Enviar búsqueda
Cargar
Data & database administration hoffer
•
Descargar como PPT, PDF
•
1 recomendación
•
1,479 vistas
Mohd Arif
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 36
Descargar ahora
Recomendados
Database backup & recovery
Database backup & recovery
Mustafa Khan
Oracle Data Guard for Beginners
Oracle Data Guard for Beginners
Pini Dibask
DB security
DB security
ERSHUBHAM TIWARI
Hadoop HDFS Architeture and Design
Hadoop HDFS Architeture and Design
sudhakara st
Backup and recovery in oracle
Backup and recovery in oracle
sadegh salehi
03 backup-and-recovery
03 backup-and-recovery
hunny garg
Database administration and security
Database administration and security
Dhani Ahmad
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
Nabeel Yoosuf
Recomendados
Database backup & recovery
Database backup & recovery
Mustafa Khan
Oracle Data Guard for Beginners
Oracle Data Guard for Beginners
Pini Dibask
DB security
DB security
ERSHUBHAM TIWARI
Hadoop HDFS Architeture and Design
Hadoop HDFS Architeture and Design
sudhakara st
Backup and recovery in oracle
Backup and recovery in oracle
sadegh salehi
03 backup-and-recovery
03 backup-and-recovery
hunny garg
Database administration and security
Database administration and security
Dhani Ahmad
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
Nabeel Yoosuf
database recovery techniques
database recovery techniques
Kalhan Liyanage
Database fragmentation
Database fragmentation
Punjab College Of Technical Education
File organization 1
File organization 1
Rupali Rana
Data administration
Data administration
Prof. Erwin Globio
Oracle RAC 19c: Best Practices and Secret Internals
Oracle RAC 19c: Best Practices and Secret Internals
Anil Nair
Transaction management and concurrency control
Transaction management and concurrency control
Dhani Ahmad
Intro to big data and applications - day 1
Intro to big data and applications - day 1
Parviz Vakili
Oracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection Issues
Markus Flechtner
Ch 2-introduction to dbms
Ch 2-introduction to dbms
Rupali Rana
Oracle backup and recovery
Oracle backup and recovery
Yogiji Creations
Advanced Database Lecture Notes
Advanced Database Lecture Notes
Jasour Obeidat
SQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster Recovery
Michael Poremba
Dataguard presentation
Dataguard presentation
Vimlendu Kumar
ACID Property in DBMS
ACID Property in DBMS
Techtud Network
Introduction To Data Warehousing
Introduction To Data Warehousing
Alex Meadows
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMS
BaivabiNayak
Backups And Recovery
Backups And Recovery
asifmalik110
Database Systems
Database Systems
Usman Tariq
Backup & recovery with rman
Backup & recovery with rman
itsabidhussain
Database systems
Database systems
NazmulHossen5
The Database Environment Chapter 12
The Database Environment Chapter 12
Jeanie Arnoco
The Database Environment Chapter 1
The Database Environment Chapter 1
Jeanie Arnoco
Más contenido relacionado
La actualidad más candente
database recovery techniques
database recovery techniques
Kalhan Liyanage
Database fragmentation
Database fragmentation
Punjab College Of Technical Education
File organization 1
File organization 1
Rupali Rana
Data administration
Data administration
Prof. Erwin Globio
Oracle RAC 19c: Best Practices and Secret Internals
Oracle RAC 19c: Best Practices and Secret Internals
Anil Nair
Transaction management and concurrency control
Transaction management and concurrency control
Dhani Ahmad
Intro to big data and applications - day 1
Intro to big data and applications - day 1
Parviz Vakili
Oracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection Issues
Markus Flechtner
Ch 2-introduction to dbms
Ch 2-introduction to dbms
Rupali Rana
Oracle backup and recovery
Oracle backup and recovery
Yogiji Creations
Advanced Database Lecture Notes
Advanced Database Lecture Notes
Jasour Obeidat
SQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster Recovery
Michael Poremba
Dataguard presentation
Dataguard presentation
Vimlendu Kumar
ACID Property in DBMS
ACID Property in DBMS
Techtud Network
Introduction To Data Warehousing
Introduction To Data Warehousing
Alex Meadows
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMS
BaivabiNayak
Backups And Recovery
Backups And Recovery
asifmalik110
Database Systems
Database Systems
Usman Tariq
Backup & recovery with rman
Backup & recovery with rman
itsabidhussain
Database systems
Database systems
NazmulHossen5
La actualidad más candente
(20)
database recovery techniques
database recovery techniques
Database fragmentation
Database fragmentation
File organization 1
File organization 1
Data administration
Data administration
Oracle RAC 19c: Best Practices and Secret Internals
Oracle RAC 19c: Best Practices and Secret Internals
Transaction management and concurrency control
Transaction management and concurrency control
Intro to big data and applications - day 1
Intro to big data and applications - day 1
Oracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection Issues
Ch 2-introduction to dbms
Ch 2-introduction to dbms
Oracle backup and recovery
Oracle backup and recovery
Advanced Database Lecture Notes
Advanced Database Lecture Notes
SQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster Recovery
Dataguard presentation
Dataguard presentation
ACID Property in DBMS
ACID Property in DBMS
Introduction To Data Warehousing
Introduction To Data Warehousing
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMS
Backups And Recovery
Backups And Recovery
Database Systems
Database Systems
Backup & recovery with rman
Backup & recovery with rman
Database systems
Database systems
Similar a Data & database administration hoffer
The Database Environment Chapter 12
The Database Environment Chapter 12
Jeanie Arnoco
The Database Environment Chapter 1
The Database Environment Chapter 1
Jeanie Arnoco
Ch 13 D B Admin
Ch 13 D B Admin
guest8fdbdd
INT 1010 07-2.pdf
INT 1010 07-2.pdf
Luis R Castellanos
The Database Environment Chapter 13
The Database Environment Chapter 13
Jeanie Arnoco
A27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practices
Insight Technology, Inc.
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for Consolidation
Yudi Herdiana
Fazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recovery
Softhat IT Solutions
Data Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data Lake
Denodo
Guide on Raid Data Recovery
Guide on Raid Data Recovery
Raid Data Recovery
Oracle database 12c new features
Oracle database 12c new features
Jakkrapat S.
Powerpoint chap.9
Powerpoint chap.9
NovieJenVillanueva
Maximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12c
Digicomp Academy Suisse Romande SA
Things learned from OpenWorld 2013
Things learned from OpenWorld 2013
Connor McDonald
vFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deck
Junchi Zhang
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
Mario Redón Luz
Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)
Denodo
High Availability Options for DB2 Data Centre
High Availability Options for DB2 Data Centre
terraborealis
C4 delivering database as a service within your organization
C4 delivering database as a service within your organization
Dr. Wilfred Lin (Ph.D.)
Bilbao oracle12c keynote
Bilbao oracle12c keynote
Aitor Ibañez
Similar a Data & database administration hoffer
(20)
The Database Environment Chapter 12
The Database Environment Chapter 12
The Database Environment Chapter 1
The Database Environment Chapter 1
Ch 13 D B Admin
Ch 13 D B Admin
INT 1010 07-2.pdf
INT 1010 07-2.pdf
The Database Environment Chapter 13
The Database Environment Chapter 13
A27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practices
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for Consolidation
Fazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recovery
Data Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data Lake
Guide on Raid Data Recovery
Guide on Raid Data Recovery
Oracle database 12c new features
Oracle database 12c new features
Powerpoint chap.9
Powerpoint chap.9
Maximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12c
Things learned from OpenWorld 2013
Things learned from OpenWorld 2013
vFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deck
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)
High Availability Options for DB2 Data Centre
High Availability Options for DB2 Data Centre
C4 delivering database as a service within your organization
C4 delivering database as a service within your organization
Bilbao oracle12c keynote
Bilbao oracle12c keynote
Más de Mohd Arif
Bootp and dhcp
Bootp and dhcp
Mohd Arif
Arp and rarp
Arp and rarp
Mohd Arif
User datagram protocol
User datagram protocol
Mohd Arif
Project identification
Project identification
Mohd Arif
Project evalaution techniques
Project evalaution techniques
Mohd Arif
Presentation
Presentation
Mohd Arif
Pointers in c
Pointers in c
Mohd Arif
Peer to-peer
Peer to-peer
Mohd Arif
Overview of current communications systems
Overview of current communications systems
Mohd Arif
Overall 23 11_2007_hdp
Overall 23 11_2007_hdp
Mohd Arif
Objectives of budgeting
Objectives of budgeting
Mohd Arif
Network management
Network management
Mohd Arif
Networing basics
Networing basics
Mohd Arif
Loaders
Loaders
Mohd Arif
Lists
Lists
Mohd Arif
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
Mohd Arif
Ip sec and ssl
Ip sec and ssl
Mohd Arif
Ip security in i psec
Ip security in i psec
Mohd Arif
Intro to comp. hardware
Intro to comp. hardware
Mohd Arif
Heap sort
Heap sort
Mohd Arif
Más de Mohd Arif
(20)
Bootp and dhcp
Bootp and dhcp
Arp and rarp
Arp and rarp
User datagram protocol
User datagram protocol
Project identification
Project identification
Project evalaution techniques
Project evalaution techniques
Presentation
Presentation
Pointers in c
Pointers in c
Peer to-peer
Peer to-peer
Overview of current communications systems
Overview of current communications systems
Overall 23 11_2007_hdp
Overall 23 11_2007_hdp
Objectives of budgeting
Objectives of budgeting
Network management
Network management
Networing basics
Networing basics
Loaders
Loaders
Lists
Lists
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
Ip sec and ssl
Ip sec and ssl
Ip security in i psec
Ip security in i psec
Intro to comp. hardware
Intro to comp. hardware
Heap sort
Heap sort
Último
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Mark Goldstein
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Cprime
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Nikki Chapple
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Alkin Tezuysal
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
TopCSSGallery
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
UiPathCommunity
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Último
(20)
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
A Framework for Development in the AI Age
A Framework for Development in the AI Age
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Data & database administration hoffer
1.
Chapter 12:
Data and Database Administration Modern Database Management 6th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden 1 © Prentice Hall, 2002
2.
Definitions
Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery Chapter 12 2 © Prentice Hall, 2002
3.
Data Administration Functions
Data policies, procedures, standards Planning Data conflict (ownership) resolution Internal marketing of DA concepts Managing the data repository Chapter 12 3 © Prentice Hall, 2002
4.
Database Administration
Functions Selection of hardware and software Installing/upgrading DBMS Tuning database performance Improving query processing performance Managing data security, privacy, and integrity Data backup and recovery Chapter 12 4 © Prentice Hall, 2002
5.
Data Warehouse Administration
New role, coming with the growth in data warehouses Similar to DA/DBA roles Emphasis on integration and coordination of metadata/data across many data sources Specific roles: – Support decision –support applications – Manage data warehouse growth – Establish service level agreements regarding data warehouses and data marts Chapter 12 5 © Prentice Hall, 2002
6.
Database Security
Database Security: Protection of the data against accidental or intentional loss, destruction, or misuse Increased difficulty due to Internet access and client/server technologies Chapter 12 6 © Prentice Hall, 2002
7.
Figure 12-2: Possible
locations of data security threats Chapter 12 7 © Prentice Hall, 2002
8.
Threats to Data
Security Accidental losses attributable to: – Human error – Software failure – Hardware failure Theftand fraud. Improper data access: – Loss of privacy (personal data) – Loss of confidentiality (corporate data) Loss of data integrity Loss of availability (through, e.g. sabotage) Chapter 12 8 © Prentice Hall, 2002
9.
Data Management Software
Security Features • Views or subschemas • Integrity controls • Authorization rules • User-defined procedures • Encryption • Authentication schemes • Backup, journalizing, and checkpointing Chapter 12 9 © Prentice Hall, 2002
10.
Views and Integrity
Controls Views – Subset of the database that is presented to one or more users – User can be given access privilege to view without allowing access privilege to underlying tables Integrity Controls – Protect data from unauthorized use – Domains – set allowable values – Assertions – enforce database conditions Chapter 12 10 © Prentice Hall, 2002
11.
Authorization Rules Controlsincorporated
in the data management system Restrict: – access to data – actions that people can take on data Authorization matrix for: – Subjects – Objects – Actions – Constraints Chapter 12 11 © Prentice Hall, 2002
12.
Figure 12-3: Authorization
matrix Chapter 12 12 © Prentice Hall, 2002
13.
Figure 12-4(a): Authorization
table for subjects Figure 12-4(b): Authorization table for objects Figure 12-5: Oracle8i privileges Some DBMSs also provide capabilities for user-defined procedures to customize the authorization process Chapter 12 13 © Prentice Hall, 2002
14.
Authentication Schemes
Goal – obtain a positive identification of the user Passwords are flawed: – Users share them with each other – They get written down, could be copied – Automatic logon scripts remove need to explicitly type them in – Unencrypted passwords travel the Internet Possible solutions: – Biometric devices – use of fingerprints, retinal scans, etc. for positive ID – Third-party authentication – using secret keys, digital certificates Chapter 12 14 © Prentice Hall, 2002
15.
Database Recovery
Mechanism for restoring a database quickly and accurately after loss or damage Recovery facilities: • Backup Facilities • Journalizing Facilities • Checkpoint Facility • Recovery Manager Chapter 12 15 © Prentice Hall, 2002
16.
Backup Facilities
Automatic dump facility that produces backup copy of the entire database Periodic backup (e.g. nightly, weekly) Cold backup – database is shut down during backup Hot backup – selected portion is shut down and backed up at a given time Backups stored in secure, off-site location Chapter 12 16 © Prentice Hall, 2002
17.
Journalizing Facilities
Audit trail of transactions and database updates Transaction log – record of essential data for each transaction processed against the database Database change log – images of updated data – Before-image – copy before modification – After-image – copy after modification Produces an audit trail Chapter 12 17 © Prentice Hall, 2002
18.
Figure 12-6: Database
audit trail From the backup and logs, databases can be restored in case of damage or loss Chapter 12 18 © Prentice Hall, 2002
19.
