Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method and system for recovering data

A technology for recovering data and data, applied in the field of communication, can solve problems such as low security, unreliable database system, and poor data durability, and achieve the effect of reducing risks and reducing the probability of transaction log loss.

Active Publication Date: 2017-11-28
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a method and system for recovering data, which is used to solve the problems of poor data persistence, low security and unreliability of the database system in the asynchronous submission scheme of the transaction log in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for recovering data
  • A method and system for recovering data
  • A method and system for recovering data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0076] First, set the security level of the node and the number of backup nodes corresponding to the security level. It can be considered that the higher the node security level, the more backup nodes the node needs, and the number of security levels (WSF, WAL SafetyFactor) is greater than or equal to 1. When WSF>1, at least one node should be specified in the cluster database system in advance As the backup node of this node. The number of backup nodes can increase in proportion to the security level. For example, it can be stipulated that when the local node WSF=3, there should be two backup nodes of the local node in the cluster database system, and when the local node WSF=4, there should be two backup nodes in the cluster database system. 3 backup nodes of this node.

[0077] Secondly, select the number of backup nodes corresponding to the security level as backup nodes for this node from the nodes other than this node, and use the buffer area of ​​the selected backup nod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a method for recovering data, including: after the transaction is submitted, saving the generated transaction log to the cache area of ​​the node, and at the same time backing up the transaction log to the buffer area of ​​at least one backup node other than the node ;Write the transaction log stored in the buffer of the local node or the transaction log backed up in the buffer of the backup node into a transaction log file in the disk, and the transaction log file in the disk is used for recovery The data of the local node; when a data loss event occurs in the local node, restore the lost data of the local node based on the transaction log files in the disk. By adopting the invention, the risk of system data can be reduced, and the data persistence, security and reliability of the system can be improved.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for recovering data. Background technique [0002] In order to make the changes made by the transaction to the data in the database system persistently stored in the database and avoid rollback operations, the transaction log generated during the transaction process is usually written to a reliable disk medium. When the database system generates data When lost, the transaction log in the disk provides the basis for the data recovery operation in the database system to achieve the persistence of the database system. [0003] The transaction log is usually saved using a synchronous commit scheme, that is, when the transaction is committed, the corresponding last record position of the generated transaction log is selected, and all transaction logs before the position are written to disk, and the transaction commit ends. [0004] Since the aforementioned solution will ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
CPCG06F11/1469G06F16/27
Inventor 文继军聂愿愿徐文韬
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More