SlideShare una empresa de Scribd logo
1 de 36
Chapter 12:
     Data and Database
       Administration
   Modern Database Management
           6th Edition
Jeffrey A. Hoffer, Mary B. Prescott, Fred R.
                  McFadden


                                               1
                © Prentice Hall, 2002
Definitions
   Data   Administration: A high-level function that is
    responsible for the overall management of data
    resources in an organization, including
    maintaining corporate-wide definitions and
    standards
   Database Administration: A technical function
    that is responsible for physical database design
    and for dealing with technical issues such as
    security enforcement, database performance, and
    backup and recovery
Chapter 12                                 2
                   © Prentice Hall, 2002
Data Administration Functions
   Data  policies, procedures, standards
   Planning
   Data conflict (ownership) resolution
   Internal marketing of DA concepts
   Managing the data repository




Chapter 12                               3
                 © Prentice Hall, 2002
Database Administration
              Functions
   Selection  of hardware and software
   Installing/upgrading DBMS
   Tuning database performance
   Improving query processing performance
   Managing data security, privacy, and
    integrity
   Data backup and recovery

Chapter 12                              4
                © Prentice Hall, 2002
Data Warehouse Administration
   New  role, coming with the growth in data
    warehouses
   Similar to DA/DBA roles
   Emphasis on integration and coordination
    of metadata/data across many data sources
   Specific roles:
      – Support decision –support applications
      – Manage data warehouse growth
      – Establish service level agreements regarding
        data warehouses and data marts
Chapter 12                                 5
                   © Prentice Hall, 2002
Database Security
  Database   Security: Protection of the
   data against accidental or intentional
   loss, destruction, or misuse
  Increased difficulty due to Internet
   access and client/server technologies


Chapter 12                              6
                © Prentice Hall, 2002
Figure 12-2: Possible locations of data security threats




Chapter 12                                    7
                    © Prentice Hall, 2002
Threats to Data Security
   Accidental    losses attributable to:
      – Human error
      – Software failure
      – Hardware failure
   Theftand fraud.
   Improper data access:
      – Loss of privacy (personal data)
      – Loss of confidentiality (corporate data)
   Loss of data integrity
   Loss of availability (through, e.g. sabotage)

Chapter 12                                         8
                     © Prentice Hall, 2002
Data Management Software
           Security Features
  •   Views or subschemas
  •   Integrity controls
  •   Authorization rules
  •   User-defined procedures
  •   Encryption
  •   Authentication schemes
  •   Backup, journalizing, and checkpointing
Chapter 12                                9
                  © Prentice Hall, 2002
Views and Integrity Controls
   Views
      – Subset of the database that is presented to one or more
        users
      – User can be given access privilege to view without
        allowing access privilege to underlying tables
   Integrity   Controls
      – Protect data from unauthorized use
      – Domains – set allowable values
      – Assertions – enforce database conditions

Chapter 12                                         10
                      © Prentice Hall, 2002
Authorization Rules
 Controlsincorporated in the data management system
 Restrict:
   – access to data
   – actions that people can take on data
 Authorization     matrix for:
   –   Subjects
   –   Objects
   –   Actions
   –   Constraints



Chapter 12                                   11
                     © Prentice Hall, 2002
Figure 12-3: Authorization matrix




Chapter 12                                       12
                      © Prentice Hall, 2002
Figure 12-4(a): Authorization table for subjects




                                   Figure 12-4(b): Authorization table for objects




Figure 12-5: Oracle8i privileges

                                             Some DBMSs also provide
                                             capabilities for user-defined
                                             procedures to customize the
                                             authorization process

Chapter 12                                                     13
                            © Prentice Hall, 2002
Authentication Schemes
   Goal – obtain a positive identification of the user
   Passwords are flawed:
      – Users share them with each other
      – They get written down, could be copied
      – Automatic logon scripts remove need to explicitly type
        them in
      – Unencrypted passwords travel the Internet
   Possible   solutions:
      – Biometric devices – use of fingerprints, retinal scans,
        etc. for positive ID
      – Third-party authentication – using secret keys, digital
        certificates
Chapter 12                                         14
                      © Prentice Hall, 2002
Database Recovery
     Mechanism   for restoring a database quickly
      and accurately after loss or damage
     Recovery facilities:
        • Backup Facilities
        • Journalizing Facilities
        • Checkpoint Facility
        • Recovery Manager



Chapter 12                                  15
                    © Prentice Hall, 2002
Backup Facilities
   Automatic  dump facility that produces
    backup copy of the entire database
   Periodic backup (e.g. nightly, weekly)
   Cold backup – database is shut down during
    backup
   Hot backup – selected portion is shut down
    and backed up at a given time
   Backups stored in secure, off-site location

Chapter 12                              16
                © Prentice Hall, 2002
Journalizing Facilities
   Audit  trail of transactions and database
    updates
   Transaction log – record of essential data
    for each transaction processed against the
    database
   Database change log – images of updated
    data
      – Before-image – copy before modification
      – After-image – copy after modification

               Produces an audit trail
Chapter 12                                 17
                   © Prentice Hall, 2002
Figure 12-6: Database audit trail




                      From the backup and
                      logs, databases can be
                      restored in case of
                      damage or loss

Chapter 12                                     18
                   © Prentice Hall, 2002
Checkpoint Facilities
   DBMS    periodically refuses to accept new
    transactions
    system is in a quiet state
   Database and transaction logs are
    synchronized
    This allows recovery manager to resume processing
    from short period, instead of repeating entire day


Chapter 12                                    19
                    © Prentice Hall, 2002
Recovery and Restart
                 Procedures
  Switch  - Mirrored databases
  Restore/Rerun - Reprocess transactions against the
   backup
  Transaction Integrity - Commit or abort all
   transaction changes
  Backward Recovery (Rollback) - Apply before
   images
  Forward Recovery (Roll Forward) - Apply after
   images (preferable to restore/rerun)

Chapter 12                                20
                  © Prentice Hall, 2002
Figure 12-7: Basic recovery techniques
                           (a) Rollback




Chapter 12                                      21
                       © Prentice Hall, 2002
Figure 12-7(b) Rollforward




Chapter 12                                22
                © Prentice Hall, 2002
Database Failure Responses
    Aborted transactions
     – Preferred recovery: rollback
     – Alternative: Rollforward to state just prior to abort
    Incorrect data
     – Preferred recovery: rollback
     – Alternative 1: re-run transactions not including inaccurate data updates
     – Alternative 2: compensating transactions
    System failure (database intact)
     – Preferred recovery: switch to duplicate database
     – Alternative 1: rollback
     – Alternative 2: restart from checkpoint
    Database destruction
     – Preferred recovery: switch to duplicate database
     – Alternative 1: rollforward
     – Alternative 2: reprocess transactions

Chapter 12                                                      23
                            © Prentice Hall, 2002
Concurrency Control
   Problem –  in a multi-user environment,
    simultaneous access to data can result in
    interference and data loss
   Solution – Concurrency Control
      – The process of managing simultaneous
        operations against a database so that data
        integrity is maintained and the operations do
        not interfere with each other in a multi-user
        environment.

Chapter 12                                  24
                    © Prentice Hall, 2002
Figure 12-8: LOST UPDATE




     Simultaneous access causes updates to cancel each other
       A similar problem is the inconsistent read problem
Chapter 12                                        25
                      © Prentice Hall, 2002
Concurrency Control
                Techniques
   Serializability   –
      – Finish one transaction before starting another
   Locking Mechanisms
      – The most common way of achieving
        serialization
      – Data that is retrieved for the purpose of
        updating is locked for the updater
      – No other user can perform update until
        unlocked

Chapter 12                                   26
                   © Prentice Hall, 2002
Figure 12-9: Updates with locking for concurrency control




             This prevents the lost update problem
Chapter 12                                      27
                     © Prentice Hall, 2002
Locking Mechanisms
   Locking     level:
      –   Database – used during database updates
      –   Table – used for bulk updates
      –   Block or page – very commonly used
      –   Record – only requested row; fairly commonly used
      –   Field – requires significant overhead; impractical
   Types     of locks:
      – Shared lock - Read but no update permitted. Used
        when just reading to prevent another user from placing
        an exclusive lock on the record
      – Exclusive lock - No access permitted. Used when
        preparing to update

Chapter 12                                        28
                         © Prentice Hall, 2002
Deadlock
          An impasse that results when two or more transactions
           have locked common resources, and each waits for the
           other to unlock their resources


           Figure 12-11
    A deadlock situation

UserA and UserB will wait
forever for each other to
release their locked resources!




   Chapter 12                                        29
                             © Prentice Hall, 2002
Managing Deadlock
  Deadlock       prevention:
     – Lock all records required at the beginning of a
       transaction
     – Two-phase locking protocol
            Growing phase
            Shrinking phase
     – May be difficult to determine all needed resources in
        advance
  Deadlock       Resolution:
     – Allow deadlocks to occur
     – Mechanisms for detecting and breaking them
            Resource usage matrix


Chapter 12                                        30
                         © Prentice Hall, 2002
Versioning
    Optimistic  approach to concurrency control
    Instead of locking
    Assumption is that simultaneous updates will be
     infrequent
    Each transaction can attempt an update as it
     wishes
    The system will reject an update when it senses a
     conflict
    Use of rollback and commit for this


Chapter 12                                31
                  © Prentice Hall, 2002
Figure 12-12: the use of versioning




              Better performance than locking

Chapter 12                                         32
                    © Prentice Hall, 2002
Managing Data Quality
   Data Steward -     Liaisons between IT and
    business units
   Five Data Quality Issues:
       Security policy and disaster recovery
       Personnel controls
       Physical access controls
       Maintenance controls (hardware & software)
       Data protection and privacy

Chapter 12                                 33
                   © Prentice Hall, 2002
Data Dictionaries and Repositories
   Data     dictionary
      – Documents data elements of a database
   System        catalog
      – System-created database that describes all database
        objects
   Information       Repository
      – Stores metadata describing data and data processing
        resources
   Information       Repository Dictionary System
     (IRDS)
      – Software tool managing/controlling access to
        information repository
Chapter 12                                       34
                      © Prentice Hall, 2002
Figure 12-13: Three components of the repository system architecture

                                                                  A schema of the
                                                                  repository information




                                                Software that manages the repository objects




                                                                 Where repository objects
                                                                 are stored

        Source: adapted from Bernstein, 1996.


 Chapter 12                                                                   35
                                           © Prentice Hall, 2002
Database Performance Tuning
   DBMS      Installation
      – Setting installation parameters
   Memory      Usage
      – Set cache levels
      – Choose background processes
   Input/Output      Contention
      – Use striping
      – Distribution of heavily accessed files
   CPU      Usage
      – Monitor CPU load
   Application      tuning
      – Modification of SQL code in applications
Chapter 12                                       36
                      © Prentice Hall, 2002

Más contenido relacionado

La actualidad más candente

database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques Kalhan Liyanage
 
File organization 1
File organization 1File organization 1
File organization 1Rupali Rana
 
Oracle RAC 19c: Best Practices and Secret Internals
Oracle RAC 19c: Best Practices and Secret InternalsOracle RAC 19c: Best Practices and Secret Internals
Oracle RAC 19c: Best Practices and Secret InternalsAnil Nair
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency controlDhani Ahmad
 
Intro to big data and applications - day 1
Intro to big data and applications - day 1Intro to big data and applications - day 1
Intro to big data and applications - day 1Parviz Vakili
 
Oracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection IssuesOracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection IssuesMarkus Flechtner
 
Ch 2-introduction to dbms
Ch 2-introduction to dbmsCh 2-introduction to dbms
Ch 2-introduction to dbmsRupali Rana
 
Oracle backup and recovery
Oracle backup and recoveryOracle backup and recovery
Oracle backup and recoveryYogiji Creations
 
Advanced Database Lecture Notes
Advanced Database Lecture NotesAdvanced Database Lecture Notes
Advanced Database Lecture NotesJasour Obeidat
 
SQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster RecoverySQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster RecoveryMichael Poremba
 
Dataguard presentation
Dataguard presentationDataguard presentation
Dataguard presentationVimlendu Kumar
 
Introduction To Data Warehousing
Introduction To Data WarehousingIntroduction To Data Warehousing
Introduction To Data WarehousingAlex Meadows
 
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBaivabiNayak
 
Backups And Recovery
Backups And RecoveryBackups And Recovery
Backups And Recoveryasifmalik110
 
Database Systems
Database SystemsDatabase Systems
Database SystemsUsman Tariq
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rmanitsabidhussain
 

La actualidad más candente (20)

database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques
 
Database fragmentation
Database fragmentationDatabase fragmentation
Database fragmentation
 
File organization 1
File organization 1File organization 1
File organization 1
 
Data administration
Data administrationData administration
Data administration
 
Oracle RAC 19c: Best Practices and Secret Internals
Oracle RAC 19c: Best Practices and Secret InternalsOracle RAC 19c: Best Practices and Secret Internals
Oracle RAC 19c: Best Practices and Secret Internals
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency control
 
Intro to big data and applications - day 1
Intro to big data and applications - day 1Intro to big data and applications - day 1
Intro to big data and applications - day 1
 
Oracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection IssuesOracle Database: Checklist Connection Issues
Oracle Database: Checklist Connection Issues
 
Ch 2-introduction to dbms
Ch 2-introduction to dbmsCh 2-introduction to dbms
Ch 2-introduction to dbms
 
Oracle backup and recovery
Oracle backup and recoveryOracle backup and recovery
Oracle backup and recovery
 
Advanced Database Lecture Notes
Advanced Database Lecture NotesAdvanced Database Lecture Notes
Advanced Database Lecture Notes
 
SQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster RecoverySQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster Recovery
 
Dataguard presentation
Dataguard presentationDataguard presentation
Dataguard presentation
 
ACID Property in DBMS
ACID Property in DBMSACID Property in DBMS
ACID Property in DBMS
 
Introduction To Data Warehousing
Introduction To Data WarehousingIntroduction To Data Warehousing
Introduction To Data Warehousing
 
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMS
 
Backups And Recovery
Backups And RecoveryBackups And Recovery
Backups And Recovery
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rman
 
Database systems
Database systemsDatabase systems
Database systems
 

Similar a Data & database administration hoffer

The Database Environment Chapter 12
The Database Environment Chapter 12The Database Environment Chapter 12
The Database Environment Chapter 12Jeanie Arnoco
 
The Database Environment Chapter 1
The Database Environment Chapter 1The Database Environment Chapter 1
The Database Environment Chapter 1Jeanie Arnoco
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13Jeanie Arnoco
 
A27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesA27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesInsight Technology, Inc.
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationYudi Herdiana
 
Fazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoveryFazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoverySofthat IT Solutions
 
Data Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data LakeData Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data LakeDenodo
 
Oracle database 12c new features
Oracle database 12c new featuresOracle database 12c new features
Oracle database 12c new featuresJakkrapat S.
 
Things learned from OpenWorld 2013
Things learned from OpenWorld 2013Things learned from OpenWorld 2013
Things learned from OpenWorld 2013Connor McDonald
 
vFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deckvFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deckJunchi Zhang
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2Mario Redón Luz
 
Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Denodo
 
High Availability Options for DB2 Data Centre
High Availability Options for DB2 Data CentreHigh Availability Options for DB2 Data Centre
High Availability Options for DB2 Data Centreterraborealis
 
C4 delivering database as a service within your organization
C4   delivering database as a service within your organizationC4   delivering database as a service within your organization
C4 delivering database as a service within your organizationDr. Wilfred Lin (Ph.D.)
 
Bilbao oracle12c keynote
Bilbao  oracle12c keynoteBilbao  oracle12c keynote
Bilbao oracle12c keynoteAitor Ibañez
 

Similar a Data & database administration hoffer (20)

The Database Environment Chapter 12
The Database Environment Chapter 12The Database Environment Chapter 12
The Database Environment Chapter 12
 
The Database Environment Chapter 1
The Database Environment Chapter 1The Database Environment Chapter 1
The Database Environment Chapter 1
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
INT 1010 07-2.pdf
INT 1010 07-2.pdfINT 1010 07-2.pdf
INT 1010 07-2.pdf
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13
 
A27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesA27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practices
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for Consolidation
 
Fazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoveryFazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recovery
 
Data Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data LakeData Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data Lake
 
Guide on Raid Data Recovery
Guide on Raid Data RecoveryGuide on Raid Data Recovery
Guide on Raid Data Recovery
 
Oracle database 12c new features
Oracle database 12c new featuresOracle database 12c new features
Oracle database 12c new features
 
Powerpoint chap.9
Powerpoint chap.9Powerpoint chap.9
Powerpoint chap.9
 
Maximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12cMaximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12c
 
Things learned from OpenWorld 2013
Things learned from OpenWorld 2013Things learned from OpenWorld 2013
Things learned from OpenWorld 2013
 
vFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deckvFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deck
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)
 
High Availability Options for DB2 Data Centre
High Availability Options for DB2 Data CentreHigh Availability Options for DB2 Data Centre
High Availability Options for DB2 Data Centre
 
C4 delivering database as a service within your organization
C4   delivering database as a service within your organizationC4   delivering database as a service within your organization
C4 delivering database as a service within your organization
 
Bilbao oracle12c keynote
Bilbao  oracle12c keynoteBilbao  oracle12c keynote
Bilbao oracle12c keynote
 

Más de Mohd Arif

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Project identification
Project identificationProject identification
Project identificationMohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniquesMohd Arif
 
Presentation
PresentationPresentation
PresentationMohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in cMohd Arif
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peerMohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systemsMohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdpMohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgetingMohd Arif
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Networing basics
Networing basicsNetworing basics
Networing basicsMohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformMohd Arif
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psecMohd Arif
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardwareMohd Arif
 

Más de Mohd Arif (20)

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Presentation
PresentationPresentation
Presentation
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Network management
Network managementNetwork management
Network management
 
Networing basics
Networing basicsNetworing basics
Networing basics
 
Loaders
LoadersLoaders
Loaders
 
Lists
ListsLists
Lists
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
 
Heap sort
Heap sortHeap sort
Heap sort
 

Último

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Data & database administration hoffer

  • 1. Chapter 12: Data and Database Administration Modern Database Management 6th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden 1 © Prentice Hall, 2002
  • 2. Definitions  Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards  Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery Chapter 12 2 © Prentice Hall, 2002
  • 3. Data Administration Functions  Data policies, procedures, standards  Planning  Data conflict (ownership) resolution  Internal marketing of DA concepts  Managing the data repository Chapter 12 3 © Prentice Hall, 2002
  • 4. Database Administration Functions  Selection of hardware and software  Installing/upgrading DBMS  Tuning database performance  Improving query processing performance  Managing data security, privacy, and integrity  Data backup and recovery Chapter 12 4 © Prentice Hall, 2002
  • 5. Data Warehouse Administration  New role, coming with the growth in data warehouses  Similar to DA/DBA roles  Emphasis on integration and coordination of metadata/data across many data sources  Specific roles: – Support decision –support applications – Manage data warehouse growth – Establish service level agreements regarding data warehouses and data marts Chapter 12 5 © Prentice Hall, 2002
  • 6. Database Security Database Security: Protection of the data against accidental or intentional loss, destruction, or misuse Increased difficulty due to Internet access and client/server technologies Chapter 12 6 © Prentice Hall, 2002
  • 7. Figure 12-2: Possible locations of data security threats Chapter 12 7 © Prentice Hall, 2002
  • 8. Threats to Data Security  Accidental losses attributable to: – Human error – Software failure – Hardware failure  Theftand fraud.  Improper data access: – Loss of privacy (personal data) – Loss of confidentiality (corporate data)  Loss of data integrity  Loss of availability (through, e.g. sabotage) Chapter 12 8 © Prentice Hall, 2002
  • 9. Data Management Software Security Features • Views or subschemas • Integrity controls • Authorization rules • User-defined procedures • Encryption • Authentication schemes • Backup, journalizing, and checkpointing Chapter 12 9 © Prentice Hall, 2002
  • 10. Views and Integrity Controls  Views – Subset of the database that is presented to one or more users – User can be given access privilege to view without allowing access privilege to underlying tables  Integrity Controls – Protect data from unauthorized use – Domains – set allowable values – Assertions – enforce database conditions Chapter 12 10 © Prentice Hall, 2002
  • 11. Authorization Rules  Controlsincorporated in the data management system  Restrict: – access to data – actions that people can take on data  Authorization matrix for: – Subjects – Objects – Actions – Constraints Chapter 12 11 © Prentice Hall, 2002
  • 12. Figure 12-3: Authorization matrix Chapter 12 12 © Prentice Hall, 2002
  • 13. Figure 12-4(a): Authorization table for subjects Figure 12-4(b): Authorization table for objects Figure 12-5: Oracle8i privileges Some DBMSs also provide capabilities for user-defined procedures to customize the authorization process Chapter 12 13 © Prentice Hall, 2002
  • 14. Authentication Schemes  Goal – obtain a positive identification of the user  Passwords are flawed: – Users share them with each other – They get written down, could be copied – Automatic logon scripts remove need to explicitly type them in – Unencrypted passwords travel the Internet  Possible solutions: – Biometric devices – use of fingerprints, retinal scans, etc. for positive ID – Third-party authentication – using secret keys, digital certificates Chapter 12 14 © Prentice Hall, 2002
  • 15. Database Recovery  Mechanism for restoring a database quickly and accurately after loss or damage  Recovery facilities: • Backup Facilities • Journalizing Facilities • Checkpoint Facility • Recovery Manager Chapter 12 15 © Prentice Hall, 2002
  • 16. Backup Facilities  Automatic dump facility that produces backup copy of the entire database  Periodic backup (e.g. nightly, weekly)  Cold backup – database is shut down during backup  Hot backup – selected portion is shut down and backed up at a given time  Backups stored in secure, off-site location Chapter 12 16 © Prentice Hall, 2002
  • 17. Journalizing Facilities  Audit trail of transactions and database updates  Transaction log – record of essential data for each transaction processed against the database  Database change log – images of updated data – Before-image – copy before modification – After-image – copy after modification Produces an audit trail Chapter 12 17 © Prentice Hall, 2002
  • 18. Figure 12-6: Database audit trail From the backup and logs, databases can be restored in case of damage or loss Chapter 12 18 © Prentice Hall, 2002
  • 19. Checkpoint Facilities  DBMS periodically refuses to accept new transactions   system is in a quiet state  Database and transaction logs are synchronized This allows recovery manager to resume processing from short period, instead of repeating entire day Chapter 12 19 © Prentice Hall, 2002
  • 20. Recovery and Restart Procedures  Switch - Mirrored databases  Restore/Rerun - Reprocess transactions against the backup  Transaction Integrity - Commit or abort all transaction changes  Backward Recovery (Rollback) - Apply before images  Forward Recovery (Roll Forward) - Apply after images (preferable to restore/rerun) Chapter 12 20 © Prentice Hall, 2002
  • 21. Figure 12-7: Basic recovery techniques (a) Rollback Chapter 12 21 © Prentice Hall, 2002
  • 22. Figure 12-7(b) Rollforward Chapter 12 22 © Prentice Hall, 2002
  • 23. Database Failure Responses  Aborted transactions – Preferred recovery: rollback – Alternative: Rollforward to state just prior to abort  Incorrect data – Preferred recovery: rollback – Alternative 1: re-run transactions not including inaccurate data updates – Alternative 2: compensating transactions  System failure (database intact) – Preferred recovery: switch to duplicate database – Alternative 1: rollback – Alternative 2: restart from checkpoint  Database destruction – Preferred recovery: switch to duplicate database – Alternative 1: rollforward – Alternative 2: reprocess transactions Chapter 12 23 © Prentice Hall, 2002
  • 24. Concurrency Control  Problem – in a multi-user environment, simultaneous access to data can result in interference and data loss  Solution – Concurrency Control – The process of managing simultaneous operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multi-user environment. Chapter 12 24 © Prentice Hall, 2002
  • 25. Figure 12-8: LOST UPDATE Simultaneous access causes updates to cancel each other A similar problem is the inconsistent read problem Chapter 12 25 © Prentice Hall, 2002
  • 26. Concurrency Control Techniques  Serializability – – Finish one transaction before starting another  Locking Mechanisms – The most common way of achieving serialization – Data that is retrieved for the purpose of updating is locked for the updater – No other user can perform update until unlocked Chapter 12 26 © Prentice Hall, 2002
  • 27. Figure 12-9: Updates with locking for concurrency control This prevents the lost update problem Chapter 12 27 © Prentice Hall, 2002
  • 28. Locking Mechanisms  Locking level: – Database – used during database updates – Table – used for bulk updates – Block or page – very commonly used – Record – only requested row; fairly commonly used – Field – requires significant overhead; impractical  Types of locks: – Shared lock - Read but no update permitted. Used when just reading to prevent another user from placing an exclusive lock on the record – Exclusive lock - No access permitted. Used when preparing to update Chapter 12 28 © Prentice Hall, 2002
  • 29. Deadlock  An impasse that results when two or more transactions have locked common resources, and each waits for the other to unlock their resources Figure 12-11 A deadlock situation UserA and UserB will wait forever for each other to release their locked resources! Chapter 12 29 © Prentice Hall, 2002
  • 30. Managing Deadlock  Deadlock prevention: – Lock all records required at the beginning of a transaction – Two-phase locking protocol  Growing phase  Shrinking phase – May be difficult to determine all needed resources in advance  Deadlock Resolution: – Allow deadlocks to occur – Mechanisms for detecting and breaking them  Resource usage matrix Chapter 12 30 © Prentice Hall, 2002
  • 31. Versioning  Optimistic approach to concurrency control  Instead of locking  Assumption is that simultaneous updates will be infrequent  Each transaction can attempt an update as it wishes  The system will reject an update when it senses a conflict  Use of rollback and commit for this Chapter 12 31 © Prentice Hall, 2002
  • 32. Figure 12-12: the use of versioning Better performance than locking Chapter 12 32 © Prentice Hall, 2002
  • 33. Managing Data Quality  Data Steward - Liaisons between IT and business units  Five Data Quality Issues:  Security policy and disaster recovery  Personnel controls  Physical access controls  Maintenance controls (hardware & software)  Data protection and privacy Chapter 12 33 © Prentice Hall, 2002
  • 34. Data Dictionaries and Repositories  Data dictionary – Documents data elements of a database  System catalog – System-created database that describes all database objects  Information Repository – Stores metadata describing data and data processing resources  Information Repository Dictionary System (IRDS) – Software tool managing/controlling access to information repository Chapter 12 34 © Prentice Hall, 2002
  • 35. Figure 12-13: Three components of the repository system architecture A schema of the repository information Software that manages the repository objects Where repository objects are stored Source: adapted from Bernstein, 1996. Chapter 12 35 © Prentice Hall, 2002
  • 36. Database Performance Tuning  DBMS Installation – Setting installation parameters  Memory Usage – Set cache levels – Choose background processes  Input/Output Contention – Use striping – Distribution of heavily accessed files  CPU Usage – Monitor CPU load  Application tuning – Modification of SQL code in applications Chapter 12 36 © Prentice Hall, 2002