Database Management: Recovery, Concurrency, and More

Classified in Computers

Written on in English with a size of 2.78 KB

Database Management Essentials

Data Recovery

Recovery: Recover data from the sources of error mentioned above. Restoring the database to its normal state is the responsibility of the DBA, who is responsible for implementing the procedures for error detection and recovery.

The DBA is the one with the centralized control of the database. This reduces the number of people who have access to technical and design details for the operation of DBMS.

Concurrency Control

Concurrency: It occurs in a multi-user environment when multiple users try to access the same data object at the same time.

Concurrency occurs when the system is multi-user and does not make adequate controls to synchronize the processes that affect the database. This is commonly referred to as little or no effectiveness of lockout.

Data Granularity

Granularity is the size of the insured units. For example, granularity can protect a field, record, etc.

Deadlock

Deadlock is a technique that avoids concurrency errors. It occurs when we develop a circular wait between two transactions, and each of these requests an update on the same file. It prevents other users from accessing the resource until the end of the process, resulting in the expected circular wait.

Database Outline

Outline: Create the original database schema and generate the data dictionary through DDL propositions.

Storage Structures

Storage structures: Responsible for generating selected secondary structures for the environment and defining the methods of access to information, the latter by means of propositions in DML.

Change Layout and Organization

Change layout and organization: Redesigning the layout of the database is a rare activity. This would be necessary before an abrupt change of the original conditions that gave rise to the primary schema design. Proposals to carry out this task are performed in DDL.

Grant Access Permissions

Grant access permissions: Responsible for registering users to allow access to the DBMS. Assign each a number of attributes that allow you to enjoy privileges such as access to certain areas of application, data, or use of system resources.

Specifying Integrity Constraints

Specifying integrity constraints: Create a series of tables which specify the set of restrictions that will apply during the upgrade process.

Data Backup

Backup: Log files (transaction log)

Daily transactions are recorded in the database. When a problem occurs, we turn to the log files, which are reversible and can also retrieve the last transaction that was made.

Related entries: