Download presentation
Presentation is loading. Please wait.
Published byBeryl Terry Modified over 9 years ago
1
TEXT BOOK: DATABASE ADMINISTRATION: THE COMPLETE GUIDE TO PRACTICES AND PROCEDURES CRAIG S. MULLINS Database Administration(IS4511) Sana azzam s.azzam@psau.edu.sa
2
Course Learning Outcomes Describe the concepts Schema, Synonyms, Encryption, Certificate, Asymmetric keys, Symmetric keys, Password security, System databases, System views, Data files, Advanced import tools, Index and Statistics. Use data files to build the underlying data architecture. Use asymmetric keys, symmetric keys and certificates to encrypt data & manage statistics to improve performance.
3
Contents #Topic Week 2 Introduction to the course Week 3 DBMS Administration Week 4 DBMS Architecture Week 5Distributed database Week 6Distributed database Week 7Mid Exam 1 Week 8 Concurrency Control, Techniques & security. Week 9 Concurrency Control, Techniques & security. Week 10 Data Mining Week 11Mid Exam 2 Week 12 Data Mining Week 13Project presentation Week 14Project presentation Week 15Revision
4
Evaluation System ProportionWeek due 20%7 th weekFirst exam: Mid Term 1 20%11 th weekSecond exam: Mid Term 2 20%During the termQuizzes/homework + Project + Lab 40 %This will be a 2-hour examination and the date and time will be announced by the College. Final exam
5
Database Administration
6
Need for Databases Data is used by different people, in different departments, for different reasons Interpretation and Presentation of data in useful formats Distribution of data and information To the right people At the right time Data Preservation Control over Data Duplication and Use
7
Role of the Database Primary Role: To Support Managerial Decision Making at All Levels of the Organization Top Level Strategic Decisions Middle Management Tactical Decisions Operational Management Daily, Operational Decisions DBMS must provide each level a separate view of the data and support their specialized decision making roles Provide a seamless flow of information throughout the company.
8
Role of the Database
9
Top Level Management Provide information for strategic decision making, strategic planning, policy formation, and goals definitions. Provide a framework for defining and enforcing organizational policies Improve the likelihood of a positive return on investment for the company. Example: Ways to reduce cost Increase Productivity Provide feedback on whether the company is achieving its goals.
10
Middle Management Provide necessary data for tactical decision making and planning Monitor and control the use of company resources How efficiently are the resources allocated and used (including data) What potential or current operational problems exist Evaluate the performance of the different departments Provide a framework for ensuring the security and privacy of the data in the database
11
Operational Management Represent and support the company operations Produce query results within set performance levels Enhance short-term operational ability Timely information for Customer Support Support for application development and computer operations
12
Special Database Considerations Having a database does not mean the data will be use properly, efficiently, correctly DBMS is just a tool for managing data – it must be used correctly effective management and use 3 Main Processes for implementing a DBMS Technological DBMS software and hardware Managerial Administrative Functions Cultural Corporate Resistance to Change
13
Evolution of the DBA Data Processing Department Information Systems Department Service Function to provide end users active data management support Production Function to provide solutions to information needs (application development) DBA – Database Administration Size and Role varies from company to company DBA’s function is very dynamic Distributed Databases Internet Databases Object Oriented databases Sophistication and Power of the DBMS packages
14
Common Functions of DBA Database Planning Standards, procedures, enforcement Requirements Gathering and Conceptual Design(data analysis and requirement, ER diagram and normalization, data model verification, Distributed DB) Logical Design(Translate Conceptual Design into internal model )(design component such as table,index,transaction) Physical Design(selection of data storage) and Implementation Testing and Debugging Operations and Maintenance Training and Support (Follows the requirements of the DBLC phases)
15
DBA’s Managerial Role Control and Planning Dimensions of Database Administration Coordinating, Monitoring, and Allocating database administration resources People Data Defining Goals and Formulating Strategic Plans for the Database Administration function
16
DBA’s Responsibilities DBA Activity DBA Service Planning End-User Support Organizing Policies, Procedures, Standards Testing Data Security, Privacy, Integrity Monitoring Data backup and Recovery Delivering Data Distribution and Use of
17
End-User Support User Requirements Gathering Understanding of the users’ views and needs Present and Future information needs Conflict and Problem Resolution Solutions in one department may cause problems in another Finding Solutions to Information Needs Ensure Quality and Integrity of Applications and Data Build End-User Confidence Manage the Training and Support of DBMS users
