balance of 190 instead of 90.
  • 10. Advantage • Waiting time decrease • Response time decrease. • Resourse utilization increase. • Efficiency utilization increase.