Font Size: a A A

Research And Implementation Of Real-time Duplicate Software In DB2Large Database

Posted on:2013-10-18Degree:MasterType:Thesis
Country:ChinaCandidate:T WangFull Text:PDF
GTID:2248330371987464Subject:Computer applications
Abstract/Summary:PDF Full Text Request
As information technology further, relating to the fortunes people’s livelihood enterprise data security becomes even more important. Such as banking, telecommunications, securities and futures, insurance industry and other corporate data security becomes particularly important. If there is no reasonable disaster recovery event of a disaster or accident can cause data loss, then the consequences are very serious. At present, there is not DB2large database’s logic-level real-time replication system in our country.But require in this area is more prominent. In this paper, a logic level quasi-real-time replication of database disaster recovery system is designed.This paper presents the process for research and implementation a real-time duplicate software in DB2database.This software used the modular design,and has5major modules:Client, Server, Full synchronizing, Increase synchronizing, Load. While the software running, the5modules coherent on with another. The client call the server, and the server schedules all task. In the process of the implementation, we grap the database’s log real-time to gain the change. This software doesn’t use any DB2database’s backup interface, so it well done in the function and efficiency. The test environment is OS:LINUX, CPU:Core2.4GHz,Memory:2GB.Under such a test environ-ment,this software worked well.This paper discusses the system and the backup software has many different. The first is based on database logic level, which is based on database tables. There has no relationship to the physical structure of the database to store data. Followed by the target-side database in real-time replication process is open and available to the state.
Keywords/Search Tags:DB2database, tolerant, backup, real-time duplicate, log analysis
PDF Full Text Request
Related items