![]() ![]() Such application code has direct access to database system buffers, and as a result, the danger of data being corrupted due to inadvertent application writes is increased. Increasingly, for extensibility and performance, special purpose application code is being integrated with database system code. Shadow paging is an alternative approach in place of log based scheme Shadow paging may be considered to use for recovering if its drawbacks of garbage collection and data fragmentation may resolve. A review of recovery techniques give the idea of modifying log based recovery technique to be used in multiuser environment more precisely if some problem of writing log each time might be solved. So we compare the recovery techniques Log Based Scheme and Shadow Paging on the basis of their performance. In this paper, we have studied when a user face the problems of failure, he may confuse which technique should be used. Recovery algorithms are techniques to ensure database consistency and transaction atomicity and durability despite failure. ![]() Appropriate procedures must be followed to restore, validate and return the system to normal. When a DBMScrashes, all or a portion of the data may become unusable. The danger of data being corrupted due to reckless application writes is increased. As system continue to grow in size and complexity, they pose increasingly greater safety and risk management challenges. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |