(C) 2000, The University of Michigan 1 Database Application Design Handout #8 February 25, 2000.

Slides:



Advertisements
Similar presentations
Chapter 12 Managing Multi-user Databases David M. Kroenke Database Processing © 2000 Prentice Hall.
Advertisements

Database Administration Chapter Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 4 th Edition.
Transaction.
Module 15: Managing Transactions and Locks. Overview Introduction to Transactions and Locks Managing Transactions SQL Server Locking Managing Locks.
Database Administration Chapter Six DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
Transaction Management and Concurrency Control
Fundamentals, Design, and Implementation, 9/e SI654 Database Application Design Instructor: Dragomir R. Radev Winter 2005.
Transaction Management and Concurrency Control
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 COS 346 Day 19.
Database Processing: Fundamentals, Design, and Implementation, 9/e by David M. KroenkeChapter 15/1 Copyright © 2004 Please……. No Food Or Drink in the class.
1 9 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 9 Database Management Approaches.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 8-1 COS 346 Day 18.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 COS 346 Day 19.
Fundamentals, Design, and Implementation, 9/e COS 346 Day 25.
Database Administration
Database Administration Chapter Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
The University of Akron Dept of Business Technology Computer Information Systems Database Management Approaches 2440: 180 Database Concepts Instructor:
Database Administration Part 1 Chapter Six CSCI260 Database Applications.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
Managing Transaction and Lock Vu Tuyet Trinh Hanoi University of Technology 1.
Managing Multi-User Databases AIMS 3710 R. Nakatsu.
(C) 2000, The University of Michigan 1 Database Application Design Handout #3 January 21, 2000.
Database Administration
Multi-user Database Processing Architectures Architectures Transactions Transactions Security Security Administration Administration.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 Managing Multiuser Databases.
(C) 2000, The University of Michigan 1 Database Application Design Handout #4 January 28, 2000.
Introduction to Database Management Systems. Information Instructor: Csilla Farkas Office: Swearingen 3A43 Office Hours: Monday, Wednesday 4:15 pm – 5:30.
Chapter 14 Sharing Enterprise Data David M. Kroenke Database Processing © 2000 Prentice Hall.
Chapter 15 Relational Implementation with DB2 David M. Kroenke Database Processing © 2000 Prentice Hall.
Fundamentals, Design, and Implementation, 9/e by David M. Kroenke Lecture 23: Sharing Enterprise Data Chapter 15 BSA206 Database Management Systems.
(C) 2000, The University of Michigan 1 Database Application Design Handout #10 March 17, 2000.
Introduction to Database Management Systems. Information Instructor: Csilla Farkas Office: Swearingen 3A43 Office Hours: M,T,W,Th,F 2:30 pm – 3:30 pm,
CSS/417 Introduction to Database Management Systems Workshop 4.
Unit 9 Transaction Processing. Key Concepts Distributed databases and DDBMS Distributed database advantages. Distributed database disadvantages Using.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases 9-1 KROENKE.
Ch 10: Transaction Management and Concurrent Control.
1 IT420: Database Management and Organization Session Control Managing Multi-user Databases 24 March 2006 Adina Crăiniceanu
(C) 2000, The University of Michigan 1 Database Application Design Handout #7 February 18, 2000.
Database Systems I Content: –How to build a database application –Principles of database-system implementation Instructor: John Sieg Required Text:
Introduction to Database Management Systems. Information Instructor: Csilla Farkas Office: Swearingen 3A43 Office Hours: Monday, Wednesday 2:30 pm – 3:30.
Prentice Hall © COS 346 Day Agenda Questions? Assignment 8 not Corrected yet Assignment 9 posted –Due April 2:05 PM Quiz 2 Corrected.
© 2002 by Prentice Hall 1 Database Administration David M. Kroenke Database Concepts 1e Chapter 6 6.
The Relational Model1 Transaction Processing Units of Work.
1 Principles of Database Systems With Internet and Java Applications Today’s Topic Chapter 15: Reliability and Security in Database Servers Instructor’s.
(C) 2000, The University of Michigan 1 Database Application Design Handout #5 February 4, 2000.
1 IT420: Database Management and Organization Managing Multi-user Databases 29 March 2006 Adina Crăiniceanu
KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall 6-1 Chapter Objectives Understand the need for and importance of database.
(C) 2000, The University of Michigan 1 Database Application Design Handout #2 January 14, 2000.
David M. Kroenke and David J. Auer Database Processing: F undamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases 9-1 KROENKE.
Managing Multi-User Databases. Mutli-User Issues n Concurrency Control n Database Reliability n Database Security n Database Administration.
Introduction to Distributed Databases Yiwei Wu. Introduction A distributed database is a database in which portions of the database are stored on multiple.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
3 Database Systems: Design, Implementation, and Management CHAPTER 9 Transaction Management and Concurrency Control.
© 2002 by Prentice Hall 1 David M. Kroenke Database Processing Eighth Edition Chapter 17 Sharing Enterprise Data.
Module 14: Managing Transactions and Locks. Overview Introducing Transactions and Locks Managing Transactions Understanding SQL Server Locking Architecture.
BACS 485 Multi-User Database Processing. Lecture Objectives Learn the difference between single and multi-user database processing and understand the.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases.
Chapter 5 Managing Multi-user Databases 1. Multi-User Issues Database Administration Concurrency Control Database Security Database Recovery Page 307.
In this session, you will learn to: Implement triggers Implement transactions Objectives.
Chapter 13 Managing Transactions and Concurrency Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition.
Transaction Management and Concurrency Control
Database Administration
Multi-User Databases Chapter 9.
Database Processing: David M. Kroenke’s Chapter Nine: Part One
Database Processing: David M. Kroenke’s Chapter Nine: Part Two
Chapter 10 Transaction Management and Concurrency Control
Database Administration
Chapter 11 Managing Databases with SQL Server 2000
Database Processing: David M. Kroenke’s Chapter Nine: Part Two
Presentation transcript:

(C) 2000, The University of Michigan 1 Database Application Design Handout #8 February 25, 2000

(C) 2000, The University of Michigan 2 Course information Instructor: Dragomir R. Radev Office: 305A, West Hall Phone: (734) Office hours: Thursdays 3-4 and Fridays 1-2 Course page: Class meets on Fridays, 2:30 - 5:30 PM, 311 WH

(C) 2000, The University of Michigan 3 Managing multi-user databases (cont’d)

(C) 2000, The University of Michigan 4 Concurrency control Lax and strict policies Atomic transactions (LUWs = logical units of work) –Example: customer+salesperson Concurrent transaction processing: interlocking Lost update problem

(C) 2000, The University of Michigan 5 Example User A: –Read item 100 –Reduce by 5 –Write item 100 User B: –Read item 200 –Reduce by 3 –Write item 200

(C) 2000, The University of Michigan 6 Resource locking Locks: implicit, explicit Example: two users

(C) 2000, The University of Michigan 7 Example User A: –Lock item 100 –Read item 100 –Reduce by 5 –Write item 100 User B: –Lock item 100 –Read item 100 –Reduce by 3 –Write item 100

(C) 2000, The University of Michigan 8 Example (cont’d) 1. Lock item 100 for A 2. Read item 100 for A 3. Lock item 100 for B; cannot 4. Decrease 100 by 5 5. Write item 100 for A 6. Release A’s lock on Lock item 100 for B 8. Read item 100 for B 9. Decrease item 100 by Write 100 for B 11. Release B’s lock on 100

(C) 2000, The University of Michigan 9 Resource locking Serizalizable transaction –2PL: growing phase, followed by a shrinking phase COMMIT and ROLLBACK DEADLOCKS

(C) 2000, The University of Michigan 10 Transaction isolation levels Exclusive use Repeatable read: mix of shared and exclusive locks Dirty read: for reports which don’t necessarily need to contain the latest data

(C) 2000, The University of Michigan 11 Cursor types Forward only: changes made to earlier records are hidden Static: any changes are hidden Dynamic: all changes are visible

(C) 2000, The University of Michigan 12 Database recovery Reprocessing: uses database saves Rollback/Rollforward : uses transaction logs, before-images, and after-images

(C) 2000, The University of Michigan 13 Database security Users, groups, permissions, objects Permissions: –CONNECT: ALTER SESSION, CREATE TABLE, CREATE VIEW

(C) 2000, The University of Michigan 14 Application security Usually done on the Web server ASP script modifies SQL statement: SELECT * FROM EMPLOYEE

(C) 2000, The University of Michigan 15 Sharing enterprise data

(C) 2000, The University of Michigan 16 Enterprise DB architectures Teleprocessing systems Client-server systems File-sharing systems Distributed database systems: vertical and horizontal fragmentation

(C) 2000, The University of Michigan 17 Comparing distributed DB architectures Unified database Distributed databases Single Nonpartitioned Nonreplicated Partitioned Nonreplicated Nonpartitioned Replicated Partitioned Replicated Increased security risk Increased difficulty of control Increased cost/complexity Increased availability Increased flexibility Increased independence Increased parallelism

(C) 2000, The University of Michigan 18 Problems in downloaded databases Coordination Consistency Access control Computer crime

(C) 2000, The University of Michigan 19 On Line Analytic Processing (OLAP) Hypercubes, axes, dimensions, slices Values of a dimension are called members Levels: hierarchical organization: e.g., date, month, year CROSSJOIN ({Existing Structure, New Construction}, {California.Children, Nevada})

20 OLAP SQL CREATE CUBE HousingSalesCube ( DIMENSION Time TYPE TIME, LEVEL Year TYPE YEAR, LEVEL Quarter TYPE QUARTER, LEVEL Month TYPE MONTH, DIMENSION Location, LEVEL USA TYPE ALL, LEVEL State, LEVEL City, DIMENSION HousingCategory, DIMENSION HousingType, MEASURE SalesPrice, FUNCTION AVG, MEASURE AskingPrice, FUNCTION AVG )

(C) 2000, The University of Michigan 21 KDD: Data Mining

(C) 2000, The University of Michigan 22 Association rules X  Y 65% of all customers who buy beer and tomato sauce also buy pasta and chicken wings Support (X) Confidence (X  Y) = Support(X+Y) / Support (X)

(C) 2000, The University of Michigan 23 Object-oriented data processing

(C) 2000, The University of Michigan 24 Introduction OOP objects: encapsulated structures with attributes and methods Interface + implementation Inheritance Polymorphism Transient and persistent objects

(C) 2000, The University of Michigan 25 Final project guidelines

26 Checklist Introduction User interviews/needs: table, reports, queries, forms Initial data model ER model Decomposition SQL code Documentation Evaluation, Future work Schedule Sustainability Snapshots Presentation Demo

(C) 2000, The University of Michigan 27 Grading Project: 40% - design 10% - implementation 10% - documentation 10% - presentation+demo 10%

(C) 2000, The University of Michigan 28 Readings for next time Kroenke –Chapter 14: Sharing Enterprise Data –Chapter 17: Object-Oriented Database Processing YRK (optional) –Chapter 14: Java and JDBC