Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Billal Hossain ID-M190305705 M.SC in Cse Jagnnath University

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 27

Billal Hossain

ID-M190305705
M.Sc In CSE
Jagnnath University
 Introduction
 Types of failure and Backup in Database

 RMAN and User-Managed Backups

 Recovery facilities:
• Backup Facilities
• Journalizing Facilities
• Checkpoint Facility
• Recovery Manager
 Backup and recovery procedures protect your
database against data loss and reconstruct the data,
should loss occur.
 The reconstructing of data is achieved through
media recovery, which refers to the various
operations involved in restoring, rolling forward,
and rolling back a backup of database files.
 A backup is a safeguard against unexpected data
loss and application errors.
 Backups are divide into:
 Physical backups
 Logical backups
 Physical backups:
 Copies of physical database files.
 Two ways to perform physical backup:
 Recovery Manager (RMAN) utility.
 Operating system utilities.
 Logical backups:
 Contain logical data (for example, tables and stored
procedures)
 Extract with an Oracle utility (Export utility) and stored
in a binary file.
 Logical backups used to supplement physical
backups.
 There are two types of backups:
 Image copies: exact duplicate of a datafile, control
file, or archived log.
 restore them as-is without performing additional
processing by using either operating system utilities or
RMAN.
 Backup sets: backup in a proprietary format that
consists of one or more physical files called backup
pieces.
 contain more than one database file, and it can also be
backed up using special processing
 Mechanism for restoring a database quickly
and accurately after loss or damage
 A DBMS COPY utility that produces a backup
copy (save) of the entire database or a subset of
the database
 Periodic backup (e.g. nightly, weekly)
 Backups stored in secure, off-site location
 Backup copy-used to restore the database
 Cold backup–database is shut down during
backup
 Hot backup–selected portion is shut down and
backed up at a given time
 Incremental backups: record changes made
since the last full backup
Source: http://kb.acronis.com/content/1536
Source: http://kb.acronis.com/content/1536
 Audit trail of transactions and database
updates/changes
 In the event of failure: consistent database state can
be reestablished using the information in the
journals together with the most recent complete
backup
 Two basic journals or logs:
 Transaction log–record of essential data for each
transaction processed against the database
 Transaction code, action, time, terminal no/user ID, input
data values , tables/records accessed & modified and the
old & new field values.
 Database change log–images of updated data
 Before-image–copy of a record before modification
 After-image–copy of a record after modification
 A facility by which the DBMS periodically refuses to
accept new transactions. The system is in a quiet state
and the database and transaction logs are synchronized
 All transactions in progress are completed and journal
files are brought up-to-date
 DBMS writes a special record (checkpoint record) to
the log file: snapshot of the state of the database
 Checkpoint record contains information necessary to
restart the system
 Any dirty data blocks (pages of memory that contain
changes that have not yet been written out to disk) are
written from memory to disk storage
 Automatically or response to commands in user
application programs
 A module of the DBMS that restores the
database to a correct condition when a failure
occurs and then resumes processing user
requests.
 Type of restart used depends on the nature of
failure.
 Disk Mirroring–switch between identical
copies of databases
 Restore/Rerun–reprocess transactions
against the backup
 Transaction Integrity–commit or abort all
transaction changes
 Backward Recovery (Rollback)–apply before
images
 Forward Recovery (Roll Forward)–apply
after images (preferable to restore/rerun)
 Database must be mirrored  switch to an
existing copy of the database
 2 copies of the database must be kept &
updated simultaneously
 Media failure occurs: processing switch to the
duplicate copy
 Allows fastest recovery

Recovery and Restart Procedures


 Involves reprocessing the day’s transactions
(up to the point of failure) against the backup
copy of the database
 Database is shut down
 The most recent copy of the database /file to be
recovered is mounted
 All transactions that have occurred since that copy
(stored on the transaction log) are rerun

Recovery and Restart Procedures


 Advantage:
 Simplicity
 DBMS does not need to create a database change journal &
no special restart procedures required
 Disadvantages:
 Time to reprocess transactions may be prohibitive
 Processing of new transactions delayed until recovery
completed
 Sequencing of transactions will often be different from
when they were originally processed: may lead to
different results.
 Original Run: customer deposit may be posted before
withdrawal
 Rerun: Withdrawal transaction may be attempted first.
 Last resort in database processing
Recovery and Restart Procedures
 DBMS backs out of or undo unwanted changes to the DB –
before images captured
 Reverse the changes made by transactions that have aborted
or terminated abnormally
 Example: transfer 100 from account for cust A to cust B
 Program reads the record for customer A and subtracts 100 from
the acc balance
 Program reads the record for customer B and adds 100 to the acc
balance.
 Program writes the updated record for A to the dbase.
 In attempting to write the record for B, program encounters an
error condition and cannot write the record.
 An UNDO command – recovery manager to apply the before
image for record A to restore acc balance to its original value.

Recovery and Restart Procedures


Recovery and Restart Procedures 19
 A technique that starts with an earlier copy of
the database. After images are applied to the
database and the database is quickly moved
forward to a later state.
 Much faster than Restore/Rerun:
 The time consuming logic of reprocessing each
transaction does not have to be repeated
 Only the most recent after-images need to be
applied. DB record may have series of after
image – most recent (good) after image is
required for rollback

Recovery and Restart Procedures


Recovery and Restart Procedures 21
 Integrity of transactions: DB is updated by
processing transactions that results in changes
to one or more DB records

 When processing transactions, DBMS must


ensure that the transactions follow four well-
accepted properties – ACID
 Atomic
 Consistent
 Isolated
 Durable

Recovery and Restart Procedures


 To maintain transaction integrity – DBMS must
provide facilities for the user or application
program to define transaction boundaries –
logical beginning and end of transaction.

BEGIN TRANSACTION
.
.
UPDATE
INSERT
.
.
COMMIT

Recovery and Restart Procedures


 Aborted transactions
 Preferred recovery: rollback
 Alternative: Rollforward to state just prior to abort
 Incorrect data
 Preferred recovery: rollback
 Alternative 1: rerun transactions not including inaccurate
data updates
 Alternative 2: compensating transactions
 System failure (database intact)
 Preferred recovery: switch to duplicate database
 Alternative 1: rollback
 Alternative 2: restart from checkpoint
 Database destruction
 Preferred recovery: switch to duplicate database
 Alternative 1: rollforward
 Alternative 2: reprocess transactions
 Contingency plans to cater for disasters –
destroy/damage data center
 Natural disasters
 Planning for DR
 Develop a detailed DR plan
 Schedule regular test of plan
 Choose multi-disciplinary team to carry out
plan
 Fast backup data center – off site location
 Send back up copies to backup data center
 Contingency plan is established to deal with unusual
events that are not part of the normal daily routine
 Contingency plans detail the response necessary to
deal with the types of event that may occur
 A contingency plan should include :
 who the key personnel are and how they can be contacted
 if the key personnel are unavailable, a list of alternative
personnel and how they can be contacted
 who decides that a contingency exists and how that is decided
 the technical requirements of transferring operations elsewhere
 the operational requirements of transferring operations
elsewhere
 any outside contacts who may help
 whether any insurance exists to cover the situation

You might also like