A crash recovery algorithm based on multiple logs that exploits parallelism

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The paper describes an efficient algorithm for recovery based on multiple logs. The standard WAL algorithm is designed to work with a single log. Since each transaction is required to write a commit record to the log, it imposes limits on the maximum achievable throughput even if group commits are allowed. These limits are well below the needs of high transaction rate systems in airlines and in other areas. Another problem with a 'single log' algorithm is that the tail of the log is a 'hot spot' because of severe contention for it. It is shown that both these problems are solved by extending the write-ahead logging method into a multiple log algorithm which allows transactions to write to one of several logs, and also permits each log to perform checkpoints and I/O operations in parallel. A further advantage of multiple logs is that parallelism can be exploited at recovery time. An algorithm is outlined that speeds up recovery by scanning the multiple logs in parallel.

Original languageEnglish (US)
Title of host publicationProceedings of the 2nd IEEE Symposium on Parallel and Distributed Processing 1990, SPDP 1990
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages156-159
Number of pages4
ISBN (Electronic)0818620870, 9780818620874
DOIs
StatePublished - 1990
Event2nd IEEE Symposium on Parallel and Distributed Processing, SPDP 1990 - Dallas, United States
Duration: Dec 9 1990Dec 13 1990

Publication series

NameProceedings of the 2nd IEEE Symposium on Parallel and Distributed Processing 1990, SPDP 1990

Conference

Conference2nd IEEE Symposium on Parallel and Distributed Processing, SPDP 1990
Country/TerritoryUnited States
CityDallas
Period12/9/9012/13/90

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'A crash recovery algorithm based on multiple logs that exploits parallelism'. Together they form a unique fingerprint.

Cite this