Distributed Systems -- Reliability Issues -- Module 4


Index

  1. Types of Failures
  2. Reliability Techniques
  3. Commit Protocols
  4. Recovery Protocols

Types of Failures

Types of Failures in DDBSs

In a distributed database system, failures are more complex than in centralized systems because of the distributed nature of the architecture. Multiple sites, networks, and transactions interacting across locations increase the likelihood of something going wrong. Here are the main types of failures you’ll encounter:


Key Considerations


Reliability Techniques

Reliability Techniques in DDBSs

Reliability techniques in distributed database systems are designed to handle the failures we discussed (site, network, transaction, and media failures) and ensure the system remains consistent, available, and fault-tolerant. Here’s a breakdown of the key techniques:

https://www.geeksforgeeks.org/recovery-in-distributed-systems/

Pasted image 20250530125546.png


Key Considerations


Commit Protocols

Commit Protocols in DDBSs

Commit protocols ensure that distributed transactions maintain atomicity—either all sites commit the transaction, or all abort it, even in the presence of failures. This is critical in DDBSs because transactions span multiple sites, and a failure at one site shouldn’t leave the system in an inconsistent state. Let’s break down the key commit protocols:

https://www.geeksforgeeks.org/two-phase-commit-protocol-distributed-transaction-management/ (2PC)

Pasted image 20250530125515.png


Pasted image 20250530125456.png


Key Considerations


Recovery Protocols

Recovery Protocols in DDBSs

Recovery protocols in distributed database systems ensure the system can return to a consistent state after a failure (like site, network, or transaction failures).



Pasted image 20250530123454.png

So shadow paging is an alternative to logging, and it helps since it basically creates a copy of a transaction which becomes active after committing, but gets discarded if the transaction aborts. The pros to this is that the original transaction is not affected and neither do we have to look up the log to rollback. This saves time.



Key Considerations