Database Management - BIT 2
Database Management - BIT 2
Management
CBE- BIT II - 2024/2025
LECTURE NOTES
- NEIL ARMSTRONG
❑A database architect develops and implements software to meet the needs of users.
❑When designing a database architecture, you must make decisions that will change how your
applications are created.
2-tier architecture
3-tier architecture
❑Because there are no network delays involved, this is generally a fast way to access data.
❑In that case, both the application and the database are running on the user’s mobile device.
❑Basically, a one-tier architecture keeps all of the elements of an application, including the
interface, Middleware and back-end data, in one place.
❑Developers see these types of systems as the simplest and most direct way.
❑an in-house customer relationship management (CRM) that connects to an Access database.
❑In this architecture, the clients connect to a back end, which in turn connects to the database.
❑A 3-tier architecture separates its tiers from each other based on the complexity of the users and
how they use the data present in the database.
❑The strength in particular is when using this architecture over distributed systems.
Security:
❑Keeping the database connection open to a single
back end reduces the risks of being hacked.
Scalability:
❑Because each layer operates independently, it is
easier to scale parts of the application.
Faster deployment:
❑Having multiple tiers makes it easier to
have a separation of concerns and to follow
cloud-native best practices, including better
continuous delivery processes.
logic tier
presentation tier
data tier
❑They serve as a blueprint for designing and implementing databases, ensuring data consistency
and integrity.
❑Data Modeling in software engineering is the process of simplifying the diagram or data model of
a software system by applying certain formal techniques.
❑It involves expressing data and information through text and symbols.
❑The data model provides the blueprint for building a new database or reengineering legacy
applications.
❑Data Modeling is the process of creating data models by which data associations and
constraints are described and eventually coded to reuse.
❑It conceptually represents data with diagrams, symbols, or text to visualize the interrelation.
❑Data Modeling thus helps to increase consistency in naming, rules, semantics, and security. This,
in turn, improves data analytics.
❑The emphasis is on the need for availability and organization of data, independent of the manner
of its application
Logical level
Physical level
Physical level
❑The physical level involves defining
the specific details of how the data
will be stored, including data types,
indexes, and other technical details.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 39
Types of Data Models
❑ER Model ❑Associative Data Model
Cardinalities of Relationships
ERD
•It is a visual representation used to model the structure
and organization of data within a database system.
•ERDs are commonly employed in database design and
development to help understand, document, and
communicate how different entities (objects or concepts)
relate to one another.
Cardinality
•Cardinality defines the number of instances of one
entity that can be associated with another entity in
a relationship.
•Common cardinality notations include "one-to-one"
(1:1), "one-to-many" (1:N), and "many-to-many"
(N:N).
Primary Key
•A primary key is an attribute (or a combination
of attributes) within an entity that uniquely
identifies each instance of that entity.
•It is marked with an underline or a unique
symbol in the ERD.
Foreign Key
•A foreign key is an attribute in one entity that
references the primary key of another entity.
•It is used to establish relationships between
entities.
Many-to-Many (N:N):
• In a many-to-many relationship, multiple instances of one entity
are related to multiple instances of another entity, and vice versa.
• This type of relationship is common and is often resolved by
introducing an associative entity (also known as a junction table or
linking table) to represent the relationship.
• For example, multiple students can enroll in multiple courses, and
each course can have multiple students.
Aggregation
• aggregation is a modeling concept that allows you to
represent a relationship between an entity and a higher-
level entity.
• Aggregation is used when a relationship is considered as a
part-whole or a "whole is composed of parts" relationship.
• It helps to create a more abstract and modular
representation of data.
Part-Whole Relationship:
•Aggregation is typically used to represent
relationships where one entity (the "whole") is
composed of or contains other entities (the
"parts"). The whole can be an entity in its own
right, and the parts can also be entities.
Diamond Notation
• Aggregation is represented in ER diagrams
using a diamond shape connecting the whole
entity to the part entity.
•The diamond is labeled with the word
"AGGREGATION."
Modularity
•Aggregation helps to break down complex
entities into smaller, more manageable parts.
•This can make the data model more modular
and easier to understand.
Hierarchical Structure
•Aggregation can represent hierarchical
structures, such as a university having
multiple faculties, each containing multiple
departments, which, in turn, contain
multiple courses.
General Entity:
•The general entity (or superclass) is a higher-level
entity that represents a common set of attributes or
properties shared by multiple specialized entities.
