download presentation source

24
TM 13- TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration Chapter 12

Upload: databaseguys

Post on 17-Dec-2014

448 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Download presentation source

TM 13-TM 13-11Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Data and Database Administration

Chapter 12

Page 2: Download presentation source

TM 13-TM 13-22Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Definitions

• Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards.

• Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery.

Page 3: Download presentation source

TM 13-TM 13-33Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Data Administration Functions

• Data policies, procedures, standards.

• Planning.

• Data conflict (ownership) resolution.

• Internal marketing of DA concepts.

• Managing the data repository.

Page 4: Download presentation source

TM 13-TM 13-44Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Database Administration Functions

• Selection of hardware and software.

• Managing data security, privacy, and integrity.

• Data backup and recovery.

Page 5: Download presentation source

TM 13-TM 13-55Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

STAGES IN THE LIFE CYCLE OF A DATABASE SYSTEM

• database planning

• database analysis

• database design

• database implementation

• operation and maintenance

• growth and change

Page 6: Download presentation source

TM 13-TM 13-66Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Data Dictionaries and Repositories

• Passive data dictionary– used by people

• Active data dictionary– CASE tool (development)– metadata (production)

• Relational catalog.

• Repository (CASE tools).

Page 7: Download presentation source

TM 13-TM 13-77Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Information Repository Dictionary System (IRDS)

• A computer software tool that is used to manage and control access to the information repository.

Page 8: Download presentation source

TM 13-TM 13-88Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Information Repository

• Stores metadata that describes an organization’s data and data processing resources.

• Manages the total information processing environment.

• Combines information about an organization’s business information and its application portfolio.

Page 9: Download presentation source

TM 13-TM 13-99Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

DBMS ENGINE

• The central component of a DMS.

• Provides access to the repository and the database and coordinates all of the other functional elements of the DMS.

Page 10: Download presentation source

TM 13-TM 13-1010Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Interface Subsystem

• Provides facilities for users and applications to access the various components of the DBMS.

Page 11: Download presentation source

TM 13-TM 13-1111Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Managing Data Quality

• Data Steward - Liaisons between IT and business units.

• Five Data Quality Issues:Security policy and disaster recovery.Personnel controls.Physical access controls.Maintenance controls (hardware & software.)Data protection and privacy.

Page 12: Download presentation source

TM 13-TM 13-1212Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Database ManagementSubsystems

• Performance Management Subsystem

• Data Integrity Management Subsystem

• Backup and Recovery Subsystem

• Application Development Subsystem

• Security Management Subsystem

Page 13: Download presentation source

TM 13-TM 13-1313Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Backup and RecoveryBasic Recovery Facilities

Backup FacilitiesJournalizing Facilities

Fig. 13-6Transaction Log - time, records, input values.Database Change Log - before & after images.

Checkpoint FacilityRestart point after a failure.

Recovery Manager

Page 14: Download presentation source

TM 13-TM 13-1414Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Database audit trail

Page 15: Download presentation source

TM 13-TM 13-1515Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Recovery and Restart Procedures• Switch - Mirrored databases.

• Restore/Rerun - Reprocess transactions against the backup.

• Transaction Integrity - Commit or abort all transaction changes.

• Backward Recovery (Rollback) - Apply before images. Fig. 13-7.

• Forward Recovery (Roll Forward) - Apply after images (preferable to restore/rerun.)

Page 16: Download presentation source

TM 13-TM 13-1616Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Basic recovery techniques(a) Rollback

Page 17: Download presentation source

TM 13-TM 13-1717Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

(b) Rollforward

Page 18: Download presentation source

TM 13-TM 13-1818Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Types of Database Failure

• Fig. 13-8.

• Aborted transactions.

• Incorrect data.

• System failure (database intact.)

• Database destruction

Page 19: Download presentation source

TM 13-TM 13-1919Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Concurrency Control

• Concurrency Control - The process of managing simultaneous operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multi-user environment.

• Lost Update Problem - Fig. 13-9.

Page 20: Download presentation source

TM 13-TM 13-2020Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Concurrency Control Techniques

• Serializability - Finish one transaction before starting another.

• Locking Mechanisms - Fig. 13-10.– Locking level:

• Database

• Table

• Block or page

• Record

• Field

Page 21: Download presentation source

TM 13-TM 13-2121Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Concurrency Control Techniques

– Types of locks:• Shared lock - Read but not update permitted. Used

when just reading to prevent another user from placing an exclusive lock on the record.

• Exclusive lock - No access permitted. Used when preparing to update.

Page 22: Download presentation source

TM 13-TM 13-2222Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Deadlock• Deadlock - Transactions wait for each other to

release needed resources. Fig. 13-11, 12.

• Deadlock prevention:– Lock all records required at the beginning of a

transaction– Two-phase locking protocol

• Growing phase.• Shrinking phase.

– May be difficult to determine all needed resources in advance.

Page 23: Download presentation source

TM 13-TM 13-2323Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Deadlock• Deadlock Resolution:

– Allow deadlocks to occur.– Mechanisms for detecting and breaking them.

• Resource usage matrix.

Page 24: Download presentation source

TM 13-TM 13-2424Copyright © 1999 Addison Wesley Longman, Inc.Copyright © 1999 Addison Wesley Longman, Inc.

Concurrency Control Techniques

• Versioning:– Optimistic approach to concurrency control.– Assumption is that simultaneous updates will be

infrequent.– Each transaction can attempt an update as it

wishes.– The system will reject an update when it senses a

conflict.– Fig. 13-13.