Database Integrity Mechanism between OLTP and Offline Data
|
|
|
- Ferdinand Houston
- 10 years ago
- Views:
Transcription
1 Database Integrity Mechanism between OLTP and Offline Data Muhammad Salman 1, Nafees Ur Rehman 2, and Muhammad Shahid 3 1 Graduate School of Engineering Sciences & Information Technology, Hamdard University Karachi-75400, Pakistan 2 Department of Computer & Information Sciences, University of Konstanz, P.O. Box. D-188, Germany 3 Department of Computer & Information Technology, Pakistan International Airline Karachi-75200, Pakistan {msalman_74,muhammadshahid}@hotmail.com, [email protected] Abstract. This paper describes integrity mechanism between OLTPs and offline data. Normally every RDBMS supports five Integrity Constraints (ICs) namely primary key or composite key, unique key, foreign key, not null and check constraints. Online database integrity is achieved through these five ICs. However, as per the retention period data is backed up and removed from the OLTPs for space and performance efficiency. But there is no standardized protocol on keeping integrity between offline data and data present in the OLTPs. Therefore, we present a solution to address the problem of offline data integrity by keeping a representative set of purged data & ICs in the online database to ensure data integrity between OLTPs and offline data. We further support our proposed solution with the help of two types of integrity tests i.e., sufficient and complete test. Keywords: Integrity Constraints, OLTPs Performance, Offline Data. 1 Introduction The word integrity is derived from Latin adjective integer (whole, complete). In this context, integrity is the sense of wholeness. Integrity is a concept of consistency of actions, values, methods, measures, principles, expectation and outcomes [1]. Similarly database integrity means keeping your data accurate, consistent and valid. It is achieved by preventing accidental or deliberate but unauthorized insertion, modification or destruction of data in a database. Online database integrity is achieved by integrity constraints. So in order to improve OLTPs performance we have to implement certain retention policy and offline backup will be taken as per the retention policy. And then that particular set of data will be removed from OLTPs. Unfortunately, not that much work has been done to maintain offline data integrity in such a scenario. To explain the problem, consider a database schema containing tables namely Customer, Product, Order and etc. The size of data in Order table, let s assume, is 50GB. Therefore, we have to implement certain retention policy and offline backup will be taken as per the retention policy. Finally, this particular set of data will be J.-S. Pan, S.-M. Chen, N.T. Nguyen (Eds.): ACIIDS 2012, Part II, LNAI 7197, pp , Springer-Verlag Berlin Heidelberg 2012
2 372 M. Salman, N.U. Rehman, and M. Shahid deleted from online Order table. However, any DML operation on Order table would challenge the data integrity of the offline data as there is no communication with the running OLTPs and the backed up offline data. 2 Related Work Let us present a summary of few related works in this section. In [2], an integrity subsystem for RDBMS has been discussed, and it shows how integrity is different from the other important area of security, consistency, and reliability. The integrity subsystem reacts as guards that prevent database against unauthorized insertion, modification or destruction of data in a database, and data accurately stored in database. [3] Introduces schema integration process. Schema integration is an important step in the database integration, and deal with integrity constraints problems. The knowledge about the correspondences between integrity constraints and extensional assertions must be known in the schema integration process, and handle all issues of database integrity at schema level in the distributed environment. [4] Explains the active integrity constraints (AICs) with consistent database. An active integrity constraint is a special constraint which is maintained database integrity for all DML operations. DML operation would be generated constraints violation while data already available in database. Otherwise, DML operations are allowed. [5] Maintains database integrity during updating process has been explained. It means that, multiple users access online database concurrently. If one user performs update query on particular record set during this process other users cannot perform update query on that particular record set until first user performs commit or rollback transaction on that particular record set. [6] This paper describes database integrity patterns. Actually vendors of RDBMS (Relational Database Management System) are quite high, but number of available solutions to active database integrity is limited. The solutions to avoid RDBMS integrity problems can be formalized as a pattern language. Integrity patterns were defined in the form of constraints, locking, and transactions. [7] Explains the process of database integrity for synthetic vision system (SVS). Synthetic vision system provides information to cockpit crew with whether a heads down display and heads up display. HDD and HUP containing aircraft state guidance, navigation information, and weather condition. So therefore all information depends upon database integrity. It is very essential for the safety. In [8], a solution for maintenance of database integrity in the replication environment is presented. The previous version of this paper presented a method for replication through 1-copy serialability. The new version of this paper is suggested replication process through snapshot isolation (SI). SI controls all issues of database integrity.si takes copy of data from active database and only updates that data which is changed in the active database. This method is improved performance of replication process and maintained database integrity. Most of modern all RDBMSs support SI through materialized view (stored snapshot of data).
3 Database Integrity Mechanism between OLTP and Offline Data 373 In [9], authors discussed schema integration in the entity relationship model (ERM). Schema integration is achieved through three steps. That is, first, finds out ambiguities of integrity constraints in the integration process and solved; second, schemas are merged; third restructure integrated schema according to specific goal. The above mentioned research papers describes solution of various online database integrity problems and contributed further enhancement in this direction. None of these directly deal with the problem of online database integrity with offline data. Now we present a solution to this problem in the following sections. 3 Method to Achieve Integrity To achieve offline data integrity, the two following approaches have been proposed: Offline data integrity at record level Offline data integrity on batch mode 3.1 Offline Data Integrity at Record Level Offline data integrity at record level is achieved through RDBMS trigger. In this technique, as per retention policy (i.e., when there are large amounts of data)) we took the online database backup and stored representative subset of backup data that consists of primary key or composite key, unique key and foreign key values and finally removed backup data from the OLTPs. Afterwards, before a new record is inserted or unique values of the existing records are updated, this is first verified for any integrity violation against the representative subset of backed up data stored in the online database system. In case of a violation, insertion or updation is rejected and integrity validation exception is raised. Otherwise, DML operations in the online database are allowed. Similarly in the foreign key case, when we insert new record into tables then first it is checked against online database subsets (foreign key) for integrity violations. And similarly if there is a violation it raises an exception and DML operation is disallowed. Otherwise, the change takes effect and DML operations are performed in the online database system. 3.2 Offline Data Integrity on Batch Mode Integrity verification for each tiny change results in comparatively huge process and effect the performance of OLTPs. To control this problem, we suggest a method where we temporarily allow data in the OLTPs and ignore integrity violation just to provide for better performance in the OLTPs. Instead of checking integrity for each row, we do it in batch mode. It can be done on the off-hours of the day or at a particular time as deemed appropriate. The logic goes into a stored procedure to check integrity in batch mode. In this method, as per retention policy (i.e., when there are large amounts of data) we took the online database backup and stored representative subset of backup data that consists of primary key or composite key, unique key and foreign key values and finally removed backup data from the database. In this case, insertion of new
4 374 M. Salman, N.U. Rehman, and M. Shahid records into tables or updating of the existing values is allowed. Later, at the appropriate time, the stored procedure is invoked and is executed in a manner ignoring values with no conflicts but reporting records that are in integrity violation. 3.3 Logical Design of Integrity Mechanism between Online System and Offline Data The Fig 1 explains the process of our solution. As per retention policy we take the backup of online database and store representative subset of backup data in the online database and finally remove backup data from the database. When a user performs insert or update query on the online database then on first step the query is validated by representative subset of data that is offline data. If a record or tuple primary or composite key, unique key values are matched with a representative subset of data then a transaction is aborted from the database. Otherwise, query is allowed on the online database. Similarly if the new updated value for foreign key in OLTP matches a foreign key value in the representative subset of data then the transaction is allowed. Otherwise, constraint violation exception is raised. Step 1 Step 2 Step 3 Online Database Backup data as per retention policy Take a representative set of data in the online database Delete Backup data from online database Integrity mechanism between OLTP and offline data Transactions Fig. 1. Integrity mechanism between OLTPs & offline data 3.4 Program Code Trigger Level Checking Integrity Constraints and Tests In the trigger code, first we select all keys values (primary key, unique Key, foreign key) from offline data set which is available in the online database. When new transaction is inserted or updated then at time check value against the selected primary and unique keys values. If value is already available then exception is
5 Database Integrity Mechanism between OLTP and Offline Data 375 generated otherwise transaction is performed. Similarly in the foreign key case, new transaction foreign key value is checked against the selected foreign key values. If current transaction value is matched then transaction is performed otherwise, transaction generated the exception. Input: List of integrity constraints primary key PK, unique key UK, foreign key FK from Representative set of data (Offline Data) Output: Valid transaction performed or aborts transaction (if available in the offline data) Store the begin time in the Tri_Result table For each j in Off-Transaction loop Invoke sufficient test If current_value.pk is equal to j.pk and Current_value.UK is equal to j.uk then Action: Abort current transaction from the database; Else Action: Complete test is performed & DML T Done; For each k in Off-Transaction loop Invoke sufficient test If current_value.fk is equal to k.fk then Action: DML T Done; Else Action: Complete test is performed & Abort Current Transaction; Action: Store the end time in the Tri_Result table; Procedure Level Checking Integrity Constraints and Tests In the procedure code, first we selected complete all keys values (primary, unique and foreign) on daily base from the online database. Second we selected complete all keys values from the offline dataset which is available in the online database. If daily base online database values matched with offline represented set of data then it report to an integrity violation. Input: List of integrity constraints primary key PK, unique key UK, foreign key FK from Representative set of data (Offline Data) Output: Valid transaction performed or aborts transaction (if available in the offline data)
6 376 M. Salman, N.U. Rehman, and M. Shahid Store the begin time in the Proc_Result table For each i in online-transaction loop For each j in off-transaction loop Invoke sufficient test If i.pk is equal to j.pk and i.uk is equal to j.uk then Action: Abort Current transaction from the database; Else Action: Complete test is performed & DML transaction Done; For each i in online-transaction loop For each j in off-transaction loop Invoke sufficient test If i.fk is equal to j.fk then Action: DML performed on database; Else Action: Complete test is performed & Abort Transaction, T; Action: Store the end time in the Proc_Result table; 4 Experimental Result Proof through McCarroll Our approach has been developed to manage RDBMS integrity between OLTPs and offline data McCarroll introduces different level of integrity tests namely sufficient test, necessary test and complete test [10]. In the sufficient test, when update or insert operation is satisfied with respect to the integrity constraint and thus DML operation is performed on the table. In the necessary test, when insert or update operation is not satisfied with respect to the integrity constraint and thus DML operation abort the transaction from the database. Complete test have both sufficient and necessary tests properties. When a user issues an update or insert query again the online database, the integrity constraints for the offline data are tested for any violation. If there is a violation, i.e. the update or inserted field value is in conflict with integrity constraints of offline data, then an exception is raised and transaction is aborted. Otherwise, update or insert query is executed and is allowed to make changes in the database. Referring to the below mention Table-2, ( i u v w x y zorder (i, u, v, w, x, y, z)) is an example of sufficient test, which verify the existence of Ord_id values in the Order_offline table that is representative subset of data whereas i, u, v, w, x, y and z are constants.
