SlideShare a Scribd company logo
1 of 36
1
© Prentice Hall, 2002
Chapter 12:Chapter 12:
Data and DatabaseData and Database
AdministrationAdministration
Modern Database Management
6th
Edition
Jeffrey A. Hoffer, Mary B. Prescott, Fred R.
McFadden
2Chapter 12
© Prentice Hall, 2002
DefinitionsDefinitions
 Data Administration: A high-level function that is
responsible for the overall management of data
resources in an organization, including
maintaining corporate-wide definitions and
standards
 Database Administration: A technical function
that is responsible for physical database design
and for dealing with technical issues such as
security enforcement, database performance, and
backup and recovery
3Chapter 12
© Prentice Hall, 2002
Data Administration FunctionsData Administration Functions
Data policies, procedures, standards
Planning
Data conflict (ownership) resolution
Internal marketing of DA concepts
Managing the data repository
4Chapter 12
© Prentice Hall, 2002
Database AdministrationDatabase Administration
FunctionsFunctions
Selection of hardware and software
Installing/upgrading DBMS
Tuning database performance
Improving query processing performance
Managing data security, privacy, and
integrity
Data backup and recovery
5Chapter 12
© Prentice Hall, 2002
Data Warehouse AdministrationData Warehouse Administration
New role, coming with the growth in data
warehouses
Similar to DA/DBA roles
Emphasis on integration and coordination
of metadata/data across many data sources
Specific roles:
– Support decision –support applications
– Manage data warehouse growth
– Establish service level agreements regarding
data warehouses and data marts
6Chapter 12
© Prentice Hall, 2002
Database SecurityDatabase Security
Database Security: Protection of the
data against accidental or intentional
loss, destruction, or misuse
Increased difficulty due to Internet
access and client/server technologies
7Chapter 12
© Prentice Hall, 2002
Figure 12-2: Possible locations of data security threats
8Chapter 12
© Prentice Hall, 2002
Threats to Data SecurityThreats to Data Security
 Accidental losses attributable to:
– Human error
– Software failure
– Hardware failure
 Theft and fraud.
 Improper data access:
– Loss of privacy (personal data)
– Loss of confidentiality (corporate data)
 Loss of data integrity
 Loss of availability (through, e.g. sabotage)
9Chapter 12
© Prentice Hall, 2002
Data Management SoftwareData Management Software
Security FeaturesSecurity Features
• Views or subschemas
• Integrity controls
• Authorization rules
• User-defined procedures
• Encryption
• Authentication schemes
• Backup, journalizing, and checkpointing
10Chapter 12
© Prentice Hall, 2002
Views and Integrity ControlsViews and Integrity Controls
 Views
– Subset of the database that is presented to one or more
users
– User can be given access privilege to view without
allowing access privilege to underlying tables
 Integrity Controls
– Protect data from unauthorized use
– Domains – set allowable values
– Assertions – enforce database conditions
11Chapter 12
© Prentice Hall, 2002
Authorization RulesAuthorization Rules
 Controls incorporated in the data management system
 Restrict:
– access to data
– actions that people can take on data
 Authorization matrix for:
– Subjects
– Objects
– Actions
– Constraints
12Chapter 12
© Prentice Hall, 2002
Figure 12-3: Authorization matrix
13Chapter 12
© Prentice Hall, 2002
Some DBMSs also provide
capabilities for user-defined
procedures to customize the
authorization process
Figure 12-4(a): Authorization table for subjects
Figure 12-4(b): Authorization table for objects
Figure 12-5: Oracle8i privileges
14Chapter 12
© Prentice Hall, 2002
Authentication SchemesAuthentication Schemes
 Goal – obtain a positive identification of the user
 Passwords are flawed:
– Users share them with each other
– They get written down, could be copied
– Automatic logon scripts remove need to explicitly type
them in
– Unencrypted passwords travel the Internet
 Possible solutions:
– Biometric devices – use of fingerprints, retinal scans,
etc. for positive ID
– Third-party authentication – using secret keys, digital
certificates
15Chapter 12
© Prentice Hall, 2002
Database RecoveryDatabase Recovery
 Mechanism for restoring a database quickly
and accurately after loss or damage
 Recovery facilities:
• Backup Facilities
• Journalizing Facilities
• Checkpoint Facility
• Recovery Manager
16Chapter 12
© Prentice Hall, 2002
Backup FacilitiesBackup Facilities
Automatic dump facility that produces
backup copy of the entire database
Periodic backup (e.g. nightly, weekly)
Cold backup – database is shut down during
backup
Hot backup – selected portion is shut down
and backed up at a given time
Backups stored in secure, off-site location
17Chapter 12
© Prentice Hall, 2002
Journalizing FacilitiesJournalizing Facilities
Audit trail of transactions and database
updates
Transaction log – record of essential data
for each transaction processed against the
database
Database change log – images of updated
data
– Before-image – copy before modification
– After-image – copy after modification
Produces an audit trailaudit trail
18Chapter 12
© Prentice Hall, 2002
Figure 12-6: Database audit trail
From the backup and
logs, databases can be
restored in case of
damage or loss
19Chapter 12
© Prentice Hall, 2002
Checkpoint FacilitiesCheckpoint Facilities
DBMS periodically refuses to accept new
transactions
 system is in a quiet state
Database and transaction logs are
synchronized
This allows recovery manager to resume processing
from short period, instead of repeating entire day
20Chapter 12
© Prentice Hall, 2002
Recovery and RestartRecovery and Restart
ProceduresProcedures
 Switch - Mirrored databases
 Restore/Rerun - Reprocess transactions against the
backup
 Transaction Integrity - Commit or abort all
transaction changes
 Backward Recovery (Rollback) - Apply before
images
 Forward Recovery (Roll Forward) - Apply after
images (preferable to restore/rerun)
21Chapter 12
© Prentice Hall, 2002
Figure 12-7: Basic recovery techniques
(a) Rollback
22Chapter 12
© Prentice Hall, 2002
Figure 12-7(b) Rollforward
23Chapter 12
© Prentice Hall, 2002
Database Failure ResponsesDatabase Failure Responses
 Aborted transactions
– Preferred recovery: rollback
– Alternative: Rollforward to state just prior to abort
 Incorrect data
– Preferred recovery: rollback
– Alternative 1: re-run transactions not including inaccurate data updates
– Alternative 2: compensating transactions
 System failure (database intact)
– Preferred recovery: switch to duplicate database
– Alternative 1: rollback
– Alternative 2: restart from checkpoint
 Database destruction
– Preferred recovery: switch to duplicate database
– Alternative 1: rollforward
– Alternative 2: reprocess transactions
24Chapter 12
© Prentice Hall, 2002
Concurrency ControlConcurrency Control
ProblemProblem – in a multi-user environment,
simultaneous access to data can result in
interference and data loss
SolutionSolution – Concurrency Control
– The process of managing simultaneous
operations against a database so that data
integrity is maintained and the operations do
not interfere with each other in a multi-user
environment.
25Chapter 12
© Prentice Hall, 2002
Figure 12-8: LOST UPDATELOST UPDATE
Simultaneous access causes updates to cancel each other
A similar problem is the inconsistent readinconsistent read problem
26Chapter 12
© Prentice Hall, 2002
Concurrency ControlConcurrency Control
TechniquesTechniques
Serializability –
– Finish one transaction before starting another
Locking MechanismsLocking Mechanisms
– The most common way of achieving
serialization
– Data that is retrieved for the purpose of
updating is locked for the updater
– No other user can perform update until
unlocked
27Chapter 12
© Prentice Hall, 2002
Figure 12-9: Updates with locking for concurrency control
This prevents the lost update problem
28Chapter 12
© Prentice Hall, 2002
Locking MechanismsLocking Mechanisms
 Locking level:
– Database – used during database updates
– Table – used for bulk updates
– Block or page – very commonly used
– Record – only requested row; fairly commonly used
– Field – requires significant overhead; impractical
 Types of locks:
– Shared lock - Read but no update permitted. Used
when just reading to prevent another user from placing
an exclusive lock on the record
– Exclusive lock - No access permitted. Used when
preparing to update
29Chapter 12
© Prentice Hall, 2002
DeadlockDeadlock
 An impasse that results when two or more transactions
have locked common resources, and each waits for the
other to unlock their resources
Figure 12-11
A deadlock situation
UserA and UserB will waitUserA and UserB will wait
forever for each other toforever for each other to
release their locked resources!release their locked resources!
30Chapter 12
© Prentice Hall, 2002
Managing DeadlockManaging Deadlock
 Deadlock prevention:
– Lock all records required at the beginning of a
transaction
– Two-phase locking protocol
 Growing phase
 Shrinking phase
– May be difficult to determine all needed resources in
advance
 Deadlock Resolution:
– Allow deadlocks to occur
– Mechanisms for detecting and breaking them
 Resource usage matrix
31Chapter 12
© Prentice Hall, 2002
VersioningVersioning
 Optimistic approach to concurrency control
 Instead of locking
 Assumption is that simultaneous updates will be
infrequent
 Each transaction can attempt an update as it
wishes
 The system will reject an update when it senses a
conflict
 Use of rollback and commit for this
32Chapter 12
© Prentice Hall, 2002
Figure 12-12: the use of versioning
Better performance than locking
33Chapter 12
© Prentice Hall, 2002
Managing Data QualityManaging Data Quality
Data StewardData Steward - Liaisons between IT and
business units
Five Data Quality Issues:
Security policy and disaster recovery
Personnel controls
Physical access controls
Maintenance controls (hardware & software)
Data protection and privacy
34Chapter 12
© Prentice Hall, 2002
Data Dictionaries and RepositoriesData Dictionaries and Repositories
Data dictionary
– Documents data elements of a database
System catalog
– System-created database that describes all database
objects
Information Repository
– Stores metadata describing data and data processing
resources
Information Repository Dictionary System
(IRDS)
– Software tool managing/controlling access to
information repository
35Chapter 12
© Prentice Hall, 2002
Figure 12-13: Three components of the repository system architecture
A schema of the
repository information
Software that manages the repository objects
Where repository objects
are stored
Source: adapted from Bernstein, 1996.
36Chapter 12
© Prentice Hall, 2002
Database Performance TuningDatabase Performance Tuning
 DBMS Installation
– Setting installation parameters
 Memory Usage
– Set cache levels
– Choose background processes
 Input/Output Contention
– Use striping
– Distribution of heavily accessed files
 CPU Usage
– Monitor CPU load
 Application tuning
– Modification of SQL code in applications

More Related Content

What's hot

Ch 1 D B Environment
Ch 1  D B  EnvironmentCh 1  D B  Environment
Ch 1 D B Environmentguest8fdbdd
 
Datastage free tutorial
Datastage free tutorialDatastage free tutorial
Datastage free tutorialtekslate1
 
Ch 2 D B Dvlpt Process
Ch 2  D B  Dvlpt  ProcessCh 2  D B  Dvlpt  Process
Ch 2 D B Dvlpt Processguest8fdbdd
 
Day 1 Data Stage Administrator And Director 11.0
Day 1 Data Stage Administrator And Director 11.0Day 1 Data Stage Administrator And Director 11.0
Day 1 Data Stage Administrator And Director 11.0kshanmug2
 
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAININGDATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAININGDatawarehouse Trainings
 
Datastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobsDatastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobsshanker_uma
 
Tuning data warehouse
Tuning data warehouseTuning data warehouse
Tuning data warehouseSrinivasan R
 
data stage-material
data stage-materialdata stage-material
data stage-materialRajesh Kv
 
Day 2 Data Stage Manager 11.0
Day 2 Data Stage Manager 11.0Day 2 Data Stage Manager 11.0
Day 2 Data Stage Manager 11.0kshanmug2
 
Week 17 slides 1 7 multidimensional, parallel, and distributed database
Week 17 slides 1 7 multidimensional, parallel, and distributed databaseWeek 17 slides 1 7 multidimensional, parallel, and distributed database
Week 17 slides 1 7 multidimensional, parallel, and distributed databaseAnne Lee
 
Teradata 13.10
Teradata 13.10Teradata 13.10
Teradata 13.10Teradata
 
Module 02 teradata basics
Module 02 teradata basicsModule 02 teradata basics
Module 02 teradata basicsMd. Noor Alam
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oraclesadegh salehi
 
Oracle backup and recovery
Oracle backup and recoveryOracle backup and recovery
Oracle backup and recoveryYogiji Creations
 
Online Datastage training
Online Datastage trainingOnline Datastage training
Online Datastage trainingchpriyaa1
 

What's hot (20)

Ch 1 D B Environment
Ch 1  D B  EnvironmentCh 1  D B  Environment
Ch 1 D B Environment
 
Datastage free tutorial
Datastage free tutorialDatastage free tutorial
Datastage free tutorial
 
Ch 2 D B Dvlpt Process
Ch 2  D B  Dvlpt  ProcessCh 2  D B  Dvlpt  Process
Ch 2 D B Dvlpt Process
 
Day 1 Data Stage Administrator And Director 11.0
Day 1 Data Stage Administrator And Director 11.0Day 1 Data Stage Administrator And Director 11.0
Day 1 Data Stage Administrator And Director 11.0
 
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAININGDATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
Migration from 8.1 to 11.3
Migration from 8.1 to 11.3Migration from 8.1 to 11.3
Migration from 8.1 to 11.3
 
Datastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobsDatastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobs
 
58750024 datastage-student-guide
58750024 datastage-student-guide58750024 datastage-student-guide
58750024 datastage-student-guide
 
Tuning data warehouse
Tuning data warehouseTuning data warehouse
Tuning data warehouse
 
data stage-material
data stage-materialdata stage-material
data stage-material
 
Day 2 Data Stage Manager 11.0
Day 2 Data Stage Manager 11.0Day 2 Data Stage Manager 11.0
Day 2 Data Stage Manager 11.0
 
Datastage Introduction To Data Warehousing
Datastage Introduction To Data WarehousingDatastage Introduction To Data Warehousing
Datastage Introduction To Data Warehousing
 
Week 17 slides 1 7 multidimensional, parallel, and distributed database
Week 17 slides 1 7 multidimensional, parallel, and distributed databaseWeek 17 slides 1 7 multidimensional, parallel, and distributed database
Week 17 slides 1 7 multidimensional, parallel, and distributed database
 
Teradata 13.10
Teradata 13.10Teradata 13.10
Teradata 13.10
 
Module 02 teradata basics
Module 02 teradata basicsModule 02 teradata basics
Module 02 teradata basics
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oracle
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Oracle backup and recovery
Oracle backup and recoveryOracle backup and recovery
Oracle backup and recovery
 
Online Datastage training
Online Datastage trainingOnline Datastage training
Online Datastage training
 

Similar to The Database Environment Chapter 12

Data & database administration hoffer
Data & database administration   hofferData & database administration   hoffer
Data & database administration hofferMohd Arif
 
Fazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoveryFazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoverySofthat IT Solutions
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)welcometofacebook
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationYudi Herdiana
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2Mario Redón Luz
 
What is Database Management System
What is Database Management SystemWhat is Database Management System
What is Database Management SystemAbhiPatel171
 
Chap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptChap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptLisaMalar
 
database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques Kalhan Liyanage
 
SQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster RecoverySQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster RecoveryMichael Poremba
 

Similar to The Database Environment Chapter 12 (20)

Data & database administration hoffer
Data & database administration   hofferData & database administration   hoffer
Data & database administration hoffer
 
Fazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoveryFazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recovery
 
Guide on Raid Data Recovery
Guide on Raid Data RecoveryGuide on Raid Data Recovery
Guide on Raid Data Recovery
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)
 
INT 1010 07-2.pdf
INT 1010 07-2.pdfINT 1010 07-2.pdf
INT 1010 07-2.pdf
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for Consolidation
 
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & RecoveryDistributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
 
2 countermeasures
2 countermeasures2 countermeasures
2 countermeasures
 
2 countermeasures
2 countermeasures2 countermeasures
2 countermeasures
 
Database recovery
Database recoveryDatabase recovery
Database recovery
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Data Guard25 August
Data Guard25 AugustData Guard25 August
Data Guard25 August
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
dbms.ppt
dbms.pptdbms.ppt
dbms.ppt
 
What is Database Management System
What is Database Management SystemWhat is Database Management System
What is Database Management System
 
Powerpoint chap.9
Powerpoint chap.9Powerpoint chap.9
Powerpoint chap.9
 
Maximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12cMaximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12c
 
Chap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptChap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.ppt
 
database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques
 
SQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster RecoverySQL Server High Availability and Disaster Recovery
SQL Server High Availability and Disaster Recovery
 

More from Jeanie Arnoco

The Database Environment Chapter 15
The Database Environment Chapter 15The Database Environment Chapter 15
The Database Environment Chapter 15Jeanie Arnoco
 
The Database Environment Chapter 14
The Database Environment Chapter 14The Database Environment Chapter 14
The Database Environment Chapter 14Jeanie Arnoco
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13Jeanie Arnoco
 
The Database Environment Chapter 8
The Database Environment Chapter 8The Database Environment Chapter 8
The Database Environment Chapter 8Jeanie Arnoco
 
The Database Environment Chapter 5
The Database Environment Chapter 5The Database Environment Chapter 5
The Database Environment Chapter 5Jeanie Arnoco
 
The Database Environment Chapter 4
The Database Environment Chapter 4The Database Environment Chapter 4
The Database Environment Chapter 4Jeanie Arnoco
 
The Database Environment Chapter 3
The Database Environment Chapter 3The Database Environment Chapter 3
The Database Environment Chapter 3Jeanie Arnoco
 
Introduction to BOOTSTRAP
Introduction to BOOTSTRAPIntroduction to BOOTSTRAP
Introduction to BOOTSTRAPJeanie Arnoco
 
Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6Jeanie Arnoco
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
(CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region (CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region Jeanie Arnoco
 
Quick sort-Data Structure
Quick sort-Data StructureQuick sort-Data Structure
Quick sort-Data StructureJeanie Arnoco
 
Quality Gurus Student
Quality Gurus StudentQuality Gurus Student
Quality Gurus StudentJeanie Arnoco
 
Partnering for Competition: External Partnership
Partnering for Competition: External PartnershipPartnering for Competition: External Partnership
Partnering for Competition: External PartnershipJeanie Arnoco
 
Partnering for Competition:Internal Partnership
Partnering for Competition:Internal PartnershipPartnering for Competition:Internal Partnership
Partnering for Competition:Internal PartnershipJeanie Arnoco
 
CROSBY’S PHILOSOPHY
CROSBY’S PHILOSOPHYCROSBY’S PHILOSOPHY
CROSBY’S PHILOSOPHYJeanie Arnoco
 
Deming’s 14 Points for Management
Deming’s 14 Points for ManagementDeming’s 14 Points for Management
Deming’s 14 Points for ManagementJeanie Arnoco
 
Deming’s PDCA and Constant Learning
Deming’s PDCA and Constant LearningDeming’s PDCA and Constant Learning
Deming’s PDCA and Constant LearningJeanie Arnoco
 

More from Jeanie Arnoco (20)

The Database Environment Chapter 15
The Database Environment Chapter 15The Database Environment Chapter 15
The Database Environment Chapter 15
 
The Database Environment Chapter 14
The Database Environment Chapter 14The Database Environment Chapter 14
The Database Environment Chapter 14
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13
 
The Database Environment Chapter 8
The Database Environment Chapter 8The Database Environment Chapter 8
The Database Environment Chapter 8
 
The Database Environment Chapter 5
The Database Environment Chapter 5The Database Environment Chapter 5
The Database Environment Chapter 5
 
The Database Environment Chapter 4
The Database Environment Chapter 4The Database Environment Chapter 4
The Database Environment Chapter 4
 
The Database Environment Chapter 3
The Database Environment Chapter 3The Database Environment Chapter 3
The Database Environment Chapter 3
 
Introduction to BOOTSTRAP
Introduction to BOOTSTRAPIntroduction to BOOTSTRAP
Introduction to BOOTSTRAP
 
Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
(CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region (CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region
 
Quick sort-Data Structure
Quick sort-Data StructureQuick sort-Data Structure
Quick sort-Data Structure
 
Quality Gurus Student
Quality Gurus StudentQuality Gurus Student
Quality Gurus Student
 
QUALITY STANDARDS
QUALITY STANDARDSQUALITY STANDARDS
QUALITY STANDARDS
 
Partnering for Competition: External Partnership
Partnering for Competition: External PartnershipPartnering for Competition: External Partnership
Partnering for Competition: External Partnership
 
Partnering for Competition:Internal Partnership
Partnering for Competition:Internal PartnershipPartnering for Competition:Internal Partnership
Partnering for Competition:Internal Partnership
 
CROSBY’S PHILOSOPHY
CROSBY’S PHILOSOPHYCROSBY’S PHILOSOPHY
CROSBY’S PHILOSOPHY
 
Juran’s Trilogy
Juran’s TrilogyJuran’s Trilogy
Juran’s Trilogy
 
Deming’s 14 Points for Management
Deming’s 14 Points for ManagementDeming’s 14 Points for Management
Deming’s 14 Points for Management
 
Deming’s PDCA and Constant Learning
Deming’s PDCA and Constant LearningDeming’s PDCA and Constant Learning
Deming’s PDCA and Constant Learning
 

