About What Is a DBA?
创始人
2024-06-01 16:49:48
0

1.Evaluating a DBA Job Offer

Here are some useful questions to ask:

• Does the company offer regular training for its DBAs to learn new DBMS features and functionality? What about training for related technologies such as programming, networking, e-business, transaction management, message queuing, and the like?

• Does the company allow DBAs to regularly attend local user groups? 12 What about annual user groups at remote locations?

• Are there backup DBAs, or will you be the only one on call 24/7?

• Are there data administration and system administration organizations, or are the DBAs expected to perform all of these duties, too?

• Does the DBA group views its relationship with application development groups as a partnership? Or is the relationship more antagonistic?

• Are DBAs included in design reviews, budgeting discussions, and other high-level IT committees and functions?

2.DBA versus DA

 

The DBA is the conduit for communication between the DA team and the technicians and application programming staff.

3.System Administration

When the SA role exists separately from the DBA role, it is responsible for the installation and setup of the DBMS. The system administrator (SA) typically has no responsibility for database design and supportthe DBA is responsible for the databases and the SA is responsible for DBMS installation, modification, and support

The system administrator ensures that the IT infrastructure is operational for database development by setting up the DBMS appropriately, applying ongoing maintenance from the DBMS vendor, and coordinating migration to new DBMS releases and versions.

The SA will never understand the physical database like a DBA, but the DBA is unlikely to understand the installation and in-depth technical relationships of system software like the SA.

DA , DBA, and SA reponsibilities

4.DBA Tasks

A DBA must be capable of performing many tasks to ensure that the organization’s data and databases are useful, usable, available, and correct. These tasks include design, performance monitoring and tuning, ensuring availability, authorizing security, backup and recovery, ensuring data integrity, and, really, anything that interfaces with the company’s databases.

4.1 Database Design

The DBA must be able to transform a logical data model into a physical database.

The DBA must be able to transform a logical data model into a physical database implementation. The DBA must ensure that the database design and implementation will enable a useful database for the applications and clients that will use it.

A DBA will most likely spend more time administering and tuning databases than in originally designing and building databases.

A poor relational design can result in poor performance, a database that does not meet the needs of the organization, and potentially inaccurate data.

4.2 Performance Monitoring and Tuning

Five factors influence database performance: workload(负载), throughput(吞吐量), resources(资源), optimization(最优化), and contention(资源竞争).

4.2.1 Workload 

The Workload that is requested of the DBMS defines the demand. It is a combination of online transactions , batch jobs, ad hoc queries, datawarehousing and analytical queries, and commands directed through the system at any given time.Workload can fluctuate drastically from day to day,hour to hour, minute to minutes, and even second to second.The overall workload has a major impact on database performance.

4.2.2 Throughput

Throughput define the overall capability of the computer hardware and software to process. It is a composite of I/O speed, CPU speed, parallel capabilities of the machine, and the efficienct of the operating system and system software. The hardware and software tools at the disposal of the system are known as the resources of the system. Examples include the database kernel, disk space, cache controllers, and microcode.

4.2.3 Optimization

All types of systems can be optimized, but relational queries are unique in that optimization is primarily accomplished internal to the DBMS. However, there are many other factors that need to be optimized (SQL formulation, database parameters, programming efficiently, and so on) to enable the database optimizer to create the most efficient access paths.

4.2.4 Contention

When the demand (workload) for a particular resource is high, contention can result.

Contention is the condition in which two or more components of the workload are attempting to use a single resource in a conflicting way (for example, dual updates to the same piece of data). As contention increases, throughput decreases.

Therefore,

database performance can be defined as the optimization of resource usage to increase throughput and minimize contention, enabling the largest possible workload to be processed.

Many performance management tasks must be shared between the DBA and other technicians. In other words, handling performance problems is truly an enterprise-wide endeavor.

Database performance can be defined as the optimization of resource usage to increase throughput and minimize contention, enabling the largest possible workload to be processed.

Alerts can be set up to e-mail the DBA when performance metrics are not within accepted boundaries.

Many tasks and abilities are required of DBAs to ensure efficient access to databases. Some of these abilities include

  • building appropriate indexes
  • specifying large enough buffers and caches
  • aligning the database implementation with the IT infrastructure,
  • ongoing monitoring of databases and applications
  • database reorganization
  • adapting to business changes —more users, more data, additional processing, and changing requirements and regulations.

