๋ณธ๋ฌธ ๋ฐ”๋กœ๊ฐ€๊ธฐ

๐Ÿ“š ์ „๊ณต ๊ณต๋ถ€55

[์•Œ๊ณ ๋ฆฌ์ฆ˜] ์ ํ™”์‹์˜ ์ดํ•ด(recurrence relation) ์ ํ™”์‹ ์ˆ˜์—ด์˜ ๊ท€๋‚ฉ์  ์ •์˜์™€ ์œ ์‚ฌ ์ฐจ์ด : ์ธ์ ‘ํ•œ ํ•ญ๊ฐ„์˜ ๊ด€๊ณ„๋งŒ์„ ๋‹ค๋ฃจ๋Š” ๊ฒƒ์€ ์•„๋‹ˆ๋‹ค. ์–ด๋–ค ํ•จ์ˆ˜๋ฅผ ์ž์‹ ๋ณด๋‹ค ๋” ์ž‘์€ ๋ณ€์ˆ˜์— ๋Œ€ํ•œ ํ•จ์ˆ˜ ์ž์‹ ๊ณผ์˜ ๊ด€๊ณ„๋กœ ํ‘œํ˜„ํ•œ ๊ฒƒ. (์ˆ˜์—ด = ์ •์˜์—ญ์ด ์ •์ˆ˜์ธ ํ•จ์ˆ˜) ๋˜๋ถ€๋ฆ„, ํ˜น์€ ์œ ์‚ฌํ•œ ๋ฐฉ์‹์œผ๋กœ ๋ฌธ์ œ๋ฅผ ํ’€ ๋•Œ ๊ฑธ๋ฆฌ๋Š” ์‹œ๊ฐ„์„ ๊ตฌํ•˜๋Š”๋ฐ์— ์‚ฌ์šฉํ•จ ex) T(n) = T(n-1) + 1 + T(n-1) = 2T(n-1) + 1 An = T(n), An = 2A(n-1) + 1 ์ ํ™”์‹์„ ํ‘ธ๋Š” ๋ฒ• 1. ๋ฐ˜๋ณต ๋Œ€์น˜ : ์ฃผ์–ด์ง„ ์กฐ๊ฑด์„ ์ด์šฉํ•˜์—ฌ ์ ์  ์ž‘์€ ํ•จ์ˆ˜๋กœ ๋ฐ˜๋ณตํ•ด์„œ ๋Œ€์น˜ํ•˜๋Š” ๋ฐฉ๋ฒ•. ์นจ์ฐฉํ•˜๊ฒŒ ๊ผผ๊ผผํžˆ! 2. ์ถ”์ • ํ›„ ์ฆ๋ช… : ์ ํ™”์‹์˜ ๊ฒฐ๋ก ์„ ์ถ”์ •ํ•˜๊ณ , ๊ท€๋‚ฉ๋ฒ•์œผ๋กœ ์ฆ๋ช…ํ•จ. ๋ฐ˜๋ณต ๋Œ€์น˜๊ฐ€ ๋ณต์žกํ•  ๋•Œ ์œ ์šฉํ•จ. but ์ถ”์ •์ด ์‰ฝ์ง€ ์•Š์„ ์ˆ˜ ์žˆ์Œ 3. ๋งˆ์Šคํ„ฐ ์ •๋ฆฌ : ์ ํ™”์‹ ๊ณต์‹. ์—ฌ๊ธฐ์—์„œ๋Š” ๋‹ค.. 2023. 1. 16.
[์•Œ๊ณ ๋ฆฌ์ฆ˜] ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๊ฐœ์š” ๋ฐ ์ •์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ์ •์˜ : ์–ด๋–ค ์ž…๋ ฅ์—๋„ ์ •ํ™•ํ•œ ์ถœ๋ ฅ์„ ์œ ํ•œํ•œ ์‹œ๊ฐ„ ์•ˆ์— ๋‚ด๋Š” ํ”„๋กœ๊ทธ๋žจ ์–ด๋–ค ์ž…๋ ฅ : ๋ฌธ์ œ์˜ ๋‚œ์ด๋„๋‚˜, ์ž…๋ ฅ์˜ ํฌ๊ธฐ์— ์ƒ๊ด€์—†์ด ๋ฌธ์ œ๋ฅผ ํ’€ ์ˆ˜ ์žˆ๋‹ค. ์ •ํ™•ํ•œ ์ถœ๋ ฅ : ๋ฌธ์ œ๊ฐ€ ์š”๊ตฌํ•˜๋Š” ์กฐ๊ฑด์„ ๋งŒ์กฑํ•œ๋‹ค. ์ •๋‹ต์ด ์š”๊ตฌํ•˜๋Š” ์กฐ๊ฑด์ด ๋ฌด์—‡์ธ์ง€ ๋ช…์‹œํ•  ์ˆ˜ ์žˆ๋‹ค. ์œ ํ•œํ•œ ์‹œ๊ฐ„ : ๋ฌดํ•œ๋ฃจํ”„์— ๋น ์ง€์ง€ ์•Š๊ณ  ๋‚ฉ๋“ํ•  ์ˆ˜ ์žˆ๋Š” ์‹œ๊ฐ„์— ์ข…๋ฃŒํ•œ๋‹ค. ex) 100๋ช…์˜ ํ•™์ƒ๋“ค์˜ ์‹œํ—˜ ์ ์ˆ˜ ์ค‘ ์ตœ๋Œ“๊ฐ’์„ ๊ตฌํ•˜์‹œ์˜ค. ์ˆ˜ํ•™์  ๊ท€๋‚ฉ๋ฒ•→ ์ •ํ™•์„ฑ : ์ž๋ช…ํ•˜๋‹ค. → ์‹œ๊ฐ„ : n๋ช…์˜ ์ ์ˆ˜๋ฅผ ์ฝ์œผ๋ฉด, n-1๋ฒˆ ๋น„๊ต. → max(์ง€๊ธˆ๊นŒ์ง€์˜ ์ตœ๋Œ“๊ฐ’, i+1๋ฒˆ์งธ ํ•™์ƒ์˜ ์ ์ˆ˜) ex) 100๋ช…์˜ ํ•™์ƒ๋“ค์˜ ์‹œํ—˜ ์ ์ˆ˜ ์ค‘ ์ตœ๋นˆ๊ฐ’์„ ๊ตฌํ•˜์‹œ์˜ค. ex) ์ž…๋ ฅ : U={1,2, … , n} ์ค‘์—์„œ ํŠน์ •ํ•œ ์ˆ˜ ํ•˜๋‚˜๋งŒ ๋นผ๊ณ  ๋ฌด์ž‘์œ„์˜ ์ˆœ์„œ๋กœ n-1๊ฐœ์˜ ์ˆซ์ž๊ฐ€ ํ•œ๋ฒˆ์— .. 2023. 1. 16.
