Download presentation
Presentation is loading. Please wait.
1
2005.10.26- SLIDE 1IS 257 – Spring 2005 Data Administration and Database Administration University of California, Berkeley School of Information Management and Systems SIMS 257: Database Management
2
2005.10.26- SLIDE 2IS 257 – Spring 2005 Lecture Outline Midterm Project Report Requirements Review –Database Administration: Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles
3
2005.10.26- SLIDE 3IS 257 – Spring 2005 Lecture Outline Midterm Project Report Requirements Review –Database Administration: Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles
4
2005.10.26- SLIDE 4IS 257 – Spring 2005 Midterm Project Requirements See WWW site: –http://sims.berkeley.edu/courses/is257/f05/index.html Report on personal/group database including: –Expanded and Updated Database description and purpose –Updated Data Dictionary –Updated Relationships Diagram –Plans or prototype examples for interface applications using the database
5
2005.10.26- SLIDE 5IS 257 – Spring 2005 Lecture Outline Midterm Project Report Requirements Review –Database Administration: Data Integrity and Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles
6
2005.10.26- SLIDE 6IS 257 – Spring 2005 Data Integrity Intrarecord integrity (enforcing constraints on contents of fields, etc.) Referential Integrity (enforcing the validity of references between records in the database) Concurrency control (ensuring the validity of database updates in a shared multiuser environment)
7
2005.10.26- SLIDE 7IS 257 – Spring 2005 Integrity Constraints (review) The constraints we wish to impose in order to protect the database from becoming inconsistent. Five types –Required data –attribute domain constraints –entity integrity –referential integrity –enterprise constraints
8
2005.10.26- SLIDE 8IS 257 – Spring 2005 Referential Integrity Ensures that dependent relationships in the data are maintained. In Oracle, for example: CREATE TABLE table-name ( attr1 attr-type PRIMARY KEY, attr2 attr-type NOT NULL, …, attrM attr-type REFERENCES owner.tablename(attrname) ON DELETE CASCADE, …
9
2005.10.26- SLIDE 9IS 257 – Spring 2005 Concurrency Control The goal is to support access by multiple users to the same data, at the same time It must assure that the transactions are serializable and that they are isolated It is intended to handle several problems in an uncontrolled system Specifically: –Lost updates –Inconsistent data states during access –Uncompleted (or committed) changes to data
10
2005.10.26- SLIDE 10IS 257 – Spring 2005 Concurrency Control: Locking Locking levels –Database –Table –Block or page –Record –Field Types –Shared (S locks) –Exclusive (X locks)
11
2005.10.26- SLIDE 11IS 257 – Spring 2005 Transaction Control in ORACLE Transactions are sequences of SQL statements that ORACLE treats as a unit –From the user’s point of view a private copy of the database is created for the duration of the transaction Transactions are started with SET TRANSACTION, followed by the SQL statements Any changes made by the SQL are made permanent by COMMIT Part or all of a transaction can be undone using ROLLBACK
12
2005.10.26- SLIDE 12IS 257 – Spring 2005 Transactions in ORACLE COMMIT; (I.e., confirm previous transaction) SET TRANSACTION READ ONLY; SELECT NAME, ADDRESS FROM WORKERS; SELECT MANAGER, ADDRESS FROM PLACES; COMMIT; Freezes the data for the user in both tables before either select retrieves any rows, so that changes that occur concurrently will not show up Commits before and after ensure any uncompleted transactions are finish, and then release the frozen data when done
13
2005.10.26- SLIDE 13IS 257 – Spring 2005 Transactions in ORACLE Savepoints are places in a transaction that you may ROLLBACK to (called checkpoints in other DBMS) –SET TRANACTION…; –SAVEPOINT ALPHA; –SQL STATEMENTS… –IF (CONDITION) THEN ROLLBACK TO SAVEPOINT ALPHA; –SAVEPOINT BETA; –SQL STATEMENTS… –IF …; –COMMIT;
14
2005.10.26- SLIDE 14IS 257 – Spring 2005 Security and Integrity Functions in Database Administration Data Integrity Security Management Backup and Recovery
15
