Log check point recovery method applied to memory data base OLTP (online transaction processing)

A recovery method and checkpoint technology, applied in the field of database management, can solve problems such as affecting transaction execution speed and increasing database system overhead, and achieve the effects of improving speed, reducing impact, and reducing I/O burden.

Active Publication Date: 2012-07-04
北京人大金仓信息技术股份有限公司
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, some in-memory databases use physical logs to restore data, but compared with logical logs, using physical logs will greatly increase the database system's disk I / O overhead due to the need for persistent logs, thus affecting the execution of transactions speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log check point recovery method applied to memory data base OLTP (online transaction processing)
  • Log check point recovery method applied to memory data base OLTP (online transaction processing)
  • Log check point recovery method applied to memory data base OLTP (online transaction processing)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to realize fast recovery of the memory database after a crash, the present invention adopts a log checkpoint recovery method based on double-log double-checkpoint backup. Two sets of log files and two sets of checkpoint backup files can restore the database in turn. Even if the database crashes again during the checkpoint operation or during the recovery process, the correct version of the log and backup files can be selected again for recovery. The specific implementation link of the log checkpoint recovery method will be described in detail below.

[0021] Such as figure 1 As shown, the log files and backup files on the disk can be divided into three types: redo log files, checkpoint ID files and checkpoint backup files.

[0022] When the database is working, it accepts the request from the client and generates a redo log file for each successfully executed DDL (Data Definition Language) statement and each successfully submitted DML (Data Manipulation Langu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a log check point recovery method applied to memory data base OLTP (online transaction processing), which uses the log check point technique based on double-log double-check-point backup. Two backup files can be used in turn, and a data base can recover to a latest uniform state no matter in a transaction process, a check point executive process or breakdown in a recovery process. Meanwhile, an MMAP (memory-mapped analog page) sharing mechanism is used for quickly setting up the mapping from a check point standby file to a memory, and rapid recovery of massive data bases is realized.

Description

technical field [0001] The invention relates to a method for recovering a database system, in particular to a method for recovering a log check point for OLTP applications in memory databases, and belongs to the technical field of database management. Background technique [0002] With the increasing popularity of informatization construction, many industrial application fields have higher and higher requirements for database performance. At the same time, with the continuous reduction of memory costs, large-capacity memory has become the standard configuration of high-end servers. Therefore, for the telecommunications, banking, securities and military command and control fields with huge data volume, high real-time requirements and high reliability, the memory database technology that can improve the application performance of OLTP (online transaction processing system) is more and more popular. favor. [0003] For in-memory databases with fast response time and high thro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14G06F17/30
Inventor 耿怡娜周烜王珊冯玉覃雄派杨经正薛忠斌
Owner 北京人大金仓信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products