Types of Checkpoints
TimesTen uses the most recent checkpoint file to recover the database to transaction-consistent state at the time of the last successful checkpoint operation completed.
It uses the transaction log files to recover the database to its most recent transaction-consistent state after a database shutdown or system failure.
TimesTen supports two types of database checkpoint operations: