Database Administration Part 2 Chapter Six CSCI260 Database Applications.

Slides:



Advertisements
Similar presentations
Transactions and Recovery Checkpointing Souhad Daraghma.
Advertisements

Database Administration Chapter Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 4 th Edition.
Understand Database Security Concepts
Data and Database Administration Chapter 12. Outline What is Concurrency Control? Background Serializability  Locking mechanisms.
Module 15: Managing Transactions and Locks. Overview Introduction to Transactions and Locks Managing Transactions SQL Server Locking Managing Locks.
Database Administration Chapter Six DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
Transaction Management and Concurrency Control
Prentice Hall © COS 346 Day Agenda Questions? Assignment 8 Due Assignment 9 posted –Due April 2:05 PM Quiz 2 Today –SQL Chaps 2-19.
ICS (072)Database Recovery1 Database Recovery Concepts and Techniques Dr. Muhammad Shafique.
Transaction Management and Concurrency Control
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 4-1 David M. Kroenke Database Processing Chapter 9 Managing Multi- User.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 COS 346 Day 19.
© 2002 by Prentice Hall 1 SI 654 Database Application Design Winter 2003 Dragomir R. Radev.
© 2002 by Prentice Hall 1 SI 654 Database Application Design Winter 2004 Dragomir R. Radev.
Chapter 8 : Transaction Management. u Function and importance of transactions. u Properties of transactions. u Concurrency Control – Meaning of serializability.
1 Transaction Management Database recovery Concurrency control.
© 2002 by Prentice Hall 1 David M. Kroenke Database Processing Eighth Edition Chapter 11 Managing Multi-User Databases.
DBMS Functions Data, Storage, Retrieval, and Update
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 COS 346 Day 19.
Database Administration
Database Administration Chapter Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
9 Chapter 9 Transaction Management and Concurrency Control Hachim Haddouti.
Database Administration Part 1 Chapter Six CSCI260 Database Applications.
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Managing Multi-User Databases AIMS 3710 R. Nakatsu.
Database Administration
DBSQL 7-1 Copyright © Genetic Computer School 2009 Chapter 7 Transaction Management, Database Security and Recovery.
Multi-user Database Processing Architectures Architectures Transactions Transactions Security Security Administration Administration.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 Managing Multiuser Databases.
Introduction: Databases and Database Users
Reliability and Security in Database Servers By Samuel Njoroge.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
1 IT420: Database Management and Organization Database Security 5 April 2006 Adina Crăiniceanu
1 All Powder Board and Ski Oracle 9i Workbook Chapter 9: Database Administration Jerry Post Copyright © 2003.
Lecture 12 Recoverability and failure. 2 Optimistic Techniques Based on assumption that conflict is rare and more efficient to let transactions proceed.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases 9-1 KROENKE.
Concurrency Control. Objectives Management of Databases Concurrency Control Database Recovery Database Security Database Administration.
Prentice Hall © COS 346 Day Agenda Questions? Assignment 8 not Corrected yet Assignment 9 posted –Due April 2:05 PM Quiz 2 Corrected.
Database Processing: Fundamentals, Design, and Implementation, 9/e by David M. KroenkeChapter 9/1 Copyright © 2004 Please……. No Food Or Drink in the class.
© 2002 by Prentice Hall 1 Database Administration David M. Kroenke Database Concepts 1e Chapter 6 6.
Fundamentals, Design, and Implementation, 9/e Chapter 9 Managing Multi-User Databases.
1 Principles of Database Systems With Internet and Java Applications Today’s Topic Chapter 15: Reliability and Security in Database Servers Instructor’s.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
MBA 664 Database Management Dave Salisbury ( )
© 2006 ITT Educational Services Inc. Course Name: IT390 Business Database Administration Unit 8 Slide 1 IT 390 Business Database Administration Unit 8:
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall 6-1 Chapter Objectives Understand the need for and importance of database.
David M. Kroenke and David J. Auer Database Processing: F undamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases 9-1 KROENKE.
Chapter 15: Reliability and Security in Database Servers Neyha Amar CS 157B May 6, 2008.
CSC 411/511: DBMS Design Dr. Nan WangCSC411_L12_JDBC_MySQL 1 Transations.
1 Intro stored procedures Declaring parameters Using in a sproc Intro to transactions Concurrency control & recovery States of transactions Desirable.
Module 11: Managing Transactions and Locks
10 1 Chapter 10 - A Transaction Management Database Systems: Design, Implementation, and Management, Rob and Coronel.
Module 14: Managing Transactions and Locks. Overview Introducing Transactions and Locks Managing Transactions Understanding SQL Server Locking Architecture.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases.
Chapter 5 Managing Multi-user Databases 1. Multi-User Issues Database Administration Concurrency Control Database Security Database Recovery Page 307.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Chapter 8 Database Redesign
Managing Multi-User Databases
David M. Kroenke and David J
Database Administration
Managing Multi-user Databases
Chapter 9 Managing Multi-User Databases
Multi-User Databases Chapter 9.
Transaction Management
Database Processing: David M. Kroenke’s Chapter Nine: Part Two
Database Administration
Database Processing: David M. Kroenke’s Chapter Nine: Part Two
Presentation transcript:

Database Administration Part 2 Chapter Six CSCI260 Database Applications

2 Chapter Objectives Understand the need for and importance of database administration Understand the need for and importance of database administration Learn different ways of processing a database Learn different ways of processing a database Understand the need for concurrency control, security, and backup and recovery Understand the need for concurrency control, security, and backup and recovery Learn typical problems that can occur when multiple users process a database concurrently Learn typical problems that can occur when multiple users process a database concurrently Understand the use of locking and the problem of deadlock Understand the use of locking and the problem of deadlock Understand the use of locking and the problem of deadlock Understand the use of locking and the problem of deadlock

3 Chapter Objectives (continued) Learn the difference between optimistic and pessimistic locking Learn the difference between optimistic and pessimistic locking Know the meaning of ACID transaction Know the meaning of ACID transaction Learn the four 1992 ANSI standard isolation levels Learn the four 1992 ANSI standard isolation levels Understand the need for security and learn a generalized model of database security Understand the need for security and learn a generalized model of database security Know the difference between DBMS and application security Know the difference between DBMS and application security Know the difference between recovery via reprocessing and recovery via rollback/rollforward Know the difference between recovery via reprocessing and recovery via rollback/rollforward

4 Chapter Objectives (continued) Understand the nature of the tasks required for recovery using rollback/rollforward Understand the nature of the tasks required for recovery using rollback/rollforward Know basic administrative and managerial DBA functions Know basic administrative and managerial DBA functions

5 Database Security Database Security strives to ensure: Database Security strives to ensure: –Only authorized users –Perform authorized activities –At authorized times

6 Admin Asst: Read, Insert and change data in all tables. ONLY delete from SEMINAR-CUSTOMER (un-enroll customer from seminar) and LINE-ITEM (take item off order). Management: Take all actions except delete customers. Never want to delete a customer. Sys Admin: Only define permissions. No other rights. Not a user, no need to change data.

7 Database Security Guidelines Run the DBMS behind a firewall Run the DBMS behind a firewall –No access outside of organization –Problem with e-commerce applications –Still protect all non-e-commerce activities Apply the latest operating system and DBMS service packs and patches Apply the latest operating system and DBMS service packs and patches –Spring 2003 Slammer worm exploited security hole in SQL Server –MS published patch eliminating hole, for those who applied it

8 Database Security Guidelines Limit DBMS functionality to needed features Limit DBMS functionality to needed features –Remove extra communication protocols –Remove pre-packaged stored procedures Protect the computer that runs the DBMS Protect the computer that runs the DBMS –No one should use or access this computer –Keep behind locked and logged doors Manage accounts and passwords Manage accounts and passwords

9 Processing Rights and Responsibilities Processing rights define who is permitted to do what, when Processing rights define who is permitted to do what, when The individuals performing these activities have full responsibility for the implications of their actions The individuals performing these activities have full responsibility for the implications of their actions Individuals are identified by a username and a password Individuals are identified by a username and a password

10 DBMS Security (Granting Permissions) Database users are known as an individual and as a member of one or more role Database users are known as an individual and as a member of one or more role Granting access and processing rights/privileges may be granted to an individual and/or a role Granting access and processing rights/privileges may be granted to an individual and/or a role Users possess the compilation of rights granted to the individual and all the roles for which they are members Users possess the compilation of rights granted to the individual and all the roles for which they are members

11 Application Security Beyond providing generic access limitations to users, an application may introduce specific access rights for particular users. Beyond providing generic access limitations to users, an application may introduce specific access rights for particular users.

12 A Model of DBMS Security

13 Database Backup and Recovery Common causes of database failures… Common causes of database failures… –Hardware failures –Programming bugs –Human errors/mistakes –Malicious actions Since these issues are impossible to completely avoid, recovery procedures are essential Since these issues are impossible to completely avoid, recovery procedures are essential

14 Database Backup and Recovery First – business functions must continue. First – business functions must continue. –Customer orders, financial transactions, packing lists – all completed manually Second – system must be restored to usable stage ASAP and as close as possible to what it was when it crashed Second – system must be restored to usable stage ASAP and as close as possible to what it was when it crashed Third – users must be notified when system back online Third – users must be notified when system back online –Some data may need to be re-entered

15 Recovery via Reprocessing In reprocessing, all activities since the backup was performed are redone In reprocessing, all activities since the backup was performed are redone This is a brut-force technique This is a brut-force technique This procedure is costly in the effort involved in re-entering the data This procedure is costly in the effort involved in re-entering the data This procedure is risky in that human error is likely and in that paper record-keeping may not be accurate This procedure is risky in that human error is likely and in that paper record-keeping may not be accurate

16 Recovery via Rollback and Rollforward Most database management systems provide a mechanism to record activities into a log file Most database management systems provide a mechanism to record activities into a log file

17 Rollforward Activities recorded in the log files may be replayed. In doing so, all activities are re- applied to the database Activities recorded in the log files may be replayed. In doing so, all activities are re- applied to the database This procedure is used to resynchronize restored database data This procedure is used to resynchronize restored database data This procedure is termed a Rollforward This procedure is termed a Rollforward

18 Rollback Since log files save activities in sequence order, it is possible to undo activities in reverse order that they were originally executed Since log files save activities in sequence order, it is possible to undo activities in reverse order that they were originally executed This is performed to correct/undo erroneous or malicious transaction(s) This is performed to correct/undo erroneous or malicious transaction(s) This procedure is known as a Rollback This procedure is known as a Rollback

Database Administration End of Presentation on Chapter Six

Due Monday December 11 9am, in the classroom Be ready to demo your entire database! Final Project for CSCI260