Recently uploaded

Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

The Database Environment Chapter 12

  • 1. 1 © Prentice Hall, 2002 Chapter 12:Chapter 12: Data and DatabaseData and Database AdministrationAdministration Modern Database Management 6th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden
  • 2. 2Chapter 12 © Prentice Hall, 2002 DefinitionsDefinitions  Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards  Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery
  • 3. 3Chapter 12 © Prentice Hall, 2002 Data Administration FunctionsData Administration Functions Data policies, procedures, standards Planning Data conflict (ownership) resolution Internal marketing of DA concepts Managing the data repository
  • 4. 4Chapter 12 © Prentice Hall, 2002 Database AdministrationDatabase Administration FunctionsFunctions Selection of hardware and software Installing/upgrading DBMS Tuning database performance Improving query processing performance Managing data security, privacy, and integrity Data backup and recovery
  • 5. 5Chapter 12 © Prentice Hall, 2002 Data Warehouse AdministrationData Warehouse Administration New role, coming with the growth in data warehouses Similar to DA/DBA roles Emphasis on integration and coordination of metadata/data across many data sources Specific roles: – Support decision –support applications – Manage data warehouse growth – Establish service level agreements regarding data warehouses and data marts
  • 6. 6Chapter 12 © Prentice Hall, 2002 Database SecurityDatabase Security Database Security: Protection of the data against accidental or intentional loss, destruction, or misuse Increased difficulty due to Internet access and client/server technologies
  • 7. 7Chapter 12 © Prentice Hall, 2002 Figure 12-2: Possible locations of data security threats
  • 8. 8Chapter 12 © Prentice Hall, 2002 Threats to Data SecurityThreats to Data Security  Accidental losses attributable to: – Human error – Software failure – Hardware failure  Theft and fraud.  Improper data access: – Loss of privacy (personal data) – Loss of confidentiality (corporate data)  Loss of data integrity  Loss of availability (through, e.g. sabotage)
  • 9. 9Chapter 12 © Prentice Hall, 2002 Data Management SoftwareData Management Software Security FeaturesSecurity Features • Views or subschemas • Integrity controls • Authorization rules • User-defined procedures • Encryption • Authentication schemes • Backup, journalizing, and checkpointing
  • 10. 10Chapter 12 © Prentice Hall, 2002 Views and Integrity ControlsViews and Integrity Controls  Views – Subset of the database that is presented to one or more users – User can be given access privilege to view without allowing access privilege to underlying tables  Integrity Controls – Protect data from unauthorized use – Domains – set allowable values – Assertions – enforce database conditions
  • 11. 11Chapter 12 © Prentice Hall, 2002 Authorization RulesAuthorization Rules  Controls incorporated in the data management system  Restrict: – access to data – actions that people can take on data  Authorization matrix for: – Subjects – Objects – Actions – Constraints
  • 12. 12Chapter 12 © Prentice Hall, 2002 Figure 12-3: Authorization matrix
  • 13. 13Chapter 12 © Prentice Hall, 2002 Some DBMSs also provide capabilities for user-defined procedures to customize the authorization process Figure 12-4(a): Authorization table for subjects Figure 12-4(b): Authorization table for objects Figure 12-5: Oracle8i privileges
  • 14. 14Chapter 12 © Prentice Hall, 2002 Authentication SchemesAuthentication Schemes  Goal – obtain a positive identification of the user  Passwords are flawed: – Users share them with each other – They get written down, could be copied – Automatic logon scripts remove need to explicitly type them in – Unencrypted passwords travel the Internet  Possible solutions: – Biometric devices – use of fingerprints, retinal scans, etc. for positive ID – Third-party authentication – using secret keys, digital certificates
  • 15. 15Chapter 12 © Prentice Hall, 2002 Database RecoveryDatabase Recovery  Mechanism for restoring a database quickly and accurately after loss or damage  Recovery facilities: • Backup Facilities • Journalizing Facilities • Checkpoint Facility • Recovery Manager
  • 16. 16Chapter 12 © Prentice Hall, 2002 Backup FacilitiesBackup Facilities Automatic dump facility that produces backup copy of the entire database Periodic backup (e.g. nightly, weekly) Cold backup – database is shut down during backup Hot backup – selected portion is shut down and backed up at a given time Backups stored in secure, off-site location
  • 17. 17Chapter 12 © Prentice Hall, 2002 Journalizing FacilitiesJournalizing Facilities Audit trail of transactions and database updates Transaction log – record of essential data for each transaction processed against the database Database change log – images of updated data – Before-image – copy before modification – After-image – copy after modification Produces an audit trailaudit trail
  • 18. 18Chapter 12 © Prentice Hall, 2002 Figure 12-6: Database audit trail From the backup and logs, databases can be restored in case of damage or loss
  • 19. 19Chapter 12 © Prentice Hall, 2002 Checkpoint FacilitiesCheckpoint Facilities DBMS periodically refuses to accept new transactions  system is in a quiet state Database and transaction logs are synchronized This allows recovery manager to resume processing from short period, instead of repeating entire day
