A lightweight timestamp-based method for data replication in database

被引:0
|
作者
Dai, Wei [1 ]
Chen, Yongyan
Liu, Xiulan
Cao, JingGuo
Liang, Bo [1 ]
机构
[1] Kunming Univ Sci & Technol, Comp Technol Applicat Key Lab Yunnan Prov, Kunming, Yunnan, Peoples R China
关键词
timestamp-based data capture; system change number; data replication;
D O I
10.2495/ISME20131922
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Introducing additional timestamp field to capture data table changes is one of the most common methods for data replication. In this paper, we test the timestamp-based method with a table with 10 million records. There were several inconsistencies caused by concurrent executions within certain database isolation level. This paper describes an improved timestamp-based method by using Oracle database's internal system change number (SCN) instead of traditional user-defined timestamp field. Experimental results show that the method can solve data inconsistencies and show better performance. It is a lightweight method for data replication and easier to implement than other methods.
引用
收藏
页码:1491 / 1497
页数:7
相关论文
共 50 条
  • [1] TIMESTAMP-BASED ORPHAN ELIMINATION
    HERLIHY, MP
    MCKENDRY, MS
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1989, 15 (07) : 825 - 831
  • [2] Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC
    Zhai, Zhongyi
    Lai, Guibing
    Cheng, Bo
    Qian, Junyan
    Zhao, Lingzhong
    Wu, Jinsong
    Wan, Zhinguo
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 5299 - 5311
  • [3] A TIMESTAMP-BASED CACHE COHERENCE SCHEME
    MIN, SL
    BAER, JL
    [J]. PROCEEDINGS OF THE 1989 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, VOL 1: ARCHITECTURE, 1989, : I23 - I32
  • [4] Commit Phase in Timestamp-based STM
    Zhang, Rui
    Budimlic, Zoran
    Scherer, William N., III
    [J]. SPAA'08: PROCEEDINGS OF THE TWENTIETH ANNUAL SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURES, 2008, : 326 - 335
  • [5] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    [J]. PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [6] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, Chi-Kwong
    Cheng, L.M.
    [J]. Computers and Security, 2001, 21 (01): : 74 - 76
  • [7] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, CK
    Cheng, LM
    [J]. COMPUTERS & SECURITY, 2002, 21 (01) : 74 - 76
  • [8] A Lightweight Timestamp-based MAC Detection Scheme for XOR Network Coding in Wireless Sensor Networks
    Zhai, Zhongyi
    Qian, Junyan
    Tao, Yuan
    Zhao, Lingzhong
    Cheng, Bo
    [J]. MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 735 - 737
  • [9] Enhancement of a timestamp-based password authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    [J]. Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (577-579):
  • [10] Load Data Analysis Based on Timestamp-Based Self-Adaptive Evolutionary Clustering
    Lin, Rongheng
    He, Zheyu
    Zou, Hua
    Wu, Budan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (12) : 11508 - 11517