Managing Multi-User Databases

Slides:



Advertisements
Similar presentations
RAID (Redundant Arrays of Independent Disks). Disk organization technique that manages a large number of disks, providing a view of a single disk of High.
Advertisements

Recovery CPSC 356 Database Ellen Walker Hiram College (Includes figures from Database Systems by Connolly & Begg, © Addison Wesley 2002)
CSCI 3140 Module 8 – Database Recovery Theodore Chiasson Dalhousie University.
Database Systems, 8 th Edition Concurrency Control with Time Stamping Methods Assigns global unique time stamp to each transaction Produces explicit.
1 Minggu 8, Pertemuan 16 Transaction Management (cont.) Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Transaction Management and Concurrency Control
Transaction Processing IS698 Min Song. 2 What is a Transaction?  When an event in the real world changes the state of the enterprise, a transaction is.
Chapter 9 Transaction Management and Concurrency Control
9 Chapter 9 Transaction Management and Concurrency Control Hachim Haddouti.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
Transaction Management WXES 2103 Database. Content What is transaction Transaction properties Transaction management with SQL Transaction log DBMS Transaction.
 Mechanism for restoring a database quickly and accurately after loss or damage  RESPONSIBILITY OF ?????  Recovery facilities: Backup Facilities Backup.
Chapter 1 Introduction to Databases
Transaction Management Chapter 9. What is a Transaction? A logical unit of work on a database A logical unit of work on a database An entire program An.
Academic Year 2014 Spring. MODULE CC3005NI: Advanced Database Systems “DATABASE RECOVERY” (PART – 1) Academic Year 2014 Spring.
Distributed DBMSPage © 1998 M. Tamer Özsu & Patrick Valduriez Outline Introduction Background Distributed DBMS Architecture Distributed Database.
Introduction to Databases and Database Languages
SQL Server 2008 Implementation and Maintenance Chapter 7: Performing Backups and Restores.
Client/Server Databases and the Oracle 10g Relational Database
Managing Multi-User Databases AIMS 3710 R. Nakatsu.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Multi-user Database Processing Architectures Architectures Transactions Transactions Security Security Administration Administration.
Database Design – Lecture 16
1 Transactions BUAD/American University Transactions.
CREATE THE DIFFERENCE Back ups and Recovery Janet Francis/Geoff Leese January 2010.
BIS Database Systems School of Management, Business Information Systems, Assumption University A.Thanop Somprasong Chapter # 10 Transaction Management.
Reliability and Security in Database Servers By Samuel Njoroge.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Database Systems: Design, Implementation, and Management Tenth Edition Chapter 12 Distributed Database Management Systems.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Information: Policy, Strategy and Systems Module Overview
Lecture 12 Recoverability and failure. 2 Optimistic Techniques Based on assumption that conflict is rare and more efficient to let transactions proceed.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
11/7/2012ISC329 Isabelle Bichindaritz1 Transaction Management & Concurrency Control.
1 Principles of Database Systems With Internet and Java Applications Today’s Topic Chapter 15: Reliability and Security in Database Servers Instructor’s.
Introduction.  Administration  Simple DBMS  CMPT 454 Topics John Edgar2.
Section 06 (a)RDBMS (a) Supplement RDBMS Issues 2 HSQ - DATABASES & SQL And Franchise Colleges By MANSHA NAWAZ.
Transaction Management Transparencies. ©Pearson Education 2009 Chapter 14 - Objectives Function and importance of transactions. Properties of transactions.
Transactions.
Oracle Architecture - Structure. Oracle Architecture - Structure The Oracle Server architecture 1. Structures are well-defined objects that store the.
10 1 Chapter 10 - A Transaction Management Database Systems: Design, Implementation, and Management, Rob and Coronel.
CREATE THE DIFFERENCE Back ups and Recovery. CREATE THE DIFFERENCE Aims This lecture aims to cover –Back ups –Transaction logging –Security threats.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Chapter 5 Managing Multi-user Databases 1. Multi-User Issues Database Administration Concurrency Control Database Security Database Recovery Page 307.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.