[DB] ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๋ณด์•ˆ Database Security and Authorization Subsystem ๋ณด์•ˆ ๋ฐ ๊ถŒํ•œ๋ถ€์—ฌ DB security legal and ethical policy issues system-related issues security levels Threats to Databases Loss of integrity : ๋ฌด๊ฒฐ์„ฑ ์ƒ์‹ค Loss of availability : ๊ฐ€์šฉ์„ฑ ์ƒ์‹ค Loss of confidentiality : ๊ธฐ๋ฐ€์„ฑ ์ƒ์‹ค access control, inference control, flow control, encryption DB security : not an isolated concern multiuser DB system database security and authoriza.. 2022. 12. 30.
[DB] ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๋ณต๊ตฌ Recovery Techniques Recovery Concept recent consistent state : no errors in db, no inconsistencies in db systme log Catastrophic failure (์น˜๋ช…์  ์žฅ์• ) → backed up, redoing Noncatastrophic failure (๋น„์žฌํ•ด์  ์žฅ์• ) → undoing, redo, deferred update&immediate update Caching(Buffering) of disk blocks ํšจ์œจ์„ฑ์„ ์œ„ํ•ด์„œ ์บ์‹œ ์‚ฌ์šฉ DBMS cache Buffer replacement : ๋ฒ„ํผ ๊ต์ฒด( flush ) dirty bit : ๋ฒ„ํผ๊ฐ€ ์ˆ˜์ •๋˜์—ˆ๋Š”์ง€ ์—ฌ.. 2022. 12. 30.
[DB] ๋™์‹œ์„ฑ ์ œ์–ด Concurrency Control Techniques Concurrency Control Protocols : guarantee serializability (์ง๋ ฌํ™” ๋ณด์žฅ) Locking Timestamps multiversion CC protocols Optimistic protocols Multiple granularity concurrency control protocol Two-phase Locking Techniques : ์ด์ค‘ ๋ผํ‚น lock ์ƒํƒœ 1, unlock ์ƒํƒœ๋Š” 0 Lock table : lock ์ •๋ณด๋ฅผ ๊ด€๋ฆฌํ•˜๋Š” ์„œ๋ธŒ์‹œ์Šคํ…œ plus a queue for transactions that are waiting to access item Shared/Exclusive (or Read/Wr.. 2022. 12. 30.
[DB] Transaction processing Transaction Concepts Concurrent Executions Transaction Schedule Serializability Recoverability Single-User vs Multiuser Systems ๊ต๋Œ€ ์ˆ˜ํ–‰ : interleaved concurrency Transaction : an executing program that forms a logical unit of db processing Begin transaction - end transaction; includes DB access operations read-only / read-write transaction read-item(X) : ๋””์Šคํฌ๋ธ”๋ก ์ฃผ์†Œ์ฐพ๊ธฐ-๋ฒ„ํผ์— ๋ณต์‚ฌ-ํ”„๋กœ๊ทธ๋žจ ๋ณ€์ˆ˜๋กœ ๋ณต์‚ฌ write-item(X).. 2022. 12. 30.
728x90
๋ฐ˜์‘ํ˜•