+ All Categories
Home > Documents > TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

Date post: 21-Jan-2016
Category:
Upload: emil-jacobs
View: 236 times
Download: 0 times
Share this document with a friend
21
TM 13- TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration
Transcript
Page 1: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-11Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Data and Database Administration

Page 2: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-22Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Definitions

• Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards.

• Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery.

Page 3: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-33Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Data Administration Functions

• Data policies, procedures, standards.

• Planning.

• Data conflict (ownership) resolution.

• Internal marketing of DA concepts.

• Managing the data repository.

Page 4: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-44Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Database Administration Functions

• Selection of hardware and software.

• Managing data security, privacy, and integrity.

• Data backup and recovery.

• Fig. 13-1 is a list of DA and DBA functions.

Page 5: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-55Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Data Security• Data Security: Protection of the data against accidental or

intentional loss, destruction, or misuse.

• Possible locations of data security threats

Pg 492

Page 6: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-66Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Threats to Data Security• Accidental losses attributable to:

– Human error.

– Software failure.

– Hardware failure.

• Theft and fraud.

• Improper data access:– Loss of privacy (personal data).

– Loss of confidentiality (corporate data).

• Loss of data integrity.

• Loss of availability (through, e.g. sabotage).

Page 7: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-77Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Data Management Software Security Features

Views or subschemas. Authorization rules.

Fig. 13-3 (right) , 4, 5. User-defined procedures.

E.g. trigger an authorization procedure which asks additional identification questions.

Encryption. Authentication schemes.

Biometric devices.

Page 8: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-88Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Backup and RecoveryBasic Recovery Facilities

Backup Facilities Journalizing Facilities

Fig. 13-6 (right)Transaction Log

- time, records, input values.Database Change Log

- before & after images. Checkpoint Facility

Restart point after a failure. Recovery Manager

Fig 13-6: Database audit trail

Page 9: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-99Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Recovery and Restart Procedures

• Switch - Mirrored databases.

• Restore/Rerun - Reprocess transactions against the backup.

• Transaction Integrity - Commit or abort all transaction changes. (trans boundaries)

• Backward & forward recovery follow….

Page 10: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1010Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Basic recovery techniques(a) Rollback

Backward Recovery - Apply before images.Undo unwanted changes

Pg 502

Page 11: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1111Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

(b) RollforwardForward Recovery - Apply after images (preferable to restore/rerun.)

Pg 502

Page 12: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1212Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Types of Database Failure

• Table. 13-1.

• Aborted transactions.

• Incorrect data. (update inaccurate)

• System failure (database intact.)

• Database destruction

Pg 503

Page 13: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1313Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Concurrency Control

• Concurrency Control - The process of managing simultaneous operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multi-user environment.

• Lost Update Problem - Fig. 13-8.

• -- refer to html notes --

Page 14: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1414Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Concurrency Control Techniques

• Serializability - Finish one transaction before starting another.

• Locking Mechanisms - Fig. 13-10.– Locking level:

• Database

• Table

• Block or page

• Record

• Field

Page 15: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1515Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Concurrency Control Techniques

– Types of locks:• Shared lock - Read but not update permitted. Used

when just reading to prevent another user from placing an exclusive lock on the record.

• Exclusive lock - No access permitted. Used when preparing to update.

Page 16: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1616Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Deadlock• Deadlock - Transactions wait for each other to

release needed resources. Fig. 13-10, 11.

• Deadlock prevention:– Lock all records required at the beginning of a

transaction– Two-phase locking protocol

• Growing phase.• Shrinking phase.

– May be difficult to determine all needed resources in advance.

Page 17: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1717Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Deadlock• Deadlock Resolution:

– Allow deadlocks to occur.– Mechanisms for detecting and breaking them.

• Resource usage matrix.

Page 18: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1818Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Concurrency Control Techniques

• Versioning:– Optimistic approach to concurrency control.– Assumption is that simultaneous updates will be

infrequent.– Each transaction can attempt an update as it

wishes.– The system will reject an update when it senses a

conflict.– Fig. 13-12.

Page 19: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-1919Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Managing Data Quality

• Data Steward - Liaisons between IT and business units.

• Five Data Quality Issues:Security policy and disaster recovery.Personnel controls.Physical access controls.Maintenance controls (hardware & software.)Data protection and privacy.

Page 20: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-2020Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Data Dictionaries and Repositories

– Passive data dictionary.

– Active data dictionary. (managed by DBMS)

• System catalog.– all DB objects, including data dictionary and user

access info

• Information Repository (CASE tools).• Information Repository Dictionary System (IRDS)

- Manages access- standards for dictionary storage and access.

Page 21: TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.

TM 13-TM 13-2121Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Performance tuning the database

• Correct installation• Memory usage• I/O Contention• CPU Usage• Application tuning

– examine SQL


Recommended