Database Administration
Database administration is the process of establishing computerised databases, and insuring their recoverability, integrity, security, availability, reliability, and performance.
Remote database administration is a multi-pronged approach to several different processes utilized to monitor databases and operating systems at a remote location, a monitor can be established to watch and monitor databases and operating systems located elsewhere. The simplest form is simply for a client computer to be monitored manually by use of telnet or through the world wide web.
Database administration is performed by a Database administrator.
Database Administration
Database administration is a technique concerning setting up, storing, modifying and access to the information in database, it refers to the technical management which people concerned should perform to ensure the normal operation of the database and qualified service. Those, individual or collective, who are responsible for this technical management, are called database administrators (DBA). The main task for this management is as follows: setting up, adjustment, reorganization, reconstruction, security control, integrity of the database and providing technical service for the users.
Setting up the database The design of the database aims only at providing the description on the type, logical structure, link, binding and storage structure of the database, which is called data mode. It also needs to choose all kinds of database properties, to define database and to prepare and load data in order to set up operational database.
Adjustment of the database The optimization and adjustment of the database can be achieved by optimizing the network, hardware, operation system, database properties and applications. According to statistics, the promotion of performance in the network, hardware, operation system, database properties and applications added up altogether can only takes up 40% of the whole database application system performance, while other 60% results from the optimization of the applications, it shows that optimization of the applications can benefit more than that of the database system itself, which can be achieved in two respects: the optimization of the source code and the SQL statements.
Database reorganization To further find information in database and mark the relationship between records, uses can reorganize or sort and regroup the data in the database. The sort the order of the records by their field value and size, and how to make alphabetical sort is very useful to browse the data. Grouping is made according to the change of the field in database, the related records can be put together in the same group, and users can calculate the abstract information of each group by using grouping, such as the percentage of the total, etc. Before group, users need at least to make sort out of the defined fields in the database.
database reconstruction The technique of the database reconstruction is to change the current code base by using controllable techniques. In the world of code, many code languages are able to reconstruct themselves. In the process of the programmed change and the data move, this kind of automation is very important to database. Thus, each database reconstruction can be achieved by programming SQL DDL (to the programmed change) and DML(to data move), these changes are not accomplished by handwork but by some SQL statements.
Setting up security mode Normally, the security measures are the processes of security rectification from the time when users use the database applications to their access to the background database in computer system.
When users make their access to the database, they first enter the database system through the database applications, which hand over the user name and password provided by the users to the database system for rectification, only after the legality are confirmed, is the next operation possible.
Those who get the identification rectification get only the license for the access to the application system and the database, as to what operations can they get within the system and the database, they depend on rights distributions and bindings of “visit control” and “access control”, among which, the “visit control” is related to applications which decide the management of users in some specific module and workflow, while the “access control” is related to the database, which decides the operation in some specific objectives and what kind.
The binding of the integration of database The integration of database refers to the protection of the correctness and consistency, including the entity integrity, referential integrity and complex affair rules.
Normally, DBMS provides one or more data integrities, which confine the value inserted in the database or the value required by updating of the data. In relational database, there are usually some different kinds of data integrities, including required data integrity, validation checking, referential integrity and complex affair rules.
To provide users with technical support Including installation and configuration of the database, detailed specification, answers to FAQ, and access to the updating and patches.