© 2002 by Prentice Hall 1 Database Administration David M. Kroenke Database Concepts 1e Chapter 6 6.

Slides:



Advertisements
Similar presentations
Chapter 12 Managing Multi-user Databases David M. Kroenke Database Processing © 2000 Prentice Hall.
Advertisements

Database Administration Chapter Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 4 th Edition.
Database Systems, 8 th Edition Concurrency Control with Time Stamping Methods Assigns global unique time stamp to each transaction Produces explicit.
Database Administration Chapter Six DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
Transaction Management and Concurrency Control
Prentice Hall © COS 346 Day Agenda Questions? Assignment 8 Due Assignment 9 posted –Due April 2:05 PM Quiz 2 Today –SQL Chaps 2-19.
10 1 Chapter 10 Transaction Management and Concurrency Control Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Transaction Management and Concurrency Control
Transaction Management and Concurrency Control
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 4-1 David M. Kroenke Database Processing Chapter 9 Managing Multi- User.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 COS 346 Day 19.
© 2002 by Prentice Hall 1 SI 654 Database Application Design Winter 2003 Dragomir R. Radev.
© 2002 by Prentice Hall 1 SI 654 Database Application Design Winter 2004 Dragomir R. Radev.
© 2002 by Prentice Hall 1 David M. Kroenke Database Processing Eighth Edition Chapter 11 Managing Multi-User Databases.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 8-1 COS 346 Day 18.
Database Administration Part 2 Chapter Six CSCI260 Database Applications.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 COS 346 Day 19.
Database Administration
Database Administration Chapter Six DAVID M. KROENKE and DAVID J. AUER DATABASE CONCEPTS, 6 th Edition.
9 Chapter 9 Transaction Management and Concurrency Control Hachim Haddouti.
Database Administration Part 1 Chapter Six CSCI260 Database Applications.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
Transaction Management and Concurrency Control
1 IT420: Database Management and Organization Transactions 31 March 2006 Adina Crăiniceanu
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Database Administration
DBSQL 7-1 Copyright © Genetic Computer School 2009 Chapter 7 Transaction Management, Database Security and Recovery.
Multi-user Database Processing Architectures Architectures Transactions Transactions Security Security Administration Administration.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 9-1 Managing Multiuser Databases.
BIS Database Systems School of Management, Business Information Systems, Assumption University A.Thanop Somprasong Chapter # 10 Transaction Management.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases 9-1 KROENKE.
1 IRU Concurrency, Reliability and Integrity issues Geoff Leese October 2007 updated August 2008, October 2009.
1 IT420: Database Management and Organization Session Control Managing Multi-user Databases 24 March 2006 Adina Crăiniceanu
11/7/2012ISC329 Isabelle Bichindaritz1 Transaction Management & Concurrency Control.
Concurrency Control. Objectives Management of Databases Concurrency Control Database Recovery Database Security Database Administration.
Transactions and Locks A Quick Reference and Summary BIT 275.
Database Processing: Fundamentals, Design, and Implementation, 9/e by David M. KroenkeChapter 9/1 Copyright © 2004 Please……. No Food Or Drink in the class.
Fundamentals, Design, and Implementation, 9/e Chapter 9 Managing Multi-User Databases.
© 2002 by Prentice Hall 1 David M. Kroenke Database Processing Eighth Edition Chapter 12 Managing Databases with Oracle.
1 IT420: Database Management and Organization Managing Multi-user Databases 29 March 2006 Adina Crăiniceanu
© 2006 ITT Educational Services Inc. Course Name: IT390 Business Database Administration Unit 8 Slide 1 IT 390 Business Database Administration Unit 8:
KROENKE and AUER - DATABASE CONCEPTS (3 rd Edition) © 2008 Pearson Prentice Hall 6-1 Chapter Objectives Understand the need for and importance of database.
Chapter 20 Transaction Management Thomas Connolly, Carolyn Begg, Database System, A Practical Approach to Design Implementation and Management, 4 th Edition,
David M. Kroenke and David J. Auer Database Processing: F undamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases 9-1 KROENKE.
Managing Multi-User Databases. Mutli-User Issues n Concurrency Control n Database Reliability n Database Security n Database Administration.
Module 11: Managing Transactions and Locks
9 1 Chapter 9_B Concurrency Control Database Systems: Design, Implementation, and Management, Rob and Coronel.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
10 Transaction Management and Concurrency Control MIS 304 Winter 2005.
3 Database Systems: Design, Implementation, and Management CHAPTER 9 Transaction Management and Concurrency Control.
10 1 Chapter 10 - A Transaction Management Database Systems: Design, Implementation, and Management, Rob and Coronel.
Module 14: Managing Transactions and Locks. Overview Introducing Transactions and Locks Managing Transactions Understanding SQL Server Locking Architecture.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Nine: Managing Multiuser Databases.
Chapter 5 Managing Multi-user Databases 1. Multi-User Issues Database Administration Concurrency Control Database Security Database Recovery Page 307.
Chapter 13 Managing Transactions and Concurrency Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
CSC314 Day 16 Transaction processing Concurrency Control 1.
David M. Kroenke and David J
Transaction Management and Concurrency Control
Database Administration
Chapter 9 Managing Multi-User Databases
Multi-User Databases Chapter 9.
Transaction Management
Database Processing: David M. Kroenke’s Chapter Nine: Part One
Database Processing: David M. Kroenke’s Chapter Nine: Part Two
Chapter 10 Transaction Management and Concurrency Control
Introduction of Week 13 Return assignment 11-1 and 3-1-5
Database Administration
Database Processing: David M. Kroenke’s Chapter Nine: Part Two
Presentation transcript:

© 2002 by Prentice Hall 1 Database Administration David M. Kroenke Database Concepts 1e Chapter 6 6

© 2002 by Prentice Hall2 Chapter Objectives Understand the need for and importance of database administration Learn different ways of processing a database Understand the need for concurrency control, security, and backup and recovery Learn typical problems that can occur when multiple users process a database concurrently

© 2002 by Prentice Hall3 Chapter Objectives (continued) Understand the use of locking and the problem of deadlock Learn the difference between optimistic and pessimistic locking Know the meaning of ACID transaction Learn the four 1992 ANSI standard isolation levels Understand the need for security and learn a generalized model of database security

© 2002 by Prentice Hall4 Chapter Objectives (continued) Know the difference between DBMS and application security Know the difference between recovery via reprocessing and recovery via rollback/rollforward Understand the nature of the tasks required for recovery using rollback/rollforward Know basic administrative and managerial DBA functions

© 2002 by Prentice Hall5 Database Processing Environment A database processing environment is complicated and multi-faceted –Multiple users –Multiple queries –Multiple forms –Multiple reports –Multiple application programs

© 2002 by Prentice Hall6 Processing Constraints Enforcing referential integrity Cascading deletion Cascading modifications Data type constraints Data size constraints Data value constraints Null constraints Uniqueness constraints

© 2002 by Prentice Hall7 Internet Application Processing Internet Application Processing is more complicated than traditional application processing Specifically, with Internet Application Processing … –The network becomes an integral part of the application

© 2002 by Prentice Hall8 Concurrency Control Concurrency control ensures that one user’s actions do not adversely impact another user’s actions At the core of concurrency is accessibility. In one extreme, data becomes inaccessible once a user touches the data. This ensures that data that is being considered for update is not shown. In the other extreme, data is always readable. The data is even readable when it is locked for update.

© 2002 by Prentice Hall9 Concurrency Control (continued) Interdependency –Changes required by one user may impact others Concurrency –People or applications may try to update the same information at the same time Record retention –When information should be discarded Backup/Recovery –How to protect yourself from losing critical information

© 2002 by Prentice Hall10 Need for Atomic Transactions A database operation typically involves several transactions. These transactions are atomic and are sometimes called logical units of work (LUW). Before an operation is committed to the database, all LUWs must successfully complete. If one or more LUW is unsuccessful, a rollback is performed and no changes are saved to the database.

© 2002 by Prentice Hall11 Enforcing Constraints through Triggers A trigger is a stored procedure that is automatically invoked by the DBMS when a specified activity occurs

© 2002 by Prentice Hall12 Lost Update Problem If two or more users are attempting to update the same piece of data at the same time, it is possible that one update may overwrite another update.

© 2002 by Prentice Hall13 Concurrency Issues Dirty reads –The transaction reads a changed record that has not been committed to the database Inconsistent reads –The transaction re-reads a data set and finds that the data has changed Phantom reads –The transaction re-reads a data set and finds that a new record has been added

© 2002 by Prentice Hall14 Resource Locking To avoid concurrency issues, resource locking will disallow transactions from reading, modifying, and/or writing to a data set that has been “locked”

© 2002 by Prentice Hall15 Implicit versus Explicit Resource Locking Implicit locks are issued automatically by the DBMS based on an activity Explicit locks are issued by users requesting exclusive rights to the data

© 2002 by Prentice Hall16 Serializable Transactions (Two-Phased Locking) Two-phased locking, whereby locks are obtained as they are needed –A growing phase, whereby the transaction continues to request additional locks –A shrinking phase, whereby the transaction begins to release the locks

© 2002 by Prentice Hall17 Deadlock As a transaction begins to lock resources, it may have to wait for a particular resource to be released by another transaction On occasions, two transactions may indefinitely wait on each another to release resources. This condition is known as a deadlock or a deadly embrace

© 2002 by Prentice Hall18 Optimistic versus Pessimistic Locking Optimistic Locking –Read data –Process transaction –Issue update –Look for conflict –If conflict occurred, rollback and repeat –Else commit Pessimistic Locking –Lock required resources –Read data –Process transaction –Issue commit –Release locks

© 2002 by Prentice Hall19 Consistent Transactions Consistent transactions are often referred to by the acronym ACID –Atomic –Consistent –Isolated –Durable

© 2002 by Prentice Hall20 ACID: Atomic A transaction consists of a series of steps. Each step must be successful for the transaction to be saved This ensures that the transaction completes everything it intended to do before saving the changes

© 2002 by Prentice Hall21 ACID: Consistent No other transactions are permitted on the records until the current transaction finishes This ensures that the transaction integrity has statement level consistency among all records

© 2002 by Prentice Hall22 ACID: Isolation Within multiuser environments, different transactions may be operating on the same data As such, the sequencing of uncommitted updates, rollbacks, and commits continuously change the data content

© 2002 by Prentice Hall23 ACID: Durable A durable transaction is one in which all committed changes are permanent

© 2002 by Prentice Hall24 Database Security Database Security strives to ensure: –Only authorized users –Perform authorized activities –At authorized times

© 2002 by Prentice Hall25 Processing Rights and Responsibilities Processing rights define who is permitted to do what, when The individuals performing these activities have full responsibility for the implications of their actions Individuals are identified by a username and a password

© 2002 by Prentice Hall26 DBMS Security (Granting Permissions) Database users are known as an individual and as a member of one or more role Granting access and processing rights/privileges may be granted to an individual and/or a role Users possess the compilation of rights granted to the individual and all the roles for which they are members

© 2002 by Prentice Hall27 Application Security Beyond providing generic access limitations to users, an application may introduce specific access rights for particular users.

© 2002 by Prentice Hall28 Database Backup and Recovery Common causes of database failures… –Hardware failures –Programming bugs –Human errors/mistakes –Malicious actions Since these issues are impossible to completely avoid, recovery procedures are essential

© 2002 by Prentice Hall29 Backup versus Reprocessing This is a brunt-force technique Simply re-type all activities since the backup was performed This procedure is costly in the effort involved in re-entering the data This procedure is risky in that human error is likely and in that paper record- keeping may not be accurate

© 2002 by Prentice Hall30 Recovery via Rollback and Rollforward Most database management systems provide a mechanism to record activities into a log file

© 2002 by Prentice Hall31 Rollforward Activities recorded in the log files may be replayed. In doing so, all activities are re-applied to the database This procedure is used to resynchronize restored database data This procedure is termed a Rollforward

© 2002 by Prentice Hall32 Rollback Since log files save activities in sequence order, it is possible to undo activities in reverse order that they were originally executed This is performed to correct/undo erroneous or malicious transaction(s) This procedure is known as a Rollback

© 2002 by Prentice Hall 33 Database Administration David M. Kroenke Database Concepts 1e Chapter 6 6