•It is often an abstract entity that is not instantiated
on its own.
Specialized Entities:
•Specialized entities (or subclasses) are lower-
level entities that inherit the attributes and
relationships of the general entity.
•They can also have their specific attributes
and relationships.
ISA Notation
•The ISA relationship is represented in ER
diagrams using a triangle or arrow connecting
the specialized entities to the general entity.
•The triangle or arrow is labeled "ISA" or "Is-A."
Inheritance:
•Specialized entities inherit the attributes,
relationships, and constraints of the general entity.
•This means that the specialized entities have all the
attributes of the general entity in addition to their
specific attributes.
Completeness Constraints:
•Completeness constraints specify whether every
instance of the general entity must belong to one or
more specialized entities.
•Completeness can be "total" (every instance must
belong to a specialized entity) or "partial" (some
instances may not belong to any specialized entity).
Application user
Sophisticated
user
Application
Programmers
Database
Administrators
End Users
•End users are the people whose jobs
require access to a database for
querying, updating and generating
reports.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 98
Categories of Database Users
Application user
•The application user is someone who
accesses an existing application
program to perform daily tasks
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 100
Categories of Database Users
Application Programmers
•These users implement specific
application programs to access the
stored data. They must be familiar with
the DBMSs to accomplish their task.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 101
Categories of Database Users
Database Administrators
•This may be one person or a group of people
in an organization responsible for authorizing
access to the database, monitoring its use
and managing all of the resources to support
the use of the entire database system.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 102
Apply ER Model for
Database Design
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 103
ER Model for Database Design
Identify Entities
Define Attributes
Establish Relationships
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 104
ER Model for Database Design
Determine Cardinality
Consider Constraints
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 105
ER Model for Database Design
Use Crow's Foot Notation or Other Notations
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 106
ER Model for Database Design
Identify Entities
•Start by identifying the entities in the system you are
modeling.
•Entities are real-world objects, concepts, or things for
which you want to store data.
•For example, in a library database, you might have
entities like "Book," "Author," and "Library Member."
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 107
ER Model for Database Design
Define Attributes
•For each entity, define its attributes, which are the
properties or characteristics that describe the entity.
•Attributes are represented as ovals connected to the
respective entities.
•For example, a "Book" entity might have attributes
like "Title," "ISBN," and "Publication Year."
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 108
ER Model for Database Design
Establish Relationships:
• Identify and define the relationships between entities.
• Relationships describe how entities are related to each other.
• They are represented as lines connecting entities.
• For example, a "Book" entity may have a relationship with the
"Author" entity, indicating that a book is authored by an
author.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 109
ER Model for Database Design
Determine Cardinality:
•Specify the cardinality of each relationship.
•Cardinality defines how many instances of one entity
are related to how many instances of another entity.
•Common cardinalities include "one-to-one" (1:1),
"one-to-many" (1:N), and "many-to-many" (N:N).
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 110
ER Model for Database Design
Add Primary Keys:
•Designate one or more attributes as the primary key
for each entity.
•A primary key uniquely identifies each instance of the
entity.
•For example, the "Book" entity might have "ISBN" as
its primary key.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 111
ER Model for Database Design
Consider Constraints:
•Think about any constraints that apply to your
entities and relationships.
•Constraints may include business rules,
domain-specific rules, and any conditions that
data must satisfy.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 112
ER Model for Database Design
Use Crow's Foot Notation or Other Notations
•Choose a notation to represent your ER model.
•Crow's Foot notation is a common choice for drawing
ER diagrams, but there are other notations like Chen
and Barker.
•Select the one that best suits your needs and
preferences.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 113
ERD Notations
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 114
ERD Notations – Crow’s Foot
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 115
ERD Notations
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 116
ER Model for Database Design
Draw the ER Diagram
•Create a visual representation of your ER model
using the chosen notation.
•Use boxes for entities, ovals for attributes, and lines
for relationships.
•Label relationships with their names and indicate
cardinality.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 117
ER Model for Database Design
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 118
ER Model for Database Design
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 119
Convert ERD to
Relational Data
Models
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 120
ERD to Relational Data Model
❑ER Model, when conceptualized into diagrams,
gives a good overview of entity-relationship, which
is easier to understand.
❑ER diagrams can be mapped to relational
schema, that is, it is possible to create relational
schema using ER diagram.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 121
ERD to Relational Data Model
❑There are several processes and algorithms
available to convert ER Diagrams into
Relational Schema.
❑Some of them are automated and some of
them are manual.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 122
ERD to Relational Data Model
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 123
ERD to Relational Data Model
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 125
ERD to Relational Data Model
Mapping Relationship
• Create table for a relationship.
• Add the primary keys of all participating Entities
as fields of table with their respective data types.
• If relationship has any attribute, add each
attribute as field of table.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 126
ERD to Relational Data Model
Mapping Relationship
• Declare a primary key composing all
the primary keys of participating
entities.
• Declare all foreign key constraints.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 127
Mapping Relationship - Example
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 128
ERD to Relational Data Model
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 129
Weak Entity Sets – Example
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 130
Mapping Hierarchical Entities
❑ER specialization or generalization
comes in the form of hierarchical entity
sets.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 131
Hierarchical Entities
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 132
Mapping Hierarchical Entities
Mapping Process
• Create tables for all higher-level entities.
• Create tables for lower-level entities.
• Add primary keys of higher-level entities
in the table of lower-level entities
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 133
Mapping Hierarchical Entities
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 134
Benefits of ERD
Visualize Data Structure: ERDs provide a clear and visual representation of
how data is structured in a database, making it easier to understand and
communicate complex data relationships.
Identify Data Requirements: ERDs help identify the data requirements and
constraints of an application or system, which is essential for effective
database design.
Normalize Data: ERDs aid in the process of normalizing data to minimize
redundancy and ensure data integrity.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 135
Benefits of ERD
Document Design: ERDs serve as documentation for the database
design process, which can be used for reference and to guide
database implementation.
Database Schema Design: ERDs are often used as a foundation
for creating the actual database schema, which defines the
structure of tables, fields, and relationships in the database
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 136
End of Part Two
DATABASE MANAGEMENT CBE – BIT II
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 137
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 138
Database
Normalization and
Denormalization
DATABASE MANAGEMENT - CBE – BIT II 2024/2025
PART THREE
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 139
SUMMARY
Definition of Terms
Forms of Normalization
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 140
DEFINITION OF TERMS
Normalization
• is a process in database design that involves organizing
the data in a relational database to reduce redundancy
and improve data integrity.
• The goal of normalization is to structure the database in a
way that minimizes data duplication and dependency,
ensuring that data is stored efficiently and can be retrieved
accurately.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 141
DEFINITION OF TERMS
Normalization
• The normalization process is based on a set of rules or
normal forms, each addressing specific types of data
redundancy and dependency.
• The most common normal forms are First Normal Form
(1NF), Second Normal Form (2NF), Third Normal Form
(3NF), and higher normal forms like Boyce-Codd Normal
Form (BCNF) and Fourth Normal Form (4NF).
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 142
DEFINITION OF TERMS
Normalization
•If a database design is not perfect, it may
contain anomalies, which are like a bad
dream for any database administrator.
•Managing a database with anomalies is next
to impossible.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 143
DEFINITION OF TERMS
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 144
DEFINITION OF TERMS
Update anomalies
• If data items are scattered and are not linked to each other
properly, then it could lead to strange situations.
• For example, when we try to update one data item having its
copies scattered over several places, a few instances get
updated properly while a few others are left with old values.
• Such instances leave the database in an inconsistent state.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 145
DEFINITION OF TERMS
Deletion anomalies
•occurs when you delete a record that may
contain attributes that shouldn’t be deleted
•to delete a record, but parts of it was left
undeleted because of unawareness, the data
is also saved somewhere else.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 146
DEFINITION OF TERMS
Insert anomalies
•occurs when you are inserting
inconsistent information into a table
•to insert data in a record that does not
exist at all.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 147
DEFINITION OF TERMS
Denormalization
•a technique used by database administrators to optimize the
efficiency of their database infrastructure.
•This method allows us to add redundant data into a normalized
database to alleviate issues with database queries that merge
data from several tables into a single table.
•The denormalization concept is based on the definition of
normalization that is defined as arranging a database into tables
correctly for a particular purpose.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 148
DEFINITION OF TERMS
Denormalization
•Denormalization does not indicate not
doing normalization.
•It is an optimization strategy that is used
after normalization has been achieved
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 149
The Difference between Normalization
and Denormalization.
DENORMALIZATION NORMALIZATION
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 150
The Difference between Normalization
and Denormalization.
