SlideShare a Scribd company logo
1 of 47
Chapter 23: Advanced Application
                                    Development


            s Performance Tuning
            s Performance Benchmarks
            s Standardization
            s E-Commerce
            s Legacy Systems




                                                                        1
Database System Concepts, 5 th Ed.      23.1       ©Silberschatz, Korth and Sudarshan
Performance Tuning
             s     Adjusting various parameters and design choices to improve system
                   performance for a specific application.
             s     Tuning is best done by
                    1.   identifying bottlenecks, and
                    2.   eliminating them.
             s     Can tune a database system at 3 levels:
                    q    Hardware -- e.g., add disks to speed up I/O, add memory to
                         increase buffer hits, move to a faster processor.
                    q    Database system parameters -- e.g., set buffer size to avoid
                         paging of buffer, set checkpointing intervals to limit log size.
                         System may have automatic tuning.
                    q    Higher level database design, such as the schema, indices
                         and transactions (more later)



                                                                                              2
Database System Concepts, 5 th Ed.                  23.2                 ©Silberschatz, Korth and Sudarshan
Bottlenecks
             s Performance of most systems (at least before they are tuned) usually
                  limited by performance of one or a few components: these are called
                  bottlenecks
                    q   E.g. 80% of the code may take up 20% of time and 20% of code
                        takes up 80% of time
                             Worth spending most time on 20% of code that take 80% of
                              time
             s Bottlenecks may be in hardware (e.g. disks are very busy, CPU is
                  idle), or in software
             s Removing one bottleneck often exposes another
             s De-bottlenecking consists of repeatedly finding bottlenecks, and
                  removing them
                    q   This is a heuristic




                                                                                               3
Database System Concepts, 5 th Ed.                   23.3                 ©Silberschatz, Korth and Sudarshan
Identifying Bottlenecks
         s Transactions request a sequence of services
                q   e.g. CPU, Disk I/O, locks
         s     With concurrent transactions, transactions may have to wait for a
              requested service while other transactions are being served
         s Can model database as a queueing system with a queue for each
              service
                q    transactions repeatedly do the following
                         request a service, wait in queue for the service, and get serviced
         s Bottlenecks in a database system typically show up as very high utilizations
              (and correspondingly, very long queues) of a particular service
                q   E.g. disk vs CPU utilization
                q   100% utilization leads to very long waiting time:
                         Rule of thumb: design system for about 70% utilization at peak load
                         utilization over 90% should be avoided


                                                                                                 4
Database System Concepts, 5 th Ed.                    23.4                  ©Silberschatz, Korth and Sudarshan
Queues In A Database System




                                                                 5
Database System Concepts, 5 th Ed.   23.5   ©Silberschatz, Korth and Sudarshan
Tunable Parameters
             s Tuning of hardware
             s Tuning of schema
             s Tuning of indices
             s Tuning of materialized views
             s Tuning of transactions




                                                                           6
Database System Concepts, 5 th Ed.            23.6    ©Silberschatz, Korth and Sudarshan
Tuning of Hardware
             s Even well-tuned transactions typically require a few I/O operations
                    q   Typical disk supports about 100 random I/O operations per second
                    q   Suppose each transaction requires just 2 random I/O operations.
                        Then to support n transactions per second, we need to stripe data
                        across n/50 disks (ignoring skew)
             s Number of I/O operations per transaction can be reduced by keeping
                  more data in memory
                    q   If all data is in memory, I/O needed only for writes
                    q   Keeping frequently used data in memory reduces disk accesses,
                        reducing number of disks required, but has a memory cost




                                                                                                    7
Database System Concepts, 5 th Ed.                    23.7                     ©Silberschatz, Korth and Sudarshan
Hardware Tuning: Five-Minute Rule
      s Question: which data to keep in memory:
             q   If a page is accessed n times per second, keeping it in memory saves
                        n*          price-per-disk-drive
                               accesses-per-second-per-disk
             q   Cost of keeping page in memory
                          price-per-MB-of-memory
                           ages-per-MB-of-memory
             q   Break-even point: value of n for which above costs are equal
                     If accesses are more then saving is greater than cost
             q   Solving above equation with current disk and memory prices leads to:
                 5-minute rule: if a page that is randomly accessed is
                 used more frequently than once in 5 minutes it should be
                 kept in memory
                      (by buying sufficient memory!)

                                                                                              8
Database System Concepts, 5 th Ed.                          23.8         ©Silberschatz, Korth and Sudarshan
Hardware Tuning: One-Minute Rule
             s For sequentially accessed data, more pages can be read per second.
                  Assuming sequential reads of 1MB of data at a time:
                  1-minute rule: sequentially accessed data that is accessed
                  once or more in a minute should be kept in memory
             s Prices of disk and memory have changed greatly over the years, but
                  the ratios have not changed much
                    q   so rules remain as 5 minute and 1 minute rules, not 1 hour or 1
                        second rules!




                                                                                               9
Database System Concepts, 5 th Ed.                  23.9                  ©Silberschatz, Korth and Sudarshan
Hardware Tuning: Choice of RAID
                                Level
         s To use RAID 1 or RAID 5?
                q    Depends on ratio of reads and writes
                         RAID 5 requires 2 block reads and 2 block writes to write out one
                          data block
         s If an application requires r reads and w writes per second
                q   RAID 1 requires r + 2w      I/O operations per second
                q   RAID 5 requires: r + 4w I/O operations per second
         s For reasonably large r and w, this requires lots of disks to handle
              workload
                q   RAID 5 may require more disks than RAID 1 to handle load!
                q   Apparent saving of number of disks by RAID 5 (by using parity, as
                    opposed to the mirroring done by RAID 1) may be illusory!
         s Thumb rule: RAID 5 is fine when writes are rare and data is very large,
              but RAID 1 is preferable otherwise
                q   If you need more disks to handle I/O load, just mirror them since
                    disk capacities these days are enormous!
                                                                                                10
Database System Concepts, 5 th Ed.                   23.10                  ©Silberschatz, Korth and Sudarshan
Tuning the Database Design
         s Schema tuning
                q   Vertically partition relations to isolate the data that is accessed most
                    often -- only fetch needed information.
                      •   E.g., split account into two, (account-number, branch-name) and
                          (account-number, balance).
                           • Branch-name need not be fetched unless required
                q   Improve performance by storing a denormalized relation
                      •   E.g., store join of account and depositor; branch-name and
                          balance information is repeated for each holder of an account, but
                          join need not be computed repeatedly.
                            • Price paid: more space and more work for programmer to keep
                              relation consistent on updates
                      •   better to use materialized views (more on this later..)
                q   Cluster together on the same disk page records that would
                    match in a frequently required join,
                         compute join very efficiently when required.

                                                                                                 11
Database System Concepts, 5 th Ed.                    23.11                  ©Silberschatz, Korth and Sudarshan
Tuning the Database Design (Cont.)

         s Index tuning
                q   Create appropriate indices to speed up slow queries/updates
                q   Speed up slow updates by removing excess indices (tradeoff between
                    queries and updates)
                q   Choose type of index (B-tree/hash) appropriate for most frequent types
                    of queries.
                q   Choose which index to make clustered
         s Index tuning wizards look at past history of queries and updates (the
              workload) and recommend which indices would be best for the workload




                                                                                            12
Database System Concepts, 5 th Ed.                23.12                 ©Silberschatz, Korth and Sudarshan
Tuning the Database Design (Cont.)
         Materialized Views
         s Materialized views can help speed up certain queries
                q   Particularly aggregate queries
         s Overheads
                q   Space
                q   Time for view maintenance
                         Immediate view maintenance:done as part of update txn
                           – time overhead paid by update transaction
                         Deferred view maintenance: done only when required
                           – update transaction is not affected, but system time is spent
                             on view maintenance
                                »    until updated, the view may be out-of-date
         s Preferable to denormalized schema since view maintenance
              is systems responsibility, not programmers
                q   Avoids inconsistencies caused by errors in update programs

                                                                                                      13
Database System Concepts, 5 th Ed.                       23.13                    ©Silberschatz, Korth and Sudarshan
Tuning the Database Design (Cont.)
             s How to choose set of materialized views
                    q   Helping one transaction type by introducing a materialized view
                        may hurt others
                    q   Choice of materialized views depends on costs
                             Users often have no idea of actual cost of operations
                    q   Overall, manual selection of materialized views is tedious
             s Some database systems provide tools to help DBA choose views to
                  materialize
                    q   “Materialized view selection wizards”




                                                                                                 14
Database System Concepts, 5 th Ed.                     23.14                 ©Silberschatz, Korth and Sudarshan
Tuning of Transactions
         s Basic approaches to tuning of transactions
                q   Improve set orientation
                q   Reduce lock contention
         s Rewriting of queries to improve performance was important in the past,
              but smart optimizers have made this less important
         s Communication overhead and query handling overheads significant part
              of cost of each call
                q   Combine multiple embedded SQL/ODBC/JDBC queries
                    into a single set-oriented query
                         Set orientation -> fewer calls to database
                         E.g. tune program that computes total salary for each department
                          using a separate SQL query by instead using a single query that
                          computes total salaries for all department at once (using group
                          by)
                q   Use stored procedures: avoids re-parsing and re-optimization
                    of query

                                                                                              15
Database System Concepts, 5 th Ed.                    23.15               ©Silberschatz, Korth and Sudarshan
Tuning of Transactions (Cont.)
             s Reducing lock contention
             s Long transactions (typically read-only) that examine large parts of a
                  relation result in lock contention with update transactions
                    q   E.g. large query to compute bank statistics and regular bank
                        transactions
             s To reduce contention
                    q   Use multi-version concurrency control
                             E.g. Oracle “snapshots” which support multi-version 2PL
                    q   Use degree-two consistency (cursor-stability) for long transactions
                             Drawback: result may be approximate




                                                                                               16
Database System Concepts, 5 th Ed.                    23.16                ©Silberschatz, Korth and Sudarshan
Tuning of Transactions (Cont.)
         s Long update transactions cause several problems
                q   Exhaust lock space
                q   Exhaust log space
                         and also greatly increase recovery time after a crash, and may
                          even exhaust log space during recovery if recovery algorithm is
                          badly designed!
         s Use mini-batch transactions to limit number of updates that a single
              transaction can carry out. E.g., if a single large transaction updates every
              record of a very large relation, log may grow too big.
                * Split large transaction into batch of ``mini-transactions,'' each
                  performing part of the updates
                •   Hold locks across transactions in a mini-batch to ensure serializability
                      •   If lock table size is a problem can release locks, but at the cost of
                          serializability
                * In case of failure during a mini-batch, must complete its
                   remaining portion on recovery, to ensure atomicity.


                                                                                                  17
Database System Concepts, 5 th Ed.                     23.17                  ©Silberschatz, Korth and Sudarshan
Performance Simulation
             s Performance simulation using queuing model useful to predict
                  bottlenecks as well as the effects of tuning changes, even without
                  access to real system
             s Queuing model as we saw earlier
                    q   Models activities that go on in parallel
             s Simulation model is quite detailed, but usually omits some low level
                  details
                    q   Model service time, but disregard details of service
                    q   E.g. approximate disk read time by using an average disk read
                        time
             s Experiments can be run on model, and provide an estimate of
                  measures such as average throughput/response time
             s Parameters can be tuned in model and then replicated in real system
                    q   E.g. number of disks, memory, algorithms, etc



                                                                                             18
Database System Concepts, 5 th Ed.                    23.18              ©Silberschatz, Korth and Sudarshan
Performance Benchmarks
             s Suites of tasks used to quantify the performance of software systems
             s Important in comparing database systems, especially as systems
                  become more standards compliant.
             s Commonly used performance measures:
                    q   Throughput (transactions per second, or tps)
                    q   Response time (delay from submission of transaction to return
                        of result)
                    q   Availability or mean time to failure




                                                                                           19
Database System Concepts, 5 th Ed.                  23.19              ©Silberschatz, Korth and Sudarshan
Performance Benchmarks (Cont.)
       s Suites of tasks used to characterize performance
             q    single task not enough for complex systems
       s Beware when computing average throughput of different transaction types
             q    E.g., suppose a system runs transaction type A at 99 tps and transaction
                  type B at 1 tps.
             q    Given an equal mixture of types A and B, throughput is not (99+1)/2 =
                  50 tps.
             q    Running one transaction of each type takes time 1+.01 seconds, giving a
                  throughput of 1.98 tps.
             q    To compute average throughput, use harmonic mean:
                                                n

             q    Interference (e.g. lock contention) + 1/tn even this incorrect if
                                          1/t1 + 1/t2 + … makes
                  different transaction types run concurrently


                                                                                             20
Database System Concepts, 5 th Ed.                  23.20                ©Silberschatz, Korth and Sudarshan
Database Application Classes
             s Online transaction processing (OLTP)
                    q   requires high concurrency and clever techniques to speed up
                        commit processing, to support a high rate of update transactions.
             s Decision support applications
                    q   including online analytical processing, or OLAP applications
                    q   require good query evaluation algorithms and query optimization.
             s Architecture of some database systems tuned to one of the two
                  classes
                    q   E.g. Teradata is tuned to decision support
             s Others try to balance the two requirements
                    q   E.g. Oracle, with snapshot support for long read-only transaction




                                                                                              21
Database System Concepts, 5 th Ed.                  23.21                 ©Silberschatz, Korth and Sudarshan
Benchmarks Suites
             s The Transaction Processing Council (TPC) benchmark suites are
                  widely used.
                    q   TPC-A and TPC-B: simple OLTP application modeling a bank
                        teller application with and without communication
                             Not used anymore
                    q   TPC-C: complex OLTP application modeling an inventory system
                             Current standard for OLTP benchmarking




                                                                                           22
Database System Concepts, 5 th Ed.                  23.22              ©Silberschatz, Korth and Sudarshan
Benchmarks Suites (Cont.)
             s TPC benchmarks (cont.)
                    q   TPC-D: complex decision support application
                             Superceded by TPC-H and TPC-R
                    q   TPC-H: (H for ad hoc) based on TPC-D with some extra queries
                             Models ad hoc queries which are not known beforehand
                               – Total of 22 queries with emphasis on aggregation
                             prohibits materialized views
                             permits indices only on primary and foreign keys
                    q   TPC-R: (R for reporting) same as TPC-H, but without any
                        restrictions on materialized views and indices
                    q   TPC-W: (W for Web) End-to-end Web service benchmark
                        modeling a Web bookstore, with combination of static and
                        dynamically generated pages



                                                                                                23
Database System Concepts, 5 th Ed.                     23.23                ©Silberschatz, Korth and Sudarshan
TPC Performance Measures
             s TPC performance measures
                    q   transactions-per-second with specified constraints on
                        response time
                    q   transactions-per-second-per-dollar accounts for cost of
                        owning system
             s TPC benchmark requires database sizes to be scaled up with
                  increasing transactions-per-second
                    q   reflects real world applications where more customers means
                        more database size and more transactions-per-second
             s External audit of TPC performance numbers mandatory
                    q   TPC performance claims can be trusted




                                                                                            24
Database System Concepts, 5 th Ed.                 23.24                ©Silberschatz, Korth and Sudarshan
TPC Performance Measures
             s Two types of tests for TPC-H and TPC-R
                    q   Power test: runs queries and updates sequentially, then takes
                        mean to find queries per hour
                    q   Throughput test: runs queries and updates concurrently
                             multiple streams running in parallel each generates queries,
                              with one parallel update stream
                    q   Composite query per hour metric: square root of product of
                        power and throughput metrics
                    q   Composite price/performance metric




                                                                                                 25
Database System Concepts, 5 th Ed.                     23.25                 ©Silberschatz, Korth and Sudarshan
Other Benchmarks
             s OODB transactions require a different set of benchmarks.
                    q   OO7 benchmark has several different operations, and provides a
                        separate benchmark number for each kind of operation
                    q   Reason: hard to define what is a typical OODB application
             s Benchmarks for XML being discussed




                                                                                             26
Database System Concepts, 5 th Ed.                 23.26                 ©Silberschatz, Korth and Sudarshan
Standardization
             s The complexity of contemporary database systems and the need for
                  their interoperation require a variety of standards.
                    q   syntax and semantics of programming languages
                    q   functions in application program interfaces
                    q   data models (e.g. object oriented/object relational databases)
             s Formal standards are standards developed by a standards
                  organization (ANSI, ISO), or by industry groups, through a public
                  process.
             s De facto standards are generally accepted as standards without
                  any formal process of recognition
                    q    Standards defined by dominant vendors (IBM, Microsoft) often
                        become de facto standards
                    q   De facto standards often go through a formal process of
                        recognition and become formal standards


                                                                                               27
Database System Concepts, 5 th Ed.                  23.27                  ©Silberschatz, Korth and Sudarshan
Standardization (Cont.)
             s Anticipatory standards lead the market place, defining features
                  that vendors then implement
                    q    Ensure compatibility of future products
                    q   But at times become very large and unwieldy since standards
                        bodies may not pay enough attention to ease of implementation
                        (e.g.,SQL-92 or SQL:1999)
             s Reactionary standards attempt to standardize features that
                  vendors have already implemented, possibly in different ways.
                    q   Can be hard to convince vendors to change already implemented
                        features. E.g. OODB systems




                                                                                            28
Database System Concepts, 5 th Ed.                   23.28              ©Silberschatz, Korth and Sudarshan
SQL Standards History
             s SQL developed by IBM in late 70s/early 80s
             s SQL-86 first formal standard
             s IBM SAA standard for SQL in 1987
             s SQL-89 added features to SQL-86 that were already implemented in
                  many systems
                    q   Was a reactionary standard
             s SQL-92 added many new features to SQL-89 (anticipatory standard)
                    q   Defines levels of compliance (entry, intermediate and full)
                    q   Even now few database vendors have full SQL-92 implementation




                                                                                               29
Database System Concepts, 5 th Ed.                   23.29                 ©Silberschatz, Korth and Sudarshan
SQL Standards History (Cont.)
             s SQL:1999
                    q   Adds variety of new features --- extended data types, object
                        orientation, procedures, triggers, etc.
                    q   Broken into several parts
                             SQL/Framework (Part 1): overview
                             SQL/Foundation (Part 2): types, schemas, tables,
                              query/update statements, security, etc
                             SQL/CLI (Call Level Interface) (Part 3): API interface
                             SQL/PSM (Persistent Stored Modules) (Part 4): procedural
                              extensions
                             SQL/Bindings (Part 5): embedded SQL for different embedding
                              languages




                                                                                                 30
Database System Concepts, 5 th Ed.                     23.30                 ©Silberschatz, Korth and Sudarshan
SQL Standards History (Cont.)
             s More parts undergoing standardization process
                    q   Part 7: SQL/Temporal: temporal data
                    q   Part 9: SQL/MED (Management of External Data)
                             Interfacing of database to external data sources
                               – Allows other databases, even files, can be viewed as part of
                                 the database
                    q   Part 10 SQL/OLB (Object Language Bindings): embedding SQL
                        in Java
                    q   Missing part numbers 6 and 8 cover features that are not near
                        standardization yet




                                                                                                 31
Database System Concepts, 5 th Ed.                     23.31                 ©Silberschatz, Korth and Sudarshan
Database Connectivity Standards
         s Open DataBase Connectivity (ODBC) standard for database
              interconnectivity
                q    based on Call Level Interface (CLI) developed by X/Open consortium
                q   defines application programming interface, and SQL features that
                    must be supported at different levels of compliance
         s JDBC standard used for Java
         s X/Open XA standards define transaction management standards for
              supporting distributed 2-phase commit
         s OLE-DB: API like ODBC, but intended to support non-database sources
              of data such as flat files
                q   OLE-DB program can negotiate with data source to find what features
                    are supported
                q   Interface language may be a subset of SQL
         s ADO (Active Data Objects): easy-to-use interface to OLE-DB
              functionality


                                                                                           32
Database System Concepts, 5 th Ed.                23.32                ©Silberschatz, Korth and Sudarshan
Object Oriented Databases
                                    Standards
             s Object Database Management Group (ODMG) standard for
                  object-oriented databases
                    q   version 1 in 1993 and version 2 in 1997, version 3 in 2000
                    q   provides language independent Object Definition Language (ODL)
                        as well as several language specific bindings
             s Object Management Group (OMG) standard for distributed
                  software based on objects
                    q   Object Request Broker (ORB) provides transparent message
                        dispatch to distributed objects
                    q   Interface Definition Language (IDL) for defining language-
                        independent data types
                    q   Common Object Request Broker Architecture (CORBA)
                        defines specifications of ORB and IDL




                                                                                              33
Database System Concepts, 5 th Ed.                  23.33                 ©Silberschatz, Korth and Sudarshan
XML-Based Standards
             s Several XML based Standards for E-commerce
                    q   E.g. RosettaNet (supply chain), BizTalk
                    q   Define catalogs, service descriptions, invoices, purchase orders,
                        etc.
                    q   XML wrappers are used to export information from relational
                        databases to XML
             s Simple Object Access Protocol (SOAP): XML based remote
                  procedure call standard
                    q   Uses XML to encode data, HTTP as transport protocol
                    q   Standards based on SOAP for specific applications
                             E.g. OLAP and Data Mining standards from Microsoft




                                                                                               34
Database System Concepts, 5 th Ed.                   23.34                 ©Silberschatz, Korth and Sudarshan
E-Commerce
             s E-commerce is the process of carrying out various activities related to
                  commerce through electronic means
             s Activities include:
                    q   Presale activities: catalogs, advertisements, etc
                    q   Sale process: negotiations on price/quality of service
                    q   Marketplace: e.g. stock exchange, auctions, reverse auctions
                    q   Payment for sale
                    q   Delivery related activities: electronic shipping, or electronic
                        tracking of order processing/shipping
                    q   Customer support and post-sale service




                                                                                                 35
Database System Concepts, 5 th Ed.                    23.35                  ©Silberschatz, Korth and Sudarshan
E-Catalogs
             s Product catalogs must provide searching and browsing facilities
                    q   Organize products into intuitive hierarchy
                    q   Keyword search
                    q   Help customer with comparison of products
             s Customization of catalog
                    q   Negotiated pricing for specific organizations
                    q   Special discounts for customers based on past history
                             E.g. loyalty discount
                    q   Legal restrictions on sales
                             Certain items not exposed to under-age customers
             s Customization requires extensive customer-specific information




                                                                                              36
Database System Concepts, 5 th Ed.                    23.36               ©Silberschatz, Korth and Sudarshan
Marketplaces
         s Marketplaces help in negotiating the price of a product when there are
              multiple sellers and buyers
         s Several types of marketplaces
                q   Reverse auction
                q   Auction
                q   Exchange
         s Real world marketplaces can be quite complicated due to product
              differentiation
         s Database issues:
                q   Authenticate bidders
                q   Record buy/sell bids securely
                q   Communicate bids quickly to participants
                         Delays can lead to financial loss to some participants
                q   Need to handle very large volumes of trade at times
                         E.g. at the end of an auction

                                                                                                37
Database System Concepts, 5 th Ed.                    23.37                 ©Silberschatz, Korth and Sudarshan
Types of Marketplace
             s Reverse auction system: single buyer, multiple sellers.
                    q   Buyer states requirements, sellers bid for supplying items. Lowest
                        bidder wins. (also known as tender system)
                    q   Open bidding vs. closed bidding
             s Auction: Multiple buyers, single seller
                    q   Simplest case: only one instance of each item is being sold
                    q   Highest bidder for an item wins
                    q   More complicated with multiple copies, and buyers bid for specific
                        number of copies
             s Exchange: multiple buyers, multiple sellers
                    q   E.g., stock exchange
                    q   Buyers specify maximum price, sellers specify minimum price
                    q   exchange matches buy and sell bids, deciding on price for the
                        trade
                             e.g. average of buy/sell bids

                                                                                              38
Database System Concepts, 5 th Ed.                     23.38              ©Silberschatz, Korth and Sudarshan
Order Settlement
             s Order settlement: payment for goods and delivery
             s Insecure means for electronic payment: send credit card number
                    q   Buyers may present some one else’s credit card numbers
                    q   Seller has to be trusted to bill only for agreed-on item
                    q   Seller has to be trusted not to pass on the credit card number to
                        unauthorized people
             s Need secure payment systems
                    q   Avoid above-mentioned problems
                    q   Provide greater degree of privacy
                             E.g. not reveal buyers identity to seller
                    q   Ensure that anyone monitoring the electronic transmissions cannot
                        access critical information




                                                                                                 39
Database System Concepts, 5 th Ed.                      23.39                ©Silberschatz, Korth and Sudarshan
Secure Payment Systems
         s All information must be encrypted to prevent eavesdropping
                q   Public/private key encryption widely used
         s Must prevent person-in-the-middle attacks
                q   E.g. someone impersonates seller or bank/credit card company and
                    fools buyer into revealing information
                         Encrypting messages alone doesn’t solve this problem
                         More on this in next slide
         s Three-way communication between seller, buyer and credit-card company
              to make payment
                q   Credit card company credits amount to seller
                q   Credit card company consolidates all payments from a buyer and
                    collects them together
                         E.g. via buyer’s bank through physical/electronic
                          check payment

                                                                                                  40
Database System Concepts, 5 th Ed.                     23.40                  ©Silberschatz, Korth and Sudarshan
Secure Payment Systems (Cont.)
             s Digital certificates are used to prevent impersonation/man-in-the
                  middle attack
                    q   Certification agency creates digital certificate by encrypting, e.g.,
                        seller’s public key using its own private key
                             Verifies sellers identity by external means first!
                    q   Seller sends certificate to buyer
                    q   Customer uses public key of certification agency to decrypt
                        certificate and find sellers public key
                             Man-in-the-middle cannot send fake public key
                    q   Sellers public key used for setting up secure communication
             s Several secure payment protocols
                    q   E.g. Secure Electronic Transaction (SET)




                                                                                                       41
Database System Concepts, 5 th Ed.                      23.41                      ©Silberschatz, Korth and Sudarshan
Digital Cash
         s Credit-card payment does not provide anonymity
                q   The SET protocol hides buyers identity from seller
                q   But even with SET, buyer can be traced with help of credit card
                    company
         s Digital cash systems provide anonymity similar to that provided by
              physical cash
                q   E.g. DigiCash
                q   Based on encryption techniques that make it impossible to find out
                    who purchased digital cash from the bank
                q   Digital cash can be spent by purchaser in parts
                         much like writing a check on an account whose owner is
                          anonymous




                                                                                             42
Database System Concepts, 5 th Ed.                  23.42                ©Silberschatz, Korth and Sudarshan
Legacy Systems
         s Legacy systems are older-generation systems that are incompatible with
              current generation standards and systems but still in production use
                q   E.g. applications written in Cobol that run on mainframes
                         Today’s hot new system is tomorrows legacy system!
         s Porting legacy system applications to a more modern environment is
              problematic
                q   Very expensive, since legacy system may involve millions of lines of
                    code, written over decades
                         Original programmers usually no longer available
                q   Switching over from old system to new system is a problem
                         more on this later
         s One approach: build a wrapper layer on top of legacy application to allow
              interoperation between newer systems and legacy application
                q   E.g. use ODBC or OLE-DB as wrapper



                                                                                                 43
Database System Concepts, 5 th Ed.                  23.43                    ©Silberschatz, Korth and Sudarshan
Legacy Systems (Cont.)
             s Rewriting legacy application requires a first phase of understanding
                  what it does
                    q   Often legacy code has no documentation or outdated
                        documentation
                    q   reverse engineering: process of going over legacy code to
                             Come up with schema designs in ER or OO model
                             Find out what procedures and processes are implemented, to
                              get a high level view of system
             s Re-engineering: reverse engineering followed by design of new
                  system
                    q   Improvements are made on existing system design in this process




                                                                                              44
Database System Concepts, 5 th Ed.                   23.44                ©Silberschatz, Korth and Sudarshan
Legacy Systems (Cont.)
             s     Switching over from old to new system is a major problem
                    q    Production systems are in every day, generating new data
                    q    Stopping the system may bring all of a company’s activities to a
                         halt, causing enormous losses
             s     Big-bang approach:
                    1.   Implement complete new system
                    2.   Populate it with data from old system
                               No transactions while this step is executed
                               scripts are created to do this quickly
                    5    Shut down old system and start using new system
                    q    Danger with this approach: what if new code has bugs or
                         performance problems, or missing features
                              Company may be brought to a halt


                                                                                                 45
Database System Concepts, 5 th Ed.                      23.45                ©Silberschatz, Korth and Sudarshan
Legacy Systems (Cont.)
         s Chicken-little approach:
                q   Replace legacy system one piece at a time
                q   Use wrappers to interoperate between legacy and new code
                         E.g. replace front end first, with wrappers on legacy backend
                           – Old front end can continue working in this phase in case of
                             problems with new front end
                         Replace back end, one functional unit at a time
                           – All parts that share a database may have to be replaced
                             together, or wrapper is needed on database also
                q   Drawback: significant extra development effort to build wrappers and
                    ensure smooth interoperation
                         Still worth it if company’s life depends on system




                                                                                                   46
Database System Concepts, 5 th Ed.                    23.46                    ©Silberschatz, Korth and Sudarshan
End of Chapter




                                Database System Concepts
                                ©Silberschatz, Korth and Sudarshan
                           See www.db-book.com for conditions on re-use                       47
Database System Concepts                                                  ©Silberschatz, Korth and Sudarshan

More Related Content

What's hot

Comparison of-foss-distributed-storage
Comparison of-foss-distributed-storageComparison of-foss-distributed-storage
Comparison of-foss-distributed-storageMarian Marinov
 
12.mass stroage system
12.mass stroage system12.mass stroage system
12.mass stroage systemSenthil Kanth
 
Memory Bandwidth QoS
Memory Bandwidth QoSMemory Bandwidth QoS
Memory Bandwidth QoSRohit Jnagal
 
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0sprdd
 
Userspace Linux I/O
Userspace Linux I/O Userspace Linux I/O
Userspace Linux I/O Garima Kapoor
 
DOXLON November 2016: Facebook Engineering on cgroupv2
DOXLON November 2016: Facebook Engineering on cgroupv2DOXLON November 2016: Facebook Engineering on cgroupv2
DOXLON November 2016: Facebook Engineering on cgroupv2Outlyer
 
High Availability in 37 Easy Steps
High Availability in 37 Easy StepsHigh Availability in 37 Easy Steps
High Availability in 37 Easy StepsTim Serong
 
Protecting Real-Time GPU Kernels in Integrated CPU-GPU SoC Platforms
Protecting Real-Time GPU Kernels in Integrated CPU-GPU SoC PlatformsProtecting Real-Time GPU Kernels in Integrated CPU-GPU SoC Platforms
Protecting Real-Time GPU Kernels in Integrated CPU-GPU SoC PlatformsHeechul Yun
 
brief introduction of drbd in SLE12SP2
brief introduction of drbd in SLE12SP2brief introduction of drbd in SLE12SP2
brief introduction of drbd in SLE12SP2Nick Wang
 
Storage Management using LVM
Storage Management using LVMStorage Management using LVM
Storage Management using LVMPriyank Kapadia
 
High Availability Storage (susecon2016)
High Availability Storage (susecon2016)High Availability Storage (susecon2016)
High Availability Storage (susecon2016)Roger Zhou 周志强
 
イマドキなNetwork/IO
イマドキなNetwork/IOイマドキなNetwork/IO
イマドキなNetwork/IOTakuya ASADA
 
Improvements in GlusterFS for Virtualization usecase
Improvements in GlusterFS for Virtualization usecaseImprovements in GlusterFS for Virtualization usecase
Improvements in GlusterFS for Virtualization usecaseDeepak Shetty
 
Inspection and maintenance tools (Linux / OpenStack)
Inspection and maintenance tools (Linux / OpenStack)Inspection and maintenance tools (Linux / OpenStack)
Inspection and maintenance tools (Linux / OpenStack)Gerard Braad
 
Practice and challenges from building IaaS
Practice and challenges from building IaaSPractice and challenges from building IaaS
Practice and challenges from building IaaSShawn Zhu
 

What's hot (20)

Comparison of-foss-distributed-storage
Comparison of-foss-distributed-storageComparison of-foss-distributed-storage
Comparison of-foss-distributed-storage
 
12.mass stroage system
12.mass stroage system12.mass stroage system
12.mass stroage system
 
Ch17
Ch17Ch17
Ch17
 
Cat @ scale
Cat @ scaleCat @ scale
Cat @ scale
 
Memory Bandwidth QoS
Memory Bandwidth QoSMemory Bandwidth QoS
Memory Bandwidth QoS
 
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
Summit2014 riel chegu_w_0340_automatic_numa_balancing_0
 
Userspace Linux I/O
Userspace Linux I/O Userspace Linux I/O
Userspace Linux I/O
 
DOXLON November 2016: Facebook Engineering on cgroupv2
DOXLON November 2016: Facebook Engineering on cgroupv2DOXLON November 2016: Facebook Engineering on cgroupv2
DOXLON November 2016: Facebook Engineering on cgroupv2
 
High Availability in 37 Easy Steps
High Availability in 37 Easy StepsHigh Availability in 37 Easy Steps
High Availability in 37 Easy Steps
 
Protecting Real-Time GPU Kernels in Integrated CPU-GPU SoC Platforms
Protecting Real-Time GPU Kernels in Integrated CPU-GPU SoC PlatformsProtecting Real-Time GPU Kernels in Integrated CPU-GPU SoC Platforms
Protecting Real-Time GPU Kernels in Integrated CPU-GPU SoC Platforms
 
First steps on CentOs7
First steps on CentOs7First steps on CentOs7
First steps on CentOs7
 
Drbd
DrbdDrbd
Drbd
 
brief introduction of drbd in SLE12SP2
brief introduction of drbd in SLE12SP2brief introduction of drbd in SLE12SP2
brief introduction of drbd in SLE12SP2
 
Storage Management using LVM
Storage Management using LVMStorage Management using LVM
Storage Management using LVM
 
High Availability Storage (susecon2016)
High Availability Storage (susecon2016)High Availability Storage (susecon2016)
High Availability Storage (susecon2016)
 
イマドキなNetwork/IO
イマドキなNetwork/IOイマドキなNetwork/IO
イマドキなNetwork/IO
 
Chap 17 advfs
Chap 17 advfsChap 17 advfs
Chap 17 advfs
 
Improvements in GlusterFS for Virtualization usecase
Improvements in GlusterFS for Virtualization usecaseImprovements in GlusterFS for Virtualization usecase
Improvements in GlusterFS for Virtualization usecase
 
Inspection and maintenance tools (Linux / OpenStack)
Inspection and maintenance tools (Linux / OpenStack)Inspection and maintenance tools (Linux / OpenStack)
Inspection and maintenance tools (Linux / OpenStack)
 
Practice and challenges from building IaaS
Practice and challenges from building IaaSPractice and challenges from building IaaS
Practice and challenges from building IaaS
 

Similar to Ch23

Ceph Day Amsterdam 2015: Measuring and predicting performance of Ceph clusters
Ceph Day Amsterdam 2015: Measuring and predicting performance of Ceph clusters Ceph Day Amsterdam 2015: Measuring and predicting performance of Ceph clusters
Ceph Day Amsterdam 2015: Measuring and predicting performance of Ceph clusters Ceph Community
 
CPN302 your-linux-ami-optimization-and-performance
CPN302 your-linux-ami-optimization-and-performanceCPN302 your-linux-ami-optimization-and-performance
CPN302 your-linux-ami-optimization-and-performanceCoburn Watson
 
Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013
Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013
Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013Amazon Web Services
 
Realizing Exabyte-scale PM Centric Architectures and Memory Fabrics
Realizing Exabyte-scale PM Centric Architectures and Memory FabricsRealizing Exabyte-scale PM Centric Architectures and Memory Fabrics
Realizing Exabyte-scale PM Centric Architectures and Memory Fabricsinside-BigData.com
 
Optimizing your Infrastrucure and Operating System for Hadoop
Optimizing your Infrastrucure and Operating System for HadoopOptimizing your Infrastrucure and Operating System for Hadoop
Optimizing your Infrastrucure and Operating System for HadoopDataWorks Summit
 
Mass storagestructure pre-final-formatting
Mass storagestructure pre-final-formattingMass storagestructure pre-final-formatting
Mass storagestructure pre-final-formattingmarangburu42
 
Q2.12: Existing Linux Mechanisms to Support big.LITTLE
Q2.12: Existing Linux Mechanisms to Support big.LITTLEQ2.12: Existing Linux Mechanisms to Support big.LITTLE
Q2.12: Existing Linux Mechanisms to Support big.LITTLELinaro
 
1 introduction
1 introduction1 introduction
1 introductionMohd Arif
 
Performance Whack-a-Mole Tutorial (pgCon 2009)
Performance Whack-a-Mole Tutorial (pgCon 2009) Performance Whack-a-Mole Tutorial (pgCon 2009)
Performance Whack-a-Mole Tutorial (pgCon 2009) PostgreSQL Experts, Inc.
 
제2회난공불락 오픈소스 세미나 커널튜닝
제2회난공불락 오픈소스 세미나 커널튜닝제2회난공불락 오픈소스 세미나 커널튜닝
제2회난공불락 오픈소스 세미나 커널튜닝Tommy Lee
 
Designing Information Structures For Performance And Reliability
Designing Information Structures For Performance And ReliabilityDesigning Information Structures For Performance And Reliability
Designing Information Structures For Performance And Reliabilitybryanrandol
 
Gluster for Geeks: Performance Tuning Tips & Tricks
Gluster for Geeks: Performance Tuning Tips & TricksGluster for Geeks: Performance Tuning Tips & Tricks
Gluster for Geeks: Performance Tuning Tips & TricksGlusterFS
 

Similar to Ch23 (20)

Ch20
Ch20Ch20
Ch20
 
Ceph Day Amsterdam 2015: Measuring and predicting performance of Ceph clusters
Ceph Day Amsterdam 2015: Measuring and predicting performance of Ceph clusters Ceph Day Amsterdam 2015: Measuring and predicting performance of Ceph clusters
Ceph Day Amsterdam 2015: Measuring and predicting performance of Ceph clusters
 
Performance Whackamole (short version)
Performance Whackamole (short version)Performance Whackamole (short version)
Performance Whackamole (short version)
 
CPN302 your-linux-ami-optimization-and-performance
CPN302 your-linux-ami-optimization-and-performanceCPN302 your-linux-ami-optimization-and-performance
CPN302 your-linux-ami-optimization-and-performance
 
Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013
Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013
Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013
 
Realizing Exabyte-scale PM Centric Architectures and Memory Fabrics
Realizing Exabyte-scale PM Centric Architectures and Memory FabricsRealizing Exabyte-scale PM Centric Architectures and Memory Fabrics
Realizing Exabyte-scale PM Centric Architectures and Memory Fabrics
 
Optimizing your Infrastrucure and Operating System for Hadoop
Optimizing your Infrastrucure and Operating System for HadoopOptimizing your Infrastrucure and Operating System for Hadoop
Optimizing your Infrastrucure and Operating System for Hadoop
 
Chap2 slides
Chap2 slidesChap2 slides
Chap2 slides
 
Mass storagestructure pre-final-formatting
Mass storagestructure pre-final-formattingMass storagestructure pre-final-formatting
Mass storagestructure pre-final-formatting
 
Q2.12: Existing Linux Mechanisms to Support big.LITTLE
Q2.12: Existing Linux Mechanisms to Support big.LITTLEQ2.12: Existing Linux Mechanisms to Support big.LITTLE
Q2.12: Existing Linux Mechanisms to Support big.LITTLE
 
Chapter03
Chapter03Chapter03
Chapter03
 
1 introduction
1 introduction1 introduction
1 introduction
 
VDI Design Guide
VDI Design GuideVDI Design Guide
VDI Design Guide
 
Performance Whack-a-Mole Tutorial (pgCon 2009)
Performance Whack-a-Mole Tutorial (pgCon 2009) Performance Whack-a-Mole Tutorial (pgCon 2009)
Performance Whack-a-Mole Tutorial (pgCon 2009)
 
Cassandra admin
Cassandra adminCassandra admin
Cassandra admin
 
제2회난공불락 오픈소스 세미나 커널튜닝
제2회난공불락 오픈소스 세미나 커널튜닝제2회난공불락 오픈소스 세미나 커널튜닝
제2회난공불락 오픈소스 세미나 커널튜닝
 
Ch17
Ch17Ch17
Ch17
 
Designing Information Structures For Performance And Reliability
Designing Information Structures For Performance And ReliabilityDesigning Information Structures For Performance And Reliability
Designing Information Structures For Performance And Reliability
 
os
osos
os
 
Gluster for Geeks: Performance Tuning Tips & Tricks
Gluster for Geeks: Performance Tuning Tips & TricksGluster for Geeks: Performance Tuning Tips & Tricks
Gluster for Geeks: Performance Tuning Tips & Tricks
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Ch23

  • 1. Chapter 23: Advanced Application Development s Performance Tuning s Performance Benchmarks s Standardization s E-Commerce s Legacy Systems 1 Database System Concepts, 5 th Ed. 23.1 ©Silberschatz, Korth and Sudarshan
  • 2. Performance Tuning s Adjusting various parameters and design choices to improve system performance for a specific application. s Tuning is best done by 1. identifying bottlenecks, and 2. eliminating them. s Can tune a database system at 3 levels: q Hardware -- e.g., add disks to speed up I/O, add memory to increase buffer hits, move to a faster processor. q Database system parameters -- e.g., set buffer size to avoid paging of buffer, set checkpointing intervals to limit log size. System may have automatic tuning. q Higher level database design, such as the schema, indices and transactions (more later) 2 Database System Concepts, 5 th Ed. 23.2 ©Silberschatz, Korth and Sudarshan
  • 3. Bottlenecks s Performance of most systems (at least before they are tuned) usually limited by performance of one or a few components: these are called bottlenecks q E.g. 80% of the code may take up 20% of time and 20% of code takes up 80% of time  Worth spending most time on 20% of code that take 80% of time s Bottlenecks may be in hardware (e.g. disks are very busy, CPU is idle), or in software s Removing one bottleneck often exposes another s De-bottlenecking consists of repeatedly finding bottlenecks, and removing them q This is a heuristic 3 Database System Concepts, 5 th Ed. 23.3 ©Silberschatz, Korth and Sudarshan
  • 4. Identifying Bottlenecks s Transactions request a sequence of services q e.g. CPU, Disk I/O, locks s With concurrent transactions, transactions may have to wait for a requested service while other transactions are being served s Can model database as a queueing system with a queue for each service q transactions repeatedly do the following  request a service, wait in queue for the service, and get serviced s Bottlenecks in a database system typically show up as very high utilizations (and correspondingly, very long queues) of a particular service q E.g. disk vs CPU utilization q 100% utilization leads to very long waiting time:  Rule of thumb: design system for about 70% utilization at peak load  utilization over 90% should be avoided 4 Database System Concepts, 5 th Ed. 23.4 ©Silberschatz, Korth and Sudarshan
  • 5. Queues In A Database System 5 Database System Concepts, 5 th Ed. 23.5 ©Silberschatz, Korth and Sudarshan
  • 6. Tunable Parameters s Tuning of hardware s Tuning of schema s Tuning of indices s Tuning of materialized views s Tuning of transactions 6 Database System Concepts, 5 th Ed. 23.6 ©Silberschatz, Korth and Sudarshan
  • 7. Tuning of Hardware s Even well-tuned transactions typically require a few I/O operations q Typical disk supports about 100 random I/O operations per second q Suppose each transaction requires just 2 random I/O operations. Then to support n transactions per second, we need to stripe data across n/50 disks (ignoring skew) s Number of I/O operations per transaction can be reduced by keeping more data in memory q If all data is in memory, I/O needed only for writes q Keeping frequently used data in memory reduces disk accesses, reducing number of disks required, but has a memory cost 7 Database System Concepts, 5 th Ed. 23.7 ©Silberschatz, Korth and Sudarshan
  • 8. Hardware Tuning: Five-Minute Rule s Question: which data to keep in memory: q If a page is accessed n times per second, keeping it in memory saves  n* price-per-disk-drive accesses-per-second-per-disk q Cost of keeping page in memory  price-per-MB-of-memory ages-per-MB-of-memory q Break-even point: value of n for which above costs are equal  If accesses are more then saving is greater than cost q Solving above equation with current disk and memory prices leads to: 5-minute rule: if a page that is randomly accessed is used more frequently than once in 5 minutes it should be kept in memory  (by buying sufficient memory!) 8 Database System Concepts, 5 th Ed. 23.8 ©Silberschatz, Korth and Sudarshan
  • 9. Hardware Tuning: One-Minute Rule s For sequentially accessed data, more pages can be read per second. Assuming sequential reads of 1MB of data at a time: 1-minute rule: sequentially accessed data that is accessed once or more in a minute should be kept in memory s Prices of disk and memory have changed greatly over the years, but the ratios have not changed much q so rules remain as 5 minute and 1 minute rules, not 1 hour or 1 second rules! 9 Database System Concepts, 5 th Ed. 23.9 ©Silberschatz, Korth and Sudarshan
  • 10. Hardware Tuning: Choice of RAID Level s To use RAID 1 or RAID 5? q Depends on ratio of reads and writes  RAID 5 requires 2 block reads and 2 block writes to write out one data block s If an application requires r reads and w writes per second q RAID 1 requires r + 2w I/O operations per second q RAID 5 requires: r + 4w I/O operations per second s For reasonably large r and w, this requires lots of disks to handle workload q RAID 5 may require more disks than RAID 1 to handle load! q Apparent saving of number of disks by RAID 5 (by using parity, as opposed to the mirroring done by RAID 1) may be illusory! s Thumb rule: RAID 5 is fine when writes are rare and data is very large, but RAID 1 is preferable otherwise q If you need more disks to handle I/O load, just mirror them since disk capacities these days are enormous! 10 Database System Concepts, 5 th Ed. 23.10 ©Silberschatz, Korth and Sudarshan
  • 11. Tuning the Database Design s Schema tuning q Vertically partition relations to isolate the data that is accessed most often -- only fetch needed information. • E.g., split account into two, (account-number, branch-name) and (account-number, balance). • Branch-name need not be fetched unless required q Improve performance by storing a denormalized relation • E.g., store join of account and depositor; branch-name and balance information is repeated for each holder of an account, but join need not be computed repeatedly. • Price paid: more space and more work for programmer to keep relation consistent on updates • better to use materialized views (more on this later..) q Cluster together on the same disk page records that would match in a frequently required join,  compute join very efficiently when required. 11 Database System Concepts, 5 th Ed. 23.11 ©Silberschatz, Korth and Sudarshan
  • 12. Tuning the Database Design (Cont.) s Index tuning q Create appropriate indices to speed up slow queries/updates q Speed up slow updates by removing excess indices (tradeoff between queries and updates) q Choose type of index (B-tree/hash) appropriate for most frequent types of queries. q Choose which index to make clustered s Index tuning wizards look at past history of queries and updates (the workload) and recommend which indices would be best for the workload 12 Database System Concepts, 5 th Ed. 23.12 ©Silberschatz, Korth and Sudarshan
  • 13. Tuning the Database Design (Cont.) Materialized Views s Materialized views can help speed up certain queries q Particularly aggregate queries s Overheads q Space q Time for view maintenance  Immediate view maintenance:done as part of update txn – time overhead paid by update transaction  Deferred view maintenance: done only when required – update transaction is not affected, but system time is spent on view maintenance » until updated, the view may be out-of-date s Preferable to denormalized schema since view maintenance is systems responsibility, not programmers q Avoids inconsistencies caused by errors in update programs 13 Database System Concepts, 5 th Ed. 23.13 ©Silberschatz, Korth and Sudarshan
  • 14. Tuning the Database Design (Cont.) s How to choose set of materialized views q Helping one transaction type by introducing a materialized view may hurt others q Choice of materialized views depends on costs  Users often have no idea of actual cost of operations q Overall, manual selection of materialized views is tedious s Some database systems provide tools to help DBA choose views to materialize q “Materialized view selection wizards” 14 Database System Concepts, 5 th Ed. 23.14 ©Silberschatz, Korth and Sudarshan
  • 15. Tuning of Transactions s Basic approaches to tuning of transactions q Improve set orientation q Reduce lock contention s Rewriting of queries to improve performance was important in the past, but smart optimizers have made this less important s Communication overhead and query handling overheads significant part of cost of each call q Combine multiple embedded SQL/ODBC/JDBC queries into a single set-oriented query  Set orientation -> fewer calls to database  E.g. tune program that computes total salary for each department using a separate SQL query by instead using a single query that computes total salaries for all department at once (using group by) q Use stored procedures: avoids re-parsing and re-optimization of query 15 Database System Concepts, 5 th Ed. 23.15 ©Silberschatz, Korth and Sudarshan
  • 16. Tuning of Transactions (Cont.) s Reducing lock contention s Long transactions (typically read-only) that examine large parts of a relation result in lock contention with update transactions q E.g. large query to compute bank statistics and regular bank transactions s To reduce contention q Use multi-version concurrency control  E.g. Oracle “snapshots” which support multi-version 2PL q Use degree-two consistency (cursor-stability) for long transactions  Drawback: result may be approximate 16 Database System Concepts, 5 th Ed. 23.16 ©Silberschatz, Korth and Sudarshan
  • 17. Tuning of Transactions (Cont.) s Long update transactions cause several problems q Exhaust lock space q Exhaust log space  and also greatly increase recovery time after a crash, and may even exhaust log space during recovery if recovery algorithm is badly designed! s Use mini-batch transactions to limit number of updates that a single transaction can carry out. E.g., if a single large transaction updates every record of a very large relation, log may grow too big. * Split large transaction into batch of ``mini-transactions,'' each performing part of the updates • Hold locks across transactions in a mini-batch to ensure serializability • If lock table size is a problem can release locks, but at the cost of serializability * In case of failure during a mini-batch, must complete its remaining portion on recovery, to ensure atomicity. 17 Database System Concepts, 5 th Ed. 23.17 ©Silberschatz, Korth and Sudarshan
  • 18. Performance Simulation s Performance simulation using queuing model useful to predict bottlenecks as well as the effects of tuning changes, even without access to real system s Queuing model as we saw earlier q Models activities that go on in parallel s Simulation model is quite detailed, but usually omits some low level details q Model service time, but disregard details of service q E.g. approximate disk read time by using an average disk read time s Experiments can be run on model, and provide an estimate of measures such as average throughput/response time s Parameters can be tuned in model and then replicated in real system q E.g. number of disks, memory, algorithms, etc 18 Database System Concepts, 5 th Ed. 23.18 ©Silberschatz, Korth and Sudarshan
  • 19. Performance Benchmarks s Suites of tasks used to quantify the performance of software systems s Important in comparing database systems, especially as systems become more standards compliant. s Commonly used performance measures: q Throughput (transactions per second, or tps) q Response time (delay from submission of transaction to return of result) q Availability or mean time to failure 19 Database System Concepts, 5 th Ed. 23.19 ©Silberschatz, Korth and Sudarshan
  • 20. Performance Benchmarks (Cont.) s Suites of tasks used to characterize performance q single task not enough for complex systems s Beware when computing average throughput of different transaction types q E.g., suppose a system runs transaction type A at 99 tps and transaction type B at 1 tps. q Given an equal mixture of types A and B, throughput is not (99+1)/2 = 50 tps. q Running one transaction of each type takes time 1+.01 seconds, giving a throughput of 1.98 tps. q To compute average throughput, use harmonic mean: n q Interference (e.g. lock contention) + 1/tn even this incorrect if 1/t1 + 1/t2 + … makes different transaction types run concurrently 20 Database System Concepts, 5 th Ed. 23.20 ©Silberschatz, Korth and Sudarshan
  • 21. Database Application Classes s Online transaction processing (OLTP) q requires high concurrency and clever techniques to speed up commit processing, to support a high rate of update transactions. s Decision support applications q including online analytical processing, or OLAP applications q require good query evaluation algorithms and query optimization. s Architecture of some database systems tuned to one of the two classes q E.g. Teradata is tuned to decision support s Others try to balance the two requirements q E.g. Oracle, with snapshot support for long read-only transaction 21 Database System Concepts, 5 th Ed. 23.21 ©Silberschatz, Korth and Sudarshan
  • 22. Benchmarks Suites s The Transaction Processing Council (TPC) benchmark suites are widely used. q TPC-A and TPC-B: simple OLTP application modeling a bank teller application with and without communication  Not used anymore q TPC-C: complex OLTP application modeling an inventory system  Current standard for OLTP benchmarking 22 Database System Concepts, 5 th Ed. 23.22 ©Silberschatz, Korth and Sudarshan
  • 23. Benchmarks Suites (Cont.) s TPC benchmarks (cont.) q TPC-D: complex decision support application  Superceded by TPC-H and TPC-R q TPC-H: (H for ad hoc) based on TPC-D with some extra queries  Models ad hoc queries which are not known beforehand – Total of 22 queries with emphasis on aggregation  prohibits materialized views  permits indices only on primary and foreign keys q TPC-R: (R for reporting) same as TPC-H, but without any restrictions on materialized views and indices q TPC-W: (W for Web) End-to-end Web service benchmark modeling a Web bookstore, with combination of static and dynamically generated pages 23 Database System Concepts, 5 th Ed. 23.23 ©Silberschatz, Korth and Sudarshan
  • 24. TPC Performance Measures s TPC performance measures q transactions-per-second with specified constraints on response time q transactions-per-second-per-dollar accounts for cost of owning system s TPC benchmark requires database sizes to be scaled up with increasing transactions-per-second q reflects real world applications where more customers means more database size and more transactions-per-second s External audit of TPC performance numbers mandatory q TPC performance claims can be trusted 24 Database System Concepts, 5 th Ed. 23.24 ©Silberschatz, Korth and Sudarshan
  • 25. TPC Performance Measures s Two types of tests for TPC-H and TPC-R q Power test: runs queries and updates sequentially, then takes mean to find queries per hour q Throughput test: runs queries and updates concurrently  multiple streams running in parallel each generates queries, with one parallel update stream q Composite query per hour metric: square root of product of power and throughput metrics q Composite price/performance metric 25 Database System Concepts, 5 th Ed. 23.25 ©Silberschatz, Korth and Sudarshan
  • 26. Other Benchmarks s OODB transactions require a different set of benchmarks. q OO7 benchmark has several different operations, and provides a separate benchmark number for each kind of operation q Reason: hard to define what is a typical OODB application s Benchmarks for XML being discussed 26 Database System Concepts, 5 th Ed. 23.26 ©Silberschatz, Korth and Sudarshan
  • 27. Standardization s The complexity of contemporary database systems and the need for their interoperation require a variety of standards. q syntax and semantics of programming languages q functions in application program interfaces q data models (e.g. object oriented/object relational databases) s Formal standards are standards developed by a standards organization (ANSI, ISO), or by industry groups, through a public process. s De facto standards are generally accepted as standards without any formal process of recognition q Standards defined by dominant vendors (IBM, Microsoft) often become de facto standards q De facto standards often go through a formal process of recognition and become formal standards 27 Database System Concepts, 5 th Ed. 23.27 ©Silberschatz, Korth and Sudarshan
  • 28. Standardization (Cont.) s Anticipatory standards lead the market place, defining features that vendors then implement q Ensure compatibility of future products q But at times become very large and unwieldy since standards bodies may not pay enough attention to ease of implementation (e.g.,SQL-92 or SQL:1999) s Reactionary standards attempt to standardize features that vendors have already implemented, possibly in different ways. q Can be hard to convince vendors to change already implemented features. E.g. OODB systems 28 Database System Concepts, 5 th Ed. 23.28 ©Silberschatz, Korth and Sudarshan
  • 29. SQL Standards History s SQL developed by IBM in late 70s/early 80s s SQL-86 first formal standard s IBM SAA standard for SQL in 1987 s SQL-89 added features to SQL-86 that were already implemented in many systems q Was a reactionary standard s SQL-92 added many new features to SQL-89 (anticipatory standard) q Defines levels of compliance (entry, intermediate and full) q Even now few database vendors have full SQL-92 implementation 29 Database System Concepts, 5 th Ed. 23.29 ©Silberschatz, Korth and Sudarshan
  • 30. SQL Standards History (Cont.) s SQL:1999 q Adds variety of new features --- extended data types, object orientation, procedures, triggers, etc. q Broken into several parts  SQL/Framework (Part 1): overview  SQL/Foundation (Part 2): types, schemas, tables, query/update statements, security, etc  SQL/CLI (Call Level Interface) (Part 3): API interface  SQL/PSM (Persistent Stored Modules) (Part 4): procedural extensions  SQL/Bindings (Part 5): embedded SQL for different embedding languages 30 Database System Concepts, 5 th Ed. 23.30 ©Silberschatz, Korth and Sudarshan
  • 31. SQL Standards History (Cont.) s More parts undergoing standardization process q Part 7: SQL/Temporal: temporal data q Part 9: SQL/MED (Management of External Data)  Interfacing of database to external data sources – Allows other databases, even files, can be viewed as part of the database q Part 10 SQL/OLB (Object Language Bindings): embedding SQL in Java q Missing part numbers 6 and 8 cover features that are not near standardization yet 31 Database System Concepts, 5 th Ed. 23.31 ©Silberschatz, Korth and Sudarshan
  • 32. Database Connectivity Standards s Open DataBase Connectivity (ODBC) standard for database interconnectivity q based on Call Level Interface (CLI) developed by X/Open consortium q defines application programming interface, and SQL features that must be supported at different levels of compliance s JDBC standard used for Java s X/Open XA standards define transaction management standards for supporting distributed 2-phase commit s OLE-DB: API like ODBC, but intended to support non-database sources of data such as flat files q OLE-DB program can negotiate with data source to find what features are supported q Interface language may be a subset of SQL s ADO (Active Data Objects): easy-to-use interface to OLE-DB functionality 32 Database System Concepts, 5 th Ed. 23.32 ©Silberschatz, Korth and Sudarshan
  • 33. Object Oriented Databases Standards s Object Database Management Group (ODMG) standard for object-oriented databases q version 1 in 1993 and version 2 in 1997, version 3 in 2000 q provides language independent Object Definition Language (ODL) as well as several language specific bindings s Object Management Group (OMG) standard for distributed software based on objects q Object Request Broker (ORB) provides transparent message dispatch to distributed objects q Interface Definition Language (IDL) for defining language- independent data types q Common Object Request Broker Architecture (CORBA) defines specifications of ORB and IDL 33 Database System Concepts, 5 th Ed. 23.33 ©Silberschatz, Korth and Sudarshan
  • 34. XML-Based Standards s Several XML based Standards for E-commerce q E.g. RosettaNet (supply chain), BizTalk q Define catalogs, service descriptions, invoices, purchase orders, etc. q XML wrappers are used to export information from relational databases to XML s Simple Object Access Protocol (SOAP): XML based remote procedure call standard q Uses XML to encode data, HTTP as transport protocol q Standards based on SOAP for specific applications  E.g. OLAP and Data Mining standards from Microsoft 34 Database System Concepts, 5 th Ed. 23.34 ©Silberschatz, Korth and Sudarshan
  • 35. E-Commerce s E-commerce is the process of carrying out various activities related to commerce through electronic means s Activities include: q Presale activities: catalogs, advertisements, etc q Sale process: negotiations on price/quality of service q Marketplace: e.g. stock exchange, auctions, reverse auctions q Payment for sale q Delivery related activities: electronic shipping, or electronic tracking of order processing/shipping q Customer support and post-sale service 35 Database System Concepts, 5 th Ed. 23.35 ©Silberschatz, Korth and Sudarshan
  • 36. E-Catalogs s Product catalogs must provide searching and browsing facilities q Organize products into intuitive hierarchy q Keyword search q Help customer with comparison of products s Customization of catalog q Negotiated pricing for specific organizations q Special discounts for customers based on past history  E.g. loyalty discount q Legal restrictions on sales  Certain items not exposed to under-age customers s Customization requires extensive customer-specific information 36 Database System Concepts, 5 th Ed. 23.36 ©Silberschatz, Korth and Sudarshan
  • 37. Marketplaces s Marketplaces help in negotiating the price of a product when there are multiple sellers and buyers s Several types of marketplaces q Reverse auction q Auction q Exchange s Real world marketplaces can be quite complicated due to product differentiation s Database issues: q Authenticate bidders q Record buy/sell bids securely q Communicate bids quickly to participants  Delays can lead to financial loss to some participants q Need to handle very large volumes of trade at times  E.g. at the end of an auction 37 Database System Concepts, 5 th Ed. 23.37 ©Silberschatz, Korth and Sudarshan
  • 38. Types of Marketplace s Reverse auction system: single buyer, multiple sellers. q Buyer states requirements, sellers bid for supplying items. Lowest bidder wins. (also known as tender system) q Open bidding vs. closed bidding s Auction: Multiple buyers, single seller q Simplest case: only one instance of each item is being sold q Highest bidder for an item wins q More complicated with multiple copies, and buyers bid for specific number of copies s Exchange: multiple buyers, multiple sellers q E.g., stock exchange q Buyers specify maximum price, sellers specify minimum price q exchange matches buy and sell bids, deciding on price for the trade  e.g. average of buy/sell bids 38 Database System Concepts, 5 th Ed. 23.38 ©Silberschatz, Korth and Sudarshan
  • 39. Order Settlement s Order settlement: payment for goods and delivery s Insecure means for electronic payment: send credit card number q Buyers may present some one else’s credit card numbers q Seller has to be trusted to bill only for agreed-on item q Seller has to be trusted not to pass on the credit card number to unauthorized people s Need secure payment systems q Avoid above-mentioned problems q Provide greater degree of privacy  E.g. not reveal buyers identity to seller q Ensure that anyone monitoring the electronic transmissions cannot access critical information 39 Database System Concepts, 5 th Ed. 23.39 ©Silberschatz, Korth and Sudarshan
  • 40. Secure Payment Systems s All information must be encrypted to prevent eavesdropping q Public/private key encryption widely used s Must prevent person-in-the-middle attacks q E.g. someone impersonates seller or bank/credit card company and fools buyer into revealing information  Encrypting messages alone doesn’t solve this problem  More on this in next slide s Three-way communication between seller, buyer and credit-card company to make payment q Credit card company credits amount to seller q Credit card company consolidates all payments from a buyer and collects them together  E.g. via buyer’s bank through physical/electronic check payment 40 Database System Concepts, 5 th Ed. 23.40 ©Silberschatz, Korth and Sudarshan
  • 41. Secure Payment Systems (Cont.) s Digital certificates are used to prevent impersonation/man-in-the middle attack q Certification agency creates digital certificate by encrypting, e.g., seller’s public key using its own private key  Verifies sellers identity by external means first! q Seller sends certificate to buyer q Customer uses public key of certification agency to decrypt certificate and find sellers public key  Man-in-the-middle cannot send fake public key q Sellers public key used for setting up secure communication s Several secure payment protocols q E.g. Secure Electronic Transaction (SET) 41 Database System Concepts, 5 th Ed. 23.41 ©Silberschatz, Korth and Sudarshan
  • 42. Digital Cash s Credit-card payment does not provide anonymity q The SET protocol hides buyers identity from seller q But even with SET, buyer can be traced with help of credit card company s Digital cash systems provide anonymity similar to that provided by physical cash q E.g. DigiCash q Based on encryption techniques that make it impossible to find out who purchased digital cash from the bank q Digital cash can be spent by purchaser in parts  much like writing a check on an account whose owner is anonymous 42 Database System Concepts, 5 th Ed. 23.42 ©Silberschatz, Korth and Sudarshan
  • 43. Legacy Systems s Legacy systems are older-generation systems that are incompatible with current generation standards and systems but still in production use q E.g. applications written in Cobol that run on mainframes  Today’s hot new system is tomorrows legacy system! s Porting legacy system applications to a more modern environment is problematic q Very expensive, since legacy system may involve millions of lines of code, written over decades  Original programmers usually no longer available q Switching over from old system to new system is a problem  more on this later s One approach: build a wrapper layer on top of legacy application to allow interoperation between newer systems and legacy application q E.g. use ODBC or OLE-DB as wrapper 43 Database System Concepts, 5 th Ed. 23.43 ©Silberschatz, Korth and Sudarshan
  • 44. Legacy Systems (Cont.) s Rewriting legacy application requires a first phase of understanding what it does q Often legacy code has no documentation or outdated documentation q reverse engineering: process of going over legacy code to  Come up with schema designs in ER or OO model  Find out what procedures and processes are implemented, to get a high level view of system s Re-engineering: reverse engineering followed by design of new system q Improvements are made on existing system design in this process 44 Database System Concepts, 5 th Ed. 23.44 ©Silberschatz, Korth and Sudarshan
  • 45. Legacy Systems (Cont.) s Switching over from old to new system is a major problem q Production systems are in every day, generating new data q Stopping the system may bring all of a company’s activities to a halt, causing enormous losses s Big-bang approach: 1. Implement complete new system 2. Populate it with data from old system No transactions while this step is executed scripts are created to do this quickly 5 Shut down old system and start using new system q Danger with this approach: what if new code has bugs or performance problems, or missing features  Company may be brought to a halt 45 Database System Concepts, 5 th Ed. 23.45 ©Silberschatz, Korth and Sudarshan
  • 46. Legacy Systems (Cont.) s Chicken-little approach: q Replace legacy system one piece at a time q Use wrappers to interoperate between legacy and new code  E.g. replace front end first, with wrappers on legacy backend – Old front end can continue working in this phase in case of problems with new front end  Replace back end, one functional unit at a time – All parts that share a database may have to be replaced together, or wrapper is needed on database also q Drawback: significant extra development effort to build wrappers and ensure smooth interoperation  Still worth it if company’s life depends on system 46 Database System Concepts, 5 th Ed. 23.46 ©Silberschatz, Korth and Sudarshan
  • 47. End of Chapter Database System Concepts ©Silberschatz, Korth and Sudarshan See www.db-book.com for conditions on re-use 47 Database System Concepts ©Silberschatz, Korth and Sudarshan