  • 20. 20Chapter 12 © Prentice Hall, 2002 Recovery and RestartRecovery and Restart ProceduresProcedures  Switch - Mirrored databases  Restore/Rerun - Reprocess transactions against the backup  Transaction Integrity - Commit or abort all transaction changes  Backward Recovery (Rollback) - Apply before images  Forward Recovery (Roll Forward) - Apply after images (preferable to restore/rerun)
  • 21. 21Chapter 12 © Prentice Hall, 2002 Figure 12-7: Basic recovery techniques (a) Rollback
  • 22. 22Chapter 12 © Prentice Hall, 2002 Figure 12-7(b) Rollforward
  • 23. 23Chapter 12 © Prentice Hall, 2002 Database Failure ResponsesDatabase Failure Responses  Aborted transactions – Preferred recovery: rollback – Alternative: Rollforward to state just prior to abort  Incorrect data – Preferred recovery: rollback – Alternative 1: re-run transactions not including inaccurate data updates – Alternative 2: compensating transactions  System failure (database intact) – Preferred recovery: switch to duplicate database – Alternative 1: rollback – Alternative 2: restart from checkpoint  Database destruction – Preferred recovery: switch to duplicate database – Alternative 1: rollforward – Alternative 2: reprocess transactions
  • 24. 24Chapter 12 © Prentice Hall, 2002 Concurrency ControlConcurrency Control ProblemProblem – in a multi-user environment, simultaneous access to data can result in interference and data loss SolutionSolution – Concurrency Control – The process of managing simultaneous operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multi-user environment.
  • 25. 25Chapter 12 © Prentice Hall, 2002 Figure 12-8: LOST UPDATELOST UPDATE Simultaneous access causes updates to cancel each other A similar problem is the inconsistent readinconsistent read problem
  • 26. 26Chapter 12 © Prentice Hall, 2002 Concurrency ControlConcurrency Control TechniquesTechniques Serializability – – Finish one transaction before starting another Locking MechanismsLocking Mechanisms – The most common way of achieving serialization – Data that is retrieved for the purpose of updating is locked for the updater – No other user can perform update until unlocked
  • 27. 27Chapter 12 © Prentice Hall, 2002 Figure 12-9: Updates with locking for concurrency control This prevents the lost update problem
  • 28. 28Chapter 12 © Prentice Hall, 2002 Locking MechanismsLocking Mechanisms  Locking level: – Database – used during database updates – Table – used for bulk updates – Block or page – very commonly used – Record – only requested row; fairly commonly used – Field – requires significant overhead; impractical  Types of locks: – Shared lock - Read but no update permitted. Used when just reading to prevent another user from placing an exclusive lock on the record – Exclusive lock - No access permitted. Used when preparing to update
  • 29. 29Chapter 12 © Prentice Hall, 2002 DeadlockDeadlock  An impasse that results when two or more transactions have locked common resources, and each waits for the other to unlock their resources Figure 12-11 A deadlock situation UserA and UserB will waitUserA and UserB will wait forever for each other toforever for each other to release their locked resources!release their locked resources!
  • 30. 30Chapter 12 © Prentice Hall, 2002 Managing DeadlockManaging Deadlock  Deadlock prevention: – Lock all records required at the beginning of a transaction – Two-phase locking protocol  Growing phase  Shrinking phase – May be difficult to determine all needed resources in advance  Deadlock Resolution: – Allow deadlocks to occur – Mechanisms for detecting and breaking them  Resource usage matrix
  • 31. 31Chapter 12 © Prentice Hall, 2002 VersioningVersioning  Optimistic approach to concurrency control  Instead of locking  Assumption is that simultaneous updates will be infrequent  Each transaction can attempt an update as it wishes  The system will reject an update when it senses a conflict  Use of rollback and commit for this
  • 32. 32Chapter 12 © Prentice Hall, 2002 Figure 12-12: the use of versioning Better performance than locking
  • 33. 33Chapter 12 © Prentice Hall, 2002 Managing Data QualityManaging Data Quality Data StewardData Steward - Liaisons between IT and business units Five Data Quality Issues: Security policy and disaster recovery Personnel controls Physical access controls Maintenance controls (hardware & software) Data protection and privacy
  • 34. 34Chapter 12 © Prentice Hall, 2002 Data Dictionaries and RepositoriesData Dictionaries and Repositories Data dictionary – Documents data elements of a database System catalog – System-created database that describes all database objects Information Repository – Stores metadata describing data and data processing resources Information Repository Dictionary System (IRDS) – Software tool managing/controlling access to information repository
  • 35. 35Chapter 12 © Prentice Hall, 2002 Figure 12-13: Three components of the repository system architecture A schema of the repository information Software that manages the repository objects Where repository objects are stored Source: adapted from Bernstein, 1996.
  • 36. 36Chapter 12 © Prentice Hall, 2002 Database Performance TuningDatabase Performance Tuning  DBMS Installation – Setting installation parameters  Memory Usage – Set cache levels – Choose background processes  Input/Output Contention – Use striping – Distribution of heavily accessed files  CPU Usage – Monitor CPU load  Application tuning – Modification of SQL code in applications