7 Database Integrity Mechanism between OLTP and Offline Data 377 When insert or update query is executed on an Order table. If Ord_id attribute value exists in an Order_offline table, then we conclude that the sufficient test and initial constraint, I1, is satisfied. If there is no record available with respect to an Ord_id attribute of Order_offline table, then further verification is performed by complete test and record is inserted or updated into Order table. Similarly we performed same test for Card_no attribute (which is unique key) in an Order table. In the case of ( u i v w x y z order (u, i, v, w, x, y, z)) is an example of sufficient test, which verified an existence of Cid attribute value in an Order_offline table, that is representative subset of data. When insert or update query is executed on an Order table. If Cid attribute value exists in an Order_offline table, then we conclude that the sufficient test property or initial constraint, I2, is satisfied. If there is no record available with respect to Cid attribute of Order_offline table, then further verification performed by complete test. Similarly we performed same test for Pid attribute (which is foreign key) in an Order table. Every record is verified against the integrity constraint values between online database (Order table) and offline data (Order_offline table). Table 1. Schematic Algebra Schema: Customer (cid, cname, add, loc); Product(pid, pname, price, unit_price); Order (ord_id, cid, pid, card_no, ord_date, sup_date, tot_price); Order_offline (ord_id, cid, pid, card_no) Integrity Constraints: Every record of Ord_id attribute in an Order_offline table exists in an Order table I1: ( i b c d u v w x y z)(order_offline(i, b, c, d) Order(i, u, v, w, x, y, z)) Every record of Cid attribute in an Order_offline table exists in an Order table I2: ( a i c d u v w x y z)(order_offline(a, i, c, d) Order(u, i, v, w, x, y, z)) Every record of Pid attribute in an Order_offline table exists in an order table I3: ( a b i d u v w x y z)(order_offline(a, b, i, d) Order(u, v, i, w, x, y, z)) Every record of Card_no attribute in an Order_offline table exists in an order table I4: ( a b c i u v w x y z)(order_offline(a, b, c, i) Order(u, v, w, i, x, y, z)) Table 2. Integrity Association I Insert and Update Template Integrity Test I1 insert(order(i, u, v, w, x,y,z)) 1. ( i x y z)(order_offline(i, b, c, d)) 1 2. ( i u v w x y z)( order(i, u, v, w, x, y, z)) 2 update(order(i, u, v, w,x, y, z)) 3. ( b c d)( order_offline(i, b, c, d)) 1 I2 insert(order(u, i, v, w, x, y, z)) 1. ( x i y z)(order_offline(a, i, c, d)) 1 2. ( u i v w x y z)( order(u, i, v, w, x, y,z)) 2 update(order(u, i, v, w, x,y, z)) 3. ( a c d)( order_offline(a, i, c, d)) 1 I3 insert(order(u, v, i, w, x, y, z)) 1. ( x y i z)(order_offline(a, b, i, d)) 1 2. ( u v i w x y z)( order(u, v, i, w, x, y, z)) 2 update(order(u, v, i, w, x, y, z)) 3. ( a b d)( order_offline(a, b, i, d)) 1 I4 insert(order(u, v, w, i, y, z)) 1. ( w x y i)(order_offline(a, b, c, i)) 1 2. ( u v w i x y z)( order(u, v, w, i, x, y, z)) 2 update(order(u, v, w, i, x, y, z)) 3. ( a b c)( order_offline(a, b, c, i)) 1
8 378 M. Salman, N.U. Rehman, and M. Shahid 5 Experimental Results The system on which we ran our experiment is running Window XP, with 2GB RAM and 2GHz processor. This experimental result is done between online database (Order table) and offline data (Order_offline table). 5.1 Offline Data Integrity at Record Level In Fig 2, shows experimental result for offline data integrity using Oracle 10g, SQL Server 2000 and IBM DB2 9.7 trigger. In this experiment, online database stored the representative set of data that is five million, seven million and up to 10 million and each valid transaction took process time is 1.600, and up to seconds for Oracle 10g in the online database. Similarly in the SQL Server 2000 case, each valid transaction took process time is two, three, four and five seconds. In the IBM DB2, each valid transaction took process time is 1.600, and up to seconds. S.No Table 3. Record level RDBMS Statistics Offline Data Set Oracle SQL Server IBM DB Fig. 2. Offline Data Integrity through Trigger