DENORMALIZATION NORMALIZATION
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 151
FORMS OF NORMALIZATION
3.5NF 4NF
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 152
FORMS OF NORMALIZATION
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 154
FORMS OF NORMALIZATION
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 155
FORMS OF NORMALIZATION
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 156
FORMS OF NORMALIZATION
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 157
FORMS OF NORMALIZATION
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 158
FORMS OF NORMALIZATION
❑Normalization is a step-by-step process, and not every
database needs to be normalized to the highest level.
❑The level of normalization depends on the specific
requirements of the database and the nature of the data.
❑Over-normalization can lead to complex query structures
and potentially degrade performance.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 159
Normalization Summary
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 160
Review Question:
Enrollment (StudentID , courseID , course_Instructor , Student_Name ,
Instructor_Office , Grade)
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 161
End of Part Three
DATABASE MANAGEMENT – CBE – BIT II
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 162
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 163
Data Backup and
Recovery
DATABASE MANAGEMENT – CBE – BIT II
PART FOUR
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 164
SUMMARY
Concept of Data Backup and Recovery in
Database
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 165
SUMMARY
Concept of RAID
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 166
Data Backup and Recovery
Introduction
• Backup and recovery is the process of duplicating data and storing it in a
secure place in case of loss or damage, and then restoring that data to a
location — the original one or a safe alternative — so it can be again used in
operations.
• Ideally, this backup copy (often called a snapshot) is immutable —meaning it
cannot be altered after it is created to protect against mutations such as
ransomware.
• Backup and recovery is also a category of onsite and cloud-based technology
solutions that automate and support this process, enabling organizations to
protect and retain their data for business and compliance reasons.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 167
Data Backup and Recovery
Data Backup
•The process of creating a copy of a company’s master
and transaction data files.
Data Recovery
•The process of restoring lost or corrupted data to a
consistent and usable state.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 168
Data Backup and Recovery
Full backups
•Full backups protect every bit of data from a single server,
database, virtual machine (VM), or data source connected to
the network.
•These backups can take many hours, even days, depending on
the amount of data being saved.
•The more modern a data management solution is, the fewer full
backups it must perform, and when it does, the faster it goes.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 170
Data Backup and Recovery
Incremental backups
•An incremental backup captures only new data since
the last full incremental was performed.
•However, a full backup is required before a backup
solution can perform its first incremental backup.
•Then it can automatically do them based on the last
incremental taken.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 171
Data Backup and Recovery
Incremental Backup
• Incremental backup is a backup types that provides a
faster method of backing up data than repeatedly
running full backups.
• During an incremental backup, only files changed since the
most recent backup are included.
• That is where it gets its name: each backup is
an increment for a previous backup.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 172
Data Backup and Recovery
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 173
Data Backup and Recovery
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 174
Data Backup and Recovery
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 175
Data Backup and Recovery
Reverse incremental
•The reverse incremental backup method produces a
backup chain that consists of the last full backup file and
a set of reverse incremental backup files preceding it.
•This way, the most recent restore point in the backup
chain is always a full backup, and it gets updated after
every successful backup job execution.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 176
Data Backup and Recovery
Multilevel incremental
• this is a more sophisticated incremental backup scheme which involves multiple
numbered backup levels. A full backup is level 0.
• A level n backup will back up everything that has changed since the most recent level
n-1 backup.
• Suppose for instance that a level 0 backup was taken on a Sunday. A level 1 backup
taken on Monday would include only changes made since Sunday.
• A level 2 backup taken on Tuesday would include only changes made since Monday.
• A level 3 backup taken on Wednesday would include only changes made since Tuesday.
• If a level 2 backup was taken on Thursday, it would include all changes made since
Monday because Monday was the most recent level n-1 backup.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 177
Data Backup and Recovery
Incremental forever
•This type is similar to the synthetic backup concept.
•After an initial full backup, only the incremental
backups are sent to a centralized backup system.
•This server keeps track of all the increments and
sends the proper data back to the client during
restores.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 178
Data Backup and Recovery
Differential Backup
•A differential backup collects data that has changed or
been created since the last full (normal) or incremental
backup, but it does not clear the archive bit on the file.
•It can also be used after a copy or differential backup,
but as with an incremental backup, every file with the
archive attribute set is backed up.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 180
Why Data Backup?
DATABASE BACKUP AND RECOVERY
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 181
Why Data Backup?
CHALLENGES
REASONS
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 182
Why Data Backup?
Challenges
•To understand why you need data backup and
recovery solutions, you must understand the
risks your data may be exposed to.
