The document discusses several key database administration topics including:
1) Database design which involves transforming logical data models into physical implementations useful for applications and clients.
2) Performance monitoring and tuning which involves analyzing workloads, throughput, optimization, and resource conflicts.
3) Ensuring database availability by keeping the DBMS running with automatic alerts and minimal disruptions during maintenance.
4) Security measures to ensure only authorized users can access data to prevent breaches.
5) Backup and recovery procedures to restore data if failures occur through current state recovery or point-in-time recovery.
The document discusses several key database administration topics including:
1) Database design which involves transforming logical data models into physical implementations useful for applications and clients.
2) Performance monitoring and tuning which involves analyzing workloads, throughput, optimization, and resource conflicts.
3) Ensuring database availability by keeping the DBMS running with automatic alerts and minimal disruptions during maintenance.
4) Security measures to ensure only authorized users can access data to prevent breaches.
5) Backup and recovery procedures to restore data if failures occur through current state recovery or point-in-time recovery.
The document discusses several key database administration topics including:
1) Database design which involves transforming logical data models into physical implementations useful for applications and clients.
2) Performance monitoring and tuning which involves analyzing workloads, throughput, optimization, and resource conflicts.
3) Ensuring database availability by keeping the DBMS running with automatic alerts and minimal disruptions during maintenance.
4) Security measures to ensure only authorized users can access data to prevent breaches.
5) Backup and recovery procedures to restore data if failures occur through current state recovery or point-in-time recovery.
Able to transform logical data model into physical database implementation
Useful db for app and clients user.
Performance Monitoring and Tuning 5-Facts: Workload: combine of online transactions (ad hoc)(warehousing) directed through the system at any given time Throughput: capability of the computer hardware and software to process data Optimization: analysis of db req with query cost to generate efficient access paths to data Conflict: 2 or more workloads are attempting to use a single resource
Database Availability Keeping the DBMS up and running Automatic alerts to warn DBMS Can maintain with min disruptions
Security To ensure the data is only available to authorized users for prevent security breaches.
Backup and Recovery DBA must prepared to recover data if there are a problem can cause the system failure
Recover to current: back db to current state at time of failure Point-in-time recovery: remove the effects of all transactions
Data Integrity Database must design to store correct data in correct way without damage or corrupt. Physical: domains and data types Semantic: quality of the data Internal: maintain links, pointers, and identifiers
Release Migration DBA must prepared to recover data if there are a problem can cause the system failure
Recover to current: back db to current state at time of failure Point-in-time recovery: remove the effects of all transactions