9 Database Integrity Mechanism between OLTP and Offline Data Offline Data Integrity on Batch Mode This method improved OLTP performance as compare to record level approach because it is execute on batch mode. In each experiment, we stored a representative subset of data in the online database that is four millions, six millions, eight millions and 10millions and daily OLTPs (online transaction processing system) transactions on a table that is two thousand, four thousands, six thousand and ten thousand. Therefore, we calculated the stored procedure execution timing in different tools (Oracle10g, SQL Server 2000 and IBM DB2 9.7). S.No Table 4. Batch mode RDBMS Statistics Daily OLTP Transaction Oracle SQL Server IBM DB In Fig 3, shows experimental result for offline data integrity using Oracle 10g, SQL Server 2000 and IBM DB2 procedure. In this experiment, Oracle stored procedure execution took 4, 4.2 and up to 4.5 seconds against an OLTP daily transaction on the database that is 2000, 6000 and up to and reporting records that are in integrity violation. Similarly in the SQL Server 2000 case, stored procedure execution took five, six and up to eighteen seconds and reporting records that are in integrity violation. In the IBM DB2 case, stored procedure took execution three, four and up to 6 seconds and reporting records that are in integrity violation. Fig. 3. Offline Data Integrity through procedure
10 380 M. Salman, N.U. Rehman, and M. Shahid 6 Conclusions We were able to introduce an integrity checking mechanisms between two disconnected systems, i.e. online database systems (OLTPs) and Offline data. We justified the offline data integrity through sufficient and complete tests. The paper presented results of various experiments conducted to support our work. These experiments were carried out on the major market products available like Oracle (10g) Microsoft SQL Server (2000) and IBM DB2 (9.7). The integrity mechanism presented was tested at two levels in the database systems i.e., at record level and in batch level. The integrity verification at level is implemented using a trigger and checks the integrity of the new record with the offline data. In case of a violation, the record insertion is rejected. The integrity verification in batch mode tolerates any integrity inconsistencies of the updated or newly inserted data for temporary time period to avoid performance degradation of OLTP while it is running the business. However, at an appropriate time, all updations and insertions can be checked for any integrity violation with the offline data. References 1. The American Heritage Dictionary of the English Language, El-shaddai, p (2009) 2. Eswaran, K., Chamberlin, D.: Functional Specifications of a Subsystem for Database Integrity. ACM (1975) 3. Türker, C.: Consistent Handling of Integrity Constraints and Extensional Assertions for Schema Integration. In: Eder, J., Rozman, I., Welzer, T. (eds.) ADBIS LNCS, vol. 1691, pp Springer, Heidelberg (1999) 4. Caroprese, L., Greco, S., Zumpano, E.: Active Integrity Constraints for Database Consistency Maintenance. IEEE Transactions on Knowledge and Data Engineering, (2009) 5. Mayol, E., Teniente, E.: A Survey of Current Methods for Integrity Constraint Maintenance and View Updating. Advances in Conceptual Modeling, (1999) 6. Mircea Petrescu, A., Rotaru, O.P.: A Database Integrity Pattern Language. ACM (2008) 7. Uut de Haag, M., Sayre, J.: Terrain Database Integrity Monitoring for Synthetic Vision Systems. IEEE Transactions on Aerospace and Electronic Systems, (2005) 8. Lin, Y., Kemme, B.: Snapshot Isolation and Integrity Constraints in replicated Databases. ACM (2009) 9. Batini, Carlo.: A Methodology for Data Schema Integration in the Entity Relationship Model. IEEE Transactions on Software Engineering, (2009) 10. McCarroll, N.F.: Semantic Integrity Enforcement in Parallel Database Machines PhD Thesis, University of Sheffield, UK (1995)
1. INTRODUCTION TO RDBMS
Oracle For Beginners Page: 1 1. INTRODUCTION TO RDBMS What is DBMS? Data Models Relational database management system (RDBMS) Relational Algebra Structured query language (SQL) What Is DBMS? Data is one
CS2Bh: Current Technologies. Introduction to XML and Relational Databases. The Relational Model. The relational model
CS2Bh: Current Technologies Introduction to XML and Relational Databases Spring 2005 The Relational Model CS2 Spring 2005 (LN6) 1 The relational model Proposed by Codd in 1970. It is the dominant data
The Relational Model. Why Study the Relational Model?
The Relational Model Chapter 3 Instructor: Vladimir Zadorozhny [email protected] Information Science Program School of Information Sciences, University of Pittsburgh 1 Why Study the Relational Model?
The Relational Model. Why Study the Relational Model? Relational Database: Definitions
The Relational Model Database Management Systems, R. Ramakrishnan and J. Gehrke 1 Why Study the Relational Model? Most widely used model. Vendors: IBM, Microsoft, Oracle, Sybase, etc. Legacy systems in
Tutorial on Relational Database Design
Tutorial on Relational Database Design Introduction Relational database was proposed by Edgar Codd (of IBM Research) around 1969. It has since become the dominant database model for commercial applications
Extraction Transformation Loading ETL Get data out of sources and load into the DW
Lection 5 ETL Definition Extraction Transformation Loading ETL Get data out of sources and load into the DW Data is extracted from OLTP database, transformed to match the DW schema and loaded into the
CS2Bh: Current Technologies. Introduction to XML and Relational Databases. Introduction to Databases. Why databases? Why not use XML?
CS2Bh: Current Technologies Introduction to XML and Relational Databases Spring 2005 Introduction to Databases CS2 Spring 2005 (LN5) 1 Why databases? Why not use XML? What is missing from XML: Consistency
Relational Database Basics Review
Relational Database Basics Review IT 4153 Advanced Database J.G. Zheng Spring 2012 Overview Database approach Database system Relational model Database development 2 File Processing Approaches Based on
Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner
24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India
1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills
Data Modeling. Database Systems: The Complete Book Ch. 4.1-4.5, 7.1-7.4
Data Modeling Database Systems: The Complete Book Ch. 4.1-4.5, 7.1-7.4 Data Modeling Schema: The structure of the data Structured Data: Relational, XML-DTD, etc Unstructured Data: CSV, JSON But where does
Lecture 6. SQL, Logical DB Design
Lecture 6 SQL, Logical DB Design Relational Query Languages A major strength of the relational model: supports simple, powerful querying of data. Queries can be written intuitively, and the DBMS is responsible
DBMS Questions. 3.) For which two constraints are indexes created when the constraint is added?
DBMS Questions 1.) Which type of file is part of the Oracle database? A.) B.) C.) D.) Control file Password file Parameter files Archived log files 2.) Which statements are use to UNLOCK the user? A.)
The Relational Model. Ramakrishnan&Gehrke, Chapter 3 CS4320 1
The Relational Model Ramakrishnan&Gehrke, Chapter 3 CS4320 1 Why Study the Relational Model? Most widely used model. Vendors: IBM, Informix, Microsoft, Oracle, Sybase, etc. Legacy systems in older models
A Synchronization Algorithm of Mobile Database for Cloud Computing
A Synchronization Algorithm of Mobile Database for Cloud Computing Ranjeet Singh 1, Chiranjit Dutta 2 Faculty of information Technology, SRM University, NCR campus, India ABSTRACT The existing synchronization
Maintaining Stored Procedures in Database Application
Maintaining Stored Procedures in Database Application Santosh Kakade 1, Rohan Thakare 2, Bhushan Sapare 3, Dr. B.B. Meshram 4 Computer Department VJTI, Mumbai 1,2,3. Head of Computer Department VJTI, Mumbai
The Relational Model. Why Study the Relational Model? Relational Database: Definitions. Chapter 3
The Relational Model Chapter 3 Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Why Study the Relational Model? Most widely used model. Vendors: IBM, Informix, Microsoft, Oracle, Sybase,
Database Management. Chapter Objectives
3 Database Management Chapter Objectives When actually using a database, administrative processes maintaining data integrity and security, recovery from failures, etc. are required. A database management
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-
Oracle Objective: Oracle has many advantages and features that makes it popular and thereby makes it as the world's largest enterprise software company. Oracle is used for almost all large application
BCA. Database Management System
BCA IV Sem Database Management System Multiple choice questions 1. A Database Management System (DBMS) is A. Collection of interrelated data B. Collection of programs to access data C. Collection of data
Database Replication with Oracle 11g and MS SQL Server 2008
Database Replication with Oracle 11g and MS SQL Server 2008 Flavio Bolfing Software and Systems University of Applied Sciences Chur, Switzerland www.hsr.ch/mse Abstract Database replication is used widely
Basics Of Replication: SQL Server 2000
Basics Of Replication: SQL Server 2000 Table of Contents: Replication: SQL Server 2000 - Part 1 Replication Benefits SQL Server Platform for Replication Entities for the SQL Server Replication Model Entities
Data Distribution with SQL Server Replication
Data Distribution with SQL Server Replication Introduction Ensuring that data is in the right place at the right time is increasingly critical as the database has become the linchpin in corporate technology
Using SAS as a Relational Database
Using SAS as a Relational Database Yves DeGuire Statistics Canada Come out of the desert of ignorance to the OASUS of knowledge Introduction Overview of relational database concepts Why using SAS as a
Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Active database systems. Triggers. Triggers. Active database systems.
