Knowledge

Data redundancy

Source 📝

32:
is the existence of data that is additional to the actual data and permits correction of errors in stored or transmitted data. The additional data can simply be a complete copy of the actual data (a type of
60:(HDDs) into a logical storage unit that allows stored data to survive a complete failure of one drive. Data redundancy can also be used as a measure against 108:
database designs and results in the complication of database management, introducing the risk of corrupting the data, and increasing the required amount of
123:
For instance, when customer data are duplicated and attached with each product bought, then redundancy of data is a known source of
399: 247: 351: 317: 283: 93: 127:
since a given customer might appear with different values for one or more of their attributes. Data redundancy leads to
169: 80:
checksumming in combination with copies of stored data to detect silent data corruption and repair its effects.
124: 38: 159: 379: 164: 117: 97: 389: 132: 61: 341: 189: 307: 109: 273: 104:, or where the field is replicated/repeated in two or more tables. Often this is found in 8: 101: 120:; used to improve performance of database queries (shorten the database response time). 394: 251: 149: 219:"Operating Systems – Three Easy Pieces: Redundant Arrays of Inexpensive Disks (RAIDs)" 218: 347: 313: 279: 190:"A Realistic Evaluation of Memory Hardware Errors and Software System Susceptibility" 105: 21: 144: 128: 57: 34: 216: 154: 384: 373: 65: 25: 187: 112:. When done on purpose from a previously normalized database schema, it 49: 17: 339: 45: 48:
is capable of detecting and correcting single-bit errors within each
217:
Remzi H. Arpaci-Dusseau; Andrea C. Arpaci-Dusseau (3 January 2015).
77: 135:
prevents redundancy and makes the best possible usage of storage.
96:
that have values repeated unnecessarily in one or more records or
53: 188:
Xin Li; Michael C. Huang; Kai Shen; Lingkun Chu (9 May 2010).
271: 69: 245: 73: 309:
Database systems: design, implementation, and management
305: 131:
and generally should be avoided by design; applying
340:I. T. L. Education Solutions Limited; Itl (2009). 371: 44:For example, by including computed check bits, 41:of lost or damaged data up to a certain level. 265: 248:"How I Use the Advanced Capabilities of Btrfs" 246:Margaret Bierman; Lenz Grimmer (August 2012). 333: 299: 275:Database integrity: challenges and solutions 37:), or only select pieces of data that allow 346:. Pearson Education India. p. 522. 272:Jorge H. Doorn; Laura C. Rivero (2002). 372: 343:Introduction to Information Technology 278:. Idea Group Inc (IGI). pp. 4–5. 83: 39:detection of errors and reconstruction 13: 306:Peter Rob; Carlos Coronel (2009). 14: 411: 312:. Cengage Learning. p. 88. 400:Fault-tolerant computer systems 170:Redundancy (information theory) 239: 210: 181: 1: 175: 129:data anomalies and corruption 7: 138: 88:While different in nature, 10: 416: 160:End-to-end data protection 165:Redundancy (engineering) 118:database denormalization 116:be considered a form of 133:database normalization 62:silent data corruption 84:In database systems 252:Oracle Corporation 150:Data deduplication 353:978-81-7758-118-8 319:978-1-4239-0201-0 285:978-1-930708-38-9 22:auxiliary storage 407: 365: 364: 362: 360: 337: 331: 330: 328: 326: 303: 297: 296: 294: 292: 269: 263: 262: 260: 258: 243: 237: 236: 234: 232: 223: 214: 208: 207: 205: 203: 197:cs.rochester.edu 194: 185: 145:Data maintenance 94:database systems 58:hard disk drives 415: 414: 410: 409: 408: 406: 405: 404: 380:Computer memory 370: 369: 368: 358: 356: 354: 338: 334: 324: 322: 320: 304: 300: 290: 288: 286: 270: 266: 256: 254: 244: 240: 230: 228: 221: 215: 211: 201: 199: 192: 186: 182: 178: 141: 92:also occurs in 90:data redundancy 86: 64:; for example, 35:repetition code 30:data redundancy 12: 11: 5: 413: 403: 402: 397: 392: 387: 382: 367: 366: 352: 332: 318: 298: 284: 264: 238: 209: 179: 177: 174: 173: 172: 167: 162: 157: 155:Data scrubbing 152: 147: 140: 137: 85: 82: 26:computer buses 9: 6: 4: 3: 2: 412: 401: 398: 396: 393: 391: 390:Data modeling 388: 386: 383: 381: 378: 377: 375: 355: 349: 345: 344: 336: 321: 315: 311: 310: 302: 287: 281: 277: 276: 268: 253: 249: 242: 227: 220: 213: 198: 191: 184: 180: 171: 168: 166: 163: 161: 158: 156: 153: 151: 148: 146: 143: 142: 136: 134: 130: 126: 125:inconsistency 121: 119: 115: 111: 107: 103: 99: 95: 91: 81: 79: 76:use data and 75: 71: 67: 63: 59: 56:combines two 55: 51: 47: 42: 40: 36: 31: 27: 23: 19: 357:. Retrieved 342: 335: 323:. Retrieved 308: 301: 289:. Retrieved 274: 267: 255:. Retrieved 241: 229:. Retrieved 225: 212: 200:. Retrieved 196: 183: 122: 113: 106:unnormalized 89: 87: 66:file systems 43: 29: 16:In computer 15: 226:cs.wisc.edu 100:, within a 54:RAID 1 50:memory word 18:main memory 374:Categories 359:4 February 325:22 January 291:23 January 257:26 January 231:16 January 202:16 January 176:References 46:ECC memory 395:Databases 139:See also 78:metadata 68:such as 52:, while 110:storage 350:  316:  282:  98:fields 222:(PDF) 193:(PDF) 102:table 70:Btrfs 385:Data 361:2011 348:ISBN 327:2011 314:ISBN 293:2011 280:ISBN 259:2015 233:2015 204:2015 72:and 24:and 114:may 74:ZFS 376:: 250:. 224:. 195:. 28:, 20:, 363:. 329:. 295:. 261:. 235:. 206:.

Index

main memory
auxiliary storage
computer buses
repetition code
detection of errors and reconstruction
ECC memory
memory word
RAID 1
hard disk drives
silent data corruption
file systems
Btrfs
ZFS
metadata
database systems
fields
table
unnormalized
storage
database denormalization
inconsistency
data anomalies and corruption
database normalization
Data maintenance
Data deduplication
Data scrubbing
End-to-end data protection
Redundancy (engineering)
Redundancy (information theory)
"A Realistic Evaluation of Memory Hardware Errors and Software System Susceptibility"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.