Checkpoint Facilities
DBMS periodically refuses to accept new transactions system is in a quiet state Database and transaction logs are synchronized This allows recovery manager to resume processing from short period, instead of repeating entire day Chapter 12 19 © Prentice Hall, 2002
20.
Recovery and Restart
Procedures Switch - Mirrored databases Restore/Rerun - Reprocess transactions against the backup Transaction Integrity - Commit or abort all transaction changes Backward Recovery (Rollback) - Apply before images Forward Recovery (Roll Forward) - Apply after images (preferable to restore/rerun) Chapter 12 20 © Prentice Hall, 2002
21.
Figure 12-7: Basic
recovery techniques (a) Rollback Chapter 12 21 © Prentice Hall, 2002
22.
Figure 12-7(b) Rollforward Chapter
12 22 © Prentice Hall, 2002
23.
Database Failure Responses
Aborted transactions – Preferred recovery: rollback – Alternative: Rollforward to state just prior to abort Incorrect data – Preferred recovery: rollback – Alternative 1: re-run transactions not including inaccurate data updates – Alternative 2: compensating transactions System failure (database intact) – Preferred recovery: switch to duplicate database – Alternative 1: rollback – Alternative 2: restart from checkpoint Database destruction – Preferred recovery: switch to duplicate database – Alternative 1: rollforward – Alternative 2: reprocess transactions Chapter 12 23 © Prentice Hall, 2002
24.
Concurrency Control
Problem – in a multi-user environment, simultaneous access to data can result in interference and data loss Solution – Concurrency Control – The process of managing simultaneous operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multi-user environment. Chapter 12 24 © Prentice Hall, 2002
25.
Figure 12-8: LOST
UPDATE Simultaneous access causes updates to cancel each other A similar problem is the inconsistent read problem Chapter 12 25 © Prentice Hall, 2002
26.
Concurrency Control
Techniques Serializability – – Finish one transaction before starting another Locking Mechanisms – The most common way of achieving serialization – Data that is retrieved for the purpose of updating is locked for the updater – No other user can perform update until unlocked Chapter 12 26 © Prentice Hall, 2002
27.
Figure 12-9: Updates
with locking for concurrency control This prevents the lost update problem Chapter 12 27 © Prentice Hall, 2002
28.
Locking Mechanisms
Locking level: – Database – used during database updates – Table – used for bulk updates – Block or page – very commonly used – Record – only requested row; fairly commonly used – Field – requires significant overhead; impractical Types of locks: – Shared lock - Read but no update permitted. Used when just reading to prevent another user from placing an exclusive lock on the record – Exclusive lock - No access permitted. Used when preparing to update Chapter 12 28 © Prentice Hall, 2002
29.
Deadlock
An impasse that results when two or more transactions have locked common resources, and each waits for the other to unlock their resources Figure 12-11 A deadlock situation UserA and UserB will wait forever for each other to release their locked resources! Chapter 12 29 © Prentice Hall, 2002
30.
Managing Deadlock
Deadlock prevention: – Lock all records required at the beginning of a transaction – Two-phase locking protocol Growing phase Shrinking phase – May be difficult to determine all needed resources in advance Deadlock Resolution: – Allow deadlocks to occur – Mechanisms for detecting and breaking them Resource usage matrix Chapter 12 30 © Prentice Hall, 2002
31.
Versioning
Optimistic approach to concurrency control Instead of locking Assumption is that simultaneous updates will be infrequent Each transaction can attempt an update as it wishes The system will reject an update when it senses a conflict Use of rollback and commit for this Chapter 12 31 © Prentice Hall, 2002
32.
Figure 12-12: the
use of versioning Better performance than locking Chapter 12 32 © Prentice Hall, 2002
33.
Managing Data Quality
Data Steward - Liaisons between IT and business units Five Data Quality Issues: Security policy and disaster recovery Personnel controls Physical access controls Maintenance controls (hardware & software) Data protection and privacy Chapter 12 33 © Prentice Hall, 2002
34.
Data Dictionaries and
Repositories Data dictionary – Documents data elements of a database System catalog – System-created database that describes all database objects Information Repository – Stores metadata describing data and data processing resources Information Repository Dictionary System (IRDS) – Software tool managing/controlling access to information repository Chapter 12 34 © Prentice Hall, 2002
35.
Figure 12-13: Three
components of the repository system architecture A schema of the repository information Software that manages the repository objects Where repository objects are stored Source: adapted from Bernstein, 1996. Chapter 12 35 © Prentice Hall, 2002
36.
Database Performance Tuning
DBMS Installation – Setting installation parameters Memory Usage – Set cache levels – Choose background processes Input/Output Contention – Use striping – Distribution of heavily accessed files CPU Usage – Monitor CPU load Application tuning – Modification of SQL code in applications Chapter 12 36 © Prentice Hall, 2002
Descargar ahora