2005.10.26- SLIDE 15IS 257 – Spring 2005 Database Security Views or restricted subschemas Authorization rules to identify users and the actions they can perform User-defined procedures (with rule systems or triggers) to define additional constraints or limitations in using the database Encryption to encode sensitive data Authentication schemes to positively identify a person attempting to gain access to the database
16
2005.10.26- SLIDE 16IS 257 – Spring 2005 Views A subset of the database presented to some set of users –SQL: CREATE VIEW viewname AS SELECT field1, field2, field3,…, FROM table1, table2 WHERE ; –Note: “queries” in Access function as views
17
2005.10.26- SLIDE 17IS 257 – Spring 2005 Restricted Views Main relation has the form: Name C_name Dept C_dept Prof C_prof TC J SmithSDept1SCryptographyTS M DoeUDept2SIT SecuritySS R JonesUDept3USecretaryUU U = unclassified : S = Secret : TS = Top Secret
18
2005.10.26- SLIDE 18IS 257 – Spring 2005 Restricted Views NAMEDeptProf J SmithDept1--- M DoeDept2IT Security R JonesDept3Secretary NAMEDeptProf M Doe--- R JonesDept3Secretary S-view of the data U-view of the data
19
2005.10.26- SLIDE 19IS 257 – Spring 2005 Authorization Rules Most current DBMS permit the DBA to define “access permissions” on a table by table basis (at least) using the GRANT and REVOKE SQL commands Some systems permit finer grained authorization (most use GRANT and REVOKE on variant views
20
2005.10.26- SLIDE 20IS 257 – Spring 2005 Lecture Outline Midterm Project Report Requirements Review –Database Administration: Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles and Functions
21
2005.10.26- SLIDE 21IS 257 – Spring 2005 Database Backup and Recovery Backup Journaling (audit trail) Checkpoint facility Recovery manager
22
2005.10.26- SLIDE 22IS 257 – Spring 2005 Backup and Offsite Backup Found on the Web… This is typical of services that provide offsite backup for computers or DP centers
23
2005.10.26- SLIDE 23IS 257 – Spring 2005 Disaster Recovery Planning Testing and Training Procedures Development Budget & Implement Plan Maintenance Recovery Strategies Risk Analysis From Toigo “Disaster Recovery Planning”
24
2005.10.26- SLIDE 24IS 257 – Spring 2005
25
2005.10.26- SLIDE 25IS 257 – Spring 2005 La Crosse, Wisc 2001
26
2005.10.26- SLIDE 26IS 257 – Spring 2005 Threats to Assets and Functions Water Fire Power Failure Mechanical breakdown or software failure Accidental or deliberate destruction of hardware or software –By hackers, disgruntled employees, industrial saboteurs, terrorists, or others
27
2005.10.26- SLIDE 27IS 257 – Spring 2005 Threats Between 1967 and 1978 fire and water damage accounted for 62% of all data processing disasters in the U.S. The water damage was sometimes caused by fighting fires More recently improvements in fire suppression (e.g., Halon) for DP centers has meant that water is the primary danger to DP centers
28
2005.10.26- SLIDE 28IS 257 – Spring 2005 Kinds of Records Class I: VITAL –Essential, irreplaceable or necessary to recovery Class II: IMPORTANT –Essential or important, but reproducible with difficulty or at extra expense Class III: USEFUL –Records whose loss would be inconvenient, but which are replaceable Class IV: NONESSENTIAL –Records which upon examination are found to be no longer necessary
29
2005.10.26- SLIDE 29IS 257 – Spring 2005 Offsite Storage of Data Early offsite storage facilities were often intended to survive atomic explosions PRISM International directory –PRISM = Professional Records and Information Services Management –http://www.prismintl.org/ Mirror sites (Hot sites) Agility “Hotsuite”
30
2005.10.26- SLIDE 30IS 257 – Spring 2005 Offsite Storage Providers Iron Mountain
31
2005.10.26- SLIDE 31IS 257 – Spring 2005 Offsite backup providers Verio
32
2005.10.26- SLIDE 32IS 257 – Spring 2005 Lecture Outline Midterm Project Report Requirements Review –Database Administration: Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles
33
2005.10.26- SLIDE 33IS 257 – Spring 2005 Today Traditional and Current Data Administration Traditional and Current Database Administration Review of Security, Integrity, etc.
34
2005.10.26- SLIDE 34IS 257 – Spring 2005 Changes in Traditional Roles This is being driven by rapid changes in –Technology –Platforms (e.g., Micro vs. Mainframe vs. Server) –Organizational Structure We will focus on the core functions and tasks of these roles (traditional or current)
35
2005.10.26- SLIDE 35IS 257 – Spring 2005 Terms and Concepts (trad) Data Administration –Responsibility for the overall management of data resources within an organization Database Administration –Responsibility for physical database design and technical issues in database management These roles are often combined or overlapping in some organizations
36
2005.10.26- SLIDE 36IS 257 – Spring 2005 Terms and Concepts (trad) DA –Data adminstrator - person responsible for the Data Administration function in an organization –Sometimes may be the CIO -- Chief Information Officer DBA –Database Administrator - person responsible for the Database Administration Function
37
2005.10.26- SLIDE 37IS 257 – Spring 2005 Database System Life Cycle Operation & Maintenance Database Implementation Database Design Growth & Change Database Analysis Database Planning Note: this is a different version of this life cycle than discussed previously
38
2005.10.26- SLIDE 38IS 257 – Spring 2005 Database Planning Development of a strategic plan for database development that supports the overall organization’s business plan DA supports top management in development of this plan The result of this stage is an enterprise data model
39
2005.10.26- SLIDE 39IS 257 – Spring 2005 Database Planning: DA & DBA functions Develop corporate database strategy (DA) Develop enterprise model (DA) Develop cost/benefit models (DA) Design database environment (DA) Develop data administration plan (DA)
40
2005.10.26- SLIDE 40IS 257 – Spring 2005 Database Analysis This is the process (discussed previously) of identifying data entities currently used by the organization, precisely defining those entities and their relationships, and documenting the results in a form that can support the follow-on design phase Must also identify new data elements or changes to data elements that will be required in the future The result of this phase is the Conceptual Data Model -- usually represented as an ER diagram
41
2005.10.26- SLIDE 41IS 257 – Spring 2005 Database Analysis: DA & DBA functions Define and model data requirements (DA) Define and model business rules (DA) Define operational requirements (DA) Maintain corporate Data Dictionary (DA)
42
2005.10.26- SLIDE 42IS 257 – Spring 2005 Database Design Purpose of the design phase is the development of the logical database design that will serve the needs of the organization and the physical design implementing the logical design In relational systems the outcome is normalized relations, and the data definition for a particular database systems (including indexes, etc.)
43
2005.10.26- SLIDE 43IS 257 – Spring 2005 Design 2: Physical Creation Development of the Physical Model of the Database –data formats and types –determination of indexes, etc. Load a prototype database and test Determine and implement security, privacy and access controls Determine and implement integrity constraints
44
2005.10.26- SLIDE 44IS 257 – Spring 2005 Database Design: DA &DBA functions Perform logical database design (DA) Design external models (subschemas) (DBA) Design internal model (Physical design) (DBA) Design integrity controls (DBA)
45
2005.10.26- SLIDE 45IS 257 – Spring 2005 Database Implementation Database design gives you an empty database Load data into the database structure Convert existing data sets and applications to use the new database –May need programs, conversion utilities to convert old data to new formats. Outcome is the actual database with its data
46
2005.10.26- SLIDE 46IS 257 – Spring 2005 Database Implementation DA & DBA functions Specify database access policies (DA & DBA) Establish Security controls (DBA) Supervise Database loading (DBA) Specify test procedures (DBA) Develop application programming standards (DBA) Establish procedures for backup and recovery (DBA) Conduct User training (DA & DBA)
47
2005.10.26- SLIDE 47IS 257 – Spring 2005 Operation and Maintenance 1: Operations Users are responsible for updating the database, DA and DBA are responsible for developing procedures that ensure the integrity and security of the database during the update process. Specific responsibility for data collection, editing and verification must be assigned Quality assurance must be practiced to protect and audit the database quality.
48
2005.10.26- SLIDE 48IS 257 – Spring 2005 Operation and Maintenance 2: Maintenance The ongoing process of updating the database to keep it current –adding new records –deleting obsolete records –changing data values in particular records –modifying relation structures (e.g. adding new fields) Privacy, security, access control must be in place. Recovery and Backup procedures must be established and used
49
2005.10.26- SLIDE 49IS 257 – Spring 2005 Operation and Maintenance: DA & DBA functions Monitor database performance (DBA) Tune and reorganize databases (DBA) Enforce standards and procedures (DBA) Support users (DA & DBA)
50
2005.10.26- SLIDE 50IS 257 – Spring 2005 Growth & Change Change is a way of life –Applications, data requirements, reports, etc. will all change as new needs and requirements are found –The Database and applications and will need to be modified to meet the needs of changes to the organization and the environment –Database performance should be monitored to maintain a high level of system performance
51
2005.10.26- SLIDE 51IS 257 – Spring 2005 Growth & Change: DA & DBA functions Implement change control procedures (DA & DBA) Plan for growth and change (DA & DBA) Evaluate new technology (DA & DBA)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.