4.3 Ensuring Availability

Availability of data and databases is often closely aligned with performance, but it is actually a separate concern. Of course, if the DBMS is offline, performance will be horrible because no data can be accessed. But ensuring database availability is a multifaceted process.

Ensuring database availability is a multi-faceted process.

 1.The data of availiablity is

  • keeping the DBMS up and running.
  • Vigilant monitoring and automated alerts can be used to warn of DBMS outages
  • Call for corrective action.

2. The database of availiability is

  • minimizing the amount of downtime required to perform administrative tasks.

The DBA must understand all of these aspects of availability and ensure that each application is receiving the correct level of availability for its needs

4.4 Database Security and Authorization

It is the responsibility of the DBA to ensure that data is available only to authorized users.

Grant and Revoke

Security must be administered for many actions required by the database environment:

• Creating database objects, including databases, tables, views, and program structures

• Altering the structure of database objects

• Accessing the system catalog

• Reading and modifying data in tables

• Creating and accessing user-defined functions and data types

• Running stored procedures

• Starting and stopping databases and associated database objects

• Setting and modifying DBMS parameters and specifications

• Running database utilities such as LOAD, RECOVER, and REORG

Database security can be enforced in other ways as well.

  • views can be created to block sensitive columns or rows from being viewed by end users and programmers.
  • DBA also frequently interfaces with external security  methods when they impact database security.
  • SQL injection attacks and how to prevent them need to be regarded.

The DBA must understand the aspects of security that impact access to databases.

4.5 Governance and Regulatory Compliance

Assuring compliance with industry and governmental regulations is an additional task required of database administration, at least in terms of implementing proper controls.s. The DBA must work with management, auditors, and business experts to understand the regulations that apply to their industry and the manner in which data is treated.

Certain aspects of regulatory compliance address standard DBA operating procedures.

regulations may contain

  • language enforcing specific security
  • authorization procedures
  • auditing requirements
  • data backup specifications
  • change management procedures.

DBAs set the proper technological controls and procedures for compliance with regard to the treatment of data.

4.6 Backup and Recovery

The DBA must be prepared to recover data in the event of a problem.

“Problem” can mean anything from a system glitch or program error to a natural disaster that shuts down an organization.

The majority of recoveries today occur as a result of application software error and human error.

Hardware failures are not as prevalent as they used to be.

In fact, analyst estimates indicate that 80 percent of application errors are due to software failures and human error. The DBA must be prepared to recover data to a usable point, no matter what the cause, and to do so as quickly as possible.

The majority of recoveries today occur as a result of application software error and human error.

The first type of data recovery that usually comes to mind is a recover to current, usually in the face of a major shutdown.The end result of the recovery is that the database is brought back to its current state at the time of the failure. Applications are completely unavailable until the recovery is complete.

Another type of traditional recovery is a point-in-time recovery. Point-in-time recovery usually is performed to deal with an application-level problem. Conventional techniques to perform a point-in-time recovery will remove the effects of all transactions since a specified point in time. This sometimes can cause problems if there were some valid transactions during that time frame that still need to be applied.

Transaction recovery is a third type of recovery that addresses the shortcomings of the traditional types of recovery: downtime and loss of good data. Thus, transaction recovery is an application recovery whereby the effects of specific transactions during a specified time frame are removed from the database. Therefore, transaction recovery is sometimes referred to as application recovery.

4.7 Ensuring Data Integrity

 A database must be designed to store the correct data in the correct way without that data becoming damaged or corrupted.

 

 

 4.8 DBMS Release Migration

4.9  Jack-of-All-Trades

The IT infrastructure of today consists of things such as

• Programming languages and environments such as COBOL, Microsoft
Visual Studio, C/C++/C#, Java, and PHP
• Software frameworks such as .NET and J2EE
• Database and process design tools such as ERwin and Rational Rose
• Transaction processing systems such as CICS and Tuxedo
• Application servers such as WebSphere, JBoss, Oracle Application
Server, and EAServer
• Message queuing software such as MQSeries and MSMQ
• Networking software and protocols such as SNA, VTAM, and TCP/IP
• Networking hardware such as bridges, routers, hubs, and cabling
• Multiple operating systems such as Windows, z/OS and MVS, UNIX
and Linux, and perhaps others
• Data storage hardware and software such as enterprise storage servers,
Microsoft SMS, IBM DFHSM, SANs, and NAS
• Operating system security packages such as RACF, ACF2, and
Kerberos
• Other types of storage hardware, for example, tape machines, silos, and
solid-state (memory-based) storage
• Non-DBMS data set and file storage techniques such as VSAM and btree
• NoSQL products such as Hadoop and MongoDB
• Database administration tools and how they interface with other
systems management solutions
• Systems management tools and frameworks such as HP OpenView and
CA Unicenter
• Operational control software such as batch scheduling software and job
entry subsystems
• Software distribution solutions for implementing new versions of
system software across the network
• The Internet and Web-enabled databases and applications
• Client/server development techniques (multitier, fat server/thin client,
thin server/fat client, etc.)
• Object-oriented and component-based development technologies and
techniques such as CORBA, COM, OLE/DB, ADO, and EJB
• Pervasive computing technology devices such as tablets and
smartphones

