Top Banner
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: presentation
Page 2: presentation

Part V: Data Administration

Chapter 13: Data and Database Administration

Chapter 14: Data Warehouse

Page 3: presentation

Chapter 13: Data and Database Administration

Data Administrator

Database Administrator

Modeling and Planning Enterprise Data

Data Security

Backup

Concurrent Access

Data Quality

Page 4: presentation

Data Administrator

Custodian of the organization’s dataDevelops procedures to protect and control data

resourceMaintains corporate-wide data definitions and

standardsFunctional responsibilities: planning, analysis, design,

implementation, maintenance, protectionShould be a respected, senior-level middle managerRequires a high level of managerial and technical skills

Page 5: presentation

Database Administrator

Responsible for physical database design and technical issues

Carries through the standards and procedures established by data administrator

Broad technical backgroundManagerial skills are also critical

Page 6: presentation

Corporate Data Management

Functions:data policies, procedures, and standardsplanningdata conflict resolutioninternal marketingmanaging the data repositoryselection of hardware and softwaremanaging data security, privacy, and integritydata backup and recovery

Page 7: presentation

Modeling Enterprise Data

Enterprise architecture: “that set of descriptive representations that are relevant for describing an enterprise such that it can be produced to management’s requirements and maintained over the period of its useful life.”

The conceptual data model must mesh with …business process modelbusiness network logisticswork flow modelsenterprise master scheduleenterprise business plan

Page 8: presentation

Planning for Databases

What data will be included?What processes will the system perform?What business locations will the system

affect?What work units and people will be affected

by the system?How will the system fit with significant

business effects?

Page 9: presentation

Managing Data Security

Threats to data securityaccidental: human, software, hardware errortheft and fraudloss of privacy or confidentialityloss of data integrityloss of availability

Data security planlimit access (4 methods)conceal datafacilitate recovery

Page 10: presentation

Security: Views

Presents only data to which a user needs access

Always shows current dataMore sophisticated security measures are

normally required

Page 11: presentation

Security: Authorization Rules

Restrict access to dataRestrict actions that may be takenAuthorization tables for subjects (users)Authorization tables for objects (data)

Page 12: presentation

Security: User-Defined Procedures

For example, a series of questions

Security: Encryption

Security: Authentication Schemes

Page 13: presentation

Database Recovery

Backup facilitiesstatic data … dynamic data … incremental backup

Journalizing facilitiestransaction log … before-image … after-image

Checkpoint facilityprovides known state from which recovery can be

done

Recovery manager

Page 14: presentation

Recovery and Restart Procedures

Switch (mirrored database)Restore/Rerun: reprocess transactionsTransaction integrity

commit or abortbackward recovery – rollback – undo transactionsforward recovery -- rollforward – apply

transactions

Page 15: presentation

Concurrent Access

Pessimistic: lockingOptimistic: versioningReading

no concurrency issues

Writingincompatible updatesinaccurate data read by another

Page 16: presentation

Locking Mechanisms

Locking level (granularity)database … table … block/page … record … fieldshared locksexclusive locks

Deadlocksprevention by lock all at starttwo-phase: lock all, then releaseresolution: backout transactions

Page 17: presentation

Versioning

Only one user may make changesOther users restricted from changing, must

restart

Page 18: presentation

Managing Data Quality

Security policy and disaster recoveryPersonnel controlsPhysical access controlsMaintenance controlsData protection and privacy

Page 19: presentation

Chapter 14: Data Warehouse

Data Warehouse Architecture

Data Characteristics

Reconciled Data Layer

Data Transformation

Derived Data Layer

User Interface

Page 20: presentation

Two Types of Processing

Operational processingcaptures, stores, and manipulates data to support daily

operations

Informational processinganalysis of summarized data to support decision

making

Data warehouses consolidate and integrate information from many

different sources and arrange it in a meaningful format for making accurate business decisions

Page 21: presentation

Data Warehouse Architectures

Two-level architecturesource files …

read-only data warehouse

Three-level architecturesource files …

enterprise data warehouse (reconciled data) … data mart (derived data)

Page 22: presentation

Data Characteristics

Status vs. event databalance vs. transaction

Transient vs. periodic datacurrent balance vs. balance history

Page 23: presentation

Reconciled Data Layer

Used to build data warehouseCharacteristics of reconciled data

detailedhistoricalnormalizedcomprehensivequality controlled

Capture Scrub Transform Load

Page 24: presentation

Derived Data Layer

Data that have been selected, formatted, and aggregated

Star schemadimension table: “demographic data”fact table: “associative data” – often summarized

Page 25: presentation

User Interface

Traditional query and reporting toolsOn-line analytical processing (OLAP)

cube slicingdrill-down

Data miningexplanatoryconfirmatoryexploratory

Data visualization

Page 26: presentation