18
Policies, Procedures, and Standards Policies: General Statements of Direction or action that communicate and support DBA goals Procedures: Written Instructions that describe a services of steps to be followed during the performance of a given activity Standards: More detailed and specific than policies, and describe the minimum requirements of a DBA activity Rules that are used to evaluate the quality of the activity
19
Areas of Policies and Procedures End-User database requirements gathering Database design and modeling Documentation and Naming conventions Design, coding, and testing of applications Database software selection Database security and integrity Database backup and recovery Database maintenance and operation End-user training
20
Data Security, Privacy and Integrity User Access Management Define each user to the database Assign Passwords Assign Access Privileges Read, Write, Delete Physical Access Control View Definitions: Protect and Control the Scope of the Data that is accessible to a user DBMS utilities access control: Limit the use of query and reporting tools DBMS usage Monitoring: Audit Logs (More difficult in distributed databases)
21
Data Security, Privacy and Integrity
22
Data Backup and Recovery Disaster Management Periodic Data and Application Backups: Full, Incremental, Concurrent Convenient and safe backup storage Physical protection of hardware and software Personal Access Control to the software of a database installation. Insurance Coverage for the data in the database
23
Data Backup and Recovery Recovery and Contingency plans Tested Evaluated Practiced Will Not Recover all components of an IS Establish priorities for the nature and extend of the data recovery process
24
Data Distribution and Use Data is only useful when: Given to the Right User Right Time Right Format Programmers Deliver programs to access data Time consuming for DBA Data Distribution allows end users to access the database Internet Intranets Queries, Web Front Ends End Users may make improper use of database, data duplication, etc.
25
DBA’s Technical Role 1. DBMS and its utilities, evaluation, selection and installation 2. Design and implementation of Database 3. Testing and Evaluation 4. Operation of DBMS, Utilities, and Applications 5. Training and Supporting Users 6. Maintenance of DBMS
26
Evaluation, Selection, and Installation Selection of Hardware and Software Must be based on the Organization’s Needs So the first step is to determine companies NEEDS
27
DBMS Checklist The choice of the DBMS is based on: DBMS Model Storage Capacity Application Development Support Security and Integrity Backup and Recovery Concurrency Control Performance DBA tools Interoperability and Data Distribution Portability Hardware Data Dictionary Vendor Training and Support Third Party Tools Cost
28
Design and Implementation Determination and Enforcement of Standards and Procedures Ensure the Design activities are performed within the Standards and Procedures Ensure Transactions are: Correct, Efficient, Compliant with Integrity and Standards Physical Design Operational Procedures
29
Testing and Evaluation All Database and End User Applications Maintained Independently of Development and Implementation Testing and evaluation cover: Technical Aspects: Backup, Recovery, Security, Integrity, SQL Observance of Standards: Naming, Documentation, Coding Data Duplication Conflicts with existing data
30
Operation of DBMS, Utilities, and Applications System Support: Day-to-day activity of the DBMS Performance monitoring and tuning Identification of Performance Goals Evaluate if performance Goals are being met Isolate Problems and Find solutions Implement solutions Backup and Recovery Security auditing and monitoring Appropriate access rights Proper use of access privileges by programmers and end users
31
Training and Supporting Users Technical Training in the use of DBMS Unscheduled on-demand technical support Interaction with DBMS vendors
32
Maintenance of DBMS Dedicated to the Preservation of the DBMS environment Management of the Storage devices Reorganizing the physical location of the data Upgrading the DBMS and Utility Software Maintenance is needed when the exchange of data is in dissimilar formats.
33
Database Administration Tools Data Dictionary Store the Description of all objects that interact with the database Integrated limited to data of DBMS Standalone Include data outside of DBMS Case Tools Computer Aided Software Engineering Automated Framework for the Software Development Life Cycle (SDLC). Front-End Tools Planning, Analysis, Design Back-End Tools Coding and Implementation Reduction in development time and costs Easier Maintenance of Application Systems Developed with CASE Tools
34
Data Dictionary Data Elements from all tables of all databases Names, Types, Format, Validation rules, When an Element is Used and by whom Defined databases, and properties Tables defined in the database Indexes defined for each table End Users and Administrators Programs that access the database Access Authorizations for all users Relationships among data elements
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.