 5.The Types of DBAs

5.1 System DBA

5.2 Database Architect 

5.3  Database Analyst

 

 5.4 Data Modeler

5.5 Application DBA

 

 

 

5.6 Task-Oriented DBA

Larger organizations sometimes create very specialized DBAs who focus on a single specific DBA task.

5.7 Performance Analyst

 

5.8 Data Warehouse Administrator

5.9 Procedual DBA

 

 Procedural DBA Involvement by Object

 

 5.10 The Internet From DBA to eDBA

 

5.11  The Personal DBA and the Cloud

 

 

 

6. Staffing Considerations

 

 

 

 Administering Stored Procedures, Triggers, and UDFs

 

相关内容

热门资讯

常用商务英语口语   商务英语是以适应职场生活的语言要求为目的,内容涉及到商务活动的方方面面。下面是小编收集的常用商务...
六年级上册英语第一单元练习题   一、根据要求写单词。  1.dry(反义词)__________________  2.writ...
复活节英文怎么说 复活节英文怎么说?复活节的英语翻译是什么?复活节:Easter;"Easter,anniversar...
2008年北京奥运会主题曲 2008年北京奥运会(第29届夏季奥林匹克运动会),2008年8月8日到2008年8月24日在中华人...
英语道歉信 英语道歉信15篇  在日常生活中,道歉信的使用频率越来越高,通过道歉信,我们可以更好地解释事情发生的...
六年级英语专题训练(连词成句... 六年级英语专题训练(连词成句30题)  1. have,playhouse,many,I,toy,i...
上班迟到情况说明英语   每个人都或多或少的迟到过那么几次,因为各种原因,可能生病,可能因为交通堵车,可能是因为天气冷,有...
小学英语教学论文 小学英语教学论文范文  引导语:英语教育一直都是每个家长所器重的,那么有关小学英语教学论文要怎么写呢...
英语口语学习必看的方法技巧 英语口语学习必看的方法技巧如何才能说流利的英语? 说外语时,我们主要应做到四件事:理解、回答、提问、...
四级英语作文选:Birth ... 四级英语作文范文选:Birth controlSince the Chinese Governmen...
金融专业英语面试自我介绍 金融专业英语面试自我介绍3篇  金融专业的学生面试时,面试官要求用英语做自我介绍该怎么说。下面是小编...
我的李老师走了四年级英语日记... 我的李老师走了四年级英语日记带翻译  我上了五个学期的小学却换了六任老师,李老师是带我们班最长的语文...
小学三年级英语日记带翻译捡玉... 小学三年级英语日记带翻译捡玉米  今天,我和妈妈去外婆家,外婆家有刚剥的`玉米棒上带有玉米籽,好大的...
七年级英语优秀教学设计 七年级英语优秀教学设计  作为一位兢兢业业的人民教师,常常要写一份优秀的教学设计,教学设计是把教学原...
我的英语老师作文 我的英语老师作文(通用21篇)  在日常生活或是工作学习中,大家都有写作文的经历,对作文很是熟悉吧,...
英语老师教学经验总结 英语老师教学经验总结(通用19篇)  总结是指社会团体、企业单位和个人对某一阶段的学习、工作或其完成...
初一英语暑假作业答案 初一英语暑假作业答案  英语练习一(基础训练)第一题1.D2.H3.E4.F5.I6.A7.J8.C...
大学生的英语演讲稿 大学生的英语演讲稿范文(精选10篇)  使用正确的写作思路书写演讲稿会更加事半功倍。在现实社会中,越...
VOA美国之音英语学习网址 VOA美国之音英语学习推荐网址 美国之音网站已经成为语言学习最重要的资源站点,在互联网上还有若干网站...
商务英语期末试卷 Part I Term Translation (20%)Section A: Translate ...