Active database systems Database Management Systems Traditional DBMS operation is passive Queries and updates are explicitly requested by users The knowledge of processes operating on data is typically
Demystified CONTENTS Acknowledgments xvii Introduction xix CHAPTER 1 Database Fundamentals CHAPTER 2 Exploring Relational Database Components
Acknowledgments xvii Introduction xix CHAPTER 1 Database Fundamentals 1 Properties of a Database 1 The Database Management System (DBMS) 2 Layers of Data Abstraction 3 Physical Data Independence 5 Logical
Database Replication with MySQL and PostgreSQL
Database Replication with MySQL and PostgreSQL Fabian Mauchle Software and Systems University of Applied Sciences Rapperswil, Switzerland www.hsr.ch/mse Abstract Databases are used very often in business
Revolutionized DB2 Test Data Management
Revolutionized DB2 Test Data Management TestBase's Patented Slice Feature Provides a Fresh Solution to an Old Set of DB2 Application Testing Problems The challenge in creating realistic representative
DB2 for z/os: Utilities and Application Development
TRAINING & CONSULTING DB2 for z/os: Utilities and Application ABIS Training & Consulting www.abis.be [email protected] 2005, 2006 Document number: 0092_03b.fm 11 January 2006 Address comments concerning
Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.
DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows
Oracle SQL. Course Summary. Duration. Objectives
Oracle SQL Course Summary Identify the major structural components of the Oracle Database 11g Create reports of aggregated data Write SELECT statements that include queries Retrieve row and column data
Introduction to Databases
Page 1 of 5 Introduction to Databases An introductory example What is a database? Why do we need Database Management Systems? The three levels of data abstraction What is a Database Management System?
SQL Databases Course. by Applied Technology Research Center. This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases.
SQL Databases Course by Applied Technology Research Center. 23 September 2015 This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases. Oracle Topics This Oracle Database: SQL
SQL NULL s, Constraints, Triggers
CS145 Lecture Notes #9 SQL NULL s, Constraints, Triggers Example schema: CREATE TABLE Student (SID INTEGER PRIMARY KEY, name CHAR(30), age INTEGER, GPA FLOAT); CREATE TABLE Take (SID INTEGER, CID CHAR(10),
Clinical Data Management (Process and practical guide) Dr Nguyen Thi My Huong WHO/RHR/RCP/SIS
Clinical Data Management (Process and practical guide) Dr Nguyen Thi My Huong WHO/RHR/RCP/SIS Training Course in Sexual and Reproductive Health Research Geneva 2012 OUTLINE Clinical Data Management CDM
Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions
Concepts of Database Management Seventh Edition Chapter 7 DBMS Functions Objectives Introduce the functions, or services, provided by a DBMS Describe how a DBMS handles updating and retrieving data Examine
Component Approach to Software Development for Distributed Multi-Database System
Informatica Economică vol. 14, no. 2/2010 19 Component Approach to Software Development for Distributed Multi-Database System Madiajagan MUTHAIYAN, Vijayakumar BALAKRISHNAN, Sri Hari Haran.SEENIVASAN,
3. Relational Model and Relational Algebra
ECS-165A WQ 11 36 3. Relational Model and Relational Algebra Contents Fundamental Concepts of the Relational Model Integrity Constraints Translation ER schema Relational Database Schema Relational Algebra
Optimizing Performance. Training Division New Delhi
Optimizing Performance Training Division New Delhi Performance tuning : Goals Minimize the response time for each query Maximize the throughput of the entire database server by minimizing network traffic,
Week 1 Part 1: An Introduction to Database Systems. Databases and DBMSs. Why Use a DBMS? Why Study Databases??
Week 1 Part 1: An Introduction to Database Systems Databases and DBMSs Data Models and Data Independence Concurrency Control and Database Transactions Structure of a DBMS DBMS Languages Databases and DBMSs
Triggers & Packages. {INSERT [OR] UPDATE [OR] DELETE}: This specifies the DML operation.
