Check point based Recovery and Shadow Paging

In this 36 mins Video Lesson

Related Lessons in this Series

In this 55 mins Video Lesson :
Introduction, Lock Based Protocols, Starvation, Desdlocks, 2 Phase Locking Protocol, Strict 2PL, Rogorous 2PL, Lock Conversion Based Protocol, and other topics.

In this 46 mins Video Lesson :
Timestamp based Protocols, Timestamp Ordering protocol, Thomas' Write Rule, Optimistic/ Validation Based Protocols, Multiversion Scheme, and other topics.

In this 38 mins Video Lesson :
DeadLocks, Deadlock Prevention, Preemtion/ Rollback Scheme, Wait-Die Scheme, Wound-Wait Scheme, Deadlock Detection, Deadlock Recovery, Selection of Victim, Rollbacks, and other topics.

In this 45 mins Video Lesson :
Introduction, Types of Failures, Log Based Recovery, Deferred Database Modification, Immediate Database Modification, and other topics.

In this 36 mins Video Lesson :
Checkpoint Based Recovery, Shadow Paging, and other topics.

Member's Zone