Table General Guidelines for Better System Performance
Transaction Management and Concurrency Control
Transaction Management and Concurrency Control
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Managing Multi-user Databases
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
RAID RAID Mukesh N Tekwani
SpiraTest/Plan/Team Deployment Considerations
Database Processing: David M. Kroenke’s Chapter Nine: Part Two
Chapter 10 Transaction Management and Concurrency Control
Table General Guidelines for Better System Performance
UNIT IV RAID.
Outline Introduction Background Distributed DBMS Architecture
Database Security &Threats
Database Security Transactions
Introduction of Week 13 Return assignment 11-1 and 3-1-5
Chapter 2: Operating-System Structures
Database Backup and recovery
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Database Processing: David M. Kroenke’s Chapter Nine: Part Two
RAID RAID Mukesh N Tekwani April 23, 2019
Chapter 2: Operating-System Structures
Database administration
Presentation transcript:

Managing Multi-User Databases AIMS 3710 R. Nakatsu

Multi-User Issues Transaction Management Database Recovery Database Administration

Transaction Processing What is a transaction? A transaction is a logical unit of work that must be entirely completed or aborted; no intermediate states are accepted. A transaction may consist of a series of related UPDATE (or writes) to the database.

Transaction: Example Scenario: A company makes a credit sale of a product to a customer. 1. Generate an order on the Order table to record the order. 2. Update the Inventory table by subtracting the number of units of the product sold from the quantity-on-hand. 3. Update the Account Receivable table to bill the customer later. If the three transactions are not completely executed, the transaction will yield an inconsistent database

Transaction Management with SQL Two commands are useful to know: 1. COMMIT: When this statement is issued, the changes are permanently recorded in the database. 2. ROLLBACK: When this statement is reached, the changes are aborted, and the database is “rolled back” to its previous consistent state.

Database Recovery The process of restoring the database to a correct state in the event of a failure. Via Reprocessing Via Rollback/Rollforward (Undo/Redo)

Recovery Facilities Backup Facilities: make periodic backup copies of the database Logging Facilities: keep track of all updates made to the database Checkpoint Facilities: maintain a point of synchronization between the database and the transaction log

Have a Back Up Strategy! Disk drives fail: don’t be surprised if this happens to you! 3-2-1 Strategy: Have at least three copies of your data, on at least two separate media storage devices, at least one copy offsite. Cloud-based services like Carbonite, and Dropbox offer affordable and convenient offsite, “cloud” storage. Create a disk image (e.g., timemachine on the Mac, superduper, drivesnapshot.de, among other programs)

Transaction Log Transaction records contain: Transaction identifier Time Type of transaction (transaction start, insert, update, delete, abort, commit) Identifier of data item affected Before-image of the data item After-image of the data item Log management information (such as pointers to previous and next log records for the transaction)

Transaction Log Example

Checkpoint The point of synchronization between the database and the transaction log file. All buffers are force-written to secondary storage. Checkpoints involve the following operations: All log records in main memory are written to secondary storage. A checkpoint record is written to the log file. The record contains the identifers of all active transactions at the time the checkpoint is taken.

Checkpointing Example tC tF

Fault-Tolerant Computer Systems… are systems that contain extra hardware, software, and power supply components that can back up a system and keep it running continuously to prevent system failure.

Technologies used to ensure maximum performance Load balancing distributes large numbers of access requests across multiple servers. Mirroring uses a backup server that duplicates all the processes and transactions of the primary server. Clustering links two computers together so that the second computer can act as a backup to the primary computer.

RAID (Redundant Array of Independent Disks) Technology that provides enhanced performance and reliability through redundancy RAID has different levels or methods of storage. The common ones are RAID 0, RAID 1, and RAID 5. RAID 0: Distributes data across multiple drives for faster read/write speeds, but does not duplicate information (faster performance only). RAID 1: Writes the same data to two drives (mirroring). RAID 5: Offers both speed and mirroring. Question: Does RAID replace the need for backups?

DBA Must Monitor DBMS Performance © 2000 Prentice Hall

Features of Multi-User DBMS Products Support for SQL and other open standards Support for transaction processing (commits and rollbacks) Transaction logging for quick recovery Security management Programmability (the ability to create customized applications) Support for DBA functions (e.g., performance tuning and query optimization)