Triggers & Packages An SQL trigger is a mechanism that automatically executes a specified PL/SQL block (referred to as the triggered action) when a triggering event occurs on the table. The triggering
Database Design. Marta Jakubowska-Sobczak IT/ADC based on slides prepared by Paula Figueiredo, IT/DB
Marta Jakubowska-Sobczak IT/ADC based on slides prepared by Paula Figueiredo, IT/DB Outline Database concepts Conceptual Design Logical Design Communicating with the RDBMS 2 Some concepts Database: an
Duration Vendor Audience 5 Days Oracle End Users, Developers, Technical Consultants and Support Staff
D80198GC10 Oracle Database 12c SQL and Fundamentals Summary Duration Vendor Audience 5 Days Oracle End Users, Developers, Technical Consultants and Support Staff Level Professional Delivery Method Instructor-led
SQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
MS-40074: Microsoft SQL Server 2014 for Oracle DBAs
MS-40074: Microsoft SQL Server 2014 for Oracle DBAs Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills and experience as an Oracle
Database Management Systems. Chapter 1
Database Management Systems Chapter 1 Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 2 What Is a Database/DBMS? A very large, integrated collection of data. Models real-world scenarios
Survey on Comparative Analysis of Database Replication Techniques
72 Survey on Comparative Analysis of Database Replication Techniques Suchit Sapate, Student, Computer Science and Engineering, St. Vincent Pallotti College, Nagpur, India Minakshi Ramteke, Student, Computer
D61830GC30. MySQL for Developers. Summary. Introduction. Prerequisites. At Course completion After completing this course, students will be able to:
D61830GC30 for Developers Summary Duration Vendor Audience 5 Days Oracle Database Administrators, Developers, Web Administrators Level Technology Professional Oracle 5.6 Delivery Method Instructor-led
SQL Server. 2012 for developers. murach's TRAINING & REFERENCE. Bryan Syverson. Mike Murach & Associates, Inc. Joel Murach
TRAINING & REFERENCE murach's SQL Server 2012 for developers Bryan Syverson Joel Murach Mike Murach & Associates, Inc. 4340 N. Knoll Ave. Fresno, CA 93722 www.murach.com [email protected] Expanded
EECS 647: Introduction to Database Systems
EECS 647: Introduction to Database Systems Instructor: Luke Huan Spring 2013 Administrative Take home background survey is due this coming Friday The grader of this course is Ms. Xiaoli Li and her email
CribMaster Database and Client Requirements
FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster
Tips and Tricks for Using Oracle TimesTen In-Memory Database in the Application Tier
Tips and Tricks for Using Oracle TimesTen In-Memory Database in the Application Tier Simon Law TimesTen Product Manager, Oracle Meet The Experts: Andy Yao TimesTen Product Manager, Oracle Gagan Singh Senior
Incremental Data Migration in Multi-database Systems Using ETL Algorithm
Incremental Data Migration in Multi-database Systems Using ETL Algorithm Rajesh Yadav, Prabhakar Patil, Uday Nevase, Kalpak Trivedi, Prof. Bharati Patil Department of Computer Engineering Imperial College
New method for data replication in distributed heterogeneous database systems
New method for data replication in distributed heterogeneous database systems Miroslaw Kasper Department of Computer Science AGH University of Science and Technology Supervisor: Grzegorz Dobrowolski Krakow,
Virtuoso Replication and Synchronization Services
Virtuoso Replication and Synchronization Services Abstract Database Replication and Synchronization are often considered arcane subjects, and the sole province of the DBA (database administrator). However,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume, Issue, March 201 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient Approach
OLTP Meets Bigdata, Challenges, Options, and Future Saibabu Devabhaktuni
OLTP Meets Bigdata, Challenges, Options, and Future Saibabu Devabhaktuni Agenda Database trends for the past 10 years Era of Big Data and Cloud Challenges and Options Upcoming database trends Q&A Scope
Topics. Introduction to Database Management System. What Is a DBMS? DBMS Types
Introduction to Database Management System Linda Wu (CMPT 354 2004-2) Topics What is DBMS DBMS types Files system vs. DBMS Advantages of DBMS Data model Levels of abstraction Transaction management DBMS
PartJoin: An Efficient Storage and Query Execution for Data Warehouses
PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE [email protected] 2
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become
Basic Concepts of Database Systems
CS2501 Topic 1: Basic Concepts 1.1 Basic Concepts of Database Systems Example Uses of Database Systems - account maintenance & access in banking - lending library systems - airline reservation systems
Introduction. Introduction: Database management system. Introduction: DBS concepts & architecture. Introduction: DBS versus File system
Introduction: management system Introduction s vs. files Basic concepts Brief history of databases Architectures & languages System User / Programmer Application program Software to process queries Software
Relational Database Systems 2 1. System Architecture
Relational Database Systems 2 1. System Architecture Wolf-Tilo Balke Philipp Wille Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 1 Organizational Issues
ORACLE 9I / 10G / 11G / PL/SQL COURSE CONTENT
ORACLE 9I / 10G / 11G / PL/SQL COURSE CONTENT INTRODUCTION: Course Objectives I-2 About PL/SQL I-3 PL/SQL Environment I-4 Benefits of PL/SQL I-5 Benefits of Subprograms I-10 Invoking Stored Procedures
LOGICAL DATABASE DESIGN
MODULE 8 LOGICAL DATABASE DESIGN OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
SQL Server Training Course Content
SQL Server Training Course Content SQL Server Training Objectives Installing Microsoft SQL Server Upgrading to SQL Server Management Studio Monitoring the Database Server Database and Index Maintenance
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.
Introduction: Database management system
Introduction Databases vs. files Basic concepts Brief history of databases Architectures & languages Introduction: Database management system User / Programmer Database System Application program Software
Databases and BigData
Eduardo Cunha de Almeida [email protected] Outline of the course Introduction Database Systems (E. Almeida) Distributed Hash Tables and P2P (C. Cassagnes) NewSQL (D. Kim and J. Meira) NoSQL (D. Kim)
The Entity-Relationship Model
The Entity-Relationship Model 221 After completing this chapter, you should be able to explain the three phases of database design, Why are multiple phases useful? evaluate the significance of the Entity-Relationship
www.dotnetsparkles.wordpress.com
Database Design Considerations Designing a database requires an understanding of both the business functions you want to model and the database concepts and features used to represent those business functions.
