2014 IEEE 30th International Conference on Data Engineering 2014
DOI: 10.1109/icde.2014.6816685
|View full text |Cite
|
Sign up to set email alerts
|

Rethinking main memory OLTP recovery

Abstract: Abstract-Fine-grained, record-oriented write-ahead logging, as exemplified by systems like ARIES, has been the gold standard for relational database recovery. In this paper, we show that in modern high-throughput transaction processing systems, this is no longer the optimal way to recover a database system. In particular, as transaction throughputs get higher, ARIEs-style logging starts to represent a non-trivial fraction of the overall transaction execution time.We propose a lighter weight, coarse-grained com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
78
0
4

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 101 publications
(86 citation statements)
references
References 22 publications
0
78
0
4
Order By: Relevance
“…Given a transaction log, there is only one possible final state of the database system. Therefore, as long as the transaction log is persisted to stable storage, the database system can recover by replaying the log, a concept introduced by other deterministic systems [22,14]. In order to avoid replaying the entire history of all transactions, checkpointing is necessary.…”
Section: Logging and Recoverymentioning
confidence: 99%
“…Given a transaction log, there is only one possible final state of the database system. Therefore, as long as the transaction log is persisted to stable storage, the database system can recover by replaying the log, a concept introduced by other deterministic systems [22,14]. In order to avoid replaying the entire history of all transactions, checkpointing is necessary.…”
Section: Logging and Recoverymentioning
confidence: 99%
“…In addition, the logs in embedded systems record the behaviors of embedded systems, and researchers use different logs to design different recovery strategies, such as partition log [14], real-time log [15], remote log [16], and operation log [17]. However, these strategies only take the requirement of real-time into consideration, and ignore other specific requirements in embedded systems, so they cannot be applied to the embedded environment efficiently.…”
Section: Reviewmentioning
confidence: 99%
“…In the single-sited case, H-Store runs all transactions serially, removing the need for fine-grained locks and latches. Fault tolerance is achieved through a technique that combines command logging and periodic snapshotting [7]. S-Store inherits all of these core features and extends them in non-trivial ways.…”
Section: S-store System Overviewmentioning
confidence: 99%