•Data loss can be caused by many factors,
such as:
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 183
Why Data Backup? - Challenges
Challenges
• System failure
• Human error
• Rogue insiders
• Theft
• Cyberattacks
• Natural disasters
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 184
Why Data Backup? – Challenges
System failure
•Hardware and software can fail at any time without warning, which
may lead to file corruption.
Human error
•Careless employees can lose terabytes worth of data by mistake.
•For example, accidental deletion or overwriting important
documents are very common ways to lose data.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 185
Why Data Backup? – Challenges
Rogue insiders
•Malicious employees may abuse their access privileges
to delete data in the hopes of sabotaging your business.
Theft
•If someone swipes company devices that contain locally
saved files, your data may be gone for good.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 186
Why Data Backup? – Challenges
Cyberattacks
• Cybercriminals may compromise your company’s data
through malware attacks.
• Ransomware, in particular, is a type of malware that
encrypts files and demands a ransom to decrypt them.
• Once files are infected with ransomware, your company
may have no choice but to pay the ransom or lose your
data permanently.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 187
Why Data Backup? – Challenges
Natural disasters
•Floods, fires, and earthquakes can
destroy your company’s physical data
storage devices, such as hard drives
and on-premises servers.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 188
Why Data Backup?
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 189
Why Data Backup? – Reasons
Defend against cyberattacks
•Considering that cyberattacks have become more common in
recent years, it’s now more important than ever to have a data
backup and recovery solution in place.
•This way, even if your systems become compromised or encrypted
by ransomware, you can be confident that you have clean copies
of your data stored elsewhere.
•This way, you can essentially reverse the damage done by a
ransomware attack without paying cybercriminals
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 190
Why Data Backup? – Reasons
Minimize downtime
• Data loss can massively disrupt your business operations
as employees scramble to recreate lost data.
• However, with data backups, you can easily restore recent
copies of your data, so there’s no need to halt operations
to redo lost work.
• In fact, high-end data backup solutions guarantee fast
recovery times for critical data to maximize uptime
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 191
Why Data Backup? - Reasons
Save money
•Data loss can be an expensive issue to deal with,
especially if you need to recreate lost data from scratch.
•Not to mention, the downtime caused by data loss can
also lead to a significant loss in revenue.
•Having a reliable data backup and recovery solution in
place can help you avoid these unnecessary expenses.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 192
Why Data Backup? – Reasons
Improve compliance
•If your business is regulated by data privacy laws,
then you’re required to protect the availability and
accessibility of your customers’ data.
•Noncompliance can cost your business thousands
of dollars in fines and lawsuits.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 193
Why Data Backup? – Reasons
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 194
Storage Media for
Data Backup
DATABASE BACKUP AND RECOVERY
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 195
Storage Media for Data Backup
OPTICAL
HDD SSD
DRIVER
USB FLASH
RAID
DRIVES
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 196
Hard Disk Drive (HDD)
❑A hard disk drive (HDD) stores data on metal or glass platters that are coated with a magnetic
substance.
❑The top and bottom of each platter is accessed by its own read/write head, moved by an actuator
mechanism.
❑Each side of each platter is divided into circular tracks, and a track contains several sectors,
each with a capacity of 512 bytes.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 197
Hard Disk Drive (HDD)
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 198
Hard Disk Drive (HDD)
❑This technology means that the performance of an HDD is determined by the speed at which the
disks spin, measured in revolutions per minute (RPM).
❑High performance drives are rated at 15,000 or 10,000 rpm; average performance is 7,200 or
5,400 rpm.
❑RPM is one factor determining access time, measured in milliseconds. Access time is a multi-
metric timeframe that includes both access and seek time and encompasses the total time for a
computer to read/write required data.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 199
Hard Disk Drive (HDD)
❑Whereas access time is the delay as the read/write head locates a particular track position, seek
time is the time it takes to move from one point to the point in which the data resides.
❑A high-performance drive will have an access time below 3 ms; a typical drive might have an
access time of around 6 ms.
❑The internal transfer rate (or data or disk transfer rate) of a drive is a measure of how fast
read/write operations are performed on the disk platters.
❑A 15 K drive should support an internal transfer rate of up to about 180 MBps, while 7.2 K drives
will be around 110 MBps.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 200
Hard Disk Drive (HDD)
❑Most HDDs use a SATA interface, though you may come across legacy devices using EIDE/PATA
or SCSI interfaces.
❑The 2.5 -inch form factor is used for laptops and as portable external drives.
❑Devices with 2.5-inch form factors can also vary in height, with 15 mm, 9.5 mm, 7 mm, and 5
mm form factors available.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 201
HDD
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 202
SOLID STATE DRIVE (SSD)
❑A solid-state drive (SSD) uses flash memory technology to implement persistent mass storage.
❑Flash memory performs much better than the mechanical components used in hard disk drives,
especially in terms of read performance.
❑Risks from total failure of the device due to mechanical shock and wear are generally lower.
Costs per gigabyte have fallen rapidly in the last few years.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 203
SOLID STATE DRIVE (SSD)
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 204
Solid State Drive (SSD)
❑SSDs normally outperform HDDs, but there are situations where they can perform worse than
HDDs (when serving multi-gigabyte file sizes, for example).
❑Flash chips are also susceptible to a type of degradation over the course of many write
operations.
❑The drive firmware and operating system use wear leveling routines that evenly distribute writing
on all blocks of an SSD to optimize the life of the device.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 205
SSD
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 206
SOLID STATE DRIVE (SSD)
❑On a typical modern desktop PC, an SSD might be installed as the computer's only internal drive
or as a boot drive for use with an additional hard drive.
❑In the second scenario, the SSD would be used to install the OS and software applications, while
the HDD would be used for user data files.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 207
SOLID STATE DRIVE (SSD)
❑In terms of the communications interface, an SSD might be packaged in a 2.5-inch caddy and
installed to a SATA port using the normal SATA data and power connectors.
❑Alternatively, the mSATA form factor allows an SSD packaged as an adapter card to be plugged
into a combined data and power port on the
❑motherboard. With both form factors, the main drawback is that the 600 MBps SATA interface
can be a bottleneck to the best performing SSDs, which can achieve transfer rates of up to 6.7
GB/s
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 208
Redundant Array of Independent
Disks (RAID)
❑Whether it is the system files required to run the OS or data files generated by users, an HDD or SSD
stores critical data. If a boot drive fails, the system will crash.
❑If a data drive fails, users will lose access to files and there may be permanent data loss if those files
have not been backed up.
❑To mitigate these risks, the disks that underpin the mass storage system can be provisioned as a
redundant array of independent disks (RAID) .
❑Redundancy sacrifices some disk capacity but provides fault tolerance. To the OS, the RAID array
appears as a single storage resource, or volume, and can be partitioned and formatted like any other
drive.
❑RAID can also be said to stand for "Redundant Array of Inexpensive Disks," and the "D" can also stand
for "devices."
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 209
RAID
❑A RAID level represents a drive configuration with a given type of fault tolerance. Basic RAID
levels are numbered from 0 to 6. There are also nested RAID solutions, such as RAID 10 (RAID 1 +
RAID 0).
❑RAID can be implemented using features of the operating system, referred to as software RAID.
Hardware RAID uses a dedicated controller, installed as an adapter card. The RAID disks are
connected to SATA ports on the RAID controller adapter card, rather than to the motherboard.
❑As another option, some motherboards implement integrated RAID functionality as part of the
chipset.
❑Hardware solutions are principally differentiated by their support for a range of RAID levels.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 210
RAID
❑Entry-level controllers might support only RAID 0 or RAID 1, whereas mid-level controllers might
add support for RAID 5 and RAID 10.
❑In addition, hardware RAID is often able to hot swap a damaged disk.
❑Hot swap means that the failed device can be replaced without shutting down the operating
system
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 211
RAID Levels
❑When implementing RAID, it is important to select the appropriate RAID level.
❑The factors influencing this decision include the required level of fault tolerance, read/write
performance characteristics, required capacity, and cost.
❑When building a RAID array, all the disks should normally be identical in terms of capacity and
ideally in terms of type and performance.
❑If disks are different sizes, the size of the smallest disk in the array determines the maximum
amount of space that can be used on the larger drives.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 212
RAID 0 (Striping without Parity)
❑Disk striping divides data into blocks and spreads the blocks in a fixed order among all the disks
in the array.
❑This improves performance as multiple disks are available to service requests in parallel. RAID 0
requires at least two disks. The logical volume size is the sum of the drives multiplied by the
smallest capacity physical disk in the array.
❑However, RAID 0 provides no redundancy at all. If any physical disk in the array fails, the whole
logical volume will fail, causing the computer to crash and requiring data to be recovered from
backup.
❑Consequently, RAID 0 only has specialist uses—typically as some type of non-critical cache store
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 213
RAID 0 (Striping without Parity)
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 214
RAID 0
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 215
RAID 1 (Mirroring)
❑RAID 1 is a mirrored drive configuration using two disks.
❑Each write operation is duplicated on the second disk in the set, introducing a small performance
overhead.
❑ A read operation can use either disk, boosting performance somewhat. This strategy is the simplest
way of protecting a single disk against failure.
❑If one disk fails, the other takes over. There is little impact on performance during this, so availability
remains good, but the failed disk should be replaced as quickly as possible as there is no longer any
redundancy.
❑When the disk is replaced, it must be populated with data from the other disk.
❑Performance while rebuilding is reduced, though RAID 1 is better than other levels in that respect and
the rebuilding process is generally shorter than for parity-based RAID.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 216
RAID 1 (Mirroring)
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 217
RAID 1
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 218
RAID 5 (Striping with Distributed
Parity)
❑RAID 5 uses striping (like RAID 0) but with distributed parity.
❑Distributed parity means that error correction information is spread across all the disks in the
array.
❑The data and parity information are managed so that the two are always on different disks. If a
single disk fails, enough information is spread across the remaining disks to allow the data to be
reconstructed.
❑Stripe sets with parity offer the best performance for read operations. However, when a disk has
failed, the read performance is degraded by the need to recover the data using the parity
information. Also, all normal write operations suffer reduced performance due to the parity
calculation.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 219
RAID 5 (Striping with Distributed
Parity)
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 220
RAID 5 (Striping with Distributed
Parity)
❑RAID 5 requires a minimum of three drives but can be configured with more.
❑This allows more flexibility in determining the overall capacity of the array than is possible with RAID 1.
A "hard" maximum number of devices is set by the controller or OS support, but the number of drives
used is more likely to be determined by practicalities such as cost and risk.
❑Adding more disks increases the chance of failure. If more than one disk fails, the volume will be
unavailable.
❑The level of fault tolerance and available disk space is inverse. As you add disks to the set, fault
tolerance decreases but usable disk space increases. If you configure a RAID 5 set using three disks, a
third of each disk is set aside for parity.
❑If four are used, one-quarter is reserved on each disk. Using a three 80 GB disk configuration, you
would have a 160 GB usable volume.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 221
RAID 5
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 222
RAID 10 (Stripe of Mirrors)
❑A nested RAID configuration combines features of two basic RAID levels.
❑RAID 10 is a logical striped volume (RAID 0) configured with two mirrored arrays (RAID 1).
❑This configuration offers excellent fault tolerance, as one disk in each mirror can fail, and the
volume will still be available.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 223
RAID 10 (Stripe of Mirrors)
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 224
RAID 10
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 225
RAID 10 (Stripe of Mirrors)
❑This configuration requires at least four disks, and there must be an even number of disks.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 226
USB Flash Drives
❑The flash memory underpinning SSDs can also be provisioned in the flash drive and memory
card form factors.
❑A flash drive —also called a USB drive, thumb drive, or pen drive—is simply a flash memory board
with a USB connector and protective cover. This type of drive plugs into any spare USB port.
❑Flash memory-based solid state drives (SSDs) have become ubiquitous in modern computing
systems, such as high-performance servers, workstation, desktops, and laptops, due to their
performance and density.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 227
USB Flash Drive
❑The architecture of SSDs has evolved to exploit the advantages of flash memories and at the
same time conceal their shortcomings.
❑SSD concurrency techniques such as channel striping, flash-chip pipelining, die interleaving, and
plane sharing utilize the available parallelism of flash memories, while the flash translation layer
(FTL) operations minimize the latency overhead of flash memories.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 228
USB Flash Drives
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 229
Optical Drives
❑An internal optical drive can be installed to a 5.25-inch drive bay and connected to the
motherboard via SATA data and power connectors.
❑An external unit would be connected via USB (or possibly eSATA or Thunderbolt).
❑External optical drives typically require their own power supply, provided via a supplied AC
adapter.
❑Some drives use a tray-based mechanism, while other use a slot-loading mechanism.
❑Drives also feature a small hole that accesses a disc eject mechanism (insert a paper clip to
activate the mechanism).
❑This is useful if the standard eject button will not work or if the drive does not have power.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 230
Optical Drives
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 231
Optical Drives
❑Optical drives are rated according to their data transfer speed.
❑An optical drive that can perform recording/rewriting is marketed with three speeds, always expressed
as the record/rewrite/read speed (for example, 24x/16x/52x).
❑New drives are generally multi-format, but you may come across older drives with no Blu-ray support.
❑Consumer DVDs and Blu-rays feature digital rights management (DRM) and region-coding copy-
protection mechanisms.
❑Region coding, if enforced, means that a disc can only be used on a player from the same region. On a
PC, the region can usually be set using device properties.
❑The firmware normally prevents this from being changed more than a couple of times.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 232
Data Backup
Methods
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 233
Backup Methods
On Site versus
Off Site Storage
Online versus
Offline Backups
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 234
Backup Methods
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 235
Backup Methods
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 236
Backup Methods
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 237
Backup Methods
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 238
Backup Methods
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 239
Data Recovery
Techniques
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 240
Recovery Techniques
Software-Based
Recovery
Hardware-Based
Recovery
File Carving
Remote Data
Recovery
Hardware Repair and
Replacement
Forensic Data
Recovery
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 241
Recovery Techniques
Software-Based Recovery
•Specialized data recovery software
tools can be used to scan storage
devices for lost or deleted files and
attempt to recover them.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 242
Recovery Techniques
Hardware-Based Recovery
• Hardware-based data recovery involves using specialized
equipment and techniques to recover data from storage
devices that have experienced physical damage or failure.
• Unlike software-based data recovery, which focuses on
logical issues, hardware-based recovery addresses issues
related to the physical components of the storage device.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 243
Hardware-Based Recovery
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 244
Hardware-Based Recovery
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 245
Recovery Techniques
Hardware-Based Recovery
•In cases where data loss is due to hardware
failures (e.g., malfunctioning hard drives),
hardware-based recovery involves repairing
or replacing faulty components to access the
data.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 246
Recovery Techniques
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 247
Recovery Techniques
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 248
Recovery Techniques
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 250
Recovery Techniques
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 251
Hardware Repair
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 252
Recovery Techniques
Hardware Repair and Replacement
•Hardware repair and replacement recovery is a specialized data
recovery technique employed when data loss is attributed to
physical damage or failures in the storage device's hardware
components.
•Unlike software-based recovery methods that focus on logical
issues, hardware-based recovery requires addressing problems
such as malfunctioning components, damaged read/write heads,
or other physical issues.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 253
Recovery Techniques
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 254
Recovery Techniques
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 255
Forensic Data Recovery
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 256
Recovery Techniques
Forensic Data Recovery
•Forensic data recovery is a specialized branch of data recovery focused
on retrieving, analyzing, and preserving electronic evidence in a manner
that maintains its integrity and is admissible in a court of law.
•This field is closely tied to digital forensics, which involves the
investigation of digital devices and data for legal or investigative
purposes.
•Forensic data recovery is often employed in cases involving cybercrime,
corporate investigations, legal disputes, and law enforcement activities.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 257
Recovery Techniques
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 258
A Database Backup
Plan
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 259
A Database Backup Plan
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 260
Database Backup Plan
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 261
Database Backup Plan
Step 2: Consider your recovery objectives
• What are your recovery objectives in the event of a disaster? You may need
to adopt a specific backup strategy or tool depending on your recovery time
objectives (RTOs) and recovery point objectives (RPOs).
• Here, your RTO is the maximum amount of time it should take to recover,
while your RPO is the maximum amount of data loss you can afford to
tolerate.
• For example, full database backups might make it hard to achieve your
RPOs if a large amount of time and data passes between consecutive
backups.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 262
Database Backup Plan
Step 3: Choose between online or offline backups
•While your data types and requirements will largely impact this decision,
you may still have to choose between online or offline backups.
•Though high-security applications often call for offline backups using
physical backup devices and servers, they come with overhead and
ongoing device maintenance.
•As a result, online backups are usually preferred, especially as more
companies leverage flexible and affordable cloud infrastructure for data
storage.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 263
Database Backup Plan
Step 4: Assign a backup strategy based on system
capabilities
•Your choice from Step 3 will greatly impact the backup strategy you
use.
•For example, offline backups may not be able to support full
database backups promptly, which might otherwise be more practical
in the cloud.
•In any case, however, incremental or differential backups are usually
appropriate for most applications.
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 264
Database Backup Plan
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 265
End of Part Four
DATABASE MANAGEMENT – CBE - BIT II
PREPARED BY MR. KIKWEMBO MLEKWA (COLLEGE OF BUSINESS EDUCATION -DSM) 10/31/2023 266