Oracle Database Links Part 2 - Distributed Transactions Written and presented by Joel Goodman October 15th 2009
Oracle Database Links Part 2 - Distributed Transactions Written and presented by Joel Goodman October 15th 2009 About Me Email: [email protected] Blog: dbatrain.wordpress.com Application Development
Chapter 1: Introduction
Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases
DATABASE MANAGEMENT SYSTEMS. Question Bank:
DATABASE MANAGEMENT SYSTEMS Question Bank: UNIT 1 1. Define Database? 2. What is a DBMS? 3. What is the need for database systems? 4. Define tupule? 5. What are the responsibilities of DBA? 6. Define schema?
Database Administrator Certificate Capstone Project Evaluation Checklist
Database Administrator Certificate Capstone Project Evaluation Checklist The following checklist will be used by the Capstone Project instructor to evaluate your project. Satisfactory completion of the
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: 1.800.529.0165 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This course is designed to deliver the fundamentals of SQL and PL/SQL along
Availability Digest. www.availabilitydigest.com. Raima s High-Availability Embedded Database December 2011
the Availability Digest Raima s High-Availability Embedded Database December 2011 Embedded processing systems are everywhere. You probably cannot go a day without interacting with dozens of these powerful
Transactions and ACID in MongoDB
Transactions and ACID in MongoDB Kevin Swingler Contents Recap of ACID transactions in RDBMSs Transactions and ACID in MongoDB 1 Concurrency Databases are almost always accessed by multiple users concurrently
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
David Dye. Extract, Transform, Load
David Dye Extract, Transform, Load Extract, Transform, Load Overview SQL Tools Load Considerations Introduction David Dye [email protected] HTTP://WWW.SQLSAFETY.COM Overview ETL Overview Extract Define
Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis
Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis Rajesh Reddy Muley 1, Sravani Achanta 2, Prof.S.V.Achutha Rao 3 1 pursuing M.Tech(CSE), Vikas College of Engineering and
4. The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A Between Tables
1. What Are The Different Views To Display A Table A) Datasheet View B) Design View C) Pivote Table & Pivot Chart View D) All Of Above 2. Which Of The Following Creates A Drop Down List Of Values To Choose
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: +966 12 739 894 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training is designed to
Logistics. Database Management Systems. Chapter 1. Project. Goals for This Course. Any Questions So Far? What This Course Cannot Do.
Database Management Systems Chapter 1 Mirek Riedewald Many slides based on textbook slides by Ramakrishnan and Gehrke 1 Logistics Go to http://www.ccs.neu.edu/~mirek/classes/2010-f- CS3200 for all course-related
Overview. Introduction to Database Systems. Motivation... Motivation: how do we store lots of data?
Introduction to Database Systems UVic C SC 370 Overview What is a DBMS? what is a relational DBMS? Why do we need them? How do we represent and store data in a DBMS? How does it support concurrent access
Efficiently Identifying Inclusion Dependencies in RDBMS
Efficiently Identifying Inclusion Dependencies in RDBMS Jana Bauckmann Department for Computer Science, Humboldt-Universität zu Berlin Rudower Chaussee 25, 12489 Berlin, Germany [email protected]
Commercial Database Software Development- A review.
Commercial Database Software Development- A review. A database software has wide applications. A database software is used in almost all the organizations. Over 15 years many tools have been developed
How to Implement Multi-way Active/Active Replication SIMPLY
How to Implement Multi-way Active/Active Replication SIMPLY The easiest way to ensure data is always up to date in a 24x7 environment is to use a single global database. This approach works well if your
5.1 Database Schema. 5.1.1 Schema Generation in SQL
5.1 Database Schema The database schema is the complete model of the structure of the application domain (here: relational schema): relations names of attributes domains of attributes keys additional constraints
Outline. Data Modeling. Conceptual Design. ER Model Basics: Entities. ER Model Basics: Relationships. Ternary Relationships. Yanlei Diao UMass Amherst
Outline Data Modeling Yanlei Diao UMass Amherst v Conceptual Design: ER Model v Relational Model v Logical Design: from ER to Relational Slides Courtesy of R. Ramakrishnan and J. Gehrke 1 2 Conceptual
Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap.
Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap. 1 Oracle9i Documentation First-Semester 1427-1428 Definitions
Transactions and the Internet
Transactions and the Internet Week 12-13 Week 12-13 MIE253-Consens 1 Schedule Week Date Lecture Topic 1 Jan 9 Introduction to Data Management 2 Jan 16 The Relational Model 3 Jan. 23 Constraints and SQL
AUTONOMIC COMPUTING IN SQL SERVER
Seventh IEEE/ACIS International Conference on Computer and Information Science AUTONOMIC COMPUTING IN SQL SERVER Abdul Mateen, Basit Raza, Tauqeer Hussain University of Central Punjab, Lahore, Pakistan
Schema Evolution in SQL-99 and Commercial (Object-)Relational DBMS
Schema Evolution in SQL-99 and Commercial (Object-)Relational DBMS Can Türker Swiss Federal Institute of Technology (ETH) Zurich Institute of Information Systems, ETH Zentrum CH 8092 Zurich, Switzerland
