Advantages of Checkpoints
- Checkpoints help us in recovering the transaction of the database in case of a random shutdown of the database.
- It enhancing the consistency of the database in case when multiple transactions are executing in the database simultaneously.
- It increasing the data recovery process.
- Checkpoints work as a synchronization point between the database and the transaction log file in the database.
- Checkpoint records in the log file are used to prevent unnecessary redo operations.
- Since dirty pages are flushed out continuously in the background, it has a very low overhead and can be done frequently.
- Checkpoints provide the baseline information needed for the restoration of the lost state in the event of a system failure.
- A database checkpoint keeps track of change information and enables incremental database backup.
- A database storage checkpoint can be mounted, allowing regular file system operations to be performed.
- Database checkpoints can be used for application solutions which include backup, recovery or database modifications.
Checkpoints in DBMS
Pre-Requisite: Transaction Management
The Checkpoint is used to declare a point before which the DBMS was in a consistent state, and all transactions were committed. During transaction execution, such checkpoints are traced. After execution, transaction log files will be created. Upon reaching the savepoint/checkpoint, the log file is destroyed by saving its update to the database. Then a new log is created with upcoming execution operations of the transaction and it will be updated until the next checkpoint and the process continues.